Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
2RM12KtuNp.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Program Files\Microsoft Office 15\ClientX64\smss.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Microsoft Office 15\ClientX64\smss.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Windows Mail\fuBYljHeUjtkgvlnN.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Windows Mail\fuBYljHeUjtkgvlnN.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Recovery\fuBYljHeUjtkgvlnN.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\sppsvc.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\sppsvc.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\2RM12KtuNp.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6097a71ae8c8063dafca0bb1115c8c625898b3ca.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6097a71ae8c8063dafca0bb1115c8c625898b3ca.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\7e00ec7d-7c2b-46a0-b437-c1650ed4cfe9.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\95f930af-8a5c-4110-bf02-41517346f671.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\LsQlNPpiOn.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\b0c9a6b4-f4b7-4599-b561-a3049e581ced.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\df7dcee1-31d9-41cd-9118-ff1c3adb1964.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Microsoft Office 15\ClientX64\69ddcba757bf72
|
ASCII text, with very long lines (490), with no line terminators
|
dropped
|
||
C:\Program Files\Windows Mail\c321b7ff01a2d7
|
ASCII text, with very long lines (405), with no line terminators
|
dropped
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\24dbde2999530e
|
ASCII text, with very long lines (972), with no line terminators
|
dropped
|
||
C:\Recovery\0a1fd5f707cd16
|
ASCII text, with very long lines (570), with no line terminators
|
dropped
|
||
C:\Recovery\c321b7ff01a2d7
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Recovery\fuBYljHeUjtkgvlnN.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\WmiPrvSE.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fuBYljHeUjtkgvlnN.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\smss.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\sppsvc.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\23hskQW7hB
|
ASCII text, with no line terminators
|
dropped
|
||
\Device\Null
|
ASCII text
|
dropped
|
There are 20 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\2RM12KtuNp.exe
|
"C:\Users\user\Desktop\2RM12KtuNp.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe'"
/rl HIGHEST /f
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe
|
"C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\smss.exe'" /f
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe
|
"C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office 15\ClientX64\smss.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\smss.exe'" /rl HIGHEST
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "fuBYljHeUjtkgvlnNf" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Mail\fuBYljHeUjtkgvlnN.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "fuBYljHeUjtkgvlnN" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\fuBYljHeUjtkgvlnN.exe'" /rl HIGHEST
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "fuBYljHeUjtkgvlnNf" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Mail\fuBYljHeUjtkgvlnN.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Recovery\sppsvc.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\sppsvc.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Recovery\sppsvc.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "fuBYljHeUjtkgvlnNf" /sc MINUTE /mo 12 /tr "'C:\Recovery\fuBYljHeUjtkgvlnN.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "fuBYljHeUjtkgvlnN" /sc ONLOGON /tr "'C:\Recovery\fuBYljHeUjtkgvlnN.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "fuBYljHeUjtkgvlnNf" /sc MINUTE /mo 13 /tr "'C:\Recovery\fuBYljHeUjtkgvlnN.exe'" /rl HIGHEST /f
|
||
C:\Recovery\fuBYljHeUjtkgvlnN.exe
|
C:\Recovery\fuBYljHeUjtkgvlnN.exe
|
||
C:\Recovery\fuBYljHeUjtkgvlnN.exe
|
C:\Recovery\fuBYljHeUjtkgvlnN.exe
|
||
C:\Program Files\Microsoft Office 15\ClientX64\smss.exe
|
"C:\Program Files\Microsoft Office 15\ClientX64\smss.exe"
|
||
C:\Program Files\Microsoft Office 15\ClientX64\smss.exe
|
"C:\Program Files\Microsoft Office 15\ClientX64\smss.exe"
|
||
C:\Recovery\sppsvc.exe
|
C:\Recovery\sppsvc.exe
|
||
C:\Recovery\sppsvc.exe
|
C:\Recovery\sppsvc.exe
|
||
C:\Program Files\Microsoft Office 15\ClientX64\smss.exe
|
"C:\Program Files\Microsoft Office 15\ClientX64\smss.exe"
|
||
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe
|
"C:\Users\All Users\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\WmiPrvSE.exe"
|
||
C:\Program Files\Microsoft Office 15\ClientX64\smss.exe
|
"C:\Program Files\Microsoft Office 15\ClientX64\smss.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\df7dcee1-31d9-41cd-9118-ff1c3adb1964.vbs"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\95f930af-8a5c-4110-bf02-41517346f671.vbs"
|
||
C:\Program Files\Microsoft Office 15\ClientX64\smss.exe
|
"C:\Program Files\Microsoft Office 15\ClientX64\smss.exe"
|
||
C:\Recovery\fuBYljHeUjtkgvlnN.exe
|
"C:\Recovery\fuBYljHeUjtkgvlnN.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\b0c9a6b4-f4b7-4599-b561-a3049e581ced.vbs"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\7e00ec7d-7c2b-46a0-b437-c1650ed4cfe9.vbs"
|
||
C:\Program Files\Microsoft Office 15\ClientX64\smss.exe
|
"C:\Program Files\Microsoft Office 15\ClientX64\smss.exe"
|
||
C:\Recovery\sppsvc.exe
|
"C:\Recovery\sppsvc.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\LsQlNPpiOn.bat"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
There are 28 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://rustpidc.beget.tech/L1nc0In.php?BUISt3=gMc0F&6MLl4TR7bW=lK7at6jiv9hnPMHdbskIx3H&JkwIAjLj8Zrj5q=Q2STSZi6ZxzzP0N4rChRJJbhM&f148c750bfef76378faaa4b867763122=286f23a1c4240333304536fe42a67044&fb9e0fc349ccee31b4da9f95d6e3cb16=gZhJTO4YmNwAjY3YjMmhTMkZWM4MjYlZjNldTZ4kTYhFzNmZGZwYWM&BUISt3=gMc0F&6MLl4TR7bW=lK7at6jiv9hnPMHdbskIx3H&JkwIAjLj8Zrj5q=Q2STSZi6ZxzzP0N4rChRJJbhM
|
5.101.153.173
|
||
http://rustpidc.beget.tech/L1nc0In.php?N39Ok=XWYIyBbUvr4DFdLfiF&4i2q7jz9vgbe7=vWHj0x15g3ZlPI26sU&f148c750bfef76378faaa4b867763122=286f23a1c4240333304536fe42a67044&fb9e0fc349ccee31b4da9f95d6e3cb16=gZhJTO4YmNwAjY3YjMmhTMkZWM4MjYlZjNldTZ4kTYhFzNmZGZwYWM&N39Ok=XWYIyBbUvr4DFdLfiF&4i2q7jz9vgbe7=vWHj0x15g3ZlPI26sU
|
5.101.153.173
|
||
http://rustpidc.beget.tech/L1nc0In.php?BuNhwMAFa=QXwieGICprMaqtoXap&jd0MRJxHvBVhUH6JQRzFfcK0KC=Ed2ZvUQ1DZLfYr8WAUJ&TtkYFlkTGTABPiso2mjMEP3tEvaY=FKgAKRV3eTJu7uuZJQ&f148c750bfef76378faaa4b867763122=286f23a1c4240333304536fe42a67044&fb9e0fc349ccee31b4da9f95d6e3cb16=gZhJTO4YmNwAjY3YjMmhTMkZWM4MjYlZjNldTZ4kTYhFzNmZGZwYWM&BuNhwMAFa=QXwieGICprMaqtoXap&jd0MRJxHvBVhUH6JQRzFfcK0KC=Ed2ZvUQ1DZLfYr8WAUJ&TtkYFlkTGTABPiso2mjMEP3tEvaY=FKgAKRV3eTJu7uuZJQ
|
5.101.153.173
|
||
http://rustpidc.beget.tech/L1nc0In.php?hL1oib=F7svBDITavvsiMUM48DwwrYA4a2M&CPaHE=J0wQF4pCw3PU7M87pf&GYis1kL6LYgVkdnLVHs71=omGpF&f148c750bfef76378faaa4b867763122=286f23a1c4240333304536fe42a67044&fb9e0fc349ccee31b4da9f95d6e3cb16=gZhJTO4YmNwAjY3YjMmhTMkZWM4MjYlZjNldTZ4kTYhFzNmZGZwYWM&hL1oib=F7svBDITavvsiMUM48DwwrYA4a2M&CPaHE=J0wQF4pCw3PU7M87pf&GYis1kL6LYgVkdnLVHs71=omGpF
|
5.101.153.173
|
||
http://rustpidc.beget.tech/L1nc0In.php?06RoA4NR89d4K3EShtj=aSiNSsqThhMbt535NoXiND&R2rvqZ8E8OS=iXDVRO&tawCKOAIE3WBcX8RVl794idNNaxU=JSFTUT2e0hgqQ3KmN0&f148c750bfef76378faaa4b867763122=286f23a1c4240333304536fe42a67044&fb9e0fc349ccee31b4da9f95d6e3cb16=gZhJTO4YmNwAjY3YjMmhTMkZWM4MjYlZjNldTZ4kTYhFzNmZGZwYWM&06RoA4NR89d4K3EShtj=aSiNSsqThhMbt535NoXiND&R2rvqZ8E8OS=iXDVRO&tawCKOAIE3WBcX8RVl794idNNaxU=JSFTUT2e0hgqQ3KmN0
|
5.101.153.173
|
||
http://rustpidc.beget.tech/L1nc0In.php?pmv=PZopg0ihS&f148c750bfef76378faaa4b867763122=286f23a1c4240333304536fe42a67044&fb9e0fc349ccee31b4da9f95d6e3cb16=gZhJTO4YmNwAjY3YjMmhTMkZWM4MjYlZjNldTZ4kTYhFzNmZGZwYWM&pmv=PZopg0ihS
|
5.101.153.173
|
||
http://rustpidc.beget.tech/
|
unknown
|
||
http://rustpidc.beget.tech/L1nc0In.php?N39Ok=XWYIyBbUvr4DFdLfiF&4i2q7jz9vgbe7=vWHj0x15g3ZlPI26sU&f14
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://rustpidc.beget.tech
|
unknown
|
||
http://rustpidc.bePb
|
unknown
|
There are 1 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
rustpidc.beget.tech
|
5.101.153.173
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
5.101.153.173
|
rustpidc.beget.tech
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
WmiPrvSE
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
smss
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
fuBYljHeUjtkgvlnN
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
fuBYljHeUjtkgvlnN
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
sppsvc
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
sppsvc
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
EnableLUA
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
PromptOnSecureDesktop
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
fuBYljHeUjtkgvlnN
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
fuBYljHeUjtkgvlnN
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\ae183e70fa10b40c51d2985e629a5c1ffae1fca0
|
6d20079632e1c7e3d849bbfc8a5577e0c16b9b53
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\smss_RASMANCS
|
FileDirectory
|
There are 26 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2491000
|
trusted library allocation
|
page read and write
|
||
1249D000
|
trusted library allocation
|
page read and write
|
||
286D000
|
trusted library allocation
|
page read and write
|
||
2CFD000
|
trusted library allocation
|
page read and write
|
||
27C1000
|
trusted library allocation
|
page read and write
|
||
2B01000
|
trusted library allocation
|
page read and write
|
||
2EA1000
|
trusted library allocation
|
page read and write
|
||
3061000
|
trusted library allocation
|
page read and write
|
||
2952000
|
trusted library allocation
|
page read and write
|
||
29A1000
|
trusted library allocation
|
page read and write
|
||
2831000
|
trusted library allocation
|
page read and write
|
||
2E11000
|
trusted library allocation
|
page read and write
|
||
2B10000
|
trusted library allocation
|
page read and write
|
||
2D01000
|
