Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
yQrCGtNgsf.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Adobe\Acrobat DC\JPOyDhPFIytu.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Uninstall Information\JPOyDhPFIytu.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\JPOyDhPFIytu.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\yQrCGtNgsf.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\6C8kMSA4ag.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\77a9gOcAJB.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9VsmEYMPZS.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9eKXf9oU9J.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\F0qtrCuOKA.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mpHYiEZ4vY.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mzBmoeLRKc.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\riciCmDgnt.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tOMWzubzd4.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\uw07fWAZe6.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\BDesMBdT.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\FTTrxXjd.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\GJcAmyRG.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\HPxsKDSZ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\IjLZavdG.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\KRjbfmWU.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\KZthgyKJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\LCrhcYww.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\MAAYLQkP.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\NkPigQpK.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\OzAXPueG.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\RdNoqiHi.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\RfcHRSFf.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\SKvXgoIi.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\TADrPPcC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\TLlpvaAw.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\TzzXjEkC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\UkLxLBCd.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\VjLFuzVH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\VnZQnlzb.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\WTjyQsvs.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\apDEhkEl.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\cyaNQADQ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\dUDNIbMu.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\eReVdbbp.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\eWtfXNEJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\edjwtIzh.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\fXYUxCDX.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\gcAWdtGq.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\lmQBfErr.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\mvOMxtrw.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\nzBVHGUq.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\oxAuScwr.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\pGrkhfIF.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\pLpTuJYH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\vlAbNuev.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\waJkCVMY.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\yuIieleo.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zdFkvbcm.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zuWaRqDn.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\JPOyDhPFIytu.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Microsoft.NET\RedistList\599871f56ea49f
|
ASCII text, with very long lines (855), with no line terminators
|
dropped
|
||
C:\Program Files\Adobe\Acrobat DC\599871f56ea49f
|
ASCII text, with very long lines (348), with no line terminators
|
dropped
|
||
C:\Program Files\Adobe\Acrobat DC\JPOyDhPFIytu.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Uninstall Information\599871f56ea49f
|
ASCII text, with very long lines (466), with no line terminators
|
dropped
|
||
C:\Program Files\Uninstall Information\JPOyDhPFIytu.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Recovery\599871f56ea49f
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Recovery\JPOyDhPFIytu.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\JPOyDhPFIytu.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5mIZs8oYbs
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\DXbWJZalmv
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\EU3LD70Oqh
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\GYwT7aWjpb
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\KMybJi9dhQ
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\VKALHPRRoG
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\i68H4JRRfw
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\kbLEDWdIV6
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\sF1f8KSh6h
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tAlK2upyiu
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\Desktop\38d863ed75bbb0
|
ASCII text, with very long lines (753), with no line terminators
|
dropped
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\599871f56ea49f
|
ASCII text, with very long lines (349), with no line terminators
|
dropped
|
||
C:\Windows\BitLockerDiscoveryVolumeContents\JPOyDhPFIytu.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
\Device\Null
|
ASCII text
|
dropped
|
There are 70 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\yQrCGtNgsf.exe
|
"C:\Users\user\Desktop\yQrCGtNgsf.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\9eKXf9oU9J.bat"
|
||
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
|
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\77a9gOcAJB.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
|
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\tOMWzubzd4.bat"
|
||
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
|
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\6C8kMSA4ag.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
|
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\mzBmoeLRKc.bat"
|
||
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
|
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\F0qtrCuOKA.bat"
|
||
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
|
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\uw07fWAZe6.bat"
|
||
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
|
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\9VsmEYMPZS.bat"
|
||
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
|
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\mpHYiEZ4vY.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Program Files (x86)\Microsoft.NET\RedistList\JPOyDhPFIytu.exe
|
"C:\Program Files (x86)\microsoft.net\RedistList\JPOyDhPFIytu.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\riciCmDgnt.bat"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
There are 40 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://115583cm.n9shteam2.top/
|
unknown
|
||
http://115583cm.n9shteam2.top/vmTo_authDbbaseTesttrackDatalifedownloads.php
|
37.44.238.250
|
||
http://115583cm.n9shteam2.top
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
115583cm.n9shteam2.top
|
37.44.238.250
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
37.44.238.250
|
115583cm.n9shteam2.top
|
France
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\cbb3ca45e57c97e576553a11cd955c1ca9eafe4e
|
f859629861127e33de65a7f53854525a8b72ffb3
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\JPOyDhPFIytu_RASMANCS
|
FileDirectory
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
272000
|
unkown
|
page readonly
|
||
128EA000
|
trusted library allocation
|
page read and write
|
||
57A067C000
|
stack
|
page read and write
|
||
2B14F1B4000
|
heap
|
page read and write
|
||
7FFB4B47A000
|
trusted library allocation
|
page read and write
|
||
70D3CFF000
|
stack
|
page read and write
|
||
7FFB4B478000
|
trusted library allocation
|
page read and write
|
||
7FFB4B47A000
|
trusted library allocation
|
page read and write
|
||
7FFB4B612000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4B4000
|
trusted library allocation
|
page read and write
|
||
3113000
|
trusted library allocation
|
page read and write
|
||
13302000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3E0000
|
trusted library allocation
|
page execute and read and write
|
||
2B14F390000
|
heap
|
page read and write
|
||
7FFB4B3F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B7F8000
|
trusted library allocation
|
page read and write
|
||
1B83F000
|
stack
|
page read and write
|
||
21EA9FD0000
|
heap
|
page read and write
|
||
2B8A000
|
trusted library allocation
|
page read and write
|
||
3455000
|
trusted library allocation
|
page read and write
|
||
89D000
|
heap
|
page read and write
|
||
2672E0B0000
|
heap
|
page read and write
|
||
7FFB4B3D6000
|
trusted library allocation
|
page execute and read and write
|
||
D40000
|
heap
|
page read and write
|
||
7FFB4B78F000
|
trusted library allocation
|
page read and write
|
||
1B62E000
|
stack
|
page read and write
|
||
2E39000
|
trusted library allocation
|
page read and write
|
||
7FFB4B760000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
1BE8E000
|
stack
|
page read and write
|
||
7FFB4B5F4000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
3431000
|
trusted library allocation
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
10E5000
|
heap
|
page read and write
|
||
1B88A000
|
heap
|
page read and write
|
||
FAE82FB000
|
stack
|
page read and write
|
||
7FFB4B483000
|
trusted library allocation
|
page read and write
|
||
1BDBE000
|
stack
|
page read and write
|
||
2F3C000
|
trusted library allocation
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
7FFB4B5D2000
|
trusted library allocation
|
page read and write
|
||
1AECF000
|
stack
|
page read and write
|
||
3398000
|
trusted library allocation
|
page read and write
|
||
7FFB4B800000
|
trusted library allocation
|
page execute and read and write
|
||
22664350000
|
heap
|
page read and write
|
||
12EF6000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2DD000
|
trusted library allocation
|
page execute and read and write
|
||
13275000
|
trusted library allocation
|
page read and write
|
||
319B000
|
trusted library allocation
|
page read and write
|
||
1B6BE000
|
stack
|
page read and write
|
||
7FFB4B2CD000
|
trusted library allocation
|
page execute and read and write
|
||
30B6000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4AA000
|
trusted library allocation
|
page read and write
|
||
12D10000
|
trusted library allocation
|
page read and write
|
||
19E3BDF3000
|
heap
|
page read and write
|
||
7FFB4B2DC000
|
trusted library allocation
|
page read and write
|
||
7FFB4B490000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2D8000
|
trusted library allocation
|
page read and write
|
||
81C000
|
heap
|
page read and write
|
||
7FFB4B2F0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B30D000
|
trusted library allocation
|
page execute and read and write
|
||
1B2A1000
|
heap
|
page read and write
|
||
20D87B14000
|
heap
|
page read and write
|
||
125F5000
|
trusted library allocation
|
page read and write
|
||
7FFB4B500000
|
trusted library allocation
|
page read and write
|
||
2BBE5BF4000
|
heap
|
page read and write
|
||
30BB000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
2F2D000
|
trusted library allocation
|
page read and write
|
||
33E1000
|
trusted library allocation
|
page read and write
|
||
7FFB4B540000
|
trusted library allocation
|
page execute and read and write
|
||
1AFE0000
|
unkown
|
page readonly
|
||
1321B000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
1BB0E000
|
heap
|
page read and write
|
||
7FFB4B4BC000
|
trusted library allocation
|
page read and write
|
||
3061000
|
trusted library allocation
|
page read and write
|
||
2AD3000
|
trusted library allocation
|
page read and write
|
||
2D16000
|
trusted library allocation
|
page read and write
|
||
7FFB4B386000
|
trusted library allocation
|
page read and write
|
||
D822AB000
|
stack
|
page read and write
|
||
2672DF13000
|
heap
|
page read and write
|
||
7FFB4B31C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B530000
|
trusted library allocation
|
page execute and read and write
|
||
19E3BF90000
|
heap
|
page read and write
|
||
7FFB4B540000
|
trusted library allocation
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
7FFB4B7D0000
|
trusted library allocation
|
page read and write
|
||
2672E140000
|
heap
|
page read and write
|
||
321B000
|
trusted library allocation
|
page read and write
|
||
E31198E000
|
stack
|
page read and write
|
||
1CE4B3F0000
|
heap
|
page read and write
|
||
3022000
|
trusted library allocation
|
page read and write
|
||
342B000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
12881000
|
trusted library allocation
|
page read and write
|
||
7FFB4B500000
|
trusted library allocation
|
page execute and read and write
|
||
2647000
|
trusted library allocation
|
page read and write
|
||
167BEB80000
|
heap
|
page read and write
|
||
2B14F1B4000
|
heap
|
page read and write
|
||
7FFB4B2BD000
|
trusted library allocation
|
page execute and read and write
|
||
1219000
|
heap
|
page read and write
|
||
2E79000
|
trusted library allocation
|
page read and write
|
||
1B5AA000
|
heap
|
page read and write
|
||
2E19000
|
trusted library allocation
|
page read and write
|
||
2C09000
|
heap
|
page read and write
|
||
32B5000
|
trusted library allocation
|
page read and write
|
||
1C3BE000
|
stack
|
page read and write
|
||
132C0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B512000
|
trusted library allocation
|
page read and write
|
||
7FFB4B30C000
|
trusted library allocation
|
page read and write
|
||
2F4A000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7A0000
|
trusted library allocation
|
page read and write
|
||
36E0000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
1AE04000
|
heap
|
page read and write
|
||
7FFB4B410000
|
trusted library allocation
|
page execute and read and write
|
||
2450000
|
heap
|
page execute and read and write
|
||
12E24000
|
trusted library allocation
|
page read and write
|
||
18DE7959000
|
heap
|
page read and write
|
||
2F46000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2ED000
|
trusted library allocation
|
page execute and read and write
|
||
1BDBB000
|
stack
|
page read and write
|
||
7FFB4B880000
|
trusted library allocation
|
page execute and read and write
|
||
1B0FE000
|
stack
|
page read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
16E0000
|
heap
|
page read and write
|
||
31B9000
|
trusted library allocation
|
page read and write
|
||
DCC000
|
heap
|
page read and write
|
||
21EA9E20000
|
heap
|
page read and write
|
||
7FFB4B800000
|
trusted library allocation
|
page execute and read and write
|
||
3972000
|
trusted library allocation
|
page read and write
|
||
7FFB4B472000
|
trusted library allocation
|
page execute and read and write
|
||
12F94000
|
trusted library allocation
|
page read and write
|
||
26A7B040000
|
heap
|
page read and write
|
||
12F20000
|
trusted library allocation
|
page read and write
|
||
279B000
|
trusted library allocation
|
page read and write
|
||
2787000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page execute and read and write
|
||
205B0BE0000
|
heap
|
page read and write
|
||
