Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
gPEbJi1xiY.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\kasper.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\kasper.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1s4oruvu.z0d.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a3yzocwq.fmu.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eexe00xp.tol.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gl2qsjwo.paa.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gv2svidy.dzv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hhhsipqs.tgr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i5lnkf1s.isu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_itm1cf0j.5dw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k4soey0k.q0g.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kwsfh325.sns.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lcbrqs5z.mwl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mhihxn5t.f0w.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p5gd5v4e.hhq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_reocv4yq.42c.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_whwszewt.uoj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yr0wtw0h.ryb.psm1
|
ASCII text, with no line terminators
|
dropped
|
There are 10 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\gPEbJi1xiY.exe
|
"C:\Users\user\Desktop\gPEbJi1xiY.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\gPEbJi1xiY.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'gPEbJi1xiY.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\kasper.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'kasper.exe'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "kasper" /tr "C:\Users\user\AppData\Roaming\kasper.exe"
|
||
C:\Users\user\AppData\Roaming\kasper.exe
|
C:\Users\user\AppData\Roaming\kasper.exe
|
||
C:\Users\user\AppData\Roaming\kasper.exe
|
C:\Users\user\AppData\Roaming\kasper.exe
|
||
C:\Users\user\AppData\Roaming\kasper.exe
|
C:\Users\user\AppData\Roaming\kasper.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://schemas.microso
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://crl.v
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://crl.micros
|
unknown
|
There are 6 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
otherwise-puzzle.gl.at.ply.gg
|
147.185.221.22
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
147.185.221.22
|
otherwise-puzzle.gl.at.ply.gg
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3C2000
|
unkown
|
page readonly
|
||
9BC000
|
heap
|
page read and write
|
||
2162B9D3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B972000
|
trusted library allocation
|
page read and write
|
||
28C902F9000
|
trusted library allocation
|
page read and write
|
||
1CF1A431000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
28C812AC000
|
trusted library allocation
|
page read and write
|
||
2162BC1C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
9CE000
|
stack
|
page read and write
|
||
28CF6BD7000
|
heap
|
page read and write
|
||
803000
|
heap
|
page read and write
|
||
859000
|
heap
|
page read and write
|
||
21FD2E6D000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
1CF0A290000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
21FECE00000
|
heap
|
page read and write
|
||
21FE4BE2000
|
trusted library allocation
|
page read and write
|
||
23D0000
|
trusted library allocation
|
page read and write
|
||
28C81006000
|
trusted library allocation
|
page read and write
|
||
1CF08975000
|
heap
|
page read and write
|
||
28C80F97000
|
trusted library allocation
|
page read and write
|
||
21FD496B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
21FE4964000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
28C902EF000
|
trusted library allocation
|
page read and write
|
||
2162B9A7000
|
trusted library allocation
|
page read and write
|
||
1CF0A411000
|
trusted library allocation
|
page read and write
|
||
1CF1A71B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD5000
|
trusted library allocation
|
page read and write
|
||
1B33E000
|
stack
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B901000
|
trusted library allocation
|
page read and write
|
||
28CF8F45000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
554000
|
stack
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1CF0B3B1000
|
trusted library allocation
|
page read and write
|
||
28C812DC000
|
trusted library allocation
|
page read and write
|
||
28C902EA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD8000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
742647E000
|
stack
|
page read and write
|
||
1CF22BC2000
|
heap
|
page read and write
|
||
1CF228DC000
|
heap
|
page read and write
|
||
21FD3015000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
1CF0A2A0000
|
heap
|
page readonly
|
||
1CF228B0000
|
heap
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
9E5000
|
heap
|
page read and write
|
||
21FD2E77000
|
heap
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
21FD2E30000
|
heap
|
page read and write
|
||
28C81125000
|
trusted library allocation
|
page read and write
|
||
1CF22CE7000
|
heap
|
page read and write
|
||
1CF22B6B000
|
heap
|
page read and write
|
||
1B49E000
|
stack
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7426AFE000
|
stack
|
page read and write
|
||
28CF8F79000
|
heap
|
page read and write
|
||
AC3A5FF000
|
stack
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
9386D89000
