Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
New PO 796512.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New PO 796512.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Documents\New PO 796512.pif
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\New PO 796512.pif.pif
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\New PO 796512.pif.pif.pif
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\New PO 796512.pif.pif.pif.pif
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Documents\New PO 796512.pif.pif.pif.pif:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\Documents\New PO 796512.pif.pif.pif:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\Documents\New PO 796512.pif.pif:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\Documents\New PO 796512.pif:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New PO 796512.pif.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New PO 796512.pif.pif.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New PO 796512.pif.pif.pif.log
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 3 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\New PO 796512.exe
|
"C:\Users\user\Desktop\New PO 796512.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512" /t REG_SZ /F /D "C:\Users\user\Documents\New
PO 796512.pif"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512" /t REG_SZ /F /D "C:\Users\user\Documents\New
PO 796512.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Desktop\New PO 796512.exe" "C:\Users\user\Documents\New PO 796512.pif"
|
||
C:\Users\user\Desktop\New PO 796512.exe
|
"C:\Users\user\Desktop\New PO 796512.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\Explorer.EXE
|
||
C:\Windows\SysWOW64\msdt.exe
|
"C:\Windows\SysWOW64\msdt.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
/c del "C:\Users\user\Desktop\New PO 796512.exe"
|
||
C:\Users\user\Documents\New PO 796512.pif
|
"C:\Users\user\Documents\New PO 796512.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New
PO 796512.pif.pif"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New
PO 796512.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\New PO 796512.pif" "C:\Users\user\Documents\New PO 796512.pif.pif"
|
||
C:\Users\user\Documents\New PO 796512.pif
|
"C:\Users\user\Documents\New PO 796512.pif"
|
||
C:\Users\user\Documents\New PO 796512.pif
|
"C:\Users\user\Documents\New PO 796512.pif"
|
||
C:\Users\user\Documents\New PO 796512.pif
|
"C:\Users\user\Documents\New PO 796512.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\SysWOW64\cmd.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New
PO 796512.pif.pif"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New
PO 796512.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\New PO 796512.pif" "C:\Users\user\Documents\New PO 796512.pif.pif"
|
||
C:\Users\user\Documents\New PO 796512.pif
|
"C:\Users\user\Documents\New PO 796512.pif"
|
||
C:\Users\user\Documents\New PO 796512.pif
|
"C:\Users\user\Documents\New PO 796512.pif"
|
||
C:\Users\user\Documents\New PO 796512.pif.pif
|
"C:\Users\user\Documents\New PO 796512.pif.pif"
|
||
C:\Windows\SysWOW64\msiexec.exe
|
"C:\Windows\SysWOW64\msiexec.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New
PO 796512.pif.pif.pif"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New
PO 796512.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\New PO 796512.pif.pif" "C:\Users\user\Documents\New PO 796512.pif.pif.pif"
|
||
C:\Users\user\Documents\New PO 796512.pif.pif
|
"C:\Users\user\Documents\New PO 796512.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\SysWOW64\cmd.exe"
|
||
C:\Users\user\Documents\New PO 796512.pif.pif
|
"C:\Users\user\Documents\New PO 796512.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New
PO 796512.pif.pif.pif"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New
PO 796512.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\New PO 796512.pif.pif" "C:\Users\user\Documents\New PO 796512.pif.pif.pif"
|
||
C:\Users\user\Documents\New PO 796512.pif.pif
|
"C:\Users\user\Documents\New PO 796512.pif.pif"
|
||
C:\Users\user\Documents\New PO 796512.pif.pif
|
"C:\Users\user\Documents\New PO 796512.pif.pif"
|
||
C:\Users\user\Documents\New PO 796512.pif.pif.pif
|
"C:\Users\user\Documents\New PO 796512.pif.pif.pif"
|
||
C:\Windows\SysWOW64\msdt.exe
|
"C:\Windows\SysWOW64\msdt.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New
PO 796512.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New
PO 796512.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\New PO 796512.pif.pif.pif" "C:\Users\user\Documents\New PO 796512.pif.pif.pif.pif"
|
||
C:\Users\user\Documents\New PO 796512.pif.pif.pif
|
"C:\Users\user\Documents\New PO 796512.pif.pif.pif"
|
||
C:\Users\user\Documents\New PO 796512.pif.pif.pif
|
"C:\Users\user\Documents\New PO 796512.pif.pif.pif"
|
||
C:\Users\user\Documents\New PO 796512.pif.pif.pif
|
"C:\Users\user\Documents\New PO 796512.pif.pif.pif"
|
||
C:\Windows\SysWOW64\mstsc.exe
|
"C:\Windows\SysWOW64\mstsc.exe"
|
||
C:\Users\user\Documents\New PO 796512.pif.pif.pif
|
"C:\Users\user\Documents\New PO 796512.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New
PO 796512.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "New PO 796512.pif.pif.pif" /t REG_SZ /F /D "C:\Users\user\Documents\New
PO 796512.pif.pif.pif.pif"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c Copy "C:\Users\user\Documents\New PO 796512.pif.pif.pif" "C:\Users\user\Documents\New PO 796512.pif.pif.pif.pif"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\autoconv.exe
|
"C:\Windows\SysWOW64\autoconv.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 54 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.hronika.fun/o62s/
|
|||
http://www.gtg.store
|
unknown
|
||
http://www.uikstudy.sbs
|
unknown
|
||
http://www.ukulbagus10.click
|
unknown
|
||
https://api.msn.com:443/v1/news/Feed/Windows?t
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
|
unknown
|
||
https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
|
unknown
|
||
https://api.msn.com:443/v1/news/Feed/Windows?
|
unknown
|
||
https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter
|
unknown
|
||
http://www.uikstudy.sbs/o62s/
|
unknown
|
||
http://www.ukulbagus10.click/o62s/
|
unknown
|
||
http://www.pertforces.store/o62s/www.kipoxz.xyz
|
unknown
|
||
https://excel.office.com
|
unknown
|
||
https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
|
unknown
|
||
http://www.iveworks.xyzReferer:
|
unknown
|
||
http://www.hronika.fun/o62s/www.iveworks.xyz
|
unknown
|
||
http://www.ottostar.motorcycles
|
unknown
|
||
http://www.ukulbagus10.clickReferer:
|
unknown
|
||
http://www.onghi292.topReferer:
|
unknown
|
||
http://www.ottostar.motorcyclesReferer:
|
unknown
|
||
http://www.pertforces.store/o62s/
|
unknown
|
||
http://www.epiyiisigorta.onlineReferer:
|
unknown
|
||
http://www.2045.pictures/o62s/www.hronika.fun
|
unknown
|
||
http://www.enisehirarnavutkoy.xyzReferer:
|
unknown
|
||
http://www.hronika.fun
|
unknown
|
||
https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&oc
|
unknown
|
||
http://www.epiyiisigorta.online
|
unknown
|
||
https://wns.windows.com/
|
unknown
|
||
http://www.2045.pictures/o62s/
|
unknown
|
||
http://www.pertforces.storeReferer:
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.itoolz.net/o62s/
|
unknown
|
||
http://www.heterraceongregory.store
|
unknown
|
||
http://www.autoitscript.com/autoit3/J
|
unknown
|
||
https://word.office.com
|
unknown
|
||
http://www.iveworks.xyz
|
unknown
|
||
http://www.kipoxz.xyzReferer:
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
|
unknown
|
||
http://www.kipoxz.xyz/o62s/
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
|
unknown
|
||
http://www.hronika.funReferer:
|
unknown
|
||
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
|
unknown
|
||
http://www.2045.pictures
|
unknown
|
||
https://rn3-sa.com/1454
|
66.29.153.238
|
||
https://outlook.com
|
unknown
|
||
http://www.2045.picturesReferer:
|
unknown
|
||
https://rn3-sa.com
|
unknown
|
||
http://www.heterraceongregory.store/o62s/www.onghi292.top
|
unknown
|
||
http://www.ukulbagus10.click/o62s/www.epiyiisigorta.online
|
unknown
|
||
http://www.enisehirarnavutkoy.xyz/o62s/www.regnancy-10606.bond
|
unknown
|
||
https://android.notify.windows.com/iOS
|
unknown
|
||
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
|
unknown
|
||
https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
|
unknown
|
||
http://www.epiyiisigorta.online/o62s/
|
unknown
|
||
http://www.kipoxz.xyz
|
unknown
|
||
http://www.regnancy-10606.bondReferer:
|
unknown
|
||
https://api.msn.com/v1/news/Feed/Windows?
|
unknown
|
||
https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua
|
unknown
|
||
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
|
unknown
|
||
https://www.pollensense.com/
|
unknown
|
||
http://www.ottostar.motorcycles/o62s/www.2045.pictures
|
unknown
|
||
http://www.axiquynhongiare.asiaReferer:
|
unknown
|
||
http://www.hronika.fun/o62s/
|
unknown
|
||
http://www.axiquynhongiare.asia
|
unknown
|
||
https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
|
unknown
|
||
https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
|
unknown
|
||
http://schemas.micro
|
unknown
|
||
https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
|
unknown
|
||
http://www.onghi292.top/o62s/www.uikstudy.sbs
|
unknown
|
||
http://www.enisehirarnavutkoy.xyz/o62s/
|
unknown
|
||
http://www.heterraceongregory.store/o62s/
|
unknown
|
||
https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-
|
unknown
|
||
http://www.iveworks.xyz/o62s/
|
unknown
|
||
https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
|
unknown
|
||
http://www.ottostar.motorcycles/o62s/
|
unknown
|
||
http://www.axiquynhongiare.asia/o62s/
|
unknown
|
||
https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
|
unknown
|
||
http://www.iveworks.xyz/o62s/www.enisehirarnavutkoy.xyz
|
unknown
|
||
http://www.heterraceongregory.storeReferer:
|
unknown
|
||
http://www.gtg.store/o62s/www.ukulbagus10.click
|
unknown
|
||
http://www.enisehirarnavutkoy.xyz
|
unknown
|
||
http://www.onghi292.top
|
unknown
|
||
https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsm
|
unknown
|
||
http://www.itoolz.netReferer:
|
unknown
|
||
http://www.regnancy-10606.bond
|
unknown
|
||
http://www.pertforces.store
|
unknown
|
||
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
|
unknown
|
||
https://powerpoint.office.com
|
unknown
|
||
http://www.foreca.com
|
unknown
|
||
http://crl.microU
|
unknown
|
||
http://www.regnancy-10606.bond/o62s/www.gtg.store
|
unknown
|
||
http://www.regnancy-10606.bond/o62s/
|
unknown
|
||
http://www.uikstudy.sbsReferer:
|
unknown
|
||
http://www.gtg.store/o62s/
|
unknown
|
||
http://www.gtg.storeReferer:
|
unknown
|
||
http://www.onghi292.top/o62s/
|
unknown
|
||
http://www.uikstudy.sbs/o62s/www.pertforces.store
|
unknown
|
||
http://www.kipoxz.xyz/o62s/www.ottostar.motorcycles
|
unknown
|
||
https://api.msn.com/
|
unknown
|
||
http://www.axiquynhongiare.asia/o62s/www.itoolz.net
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.heterraceongregory.store
|
unknown
|
||
www.onghi292.top
|
unknown
|
||
www.uikstudy.sbs
|
unknown
|
||
www.pertforces.store
|
unknown
|
||
rn3-sa.com
|
66.29.153.238
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
66.29.153.238
|
rn3-sa.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
New PO 796512
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
New PO 796512.pif
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
New PO 796512.pif.pif
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
New PO 796512.pif.pif.pif
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\New PO 796512_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
a
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000004044A
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000080082
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
b
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000060450
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000005045A
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
c
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000006045E
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000070452
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
d
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000A0454
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000D005A
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs.cvs.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
e
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000009046C
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000D0450
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs.cvs.cvs.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
f
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000E0450
|
VirtualDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
Classes
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
|
~reserved~
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
|
IconLayouts
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\GameDVR
|
KGLToGCSUpdatedRevision
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
HRZR_PGYFRFFVBA
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
|
P:\Hfref\sebagqrfx\Qbphzragf\Arj CB 796512.cvs.cvs.cvs.cvs.cvs
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
|
MRUList
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
There are 103 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2830000
|
system
|
page execute and read and write
|
||
640000
|
system
|
page execute and read and write
|
||
3260000
|
trusted library allocation
|
page read and write
|
||
4194000
|
trusted library allocation
|
page read and write
|
||
4059000
|
trusted library allocation
|
page read and write
|
||
770000
|
system
|
page execute and read and write
|
||
4146000
|
trusted library allocation
|
page read and write
|
||
3230000
|
unclassified section
|
page execute and read and write
|
||
2E00000
|
system
|
page execute and read and write
|
||
2710000
|
system
|
page execute and read and write
|
||
2F90000
|
system
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1097000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
79A0000
|
unkown
|
page read and write
|
||
66FE000
|
stack
|
page read and write
|
||
46F6000
|
unkown
|
page read and write
|
||
11910000
|
system
|
page execute and read and write
|
||
C46F000
|
unkown
|
page read and write
|
||
7FF5570C1000
|
unkown
|
page readonly
|
||
7FF55752E000
|
unkown
|
page readonly
|
||
2B40000
|
heap
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
7040D000
|
unkown
|
page read and write
|
||
2C05000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
7FF5574F4000
|
unkown
|
page readonly
|
||
10484000
|
unkown
|
page read and write
|
||
591E000
|
stack
|
page read and write
|
||
11FD000
|
trusted library allocation
|
page execute and read and write
|
||
1606000
|
direct allocation
|
page execute and read and write
|
||
3AD000
|
stack
|
page read and write
|
||
7FF5574B3000
|
unkown
|
page readonly
|
||
AFFF000
|
stack
|
page read and write
|
||
53F3000
|
heap
|
page read and write
|
||
A888000
|
unkown
|
page read and write
|
||
121E000
|
heap
|
page read and write
|
||
5A3E000
|
stack
|
page read and write
|
||
378C000
|
trusted library allocation
|
page read and write
|
||
C47F000
|
unkown
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
84D000
|
stack
|
page read and write
|
||
10B6A000
|
system
|
page execute and read and write
|
||
45A000
|
system
|
page execute and read and write
|
||
C18A000
|
unkown
|
page read and write
|
||
8BD9000
|
stack
|
page read and write
|
||
2E9D000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
A156000
|
unkown
|
page read and write
|
||
55C6000
|
trusted library allocation
|
page read and write
|
||
7FF557099000
|
unkown
|
page readonly
|
||
1178000
|
heap
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
105C4000
|
unkown
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
B72B000
|
stack
|
page read and write
|
||
7FF556E48000
|
unkown
|
page readonly
|
||
F85000
|
heap
|
page read and write
|
||
3940000
|
heap
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
798E000
|
stack
|
page read and write
|
||
B41000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
7FF557568000
|
unkown
|
page readonly
|
||
4D6D000
|
stack
|
page read and write
|
||
7FF557113000
|
unkown
|
page readonly
|
||
C3B3000
|
unkown
|
page read and write
|
||
1237000
|
heap
|
page read and write
|
||
2ADE000
|
unkown
|
page read and write
|
||
7FF557302000
|
unkown
|
page readonly
|
||
7FF557627000
|
unkown
|
page readonly
|
||
7FF5573EA000
|
unkown
|
page readonly
|
||
7FF5573A9000
|
unkown
|
page readonly
|
||
C31000
|
unkown
|
page readonly
|
||
2FA5000
|
heap
|
page read and write
|
||
2F6F000
|
unkown
|
page read and write
|
||
27B1000
|
heap
|
page read and write
|
||
7FF557463000
|
unkown
|
page readonly
|
||
11E3000
|
trusted library allocation
|
page execute and read and write
|
||
7E05000
|
stack
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
739D000
|
stack
|
page read and write
|
||
1218000
|
heap
|
page read and write
|
||
C4DB000
|
unkown
|
page read and write
|
||
1320000
|
direct allocation
|
page execute and read and write
|
||
9D8E000
|
stack
|
page read and write
|
||
146E000
|
stack
|
page read and write
|
||
30A0000
|
unclassified section
|
page execute and read and write
|
||
8D60000
|
unkown
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
C47F000
|
unkown
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
1213000
|
trusted library allocation
|
page execute and read and write
|
||
C44D000
|
unkown
|
page read and write
|
||
360F000
|
heap
|
page read and write
|
||
303C000
|
heap
|
page read and write
|
||
3FB6000
|
trusted library allocation
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
635E000
|
stack
|
page read and write
|
||
7FF557434000
|
unkown
|
page readonly
|
||
D8A000
|
stack
|
page read and write
|
||
A881000
|
unkown
|
page read and write
|
||
7FF556E9A000
|
unkown
|
page readonly
|
||
4044000
|
trusted library allocation
|
page read and write
|
||
7F600000
|
trusted library allocation
|
page execute and read and write
|
||
5600000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
7FF5575E0000
|
unkown
|
page readonly
|
||
3169000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
7173000
|
unkown
|
page read and write
|
||
1202000
|
trusted library allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
90C9000
|
unkown
|
page read and write
|
||
109A6000
|
system
|
page execute and read and write
|
||
3CE0000
|
direct allocation
|
page execute and read and write
|
||
F40000
|
heap
|
page read and write
|
||
37AF000
|
unkown
|
page read and write
|
||
7FF557426000
|
unkown
|
page readonly
|
||
2C0A000
|
heap
|
page read and write
|
||
7FF556E4B000
|
unkown
|
page readonly
|
||
7FF557103000
|
unkown
|
page readonly
|
||
A114000
|
unkown
|
page read and write
|
||
6888000
|
heap
|
page read and write
|
||
77B0000
|
unkown
|
page read and write
|
||
49D6000
|
heap
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
7F020000
|
trusted library allocation
|
page execute and read and write
|
||
3609000
|
heap
|
page read and write
|
||
4F79000
|
direct allocation
|
page execute and read and write
|
||
C10B000
|
unkown
|