7FFB4B740000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
7FFB4B30C000
|
trusted library allocation
|
page read and write
|
||
31CB000
|
trusted library allocation
|
page read and write
|
||
12FC0000
|
trusted library allocation
|
page read and write
|
||
3179000
|
trusted library allocation
|
page read and write
|
||
1B91E000
|
stack
|
page read and write
|
||
3388000
|
trusted library allocation
|
page read and write
|
||
24E0000
|
heap
|
page execute and read and write
|
||
16839123000
|
heap
|
page read and write
|
||
21EA9D2A000
|
heap
|
page read and write
|
||
7FFB4B7A0000
|
trusted library allocation
|
page read and write
|
||
78A000
|
heap
|
page read and write
|
||
26EE000
|
stack
|
page read and write
|
||
1F8B4200000
|
heap
|
page read and write
|
||
1BB3B000
|
heap
|
page read and write
|
||
8AA000
|
heap
|
page read and write
|
||
7FFB4B4BC000
|
trusted library allocation
|
page read and write
|
||
3433000
|
trusted library allocation
|
page read and write
|
||
1BA4F000
|
stack
|
page read and write
|
||
205B0FB5000
|
heap
|
page read and write
|
||
7FFB4B472000
|
trusted library allocation
|
page execute and read and write
|
||
2D17000
|
trusted library allocation
|
page read and write
|
||
1286C000
|
trusted library allocation
|
page read and write
|
||
278F000
|
trusted library allocation
|
page read and write
|
||
3169000
|
trusted library allocation
|
page read and write
|
||
18DE7967000
|
heap
|
page read and write
|
||
12D4B000
|
trusted library allocation
|
page read and write
|
||
1BDCE000
|
stack
|
page read and write
|
||
7FFB4B77E000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
7FFB4B4AA000
|
trusted library allocation
|
page read and write
|
||
7FFB4B770000
|
trusted library allocation
|
page read and write
|
||
1B12E000
|
stack
|
page read and write
|
||
F43FBBC000
|
stack
|
page read and write
|
||
7FFB4B524000
|
trusted library allocation
|
page read and write
|
||
21F3A530000
|
heap
|
page read and write
|
||
7FFB4B314000
|
trusted library allocation
|
page read and write
|
||
F1D000
|
heap
|
page read and write
|
||
27A9000
|
trusted library allocation
|
page read and write
|
||
1245000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
22922EF3000
|
heap
|
page read and write
|
||
18DE7940000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
2671000
|
trusted library allocation
|
page read and write
|
||
1BA10000
|
heap
|
page read and write
|
||
7FFB4B32C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B530000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B2F3000
|
trusted library allocation
|
page execute and read and write
|
||
CDE000
|
stack
|
page read and write
|
||
2A5F000
|
trusted library allocation
|
page read and write
|
||
2B14F180000
|
heap
|
page read and write
|
||
2E56000
|
trusted library allocation
|
page read and write
|
||
7FFB4B442000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B2CD000
|
trusted library allocation
|
page execute and read and write
|
||
27DB000
|
trusted library allocation
|
page read and write
|
||
2B14F400000
|
heap
|
page read and write
|
||
D823AF000
|
stack
|
page read and write
|
||
12DCB000
|
trusted library allocation
|
page read and write
|
||
7FFB4B411000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B4F0000
|
trusted library allocation
|
page read and write
|
||
20D8789F000
|
heap
|
page read and write
|
||
7FFB4B532000
|
trusted library allocation
|
page read and write
|
||
2569000
|
trusted library allocation
|
page read and write
|
||
F17000
|
heap
|
page read and write
|
||
7FFB4B3F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B790000
|
trusted library allocation
|
page read and write
|
||
1B69D000
|
heap
|
page read and write
|
||
7FFB4B511000
|
trusted library allocation
|
page read and write
|
||
12EBF000
|
trusted library allocation
|
page read and write
|
||
203A9960000
|
heap
|
page read and write
|
||
7FFB4B4DD000
|
trusted library allocation
|
page read and write
|
||
1B1FE000
|
stack
|
page read and write
|
||
37DF000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4E0000
|
trusted library allocation
|
page read and write
|
||
2DBA000
|
trusted library allocation
|
page read and write
|
||
1B437000
|
heap
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
1C4BE000
|
stack
|
page read and write
|
||
12C74000
|
trusted library allocation
|
page read and write
|
||
7FFB4B366000
|
trusted library allocation
|
page read and write
|
||
7FFB4B31B000
|
trusted library allocation
|
page execute and read and write
|
||
2A84000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
853000
|
heap
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
203A99F9000
|
heap
|
page read and write
|
||
3132000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7E0000
|
trusted library allocation
|
page execute and read and write
|
||
3413000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3B6000
|
trusted library allocation
|
page execute and read and write
|
||
3248000
|
trusted library allocation
|
page read and write
|
||
7FFB4B510000
|
trusted library allocation
|
page read and write
|
||
14C5000
|
heap
|
page read and write
|
||
26F9000
|
trusted library allocation
|
page read and write
|
||
2672E2A0000
|
heap
|
page read and write
|
||
7FFB4B4E7000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
167BEC07000
|
heap
|
page read and write
|
||
7FFB4B4B7000
|
trusted library allocation
|
page read and write
|
||
13F5000
|
heap
|
page read and write
|
||
D9A000
|
heap
|
page read and write
|
||
20F2B458000
|
heap
|
page read and write
|
||
1B613000
|
heap
|
page execute and read and write
|
||
1B870000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
7FFB4B4E2000
|
trusted library allocation
|
page read and write
|
||
1BFC0000
|
heap
|
page read and write
|
||
33AE000
|
trusted library allocation
|
page read and write
|
||
1EB66480000
|
heap
|
page read and write
|
||
2CF1000
|
trusted library allocation
|
page read and write
|
||
12F07000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7BF000
|
trusted library allocation
|
page read and write
|
||
2430000
|
heap
|
page execute and read and write
|
||
1B43F000
|
stack
|
page read and write
|
||
1C08E000
|
stack
|
page read and write
|
||
274E000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7B0000
|
trusted library allocation
|
page read and write
|
||
1A8BB000
|
heap
|
page read and write
|
||
12CF7000
|
trusted library allocation
|
page read and write
|
||
1BB3E000
|
stack
|
page read and write
|
||
278B000
|
trusted library allocation
|
page read and write
|
||
31DC000
|
trusted library allocation
|
page read and write
|
||
7FFB4B31C000
|
trusted library allocation
|
page execute and read and write
|
||
3049000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7C8000
|
trusted library allocation
|
page read and write
|
||
7FFB4B557000
|
trusted library allocation
|
page read and write
|
||
1B22F000
|
stack
|
page read and write
|
||
1275D480000
|
heap
|
page read and write
|
||
7FFB4B550000
|
trusted library allocation
|
page execute and read and write
|
||
FC5000
|
heap
|
page read and write
|
||
11A5000
|
heap
|
page read and write
|
||
2F85000
|
trusted library allocation
|
page read and write
|
||
12DD4000
|
trusted library allocation
|
page read and write
|
||
12E2F000
|
trusted library allocation
|
page read and write
|
||
22922EF3000
|
heap
|
page read and write
|
||
7FFB4B4B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B527000
|
trusted library allocation
|
page read and write
|
||
25C8000
|
trusted library allocation
|
page read and write
|
||
2FBB000
|
trusted library allocation
|
page read and write
|
||
1BB80000
|
heap
|
page read and write
|
||
2C99000
|
trusted library allocation
|
page read and write
|
||
89B000
|
heap
|
page read and write
|
||
7FFB4B4A0000
|
trusted library allocation
|
page execute and read and write
|
||
132EC000
|
trusted library allocation
|
page read and write
|
||
7FFB4B500000
|
trusted library allocation
|
page execute and read and write
|
||
12C5000
|
heap
|
page read and write
|
||
7FFB4B3A6000
|
trusted library allocation
|
page read and write
|
||
1EC054D0000
|
heap
|
page read and write
|
||
3415000
|
trusted library allocation
|
page read and write
|
||
3181000
|
trusted library allocation
|
page read and write
|
||
12874000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2C3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B510000
|
trusted library allocation
|
page read and write
|
||
167BEBE0000
|
heap
|
page read and write
|
||
21EA9D61000
|
heap
|
page read and write
|
||
21EA9D20000
|
heap
|
page read and write
|
||
12D90000
|
trusted library allocation
|
page read and write
|
||
2D2C000
|
trusted library allocation
|
page read and write
|
||
3A632FF000
|
stack
|
page read and write
|
||
2B14F1B4000
|
heap
|
page read and write
|
||
1C190000
|
heap
|
page read and write
|
||
36CA000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3A0000
|
trusted library allocation
|
page read and write
|
||
1EB664D0000
|
heap
|
page read and write
|
||
7FFB4B760000
|
trusted library allocation
|
page read and write
|
||
168390F0000
|
heap
|
page read and write
|
||
266A000
|
trusted library allocation
|
page read and write
|
||
2376B660000
|
heap
|
page read and write
|
||
20F2B457000
|
heap
|
page read and write
|
||
7FFB4B478000
|
trusted library allocation
|
page read and write
|
||
19E3BDCA000
|
heap
|
page read and write
|
||
1EC0524F000
|
heap
|
page read and write
|
||
2672E144000
|
heap
|
page read and write
|
||
7FFB4B410000
|
trusted library allocation
|
page execute and read and write
|
||
3729000
|
trusted library allocation
|
page read and write
|
||
19E3BDF3000
|
heap
|
page read and write
|
||
1B20A000
|
stack
|
page read and write
|
||
7FFB4B4FE000
|
trusted library allocation
|
page read and write
|
||
317B000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
heap
|
page execute and read and write
|
||
7FFB4B540000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2FD000
|
trusted library allocation
|
page execute and read and write
|
||
1313B000
|
trusted library allocation
|
page read and write
|
||
A380BFF000
|
unkown
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
7FFB4B4FB000
|
trusted library allocation
|
page read and write
|
||
7FFB4B758000
|
trusted library allocation
|
page read and write
|
||
2CD4000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4A0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B777000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
16839123000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
12EEE000
|
trusted library allocation
|
page read and write
|
||
2DEA000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2D0000
|
trusted library allocation
|
page read and write
|
||
2BBE5BE3000
|
heap
|
page read and write
|
||
1B4E0000
|
heap
|
page read and write
|
||
2E1B000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
7FFB4B524000
|
trusted library allocation
|
page read and write
|
||
2AD2000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4E0000
|
trusted library allocation
|
page read and write
|
||
2FF8000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
1B686000
|
heap
|
page read and write
|
||
2E68000
|
trusted library allocation
|
page read and write
|
||
1B933000
|
heap
|
page execute and read and write
|
||
2756000
|
trusted library allocation
|
page read and write
|
||
1CA5B000
|
stack
|
page read and write
|
||
1B7BE000
|
stack
|
page read and write
|
||
3A948FF000
|
stack
|
page read and write
|
||
2B41000
|
trusted library allocation
|
page read and write
|
||
12C96000
|
trusted library allocation
|
page read and write
|
||
7FFB4B541000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7D0000
|
trusted library allocation
|
page execute and read and write
|
||
168391F0000
|
heap
|
page read and write
|
||
1C210000
|
heap
|
page read and write
|
||
2FB8000
|
trusted library allocation
|
page read and write
|
||
1B56F000
|
stack
|
page read and write
|
||
7FFB4B750000
|
trusted library allocation
|
page read and write
|
||
12625000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4A0000
|
trusted library allocation
|
page execute and read and write
|
||
2799000
|
trusted library allocation
|
page read and write
|
||
2F44000
|
trusted library allocation
|
page read and write
|
||
205B0FB0000
|
heap
|
page read and write
|
||
2B14F1B4000
|
heap
|
page read and write
|
||
7FFB4B4E0000
|
trusted library allocation
|
page read and write
|
||
276ADE90000
|
heap
|
page read and write
|
||
12E63000
|
trusted library allocation
|
page read and write
|
||
2AB8000
|
trusted library allocation
|
page read and write
|
||
2E11000
|
trusted library allocation
|
page read and write
|
||
282A000
|
trusted library allocation
|
page read and write
|
||
22922EC0000
|
heap
|
page read and write
|
||
7FFB4B31C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B441000
|
trusted library allocation
|
page execute and read and write
|
||
1100000
|
heap
|
page read and write
|
||
7FFB4B411000
|
trusted library allocation
|
page execute and read and write
|
||
20D878A2000
|
heap
|
page read and write
|
||
7FFB4B500000
|
trusted library allocation
|
page read and write
|
||
324D000
|
trusted library allocation
|
page read and write
|
||
26A7B355000
|
heap
|
page read and write
|
||
2EA6000
|
trusted library allocation
|
page read and write
|
||
7FFB4B30D000
|
trusted library allocation
|
page execute and read and write
|
||
2FA2000
|
trusted library allocation
|
page read and write
|
||
7FFB4B870000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
heap
|
page execute and read and write
|
||
1759000
|
heap
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
21EA9D61000
|
heap
|
page read and write
|
||
7FFB4B7B4000
|
trusted library allocation
|
page read and write
|
||
1EC05440000
|
heap
|
page read and write
|
||
244AF5A7000
|
heap
|
page read and write
|
||
7FFB4B5D4000
|
trusted library allocation
|
page read and write
|
||
2C4D000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2FD000
|
trusted library allocation
|
page execute and read and write
|
||
20F2B3A0000
|
heap
|
page read and write
|
||
20D87BA0000
|
heap
|
page read and write
|
||
1EB664D7000
|
heap
|
page read and write
|
||
12754000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
133CB000
|
trusted library allocation
|
page read and write
|
||
1C85E000
|
stack
|
page read and write
|
||
7FFB4B789000
|
trusted library allocation
|
page read and write
|
||
2B6000
|
unkown
|
page readonly
|
||
F43FE7F000
|
stack
|
page read and write
|
||
2E50000
|
trusted library allocation
|
page read and write
|
||
13196000
|
trusted library allocation
|
page read and write
|
||
20D8789E000
|
heap
|
page read and write
|
||
2EFB000
|
trusted library allocation
|
page read and write
|
||
7FFB4B891000
|
trusted library allocation
|
page read and write
|
||
7FFB4B543000
|
trusted library allocation
|
page read and write
|
||
127D6000
|
trusted library allocation
|
page read and write
|
||
1B688000
|
heap
|
page read and write
|
||
7FFB4B797000
|
trusted library allocation
|
page read and write
|
||
7FFB4B488000
|
trusted library allocation
|
page read and write
|
||
740000
|
trusted library allocation
|
page read and write
|
||
12EA4000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
9FCA7FF000
|
stack
|
page read and write
|
||
7FFB4B768000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4C4000
|
trusted library allocation