|
stack
|
page read and write
|
||
28C90021000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
96BBC7B000
|
stack
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
1CF22C21000
|
heap
|
page read and write
|
||
2162B4FC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
2162C17D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE9000
|
trusted library allocation
|
page read and write
|
||
28C81787000
|
trusted library allocation
|
page read and write
|
||
1AF4E000
|
stack
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
2162B890000
|
trusted library allocation
|
page read and write
|
||
742774C000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
28CF8EA8000
|
heap
|
page read and write
|
||
96BC13B000
|
stack
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
28CF6DD0000
|
trusted library allocation
|
page read and write
|
||
28C80D09000
|
trusted library allocation
|
page read and write
|
||
21628E28000
|
heap
|
page read and write
|
||
1CF0B5ED000
|
trusted library allocation
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
28C81E26000
|
trusted library allocation
|
page read and write
|
||
1CF0896E000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
21628E62000
|
heap
|
page read and write
|
||
21628DA5000
|
heap
|
page read and write
|
||
264E000
|
stack
|
page read and write
|
||
7FFD9B7AC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1CE46260000
|
heap
|
page read and write
|
||
28CF8D10000
|
heap
|
page read and write
|
||
21FECDF8000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
AC3AD7E000
|
stack
|
page read and write
|
||
7FFD9B912000
|
trusted library allocation
|
page read and write
|
||
9385DFD000
|
stack
|
page read and write
|
||
1B2A0000
|
heap
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
21628D60000
|
heap
|
page read and write
|
||
7FFD9B978000
|
trusted library allocation
|
page read and write
|
||
7DF485960000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
1C22C000
|
stack
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
AC3ABFD000
|
stack
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
21FECD80000
|
heap
|
page read and write
|
||
12651000
|
trusted library allocation
|
page read and write
|
||
7FFD9B958000
|
trusted library allocation
|
page read and write
|
||
2162A780000
|
heap
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
28C80085000
|
trusted library allocation
|
page read and write
|
||
21FD2E75000
|
heap
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
21FECFF0000
|
heap
|
page execute and read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
28CF6BD3000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
9B9000
|
heap
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1CF0C237000
|
trusted library allocation
|
page read and write
|
||
21FD4B18000
|
trusted library allocation
|
page read and write
|
||
9FD000
|
heap
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
21FE4BEC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
1CF0B4A6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1B301000
|
heap
|
page read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
BEE000
|
stack
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
5D0000
|
heap
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
21628E6A000
|
heap
|
page read and write
|
||
12778000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
742697F000
|
stack
|
page read and write
|
||
2162B362000
|
trusted library allocation
|
page read and write
|
||
28CF8F14000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
28CF9160000
|
heap
|
page read and write
|
||
21FED17D000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
96BB763000
|
stack
|
page read and write
|
||
AC3A9FE000
|
stack
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
21FD5CB3000
|
trusted library allocation
|
page read and write
|
||
1CF1A484000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
21FE48F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
28CF8CA2000
|
heap
|
page read and write
|
||
21FED167000
|
heap
|
page read and write
|
||
28CF8E26000
|
heap
|
page read and write
|
||
21FD5B99000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
heap
|
page read and write
|
||
1CF22B7F000
|
heap
|
page read and write
|
||
9386D0D000
|
stack
|
page read and write
|
||
21628DF0000
|
trusted library allocation
|
page read and write
|
||
2164315E000
|
heap
|
page read and write
|
||
2162B887000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
BCF000
|
stack
|
page read and write
|
||
2162B88C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
2162C6F1000
|
trusted library allocation
|
page read and write
|
||
1B1DE000
|
stack
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
1CF22AE0000
|
heap
|
page execute and read and write
|
||
2162B883000
|
trusted library allocation
|
page read and write
|
||
A55000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
28CF8E6A000
|
heap
|
page read and write
|
||
21628DE0000
|
trusted library section
|
page read and write
|
||
21FED012000
|
heap
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
1CF0B416000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page read and write
|
||
21FD2FBA000
|
heap
|
page read and write
|
||
96BBA7E000
|
stack
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1CF1A411000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC9000
|
trusted library allocation
|
page read and write
|
||
1CF0B7D7000
|
trusted library allocation
|
page read and write