page read and write
|
||
2DE9000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
heap
|
page read and write
|
||
C3E7000
|
unkown
|
page read and write
|
||
6716000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
7FF55730C000
|
unkown
|
page readonly
|
||
5580000
|
heap
|
page read and write
|
||
C18A000
|
unkown
|
page read and write
|
||
4209000
|
trusted library allocation
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
7FF55738F000
|
unkown
|
page readonly
|
||
4785000
|
unkown
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
7306000
|
unkown
|
page read and write
|
||
344E000
|
unkown
|
page read and write
|
||
7FF557280000
|
unkown
|
page readonly
|
||
54AE000
|
trusted library allocation
|
page read and write
|
||
6662000
|
heap
|
page read and write
|
||
3E7E000
|
direct allocation
|
page execute and read and write
|
||
7FF55748F000
|
unkown
|
page readonly
|
||
52F1000
|
trusted library allocation
|
page read and write
|
||
7FF5575B1000
|
unkown
|
page readonly
|
||
5325000
|
trusted library allocation
|
page read and write
|
||
C23A000
|
unkown
|
page read and write
|
||
7FF557429000
|
unkown
|
page readonly
|
||
3450000
|
unkown
|
page read and write
|
||
7FF55752A000
|
unkown
|
page readonly
|
||
10546000
|
unkown
|
page read and write
|
||
2AF4000
|
heap
|
page read and write
|
||
7169000
|
unkown
|
page read and write
|
||
7FF5573ED000
|
unkown
|
page readonly
|
||
3EF9000
|
trusted library allocation
|
page read and write
|
||
7FF557437000
|
unkown
|
page readonly
|
||
B4C000
|
heap
|
page read and write
|
||
6A2E000
|
stack
|
page read and write
|
||
4BD3000
|
heap
|
page read and write
|
||
4CB2000
|
direct allocation
|
page execute and read and write
|
||
B4C000
|
heap
|
page read and write
|
||
3CD7000
|
heap
|
page read and write
|
||
9A90000
|
system
|
page execute and read and write
|
||
896000
|
trusted library allocation
|
page execute and read and write
|
||
2D71000
|
trusted library allocation
|
page read and write
|
||
40B6000
|
trusted library allocation
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
7FF5574C6000
|
unkown
|
page readonly
|
||
297D000
|
stack
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
4732000
|
unkown
|
page read and write
|
||
EC8000
|
heap
|
page read and write
|
||
A8D2000
|
unkown
|
page read and write
|
||
101E000
|
unclassified section
|
page execute and read and write
|
||
72FC000
|
unkown
|
page read and write
|
||
1023000
|
heap
|
page read and write
|
||
1668000
|
direct allocation
|
page execute and read and write
|
||
3CC000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
5860000
|
heap
|
page read and write
|
||
1691000
|
direct allocation
|
page execute and read and write
|
||
32C7000
|
unkown
|
page read and write
|
||
2C0A000
|
heap
|
page read and write
|
||
42F6000
|
trusted library allocation
|
page read and write
|
||
3FE6000
|
trusted library allocation
|
page read and write
|
||
639F000
|
stack
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
B4C000
|
heap
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
14E7000
|
heap
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
553D000
|
stack
|
page read and write
|
||
6DE0000
|
trusted library allocation
|
page read and write
|
||
C2E4000
|
unkown
|
page read and write
|
||
68C9000
|
heap
|
page read and write
|
||
2486000
|
trusted library allocation
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
1CAF000
|
stack
|
page read and write
|
||
4004000
|
trusted library allocation
|
page read and write
|
||
4AB1000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
16A3000
|
direct allocation
|
page execute and read and write
|
||
7FF5573B0000
|
unkown
|
page readonly
|
||
2B7B000
|
stack
|
page read and write
|
||
E13B000
|
stack
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
2DA7000
|
trusted library allocation
|
page execute and read and write
|
||
7FF556FFB000
|
unkown
|
page readonly
|
||
F6C000
|
stack
|
page read and write
|
||
33DE000
|
direct allocation
|
page execute and read and write
|
||
7FF5575BF000
|
unkown
|
page readonly
|
||
7162000
|
unkown
|
page read and write
|
||
BDA000
|
stack
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
7FF5573ED000
|
unkown
|
page readonly
|
||
F3B000
|
heap
|
page read and write
|
||
7FF5572B4000
|
unkown
|
page readonly
|
||
7FF556FEE000
|
unkown
|
page readonly
|
||
8D6C000
|
unkown
|
page read and write
|
||
2D20000
|
trusted library allocation
|
page read and write
|
||
307F000
|
unkown
|
page read and write
|
||
1983000
|
direct allocation
|
page execute and read and write
|
||
A280000
|
unkown
|
page read and write
|
||
6F7000
|
stack
|
page read and write
|
||
2F2F000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
104C2000
|
unkown
|
page read and write
|
||
7FF556E66000
|
unkown
|
page readonly
|
||
7FF557607000
|
unkown
|
page readonly
|
||
5CBD000
|
stack
|
page read and write
|
||
ABE000
|
stack
|
page read and write
|
||
4054000
|
trusted library allocation
|
page read and write
|
||
7FF556E85000
|
unkown
|
page readonly
|
||
8F4D000
|
unkown
|
page read and write
|
||
B0E9000
|
system
|
page execute and read and write
|
||
7FF557293000
|
unkown
|
page readonly
|
||
3FB6000
|
trusted library allocation
|
page read and write
|
||
629E000
|
stack
|
page read and write
|
||
C47F000
|
unkown
|
page read and write
|
||
73C000
|
stack
|
page read and write
|
||
12AE000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
57CD000
|
stack
|
page read and write
|
||
26E2000
|
trusted library allocation
|
page read and write
|
||
913F000
|
unkown
|
page read and write
|
||
2C2C000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
84DC000
|
stack
|
page read and write
|
||
7300000
|
unkown
|
page read and write
|
||
E260000
|
unkown
|
page read and write
|
||
A850000
|
unkown
|
page read and write
|
||
47C0000
|
unkown
|
page read and write
|
||
2908000
|
heap
|
page read and write
|
||
1528000
|
trusted library allocation
|
page read and write
|
||
C46F000
|
unkown
|
page read and write
|
||
4D1D000
|
direct allocation
|
page execute and read and write
|
||
3F29000
|
trusted library allocation
|
page read and write
|
||
7A60000
|
unkown
|
page readonly
|
||
4F7D000
|
direct allocation
|
page execute and read and write
|
||
B42F000
|
stack
|
page read and write
|
||
BC10000
|
unkown
|
page read and write
|
||
7FF557568000
|
unkown
|
page readonly
|
||
17AB000
|
stack
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
11FBA000
|
system
|
page execute and read and write
|
||
6572000
|
heap
|
page read and write
|
||
6870000
|
trusted library allocation
|
page read and write
|
||
6683000
|
heap
|
page read and write
|
||
F522000
|
heap
|
page read and write
|
||
7FF55714D000
|
unkown
|
page readonly
|
||
541E000
|
trusted library allocation
|
page read and write
|
||
651E000
|
stack
|
page read and write
|
||
8DFE000
|
unkown
|
page read and write
|
||
4DC8000
|
heap
|
page read and write
|
||
C06D000
|
unkown
|
page read and write
|
||
7FF5570A6000
|
unkown
|
page readonly
|
||
1492000
|
trusted library allocation
|
page read and write
|
||
EF7000
|
stack
|
page read and write
|
||
3FAD000
|
direct allocation
|
page execute and read and write
|
||
7FF557264000
|
unkown
|
page readonly
|
||
3F1C000
|
trusted library allocation
|
page read and write
|
||
A877000
|
unkown
|
page read and write
|
||
298F000
|
unkown
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
C5C7000
|
unkown
|
page read and write
|
||
C328000
|
unkown
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
6D6C000
|
stack
|
page read and write
|
||
15EF000
|
stack
|
page read and write
|
||
7176000
|
unkown
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
25DE000
|
unkown
|
page read and write
|
||
7FF557033000
|
unkown
|
page readonly
|
||
E1B9000
|
stack
|
page read and write
|
||
4830000
|
unkown
|
page read and write
|
||
350E000
|
unkown
|
page read and write
|
||
4850000
|
unkown
|
page read and write
|
||
732E000
|
unkown
|
page read and write
|
||
7FF55733B000
|
unkown
|
page readonly
|
||
69D7000
|
heap
|
page read and write
|
||
39D000
|
stack
|
page read and write
|
||
4009000
|
trusted library allocation
|
page read and write
|
||
7FF55726C000
|
unkown
|
page readonly
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
3FFC000
|
trusted library allocation
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
5650000
|
heap
|
page execute and read and write
|
||
42B6000
|
trusted library allocation
|
page read and write
|
||
E424000
|
system
|
page execute and read and write
|
||
2AF4000
|
heap
|
page read and write
|
||
559E000
|
stack
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
144D000
|
direct allocation
|
page execute and read and write
|
||
13D0000
|
heap
|
page read and write
|
||
BBE0000
|
unkown
|
page readonly
|
||
7C00000
|
unkown
|
page readonly
|
||
10A0000
|
heap
|
page read and write
|
||
1466000
|
direct allocation
|
page execute and read and write
|
||
19FA000
|
unclassified section
|
page execute and read and write
|
||
7FF55764C000
|
unkown
|
page readonly
|
||
2EDC000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
54B6000
|
trusted library allocation
|
page read and write
|
||
651E000
|
stack
|
page read and write
|
||
4D21000
|
direct allocation
|
page execute and read and write
|
||
42C6000
|
trusted library allocation
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
E868000
|
unkown
|
page read and write
|
||
61AE000
|
stack
|
page read and write
|
||
7FF5570B5000
|
unkown
|
page readonly
|
||
AF6D000
|
stack
|
page read and write
|
||
7FF5570F7000
|
unkown
|
page readonly
|
||
A218000
|
unkown
|
page read and write
|
||
7FF556FFF000
|
unkown
|
page readonly
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
7FF557026000
|
unkown
|
page readonly
|
||
8D78000
|
unkown
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
C12D000
|
unkown
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
2740000
|
direct allocation
|
page read and write
|
||
7FF5574F1000
|
unkown
|
page readonly
|
||
90C9000
|
unkown
|
page read and write
|
||
11DE000
|
stack
|
page read and write
|
||
4746000
|
unkown
|
page read and write
|
||
A231000
|
unkown
|
page read and write
|
||
C46C000
|
unkown
|
page read and write
|
||
7FF5570D4000
|
unkown
|
page readonly
|
||
643E000
|
stack
|
page read and write
|
||
7FF5573FF000
|
unkown
|
page readonly
|
||
6A10000
|
trusted library allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
2A15000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
647E000
|
stack
|
page read and write
|
||
BFD0000
|
unkown
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
664E000
|
stack
|
page read and write
|
||
7FF55756D000
|
unkown
|
page readonly
|
||
5850000
|
heap
|
page execute and read and write
|
||
6C14000
|
heap
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
B040000
|
unkown
|
page readonly
|
||
7FF557210000
|
unkown
|
page readonly
|
||
8D78000
|
unkown
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
14AB000
|
trusted library allocation
|
page execute and read and write
|
||
1247000
|
trusted library allocation
|
page execute and read and write
|
||
316D000
|
trusted library allocation
|
page read and write
|
||
7FF557627000
|
unkown
|
page readonly
|
||
1090000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
7FF5570C5000
|
unkown
|
page readonly
|
||
6BB0000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
4AB1000
|
heap
|
page read and write
|
||
6689000
|
heap
|
page read and write
|
||
55E0000
|
trusted library allocation
|
page read and write
|
||
9960000
|
system
|
page execute and read and write
|
||
5540000
|
trusted library allocation
|
page read and write
|
||
1023000
|
heap
|
page read and write
|
||
4880000
|
unkown
|
page read and write
|
||
1711000
|
direct allocation
|
page execute and read and write
|
||
4124000
|
trusted library allocation
|
page read and write
|
||
B050000
|
unkown
|
page read and write
|
||
1846000
|
direct allocation
|
page execute and read and write
|
||
2E72000
|
trusted library allocation
|
page read and write
|
||
41A6000
|
trusted library allocation
|
page read and write
|
||
2780000
|
heap
|
page readonly
|
||
5740000
|
heap
|
page read and write
|
||
7FF55726A000
|
unkown
|
page readonly
|
||
4B21000
|
direct allocation
|
page execute and read and write
|
||
7DF468991000
|
unkown
|
page execute read
|
||
3029000
|
stack
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
2D83000
|
trusted library allocation
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
2DE1000
|
trusted library allocation
|
page read and write
|
||
7FF55714A000
|
unkown
|
page readonly
|
||
7B99000
|
stack
|
page read and write
|
||
25C0000
|
heap
|
page read and write
|
||
798E000
|
stack
|
page read and write
|
||
7FF5574EF000
|
unkown
|
page readonly
|
||
2F9F000
|
heap
|
page read and write
|
||
1236000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5571E6000
|
unkown
|
page readonly
|
||
A280000
|
unkown
|
page read and write
|
||
8DAE000
|
unkown
|
page read and write
|
||
68F0000
|
trusted library allocation
|
page execute and read and write
|
||
E70000
|
heap
|
page read and write
|
||
2CF5000
|
heap
|
page read and write
|
||
7FF5573D8000
|
unkown
|
page readonly
|
||
32DB000
|
unkown
|
page read and write
|
||
410000
|
system
|
page execute and read and write
|
||
7FF557599000
|
unkown
|
page readonly
|
||
89A000
|
trusted library allocation
|
page execute and read and write
|
||
5F41000
|
heap
|
page read and write
|
||
4880000
|
unkown
|
page read and write
|
||
AFFF000
|
stack
|
page read and write
|
||
3FB6000
|
trusted library allocation
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
4296000
|
trusted library allocation
|
page read and write
|
||
7FF557095000
|
unkown
|
page readonly
|
||
55E4000
|
trusted library allocation
|
page read and write
|
||
14BA000
|
unclassified section
|
page execute and read and write
|
||
62AF000
|
stack
|
page read and write
|
||
2D20000
|
trusted library allocation
|
page read and write
|
||
1330000
|
trusted library allocation
|
page read and write
|
||
7FF557330000
|
unkown
|
page readonly
|
||
324E000
|
unclassified section
|
page execute and read and write
|
||
289A000
|
heap
|
page read and write
|
||
7FF556FF3000
|
unkown
|
page readonly
|
||
63EE000
|
stack
|
page read and write
|
||
7FF557235000
|
unkown
|
page readonly
|
||
864F000
|
stack
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
715C000
|
unkown
|
page read and write
|
||
147D000
|
trusted library allocation
|
page execute and read and write
|
||
E60000
|
unkown
|
page readonly
|
||
2FAE000
|
unkown
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
3E0D000
|
direct allocation
|
page execute and read and write
|
||
2FFF000
|
heap
|
page read and write
|
||
460B000
|
heap
|
page read and write
|
||
7FF546F35000
|
unkown
|
page readonly
|
||
2E4E000
|
unkown
|
page read and write
|
||
615F000
|
stack
|
page read and write
|
||
29C4000
|
heap
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
6818000
|
heap
|
page read and write
|
||
33A000
|
stack
|
page read and write
|
||
C0F9000
|
unkown
|
page read and write
|
||
72FE000
|
unkown
|
page read and write
|
||
7FF5570E7000
|
unkown
|
page readonly
|
||
3350000
|
unkown
|
page readonly
|
||
288F000
|
heap
|
page read and write
|
||
2C1E000
|
stack
|
page read and write
|
||
68C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5570D6000
|
unkown
|
page readonly
|
||
C101000
|
unkown
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
8D6A000
|
unkown
|
page read and write
|
||
7FF556E75000
|
unkown
|
page readonly
|
||
7FF5570CA000
|
unkown
|
page readonly
|
||
4AB1000
|
heap
|
page read and write
|
||
5478000
|
trusted library allocation
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
88F8000
|
unkown
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
3370000
|
trusted library allocation
|
page read and write
|
||
308F000
|
heap
|
page read and write
|
||
B080000
|
unkown
|
page read and write
|
||
90CF000
|
unkown
|
page read and write
|
||
A118000
|
unkown
|
page read and write
|
||
51E3000
|
unkown
|
page read and write
|
||
4840000
|
unkown
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
144D000
|
trusted library allocation
|
page execute and read and write
|
||
246B000
|
trusted library allocation
|
page read and write
|
||
C328000
|
unkown
|
page read and write
|
||
7FF556FC4000
|
unkown
|
page readonly
|
||
7FF556F98000
|
unkown
|
page readonly
|
||
E13B000
|
stack
|
page read and write
|
||
548D000
|
trusted library allocation
|
page read and write
|
||
F32000
|
system
|
page execute and read and write
|
||
72FC000
|
unkown
|
page read and write
|
||
288D000
|
heap
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
8911000
|
unkown
|
page read and write
|
||
7FF5575FC000
|
unkown
|
page readonly
|
||
3140000
|
heap
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
B7AA000
|
stack
|
page read and write
|
||
6B50000
|
trusted library allocation
|
page read and write
|
||
A286000
|
unkown
|
page read and write
|
||
FD0000
|
unkown
|
page readonly
|
||
3FC6000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
138B000
|
unclassified section
|
page execute and read and write
|
||
2BB0000
|
heap
|
page read and write
|
||
5170000
|
trusted library allocation
|
page execute and read and write
|
||
A0B9000
|
unkown
|
page read and write
|
||
71AE000
|
stack
|
page read and write
|
||
7FF55719C000
|
unkown
|
page readonly
|
||
4769000
|
unkown
|
page read and write
|
||
2CEC000
|
heap
|
page read and write
|
||
9F0000
|
unkown
|
page readonly
|
||
C4A2000
|
unkown
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
7FF55722A000
|
unkown
|
page readonly
|
||
1288000
|
heap
|
page read and write
|
||
8810000
|
unkown
|
page readonly
|
||
716B000
|
unkown
|
page read and write
|
||
A6E000
|
stack
|
page read and write
|
||
3846000
|
trusted library allocation
|
page read and write
|
||
6959000
|
heap
|
page read and write
|
||
12FF000
|
stack
|
page read and write
|
||
7FF5575D0000
|
unkown
|
page readonly
|
||
C244000
|
unkown
|
page read and write
|
||
3550000
|
direct allocation
|
page read and write
|
||
7FF557594000
|
unkown
|
page readonly
|
||
8EDD000
|
unkown
|
page read and write
|
||
289A000
|
heap
|
page read and write
|
||
7FF5574EF000
|
unkown
|
page readonly
|
||
4800000
|
unkown
|
page read and write
|
||
1831000
|
direct allocation
|
page execute and read and write
|
||
A215000
|
unkown
|
page read and write
|
||
2F21000
|
trusted library allocation
|
page read and write
|
||
7FF55724C000
|
unkown
|
page readonly
|
||
271E000
|
unkown
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
7FF5573D8000
|
unkown
|
page readonly
|
||
3ED6000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
7040D000
|
unkown
|
page read and write
|
||
2E7B000
|
trusted library allocation
|
page read and write
|
||
7FF55765C000
|
unkown
|
page readonly
|
||
5161000
|
unkown
|
page read and write
|
||
5590000
|
trusted library allocation
|
page execute and read and write
|
||
256D000
|
stack
|
page read and write
|
||
4734000
|
unkown
|
page read and write
|
||
6803000
|
heap
|
page read and write
|
||
319C000
|
stack
|
page read and write
|
||
7FF556E7E000
|
unkown
|
page readonly
|
||
29FE000
|
stack
|
page read and write
|
||
9F8F000
|
stack
|
page read and write
|
||
55FC000
|
trusted library allocation
|
page read and write
