Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
jcMcDQ11pZ.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\AdobeIPC
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\AdobeIPC.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Guna.UI2.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Stellar Generator.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\jcMcDQ11pZ.exe.log
|
CSV text
|
dropped
|
||
C:\ProgramData\Stellar Generator.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Stellar Generator.pdb
|
MSVC program database ver 7.00, 512*71 bytes
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AdobeIPC.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AdobeIPC.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
Generic INItialization configuration [WIN]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2psyogwv.k3s.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3xothryz.ijd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4ogmuane.uyt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5uz3ohrq.kz4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gparxsgw.ehe.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_htybpzt4.kpx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ivhoya4t.z0t.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k0bwt0ye.50r.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ldkyqj5g.mfs.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oknxujmk.cja.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rwfw5dkb.v3d.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sgt1coh3.510.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tzsuz335.ltx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vqn1ceza.owy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wziq02vf.kdq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xrxerhss.qec.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AdobeIPC.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Oct 13 16:07:58
2024, mtime=Sun Oct 13 16:07:58 2024, atime=Sun Oct 13 16:07:58 2024, length=67072, window=hide
|
dropped
|
There are 19 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\jcMcDQ11pZ.exe
|
"C:\Users\user\Desktop\jcMcDQ11pZ.exe"
|
||
C:\ProgramData\Stellar Generator.exe
|
"C:\ProgramData\Stellar Generator.exe"
|
||
C:\ProgramData\AdobeIPC.exe
|
"C:\ProgramData\AdobeIPC.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\AdobeIPC.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'AdobeIPC.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\AdobeIPC'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'AdobeIPC'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "AdobeIPC" /tr "C:\ProgramData\AdobeIPC"
|
||
C:\ProgramData\AdobeIPC
|
C:\ProgramData\AdobeIPC
|
||
C:\ProgramData\AdobeIPC.exe
|
"C:\ProgramData\AdobeIPC.exe"
|
||
C:\ProgramData\AdobeIPC.exe
|
"C:\ProgramData\AdobeIPC.exe"
|
||
C:\ProgramData\AdobeIPC
|
C:\ProgramData\AdobeIPC
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://pastebin.com/raw/LsuynkUz
|
172.67.19.24
|
||
https://pastebin.com
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
https://pastebin.com/raw/LSuWhARfChttps://pastebin.com/raw/j4XYdsdHChttps://paste.fo/raw/9fc49c53951
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
https://gunaframework.com/api/licensing.phpLR
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
https://gunaui.com/api/licensing.phpLR
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://www.microsoft.Q
|
unknown
|
||
https://gunaui.com/pricingLR
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
||
https://gunaui.com/pricing
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-user.html
|
unknown
|
||
https://gunaui.com/LR
|
unknown
|
||
https://gunaframework.com/api/licensing.php
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
https://gunaui.com/api/licensing.php
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://gunaui.com/
|
unknown
|
There are 39 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pastebin.com
|
172.67.19.24
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.19.24
|
pastebin.com
|
United States
|
||
193.161.193.99
|
unknown
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
AdobeIPC
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AdobeIPC_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2A01000
|
trusted library allocation
|
page read and write
|
||
AF2000
|
unkown
|
page readonly
|
||
1E2A12EF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7C6000
|
trusted library allocation
|
page execute and read and write
|
||
D0991FD000
|
stack
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1B37F000
|
stack
|
page read and write
|
||
7FFD9B70C000
|
trusted library allocation
|
page execute and read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
13B58FE000
|
stack
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
27F7B7DB000
|
heap
|
page read and write
|
||
7FFD9B6ED000
|
trusted library allocation
|
page execute and read and write
|
||
160000
|
heap
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
7DF4ACA30000
|
trusted library allocation
|
page execute and read and write
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
BFAE479000
|
stack
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
20C75C5F000
|
heap
|
page read and write
|
||
D09A1CC000
|
stack
|
page read and write
|
||
7FFD9B6C4000
|
trusted library allocation
|
page read and write
|
||
299A5FA0000
|
trusted library allocation
|
page read and write
|
||
13B587F000
|
stack
|
page read and write
|
||
20C75F4C000
|
heap
|
page read and write
|
||
7FFD9B8C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
AA0333E000
|
stack
|
page read and write
|
||
20C004CD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6FB000
|
trusted library allocation
|
page execute and read and write
|
||
1AD10000
|
trusted library allocation
|
page read and write
|
||
A16000
|
heap
|
page read and write
|
||
7FFD9B700000
|
trusted library allocation
|
page read and write
|
||
299BCBBE000
|
heap
|
page read and write
|
||
954000
|
unkown
|
page readonly
|
||
F30000
|
heap
|
page read and write
|
||
1E2A12F1000
|
trusted library allocation
|
page read and write
|
||
20C01097000
|
trusted library allocation
|
page read and write
|
||
1E2A900E000
|
heap
|
page read and write
|
||
2ACC000
|
trusted library allocation
|
page read and write
|
||
7DF4552D0000
|
trusted library allocation
|
page execute and read and write
|
||
133F000
|
stack
|
page read and write
|
||
1E2A9450000
|
heap
|
page read and write
|
||
1B3B0000
|
heap
|
page execute and read and write
|
||
299BCD70000
|
heap
|
page read and write
|
||
27F7B7FC000
|
heap
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
D098FFE000
|
stack
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
FDB000
|
heap
|
page read and write
|
||
12D78000
|
trusted library allocation
|
page read and write
|
||
2351000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
1E292097000
|
trusted library allocation
|
page read and write
|
||
20C75BF4000
|
heap
|
page read and write
|
||
AA02CFD000
|
stack
|
page read and write
|
||
562000
|
heap
|
page read and write
|
||
CDA000
|
heap
|
page read and write
|
||
1E2A96CC000
|
heap
|
page read and write
|
||
2CEE000
|
trusted library allocation
|
page read and write
|
||
13B5C37000
|
stack
|
page read and write
|
||
7FFD9BA04000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6ED000
|
trusted library allocation
|
page execute and read and write
|
||
27F647C2000
|
trusted library allocation
|
page read and write
|
||
27F7B8F2000
|
heap
|
page read and write
|
||
27F63F1A000
|
trusted library allocation
|
page read and write
|
||
14C5000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
1CA56000
|
heap
|
page read and write
|
||
2CDE000
|
trusted library allocation
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page read and write