|
||
1CF0B6BA000
|
trusted library allocation
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
1CF22C02000
|
heap
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
21643220000
|
heap
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
AC3AFFC000
|
stack
|
page read and write
|
||
1CF08979000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
21628E7E000
|
heap
|
page read and write
|
||
9386E8E000
|
stack
|
page read and write
|
||
1CF1A420000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page execute and read and write
|
||
21FD2FB5000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
2162C1A3000
|
trusted library allocation
|
page read and write
|
||
28C81E2B000
|
trusted library allocation
|
page read and write
|
||
1CF22A0D000
|
heap
|
page read and write
|
||
277C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBAD000
|
trusted library allocation
|
page read and write
|
||
1CF22B73000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
1CF22C49000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
1B9AE000
|
stack
|
page read and write
|
||
2581000
|
trusted library allocation
|
page read and write
|
||
7FFD9B753000
|
trusted library allocation
|
page execute and read and write
|
||
7DF497370000
|
trusted library allocation
|
page execute and read and write
|
||
D10000
|
heap
|
page execute and read and write
|
||
AC3AA79000
|
stack
|
page read and write
|
||
7FFD9BAFC000
|
trusted library allocation
|
page read and write
|
||
1CF0B5B9000
|
trusted library allocation
|
page read and write
|
||
2162BCD9000
|
trusted library allocation
|
page read and write
|
||
21FD5BCA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7EF000
|
heap
|
page read and write
|
||
66C5279000
|
stack
|
page read and write
|
||
21FD2F50000
|
heap
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7CC000
|
heap
|
page read and write
|
||
2390000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page execute and read and write
|
||
21FD2FF0000
|
trusted library allocation
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
21FE4B35000
|
trusted library allocation
|
page read and write
|
||
28C90309000
|
trusted library allocation
|
page read and write
|
||
2162A8FE000
|
heap
|
page read and write
|
||
2164318A000
|
heap
|
page read and write
|
||
1B5DE000
|
stack
|
page read and write
|
||
1CF1A701000
|
trusted library allocation
|
page read and write
|
||
2162A785000
|
heap
|
page read and write
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
28C81347000
|
trusted library allocation
|
page read and write
|
||
28CF6E10000
|
heap
|
page read and write
|
||
7FFD9BB63000
|
trusted library allocation
|
page read and write
|
||
7DF485950000
|
trusted library allocation
|
page execute and read and write
|
||
74269FE000
|
stack
|
page read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
216431C7000
|
heap
|
page read and write
|
||
1CF22966000
|
heap
|
page execute and read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
96BC0BE000
|
stack
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page read and write
|
||
1CF0BB99000
|
trusted library allocation
|
page read and write
|
||
21FD5A14000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
9385F39000
|
stack
|
page read and write
|
||
96BBB79000
|
stack
|
page read and write
|
||
74260A3000
|
stack
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
21FD47E0000
|
heap
|
page execute and read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
1CF0C1F2000
|
trusted library allocation
|
page read and write
|
||
21FED198000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
21FE4BE4000
|
trusted library allocation
|
page read and write
|
||
2163AC02000
|
trusted library allocation
|
page read and write
|
||
21FD6240000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
9FC000
|
heap
|
page read and write
|
||
7FFD9BAC4000
|
trusted library allocation
|
page read and write
|
||
28C81954000
|
trusted library allocation
|
page read and write
|
||
21FD2D40000
|
heap
|
page read and write
|
||
2C11000
|
trusted library allocation
|
page read and write
|
||
21628E66000
|
heap
|
page read and write
|
||
21628DD0000
|
trusted library section
|
page read and write
|
||
28C811AB000
|
trusted library allocation
|
page read and write
|
||
7DF47AE90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
9385EBE000
|
stack
|
page read and write
|
||
1CF0A2C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B941000
|
trusted library allocation
|
page read and write
|
||
21FECE04000
|
heap
|
page read and write
|
||
1B323000
|
heap
|
page read and write
|
||
8A7000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
9E6000
|
heap
|
page read and write
|
||
9385AFD000
|
stack
|
page read and write
|
||
AC3BC4E000
|
stack
|
page read and write
|
||
1CF08A30000
|
heap
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
2162B87B000
|
trusted library allocation
|
page read and write
|
||
21FE4900000
|
trusted library allocation
|
page read and write
|
||
AC3ACF7000
|
stack
|
page read and write
|
||
1CE46230000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
25F6000
|
trusted library allocation
|
page read and write
|
||
28CF8F63000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
21FD6712000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
1BD70000
|
heap
|
page read and write
|
||
21FED010000
|
heap
|
page read and write
|
||
AC3AEFF000
|
stack
|
page read and write
|
||
1CF22860000
|
heap
|
page read and write
|