|
||
1060000
|
unkown
|
page read and write
|
||
A231000
|
unkown
|
page read and write
|
||
2492000
|
trusted library allocation
|
page read and write
|
||
47EE000
|
unkown
|
page read and write
|
||
1240000
|
trusted library allocation
|
page execute and read and write
|
||
9366000
|
unkown
|
page read and write
|
||
45A000
|
system
|
page execute and read and write
|
||
6850000
|
trusted library allocation
|
page execute and read and write
|
||
2D1C000
|
heap
|
page read and write
|
||
5290000
|
trusted library allocation
|
page execute and read and write
|
||
890000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
10996000
|
system
|
page execute and read and write
|
||
7A50000
|
unkown
|
page readonly
|
||
67CE000
|
trusted library allocation
|
page read and write
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
79B0000
|
unkown
|
page read and write
|
||
5ED000
|
stack
|
page read and write
|
||
1830000
|
unclassified section
|
page execute and read and write
|
||
5743000
|
heap
|
page read and write
|
||
7FF557579000
|
unkown
|
page readonly
|
||
7FF55733F000
|
unkown
|
page readonly
|
||
2EF4000
|
heap
|
page read and write
|
||
8D68000
|
unkown
|
page read and write
|
||
7FF557571000
|
unkown
|
page readonly
|
||
1770000
|
unclassified section
|
page execute and read and write
|
||
7FF5571AC000
|
unkown
|
page readonly
|
||
2D3B000
|
stack
|
page read and write
|
||
72C3000
|
unkown
|
page read and write
|
||
A01000
|
heap
|
page read and write
|
||
968000
|
heap
|
page read and write
|
||
3E09000
|
direct allocation
|
page execute and read and write
|
||
7FF5570A6000
|
unkown
|
page readonly
|
||
8911000
|
unkown
|
page read and write
|
||
7178000
|
unkown
|
page read and write
|
||
88E5000
|
unkown
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
7FF556E4D000
|
unkown
|
page readonly
|
||
7FF5575BB000
|
unkown
|
page readonly
|
||
356D000
|
unclassified section
|
page execute and read and write
|
||
900000
|
unkown
|
page readonly
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
98DA000
|
stack
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
2D33000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
511C000
|
stack
|
page read and write
|
||
46F0000
|
unkown
|
page read and write
|
||
2F2B000
|
trusted library allocation
|
page read and write
|
||
C3B3000
|
unkown
|
page read and write
|
||
C3FC000
|
unkown
|
page read and write
|
||
913F000
|
unkown
|
page read and write
|
||
9259000
|
stack
|
page read and write
|
||
2B7F000
|
unkown
|
page read and write
|
||
7FF55750F000
|
unkown
|
page readonly
|
||
5400000
|
trusted library allocation
|
page read and write
|
||
3801000
|
heap
|
page read and write
|
||
E99000
|
stack
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
7162000
|
unkown
|
page read and write
|
||
A156000
|
unkown
|
page read and write
|
||
2C6F000
|
unkown
|
page read and write
|
||
F520000
|
heap
|
page read and write
|
||
7FF5571E2000
|
unkown
|
page readonly
|
||
995E000
|
stack
|
page read and write
|
||
45E000
|
system
|
page execute and read and write
|
||
3404000
|
heap
|
page read and write
|
||
495C000
|
heap
|
page read and write
|
||
88B0000
|
unkown
|
page read and write
|
||
13F0000
|
trusted library allocation
|
page read and write
|
||
7FF5570D6000
|
unkown
|
page readonly
|
||
9D8E000
|
stack
|
page read and write
|
||
72D8000
|
unkown
|
page read and write
|
||
3609000
|
heap
|
page read and write
|
||
E290000
|
unkown
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
4850000
|
unkown
|
page read and write
|
||
4DCC000
|
heap
|
page read and write
|
||
3085000
|
unclassified section
|
page execute and read and write
|
||
9362000
|
unkown
|
page read and write
|
||
7FF557589000
|
unkown
|
page readonly
|
||
3230000
|
heap
|
page read and write
|
||
55B0000
|
heap
|
page execute and read and write
|
||
4DF7000
|
trusted library allocation
|
page read and write
|
||
4860000
|
unkown
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
17C0000
|
heap
|
page read and write
|
||
4371000
|
trusted library allocation
|
page read and write
|
||
7FF557239000
|
unkown
|
page readonly
|
||
BDC000
|
stack
|
page read and write
|
||
6DF0000
|
trusted library allocation
|
page execute and read and write
|
||
2D01000
|
heap
|
page read and write
|
||
2D8A000
|
stack
|
page read and write
|
||
8B1B000
|
unkown
|
page read and write
|
||
84E0000
|
unkown
|
page readonly
|
||
B5AE000
|
stack
|
page read and write
|
||
7FF556E4B000
|
unkown
|
page readonly
|
||
6A70000
|
trusted library allocation
|
page execute and read and write
|
||
6040000
|
trusted library allocation
|
page execute and read and write
|
||
892000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF557554000
|
unkown
|
page readonly
|
||
3118000
|
stack
|
page read and write
|
||
B52000
|
heap
|
page read and write
|
||
6A8E000
|
trusted library allocation
|
page read and write
|
||
C561000
|
unkown
|
page read and write
|
||
A225000
|
unkown
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
6A6C000
|
stack
|
page read and write
|
||
7040D000
|
unkown
|
page read and write
|
||
A8D2000
|
unkown
|
page read and write
|
||
14E6000
|
direct allocation
|
page execute and read and write
|
||
8D6A000
|
unkown
|
page read and write
|
||
360B000
|
heap
|
page read and write
|
||
149A000
|
trusted library allocation
|
page execute and read and write
|
||
C68000
|
heap
|
page read and write
|
||
1268000
|
heap
|
page read and write
|
||
1313000
|
trusted library allocation
|
page read and write
|
||
104CB000
|
unkown
|
page read and write
|
||
3FD6000
|
trusted library allocation
|
page read and write
|
||
C46F000
|
unkown
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
7FF557257000
|
unkown
|
page readonly
|
||
1355000
|
heap
|
page read and write
|
||
F8D000
|
trusted library allocation
|
page execute and read and write
|
||
5FE0000
|
heap
|
page read and write
|
||
13DD000
|
trusted library allocation
|
page execute and read and write
|
||
1FB000
|
stack
|
page read and write
|
||
7FF5571E2000
|
unkown
|
page readonly
|
||
49D2000
|
heap
|
page read and write
|
||
C5AA000
|
unkown
|
page read and write
|
||
7FF5575A1000
|
unkown
|
page readonly
|
||
7FF557661000
|
unkown
|
page readonly
|
||
650000
|
heap
|
page read and write
|
||
121D000
|
trusted library allocation
|
page execute and read and write
|
||
71B1000
|
unkown
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
5FF4000
|
heap
|
page read and write
|
||
29C4000
|
heap
|
page read and write
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
6BD0000
|
trusted library allocation
|
page execute and read and write
|
||
2E80000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
6AC0000
|
trusted library allocation
|
page execute and read and write
|
||
3010000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page read and write
|
||
FD000
|
stack
|
page read and write
|
||
6D00000
|
trusted library allocation
|
page execute and read and write
|
||
32E6000
|
unkown
|
page read and write
|
||
354F000
|
unkown
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
F1CA000
|
system
|
page execute and read and write
|
||
A0BF000
|
unkown
|
page read and write
|
||
6A90000
|
heap
|
page read and write
|
||
26DC000
|
stack
|
page read and write
|
||
7FF557393000
|
unkown
|
page readonly
|
||
8B1A000
|
unkown
|
page read and write
|
||
28AE000
|
unkown
|
page read and write
|
||
477D000
|
unkown
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
7FF55728F000
|
unkown
|
page readonly
|
||
AB9000
|
stack
|
page read and write
|
||
140E000
|
heap
|
page read and write
|
||
698E000
|
stack
|
page read and write
|
||
B287000
|
system
|
page execute and read and write
|
||
7FF5574F1000
|
unkown
|
page readonly
|
||
2DBF000
|
stack
|
page read and write
|
||
A85A000
|
unkown
|
page read and write
|
||
1472000
|
heap
|
page read and write
|
||
7FF556E48000
|
unkown
|
page readonly
|
||
6FD000
|
stack
|
page read and write
|
||
24F8000
|
trusted library allocation
|
page read and write
|
||
1182000
|
direct allocation
|
page execute and read and write
|
||
B0AA000
|
system
|
page execute and read and write
|
||
313E000
|
stack
|
page read and write
|
||
7E03000
|
stack
|
page read and write
|
||
13ED000
|
trusted library allocation
|
page execute and read and write
|
||
7FF557487000
|
unkown
|
page readonly
|
||
44F1000
|
heap
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
990000
|
system
|
page execute and read and write
|
||
A850000
|
unkown
|
page read and write
|
||
6955000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
8EEE000
|
unkown
|
page read and write
|
||
4BC1000
|
trusted library allocation
|
page execute and read and write
|
||
C5C000
|
stack
|
page read and write
|
||
73C5000
|
stack
|
page read and write
|
||
14AE000
|
stack
|
page read and write
|
||
7FF55752E000
|
unkown
|
page readonly
|
||
910000
|
unkown
|
page readonly
|
||
72C3000
|
unkown
|
page read and write
|
||
11F3000
|
trusted library allocation
|
page read and write
|
||
7FF557476000
|
unkown
|
page readonly
|
||
7803000
|
unkown
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
7306000
|
unkown
|
page read and write
|
||
74DE000
|
stack
|
page read and write
|
||
A8DD000
|
unkown
|
page read and write
|
||
732D000
|
unkown
|
page read and write
|
||
657F000
|
stack
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
910000
|
trusted library allocation
|
page execute and read and write
|
||
7FF556FE3000
|
unkown
|
page readonly
|
||
D1D000
|
heap
|
page read and write
|
||
3614000
|
heap
|
page read and write
|
||
7FF5570BB000
|
unkown
|
page readonly
|
||
5840000
|
trusted library allocation
|
page read and write
|
||
119B0000
|
system
|
page execute and read and write
|
||
7FF557302000
|
unkown
|
page readonly
|
||
7FF5570CA000
|
unkown
|
page readonly
|
||
1483000
|
trusted library allocation
|
page read and write
|
||
716E000
|
unkown
|
page read and write
|
||
90F2000
|
unkown
|
page read and write
|
||
1060000
|
unkown
|
page read and write
|
||
13C0000
|
trusted library allocation
|
page read and write
|
||
A85E000
|
unkown
|
page read and write
|
||
7FF55741C000
|
unkown
|
page readonly
|
||
55C1000
|
trusted library allocation
|
page read and write
|
||
E856000
|
unkown
|
page read and write
|
||
7FF5573F3000
|
unkown
|
page readonly
|
||
54EB000
|
trusted library allocation
|
page read and write
|
||
F52A000
|
heap
|
page read and write
|
||
10B2B000
|
system
|
page execute and read and write
|
||
5B7E000
|
stack
|
page read and write
|
||
10B0000
|
unkown
|
page readonly
|
||
2AF4000
|
heap
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
6A5F000
|
trusted library allocation
|
page read and write
|
||
59CF000
|
stack
|
page read and write
|
||
C3AE000
|
unkown
|
page read and write
|
||
7FF557413000
|
unkown
|
page readonly
|
||
7FF556E8D000
|
unkown
|
page readonly
|
||
2ED0000
|
heap
|
page read and write
|
||
4979000
|
direct allocation
|
page execute and read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
2E40000
|
heap
|
page execute and read and write
|
||
A0A8000
|
unkown
|
page read and write
|
||
1460000
|
direct allocation
|
page execute and read and write
|
||
7FF557009000
|
unkown
|
page readonly
|
||
7E05000
|
stack
|
page read and write
|
||
574D000
|
stack
|
page read and write
|
||
2E41000
|
trusted library allocation
|
page read and write
|
||
7FF55728F000
|
unkown
|
page readonly
|
||
DC0000
|
heap
|
page read and write
|
||
C22F000
|
unkown
|
page read and write
|
||
4785000
|
unkown
|
page read and write
|
||
E86C000
|
unkown
|
page read and write
|
||
4FDF000
|
stack
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
E5EB000
|
stack
|
page read and write
|
||
7FF55748F000
|
unkown
|
page readonly
|
||
10F7000
|
stack
|
page read and write
|
||
18E0000
|
direct allocation
|
page execute and read and write
|
||
40F6000
|
trusted library allocation
|
page read and write
|
||
5600000
|
heap
|
page execute and read and write
|
||
1702000
|
trusted library allocation
|
page read and write
|
||
2D1F000
|
stack
|
page read and write
|
||
6A00000
|
trusted library allocation
|
page execute and read and write
|
||
2B20000
|
heap
|
page read and write
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
unkown
|
page readonly
|
||
C5D2000
|
unkown
|
page read and write
|
||
77D0000
|
unkown
|
page read and write
|
||
7185000
|
unkown
|
page read and write
|
||
E260000
|
unkown
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
7DF468990000
|
unkown
|
page readonly
|
||
59AE000
|
stack
|
page read and write
|
||
7FF5569FA000
|
unkown
|
page readonly
|
||
26B9000
|
trusted library allocation
|
page read and write
|
||
497D000
|
direct allocation
|
page execute and read and write
|
||
7FF5575D5000
|
unkown
|
page readonly
|
||
47BE000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
6842000
|
heap
|
page read and write
|
||
71FC000
|
unkown
|
page read and write
|
||
50B0000
|
unkown
|
page write copy
|
||
73DE000
|
stack
|
page read and write
|
||
7FF55745B000
|
unkown
|
page readonly
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
29C4000
|
heap
|
page read and write
|
||
B010000
|
unkown
|
page readonly
|
||
DD7000
|
stack
|
page read and write
|
||
E23B000
|
stack
|
page read and write
|
||
90DB000
|
unkown
|
page read and write
|
||
7FF5575EA000
|
unkown
|
page readonly
|
||
1332000
|
trusted library allocation
|
page read and write
|
||
9013000
|
unkown
|
page read and write
|
||
7FF5571DF000
|
unkown
|
page readonly
|
||
29C4000
|
heap
|
page read and write
|
||
7FF55702F000
|
unkown
|
page readonly
|
||
2F5B000
|
trusted library allocation
|
page read and write
|
||
9B4F000
|
system
|
page execute and read and write
|
||
2C06000
|
stack
|
page read and write
|
||
9CDC000
|
stack
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
8D74000
|
unkown
|
page read and write
|
||
E91B000
|
stack
|
page read and write
|
||
4860000
|
unkown
|
page read and write
|
||
B1A0000
|
unkown
|
page read and write
|
||
1583000
|
direct allocation
|
page execute and read and write
|
||
150F000
|
stack
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
5492000
|
trusted library allocation
|
page read and write
|
||
32D3000
|
unkown
|
page read and write
|
||
B41000
|
heap
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
77B0000
|
unkown
|
page read and write
|
||
336D000
|
direct allocation
|
page execute and read and write
|
||
69B5000
|
trusted library allocation
|
page read and write
|
||
69F0000
|
trusted library allocation
|
page execute and read and write
|
||
570D000
|
stack
|
page read and write
|
||
4C3D000
|
direct allocation
|
page execute and read and write
|
||
6A8E000
|
trusted library allocation
|
page read and write
|
||
110B000
|
heap
|
page read and write
|
||
32F3000
|
unkown
|
page read and write
|
||
C04F000
|
unkown
|
page read and write
|
||
2C2C000
|
heap
|
page read and write
|
||
641E000
|
stack
|
page read and write
|
||
7FF556E9A000
|
unkown
|
page readonly
|
||
C3AE000
|
unkown
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
7FF55710A000
|
unkown
|
page readonly
|
||
C233000
|
unkown
|
page read and write
|
||
549B000
|
trusted library allocation
|
page read and write
|
||
C0F3000
|
unkown
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
65AE000
|
stack
|
page read and write
|
||
A0FC000
|
unkown
|
page read and write
|
||
2D4D000
|
stack
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
65DE000
|
stack
|
page read and write
|
||
7FF55760F000
|
unkown
|
page readonly
|
||
28EE000
|
stack
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
55E0000
|
trusted library allocation
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
715C000
|
unkown
|
page read and write
|
||
687D000
|
heap
|
page read and write
|
||
136F000
|
stack
|
page read and write
|
||
4E3D000
|
heap
|
page read and write
|
||
CB7000
|
heap
|
page read and write
|
||
5280000
|
heap
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
26F9000
|
trusted library allocation
|
page read and write
|
||
6B91000
|
trusted library allocation
|
page read and write
|
||
839F000
|
unkown
|
page read and write
|
||
1204000
|
trusted library allocation
|
page read and write
|
||
3E99000
|
trusted library allocation
|
page read and write
|
||
7FF5570CF000
|
unkown
|
page readonly
|
||
2D00000
|
heap
|
page read and write
|
||
3F21000
|
trusted library allocation
|
page read and write
|
||
2460000
|
trusted library allocation
|
page read and write
|
||
948000
|
heap
|
page read and write
|
||
61BE000
|
stack
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
7FF557426000
|
unkown
|
page readonly
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
8D76000
|
unkown
|
page read and write
|
||
2CB5000
|
heap
|
page read and write
|
||
14A7000
|
trusted library allocation
|
page execute and read and write
|
||
69E0000
|
trusted library allocation
|
page read and write
|
||
90CF000
|
unkown
|
page read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
47AC000
|
stack
|
page read and write
|
||
C6D000
|
heap
|
page read and write
|
||
6908000
|
heap
|
page read and write
|
||
E2A0000
|
heap
|
page read and write
|
||
596E000
|
stack
|
page read and write
|
||
6020000
|
trusted library allocation
|
page read and write
|
||
2F55000
|
heap
|
page read and write
|
||
7FF557174000
|
unkown
|
page readonly
|
||
3F56000
|
trusted library allocation
|
page read and write
|
||
2E99000
|
trusted library allocation
|
page read and write
|
||
2D1E000
|
stack
|
page read and write
|
||
69DE000
|
stack
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
2C06000
|
stack
|
page read and write
|
||
C42C000
|
unkown
|
page read and write
|
||
7FF55753D000
|
unkown
|
page readonly
|
||
2F10000
|
unkown
|
page readonly
|
||
68EF000
|
stack
|
page read and write
|
||
679E000
|
trusted library allocation
|
page read and write
|
||
47D1000
|
heap
|
page read and write
|
||
7FF556FF3000
|
unkown
|
page readonly
|
||
64DE000
|
stack
|
page read and write
|
||
269C000
|
stack
|
page read and write
|
||
3EC9000
|
trusted library allocation
|
page read and write
|
||
703D000
|
heap
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
7FF5575B9000
|
unkown
|
page readonly
|
||
7FF557669000
|
unkown
|
page readonly
|
||
4732000
|
unkown
|
page read and write
|
||
7FF557413000
|
unkown
|
page readonly
|
||
16B0000
|
heap
|
page read and write
|
||
126F000
|
stack
|
page read and write
|
||
88F2000
|
unkown
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
24FD000
|
stack
|
page read and write
|
||
4F78000
|
trusted library allocation
|
page read and write
|
||
7FF5573CB000
|
unkown
|
page readonly
|
||
7FF5570FE000
|
unkown
|
page readonly
|
||
C1E9000
|
unkown
|
page read and write
|
||
7FF55747D000
|
unkown
|
page readonly
|
||
124E000
|
stack
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
7FF557148000
|
unkown
|
page readonly
|
||
AD4000
|
heap
|
page read and write
|
||
410000
|
system
|
page execute and read and write
|
||
7FF557083000
|
unkown
|
page readonly
|
||
55AB000
|
trusted library allocation
|
page read and write
|
||
2A9D000
|
stack
|
page read and write
|
||
71A4000
|
unkown
|
page read and write
|
||
2C0A000
|
heap
|
page read and write
|
||
2FAA000
|
heap
|
page read and write
|
||
3799000
|
trusted library allocation
|
page read and write
|
||
5CAE000
|
stack
|
page read and write
|
||
CFB000
|
stack
|
page read and write
|
||
27EE000
|