|
||
299BCF2E000
|
heap
|
page read and write
|
||
27F73003000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78C000
|
trusted library allocation
|
page execute and read and write
|
||
51D3000
|
heap
|
page execute and read and write
|
||
D098B93000
|
stack
|
page read and write
|
||
7FFD9B6B4000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
20C00F60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
12CD8000
|
trusted library allocation
|
page read and write
|
||
299A56B2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1B25D000
|
stack
|
page read and write
|
||
1E2A1071000
|
trusted library allocation
|
page read and write
|
||
3C66000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
27F61442000
|
heap
|
page read and write
|
||
1E2A97F4000
|
heap
|
page read and write
|
||
1E2914CF000
|
trusted library allocation
|
page read and write
|
||
27F73283000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
12D71000
|
trusted library allocation
|
page read and write
|
||
1C5FE000
|
stack
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
13B5F3B000
|
stack
|
page read and write
|
||
20C73C34000
|
heap
|
page read and write
|
||
7FFD9B6E4000
|
trusted library allocation
|
page read and write
|
||
1B7AE000
|
stack
|
page read and write
|
||
7FFD9BB36000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA39000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA03000
|
trusted library allocation
|
page read and write
|
||
1C97CF19000
|
heap
|
page read and write
|
||
3C19000
|
trusted library allocation
|
page read and write
|
||
1056000
|
heap
|
page read and write
|
||
D09967C000
|
stack
|
page read and write
|
||
1E2A949B000
|
heap
|
page read and write
|
||
2CDF000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
heap
|
page execute and read and write
|
||
1E2A1021000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
10FA000
|
heap
|
page read and write
|
||
7FFD9B72C000
|
trusted library allocation
|
page execute and read and write
|
||
20C73E80000
|
heap
|
page read and write
|
||
1BCBE000
|
stack
|
page read and write
|
||
BFAF48E000
|
stack
|
page read and write
|
||
92D000
|
unkown
|
page readonly
|
||
299A2C80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB06000
|
trusted library allocation
|
page read and write
|
||
1E291086000
|
trusted library allocation
|
page read and write
|
||
299B4741000
|
trusted library allocation
|
page read and write
|
||
57EC000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
299A4700000
|
heap
|
page read and write
|
||
27F63F05000
|
trusted library allocation
|
page read and write
|
||
EB2000
|
heap
|
page read and write
|
||
577E000
|
stack
|
page read and write
|
||
7FFD9B700000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
7FF44B690000
|
trusted library allocation
|
page execute and read and write
|
||
1E292DDE000
|
trusted library allocation
|
page read and write
|
||
27F7B82C000
|
heap
|
page read and write
|
||
27F7B3B8000
|
heap
|
page read and write
|
||
27F61455000
|
heap
|
page read and write
|
||
1B61E000
|
stack
|
page read and write
|
||
7FFD9B6D4000
|
trusted library allocation
|
page read and write
|
||
299A2C60000
|
trusted library allocation
|
page read and write
|
||
27F63B9F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6BD000
|
trusted library allocation
|
page execute and read and write
|
||
2CD1000
|
trusted library allocation
|
page read and write
|
||
1E291C0F000
|
trusted library allocation
|
page read and write
|
||
20C01E29000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAEC000
|
trusted library allocation
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
7A50000
|
heap
|
page read and write
|
||
920000
|
unkown
|
page readonly
|
||
7FFD9B9BF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
5340000
|
heap
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
27F6471C000
|
trusted library allocation
|
page read and write
|
||
1E2A9827000
|
heap
|
page read and write
|
||
1BA3F000
|
stack
|
page read and write
|
||
3C53000
|
trusted library allocation
|
page read and write
|
||
1E2A9576000
|
heap
|
page execute and read and write
|
||
27F6148F000
|
heap
|
page read and write
|
||
FF5000
|
heap
|
page read and write
|
||
1E292891000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E2000
|
trusted library allocation
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
1E2921E0000
|
trusted library allocation
|
page read and write
|
||
D0990FE000
|
stack
|
page read and write
|
||
20C75BB2000
|
heap
|
page read and write
|
||
7FFD9B891000
|
trusted library allocation
|
page read and write
|
||
1E2A94A5000
|
heap
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
AA02FFE000
|
stack
|
page read and write
|
||
7FFD9B9E3000
|
trusted library allocation
|
page read and write
|
||
105B000
|
trusted library allocation
|
page execute and read and write
|
||
29FE000
|
stack
|
page read and write
|
||
104A000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAEE000
|
trusted library allocation
|
page read and write
|
||
BFAE639000
|
stack
|
page read and write
|
||
7FFD9B79C000
|
trusted library allocation
|
page execute and read and write
|
||
1E291C05000
|
trusted library allocation
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
1E28F6A0000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
EF1000
|
stack
|
page read and write
|
||
27F64299000
|
trusted library allocation
|
page read and write
|
||
1B03E000
|
stack
|
page read and write
|
||
20C75F3E000
|
heap
|
page read and write
|
||
20C75C17000
|
heap
|
page read and write
|
||
6150000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
13B5979000
|
stack
|
page read and write
|
||
20C00D1B000
|
trusted library allocation
|
page read and write
|
||
20C75EC8000
|
heap
|
page read and write
|
||
7923000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
299A6061000
|
trusted library allocation
|
page read and write
|
||
1B91E000
|
stack
|
page read and write
|
||
299A5719000
|
trusted library allocation
|
page read and write
|
||
20C102F0000
|
trusted library allocation
|
page read and write
|
||
1E292E28000
|
trusted library allocation
|
page read and write
|
||
4F1000
|
stack
|
page read and write
|
||
F99000
|
heap
|
page read and write
|
||
1E291DC0000
|
trusted library allocation
|
page read and write
|
||
299BCF37000
|
heap
|
page read and write
|
||
7FFD9B72C000
|
trusted library allocation
|
page execute and read and write
|
||
27F7B859000
|
heap
|
page read and write
|
||
AA0323A000
|
stack
|
page read and write
|
||
27F7B4F4000
|
heap
|
page read and write
|
||
1E28F610000
|
heap
|
page readonly
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
F5E000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
1E28F650000
|
trusted library allocation
|
page read and write
|
||
12D73000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
20C102F2000
|
trusted library allocation
|
page read and write
|
||
27F6416B000
|
trusted library allocation
|
page read and write
|
||
20C73D10000
|
heap
|
page read and write
|
||
20C73E40000
|
trusted library allocation
|
page read and write
|
||
1E2920C3000
|
trusted library allocation
|
page read and write
|
||
D09A0CE000
|
stack
|
page read and write
|
||
1E292128000
|
trusted library allocation
|
page read and write
|
||
299A598B000
|
trusted library allocation
|
page read and write
|
||
1C24E000
|
stack
|
page read and write
|
||
1E28F390000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page execute and read and write
|
||
1E28F745000
|
heap
|
page read and write
|
||
1E291A54000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
BFAE73E000
|
stack
|
page read and write
|
||
1E2A9680000
|
heap
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
1E28F430000
|
heap
|
page read and write
|
||
7FFD9BA34000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
