Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
0JLWNg4Sz1.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Google\Update\DViaOgnvmAhwCXZ.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Google\Update\DViaOgnvmAhwCXZ.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Microsoft\Edge\smartscreen.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Microsoft\Edge\smartscreen.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft OneDrive\setup\DViaOgnvmAhwCXZ.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\DViaOgnvmAhwCXZ.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\StartMenuExperienceHost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\StartMenuExperienceHost.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\0JLWNg4Sz1.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\oLZ05R153F.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\ALzNWdSZ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\KjTCumlu.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Google\Update\3e8b633d968cb5
|
ASCII text, with very long lines (845), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\Microsoft\Edge\2afe4ed40d5a86
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Microsoft OneDrive\setup\3e8b633d968cb5
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\Microsoft OneDrive\setup\DViaOgnvmAhwCXZ.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Recovery\3e8b633d968cb5
|
ASCII text, with very long lines (827), with no line terminators
|
dropped
|
||
C:\Recovery\55b276f4edf653
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Recovery\DViaOgnvmAhwCXZ.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\DViaOgnvmAhwCXZ.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\StartMenuExperienceHost.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\smartscreen.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aC4Ftn18Tq
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\Desktop\b773b89e2bfe58
|
ASCII text, with very long lines (762), with no line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 16 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\0JLWNg4Sz1.exe
|
"C:\Users\user\Desktop\0JLWNg4Sz1.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DViaOgnvmAhwCXZD" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Microsoft OneDrive\setup\DViaOgnvmAhwCXZ.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DViaOgnvmAhwCXZ" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft OneDrive\setup\DViaOgnvmAhwCXZ.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DViaOgnvmAhwCXZD" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Microsoft OneDrive\setup\DViaOgnvmAhwCXZ.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DViaOgnvmAhwCXZD" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\google\Update\DViaOgnvmAhwCXZ.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DViaOgnvmAhwCXZ" /sc ONLOGON /tr "'C:\Program Files (x86)\google\Update\DViaOgnvmAhwCXZ.exe'" /rl
HIGHEST /f
|
||
C:\ProgramData\Microsoft OneDrive\setup\DViaOgnvmAhwCXZ.exe
|
"C:\Users\All Users\Microsoft OneDrive\setup\DViaOgnvmAhwCXZ.exe"
|
||
C:\Program Files (x86)\Google\Update\DViaOgnvmAhwCXZ.exe
|
"C:\Program Files (x86)\google\Update\DViaOgnvmAhwCXZ.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DViaOgnvmAhwCXZD" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\google\Update\DViaOgnvmAhwCXZ.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DViaOgnvmAhwCXZD" /sc MINUTE /mo 9 /tr "'C:\Recovery\DViaOgnvmAhwCXZ.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DViaOgnvmAhwCXZ" /sc ONLOGON /tr "'C:\Recovery\DViaOgnvmAhwCXZ.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DViaOgnvmAhwCXZD" /sc MINUTE /mo 12 /tr "'C:\Recovery\DViaOgnvmAhwCXZ.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 12 /tr "'C:\Recovery\StartMenuExperienceHost.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Recovery\StartMenuExperienceHost.exe'" /rl HIGHEST
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 9 /tr "'C:\Recovery\StartMenuExperienceHost.exe'" /rl HIGHEST
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "smartscreens" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\microsoft\Edge\smartscreen.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "smartscreen" /sc ONLOGON /tr "'C:\Program Files (x86)\microsoft\Edge\smartscreen.exe'" /rl HIGHEST
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "smartscreens" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\microsoft\Edge\smartscreen.exe'" /rl
HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "0JLWNg4Sz10" /sc MINUTE /mo 10 /tr "'C:\Users\user\Desktop\0JLWNg4Sz1.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "0JLWNg4Sz1" /sc ONLOGON /tr "'C:\Users\user\Desktop\0JLWNg4Sz1.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "0JLWNg4Sz10" /sc MINUTE /mo 14 /tr "'C:\Users\user\Desktop\0JLWNg4Sz1.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\oLZ05R153F.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Users\user\Desktop\0JLWNg4Sz1.exe
|
C:\Users\user\Desktop\0JLWNg4Sz1.exe
|
||
C:\Users\user\Desktop\0JLWNg4Sz1.exe
|
C:\Users\user\Desktop\0JLWNg4Sz1.exe
|
||
C:\Program Files (x86)\Microsoft\Edge\smartscreen.exe
|
"C:\Program Files (x86)\microsoft\Edge\smartscreen.exe"
|
||
C:\Program Files (x86)\Microsoft\Edge\smartscreen.exe
|
"C:\Program Files (x86)\microsoft\Edge\smartscreen.exe"
|
||
C:\Recovery\StartMenuExperienceHost.exe
|
C:\Recovery\StartMenuExperienceHost.exe
|
||
C:\Recovery\StartMenuExperienceHost.exe
|
C:\Recovery\StartMenuExperienceHost.exe
|
||
C:\Recovery\StartMenuExperienceHost.exe
|
"C:\Recovery\StartMenuExperienceHost.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
There are 22 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://977255cm.nyashkoon.in/secureWindows.php
|
188.114.96.3
|
||
http://977255cm.nyashkoon.in/
|
unknown
|
||
http://977255cm.nyashkoon.in
|
unknown
|
||
http://977255cm.nyashkX
|
unknown
|
||
http://977255cm.nyashkX:t
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
977255cm.nyashkoon.in
|
188.114.96.3
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
977255cm.nyashkoon.in
|
European Union
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\262e9cc7e8741ec11e895b457975c7e7a3aa5176
|
6e18fa973baad7ceda19b04ae72fa7ac7fc15aae
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\DViaOgnvmAhwCXZ_RASMANCS
|
FileDirectory
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2E12000
|
trusted library allocation
|
page read and write
|
||
2C73000
|
trusted library allocation
|
page read and write
|
||
27FE000
|
trusted library allocation
|
page read and write
|
||
FA2000
|
unkown
|
page readonly
|
||
13471000
|
trusted library allocation
|
page read and write
|
||
2E63000
|
trusted library allocation
|
page read and write
|
||
2F62000
|
trusted library allocation
|
page read and write
|
||
7FFD9B688000
|
trusted library allocation
|
page read and write
|
||
17D0000
|
trusted library allocation
|
page read and write
|
||
7EF000
|
heap
|
page read and write
|
||
7FFD9B7F8000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
19A9000
|
heap
|
page read and write
|
||
3F0A000
|
trusted library allocation
|
page read and write
|
||
3F3E000
|
trusted library allocation
|
page read and write
|
||
7B9000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
FD5000
|
unkown
|
page readonly
|
||
7FFD9B868000
|
trusted library allocation
|
page read and write
|
||
B03000
|
trusted library allocation
|
page read and write
|
||
2F5C000
|
trusted library allocation
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
12E5D000
|
trusted library allocation
|
page read and write
|
||
3474000
|
trusted library allocation
|
page read and write
|
||
3461000
|
trusted library allocation
|
page read and write
|
||
1C51C000
|
heap
|
page read and write
|
||
7FFD9B65D000
|
trusted library allocation
|
page execute and read and write
|
||
1B7B2000
|
heap
|
page read and write
|
||
1C4F0000
|
heap
|
page read and write
|
||
33CC000
|
trusted library allocation
|
page read and write
|
||
152D000
|
heap
|
page read and write
|
||
35AC000
|
trusted library allocation
|
page read and write
|
||
2E23000
|
trusted library allocation
|
page read and write
|
||
34F2000
|
trusted library allocation
|
page read and write
|
||
1B99F000
|
stack
|
page read and write
|
||
34DB000
|
trusted library allocation
|
page read and write
|
||
2552000
|
trusted library allocation
|
page read and write
|
||
1820000
|
heap
|
page read and write
|
||
7FFD9B7E9000
|
trusted library allocation
|
page read and write
|
||
31A3000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
32A9000
|
trusted library allocation
|
page read and write
|
||
36CD000
|
trusted library allocation
