Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PixpFUv4G7.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Copilot.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Microsoft Copilot.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\BouncyCastle.Crypto.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Gma.System.MouseKeyHook.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Guna.UI2.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Mech Server.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Microsoft.TestPlatform.AdapterUtilities.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Microsoft.VisualStudio.CodeCoverage.Shim.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Microsoft.VisualStudio.TestPlatform.MSTest.TestAdapter.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Microsoft.VisualStudio.TestPlatform.TestFramework.Extensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Microsoft.VisualStudio.TestPlatform.TestFramework.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Mono.Cecil.Mdb.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Mono.Cecil.Pdb.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Mono.Cecil.Rocks.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Mono.Cecil.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Profiles\Default.xml
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Quasar.Common.Tests.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Quasar.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Vestris.ResourceLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\aa-DJ\Quasar.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\client.bin
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\protobuf-net.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Microsoft Copilot.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Mech RAT.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5bcaxv5z.b0k.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5zt03qhq.po0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ajczprla.cij.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bzu5hxfh.xeq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e243zlq3.bck.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_egfsle4z.epq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_klshm5t3.2ql.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lgche4mn.wfz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ltbjgqci.0cf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oyhil3c3.lr2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p012odqo.22x.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s2fqu20u.f1v.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vvm2f5nq.c24.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x2f0rpli.rmq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zcawnhwe.1e4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zy5hglte.q2d.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Client.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\CM Stolen ICO.ico
|
MS Windows icon resource - 1 icon, 256x256, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\Discord Stolen ICO.ico
|
MS Windows icon resource - 1 icon, 64x64, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\Mech ICO.ico
|
MS Windows icon resource - 1 icon, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\Mech2.png
|
PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\Roblox Modern Stolen.ico
|
MS Windows icon resource - 1 icon, 256x256, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\XWorm Stolen ICO.ico
|
MS Windows icon resource - 1 icon, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (1).ico
|
MS Windows icon resource - 5 icons, 48x48, 32 bits/pixel, 64x64, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (10).ico
|
MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel,
-128x-128, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (11).ico
|
MS Windows icon resource - 1 icon, 48x48
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (12).ico
|
MS Windows icon resource - 1 icon, 48x48
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (13).ico
|
MS Windows icon resource - 6 icons, 256x256, 32 bits/pixel, 16x16, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (14).ico
|
MS Windows icon resource - 6 icons, 256x256, 32 bits/pixel, 16x16, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (15).ico
|
MS Windows icon resource - 6 icons, 256x256, 32 bits/pixel, 16x16, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (16).ico
|
MS Windows icon resource - 5 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (17).ico
|
MS Windows icon resource - 1 icon, -128x-128, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (2).ico
|
MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel,
-128x-128, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (3).ico
|
MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel,
-128x-128, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (4).ico
|
MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel,
-128x-128, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (5).ico
|
MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel,
-128x-128, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (6).ico
|
MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel,
-128x-128, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (7).ico
|
Targa image data - Map 32 x 3467 x 1 +1
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (8).ico
|
MS Windows icon resource - 6 icons, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel,
-128x-128, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fake Icons\icon (9).ico
|
MS Windows icon resource - 1 icon, 256x256
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Fixer.bat
|
DOS batch file, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Open.Nat.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\Quasar.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd\Mech RAT\settings.xml
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\unarchiver.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Copilot.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Oct 6 23:35:09
2024, mtime=Sun Oct 6 23:35:09 2024, atime=Sun Oct 6 23:35:09 2024, length=71680, window=hide
|
dropped
|
There are 65 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PixpFUv4G7.exe
|
"C:\Users\user\Desktop\PixpFUv4G7.exe"
|
||
C:\Users\user\AppData\Local\Temp\Copilot.exe
|
"C:\Users\user~1\AppData\Local\Temp\Copilot.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user~1\AppData\Local\Temp\Copilot.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Copilot.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user~1\AppData\Local\Temp\Microsoft
Copilot.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft
Copilot.exe'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Microsoft Copilot" /tr "C:\Users\user~1\AppData\Local\Temp\Microsoft
Copilot.exe"
|
||
C:\Users\user\AppData\Local\Temp\Microsoft Copilot.exe
|
"C:\Users\user~1\AppData\Local\Temp\Microsoft Copilot.exe"
|
||
C:\Users\user\AppData\Local\Temp\Microsoft Copilot.exe
|
"C:\Users\user~1\AppData\Local\Temp\Microsoft Copilot.exe"
|
||
C:\Users\user\AppData\Local\Temp\Microsoft Copilot.exe
|
"C:\Users\user~1\AppData\Local\Temp\Microsoft Copilot.exe"
|
||
C:\Users\user\AppData\Local\Temp\Microsoft Copilot.exe
|
"C:\Users\user~1\AppData\Local\Temp\Microsoft Copilot.exe"
|
||
C:\Windows\SysWOW64\unarchiver.exe
|
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user~1\AppData\Local\Temp\Mech RAT.zip"
|
||
C:\Windows\SysWOW64\7za.exe
|
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\dpt5uaov.zyd" "C:\Users\user~1\AppData\Local\Temp\Mech
RAT.zip"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 9 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
content-portion.gl.at.ply.gg
|
|||
https://api.ipify.org/
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://github.com/lontivero/Open.Nat/issuesOAlso
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://crl.mi
|
unknown
|
||
http://crl.m
|
unknown
|
||
https://ion=v4.5
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354sCannot
|
unknown
|
||
https://ipwho.is/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/novotnyllc/bc-csharp
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 16 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
content-portion.gl.at.ply.gg
|
147.185.221.21
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
147.185.221.21
|
content-portion.gl.at.ply.gg
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Microsoft Copilot
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\SysWOW64\unarchiver.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\SysWOW64\unarchiver.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Copilot_RASMANCS
|
FileDirectory
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2820000
|
heap
|
page read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
962000
|
unkown
|
page readonly
|
||
7FFAACD8C000
|
trusted library allocation
|
page read and write
|
||
2189B811000
|
trusted library allocation
|
page read and write
|
||
D00000
|
trusted library allocation
|
page read and write
|
||
3639CB6000
|
stack
|
page read and write
|
||
205B9220000
|
heap
|
page readonly
|
||
205BB306000
|
trusted library allocation
|
page read and write
|
||
7FFAACAC6000
|
trusted library allocation
|
page read and write
|
||
5A0460E000
|
stack
|
page read and write
|
||
204AC675000
|
trusted library allocation
|
page read and write
|
||
7FFB0B7F0000
|
unkown
|
page read and write
|
||
7FFAACAB6000
|
trusted library allocation
|
page read and write
|
||
17A9C760000
|
heap
|
page read and write
|
||
7FFAACA24000
|
trusted library allocation
|
page read and write
|
||
7FFAACD54000
|