unkown
|
page read and write
|
||
6614000
|
heap
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
6BCE000
|
trusted library allocation
|
page read and write
|
||
501C000
|
stack
|
page read and write
|
||
6A80000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
7FF557416000
|
unkown
|
page readonly
|
||
13D0000
|
trusted library allocation
|
page read and write
|
||
3FE4000
|
trusted library allocation
|
page read and write
|
||
F52A000
|
heap
|
page read and write
|
||
7FF557285000
|
unkown
|
page readonly
|
||
2CFD000
|
stack
|
page read and write
|
||
8D86000
|
unkown
|
page read and write
|
||
7FF557456000
|
unkown
|
page readonly
|
||
C59000
|
heap
|
page read and write
|
||
2C38000
|
heap
|
page read and write
|
||
2FAA000
|
heap
|
page read and write
|
||
58E7000
|
trusted library allocation
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
7FF557549000
|
unkown
|
page readonly
|
||
48E7000
|
heap
|
page read and write
|
||
2FAA000
|
heap
|
page read and write
|
||
304C000
|
heap
|
page read and write
|
||
F8E000
|
heap
|
page read and write
|
||
7030000
|
heap
|
page read and write
|
||
675E000
|
stack
|
page read and write
|
||
3886000
|
trusted library allocation
|
page read and write
|
||
5920000
|
heap
|
page read and write
|
||
77C0000
|
unkown
|
page read and write
|
||
505F000
|
stack
|
page read and write
|
||
6900000
|
trusted library allocation
|
page execute and read and write
|
||
90D6000
|
unkown
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
70EE000
|
stack
|
page read and write
|
||
3901000
|
trusted library allocation
|
page read and write
|
||
279C000
|
heap
|
page read and write
|
||
14BE000
|
direct allocation
|
page execute and read and write
|
||
7FF5574C6000
|
unkown
|
page readonly
|
||
7FF557411000
|
unkown
|
page readonly
|
||
F2D000
|
system
|
page execute and read and write
|
||
82E000
|
stack
|
page read and write
|
||
2CD0000
|
heap
|
page execute and read and write
|
||
46F0000
|
heap
|
page read and write
|
||
4746000
|
unkown
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
3614000
|
heap
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
84E0000
|
unkown
|
page readonly
|
||
C59000
|
heap
|
page read and write
|
||
1522000
|
direct allocation
|
page execute and read and write
|
||
C5AA000
|
unkown
|
page read and write
|
||
7FF5569E8000
|
unkown
|
page readonly
|
||
2CFE000
|
stack
|
page read and write
|
||
77F0000
|
unkown
|
page read and write
|
||
4970000
|
direct allocation
|
page execute and read and write
|
||
BB7000
|
stack
|
page read and write
|
||
961B000
|
stack
|
page read and write
|
||
7173000
|
unkown
|
page read and write
|
||
7FF557210000
|
unkown
|
page readonly
|
||
12C7000
|
heap
|
page read and write
|
||
864F000
|
stack
|
page read and write
|
||
C3A8000
|
unkown
|
page read and write
|
||
6939000
|
heap
|
page read and write
|
||
6EEC000
|
stack
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
717E000
|
unkown
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
2AFD000
|
stack
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
67BC000
|
heap
|
page read and write
|
||
4A47000
|
heap
|
page read and write
|
||
7FF557493000
|
unkown
|
page readonly
|
||
3DE1000
|
trusted library allocation
|
page read and write
|
||
8AB000
|
trusted library allocation
|
page execute and read and write
|
||
28FB000
|
stack
|
page read and write
|
||
E370000
|
unkown
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
360D000
|
heap
|
page read and write
|
||
B010000
|
unkown
|
page readonly
|
||
8DFE000
|
unkown
|
page read and write
|
||
8F27000
|
unkown
|
page read and write
|
||
2F3C000
|
heap
|
page read and write
|
||
5513000
|
heap
|
page read and write
|
||
6B50000
|
heap
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
C460000
|
unkown
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
1214000
|
trusted library allocation
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
1A6D000
|
trusted library allocation
|
page execute and read and write
|
||
6622000
|
heap
|
page read and write
|
||
4E8B000
|
stack
|
page read and write
|
||
6890000
|
heap
|
page read and write
|
||
3440000
|
unkown
|
page readonly
|
||
B2C6000
|
system
|
page execute and read and write
|
||
2FA2000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
1322000
|
trusted library allocation
|
page read and write
|
||
5A90000
|
trusted library allocation
|
page read and write
|
||
3440000
|
unkown
|
page readonly
|
||
7185000
|
unkown
|
page read and write
|
||
1441000
|
unkown
|
page readonly
|
||
1146000
|
direct allocation
|
page execute and read and write
|
||
7FF557607000
|
unkown
|
page readonly
|
||
3511000
|
direct allocation
|
page execute and read and write
|
||
88A0000
|
unkown
|
page read and write
|
||
88ED000
|
unkown
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
7300000
|
unkown
|
page read and write
|
||
6B50000
|
trusted library section
|
page read and write
|
||
143F000
|
stack
|
page read and write
|
||
900000
|
unkown
|
page readonly
|
||
7FF55714F000
|
unkown
|
page readonly
|
||
7FF55731B000
|
unkown
|
page readonly
|
||
904C000
|
unkown
|
page read and write
|
||
E5F000
|
stack
|
page read and write
|
||
6A51000
|
trusted library allocation
|
page read and write
|
||
12B8000
|
trusted library allocation
|
page read and write
|
||
7FF55763D000
|
unkown
|
page readonly
|
||
B4C000
|
heap
|
page read and write
|
||
2FBD000
|
trusted library allocation
|
page read and write
|
||
693E000
|
stack
|
page read and write
|
||
61FD000
|
stack
|
page read and write
|
||
A858000
|
unkown
|
page read and write
|
||
B4AD000
|
stack
|
page read and write
|
||
148C000
|
heap
|
page read and write
|
||
32C4000
|
unkown
|
page read and write
|
||
7FF557239000
|
unkown
|
page readonly
|
||
1867000
|
direct allocation
|
page execute and read and write
|
||
5B3E000
|
stack
|
page read and write
|
||
7FF556F26000
|
unkown
|
page readonly
|
||
3801000
|
heap
|
page read and write
|
||
F81000
|
heap
|
page read and write
|
||
9F8F000
|
stack
|
page read and write
|
||
975000
|
heap
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
61EC000
|
stack
|
page read and write
|
||
4091000
|
trusted library allocation
|
page read and write
|
||
32E3000
|
unkown
|
page read and write
|
||
2C28000
|
heap
|
page read and write
|
||
3A06000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
6C6D000
|
stack
|
page read and write
|
||
7FF556E7E000
|
unkown
|
page readonly
|
||
3080000
|
unclassified section
|
page execute and read and write
|
||
A110000
|
unkown
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
6942000
|
heap
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
9A28000
|
system
|
page execute and read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
4C41000
|
direct allocation
|
page execute and read and write
|
||
3460000
|
unkown
|
page read and write
|
||
8EF5000
|
unkown
|
page read and write
|
||
8580000
|
unkown
|
page read and write
|
||
69EE000
|
heap
|
page read and write
|
||
7FF556F87000
|
unkown
|
page readonly
|
||
A0BF000
|
unkown
|
page read and write
|
||
7FF55747D000
|
unkown
|
page readonly
|
||
F209000
|
system
|
page execute and read and write
|
||
2B35000
|
heap
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
7FF556F84000
|
unkown
|
page readonly
|
||
2BFF000
|
heap
|
page read and write
|
||
3369000
|
direct allocation
|
page execute and read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
4870000
|
unkown
|
page read and write
|
||
E380000
|
system
|
page execute and read and write
|
||
2D96000
|
trusted library allocation
|
page read and write
|
||
4176000
|
trusted library allocation
|
page read and write
|
||
55A4000
|
trusted library allocation
|
page read and write
|
||
7FF556F26000
|
unkown
|
page readonly
|
||
2DD2000
|
heap
|
page read and write
|
||
5605000
|
trusted library allocation
|
page read and write
|
||
1406000
|
direct allocation
|
page execute and read and write
|
||
2B6E000
|
unkown
|
page read and write
|
||
685F000
|
stack
|
page read and write
|
||
C10B000
|
unkown
|
page read and write
|
||
72BA000
|
heap
|
page read and write
|
||
7FF55719C000
|
unkown
|
page readonly
|
||
4B79000
|
direct allocation
|
page execute and read and write
|
||
2D0B000
|
stack
|
page read and write
|
||
A131000
|
unkown
|
page read and write
|
||
7FF5572C9000
|
unkown
|
page readonly
|
||
69E0000
|
trusted library allocation
|
page read and write
|
||
106E000
|
stack
|
page read and write
|
||
7FF557026000
|
unkown
|
page readonly
|
||
2A8E000
|
stack
|
page read and write
|
||
24D0000
|
trusted library allocation
|
page read and write
|
||
8A7000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5573D5000
|
unkown
|
page readonly
|
||
7FF5573BB000
|
unkown
|
page readonly
|
||
8EC5000
|
unkown
|
page read and write
|
||
1509000
|
direct allocation
|
page execute and read and write
|
||
2FA5000
|
heap
|
page read and write
|
||
16AD000
|
direct allocation
|
page execute and read and write
|
||
3985000
|
heap
|
page read and write
|
||
7FF5572AC000
|
unkown
|
page readonly
|
||
4769000
|
unkown
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
2C2C000
|
heap
|
page read and write
|
||
C96000
|
trusted library allocation
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
B72B000
|
stack
|
page read and write
|
||
7FF557065000
|
unkown
|
page readonly
|
||
7FF557531000
|
unkown
|
page readonly
|
||
5547000
|
trusted library allocation
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
1B11000
|
direct allocation
|
page execute and read and write
|
||
674D000
|
stack
|
page read and write
|
||
9050000
|
unkown
|
page read and write
|
||
642E000
|
stack
|
page read and write
|
||
86CE000
|
stack
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
9052000
|
unkown
|
page read and write
|
||
35B0000
|
heap
|
page read and write
|
||
52FD000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
5400000
|
heap
|
page read and write
|
||
1410000
|
unclassified section
|
page execute and read and write
|
||
5467000
|
trusted library allocation
|
page read and write
|
||
C20000
|
unkown
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
2F69000
|
trusted library allocation
|
page read and write
|
||
3906000
|
trusted library allocation
|
page read and write
|
||
ACBE000
|
stack
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
17C7000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
7FF55750F000
|
unkown
|
page readonly
|
||
E920000
|
unkown
|
page execute and read and write
|
||
58CD000
|
stack
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
11E4000
|
trusted library allocation
|
page read and write
|
||
AE2B000
|
stack
|
page read and write
|
||
2B3E000
|
unkown
|
page read and write
|
||
7FF55708D000
|
unkown
|
page readonly
|
||
671E000
|
stack
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
7FF546F35000
|
unkown
|
page readonly
|
||
2D30000
|
heap
|
page read and write
|
||
62EE000
|
stack
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
79D000
|
trusted library allocation
|
page execute and read and write
|
||
9F0000
|
unkown
|
page readonly
|
||
2963000
|
heap
|
page read and write
|
||
9E0000
|
trusted library allocation
|
page execute and read and write
|
||
55D0000
|
heap
|
page execute and read and write
|
||
7FF5570F7000
|
unkown
|
page readonly
|
||
2F30000
|
heap
|
page read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
12D5000
|
heap
|
page read and write
|
||
FB0000
|
unkown
|
page read and write
|
||
1467000
|
direct allocation
|
page execute and read and write
|
||
C3ED000
|
unkown
|
page read and write
|
||
BBD0000
|
unkown
|
page readonly
|
||
7FF557042000
|
unkown
|
page readonly
|
||
2E12000
|
trusted library allocation
|
page read and write
|
||
A08D000
|
stack
|
page read and write
|
||
9050000
|
unkown
|
page read and write
|
||
62D000
|
system
|
page execute and read and write
|
||
694C000
|
stack
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
AEE7000
|
stack
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
7FF557328000
|
unkown
|
page readonly
|
||
7FF556FD2000
|
unkown
|
page readonly
|
||
6A90000
|
trusted library allocation
|
page execute and read and write
|
||
7FF556E6C000
|
unkown
|
page readonly
|
||
7FF55714A000
|
unkown
|
page readonly
|
||
7FF5575BD000
|
unkown
|
page readonly
|
||
7FF5571E6000
|
unkown
|
page readonly
|
||
297D000
|
stack
|
page read and write
|
||
7FF556F9E000
|
unkown
|
page readonly
|
||
7FF5569FA000
|
unkown
|
page readonly
|
||
A8DD000
|
unkown
|
page read and write
|
||
7FF557476000
|
unkown
|
page readonly
|
||
131D000
|
trusted library allocation
|
page execute and read and write
|
||
10A30000
|
heap
|
page read and write
|
||
A131000
|
unkown
|
page read and write
|
||
7FF5572BD000
|
unkown
|
page readonly
|
||
6E3C000
|
stack
|
page read and write
|
||
7FF55763D000
|
unkown
|
page readonly
|
||
2800000
|
heap
|
page read and write
|
||
7FF5574B3000
|
unkown
|
page readonly
|
||
1700000
|
trusted library allocation
|
page read and write
|
||
6824000
|
heap
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
1750000
|
trusted library allocation
|
page read and write
|
||
BFD0000
|
unkown
|
page read and write
|
||
6791000
|
trusted library allocation
|
page read and write
|
||
6953000
|
heap
|
page read and write
|
||
6628000
|
heap
|
page read and write
|
||
C3A8000
|
unkown
|
page read and write
|
||
2DA5000
|
trusted library allocation
|
page execute and read and write
|
||
7D0E000
|
stack
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
8D70000
|
unkown
|
page read and write
|
||
3109000
|
trusted library allocation
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
A0FF000
|
unkown
|
page read and write
|
||
167D000
|
trusted library allocation
|
page execute and read and write
|
||
3600000
|
heap
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page execute and read and write
|
||
2C05000
|
heap
|
page read and write
|
||
1516000
|
trusted library allocation
|
page read and write
|
||
1242000
|
trusted library allocation
|
page read and write
|
||
10E6000
|
direct allocation
|
page execute and read and write
|
||
12A0000
|
heap
|
page read and write
|
||
3EE6000
|
trusted library allocation
|
page read and write
|
||
4AB3000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
1707000
|
trusted library allocation
|
page execute and read and write
|
||
9580000
|
unkown
|
page readonly
|
||
44F0000
|
heap
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
717E000
|
unkown
|
page read and write
|
||
1473000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5570B5000
|
unkown
|
page readonly
|
||
67E2000
|
heap
|
page read and write
|
||
7FF556F2A000
|
unkown
|
page readonly
|
||
E9B3000
|
unkown
|
page execute and read and write
|
||
4800000
|
unkown
|
page read and write
|
||
7FF557285000
|
unkown
|
page readonly
|
||
717C000
|
unkown
|
page read and write
|
||
41FC000
|
trusted library allocation
|
page read and write
|
||
5240000
|
trusted library allocation
|
page read and write
|
||
54A4000
|
trusted library allocation
|
page read and write
|
||
1600000
|
direct allocation
|
page execute and read and write
|
||
4718000
|
unkown
|
page read and write
|
||
7FF55710A000
|
unkown
|
page readonly
|
||
26B1000
|
trusted library allocation
|
page read and write
|
||
24E0000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
7FF5572B6000
|
unkown
|
page readonly
|
||
125E000
|
stack
|
page read and write
|
||
7FF546F2F000
|
unkown
|
page readonly
|
||
323F000
|
unkown
|
page read and write
|
||
E5EB000
|
stack
|
page read and write
|
||
1223000
|
trusted library allocation
|
page read and write
|
||
76B0000
|
unkown
|
page read and write
|
||
4810000
|
unkown
|
page read and write
|
||
1860000
|
direct allocation
|
page execute and read and write
|
||
2C0F000
|
unkown
|
page read and write
|
||
A08D000
|
stack
|
page read and write
|
||
7FF557083000
|
unkown
|
page readonly
|
||
2CFD000
|
stack
|
page read and write
|
||
7FF55703C000
|
unkown
|
page readonly
|
||
6210000
|
heap
|
page read and write
|
||
3C66000
|
heap
|
page read and write
|
||
30FB000
|
stack
|
page read and write
|
||
148D000
|
trusted library allocation
|
page execute and read and write
|
||
EB5000
|
heap
|
page read and write
|
||
8D74000
|
unkown
|
page read and write
|
||
68FC000
|
heap
|
page read and write
|
||
288B000
|
heap
|
page read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
6B80000
|
trusted library allocation
|
page read and write
|
||
7FF5572BD000
|
unkown
|
page readonly
|
||
1210000
|
heap
|
page read and write
|
||
7FF55756D000
|
unkown
|
page readonly
|
||
12D0000
|
heap
|
page read and write
|
||
29C4000
|
heap
|
page read and write
|
||
2E8D000
|
trusted library allocation
|
page read and write
|
||
3053000
|
heap
|
page read and write
|
||
7FF5575E0000
|
unkown
|
page readonly
|
||
BFB000
|
unclassified section
|
page execute and read and write
|
||
A8D2000
|
unkown
|
page read and write
|
||
A28D000
|
unkown
|
page read and write
|
||
FD0000
|
unkown
|
page readonly
|
||
B48000
|
heap
|
page read and write
|
||
7FF5569CB000
|
unkown
|
page readonly
|
||
2C00000
|
heap
|
page read and write
|
||
C24F000
|
unkown
|
page read and write
|
||
7FF5573FF000
|
unkown
|
page readonly
|
||
9086000
|
unkown
|
page read and write
|
||
69E6000
|
heap
|
page read and write
|
||
C23A000
|
unkown
|
page read and write
|
||
2630000
|
heap
|
page read and write
|
||
330A000
|
unkown
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
31FF000
|
unkown
|
page read and write
|
||
1753000
|
trusted library allocation
|
page execute and read and write
|
||
12E0000
|
heap
|
page read and write
|
||
322D000
|
heap
|
page read and write
|
||
10C7000
|
direct allocation
|
page execute and read and write
|
||
2D96000
|
trusted library allocation
|
page execute and read and write
|
||
88ED000
|
unkown
|
page read and write
|
||
4A9D000
|
direct allocation
|
page execute and read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
6817000
|
heap
|
page read and write
|
||
32C4000
|
unkown
|
page read and write
|
||
32B9000
|
unkown
|
page read and write
|
||
3E41000
|
trusted library allocation
|
page read and write
|
||
41B6000
|
trusted library allocation
|
page read and write
|
||
7FF5573E2000
|
unkown
|
page readonly
|
||
2F10000
|
heap
|
page execute and read and write
|
||
2F5D000
|
stack
|
page read and write
|
||
55BE000
|
trusted library allocation
|
page read and write
|
||
70CE000
|
stack
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
88E2000
|
unkown
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
A129000
|
unkown
|
page read and write
|
||
145E000
|
stack
|
page read and write
|
||
654C000
|
heap
|
page read and write
|
||
46F6000
|
unkown
|
page read and write
|
||
8D6C000
|
unkown
|
page read and write
|
||
9013000
|
unkown
|
page read and write
|
||
2C21000
|
heap
|
page read and write
|
||
ADAF000
|
stack
|
page read and write
|
||
13D3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5570D4000
|
unkown
|
page readonly
|
||
C74000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
2F41000
|
unkown
|
page read and write
|
||
4476000
|
trusted library allocation
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
7FF5573EA000
|
unkown
|
page readonly
|
||
29C5000
|
heap
|
page read and write
|
||
10FB000
|
stack
|
page read and write
|
||
7FF557411000
|
unkown
|
page readonly
|
||
32FF000
|
stack
|