|
page read and write
|
||
1725000
|
heap
|
page read and write
|
||
7FFD9B818000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
7FFD9B670000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page execute and read and write
|
||
1170000
|
heap
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page read and write
|
||
13041000
|
trusted library allocation
|
page read and write
|
||
1B8BD000
|
heap
|
page read and write
|
||
7FFD9B66D000
|
trusted library allocation
|
page execute and read and write
|
||
3141000
|
trusted library allocation
|
page read and write
|
||
3264000
|
trusted library allocation
|
page read and write
|
||
7FFD9B69C000
|
trusted library allocation
|
page execute and read and write
|
||
2C7B000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
trusted library allocation
|
page read and write
|
||
1BF8E000
|
stack
|
page read and write
|
||
253B000
|
trusted library allocation
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
15AF000
|
stack
|
page read and write
|
||
1C637000
|
heap
|
page read and write
|
||
1BE88000
|
heap
|
page read and write
|
||
125ED000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
2570000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
2EFC000
|
trusted library allocation
|
page read and write
|
||
2CE61EF0000
|
heap
|
page read and write
|
||
7FFD9B87D000
|
trusted library allocation
|
page read and write
|
||
26A0000
|
heap
|
page execute and read and write
|
||
1510000
|
heap
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
2F4D000
|
trusted library allocation
|
page read and write
|
||
1AD96000
|
heap
|
page read and write
|
||
2AAB000
|
trusted library allocation
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
12E17000
|
trusted library allocation
|
page read and write
|
||
118A000
|
heap
|
page read and write
|
||
17DE000
|
stack
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page execute and read and write
|
||
136F000
|
heap
|
page read and write
|
||
253F000
|
trusted library allocation
|
page read and write
|
||
1C528000
|
heap
|
page read and write
|
||
1208000
|
heap
|
page read and write
|
||
1BC8D000
|
heap
|
page read and write
|
||
2CE61F9A000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
3023000
|
trusted library allocation
|
page read and write
|
||
2ED9000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
124E1000
|
trusted library allocation
|
page read and write
|
||
12401000
|
trusted library allocation
|
page read and write
|
||
1C0F0000
|
heap
|
page read and write
|
||
1E8B7FF0000
|
heap
|
page read and write
|
||
3406000
|
trusted library allocation
|
page read and write
|
||
2EB6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A1000
|
trusted library allocation
|
page execute and read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
3EAC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B746000
|
trusted library allocation
|
page execute and read and write
|
||
1C64F000
|
heap
|
page read and write
|
||
2F8F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B672000
|
trusted library allocation
|
page read and write
|
||
2550000
|
trusted library allocation
|
page read and write
|
||
7FFD9B658000
|
trusted library allocation
|
page read and write
|
||
3E96000
|
trusted library allocation
|
page read and write
|
||
12411000
|
trusted library allocation
|
page read and write
|
||
1B7C8000
|
heap
|
page read and write
|
||
2EDB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page execute and read and write
|
||
134A1000
|
trusted library allocation
|
page read and write
|
||
3002000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
26B0000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
7FFD9B68B000
|
trusted library allocation
|
page execute and read and write
|
||
C35000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page execute and read and write
|
||
2576000
|
trusted library allocation
|
page read and write
|
||
160C000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
3462000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B837000
|
trusted library allocation
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
34B5000
|
trusted library allocation
|
page read and write
|
||
19C5000
|
heap
|
page read and write
|
||
7FFD9B7F6000
|
trusted library allocation
|
page read and write
|
||
153C000
|
heap
|
page read and write
|
||
7FFD9B818000
|
trusted library allocation
|
page read and write
|
||
2CE61EF5000
|
heap
|
page read and write
|
||
1A6F0000
|
trusted library allocation
|
page read and write
|
||
160D000
|
heap
|
page read and write
|
||
34E0000
|
trusted library allocation
|
page read and write
|
||
33DF000
|
trusted library allocation
|
page read and write
|
||
3ED4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
2C71000
|
trusted library allocation
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
32D9000
|
heap
|
page read and write
|
||
7FFD9B668000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
1480000
|
heap
|
page execute and read and write
|
||
2CEC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B64D000
|
trusted library allocation
|
page execute and read and write
|
||
342F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B972000
|
trusted library allocation
|
page read and write
|
||
7FFD9B716000
|
trusted library allocation
|
page read and write
|
||
3E7E000
|
trusted library allocation
|
page read and write
|
||
3158000
|
trusted library allocation
|
page read and write
|
||
3156000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
14A5000
|
heap
|
page read and write
|
||
7FFD9B71C000
|
trusted library allocation
|
page execute and read and write
|
||
345F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B70C000
|
trusted library allocation
|
page execute and read and write
|
||
15B8000
|
heap
|
page read and write
|
||
7FFD9B746000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B87E000
|
trusted library allocation
|
page read and write
|
||
33FD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B85E000
|
trusted library allocation
|
page read and write
|
||
3E6A000
|
trusted library allocation
|
page read and write
|
||
3EEC000
|
trusted library allocation
|
page read and write
|
||
1BD8E000
|
stack
|
page read and write
|
||
7FFD9B71C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
331F000
|
stack
|
page read and write
|
||
153E000
|
heap
|
page read and write
|
||
12407000
|
trusted library allocation
|
page read and write
|
||
3469000
|
trusted library allocation
|
page read and write
|
||
1BABF000
|
stack
|
page read and write
|
||
FE2000
|
unkown
|
page readonly
|
||
7FFD9BBB3000
|
trusted library allocation
|
page read and write
|
||
33C6000
|
trusted library allocation
|
page read and write
|
||
128AD000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
7FFD9B716000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B69B000
|
trusted library allocation
|
page execute and read and write
|
||
13327000
|
trusted library allocation
|
page read and write
|
||
1BF7E000
|
stack
|
page read and write
|
||
7FFD9B66D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
2EBC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B653000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B680000
|
trusted library allocation
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
2F77000
|
trusted library allocation
|
page read and write
|
||
14F9000
|
heap
|
page read and write
|
||
7FFD9B736000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B982000
|
trusted library allocation
|
page read and write
|
||
7FFD9B827000
|
trusted library allocation
|
page read and write
|
||
1B490000
|
trusted library allocation
|
page read and write
|
||
3FF71FE000
|
stack
|
page read and write
|
||
11CB000
|
heap
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
3110000
|
heap
|
page execute and read and write
|
||
11C0000
|
heap
|
page read and write
|
||
7FFD9B66D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6CC000
|
trusted library allocation
|
page execute and read and write
|
||
34FD000
|
trusted library allocation
|
page read and write
|
||
339C000
|
trusted library allocation
|
page read and write
|
||
34B3000
|
trusted library allocation
|
page read and write
|
||
1830000
|
trusted library allocation
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
1410000
|
trusted library allocation
|
page read and write
|
||
3F3A000
|
trusted library allocation
|
page read and write
|
||
332F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B844000
|
trusted library allocation
|
page read and write
|
||
7FFD9B736000
|
trusted library allocation
|
page execute and read and write
|
||
DA0000
|
heap
|
page read and write
|
||
156A000
|
heap
|
page read and write
|
||