trusted library allocation
|
page read and write
|
||
5BA54BE000
|
stack
|
page read and write
|
||
7FFAACAB0000
|
trusted library allocation
|
page read and write
|
||
21889ED5000
|
heap
|
page read and write
|
||
7FFAACBE0000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page read and write
|
||
1C4A8000
|
stack
|
page read and write
|
||
205D1B7D000
|
heap
|
page read and write
|
||
205D1896000
|
heap
|
page read and write
|
||
205BB0B3000
|
trusted library allocation
|
page read and write
|
||
7FFAACB20000
|
trusted library allocation
|
page execute and read and write
|
||
2A30000
|
trusted library allocation
|
page read and write
|
||
2A6A000
|
trusted library allocation
|
page read and write
|
||
7FFAACAE6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD88000
|
trusted library allocation
|
page read and write
|
||
7FFAACBDA000
|
trusted library allocation
|
page read and write
|
||
26AE000
|
stack
|
page read and write
|
||
204C3160000
|
heap
|
page read and write
|
||
205BA458000
|
trusted library allocation
|
page read and write
|
||
D85000
|
heap
|
page read and write
|
||
7FFAACA20000
|
trusted library allocation
|
page read and write
|
||
205BAD6A000
|
trusted library allocation
|
page read and write
|
||
2189BADD000
|
trusted library allocation
|
page read and write
|
||
226813F3000
|
trusted library allocation
|
page read and write
|
||
7FFAACA33000
|
trusted library allocation
|
page execute and read and write
|
||
205B9709000
|
trusted library allocation
|
page read and write
|
||
2269870B000
|
heap
|
page read and write
|
||
5A037B9000
|
stack
|
page read and write
|
||
93B000
|
heap
|
page read and write
|
||
7FFAACD7C000
|
trusted library allocation
|
page read and write
|
||
7FFAACBBA000
|
trusted library allocation
|
page read and write
|
||
7FFAACD6C000
|
trusted library allocation
|
page read and write
|
||
226904D3000
|
trusted library allocation
|
page read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page read and write
|
||
7FFAACA3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACCF0000
|
trusted library allocation
|
page read and write
|
||
204C33C0000
|
heap
|
page read and write
|
||
22680E1F000
|
trusted library allocation
|
page read and write
|
||
218A3FA4000
|
heap
|
page read and write
|
||
7FFAACC50000
|
trusted library allocation
|
page read and write
|
||
204AAC1C000
|
heap
|
page read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
127F1000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
205B7C00000
|
heap
|
page read and write
|
||
7FFAACC10000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACE20000
|
trusted library allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
7FFAACBC1000
|
trusted library allocation
|
page read and write
|
||
7FFAACC80000
|
trusted library allocation
|
page read and write
|
||
7FFAACA03000
|
trusted library allocation
|
page execute and read and write
|
||
2188C904000
|
trusted library allocation
|
page read and write
|
||
9E7000
|
heap
|
page read and write
|
||
36398FE000
|
stack
|
page read and write
|
||
2188D600000
|
trusted library allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
1409000
|
heap
|
page read and write
|
||
22681157000
|
trusted library allocation
|
page read and write
|
||
7FFAACA0D000
|
trusted library allocation
|
page execute and read and write
|
||
1BB36000
|
heap
|
page read and write
|
||
205C9551000
|
trusted library allocation
|
page read and write
|
||
7FFAACD30000
|
trusted library allocation
|
page read and write
|
||
2188D605000
|
trusted library allocation
|
page read and write
|
||
5BA618E000
|
stack
|
page read and write
|
||
205BB2EC000
|
trusted library allocation
|
page read and write
|
||
5BA5236000
|
stack
|
page read and write
|
||
205BAE36000
|
trusted library allocation
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
4D5D000
|
stack
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
205D1AE6000
|
heap
|
page read and write
|
||
5BA543E000
|
stack
|
page read and write
|
||
226904CE000
|
trusted library allocation
|
page read and write
|
||
7FFAACE5D000
|
trusted library allocation
|
page read and write
|
||
218A3D20000
|
heap
|
page read and write
|
||
2A4A000
|
trusted library allocation
|
page read and write
|
||
2C41000
|
trusted library allocation
|
page read and write
|
||
7FF4EF500000
|
trusted library allocation
|
page execute and read and write
|
||
21889CE0000
|
heap
|
page read and write
|
||
E5E000
|
heap
|
page read and write
|
||
769000
|
stack
|
page read and write
|
||
7FFAACCA0000
|
trusted library allocation
|
page read and write
|
||
22681216000
|
trusted library allocation
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
7FFAACD54000
|
trusted library allocation
|
page read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page read and write
|
||
205BB22B000
|
trusted library allocation
|
page read and write
|
||
204BB07A000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page execute and read and write
|
||
204ABEA1000
|
trusted library allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
7FFAACD62000
|
trusted library allocation
|
page read and write
|
||
5BA5179000
|
stack
|
page read and write
|
||
12BC1000
|
trusted library allocation
|
page read and write
|
||
22680C32000
|
trusted library allocation
|
page read and write
|
||
12BB1000
|
trusted library allocation
|
page read and write
|
||
CFA000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACC50000
|
trusted library allocation
|
page read and write
|
||
218A3C44000
|
heap
|
page read and write
|
||
DA1000
|
heap
|
page read and write
|
||
D09000
|
heap
|
page read and write
|
||
7FFAACE10000
|
trusted library allocation
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page read and write
|
||
205B7A27000
|
heap
|
page read and write
|
||
205BAE3D000
|
trusted library allocation
|
page read and write
|
||
2188C3DA000
|
trusted library allocation
|
page read and write
|
||
1CEAC000
|
stack
|
page read and write
|
||
205BB2F6000
|
trusted library allocation
|
page read and write
|
||
2A50000
|
trusted library allocation
|
page read and write
|
||
7FFAACA14000
|
trusted library allocation
|
page read and write
|
||
205BAD48000
|
trusted library allocation
|
page read and write
|
||
204C323C000
|
heap
|
page read and write
|
||
2188C754000
|
trusted library allocation
|
page read and write
|
||
22690201000
|
trusted library allocation
|
page read and write
|
||
204C32E3000
|
heap
|
page read and write
|
||
7FFAACA0D000
|
trusted library allocation
|
page execute and read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
7FFAACDF3000
|
trusted library allocation
|
page read and write
|
||
226987C2000
|
heap
|
page read and write
|
||
205BA465000
|
trusted library allocation
|
page read and write
|
||
1BDFE000
|
stack
|
page read and write
|
||
218A3BF0000
|
heap
|
page execute and read and write
|
||
205BA867000
|
trusted library allocation
|
page read and write
|
||
205BAD53000
|
trusted library allocation
|
page read and write
|
||
1BB0C000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
7FFAACC00000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
204C3190000
|
trusted library allocation
|
page read and write
|
||
7FFAACD68000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD1000
|
trusted library allocation
|
page read and write
|
||
205C97D7000
|
trusted library allocation
|
page read and write
|
||
205BB147000
|
trusted library allocation
|
page read and write
|
||
7FFAACE80000
|
trusted library allocation
|
page read and write
|
||
C9F000
|
stack
|
page read and write
|
||
D0C000
|
trusted library allocation
|
page execute and read and write
|
||
920000
|
heap
|
page read and write
|
||
7B1000
|
stack
|
page read and write
|
||
204C32D0000
|
heap
|
page read and write
|
||
7FFAACE50000
|
trusted library allocation
|
page read and write
|
||
2B075CC000
|
stack
|
page read and write
|
||
7FFAACB40000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACC02000
|
trusted library allocation
|
page read and write
|
||
205B99AD000
|
trusted library allocation
|
page read and write
|
||
2A01000
|
trusted library allocation
|
page read and write
|
||
7FFAACAC0000
|
trusted library allocation
|
page execute and read and write
|
||
DCE000
|
stack
|
page read and write
|
||
205BA787000
|
trusted library allocation
|
page read and write
|
||
363AA0E000
|
stack
|
page read and write
|
||
218A3BF6000
|
heap
|
page execute and read and write
|
||
BAE000
|
heap
|
page read and write
|
||
226987B0000
|
heap
|
page read and write
|
||
7FFAACE30000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACA30000
|
trusted library allocation
|
page read and write
|
||
22698777000
|
heap
|
page execute and read and write
|
||
CFA000
|
heap
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
226989BC000
|
heap
|
page read and write
|
||
2188C9BC000
|
trusted library allocation
|
page read and write
|
||
5BA5F8C000
|
stack
|
page read and write
|
||
7FFAACE50000
|
trusted library allocation
|
page read and write
|
||
EBE000
|
heap
|
page read and write
|
||
5A03738000
|
stack
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
2268115F000
|
trusted library allocation
|
page read and write
|
||
2188C812000
|
trusted library allocation
|
page read and write
|
||
1CBB0000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
7FFAACA10000
|
trusted library allocation
|
page read and write
|
||
7FFAACE60000
|
trusted library allocation
|
page read and write
|
||
7FFAACE60000
|
trusted library allocation
|
page read and write
|
||
12BB8000
|
trusted library allocation
|
page read and write
|
||
7FFAACE50000
|
trusted library allocation
|
page read and write
|
||
205D1C35000
|
heap
|
page read and write
|
||
5A02FC3000
|
stack
|
page read and write
|
||
205B7920000
|
trusted library section
|