trusted library allocation
|
page read and write
|
||
2CC1000
|
trusted library allocation
|
page read and write
|
||
2FAD000
|
trusted library allocation
|
page read and write
|
||
2F71000
|
trusted library allocation
|
page read and write
|
||
7FF848CBC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C83000
|
trusted library allocation
|
page execute and read and write
|
||
5D2000
|
heap
|
page read and write
|
||
7FF848E0C000
|
trusted library allocation
|
page read and write
|
||
1B369000
|
heap
|
page read and write
|
||
130D000
|
heap
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
2E74000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
1B4EE000
|
stack
|
page read and write
|
||
7FF848CA0000
|
trusted library allocation
|
page read and write
|
||
27C244C8000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page execute and read and write
|
||
DD0000
|
heap
|
page read and write
|
||
CC8000
|
heap
|
page read and write
|
||
5C303FD000
|
stack
|
page read and write
|
||
22B0000
|
heap
|
page read and write
|
||
7FF848C87000
|
trusted library allocation
|
page read and write
|
||
27C25F20000
|
heap
|
page read and write
|
||
129F1000
|
trusted library allocation
|
page read and write
|
||
127CD000
|
trusted library allocation
|
page read and write
|
||
13063000
|
trusted library allocation
|
page read and write
|
||
28CA000
|
trusted library allocation
|
page read and write
|
||
2CAF000
|
trusted library allocation
|
page read and write
|
||
2D06000
|
trusted library allocation
|
page read and write
|
||
107E000
|
heap
|
page read and write
|
||
2A6D000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1B07E000
|
stack
|
page read and write
|
||
1BB10000
|
heap
|
page execute and read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF848D3C000
|
trusted library allocation
|
page execute and read and write
|
||
27C244CE000
|
heap
|
page read and write
|
||
7FF848C88000
|
trusted library allocation
|
page read and write
|
||
1A97AF88000
|
heap
|
page read and write
|
||
27F1000
|
trusted library allocation
|
page read and write
|
||
7FF848D46000
|
trusted library allocation
|
page execute and read and write
|
||
2569000
|
trusted library allocation
|
page read and write
|
||
A83000
|
heap
|
page read and write
|
||
1C0A9000
|
heap
|
page read and write
|
||
7FF848EED000
|
trusted library allocation
|
page read and write
|
||
1CEAC000
|
heap
|
page read and write
|
||
2270000
|
trusted library allocation
|
page read and write
|
||
2DB3000
|
trusted library allocation
|
page read and write
|
||
1B61D000
|
stack
|
page read and write
|
||
27D7000
|
trusted library allocation
|
page read and write
|
||
7FF848C83000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
7FF848C7D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E31000
|
trusted library allocation
|
page read and write
|
||
26162CEB000
|
heap
|
page read and write
|
||
1E35D000
|
stack
|
page read and write
|
||
1B7BF000
|
stack
|
page read and write
|
||
27C244B0000
|
heap
|
page read and write
|
||
106D000
|
heap
|
page read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
1062000
|
heap
|
page read and write
|
||
7FF848C9D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E41000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
7FF848C83000
|
trusted library allocation
|
page read and write
|
||
26A6000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
1C13C000
|
heap
|
page read and write
|
||
12CC3000
|
trusted library allocation
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page read and write
|
||
26162F05000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
7FF848C92000
|
trusted library allocation
|
page read and write
|
||
7FF848C9C000
|
trusted library allocation
|
page read and write
|
||
7FF848C73000
|
trusted library allocation
|
page execute and read and write
|
||
C85000
|
heap
|
page read and write
|
||
26162D18000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
29E1000
|
trusted library allocation
|
page read and write
|
||
A75000
|
heap
|
page read and write
|
||
12FC4000
|
trusted library allocation
|
page read and write
|
||
1BBBE000
|
stack
|
page read and write
|
||
1FA91847000
|
heap
|
page read and write
|
||
1B3BE000
|
stack
|
page read and write
|
||
7FF848C93000
|
trusted library allocation
|
page read and write
|
||
1C121000
|
heap
|
page read and write
|
||
12E21000
|
trusted library allocation
|
page read and write
|
||
1B383000
|
heap
|
page read and write
|
||
28C4000
|
trusted library allocation
|
page read and write
|
||
2D7C000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
7FF848C73000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E2C000
|
trusted library allocation
|
page read and write
|
||
27D5000
|
trusted library allocation
|
page read and write
|
||
1FA91A60000
|
heap
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
12B8000
|
heap
|
page read and write
|
||
7FF848D76000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C63000
|
trusted library allocation
|
page execute and read and write
|
||
261646D0000
|
heap
|
page read and write
|
||
1AF7D000
|
stack
|
page read and write
|
||
26162CED000
|
heap
|
page read and write
|
||
7FF848C8D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F8A000
|
trusted library allocation
|
page read and write
|
||
1A860000
|
trusted library allocation
|
page read and write
|
||
1BDDE000
|
stack
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
1B5E3000
|
stack
|
page read and write
|
||
1B348000
|
heap
|
page read and write
|
||
E7F000
|
stack
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
7FF848C9D000
|
trusted library allocation
|
page execute and read and write
|
||
12A08000
|
trusted library allocation
|
page read and write
|
||
1B376000
|
heap
|
page read and write
|
||
1013000
|
heap
|
page read and write
|
||
2802000
|
trusted library allocation
|
page read and write
|
||
7FF848DC1000
|
trusted library allocation
|
page execute and read and write
|
||
5BB000
|
heap
|
page read and write
|
||
E1B000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page execute and read and write
|
||
5A6000
|
stack
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page execute and read and write
|
||
1C12C000
|
heap
|
page read and write
|
||
12A0C000
|
trusted library allocation
|
page read and write
|
||
DF1533A000
|
stack
|
page read and write
|
||
7FF848E2E000
|
trusted library allocation
|
page read and write
|
||
7FF848C8D000
|
trusted library allocation
|
page execute and read and write
|
||
1B02E000
|
stack
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
ABD000
|
heap
|
page read and write
|
||
1B7EE000
|
stack
|
page read and write
|
||
1B97E000
|
stack
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
7FF848C60000
|
trusted library allocation
|
page read and write
|
||
7FF848E61000
|
trusted library allocation
|
page read and write
|
||
27C2448B000
|
heap
|
page read and write
|
||
27C244C3000
|
heap
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
2DAD000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
7FF848E61000
|
trusted library allocation
|
page read and write
|
||
1B9B4000
|
stack
|
page read and write
|
||
EB3FBFF000
|
stack
|
page read and write
|
||
12491000
|
trusted library allocation
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
310F000
|
trusted library allocation
|
page read and write
|
||
7FF848C93000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CCC000
|
trusted library allocation
|
page execute and read and write
|
||
E91000
|
heap
|
page read and write
|
||
1B93F000
|
stack
|
page read and write
|
||
2BAD000
|
trusted library allocation
|
page read and write
|
||
12CD1000
|
trusted library allocation
|
page read and write
|
||
7FF848D46000
|
trusted library allocation
|
page execute and read and write
|
||
12A04000
|
trusted library allocation
|
page read and write
|
||
7FF848D16000
|
trusted library allocation
|
page read and write
|
||
26162D38000
|
heap
|
page read and write
|
||
1C154000
|
heap
|
page read and write
|
||
5CF000
|
heap
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF848CCC000
|
trusted library allocation
|
page execute and read and write
|
||
F6F000
|
stack
|
page read and write
|
||
2563000
|
trusted library allocation
|
page read and write
|
||
129E5000
|
trusted library allocation
|
page read and write
|
||
26162CB0000
|
heap
|
page read and write
|
||
1B0C0000
|
heap
|
page read and write
|
||
7FF848C78000
|
trusted library allocation
|
page read and write
|
||
12BB1000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
EB3F7FE000
|
stack
|
page read and write
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
10AE000
|
stack
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
159E000
|
stack
|
page read and write
|
||
12FF7000
|
trusted library allocation
|
page read and write
|
||
12A2A000
|
trusted library allocation
|
page read and write
|
||
7FF848C84000
|
trusted library allocation
|
page read and write
|
||
7FF848D8F000
|
trusted library allocation
|
page execute and read and write
|
||
8B7000
|
heap
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C93000
|
trusted library allocation
|
page read and write
|
||
26162D0B000
|
heap
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
ACC000
|
heap
|
page read and write
|
||
7FF848C7C000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
2D00000
|
trusted library allocation
|
page read and write
|
||
2758AFF000
|
stack
|
page read and write
|
||
12A1E000
|
trusted library allocation
|
page read and write
|
||
130F5000
|
trusted library allocation
|
page read and write
|
||
7FF848D88000
|
trusted library allocation
|
page execute and read and write
|
||
11D0000
|
heap
|
page read and write
|
||
EB3F6FA000
|
stack
|
page read and write
|
||
2CC2000
|
trusted library allocation
|
page read and write
|
||
D0F000
|
stack
|
page read and write
|
||
12FAF000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
1CAFE000
|
stack
|
page read and write
|
||
26162CCD000
|
heap
|
page read and write
|
||
27E7000
|
trusted library allocation
|
page read and write
|
||
7FF848CA4000
|
trusted library allocation
|
page read and write
|
||
7FF848C74000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
7FF848C7D000
|
trusted library allocation
|
