Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
O5OjRoFGIW.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\jDownloader\config\RuntimeBroker.exe
|
MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Program Files\Google\SystemSettings.exe
|
MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Recovery\WmiPrvSE.exe
|
MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Recovery\conhost.exe
|
MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zh7ztWDiYf.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserperfMonitorcommon\qaZuUyhTvy3Ow0sR3yWsCVR.vbe
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserperfMonitorcommon\servernet.exe
|
MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\AppData\Roaming\Floppy.scr
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\chrome.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\chrome_proxy.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\AlGpCalM.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\JOOemUAt.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\JxHMXyHr.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\LAuuthLm.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\NKQvtzqn.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\RsXUWNQa.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\WfpSyKfO.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\aWfJGGgI.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\cYRsbpkD.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\iZejiEQx.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\jEyZpjlp.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\nMwiLBfl.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\tnSpZLqX.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\wvPyvekT.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\en-GB\XxjbrMQQJwIwk.exe
|
MS-DOS executable PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Program Files (x86)\jDownloader\config\9e8d7a4ca61bd9
|
ASCII text, with very long lines (386), with no line terminators
|
dropped
|
||
C:\Program Files\Google\9e60a5f7a3bd80
|
ASCII text, with very long lines (369), with no line terminators
|
dropped
|
||
C:\Recovery\088424020bedd6
|
ASCII text, with very long lines (387), with no line terminators
|
dropped
|
||
C:\Recovery\24dbde2999530e
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XxjbrMQQJwIwk.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\servernet.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\VN2HXX5oOb
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\BrowserperfMonitorcommon\nbrdiKRtfK6.bat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\en-GB\9edda0bcc19ef6
|
ASCII text, with very long lines (996), with no line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 26 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\O5OjRoFGIW.exe
|
"C:\Users\user\Desktop\O5OjRoFGIW.exe"
|
||
C:\Users\user\AppData\Roaming\Floppy.scr
|
"C:\Users\user\AppData\Roaming\Floppy.scr" /S
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\BrowserperfMonitorcommon\qaZuUyhTvy3Ow0sR3yWsCVR.vbe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\AppData\Roaming\BrowserperfMonitorcommon\servernet.exe
|
"C:\Users\user\AppData\Roaming\BrowserperfMonitorcommon/servernet.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\Recovery\conhost.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\conhost.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Recovery\conhost.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'" /rl
HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\jdownloader\config\RuntimeBroker.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\Recovery\WmiPrvSE.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Recovery\WmiPrvSE.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Recovery\WmiPrvSE.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "SystemSettingsS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Google\SystemSettings.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "SystemSettings" /sc ONLOGON /tr "'C:\Program Files\Google\SystemSettings.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "SystemSettingsS" /sc MINUTE /mo 12 /tr "'C:\Program Files\Google\SystemSettings.exe'" /rl HIGHEST
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "XxjbrMQQJwIwkX" /sc MINUTE /mo 14 /tr "'C:\Windows\en-GB\XxjbrMQQJwIwk.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "XxjbrMQQJwIwk" /sc ONLOGON /tr "'C:\Windows\en-GB\XxjbrMQQJwIwk.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "XxjbrMQQJwIwkX" /sc MINUTE /mo 10 /tr "'C:\Windows\en-GB\XxjbrMQQJwIwk.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\zh7ztWDiYf.bat"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Windows\en-GB\XxjbrMQQJwIwk.exe
|
C:\Windows\en-GB\XxjbrMQQJwIwk.exe
|
||
C:\Windows\en-GB\XxjbrMQQJwIwk.exe
|
C:\Windows\en-GB\XxjbrMQQJwIwk.exe
|
||
C:\Program Files\Google\SystemSettings.exe
|
"C:\Program Files\Google\SystemSettings.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\BrowserperfMonitorcommon\nbrdiKRtfK6.bat" "
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
There are 18 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://crashpad.chromium.org/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://crashpad.chromium.org/https://crashpad.chromium.org/bug/new
|
unknown
|
||
https://crashpad.chromium.org/bug/new
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\049a3d20f72b6586daef88425fb7fea6daad9796
|
835808e2777d2a7ec24a272e8c6c1dfec96e4f1e
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.ApplicationCompany
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
12517000
|
trusted library allocation
|
page read and write
|
||
1AC00000
|
trusted library section
|
page read and write
|
||
9E4000
|
heap
|
page read and write
|
||
1BC1F000
|
stack
|
page read and write
|
||
7FF848FF3000
|
trusted library allocation
|
page read and write
|
||
7FF849670000
|
trusted library allocation
|
page execute and read and write
|
||
753E000
|
stack
|
page read and write
|
||
558D000
|
heap
|
page read and write
|
||
34DB000
|
heap
|
page read and write
|
||
2B7C000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
2A5D000
|
trusted library allocation
|
page read and write
|
||
12FF4000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
1B4CF000
|
stack
|
page read and write
|
||
12B59000
|
trusted library allocation
|
page read and write
|
||
7FF849550000
|
trusted library allocation
|
page read and write
|
||
30C0000
|
stack
|
page read and write
|
||
3236000
|
stack
|
page read and write
|
||
12FF2000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
313D000
|
trusted library allocation
|
page read and write
|
||
1B781000
|
heap
|
page read and write
|
||
23574AE8000
|
heap
|
page read and write
|
||