2F35000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7FA000
|
trusted library allocation
|
page read and write
|
||
17FE000
|
stack
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
1B790000
|
heap
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page read and write
|
||
3485000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
3EE4000
|
trusted library allocation
|
page read and write
|
||
7DA000
|
heap
|
page read and write
|
||
3267000
|
trusted library allocation
|
page read and write
|
||
7FFD9B710000
|
trusted library allocation
|
page execute and read and write
|
||
1350D000
|
trusted library allocation
|
page read and write
|
||
34CF000
|
trusted library allocation
|
page read and write
|
||
2DE2000
|
trusted library allocation
|
page read and write
|
||
1B8D8000
|
heap
|
page read and write
|
||
3455000
|
trusted library allocation
|
page read and write
|
||
3F1C000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
32BB000
|
trusted library allocation
|
page read and write
|
||
1348D000
|
trusted library allocation
|
page read and write
|
||
3EA6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B690000
|
trusted library allocation
|
page read and write
|
||
12EF1000
|
trusted library allocation
|
page read and write
|
||
74A000
|
heap
|
page read and write
|
||
7FFD9B872000
|
trusted library allocation
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
2574000
|
trusted library allocation
|
page read and write
|
||
12FE7000
|
trusted library allocation
|
page read and write
|
||
23FE000
|
stack
|
page read and write
|
||
7FFD9B87E000
|
trusted library allocation
|
page read and write
|
||
19C0000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
7FFD9B87D000
|
trusted library allocation
|
page read and write
|
||
AC5000
|
heap
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
7FFD9B69C000
|
trusted library allocation
|
page execute and read and write
|
||
2F4B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B68D000
|
trusted library allocation
|
page execute and read and write
|
||
3190000
|
heap
|
page read and write
|
||
1BFEF000
|
stack
|
page read and write
|
||
7FFD9B6BC000
|
trusted library allocation
|
page execute and read and write
|
||
1BDF0000
|
heap
|
page read and write
|
||
1058000
|
heap
|
page read and write
|
||
3421000
|
trusted library allocation
|
page read and write
|
||
32A7000
|
trusted library allocation
|
page read and write
|
||
3327000
|
trusted library allocation
|
page read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
1B8BB000
|
heap
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
1306000
|
heap
|
page read and write
|
||
146F000
|
stack
|
page read and write
|
||
7FFD9B652000
|
trusted library allocation
|
page read and write
|
||
7FFD9B673000
|
trusted library allocation
|
page read and write
|
||
7FFD9B864000
|
trusted library allocation
|
page read and write
|
||
1B8C2000
|
heap
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
36C9000
|
trusted library allocation
|
page read and write
|
||
1C566000
|
heap
|
page read and write
|
||
738000
|
heap
|
page read and write
|
||
3EC4000
|
trusted library allocation
|
page read and write
|
||
2C8B000
|
trusted library allocation
|
page read and write
|
||
1E8B7FF0000
|
heap
|
page read and write
|
||
1015000
|
heap
|
page read and write
|
||
132A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B862000
|
trusted library allocation
|
page read and write
|
||
2F54000
|
trusted library allocation
|
page read and write
|
||
1C653000
|
heap
|
page read and write
|
||
120B000
|
heap
|
page read and write
|
||
7FFD9B878000
|
trusted library allocation
|
page read and write
|
||
1B13E000
|
stack
|
page read and write
|
||
2572000
|
trusted library allocation
|
page read and write
|
||
7FFD9B660000
|
trusted library allocation
|
page read and write
|
||
7FFD9B680000
|
trusted library allocation
|
page read and write
|
||
1C675000
|
heap
|
page read and write
|
||
1C631000
|
heap
|
page read and write
|
||
3EBA000
|
trusted library allocation
|
page read and write
|
||
1B8CA000
|
stack
|
page read and write
|
||
2F84000
|
trusted library allocation
|
page read and write
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
2FD3000
|
trusted library allocation
|
page read and write
|
||
830000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B668000
|
trusted library allocation
|
page read and write
|
||
331F000
|
trusted library allocation
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page read and write
|
||
889000
|
heap
|
page read and write
|
||
7FFD9B858000
|
trusted library allocation
|
page read and write
|
||
1E8B7F10000
|
heap
|
page read and write
|
||
11C7000
|
heap
|
page read and write
|
||
7FFD9B684000
|
trusted library allocation
|
page read and write
|
||
12E21000
|
trusted library allocation
|
page read and write
|
||
7FFD9B834000
|
trusted library allocation
|
page read and write
|
||
1C2EB000
|
stack
|
page read and write
|
||
1C510000
|
heap
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
FE6000
|
unkown
|
page readonly
|
||
7FFD9B82C000
|
trusted library allocation
|
page read and write
|
||
1B9EB000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1C0FD000
|
heap
|
page read and write
|
||
12E11000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6F6000
|
trusted library allocation
|
page read and write
|
||
1BE86000
|
heap
|
page read and write
|
||
1BE4E000
|
heap
|
page read and write
|
||
166D000
|
heap
|
page read and write
|
||
2F7A000
|
trusted library allocation
|
page read and write
|
||
1220000
|
trusted library allocation
|
page read and write
|
||
7FFD9B726000
|
trusted library allocation
|
page execute and read and write
|
||
27D4000
|
trusted library allocation
|
page read and write
|
||
345B000
|
trusted library allocation
|
page read and write
|
||
2FDC000
|
trusted library allocation
|
page read and write
|
||
3533000
|
trusted library allocation
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
1E8B7FF0000
|
heap
|
page read and write
|
||
7FFD9B69D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B67D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B65D000
|
trusted library allocation
|
page execute and read and write
|
||
AAF000
|
stack
|
page read and write
|
||
7FFD9B710000
|
trusted library allocation
|
page execute and read and write
|
||
25E0000
|
heap
|
page execute and read and write
|
||
B32000
|
stack
|
page read and write
|
||
1B56D000
|
stack
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
1E8B8000000
|
heap
|
page read and write
|
||
1AFCC000
|
heap
|
page read and write
|
||
12E91000
|
trusted library allocation
|
page read and write
|
||
1BCBE000
|
stack
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
2DCD000
|
trusted library allocation
|
page read and write
|
||
329F000
|
stack
|
page read and write
|
||
7FFD9B663000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
heap
|
page execute and read and write
|
||
1BD7D000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
301D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page read and write
|
||
2E20000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
1C0FF000
|
stack
|
page read and write
|
||
1AC4B000
|
stack
|
page read and write
|
||
1B9BE000
|
stack
|
page read and write
|
||
2B0F000
|
trusted library allocation
|
page read and write
|
||
1C596000
|
heap
|
page read and write
|
||
1BB3F000
|
stack
|
page read and write
|
||
7FFD9B854000
|
trusted library allocation
|
page read and write
|
||
27E8000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
7FFD9B828000
|
trusted library allocation
|
page read and write
|
||
134DD000
|
trusted library allocation
|
page read and write
|
||
13461000
|
trusted library allocation
|
page read and write
|
||
1AA42000
|
heap
|
page read and write
|
||
7FFD9B88D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
17A5000
|
heap
|
page read and write
|
||
30C0000
|
heap
|
page execute and read and write
|
||
FA2000
|
unkown
|
page readonly
|
||
1B8B0000
|
heap
|
page execute and read and write
|
||
2E2B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
1110000
|
heap
|
page read and write
|
||
7FFD9B710000
|
trusted library allocation
|
page read and write
|
||
17CF000
|
stack
|
page read and write
|
||
3EA2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page execute and read and write
|
||
1C625000
|
heap
|
page read and write
|
||
332B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B808000
|
trusted library allocation
|
page read and write
|
||
1B28E000
|
stack
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
2544000
|
trusted library allocation
|
page read and write
|
||
7FFD9B806000
|
trusted library allocation