page execute and read and write
|
||
1100000
|
heap
|
page read and write
|
||
C58000
|
heap
|
page read and write
|
||
1B72E000
|
stack
|
page read and write
|
||
12D03000
|
trusted library allocation
|
page read and write
|
||
7FF848CB4000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
7FF848C6D000
|
trusted library allocation
|
page execute and read and write
|
||
26A0000
|
trusted library allocation
|
page read and write
|
||
27C24496000
|
heap
|
page read and write
|
||
7FF848D88000
|
trusted library allocation
|
page execute and read and write
|
||
CD6000
|
heap
|
page read and write
|
||
106D000
|
heap
|
page read and write
|
||
1265000
|
heap
|
page read and write
|
||
26162D25000
|
heap
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page read and write
|
||
1C0E4000
|
heap
|
page read and write
|
||
27C24480000
|
heap
|
page read and write
|
||
27C24496000
|
heap
|
page read and write
|
||
D95000
|
heap
|
page read and write
|
||
129A1000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
27C244AE000
|
heap
|
page read and write
|
||
27C244F4000
|
heap
|
page read and write
|
||
29E5000
|
trusted library allocation
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
1A814000
|
heap
|
page read and write
|
||
12FC6000
|
trusted library allocation
|
page read and write
|
||
12A06000
|
trusted library allocation
|
page read and write
|
||
1AA1C000
|
stack
|
page read and write
|
||
1C3CE000
|
stack
|
page read and write
|
||
127C8000
|
trusted library allocation
|
page read and write
|
||
1B5ED000
|
stack
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
7FF848E64000
|
trusted library allocation
|
page read and write
|
||
129ED000
|
trusted library allocation
|
page read and write
|
||
1B4BF000
|
stack
|
page read and write
|
||
27C244D2000
|
heap
|
page read and write
|
||
12EA1000
|
trusted library allocation
|
page read and write
|
||
12D08000
|
trusted library allocation
|
page read and write
|
||
12A02000
|
trusted library allocation
|
page read and write
|
||
12CF000
|
stack
|
page read and write
|
||
1B355000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
12D51000
|
trusted library allocation
|
page read and write
|
||
27C244ED000
|
heap
|
page read and write
|
||
2A4F000
|
trusted library allocation
|
page read and write
|
||
1B1CE000
|
stack
|
page read and write
|
||
1BA50000
|
heap
|
page read and write
|
||
E0E000
|
heap
|
page read and write
|
||
7FF848E0E000
|
trusted library allocation
|
page read and write
|
||
1039000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
CBA000
|
heap
|
page read and write
|
||
C2C000
|
heap
|
page read and write
|
||
1B3F2000
|
heap
|
page read and write
|
||
CCE000
|
heap
|
page read and write
|
||
1CF11000
|
heap
|
page read and write
|
||
27C24440000
|
heap
|
page read and write
|
||
129FE000
|
trusted library allocation
|
page read and write
|
||
1B17D000
|
stack
|
page read and write
|
||
7FF848EB7000
|
trusted library allocation
|
page read and write
|
||
12D61000
|
trusted library allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
1AB30000
|
trusted library allocation
|
page read and write
|
||
5F9000
|
heap
|
page read and write
|
||
1AF80000
|
heap
|
page read and write
|
||
26162D26000
|
heap
|
page read and write
|
||
2A69000
|
trusted library allocation
|
page read and write
|
||
27C244F5000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
1BD80000
|
heap
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
68C000
|
heap
|
page read and write
|
||
2A90000
|
trusted library allocation
|
page read and write
|
||
26162D1E000
|
heap
|
page read and write
|
||
12A8000
|
heap
|
page read and write
|
||
A4B000
|
heap
|
page read and write
|
||
2E30000
|
heap
|
page execute and read and write
|
||
1B970000
|
heap
|
page execute and read and write
|
||
1FA91847000
|
heap
|
page read and write
|
||
27F5000
|
trusted library allocation
|
page read and write
|
||
A6C000
|
heap
|
page read and write
|
||
7FF848DA8000
|
trusted library allocation
|
page execute and read and write
|
||
27C244F5000
|
heap
|
page read and write
|
||
1CE4E000
|
heap
|
page read and write
|
||
12FD5000
|
trusted library allocation
|
page read and write
|
||
7FF848D8F000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C83000
|
trusted library allocation
|
page execute and read and write
|
||
2A70000
|
trusted library allocation
|
page read and write
|
||
1C135000
|
heap
|
page read and write
|
||
1B4FD000
|
stack
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
C13000
|
heap
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
130FB000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
DF15CFF000
|
stack
|
page read and write
|
||
12FCD000
|
trusted library allocation
|
page read and write
|
||
1AC3D000
|
stack
|
page read and write
|
||
7FF848C9D000
|
trusted library allocation
|
page execute and read and write
|
||
129F8000
|
trusted library allocation
|
page read and write
|
||
7FF848E31000
|
trusted library allocation
|
page read and write
|
||
26162CE1000
|
heap
|
page read and write
|
||
DF156FF000
|
stack
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
27C244DD000
|
heap
|
page read and write
|
||
26162D0F000
|
heap
|
page read and write
|
||
2DF3000
|
trusted library allocation
|
page read and write
|
||
5C306FF000
|
stack
|
page read and write
|
||
129EF000
|
trusted library allocation
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
7FF848D2C000
|
trusted library allocation
|
page execute and read and write
|
||
27C244BD000
|
heap
|
page read and write
|
||
7FF848EED000
|
trusted library allocation
|
page read and write
|
||
7FF848D88000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D46000
|
trusted library allocation
|
page execute and read and write
|
||
2565000
|
trusted library allocation
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
2DBF000
|
trusted library allocation
|
page read and write
|
||
7FF848E43000
|
trusted library allocation
|
page read and write
|
||
1CBFE000
|
stack
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
129F5000
|
trusted library allocation
|
page read and write
|
||
27DB000
|
trusted library allocation
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
7FF848C94000
|
trusted library allocation
|
page read and write
|
||
2BBC000
|
trusted library allocation
|
page read and write
|
||
1BF2E000
|
stack
|
page read and write
|
||
1B210000
|
heap
|
page execute and read and write
|
||
1BA2E000
|
stack
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
12FE3000
|
trusted library allocation
|
page read and write
|
||
1106000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
1B7BE000
|
stack
|
page read and write
|
||
12A24000
|
trusted library allocation
|
page read and write
|
||
12D01000
|
trusted library allocation
|
page read and write
|
||
22A0000
|
trusted library section
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
13021000
|
trusted library allocation
|
page read and write
|
||
7FF848D16000
|
trusted library allocation
|
page read and write
|
||
1B6B4000
|
stack
|
page read and write
|
||
7FF848C62000
|
trusted library allocation
|
page read and write
|
||
280E000
|
stack
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
1BA74000
|
stack
|
page read and write
|
||
12FBE000
|
trusted library allocation
|
page read and write
|
||
7FF848E51000
|
trusted library allocation
|
page read and write
|
||
12B0D000
|
trusted library allocation
|
page read and write
|
||
1BBE0000
|
heap
|
page execute and read and write
|
||
27C244F5000
|
heap
|
page read and write
|
||
27F9000
|
trusted library allocation
|
page read and write
|
||
7FF848C78000
|
trusted library allocation
|
page read and write
|
||
12FD1000
|
trusted library allocation
|
page read and write
|
||
7FF848E4B000
|
trusted library allocation
|
page read and write
|
||
7FF848D46000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C8D000
|
trusted library allocation
|
page execute and read and write
|
||
12BA6000
|
trusted library allocation
|
page read and write
|
||
26162D0F000
|
heap
|
page read and write
|
||
1A97AFB6000
|
heap
|
page read and write
|
||
C3A000
|
heap
|
page read and write
|
||
12DC000
|
heap
|
page read and write
|
||
7FF848C7C000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
7FF848E97000
|
trusted library allocation
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
1ACF0000
|
trusted library allocation
|
page read and write
|
||
1AE40000
|
trusted library allocation
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
7FF848C64000
|
trusted library allocation
|
page read and write
|
||
1CCF7000
|
stack
|
page read and write
|
||
7FF848C80000
|
trusted library allocation
|
page read and write
|
||
CBF000
|
heap
|
page read and write
|
||
12CB000
|
heap
|
page read and write
|
||
7FF848E3E000
|
trusted library allocation
|
page read and write
|
||
26162CC7000
|
heap
|
page read and write
|
||
1B920000
|
heap
|
page read and write
|
||
1B270000
|
heap
|
page execute and read and write
|
||
7FF848E33000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page execute and read and write
|
||
27C244DB000
|
heap
|
page read and write
|
||
7FF848E53000
|
trusted library allocation
|
page read and write
|
||
2DF7000
|
trusted library allocation
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
1B3EE000
|
stack
|
page read and write
|
||
29EC000
|
trusted library allocation
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
7FF848D88000
|
trusted library allocation
|
page execute and read and write
|
||
27E3000
|
trusted library allocation
|
page read and write
|
||
2990000
|
heap
|
page execute and read and write
|
||
12FF9000
|
trusted library allocation
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
7FF848E1A000
|
trusted library allocation
|
page read and write
|
||
27C244E1000
|
heap
|
page read and write
|
||
7FF848EB2000
|
trusted library allocation
|
page read and write
|
||
2D6D000
|
trusted library allocation
|
page read and write
|
||
7FF848CBC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C7C000
|
trusted library allocation
|
page read and write
|
||
27C244D2000
|
heap
|
page read and write
|
||
275F000
|
trusted library allocation
|
page read and write
|
||
D02000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
132AC000
|