page read and write
|
||
7FFAACAC0000
|
trusted library allocation
|
page read and write
|
||
E33000
|
heap
|
page read and write
|
||
AE5000
|
heap
|
page read and write
|
||
226FE562000
|
heap
|
page read and write
|
||
2C3F000
|
trusted library allocation
|
page read and write
|
||
22690255000
|
trusted library allocation
|
page read and write
|
||
7FFAACAB0000
|
trusted library allocation
|
page read and write
|
||
12918000
|
trusted library allocation
|
page read and write
|
||
205BAD39000
|
trusted library allocation
|
page read and write
|
||
1C8B0000
|
heap
|
page read and write
|
||
7FFAACD59000
|
trusted library allocation
|
page read and write
|
||
218A3F95000
|
heap
|
page read and write
|
||
D0A000
|
trusted library allocation
|
page execute and read and write
|
||
2188B7D5000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
204C33C4000
|
heap
|
page read and write
|
||
7FFAACCE0000
|
trusted library allocation
|
page read and write
|
||
7FFAACD65000
|
trusted library allocation
|
page read and write
|
||
E1B000
|
heap
|
page read and write
|
||
D07000
|
heap
|
page read and write
|
||
146A000
|
heap
|
page read and write
|
||
1820000
|
heap
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
22681304000
|
trusted library allocation
|
page read and write
|
||
CDF000
|
stack
|
page read and write
|
||
204AAD70000
|
heap
|
page read and write
|
||
226814E9000
|
trusted library allocation
|
page read and write
|
||
1B563000
|
heap
|
page read and write
|
||
7FFAACBA2000
|
trusted library allocation
|
page read and write
|
||
DD7000
|
heap
|
page read and write
|
||
2188C5A2000
|
trusted library allocation
|
page read and write
|
||
22681FBC000
|
trusted library allocation
|
page read and write
|
||
204AC145000
|
trusted library allocation
|
page read and write
|
||
205BA6F4000
|
trusted library allocation
|
page read and write
|
||
2188CF61000
|
trusted library allocation
|
page read and write
|
||
226FE59D000
|
heap
|
page read and write
|
||
7FFAACA14000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
205B78A0000
|
heap
|
page read and write
|
||
7FFAACBD2000
|
trusted library allocation
|
page read and write
|
||
7FFAACD33000
|
trusted library allocation
|
page read and write
|
||
5BA533A000
|
stack
|
page read and write
|
||
7FFAACBE2000
|
trusted library allocation
|
page read and write
|
||
1B73E000
|
stack
|
page read and write
|
||
7FFAACBB1000
|
trusted library allocation
|
page read and write
|
||
205BB0FD000
|
trusted library allocation
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page read and write
|
||
1B89E000
|
stack
|
page read and write
|
||
7FFAACAC0000
|
trusted library allocation
|
page read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page read and write
|
||
204A91E0000
|
heap
|
page read and write
|
||
5A038BE000
|
stack
|
page read and write
|
||
205BAE76000
|
trusted library allocation
|
page read and write
|
||
218A3F15000
|
heap
|
page read and write
|
||
17AF000
|
stack
|
page read and write
|
||
226FE593000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FFAACBC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB0B7F2000
|
unkown
|
page readonly
|
||
205D1980000
|
heap
|
page read and write
|
||
7FFAACA4D000
|
trusted library allocation
|
page execute and read and write
|
||
17A9C7A0000
|
heap
|
page read and write
|
||
205B92B0000
|
trusted library allocation
|
page read and write
|
||
7FFAACBF0000
|
trusted library allocation
|
page execute and read and write
|
||
1B4DE000
|
stack
|
page read and write
|
||
21889CC0000
|
trusted library allocation
|
page read and write
|
||
204A92D0000
|
heap
|
page read and write
|
||
7FFAACE20000
|
trusted library allocation
|
page execute and read and write
|
||
12BF000
|
stack
|
page read and write
|
||
4B9E000
|
stack
|
page read and write
|
||
204A92A0000
|
heap
|
page read and write
|
||
7FFAACA23000
|
trusted library allocation
|
page execute and read and write
|
||
205BAE23000
|
trusted library allocation
|
page read and write
|
||
2188B684000
|
heap
|
page read and write
|
||
205D1AB0000
|
heap
|
page read and write
|
||
226989F3000
|
heap
|
page read and write
|
||
2C27000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
226FE680000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page execute and read and write
|
||
2188C748000
|
trusted library allocation
|
page read and write
|
||
2921000
|
trusted library allocation
|
page read and write
|
||
7FFAACA20000
|
trusted library allocation
|
page read and write
|
||
AEB000
|
heap
|
page read and write
|
||
5BA51BE000
|
stack
|
page read and write
|
||
2188B7E1000
|
trusted library allocation
|
page read and write
|
||
226FE5AD000
|
heap
|
page read and write
|
||
1075000
|
heap
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
7FFAACA23000
|
trusted library allocation
|
page execute and read and write
|
||
22681218000
|
trusted library allocation
|
page read and write
|
||
204AAD81000
|
trusted library allocation
|
page read and write
|
||
204C31A0000
|
heap
|
page execute and read and write
|
||
7FFAACD00000
|
trusted library allocation
|
page read and write
|
||
204ABD86000
|
trusted library allocation
|
page read and write
|
||
21889CF2000
|
heap
|
page read and write
|
||
226FE650000
|
heap
|
page read and write
|
||
22680050000
|
heap
|
page readonly
|
||
2188B7D0000
|
heap
|
page read and write
|
||
363AC0E000
|
stack
|
page read and write
|
||
127F3000
|
trusted library allocation
|
page read and write
|
||
3639EBE000
|
stack
|
page read and write
|
||
22698965000
|
heap
|
page read and write
|
||
2188C3E3000
|
trusted library allocation
|
page read and write
|
||
2801000
|
trusted library allocation
|
page read and write
|
||
7FFAACD82000
|
trusted library allocation
|
page read and write
|
||
204A9330000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
205B7943000
|
heap
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
8FD000
|
stack
|
page read and write
|
||
205BAE48000
|
trusted library allocation
|
page read and write
|
||
7FFAACA5C000
|
trusted library allocation
|
page execute and read and write
|
||
218A3E00000
|
heap
|
page read and write
|
||
1B1CF000
|
stack
|
page read and write
|
||
205D1E10000
|
heap
|
page read and write
|
||
F20000
|
unkown
|
page readonly
|
||
5BA4F7A000
|
stack
|
page read and write
|
||
D3B000
|
trusted library allocation
|
page execute and read and write
|
||
95C000
|
heap
|
page read and write
|
||
2188C750000
|
trusted library allocation
|
page read and write
|
||
22698C20000
|
heap
|
page read and write
|
||
7FFAACA44000
|
trusted library allocation
|
page read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page read and write
|
||
363987E000
|
stack
|
page read and write
|
||
205BB2E1000
|
trusted library allocation
|
page read and write
|
||
218A3C00000
|
heap
|
page read and write
|
||
7FFAACD20000
|
trusted library allocation
|
page read and write
|
||
7DF4C37F0000
|
trusted library allocation
|
page execute and read and write
|
||
205BAE00000
|
trusted library allocation
|
page read and write
|
||
7FFAACA30000
|
trusted library allocation
|
page read and write
|
||
5BA50FD000
|
stack
|
page read and write
|
||
204ABE3F000
|
trusted library allocation
|
page read and write
|
||
17A9C7D0000
|
heap
|
page read and write
|
||
226904D5000
|
trusted library allocation
|
page read and write
|
||
22698A4C000
|
heap
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
205BAB30000
|
trusted library allocation
|
page read and write
|
||
2189B7E1000
|
trusted library allocation
|
page read and write
|
||
218A3EE3000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
7FFAACC20000
|
trusted library allocation
|
page read and write
|
||
218A3EF8000
|
heap
|
page read and write
|
||
218A3F90000
|
heap
|
page read and write
|
||
5A039BB000
|
stack
|
page read and write
|
||
205BAE30000
|
trusted library allocation
|
page read and write
|
||
5BA4EFF000
|
stack
|
page read and write
|
||
7FFAACA14000
|
trusted library allocation
|
page read and write
|
||
204AB7D2000
|
trusted library allocation
|
page read and write
|
||
B79000
|
heap
|
page read and write
|
||
5A0363E000
|
stack
|
page read and write
|
||
205BA7B6000
|
trusted library allocation
|
page read and write
|
||
205B7C05000
|
heap
|
page read and write
|
||
7FFAACA10000
|
trusted library allocation
|
page read and write
|
||
204AABD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACB30000
|
trusted library allocation
|
page execute and read and write
|
||
1B99E000
|
stack
|
page read and write
|
||
EB5000
|
heap
|
page read and write
|
||
226FE597000
|
heap
|
page read and write
|
||
7FFAACA2B000
|
trusted library allocation
|
page read and write
|
||
7FFAACA02000
|
trusted library allocation
|
page read and write
|
||
2BFA000
|
trusted library allocation
|
page read and write
|
||
1B790000
|
heap
|
page execute and read and write
|
||
21889D3F000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
7FFAACA10000
|
trusted library allocation
|
page read and write
|
||
7FFAACAE6000
|
trusted library allocation
|
page execute and read and write
|
||
C39000
|
heap
|
page read and write
|
||
7FFAACD68000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC2000
|
trusted library allocation
|
page read and write
|
||
66C000
|
stack
|
page read and write
|
||
226801E1000
|
trusted library allocation
|
page read and write
|
||
E5C000
|
heap
|
page read and write
|
||
2189BA6E000
|
trusted library allocation
|
page read and write
|
||
205C9723000
|
trusted library allocation
|
page read and write
|
||
5A0347F000
|
stack
|
page read and write
|
||
965000
|
heap
|
page read and write
|
||
2B0764D000
|
stack
|
page read and write
|
||
7FFAACA40000
|
trusted library allocation
|
page read and write
|
||
22680020000
|
trusted library allocation
|
page read and write