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
128BF000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page read and write
|
||
136B000
|
heap
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
2E1B000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
2DB1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B650000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
12FF1000
|
trusted library allocation
|
page read and write
|
||
810000
|
trusted library allocation
|
page read and write
|
||
3464000
|
trusted library allocation
|
page read and write
|
||
334C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
3444000
|
trusted library allocation
|
page read and write
|
||
27D7000
|
trusted library allocation
|
page read and write
|
||
13E5000
|
heap
|
page read and write
|
||
3330000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6AC000
|
trusted library allocation
|
page execute and read and write
|
||
2565000
|
trusted library allocation
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
1B590000
|
heap
|
page execute and read and write
|
||
1AF30000
|
heap
|
page execute and read and write
|
||
7FFD9B862000
|
trusted library allocation
|
page read and write
|
||
71E000
|
stack
|
page read and write
|
||
18D5000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
3F4A000
|
trusted library allocation
|
page read and write
|
||
11C5000
|
heap
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
7FFD9B844000
|
trusted library allocation
|
page read and write
|
||
3F48000
|
trusted library allocation
|
page read and write
|
||
3445000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
12FE1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6F6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B650000
|
trusted library allocation
|
page read and write
|
||
15FF000
|
heap
|
page read and write
|
||
7FFD9B67B000
|
trusted library allocation
|
page execute and read and write
|
||
1589000
|
heap
|
page read and write
|
||
1E8B8001000
|
heap
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
3321000
|
trusted library allocation
|
page read and write
|
||
157B000
|
heap
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
1B39D000
|
stack
|
page read and write
|
||
1506000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
760000
|
heap
|
page read and write
|
||
7FFD9B84D000
|
trusted library allocation
|
page read and write
|
||
3401000
|
trusted library allocation
|
page read and write
|
||
3431000
|
trusted library allocation
|
page read and write
|
||
12F71000
|
trusted library allocation
|
page read and write
|
||
1516000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page execute and read and write
|
||
1C60D000
|
heap
|
page read and write
|
||
1BC70000
|
heap
|
page read and write
|
||
1BEE0000
|
heap
|
page read and write
|
||
1880000
|
heap
|
page read and write
|
||
3EC2000
|
trusted library allocation
|
page read and write
|
||
3290000
|
unkown
|
page readonly
|
||
128BA000
|
trusted library allocation
|
page read and write
|
||
27F7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B878000
|
trusted library allocation
|
page read and write
|
||
1BFEF000
|
stack
|
page read and write
|
||
1E8B8001000
|
heap
|
page read and write
|
||
7FFD9B7A1000
|
trusted library allocation
|
page execute and read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B726000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page read and write
|
||
7FFD9B85D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
7FFD9B69C000
|
trusted library allocation
|
page execute and read and write
|
||
1E8B8000000
|
heap
|
page read and write
|
||
1342000
|
heap
|
page read and write
|
||
1E8B7F50000
|
heap
|
page read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
12FFD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B65D000
|
trusted library allocation
|
page execute and read and write
|
||
17E0000
|
heap
|
page read and write
|
||
2EE3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B68B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
33DB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B653000
|
trusted library allocation
|
page read and write
|
||
32AB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B670000
|
trusted library allocation
|
page read and write
|
||
3F30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page read and write
|
||
7FFD9B86D000
|
trusted library allocation
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
3460000
|
trusted library allocation
|
page read and write
|
||
7FFD9B70C000
|
trusted library allocation
|
page execute and read and write
|
||
132B1000
|
trusted library allocation
|
page read and write
|
||
254C000
|
trusted library allocation
|
page read and write
|
||
2613000
|
trusted library allocation
|
page read and write
|
||
1BE8F000
|
stack
|
page read and write
|
||
16EA000
|
heap
|
page read and write
|
||
311F000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
339F000
|
trusted library allocation
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
7FFD9B654000
|
trusted library allocation
|
page read and write
|
||
1B073000
|
heap
|
page read and write
|
||
897000
|
heap
|
page read and write
|
||
3472000
|
trusted library allocation
|
page read and write
|
||
11AB000
|
heap
|
page read and write
|
||
2DB4000
|
trusted library allocation
|
page read and write
|
||
3461000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page execute and read and write
|
||
1C4EC000
|
stack
|
page read and write
|
||
2FFE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B875000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
1485000
|
heap
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
343C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
16F3000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
346C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
1BE1C000
|
heap
|
page read and write
|
||
7FFD9B85D000
|
trusted library allocation
|
page read and write
|
||
1E8B8001000
|
heap
|
page read and write
|
||
3463000
|
trusted library allocation
|
page read and write
|
||
1BC60000
|
heap
|
page read and write
|
||
7FFD9B808000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
trusted library allocation
|
page read and write
|
||
3ECE000
|
trusted library allocation
|
page read and write
|
||
345D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B874000
|
trusted library allocation
|
page read and write
|
||
2D19000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
7FFD9B7F8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
7FFD9B813000
|
trusted library allocation
|
page read and write
|
||
1206000
|
heap
|
page read and write
|
||
3199000
|
heap
|
page read and write
|
||
132F1000
|
trusted library allocation
|
page read and write
|
||
2F78000
|
trusted library allocation
|
page read and write
|
||
166F000
|
heap
|
page read and write
|
||
2E19000
|
trusted library allocation
|
page read and write
|
||
313F000
|
trusted library allocation
|
page read and write
|
||
2EE1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B88D000
|
trusted library allocation
|
page read and write
|
||
3004000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page read and write
|
||
26A3000
|
heap
|
page execute and read and write
|
||
7FFD9B882000
|
trusted library allocation
|
page read and write
|
||
1B7E6000
|
heap
|
page read and write
|
||
1ADE000
|
stack
|
page read and write
|
||
7FFD9B865000
|
trusted library allocation
|
page read and write
|
||
2554000
|
trusted library allocation
|
page read and write
|
||
33F2000
|
trusted library allocation
|
page read and write
|
||
3412000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page read and write
|
||
7FFD9B803000
|
trusted library allocation
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
1C103000
|
heap
|
page read and write
|
||
1A25000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
2CE61DC0000
|
heap
|
page read and write
|
||
1B82D000
|
stack
|
page read and write
|
||
7FFD9B64D000
|
trusted library allocation
|
page execute and read and write
|
||
C30000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
7FFD9B854000
|
trusted library allocation
|
page read and write
|
||
7FFD9B874000
|
trusted library allocation
|
page read and write
|
||
153F000
|
heap
|
page read and write
|
||
1C5F3000
|
heap
|
page read and write
|
||
1577000
|
heap
|
page read and write
|
||
7FFD9B660000
|
trusted library allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
1C135000
|
heap
|
page read and write
|
||
10C6000
|
heap
|
page read and write
|
||
333B000
|
trusted library allocation
|
page read and write
|
||
311D000
|
trusted library allocation
|
page read and write
|
||
13451000
|
trusted library allocation
|
page read and write
|
||