trusted library allocation
|
page read and write
|
||
7FF848DA8000
|
trusted library allocation
|
page execute and read and write
|
||
A2B000
|
heap
|
page read and write
|
||
1EB009FB000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
27FF000
|
trusted library allocation
|
page read and write
|
||
1C0DC000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
2CFA000
|
trusted library allocation
|
page read and write
|
||
12D54000
|
trusted library allocation
|
page read and write
|
||
10000
|
unkown
|
page readonly
|
||
29EA000
|
trusted library allocation
|
page read and write
|
||
12B08000
|
trusted library allocation
|
page read and write
|
||
1B3B5000
|
heap
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
1C0FD000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page execute and read and write
|
||
EC5000
|
heap
|
page read and write
|
||
26162CE3000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
12D33000
|
trusted library allocation
|
page read and write
|
||
7FF848C8D000
|
trusted library allocation
|
page execute and read and write
|
||
1B8CE000
|
stack
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
157E000
|
stack
|
page read and write
|
||
1BB5E000
|
stack
|
page read and write
|
||
29E7000
|
trusted library allocation
|
page read and write
|
||
E47000
|
heap
|
page read and write
|
||
12B01000
|
trusted library allocation
|
page read and write
|
||
1B32E000
|
stack
|
page read and write
|
||
2942000
|
trusted library allocation
|
page read and write
|
||
12DD9000
|
trusted library allocation
|
page read and write
|
||
130C0000
|
trusted library allocation
|
page read and write
|
||
110C000
|
heap
|
page read and write
|
||
12FEF000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
6D3078F000
|
stack
|
page read and write
|
||
7FF848D46000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
EB3FAFF000
|
stack
|
page read and write
|
||
1ADB0000
|
trusted library section
|
page read and write
|
||
1B8BE000
|
stack
|
page read and write
|
||
27C24489000
|
heap
|
page read and write
|
||
1EB00900000
|
heap
|
page read and write
|
||
A7D000
|
heap
|
page read and write
|
||
12FD7000
|
trusted library allocation
|
page read and write
|
||
29E3000
|
trusted library allocation
|
page read and write
|
||
1C0AE000
|
heap
|
page read and write
|
||
2FB9000
|
trusted library allocation
|
page read and write
|
||
1318000
|
heap
|
page read and write
|
||
2D44000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
7FF848D36000
|
trusted library allocation
|
page read and write
|
||
CD3000
|
heap
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
7FF848E1C000
|
trusted library allocation
|
page read and write
|
||
7FF4E0B80000
|
trusted library allocation
|
page execute and read and write
|
||
8F5000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
26162CBA000
|
heap
|
page read and write
|
||
129E3000
|
trusted library allocation
|
page read and write
|
||
12A0E000
|
trusted library allocation
|
page read and write
|
||
7FF848C7D000
|
trusted library allocation
|
page execute and read and write
|
||
B8E000
|
stack
|
page read and write
|
||
7FF848F95000
|
trusted library allocation
|
page read and write
|
||
6D3070B000
|
stack
|
page read and write
|
||
C63000
|
heap
|
page read and write
|
||
26162D36000
|
heap
|
page read and write
|
||
1BB73000
|
stack
|
page read and write
|
||
7FF848C6D000
|
trusted library allocation
|
page execute and read and write
|
||
133A4000
|
trusted library allocation
|
page read and write
|
||
7FF848CDC000
|
trusted library allocation
|
page execute and read and write
|
||
1A7F0000
|
trusted library allocation
|
page read and write
|
||
27C244C3000
|
heap
|
page read and write
|
||
7FF848E2E000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
255F000
|
trusted library allocation
|
page read and write
|
||
12A16000
|
trusted library allocation
|
page read and write
|
||
7FF848CAD000
|
trusted library allocation
|
page execute and read and write
|
||
A20000
|
heap
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
12871000
|
trusted library allocation
|
page read and write
|
||
1B6B0000
|
heap
|
page read and write
|
||
6D30A7F000
|
stack
|
page read and write
|
||
7FF848CDC000
|
trusted library allocation
|
page execute and read and write
|
||
FFF000
|
stack
|
page read and write
|
||
7FF848C9B000
|
trusted library allocation
|
page execute and read and write
|
||
12FF1000
|
trusted library allocation
|
page read and write
|
||
7FF848D91000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CA3000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
27C244AF000
|
heap
|
page read and write
|
||
28C8000
|
trusted library allocation
|
page read and write
|
||
7FF848D66000
|
trusted library allocation
|
page execute and read and write
|
||
820000
|
heap
|
page read and write
|
||
12B0D000
|
trusted library allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF848E0C000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
30A5000
|
trusted library allocation
|
page read and write
|
||
129A3000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
12FC9000
|
trusted library allocation
|
page read and write
|
||
EFF000
|
unkown
|
page read and write
|
||
12BB000
|
heap
|
page read and write
|
||
1B010000
|
heap
|
page read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
E06000
|
heap
|
page read and write
|
||
7FF848E1A000
|
trusted library allocation
|
page read and write
|
||
1B5B3000
|
stack
|
page read and write
|
||
1E13D000
|
stack
|
page read and write
|
||
27C24496000
|
heap
|
page read and write
|
||
7FF848CAC000
|
trusted library allocation
|
page read and write
|
||
1C57E000
|
stack
|
page read and write
|
||
12D6000
|
heap
|
page read and write
|
||
1CE67000
|
heap
|
page read and write
|
||
1510000
|
trusted library allocation
|
page read and write
|
||
A9E000
|
heap
|
page read and write
|
||
26162D08000
|
heap
|
page read and write
|
||
7FF848C8D000
|
trusted library allocation
|
page execute and read and write
|
||
12FDB000
|
trusted library allocation
|
page read and write
|
||
27C244D8000
|
heap
|
page read and write
|
||
1B9DF000
|
stack
|
page read and write
|
||
26162D01000
|
heap
|
page read and write
|
||
100D000
|
heap
|
page read and write
|
||
7FF848F48000
|
trusted library allocation
|
page read and write
|
||
27E5000
|
trusted library allocation
|
page read and write
|
||
7FF848C84000
|
trusted library allocation
|
page read and write
|
||
1BC2F000
|
stack
|
page read and write
|
||
26162CE2000
|
heap
|
page read and write
|
||
C56000
|
heap
|
page read and write
|
||
12D1000
|
heap
|
page read and write
|
||
1CF06000
|
heap
|
page read and write
|
||
26162CF5000
|
heap
|
page read and write
|
||
1133000
|
heap
|
page read and write
|
||
12CCD000
|
trusted library allocation
|
page read and write
|
||
27F7000
|
trusted library allocation
|
page read and write
|
||
27C2448F000
|
heap
|
page read and write
|
||
1CAF2000
|
stack
|
page read and write
|
||
7FF848D20000
|
trusted library allocation
|
page execute and read and write
|
||
12A20000
|
trusted library allocation
|
page read and write
|
||
26162D17000
|
heap
|
page read and write
|
||
7FF848C97000
|
trusted library allocation
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
26162D1D000
|
heap
|
page read and write
|
||
7FF848D8F000
|
trusted library allocation
|
page execute and read and write
|
||
12DE000
|
heap
|
page read and write
|
||
12B01000
|
trusted library allocation
|
page read and write
|
||
26162D0F000
|
heap
|
page read and write
|
||
12BB1000
|
trusted library allocation
|
page read and write
|
||
7FF848F48000
|
trusted library allocation
|
page read and write
|
||
27C244C8000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
1A97AF75000
|
heap
|
page read and write
|
||
7FF848C63000
|
trusted library allocation
|
page execute and read and write
|
||
A4D000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
7FF848D46000
|
trusted library allocation
|
page read and write
|
||
1B39D000
|
stack
|
page read and write
|
||
129AD000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
C98000
|
heap
|
page read and write
|
||
130E000
|
stack
|
page read and write
|
||
1B42D000
|
stack
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
301E000
|
trusted library allocation
|
page read and write
|
||
A77000
|
heap
|
page read and write
|
||
27C244C8000
|
heap
|
page read and write
|
||
26162B10000
|
heap
|
page read and write
|
||
1A97ADB0000
|
heap
|
page read and write
|
||
27C244C8000
|
heap
|
page read and write
|
||
EC3000
|
heap
|
page read and write
|
||
248E000
|
stack
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
7FF848C74000
|
trusted library allocation
|
page read and write
|
||
1C13F000
|
heap
|
page read and write
|
||
7FF848C63000
|
trusted library allocation
|
page execute and read and write
|
||
12D71000
|
trusted library allocation
|
page read and write
|
||
7FF848C73000
|
trusted library allocation
|
page read and write
|
||
2A52000
|
trusted library allocation
|
page read and write
|
||
26162CE3000
|
heap
|
page read and write
|
||
2DAA000
|
trusted library allocation
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
C3A000
|
heap
|
page read and write
|
||
26162CF6000
|
heap
|
page read and write
|
||
2FAF000
|
trusted library allocation
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
131F0000
|
trusted library allocation
|
page read and write
|
||
7FF848CA4000
|
trusted library allocation
|
page read and write
|
||
27C2448F000
|
heap
|
page read and write
|
||
2E59000
|
trusted library allocation
|
page read and write
|
||
2D73000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
26162CBC000
|
heap
|
page read and write
|
||
2C75000
|
trusted library allocation
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
12000
|
unkown
|
page readonly
|
||
12D11000
|
trusted library allocation
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
112E000
|
heap
|
page read and write
|
||
2380000
|
heap
|
page execute and read and write
|
||
12A0000
|
heap
|
page read and write
|
||
12F71000
|
trusted library allocation
|
page read and write
|
||
2E70000
|
trusted library allocation
|
page read and write
|
||
26162D10000
|
heap
|
page read and write
|
||
7FF848C98000
|
trusted library allocation
|
page read and write