|
||
205D1AEE000
|
heap
|
page read and write
|
||
5A0438F000
|
stack
|
page read and write
|
||
2188C744000
|
trusted library allocation
|
page read and write
|
||
3D20000
|
heap
|
page read and write
|
||
CE0000
|
trusted library allocation
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
204A9226000
|
heap
|
page read and write
|
||
205BACAF000
|
trusted library allocation
|
page read and write
|
||
7FFAACAE0000
|
trusted library allocation
|
page read and write
|
||
7FFAACD10000
|
trusted library allocation
|
page read and write
|
||
21889D68000
|
heap
|
page read and write
|
||
2268114E000
|
trusted library allocation
|
page read and write
|
||
7FFAACCD0000
|
trusted library allocation
|
page read and write
|
||
205B77C0000
|
heap
|
page read and write
|
||
2C2E000
|
trusted library allocation
|
page read and write
|
||
BA2000
|
heap
|
page read and write
|
||
4FDE000
|
stack
|
page read and write
|
||
7FFAACB40000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD00000
|
trusted library allocation
|
page read and write
|
||
21889D23000
|
heap
|
page read and write
|
||
7DF407A20000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACCB0000
|
trusted library allocation
|
page read and write
|
||
7FFAACABC000
|
trusted library allocation
|
page execute and read and write
|
||
31A0000
|
heap
|
page execute and read and write
|
||
2189BAD3000
|
trusted library allocation
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
2189B801000
|
trusted library allocation
|
page read and write
|
||
218A3C91000
|
heap
|
page read and write
|
||
1BA78000
|
heap
|
page read and write
|
||
1B3BF000
|
stack
|
page read and write
|
||
218A4140000
|
heap
|
page read and write
|
||
5BA4FFF000
|
stack
|
page read and write
|
||
7FFAACE30000
|
trusted library allocation
|
page read and write
|
||
7FFAACC50000
|
trusted library allocation
|
page read and write
|
||
204BADA1000
|
trusted library allocation
|
page read and write
|
||
95F000
|
stack
|
page read and write
|
||
7FFAACCC0000
|
trusted library allocation
|
page read and write
|
||
F45000
|
heap
|
page read and write
|
||
2269869E000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
205B7979000
|
heap
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
7FFAACCB0000
|
trusted library allocation
|
page read and write
|
||
218A3C15000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page execute and read and write
|
||
5BA610D000
|
stack
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
2A5F000
|
trusted library allocation
|
page read and write
|
||
3639F3C000
|
stack
|
page read and write
|
||
204AB97F000
|
trusted library allocation
|
page read and write
|
||
205BA9B3000
|
trusted library allocation
|
page read and write
|
||
27F1000
|
trusted library allocation
|
page read and write
|
||
1B86E000
|
stack
|
page read and write
|
||
7FFAACA1D000
|
trusted library allocation
|
page execute and read and write
|
||
21889D6B000
|
heap
|
page read and write
|
||
205BA265000
|
trusted library allocation
|
page read and write
|
||
7FFAACA6C000
|
trusted library allocation
|
page execute and read and write
|
||
226FE557000
|
heap
|
page read and write
|
||
7FFAACA04000
|
trusted library allocation
|
page read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page read and write
|
||
205D1C44000
|
heap
|
page read and write
|
||
205BA454000
|
trusted library allocation
|
page read and write
|
||
7FFAACA5C000
|
trusted library allocation
|
page execute and read and write
|
||
EC0000
|
heap
|
page read and write
|
||
226814B6000
|
trusted library allocation
|
page read and write
|
||
204AB97D000
|
trusted library allocation
|
page read and write
|
||
204A9170000
|
heap
|
page read and write
|
||
204A9380000
|
heap
|
page execute and read and write
|
||
7FFAACB06000
|
trusted library allocation
|
page execute and read and write
|
||
2188C758000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
5BA4E7E000
|
stack
|
page read and write
|
||
698000
|
heap
|
page read and write
|
||
95A000
|
heap
|
page read and write
|
||
2268129F000
|
trusted library allocation
|
page read and write
|
||
3639AF7000
|
stack
|
page read and write
|
||
CF1000
|
stack
|
page read and write
|
||
204A91DC000
|
heap
|
page read and write
|
||
205BAA4B000
|
trusted library allocation
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
7FFAACA23000
|
trusted library allocation
|
page read and write
|
||
7FFAACB20000
|
trusted library allocation
|
page execute and read and write
|
||
204A91FC000
|
heap
|
page read and write
|
||
205BB2FD000
|
trusted library allocation
|
page read and write
|
||
2A55000
|
trusted library allocation
|
page read and write
|
||
7FFAACE70000
|
trusted library allocation
|
page read and write
|
||
7FFAACE90000
|
trusted library allocation
|
page read and write
|
||
2C9A000
|
trusted library allocation
|
page read and write
|
||
21889D2D000
|
heap
|
page read and write
|
||
333C000
|
stack
|
page read and write
|
||
204C3546000
|
heap
|
page read and write
|
||
1BFAD000
|
stack
|
page read and write
|
||
A54000
|
unkown
|
page readonly
|
||
3639C3E000
|
stack
|
page read and write
|
||
D22000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACE50000
|
trusted library allocation
|
page read and write
|
||
7FFAACA22000
|
trusted library allocation
|
page read and write
|
||
1BBF0000
|
heap
|
page execute and read and write
|
||
7FFAACA13000
|
trusted library allocation
|
page execute and read and write
|
||
1BEAE000
|
stack
|
page read and write
|
||
1175000
|
heap
|
page read and write
|
||
22680010000
|
trusted library section
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
363AA8E000
|
stack
|
page read and write
|
||
205BA9FD000
|
trusted library allocation
|
page read and write
|
||
7FFAACCE0000
|
trusted library allocation
|
page read and write
|
||
7FFAACAE6000
|
trusted library allocation
|
page execute and read and write
|
||
218A3C71000
|
heap
|
page read and write
|
||
2189BACF000
|
trusted library allocation
|
page read and write
|
||
7FFAACC40000
|
trusted library allocation
|
page read and write
|
||
204BAD90000
|
trusted library allocation
|
page read and write
|
||
1C6A0000
|
heap
|
page read and write
|
||
7FFAACD53000
|
trusted library allocation
|
page read and write
|
||
226FE5D6000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
7FFAACE10000
|
trusted library allocation
|
page read and write
|
||
2C30000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
1B5D0000
|
heap
|
page read and write
|
||
21889B20000
|
heap
|
page read and write
|
||
7FFAACA03000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACC30000
|
trusted library allocation
|
page read and write
|
||
7FFAACB20000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD20000
|
trusted library allocation
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
205D1AE2000
|
heap
|
page read and write
|
||
22698630000
|
heap
|
page read and write
|
||
2C46000
|
trusted library allocation
|
page read and write
|
||
2A7A000
|
trusted library allocation
|
page read and write
|
||
226800D0000
|
trusted library allocation
|
page read and write
|
||
2B0657E000
|
stack
|
page read and write
|
||
7FFAACA04000
|
trusted library allocation
|
page read and write
|
||
204C320A000
|
heap
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
7FFAACCD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page read and write
|
||
205B7971000
|
heap
|
page read and write
|
||
5A0337E000
|
stack
|
page read and write
|
||
205B798D000
|
heap
|
page read and write
|
||
1850000
|
heap
|
page read and write
|
||
5A035FA000
|
stack
|
page read and write
|
||
7FFAACC20000
|
trusted library allocation
|
page read and write
|
||
7FFAACD10000
|
trusted library allocation
|
page read and write
|
||
204A91E4000
|
heap
|
page read and write
|
||
2B064FA000
|
stack
|
page read and write
|
||
112E000
|
stack
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
21889CE8000
|
heap
|
page read and write
|
||
7FFAACE56000
|
trusted library allocation
|
page read and write
|
||
1406000
|
heap
|
page read and write
|
||
5A0448E000
|
stack
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
D99000
|
heap
|
page read and write
|
||
7FFAACCA0000
|
trusted library allocation
|
page read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
1855000
|
heap
|
page read and write
|
||
205B7938000
|
heap
|
page read and write
|
||
7FFAACA1D000
|
trusted library allocation
|
page execute and read and write
|
||
A00000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
205D1CC0000
|
trusted library allocation
|
page read and write
|
||
205B7BD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
3639E3F000
|
stack
|
page read and write
|
||
929000
|
heap
|
page read and write
|
||
205BAF38000
|
trusted library allocation
|
page read and write
|
||
7FFAACBBA000
|
trusted library allocation
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
205BB198000
|
trusted library allocation
|
page read and write
|
||
1B1CD000
|
stack
|
page read and write
|
||
7FFAACC08000
|
trusted library allocation
|
page read and write
|
||
363AB8C000
|
stack
|
page read and write
|
||
21889C00000
|
heap
|
page read and write
|
||
B1D000
|
heap
|
page read and write
|
||
7FFB0B7F0000
|
unkown
|
page read and write
|
||
7FFAACA8C000
|
trusted library allocation
|
page execute and read and write
|
||
1BA65000
|
stack
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
205BAE43000
|
trusted library allocation
|
page read and write
|
||
15FF000
|
stack
|
page read and write
|
||
1B4BE000
|
stack
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
205B9270000
|
trusted library allocation
|
page read and write
|
||
204ACBA5000
|
trusted library allocation
|
page read and write
|
||
226904DD000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