1BDC3000
|
heap
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
338E000
|
heap
|
page read and write
|
||
7FF849505000
|
trusted library allocation
|
page read and write
|
||
7FF8493DB000
|
trusted library allocation
|
page read and write
|
||
2B5C000
|
trusted library allocation
|
page read and write
|
||
12FD3000
|
trusted library allocation
|
page read and write
|
||
3247000
|
trusted library allocation
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
1B140000
|
trusted library allocation
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
7FF84906D000
|
trusted library allocation
|
page read and write
|
||
2A56000
|
heap
|
page read and write
|
||
7FF8493E0000
|
trusted library allocation
|
page read and write
|
||
130D0000
|
trusted library allocation
|
page read and write
|
||
8F3000
|
unkown
|
page readonly
|
||
8FE000
|
unkown
|
page read and write
|
||
130C3000
|
trusted library allocation
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
3389000
|
heap
|
page read and write
|
||
1B548000
|
unkown
|
page readonly
|
||
1340000
|
heap
|
page read and write
|
||
12FCA000
|
trusted library allocation
|
page read and write
|
||
5C8E000
|
stack
|
page read and write
|
||
8AE000
|
stack
|
page read and write
|
||
1B6E2000
|
heap
|
page read and write
|
||
2AC2000
|
heap
|
page read and write
|
||
5311000
|
trusted library allocation
|
page read and write
|
||
1BBDA000
|
heap
|
page read and write
|
||
39E4000
|
heap
|
page read and write
|
||
F88000
|
heap
|
page read and write
|
||
2AC2000
|
heap
|
page read and write
|
||
3223000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
1369F000
|
trusted library allocation
|
page read and write
|
||
1C23E000
|
stack
|
page read and write
|
||
13713000
|
trusted library allocation
|
page read and write
|
||
3389000
|
heap
|
page read and write
|
||
3A0B000
|
heap
|
page read and write
|
||
2A6F000
|
heap
|
page read and write
|
||
1B3BD000
|
stack
|
page read and write
|
||
338D000
|
heap
|
page read and write
|
||
1B6B0000
|
heap
|
page read and write
|
||
34E6000
|
heap
|
page read and write
|
||
7FF848FB6000
|
trusted library allocation
|
page read and write
|
||
2B18000
|
trusted library allocation
|
page read and write
|
||
7FF8493C0000
|
trusted library allocation
|
page read and write
|
||
7FF848FF5000
|
trusted library allocation
|
page read and write
|
||
5850000
|
heap
|
page read and write
|
||
24108EA0000
|
heap
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
24108EFB000
|
heap
|
page read and write
|
||
1349B000
|
trusted library allocation
|
page read and write
|
||
341B000
|
heap
|
page read and write
|
||
1B552000
|
unkown
|
page readonly
|
||
80000
|
unkown
|
page readonly
|
||
2A66000
|
heap
|
page read and write
|
||
2A58000
|
trusted library allocation
|
page read and write
|
||
12F77000
|
trusted library allocation
|
page read and write
|
||
2A63000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
7FF848F27000
|
trusted library allocation
|
page execute and read and write
|
||
29C0000
|
heap
|
page read and write
|
||
12B4C000
|
trusted library allocation
|
page read and write
|
||
1367B000
|
trusted library allocation
|
page read and write
|
||
7FF848F3C000
|
trusted library allocation
|
page execute and read and write
|
||
2331000
|
trusted library allocation
|
page read and write
|
||
2B2D000
|
trusted library allocation
|
page read and write
|
||
2A71000
|
heap
|
page read and write
|
||
3284000
|
trusted library allocation
|
page read and write
|
||
24108F25000
|
heap
|
page read and write
|
||
33B6000
|
heap
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
1B805000
|
heap
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
5476000
|
heap
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
12BD9000
|
trusted library allocation
|
page read and write
|
||
1B5DE000
|
unkown
|
page readonly
|
||
33CE000
|
heap
|
page read and write
|
||
1C59E000
|
stack
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
136B1000
|
trusted library allocation
|
page read and write
|
||
2CC5000
|
trusted library allocation
|
page read and write
|
||
174F000
|
stack
|
page read and write
|
||
132D8000
|
trusted library allocation
|
page read and write
|
||
1B0C3000
|
heap
|
page execute and read and write
|
||
1B713000
|
heap
|
page read and write
|
||
8C1000
|
unkown
|
page execute read
|
||
129FF000
|
trusted library allocation
|
page read and write
|
||
1AA000
|
stack
|
page read and write
|
||
1B836000
|
heap
|
page read and write
|
||
8AE000
|
stack
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page execute and read and write
|
||
24108F35000
|
heap
|
page read and write
|
||
1326D000
|
trusted library allocation
|
page read and write
|
||
549E000
|
stack
|
page read and write
|
||
7FF8496F0000
|
trusted library allocation
|
page read and write
|
||
2BF4000
|
trusted library allocation
|
page read and write
|
||
7FF849570000
|
trusted library allocation
|
page read and write
|
||
BB5000
|
unkown
|
page write copy
|
||
137DB000
|
trusted library allocation
|
page read and write
|
||
3292000
|
trusted library allocation
|
page read and write
|
||
2C91000
|
trusted library allocation
|
page read and write
|
||
2C9B000
|
trusted library allocation
|
page read and write
|
||
7FF849400000
|
trusted library allocation
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
12FA8000
|
trusted library allocation
|
page read and write
|
||
BBB000
|
unkown
|
page read and write
|
||
2C3B000
|
trusted library allocation
|
page read and write
|
||
34C8000
|
heap
|
page read and write
|
||
86000
|
unkown
|
page readonly
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
3250000
|
trusted library allocation
|
page read and write
|
||
12F9F000
|
trusted library allocation
|
page read and write
|
||
4BDF000
|
stack
|
page read and write
|
||
12FAF000
|
trusted library allocation
|
page read and write
|
||
33C7000
|
heap
|
page read and write
|
||
5460000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
5C4E000
|
stack
|
page read and write
|
||
2A5C000
|
heap
|
page read and write
|
||
33CA000
|
heap
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1B787000
|
heap
|
page read and write
|
||
13786000
|
trusted library allocation
|
page read and write
|
||
7FF848F1C000
|
trusted library allocation
|
page execute and read and write
|
||
1B508000
|
unkown
|
page readonly
|
||
3386000
|
heap
|
page read and write
|
||
7FF8495F0000
|
trusted library allocation
|
page read and write
|
||
7FF848FAC000
|
trusted library allocation
|
page read and write
|
||
24108F36000
|
heap
|
page read and write
|
||
7FF402760000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FD6000
|
trusted library allocation
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
1B4F0000
|
unkown
|
page readonly
|
||
1B769000
|
heap