|
||
7FF848E36000
|
trusted library allocation
|
page read and write
|
||
1FA91839000
|
heap
|
page read and write
|
||
149E000
|
stack
|
page read and write
|
||
12833000
|
trusted library allocation
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
heap
|
page execute and read and write
|
||
7FF848E41000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
1C502000
|
heap
|
page execute and read and write
|
||
1AD30000
|
trusted library allocation
|
page read and write
|
||
CDF000
|
heap
|
page read and write
|
||
16EF000
|
stack
|
page read and write
|
||
7FF848D20000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
29DF000
|
trusted library allocation
|
page read and write
|
||
2BB3000
|
trusted library allocation
|
page read and write
|
||
293A000
|
trusted library allocation
|
page read and write
|
||
7FF848CB4000
|
trusted library allocation
|
page read and write
|
||
1ADC0000
|
trusted library section
|
page read and write
|
||
7FF848E33000
|
trusted library allocation
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page execute and read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
7FF848C6D000
|
trusted library allocation
|
page execute and read and write
|
||
12EAD000
|
trusted library allocation
|
page read and write
|
||
CFF000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
27C244EA000
|
heap
|
page read and write
|
||
26162D08000
|
heap
|
page read and write
|
||
1BDE4000
|
stack
|
page read and write
|
||
DF15BFF000
|
stack
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
11D9000
|
heap
|
page read and write
|
||
1B87E000
|
stack
|
page read and write
|
||
1B222000
|
stack
|
page read and write
|
||
1ADBD000
|
stack
|
page read and write
|
||
12E1D000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
7FF848C94000
|
trusted library allocation
|
page read and write
|
||
27C244C8000
|
heap
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
29EF000
|
trusted library allocation
|
page read and write
|
||
100B000
|
heap
|
page read and write
|
||
7FF848D16000
|
trusted library allocation
|
page read and write
|
||
2ECA000
|
trusted library allocation
|
page read and write
|
||
7FF848E11000
|
trusted library allocation
|
page read and write
|
||
1B6EE000
|
stack
|
page read and write
|
||
1C7FF000
|
stack
|
page read and write
|
||
7FF848E58000
|
trusted library allocation
|
page read and write
|
||
293E000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
27C2449C000
|
heap
|
page read and write
|
||
7FF848E11000
|
trusted library allocation
|
page read and write
|
||
7FF848E0E000
|
trusted library allocation
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
27C244D2000
|
heap
|
page read and write
|
||
2E8F000
|
trusted library allocation
|
page read and write
|
||
7FF848C6D000
|
trusted library allocation
|
page execute and read and write
|
||
1B2E0000
|
heap
|
page read and write
|
||
7FF848DAF000
|
trusted library allocation
|
page execute and read and write
|
||
2BB0000
|
trusted library allocation
|
page read and write
|
||
2765000
|
trusted library allocation
|
page read and write
|
||
2C7B000
|
trusted library allocation
|
page read and write
|
||
275814A000
|
stack
|
page read and write
|
||
26162D31000
|
heap
|
page read and write
|
||
13061000
|
trusted library allocation
|
page read and write
|
||
12841000
|
trusted library allocation
|
page read and write
|
||
26162CCC000
|
heap
|
page read and write
|
||
2761000
|
trusted library allocation
|
page read and write
|
||
7FF848C7C000
|
trusted library allocation
|
page read and write
|
||
1AE20000
|
heap
|
page execute and read and write
|
||
26162D15000
|
heap
|
page read and write
|
||
7FF848D94000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E46000
|
trusted library allocation
|
page read and write
|
||
1655000
|
heap
|
page read and write
|
||
130BD000
|
trusted library allocation
|
page read and write
|
||
27C244EC000
|
heap
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page read and write
|
||
1C9F4000
|
stack
|
page read and write
|
||
12E11000
|
trusted library allocation
|
page read and write
|
||
27C244FD000
|
heap
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page read and write
|
||
7FF848E11000
|
trusted library allocation
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
1BA55000
|
stack
|
page read and write
|
||
7FF848C82000
|
trusted library allocation
|
page read and write
|
||
1EB009F0000
|
heap
|
page read and write
|
||
15E5000
|
heap
|
page read and write
|
||
2240000
|
trusted library allocation
|
page read and write
|
||
27C24715000
|
heap
|
page read and write
|
||
26162CE1000
|
heap
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
C73000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
7FF848DB1000
|
trusted library allocation
|
page execute and read and write
|
||
2843000
|
trusted library allocation
|
page read and write
|
||
7FF848C78000
|
trusted library allocation
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
1B71A000
|
stack
|
page read and write
|
||
26162D01000
|
heap
|
page read and write
|
||
7FF848EB2000
|
trusted library allocation
|
page read and write
|
||
7FF848CAD000
|
trusted library allocation
|
page execute and read and write
|
||
275D000
|
trusted library allocation
|
page read and write
|
||
1283D000
|
trusted library allocation
|
page read and write
|
||
116D000
|
heap
|
page read and write
|
||
1B3E6000
|
heap
|
page read and write
|
||
269E000
|
trusted library allocation
|
page read and write
|
||
2CE0000
|
trusted library allocation
|
page read and write
|
||
26162D2F000
|
heap
|
page read and write
|
||
1C174000
|
heap
|
page read and write
|
||
1037000
|
heap
|
page read and write
|
||
1EB008E0000
|
heap
|
page read and write
|
||
C4F000
|
heap
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
7FF848C70000
|
trusted library allocation
|
page read and write
|
||
27589FF000
|
stack
|
page read and write
|
||
12DF7000
|
trusted library allocation
|
page read and write
|
||
12FB8000
|
trusted library allocation
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page read and write
|
||
C51000
|
heap
|
page read and write
|
||
7FF848CAD000
|
trusted library allocation
|
page execute and read and write
|
||
1E25E000
|
stack
|
page read and write
|
||
7FF848E0E000
|
trusted library allocation
|
page read and write
|
||
3050000
|
heap
|
page execute and read and write
|
||
27C244D2000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
13364000
|
trusted library allocation
|
page read and write
|
||
1C099000
|
heap
|
page read and write
|
||
1B4B0000
|
trusted library section
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
1A97AF7B000
|
heap
|
page read and write
|
||
12FB6000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
27E9000
|
trusted library allocation
|
page read and write
|
||
C24000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
1C01E000
|
stack
|
page read and write
|
||
12FD3000
|
trusted library allocation
|
page read and write
|
||
12A22000
|
trusted library allocation
|
page read and write
|
||
7FF848CEC000
|
trusted library allocation
|
page execute and read and write
|
||
12B03000
|
trusted library allocation
|
page read and write
|
||
7FF848C9C000
|
trusted library allocation
|
page read and write
|
||
7FF848E1C000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
unkown
|
page read and write
|
||
1BCB3000
|
stack
|
page read and write
|
||
1C402000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
2D6A000
|
trusted library allocation
|
page read and write
|
||
1CE0B000
|
heap
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
27C2449A000
|
heap
|
page read and write
|
||
12A51000
|
trusted library allocation
|
page read and write
|
||
112B000
|
heap
|
page read and write
|
||
27C244EE000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1C10C000
|
heap
|
page read and write
|
||
26162F00000
|
heap
|
page read and write
|
||
7FF848C84000
|
trusted library allocation
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
2D76000
|
trusted library allocation
|
page read and write
|
||
7FF848D26000
|
trusted library allocation
|
page read and write
|
||
26162CDF000
|
heap
|
page read and write
|
||
1BC1F000
|
stack
|
page read and write
|
||
1BADE000
|
stack
|
page read and write
|
||
12FE9000
|
trusted library allocation
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
596000
|
heap
|
page read and write
|
||
12F81000
|
trusted library allocation
|
page read and write
|
||
29EB000
|
trusted library allocation
|
page read and write
|
||
7FF848C9D000
|
trusted library allocation
|
page execute and read and write
|
||
26162C10000
|
heap
|
page read and write
|
||
7FF848C8D000
|
trusted library allocation
|
page execute and read and write
|
||
129E7000
|
trusted library allocation
|
page read and write
|
||
129B1000
|
trusted library allocation
|
page read and write
|
||
12FE7000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
12FBC000
|
trusted library allocation
|
page read and write
|
||
1C02E000
|
stack
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
2BB6000
|
trusted library allocation
|
page read and write
|
||
126F1000
|
trusted library allocation
|
page read and write
|
||
27C244E9000
|
heap
|
page read and write
|
||
7FF848CAB000
|
trusted library allocation
|
page execute and read and write
|
||
D02000
|
heap
|
page read and write
|
||
26162D33000
|
heap
|
page read and write
|
||
26162D22000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
1B86E000
|
stack
|
page read and write
|
||
5C304FF000
|
stack
|
page read and write
|
||
1B090000
|
trusted library allocation
|
page read and write
|
||
2D7F000
|
trusted library allocation
|
page read and write
|
||
10000
|
unkown
|
page readonly
|
||
262E000
|
stack
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
7FF848D56000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EDA000
|
trusted library allocation
|
page read and write
|
||
26162BF0000
|
heap
|
page read and write
|
||
27C244F3000
|
heap
|
page read and write
|
||
28C6000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page read and write
|
||
1B346000
|
heap
|
page read and write
|
||
12F7D000
|
trusted library allocation
|
page read and write
|
||
1CEE9000
|
heap
|
page read and write
|
||
7FF848C84000
|