20C73C3E000
|
heap
|
page read and write
|
||
1E28F48C000
|
heap
|
page read and write
|
||
1B2FE000
|
stack
|
page read and write
|
||
27F7B900000
|
heap
|
page read and write
|
||
13B690E000
|
stack
|
page read and write
|
||
1E28F370000
|
heap
|
page read and write
|
||
7FFD9B6E1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C2000
|
trusted library allocation
|
page read and write
|
||
20C75F13000
|
heap
|
page read and write
|
||
7FFD9B796000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D3000
|
trusted library allocation
|
page execute and read and write
|
||
27F631B9000
|
trusted library allocation
|
page read and write
|
||
27F7B320000
|
heap
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
1E2923C9000
|
trusted library allocation
|
page read and write
|
||
13B55DF000
|
stack
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
27F64355000
|
trusted library allocation
|
page read and write
|
||
20C10021000
|
trusted library allocation
|
page read and write
|
||
3BE9000
|
trusted library allocation
|
page read and write
|
||
27F63F00000
|
trusted library allocation
|
page read and write
|
||
27F63B91000
|
trusted library allocation
|
page read and write
|
||
1CE4E000
|
stack
|
page read and write
|
||
299A58EF000
|
trusted library allocation
|
page read and write
|
||
105C000
|
heap
|
page read and write
|
||
27F7329B000
|
trusted library allocation
|
page read and write
|
||
EAF000
|
heap
|
page read and write
|
||
20C73E00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
C25000
|
heap
|
page read and write
|
||
20C102EC000
|
trusted library allocation
|
page read and write
|
||
2C83000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
27F7B8C0000
|
heap
|
page read and write
|
||
7FFD9B73C000
|
trusted library allocation
|
page execute and read and write
|
||
1B69E000
|
stack
|
page read and write
|
||
7FFD9B89A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D3000
|
trusted library allocation
|
page execute and read and write
|
||
1C63E000
|
stack
|
page read and write
|
||
20C00F64000
|
trusted library allocation
|
page read and write
|
||
20C75CB0000
|
heap
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
27F614B7000
|
heap
|
page read and write
|
||
299A5837000
|
trusted library allocation
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
1C355000
|
stack
|
page read and write
|
||
7FFD9B6B3000
|
trusted library allocation
|
page execute and read and write
|
||
299A5E94000
|
trusted library allocation
|
page read and write
|
||
27F7B418000
|
heap
|
page read and write
|
||
27F72FA1000
|
trusted library allocation
|
page read and write
|
||
1AF30000
|
heap
|
page execute and read and write
|
||
20C73DA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
1125000
|
heap
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
1E291001000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
1E291F68000
|
trusted library allocation
|
page read and write
|
||
299A59BE000
|
trusted library allocation
|
page read and write
|
||
20C75C24000
|
heap
|
page read and write
|
||
5126000
|
trusted library allocation
|
page read and write
|
||
7FFD9B881000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
BFAE3FD000
|
stack
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
299BCF4A000
|
heap
|
page read and write
|
||
27F61473000
|
heap
|
page read and write
|
||
7FFD9B72C000
|
trusted library allocation
|
page execute and read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
27F7327C000
|
trusted library allocation
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
299A5162000
|
trusted library allocation
|
page read and write
|
||
20C00F75000
|
trusted library allocation
|
page read and write
|
||
5780000
|
trusted library allocation
|
page execute and read and write
|
||
4DBE000
|
stack
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
9B9377E000
|
stack
|
page read and write
|
||
27F7B620000
|
trusted library allocation
|
page read and write
|
||
20C73CE6000
|
heap
|
page read and write
|
||
7FFD9B6E4000
|
trusted library allocation
|
page read and write
|
||
27F639E2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page execute and read and write
|
||
1E28F3F0000
|
trusted library section
|
page read and write
|
||
27F61665000
|
heap
|
page read and write
|
||
D099177000
|
stack
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
27F63017000
|
trusted library allocation
|
page read and write
|
||
299BD170000
|
heap
|
page read and write
|
||
20C75E6C000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B89A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
D1B000
|
heap
|
page read and write
|
||
13B5DBE000
|
stack
|
page read and write
|
||
72D0000
|
trusted library allocation
|
page read and write
|
||
27F72FC1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B796000
|
trusted library allocation
|
page execute and read and write
|
||
299BCF3A000
|
heap
|
page read and write
|
||
12AC3000
|
trusted library allocation
|
page read and write
|
||
51C9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
20C75FE0000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
10EC000
|
heap
|
page read and write
|
||
7FFD9B6EB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A1000
|
trusted library allocation
|
page read and write
|
||
27F648E9000
|
trusted library allocation
|
page read and write
|
||
27F7B365000
|
heap
|
page read and write
|
||
1B89E000
|
stack
|
page read and write
|
||
A0E000
|
heap
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
1E28F6A5000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
27F62E2D000
|
heap
|
page read and write
|
||
2D71000
|
trusted library allocation
|
page read and write
|
||
20C75E91000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page execute and read and write
|
||
20C10010000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
BFAF40C000
|
stack
|
page read and write
|
||
1E2A1309000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
10AE000
|
stack
|
page read and write
|
||
7FFD9B7B6000
|
trusted library allocation
|
page execute and read and write
|
||
9EC000
|
heap
|
page read and write
|
||
1E2A974D000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B73C000
|
trusted library allocation
|
page execute and read and write
|
||
12DF000
|
stack
|
page read and write
|
||
5145000
|
trusted library allocation
|
page read and write
|
||
380000
|
unkown
|
page readonly
|
||
27F61519000
|
heap
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
5293000
|
heap
|
page read and write
|
||
1024000
|
trusted library allocation
|
page read and write
|
||
AA02E79000
|
stack
|
page read and write
|
||
27F7B4FC000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B86A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
1BB3E000
|
stack
|
page read and write
|
||
27F6146F000
|
heap
|
page read and write
|
||
1C97D285000
|
heap
|
page read and write
|
||
CE2000
|
heap
|
page read and write
|
||
20C1030A000
|
trusted library allocation
|
page read and write
|
||
AA03E8C000
|
stack
|
page read and write
|
||
9B936FF000
|
unkown
|
page read and write
|
||
3BE1000
|
trusted library allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page execute and read and write
|
||
20C10247000
|
trusted library allocation
|
page read and write
|
||
20C73D40000
|
heap
|
page read and write
|
||
7320000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
563E000
|
stack
|
page read and write
|
||
20C0007A000
|
trusted library allocation
|
page read and write
|
||
95D000
|
unkown
|
page readonly
|
||
BFAE83C000
|
stack
|
page read and write
|
||
7FFD9B88A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C4000
|
trusted library allocation
|
page read and write
|
||
299A2CCF000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1BB1B000
|
stack
|
page read and write
|
||
299BCF11000
|
heap
|
page read and write
|
||
20C75C3F000