|
page read and write
|
||
24108F35000
|
heap
|
page read and write
|
||
2B6F000
|
trusted library allocation
|
page read and write
|
||
2A5E000
|
heap
|
page read and write
|
||
2A73000
|
heap
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
1307F000
|
trusted library allocation
|
page read and write
|
||
1B652000
|
unkown
|
page readonly
|
||
8FE000
|
unkown
|
page write copy
|
||
F80000
|
heap
|
page read and write
|
||
137D000
|
heap
|
page read and write
|
||
1370E000
|
trusted library allocation
|
page read and write
|
||
1BE8F000
|
stack
|
page read and write
|
||
2A18000
|
heap
|
page read and write
|
||
2C95000
|
trusted library allocation
|
page read and write
|
||
2A87000
|
heap
|
page read and write
|
||
12A9D000
|
trusted library allocation
|
page read and write
|
||
DE7000
|
heap
|
page read and write
|
||
2FBF000
|
trusted library allocation
|
page read and write
|
||
7FF8493A0000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
2A41000
|
heap
|
page read and write
|
||
1B532000
|
unkown
|
page readonly
|
||
2A4F000
|
heap
|
page read and write
|
||
1C43E000
|
stack
|
page read and write
|
||
BEB000
|
unkown
|
page readonly
|
||
12BDB000
|
trusted library allocation
|
page read and write
|
||
7FF849580000
|
trusted library allocation
|
page read and write
|
||
8EE000
|
stack
|
page read and write
|
||
7FF848FFD000
|
trusted library allocation
|
page read and write
|
||
1305F000
|
trusted library allocation
|
page read and write
|
||
533B000
|
stack
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
30F5000
|
trusted library allocation
|
page read and write
|
||
3529000
|
heap
|
page read and write
|
||
7FF848F76000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
31EA000
|
trusted library allocation
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
2C77000
|
trusted library allocation
|
page read and write
|
||
311B000
|
trusted library allocation
|
page read and write
|
||
2B38000
|
trusted library allocation
|
page read and write
|
||
24108F35000
|
heap
|
page read and write
|
||
34D9000
|
heap
|
page read and write
|
||
2C5F000
|
trusted library allocation
|
page read and write
|
||
BAA000
|
unkown
|
page readonly
|
||
8F3000
|
unkown
|
page readonly
|
||
505E000
|
stack
|
page read and write
|
||
1B0C0000
|
heap
|
page execute and read and write
|
||
1C33E000
|
stack
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
340F000
|
heap
|
page read and write
|
||
2C75000
|
trusted library allocation
|
page read and write
|
||
7FF848FDA000
|
trusted library allocation
|
page read and write
|
||
2A78000
|
heap
|
page read and write
|
||
34E2000
|
heap
|
page read and write
|
||
1C24E000
|
stack
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
232C000
|
heap
|
page read and write
|
||
13695000
|
trusted library allocation
|
page read and write
|
||
1B4D0000
|
unkown
|
page readonly
|
||
5C0E000
|
stack
|
page read and write
|
||
2A49000
|
trusted library allocation
|
page read and write
|
||
7FF849520000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
2A85000
|
heap
|
page read and write
|
||
7FF848F56000
|
trusted library allocation
|
page execute and read and write
|
||
382E000
|
stack
|
page read and write
|
||
13692000
|
trusted library allocation
|
page read and write
|
||
5CCC000
|
stack
|
page read and write
|
||
1B0AC000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
D61000
|
heap
|
page read and write
|
||
160F000
|
stack
|
page read and write
|
||
30E7000
|
trusted library allocation
|
page read and write
|
||
1B7AD000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
2A64000
|
heap
|
page read and write
|
||
7FF84901A000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
7FF849480000
|
trusted library allocation
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
7FF848FF3000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
593C000
|
stack
|
page read and write
|
||
330C000
|
stack
|
page read and write
|
||
34DB000
|
heap
|
page read and write
|
||
1BADD000
|
stack
|
page read and write
|
||
12F2000
|
stack
|
page read and write
|
||
2B29000
|
trusted library allocation
|
page read and write
|
||
13221000
|
trusted library allocation
|
page read and write
|
||
2A54000
|
heap
|
page read and write
|
||
34E2000
|
heap
|
page read and write
|
||
136BE000
|
trusted library allocation
|
page read and write
|
||
1B829000
|
heap
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
3412000
|
heap
|
page read and write
|
||
7FF8493B0000
|
trusted library allocation
|
page read and write
|
||
5E1F000
|
stack
|
page read and write
|
||
52FF000
|
stack
|
page read and write
|
||
7FF848FB4000
|
trusted library allocation
|
page read and write
|
||
1B4D2000
|
unkown
|
page readonly
|
||
470000
|
heap
|
page read and write
|
||
17B0000
|
heap
|
page execute and read and write
|
||
BA0000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF8495A0000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
3508000
|
trusted library allocation
|
page read and write
|
||
7FF849086000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
34DC000
|
heap
|
page read and write
|
||
33CA000
|
heap
|
page read and write
|
||
7FF8495E0000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
3377000
|
heap
|
page read and write
|
||
1303D000
|
trusted library allocation
|
page read and write
|
||
2A5E000
|
heap
|
page read and write
|
||
2C6D000
|
trusted library allocation
|
page read and write
|
||
21B0000
|
heap
|
page read and write
|
||
2A6F000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page execute and read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
34D8000
|
heap
|
page read and write
|
||
2A5D000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
30E4000
|
trusted library allocation
|
page read and write
|
||
24108DC0000
|
heap
|
page read and write
|
||
3014000
|
trusted library allocation
|
page read and write
|
||
24108FF0000
|
heap
|
page read and write
|
||
D5C000
|
heap
|
page read and write
|
||
4DD000
|
heap
|
page read and write
|
||
4E3000
|
heap
|
page read and write
|
||
12F7E000
|
trusted library allocation
|
page read and write
|
||
7FF849065000
|
trusted library allocation
|
page read and write
|
||
136D0000
|
trusted library allocation
|
page read and write
|
||
2FA1000
|
trusted library allocation
|
page read and write
|
||
33B6000
|
heap
|
page read and write
|
||
7FF849420000
|
trusted library allocation
|
page read and write
|
||
3529000
|
heap
|
page read and write
|
||
12F74000
|
trusted library allocation
|
page read and write
|
||
7FF849500000
|
trusted library allocation
|
page read and write
|
||
7FF849502000
|
trusted library allocation
|
page read and write
|
||
7FF848E34000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
12F95000
|
trusted library allocation
|
page read and write
|