|
page read and write
|
||
1236000
|
heap
|
page read and write
|
||
E00000
|
unkown
|
page readonly
|
||
28C8000
|
trusted library allocation
|
page read and write
|
||
2742000
|
trusted library allocation
|
page read and write
|
||
2D65000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4F0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2F4000
|
trusted library allocation
|
page read and write
|
||
2AD6000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4F0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B54E000
|
trusted library allocation
|
page read and write
|
||
1B6BA000
|
heap
|
page read and write
|
||
31BF000
|
trusted library allocation
|
page read and write
|
||
7FFB4B751000
|
trusted library allocation
|
page read and write
|
||
7FFB4B880000
|
trusted library allocation
|
page execute and read and write
|
||
1AF87000
|
heap
|
page read and write
|
||
1B61A000
|
heap
|
page read and write
|
||
2BBE5BDF000
|
heap
|
page read and write
|
||
E6D000
|
heap
|
page read and write
|
||
2672DEEA000
|
heap
|
page read and write
|
||
1B426000
|
heap
|
page read and write
|
||
270000
|
unkown
|
page readonly
|
||
7FFB4B520000
|
trusted library allocation
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
FAE84FF000
|
stack
|
page read and write
|
||
7FFB4B2F0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B524000
|
trusted library allocation
|
page read and write
|
||
7FFB4B5E4000
|
trusted library allocation
|
page read and write
|
||
3715000
|
trusted library allocation
|
page read and write
|
||
2F26000
|
trusted library allocation
|
page read and write
|
||
2DB3000
|
heap
|
page execute and read and write
|
||
1282B000
|
trusted library allocation
|
page read and write
|
||
2E41000
|
trusted library allocation
|
page read and write
|
||
F55000
|
heap
|
page read and write
|
||
7FFB4B390000
|
trusted library allocation
|
page execute and read and write
|
||
D20000
|
heap
|
page read and write
|
||
1145000
|
heap
|
page read and write
|
||
D2F61FF000
|
stack
|
page read and write
|
||
7FFB4B7D0000
|
trusted library allocation
|
page read and write
|
||
21EA9F50000
|
heap
|
page read and write
|
||
12A51000
|
trusted library allocation
|
page read and write
|
||
276ADFA0000
|
heap
|
page read and write
|
||
7FFB4B7C0000
|
trusted library allocation
|
page read and write
|
||
FFAAE7E000
|
stack
|
page read and write
|
||
12CC6000
|
trusted library allocation
|
page read and write
|
||
7FFB4B51D000
|
trusted library allocation
|
page read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
7FFB4B49D000
|
trusted library allocation
|
page read and write
|
||
E46000
|
heap
|
page read and write
|
||
35DA000
|
trusted library allocation
|
page read and write
|
||
2E07000
|
trusted library allocation
|
page read and write
|
||
7FFB4B478000
|
trusted library allocation
|
page read and write
|
||
7FFB4B480000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4FB000
|
trusted library allocation
|
page read and write
|
||
70D3BFF000
|
unkown
|
page read and write
|
||
7FFB4B77E000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4F4000
|
trusted library allocation
|
page read and write
|
||
11D9000
|
heap
|
page read and write
|
||
127E8000
|
trusted library allocation
|
page read and write
|
||
1BECE000
|
stack
|
page read and write
|
||
19E3BDEE000
|
heap
|
page read and write
|
||
264D000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7BF000
|
trusted library allocation
|
page read and write
|
||
12EEC000
|
trusted library allocation
|
page read and write
|
||
3089000
|
trusted library allocation
|
page read and write
|
||
1B635000
|
heap
|
page read and write
|
||
7FFB4B7AC000
|
trusted library allocation
|
page read and write
|
||
8D4327B000
|
stack
|
page read and write
|
||
BA3F8FF000
|
stack
|
page read and write
|
||
1275D380000
|
heap
|
page read and write
|
||
3187000
|
trusted library allocation
|
page read and write
|
||
1BD5E000
|
stack
|
page read and write
|
||
28EF000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2C6000
|
trusted library allocation
|
page read and write
|
||
7FFB4B770000
|
trusted library allocation
|
page read and write
|
||
3185000
|
trusted library allocation
|
page read and write
|
||
7FFB4B787000
|
trusted library allocation
|
page read and write
|
||
338A000
|
trusted library allocation
|
page read and write
|
||
109D000
|
heap
|
page read and write
|
||
2EC1000
|
trusted library allocation
|
page read and write
|
||
2797000
|
trusted library allocation
|
page read and write
|
||
1C5AF000
|
stack
|
page read and write
|
||
7FFB4B7C8000
|
trusted library allocation
|
page read and write
|
||
7FFB4B570000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B4BD000
|
trusted library allocation
|
page read and write
|
||
224EAFF000
|
stack
|
page read and write
|
||
F49000
|
heap
|
page read and write
|
||
7FFB4B2CC000
|
trusted library allocation
|
page read and write
|
||
22922ECA000
|
heap
|
page read and write
|
||
21F3A570000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
7FFB4B790000
|
trusted library allocation
|
page read and write
|
||
7FFB4B510000
|
trusted library allocation
|
page read and write
|
||
253F000
|
trusted library allocation
|
page read and write
|
||
7FFB4B510000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B488000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
32EA000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2B4000
|
trusted library allocation
|
page read and write
|
||
36E000
|
stack
|
page read and write
|
||
1EC05275000
|
heap
|
page read and write
|
||
7FFB4B543000
|
trusted library allocation
|
page read and write
|
||
7FFB4B50D000
|
trusted library allocation
|
page read and write
|
||
25117420000
|
heap
|
page read and write
|
||
26A7B148000
|
heap
|
page read and write
|
||
1277B000
|
trusted library allocation
|
page read and write
|
||
7FFB4B34C000
|
trusted library allocation
|
page execute and read and write
|
||
1C48B000
|
stack
|
page read and write
|
||
2B14F1B4000
|
heap
|
page read and write
|
||
7FFB4B2F3000
|
trusted library allocation
|
page execute and read and write
|
||
12686000
|
trusted library allocation
|
page read and write
|
||
24E3000
|
heap
|
page execute and read and write
|
||
E31188C000
|
stack
|
page read and write
|
||
7FFB4B7D0000
|
trusted library allocation
|
page read and write
|
||
12657000
|
trusted library allocation
|
page read and write
|
||
7FFB4B550000
|
trusted library allocation
|
page read and write
|
||
2C98000
|
trusted library allocation
|
page read and write
|
||
7FFB4B77C000
|
trusted library allocation
|
page read and write
|
||
12D08000
|
trusted library allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
7FFB4B7B0000
|
trusted library allocation
|
page read and write
|
||
709000
|
heap
|
page read and write
|
||
22922FE0000
|
heap
|
page read and write
|
||
1BE9D000
|
stack
|
page read and write
|
||
7FFB4B2DD000
|
trusted library allocation
|
page execute and read and write
|
||
25117247000
|
heap
|
page read and write
|
||
12B15000
|
trusted library allocation
|
page read and write
|
||
FFAABDE000
|
stack
|
page read and write
|
||
7FFB4B3A6000
|
trusted library allocation
|
page read and write
|
||
2E1E000
|
trusted library allocation
|
page read and write
|
||
E31190E000
|
stack
|
page read and write
|
||
1EC05420000
|
heap
|
page read and write
|
||
2AED000
|
trusted library allocation
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
7FFB4B7A4000
|
trusted library allocation
|
page read and write
|
||
1314C000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
3389000
|
trusted library allocation
|
page read and write
|
||
1B59D000
|
heap
|
page read and write
|
||
35BC000
|
trusted library allocation
|
page read and write
|
||
21EA9D61000
|
heap
|
page read and write
|
||
7FFB4B3A6000
|
trusted library allocation
|
page execute and read and write
|
||
12C53000
|
trusted library allocation
|
page read and write
|
||
2F3E000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4C0000
|
trusted library allocation
|
page read and write
|
||
1BB5F000
|
stack
|
page read and write
|
||
21F3A607000
|
heap
|
page read and write
|
||
1266C000
|
trusted library allocation
|
page read and write
|
||
7FFB4B787000
|
trusted library allocation
|
page read and write
|
||
338F000
|
trusted library allocation
|
page read and write
|
||
3005000
|
trusted library allocation
|
page read and write
|
||
2E0F000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
stack
|
page read and write
|
||
7FFB4B530000
|
trusted library allocation
|
page execute and read and write
|
||
127CF000
|
trusted library allocation
|
page read and write
|
||
2DFD000
|
trusted library allocation
|
page read and write
|
||
7FFB4B614000
|
trusted library allocation
|
page read and write
|
||
7FFB4B797000
|
trusted library allocation
|
page read and write
|
||
3481000
|
trusted library allocation
|
page read and write
|
||
12BFF000
|
trusted library allocation
|
page read and write
|
||
125C6000
|
trusted library allocation
|
page read and write
|
||
FFAAB5B000
|
stack
|
page read and write
|
||
3177000
|
trusted library allocation
|
page read and write
|
||
21EA9D51000
|
heap
|
page read and write
|
||
1B6C7000
|
heap
|
page read and write
|
||
2EF9000
|
trusted library allocation
|
page read and write
|
||
5DB52CC000
|
stack
|
page read and write
|
||
7FFB4B3D0000
|
trusted library allocation
|
page execute and read and write
|
||
1B0DB000
|
stack
|
page read and write
|
||
7FFB4B4E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B2E4000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
1B014000
|
unkown
|
page readonly
|
||
7FFB4B850000
|
trusted library allocation
|
page execute and read and write
|
||
126DC000
|
trusted library allocation
|
page read and write
|
||
7FFB4B760000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4DD000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7B9000
|
trusted library allocation
|
page read and write
|
||
22922F03000
|
heap
|
page read and write
|
||
2E0B000
|
trusted library allocation
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
7FFB4B4F4000
|
trusted library allocation
|
page read and write
|
||
12C01000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
7FFB4B7D0000
|
trusted library allocation
|
page execute and read and write
|
||
BC0000
|
heap
|
page read and write
|
||
1F8B4180000
|
heap
|
page read and write
|
||
1F8B4160000
|
heap
|
page read and write
|
||
2CE6000
|
trusted library allocation
|
page read and write
|
||
7FFB4B761000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
7FFB4B7EB000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2F6000
|
trusted library allocation
|
page read and write
|
||
278D000
|
trusted library allocation
|
page read and write
|
||
1B550000
|
heap
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
7FFB4B2E4000
|
trusted library allocation
|
page read and write
|
||
1546000
|
heap
|
page read and write
|
||
12DA6000
|
trusted library allocation
|
page read and write
|
||
20D878A2000
|
heap
|
page read and write
|
||
7FFB4B512000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7A0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B476000
|
trusted library allocation
|
page read and write
|
||
3037000
|
trusted library allocation
|
page read and write
|
||
13046000
|
trusted library allocation
|
page read and write
|
||
2664000
|
trusted library allocation
|
page read and write
|
||
1C21F000
|
heap
|
page read and write
|
||
7FFB4B540000
|
trusted library allocation
|
page execute and read and write
|
||
1328E000
|
trusted library allocation
|
page read and write
|
||
1CE4B470000
|
heap
|
page read and write
|
||
317F000
|
trusted library allocation
|
page read and write
|
||
203A9A07000
|
heap
|
page read and write
|
||
3429000
|
trusted library allocation
|
page read and write
|
||
317C000
|
trusted library allocation
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
18CE000
|
stack
|
page read and write
|
||
21EA9D64000
|
heap
|
page read and write
|
||
1F8B420A000
|
heap
|
page read and write
|
||
7FFB4B790000
|
trusted library allocation
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3AC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B4B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B470000
|
trusted library allocation
|
page read and write
|
||
340B000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B4B3000
|
trusted library allocation
|
page read and write
|
||
19E3BD80000
|
heap
|
page read and write
|
||
311E000
|
trusted library allocation
|
page read and write
|
||
1EC05560000
|
heap
|
page read and write
|
||
7FFB4B7E0000
|
trusted library allocation
|
page execute and read and write
|
||
E5D6A8C000
|
stack
|
page read and write
|
||
269A000
|
trusted library allocation
|
page read and write
|
||
7FFB4B530000
|
trusted library allocation
|
page read and write
|
||
13072000
|
trusted library allocation
|
page read and write
|
||
203A9970000
|
heap
|
page read and write
|
||
7FFB4B512000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3D6000
|
trusted library allocation
|
page execute and read and write
|
||
151A000
|
heap
|
page read and write
|
||
1AE20000
|
heap
|
page read and write
|
||
F1C000
|
heap
|
page read and write
|
||
303D000
|
trusted library allocation
|
page read and write
|
||
2C09000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4D7000
|
trusted library allocation
|
page read and write
|
||
1CE4B410000
|
heap
|
page read and write
|
||
1B673000
|
heap
|
page read and write
|
||
12B2E000
|
trusted library allocation
|
page read and write
|
||
1EB66675000
|
heap
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
7FFB4B7F6000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
F39D2DC000
|
stack
|
page read and write
|
||
7FFB4B780000
|
trusted library allocation
|
page read and write
|
||
2D97000
|
trusted library allocation
|
page read and write
|
||
7FFB4B520000
|
trusted library allocation
|
page read and write
|
||
2EAD000
|
trusted library allocation
|
page read and write
|
||
7FFB4B488000
|
trusted library allocation
|
page read and write
|
||
7FFB4B772000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page execute and read and write
|
||
25CD000
|
trusted library allocation
|
page read and write
|
||
7FFB4B760000
|
trusted library allocation
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
7FFB4B520000
|
trusted library allocation
|
page read and write
|
||
79F000
|
heap
|
page read and write
|
||
12FFE000
|
trusted library allocation
|
page read and write
|
||
1275D680000
|
heap
|
page read and write
|
||
2DCE000
|
trusted library allocation
|
page read and write
|
||
1285B000
|
trusted library allocation
|
page read and write
|
||
7FFB4B530000
|
trusted library allocation
|
page execute and read and write
|
||
73B000
|
heap
|
page read and write
|
||
12C6B000
|
trusted library allocation
|
page read and write
|
||
E45000
|
heap
|
page read and write
|
||
7FFB4B2ED000
|
trusted library allocation
|
page execute and read and write
|
||
1B740000
|
heap
|
page read and write
|
||
2FBD000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2CD000
|
trusted library allocation
|
page execute and read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
2969000
|
trusted library allocation
|
page read and write
|
||
2F21000
|
trusted library allocation
|
page read and write
|
||
7FFB4B303000
|
trusted library allocation
|
page read and write
|
||
2C12000