||
21FD48E0000
|
heap
|
page read and write
|
||
9385A73000
|
stack
|
page read and write
|
||
21FD59B1000
|
trusted library allocation
|
page read and write
|
||
21642F00000
|
heap
|
page execute and read and write
|
||
7DF4BB6B0000
|
trusted library allocation
|
page execute and read and write
|
||
990000
|
heap
|
page read and write
|
||
21FD47F0000
|
trusted library allocation
|
page read and write
|
||
21FD4820000
|
trusted library allocation
|
page read and write
|
||
21642F57000
|
heap
|
page execute and read and write
|
||
28CF6B90000
|
heap
|
page read and write
|
||
28CF6D40000
|
trusted library allocation
|
page read and write
|
||
28C810C3000
|
trusted library allocation
|
page read and write
|
||
21FD5985000
|
trusted library allocation
|
page read and write
|
||
9C4000
|
heap
|
page read and write
|
||
21FED240000
|
trusted library allocation
|
page read and write
|
||
28CF8867000
|
heap
|
page execute and read and write
|
||
28C81063000
|
trusted library allocation
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
A07000
|
heap
|
page read and write
|
||
2162C206000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
21FD3010000
|
heap
|
page read and write
|
||
2164314B000
|
heap
|
page read and write
|
||
AEE000
|
stack
|
page read and write
|
||
96BB7ED000
|
stack
|
page read and write
|
||
A5D000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
2163A911000
|
trusted library allocation
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
1A5B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
1B69E000
|
stack
|
page read and write
|
||
7426879000
|
stack
|
page read and write
|
||
28CF6D90000
|
trusted library allocation
|
page read and write
|
||
21FED320000
|
heap
|
page read and write
|
||
21FD66CD000
|
trusted library allocation
|
page read and write
|
||
21FD2F80000
|
heap
|
page read and write
|
||
7FFD9BAB2000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
1CF0C217000
|
trusted library allocation
|
page read and write
|
||
96BBF3A000
|
stack
|
page read and write
|
||
21FED13D000
|
heap
|
page read and write
|
||
1CF1A6FD000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
74264FE000
|
stack
|
page read and write
|
||
96BBD79000
|
stack
|
page read and write
|
||
2162A6D0000
|
trusted library allocation
|
page read and write
|
||
28CF8C4F000
|
heap
|
page read and write
|
||
28C90031000
|
trusted library allocation
|
page read and write
|
||
7FFD9B94A000
|
trusted library allocation
|
page read and write
|
||
28C902F1000
|
trusted library allocation
|
page read and write
|
||
1CF0B71B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
FC2000
|
heap
|
page read and write
|
||
7FF4E63E0000
|
trusted library allocation
|
page execute and read and write
|
||
96BC03F000
|
stack
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
1BFAA000
|
stack
|
page read and write
|
||
21FD54F8000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
1CF0A8DD000
|
trusted library allocation
|
page read and write
|
||
1CF2294F000
|
heap
|
page read and write
|
||
21628EAA000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
21628D40000
|
heap
|
page read and write
|
||
1B2F6000
|
heap
|
page read and write
|
||
1B8AE000
|
stack
|
page read and write
|
||
21642F50000
|
heap
|
page execute and read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
1CF08942000
|
heap
|
page read and write
|
||
2162AB39000
|
trusted library allocation
|
page read and write
|
||
28C81160000
|
trusted library allocation
|
page read and write
|
||
21643201000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
2162A6C0000
|
heap
|
page readonly
|
||
1CF22B77000
|
heap
|
page read and write
|
||
21FD6119000
|
trusted library allocation
|
page read and write
|
||
9D5000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1CF1A441000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page execute and read and write
|
||
28C81DE1000
|
trusted library allocation
|
page read and write
|
||
7426677000
|
stack
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC3000
|
trusted library allocation
|
page read and write
|
||
28C8186C000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
AC3ADF8000
|
stack
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
AC3A873000
|
stack
|
page read and write
|
||
21642F60000
|
trusted library allocation
|
page read and write
|
||
28CF87F0000
|
heap
|
page execute and read and write
|
||
A14000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
1CF089B9000
|
heap
|
page read and write
|
||
1B340000
|
heap
|
page read and write
|
||
21628E6C000
|
heap
|
page read and write
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
96BBEB8000
|
stack
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
1B7AE000
|
stack
|
page read and write
|
||
21FD3000000
|
heap
|
page readonly
|
||
1CF089B7000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page execute and read and write
|
||
21FD5ACC000
|
trusted library allocation
|
page read and write
|
||
28CF6D50000
|
heap
|
page readonly
|
||
28C80A55000
|
trusted library allocation
|
page read and write
|
||
28CF6BA2000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page execute and read and write
|
||
CF4000
|
stack
|
page read and write
|
||
28CF6C17000
|
heap
|
page read and write
|
||
2C1C000
|
trusted library allocation
|
page read and write
|
||
21FD2FD0000
|
trusted library allocation
|
page read and write
|
||
2162A900000
|
heap
|
page read and write
|
||
21FD47C0000
|
heap
|
page execute and read and write