1B1FD000
|
stack
|
page read and write
|
||
7FFD9B6F6000
|
trusted library allocation
|
page read and write
|
||
3498000
|
trusted library allocation
|
page read and write
|
||
7FFD9B658000
|
trusted library allocation
|
page read and write
|
||
1E8B8005000
|
heap
|
page read and write
|
||
2DC2000
|
trusted library allocation
|
page read and write
|
||
36F1000
|
trusted library allocation
|
page read and write
|
||
2DE4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
7FFD9B65D000
|
trusted library allocation
|
page execute and read and write
|
||
11A0000
|
heap
|
page read and write
|
||
1BC6F000
|
stack
|
page read and write
|
||
1C7EE000
|
stack
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B720000
|
trusted library allocation
|
page execute and read and write
|
||
1C8EE000
|
stack
|
page read and write
|
||
7FFD9B872000
|
trusted library allocation
|
page read and write
|
||
2D16000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
7FFD9B663000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page execute and read and write
|
||
3F16000
|
trusted library allocation
|
page read and write
|
||
130C000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
3679000
|
trusted library allocation
|
page read and write
|
||
1BC80000
|
heap
|
page read and write
|
||
7FFD9B882000
|
trusted library allocation
|
page read and write
|
||
73C000
|
heap
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
3686000
|
trusted library allocation
|
page read and write
|
||
3132000
|
trusted library allocation
|
page read and write
|
||
1BE7C000
|
stack
|
page read and write
|
||
15EF000
|
stack
|
page read and write
|
||
7FFD9B65D000
|
trusted library allocation
|
page execute and read and write
|
||
26B9000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
3416000
|
trusted library allocation
|
page read and write
|
||
7FFD9B653000
|
trusted library allocation
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
3F10000
|
trusted library allocation
|
page read and write
|
||
3124000
|
trusted library allocation
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
162B000
|
heap
|
page read and write
|
||
1BBC9000
|
stack
|
page read and write
|
||
34D9000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
33EC000
|
trusted library allocation
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
22F0000
|
heap
|
page execute and read and write
|
||
B80000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
7FFD9B664000
|
trusted library allocation
|
page read and write
|
||
1531000
|
heap
|
page read and write
|
||
1850000
|
trusted library allocation
|
page read and write
|
||
132F7000
|
trusted library allocation
|
page read and write
|
||
1307D000
|
trusted library allocation
|
page read and write
|
||
134EA000
|
trusted library allocation
|
page read and write
|
||
3EF4000
|
trusted library allocation
|
page read and write
|
||
182F000
|
stack
|
page read and write
|
||
2EDD000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
heap
|
page execute and read and write
|
||
1C07E000
|
stack
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
3F5A000
|
trusted library allocation
|
page read and write
|
||
25DE000
|
stack
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
7FFD9B720000
|
trusted library allocation
|
page read and write
|
||
326A000
|
trusted library allocation
|
page read and write
|
||
1641000
|
heap
|
page read and write
|
||
29B6000
|
trusted library allocation
|
page read and write
|
||
321F000
|
stack
|
page read and write
|
||
36D4000
|
trusted library allocation
|
page read and write
|
||
16A9000
|
heap
|
page read and write
|
||
311B000
|
trusted library allocation
|
page read and write
|
||
3429000
|
trusted library allocation
|
page read and write
|
||
132C000
|
heap
|
page read and write
|
||
1329000
|
heap
|
page read and write
|
||
2401000
|
trusted library allocation
|
page read and write
|
||
1C3ED000
|
stack
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
7FFD9B746000
|
trusted library allocation
|
page execute and read and write
|
||
1BC3E000
|
stack
|
page read and write
|
||
7FFD9B706000
|
trusted library allocation
|
page read and write
|
||
1565000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page execute and read and write
|
||
11AD000
|
heap
|
page read and write
|
||
257F000
|
trusted library allocation
|
page read and write
|
||
132A7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B654000
|
trusted library allocation
|
page read and write
|
||
7FFD9B818000
|
trusted library allocation
|
page read and write
|
||
7FFD9B654000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7F8000
|
trusted library allocation
|
page read and write
|
||
2E11000
|
trusted library allocation
|
page read and write
|
||
2EDF000
|
trusted library allocation
|
page read and write
|
||
1C5DD000
|
heap
|
page read and write
|
||
7FFD9B86C000
|
trusted library allocation
|
page read and write
|
||
2FE5000
|
trusted library allocation
|
page read and write
|
||
12E21000
|
trusted library allocation
|
page read and write
|
||
11DD000
|
heap
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
3F4D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
3752000
|
trusted library allocation
|
page read and write
|
||
1C113000
|
heap
|
page read and write
|
||
2CE61F90000
|
heap
|
page read and write
|
||
11D8000
|
heap
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
2E29000
|
trusted library allocation
|
page read and write
|
||
1CA8B000
|
stack
|
page read and write
|
||
1C18F000
|
stack
|
page read and write
|
||
7FFD9B807000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83D000
|
trusted library allocation
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
36FA000
|
trusted library allocation
|
page read and write
|
||
3349000
|
trusted library allocation
|
page read and write
|
||
7FFD9B86E000
|
trusted library allocation
|
page read and write
|
||
33C6000
|
trusted library allocation
|
page read and write
|
||
2E42000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6AC000
|
trusted library allocation
|
page execute and read and write
|
||
3470000
|
trusted library allocation
|
page read and write
|
||
1541000
|
heap
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
2F86000
|
trusted library allocation
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
1C5AE000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
2E9F000
|
trusted library allocation
|
page read and write
|
||
1E8B8190000
|
heap
|
page read and write
|
||
7FFD9B643000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B65D000
|
trusted library allocation
|
page execute and read and write
|
||
36C7000
|
trusted library allocation
|
page read and write
|
||
1BEFE000
|
stack
|
page read and write
|
||
7FFD9B642000
|
trusted library allocation
|
page read and write
|
||
7F2000
|
heap
|
page read and write
|
||
1C59E000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
13381000
|
trusted library allocation
|
page read and write
|
||
19DE000
|
stack
|
page read and write
|
||
3292000
|
unkown
|
page readonly
|
||
11C2000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
7FFD9B684000
|
trusted library allocation
|
page read and write
|
||
2DD7000
|
trusted library allocation
|
page read and write
|
||
3161000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B85E000
|
trusted library allocation
|
page read and write
|
||
11E2000
|
stack
|
page read and write
|
||
134D1000
|
trusted library allocation
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
2DD5000
|
trusted library allocation
|
page read and write
|
||
2F64000
|
trusted library allocation
|
page read and write
|
||
7FFD9B80C000
|
trusted library allocation
|
page read and write
|
||
2DEF000
|
trusted library allocation
|
page read and write
|
||
12C71000
|
trusted library allocation
|
page read and write
|
||
1B9C5000
|
stack
|
page read and write
|
||
7FFD9B7A4000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B730000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B756000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B80A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
1552000
|
heap
|
page read and write
|
||
134F3000
|
trusted library allocation
|
page read and write
|
||
32F3000
|
trusted library allocation
|
page read and write
|
||
367F000
|
trusted library allocation
|
page read and write
|
||
1B8B0000
|
heap
|
page read and write
|
||
7FFD9B868000
|
trusted library allocation
|
page read and write
|
||
3346000
|
trusted library allocation
|
page read and write
|
||
7FFD9B653000
|
trusted library allocation
|
page execute and read and write
|
||
3413000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page read and write
|
||
1BDE0000
|
heap
|