|
heap
|
page read and write
|
||
1E2A94D4000
|
heap
|
page read and write
|
||
20C75F5E000
|
heap
|
page read and write
|
||
1B6A0000
|
heap
|
page execute and read and write
|
||
5800000
|
trusted library section
|
page readonly
|
||
CF7000
|
stack
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
299A2D1B000
|
heap
|
page read and write
|
||
AA02D7E000
|
stack
|
page read and write
|
||
7FFD9B9EF000
|
trusted library allocation
|
page read and write
|
||
299A2C90000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1E291F7D000
|
trusted library allocation
|
page read and write
|
||
AA0408E000
|
stack
|
page read and write
|
||
1BDBE000
|
stack
|
page read and write
|
||
9E6000
|
heap
|
page read and write
|
||
D71000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
1E290FF0000
|
heap
|
page read and write
|
||
7FFD9B796000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
1E28F476000
|
heap
|
page read and write
|
||
2AD1000
|
trusted library allocation
|
page read and write
|
||
20C73E76000
|
heap
|
page execute and read and write
|
||
1E292E23000
|
trusted library allocation
|
page read and write
|
||
1B47E000
|
stack
|
page read and write
|
||
7FFD9B6D4000
|
trusted library allocation
|
page read and write
|
||
299A6533000
|
trusted library allocation
|
page read and write
|
||
20C75B74000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
5280000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
27F64828000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
2CDC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
27F615F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1E28F4B4000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
D0995FE000
|
stack
|
page read and write
|
||
7FFD9B6CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page execute and read and write
|
||
72F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B872000
|
trusted library allocation
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
548000
|
heap
|
page read and write
|
||
7FFD9B6D3000
|
trusted library allocation
|
page execute and read and write
|
||
20C73BF0000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
1023000
|
trusted library allocation
|
page execute and read and write
|
||
299A2D60000
|
heap
|
page read and write
|
||
1C97D110000
|
heap
|
page read and write
|
||
1E291F64000
|
trusted library allocation
|
page read and write
|
||
5121000
|
trusted library allocation
|
page read and write
|
||
20C73E85000
|
heap
|
page read and write
|
||
7FFD9BA39000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
heap
|
page execute and read and write
|
||
299B4A09000
|
trusted library allocation
|
page read and write
|
||
299B49FD000
|
trusted library allocation
|
page read and write
|
||
299A2C98000
|
heap
|
page read and write
|
||
20C75B80000
|
heap
|
page read and write
|
||
20C73C50000
|
heap
|
page read and write
|
||
BFAE4BE000
|
stack
|
page read and write
|
||
7DF4552E0000
|
trusted library allocation
|
page execute and read and write
|
||
20C01E05000
|
trusted library allocation
|
page read and write
|
||
235C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D4000
|
trusted library allocation
|
page read and write
|
||
13B698C000
|
stack
|
page read and write
|
||
1E2A981D000
|
heap
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7C6000
|
trusted library allocation
|
page execute and read and write
|
||
299A5928000
|
trusted library allocation
|
page read and write
|
||
1E2A94B1000
|
heap
|
page read and write
|
||
1E2A96D0000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
20C10001000
|
trusted library allocation
|
page read and write
|
||
2BE1000
|
trusted library allocation
|
page read and write
|
||
3BF1000
|
trusted library allocation
|
page read and write
|
||
299A2CEF000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
12AC8000
|
trusted library allocation
|
page read and write
|
||
7DF4506E0000
|
trusted library allocation
|
page execute and read and write
|
||
13B5A77000
|
stack
|
page read and write
|
||
27F64D9B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
20C00C03000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
12CE1000
|
trusted library allocation
|
page read and write
|
||
1BD1E000
|
stack
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
EC4000
|
heap
|
page read and write
|
||
1E2A97E6000
|
heap
|
page read and write
|
||
1BBBF000
|
stack
|
page read and write
|
||
13B5E3E000
|
stack
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
7FFD9B786000
|
trusted library allocation
|
page read and write
|
||
1437000
|
heap
|
page read and write
|
||
12CD1000
|
trusted library allocation
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
CEF000
|
heap
|
page read and write
|
||
AA0408C000
|
stack
|
page read and write
|
||
BFAE17D000
|
stack
|
page read and write
|
||
7FFD9B894000
|
trusted library allocation
|
page read and write
|
||
13B6A89000
|
stack
|
page read and write
|
||
3C96000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
1E2A9835000
|
heap
|
page read and write
|
||
299BCF77000
|
heap
|
page read and write
|
||
7FFD9BA3C000
|
trusted library allocation
|
page read and write
|
||
AA02DFE000
|
stack
|
page read and write
|
||
F55000
|
heap
|
page read and write
|
||
B10000
|
unkown
|
page readonly
|
||
7FFD9B8B0000
|
trusted library allocation
|
page read and write
|
||
27F64DBF000
|
trusted library allocation
|
page read and write
|
||
20C73C30000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
heap
|
page execute and read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
20C75F62000
|
heap
|
page read and write
|
||
7FFD9B7B6000
|
trusted library allocation
|
page execute and read and write
|
||
F7C000
|
heap
|
page read and write
|
||
7DF4ACA20000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
heap
|
page read and write
|
||
12CED000
|
trusted library allocation
|
page read and write
|
||
20C01DDF000
|
trusted library allocation
|
page read and write
|
||
F9C000
|
heap
|
page read and write
|
||
27F6144F000
|
heap
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
299A57D5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B796000
|
trusted library allocation
|
page read and write
|
||
5DC000
|
unkown
|
page readonly
|
||
7FFD9BA24000
|
trusted library allocation
|
page read and write
|
||
20C75F0B000
|
heap
|
page read and write
|
||
7FFD9B9AE000
|
trusted library allocation
|
page read and write
|
||
20C73E70000
|
heap
|
page execute and read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page execute and read and write
|
||
13B5B79000
|
stack
|
page read and write
|
||
BFAF387000
|
stack
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1E2A9751000
|
heap
|
page read and write
|
||
1E28F410000
|
trusted library allocation
|
page read and write
|
||
D0993F8000
|
stack
|
page read and write
|
||
ED9000
|
heap
|
page read and write
|
||
299A478B000
|
trusted library allocation
|
page read and write
|
||
2340000
|
heap
|
page execute and read and write
|
||
299A5AD8000
|
trusted library allocation
|
page read and write
|
||
1E28F400000
|
trusted library section
|
page read and write
|
||
922000
|
unkown
|
page readonly
|
||
20C75DB0000
|
heap
|
page execute and read and write
|
||
299BCBB6000
|
heap
|
page read and write
|
||
1E28F740000
|
heap
|
page read and write
|
||
BFAF20E000
|
stack
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
AA0400D000
|
stack
|
page read and write
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E3000
|
trusted library allocation
|
page execute and read and write
|
||
13B5BBE000
|
stack
|
page read and write
|
||
20C00001000
|
trusted library allocation
|
page read and write
|
||
1C97CF10000
|
heap
|
page read and write
|
||
20C01034000
|
trusted library allocation
|
page read and write
|
||
27F64025000
|
trusted library allocation
|
page read and write
|