204C33B8000
|
heap
|
page read and write
|
||
204C32DD000
|
heap
|
page read and write
|
||
7FFAACC80000
|
trusted library allocation
|
page read and write
|
||
22681146000
|
trusted library allocation
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
205B7BF0000
|
trusted library allocation
|
page read and write
|
||
21889CA0000
|
trusted library allocation
|
page read and write
|
||
2188C75D000
|
trusted library allocation
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
2188C55C000
|
trusted library allocation
|
page read and write
|
||
21889D29000
|
heap
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
2188C565000
|
trusted library allocation
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page read and write
|
||
2188C8A0000
|
trusted library allocation
|
page read and write
|
||
1C29E000
|
stack
|
page read and write
|
||
22681FE1000
|
trusted library allocation
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page read and write
|
||
205BAF80000
|
trusted library allocation
|
page read and write
|
||
F65000
|
heap
|
page read and write
|
||
2240000
|
trusted library allocation
|
page read and write
|
||
1BA70000
|
heap
|
page read and write
|
||
2188B7B0000
|
heap
|
page execute and read and write
|
||
7FFAACA5C000
|
trusted library allocation
|
page execute and read and write
|
||
12F1000
|
stack
|
page read and write
|
||
BB5000
|
heap
|
page read and write
|
||
2189BADB000
|
trusted library allocation
|
page read and write
|
||
22682006000
|
trusted library allocation
|
page read and write
|
||
204BB06C000
|
trusted library allocation
|
page read and write
|
||
205C97CF000
|
trusted library allocation
|
page read and write
|
||
3C0C000
|
stack
|
page read and write
|
||
7FFAACA3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACE1C000
|
trusted library allocation
|
page read and write
|
||
7DF4C37E0000
|
trusted library allocation
|
page execute and read and write
|
||
1B3DF000
|
stack
|
page read and write
|
||
1B290000
|
heap
|
page execute and read and write
|
||
1B96E000
|
stack
|
page read and write
|
||
146C000
|
heap
|
page read and write
|
||
7FFAACE40000
|
trusted library allocation
|
page read and write
|
||
21889C60000
|
heap
|
page read and write
|
||
7FFAACE10000
|
trusted library allocation
|
page read and write
|
||
218A3E66000
|
heap
|
page read and write
|
||
1B66A000
|
stack
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
218A3F47000
|
heap
|
page read and write
|
||
205D1AF6000
|
heap
|
page read and write
|
||
2188D5BB000
|
trusted library allocation
|
page read and write
|
||
2269890A000
|
heap
|
page read and write
|
||
B9E000
|
stack
|
page read and write
|
||
3583000
|
heap
|
page read and write
|
||
3639BF9000
|
stack
|
page read and write
|
||
218A3E16000
|
heap
|
page read and write
|
||
7FFAACBE0000
|
trusted library allocation
|
page execute and read and write
|
||
204C344F000
|
heap
|
page read and write
|
||
204A93F5000
|
heap
|
page read and write
|
||
22681142000
|
trusted library allocation
|
page read and write
|
||
22680DEF000
|
trusted library allocation
|
page read and write
|
||
1BA9E000
|
stack
|
page read and write
|
||
CBE000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
218A3F68000
|
heap
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
204A91E8000
|
heap
|
page read and write
|
||
7FFAACC10000
|
trusted library allocation
|
page read and write
|
||
2188D5E0000
|
trusted library allocation
|
page read and write
|
||
22698A46000
|
heap
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
22698973000
|
heap
|
page read and write
|
||
988000
|
heap
|
page read and write
|
||
7FFAACC60000
|
trusted library allocation
|
page read and write
|
||
2188CAEB000
|
trusted library allocation
|
page read and write
|
||
AEE000
|
heap
|
page read and write
|
||
7FFAACAF6000
|
trusted library allocation
|
page execute and read and write
|
||
22698A3D000
|
heap
|
page read and write
|
||
7FFAACA40000
|
trusted library allocation
|
page read and write
|
||
2A63000
|
trusted library allocation
|
page read and write
|
||
7FFAACD43000
|
trusted library allocation
|
page read and write
|
||
2269061E000
|
trusted library allocation
|
page read and write
|
||
7FFAACD30000
|
trusted library allocation
|
page read and write
|
||
7FFAACC90000
|
trusted library allocation
|
page read and write
|
||
7DF49B390000
|
trusted library allocation
|
page execute and read and write
|
||
204A9310000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
3639DB8000
|
stack
|
page read and write
|
||
363997E000
|
stack
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
7FFAACC30000
|
trusted library allocation
|
page read and write
|
||
205BA81E000
|
trusted library allocation
|
page read and write
|
||
7FFAACCBF000
|
trusted library allocation
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
7FFAACC30000
|
trusted library allocation
|
page read and write
|
||
5A0440D000
|
stack
|
page read and write
|
||
7FFAACD69000
|
trusted library allocation
|
page read and write
|
||
7FFAACE70000
|
trusted library allocation
|
page read and write
|
||
131B1000
|
trusted library allocation
|
page read and write
|
||
7FFAACBCA000
|
trusted library allocation
|
page read and write
|
||
21889DE0000
|
trusted library allocation
|
page read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page read and write
|
||
204C31FD000
|
heap
|
page read and write
|
||
205C97E8000
|
trusted library allocation
|
page read and write
|
||
7FFB0B7F0000
|
unkown
|
page read and write
|
||
3639D3B000
|
stack
|
page read and write
|
||
204AC612000
|
trusted library allocation
|
page read and write
|
||
7FFAACCC0000
|
trusted library allocation
|
page read and write
|
||
205B79B9000
|
heap
|
page read and write
|
||
7FFAACC50000
|
trusted library allocation
|
page read and write
|
||
7FFAACE60000
|
trusted library allocation
|
page read and write
|
||
22690211000
|
trusted library allocation
|
page read and write
|
||
14C2000
|
heap
|
page read and write
|
||
204AB24E000
|
trusted library allocation
|
page read and write
|
||
204C33B0000
|
heap
|
page read and write
|
||
22681B30000
|
trusted library allocation
|
page read and write
|
||
205D186F000
|
heap
|
page read and write
|
||
226988C0000
|
heap
|
page read and write
|
||
218A3BC0000
|
heap
|
page execute and read and write
|
||
226989B5000
|
heap
|
page read and write
|
||
9E5000
|
heap
|
page read and write
|
||
7FFAACC40000
|
trusted library allocation
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
1B5BF000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page execute and read and write
|
||
204BB070000
|
trusted library allocation
|
page read and write
|
||
1BAD8000
|
heap
|
page read and write
|
||
204C340C000
|
heap
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
7FFAACACC000
|
trusted library allocation
|
page execute and read and write
|
||
1AD8D000
|
stack
|
page read and write
|
||
218A3C4F000
|
heap
|
page read and write
|
||
5A036B7000
|
stack
|
page read and write
|
||
105F000
|
stack
|
page read and write
|
||
7FFAACE60000
|
trusted library allocation
|
page read and write
|
||
EB2000
|
heap
|
page read and write
|
||
2594DEF000
|
stack
|
page read and write
|
||
205BA605000
|
trusted library allocation
|
page read and write
|
||
2911000
|
trusted library allocation
|
page read and write
|
||
226FE64B000
|
heap
|
page read and write
|
||
7FFAACBF4000
|
trusted library allocation
|
page read and write
|
||
5A0383F000
|
stack
|
page read and write
|
||
7FFAACB25000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACA20000
|
trusted library allocation
|
page read and write
|
||
7FFAACA13000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACAD0000
|
trusted library allocation
|
page read and write
|
||
21889D27000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
36395D3000
|
stack
|
page read and write
|
||
2268115B000
|
trusted library allocation
|
page read and write
|
||
7FFAACCE0000
|
trusted library allocation
|
page read and write
|
||
2B069FE000
|
stack
|
page read and write
|
||
205BADD1000
|
trusted library allocation
|
page read and write
|
||
2B074CC000
|
stack
|
page read and write
|
||
2188C232000
|
trusted library allocation
|
page read and write
|
||
7FFAACAD0000
|
trusted library allocation
|
page read and write
|
||
205BB296000
|
trusted library allocation
|
page read and write
|
||
1442000
|
heap
|
page read and write
|
||
2594D6F000
|
unkown
|
page read and write
|
||
986000
|
heap
|
page read and write
|
||
2188C989000
|
trusted library allocation
|
page read and write
|
||
2265000
|
heap
|
page read and write
|
||
226986A8000
|
heap
|
page read and write
|
||
12913000
|
trusted library allocation
|
page read and write
|
||
205B94D0000
|
heap
|
page execute and read and write
|
||
511E000
|
stack
|
page read and write
|
||
21889C80000
|
trusted library section
|
page read and write
|
||
7FFAACE40000
|
trusted library allocation
|
page execute and read and write
|
||
7DF490350000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACBB2000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
205BAD73000
|
trusted library allocation
|
page read and write
|
||
7FFAACB50000
|
trusted library allocation
|
page execute and read and write
|
||
204A91A0000
|
heap
|
page read and write
|
||
205B796D000
|
heap
|
page read and write
|
||
7FFAACE20000
|
trusted library allocation
|
page read and write
|
||
205BAC62000
|
trusted library allocation
|
page read and write
|
||
205B9F32000
|
trusted library allocation
|
page read and write
|
||
226904ED000
|
trusted library allocation
|
page read and write
|
||
22698675000
|
heap
|
page read and write
|
||
204C3263000
|
heap
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page execute and read and write
|
||
2B065F7000
|
stack
|
page read and write
|
||
1BEFE000