page read and write
|
||
8AE6000
|
unkown
|
page read and write
|
||
955B000
|
stack
|
page read and write
|
||
7FF55733B000
|
unkown
|
page readonly
|
||
69EE000
|
trusted library allocation
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
63DE000
|
stack
|
page read and write
|
||
79F000
|
stack
|
page read and write
|
||
35D000
|
stack
|
page read and write
|
||
C244000
|
unkown
|
page read and write
|
||
4C9F000
|
heap
|
page read and write
|
||
3F76000
|
trusted library allocation
|
page read and write
|
||
6932000
|
heap
|
page read and write
|
||
6D4B000
|
stack
|
page read and write
|
||
7FF55708D000
|
unkown
|
page readonly
|
||
29C4000
|
heap
|
page read and write
|
||
7160000
|
unkown
|
page read and write
|
||
7040D000
|
unkown
|
page read and write
|
||
71EE000
|
stack
|
page read and write
|
||
1206000
|
trusted library allocation
|
page execute and read and write
|
||
7FF557456000
|
unkown
|
page readonly
|
||
7FF557549000
|
unkown
|
page readonly
|
||
A85E000
|
unkown
|
page read and write
|
||
360F000
|
heap
|
page read and write
|
||
2F78000
|
trusted library allocation
|
page read and write
|
||
AD10000
|
unkown
|
page readonly
|
||
7F8A0000
|
trusted library allocation
|
page execute and read and write
|
||
1199000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page execute and read and write
|
||
F0E0000
|
system
|
page execute and read and write
|
||
7DF468980000
|
unkown
|
page readonly
|
||
5160000
|
trusted library allocation
|
page read and write
|
||
13F2000
|
trusted library allocation
|
page read and write
|
||
7FF557653000
|
unkown
|
page readonly
|
||
7FF5574F4000
|
unkown
|
page readonly
|
||
3230000
|
unkown
|
page read and write
|
||
6F8C000
|
stack
|
page read and write
|
||
842F000
|
stack
|
page read and write
|
||
1408000
|
heap
|
page read and write
|
||
2E3D000
|
stack
|
page read and write
|
||
4820000
|
unkown
|
page read and write
|
||
7169000
|
unkown
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
72FE000
|
unkown
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
6864000
|
heap
|
page read and write
|
||
5580000
|
trusted library allocation
|
page execute and read and write
|
||
1335000
|
trusted library allocation
|
page execute and read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
77F0000
|
unkown
|
page read and write
|
||
8D68000
|
unkown
|
page read and write
|
||
729E000
|
stack
|
page read and write
|
||
6EB0000
|
heap
|
page read and write
|
||
29AE000
|
stack
|
page read and write
|
||
7DF4689A1000
|
unkown
|
page execute read
|
||
477D000
|
unkown
|
page read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
F6C000
|
stack
|
page read and write
|
||
69CB000
|
heap
|
page read and write
|
||
71CE000
|
stack
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
7FF55741A000
|
unkown
|
page readonly
|
||
67AE000
|
stack
|
page read and write
|
||
90D7000
|
unkown
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
7A80000
|
unkown
|
page readonly
|
||
539F000
|
unclassified section
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
902C000
|
unkown
|
page read and write
|
||
86CE000
|
stack
|
page read and write
|
||
5F65000
|
heap
|
page read and write
|
||
E83A000
|
stack
|
page read and write
|
||
6BA0000
|
trusted library allocation
|
page execute and read and write
|
||
669E000
|
stack
|
page read and write
|
||
69B1000
|
trusted library allocation
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
2D0B000
|
stack
|
page read and write
|
||
104D9000
|
unkown
|
page read and write
|
||
874E000
|
stack
|
page read and write
|
||
60F0000
|
trusted library allocation
|
page execute and read and write
|
||
2E60000
|
heap
|
page read and write
|
||
6763000
|
heap
|
page read and write
|
||
C460000
|
unkown
|
page read and write
|
||
88F2000
|
unkown
|
page read and write
|
||
2B8C000
|
stack
|
page read and write
|
||
A1FD000
|
unkown
|
page read and write
|
||
66BF000
|
stack
|
page read and write
|
||
6A40000
|
trusted library allocation
|
page read and write
|
||
7FF5573DE000
|
unkown
|
page readonly
|
||
2E89000
|
trusted library allocation
|
page read and write
|
||
7FF556E98000
|
unkown
|
page readonly
|
||
B82A000
|
stack
|
page read and write
|
||
324A000
|
unkown
|
page read and write
|
||
288F000
|
heap
|
page read and write
|
||
7140000
|
unkown
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
E1B9000
|
stack
|
page read and write
|
||
BBC0000
|
unkown
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
7FF557187000
|
unkown
|
page readonly
|
||
31C0000
|
heap
|
page read and write
|
||
7DF468970000
|
unkown
|
page readonly
|
||
AD4000
|
heap
|
page read and write
|
||
7FF5572C9000
|
unkown
|
page readonly
|
||
9C6000
|
heap
|
page read and write
|
||
C091000
|
unkown
|
page read and write
|
||
7FF557065000
|
unkown
|
page readonly
|
||
C562000
|
unkown
|
page read and write
|
||
2E98000
|
heap
|
page read and write
|
||
605F000
|
stack
|
page read and write
|
||
6D8E000
|
stack
|
page read and write
|
||
54B3000
|
heap
|
page read and write
|
||
3930000
|
heap
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
EFB000
|
stack
|
page read and write
|
||
10970000
|
system
|
page execute and read and write
|
||
55F8000
|
trusted library allocation
|
page read and write
|
||
669A000
|
heap
|
page read and write
|
||
7FF557579000
|
unkown
|
page readonly
|
||
625E000
|
stack
|
page read and write
|
||
6C50000
|
heap
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
4026000
|
trusted library allocation
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
C04B000
|
unkown
|
page read and write
|
||
A87A000
|
unkown
|
page read and write
|
||
7FF557594000
|
unkown
|
page readonly
|
||
2D21000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page execute and read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
2A17000
|
trusted library allocation
|
page read and write
|
||
4096000
|
trusted library allocation
|
page read and write
|
||
C7B000
|
stack
|
page read and write
|
||
10D5000
|
heap
|
page read and write
|
||
2BFB000
|
stack
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
7FF5575BB000
|
unkown
|
page readonly
|
||
14BE000
|
stack
|
page read and write
|
||
1217000
|
trusted library allocation
|
page execute and read and write
|
||
32E3000
|
unkown
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
6B2E000
|
stack
|
page read and write
|
||
A129000
|
unkown
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
1296000
|
heap
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
6BF0000
|
heap
|
page read and write
|
||
7DF468971000
|
unkown
|
page execute read
|
||
650E000
|
stack
|
page read and write
|
||
5EC000
|
stack
|
page read and write
|
||
2C0A000
|
heap
|
page read and write
|
||
C1DB000
|
unkown
|
page read and write
|
||
3614000
|
heap
|
page read and write
|
||
68BF000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
24FD000
|
stack
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
1135000
|
heap
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
8DB0000
|
unkown
|
page read and write
|
||
68B5000
|
trusted library allocation
|
page read and write
|
||
2A0E000
|
unkown
|
page read and write
|
||
32D7000
|
unkown
|
page read and write
|
||
2FAB000
|
trusted library allocation
|
page read and write
|
||
1474000
|
trusted library allocation
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
1215000
|
trusted library allocation
|
page execute and read and write
|
||
C072000
|
unkown
|
page read and write
|
||
7FF557535000
|
unkown
|
page readonly
|
||
29AC000
|
heap
|
page read and write
|
||
7F340000
|
trusted library allocation
|
page execute and read and write
|
||
546B000
|
trusted library allocation
|
page read and write
|
||
472C000
|
unkown
|
page read and write
|
||
E84C000
|
unkown
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
E9F2000
|
unkown
|
page execute and read and write
|
||
902C000
|
unkown
|
page read and write
|
||
2C04000
|
stack
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
8A5000
|
trusted library allocation
|
page execute and read and write
|
||
70CE000
|
stack
|
page read and write
|
||
6B94000
|
trusted library allocation
|
page read and write
|
||
88E4000
|
unkown
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
5797000
|
trusted library allocation
|
page read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
904C000
|
unkown
|
page read and write
|
||
5C6E000
|
stack
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
77D000
|
stack
|
page read and write
|
||
10D5000
|
heap
|
page read and write
|
||
676F000
|
stack
|
page read and write
|
||
4064000
|
trusted library allocation
|
page read and write
|
||
88B0000
|
unkown
|
page read and write
|
||
3460000
|
unkown
|
page read and write
|
||
2815000
|
heap
|
page read and write
|
||
4BB0000
|
trusted library allocation
|
page execute and read and write
|
||
1203000
|
trusted library allocation
|
page execute and read and write
|
||
B43000
|
heap
|
page read and write
|
||
C063000
|
unkown
|
page read and write
|
||
9E8E000
|
stack
|
page read and write
|
||
5403000
|
heap
|
page read and write
|
||
910000
|
unkown
|
page readonly
|
||
2990000
|
heap
|
page read and write
|
||
32FD000
|
stack
|
page read and write
|
||
4850000
|
direct allocation
|
page execute and read and write
|
||
7FF5573B0000
|
unkown
|
page readonly
|
||
5A0E000
|
stack
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page execute and read and write
|
||
B4C000
|
heap
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
62D0000
|
heap
|
page read and write
|
||
7FF557420000
|
unkown
|
page readonly
|
||
55D2000
|
trusted library allocation
|
page read and write
|
||
E7B000
|
unclassified section
|
page execute and read and write
|
||
68E0000
|
trusted library allocation
|
page read and write
|
||
6864000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
4B0E000
|
direct allocation
|
page execute and read and write
|
||
4830000
|
unkown
|
page read and write
|
||
655E000
|
stack
|
page read and write
|
||
2D60000
|
trusted library allocation
|
page read and write
|
||
32B9000
|
unkown
|
page read and write
|
||
361A000
|
heap
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
3590000
|
trusted library allocation
|
page read and write
|
||
BBBB000
|
stack
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
3107000
|
trusted library allocation
|
page read and write
|
||
7908000
|
stack
|
page read and write
|
||
3826000
|
trusted library allocation
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
10994000
|
system
|
page execute and read and write
|
||
4840000
|
unkown
|
page read and write
|
||
8EC5000
|
unkown
|
page read and write
|
||
88E1000
|
unkown
|
page read and write
|
||
2D6E000
|
trusted library allocation
|
page read and write
|
||
6860000
|
trusted library allocation
|
page execute and read and write
|
||
6E8E000
|
stack
|
page read and write
|
||
58F0000
|
heap
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
A0DA000
|
unkown
|
page read and write
|
||
102F000
|
heap
|
page read and write
|
||
6C50000
|
trusted library allocation
|
page execute and read and write
|
||
C41F000
|
unkown
|
page read and write
|
||
547E000
|
trusted library allocation
|
page read and write
|
||
C22B000
|
unkown
|
page read and write
|
||
73D0000
|
unkown
|
page read and write
|
||
7FF55706A000
|
unkown
|
page readonly
|
||
25FD000
|
stack
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
AD10000
|
unkown
|
page readonly
|
||
88F2000
|
unkown
|
page read and write
|
||
10B0000
|
unkown
|
page readonly
|
||
9F1000
|
trusted library allocation
|
page execute and read and write
|
||
11F10000
|
system
|
page execute and read and write
|
||
256D000
|
stack
|
page read and write
|
||
2E82000
|
trusted library allocation
|
page read and write
|
||
9050000
|
unkown
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
48EB000
|
heap
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
6190000
|
trusted library allocation
|
page read and write
|
||
7FF55726A000
|
unkown
|
page readonly
|
||
7FF55753D000
|
unkown
|
page readonly
|
||
70406000
|
unkown
|
page readonly
|
||
4022000
|
direct allocation
|
page execute and read and write
|
||
2D34000
|
trusted library allocation
|
page read and write
|
||
26EB000
|
trusted library allocation
|
page read and write
|
||
8ECE000
|
unkown
|
page read and write
|
||
2DEB000
|
trusted library allocation
|
page read and write
|
||
6530000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
E32E000
|
stack
|
page read and write
|
||
15BF000
|
stack
|
page read and write
|
||
5C2E000
|
stack
|
page read and write
|
||
B42F000
|
stack
|
page read and write
|
||
7FF557387000
|
unkown
|
page readonly
|
||
7FF5571B3000
|
unkown
|
page readonly
|
||
7FF55723F000
|
unkown
|
page readonly
|
||
152B000
|
trusted library allocation
|
page read and write
|
||
BB3E000
|
stack
|
page read and write
|
||
A23B000
|
unkown
|
page read and write
|
||
72D7000
|
unkown
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
7FF5573DE000
|
unkown
|
page readonly
|
||
F8E000
|
stack
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
7D8D000
|
stack
|
page read and write
|
||
6860000
|
heap
|
page read and write
|
||
8F27000
|
unkown
|
page read and write
|
||
7FF5572AC000
|
unkown
|
page readonly
|
||
4842000
|
heap
|
page read and write
|
||
5DBE000
|
stack
|
page read and write
|
||
2F77000
|
trusted library allocation
|
page read and write
|
||
11E9000
|
direct allocation
|
page execute and read and write
|
||
6C4000
|
heap
|
page read and write
|
||
718B000
|
unkown
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
5560000
|
heap
|
page read and write
|
||
7FF556F31000
|
unkown
|
page readonly
|
||
7FF5575D0000
|
unkown
|
page readonly
|
||
8EB8000
|
unkown
|
page read and write
|
||
46E0000
|
unkown
|
page read and write
|
||
FA0000
|
unclassified section
|
page execute and read and write
|
||
91D9000
|
stack
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
7FF55761F000
|
unkown
|
page readonly
|
||
2EF4000
|
heap
|
page read and write
|
||
7FF557661000
|
unkown
|
page readonly
|
||
7FF55714D000
|
unkown
|
page readonly
|
||
14EC000
|
stack
|
page read and write
|
||
B040000
|
unkown
|
page readonly
|
||
62F000
|
system
|
page execute and read and write
|
||
2894000
|
heap
|
page read and write
|
||
6970000
|
heap
|
page read and write
|
||
7040F000
|
unkown
|
page readonly
|
||
7FF5575D5000
|
unkown
|
page readonly
|
||
29FE000
|
stack
|
page read and write
|
||
6EAD000
|
stack
|
page read and write
|
||
1140000
|
direct allocation
|
page execute and read and write
|
||
2900000
|
heap
|
page read and write
|
||
10C0000
|
unclassified section
|
page execute and read and write
|
||
AD4000
|
heap
|
page read and write
|
||
7276000
|
unkown
|
page read and write
|
||
7FF556E6C000
|
unkown
|
page readonly
|
||
8C59000
|
stack
|
page read and write
|
||
5360000
|
trusted library allocation
|
page read and write
|
||
55F0000
|
trusted library allocation
|
page read and write
|
||
72AD000
|
stack
|
page read and write
|
||
29C4000
|
heap
|
page read and write
|
||
8DA6000
|
unkown
|
page read and write
|
||
7FF546F2F000
|
unkown
|
page readonly
|
||
4FEE000
|
direct allocation
|
page execute and read and write
|
||
13E0000
|
direct allocation
|
page execute and read and write
|
||
7FF5573E2000
|
unkown
|
page readonly
|
||
6E90000
|
heap
|
page read and write
|
||
7FF55732D000
|
unkown
|
page readonly
|
||
7FF55764C000
|
unkown
|
page readonly
|
||
C101000
|
unkown
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
2C0A000
|
heap
|
page read and write
|
||
2F09000
|
stack
|
page read and write
|
||
170B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5573E6000
|
unkown
|
page readonly
|
||
7FF557099000
|
unkown
|
page readonly
|
||
2F8F000
|
trusted library allocation
|
page read and write
|
||
1210000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
9E0F000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
3FB1000
|
direct allocation
|
page execute and read and write
|
||
BEBF000
|
stack
|
page read and write
|
||
4376000
|
trusted library allocation
|
page read and write
|
||
F08000
|
heap
|
page read and write
|
||
6B90000
|
heap
|
page read and write
|
||
2FA6000
|
heap
|
page read and write
|
||
2FC8000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
675E000
|
stack
|
page read and write
|
||
7FF556F90000
|
unkown
|
page readonly
|
||
176E000
|
stack
|
page read and write
|
||
7FF557045000
|
unkown
|
page readonly
|
||
26FD000
|
trusted library allocation
|
page read and write
|
||
631E000
|
stack
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
6E60000
|
heap
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
7FF557493000
|
unkown
|
page readonly
|
||
7276000
|
unkown
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
15A6000
|
direct allocation
|
page execute and read and write
|
||
6E30000
|
heap
|
page read and write
|
||
883000
|
trusted library allocation
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
8ECE000
|
unkown
|
page read and write
|
||
2E0E000
|
unkown
|
page read and write
|
||
73F0000
|
unkown
|
page read and write
|
||
361A000
|
heap
|
page read and write
|
||
2C88000
|
heap
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
7FF556FE3000
|
unkown
|
page readonly
|
||
64CC000
|
stack
|
page read and write
|
||
29C2000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1503000
|
direct allocation
|
page execute and read and write
|
||
EEC000
|
stack
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
F5F000
|
stack
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF55703F000
|
unkown
|
page readonly
|
||
3152000
|
trusted library allocation
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
90CF000
|
unkown
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
86F000
|
stack
|
page read and write
|
||
594F000
|
stack
|
page read and write
|
||
935A000
|
stack
|
page read and write
|
||
7FF5572B6000
|
unkown
|
page readonly
|
||
7FF55700F000
|
unkown
|
page readonly
|
||
1449000
|
direct allocation
|
page execute and read and write
|
||
B28000
|
heap
|
page read and write
|
||
121B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF55760F000
|
unkown
|
page readonly
|
||
7FF5570BB000
|
unkown
|
page readonly
|
||
2DD5000
|
heap
|
page read and write
|
||
1642000
|
direct allocation
|
page execute and read and write
|
||
AD4000
|
heap
|
page read and write
|
||
2894000
|
heap
|
page read and write
|
||
5A4E000
|
stack
|
page read and write
|
||
6BC0000
|
trusted library allocation
|
page read and write
|
||
B070000
|
unkown
|
page read and write
|
||
7FF556FEE000
|
unkown
|
page readonly
|
||
2C0A000
|
heap
|
page read and write
|
||
6BE0000
|
heap
|
page read and write
|
||
913F000
|
unkown
|
page read and write
|
||
67C0000
|
trusted library allocation
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
11BF000
|
stack
|
page read and write
|
||
2F20000
|
unkown
|
page readonly
|
||
6A60000
|
trusted library allocation
|
page execute and read and write
|
||
74EE000
|
stack
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
7A60000
|
unkown
|
page readonly
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
7FF556F90000
|
unkown
|
page readonly
|
||
71A4000
|
unkown
|
page read and write
|
||
8D80000
|
unkown
|
page read and write
|
||
88F8000
|
unkown
|
page read and write
|
||
6070000
|
trusted library allocation
|
page execute and read and write