trusted library allocation
|
page read and write
|
||
27C24360000
|
heap
|
page read and write
|
||
1BD13000
|
stack
|
page read and write
|
||
282F000
|
trusted library allocation
|
page read and write
|
||
FFF000
|
stack
|
page read and write
|
||
1C402000
|
heap
|
page read and write
|
||
2567000
|
trusted library allocation
|
page read and write
|
||
1AF7D000
|
stack
|
page read and write
|
||
1CF0C000
|
heap
|
page read and write
|
||
7FF848D91000
|
trusted library allocation
|
page execute and read and write
|
||
2820000
|
heap
|
page read and write
|
||
127C3000
|
trusted library allocation
|
page read and write
|
||
27C2447B000
|
heap
|
page read and write
|
||
27C244D8000
|
heap
|
page read and write
|
||
2FC5000
|
trusted library allocation
|
page read and write
|
||
129F3000
|
trusted library allocation
|
page read and write
|
||
1CE95000
|
heap
|
page read and write
|
||
1CE00000
|
heap
|
page read and write
|
||
2871000
|
trusted library allocation
|
page read and write
|
||
1AF80000
|
heap
|
page read and write
|
||
C11000
|
heap
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page read and write
|
||
2D87000
|
trusted library allocation
|
page read and write
|
||
26162CC7000
|
heap
|
page read and write
|
||
2A67000
|
trusted library allocation
|
page read and write
|
||
1B7C0000
|
heap
|
page execute and read and write
|
||
27586FD000
|
stack
|
page read and write
|
||
2A4C000
|
trusted library allocation
|
page read and write
|
||
12A1A000
|
trusted library allocation
|
page read and write
|
||
2BBF000
|
trusted library allocation
|
page read and write
|
||
12F10000
|
trusted library allocation
|
page read and write
|
||
12A10000
|
trusted library allocation
|
page read and write
|
||
1C8FE000
|
stack
|
page read and write
|
||
12A00000
|
trusted library allocation
|
page read and write
|
||
A79000
|
heap
|
page read and write
|
||
2BAA000
|
trusted library allocation
|
page read and write
|
||
27C244D7000
|
heap
|
page read and write
|
||
7FF848C8C000
|
trusted library allocation
|
page read and write
|
||
311B000
|
trusted library allocation
|
page read and write
|
||
7FF848DBF000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CBC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
7FF848C63000
|
trusted library allocation
|
page execute and read and write
|
||
11CE000
|
stack
|
page read and write
|
||
12DB1000
|
trusted library allocation
|
page read and write
|
||
12D26000
|
trusted library allocation
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
1B220000
|
heap
|
page execute and read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
26162CE3000
|
heap
|
page read and write
|
||
26162D08000
|
heap
|
page read and write
|
||
2833000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
heap
|
page execute and read and write
|
||
1305000
|
heap
|
page read and write
|
||
14AE000
|
stack
|
page read and write
|
||
D80000
|
trusted library allocation
|
page read and write
|
||
F15000
|
heap
|
page read and write
|
||
7FF848D91000
|
trusted library allocation
|
page execute and read and write
|
||
2A61000
|
trusted library allocation
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
1BA20000
|
heap
|
page read and write
|
||
1CEE5000
|
heap
|
page read and write
|
||
1B32A000
|
stack
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
7FF848E53000
|
trusted library allocation
|
page read and write
|
||
1B000000
|
heap
|
page read and write
|
||
27C244D2000
|
heap
|
page read and write
|
||
10C5000
|
heap
|
page read and write
|
||
27C244FA000
|
heap
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
27C244E9000
|
heap
|
page read and write
|
||
1B334000
|
heap
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page read and write
|
||
88C000
|
heap
|
page read and write
|
||
7FF848E0C000
|
trusted library allocation
|
page read and write
|
||
2BD2000
|
trusted library allocation
|
page read and write
|
||
1AFC0000
|
trusted library allocation
|
page read and write
|
||
128E1000
|
trusted library allocation
|
page read and write
|
||
129DE000
|
trusted library allocation
|
page read and write
|
||
26162D01000
|
heap
|
page read and write
|
||
29F8000
|
trusted library allocation
|
page read and write
|
||
2DF5000
|
trusted library allocation
|
page read and write
|
||
13071000
|
trusted library allocation
|
page read and write
|
||
27EF000
|
trusted library allocation
|
page read and write
|
||
1171000
|
heap
|
page read and write
|
||
7FF848C9D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C7C000
|
trusted library allocation
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page execute and read and write
|
||
27C244D2000
|
heap
|
page read and write
|
||
1BB2E000
|
stack
|
page read and write
|
||
3115000
|
trusted library allocation
|
page read and write
|
||
282D000
|
trusted library allocation
|
page read and write
|
||
134D000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page execute and read and write
|
||
1AFA0000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
7FF848D98000
|
trusted library allocation
|
page execute and read and write
|
||
1C67E000
|
stack
|
page read and write
|
||
27C244EE000
|
heap
|
page read and write
|
||
1EB009B0000
|
heap
|
page read and write
|
||
1C148000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
7D6000
|
stack
|
page read and write
|
||
1BCDB000
|
stack
|
page read and write
|
||
12498000
|
trusted library allocation
|
page read and write
|
||
129A8000
|
trusted library allocation
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page execute and read and write
|
||
A66000
|
heap
|
page read and write
|
||
7FF848C84000
|
trusted library allocation
|
page read and write
|
||
27FD000
|
trusted library allocation
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
12E18000
|
trusted library allocation
|
page read and write
|
||
1CF02000
|
heap
|
page read and write
|
||
12D73000
|
trusted library allocation
|
page read and write
|
||
7FF848C70000
|
trusted library allocation
|
page read and write
|
||
7FF848E41000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
1B62F000
|
stack
|
page read and write
|
||
7FF848E2C000
|
trusted library allocation
|
page read and write
|
||
27C244F6000
|
heap
|
page read and write
|
||
1E03B000
|
stack
|
page read and write
|
||
1C167000
|
heap
|
page read and write
|
||
1BEEB000
|
stack
|
page read and write
|
||
2CF0000
|
heap
|
page execute and read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
7FF848CA7000
|
trusted library allocation
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
7FF848E0C000
|
trusted library allocation
|
page read and write
|
||
2767000
|
trusted library allocation
|
page read and write
|
||
DF157FF000
|
stack
|
page read and write
|
||
7FF848E5A000
|
trusted library allocation
|
page read and write
|
||
7FF848C64000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
heap
|
page execute and read and write
|
||
1DF2D000
|
stack
|
page read and write
|
||
7FF848C9D000
|
trusted library allocation
|
page execute and read and write
|
||
1B8D0000
|
heap
|
page read and write
|
||
515000
|
heap
|
page read and write
|
||
2E6E000
|
trusted library allocation
|
page read and write
|
||
7FF848D9F000
|
trusted library allocation
|
page execute and read and write
|
||
26162D3B000
|
heap
|
page read and write
|
||
12FDD000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
127D1000
|
trusted library allocation
|
page read and write
|
||
301B000
|
trusted library allocation
|
page read and write
|
||
12EC1000
|
trusted library allocation
|
page read and write
|
||
7FF848C7D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E37000
|
trusted library allocation
|
page read and write
|
||
27C244CD000
|
heap
|
page read and write
|
||
EB3FCFE000
|
stack
|
page read and write
|
||
27C244C3000
|
heap
|
page read and write
|
||
1FA917C0000
|
heap
|
page read and write
|
||
C2C000
|
heap
|
page read and write
|
||
CB5000
|
heap
|
page read and write
|
||
1B330000
|
heap
|
page read and write
|
||
1D29A000
|
stack
|
page read and write
|
||
1EB009F5000
|
heap
|
page read and write
|
||
CAD000
|
heap
|
page read and write
|
||
1AED0000
|
trusted library allocation
|
page read and write
|
||
1B430000
|
trusted library section
|
page read and write
|
||
2370000
|
trusted library section
|
page read and write
|
||
7FF848E36000
|
trusted library allocation
|
page read and write
|
||
1C8FF000
|
stack
|
page read and write
|
||
7FF848D94000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C78000
|
trusted library allocation
|
page read and write
|
||
12FED000
|
trusted library allocation
|
page read and write
|
||
C33000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page execute and read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
2E72000
|
trusted library allocation
|
page read and write
|
||
7FF848E0A000
|
trusted library allocation
|
page read and write
|
||
26162D27000
|
heap
|
page read and write
|
||
1B81A000
|
stack
|
page read and write
|
||
7FF848C8B000
|
trusted library allocation
|
page execute and read and write
|
||
5C300FA000
|
stack
|
page read and write
|
||
7FF848CBD000
|
trusted library allocation
|
page execute and read and write
|
||
27C244B0000
|
heap
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
7FF848CEC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D66000
|
trusted library allocation
|
page execute and read and write
|
||
1A97AF70000
|
heap
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
26162C90000
|
heap
|
page read and write
|
||
EB3FDFE000
|
stack
|
page read and write
|
||
7FF848D8F000
|
trusted library allocation
|
page execute and read and write
|
||
1B41F000
|
heap
|
page read and write
|
||
7FF848C8C000
|
trusted library allocation
|
page read and write
|
||
27F3000
|
trusted library allocation
|
page read and write
|
||
27C24489000
|
heap
|
page read and write
|
||
1590000
|
trusted library allocation
|
page read and write
|
||
7FF848E0E000
|
trusted library allocation
|
page read and write
|
||
1C183000
|
heap
|
page read and write
|
||
12FEB000
|
trusted library allocation
|
page read and write
|
||
85E000
|
stack
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
1D19A000
|
stack
|
page read and write
|
||
1B3CE000
|
heap
|
page read and write
|
||
EB3F8FE000
|
stack