page execute and read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
2567000
|
trusted library allocation
|
page read and write
|
||
150C000
|
heap
|
page read and write
|
||
3F28000
|
trusted library allocation
|
page read and write
|
||
36D9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page read and write
|
||
136F000
|
stack
|
page read and write
|
||
7FFD9B7E0000
|
trusted library allocation
|
page read and write
|
||
119A000
|
heap
|
page read and write
|
||
1BC89000
|
heap
|
page read and write
|
||
1C4F9000
|
heap
|
page read and write
|
||
14E2000
|
stack
|
page read and write
|
||
7FFD9B683000
|
trusted library allocation
|
page read and write
|
||
7FFD9B815000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
1C5BE000
|
heap
|
page read and write
|
||
7FFD9B67D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
33D9000
|
trusted library allocation
|
page read and write
|
||
3496000
|
trusted library allocation
|
page read and write
|
||
7FFD9B668000
|
trusted library allocation
|
page read and write
|
||
2DAD000
|
trusted library allocation
|
page read and write
|
||
32C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
3EF6000
|
trusted library allocation
|
page read and write
|
||
3450000
|
heap
|
page execute and read and write
|
||
7FFD9B64D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page execute and read and write
|
||
1720000
|
heap
|
page read and write
|
||
125B1000
|
trusted library allocation
|
page read and write
|
||
3F44000
|
trusted library allocation
|
page read and write
|
||
1BC70000
|
heap
|
page read and write
|
||
2FC9000
|
trusted library allocation
|
page read and write
|
||
1BE7E000
|
stack
|
page read and write
|
||
33F4000
|
trusted library allocation
|
page read and write
|
||
2F88000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
33AF000
|
trusted library allocation
|
page read and write
|
||
15B6000
|
heap
|
page read and write
|
||
7FFD9B808000
|
trusted library allocation
|
page read and write
|
||
33E1000
|
trusted library allocation
|
page read and write
|
||
2D63000
|
trusted library allocation
|
page read and write
|
||
33C5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page read and write
|
||
3EB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page execute and read and write
|
||
1606000
|
heap
|
page read and write
|
||
1B760000
|
heap
|
page read and write
|
||
1BE5B000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page execute and read and write
|
||
3410000
|
trusted library allocation
|
page read and write
|
||
2DE8000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
heap
|
page execute and read and write
|
||
7FFD9B678000
|
trusted library allocation
|
page read and write
|
||
2832000
|
trusted library allocation
|
page read and write
|
||
7FFD9B643000
|
trusted library allocation
|
page execute and read and write
|
||
11C0000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B663000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
33DD000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B664000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
1440000
|
heap
|
page read and write
|
||
1C63E000
|
heap
|
page read and write
|
||
1BEB6000
|
heap
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page read and write
|
||
33E3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B855000
|
trusted library allocation
|
page read and write
|
||
1BC8E000
|
stack
|
page read and write
|
||
1BA80000
|
heap
|
page read and write
|
||
26C1000
|
trusted library allocation
|
page read and write
|
||
34D1000
|
trusted library allocation
|
page read and write
|
||
18FE000
|
stack
|
page read and write
|
||
2CE61F98000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
3242000
|
trusted library allocation
|
page read and write
|
||
3492000
|
trusted library allocation
|
page read and write
|
||
2FCF000
|
trusted library allocation
|
page read and write
|
||
1B5CE000
|
stack
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page execute and read and write
|
||
1160000
|
heap
|
page read and write
|
||
7FFD9B892000
|
trusted library allocation
|
page read and write
|
||
2F82000
|
trusted library allocation
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
3466000
|
trusted library allocation
|
page read and write
|
||
7FFD9B854000
|
trusted library allocation
|
page read and write
|
||
2F4F000
|
trusted library allocation
|
page read and write
|
||
1BF7A000
|
stack
|
page read and write
|
||
27D1000
|
trusted library allocation
|
page read and write
|
||
2AA9000
|
heap
|
page read and write
|
||
3451000
|
trusted library allocation
|
page read and write
|
||
1AFE4000
|
heap
|
page read and write
|
||
3006000
|
trusted library allocation
|
page read and write
|
||
2E8F000
|
trusted library allocation
|
page read and write
|
||
1800000
|
heap
|
page read and write
|
||
2F6F000
|
trusted library allocation
|
page read and write
|
||
17A0000
|
heap
|
page read and write
|
||
D92000
|
stack
|
page read and write
|
||
7FFD9B7B1000
|
trusted library allocation
|
page execute and read and write
|
||
36F4000
|
trusted library allocation
|
page read and write
|
||
131CD000
|
trusted library allocation
|
page read and write
|
||
2CEF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B720000
|
trusted library allocation
|
page execute and read and write
|
||
3464000
|
trusted library allocation
|
page read and write
|
||
101C000
|
heap
|
page read and write
|
||
12FC1000
|
trusted library allocation
|
page read and write
|
||
1BC50000
|
heap
|
page execute and read and write
|
||
1E8B7F00000
|
heap
|
page read and write
|
||
1CB8E000
|
stack
|
page read and write
|
||
7FFD9B854000
|
trusted library allocation
|
page read and write
|
||
13331000
|
trusted library allocation
|
page read and write
|
||
2DAB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
1B03E000
|
stack
|
page read and write
|
||
36F7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
1BC3F000
|
stack
|
page read and write
|
||
3154000
|
trusted library allocation
|
page read and write
|
||
7FFD9B706000
|
trusted library allocation
|
page read and write
|
||
7FFD9B663000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B85C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B653000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B844000
|
trusted library allocation
|
page read and write
|
||
7FFD9B684000
|
trusted library allocation
|
page read and write
|
||
7FFD9B726000
|
trusted library allocation
|
page read and write
|
||
1890000
|
heap
|
page read and write
|
||
E50BC7E000
|
stack
|
page read and write
|
||
1BBBE000
|
stack
|
page read and write
|
||
7FFD9B7F6000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
7FFD9B67B000
|
trusted library allocation
|
page execute and read and write
|
||
1490000
|
heap
|
page read and write
|
||
7FF41D1F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B80C000
|
trusted library allocation
|
page read and write
|
||
2EB9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B68D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B818000
|
trusted library allocation
|
page read and write
|
||
1C3EA000
|
stack
|
page read and write
|
||
1BDF0000
|
heap
|
page read and write
|
||
3487000
|
trusted library allocation
|
page read and write
|
||
3393000
|
trusted library allocation
|
page read and write
|
||
32A0000
|
heap
|
page execute and read and write
|
||
1196000
|
heap
|
page read and write
|
||
1C561000
|
heap
|
page read and write
|
||
3442000
|
trusted library allocation
|
page read and write
|
||
2E8C000
|
trusted library allocation
|
page read and write
|
||
2D1C000
|
trusted library allocation
|
page read and write
|
||
2E83000
|
trusted library allocation
|
page read and write
|
||
1BAC7000
|
stack
|
page read and write
|
||
2FEF000
|
trusted library allocation
|
page read and write
|
||
300F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B864000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
33C9000
|
trusted library allocation
|
page read and write
|
||
3F08000
|
trusted library allocation
|
page read and write
|
||
1399000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
2DCF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
7FFD9B670000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page execute and read and write
|
||
1430000
|
heap
|
page read and write
|
||
3FF6D1C000
|
stack
|
page read and write
|
||
18D0000
|
heap
|
page read and write
|
||
32A1000
|
trusted library allocation
|
page read and write
|
||
2CE61EC0000
|
heap
|
page read and write
|
||
2FF6000
|
trusted library allocation
|
page read and write
|
||
1BEC6000
|
heap
|
page read and write
|
||
1C558000
|
heap
|
page read and write
|
||
3494000
|
trusted library allocation
|