|
heap
|
page read and write
|
||
1B535000
|
heap
|
page read and write
|
||
1B17F000
|
stack
|
page read and write
|
||
35B4000
|
trusted library allocation
|
page read and write
|
||
1BD0B000
|
stack
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
12E11000
|
trusted library allocation
|
page read and write
|
||
12C4A000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3B6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B4BC000
|
trusted library allocation
|
page read and write
|
||
12FBC000
|
trusted library allocation
|
page read and write
|
||
2DC2000
|
trusted library allocation
|
page read and write
|
||
26A7B350000
|
heap
|
page read and write
|
||
18DE7950000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
61BE2FF000
|
stack
|
page read and write
|
||
7FFB4B790000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4ED000
|
trusted library allocation
|
page read and write
|
||
1B1E0000
|
trusted library allocation
|
page read and write
|
||
1B070000
|
heap
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
12D77000
|
trusted library allocation
|
page read and write
|
||
276ADFD0000
|
heap
|
page read and write
|
||
7FFB4B4A6000
|
trusted library allocation
|
page read and write
|
||
7FFB4B46C000
|
trusted library allocation
|
page read and write
|
||
1B32E000
|
stack
|
page read and write
|
||
276ADF75000
|
heap
|
page read and write
|
||
2BBE5B00000
|
heap
|
page read and write
|
||
25CB000
|
trusted library allocation
|
page read and write
|
||
2BBE5BE5000
|
heap
|
page read and write
|
||
13246000
|
trusted library allocation
|
page read and write
|
||
2BF0000
|
heap
|
page execute and read and write
|
||
7FFB4B870000
|
trusted library allocation
|
page read and write
|
||
7FFB4B492000
|
trusted library allocation
|
page read and write
|
||
12CD6000
|
trusted library allocation
|
page read and write
|
||
3454000
|
trusted library allocation
|
page read and write
|
||
3082000
|
trusted library allocation
|
page read and write
|
||
30FF000
|
trusted library allocation
|
page read and write
|
||
167BEBA0000
|
heap
|
page read and write
|
||
7FFB4B310000
|
trusted library allocation
|
page read and write
|
||
2D2E000
|
trusted library allocation
|
page read and write
|
||
7FFB4B48C000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
12E76000
|
trusted library allocation
|
page read and write
|
||
1BAC0000
|
heap
|
page read and write
|
||
1CE4B310000
|
heap
|
page read and write
|
||
3199000
|
trusted library allocation
|
page read and write
|
||
7FFB4B557000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4DD000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
12E1B000
|
trusted library allocation
|
page read and write
|
||
224E9FF000
|
unkown
|
page read and write
|
||
130CB000
|
trusted library allocation
|
page read and write
|
||
2D3A000
|
trusted library allocation
|
page read and write
|
||
7FFB4B30C000
|
trusted library allocation
|
page read and write
|
||
133AA000
|
trusted library allocation
|
page read and write
|
||
2A9A000
|
trusted library allocation
|
page read and write
|
||
2E11000
|
trusted library allocation
|
page read and write
|
||
7FFB4B52B000
|
trusted library allocation
|
page read and write
|
||
2A95000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3A6000
|
trusted library allocation
|
page execute and read and write
|
||
5DB53CE000
|
stack
|
page read and write
|
||
22664357000
|
heap
|
page read and write
|
||
1B676000
|
heap
|
page read and write
|
||
2EAB000
|
trusted library allocation
|
page read and write
|
||
276ADFDA000
|
heap
|
page read and write
|
||
7FFB4B774000
|
trusted library allocation
|
page read and write
|
||
2BBE5DF0000
|
heap
|
page read and write
|
||
78C000
|
heap
|
page read and write
|
||
1B47F000
|
stack
|
page read and write
|
||
1B618000
|
heap
|
page read and write
|
||
2A59000
|
trusted library allocation
|
page read and write
|
||
3146000
|
trusted library allocation
|
page read and write
|
||
203A9D20000
|
heap
|
page read and write
|
||
2E26000
|
trusted library allocation
|
page read and write
|
||
1BA8E000
|
stack
|
page read and write
|
||
12EC4000
|
trusted library allocation
|
page read and write
|
||
7FFB4B74C000
|
trusted library allocation
|
page read and write
|
||
3A6337F000
|
stack
|
page read and write
|
||
2CC7000
|
trusted library allocation
|
page read and write
|
||
25117340000
|
heap
|
page read and write
|
||
2539000
|
trusted library allocation
|
page read and write
|
||
2CC9000
|
trusted library allocation
|
page read and write
|
||
2C4B000
|
trusted library allocation
|
page read and write
|
||
1B6BC000
|
heap
|
page read and write
|
||
1311A000
|
trusted library allocation
|
page read and write
|
||
8D432FF000
|
stack
|
page read and write
|
||
7FFB4B7DA000
|
trusted library allocation
|
page read and write
|
||
1B780000
|
heap
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
7FFB4B780000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4C4000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
2CCD000
|
trusted library allocation
|
page read and write
|
||
20F2B440000
|
heap
|
page read and write
|
||
1B81E000
|
stack
|
page read and write
|
||
7FFB4B78F000
|
trusted library allocation
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
2E9E000
|
trusted library allocation
|
page read and write
|
||
1310B000
|
trusted library allocation
|
page read and write
|
||
3D5000
|
heap
|
page read and write
|
||
12FE5000
|
trusted library allocation
|
page read and write
|
||
20D8789F000
|
heap
|
page read and write
|
||
1AFF4000
|
heap
|
page read and write
|
||
7FFB4B2EC000
|
trusted library allocation
|
page read and write
|
||
12F4C000
|
trusted library allocation
|
page read and write
|
||
2BBE5BBB000
|
heap
|
page read and write
|
||
7FFB4B2FB000
|
trusted library allocation
|
page execute and read and write
|
||
2D1B000
|
trusted library allocation
|
page read and write
|
||
D8232F000
|
stack
|
page read and write
|
||
2672E0D0000
|
heap
|
page read and write
|
||
7FFB4B782000
|
trusted library allocation
|
page read and write
|
||
F8D000
|
heap
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
7FFB4B500000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B4D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B861000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3A6000
|
trusted library allocation
|
page execute and read and write
|
||
A1866FF000
|
stack
|
page read and write
|
||
7FFB4B4D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7AA000
|
trusted library allocation
|
page read and write
|
||
2F42000
|
trusted library allocation
|
page read and write
|
||
1F8B4150000
|
heap
|
page read and write
|
||
1B5E9000
|
heap
|
page read and write
|
||
3108000
|
trusted library allocation
|
page read and write
|
||
1C140000
|
heap
|
page read and write
|
||
1F8B4190000
|
heap
|
page read and write
|
||
7FFB4B314000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
trusted library allocation
|
page read and write
|
||
1B37E000
|
stack
|
page read and write
|
||
1BB21000
|
heap
|
page read and write
|
||
7FFB4B52E000
|
trusted library allocation
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
12DBC000
|
trusted library allocation
|
page read and write
|
||
7FFB4B790000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7A9000
|
trusted library allocation
|
page read and write
|
||
26153460000
|
heap
|
page read and write
|
||
7FFB4B2F0000
|
trusted library allocation
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
205B0C10000
|
heap
|
page read and write
|
||
7FFB4B787000
|
trusted library allocation
|
page read and write
|
||
E27000
|
heap
|
page read and write
|
||
7FFB4B476000
|
trusted library allocation
|
page read and write
|
||
20F2B3F0000
|
heap
|
page read and write
|
||
26153467000
|
heap
|
page read and write
|
||
295E6110000
|
heap
|
page read and write
|
||
295E6127000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page execute and read and write
|
||
2BA0000
|
heap
|
page execute and read and write
|
||
83B000
|
heap
|
page read and write
|
||
7FFB4B48C000
|
trusted library allocation
|
page read and write
|
||
2379000
|
heap
|
page read and write
|
||
13034000
|
trusted library allocation
|
page read and write
|
||
2BB3000
|
heap
|
page execute and read and write
|
||
1B016000
|
heap
|
page read and write
|
||
341B000
|
trusted library allocation
|
page read and write
|
||
7FFB4B505000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
7FFB4B4D5000
|
trusted library allocation
|
page read and write
|
||
1AC7A000
|
stack
|
page read and write
|
||
7FFB4B861000
|
trusted library allocation
|
page read and write
|
||
7FFB4B850000
|
trusted library allocation
|
page execute and read and write
|
||
12EB8000
|
trusted library allocation
|
page read and write
|
||
316C000
|
trusted library allocation
|
page read and write
|
||
2D00000
|
trusted library allocation
|
page read and write
|
||
7FFB4B78C000
|
trusted library allocation
|
page read and write
|
||
2FBF000
|
trusted library allocation
|
page read and write
|
||
1263E000
|
trusted library allocation
|
page read and write
|
||
1BEDE000
|
stack
|
page read and write
|
||
2BC9000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2C4000
|
trusted library allocation
|
page read and write
|
||
1274B000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4B4000
|
trusted library allocation
|
page read and write
|
||
2793000
|
trusted library allocation
|
page read and write
|
||
3738000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
2BBE5BB0000
|
heap
|
page read and write
|
||
7FFB4B490000
|
trusted library allocation
|
page read and write
|
||
A1865FF000
|
unkown
|
page read and write
|
||
7FFB4B2F2000
|
trusted library allocation
|
page read and write
|
||
7FFB4B532000
|
trusted library allocation
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
7FFB4B2D3000
|
trusted library allocation
|
page read and write
|
||
2615346A000
|
heap
|
page read and write
|
||
1BF8E000
|
stack
|
page read and write
|
||
3745000
|
trusted library allocation
|
page read and write
|
||
305A000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2D3000
|
trusted library allocation
|
page read and write
|
||
1B00E000
|
heap
|
page read and write
|
||
7FFB4B470000
|
trusted library allocation
|
page read and write
|
||
19E3BDF3000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
7FFB4B758000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
7FFB4B2DC000
|
trusted library allocation
|
page read and write
|
||
2CF2000
|
trusted library allocation
|
page read and write
|
||
1B8DA000
|
heap
|
page read and write
|
||
354D000
|
trusted library allocation
|
page read and write
|
||
1305C000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B2B3000
|
trusted library allocation
|
page execute and read and write
|
||
12D45000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page execute and read and write
|
||
7FFB4B4D0000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
1B5F0000
|
heap
|
page read and write
|
||
2C0F000
|
trusted library allocation
|
page read and write
|
||
13017000
|
trusted library allocation
|
page read and write
|
||
19E3BFA0000
|
heap
|
page read and write
|
||
301E000
|
trusted library allocation
|
page read and write
|
||
7FFB4B466000
|
trusted library allocation
|
page read and write
|
||
1BA80000
|
heap
|
page read and write
|
||
12627000
|
trusted library allocation
|
page read and write
|
||
19E3BDC0000
|
heap
|
page read and write
|
||
7FFB4B7A2000
|
trusted library allocation
|
page read and write
|
||
7FFB4B54E000
|
trusted library allocation
|
page read and write
|
||
19E3BC80000
|
heap
|
page read and write
|
||
132D6000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
7FFB4B7B2000
|
trusted library allocation
|
page read and write
|
||
2FEB000
|
trusted library allocation
|
page read and write
|
||
308B000
|
trusted library allocation
|
page read and write
|
||
22923070000
|
heap
|
page read and write
|
||
2E29000
|
trusted library allocation
|
page read and write
|
||
7FFB4B780000
|
trusted library allocation
|
page read and write
|
||
7FFB4B79F000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2C3000
|
trusted library allocation
|
page execute and read and write
|
||
151D000
|
heap
|
page read and write
|
||
1EC05271000
|
heap
|
page read and write
|
||
7FFB4B490000
|
trusted library allocation
|
page read and write
|
||
7FFB4B442000
|
trusted library allocation
|
page execute and read and write
|
||
EF0000
|
heap
|
page read and write
|
||
33E9000
|
trusted library allocation
|
page read and write
|
||
A8E000
|
stack
|
page read and write
|
||
7FFB4B562000
|
trusted library allocation
|
page read and write
|
||
B1A85CB000
|
stack
|
page read and write
|
||
7FFB4B500000
|
trusted library allocation
|
page read and write
|
||
1C220000
|
heap
|
page read and write
|
||
1EB66460000
|
heap
|
page read and write
|
||
7FFB4B4A8000
|
trusted library allocation
|
page read and write
|
||
1B98E000
|
stack
|
page read and write
|
||
125DF000
|
trusted library allocation
|
page read and write
|
||
7FFB4B492000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2CD000
|
trusted library allocation
|
page execute and read and write
|
||
BC0000
|
heap
|
page read and write
|
||
816000
|
heap
|
page read and write
|
||
26A7B14A000
|
heap
|
page read and write
|
||
7FFB4B476000
|
trusted library allocation
|
page read and write
|
||
7FFB4B50D000
|
trusted library allocation
|
page read and write
|
||
7FFB4B487000
|
trusted library allocation
|
page read and write
|
||
C167E7F000
|
stack
|
page read and write
|
||
2CDC000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7B7000
|
trusted library allocation
|
page read and write
|
||
7FFB4B510000
|
trusted library allocation
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2FD000
|
trusted library allocation
|
page execute and read and write
|
||
2EA8000
|
trusted library allocation
|
page read and write
|
||
7FFB4B380000
|
trusted library allocation
|
page read and write
|
||
2E2B000
|
trusted library allocation
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
2E56000
|
trusted library allocation
|
page read and write
|
||
2761000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2D3000
|
trusted library allocation
|
page read and write
|
||
EAA000
|
heap
|
page read and write
|
||
7FFB4B2D0000
|
trusted library allocation
|
page read and write
|
||
EA774FF000
|
unkown
|
page read and write
|
||
2E7E000
|
trusted library allocation
|
page read and write
|
||
2672DEE0000
|
heap
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
106E000
|
stack
|
page read and write
|
||
7FFB4B510000
|
trusted library allocation
|
page read and write
|
||
12B8C000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
134C4000
|
trusted library allocation
|
page read and write
|
||
A1864FC000
|
stack
|
page read and write
|
||
3036000
|
trusted library allocation
|
page read and write
|
||
7FFB4B787000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4A0000
|
trusted library allocation
|
page execute and read and write
|
||
13030000
|
trusted library allocation
|
page read and write
|
||
7FFB4B860000
|
trusted library allocation
|
page read and write
|
||
1BFD0000
|
heap
|
page read and write
|
||
12D26000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4E2000
|
trusted library allocation
|
page read and write
|
||
1275D510000
|
heap
|
page read and write
|
||
1B88F000
|
stack
|
page read and write
|