||
1E2A96D4000
|
heap
|
page read and write
|
||
20C012AA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C8000
|
trusted library allocation
|
page read and write
|
||
D098EFE000
|
stack
|
page read and write
|
||
FB1000
|
heap
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page execute and read and write
|
||
CB8000
|
heap
|
page read and write
|
||
1B93E000
|
stack
|
page read and write
|
||
20C75EED000
|
heap
|
page read and write
|
||
1C97D0F0000
|
heap
|
page read and write
|
||
ACE000
|
heap
|
page read and write
|
||
299B4731000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
20C10031000
|
trusted library allocation
|
page read and write
|
||
20C75740000
|
heap
|
page execute and read and write
|
||
7FFD9BA48000
|
trusted library allocation
|
page read and write
|
||
299B4711000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6ED000
|
trusted library allocation
|
page execute and read and write
|
||
27F73281000
|
trusted library allocation
|
page read and write
|
||
D0992F7000
|
stack
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
1B06D000
|
heap
|
page read and write
|
||
1C650000
|
heap
|
page read and write
|
||
1E292952000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
6120000
|
heap
|
page execute and read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
1E28F47A000
|
heap
|
page read and write
|
||
AA030BF000
|
stack
|
page read and write
|
||
EA2000
|
heap
|
page read and write
|
||
3C2E000
|
trusted library allocation
|
page read and write
|
||
27F7B363000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
20C75E24000
|
heap
|
page read and write
|
||
13B6B8E000
|
stack
|
page read and write
|
||
299B4A01000
|
trusted library allocation
|
page read and write
|
||
AA029C3000
|
stack
|
page read and write
|
||
ED1000
|
heap
|
page read and write
|
||
F25000
|
heap
|
page read and write
|
||
20C75CD0000
|
heap
|
page read and write
|
||
5810000
|
heap
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
27F63B89000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D2000
|
trusted library allocation
|
page read and write
|
||
12358000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6ED000
|
trusted library allocation
|
page execute and read and write
|
||
27F63EF8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BABC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA13000
|
trusted library allocation
|
page read and write
|
||
1E290F90000
|
heap
|
page execute and read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
CEC000
|
heap
|
page read and write
|
||
2BC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA42000
|
trusted library allocation
|
page read and write
|
||
1E28F620000
|
trusted library allocation
|
page read and write
|
||
BFAF30E000
|
stack
|
page read and write
|
||
2CD3000
|
trusted library allocation
|
page read and write
|
||
BFAE5B8000
|
stack
|
page read and write
|
||
20C01786000
|
trusted library allocation
|
page read and write
|
||
299A4BDE000
|
trusted library allocation
|
page read and write
|
||
1093000
|
heap
|
page read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
299BCB60000
|
heap
|
page read and write
|
||
7FFD9BA38000
|
trusted library allocation
|
page read and write
|
||
27F63F09000
|
trusted library allocation
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
1E2A9714000
|
heap
|
page read and write
|
||
AC5000
|
heap
|
page read and write
|
||
12A03000
|
trusted library allocation
|
page read and write
|
||
1E2A1355000
|
trusted library allocation
|
page read and write
|
||
20C0182C000
|
trusted library allocation
|
page read and write
|
||
2CF4000
|
trusted library allocation
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
A4F000
|
heap
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
299A2C50000
|
trusted library section
|
page read and write
|
||
2C10000
|
heap
|
page execute and read and write
|
||
20C102FA000
|
trusted library allocation
|
page read and write
|
||
11D5000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
1046000
|
heap
|
page read and write
|
||
20C00F69000
|
trusted library allocation
|
page read and write
|
||
1B710000
|
heap
|
page execute and read and write
|
||
27F7B502000
|
heap
|
page read and write
|
||
E9E000
|
heap
|
page read and write
|
||
BFAE279000
|
stack
|
page read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
27F7B826000
|
heap
|
page read and write
|
||
1043000
|
trusted library allocation
|
page read and write
|
||
7DF412710000
|
trusted library allocation
|
page execute and read and write
|
||
20C73CC9000
|
heap
|
page read and write
|
||
2ACF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page execute and read and write
|
||
1CA50000
|
heap
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
20C75EEA000
|
heap
|
page read and write
|
||
20C75F42000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1E29122B000
|
trusted library allocation
|
page read and write
|
||
78A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
12A01000
|
trusted library allocation
|
page read and write
|
||
D099379000
|
stack
|
page read and write
|
||
27F64051000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6FB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A6000
|
trusted library allocation
|
page execute and read and write
|
||
27F62F30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
13B5553000
|
stack
|
page read and write
|
||
20C75B84000
|
heap
|
page read and write
|
||
5100000
|
trusted library allocation
|
page read and write
|
||
C55000
|
heap
|
page read and write
|
||
2D00000
|
trusted library allocation
|
page read and write
|
||
A87000
|
heap
|
page read and write
|
||
27F615A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B766000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
1E28F438000
|
heap
|
page read and write
|
||
299BCE5A000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
7FFD9B861000
|
trusted library allocation
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
1E2A96E0000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
299A57A9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6B3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
D098BDE000
|
stack
|
page read and write
|
||
1C564000
|
stack
|
page read and write
|
||
299BCC17000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
299BCB88000
|
heap
|
page read and write
|
||
27F7B37D000
|
heap
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
D09A04E000
|
stack
|
page read and write
|
||
299BC717000
|
heap
|
page read and write
|
||
27F640B5000
|
trusted library allocation
|
page read and write
|
||
1B410000
|
heap
|
page read and write
|
||
5DD000
|
heap
|
page read and write
|
||
934000
|
stack
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7B6000
|
trusted library allocation
|
page execute and read and write
|
||
1B8C0000
|
heap
|
page read and write
|
||
20C73C40000
|
heap
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
27F641A4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
AA0343B000
|
stack
|
page read and write
|
||
7FFD9B862000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6F4000
|
trusted library allocation
|
page read and write
|
||
2D09000
|
trusted library allocation
|
page read and write
|
||
1E2921AC000
|
trusted library allocation
|
page read and write
|
||
511E000
|
trusted library allocation
|
page read and write
|
||
D099079000
|
stack
|
page read and write
|
||
299A2BA0000
|
heap
|
page read and write
|
||
27F7328B000
|
trusted library allocation
|
page read and write
|
||
D09947E000
|
stack
|
page read and write
|
||
20C00BF8000
|
trusted library allocation
|
page read and write
|
||
7DF412700000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6E3000
|
trusted library allocation
|
page read and write
|
||
D09A149000
|
stack
|
page read and write
|
||
1AE6F000
|
stack
|
page read and write
|