||
130D4000
|
trusted library allocation
|
page read and write
|
||
30E5000
|
stack
|
page read and write
|
||
2A0F000
|
trusted library allocation
|
page read and write
|
||
1B7DD000
|
heap
|
page read and write
|
||
3272000
|
trusted library allocation
|
page read and write
|
||
34CF000
|
heap
|
page read and write
|
||
3720000
|
heap
|
page read and write
|
||
C45000
|
heap
|
page read and write
|
||
2C55000
|
trusted library allocation
|
page read and write
|
||
1C48B000
|
stack
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
7FF849093000
|
trusted library allocation
|
page read and write
|
||
2DE6000
|
stack
|
page read and write
|
||
12FB1000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
7FF848F4A000
|
trusted library allocation
|
page execute and read and write
|
||
BAA000
|
unkown
|
page readonly
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
33CA000
|
heap
|
page read and write
|
||
3113000
|
trusted library allocation
|
page read and write
|
||
1BBB0000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1B2CF000
|
stack
|
page read and write
|
||
280E000
|
stack
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
21E0000
|
unkown
|
page readonly
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
124E000
|
stack
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
1B550000
|
unkown
|
page readonly
|
||
BD4000
|
heap
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
13795000
|
trusted library allocation
|
page read and write
|
||
1BB0D000
|
stack
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
1250F000
|
trusted library allocation
|
page read and write
|
||
7FF849057000
|
trusted library allocation
|
page read and write
|
||
5B0D000
|
stack
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
1C08E000
|
stack
|
page read and write
|
||
34CB000
|
heap
|
page read and write
|
||
130A0000
|
trusted library allocation
|
page read and write
|
||
3490000
|
heap
|
page readonly
|
||
34A7000
|
heap
|
page read and write
|
||
29F1000
|
trusted library allocation
|
page read and write
|
||
13018000
|
trusted library allocation
|
page read and write
|
||
2A5C000
|
heap
|
page read and write
|
||
130C5000
|
trusted library allocation
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
49C000
|
heap
|
page read and write
|
||
332D000
|
stack
|
page read and write
|
||
7FF849620000
|
trusted library allocation
|
page read and write
|
||
813EBFF000
|
stack
|
page read and write
|
||
12FAF000
|
trusted library allocation
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
1BF30000
|
heap
|
page execute and read and write
|
||
1B7D0000
|
heap
|
page read and write
|
||
7FF849041000
|
trusted library allocation
|
page read and write
|
||
3FB000
|
stack
|
page read and write
|
||
136C7000
|
trusted library allocation
|
page read and write
|
||
7FF849093000
|
trusted library allocation
|
page read and write
|
||
310A000
|
trusted library allocation
|
page read and write
|
||
2B72000
|
trusted library allocation
|
page read and write
|
||
30E9000
|
stack
|
page read and write
|
||
132FA000
|
trusted library allocation
|
page read and write
|
||
CF6000
|
heap
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
3389000
|
heap
|
page read and write
|
||
2C43000
|
trusted library allocation
|
page read and write
|
||
3220000
|
heap
|
page read and write
|
||
1AF7D000
|
stack
|
page read and write
|
||
328F000
|
trusted library allocation
|
page read and write
|
||
1326B000
|
trusted library allocation
|
page read and write
|
||
136F2000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
2B14000
|
trusted library allocation
|
page read and write
|
||
136AC000
|
trusted library allocation
|
page read and write
|
||
1C14D000
|
stack
|
page read and write
|
||
7FF849510000
|
trusted library allocation
|
page read and write
|
||
1AFD0000
|
heap
|
page read and write
|
||
1A360000
|
trusted library allocation
|
page read and write
|
||
372E000
|
stack
|
page read and write
|
||
7FF849625000
|
trusted library allocation
|
page read and write
|
||
770000
|
trusted library allocation
|
page read and write
|
||
5F1F000
|
stack
|
page read and write
|
||
7FF849013000
|
trusted library allocation
|
page read and write
|
||
7FF848FC8000
|
trusted library allocation
|
page read and write
|
||
2C37000
|
trusted library allocation
|
page read and write
|
||
FAF000
|
heap
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
3507000
|
heap
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
2B27000
|
trusted library allocation
|
page read and write
|
||
587E000
|
stack
|
page read and write
|
||
2C8B000
|
trusted library allocation
|
page read and write
|
||
2A6E000
|
heap
|
page read and write
|
||
1B3CF000
|
stack
|
page read and write
|
||
1B9AA000
|
stack
|
page read and write
|
||
7FF849430000
|
trusted library allocation
|
page read and write
|
||
325A000
|
trusted library allocation
|
page read and write
|
||
7FF848F42000
|
trusted library allocation
|
page execute and read and write
|
||
1B800000
|
heap
|
page read and write
|
||
129F8000
|
trusted library allocation
|
page read and write
|
||
2A5D000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
136C000
|
heap
|
page read and write
|
||
1BA1E000
|
stack
|
page read and write
|
||
773F000
|
stack
|
page read and write
|
||
7FF849610000
|
trusted library allocation
|
page read and write
|
||
2B49000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page execute and read and write
|
||
34F8000
|
heap
|
page read and write
|
||
23574AEA000
|
heap
|
page read and write
|
||
2A6F000
|
heap
|
page read and write
|
||
300C000
|
heap
|
page read and write
|
||
12BE4000
|
trusted library allocation
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
7FF848FDD000
|
trusted library allocation
|
page read and write
|
||
33CC000
|
heap
|
page read and write
|
||
3249000
|
trusted library allocation
|
page read and write
|
||
2B2F000
|
trusted library allocation
|
page read and write
|
||
2A7A000
|
heap
|
page read and write
|
||
2B6D000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
33B6000
|
heap
|
page read and write
|
||
10B5000
|
heap
|
page read and write
|
||
6C40000
|
trusted library allocation
|
page read and write
|
||
2CA9000
|
trusted library allocation
|
page read and write
|
||
1BC90000
|
heap
|
page read and write
|
||
1B4F2000
|
unkown
|
page readonly
|
||
3029000
|
trusted library allocation
|
page read and write
|
||
1B07A000
|
heap
|
page read and write
|
||
7FF849025000
|
trusted library allocation
|
page read and write
|
||
2C7F000
|
trusted library allocation
|
page read and write
|
||
2FB5000
|
trusted library allocation
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
1312A000
|
trusted library allocation
|
page read and write
|
||
12DA3000
|
trusted library allocation
|
page read and write