page read and write
|
||
1018000
|
heap
|
page read and write
|
||
1BE90000
|
heap
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
1BD90000
|
heap
|
page execute and read and write
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
2FD1000
|
trusted library allocation
|
page read and write
|
||
102B000
|
heap
|
page read and write
|
||
7FFD9B86E000
|
trusted library allocation
|
page read and write
|
||
33CB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B862000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page read and write
|
||
12C77000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page read and write
|
||
2E21000
|
trusted library allocation
|
page read and write
|
||
2F03000
|
trusted library allocation
|
page read and write
|
||
2E1F000
|
trusted library allocation
|
page read and write
|
||
342B000
|
trusted library allocation
|
page read and write
|
||
3EEA000
|
trusted library allocation
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
7FFD9B66D000
|
trusted library allocation
|
page execute and read and write
|
||
1BED0000
|
heap
|
page read and write
|
||
127A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B67D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B875000
|
trusted library allocation
|
page read and write
|
||
2DAF000
|
trusted library allocation
|
page read and write
|
||
10E2000
|
stack
|
page read and write
|
||
3F20000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
346F000
|
trusted library allocation
|
page read and write
|
||
12E97000
|
trusted library allocation
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
7FFD9B643000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B664000
|
trusted library allocation
|
page read and write
|
||
7FFD9B678000
|
trusted library allocation
|
page read and write
|
||
7FFD9B808000
|
trusted library allocation
|
page read and write
|
||
3F26000
|
trusted library allocation
|
page read and write
|
||
1B89F000
|
stack
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
33EE000
|
trusted library allocation
|
page read and write
|
||
2C79000
|
trusted library allocation
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
7FFD9B823000
|
trusted library allocation
|
page read and write
|
||
2E2B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B791000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B674000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page read and write
|
||
157E000
|
heap
|
page read and write
|
||
7FFD9B67D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6AC000
|
trusted library allocation
|
page execute and read and write
|
||
1580000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B736000
|
trusted library allocation
|
page execute and read and write
|
||
2CE61EA0000
|
heap
|
page read and write
|
||
1895000
|
heap
|
page read and write
|
||
3261000
|
trusted library allocation
|
page read and write
|
||
7FFD9B644000
|
trusted library allocation
|
page read and write
|
||
315F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B673000
|
trusted library allocation
|
page read and write
|
||
102E000
|
heap
|
page read and write
|
||
7FFD9B858000
|
trusted library allocation
|
page read and write
|
||
3ECC000
|
trusted library allocation
|
page read and write
|
||
1BD80000
|
heap
|
page read and write
|
||
1643000
|
heap
|
page read and write
|
||
7FFD9B674000
|
trusted library allocation
|
page read and write
|
||
2F75000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
1A20000
|
heap
|
page read and write
|
||
735000
|
heap
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page execute and read and write
|
||
A7D000
|
stack
|
page read and write
|
||
37A5000
|
trusted library allocation
|
page read and write
|
||
2CFF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8CA000
|
trusted library allocation
|
page read and write
|
||
3300000
|
trusted library allocation
|
page read and write
|
||
2FE2000
|
trusted library allocation
|
page read and write
|
||
12C81000
|
trusted library allocation
|
page read and write
|
||
1B88D000
|
stack
|
page read and write
|
||
26C9000
|
trusted library allocation
|
page read and write
|
||
3476000
|
trusted library allocation
|
page read and write
|
||
1BEDB000
|
heap
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
7FFD9B726000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1940000
|
heap
|
page read and write
|
||
72B000
|
heap
|
page read and write
|
||
7FFD9B700000
|
trusted library allocation
|
page read and write
|
||
352000
|
stack
|
page read and write
|
||
E50B92C000
|
stack
|
page read and write
|
||
1B776000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
7FFD9B673000
|
trusted library allocation
|
page read and write
|
||
367C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B844000
|
trusted library allocation
|
page read and write
|
||
7FFD9B854000
|
trusted library allocation
|
page read and write
|
||
7FFD9B67D000
|
trusted library allocation
|
page execute and read and write
|
||
312C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page execute and read and write
|
||
1E8B7F40000
|
heap
|
page read and write
|
||
7FFD9B66D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B84D000
|
trusted library allocation
|
page read and write
|
||
3270000
|
trusted library allocation
|
page read and write
|
||
2F6D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B653000
|
trusted library allocation
|
page execute and read and write
|
||
1BE12000
|
heap
|
page read and write
|
||
326D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B884000
|
trusted library allocation
|
page read and write
|
||
3689000
|
trusted library allocation
|
page read and write
|
||
1C5E6000
|
heap
|
page read and write
|
||
1885000
|
heap
|
page read and write
|
||
1B18E000
|
stack
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
2DBC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
12EA1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B80C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B640000
|
trusted library allocation
|
page read and write
|
||
7FFD9B864000
|
trusted library allocation
|
page read and write
|
||
2FCD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B66D000
|
trusted library allocation
|
page execute and read and write
|
||
1C551000
|
heap
|
page read and write
|
||
1AF90000
|
heap
|
page read and write
|
||
2DE6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6FC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
7FFD9B678000
|
trusted library allocation
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
13301000
|
trusted library allocation
|
page read and write
|
||
1C10E000
|
heap
|
page read and write
|
||
7FFD9B710000
|
trusted library allocation
|
page read and write
|
||
7FFD9B86D000
|
trusted library allocation
|
page read and write
|
||
344D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B872000
|
trusted library allocation
|
page read and write
|
||
33FF000
|
trusted library allocation
|
page read and write
|
||
3724000
|
trusted library allocation
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
7FFD9B694000
|
trusted library allocation
|
page read and write
|
||
1BE8F000
|
stack
|
page read and write
|
||
13191000
|
trusted library allocation
|
page read and write
|
||
1B5A0000
|
heap
|
page read and write
|
||
3ED8000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
342D000
|
trusted library allocation
|
page read and write
|
||
2556000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B67D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page execute and read and write
|
||
1C5A2000
|
heap
|
page read and write
|
||
7FFD9B664000
|
trusted library allocation
|
page read and write
|
||
343E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B706000
|
trusted library allocation
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
3414000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
326E000
|
stack
|
page read and write
|
||
7FFD9B791000
|
trusted library allocation
|
page execute and read and write
|
||
13321000
|
trusted library allocation
|
page read and write
|
||
1C0EE000
|
stack
|
page read and write
|
||
7FFD9B660000
|
trusted library allocation
|
page read and write
|
||
7FFD9B663000
|
trusted library allocation
|
page execute and read and write
|
||
3418000
|
trusted library allocation
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
32C7000
|
trusted library allocation
|
page read and write
|
||
36D9000
|
trusted library allocation
|
page read and write
|
||
16E7000
|
heap
|
page read and write
|
||
7FFD9B66B000
|
trusted library allocation
|
page execute and read and write
|
||
3EB8000
|
trusted library allocation
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
1B23E000
|
stack
|