||
31C9000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4B3000
|
trusted library allocation
|
page read and write
|
||
2C32000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4B8000
|
trusted library allocation
|
page read and write
|
||
126F1000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
12E68000
|
trusted library allocation
|
page read and write
|
||
1BC9E000
|
stack
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
1B4BC000
|
heap
|
page read and write
|
||
1C62F000
|
stack
|
page read and write
|
||
1275D684000
|
heap
|
page read and write
|
||
2376BA60000
|
heap
|
page read and write
|
||
1B4EB000
|
heap
|
page read and write
|
||
1AF30000
|
heap
|
page read and write
|
||
7FFB4B4F0000
|
trusted library allocation
|
page execute and read and write
|
||
2A51000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
2F39000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
F1A000
|
heap
|
page read and write
|
||
1EC05275000
|
heap
|
page read and write
|
||
317D000
|
trusted library allocation
|
page read and write
|
||
18DE7C20000
|
heap
|
page read and write
|
||
2B74000
|
trusted library allocation
|
page read and write
|
||
6588A7C000
|
stack
|
page read and write
|
||
2B14F350000
|
heap
|
page read and write
|
||
3231000
|
trusted library allocation
|
page read and write
|
||
7FFB4B400000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B7A2000
|
trusted library allocation
|
page read and write
|
||
340D000
|
trusted library allocation
|
page read and write
|
||
1B8BE000
|
heap
|
page read and write
|
||
12C81000
|
trusted library allocation
|
page read and write
|
||
7FFB4B513000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4CC000
|
trusted library allocation
|
page read and write
|
||
21EA9D61000
|
heap
|
page read and write
|
||
276ADF80000
|
heap
|
page read and write
|
||
7FFB4B4C4000
|
trusted library allocation
|
page read and write
|
||
7FFB4B30D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B7DA000
|
trusted library allocation
|
page read and write
|
||
3217000
|
trusted library allocation
|
page read and write
|
||
32B2000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7B9000
|
trusted library allocation
|
page read and write
|
||
20D87B10000
|
heap
|
page read and write
|
||
7FFB4B861000
|
trusted library allocation
|
page read and write
|
||
12D60000
|
trusted library allocation
|
page read and write
|
||
2D02000
|
trusted library allocation
|
page read and write
|
||
25117440000
|
heap
|
page read and write
|
||
3192000
|
trusted library allocation
|
page read and write
|
||
1AFF8000
|
unkown
|
page readonly
|
||
2CDE000
|
trusted library allocation
|
page read and write
|
||
31A0000
|
heap
|
page execute and read and write
|
||
1B86D000
|
stack
|
page read and write
|
||
1B8CB000
|
stack
|
page read and write
|
||
2B14F1B3000
|
heap
|
page read and write
|
||
168390FA000
|
heap
|
page read and write
|
||
7FFB4B303000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2D8000
|
trusted library allocation
|
page read and write
|
||
3465000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
heap
|
page execute and read and write
|
||
2B5F000
|
trusted library allocation
|
page read and write
|
||
1EC05460000
|
heap
|
page read and write
|
||
7FFB4B620000
|
trusted library allocation
|
page read and write
|
||
31F6000
|
trusted library allocation
|
page read and write
|
||
7FFB4B871000
|
trusted library allocation
|
page read and write
|
||
1B940000
|
heap
|
page execute and read and write
|
||
7FFB4B442000
|
trusted library allocation
|
page execute and read and write
|
||
19E3BDF3000
|
heap
|
page read and write
|
||
7FFB4B2F4000
|
trusted library allocation
|
page read and write
|
||
3719000
|
trusted library allocation
|
page read and write
|
||
1CE4B650000
|
heap
|
page read and write
|
||
344F000
|
trusted library allocation
|
page read and write
|
||
1EB664DA000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
2511725A000
|
heap
|
page read and write
|
||
7FFB4B5F0000
|
trusted library allocation
|
page read and write
|
||
1AF2E000
|
stack
|
page read and write
|
||
22923110000
|
heap
|
page read and write
|
||
2B14F18B000
|
heap
|
page read and write
|
||
7FFB4B74E000
|
trusted library allocation
|
page read and write
|
||
1275A000
|
trusted library allocation
|
page read and write
|
||
2E12000
|
trusted library allocation
|
page read and write
|
||
33F1000
|
trusted library allocation
|
page read and write
|
||
9FCA31C000
|
stack
|
page read and write
|
||
1B943000
|
heap
|
page execute and read and write
|
||
1CE4B477000
|
heap
|
page read and write
|
||
5DB534F000
|
stack
|
page read and write
|
||
7FFB4B2D4000
|
trusted library allocation
|
page read and write
|
||
261535C5000
|
heap
|
page read and write
|
||
265E000
|
trusted library allocation
|
page read and write
|
||
1018000
|
heap
|
page read and write
|
||
A380AFC000
|
stack
|
page read and write
|
||
22664620000
|
heap
|
page read and write
|
||
7FFB4B4D4000
|
trusted library allocation
|
page read and write
|
||
7FFB4B5E2000
|
trusted library allocation
|
page read and write
|
||
1EC05274000
|
heap
|
page read and write
|
||
2C82000
|
trusted library allocation
|
page read and write
|
||
21F3A600000
|
heap
|
page read and write
|
||
2795000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4FE000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4E0000
|
trusted library allocation
|
page read and write
|
||
1B5D0000
|
heap
|
page read and write
|
||
21EA9F20000
|
heap
|
page read and write
|
||
12656000
|
trusted library allocation
|
page read and write
|
||
2AA9000
|
trusted library allocation
|
page read and write
|
||
2EBF000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7A4000
|
trusted library allocation
|
page read and write
|
||
2D36000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4C0000
|
trusted library allocation
|
page read and write
|
||
E25000
|
heap
|
page read and write
|
||
32F1000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2E3000
|
trusted library allocation
|
page read and write
|
||
7FFB4B891000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2D3000
|
trusted library allocation
|
page execute and read and write
|
||
300E000
|
trusted library allocation
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
1B66D000
|
stack
|
page read and write
|
||
12F62000
|
trusted library allocation
|
page read and write
|
||
1C61E000
|
stack
|
page read and write
|
||
1055000
|
heap
|
page read and write
|
||
18DE7B40000
|
heap
|
page read and write
|
||
7FFB4B2DB000
|
trusted library allocation
|
page execute and read and write
|
||
61BE1FF000
|
unkown
|
page read and write
|
||
33CE000
|
trusted library allocation
|
page read and write
|
||
7FFB4B461000
|
trusted library allocation
|
page read and write
|
||
1AE08000
|
heap
|
page read and write
|
||
7FFB4B540000
|
trusted library allocation
|
page execute and read and write
|
||
132A7000
|
trusted library allocation
|
page read and write
|
||
28B2000
|
trusted library allocation
|
page read and write
|
||
25B2000
|
trusted library allocation
|
page read and write
|
||
26153380000
|
heap
|
page read and write
|
||
2BB9000
|
trusted library allocation
|
page read and write
|
||
104F000
|
stack
|
page read and write
|
||
329F000
|
trusted library allocation
|
page read and write
|
||
18DE7B20000
|
heap
|
page read and write
|
||
1A720000
|
trusted library allocation
|
page read and write
|
||
7FFB4B758000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7DC000
|
trusted library allocation
|
page read and write
|
||
20D87A80000
|
heap
|
page read and write
|
||
7FFB4B2D4000
|
trusted library allocation
|
page read and write
|
||
26F1000
|
trusted library allocation
|
page read and write
|
||
27AB000
|
trusted library allocation
|
page read and write
|
||
1302B000
|
trusted library allocation
|
page read and write
|
||
1BE5D000
|
stack
|
page read and write
|
||
3379000
|
trusted library allocation
|
page read and write
|
||
12CAF000
|
trusted library allocation
|
page read and write
|
||
1B73D000
|
stack
|
page read and write
|
||
7FFB4B2DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B2C4000
|
trusted library allocation
|
page read and write
|
||
7FFB4B452000
|
trusted library allocation
|
page execute and read and write
|
||
14E0000
|
heap
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
7FFB4B516000
|
trusted library allocation
|
page read and write
|
||
265C000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
205B0DE0000
|
heap
|
page read and write
|
||
7FFB4B4E2000
|
trusted library allocation
|
page read and write
|
||
12670000
|
trusted library allocation
|
page read and write
|
||
2789000
|
trusted library allocation
|
page read and write
|
||
2CE4000
|
trusted library allocation
|
page read and write
|
||
1275D460000
|
heap
|
page read and write
|
||
2E0D000
|
trusted library allocation
|
page read and write
|
||
11F8000
|
heap
|
page read and write
|
||
12D2F000
|
trusted library allocation
|
page read and write
|
||
7FFB4B507000
|
trusted library allocation
|
page read and write
|
||
32DE000
|
trusted library allocation
|
page read and write
|
||
7FFB4B787000
|
trusted library allocation
|
page read and write
|
||
26A7B140000
|
heap
|
page read and write
|
||
13203000
|
trusted library allocation
|
page read and write
|
||
2376B760000
|
heap
|
page read and write
|
||
2320000
|
heap
|
page execute and read and write
|
||
7FFB4B7B9000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7B7000
|
trusted library allocation
|
page read and write
|
||
1269C000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
7FFB4B4F0000
|
trusted library allocation
|
page read and write
|
||
2E1F000
|
trusted library allocation
|
page read and write
|
||
3429000
|
trusted library allocation
|
page read and write
|
||
1AF50000
|
trusted library allocation
|
page read and write
|
||
2B30000
|
heap
|
page execute and read and write
|
||
31C6000
|
trusted library allocation
|
page read and write
|
||
17C0000
|
heap
|
page read and write
|
||
304E000
|
trusted library allocation
|
page read and write
|
||
7FFB4B760000
|
trusted library allocation
|
page read and write
|
||
70D3AFB000
|
stack
|
page read and write
|
||
7FFB4B482000
|
trusted library allocation
|
page read and write
|
||
22923074000
|
heap
|
page read and write
|
||
2672DF15000
|
heap
|
page read and write
|
||
10C0000
|
trusted library allocation
|
page read and write
|
||
1720000
|
heap
|
page execute and read and write
|
||
7FFB4B376000
|
trusted library allocation
|
page read and write
|
||
1275D51A000
|
heap
|
page read and write
|
||
2F2C000
|
trusted library allocation
|
page read and write
|
||
20D87A60000
|
heap
|
page read and write
|
||
1BC5E000
|
stack
|
page read and write
|
||
1A590000
|
trusted library allocation
|
page read and write
|
||
1288B000
|
trusted library allocation
|
page read and write
|
||
1B435000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
2AEE000
|
stack
|
page read and write
|
||
12EA6000
|
trusted library allocation
|
page read and write
|
||
133D4000
|
trusted library allocation
|
page read and write
|
||
1AF89000
|
heap
|
page read and write
|
||
7FFB4B30C000
|
trusted library allocation
|
page execute and read and write
|
||
1C51B000
|
stack
|
page read and write
|
||
7FFB4B520000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2E8000
|
trusted library allocation
|
page read and write
|
||
DB9000
|
heap
|
page read and write
|
||
7FFB4B860000
|
trusted library allocation
|
page execute and read and write
|
||
1C2BE000
|
stack
|
page read and write
|
||
57A06FF000
|
stack
|
page read and write
|
||
56E000
|
stack
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
2DDB000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2FD000
|
trusted library allocation
|
page execute and read and write
|
||
1EC054D4000
|
heap
|
page read and write
|
||
13086000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4ED000
|
trusted library allocation
|
page read and write
|
||
168392D0000
|
heap
|
page read and write
|
||
7FFB4B505000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4B0000
|
trusted library allocation
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
3051000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4D7000
|
trusted library allocation
|
page read and write
|
||
21EA9D53000
|
heap
|
page read and write
|
||
9F5000
|
heap
|
page read and write
|
||
7FFB4B507000
|
trusted library allocation
|
page read and write
|
||
7FFB4B562000
|
trusted library allocation
|
page read and write
|
||
7FFB4B386000
|
trusted library allocation
|
page read and write
|
||
7FFB4B780000
|
trusted library allocation
|
page read and write
|
||
7FFB4B441000
|
trusted library allocation
|
page execute and read and write
|
||
1BC4E000
|
stack
|
page read and write
|
||
12531000
|
trusted library allocation
|
page read and write
|
||
2FBB000
|
trusted library allocation
|
page read and write
|
||
1B420000
|
heap
|
page read and write
|
||
21F3A60A000
|
heap
|
page read and write
|
||
1AFFE000
|
stack
|
page read and write
|
||
7FFB4B7D0000
|
trusted library allocation
|
page execute and read and write
|
||
D0C000
|
stack
|
page read and write
|
||
12F7B000
|
trusted library allocation
|
page read and write
|
||
22922EEE000
|
heap
|
page read and write
|
||
1CB5F000
|
stack
|
page read and write
|
||
7FFB4B78F000
|
trusted library allocation
|
page read and write
|
||
7FFB4B490000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B2DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B7A2000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2C2000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2C4000
|
trusted library allocation
|
page read and write
|
||
7FFB4B540000
|
trusted library allocation
|
page execute and read and write
|
||
EE0000
|
heap
|
page read and write
|
||
20D878A2000
|
heap
|
page read and write
|
||
7FFB4B800000
|
trusted library allocation
|
page execute and read and write
|
||
2D1D000
|
trusted library allocation
|
page read and write
|
||
76C000
|
heap
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B308000
|
trusted library allocation
|
page read and write
|
||
26A7AF60000
|
heap
|
page read and write
|
||
13468000
|
trusted library allocation
|
page read and write
|
||
1BA9F000
|
heap
|
page read and write
|
||
7FFB4B75E000
|
trusted library allocation
|
page read and write
|
||
12AE6000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3A6000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4A0000
|
trusted library allocation
|
page read and write
|
||
1C73B000
|
stack
|
page read and write
|
||
E5D6B0F000
|
stack
|
page read and write
|
||
2672DF24000
|
heap
|
page read and write
|
||
276ADF70000
|
heap
|
page read and write
|
||
342B000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2E3000
|
trusted library allocation
|
page read and write
|
||
7FFB4B530000
|
trusted library allocation
|
page read and write
|
||
E02000
|
unkown
|
page readonly
|
||
766000
|
heap
|
page read and write
|
||
2D98000
|
trusted library allocation
|
page read and write
|
||
2EA8000
|
trusted library allocation
|
page read and write
|
||
7FFB4B49C000
|
trusted library allocation
|
page read and write
|
||
1B770000
|
heap
|
page read and write
|
||
12F14000
|
trusted library allocation
|
page read and write
|
||
7FFB4B32C000
|
trusted library allocation
|
page execute and read and write
|
||
3421000
|
trusted library allocation
|
page read and write