||
7FFD9B6ED000
|
trusted library allocation
|
page execute and read and write
|
||
20C01127000
|
trusted library allocation
|
page read and write
|
||
20C102F8000
|
trusted library allocation
|
page read and write
|
||
13B6A0E000
|
stack
|
page read and write
|
||
611E000
|
stack
|
page read and write
|
||
1E28F44E000
|
heap
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
27F7B4D0000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
103D000
|
trusted library allocation
|
page execute and read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
299A2BE5000
|
heap
|
page read and write
|
||
20C75820000
|
heap
|
page read and write
|
||
BFAE073000
|
stack
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
299A2C40000
|
trusted library section
|
page read and write
|
||
380000
|
unkown
|
page readonly
|
||
1C45A000
|
stack
|
page read and write
|
||
D098E7E000
|
stack
|
page read and write
|
||
10F5000
|
heap
|
page read and write
|
||
1E28F4B8000
|
heap
|
page read and write
|
||
228E000
|
stack
|
page read and write
|
||
7A75000
|
heap
|
page read and write
|
||
27F61479000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
299A2BC0000
|
heap
|
page read and write
|
||
118F000
|
stack
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
299A5A1F000
|
trusted library allocation
|
page read and write
|
||
AA03E0E000
|
stack
|
page read and write
|
||
20C75BF2000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
299A5872000
|
trusted library allocation
|
page read and write
|
||
13B6B0C000
|
stack
|
page read and write
|
||
1091000
|
heap
|
page read and write
|
||
7FFD9B8B4000
|
trusted library allocation
|
page read and write
|
||
20C011AB000
|
trusted library allocation
|
page read and write
|
||
299A2CD1000
|
heap
|
page read and write
|
||
7FFD9B6BD000
|
trusted library allocation
|
page execute and read and write
|
||
20C73DB5000
|
heap
|
page read and write
|
||
1E291DC2000
|
trusted library allocation
|
page read and write
|
||
27F7B790000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
12CD3000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
9F8000
|
stack
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
20C75E69000
|
heap
|
page read and write
|
||
1420000
|
trusted library allocation
|
page execute and read and write
|
||
27F61430000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
299A4711000
|
trusted library allocation
|
page read and write
|
||
7FFD9B882000
|
trusted library allocation
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
D09957D000
|
stack
|
page read and write
|
||
7FFD9B7E0000
|
trusted library allocation
|
page execute and read and write
|
||
1C04E000
|
stack
|
page read and write
|
||
299A6513000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
12CE8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA34000
|
trusted library allocation
|
page read and write
|
||
F87000
|
heap
|
page read and write
|
||
5E00000
|
unkown
|
page readonly
|
||
895000
|
heap
|
page read and write
|
||
7FFD9B872000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA29000
|
trusted library allocation
|
page read and write
|
||
12CEF000
|
trusted library allocation
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
51C6000
|
trusted library allocation
|
page read and write
|
||
3C68000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
A0C000
|
heap
|
page read and write
|
||
7FFD9BA4A000
|
trusted library allocation
|
page read and write
|
||
27F6345D000
|
trusted library allocation
|
page read and write
|
||
299A4600000
|
heap
|
page execute and read and write
|
||
FB0000
|
heap
|
page read and write
|
||
7FFD9B6CD000
|
trusted library allocation
|
page execute and read and write
|
||
20C75E51000
|
heap
|
page read and write
|
||
299A2BE0000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
299B4A1B000
|
trusted library allocation
|
page read and write
|
||
92F000
|
unkown
|
page readonly
|
||
299BCC60000
|
heap
|
page execute and read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
1031000
|
heap
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
299A4570000
|
trusted library allocation
|
page read and write
|
||
2D2D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
299BCC53000
|
heap
|
page read and write
|
||
3C2C000
|
trusted library allocation
|
page read and write
|
||
299BCD36000
|
heap
|
page execute and read and write
|
||
2B73000
|
heap
|
page read and write
|
||
299BCF90000
|
heap
|
page read and write
|
||
1E2A98B0000
|
heap
|
page read and write
|
||
9B93679000
|
stack
|
page read and write
|
||
299BCED8000
|
heap
|
page read and write
|
||
2D7C000
|
trusted library allocation
|
page read and write
|
||
20C0130B000
|
trusted library allocation
|
page read and write
|
||
1135000
|
heap
|
page read and write
|
||
1B81F000
|
stack
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
heap
|
page execute and read and write
|
||
27F615D0000
|
heap
|
page read and write
|
||
12CF1000
|
trusted library allocation
|
page read and write
|
||
1E292E03000
|
trusted library allocation
|
page read and write
|
||
3C8D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
20C75E07000
|
heap
|
page read and write
|
||
299BCEC9000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
BFAE379000
|
stack
|
page read and write
|
||
1E2A94B3000
|
heap
|
page read and write
|
||
27F61320000
|
heap
|
page read and write
|
||
7FFD9BA45000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6B2000
|
trusted library allocation
|
page read and write
|
||
E77000
|
heap
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
1E292785000
|
trusted library allocation
|
page read and write
|
||
1C97D280000
|
heap
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page execute and read and write
|
||
299BCCB0000
|
trusted library allocation
|
page read and write
|
||
1E291F75000
|
trusted library allocation
|
page read and write
|
||
299BCE84000
|
heap
|
page read and write
|
||
7FFD9B7C6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
5AB000
|
unkown
|
page readonly
|
||
27F7B8B0000
|
heap
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
7FFD9B6FD000
|
trusted library allocation
|
page execute and read and write
|
||
FB4000
|
heap
|
page read and write
|
||
BC1000
|
stack
|
page read and write
|
||
1A8DD000
|
stack
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
1E2A9830000
|
heap
|
page read and write
|
||
1E29203A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B891000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1122000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
AA03F89000
|
stack
|
page read and write
|
||
6140000
|
heap
|
page read and write
|
||
20C01953000
|
trusted library allocation
|
page read and write
|
||
299A5315000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
12353000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6CB000
|
trusted library allocation
|
page read and write
|
||
529000
|
heap
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
299A2C35000
|
heap
|
page read and write
|
||
1E2A95A0000
|
heap
|
page read and write
|
||
7FFD9B71C000
|
trusted library allocation
|
page execute and read and write
|
||
1C97D010000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1E2A9570000
|
heap
|
page execute and read and write
|
||
2CE1000
|
trusted library allocation
|
page read and write
|
||
AA03138000
|
stack
|
page read and write
|
||
1B620000
|
heap
|
page read and write
|
||
299A45B0000
|
trusted library allocation
|
page read and write
|
||
F61000
|
heap
|
page read and write
|
||
1B6AD000
|
stack
|
page read and write
|
||
1AF3E000
|
stack
|
page read and write
|
||
27F61670000
|
heap
|
page read and write
|
||
AA031BE000
|
stack
|
page read and write
|
||
20C75F57000
|
heap
|
page read and write
|
||
20C0194A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1042000
|
trusted library allocation
|