|
||
12B0D000
|
trusted library allocation
|
page read and write
|
||
B81000
|
unkown
|
page execute read
|
||
1AA20000
|
trusted library allocation
|
page read and write
|
||
30C9000
|
stack
|
page read and write
|
||
7FF848F47000
|
trusted library allocation
|
page execute and read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
1BB1F000
|
stack
|
page read and write
|
||
3358000
|
heap
|
page read and write
|
||
2C61000
|
trusted library allocation
|
page read and write
|
||
7FF849600000
|
trusted library allocation
|
page read and write
|
||
2A14000
|
trusted library allocation
|
page read and write
|
||
2B4D000
|
trusted library allocation
|
page read and write
|
||
1B4E2000
|
unkown
|
page readonly
|
||
2C45000
|
trusted library allocation
|
page read and write
|
||
136AE000
|
trusted library allocation
|
page read and write
|
||
1C13E000
|
stack
|
page read and write
|
||
3226000
|
heap
|
page read and write
|
||
1B730000
|
heap
|
page read and write
|
||
1BF40000
|
heap
|
page read and write
|
||
7FF849590000
|
trusted library allocation
|
page read and write
|
||
922000
|
unkown
|
page read and write
|
||
2A52000
|
heap
|
page read and write
|
||
1B530000
|
unkown
|
page readonly
|
||
12B05000
|
trusted library allocation
|
page read and write
|
||
5830000
|
heap
|
page read and write
|
||
BEA000
|
unkown
|
page read and write
|
||
13E5000
|
heap
|
page read and write
|
||
2A88000
|
heap
|
page read and write
|
||
169F000
|
stack
|
page read and write
|
||
1B7B6000
|
heap
|
page read and write
|
||
923000
|
unkown
|
page readonly
|
||
1AFB0000
|
heap
|
page read and write
|
||
7FF849660000
|
trusted library allocation
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page execute and read and write
|
||
410000
|
heap
|
page read and write
|
||
24108F23000
|
heap
|
page read and write
|
||
3258000
|
trusted library allocation
|
page read and write
|
||
33CC000
|
heap
|
page read and write
|
||
84000
|
unkown
|
page readonly
|
||
34CB000
|
heap
|
page read and write
|
||
34D1000
|
heap
|
page read and write
|
||
B12000
|
stack
|
page read and write
|
||
7FF84905E000
|
trusted library allocation
|
page read and write
|
||
137B000
|
heap
|
page read and write
|
||
17C0000
|
heap
|
page read and write
|
||
2644000
|
trusted library allocation
|
page read and write
|
||
B81000
|
unkown
|
page execute read
|
||
12B5B000
|
trusted library allocation
|
page read and write
|
||
24108F23000
|
heap
|
page read and write
|
||
4B1000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
337D000
|
heap
|
page read and write
|
||
3412000
|
heap
|
page read and write
|
||
21F0000
|
heap
|
page execute and read and write
|
||
2F90000
|
heap
|
page execute and read and write
|
||
12F5A000
|
trusted library allocation
|
page read and write
|
||
8C1000
|
unkown
|
page execute read
|
||
2A05000
|
trusted library allocation
|
page read and write
|
||
31DF000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
12FAA000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
23574AD0000
|
heap
|
page read and write
|
||
33F1000
|
heap
|
page read and write
|
||
333D000
|
stack
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
2A5B000
|
trusted library allocation
|
page read and write
|
||
1B5D2000
|
unkown
|
page readonly
|
||
1B510000
|
unkown
|
page readonly
|
||
13771000
|
trusted library allocation
|
page read and write
|
||
13A7000
|
heap
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
132F0000
|
trusted library allocation
|
page read and write
|
||
1BAF0000
|
heap
|
page read and write
|
||
7FF848E34000
|
trusted library allocation
|
page read and write
|
||
30CF000
|
trusted library allocation
|
page read and write
|
||
7FF849073000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
1645000
|
heap
|
page read and write
|
||
12FA2000
|
trusted library allocation
|
page read and write
|
||
324F000
|
trusted library allocation
|
page read and write
|
||
4DB000
|
heap
|
page read and write
|
||
136CB000
|
trusted library allocation
|
page read and write
|
||
12BCE000
|
trusted library allocation
|
page read and write
|
||
137E6000
|
trusted library allocation
|
page read and write
|
||
3115000
|
trusted library allocation
|
page read and write
|
||
3009000
|
heap
|
page read and write
|
||
7FF84907B000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E28000
|
trusted library allocation
|
page read and write
|
||
1B6F0000
|
heap
|
page read and write
|
||
2300000
|
heap
|
page execute and read and write
|
||
24108F34000
|
heap
|
page read and write
|
||
1B5D0000
|
unkown
|
page readonly
|
||
3412000
|
heap
|
page read and write
|
||
2B62000
|
trusted library allocation
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
341B000
|
heap
|
page read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
326B000
|
trusted library allocation
|
page read and write
|
||
7FF848FFA000
|
trusted library allocation
|
page read and write
|
||
1B420000
|
heap
|
page execute and read and write
|
||
7FF848F22000
|
trusted library allocation
|
page execute and read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
12F8D000
|
trusted library allocation
|
page read and write
|
||
7FF849014000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
2DDC000
|
heap
|
page read and write
|
||
924000
|
unkown
|
page readonly
|
||
324D000
|
trusted library allocation
|
page read and write
|
||
3505000
|
heap
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
7FF848E08000
|
trusted library allocation
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
3412000
|
heap
|
page read and write
|
||
34AC000
|
trusted library allocation
|
page read and write
|
||
12C4B000
|
trusted library allocation
|
page read and write
|
||
2C81000
|
trusted library allocation
|
page read and write
|
||
2C9F000
|
trusted library allocation
|
page read and write
|
||
7FF849164000
|
trusted library allocation
|
page read and write
|
||
35DE000
|
stack
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
34EE000
|
heap
|
page read and write
|
||
13111000
|
trusted library allocation
|
page read and write
|
||
5583000
|
heap
|
page read and write
|
||
1B745000
|
heap
|
page read and write
|
||
7FF849440000
|
trusted library allocation
|
page read and write
|
||
1B812000
|
heap
|
page read and write
|
||
341B000
|
heap
|
page read and write
|
||
13A5000
|
heap
|
page read and write
|
||
33CC000
|
heap
|
page read and write
|
||
12B4E000
|
trusted library allocation
|
page read and write
|
||
13332000
|
trusted library allocation
|
page read and write
|
||
1BB90000
|
heap
|
page read and write
|
||
7FF849025000
|
trusted library allocation
|
page read and write
|
||
34DB000
|
heap
|
page read and write
|
||
24109114000
|
heap
|
page read and write
|
||
2A67000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
3313000