|
||
7FFB4B49C000
|
trusted library allocation
|
page read and write
|
||
1B4B0000
|
heap
|
page execute and read and write
|
||
2B14F160000
|
heap
|
page read and write
|
||
1300A000
|
trusted library allocation
|
page read and write
|
||
720000
|
trusted library allocation
|
page read and write
|
||
2C48000
|
trusted library allocation
|
page read and write
|
||
1C76E000
|
heap
|
page read and write
|
||
1B6E4FF000
|
unkown
|
page read and write
|
||
20F2B449000
|
heap
|
page read and write
|
||
1C4C0000
|
heap
|
page read and write
|
||
B1A887F000
|
stack
|
page read and write
|
||
7FFB4B536000
|
trusted library allocation
|
page read and write
|
||
6588B7F000
|
stack
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
2C9B000
|
trusted library allocation
|
page read and write
|
||
1BD7E000
|
stack
|
page read and write
|
||
3008000
|
trusted library allocation
|
page read and write
|
||
7FFB4B376000
|
trusted library allocation
|
page read and write
|
||
329E000
|
trusted library allocation
|
page read and write
|
||
7FFB4B380000
|
trusted library allocation
|
page read and write
|
||
2785000
|
trusted library allocation
|
page read and write
|
||
12D64000
|
trusted library allocation
|
page read and write
|
||
7FFB4B781000
|
trusted library allocation
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
D68000
|
heap
|
page read and write
|
||
329C000
|
trusted library allocation
|
page read and write
|
||
2C95000
|
trusted library allocation
|
page read and write
|
||
1B638000
|
heap
|
page read and write
|
||
7FFB4B7C0000
|
trusted library allocation
|
page read and write
|
||
126B2000
|
trusted library allocation
|
page read and write
|
||
3294000
|
trusted library allocation
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
31A8000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2DC000
|
trusted library allocation
|
page read and write
|
||
2D2C000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7BB000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3F0000
|
trusted library allocation
|
page execute and read and write
|
||
22664366000
|
heap
|
page read and write
|
||
32E4000
|
trusted library allocation
|
page read and write
|
||
2DEF000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4B4000
|
trusted library allocation
|
page read and write
|
||
131D8000
|
trusted library allocation
|
page read and write
|
||
1BABB000
|
heap
|
page read and write
|
||
12ED5000
|
trusted library allocation
|
page read and write
|
||
1AABA000
|
stack
|
page read and write
|
||
2FEF000
|
trusted library allocation
|
page read and write
|
||
7FFB4B51E000
|
trusted library allocation
|
page read and write
|
||
1C190000
|
heap
|
page read and write
|
||
7FFB4B461000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7B0000
|
trusted library allocation
|
page read and write
|
||
27D6000
|
trusted library allocation
|
page read and write
|
||
343F000
|
trusted library allocation
|
page read and write
|
||
7FFB4B38C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B2B0000
|
trusted library allocation
|
page read and write
|
||
3357000
|
trusted library allocation
|
page read and write
|
||
127A6000
|
trusted library allocation
|
page read and write
|
||
21F3A430000
|
heap
|
page read and write
|
||
1B76E000
|
stack
|
page read and write
|
||
33D6000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B774000
|
trusted library allocation
|
page read and write
|
||
7FFB4B487000
|
trusted library allocation
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
1BEBE000
|
stack
|
page read and write
|
||
7FFB4B772000
|
trusted library allocation
|
page read and write
|
||
1B4B3000
|
heap
|
page execute and read and write
|
||
7FFB4B4ED000
|
trusted library allocation
|
page read and write
|
||
7FFB4B308000
|
trusted library allocation
|
page read and write
|
||
D6AC6FF000
|
stack
|
page read and write
|
||
E32000
|
unkown
|
page readonly
|
||
1B6E14B000
|
stack
|
page read and write
|
||
7FFB4B4B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B74E000
|
trusted library allocation
|
page read and write
|
||
2BBE5D80000
|
heap
|
page read and write
|
||
3411000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
33C2000
|
trusted library allocation
|
page read and write
|
||
2769000
|
trusted library allocation
|
page read and write
|
||
F43FEFF000
|
stack
|
page read and write
|
||
2511724A000
|
heap
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
1C07D000
|
stack
|
page read and write
|
||
1325C000
|
trusted library allocation
|
page read and write
|
||
270F000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4D5000
|
trusted library allocation
|
page read and write
|
||
7FFB4B475000
|
trusted library allocation
|
page read and write
|
||
12CA7000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B460000
|
trusted library allocation
|
page read and write
|
||
1BB9E000
|
stack
|
page read and write
|
||
2CDE000
|
trusted library allocation
|
page read and write
|
||
270000
|
unkown
|
page readonly
|
||
19E3C010000
|
heap
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
2576000
|
trusted library allocation
|
page read and write
|
||
205B0C17000
|
heap
|
page read and write
|
||
1AC30000
|
trusted library allocation
|
page read and write
|
||
7FFB4B789000
|
trusted library allocation
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
31C0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4F4000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7E0000
|
trusted library allocation
|
page read and write
|
||
2B4B000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
1EC05240000
|
heap
|
page read and write
|
||
7FFB4B4CC000
|
trusted library allocation
|
page read and write
|
||
1C220000
|
heap
|
page read and write
|
||
1C155000
|
heap
|
page read and write
|
||
7FFB4B74E000
|
trusted library allocation
|
page read and write
|
||
12D3C000
|
trusted library allocation
|
page read and write
|
||
1EB66380000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
1B844000
|
heap
|
page read and write
|
||
21EA9F60000
|
heap
|
page read and write
|
||
26A7B060000
|
heap
|
page read and write
|
||
7FFB4B7A2000
|
trusted library allocation
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
7FFB4B2C2000
|
trusted library allocation
|
page read and write
|
||
7FFB4B560000
|
trusted library allocation
|
page read and write
|
||
7FFB4B52E000
|
trusted library allocation
|
page read and write
|
||
339A000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7C0000
|
trusted library allocation
|
page read and write
|
||
8D4337E000
|
stack
|
page read and write
|
||
3407000
|
trusted library allocation
|
page read and write
|
||
22923000000
|
heap
|
page read and write
|
||
12C8E000
|
trusted library allocation
|
page read and write
|
||
2D8F000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7D2000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4C0000
|
trusted library allocation
|
page read and write
|
||
12DAA000
|
trusted library allocation
|
page read and write
|
||
1B7F0000
|
heap
|
page read and write
|
||
7FFB4B51E000
|
trusted library allocation
|
page read and write
|
||
7FFB4B486000
|
trusted library allocation
|
page read and write
|
||
16839310000
|
heap
|
page read and write
|
||
2D1D000
|
trusted library allocation
|
page read and write
|
||
7FFB4B38C000
|
trusted library allocation
|
page execute and read and write
|
||
12640000
|
trusted library allocation
|
page read and write
|
||
1C18D000
|
stack
|
page read and write
|
||
3295000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7A4000
|
trusted library allocation
|
page read and write
|
||
1AF6F000
|
heap
|
page read and write
|
||
271A000
|
trusted library allocation
|
page read and write
|
||
1ABE0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2E0000
|
trusted library allocation
|
page read and write
|
||
2B95000
|
trusted library allocation
|
page read and write
|
||
1280000
|
heap
|
page execute and read and write
|
||
2E15000
|
trusted library allocation
|
page read and write
|
||
FAE83FF000
|
unkown
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
2D41000
|
trusted library allocation
|
page read and write
|
||
12B47000
|
trusted library allocation
|
page read and write
|
||
1EC05340000
|
heap
|
page read and write
|
||
850000
|
trusted library allocation
|
page read and write
|
||
1B270000
|
heap
|
page execute and read and write
|
||
1CE4B655000
|
heap
|
page read and write
|
||
2AC5000
|
trusted library allocation
|
page read and write
|
||
73D000
|
heap
|
page read and write
|
||
2666000
|
trusted library allocation
|
page read and write
|
||
A380CFF000
|
stack
|
page read and write
|
||
12F21000
|
trusted library allocation
|
page read and write
|
||
25117500000
|
heap
|
page read and write
|
||
7FFB4B4D2000
|
trusted library allocation
|
page read and write
|
||
1B50B000
|
heap
|
page read and write
|
||
12AA3000
|
trusted library allocation
|
page read and write
|
||
22922FC0000
|
heap
|
page read and write
|
||
1BE2E000
|
stack
|
page read and write
|
||
7FFB4B520000
|
trusted library allocation
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
7FFB4B4C0000
|
trusted library allocation
|
page read and write
|
||
21EA9D50000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
7FFB4B4C0000
|
trusted library allocation
|
page read and write
|
||
1325F000
|
trusted library allocation
|
page read and write
|
||
7FFB4B51D000
|
trusted library allocation
|
page read and write
|
||
2791000
|
trusted library allocation
|
page read and write
|
||
2DFE000
|
trusted library allocation
|
page read and write
|
||
1BCD0000
|
heap
|
page execute and read and write
|
||
7FFB4B4E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4A5000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4EC000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4A8000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2E4000
|
trusted library allocation
|
page read and write
|
||
20D8787B000
|
heap
|
page read and write
|
||
7FFB4B4E2000
|
trusted library allocation
|
page read and write
|
||
2B35000
|
trusted library allocation
|
page read and write
|
||
12D52000
|
trusted library allocation
|
page read and write
|
||
167BEC00000
|
heap
|
page read and write
|
||
2B14F370000
|
heap
|
page read and write
|
||
7FFB4B774000
|
trusted library allocation
|
page read and write
|
||
2BBE5B80000
|
heap
|
page read and write
|
||
272E000
|
trusted library allocation
|
page read and write
|
||
1DA2B000
|
heap
|
page read and write
|
||
7FFB4B550000
|
trusted library allocation
|
page read and write
|
||
2CDC000
|
trusted library allocation
|
page read and write
|
||
1BC8F000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page execute and read and write
|
||
2B14F404000
|
heap
|
page read and write
|
||
25117238000
|
heap
|
page read and write
|
||
7FFB4B78F000
|
trusted library allocation
|
page read and write
|
||
2531000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4BD000
|
trusted library allocation
|
page read and write
|
||
295E5F30000
|
heap
|
page read and write
|
||
2F27000
|
trusted library allocation
|
page read and write
|
||
7FFB4B314000
|
trusted library allocation
|
page read and write
|
||
1AEDB000
|
heap
|
page read and write
|
||
203A9990000
|
heap
|
page read and write
|
||
21EA9F00000
|
heap
|
page read and write
|
||
7FFB4B4E0000
|
trusted library allocation
|
page read and write
|
||
2549000
|
trusted library allocation
|
page read and write
|
||
7FFB4B8A0000
|
trusted library allocation
|
page read and write
|
||
2B6D000
|
trusted library allocation
|
page read and write
|
||
7FFB4B497000
|
trusted library allocation
|
page read and write
|
||
22922DE0000
|
heap
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
7FFB4B482000
|
trusted library allocation
|
page read and write
|
||
7FFB4B762000
|
trusted library allocation
|
page read and write
|
||
1BCCE000
|
stack
|
page read and write
|
||
D6AC67C000
|
stack
|
page read and write
|
||
7FFB4B390000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B541000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4D7000
|
trusted library allocation
|
page read and write
|
||
12DD2000
|
trusted library allocation
|
page read and write
|
||
2DD6000
|
trusted library allocation
|
page read and write
|
||
7FFB4B34C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B2F3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B4B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B4E4000
|
trusted library allocation
|
page read and write
|
||
1D9B8000
|
heap
|
page read and write
|
||
2DE8000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2D3000
|
trusted library allocation
|
page execute and read and write
|
||
272000
|
unkown
|
page readonly
|
||
7FFB4B2C3000
|
trusted library allocation
|
page read and write
|
||
338C000
|
trusted library allocation
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
302E000
|
trusted library allocation
|
page read and write
|
||
21EA9D50000
|
heap
|
page read and write
|
||
203A9A07000
|
heap
|
page read and write
|
||
7FFB4B2DC000
|
trusted library allocation
|
page read and write
|
||
3548000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7B0000
|
trusted library allocation
|
page read and write
|
||
12FCF000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4E4000
|
trusted library allocation
|
page read and write
|
||
22664170000
|
heap
|
page read and write
|
||
1AAEB000
|
stack
|
page read and write
|
||
7FFB4B370000
|
trusted library allocation
|
page read and write
|
||
1B53E000
|
stack
|
page read and write
|
||
7FFB4B7A0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B511000
|
trusted library allocation
|
page read and write
|
||
2376B7A8000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
35D2000
|
trusted library allocation
|
page read and write
|
||
7FFB4B420000
|
trusted library allocation
|
page execute and read and write
|
||
276ADFD8000
|
heap
|
page read and write
|
||
127E000
|
heap
|
page read and write
|
||
1135000
|
heap
|
page read and write
|
||
7FFB4B3F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B500000
|
trusted library allocation
|
page read and write
|
||
134AB000
|
trusted library allocation
|
page read and write
|
||
3405000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7F0000
|
trusted library allocation
|
page read and write
|
||
22922EF3000
|
heap
|
page read and write
|
||
1170000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2D8000
|
trusted library allocation
|
page read and write
|
||
12818000
|
trusted library allocation
|
page read and write
|
||
2BBE5BBD000
|
heap
|
page read and write
|
||
7FFB4B370000
|
trusted library allocation
|
page execute and read and write
|
||
395C000
|
trusted library allocation
|
page read and write
|
||
1B4DC000
|
heap
|
page read and write
|
||
1B18A000
|
stack
|
page read and write
|
||
C167BEC000
|
stack
|
page read and write
|
||
12D5E000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3B0000
|
trusted library allocation
|
page execute and read and write
|
||
1B5CE000
|
stack
|
page read and write
|
||
12784000
|
trusted library allocation
|
page read and write
|
||
7FF4C36D0000
|
trusted library allocation
|
page execute and read and write
|
||
2E6A000
|
trusted library allocation
|
page read and write
|
||
7FFB4B790000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2F4000
|
trusted library allocation
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
7FFB4B7C0000
|
trusted library allocation