page read and write
|
||
27F61620000
|
trusted library allocation
|
page read and write
|
||
1C590000
|
heap
|
page read and write
|
||
20C73DB0000
|
heap
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page execute and read and write
|
||
20C76010000
|
trusted library allocation
|
page read and write
|
||
20C01892000
|
trusted library allocation
|
page read and write
|
||
1E2A97E4000
|
heap
|
page read and write
|
||
5820000
|
heap
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA13000
|
trusted library allocation
|
page read and write
|
||
5E02000
|
unkown
|
page readonly
|
||
27F7B8DE000
|
heap
|
page read and write
|
||
1E28F600000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
1E29286A000
|
trusted library allocation
|
page read and write
|
||
27F63D17000
|
trusted library allocation
|
page read and write
|
||
1E2A9493000
|
heap
|
page read and write
|
||
1B26D000
|
stack
|
page read and write
|
||
299A6538000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
F1D000
|
heap
|
page read and write
|
||
1E2922AD000
|
trusted library allocation
|
page read and write
|
||
27F7B5D0000
|
heap
|
page execute and read and write
|
||
27F62F76000
|
heap
|
page execute and read and write
|
||
27F7B87F000
|
heap
|
page read and write
|
||
A79000
|
heap
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6FB000
|
trusted library allocation
|
page read and write
|
||
299A64EE000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
20C73B00000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
1E291F71000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
1052000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA42000
|
trusted library allocation
|
page read and write
|
||
20C75EF3000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
1B57E000
|
stack
|
page read and write
|
||
27F62F80000
|
heap
|
page execute and read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
20C00F71000
|
trusted library allocation
|
page read and write
|
||
A23000
|
heap
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
1BC1E000
|
stack
|
page read and write
|
||
1E2A12F9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6FD000
|
trusted library allocation
|
page execute and read and write
|
||
299BCEDD000
|
heap
|
page read and write
|
||
299A4530000
|
heap
|
page readonly
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7B6000
|
trusted library allocation
|
page execute and read and write
|
||
27F64DBA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D4000
|
trusted library allocation
|
page read and write
|
||
D09A24E000
|
stack
|
page read and write
|
||
20C75DD0000
|
heap
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
heap
|
page execute and read and write
|
||
7FFD9B872000
|
trusted library allocation
|
page read and write
|
||
55C000
|
heap
|
page read and write
|
||
7FFD9B8B8000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
7FFD9BA48000
|
trusted library allocation
|
page read and write
|
||
299A5604000
|
trusted library allocation
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
1E2A1001000
|
trusted library allocation
|
page read and write
|
||
27F63E24000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
299A2D17000
|
heap
|
page read and write
|
||
1C14D000
|
stack
|
page read and write
|
||
BFAE0FE000
|
stack
|
page read and write
|
||
20C00A52000
|
trusted library allocation
|
page read and write
|
||
20C73CF0000
|
heap
|
page read and write
|
||
27F61660000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
AF1000
|
stack
|
page read and write
|
||
102D000
|
trusted library allocation
|
page execute and read and write
|
||
1E29202E000
|
trusted library allocation
|
page read and write
|
||
51C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FFD9B882000
|
trusted library allocation
|
page read and write
|
||
2CBE000
|
trusted library allocation
|
page read and write
|
||
20C00228000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
heap
|
page execute and read and write
|
||
7FFD9BA09000
|
trusted library allocation
|
page read and write
|
||
7960000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
27F6147B000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
20C75B70000
|
heap
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
D099279000
|
stack
|
page read and write
|
||
2BA0000
|
heap
|
page execute and read and write
|
||
FB5000
|
heap
|
page read and write
|
||
AA03078000
|
stack
|
page read and write
|
||
1E2A9706000
|
heap
|
page read and write
|
||
1046000
|
trusted library allocation
|
page execute and read and write
|
||
27F63EFC000
|
trusted library allocation
|
page read and write
|
||
299A5F79000
|
trusted library allocation
|
page read and write
|
||
7DF4506F0000
|
trusted library allocation
|
page execute and read and write
|
||
299BCD60000
|
heap
|
page read and write
|
||
299BCE40000
|
heap
|
page read and write
|
||
20C00D85000
|
trusted library allocation
|
page read and write
|
||
20C00C0D000
|
trusted library allocation
|
page read and write
|
||
1B830000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
6130000
|
heap
|
page read and write
|
||
1AF8D000
|
stack
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
BFAE2FE000
|
stack
|
page read and write
|
||
20C7563A000
|
heap
|
page read and write
|
||
7342000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
AA032BE000
|
stack
|
page read and write
|
||
512D000
|
trusted library allocation
|
page read and write
|
||
500000
|
trusted library allocation
|
page read and write
|
||
2CB3000
|
trusted library allocation
|
page read and write
|
||
1B13F000
|
stack
|
page read and write
|
||
1E2A9530000
|
heap
|
page read and write
|
||
299BCF6F000
|
heap
|
page read and write
|
||
7FFD9B882000
|
trusted library allocation
|
page read and write
|
||
D098F7E000
|
stack
|
page read and write
|
||
1B51E000
|
stack
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
299A2C30000
|
heap
|
page read and write
|
||
7FFD9B852000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page execute and read and write
|
||
A21000
|
heap
|
page read and write
|
||
99F000
|
stack
|
page read and write
|
||
2C8D000
|
trusted library allocation
|
page read and write
|
||
20C73D80000
|
trusted library allocation
|
page read and write
|
||
7720000
|
heap
|
page read and write
|
||
1B79F000
|
stack
|
page read and write
|
||
27F615E0000
|
heap
|
page readonly
|
||
7FFD9B6E4000
|
trusted library allocation
|
page read and write
|
||
382000
|
unkown
|
page readonly
|
||
AA033BE000
|
stack
|
page read and write
|
||
7FFD9B6B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
D0994FE000
|
stack
|
page read and write
|
||
20C75B78000
|
heap
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page read and write
|
||
27F7B862000
|
heap
|
page read and write
|
||
7FFD9B72C000
|
trusted library allocation
|
page execute and read and write
|
||
1E2A96D8000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
27F63CA5000
|
trusted library allocation
|
page read and write
|
||
EAD000
|
heap
|
page read and write
|
||
7DF4552C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
299A2AC0000
|
heap
|
page read and write
|
||
27F63F0D000
|
trusted library allocation
|
page read and write
|
||
299B4A03000
|
trusted library allocation
|
page read and write
|
||
F5E000
|
stack
|
page read and write
|
||
27F7B40C000
|
heap
|
page read and write
|
||
BFAE537000
|
stack
|
page read and write
|
||
20C0186B000
|
trusted library allocation
|
page read and write
|
||
1E28F472000
|
heap
|
page read and write
|
||
7FFD9B8B2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
299A5745000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C2000
|
trusted library allocation
|
page read and write
|
||
1E28F360000
|
heap
|
page read and write
|
||
20C75F6A000
|
heap
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