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
A92000
|
heap
|
page read and write
|
||
12E13000
|
trusted library allocation
|
page read and write
|
||
27C244BC000
|
heap
|
page read and write
|
||
26162CBB000
|
heap
|
page read and write
|
||
1B396000
|
heap
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
1535000
|
heap
|
page read and write
|
||
D86000
|
stack
|
page read and write
|
||
26162D15000
|
heap
|
page read and write
|
||
1B42E000
|
heap
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
7FF848DB4000
|
trusted library allocation
|
page execute and read and write
|
||
13068000
|
trusted library allocation
|
page read and write
|
||
1C0ED000
|
heap
|
page read and write
|
||
12FE1000
|
trusted library allocation
|
page read and write
|
||
CAB000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
1002000
|
heap
|
page read and write
|
||
7FF848CDC000
|
trusted library allocation
|
page execute and read and write
|
||
26162D2B000
|
heap
|
page read and write
|
||
1BE2E000
|
stack
|
page read and write
|
||
1C080000
|
heap
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
26162D33000
|
heap
|
page read and write
|
||
12F51000
|
trusted library allocation
|
page read and write
|
||
1A97AEB0000
|
heap
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page execute and read and write
|
||
269A000
|
trusted library allocation
|
page read and write
|
||
269C000
|
trusted library allocation
|
page read and write
|
||
1B8BE000
|
stack
|
page read and write
|
||
2A6B000
|
trusted library allocation
|
page read and write
|
||
13111000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
1119000
|
heap
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
1EB00815000
|
heap
|
page read and write
|
||
29F0000
|
heap
|
page execute and read and write
|
||
10F6000
|
stack
|
page read and write
|
||
1C0EE000
|
stack
|
page read and write
|
||
2763000
|
trusted library allocation
|
page read and write
|
||
12D3C000
|
trusted library allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
27C244F0000
|
heap
|
page read and write
|
||
7FF848C77000
|
trusted library allocation
|
page read and write
|
||
746000
|
stack
|
page read and write
|
||
1CE86000
|
heap
|
page read and write
|
||
12FF3000
|
trusted library allocation
|
page read and write
|
||
7FF848E43000
|
trusted library allocation
|
page read and write
|
||
129FC000
|
trusted library allocation
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page read and write
|
||
7FF848E66000
|
trusted library allocation
|
page read and write
|
||
7FF848DAF000
|
trusted library allocation
|
page execute and read and write
|
||
1AFA0000
|
heap
|
page execute and read and write
|
||
1B3A9000
|
heap
|
page read and write
|
||
12D0D000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page execute and read and write
|
||
1AF2E000
|
stack
|
page read and write
|
||
1CE4A000
|
heap
|
page read and write
|
||
12C3C000
|
trusted library allocation
|
page read and write
|
||
2E81000
|
trusted library allocation
|
page read and write
|
||
1CEF0000
|
heap
|
page read and write
|
||
12838000
|
trusted library allocation
|
page read and write
|
||
27C24494000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
1B24D000
|
stack
|
page read and write
|
||
1002000
|
heap
|
page read and write
|
||
7FF848D36000
|
trusted library allocation
|
page read and write
|
||
1C093000
|
heap
|
page read and write
|
||
7FF848C9D000
|
trusted library allocation
|
page execute and read and write
|
||
12831000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page read and write
|
||
EB3FEFF000
|
stack
|
page read and write
|
||
7FF848E71000
|
trusted library allocation
|
page read and write
|
||
27C24480000
|
heap
|
page read and write
|
||
1CDFD000
|
stack
|
page read and write
|
||
7FF848C73000
|
trusted library allocation
|
page read and write
|
||
CDD000
|
heap
|
page read and write
|
||
27EB000
|
trusted library allocation
|
page read and write
|
||
7FF848E5D000
|
trusted library allocation
|
page read and write
|
||
7FF848DB8000
|
trusted library allocation
|
page execute and read and write
|
||
1BCEE000
|
stack
|
page read and write
|
||
26162D0F000
|
heap
|
page read and write
|
||
12CC8000
|
trusted library allocation
|
page read and write
|
||
1AB30000
|
trusted library allocation
|
page read and write
|
||
27C244D8000
|
heap
|
page read and write
|
||
12A26000
|
trusted library allocation
|
page read and write
|
||
13005000
|
trusted library allocation
|
page read and write
|
||
7FF848C7D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D66000
|
trusted library allocation
|
page execute and read and write
|
||
10AC000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
2CF0000
|
heap
|
page read and write
|
||
8F8000
|
heap
|
page read and write
|
||
129EB000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
heap
|
page execute and read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
7FF848C84000
|
trusted library allocation
|
page read and write
|
||
1AE1D000
|
stack
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
7FF848E97000
|
trusted library allocation
|
page read and write
|
||
176000
|
unkown
|
page readonly
|
||
26162D15000
|
heap
|
page read and write
|
||
26162CB0000
|
heap
|
page read and write
|
||
2DBC000
|
trusted library allocation
|
page read and write
|
||
7FF848E99000
|
trusted library allocation
|
page read and write
|
||
7FF848C8D000
|
trusted library allocation
|
page execute and read and write
|
||
560000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
26162D08000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
C13000
|
heap
|
page read and write
|
||
B3B000
|
heap
|
page read and write
|
||
FC6000
|
stack
|
page read and write
|
||
DF15DFF000
|
stack
|
page read and write
|
||
7FF848C6D000
|
trusted library allocation
|
page execute and read and write
|
||
1BE14000
|
stack
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
12FFB000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page execute and read and write
|
||
1FA917D0000
|
heap
|
page read and write
|
||
2E10000
|
trusted library allocation
|
page read and write
|
||
1CE3D000
|
heap
|
page read and write
|
||
12EA8000
|
trusted library allocation
|
page read and write
|
||
26A4000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
27C244F5000
|
heap
|
page read and write
|
||
1EB007E0000
|
heap
|
page read and write
|
||
26162D2C000
|
heap
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
12FD9000
|
trusted library allocation
|
page read and write
|
||
7FF848DB4000
|
trusted library allocation
|
page execute and read and write
|
||
2CFE000
|
trusted library allocation
|
page read and write
|
||
27C244F5000
|
heap
|
page read and write
|
||
DF15AFE000
|
stack
|
page read and write
|
||
2C79000
|
trusted library allocation
|
page read and write
|
||
27C244B0000
|
heap
|
page read and write
|
||
1049000
|
heap
|
page read and write
|
||
1C81B000
|
stack
|
page read and write
|
||
2FA7000
|
trusted library allocation
|
page read and write
|
||
7FF848C94000
|
trusted library allocation
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page read and write
|
||
2EE6000
|
trusted library allocation
|
page read and write
|
||
127C1000
|
trusted library allocation
|
page read and write
|
||
1141000
|
heap
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
1BD23000
|
stack
|
page read and write
|
||
12F78000
|
trusted library allocation
|
page read and write
|
||
7FF848E68000
|
trusted library allocation
|
page read and write
|
||
7FF848D94000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CBB000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C93000
|
trusted library allocation
|
page execute and read and write
|
||
1102000
|
heap
|
page read and write
|
||
7FF848C73000
|
trusted library allocation
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CAC000
|
trusted library allocation
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
1072000
|
heap
|
page read and write
|
||
26162CAB000
|
heap
|
page read and write
|
||
293C000
|
trusted library allocation
|
page read and write
|
||
1BA2E000
|
stack
|
page read and write
|
||
7FF848E11000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
4F6000
|
stack
|
page read and write
|
||
1C502000
|
heap
|
page execute and read and write
|
||
BD0000
|
heap
|
page read and write
|
||
1A97C8D0000
|
heap
|
page read and write
|
||
26162D01000
|
heap
|
page read and write
|
||
12EB1000
|
trusted library allocation
|
page read and write
|
||
7FF848F6E000
|
trusted library allocation
|
page read and write
|
||
1CBFA000
|
stack
|
page read and write
|
||
7FF848C98000
|
trusted library allocation
|
page read and write
|
||
27FB000
|
trusted library allocation
|
page read and write
|
||
1330000
|
trusted library allocation
|
page read and write
|
||
E1D000
|
heap
|
page read and write
|
||
26162D14000
|
heap
|
page read and write
|
||
7FF848EB4000
|
trusted library allocation
|
page read and write
|
||
12FC2000
|
trusted library allocation
|
page read and write
|
||
27ED000
|
trusted library allocation
|
page read and write
|
||
12A0A000
|
trusted library allocation
|
page read and write
|
||
606000
|
heap
|
page read and write
|
||
27C244D3000
|
heap
|
page read and write
|
||
27C24710000
|
heap
|
page read and write
|
||
29F2000
|
trusted library allocation
|
page read and write
|
||
1B5BE000
|
stack
|
page read and write
|
||
1B25F000
|
stack
|
page read and write
|
||
12EC000
|
heap
|
page read and write
|
||
12A18000
|
trusted library allocation
|
page read and write
|
||
27C244B3000
|
heap
|
page read and write
|
||
7FF848D56000
|
trusted library allocation
|
page execute and read and write
|
||
BF6000
|
stack
|
page read and write
|
||
1B423000
|
stack
|
page read and write
|
||
129FA000
|
trusted library allocation
|
page read and write
|
||
12E0D000
|
trusted library allocation
|
page read and write
|
||
D2F000
|
stack
|
page read and write
|
||
1A9D0000
|
trusted library allocation
|
page read and write
|
||
E09000
|
heap
|
page read and write
|
||
1BED3000
|
stack
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
1CE02000
|
heap
|
page read and write
|
||
27C24460000
|
heap
|
page read and write
|
||
27DD000
|
trusted library allocation
|
page read and write
|
||
12F73000
|