|
||
28CF6D20000
|
trusted library allocation
|
page read and write
|
||
12C13000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7426A7C000
|
stack
|
page read and write
|
||
9F3000
|
heap
|
page read and write
|
||
21FD6717000
|
trusted library allocation
|
page read and write
|
||
276F000
|
stack
|
page read and write
|
||
28C90001000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
1B30E000
|
heap
|
page read and write
|
||
21628DA0000
|
heap
|
page read and write
|
||
2164291B000
|
heap
|
page read and write
|
||
DA5000
|
heap
|
page read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
28CF6C90000
|
heap
|
page read and write
|
||
21643164000
|
heap
|
page read and write
|
||
C35000
|
heap
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
93861BE000
|
stack
|
page read and write
|
||
28CF6BD1000
|
heap
|
page read and write
|
||
21FD2EB6000
|
heap
|
page read and write
|
||
1CF22CB5000
|
heap
|
page read and write
|
||
AC3AF7E000
|
stack
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
9385CFE000
|
stack
|
page read and write
|
||
21FD54EE000
|
trusted library allocation
|
page read and write
|
||
1CF0A48F000
|
trusted library allocation
|
page read and write
|
||
21643239000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
1CF22A17000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
B8F000
|
stack
|
page read and write
|
||
1CF0B017000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
7FFD9BAF2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
1CF1A70B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B75D000
|
trusted library allocation
|
page execute and read and write
|
||
21FECE08000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
28CF8C91000
|
heap
|
page read and write
|
||
28CF8C6F000
|
heap
|
page read and write
|
||
1B23E000
|
stack
|
page read and write
|
||
1ABDD000
|
stack
|
page read and write
|
||
28CF8720000
|
heap
|
page read and write
|
||
AC3A8FE000
|
stack
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
265C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
21628E60000
|
heap
|
page read and write
|
||
21FD5891000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
21FECD72000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
F8F000
|
heap
|
page read and write
|
||
257E000
|
stack
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
1CF0A400000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7DF497380000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA83000
|
trusted library allocation
|
page read and write
|
||
96BCD8C000
|
stack
|
page read and write
|
||
23D3000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
1CF0B442000
|
trusted library allocation
|
page read and write
|
||
1B43F000
|
stack
|
page read and write
|
||
1A909000
|
heap
|
page read and write
|
||
28C80C31000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
96BCD0C000
|
stack
|
page read and write
|
||
2162A8A5000
|
heap
|
page read and write
|
||
742774E000
|
stack
|
page read and write
|
||
28C90071000
|
trusted library allocation
|
page read and write
|
||
7426B7B000
|
stack
|
page read and write
|
||
28CF8C10000
|
heap
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
1CF22A00000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
28CF6AA0000
|
heap
|
page read and write
|
||
7FFD9B754000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
1CF08977000
|
heap
|
page read and write
|
||
900000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B806000
|
trusted library allocation
|
page read and write
|
||
9D2000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
96BCC87000
|
stack
|
page read and write
|
||
1CF22C92000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
2162BBBB000
|
trusted library allocation
|
page read and write
|
||
21FD2FB0000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
9385BFE000
|
stack
|
page read and write
|
||
1CE46309000
|
heap
|
page read and write
|
||
21FD58F6000
|
trusted library allocation
|
page read and write
|
||
216430C0000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
2162B946000
|
trusted library allocation
|
page read and write
|
||
66C52FE000
|
unkown
|
page read and write
|
||
21628E20000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
28C813C9000
|
trusted library allocation
|
page read and write
|
||
AC3AB77000
|
stack
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
1CF1A709000
|
trusted library allocation
|
page read and write
|
||
1CE46240000
|
heap
|
page read and write
|
||
28CF8C26000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
F3B000
|
heap
|
page read and write
|
||
28CF6E40000
|
heap
|
page read and write
|
||
1B90A000
|
stack
|
page read and write
|
||
7FFD9B958000
|
trusted library allocation
|
page read and write
|
||
AC3A97E000
|
stack
|
page read and write
|
||
2162C716000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
7EA000
|
heap
|
page read and write
|
||
7FFD9B995000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
28C81032000
|
trusted library allocation
|
page read and write
|
||
21FD47C6000
|
heap
|
page execute and read and write
|
||
21FD2FA0000
|
trusted library section
|
page read and write
|
||
21643229000
|
heap
|
page read and write
|
||
74261AE000
|
stack
|
page read and write
|
||
1CF08930000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
21FECE35000
|
heap
|
page read and write
|
||
1CF22C8C000
|
heap
|
page read and write
|
||