|
||
124B000
|
trusted library allocation
|
page execute and read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
13E7000
|
direct allocation
|
page execute and read and write
|
||
2D92000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
unkown
|
page readonly
|
||
2FA4000
|
heap
|
page read and write
|
||
4BCE000
|
stack
|
page read and write
|
||
145F000
|
stack
|
page read and write
|
||
C0F9000
|
unkown
|
page read and write
|
||
2EDE000
|
unkown
|
page read and write
|
||
7FF55741A000
|
unkown
|
page readonly
|
||
8ED5000
|
unkown
|
page read and write
|
||
2FAA000
|
heap
|
page read and write
|
||
4B1D000
|
direct allocation
|
page execute and read and write
|
||
2D82000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
B7AA000
|
stack
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
C5BE000
|
unkown
|
page read and write
|
||
3220000
|
unclassified section
|
page execute and read and write
|
||
7FF557535000
|
unkown
|
page readonly
|
||
3970000
|
heap
|
page read and write
|
||
7FF5573CB000
|
unkown
|
page readonly
|
||
7FF55733F000
|
unkown
|
page readonly
|
||
AD4000
|
heap
|
page read and write
|
||
C214000
|
unkown
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
839F000
|
unkown
|
page read and write
|
||
C0FB000
|
unkown
|
page read and write
|
||
5450000
|
trusted library allocation
|
page read and write
|
||
32D7000
|
unkown
|
page read and write
|
||
63AE000
|
stack
|
page read and write
|
||
8ED5000
|
unkown
|
page read and write
|
||
5847000
|
trusted library allocation
|
page read and write
|
||
717A000
|
unkown
|
page read and write
|
||
52DB000
|
trusted library allocation
|
page read and write
|
||
15E6000
|
direct allocation
|
page execute and read and write
|
||
2D76000
|
trusted library allocation
|
page read and write
|
||
1054B000
|
unkown
|
page read and write
|
||
8530000
|
unkown
|
page readonly
|
||
67D0000
|
trusted library allocation
|
page execute and read and write
|
||
E280000
|
unkown
|
page read and write
|
||
9853000
|
unkown
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
A222000
|
unkown
|
page read and write
|
||
7FF55703C000
|
unkown
|
page readonly
|
||
C541000
|
unkown
|
page read and write
|
||
131D000
|
stack
|
page read and write
|
||
B6AA000
|
stack
|
page read and write
|
||
7140000
|
unkown
|
page read and write
|
||
6808000
|
heap
|
page read and write
|
||
C24F000
|
unkown
|
page read and write
|
||
184D000
|
direct allocation
|
page execute and read and write
|
||
10F7000
|
stack
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
880000
|
trusted library allocation
|
page read and write
|
||
1989000
|
direct allocation
|
page execute and read and write
|
||
6627000
|
heap
|
page read and write
|
||
6A3E000
|
stack
|
page read and write
|
||
90C9000
|
unkown
|
page read and write
|
||
10BE000
|
stack
|
page read and write
|
||
1886000
|
direct allocation
|
page execute and read and write
|
||
1126000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
15FF000
|
stack
|
page read and write
|
||
326A000
|
unkown
|
page read and write
|
||
8F09000
|
unkown
|
page read and write
|
||
52F6000
|
trusted library allocation
|
page read and write
|
||
7FF5569F1000
|
unkown
|
page readonly
|
||
90DB000
|
unkown
|
page read and write
|
||
7FF5575C5000
|
unkown
|
page readonly
|
||
67EE000
|
stack
|
page read and write
|
||
8FB000
|
stack
|
page read and write
|
||
7FF55704A000
|
unkown
|
page readonly
|
||
120D000
|
trusted library allocation
|
page execute and read and write
|
||
B070000
|
unkown
|
page read and write
|
||
73D000
|
stack
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
32C7000
|
unkown
|
page read and write
|
||
1726000
|
direct allocation
|
page execute and read and write
|
||
C1DD000
|
unkown
|
page read and write
|
||
26BB000
|
trusted library allocation
|
page read and write
|
||
315B000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
589E000
|
stack
|
page read and write
|
||
5F70000
|
heap
|
page read and write
|
||
9768000
|
system
|
page execute and read and write
|
||
55E6000
|
trusted library allocation
|
page read and write
|
||
668000
|
heap
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
10A30000
|
heap
|
page read and write
|
||
3054000
|
heap
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
89C0000
|
unkown
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
B090000
|
system
|
page execute and read and write
|
||
8AE6000
|
unkown
|
page read and write
|
||
2AF4000
|
heap
|
page read and write
|
||
7FF5575EA000
|
unkown
|
page readonly
|
||
CF2000
|
unkown
|
page readonly
|
||
7FF55752A000
|
unkown
|
page readonly
|
||
7FF557245000
|
unkown
|
page readonly
|
||
54B0000
|
heap
|
page read and write
|
||
16A6000
|
direct allocation
|
page execute and read and write
|
||
1142000
|
heap
|
page read and write
|
||
7FF55765C000
|
unkown
|
page readonly
|
||
4BD0000
|
heap
|
page read and write
|
||
2E2D000
|
trusted library allocation
|
page read and write
|
||
10DB000
|
unclassified section
|
page execute and read and write
|
||
7FF557062000
|
unkown
|
page readonly
|
||
633E000
|
stack
|
page read and write
|
||
2D8A000
|
stack
|
page read and write
|
||
7FF557037000
|
unkown
|
page readonly
|
||
2BC0000
|
direct allocation
|
page read and write
|
||
8EEE000
|
unkown
|
page read and write
|
||
B050000
|
unkown
|
page read and write
|
||
C4A2000
|
unkown
|
page read and write
|
||
2F90000
|
unkown
|
page readonly
|
||
2E8B000
|
trusted library allocation
|
page read and write
|
||
4031000
|
trusted library allocation
|
page read and write
|
||
4A99000
|
direct allocation
|
page execute and read and write
|
||
14A2000
|
direct allocation
|
page execute and read and write
|
||
7C00000
|
unkown
|
page readonly
|
||
4718000
|
unkown
|
page read and write
|
||
A891000
|
unkown
|
page read and write
|
||
606E000
|
trusted library allocation
|
page read and write
|
||
7FF5569CB000
|
unkown
|
page readonly
|
||
2D80000
|
trusted library allocation
|
page read and write
|
||
2D9A000
|
trusted library allocation
|
page execute and read and write
|
||
75EF000
|
stack
|
page read and write
|
||
A0BD000
|
unkown
|
page read and write
|
||
51F9000
|
unkown
|
page read and write
|
||
6618000
|
heap
|
page read and write
|
||
47DB000
|
unkown
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
9086000
|
unkown
|
page read and write
|
||
38B4000
|
trusted library allocation
|
page read and write
|
||
2BFF000
|
heap
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
3AA8000
|
heap
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page execute and read and write
|
||
5330000
|
trusted library allocation
|
page read and write
|
||
7FF5573E6000
|
unkown
|
page readonly
|
||
7FF557106000
|
unkown
|
page readonly
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
45E000
|
system
|
page execute and read and write
|
||
9D0000
|
heap
|
page read and write
|
||
72FC000
|
unkown
|
page read and write
|
||
A118000
|
unkown
|
page read and write
|
||
176F000
|
stack
|
page read and write
|
||
58DD000
|
stack
|
page read and write
|
||
40A6000
|
trusted library allocation
|
page read and write
|
||
2889000
|
heap
|
page read and write
|
||
C2E4000
|
unkown
|
page read and write
|
||
7FF5574BD000
|
unkown
|
page readonly
|
||
7FF556F2A000
|
unkown
|
page readonly
|
||
5421000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
B030000
|
unkown
|
page readonly
|
||
7FF557148000
|
unkown
|
page readonly
|
||
1006000
|
unclassified section
|
page execute and read and write
|
||
BC00000
|
unkown
|
page readonly
|
||
B4C000
|
heap
|
page read and write
|
||
7FF55704A000
|
unkown
|
page readonly
|
||
6031000
|
trusted library allocation
|
page read and write
|
||
7FF55720D000
|
unkown
|
page readonly
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
6A40000
|
trusted library allocation
|
page read and write
|
||
625E000
|
stack
|
page read and write
|
||
128E000
|
stack
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
8D72000
|
unkown
|
page read and write
|
||
68D3000
|
heap
|
page read and write
|
||
1460000
|
direct allocation
|
page execute and read and write
|
||
89F000
|
stack
|
page read and write
|
||
7FF557437000
|
unkown
|
page readonly
|
||
1922000
|
direct allocation
|
page execute and read and write
|
||
27B5000
|
heap
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
1220000
|
trusted library allocation
|
page read and write
|
||
652E000
|
stack
|
page read and write
|
||
7FF5575E3000
|
unkown
|
page readonly
|
||
7FF557416000
|
unkown
|
page readonly
|
||
C072000
|
unkown
|
page read and write
|
||
521C000
|
stack
|
page read and write
|
||
7FF5573A9000
|
unkown
|
page readonly
|
||
2FB0000
|
heap
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
7FF5574F9000
|
unkown
|
page readonly
|
||
10503000
|
unkown
|
page read and write
|
||
7FF556FD2000
|
unkown
|
page readonly
|
||
55BE000
|
stack
|
page read and write
|
||
7FF5572A4000
|
unkown
|
page readonly
|
||
F90000
|
heap
|
page read and write
|
||
2F41000
|
unkown
|
page read and write
|
||
7040D000
|
unkown
|
page read and write
|
||
A2F000
|
heap
|
page read and write
|
||
4820000
|
heap
|
page read and write
|
||
7FF557187000
|
unkown
|
page readonly
|
||
47C6000
|
unkown
|
page read and write
|
||
E2A0000
|
heap
|
page read and write
|
||
A222000
|
unkown
|
page read and write
|
||
10F46000
|
system
|
page read and write
|
||
13F6000
|
trusted library allocation
|
page execute and read and write
|
||
514C000
|
stack
|
page read and write
|
||
A810000
|
unkown
|
page read and write
|
||
8580000
|
unkown
|
page read and write
|
||
7FF5570C1000
|
unkown
|
page readonly
|
||
E87A000
|
unkown
|
page read and write
|
||
68B1000
|
trusted library allocation
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
4BD6000
|
heap
|
page read and write
|
||
2C04000
|
stack
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
67A0000
|
trusted library allocation
|
page execute and read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
3249000
|
unkown
|
page read and write
|
||
132A000
|
trusted library allocation
|
page execute and read and write
|
||
5494000
|
trusted library allocation
|
page read and write
|
||
11E3000
|
direct allocation
|
page execute and read and write
|
||
330A000
|
unkown
|
page read and write
|
||
6D4C000
|
stack
|
page read and write
|
||
1514000
|
trusted library allocation
|
page read and write
|
||
2AFD000
|
stack
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
E871000
|
unkown
|
page read and write
|
||
C1DF000
|
unkown
|
page read and write
|
||
4CA1000
|
trusted library allocation
|
page execute and read and write
|
||
3240000
|
direct allocation
|
page execute and read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
7FF5575B9000
|
unkown
|
page readonly
|
||
B52000
|
heap
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
38D4000
|
trusted library allocation
|
page read and write
|
||
557D000
|
stack
|
page read and write
|
||
7FF557174000
|
unkown
|
page readonly
|
||
EEC000
|
stack
|
page read and write
|
||
726D000
|
stack
|
page read and write
|
||
685E000
|
stack
|
page read and write
|
||
D5B000
|
stack
|
page read and write
|
||
7803000
|
unkown
|
page read and write
|
||
995E000
|
stack
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
90F2000
|
unkown
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
10DA0000
|
system
|
page execute and read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
3230000
|
unkown
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
8D80000
|
unkown
|
page read and write
|
||
1210000
|
trusted library allocation
|
page read and write
|
||
3572000
|
unclassified section
|
page execute and read and write
|
||
2F0F000
|
unkown
|
page read and write
|
||
7D8D000
|
stack
|
page read and write
|
||
C374000
|
unkown
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
703F0000
|
unkown
|
page readonly
|
||
88EE000
|
unkown
|
page read and write
|
||
30AF000
|
unclassified section
|
page execute and read and write
|
||
2A7D000
|
stack
|
page read and write
|
||
7306000
|
unkown
|
page read and write
|
||
7FF557095000
|
unkown
|
page readonly
|
||
7DF468981000
|
unkown
|
page execute read
|
||
7FF55707D000
|
unkown
|
page readonly
|
||
18E6000
|
direct allocation
|
page execute and read and write
|
||
1140000
|
heap
|
page read and write
|
||
8DFE000
|
unkown
|
page read and write
|
||
7FF556FFB000
|
unkown
|
page readonly
|
||
C3ED000
|
unkown
|
page read and write
|
||
568D000
|
stack
|
page read and write
|
||
7FF557531000
|
unkown
|
page readonly
|
||
43E000
|
system
|
page execute and read and write
|
||
6970000
|
trusted library allocation
|
page read and write
|
||
89C0000
|
unkown
|
page read and write
|
||
C4DC000
|
unkown
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
88D000
|
trusted library allocation
|
page execute and read and write
|
||
A22F000
|
unkown
|
page read and write
|
||
7FF55702F000
|
unkown
|
page readonly
|
||
2BBE000
|
stack
|
page read and write
|
||
40A1000
|
trusted library allocation
|
page read and write
|
||
7A4B000
|
stack
|
page read and write
|
||
C94000
|
trusted library allocation
|
page read and write
|
||
1337000
|
trusted library allocation
|
page execute and read and write
|
||
7FF557280000
|
unkown
|
page readonly
|
||
3115000
|
stack
|
page read and write
|
||
1371000
|
direct allocation
|
page execute and read and write
|
||
F97000
|
stack
|
page read and write
|
||
2EBC000
|
heap
|
page read and write
|
||
11F0000
|
unclassified section
|
page execute and read and write
|
||
8820000
|
unkown
|
page readonly
|
||
2E50000
|
trusted library allocation
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
2C2E000
|
unkown
|
page read and write
|
||
29BD000
|
stack
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
E270000
|
unkown
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
5121000
|
direct allocation
|
page execute and read and write
|
||
3055000
|
heap
|
page read and write
|
||
7A80000
|
unkown
|
page readonly
|
||
3B0000
|
heap
|
page read and write
|
||
63C000
|
stack
|
page read and write
|
||
725C000
|
stack
|
page read and write
|
||
4B30000
|
trusted library allocation
|
page execute and read and write
|
||
84DC000
|
stack
|
page read and write
|
||
9374000
|
unkown
|
page read and write
|
||
AEE7000
|
stack
|
page read and write
|
||
7FF5574A9000
|
unkown
|
page readonly
|
||
C04B000
|
unkown
|
page read and write
|
||
4136000
|
trusted library allocation
|
page read and write
|
||
2464000
|
trusted library allocation
|
page read and write
|
||
35BC000
|
heap
|
page read and write
|
||
313E000
|
unkown
|
page read and write
|
||
7FF55731B000
|
unkown
|
page readonly
|
||
C50B000
|
unkown
|
page read and write
|
||
90DB000
|
unkown
|
page read and write
|
||
35C6000
|
heap
|
page read and write
|
||
7FF5572A4000
|
unkown
|
page readonly
|
||
E290000
|
unkown
|
page read and write
|
||
7FF5575B1000
|
unkown
|
page readonly
|
||
2EC0000
|
heap
|
page read and write
|
||
7FF557602000
|
unkown
|
page readonly
|
||
703F1000
|
unkown
|
page execute read
|
||
8EB8000
|
unkown
|
page read and write
|
||
9E8E000
|
stack
|
page read and write
|
||
1545000
|
trusted library allocation
|
page read and write
|
||
6A30000
|
heap
|
page read and write
|
||
511E000
|
stack
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
A225000
|
unkown
|
page read and write
|
||
7FF55714F000
|
unkown
|
page readonly
|
||
BBBB000
|
stack
|
page read and write
|
||
3213000
|
stack
|
page read and write
|
||
2AF4000
|
heap
|
page read and write
|
||
3450000
|
unclassified section
|
page execute and read and write
|
||
A218000
|
unkown
|
page read and write
|
||
3220000
|
unkown
|
page readonly
|
||
105C4000
|
unkown
|
page read and write
|
||
53F0000
|
heap
|
page read and write
|
||
6A90000
|
trusted library allocation
|
page execute and read and write
|
||
6970000
|
trusted library allocation
|
page execute and read and write
|
||
57A0000
|
heap
|
page execute and read and write
|
||
2961000
|
heap
|
page read and write
|
||
7FF5572D4000
|
unkown
|
page readonly
|
||
7FF5575A1000
|
unkown
|
page readonly
|
||
C460000
|
unkown
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
12E2000
|
heap
|
page read and write
|
||
68C8000
|
heap
|
page read and write
|
||
7DF468991000
|
unkown
|
page execute read
|
||
5AD000
|
stack
|
page read and write
|
||
11F7B000
|
system
|
page execute and read and write
|
||
716C000
|
stack
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
7A4B000
|
stack
|
page read and write
|
||
1360000
|
trusted library allocation
|
page execute and read and write
|
||
7FF557113000
|
unkown
|
page readonly
|
||
2C23000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
7FF557583000
|
unkown
|
page readonly
|
||
472C000
|
unkown
|
page read and write
|
||
7FF55742B000
|
unkown
|
page readonly
|
||
2F00000
|
heap
|
page read and write
|
||
8ECE000
|
unkown
|
page read and write
|
||
51A6000
|
unclassified section
|
page read and write
|
||
1842000
|
unclassified section
|
page execute and read and write
|
||
33D0000
|
heap
|
page read and write
|
||
C3F7000
|
unkown
|
page read and write
|
||
F520000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
B82A000
|
stack
|
page read and write
|
||
13F8000
|
heap
|
page read and write
|
||
10546000
|
unkown
|
page read and write
|
||
7DF468970000
|
unkown
|
page readonly
|
||
C50000
|
heap
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
76B0000
|
unkown
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
3F39000
|
trusted library allocation
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
6F20000
|
heap
|
page read and write
|
||
123A000
|
trusted library allocation
|
page execute and read and write
|
||
64AE000
|
stack
|
page read and write
|
||
8D72000
|
unkown
|
page read and write
|
||
B5AE000
|
stack
|
page read and write
|
||
60BE000
|
stack
|
page read and write
|
||
7F8E0000
|
trusted library allocation
|
page execute and read and write
|
||
3109000
|
trusted library allocation
|
page read and write
|
||
1054B000
|
unkown
|
page read and write
|
||
11971000
|
system
|
page execute and read and write
|
||
1496000
|
trusted library allocation
|
page execute and read and write
|
||
7FF557330000
|
unkown
|
page readonly
|
||
4614000
|
heap
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page execute and read and write
|
||
C74000
|
heap
|
page read and write
|
||
68A0000
|
trusted library allocation
|
page read and write
|
||
B1A0000
|
unkown
|
page read and write
|
||
3F09000
|
trusted library allocation
|
page read and write
|
||
7E10000
|
unkown
|
page read and write
|
||
7FF557487000
|
unkown
|
page readonly
|
||
5464000
|
trusted library allocation
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
9B10000
|
system
|
page execute and read and write
|
||
51F9000
|
unkown
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
BBD0000
|
unkown
|
page readonly
|
||
5F00000
|
heap
|
page read and write
|
||
8F83000
|
unkown
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
A873000
|
unkown
|
page read and write
|
||
7BC1000
|
unkown
|
page read and write
|
||
7FF557420000
|
unkown
|
page readonly
|
||
2FB0000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2AFC000
|
stack
|
page read and write
|
||
9013000
|
unkown
|
page read and write
|
||
5481000
|
trusted library allocation
|
page read and write
|
||
10A40000
|
unkown
|
page read and write
|
||