|
stack
|
page read and write
|
||
13154000
|
trusted library allocation
|
page read and write
|
||
33CA000
|
heap
|
page read and write
|
||
1B5F2000
|
unkown
|
page readonly
|
||
3160000
|
heap
|
page readonly
|
||
2A78000
|
heap
|
page read and write
|
||
7FF84942D000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
33C9000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
2A6D000
|
heap
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
2A52000
|
heap
|
page read and write
|
||
2C08000
|
trusted library allocation
|
page read and write
|
||
7FF849630000
|
trusted library allocation
|
page read and write
|
||
341B000
|
heap
|
page read and write
|
||
13716000
|
trusted library allocation
|
page read and write
|
||
12331000
|
trusted library allocation
|
page read and write
|
||
56B1000
|
trusted library allocation
|
page read and write
|
||
1BDB0000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
13052000
|
trusted library allocation
|
page read and write
|
||
1B0B2000
|
unkown
|
page readonly
|
||
1B70A000
|
heap
|
page read and write
|
||
7FF84905B000
|
trusted library allocation
|
page read and write
|
||
7FF8495B0000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
923000
|
unkown
|
page write copy
|
||
783D000
|
stack
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
601C000
|
stack
|
page read and write
|
||
2B4F000
|
trusted library allocation
|
page read and write
|
||
3260000
|
trusted library allocation
|
page read and write
|
||
12AD1000
|
trusted library allocation
|
page read and write
|
||
1B41D000
|
stack
|
page read and write
|
||
1AFAD000
|
stack
|
page read and write
|
||
132CB000
|
trusted library allocation
|
page read and write
|
||
1BDFC000
|
heap
|
page read and write
|
||
30F1000
|
trusted library allocation
|
page read and write
|
||
1B724000
|
heap
|
page read and write
|
||
1369A000
|
trusted library allocation
|
page read and write
|
||
136C0000
|
trusted library allocation
|
page read and write
|
||
2FAF000
|
trusted library allocation
|
page read and write
|
||
3102000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page execute and read and write
|
||
58FE000
|
stack
|
page read and write
|
||
6FB000
|
stack
|
page read and write
|
||
7FF84909B000
|
trusted library allocation
|
page read and write
|
||
2CB1000
|
trusted library allocation
|
page read and write
|
||
1B5C2000
|
unkown
|
page readonly
|
||
763E000
|
stack
|
page read and write
|
||
7FF849650000
|
trusted library allocation
|
page read and write
|
||
312A000
|
trusted library allocation
|
page read and write
|
||
350F000
|
heap
|
page read and write
|
||
D1D000
|
heap
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
7FF849021000
|
trusted library allocation
|
page read and write
|
||
430000
|
heap
|
page read and write
|
||
2D91000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF848FC3000
|
trusted library allocation
|
page read and write
|
||
56AF000
|
heap
|
page read and write
|
||
1B0B0000
|
unkown
|
page readonly
|
||
1B7B8000
|
heap
|
page read and write
|
||
1B69D000
|
stack
|
page read and write
|
||
129F1000
|
trusted library allocation
|
page read and write
|
||
12F90000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
D22000
|
heap
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
2A31000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
1C18E000
|
stack
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
36DD000
|
stack
|
page read and write
|
||
4B3000
|
heap
|
page read and write
|
||
3321000
|
stack
|
page read and write
|
||
2AD6000
|
heap
|
page read and write
|
||
324B000
|
trusted library allocation
|
page read and write
|
||
1B0D0000
|
heap
|
page read and write
|
||
30F2000
|
stack
|
page read and write
|
||
350F000
|
heap
|
page read and write
|
||
1B5B2000
|
unkown
|
page readonly
|
||
2B4B000
|
trusted library allocation
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
2709000
|
heap
|
page read and write
|
||
56CA000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
heap
|
page read and write
|
||
1AFD0000
|
trusted library allocation
|
page read and write
|
||
3373000
|
heap
|
page read and write
|
||
24108F24000
|
heap
|
page read and write
|
||
12FA1000
|
trusted library allocation
|
page read and write
|
||
2A94000
|
trusted library allocation
|
page read and write
|
||
1A8BB000
|
stack
|
page read and write
|
||
1344000
|
heap
|
page read and write
|
||
33CC000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
131F2000
|
trusted library allocation
|
page read and write
|
||
9E9000
|
heap
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
D07674B000
|
stack
|
page read and write
|
||
2AE3000
|
trusted library allocation
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
47D000
|
heap
|
page read and write
|
||
1B542000
|
unkown
|
page readonly
|
||
3728000
|
heap
|
page read and write
|
||
2A62000
|
heap
|
page read and write
|
||
2FB1000
|
trusted library allocation
|
page read and write
|
||
136C3000
|
trusted library allocation
|
page read and write
|
||
12F2A000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
39E0000
|
heap
|
page read and write
|
||
7FF848FD8000
|
trusted library allocation
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
7FF849079000
|
trusted library allocation
|
page read and write
|
||
1327A000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
1B6F9000
|
heap
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF848FBA000
|
trusted library allocation
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
FAA000
|
heap
|
page read and write
|
||
5588000
|
heap
|
page read and write
|
||
24108EC0000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
D076BFE000
|
stack
|
page read and write
|
||
333A000
|
stack
|
page read and write
|
||
2C2F000
|
trusted library allocation
|
page read and write
|
||
24108F24000
|
heap
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
3412000
|
heap
|
page read and write
|
||
24108F24000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
34DB000
|
heap
|
page read and write
|
||
2B3C000
|
trusted library allocation
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
3119000
|
trusted library allocation
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
46A0000
|
heap
|
page read and write
|
||
5470000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
7FF8495C0000
|
trusted library allocation
|
page read and write
|
||
34D2000
|
heap
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
6C49000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
2B5E000
|
trusted library allocation
|
page read and write
|
||
31F6000
|
trusted library allocation
|
page read and write
|
||
300F000
|
trusted library allocation
|
page read and write
|
||
7FF849470000
|
trusted library allocation
|
page read and write
|
||
23574AE0000