1CF08938000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1CE46300000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
66C537F000
|
stack
|
page read and write
|
||
21FECDFC000
|
heap
|
page read and write
|
||
FC5000
|
heap
|
page read and write
|
||
7426579000
|
stack
|
page read and write
|
||
21FED179000
|
heap
|
page read and write
|
||
74265FE000
|
stack
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
21FED072000
|
heap
|
page read and write
|
||
1CF08C10000
|
heap
|
page read and write
|
||
7FFD9BAA3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BABC000
|
trusted library allocation
|
page read and write
|
||
96BCC0E000
|
stack
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
2922000
|
trusted library allocation
|
page read and write
|
||
1CF0A2B5000
|
heap
|
page read and write
|
||
AC3BB49000
|
stack
|
page read and write
|
||
1CF0B74F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B938000
|
trusted library allocation
|
page read and write
|
||
21FD5341000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
1CF0B56F000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
266F000
|
stack
|
page read and write
|
||
2163A984000
|
trusted library allocation
|
page read and write
|
||
1CF0A2B0000
|
heap
|
page read and write
|
||
28CF8D30000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
AC3AAFE000
|
stack
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
216430D4000
|
heap
|
page read and write
|
||
21FD2FC0000
|
trusted library section
|
page read and write
|
||
1AFF0000
|
heap
|
page execute and read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
21FD6073000
|
trusted library allocation
|
page read and write
|
||
21FD66F2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B80C000
|
trusted library allocation
|
page execute and read and write
|
||
28CF8860000
|
heap
|
page execute and read and write
|
||
28C80D72000
|
trusted library allocation
|
page read and write
|
||
28CF8E18000
|
heap
|
page read and write
|
||
7FFD9BAA9000
|
trusted library allocation
|
page read and write
|
||
1B6A0000
|
heap
|
page execute and read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
1CE46625000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
2162C098000
|
trusted library allocation
|
page read and write
|
||
21FD617F000
|
trusted library allocation
|
page read and write
|
||
A51000
|
heap
|
page read and write
|
||
9385C79000
|
stack
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
1CF0B18D000
|
trusted library allocation
|
page read and write
|
||
12C18000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
96BBDBE000
|
stack
|
page read and write
|
||
28CF6E45000
|
heap
|
page read and write
|
||
21FE4911000
|
trusted library allocation
|
page read and write
|
||
28CF6E15000
|
heap
|
page read and write
|
||
1CF22CD1000
|
heap
|
page read and write
|
||
21FECD40000
|
heap
|
page read and write
|
||
1B0FE000
|
stack
|
page read and write
|
||
1CF22960000
|
heap
|
page execute and read and write
|
||
28CF6B98000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
21FD5922000
|
trusted library allocation
|
page read and write
|
||
938603C000
|
stack
|
page read and write
|
||
2162B87F000
|
trusted library allocation
|
page read and write
|
||
1CF0BC7E000
|
trusted library allocation
|
page read and write
|
||
F3D000
|
heap
|
page read and write
|
||
1CF22B7B000
|
heap
|
page read and write
|
||
1B19D000
|
stack
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page execute and read and write
|
||
28CF6BDB000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
2453000
|
heap
|
page read and write
|
||
12773000
|
trusted library allocation
|
page read and write
|
||
1CF22B83000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
2162A7C0000
|
trusted library allocation
|
page read and write
|
||
1CF0897B000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
F07000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
21FE4BFC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
21FED180000
|
heap
|
page read and write
|
||
21628EA5000
|
heap
|
page read and write
|
||
1CF22B20000
|
heap
|
page read and write
|
||
28C811DE000
|
trusted library allocation
|
page read and write
|
||
2162A790000
|
trusted library allocation
|
page read and write
|
||
21FD4DBD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
12C11000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
9385FB9000
|
stack
|
page read and write
|
||
99C000
|
heap
|
page read and write
|
||
7FFD9B90A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
74276CD000
|
stack
|
page read and write
|
||
2C1F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7427649000
|
stack
|
page read and write
|
||
21FE4BEA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
853000
|
heap
|
page read and write
|
||
28C81893000
|
trusted library allocation
|
page read and write
|
||
28C81342000
|
trusted library allocation
|
page read and write
|
||
2163ABFD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB4A000
|
trusted library allocation
|
page read and write
|
||
74261EF000
|
stack
|
page read and write
|
||
1CF0B11D000
|
trusted library allocation
|
page read and write
|
||
28CF6CB0000
|
heap
|
page read and write
|
||
9E2000
|
heap
|
page read and write
|
||
1CE46620000
|
heap
|
page read and write
|
||
7FFD9BAB8000
|
trusted library allocation
|
page read and write
|
||
2163AC1C000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page execute and read and write
|
||
1CF08C15000
|
heap
|
page read and write
|
||