|
page read and write
|
||
22664368000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
7FFB4B2C3000
|
trusted library allocation
|
page execute and read and write
|
||
1D9A5000
|
heap
|
page read and write
|
||
1683911F000
|
heap
|
page read and write
|
||
31EF000
|
trusted library allocation
|
page read and write
|
||
1A8E1000
|
heap
|
page read and write
|
||
108F000
|
stack
|
page read and write
|
||
10B9000
|
heap
|
page read and write
|
||
7FFB4B570000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B520000
|
trusted library allocation
|
page read and write
|
||
1BEA0000
|
heap
|
page read and write
|
||
13161000
|
trusted library allocation
|
page read and write
|
||
2C81000
|
trusted library allocation
|
page read and write
|
||
167BEBE5000
|
heap
|
page read and write
|
||
7FFB4B490000
|
trusted library allocation
|
page read and write
|
||
295E6030000
|
heap
|
page read and write
|
||
318B000
|
trusted library allocation
|
page read and write
|
||
7FFB4B781000
|
trusted library allocation
|
page read and write
|
||
12C5F000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2D8000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B4D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B788000
|
trusted library allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
6588AFF000
|
stack
|
page read and write
|
||
7FFB4B850000
|
trusted library allocation
|
page execute and read and write
|
||
1CE4B47A000
|
heap
|
page read and write
|
||
12CEC000
|
trusted library allocation
|
page read and write
|
||
102A000
|
heap
|
page read and write
|
||
7FFB4B2D4000
|
trusted library allocation
|
page read and write
|
||
1B4CA000
|
heap
|
page read and write
|
||
12BB1000
|
trusted library allocation
|
page read and write
|
||
12D02000
|
trusted library allocation
|
page read and write
|
||
203A99F0000
|
heap
|
page read and write
|
||
7FFB4B520000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7A9000
|
trusted library allocation
|
page read and write
|
||
7CC000
|
heap
|
page read and write
|
||
D85000
|
heap
|
page read and write
|
||
7FFB4B37C000
|
trusted library allocation
|
page execute and read and write
|
||
15CE000
|
stack
|
page read and write
|
||
7FFB4B5F2000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7C0000
|
trusted library allocation
|
page read and write
|
||
20D87980000
|
heap
|
page read and write
|
||
1B8BE000
|
stack
|
page read and write
|
||
7FFB4B8A0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B770000
|
trusted library allocation
|
page read and write
|
||
7FFB4B789000
|
trusted library allocation
|
page read and write
|
||
1B62E000
|
heap
|
page read and write
|
||
205B0C1A000
|
heap
|
page read and write
|
||
3A9497F000
|
stack
|
page read and write
|
||
D9C000
|
heap
|
page read and write
|
||
7FFB4B376000
|
trusted library allocation
|
page read and write
|
||
1AFD0000
|
heap
|
page read and write
|
||
127C9000
|
trusted library allocation
|
page read and write
|
||
1BCBF000
|
stack
|
page read and write
|
||
21EA9D61000
|
heap
|
page read and write
|
||
2DF1000
|
trusted library allocation
|
page read and write
|
||
1AA80000
|
trusted library allocation
|
page read and write
|
||
310F000
|
trusted library allocation
|
page read and write
|
||
2EB1000
|
trusted library allocation
|
page read and write
|
||
12AFF000
|
trusted library allocation
|
page read and write
|
||
2B14F150000
|
heap
|
page read and write
|
||
7FFB4B513000
|
trusted library allocation
|
page read and write
|
||
1AA79000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
7FFB4B2B2000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4C0000
|
trusted library allocation
|
page read and write
|
||
21EA9FD4000
|
heap
|
page read and write
|
||
1BF7D000
|
stack
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
7FFB4B2C3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B47A000
|
trusted library allocation
|
page read and write
|
||
3056000
|
trusted library allocation
|
page read and write
|
||
3175000
|
trusted library allocation
|
page read and write
|
||
134EC000
|
trusted library allocation
|
page read and write
|
||
7CA000
|
heap
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
32C7000
|
trusted library allocation
|
page read and write
|
||
1EC0524A000
|
heap
|
page read and write
|
||
7FFB4B4F4000
|
trusted library allocation
|
page read and write
|
||
57A077F000
|
stack
|
page read and write
|
||
7FFB4B4D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2D2000
|
trusted library allocation
|
page read and write
|
||
12583000
|
trusted library allocation
|
page read and write
|
||
2C89000
|
trusted library allocation
|
page read and write
|
||
2E09000
|
trusted library allocation
|
page read and write
|
||
7FFB4B52B000
|
trusted library allocation
|
page read and write
|
||
2B14F1B0000
|
heap
|
page read and write
|
||
125F6000
|
trusted library allocation
|
page read and write
|
||
7FFB4B772000
|
trusted library allocation
|
page read and write
|
||
2F9B000
|
trusted library allocation
|
page read and write
|
||
12844000
|
trusted library allocation
|
page read and write
|
||
7FFB4B790000
|
trusted library allocation
|
page read and write
|
||
1275D610000
|
heap
|
page read and write
|
||
7FFB4B376000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7C0000
|
trusted library allocation
|
page read and write
|
||
2B67000
|
trusted library allocation
|
page read and write
|
||
7FFB4B614000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4A6000
|
trusted library allocation
|
page read and write
|
||
1B73B000
|
stack
|
page read and write
|
||
B1A88FF000
|
stack
|
page read and write
|
||
1B28B000
|
stack
|
page read and write
|
||
7FFB4B490000
|
trusted library allocation
|
page read and write
|
||
10D5000
|
heap
|
page read and write
|
||
12F38000
|
trusted library allocation
|
page read and write
|
||
2E92000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7C6000
|
trusted library allocation
|
page read and write
|
||
1D960000
|
heap
|
page read and write
|
||
7FFB4B2ED000
|
trusted library allocation
|
page execute and read and write
|
||
12EFB000
|
trusted library allocation
|
page read and write
|
||
295E6119000
|
heap
|
page read and write
|
||
12DAF000
|
trusted library allocation
|
page read and write
|
||
2D34000
|
trusted library allocation
|
page read and write
|
||
2AEB000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
7FFB4B510000
|
trusted library allocation
|
page read and write
|
||
125B3000
|
trusted library allocation
|
page read and write
|
||
1275D543000
|
heap
|
page read and write
|
||
19E3BDF2000
|
heap
|
page read and write
|
||
7FFB4B8A0000
|
trusted library allocation
|
page read and write
|
||
2FFA000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7A2000
|
trusted library allocation
|
page read and write
|
||
7FFB4B534000
|
trusted library allocation
|
page read and write
|
||
2B2000
|
unkown
|
page readonly
|
||
7FFB4B5E0000
|
trusted library allocation
|
page read and write
|
||
3054000
|
trusted library allocation
|
page read and write
|
||
7FFB4B510000
|
trusted library allocation
|
page execute and read and write
|
||
2BBE5DF4000
|
heap
|
page read and write
|
||
2905000
|
trusted library allocation
|
page read and write
|
||
1260E000
|
trusted library allocation
|
page read and write
|
||
34A3000
|
trusted library allocation
|
page read and write
|
||
7FFB4B380000
|
trusted library allocation
|
page execute and read and write
|
||
20D87AA0000
|
heap
|
page read and write
|
||
881000
|
heap
|
page read and write
|
||
12EAB000
|
trusted library allocation
|
page read and write
|
||
120D000
|
heap
|
page read and write
|
||
2DE9000
|
trusted library allocation
|
page read and write
|
||
25117230000
|
heap
|
page read and write
|
||
120A000
|
heap
|
page read and write
|
||
3A9487C000
|
stack
|
page read and write
|
||
12F73000
|
trusted library allocation
|
page read and write
|
||
11EB000
|
heap
|
page read and write
|
||
32C8000
|
trusted library allocation
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
16839490000
|
heap
|
page read and write
|
||
1C23D000
|
heap
|
page read and write
|
||
7FFB4B2ED000
|
trusted library allocation
|
page execute and read and write
|
||
1B13B000
|
stack
|
page read and write
|
||
7FFB4B3E0000
|
trusted library allocation
|
page execute and read and write
|
||
33A5000
|
trusted library allocation
|
page read and write
|
||
7FFB4B851000
|
trusted library allocation
|
page read and write
|
||
2F2F000
|
trusted library allocation
|
page read and write
|
||
1B5D8000
|
heap
|
page read and write
|
||
7FFB4B7DC000
|
trusted library allocation
|
page read and write
|
||
2CFA000
|
trusted library allocation
|
page read and write
|
||
2E31000
|
trusted library allocation
|
page read and write
|
||
12B60000
|
trusted library allocation
|
page read and write
|
||
E5D6B8E000
|
stack
|
page read and write
|
||
ED9000
|
heap
|
page read and write
|
||
7FFB4B870000
|
trusted library allocation
|
page read and write
|
||
1B71E000
|
stack
|
page read and write
|
||
126E0000
|
trusted library allocation
|
page read and write
|
||
3409000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B483000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3E0000
|
trusted library allocation
|
page execute and read and write
|
||
324B000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2F4000
|
trusted library allocation
|
page read and write
|
||
1BFCD000
|
stack
|
page read and write
|
||
32E6000
|
trusted library allocation
|
page read and write
|
||
31EB000
|
trusted library allocation
|
page read and write
|
||
1B730000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page execute and read and write
|
||
7FFB4B850000
|
trusted library allocation
|
page execute and read and write
|
||
1B440000
|
heap
|
page read and write
|
||
7FFB4B7C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B7D2000
|
trusted library allocation
|
page read and write
|
||
1C760000
|
heap
|
page read and write
|
||
3161000
|
trusted library allocation
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
3447000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7BB000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
heap
|
page read and write
|
||
21F3A575000
|
heap
|
page read and write
|
||
2C01000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4C4000
|
trusted library allocation
|
page read and write
|
||
33AE000
|
trusted library allocation
|
page read and write
|
||
2B14F1B4000
|
heap
|
page read and write
|
||
32DC000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
7FFB4B4F2000
|
trusted library allocation
|
page read and write
|
||
1BB1C000
|
heap
|
page read and write
|
||
7FFB4B2FD000
|
trusted library allocation
|
page execute and read and write
|
||
1275D53F000
|
heap
|
page read and write
|
||
12B76000
|
trusted library allocation
|
page read and write
|
||
20F2B390000
|
heap
|
page read and write
|
||
7FFB4B480000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
7FFB4B4A0000
|
trusted library allocation
|
page execute and read and write
|
||
13426000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3D6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B4A0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B31D000
|
trusted library allocation
|
page execute and read and write
|
||
9FCA6FF000
|
unkown
|
page read and write
|
||
1B9CE000
|
stack
|
page read and write
|
||
3232000
|
trusted library allocation
|
page read and write
|
||
13234000
|
trusted library allocation
|
page read and write
|
||
7FFB4B540000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
A45000
|
heap
|
page read and write
|
||
3041000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
7FFB4B760000
|
trusted library allocation
|
page read and write
|
||
2F2B000
|
trusted library allocation
|
page read and write
|
||
2E17000
|
trusted library allocation
|
page read and write
|
||
12C75000
|
trusted library allocation
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
7FFB4B777000
|
trusted library allocation
|
page read and write
|
||
1190000
|
trusted library allocation
|
page read and write
|
||
7FFB4B308000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2C8000
|
trusted library allocation
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
768000
|
heap
|
page read and write
|
||
12E7A000
|
trusted library allocation
|
page read and write
|
||
13271000
|
trusted library allocation
|
page read and write
|
||
1C62E000
|
stack
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
1AEED000
|
heap
|
page read and write
|
||
2B85000
|
trusted library allocation
|
page read and write
|
||
27D9000
|
trusted library allocation
|
page read and write
|
||
7FFB4B870000
|
trusted library allocation
|
page read and write
|
||
12F01000
|
trusted library allocation
|
page read and write
|
||
1B698000
|
heap
|
page read and write
|
||
21EA9D60000
|
heap
|
page read and write
|
||
1BFBE000
|
stack
|
page read and write
|
||
1B87E000
|
stack
|
page read and write
|
||
7FFB4B4F4000
|
trusted library allocation
|
page read and write
|
||
D55000
|
heap
|
page read and write
|
||
7FFB4B73C000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2C4000
|
trusted library allocation
|
page read and write
|
||
2A69000
|
trusted library allocation
|
page read and write
|
||
131B1000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4F0000
|
trusted library allocation
|
page read and write
|
||
2C19000
|
trusted library allocation
|
page read and write
|
||
7FFB4B303000
|
trusted library allocation
|
page read and write
|
||
16DE000
|
stack
|
page read and write
|
||
7FFB4B450000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4B0000
|
trusted library allocation
|
page read and write
|
||
12DFA000
|
trusted library allocation
|
page read and write
|
||
1BA7E000
|
stack
|
page read and write
|
||
7FFB4B2DD000
|
trusted library allocation
|
page execute and read and write
|
||
2DDF000
|
trusted library allocation
|
page read and write
|
||
DC8000
|
heap
|
page read and write
|
||
7FFB4B478000
|
trusted library allocation
|
page read and write
|
||
2DC1000
|
trusted library allocation
|
page read and write
|
||
BA3F97F000
|
stack
|
page read and write
|
||
EA775FF000
|
stack
|
page read and write
|
||
1057000
|
heap
|
page read and write
|
||
11C0000
|
heap
|
page execute and read and write
|
||
318B000
|
trusted library allocation
|
page read and write
|
||
7FFB4B500000
|
trusted library allocation
|
page read and write
|
||
7FFB4B520000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
12EF000
|
stack
|
page read and write
|
||
1B273000
|
heap
|
page execute and read and write
|
||
7FFB4B7EB000
|
trusted library allocation
|
page read and write
|
||
205B0BD0000
|
heap
|
page read and write
|
||
7FFB4B2E4000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2FB000
|
trusted library allocation
|
page execute and read and write
|
||
2376B7A0000
|
heap
|
page read and write
|
||
7FFB4B527000
|
trusted library allocation
|
page read and write
|
||
20D87870000
|
heap
|
page read and write
|
||
3201000
|
trusted library allocation
|
page read and write
|
||
1AF31000
|
heap
|
page read and write
|
||
102D000
|
heap
|
page read and write
|
||
2F66000
|
trusted library allocation
|
page read and write
|
||
21EA9D61000
|
heap
|
page read and write
|
||
7FFB4B7BF000
|
trusted library allocation
|
page read and write
|
||
1C1A3000
|
heap
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
20F2B3C0000
|
heap
|
