Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
vRp56pf5a9.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\cvchost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\responsibilitylead.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\cvchost.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\responsiibilitylead.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3vl5rssp.bxl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5df3vzno.4no.ps1
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\vRp56pf5a9.exe
|
"C:\Users\user\Desktop\vRp56pf5a9.exe"
|
||
C:\Users\user\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe
|
C:\Users\user\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\user\AppData\Local\Temp\IXP000.TMP\responsibilitylead.exe'
-Force
|
||
C:\Users\user\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe
|
C:\Users\user\AppData\Local\Temp\IXP000.TMP\responsiibilitylead.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
|
||
C:\Users\user\AppData\Local\cvchost.exe
|
"C:\Users\user\AppData\Local\cvchost.exe"
|
||
C:\Users\user\AppData\Local\cvchost.exe
|
"C:\Users\user\AppData\Local\cvchost.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
|
||
C:\Windows\System32\rundll32.exe
|
"C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user\AppData\Local\Temp\IXP000.TMP\"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://api.ipify.org/
|
172.67.74.152
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://api.ipify.org2
|
unknown
|
||
http://159.253.120.145/beer/Zdthsqoc.wav
|
159.253.120.145
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
https://api.ipify.orgJ
|
unknown
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://159.253.120.145/beer/Vxttheubu.mp41EGP4CCIIOMuIUm3
|
unknown
|
||
http://159.253.120.145
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://159.253.120.145/beer/Vxttheubu.mp4
|
159.253.120.145
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://159.253.120.145/beer/Zdthsqoc.wav1ac8RgXhHQGMLHirw3jKOBg==
|
unknown
|
There are 16 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
api.ipify.org
|
172.67.74.152
|
||
fp2e7a.wpc.phicdn.net
|
192.229.211.108
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
212.224.86.54
|
unknown
|
Germany
|
||
159.253.120.145
|
unknown
|
Russian Federation
|
||
109.107.181.83
|
unknown
|
Russian Federation
|
||
172.67.74.152
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
|
wextract_cleanup0
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
cvchost
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\responsibilitylead_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\responsiibilitylead_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\cvchost_RASMANCS
|
FileDirectory
|
There are 35 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
remote allocation
|
page execute and read and write
|
||
4146000
|
trusted library allocation
|
page read and write
|
||
3E7B000
|
trusted library allocation
|
page read and write
|
||
2D89F560000
|
trusted library section
|
page read and write
|
||
5080000
|
trusted library section
|
page read and write
|
||
2C91000
|
trusted library allocation
|
page read and write
|
||
32AF000
|
trusted library allocation
|
page read and write
|
||
2D89F270000
|
trusted library section
|
page read and write
|
||
29EB000
|
trusted library allocation
|
page read and write
|
||
2BBF000
|
trusted library allocation
|
page read and write
|
||
25D1000
|
trusted library allocation
|
page read and write
|
||
5250000
|
trusted library section
|
page read and write
|
||
295F000
|
trusted library allocation
|
page read and write
|
||
2D896BE1000
|
trusted library allocation
|
page read and write
|
||
5F80000
|
trusted library section
|
page read and write
|
||
3448000
|
trusted library allocation
|
page read and write
|
||
2D897329000
|
trusted library allocation
|
page read and write
|
||
2D886831000
|
trusted library allocation
|
page read and write
|
||
47AB000
|
trusted library allocation
|
page read and write
|
||
71F0000
|
trusted library section
|
page read and write
|
||
3E06000
|
trusted library allocation
|
page read and write
|
||
3C2A000
|
trusted library allocation
|
page read and write
|
||
FE3000
|
trusted library allocation
|
page execute and read and write
|
||
54EE000
|
stack
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
2920000
|
heap
|
page execute and read and write
|
||
1D4E3F36000
|
heap
|
page read and write
|
||
1D430B78000
|
heap
|
page read and write
|
||
57D0000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
C20000
|
trusted library allocation
|
page read and write
|
||
123F000
|
stack
|
page read and write
|
||
3518000
|
trusted library allocation
|
page read and write
|
||
7FF849048000
|
trusted library allocation
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
5950000
|
trusted library allocation
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
1D638630000
|
heap
|
page read and write
|
||
2D884CC0000
|
heap
|
page read and write
|
||
7FF849310000
|
trusted library allocation
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
2C49000
|
trusted library allocation
|
page read and write
|
||
6CF8000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page execute and read and write
|
||
6FFF000
|
heap
|
page read and write
|
||
7FF848E34000
|
trusted library allocation
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
350C000
|
trusted library allocation
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
57FB000
|
trusted library allocation
|
page read and write
|
||
74E5000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page execute and read and write
|
||
5EB000
|
stack
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
2C47000
|
trusted library allocation
|
page read and write
|
||
2E86000
|
trusted library allocation
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page read and write
|
||
C14000
|
trusted library allocation
|
page read and write
|
||
722C000
|
trusted library allocation
|
page read and write
|
||
168B000
|
heap
|
page read and write
|
||
6D5C000
|
heap
|
page read and write
|
||
147814E000
|
stack
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page execute and read and write
|
||
935000
|
heap
|
page read and write
|
||
E44000
|
trusted library allocation
|
page read and write
|
||
52B1000
|
trusted library allocation
|
page read and write
|
||
76F0000
|
trusted library allocation
|
page read and write
|
||
60D0000
|
trusted library allocation
|
page read and write
|
||
2C2C000
|
trusted library allocation
|
page read and write
|
||
C7E000
|
heap
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