7FFD9BBCD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
28CF8F25000
|
heap
|
page read and write
|
||
1CF22D40000
|
trusted library allocation
|
page read and write
|
||
96BBE36000
|
stack
|
page read and write
|
||
21FD2EB4000
|
heap
|
page read and write
|
||
AC3BA4C000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
21628DB0000
|
heap
|
page read and write
|
||
96BCB8C000
|
stack
|
page read and write
|
||
714000
|
stack
|
page read and write
|
||
7FFD9BAD8000
|
trusted library allocation
|
page read and write
|
||
74268F9000
|
stack
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
1B7CE000
|
stack
|
page read and write
|
||
28CF85F0000
|
heap
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
2163A931000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
1CE4630E000
|
heap
|
page read and write
|
||
1BC70000
|
heap
|
page read and write
|
||
AC3B9CF000
|
stack
|
page read and write
|
||
28CF6BCC000
|
heap
|
page read and write
|
||
2162C736000
|
trusted library allocation
|
page read and write
|
||
7FFD9B912000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
1CF08A50000
|
heap
|
page read and write
|
||
C43000
|
trusted library allocation
|
page read and write
|
||
12658000
|
trusted library allocation
|
page read and write
|
||
1CF0A300000
|
heap
|
page execute and read and write
|
||
9D8000
|
heap
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
2162A710000
|
heap
|
page execute and read and write
|
||
1CF0BD60000
|
trusted library allocation
|
page read and write
|
||
1CF0B00F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
74267F7000
|
stack
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1CF0BCA5000
|
trusted library allocation
|
page read and write
|
||
2162B697000
|
trusted library allocation
|
page read and write
|
||
96BBFBE000
|
stack
|
page read and write
|
||
F28000
|
heap
|
page read and write
|
||
1B13E000
|
stack
|
page read and write
|
||
28C804CD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
96BBAFE000
|
stack
|
page read and write
|
||
21FECF00000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
74266FD000
|
stack
|
page read and write
|
||
9386E0C000
|
stack
|
page read and write
|
||
1CF228B8000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
9386C0E000
|
stack
|
page read and write
|
||
AC3AE7E000
|
stack
|
page read and write
|
||
28CF6CE0000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAC4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
1CF0B382000
|
trusted library allocation
|
page read and write
|
||
1BC5C000
|
stack
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7426779000
|
stack
|
page read and write
|
||
1CF22B6F000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
96BBBFE000
|
stack
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
28CF8F54000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B752000
|
trusted library allocation
|
page read and write
|
||
28C8130F000
|
trusted library allocation
|
page read and write
|
||
2162B877000
|
trusted library allocation
|
page read and write
|
||
A59000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
21FD2E8D000
|
heap
|
page read and write
|
||
21FD2E6F000
|
heap
|
page read and write
|
||
3F0000
|
unkown
|
page readonly
|
||
9D0000
|
heap
|
page read and write
|
||
21FD2F21000
|
heap
|
page read and write
|
||
21FD2E38000
|
heap
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
1CF22CBD000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
21FD5CB7000
|
trusted library allocation
|
page read and write
|
||
96BCB0E000
|
stack
|
page read and write
|
||
2162A845000
|
heap
|
page read and write
|
||
12653000
|
trusted library allocation
|
page read and write
|
||
1CF0AE62000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BD000
|
trusted library allocation
|
page execute and read and write
|
||
9385B7E000
|
stack
|
page read and write
|
||
2163A941000
|
trusted library allocation
|
page read and write
|
||
1CF22CCC000
|
heap
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
1CF0B055000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA6000
|
trusted library allocation
|
page read and write
|
||
2162C265000
|
trusted library allocation
|
page read and write
|
||
1B2D0000
|
heap
|
page read and write
|
||
1ACFE000
|
stack
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
1CF0BD66000
|
trusted library allocation
|
page read and write
|
||
1CF0898F000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
21FD6158000
|
trusted library allocation
|
page read and write
|
||
1B79E000
|
stack
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1CF0A340000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1CF22BA9000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
21FD2F30000
|
heap
|
page read and write
|
||
2470000
|
heap
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7B4000
|
trusted library allocation
|
page read and write
|
||
12581000
|
trusted library allocation
|
page read and write
|
||
7FFD9BADA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B974000
|
trusted library allocation
|
page read and write
|
||
21FD2EB9000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
10FF000
|
stack
|
page read and write
|
||
544000
|
stack
|
page read and write
|
||
1CF0A230000
|
heap
|
page read and write
|
||
21FEC8FD000
|
heap
|
page read and write
|
||
2162BC9B000
|
trusted library allocation
|
page read and write
|
||
21628C60000
|
heap
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
2162A862000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