trusted library allocation
|
page read and write
|
||
272E000
|
stack
|
page read and write
|
||
12FB4000
|
trusted library allocation
|
page read and write
|
||
12CC1000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
1705000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
7FF848CBC000
|
trusted library allocation
|
page execute and read and write
|
||
12E1A000
|
trusted library allocation
|
page read and write
|
||
26162D01000
|
heap
|
page read and write
|
||
1EB007E9000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
26162CB9000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
1306D000
|
trusted library allocation
|
page read and write
|
||
5FB000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
7FF848C83000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E0C000
|
trusted library allocation
|
page read and write
|
||
26164870000
|
heap
|
page read and write
|
||
2DB6000
|
trusted library allocation
|
page read and write
|
||
1A97AE90000
|
heap
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page execute and read and write
|
||
A60000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
1CE65000
|
heap
|
page read and write
|
||
27C24468000
|
heap
|
page read and write
|
||
7FF848C73000
|
trusted library allocation
|
page read and write
|
||
7FF848C93000
|
trusted library allocation
|
page read and write
|
||
130A000
|
heap
|
page read and write
|
||
1A97AF80000
|
heap
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
27C244B2000
|
heap
|
page read and write
|
||
26162CC0000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
7FF848D10000
|
trusted library allocation
|
page read and write
|
||
7FF848C7D000
|
trusted library allocation
|
page execute and read and write
|
||
15E5000
|
heap
|
page read and write
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
1C116000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
26162C98000
|
heap
|
page read and write
|
||
7FF848C80000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
1B77E000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
12FBA000
|
trusted library allocation
|
page read and write
|
||
14EF000
|
stack
|
page read and write
|
||
5C307FE000
|
stack
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
27C244C3000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
7FF848C63000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DB1000
|
trusted library allocation
|
page execute and read and write
|
||
12FF5000
|
trusted library allocation
|
page read and write
|
||
7FF848D16000
|
trusted library allocation
|
page read and write
|
||
D8F000
|
stack
|
page read and write
|
||
7FF848D20000
|
trusted library allocation
|
page read and write
|
||
7FF848E41000
|
trusted library allocation
|
page read and write
|
||
2BD4000
|
trusted library allocation
|
page read and write
|
||
1FA917F0000
|
heap
|
page read and write
|
||
26162D0F000
|
heap
|
page read and write
|
||
A8D000
|
heap
|
page read and write
|
||
1BC7E000
|
stack
|
page read and write
|
||
27C244D2000
|
heap
|
page read and write
|
||
7FF848D1C000
|
trusted library allocation
|
page execute and read and write
|
||
27C26060000
|
heap
|
page read and write
|
||
27C244B0000
|
heap
|
page read and write
|
||
27C244E8000
|
heap
|
page read and write
|
||
CC8000
|
heap
|
page read and write
|
||
7FF848D26000
|
trusted library allocation
|
page read and write
|
||
10F6000
|
stack
|
page read and write
|
||
7FF848E1E000
|
trusted library allocation
|
page read and write
|
||
12A1C000
|
trusted library allocation
|
page read and write
|
||
7FF848D94000
|
trusted library allocation
|
page execute and read and write
|
||
12FC0000
|
trusted library allocation
|
page read and write
|
||
7FF848C9B000
|
trusted library allocation
|
page execute and read and write
|
||
D30000
|
heap
|
page read and write
|
||
2640000
|
heap
|
page read and write
|
||
7FF848E41000
|
trusted library allocation
|
page read and write
|
||
129E9000
|
trusted library allocation
|
page read and write
|
||
27C24489000
|
heap
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
2BD6000
|
trusted library allocation
|
page read and write
|
||
2A6E000
|
stack
|
page read and write
|
||
27587FF000
|
stack
|
page read and write
|
||
12A12000
|
trusted library allocation
|
page read and write
|
||
1AD60000
|
trusted library section
|
page read and write
|
||
1FA91830000
|
heap
|
page read and write
|
||
1BD7E000
|
stack
|
page read and write
|
||
7FF848CA3000
|
trusted library allocation
|
page read and write
|
||
7FF848E43000
|
trusted library allocation
|
page read and write
|
||
2E40000
|
heap
|
page execute and read and write
|
||
1B1FF000
|
stack
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
7FF848C9C000
|
trusted library allocation
|
page read and write
|
||
A8A000
|
heap
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page read and write
|
||
1AFC0000
|
trusted library allocation
|
page read and write
|
||
2C77000
|
trusted library allocation
|
page read and write
|
||
7FF848F82000
|
trusted library allocation
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
7FF848CA4000
|
trusted library allocation
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
7FF848CAD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
26162CC0000
|
heap
|
page read and write
|
||
1B3B1000
|
heap
|
page read and write
|
||
7FF848D36000
|
trusted library allocation
|
page read and write
|
||
27C244EE000
|
heap
|
page read and write
|
||
12A28000
|
trusted library allocation
|
page read and write
|
||
1C6FF000
|
stack
|
page read and write
|
||
1BBD4000
|
stack
|
page read and write
|
||
1B2B0000
|
heap
|
page read and write
|
||
E49000
|
heap
|
page read and write
|
||
1B670000
|
heap
|
page execute and read and write
|
||
1CCFF000
|
stack
|
page read and write
|
||
287A000
|
trusted library allocation
|
page read and write
|
||
7FF848C7D000
|
trusted library allocation
|
page execute and read and write
|
||
1AFA0000
|
heap
|
page execute and read and write
|
||
12EA3000
|
trusted library allocation
|
page read and write
|
||
1B8EE000
|
stack
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page read and write
|
||
1D4DE000
|
unkown
|
page read and write
|
||
2B01000
|
trusted library allocation
|
page read and write
|
||
7FF848E2C000
|
trusted library allocation
|
page read and write
|
||
27C2448A000
|
heap
|
page read and write
|
||
13A5000
|
heap
|
page read and write
|
||
1C0BB000
|
heap
|
page read and write
|
||
2E6C000
|
trusted library allocation
|
page read and write
|
||
2350000
|
trusted library section
|
page read and write
|
||
1AD80000
|
trusted library section
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
1B52E000
|
stack
|
page read and write
|
||
1CE9F000
|
heap
|
page read and write
|
||
12FCB000
|
trusted library allocation
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
2220000
|
trusted library allocation
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
27C24496000
|
heap
|
page read and write
|
||
7FF848DC4000
|
trusted library allocation
|
page execute and read and write
|
||
95E000
|
stack
|
page read and write
|
||
1A4C0000
|
trusted library allocation
|
page read and write
|
||
2561000
|
trusted library allocation
|
page read and write
|
||
26162CDE000
|
heap
|
page read and write
|
||
1C9F3000
|
stack
|
page read and write
|
||
126E4000
|
trusted library allocation
|
page read and write
|
||
12FDF000
|
trusted library allocation
|
page read and write
|
||
1C6FE000
|
stack
|
page read and write
|
||
CAB000
|
heap
|
page read and write
|
||
7FF848D46000
|
trusted library allocation
|
page execute and read and write
|
||
FF5000
|
heap
|
page read and write
|
||
7FF848D91000
|
trusted library allocation
|
page execute and read and write
|
||
1B3C9000
|
heap
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
7FF848D16000
|
trusted library allocation
|
page read and write
|
||
7FF848D2C000
|
trusted library allocation
|
page execute and read and write
|
||
1BFE3000
|
stack
|
page read and write
|
||
27C24488000
|
heap
|
page read and write
|
||
12B11000
|
trusted library allocation
|
page read and write
|
||
1BF1E000
|
stack
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
12C50000
|
trusted library allocation
|
page read and write
|
||
10F2000
|
heap
|
page read and write
|
||
88A000
|
heap
|
page read and write
|
||
7FF848DA1000
|
trusted library allocation
|
page execute and read and write
|
||
27C244E0000
|
heap
|
page read and write
|
||
27C244E0000
|
heap
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page execute and read and write
|
||
27C244C3000
|
heap
|
page read and write
|
||
7FF848C73000
|
trusted library allocation
|
page read and write
|
||
1015000
|
heap
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
7FF848CBC000
|
trusted library allocation
|
page execute and read and write
|
||
1EB006F0000
|
heap
|
page read and write
|
||
1B12E000
|
stack
|
page read and write
|
||
26162D08000
|
heap
|
page read and write
|
||
26162CC7000
|
heap
|
page read and write
|
||
7FF848CA8000
|
trusted library allocation
|
page read and write
|
||
C3C000
|
heap
|
page read and write
|
||
7FF848E9D000
|
trusted library allocation
|
page read and write
|
||
27C24560000
|
heap
|
page read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page read and write
|
||
7FF848D76000
|
trusted library allocation
|
page execute and read and write
|
||
1C7FE000
|
stack
|
page read and write
|
||
234E000
|
stack
|
page read and write
|
||
858000
|
heap
|
page read and write
|
||
AA2000
|
heap
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
1C37E000
|
stack
|
page read and write
|
||
1BABE000
|
stack
|
page read and write
|
||
7FF848C76000
|
trusted library allocation
|
page read and write
|
||
2E6A000
|
trusted library allocation
|
page read and write
|
||
12FCF000
|
trusted library allocation
|
page read and write
|
||
7FF848D4C000
|
trusted library allocation
|
page execute and read and write
|
||
DF159FF000
|
stack
|
page read and write
|
||
1B39C000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
2C7D000
|
trusted library allocation
|
page read and write
|
||
2944000
|
trusted library allocation
|
page read and write
|
||
12D08000
|
trusted library allocation
|
page read and write
|
There are 1463 hidden memdumps, click here to show them.