|
heap
|
page read and write
|
||
7FF848F2A000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
3012000
|
trusted library allocation
|
page read and write
|
||
1B726000
|
heap
|
page read and write
|
||
1BB92000
|
heap
|
page read and write
|
||
12B43000
|
trusted library allocation
|
page read and write
|
||
58BE000
|
stack
|
page read and write
|
||
2DD9000
|
heap
|
page read and write
|
||
1B71F000
|
heap
|
page read and write
|
||
2CA7000
|
trusted library allocation
|
page read and write
|
||
866000
|
heap
|
page read and write
|
||
132FC000
|
trusted library allocation
|
page read and write
|
||
13749000
|
trusted library allocation
|
page read and write
|
||
7FF849085000
|
trusted library allocation
|
page read and write
|
||
23574930000
|
heap
|
page read and write
|
||
7FF8495D0000
|
trusted library allocation
|
page read and write
|
||
4CDF000
|
stack
|
page read and write
|
||
23574A10000
|
heap
|
page read and write
|
||
1A6BB000
|
heap
|
page read and write
|
||
1B6CB000
|
heap
|
page read and write
|
||
2AC2000
|
heap
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page execute and read and write
|
||
136C9000
|
trusted library allocation
|
page read and write
|
||
341B000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
7FF84907E000
|
trusted library allocation
|
page read and write
|
||
1B524000
|
unkown
|
page readonly
|
||
12C22000
|
trusted library allocation
|
page read and write
|
||
2C69000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
trusted library allocation
|
page read and write
|
||
372B000
|
heap
|
page read and write
|
||
1301A000
|
trusted library allocation
|
page read and write
|
||
5860000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
2CB9000
|
trusted library allocation
|
page read and write
|
||
3A00000
|
heap
|
page read and write
|
||
13342000
|
trusted library allocation
|
page read and write
|
||
34EF000
|
heap
|
page read and write
|
||
1367000
|
heap
|
page read and write
|
||
1B79A000
|
heap
|
page read and write
|
||
3A07000
|
heap
|
page read and write
|
||
30FA000
|
stack
|
page read and write
|
||
1B512000
|
unkown
|
page readonly
|
||
130CE000
|
trusted library allocation
|
page read and write
|
||
2D3A000
|
heap
|
page read and write
|
||
1BAAA000
|
stack
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
D5A000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
2A61000
|
heap
|
page read and write
|
||
2AD5000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
13068000
|
trusted library allocation
|
page read and write
|
||
BEB000
|
unkown
|
page write copy
|
||
13258000
|
trusted library allocation
|
page read and write
|
||
D076AFF000
|
unkown
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
309A000
|
trusted library allocation
|
page read and write
|
||
7FF8494F8000
|
trusted library allocation
|
page read and write
|
||
1B6DC000
|
heap
|
page read and write
|
||
24108F35000
|
heap
|
page read and write
|
||
13118000
|
trusted library allocation
|
page read and write
|
||
135B8000
|
trusted library allocation
|
page read and write
|
||
D32000
|
heap
|
page read and write
|
||
341B000
|
heap
|
page read and write
|
||
3104000
|
trusted library allocation
|
page read and write
|
||
1B460000
|
heap
|
page read and write
|
||
1B775000
|
heap
|
page read and write
|
||
327C000
|
trusted library allocation
|
page read and write
|
||
137E4000
|
trusted library allocation
|
page read and write
|
||
12FA8000
|
trusted library allocation
|
page read and write
|
||
3269000
|
trusted library allocation
|
page read and write
|
||
3300000
|
stack
|
page read and write
|
||
22FF000
|
stack
|
page read and write
|
||
341B000
|
heap
|
page read and write
|
||
326D000
|
trusted library allocation
|
page read and write
|
||
30F9000
|
trusted library allocation
|
page read and write
|
||
7FF849059000
|
trusted library allocation
|
page read and write
|
||
3282000
|
trusted library allocation
|
page read and write
|
||
328D000
|
trusted library allocation
|
page read and write
|
||
7FF849059000
|
trusted library allocation
|
page read and write
|
||
7FF849062000
|
trusted library allocation
|
page read and write
|
||
3122000
|
trusted library allocation
|
page read and write
|
||
325E000
|
trusted library allocation
|
page read and write
|
||
1BF8E000
|
stack
|
page read and write
|
||
24109110000
|
heap
|
page read and write
|
||
1B650000
|
unkown
|
page readonly
|
||
1640000
|
heap
|
page read and write
|
||
59C0000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
7FF849045000
|
trusted library allocation
|
page read and write
|
||
1365A000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
3389000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
2B3A000
|
trusted library allocation
|
page read and write
|
||
12AD3000
|
trusted library allocation
|
page read and write
|
||
7480000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
3126000
|
trusted library allocation
|
page read and write
|
||
BEC000
|
unkown
|
page readonly
|
||
1B5F0000
|
unkown
|
page readonly
|
||
7FF84909E000
|
trusted library allocation
|
page read and write
|
||
24108F34000
|
heap
|
page read and write
|
||
461E000
|
stack
|
page read and write
|
||
23574AD4000
|
heap
|
page read and write
|
||
13236000
|
trusted library allocation
|
page read and write
|
||
1B08D000
|
heap
|
page read and write
|
||
13276000
|
trusted library allocation
|
page read and write
|
||
7FF8493D8000
|
trusted library allocation
|
page read and write
|
||
7FF848E08000
|
trusted library allocation
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
905000
|
unkown
|
page read and write
|
||
30D8000
|
stack
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
30CB000
|
trusted library allocation
|
page read and write
|
||
1B0AE000
|
heap
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
7FF848E28000
|
trusted library allocation
|
page read and write
|
||
30F7000
|
trusted library allocation
|
page read and write
|
||
2C4B000
|
trusted library allocation
|
page read and write
|
||
BB5000
|
unkown
|
page read and write
|
||
12BB5000
|
trusted library allocation
|
page read and write
|
||
1B095000
|
heap
|
page read and write
|
||
7FF849034000
|
trusted library allocation
|
page read and write
|
||
2700000
|
heap
|
page read and write
|
||
7FF84907E000
|
trusted library allocation
|
page read and write
|
||
1311F000
|
trusted library allocation
|
page read and write
|
||
1B7F6000
|
heap
|
page read and write
|
||
3417000
|
heap
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
7FF849530000
|
trusted library allocation
|
page read and write
|
||
7FF848FF9000
|
trusted library allocation
|
page read and write
|
||
1B5B0000
|
unkown
|
page readonly
|
||
82000
|
unkown
|
page readonly
|
||
EEF000
|
stack
|
page read and write
|
||
12B17000
|