5830000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA1C000
|
trusted library allocation
|
page read and write
|
||
1E2A1010000
|
trusted library allocation
|
page read and write
|
||
111D000
|
heap
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
299BCF32000
|
heap
|
page read and write
|
||
7FFD9B70C000
|
trusted library allocation
|
page execute and read and write
|
||
1E2A1031000
|
trusted library allocation
|
page read and write
|
||
7940000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B78C000
|
trusted library allocation
|
page execute and read and write
|
||
1E2A9550000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB3D000
|
trusted library allocation
|
page read and write
|
||
13B5EBE000
|
stack
|
page read and write
|
||
20C01E24000
|
trusted library allocation
|
page read and write
|
||
1BABE000
|
stack
|
page read and write
|
||
299A4939000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
510B000
|
trusted library allocation
|
page read and write
|
||
1B95F000
|
heap
|
page read and write
|
||
20C013C7000
|
trusted library allocation
|
page read and write
|
||
12A08000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
12351000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C4000
|
trusted library allocation
|
page read and write
|
||
27F64238000
|
trusted library allocation
|
page read and write
|
||
1E2A125A000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
unkown
|
page readonly
|
||
299A2CD9000
|
heap
|
page read and write
|
||
7FFD9B6C3000
|
trusted library allocation
|
page execute and read and write
|
||
20C011DE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
20C75F6C000
|
heap
|
page read and write
|
||
7FFD9B6DD000
|
trusted library allocation
|
page execute and read and write
|
||
1033000
|
trusted library allocation
|
page read and write
|
||
FDD000
|
heap
|
page read and write
|
||
1018000
|
heap
|
page read and write
|
||
1E291D85000
|
trusted library allocation
|
page read and write
|
||
20C010C3000
|
trusted library allocation
|
page read and write
|
||
20C01217000
|
trusted library allocation
|
page read and write
|
||
7FFD9B786000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
27F61400000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
1E292310000
|
trusted library allocation
|
page read and write
|
||
3C22000
|
trusted library allocation
|
page read and write
|
||
1E291F8A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6ED000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page execute and read and write
|
||
299B4720000
|
trusted library allocation
|
page read and write
|
||
AA03F0E000
|
stack
|
page read and write
|
||
20C00F82000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
55E000
|
heap
|
page read and write
|
||
1E28F46C000
|
heap
|
page read and write
|
||
1CD4C000
|
stack
|
page read and write
|
||
27F7B4F0000
|
heap
|
page read and write
|
||
299BCD30000
|
heap
|
page execute and read and write
|
||
10BD000
|
heap
|
page read and write
|
||
1E290FB0000
|
heap
|
page execute and read and write
|
||
20C73C3A000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
7FFD9B8C4000
|
trusted library allocation
|
page read and write
|
||
1E291F6C000
|
trusted library allocation
|
page read and write
|
||
AA02F77000
|
stack
|
page read and write
|
||
1057000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
1E2A12EA000
|
trusted library allocation
|
page read and write
|
||
27F7B7A0000
|
heap
|
page read and write
|
||
27F62F70000
|
heap
|
page execute and read and write
|
||
299B4A0B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
B75000
|
heap
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA18000
|
trusted library allocation
|
page read and write
|
||
5132000
|
trusted library allocation
|
page read and write
|
||
1BA1F000
|
stack
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
7FFD9BA12000
|
trusted library allocation
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
3C5C000
|
trusted library allocation
|
page read and write
|
||
2800000
|
heap
|
page execute and read and write
|
||
7FFD9B73C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
1E291F79000
|
trusted library allocation
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
72E0000
|
trusted library allocation
|
page execute and read and write
|
||
1E28F3D0000
|
heap
|
page read and write
|
||
AA02C7E000
|
stack
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
20C10073000
|
trusted library allocation
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
27F72FB1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1E2A9819000
|
heap
|
page read and write
|
||
20C73DC0000
|
heap
|
page readonly
|
||
BFAE7BE000
|
stack
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
27F61530000
|
heap
|
page read and write
|
||
7FFD9B6E4000
|
trusted library allocation
|
page read and write
|
||
13B5AFD000
|
stack
|
page read and write
|
||
27F62F91000
|
trusted library allocation
|
page read and write
|
||
588000
|
heap
|
page read and write
|
||
299B4783000
|
trusted library allocation
|
page read and write
|
||
2CE1000
|
trusted library allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
27F615C0000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
trusted library allocation
|
page read and write
|
||
20C73C78000
|
heap
|
page read and write
|
||
1E28F690000
|
trusted library allocation
|
page read and write
|
||
10BF000
|
heap
|
page read and write
|
||
27F64D75000
|
trusted library allocation
|
page read and write
|
||
13B59FF000
|
stack
|
page read and write
|
||
13B5CBA000
|
stack
|
page read and write
|
||
20C75C68000
|
heap
|
page read and write
|
||
567E000
|
stack
|
page read and write
|
||
13B5D39000
|
stack
|
page read and write
|
||
20C00C5F000
|
trusted library allocation
|
page read and write
|
||
12AC1000
|
trusted library allocation
|
page read and write
|
||
27F7B323000
|
heap
|
page read and write
|
||
2C6B000
|
trusted library allocation
|
page read and write
|
||
299A2C10000
|
heap
|
page read and write
|
||
299A5602000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1E2A96DC000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
1AD1E000
|
stack
|
page read and write
|
||
EF1000
|
stack
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
2AC1000
|
trusted library allocation
|
page read and write
|
||
BFAE1FF000
|
stack
|
page read and write
|
||
7FFD9B898000
|
trusted library allocation
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
BFAF28C000
|
stack
|
page read and write
|
||
27F61675000
|
heap
|
page read and write
|
||
27F61560000
|
heap
|
page read and write
|
||
6135000
|
heap
|
page read and write
|
||
1B81E000
|
stack
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
AA02EFF000
|
stack
|
page read and write
|
||
7FFD9B6E4000
|
trusted library allocation
|
page read and write
|
||
27F63B87000
|
trusted library allocation
|
page read and write
|
||
299A2D6A000
|
heap
|
page read and write
|
||
27F64801000
|
trusted library allocation
|
page read and write
|
||
5840000
|
trusted library allocation
|
page execute and read and write
|
||
BFAE6BE000
|
stack
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
7FFD9BB0D000
|
trusted library allocation
|
page read and write
|
||
20C00F6D000
|
trusted library allocation
|
page read and write
|
||
A4D000
|
heap
|
page read and write
|
||
3BF4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B892000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6DD000
|
trusted library allocation
|
page execute and read and write
|
||
1E2A96C8000
|
heap
|
page read and write
|
||
773D000
|
heap
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
1AD60000
|
heap
|
page read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
27F72F91000
|
trusted library allocation
|
page read and write
|
||
FAF000
|
heap
|
page read and write
|
There are 1301 hidden memdumps, click here to show them.