7FF557328000
|
unkown
|
page readonly
|
||
65BE000
|
stack
|
page read and write
|
||
F29000
|
heap
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
8EF5000
|
unkown
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
7FF556F9E000
|
unkown
|
page readonly
|
||
2C90000
|
direct allocation
|
page read and write
|
||
6EBE000
|
heap
|
page read and write
|
||
A882000
|
unkown
|
page read and write
|
||
8F27000
|
unkown
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
7DF468981000
|
unkown
|
page execute read
|
||
14C0000
|
heap
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
1587000
|
direct allocation
|
page execute and read and write
|
||
79A0000
|
unkown
|
page read and write
|
||
611F000
|
stack
|
page read and write
|
||
4171000
|
trusted library allocation
|
page read and write
|
||
13D4000
|
trusted library allocation
|
page read and write
|
||
6E4C000
|
stack
|
page read and write
|
||
1245000
|
trusted library allocation
|
page execute and read and write
|
||
1205000
|
heap
|
page read and write
|
||
8C59000
|
stack
|
page read and write
|
||
A1FD000
|
unkown
|
page read and write
|
||
50BC000
|
stack
|
page read and write
|
||
D20000
|
trusted library allocation
|
page read and write
|
||
294C000
|
heap
|
page read and write
|
||
BE0000
|
unclassified section
|
page execute and read and write
|
||
1326000
|
trusted library allocation
|
page execute and read and write
|
||
6BD000
|
stack
|
page read and write
|
||
7FF55751D000
|
unkown
|
page readonly
|
||
10A5000
|
heap
|
page read and write
|
||
5CEE000
|
stack
|
page read and write
|
||
14A2000
|
trusted library allocation
|
page read and write
|
||
A0B9000
|
unkown
|
page read and write
|
||
7BC0000
|
unkown
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
8D70000
|
unkown
|
page read and write
|
||
8F4D000
|
unkown
|
page read and write
|
||
2C88000
|
trusted library allocation
|
page read and write
|
||
7FF5572A2000
|
unkown
|
page readonly
|
||
662C000
|
heap
|
page read and write
|
||
7FF55700F000
|
unkown
|
page readonly
|
||
7FF5574BA000
|
unkown
|
page readonly
|
||
A0BD000
|
unkown
|
page read and write
|
||
7FF557599000
|
unkown
|
page readonly
|
||
A114000
|
unkown
|
page read and write
|
||
32D3000
|
unkown
|
page read and write
|
||
A0DA000
|
unkown
|
page read and write
|
||
8EC5000
|
unkown
|
page read and write
|
||
90F2000
|
unkown
|
page read and write
|
||
10A40000
|
system
|
page execute and read and write
|
||
66A5000
|
heap
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
11ED000
|
trusted library allocation
|
page execute and read and write
|
||
68EE000
|
trusted library allocation
|
page read and write
|
||
88F8000
|
unkown
|
page read and write
|
||
6BC0000
|
trusted library allocation
|
page execute and read and write
|
||
149E000
|
stack
|
page read and write
|
||
1770000
|
unclassified section
|
page execute and read and write
|
||
7FF556F87000
|
unkown
|
page readonly
|
||
2960000
|
heap
|
page read and write
|
||
2FAA000
|
heap
|
page read and write
|
||
603E000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page execute and read and write
|
||
2BE8000
|
heap
|
page read and write
|
||
4344000
|
trusted library allocation
|
page read and write
|
||
3F71000
|
trusted library allocation
|
page read and write
|
||
11CF000
|
stack
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
8F4D000
|
unkown
|
page read and write
|
||
7FF557467000
|
unkown
|
page readonly
|
||
A8CA000
|
unkown
|
page read and write
|
||
6CF0000
|
heap
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
24A5000
|
trusted library allocation
|
page read and write
|
||
C57F000
|
unkown
|
page read and write
|
||
5647000
|
trusted library allocation
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
7FF556E85000
|
unkown
|
page readonly
|
||
6AB0000
|
trusted library allocation
|
page read and write
|
||
68A1000
|
heap
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
17A3000
|
unclassified section
|
page execute and read and write
|
||
EB5B000
|
stack
|
page read and write
|
||
E60000
|
unkown
|
page readonly
|
||
10503000
|
unkown
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
43E000
|
system
|
page execute and read and write
|
||
C0FB000
|
unkown
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
4276000
|
trusted library allocation
|
page read and write
|
||
C22F000
|
unkown
|
page read and write
|
||
7FF5575AB000
|
unkown
|
page readonly
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
29C4000
|
heap
|
page read and write
|
||
C5AA000
|
unkown
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
7FF556E98000
|
unkown
|
page readonly
|
||
9052000
|
unkown
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
794000
|
trusted library allocation
|
page read and write
|
||
2C5E000
|
unkown
|
page read and write
|
||
31BC000
|
heap
|
page read and write
|
||
7B99000
|
stack
|
page read and write
|
||
CA8000
|
trusted library allocation
|
page read and write
|
||
8EF5000
|
unkown
|
page read and write
|
||
780000
|
trusted library allocation
|
page read and write
|
||
2AF4000
|
heap
|
page read and write
|
||
7FF557642000
|
unkown
|
page readonly
|
||
110E000
|
heap
|
page read and write
|
||
3F2C000
|
trusted library allocation
|
page read and write
|
||
7FF557429000
|
unkown
|
page readonly
|
||
2C32000
|
heap
|
page read and write
|
||
2DB5000
|
trusted library allocation
|
page read and write
|
||
5302000
|
trusted library allocation
|
page read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
26AE000
|
stack
|
page read and write
|
||
717C000
|
unkown
|
page read and write
|
||
7FF557463000
|
unkown
|
page readonly
|
||
7FF557642000
|
unkown
|
page readonly
|
||
55CD000
|
trusted library allocation
|
page read and write
|
||
4144000
|
trusted library allocation
|
page read and write
|
||
8F09000
|
unkown
|
page read and write
|
||
8DA6000
|
unkown
|
page read and write
|
||
32E6000
|
unkown
|
page read and write
|
||
A87A000
|
unkown
|
page read and write
|
||
2F88000
|
heap
|
page read and write
|
||
27BD000
|
stack
|
page read and write
|
||
C46C000
|
unkown
|
page read and write
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
A00A000
|
stack
|
page read and write
|
||
2C38000
|
heap
|
page read and write
|
||
8BD9000
|
stack
|
page read and write
|
||
71FC000
|
unkown
|
page read and write
|
||
2D35000
|
heap
|
page read and write
|
||
3800000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
7FF55732D000
|
unkown
|
page readonly
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
6A8E000
|
stack
|
page read and write
|
||
788B000
|
stack
|
page read and write
|
||
15ED000
|
direct allocation
|
page execute and read and write
|
||
73D0000
|
unkown
|
page read and write
|
||
A8CA000
|
unkown
|
page read and write
|
||
32C9000
|
unkown
|
page read and write
|
||
51E3000
|
unkown
|
page read and write
|
||
7FF557583000
|
unkown
|
page readonly
|
||
9F0E000
|
stack
|
page read and write
|
||
3350000
|
unkown
|
page readonly
|
||
1357000
|
heap
|
page read and write
|
||
7FF557352000
|
unkown
|
page readonly
|
||
D7A000
|
stack
|
page read and write
|
||
1B2D000
|
direct allocation
|
page execute and read and write
|
||
175D000
|
trusted library allocation
|
page execute and read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
702C000
|
stack
|
page read and write
|
||
7FF556E66000
|
unkown
|
page readonly
|
||
7FF557617000
|
unkown
|
page readonly
|
||
9086000
|
unkown
|
page read and write
|
||
7DF468980000
|
unkown
|
page readonly
|
||
649E000
|
stack
|
page read and write
|
||
8EDD000
|
unkown
|
page read and write
|
||
1767000
|
heap
|
page read and write
|
||
4B7D000
|
direct allocation
|
page execute and read and write
|
||
10E60000
|
system
|
page execute and read and write
|
||
13AD000
|
trusted library allocation
|
page execute and read and write
|
||
A00A000
|
stack
|
page read and write
|
||
4781000
|
unkown
|
page read and write
|
||
7FF557501000
|
unkown
|
page readonly
|
||
2C32000
|
heap
|
page read and write
|
||
4121000
|
trusted library allocation
|
page read and write
|
||
9B5000
|
stack
|
page read and write
|
||
344F000
|
unkown
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
7FF55738F000
|
unkown
|
page readonly
|
||
3FD9000
|
trusted library allocation
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
7FF557382000
|
unkown
|
page readonly
|
||
7C70000
|
unkown
|
page readonly
|
||
7FF556E8D000
|
unkown
|
page readonly
|
||
2B2C000
|
heap
|
page read and write
|
||
288B000
|
heap
|
page read and write
|
||
77C0000
|
unkown
|
page read and write
|
||
6A10000
|
trusted library allocation
|
page read and write
|
||
273D000
|
stack
|
page read and write
|
||
A8DD000
|
unkown
|
page read and write
|
||
1754000
|
trusted library allocation
|
page read and write
|
||
95C000
|
stack
|
page read and write
|
||
C5D000
|
stack
|
page read and write
|
||
6ABE000
|
trusted library allocation
|
page read and write
|
||
511D000
|
direct allocation
|
page execute and read and write
|
||
7DF4689B1000
|
unkown
|
page execute read
|
||
2AF4000
|
heap
|
page read and write
|
||
6894000
|
heap
|
page read and write
|
||
28AD000
|
stack
|
page read and write
|
||
85E000
|
stack
|
page read and write
|
||
1377000
|
heap
|
page read and write
|
||
598E000
|
stack
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
6E8C000
|
stack
|
page read and write
|
||
711C000
|
stack
|
page read and write
|
||
7FF5574BA000
|
unkown
|
page readonly
|
||
104C2000
|
unkown
|
page read and write
|
||
716E000
|
unkown
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
7FF5573B5000
|
unkown
|
page readonly
|
||
7FF556A1B000
|
unkown
|
page readonly
|
||
1040000
|
heap
|
page read and write
|
||
7E10000
|
unkown
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
1B26000
|
direct allocation
|
page execute and read and write
|
||
7FF557245000
|
unkown
|
page readonly
|
||
1370000
|
heap
|
page read and write
|
||
10AE000
|
stack
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
7FF5575BF000
|
unkown
|
page readonly
|
||
3195000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
296F000
|
stack
|
page read and write
|
||
736E000
|
stack
|
page read and write
|
||
C2D3000
|
unkown
|
page read and write
|
||
874E000
|
stack
|
page read and write
|
||
6DAE000
|
stack
|
page read and write
|
||
7FF5573BB000
|
unkown
|
page readonly
|
||
6C30000
|
heap
|
page read and write
|
||
2965000
|
heap
|
page read and write
|
||
1232000
|
trusted library allocation
|
page read and write
|
||
1589000
|
direct allocation
|
page execute and read and write
|
||
7FF55710F000
|
unkown
|
page readonly
|
||
1390000
|
unclassified section
|
page execute and read and write
|
||
AF6D000
|
stack
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
79B0000
|
unkown
|
page read and write
|
||
2AF4000
|
heap
|
page read and write
|
||
52EE000
|
trusted library allocation
|
page read and write
|
||
BC10000
|
unkown
|
page read and write
|
||
730A000
|
unkown
|
page read and write
|
||
2F9F000
|
heap
|
page read and write
|
||
4870000
|
unkown
|
page read and write
|
||
7FF55720D000
|
unkown
|
page readonly
|
||
2481000
|
trusted library allocation
|
page read and write
|
||
104D9000
|
unkown
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
CA0000
|
trusted library allocation
|
page read and write
|
||
BFB000
|
stack
|
page read and write
|
||
DDC000
|
stack
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
615E000
|
stack
|
page read and write
|
||
C2D3000
|
unkown
|
page read and write
|
||
2C21000
|
heap
|
page read and write
|
||
7040D000
|
unkown
|
page read and write
|
||
16A9000
|
direct allocation
|
page execute and read and write
|
||
1760000
|
heap
|
page read and write
|
||
7FF557103000
|
unkown
|
page readonly
|
||
7FF55703F000
|
unkown
|
page readonly
|
||
2ED0000
|
heap
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
2F29000
|
trusted library allocation
|
page read and write
|
||
8EEE000
|
unkown
|
page read and write
|
||
6C0C000
|
stack
|
page read and write
|
||
7FF5572A2000
|
unkown
|
page readonly
|
||
7FF5569F1000
|
unkown
|
page readonly
|
||
BC00000
|
unkown
|
page readonly
|
||
EB0000
|
heap
|
page read and write
|
||
3582000
|
direct allocation
|
page execute and read and write
|
||
326D000
|
stack
|
page read and write
|
||
2DE0000
|
direct allocation
|
page read and write
|
||
5404000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
36B1000
|
trusted library allocation
|
page read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
666E000
|
stack
|
page read and write
|
||
583E000
|
stack
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
81F000
|
stack
|
page read and write
|
||
69BF000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
C80000
|
trusted library allocation
|
page read and write
|
||
FBB000
|
unclassified section
|
page execute and read and write
|
||
4EDC000
|
stack
|
page read and write
|
||
8820000
|
unkown
|
page readonly
|
||
2FDF000
|
stack
|
page read and write
|
||
4B92000
|
direct allocation
|
page execute and read and write
|
||
1550000
|
heap
|
page read and write
|
||
5AAF000
|
stack
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
7908000
|
stack
|
page read and write
|
||
6A55000
|
trusted library allocation
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
1486000
|
direct allocation
|
page execute and read and write
|
||
E7F000
|
unclassified section
|
page execute and read and write
|
||
89CC000
|
unkown
|
page read and write
|
||
542D000
|
trusted library allocation
|
page read and write
|
||
7EE10000
|
trusted library allocation
|
page execute and read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
7FF557062000
|
unkown
|
page readonly
|
||
2AF4000
|
heap
|
page read and write
|
||
8D60000
|
unkown
|
page read and write
|
||
7E03000
|
stack
|
page read and write
|
||
29AE000
|
stack
|
page read and write
|
||
A85A000
|
unkown
|
page read and write
|
||
18D0000
|
unclassified section
|
page execute and read and write
|
||
6A81000
|
trusted library allocation
|
page read and write
|
||
2BCD000
|
stack
|
page read and write
|
||
7FF557257000
|
unkown
|
page readonly
|
||
53E7000
|
trusted library allocation
|
page read and write
|
||
2E51000
|
trusted library allocation
|
page read and write
|
||
2D31000
|
heap
|
page read and write
|
||
7A50000
|
unkown
|
page readonly
|
||
7FF557009000
|
unkown
|
page readonly
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
unkown
|
page readonly
|
||
AFC000
|
stack
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
24B0000
|
trusted library allocation
|
page read and write
|
||
6B9E000
|
trusted library allocation
|
page read and write
|
||
3769000
|
trusted library allocation
|
page read and write
|
||
8530000
|
unkown
|
page readonly
|
||
8DAD000
|
unkown
|
page read and write
|
||
7FF5572D4000
|
unkown
|
page readonly
|
||
4820000
|
unkown
|
page read and write
|
||
69C0000
|
trusted library allocation
|
page execute and read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
7040D000
|
unkown
|
page read and write
|
||
4730000
|
unkown
|
page read and write
|
||
7FF5571AC000
|
unkown
|
page readonly
|
||
BF3F000
|
stack
|
page read and write
|
||
2F6D000
|
trusted library allocation
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
7FF5573C1000
|
unkown
|
page readonly
|
||
6FC000
|
stack
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
2F52000
|
trusted library allocation
|
page read and write
|
||
69F0000
|
trusted library allocation
|
page read and write
|
||
7FF556E75000
|
unkown
|
page readonly
|
||
BBE0000
|
unkown
|
page readonly
|
||
C1DB000
|
unkown
|
page read and write
|
||
2F52000
|
heap
|
page read and write
|
||
3614000
|
heap
|
page read and write
|
||
13E3000
|
trusted library allocation
|
page read and write
|
||
47C0000
|
unkown
|
page read and write
|
||
140F000
|
stack
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
936E000
|
unkown
|
page read and write
|
||
C20000
|
unkown
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
97BE000
|
stack
|
page read and write
|
||
7FF55710F000
|
unkown
|
page readonly
|
||
2BDF000
|
unkown
|
page read and write
|
||
B628000
|
stack
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
4DAE000
|
stack
|
page read and write
|
||
4E10000
|
heap
|
page execute and read and write
|
||
24A0000
|
trusted library allocation
|
page read and write
|
||
4B50000
|
heap
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
4810000
|
unkown
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
91D9000
|
stack
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
7FF557617000
|
unkown
|
page readonly
|
||
1370000
|
unclassified section
|
page execute and read and write
|
||
7FF5571B3000
|
unkown
|
page readonly
|
||
A877000
|
unkown
|
page read and write
|
||
104CB000
|
unkown
|
page read and write
|
||
31B8000
|
heap
|
page read and write
|
||
B628000
|
stack
|
page read and write
|
||
7FF556E3D000
|
unkown
|
page readonly
|
||
E280000
|
unkown
|
page read and write
|
||
7FF556F31000
|
unkown
|
page readonly
|
||
172D000
|
direct allocation
|
page execute and read and write
|
||
2D94000
|
trusted library allocation
|
page read and write
|
||
1441000
|
heap
|
page read and write
|
||
1113F000
|
system
|
page read and write
|
||
9F0E000
|
stack
|
page read and write
|
||
24AD000
|
stack
|
page read and write
|
||
17F0000
|
unclassified section
|
page execute and read and write
|
||
F9B000
|
heap
|
page read and write
|
||
3450000
|
unkown
|
page read and write
|
||
5490000
|
heap
|
page read and write
|
||
13FA000
|
trusted library allocation
|
page execute and read and write
|
||
593E000
|
stack
|
page read and write
|
||
7DF468971000
|
unkown
|
page execute read
|
||
13AB000
|
unclassified section
|
page execute and read and write
|
||
7160000
|
unkown
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
A0A5000
|
unkown
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
E329000
|
stack
|
page read and write
|
||
9B5000
|
stack
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
BEBF000
|
stack
|
page read and write
|
||
7FF5575E3000
|
unkown
|
page readonly
|
||
2E20000
|
trusted library allocation
|
page read and write
|
||
BF3F000
|
stack
|
page read and write
|
||
7FF55751D000
|
unkown
|
page readonly
|
||
69A0000
|
trusted library allocation
|
page read and write
|
||
606F000
|
stack
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
C428000
|
unkown
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
A810000
|
unkown
|
page read and write
|
||
5161000
|
unkown
|
page read and write
|
||
3220000
|
unkown
|
page readonly
|
||
326E000
|
unclassified section
|
page execute and read and write
|
||
8EDD000
|
unkown
|
page read and write
|
||
2D54000
|
trusted library allocation
|
page read and write
|
||
CDE000
|
stack
|
page read and write
|
||
A0A8000
|
unkown
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
5720000
|
heap
|
page read and write
|
||
C3FB000
|
unkown
|
page read and write
|
||
7FF557042000
|
unkown
|
page readonly
|
||
7FF5573D5000
|
unkown
|
page readonly
|
||
98DA000
|
stack
|
page read and write
|
||
47EE000
|
unkown
|
page read and write
|
||
2DAB000
|
trusted library allocation
|
page execute and read and write
|
||
A873000
|
unkown
|
page read and write
|
||
C59E000
|
unkown
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
292E000
|
stack
|
page read and write
|
||
3746000
|
trusted library allocation
|
page read and write