9385E77000
|
stack
|
page read and write
|
||
28C80001000
|
trusted library allocation
|
page read and write
|
||
74275CE000
|
stack
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
1CF22DF0000
|
heap
|
page read and write
|
||
1CF228A4000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
A01000
|
heap
|
page read and write
|
||
28C81097000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
216430D0000
|
heap
|
page read and write
|
||
1AB0C000
|
stack
|
page read and write
|
||
742612E000
|
stack
|
page read and write
|
||
1CF0A270000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE4000
|
trusted library allocation
|
page read and write
|
||
AC3AC79000
|
stack
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
21FD5BFC000
|
trusted library allocation
|
page read and write
|
||
1CF22418000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7DF485940000
|
trusted library allocation
|
page execute and read and write
|
||
AC3BACE000
|
stack
|
page read and write
|
||
96BCE0E000
|
stack
|
page read and write
|
||
7FFD9B76B000
|
trusted library allocation
|
page read and write
|
||
1CF08973000
|
heap
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
21FECD79000
|
heap
|
page read and write
|
||
1CF08840000
|
heap
|
page read and write
|
||
2651000
|
trusted library allocation
|
page read and write
|
||
7DF47AE80000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
996000
|
heap
|
page read and write
|
||
28C80229000
|
trusted library allocation
|
page read and write
|
||
1CF0A639000
|
trusted library allocation
|
page read and write
|
||
21FD47D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB5C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
9385D77000
|
stack
|
page read and write
|
||
28CF8E10000
|
heap
|
page read and write
|
||
1B59E000
|
stack
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
21FD5522000
|
trusted library allocation
|
page read and write
|
||
7FFD9B934000
|
trusted library allocation
|
page read and write
|
||
742754E000
|
stack
|
page read and write
|
||
1B0F0000
|
heap
|
page read and write
|
||
F67000
|
heap
|
page read and write
|
||
28CF6C1A000
|
heap
|
page read and write
|
||
93860BF000
|
stack
|
page read and write
|
||
2162A998000
|
trusted library allocation
|
page read and write
|
||
1BA14000
|
stack
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
1CF22A28000
|
heap
|
page read and write
|
||
1CF0C23C000
|
trusted library allocation
|
page read and write
|
||
1CF0B534000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
21628E5E000
|
heap
|
page read and write
|
||
1CF22CDF000
|
heap
|
page read and write
|
||
1CF0B4D2000
|
trusted library allocation
|
page read and write
|
||
2162A803000
|
heap
|
page read and write
|
||
1CF0C07D000
|
trusted library allocation
|
page read and write
|
||
28CF88C0000
|
heap
|
page execute and read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
23B0000
|
trusted library allocation
|
page read and write
|
||
96BBCFE000
|
stack
|
page read and write
|
||
1CF22B31000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB9C000
|
trusted library allocation
|
page read and write
|
||
28CF8E35000
|
heap
|
page read and write
|
||
2C21000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
21642E20000
|
heap
|
page read and write
|
||
A12000
|
heap
|
page read and write
|
||
2162B513000
|
trusted library allocation
|
page read and write
|
||
28CF8CA5000
|
heap
|
page read and write
|
||
938613E000
|
stack
|
page read and write
|
||
2162C73B000
|
trusted library allocation
|
page read and write
|
||
2163AC0C000
|
trusted library allocation
|
page read and write
|
||
9386C8C000
|
stack
|
page read and write
|
||
28CF8840000
|
trusted library allocation
|
page read and write
|
||
938623B000
|
stack
|
page read and write
|
||
7C6000
|
heap
|
page read and write
|
||
23C0000
|
heap
|
page execute and read and write
|
||
2162BA37000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
AC3BBCC000
|
stack
|
page read and write
|
||
21FE4921000
|
trusted library allocation
|
page read and write
|
||
21FD48F1000
|
trusted library allocation
|
page read and write
|
||
2163AC04000
|
trusted library allocation
|
page read and write
|
||
21FD5670000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
21FECDD0000
|
heap
|
page read and write
|
||
28CF6BED000
|
heap
|
page read and write
|
||
1CF2288D000
|
heap
|
page read and write
|
||
2162A800000
|
heap
|
page read and write
|
||
1BFEF000
|
stack
|
page read and write
|
||
12588000
|
trusted library allocation
|
page read and write
|
||
21FECE10000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
12771000
|
trusted library allocation
|
page read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
2162A911000
|
trusted library allocation
|
page read and write
|
||
28C81E06000
|
trusted library allocation
|
page read and write
|
||
2162ADDD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
2162B521000
|
trusted library allocation
|
page read and write
|
||
21628E10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
2162BAEE000
|
trusted library allocation
|
page read and write
|
||
28CF6C15000
|
heap
|
page read and write
|
||
7DF4BB6C0000
|
trusted library allocation
|
page execute and read and write
|
||
21FE4BDD000
|
trusted library allocation
|
page read and write
|
||
2162B8E9000
|
trusted library allocation
|
page read and write
|
||
836000
|
heap
|
page read and write
|
There are 1016 hidden memdumps, click here to show them.