|
stack
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
7FFAACA00000
|
trusted library allocation
|
page read and write
|
||
5BA4B43000
|
stack
|
page read and write
|
||
58D000
|
stack
|
page read and write
|
||
2188C818000
|
trusted library allocation
|
page read and write
|
||
7FFAACAF6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACE70000
|
trusted library allocation
|
page read and write
|
||
205BA547000
|
trusted library allocation
|
page read and write
|
||
7FFAACBC2000
|
trusted library allocation
|
page read and write
|
||
226904DB000
|
trusted library allocation
|
page read and write
|
||
5A032FE000
|
stack
|
page read and write
|
||
226FE750000
|
heap
|
page read and write
|
||
7FFAACCC0000
|
trusted library allocation
|
page read and write
|
||
21889D21000
|
heap
|
page read and write
|
||
2B0618E000
|
stack
|
page read and write
|
||
7FFAACA10000
|
trusted library allocation
|
page read and write
|
||
7FFAACA00000
|
trusted library allocation
|
page read and write
|
||
FAF000
|
stack
|
page read and write
|
||
204ABF5A000
|
trusted library allocation
|
page read and write
|
||
2370000
|
trusted library allocation
|
page read and write
|
||
204ABAF0000
|
trusted library allocation
|
page read and write
|
||
D37000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACE80000
|
trusted library allocation
|
page read and write
|
||
7FFAACA2D000
|
trusted library allocation
|
page execute and read and write
|
||
205D1920000
|
heap
|
page execute and read and write
|
||
226FE550000
|
heap
|
page read and write
|
||
205BAD6E000
|
trusted library allocation
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
204C31B0000
|
heap
|
page read and write
|
||
7FFAACE30000
|
trusted library allocation
|
page execute and read and write
|
||
2A50000
|
trusted library allocation
|
page read and write
|
||
DAA000
|
heap
|
page read and write
|
||
7FFAACCF0000
|
trusted library allocation
|
page read and write
|
||
205D1B1C000
|
heap
|
page read and write
|
||
22680040000
|
trusted library allocation
|
page read and write
|
||
5BA553C000
|
stack
|
page read and write
|
||
204AC506000
|
trusted library allocation
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
204A91B2000
|
heap
|
page read and write
|
||
2B06777000
|
stack
|
page read and write
|
||
22698A11000
|
heap
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
7DF407A10000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACE00000
|
trusted library allocation
|
page read and write
|
||
2C2B000
|
trusted library allocation
|
page read and write
|
||
205C97CA000
|
trusted library allocation
|
page read and write
|
||
7FFB0B7D1000
|
unkown
|
page execute read
|
||
204ABDB2000
|
trusted library allocation
|
page read and write
|
||
7FFAACA14000
|
trusted library allocation
|
page read and write
|
||
7FFAACAD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACE10000
|
trusted library allocation
|
page read and write
|
||
DDA000
|
heap
|
page read and write
|
||
7FFAACBE4000
|
trusted library allocation
|
page read and write
|
||
5A0458C000
|
stack
|
page read and write
|
||
2A67000
|
trusted library allocation
|
page read and write
|
||
205BA372000
|
trusted library allocation
|
page read and write
|
||
2188CB1E000
|
trusted library allocation
|
page read and write
|
||
7FFAACC90000
|
trusted library allocation
|
page read and write
|
||
E66000
|
heap
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
218A3C9D000
|
heap
|
page read and write
|
||
205BA0ED000
|
trusted library allocation
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
7FFAACE00000
|
trusted library allocation
|
page read and write
|
||
205BB30F000
|
trusted library allocation
|
page read and write
|
||
7FFAACC00000
|
trusted library allocation
|
page read and write
|
||
7DF49B3A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page read and write
|
||
12911000
|
trusted library allocation
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page read and write
|
||
7FFAACA34000
|
trusted library allocation
|
page read and write
|
||
7FFAACA5C000
|
trusted library allocation
|
page execute and read and write
|
||
2188BA0A000
|
trusted library allocation
|
page read and write
|
||
205D1C01000
|
heap
|
page read and write
|
||
1B4F0000
|
heap
|
page execute and read and write
|
||
205BA8CD000
|
trusted library allocation
|
page read and write
|
||
205BAE25000
|
trusted library allocation
|
page read and write
|
||
C0F000
|
stack
|
page read and write
|
||
7FFAACC90000
|
trusted library allocation
|
page read and write
|
||
21889CD0000
|
heap
|
page readonly
|
||
7FFAACAD6000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
204C34B1000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
7FFAACA04000
|
trusted library allocation
|
page read and write
|
||
205D1ADE000
|
heap
|
page read and write
|
||
7FFAACC90000
|
trusted library allocation
|
page read and write
|
||
22698AE0000
|
trusted library allocation
|
page read and write
|
||
2B068FE000
|
stack
|
page read and write
|
||
205BA443000
|
trusted library allocation
|
page read and write
|
||
A6E000
|
stack
|
page read and write
|
||
7FFAACA3B000
|
trusted library allocation
|
page read and write
|
||
7FFAACCD0000
|
trusted library allocation
|
page read and write
|
||
218A3E5A000
|
heap
|
page read and write
|
||
1B13D000
|
stack
|
page read and write
|
||
7FFB0B7E6000
|
unkown
|
page readonly
|
||
7FFAACA30000
|
trusted library allocation
|
page read and write
|
||
205B79B4000
|
heap
|
page read and write
|
||
CBA000
|
heap
|
page read and write
|
||
7FFAACA3D000
|
trusted library allocation
|
page execute and read and write
|
||
204C3504000
|
heap
|
page read and write
|
||
974000
|
unkown
|
page readonly
|
||
5BA53BE000
|
stack
|
page read and write
|
||
7FFAACCF0000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
7FFAACA7C000
|
trusted library allocation
|
page execute and read and write
|
||
205BA966000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
5BA5077000
|
stack
|
page read and write
|
||
7FFAACD30000
|
trusted library allocation
|
page read and write
|
||
205D1BF5000
|
heap
|
page read and write
|
||
5BA6089000
|
stack
|
page read and write
|
||
205D1AA0000
|
heap
|
page read and write
|
||
22681963000
|
trusted library allocation
|
page read and write
|
||
7FFAACD74000
|
trusted library allocation
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
1B1D0000
|
heap
|
page execute and read and write
|
||
7FFAACA0D000
|
trusted library allocation
|
page execute and read and write
|
||
204C34AB000
|
heap
|
page read and write
|
||
7FFAACBF2000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page execute and read and write
|
||
900000
|
heap
|
page read and write
|
||
3639FBE000
|
stack
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
7FFAACC20000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
7FFAACCE0000
|
trusted library allocation
|
page read and write
|
||
343C000
|
stack
|
page read and write
|
||
205D1A60000
|
heap
|
page execute and read and write
|
||
205D1926000
|
heap
|
page execute and read and write
|
||
218A3E90000
|
heap
|
page read and write
|
||
205B9307000
|
heap
|
page read and write
|
||
7FFAACBB1000
|
trusted library allocation
|
page read and write
|
||
7FFB0B7F5000
|
unkown
|
page readonly
|
||
22698680000
|
heap
|
page read and write
|
||
1B2B0000
|
heap
|
page read and write
|
||
7FFAACD20000
|
trusted library allocation
|
page read and write
|
||
22680267000
|
trusted library allocation
|
page read and write
|
||
2B06083000
|
stack
|
page read and write
|
||
7FFAACCF0000
|
trusted library allocation
|
page read and write
|
||
2C38000
|
trusted library allocation
|
page read and write
|
||
22681A48000
|
trusted library allocation
|
page read and write
|
||
7FFAACA10000
|
trusted library allocation
|
page read and write
|
||
204A91A8000
|
heap
|
page read and write
|
||
7FFAACBF0000
|
trusted library allocation
|
page execute and read and write
|
||
204ABEDC000
|
trusted library allocation
|
page read and write
|
||
22680090000
|
trusted library allocation
|
page read and write
|
||
2188CBA5000
|
trusted library allocation
|
page read and write
|
||
2189B856000
|
trusted library allocation
|
page read and write
|
||
7FFB0B7F0000
|
unkown
|
page read and write
|
||
7FFAACBE4000
|
trusted library allocation
|
page read and write
|
||
766000
|
stack
|
page read and write
|
||
2A80000
|
heap
|
page execute and read and write
|
||
218A3F10000
|
heap
|
page read and write
|
||
7FFAACE66000
|
trusted library allocation
|
page read and write
|
||
226981E5000
|
heap
|
page read and write
|
||
36399FA000
|
stack
|
page read and write
|
||
2B076CE000
|
stack
|
page read and write
|
||
7FFAACA40000
|
trusted library allocation
|
page read and write
|
||
7FFAACC80000
|
trusted library allocation
|
page read and write
|
||
226813BA000
|
trusted library allocation
|
page read and write
|
||
1AD7D000
|
stack
|
page read and write
|
||
7FFAACC04000
|
trusted library allocation
|
page read and write
|
||
205BA59F000
|
trusted library allocation
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
218A3E62000
|
heap
|
page read and write
|
||
204BADF3000
|
trusted library allocation
|
page read and write
|
||
12BBE000
|
trusted library allocation
|
page read and write
|
||
2B06A7C000
|
stack
|
page read and write
|
||
205C9855000
|
trusted library allocation
|
page read and write
|
||
1C3AA000
|
stack
|
page read and write
|
||
7FFAACBF0000
|
trusted library allocation
|
page execute and read and write
|
||
3A01000
|
trusted library allocation
|
page read and write
|
||
226FE58F000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
205B92F5000
|
heap
|
page read and write
|
||
143F000
|
heap
|
page read and write
|
||
205D1BF8000
|
heap
|
page read and write
|
||
22698890000
|
heap
|