|
||
3E76000
|
trusted library allocation
|
page read and write
|
||
B1E000
|
stack
|
page read and write
|
||
3404000
|
heap
|
page read and write
|
||
9853000
|
unkown
|
page read and write
|
||
D1D000
|
heap
|
page read and write
|
||
A286000
|
unkown
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
2E86000
|
stack
|
page read and write
|
||
50B0000
|
unkown
|
page write copy
|
||
2C0A000
|
heap
|
page read and write
|
||
4F8B000
|
stack
|
page read and write
|
||
7FF557264000
|
unkown
|
page readonly
|
||
C3F7000
|
unkown
|
page read and write
|
||
44F1000
|
heap
|
page read and write
|
||
665E000
|
stack
|
page read and write
|
||
904C000
|
unkown
|
page read and write
|
||
2F71000
|
trusted library allocation
|
page read and write
|
||
6A50000
|
trusted library allocation
|
page read and write
|
||
7FF55707D000
|
unkown
|
page readonly
|
||
54BD000
|
trusted library allocation
|
page read and write
|
||
CD9000
|
stack
|
page read and write
|
||
360B000
|
heap
|
page read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
CAB000
|
trusted library allocation
|
page read and write
|
||
3EBC000
|
trusted library allocation
|
page read and write
|
||
6B6C000
|
stack
|
page read and write
|
||
7176000
|
unkown
|
page read and write
|
||
2D1E000
|
unkown
|
page read and write
|
||
17B0000
|
heap
|
page execute and read and write
|
||
9580000
|
unkown
|
page readonly
|
||
7FF5571A1000
|
unkown
|
page readonly
|
||
1360000
|
heap
|
page read and write
|
||
2FAA000
|
heap
|
page read and write
|
||
3213000
|
stack
|
page read and write
|
||
C04F000
|
unkown
|
page read and write
|
||
661F000
|
stack
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
C214000
|
unkown
|
page read and write
|
||
66AF000
|
stack
|
page read and write
|
||
8F0000
|
trusted library allocation
|
page read and write
|
||
C091000
|
unkown
|
page read and write
|
||
2889000
|
heap
|
page read and write
|
||
4C90000
|
trusted library allocation
|
page execute and read and write
|
||
4781000
|
unkown
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
5487000
|
trusted library allocation
|
page read and write
|
||
A0FF000
|
unkown
|
page read and write
|
||
4734000
|
unkown
|
page read and write
|
||
2490000
|
trusted library allocation
|
page read and write
|
||
47C6000
|
unkown
|
page read and write
|
||
A8CA000
|
unkown
|
page read and write
|
||
702C000
|
stack
|
page read and write
|
||
2BCC000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page execute and read and write
|
||
34B0000
|
heap
|
page read and write
|
||
5690000
|
trusted library allocation
|
page execute and read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
A8CD000
|
unkown
|
page read and write
|
||
8D86000
|
unkown
|
page read and write
|
||
A8DD000
|
unkown
|
page read and write
|
||
2ED8000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
FB0000
|
unkown
|
page read and write
|
||
7FF556E7C000
|
unkown
|
page readonly
|
||
7FF557106000
|
unkown
|
page readonly
|
||
8D7A000
|
unkown
|
page read and write
|
||
2D7E000
|
unkown
|
page read and write
|
||
7FF5571A1000
|
unkown
|
page readonly
|
||
2E70000
|
heap
|
page read and write
|
||
8EB8000
|
unkown
|
page read and write
|
||
6D70000
|
heap
|
page read and write
|
||
72B0000
|
heap
|
page read and write
|
||
62FF000
|
stack
|
page read and write
|
||
65A7000
|
heap
|
page read and write
|
||
504C000
|
stack
|
page read and write
|
||
7FF557393000
|
unkown
|
page readonly
|
||
E10000
|
heap
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
7FF557235000
|
unkown
|
page readonly
|
||
2E29000
|
trusted library allocation
|
page read and write
|
||
41F000
|
remote allocation
|
page execute and read and write
|
||
55F0000
|
trusted library allocation
|
page read and write
|
||
2D36000
|
trusted library allocation
|
page read and write
|
||
9CDC000
|
stack
|
page read and write
|
||
2DA2000
|
trusted library allocation
|
page read and write
|
||
3B39000
|
heap
|
page read and write
|
||
7FF557352000
|
unkown
|
page readonly
|
||
8ED5000
|
unkown
|
page read and write
|
||
5990000
|
trusted library allocation
|
page execute and read and write
|
||
1253000
|
heap
|
page read and write
|
||
7FF5573C1000
|
unkown
|
page readonly
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
64DE000
|
stack
|
page read and write
|
||
2E0A000
|
stack
|
page read and write
|
||
14A5000
|
trusted library allocation
|
page execute and read and write
|
||
793000
|
trusted library allocation
|
page execute and read and write
|
||
73F0000
|
unkown
|
page read and write
|
||
7C30000
|
unkown
|
page readonly
|
||
6960000
|
trusted library allocation
|
page execute and read and write
|
||
2E00000
|
heap
|
page read and write
|
||
509E000
|
stack
|
page read and write
|
||
B080000
|
unkown
|
page read and write
|
||
50DD000
|
stack
|
page read and write
|
||
326A000
|
unclassified section
|
page execute and read and write
|
||
120A000
|
trusted library allocation
|
page execute and read and write
|
||
273F000
|
unkown
|
page read and write
|
||
A154000
|
unkown
|
page read and write
|
||
7FF55722A000
|
unkown
|
page readonly
|
||
14E0000
|
direct allocation
|
page execute and read and write
|
||
717A000
|
unkown
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
7FF557669000
|
unkown
|
page readonly
|
||
310B000
|
trusted library allocation
|
page read and write
|
||
30AD000
|
unclassified section
|
page execute and read and write
|
||
788B000
|
stack
|
page read and write
|
||
4074000
|
trusted library allocation
|
page read and write
|
||
842F000
|
stack
|
page read and write
|
||
6A20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF557571000
|
unkown
|
page readonly
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
10584000
|
unkown
|
page read and write
|
||
1580000
|
direct allocation
|
page execute and read and write
|
||
46FD000
|
heap
|
page read and write
|
||
5680000
|
heap
|
page read and write
|
||
31E3000
|
trusted library allocation
|
page read and write
|
||
25A0000
|
heap
|
page execute and read and write
|
||
354E000
|
stack
|
page read and write
|
||
5490000
|
trusted library allocation
|
page read and write
|
||
2F53000
|
heap
|
page read and write
|
||
716B000
|
unkown
|
page read and write
|
||
2DBC000
|
heap
|
page read and write
|
||
54F3000
|
heap
|
page read and write
|
||
5DFE000
|
stack
|
page read and write
|
||
6750000
|
heap
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
1008000
|
heap
|
page read and write
|
||
6C06000
|
heap
|
page read and write
|
||
B1B0000
|
system
|
page execute and read and write
|
||
CF0000
|
unkown
|
page readonly
|
||
ADAF000
|
stack
|
page read and write
|
||
2F90000
|
unkown
|
page readonly
|
||
2E0A000
|
stack
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
2D5B000
|
trusted library allocation
|
page read and write
|
||
1245000
|
heap
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
7DF4689B1000
|
unkown
|
page execute read
|
||
1212000
|
trusted library allocation
|
page read and write
|
||
7FF557501000
|
unkown
|
page readonly
|
||
621E000
|
stack
|
page read and write
|
||
E370000
|
unkown
|
page read and write
|
||
4016000
|
trusted library allocation
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
7FF5571DF000
|
unkown
|
page readonly
|
||
7DF468990000
|
unkown
|
page readonly
|
||
25D0000
|
heap
|
page read and write
|
||
6E9F000
|
heap
|
page read and write
|
||
99E9000
|
system
|
page execute and read and write
|
||
4036000
|
trusted library allocation
|
page read and write
|
||
9E0F000
|
stack
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
1440000
|
unkown
|
page readonly
|
||
C427000
|
unkown
|
page read and write
|
||
C374000
|
unkown
|
page read and write
|
||
B4A6000
|
stack
|
page read and write
|
||
299D000
|
stack
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
7FF557045000
|
unkown
|
page readonly
|
||
C233000
|
unkown
|
page read and write
|
||
25FD000
|
stack
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
C56F000
|
unkown
|
page read and write
|
||
3194000
|
trusted library allocation
|
page read and write
|
||
25F0000
|
direct allocation
|
page read and write
|
||
7FF5574A9000
|
unkown
|
page readonly
|
||
2C70000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
7FF556FC4000
|
unkown
|
page readonly
|
||
7300000
|
unkown
|
page read and write
|
||
7FF5575BD000
|
unkown
|
page readonly
|
||
7C30000
|
unkown
|
page readonly
|
||
C582000
|
unkown
|
page read and write
|
||
7FF556E7B000
|
unkown
|
page readonly
|
||
718B000
|
unkown
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2EF4000
|
heap
|
page read and write
|
||
16FF000
|
stack
|
page read and write
|
||
29F0000
|
heap
|
page read and write
|
||
EBDB000
|
stack
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
12AE000
|
stack
|
page read and write
|
||
9052000
|
unkown
|
page read and write
|
||
A110000
|
unkown
|
page read and write
|
||
6FCE000
|
stack
|
page read and write
|
||
B3F000
|
stack
|
page read and write
|
||
49EE000
|
direct allocation
|
page execute and read and write
|
||
C22B000
|
unkown
|
page read and write
|
||
280C000
|
heap
|
page read and write
|
||
7FF556F84000
|
unkown
|
page readonly
|
||
2D01000
|
heap
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
7FF5570FE000
|
unkown
|
page readonly
|
||
2F6F000
|
unkown
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
E60000
|
unclassified section
|
page execute and read and write
|
||
472E000
|
heap
|
page read and write
|
||
C12D000
|
unkown
|
page read and write
|
||
47DB000
|
unkown
|
page read and write
|
||
2DA8000
|
trusted library allocation
|
page read and write
|
||
15D1000
|
direct allocation
|
page execute and read and write
|
||
48A9000
|
heap
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page execute and read and write
|
||
29C0000
|
heap
|
page read and write
|
||
990000
|
system
|
page execute and read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
7F890000
|
trusted library allocation
|
page execute and read and write
|
||
C4BF000
|
unkown
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
4096000
|
trusted library allocation
|
page read and write
|
||
A215000
|
unkown
|
page read and write
|
||
1705000
|
trusted library allocation
|
page execute and read and write
|
||
77D0000
|
unkown
|
page read and write
|
||
A23B000
|
unkown
|
page read and write
|
||
1510000
|
trusted library allocation
|
page read and write
|
||
25BE000
|
unkown
|
page read and write
|
||
A22F000
|
unkown
|
page read and write
|
||
2C2C000
|
heap
|
page read and write
|
||
7FF5569E8000
|
unkown
|
page readonly
|
||
7FF55706A000
|
unkown
|
page readonly
|
||
E463000
|
system
|
page execute and read and write
|
||
31E1000
|
trusted library allocation
|
page read and write
|
||
2DAB000
|
trusted library allocation
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
C1DD000
|
unkown
|
page read and write
|
||
68F9000
|
heap
|
page read and write
|
||
4E48000
|
trusted library allocation
|
page read and write
|
||
8D76000
|
unkown
|
page read and write
|
||
8810000
|
unkown
|
page readonly
|
||
FD0000
|
heap
|
page read and write
|
||
1890000
|
unclassified section
|
page execute and read and write
|
||
7FF557602000
|
unkown
|
page readonly
|
||
1720000
|
trusted library allocation
|
page read and write
|
||
4730000
|
unkown
|
page read and write
|
||
16C0000
|
unclassified section
|
page execute and read and write
|
||
7FF55730C000
|
unkown
|
page readonly
|
||
7FF557467000
|
unkown
|
page readonly
|
||
2E3E000
|
stack
|
page read and write
|
||
7FF557589000
|
unkown
|
page readonly
|
||
138D000
|
direct allocation
|
page execute and read and write
|
||
29C4000
|
heap
|
page read and write
|
||
55B0000
|
trusted library allocation
|
page read and write
|
||
7322000
|
unkown
|
page read and write
|
||
61A0000
|
trusted library allocation
|
page execute and read and write
|
||
A0A5000
|
unkown
|
page read and write
|
||
54B1000
|
trusted library allocation
|
page read and write
|
||
E270000
|
unkown
|
page read and write
|
||
679E000
|
stack
|
page read and write
|
||
318C000
|
heap
|
page read and write
|
||
C1E9000
|
unkown
|
page read and write
|
||
5C7E000
|
stack
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
5FAE000
|
heap
|
page read and write
|
||
5540000
|
trusted library allocation
|
page read and write
|
||
122D000
|
trusted library allocation
|
page execute and read and write
|
||
46F0000
|
unkown
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page execute and read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
C424000
|
unkown
|
page read and write
|
||
350D000
|
direct allocation
|
page execute and read and write
|
||
7FF5570E7000
|
unkown
|
page readonly
|
||
3C62000
|
heap
|
page read and write
|
||
F522000
|
heap
|
page read and write
|
||
2AF4000
|
heap
|
page read and write
|
||
7178000
|
unkown
|
page read and write
|
||
7FF557653000
|
unkown
|
page readonly
|
||
32C9000
|
unkown
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
5F56000
|
heap
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
90D8000
|
unkown
|
page read and write
|
||
616E000
|
stack
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
2D21000
|
heap
|
page read and write
|
||
E10000
|
system
|
page execute and read and write
|
||
2B9D000
|
stack
|
page read and write
|
||
A154000
|
unkown
|
page read and write
|
||
72FE000
|
unkown
|
page read and write
|
||
C0F3000
|
unkown
|
page read and write
|
||
715E000
|
stack
|
page read and write
|
||
7FF5574BD000
|
unkown
|
page readonly
|
||
2D7D000
|
trusted library allocation
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
4BEE000
|
direct allocation
|
page execute and read and write
|
||
584E000
|
stack
|
page read and write
|
||
97A7000
|
system
|
page execute and read and write
|
||
7FF55745B000
|
unkown
|
page readonly
|
||
4D92000
|
direct allocation
|
page execute and read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
2E1F000
|
stack
|
page read and write
|
||
C063000
|
unkown
|
page read and write
|
||
C06D000
|
unkown
|
page read and write
|
||
7FF556FFF000
|
unkown
|
page readonly
|
||
7DF4689A1000
|
unkown
|
page execute read
|
||
2BE0000
|
heap
|
page read and write
|
||
8F09000
|
unkown
|
page read and write
|
||
7FF557554000
|
unkown
|
page readonly
|
||
E91D000
|
stack
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
10584000
|
unkown
|
page read and write
|
||
7FF5573D3000
|
unkown
|
page readonly
|
||
7FF556E4D000
|
unkown
|
page readonly
|
||
54B0000
|
heap
|
page read and write
|
||
73C5000
|
stack
|
page read and write
|
||
47CD000
|
heap
|
page read and write
|
||
7FF5573F3000
|
unkown
|
page readonly
|
||
25AD000
|
stack
|
page read and write
|
||
6C2C000
|
stack
|
page read and write
|
||
583E000
|
stack
|
page read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
4324000
|
trusted library allocation
|
page read and write
|
||
10E21000
|
system
|
page execute and read and write
|
||
AE2B000
|
stack
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
2FB9000
|
trusted library allocation
|
page read and write
|
||
3054000
|
heap
|
page read and write
|
||
88E1000
|
unkown
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
10484000
|
unkown
|
page read and write
|
||
7FF5570C5000
|
unkown
|
page readonly
|
||
870000
|
heap
|
page read and write
|
||
29C4000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
B52A000
|
stack
|
page read and write
|
||
67FF000
|
stack
|
page read and write
|
||
336C000
|
stack
|
page read and write
|
||
5560000
|
trusted library allocation
|
page execute and read and write
|
||
133B000
|
trusted library allocation
|
page execute and read and write
|
||
54F0000
|
heap
|
page read and write
|
||
661E000
|
stack
|
page read and write
|
||
7D0E000
|
stack
|
page read and write
|
||
7FF5573D3000
|
unkown
|
page readonly
|
||
2ACF000
|
stack
|
page read and write
|
||
7FF557387000
|
unkown
|
page readonly
|
||
2E1B000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
heap
|
page read and write
|
||
7FF557382000
|
unkown
|
page readonly
|
||
2F09000
|
stack
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
248D000
|
trusted library allocation
|
page read and write
|
||
7FF557037000
|
unkown
|
page readonly
|
||
53E0000
|
trusted library allocation
|
page read and write
|
||
68F0000
|
trusted library allocation
|
page read and write
|
||
C31000
|
unkown
|
page readonly
|
||
7FF55726C000
|
unkown
|
page readonly
|
||
8A2000
|
trusted library allocation
|
page read and write
|
||
7FF5575FC000
|
unkown
|
page readonly
|
||
88A0000
|
unkown
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
BBC0000
|
unkown
|
page read and write
|
||
9259000
|
stack
|
page read and write
|
||
7FF556A1B000
|
unkown
|
page readonly
|
||
7FF557434000
|
unkown
|
page readonly
|
||
32F3000
|
unkown
|
page read and write
|
||
7FF5574F9000
|
unkown
|
page readonly
|
||
A0FC000
|
unkown
|
page read and write
|
||
41D9000
|
trusted library allocation
|
page read and write
|
||
E9D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF5570CF000
|
unkown
|
page readonly
|
||
317F000
|
stack
|
page read and write
|
||
8F83000
|
unkown
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
166E000
|
stack
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
7FF55761F000
|
unkown
|
page readonly
|
||
52D4000
|
trusted library allocation
|
page read and write
|
||
5EFE000
|
stack
|
page read and write
|
||
2570000
|
heap
|
page read and write
|
||
2FA1000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
6F2E000
|
stack
|
page read and write
|
||
32DB000
|
unkown
|
page read and write
|
||
9740000
|
system
|
page execute and read and write
|
||
F90000
|
heap
|
page read and write
|
||
660C000
|
stack
|
page read and write
|
||
639E000
|
stack
|
page read and write
|
||
7FF5572B4000
|
unkown
|
page readonly
|
||
10C0000
|
direct allocation
|
page execute and read and write
|
||
58DE000
|
stack
|
page read and write
|
||
C3E7000
|
unkown
|
page read and write
|
||
5510000
|
heap
|
page read and write
|
||
A858000
|
unkown
|
page read and write
|
||
2CAC000
|
heap
|
page read and write
|
||
620000
|
system
|
page execute and read and write
|
||
4F28000
|
trusted library allocation
|
page read and write
|
||
5192000
|
direct allocation
|
page execute and read and write
|
||
902E000
|
unkown
|
page read and write
|
||
7FF5575AB000
|
unkown
|
page readonly
|
||
2DFF000
|
stack
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
2A8F000
|
stack
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
46A4000
|
heap
|
page read and write
|
||
247E000
|
trusted library allocation
|
page read and write
|
||
1386000
|
direct allocation
|
page execute and read and write
|
||
7FF55724C000
|
unkown
|
page readonly
|
||
7FF55741C000
|
unkown
|
page readonly
|
||
4196000
|
trusted library allocation
|
page read and write
|
||
7FF55742B000
|
unkown
|
page readonly
|
||
C6D000
|
heap
|
page read and write
|
||
46E0000
|
unkown
|
page read and write
|
||
2FBB000
|
trusted library allocation
|
page read and write
|
||
7FF557293000
|
unkown
|
page readonly
|
||
88D000
|
stack
|
page read and write
|
||
8D7A000
|
unkown
|
page read and write
|
||
2D8D000
|
trusted library allocation
|
page execute and read and write
|
||
2EAF000
|
unkown
|
page read and write
|
||
93FD000
|
stack
|
page read and write
|
||
7FF5575C5000
|
unkown
|
page readonly
|
There are 3161 hidden memdumps, click here to show them.