page read and write
|
||
7FFB4B4F0000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
26153580000
|
heap
|
page read and write
|
||
7FFB4B772000
|
trusted library allocation
|
page read and write
|
||
3398000
|
trusted library allocation
|
page read and write
|
||
12CC5000
|
trusted library allocation
|
page read and write
|
||
22664250000
|
heap
|
page read and write
|
||
12786000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4CC000
|
trusted library allocation
|
page read and write
|
||
1C080000
|
heap
|
page read and write
|
||
7FFB4B7C0000
|
trusted library allocation
|
page read and write
|
||
167BEC0A000
|
heap
|
page read and write
|
||
2D18000
|
trusted library allocation
|
page read and write
|
||
1BE60000
|
heap
|
page read and write
|
||
1335D000
|
trusted library allocation
|
page read and write
|
||
3487000
|
trusted library allocation
|
page read and write
|
||
17C5000
|
heap
|
page read and write
|
||
7FFB4B7C6000
|
trusted library allocation
|
page read and write
|
||
1AEDF000
|
heap
|
page read and write
|
||
21EA9D51000
|
heap
|
page read and write
|
||
7FFB4B880000
|
trusted library allocation
|
page execute and read and write
|
||
295E6127000
|
heap
|
page read and write
|
||
1AFE2000
|
unkown
|
page readonly
|
||
E30000
|
heap
|
page read and write
|
||
3159000
|
trusted library allocation
|
page read and write
|
||
2D9A000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3A6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B7F6000
|
trusted library allocation
|
page read and write
|
||
304C000
|
trusted library allocation
|
page read and write
|
||
32CD000
|
trusted library allocation
|
page read and write
|
||
7FFB4B520000
|
trusted library allocation
|
page read and write
|
||
2E5B000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2D3000
|
trusted library allocation
|
page read and write
|
||
1C1BF000
|
stack
|
page read and write
|
||
1BCD3000
|
heap
|
page execute and read and write
|
||
2EDA000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B751000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7AC000
|
trusted library allocation
|
page read and write
|
||
1EB66670000
|
heap
|
page read and write
|
||
295E6330000
|
heap
|
page read and write
|
||
1BA3E000
|
stack
|
page read and write
|
||
7FFB4B500000
|
trusted library allocation
|
page execute and read and write
|
||
2376BA65000
|
heap
|
page read and write
|
||
35BE000
|
trusted library allocation
|
page read and write
|
||
7FFB4B360000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4ED000
|
trusted library allocation
|
page read and write
|
||
7FFB4B380000
|
trusted library allocation
|
page execute and read and write
|
||
1B72E000
|
stack
|
page read and write
|
||
2376B7AA000
|
heap
|
page read and write
|
||
13144000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
2C46000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4D4000
|
trusted library allocation
|
page read and write
|
||
19E3BD60000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
1B610000
|
heap
|
page execute and read and write
|
||
2672DEB0000
|
heap
|
page read and write
|
||
7FFB4B770000
|
trusted library allocation
|
page read and write
|
||
7FFB4B470000
|
trusted library allocation
|
page read and write
|
||
EA771FB000
|
stack
|
page read and write
|
||
7FFB4B4B8000
|
trusted library allocation
|
page read and write
|
||
1F8B4207000
|
heap
|
page read and write
|
||
7FFB4B2E8000
|
trusted library allocation
|
page read and write
|
||
320E000
|
trusted library allocation
|
page read and write
|
||
1B000000
|
unkown
|
page readonly
|
||
21EA9D60000
|
heap
|
page read and write
|
||
D2F5D6C000
|
stack
|
page read and write
|
||
7FFB4B600000
|
trusted library allocation
|
page read and write
|
||
16839340000
|
heap
|
page read and write
|
||
2C79000
|
heap
|
page read and write
|
||
1275D543000
|
heap
|
page read and write
|
||
1270F000
|
trusted library allocation
|
page read and write
|
||
310A000
|
trusted library allocation
|
page read and write
|
||
32D9000
|
trusted library allocation
|
page read and write
|
||
7FFB4B526000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4ED000
|
trusted library allocation
|
page read and write
|
||
12D16000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2F4000
|
trusted library allocation
|
page read and write
|
||
1BE7E000
|
stack
|
page read and write
|
||
7FFB4B5F2000
|
trusted library allocation
|
page read and write
|
||
295E6010000
|
heap
|
page read and write
|
||
2CEA000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4D0000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
7FFB4B556000
|
trusted library allocation
|
page read and write
|
||
2529000
|
heap
|
page read and write
|
||
7FFB4B2EC000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7E0000
|
trusted library allocation
|
page read and write
|
||
2DD8000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page execute and read and write
|
||
446000
|
unkown
|
page readonly
|
||
7FFB4B784000
|
trusted library allocation
|
page read and write
|
||
1B633000
|
heap
|
page read and write
|
||
2EF5000
|
trusted library allocation
|
page read and write
|
||
14E8000
|
heap
|
page read and write
|
||
3A6327C000
|
stack
|
page read and write
|
||
130C8000
|
trusted library allocation
|
page read and write
|
||
2E92000
|
trusted library allocation
|
page read and write
|
||
1C51B000
|
stack
|
page read and write
|
||
7FFB4B570000
|
trusted library allocation
|
page execute and read and write
|
||
2C9D000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page execute and read and write
|
||
336D000
|
trusted library allocation
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
130D0000
|
trusted library allocation
|
page read and write
|
||
224E8FC000
|
stack
|
page read and write
|
||
2323000
|
heap
|
page execute and read and write
|
||
3132000
|
trusted library allocation
|
page read and write
|
||
7FFB4B530000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4F2000
|
trusted library allocation
|
page read and write
|
||
1BB64000
|
heap
|
page read and write
|
||
21EA9D65000
|
heap
|
page read and write
|
||
3532000
|
trusted library allocation
|
page read and write
|
||
12D5B000
|
trusted library allocation
|
page read and write
|
||
1B6E5FF000
|
stack
|
page read and write
|
||
26153560000
|
heap
|
page read and write
|
||
7FFB4B4D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B7B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7D0000
|
trusted library allocation
|
page execute and read and write
|
||
12F36000
|
trusted library allocation
|
page read and write
|
||
E79000
|
heap
|
page read and write
|
||
1F8B4185000
|
heap
|
page read and write
|
||
2A5000
|
unkown
|
page readonly
|
||
2561000
|
trusted library allocation
|
page read and write
|
||
1EC05275000
|
heap
|
page read and write
|
||
7FFB4B396000
|
trusted library allocation
|
page execute and read and write
|
||
12DF000
|
stack
|
page read and write
|
||
7FFB4B4AC000
|
trusted library allocation
|
page read and write
|
||
1D9F1000
|
heap
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
7FFB4B891000
|
trusted library allocation
|
page read and write
|
||
12682000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
2672DF0F000
|
heap
|
page read and write
|
||
12BA2000
|
trusted library allocation
|
page read and write
|
||
3429000
|
trusted library allocation
|
page read and write
|
||
A30000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
3417000
|
trusted library allocation
|
page read and write
|
||
DC7000
|
heap
|
page read and write
|
||
168392F0000
|
heap
|
page read and write
|
||
7FFB4B4BC000
|
trusted library allocation
|
page read and write
|
||
313E000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B4FA000
|
trusted library allocation
|
page read and write
|
||
EE8000
|
heap
|
page read and write
|
||
12E9B000
|
trusted library allocation
|
page read and write
|
||
21EA9D53000
|
heap
|
page read and write
|
||
7FFB4B531000
|
trusted library allocation
|
page read and write
|
||
1BB4E000
|
stack
|
page read and write
|
||
2FDE000
|
trusted library allocation
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
7FFB4B36C000
|
trusted library allocation
|
page execute and read and write
|
||
2AE8000
|
trusted library allocation
|
page read and write
|
||
2615000
|
trusted library allocation
|
page read and write
|
||
20D878A2000
|
heap
|
page read and write
|
||
7FFB4B79C000
|
trusted library allocation
|
page read and write
|
||
1BD9D000
|
stack
|
page read and write
|
||
7FFB4B880000
|
trusted library allocation
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page read and write
|
||
7FFB4B420000
|
trusted library allocation
|
page execute and read and write
|
||
255E000
|
stack
|
page read and write
|
||
3375000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
heap
|
page execute and read and write
|
||
21F3A510000
|
heap
|
page read and write
|
||
2376B740000
|
heap
|
page read and write
|
||
3151000
|
trusted library allocation
|
page read and write
|
||
7FFB4B751000
|
trusted library allocation
|
page read and write
|
||
2E13000
|
trusted library allocation
|
page read and write
|
||
1C1B0000
|
heap
|
page read and write
|
||
1B82C000
|
heap
|
page read and write
|
||
3183000
|
trusted library allocation
|
page read and write
|
||
2BBE5BE3000
|
heap
|
page read and write
|
||
7FFB4B2C0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4B0000
|
trusted library allocation
|
page read and write
|
||
2B49000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4B0000
|
trusted library allocation
|
page read and write
|
||
261535C0000
|
heap
|
page read and write
|
||
61BE0FB000
|
stack
|
page read and write
|
||
1272A000
|
trusted library allocation
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
22664270000
|
heap
|
page read and write
|
||
1B630000
|
heap
|
page read and write
|
||
1C50B000
|
stack
|
page read and write
|
||
1B002000
|
unkown
|
page readonly
|
||
7FFB4B788000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2ED000
|
trusted library allocation
|
page execute and read and write
|
||
12CDE000
|
trusted library allocation
|
page read and write
|
||
2718000
|
trusted library allocation
|
page read and write
|
||
2CC6000
|
trusted library allocation
|
page read and write
|
||
2EB9000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
2BBE5B20000
|
heap
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
1508000
|
heap
|
page read and write
|
||
2F29000
|
trusted library allocation
|
page read and write
|
||
2672DEA0000
|
heap
|
page read and write
|
||
7FFB4B4C0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B790000
|
trusted library allocation
|
page read and write
|
||
1B584000
|
heap
|
page read and write
|
||
7FFB4B31C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B490000
|
trusted library allocation
|
page read and write
|
||
2BBF000
|
trusted library allocation
|
page read and write
|
||
2E05000
|
trusted library allocation
|
page read and write
|
||
7FFB4B550000
|
trusted library allocation
|
page execute and read and write
|
||
D2F60FF000
|
unkown
|
page read and write
|
||
830000
|
trusted library allocation
|
page read and write
|
||
7FFB4B840000
|
trusted library allocation
|
page execute and read and write
|
||
25117249000
|
heap
|
page read and write
|
||
D6AC77F000
|
stack
|
page read and write
|
||
12FB6000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7B7000
|
trusted library allocation
|
page read and write
|
||
BA3F87C000
|
stack
|
page read and write
|
||
12561000
|
trusted library allocation
|
page read and write
|
||
2DEE000
|
trusted library allocation
|
page read and write
|
||
2DE1000
|
trusted library allocation
|
page read and write
|
||
7FFB4B861000
|
trusted library allocation
|
page read and write
|
||
1B930000
|
heap
|
page execute and read and write
|
||
7FFB4B3E0000
|
trusted library allocation
|
page execute and read and write
|
||
340F000
|
trusted library allocation
|
page read and write
|
||
7FFB4B50A000
|
trusted library allocation
|
page read and write
|
||
7FFB4B526000
|
trusted library allocation
|
page read and write
|
||
1260F000
|
trusted library allocation
|
page read and write
|
||
2672DF13000
|
heap
|
page read and write
|
||
12C03000
|
trusted library allocation
|
page read and write
|
||
2E29000
|
trusted library allocation
|
page read and write
|
||
7FFB4B77F000
|
trusted library allocation
|
page read and write
|
||
7FFB4B799000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B34C000
|
trusted library allocation
|
page execute and read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
3189000
|
trusted library allocation
|
page read and write
|
||
2A99000
|
trusted library allocation
|
page read and write
|
||
7FFB4B550000
|
trusted library allocation
|
page read and write
|
||
19E3BDF3000
|
heap
|
page read and write
|
||
12CD3000
|
trusted library allocation
|
page read and write
|
||
7FFB4B7A2000
|
trusted library allocation
|
page read and write
|
||
2B8F000
|
stack
|
page read and write
|
||
7FFB4B612000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3A0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B477000
|
trusted library allocation
|
page read and write
|
||
12CC0000
|
trusted library allocation
|
page read and write
|
||
1EC05275000
|
heap
|
page read and write
|
||
1BDDE000
|
stack
|
page read and write
|
||
1B97E000
|
stack
|
page read and write
|
||
12E1B000
|
trusted library allocation
|
page read and write
|
||
2A96000
|
trusted library allocation
|
page read and write
|
||
33C5000
|
trusted library allocation
|
page read and write
|
||
2BBE5AF0000
|
heap
|
page read and write
|
||
7FFB4B4F0000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
3419000
|
trusted library allocation
|
page read and write
|
||
167BEAA0000
|
heap
|
page read and write
|
||
7FFB4B410000
|
trusted library allocation
|
page execute and read and write
|
||
29F0000
|
heap
|
page execute and read and write
|
||
1275D7C0000
|
heap
|
page read and write
|
||
1B557000
|
heap
|
page read and write
|
||
2CE5000
|
trusted library allocation
|
page read and write
|
||
7FFB4B750000
|
trusted library allocation
|
page read and write
|
||
12E26000
|
trusted library allocation
|
page read and write
|
||
2BF6000
|
trusted library allocation
|
page read and write
|
||
1C55E000
|
stack
|
page read and write
|
||
13124000
|
trusted library allocation
|
page read and write
|
||
1B4AB000
|
stack
|
page read and write
|
||
1229000
|
heap
|
page read and write
|
||
11EF000
|
stack
|
page read and write
|
||
7FFB4B7F8000
|
trusted library allocation
|
page read and write
|
||
3386000
|
trusted library allocation
|
page read and write
|
||
1B63D000
|
stack
|
page read and write
|
||
2DAE000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
7FFB4B2EB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B500000
|
trusted library allocation
|
page read and write
|
||
2E19000
|
trusted library allocation
|
page read and write
|
||
19E3C014000
|
heap
|
page read and write
|
||
7FFB4B7A0000
|
trusted library allocation
|
page read and write
|
||
F45000
|
heap
|
page read and write
|
||
1BEDE000
|
stack
|
page read and write
|
||
1B66E000
|
heap
|
page read and write
|
||
12C46000
|
trusted library allocation
|
page read and write
|
||
7FFB4B520000
|
trusted library allocation
|
page read and write
|
||
2E7B000
|
trusted library allocation
|
page read and write
|
There are 2117 hidden memdumps, click here to show them.