page execute and read and write
|
||
2B0610E000
|
stack
|
page read and write
|
||
5BA52B9000
|
stack
|
page read and write
|
||
204AAE07000
|
trusted library allocation
|
page read and write
|
||
205B7BC0000
|
trusted library section
|
page read and write
|
||
2A5B000
|
trusted library allocation
|
page read and write
|
||
7FFAACA34000
|
trusted library allocation
|
page read and write
|
||
218A3F9F000
|
heap
|
page read and write
|
||
7DF490360000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACCC0000
|
trusted library allocation
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
48C000
|
stack
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
14BF000
|
heap
|
page read and write
|
||
A54000
|
unkown
|
page readonly
|
||
218A3F4D000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
7FFAACC2F000
|
trusted library allocation
|
page read and write
|
||
22680409000
|
trusted library allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
7FFAACA2D000
|
trusted library allocation
|
page execute and read and write
|
||
205BB301000
|
trusted library allocation
|
page read and write
|
||
1C0AD000
|
stack
|
page read and write
|
||
7FFAACBA2000
|
trusted library allocation
|
page read and write
|
||
205B7A2C000
|
heap
|
page read and write
|
||
226987B6000
|
heap
|
page read and write
|
||
204A93F0000
|
heap
|
page read and write
|
||
205B7975000
|
heap
|
page read and write
|
||
205BAC15000
|
trusted library allocation
|
page read and write
|
||
7FFAACABC000
|
trusted library allocation
|
page execute and read and write
|
||
4EDE000
|
stack
|
page read and write
|
||
12C31000
|
trusted library allocation
|
page read and write
|
||
17A9C770000
|
heap
|
page read and write
|
||
204ACB85000
|
trusted library allocation
|
page read and write
|
||
291F000
|
trusted library allocation
|
page read and write
|
||
680000
|
trusted library allocation
|
page read and write
|
||
1B76E000
|
stack
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
226FE410000
|
heap
|
page read and write
|
||
204BB072000
|
trusted library allocation
|
page read and write
|
||
204BB0BF000
|
trusted library allocation
|
page read and write
|
||
204C34EF000
|
heap
|
page read and write
|
||
204C33BC000
|
heap
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page read and write
|
||
7FFAACA11000
|
trusted library allocation
|
page read and write
|
||
204A9090000
|
heap
|
page read and write
|
||
7FFAACBA2000
|
trusted library allocation
|
page read and write
|
||
7FFAACC40000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
heap
|
page read and write
|
||
7FFAACE70000
|
trusted library allocation
|
page read and write
|
||
226FE595000
|
heap
|
page read and write
|
||
205BAE2C000
|
trusted library allocation
|
page read and write
|
||
7FFAACC60000
|
trusted library allocation
|
page read and write
|
||
27EE000
|
stack
|
page read and write
|
||
226801B0000
|
heap
|
page execute and read and write
|
||
1B110000
|
heap
|
page read and write
|
||
226FE58C000
|
heap
|
page read and write
|
||
204C33F2000
|
heap
|
page read and write
|
||
7FFAACC20000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
204AC5EC000
|
trusted library allocation
|
page read and write
|
||
218A3C03000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
205BA450000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
heap
|
page read and write
|
||
7FFB0B7F0000
|
unkown
|
page read and write
|
||
204BADB1000
|
trusted library allocation
|
page read and write
|
||
205B94E1000
|
trusted library allocation
|
page read and write
|
||
7FFAACE2C000
|
trusted library allocation
|
page read and write
|
||
205C9511000
|
trusted library allocation
|
page read and write
|
||
CF2000
|
trusted library allocation
|
page execute and read and write
|
||
B8C000
|
heap
|
page read and write
|
||
218A3E52000
|
heap
|
page read and write
|
||
7DF4C3800000
|
trusted library allocation
|
page execute and read and write
|
||
BDC000
|
heap
|
page read and write
|
||
2188C761000
|
trusted library allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
7FFAACCB0000
|
trusted library allocation
|
page read and write
|
||
7FFAACCA0000
|
trusted library allocation
|
page read and write
|
||
205C98BE000
|
trusted library allocation
|
page read and write
|
||
5BA4BCE000
|
stack
|
page read and write
|
||
226FE685000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
218A3CC8000
|
heap
|
page read and write
|
||
12C38000
|
trusted library allocation
|
page read and write
|
||
5A034F7000
|
stack
|
page read and write
|
||
1ABE0000
|
trusted library allocation
|
page read and write
|
||
226FE755000
|
heap
|
page read and write
|
||
205B78C0000
|
heap
|
page read and write
|
||
7FFAACD72000
|
trusted library allocation
|
page read and write
|
||
7FFAACDF0000
|
trusted library allocation
|
page read and write
|
||
7FFAACB20000
|
trusted library allocation
|
page execute and read and write
|
||
21889C90000
|
trusted library section
|
page read and write
|
||
218A3FC3000
|
heap
|
page read and write
|
||
2C31000
|
trusted library allocation
|
page read and write
|
||
7EF30000
|
trusted library allocation
|
page execute and read and write
|
||
21889ED0000
|
heap
|
page read and write
|
||
204AAD20000
|
heap
|
page read and write
|
||
7FFAACD6A000
|
trusted library allocation
|
page read and write
|
||
226988DD000
|
heap
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
205BA7EB000
|
trusted library allocation
|
page read and write
|
||
D2A000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACA03000
|
trusted library allocation
|
page execute and read and write
|
||
363A03B000
|
stack
|
page read and write
|
||
204A9350000
|
trusted library allocation
|
page read and write
|
||
4C5E000
|
stack
|
page read and write
|
||
2188D06D000
|
trusted library allocation
|
page read and write
|
||
127F8000
|
trusted library allocation
|
page read and write
|
||
226986D1000
|
heap
|
page read and write
|
||
5A033F9000
|
stack
|
page read and write
|
||
363AB09000
|
stack
|
page read and write
|
||
D02000
|
trusted library allocation
|
page execute and read and write
|
||
2B061CF000
|
stack
|
page read and write
|
||
3639B7D000
|
stack
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page read and write
|
||
7FFAACA1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACA6C000
|
trusted library allocation
|
page execute and read and write
|
||
1B2DF000
|
stack
|
page read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
7FFAACA3B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
7FFAACBE8000
|
trusted library allocation
|
page read and write
|
||
B06000
|
heap
|
page read and write
|
||
205BB2DD000
|
trusted library allocation
|
page read and write
|
||
7FFAACC80000
|
trusted library allocation
|
page read and write
|
||
205D189C000
|
heap
|
page read and write
|
||
204C32B0000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
7FFAACBE8000
|
trusted library allocation
|
page read and write
|
||
1B6DE000
|
stack
|
page read and write
|
||
204C33C8000
|
heap
|
page read and write
|
||
7FFAACAB0000
|
trusted library allocation
|
page read and write
|
||
2188C74C000
|
trusted library allocation
|
page read and write
|
||
7FFAACA24000
|
trusted library allocation
|
page read and write
|
||
205D1BF1000
|
heap
|
page read and write
|
||
205BAB7E000
|
trusted library allocation
|
page read and write
|
||
3639A7E000
|
stack
|
page read and write
|
||
1B560000
|
heap
|
page read and write
|
||
205B79B6000
|
heap
|
page read and write
|
||
204ACB60000
|
trusted library allocation
|
page read and write
|
||
7FFAACC00000
|
trusted library allocation
|
page execute and read and write
|
||
2C25000
|
trusted library allocation
|
page read and write
|
||
F95000
|
heap
|
page read and write
|
||
5A0393E000
|
stack
|
page read and write
|
||
2C4B000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
204AAD75000
|
heap
|
page read and write
|
||
7FFAACD00000
|
trusted library allocation
|
page read and write
|
||
204C31C3000
|
heap
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page read and write
|
||
22680000000
|
trusted library section
|
page read and write
|
||
226806AD000
|
trusted library allocation
|
page read and write
|
||
7FFAACA20000
|
trusted library allocation
|
page read and write
|
||
204C33CC000
|
heap
|
page read and write
|
||
7FFAACD79000
|
trusted library allocation
|
page read and write
|
||
17A9C7A5000
|
heap
|
page read and write
|
||
226FE5D9000
|
heap
|
page read and write
|
||
27FF000
|
trusted library allocation
|
page read and write
|
||
7FFAACA34000
|
trusted library allocation
|
page read and write
|
||
2188B867000
|
trusted library allocation
|
page read and write
|
||
205BADA2000
|
trusted library allocation
|
page read and write
|
||
2A3A000
|
trusted library allocation
|
page read and write
|
||
7FFAACC40000
|
trusted library allocation
|
page read and write
|
||
2B0744E000
|
stack
|
page read and write
|
||
204A9340000
|
heap
|
page readonly
|
||
7FFAACDA0000
|
trusted library allocation
|
page read and write
|
||
205C94E1000
|
trusted library allocation
|
page read and write
|
||
7FFAACE40000
|
trusted library allocation
|
page read and write
|
||
205B92F0000
|
heap
|
page read and write
|
||
7FFAACD00000
|
trusted library allocation
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
22681487000
|
trusted library allocation
|
page read and write
|
||
205BACCE000
|
trusted library allocation
|
page read and write
|
||
7FFAACD59000
|
trusted library allocation
|
page read and write
|
||
205BB2D3000
|
trusted library allocation
|
page read and write
|
||
2C84000
|
trusted library allocation
|
page read and write
|
||
7FFAACA03000
|
trusted library allocation
|
page execute and read and write
|
||
949000
|
heap
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