trusted library allocation
|
page read and write
|
||
B80000
|
unkown
|
page readonly
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
12FA5000
|
trusted library allocation
|
page read and write
|
||
137A2000
|
trusted library allocation
|
page read and write
|
||
131FB000
|
trusted library allocation
|
page read and write
|
||
12F87000
|
trusted library allocation
|
page read and write
|
||
2C1F000
|
trusted library allocation
|
page read and write
|
||
7FF8493F0000
|
trusted library allocation
|
page read and write
|
||
7FF849045000
|
trusted library allocation
|
page read and write
|
||
1BB80000
|
heap
|
page execute and read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
24108EF0000
|
heap
|
page read and write
|
||
2C2D000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849015000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
137EF000
|
trusted library allocation
|
page read and write
|
||
2A4E000
|
heap
|
page read and write
|
||
2A59000
|
heap
|
page read and write
|
||
7FF849460000
|
trusted library allocation
|
page read and write
|
||
337A000
|
heap
|
page read and write
|
||
136C8000
|
trusted library allocation
|
page read and write
|
||
3117000
|
trusted library allocation
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
2C4F000
|
trusted library allocation
|
page read and write
|
||
131DC000
|
trusted library allocation
|
page read and write
|
||
1377A000
|
trusted library allocation
|
page read and write
|
||
B80000
|
unkown
|
page readonly
|
||
2B2B000
|
trusted library allocation
|
page read and write
|
||
7FF849073000
|
trusted library allocation
|
page read and write
|
||
813EAFC000
|
stack
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
1B5C0000
|
unkown
|
page readonly
|
||
7FF849640000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF8490A6000
|
trusted library allocation
|
page read and write
|
||
12F5D000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
34DC000
|
heap
|
page read and write
|
||
34CF000
|
heap
|
page read and write
|
||
7A4000
|
heap
|
page read and write
|
||
12338000
|
trusted library allocation
|
page read and write
|
||
7FF84949D000
|
trusted library allocation
|
page read and write
|
||
1336B000
|
trusted library allocation
|
page read and write
|
||
3412000
|
heap
|
page read and write
|
||
2C59000
|
trusted library allocation
|
page read and write
|
||
3485000
|
heap
|
page read and write
|
||
2AC2000
|
heap
|
page read and write
|
||
2B64000
|
trusted library allocation
|
page read and write
|
||
24108F1F000
|
heap
|
page read and write
|
||
24108F35000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
1B06C000
|
heap
|
page read and write
|
||
7FF84906C000
|
trusted library allocation
|
page read and write
|
||
7FF849450000
|
trusted library allocation
|
page read and write
|
||
1B820000
|
heap
|
page read and write
|
||
2A52000
|
heap
|
page read and write
|
||
328B000
|
trusted library allocation
|
page read and write
|
||
3418000
|
heap
|
page read and write
|
||
137F2000
|
trusted library allocation
|
page read and write
|
||
350C000
|
heap
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
34E3000
|
heap
|
page read and write
|
||
2CB3000
|
trusted library allocation
|
page read and write
|
||
337C000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
2FCB000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
23574A30000
|
heap
|
page read and write
|
||
FBF000
|
heap
|
page read and write
|
||
1BDF0000
|
heap
|
page read and write
|
||
21E2000
|
unkown
|
page readonly
|
||
7FF8493D0000
|
trusted library allocation
|
page read and write
|
||
13187000
|
trusted library allocation
|
page read and write
|
||
3221000
|
trusted library allocation
|
page read and write
|
||
3124000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
1360B000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
1B740000
|
heap
|
page read and write
|
||
7FF849410000
|
trusted library allocation
|
page execute and read and write
|
||
2A30000
|
heap
|
page read and write
|
||
3280000
|
trusted library allocation
|
page read and write
|
||
3314000
|
heap
|
page read and write
|
||
12FBD000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page execute and read and write
|
||
9C0000
|
heap
|
page read and write
|
||
2A66000
|
heap
|
page read and write
|
||
34DB000
|
heap
|
page read and write
|
||
2A10000
|
heap
|
page read and write
|
||
2B41000
|
trusted library allocation
|
page read and write
|
||
543C000
|
stack
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
CFC000
|
heap
|
page read and write
|
||
FBD000
|
heap
|
page read and write
|
||
2A53000
|
heap
|
page read and write
|
||
2A74000
|
heap
|
page read and write
|
||
31D9000
|
trusted library allocation
|
page read and write
|
||
7FF84907B000
|
trusted library allocation
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
2A72000
|
trusted library allocation
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
2C87000
|
trusted library allocation
|
page read and write
|
||
1B736000
|
heap
|
page read and write
|
||
1B082000
|
heap
|
page read and write
|
||
24108F34000
|
heap
|
page read and write
|
||
36E0000
|
heap
|
page read and write
|
||
1B4E0000
|
unkown
|
page readonly
|
||
2A9E000
|
heap
|
page read and write
|
||
12514000
|
trusted library allocation
|
page read and write
|
||
7FF848FE3000
|
trusted library allocation
|
page read and write
|
||
3111000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
1B540000
|
unkown
|
page readonly
|
||
136D0000
|
trusted library allocation
|
page read and write
|
||
17C5000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
2DEA000
|
trusted library allocation
|
page read and write
|
||
1BDD7000
|
heap
|
page read and write
|
||
7FF848FB8000
|
trusted library allocation
|
page read and write
|
||
13015000
|
trusted library allocation
|
page read and write
|
||
7FF849540000
|
trusted library allocation
|
page read and write
|
||
33CC000
|
heap
|
page read and write
|
||
EF3000
|
stack
|
page read and write
|
||
813EB7E000
|
stack
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
3503000
|
heap
|
page read and write
|
||
1233D000
|
trusted library allocation
|
page read and write
|
||
12F7B000
|
trusted library allocation
|
page read and write
|
||
270C000
|
heap
|
page read and write
|
||
7FF848FA9000
|
trusted library allocation
|
page read and write
|
||
7FF84908D000
|
trusted library allocation
|
page read and write
|
||
1B717000
|
heap
|
page read and write
|
||
1B720000
|
heap
|
page read and write
|
||
12FD9000
|
trusted library allocation
|
page read and write
|
||
1B756000
|
heap
|
page read and write
|
||
1369D000
|
trusted library allocation
|
page read and write
|
||
12EEB000
|
trusted library allocation
|
page read and write
|
There are 1046 hidden memdumps, click here to show them.