page read and write
|
||
30A3000
|
trusted library allocation
|
page read and write
|
||
3EDE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B674000
|
trusted library allocation
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
7FFD9B828000
|
trusted library allocation
|
page read and write
|
||
1BEED000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page execute and read and write
|
||
1AD80000
|
heap
|
page read and write
|
||
2DC5000
|
trusted library allocation
|
page read and write
|
||
130C1000
|
trusted library allocation
|
page read and write
|
||
133D1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
7FFD9B882000
|
trusted library allocation
|
page read and write
|
||
1BB8E000
|
stack
|
page read and write
|
||
253D000
|
trusted library allocation
|
page read and write
|
||
27DA000
|
trusted library allocation
|
page read and write
|
||
2541000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page execute and read and write
|
||
DC0000
|
heap
|
page read and write
|
||
1AD70000
|
heap
|
page read and write
|
||
7FFD9B664000
|
trusted library allocation
|
page read and write
|
||
74C000
|
heap
|
page read and write
|
||
1BEA7000
|
heap
|
page read and write
|
||
344F000
|
trusted library allocation
|
page read and write
|
||
2E4D000
|
trusted library allocation
|
page read and write
|
||
2E17000
|
trusted library allocation
|
page read and write
|
||
1C1EF000
|
stack
|
page read and write
|
||
3150000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAEC000
|
trusted library allocation
|
page read and write
|
||
1C50B000
|
heap
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page execute and read and write
|
||
126C1000
|
trusted library allocation
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
1B8AD000
|
stack
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page read and write
|
||
3EFE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B803000
|
trusted library allocation
|
page read and write
|
||
1C5D8000
|
heap
|
page read and write
|
||
7FFD9B700000
|
trusted library allocation
|
page read and write
|
||
7FFD9B673000
|
trusted library allocation
|
page execute and read and write
|
||
32F1000
|
trusted library allocation
|
page read and write
|
||
3274000
|
trusted library allocation
|
page read and write
|
||
7FFD9B72C000
|
trusted library allocation
|
page execute and read and write
|
||
B40000
|
heap
|
page read and write
|
||
1BE3A000
|
heap
|
page read and write
|
||
2FED000
|
trusted library allocation
|
page read and write
|
||
7FFD9B865000
|
trusted library allocation
|
page read and write
|
||
1B7A0000
|
heap
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
11A8000
|
heap
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
1B9E0000
|
heap
|
page execute and read and write
|
||
7FFD9B674000
|
trusted library allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
7FFD9B700000
|
trusted library allocation
|
page execute and read and write
|
||
2FCB000
|
trusted library allocation
|
page read and write
|
||
1C6B8000
|
heap
|
page read and write
|
||
1BC70000
|
heap
|
page read and write
|
||
1BEE9000
|
heap
|
page read and write
|
||
34D3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
2E91000
|
trusted library allocation
|
page read and write
|
||
1BA9E000
|
stack
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
3051000
|
trusted library allocation
|
page read and write
|
||
2FE1000
|
trusted library allocation
|
page read and write
|
||
DF5000
|
heap
|
page read and write
|
||
1C61E000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
7B6000
|
heap
|
page read and write
|
||
7FFD9B813000
|
trusted library allocation
|
page read and write
|
||
7FFD9B834000
|
trusted library allocation
|
page read and write
|
||
7FFD9B68D000
|
trusted library allocation
|
page execute and read and write
|
||
2578000
|
trusted library allocation
|
page read and write
|
||
19A0000
|
heap
|
page read and write
|
||
7FFD9B806000
|
trusted library allocation
|
page read and write
|
||
7FFD9B716000
|
trusted library allocation
|
page read and write
|
||
2410000
|
trusted library allocation
|
page read and write
|
||
F52000
|
stack
|
page read and write
|
||
1C52B000
|
heap
|
page read and write
|
||
3490000
|
trusted library allocation
|
page read and write
|
||
1160000
|
trusted library allocation
|
page read and write
|
||
3134000
|
trusted library allocation
|
page read and write
|
||
1B79E000
|
stack
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
2C77000
|
trusted library allocation
|
page read and write
|
||
3471000
|
trusted library allocation
|
page read and write
|
||
1BFFF000
|
stack
|
page read and write
|
||
7FFD9B855000
|
trusted library allocation
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
3682000
|
trusted library allocation
|
page read and write
|
||
1C549000
|
heap
|
page read and write
|
||
1554000
|
heap
|
page read and write
|
||
2F9C000
|
trusted library allocation
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
7FFD9B823000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
1C130000
|
heap
|
page read and write
|
||
7FFD9B658000
|
trusted library allocation
|
page read and write
|
||
25C0000
|
trusted library allocation
|
page read and write
|
||
128C7000
|
trusted library allocation
|
page read and write
|
||
158C000
|
heap
|
page read and write
|
||
341F000
|
trusted library allocation
|
page read and write
|
||
8A5000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
349F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
312E000
|
trusted library allocation
|
page read and write
|
||
2DFE000
|
trusted library allocation
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
1C08E000
|
stack
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
3F00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
347F000
|
trusted library allocation
|
page read and write
|
||
1C577000
|
heap
|
page read and write
|
||
2CC3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A4000
|
trusted library allocation
|
page execute and read and write
|
||
1B06A000
|
heap
|
page read and write
|
||
1C5A5000
|
heap
|
page read and write
|
||
1E8B7FCB000
|
heap
|
page read and write
|
||
359B000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
unkown
|
page readonly
|
||
7FFD9B662000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
7FFD9B7B1000
|
trusted library allocation
|
page execute and read and write
|
||
1BDE3000
|
heap
|
page execute and read and write
|
||
FB0000
|
heap
|
page read and write
|
||
E50B9AF000
|
stack
|
page read and write
|
||
1B930000
|
heap
|
page execute and read and write
|
||
3277000
|
trusted library allocation
|
page read and write
|
||
8A5000
|
heap
|
page read and write
|
||
134F0000
|
trusted library allocation
|
page read and write
|
||
3676000
|
trusted library allocation
|
page read and write
|
||
12D51000
|
trusted library allocation
|
page read and write
|
||
12871000
|
trusted library allocation
|
page read and write
|
||
1BFFF000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page execute and read and write
|
||
3F32000
|
trusted library allocation
|
page read and write
|
||
3E90000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
heap
|
page execute and read and write
|
||
255F000
|
trusted library allocation
|
page read and write
|
||
3329000
|
trusted library allocation
|
page read and write
|
||
BD5000
|
heap
|
page read and write
|
||
1B41D000
|
stack
|
page read and write
|
||
1BA3E000
|
stack
|
page read and write
|
||
7FFD9B66D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
7FFD9B644000
|
trusted library allocation
|
page read and write
|
||
3119000
|
heap
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B644000
|
trusted library allocation
|
page read and write
|
||
13401000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
1C5ED000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
3FF70FF000
|
unkown
|
page read and write
|
||
1E8B7FC0000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
7FFD9B6BC000
|
trusted library allocation
|
page execute and read and write
|
||
100B000
|
heap
|
page read and write
|
||
7FFD9B663000
|
trusted library allocation
|
page execute and read and write
|
||
3147000
|
trusted library allocation
|
page read and write
|
||
1C110000
|
heap
|
page read and write
|
||
1531000
|
heap
|
page read and write
|
||
7FFD9B664000
|
trusted library allocation
|
page read and write
|
||
33DE000
|
stack
|
page read and write
|
||
1A98D000
|
stack
|
page read and write
|
||
7FFD9B7FA000
|
trusted library allocation
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
3373000
|
trusted library allocation
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
There are 1292 hidden memdumps, click here to show them.