7FFAACA7C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACAE0000
|
trusted library allocation
|
page execute and read and write
|
||
2188CA89000
|
trusted library allocation
|
page read and write
|
||
22698702000
|
heap
|
page read and write
|
||
DAD000
|
heap
|
page read and write
|
||
4E9D000
|
stack
|
page read and write
|
||
218A3E5E000
|
heap
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
205BAD5F000
|
trusted library allocation
|
page read and write
|
||
12C33000
|
trusted library allocation
|
page read and write
|
||
7FFAACE20000
|
trusted library allocation
|
page read and write
|
||
7FFAACBF8000
|
trusted library allocation
|
page read and write
|
||
7FFAACA30000
|
trusted library allocation
|
page read and write
|
||
205BAFD0000
|
trusted library allocation
|
page read and write
|
||
2B066F9000
|
stack
|
page read and write
|
||
226986F3000
|
heap
|
page read and write
|
||
7FFAACBB2000
|
trusted library allocation
|
page read and write
|
||
7FFAACA50000
|
trusted library allocation
|
page read and write
|
||
22698A32000
|
heap
|
page read and write
|
||
7FFAACC60000
|
trusted library allocation
|
page read and write
|
||
7FFAACE80000
|
trusted library allocation
|
page read and write
|
||
205BAD44000
|
trusted library allocation
|
page read and write
|
||
7FFAACAF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD20000
|
trusted library allocation
|
page read and write
|
||
2188D046000
|
trusted library allocation
|
page read and write
|
||
204C33B4000
|
heap
|
page read and write
|
||
205BB01A000
|
trusted library allocation
|
page read and write
|
||
22681A6F000
|
trusted library allocation
|
page read and write
|
||
1BCFE000
|
stack
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FFAACC60000
|
trusted library allocation
|
page read and write
|
||
2594CE9000
|
stack
|
page read and write
|
||
7FFAACBE2000
|
trusted library allocation
|
page read and write
|
||
7FFAACD33000
|
trusted library allocation
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
1CAAB000
|
stack
|
page read and write
|
||
7FFAACDB0000
|
trusted library allocation
|
page read and write
|
||
7FFAACC10000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
7FFAACC30000
|
trusted library allocation
|
page read and write
|
||
22698770000
|
heap
|
page execute and read and write
|
||
2260000
|
heap
|
page read and write
|
||
7FFAACAE6000
|
trusted library allocation
|
page execute and read and write
|
||
1CBAA000
|
stack
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
D11000
|
stack
|
page read and write
|
||
26BE000
|
stack
|
page read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACAC6000
|
trusted library allocation
|
page read and write
|
||
204C3538000
|
heap
|
page read and write
|
||
2A62000
|
trusted library allocation
|
page read and write
|
||
7FFAACA0D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD40000
|
trusted library allocation
|
page read and write
|
||
22682001000
|
trusted library allocation
|
page read and write
|
||
7FFAACACC000
|
trusted library allocation
|
page execute and read and write
|
||
2700000
|
heap
|
page read and write
|
||
204AC027000
|
trusted library allocation
|
page read and write
|
||
205BA447000
|
trusted library allocation
|
page read and write
|
||
7FFAACB30000
|
trusted library allocation
|
page execute and read and write
|
||
204C31A6000
|
heap
|
page execute and read and write
|
||
7FFAACCD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACA20000
|
trusted library allocation
|
page read and write
|
||
21889C20000
|
heap
|
page read and write
|
||
2C34000
|
trusted library allocation
|
page read and write
|
||
226801D0000
|
heap
|
page read and write
|
||
2A3C000
|
trusted library allocation
|
page read and write
|
||
7FFAACA1B000
|
trusted library allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
205D1C20000
|
heap
|
page read and write
|
||
204AC088000
|
trusted library allocation
|
page read and write
|
||
226FE59B000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
204ACBAA000
|
trusted library allocation
|
page read and write
|
||
7FFAACA1B000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD64000
|
trusted library allocation
|
page read and write
|
||
205BA512000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page execute and read and write
|
||
205BA8A5000
|
trusted library allocation
|
page read and write
|
||
7FFAACD6C000
|
trusted library allocation
|
page read and write
|
||
2188D12E000
|
trusted library allocation
|
page read and write
|
||
205B7930000
|
heap
|
page read and write
|
||
226901E1000
|
trusted library allocation
|
page read and write
|
||
7FFAACD10000
|
trusted library allocation
|
page read and write
|
||
21889D1E000
|
heap
|
page read and write
|
||
5BA600E000
|
stack
|
page read and write
|
||
131B8000
|
trusted library allocation
|
page read and write
|
||
7FFAACCA0000
|
trusted library allocation
|
page read and write
|
||
2A30000
|
trusted library allocation
|
page read and write
|
||
7FFAACE30000
|
trusted library allocation
|
page read and write
|
||
205BABCD000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FFAACA12000
|
trusted library allocation
|
page read and write
|
||
205B9566000
|
trusted library allocation
|
page read and write
|
||
17A9C7B0000
|
heap
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
205D1820000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
5A0357D000
|
stack
|
page read and write
|
||
218A4020000
|
trusted library allocation
|
page read and write
|
||
5A0327E000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page execute and read and write
|
||
7FFAACC10000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
7FFAACD10000
|
trusted library allocation
|
page read and write
|
||
5BA5F0E000
|
stack
|
page read and write
|
||
205D1879000
|
heap
|
page read and write
|
||
205D1AEA000
|
heap
|
page read and write
|
||
205B7990000
|
heap
|
page read and write
|
||
17A9C7D8000
|
heap
|
page read and write
|
||
7FFAACD78000
|
trusted library allocation
|
page read and write
|
||
7FFAACB06000
|
trusted library allocation
|
page execute and read and write
|
||
A60000
|
heap
|
page read and write
|
||
2188C3ED000
|
trusted library allocation
|
page read and write
|
||
204C3130000
|
heap
|
page execute and read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page read and write
|
||
205BA44B000
|
trusted library allocation
|
page read and write
|
||
204BB08A000
|
trusted library allocation
|
page read and write
|
||
226FE4F0000
|
heap
|
page read and write
|
||
205D1AF2000
|
heap
|
page read and write
|
||
2268114A000
|
trusted library allocation
|
page read and write
|
||
21889E40000
|
trusted library allocation
|
page read and write
|
||
2B20000
|
heap
|
page execute and read and write
|
||
2B0697E000
|
stack
|
page read and write
|
||
7FFAACE40000
|
trusted library allocation
|
page read and write
|
||
21889E00000
|
heap
|
page read and write
|
||
204C347B000
|
heap
|
page read and write
|
||
2B06878000
|
stack
|
page read and write
|
||
7FFAACA2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACBE0000
|
trusted library allocation
|
page execute and read and write
|
||
16A5000
|
heap
|
page read and write
|
||
131B3000
|
trusted library allocation
|
page read and write
|
||
226FE510000
|
heap
|
page read and write
|
||
205BAAE4000
|
trusted library allocation
|
page read and write
|
||
1BA76000
|
heap
|
page read and write
|
||
3D0D000
|
stack
|
page read and write
|
||
204AAFAA000
|
trusted library allocation
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
204BAD81000
|
trusted library allocation
|
page read and write
|
||
7FFAACB16000
|
trusted library allocation
|
page execute and read and write
|
||
22680F5D000
|
trusted library allocation
|
page read and write
|
||
205B7900000
|
heap
|
page read and write
|
||
2188BCAD000
|
trusted library allocation
|
page read and write
|
||
2189BAED000
|
trusted library allocation
|
page read and write
|
||
205BB2BC000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
7FFB0B7D0000
|
unkown
|
page readonly
|
||
205BA0E3000
|
trusted library allocation
|
page read and write
|
||
7FFAACA1D000
|
trusted library allocation
|
page execute and read and write
|
||
8F1000
|
stack
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
205B9230000
|
heap
|
page read and write
|
||
226815A5000
|
trusted library allocation
|
page read and write
|
||
10E5000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
2B0667D000
|
stack
|
page read and write
|
||
1BB15000
|
heap
|
page read and write
|
||
1BDAE000
|
stack
|
page read and write
|
||
7FFAACD40000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
116E000
|
stack
|
page read and write
|
||
7FFAACAB6000
|
trusted library allocation
|
page read and write
|
||
7FFAACADC000
|
trusted library allocation
|
page execute and read and write
|
||
22681153000
|
trusted library allocation
|
page read and write
|
||
2B0754D000
|
stack
|
page read and write
|
||
205C9501000
|
trusted library allocation
|
page read and write
|
||
2B0647E000
|
stack
|
page read and write
|
||
21889D66000
|
heap
|
page read and write
|
||
7FFAACD30000
|
trusted library allocation
|
page read and write
|
||
1BB7E000
|
stack
|
page read and write
|
||
205BA6BB000
|
trusted library allocation
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
204AC6D4000
|
trusted library allocation
|
page read and write
|
||
2C13000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
7FFAACDF0000
|
trusted library allocation
|
page read and write
|
||
D70000
|
trusted library allocation
|
page read and write
|
||
142C000
|
heap
|
page read and write
|
||
218A3EE0000
|
heap
|
page read and write
|
||
2B067FA000
|
stack
|
page read and write
|
||
5A04509000
|
stack
|
page read and write
|
There are 1282 hidden memdumps, click here to show them.