3B91000
|
trusted library allocation
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
5E7E000
|
stack
|
page read and write
|
||
19413150000
|
heap
|
page read and write
|
||
770000
|
trusted library allocation
|
page read and write
|
||
2874000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
1D638750000
|
heap
|
page read and write
|
||
12BC000
|
stack
|
page read and write
|
||
2C20000
|
trusted library allocation
|
page read and write
|
||
6F7A000
|
heap
|
page read and write
|
||
AC6000
|
trusted library allocation
|
page execute and read and write
|
||
1D42857B000
|
trusted library allocation
|
page read and write
|
||
761EBFF000
|
stack
|
page read and write
|
||
19413198000
|
heap
|
page read and write
|
||
1566000
|
trusted library allocation
|
page execute and read and write
|
||
5340000
|
trusted library allocation
|
page execute and read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
F0B000
|
trusted library allocation
|
page read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
7FF70F151000
|
unkown
|
page execute read
|
||
56A0000
|
heap
|
page read and write
|
||
3070000
|
trusted library allocation
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
AC2000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
1D4309E7000
|
heap
|
page execute and read and write
|
||
172F000
|
heap
|
page read and write
|
||
6E11000
|
trusted library allocation
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page execute and read and write
|
||
3120000
|
trusted library allocation
|
page read and write
|
||
19413190000
|
heap
|
page read and write
|
||
6E04000
|
trusted library allocation
|
page read and write
|
||
2582000
|
trusted library allocation
|
page read and write
|
||
CB21BDE000
|
stack
|
page read and write
|
||
F2390FD000
|
stack
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
3D7B000
|
trusted library allocation
|
page read and write
|
||
2D886B40000
|
trusted library allocation
|
page read and write
|
||
4251000
|
trusted library allocation
|
page read and write
|
||
3565000
|
trusted library allocation
|
page read and write
|
||
4701000
|
trusted library allocation
|
page read and write
|
||
6DE0000
|
trusted library allocation
|
page read and write
|
||
50A9000
|
trusted library allocation
|
page read and write
|
||
777F000
|
trusted library allocation
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page execute and read and write
|
||
AA3000
|
trusted library allocation
|
page execute and read and write
|
||
382A000
|
trusted library allocation
|
page read and write
|
||
56BA000
|
heap
|
page read and write
|
||
1D638638000
|
heap
|
page read and write
|
||
628E000
|
stack
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
2D884D2C000
|
heap
|
page read and write
|
||
7FF849317000
|
trusted library allocation
|
page read and write
|
||
1D419ECC000
|
trusted library allocation
|
page read and write
|
||
2C1D000
|
trusted library allocation
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
7FF8492D0000
|
trusted library allocation
|
page read and write
|
||
5220000
|
trusted library allocation
|
page execute and read and write
|
||
3A79000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
2D89F160000
|
heap
|
page execute and read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
1477477000
|
stack
|
page read and write
|
||
1544000
|
trusted library allocation
|
page read and write
|
||
7622000
|
heap
|
page read and write
|
||
1400D1000
|
remote allocation
|
page execute and read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
heap
|
page execute and read and write
|
||
550E000
|
stack
|
page read and write
|
||
3527000
|
trusted library allocation
|
page read and write
|
||
3544000
|
trusted library allocation
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
60C0000
|
trusted library allocation
|
page execute and read and write
|
||
3090000
|
trusted library allocation
|
page read and write
|
||
2CC9000
|
trusted library allocation
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
2CDE000
|
trusted library allocation
|
page read and write
|
||
2E45000
|
trusted library allocation
|
page read and write
|
||
147757E000
|
stack
|
page read and write
|
||
785000
|
heap
|
page read and write
|
||
6BD1000
|
trusted library allocation
|
page read and write
|
||
2C0A000
|
trusted library allocation
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
1D418333000
|
trusted library allocation
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
350A000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
4AB9000
|
trusted library allocation
|
page read and write
|
||
2C3D000
|
trusted library allocation
|
page read and write
|
||
4066000
|
trusted library allocation
|
page read and write
|
||
2D886B2E000
|
trusted library allocation
|
page read and write
|
||
3563000
|
trusted library allocation
|
page read and write
|
||
56C0000
|
heap
|
page read and write
|
||
2D884D97000
|
heap
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF70F15E000
|
unkown
|
page readonly
|
||
2EAB000
|
trusted library allocation
|
page read and write
|
||
2C28000
|
trusted library allocation
|
page read and write
|
||
D8B000
|
trusted library allocation
|
page read and write
|
||
C42000
|
trusted library allocation
|
page read and write
|
||
72F000
|
heap
|
page read and write
|
||
1D4E5CAE000
|
heap
|
page read and write
|
||
70C0000
|
trusted library allocation
|
page read and write
|
||
5F7F000
|
stack
|
page read and write
|
||
357A000
|
trusted library allocation
|
page read and write
|
||
357C000
|
trusted library allocation
|
page read and write
|
||
7FDF0000
|
trusted library allocation
|
page execute and read and write
|
||
2C37000
|
trusted library allocation
|
page read and write
|
||
96A000
|
heap
|
page read and write
|
||
2E84000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
6FD8000
|
heap
|
page read and write
|
||
79D4000
|
trusted library allocation
|
page read and write
|
||
B7C000
|
stack
|
page read and write
|
||
3E86000
|
trusted library allocation
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page execute and read and write
|
||
2870000
|
heap
|
page read and write
|
||
1D430A80000
|
heap
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page read and write
|
||
250E000
|
stack
|
page read and write
|
||
1D4E4030000
|
heap
|
page read and write
|
||
5180000
|
trusted library allocation
|
page read and write
|
||
E8F000
|
stack
|
page read and write
|
||
2970000
|
trusted library allocation
|
page read and write
|
||
70E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
3C31000
|
trusted library allocation
|
page read and write
|
||
2C26000
|
trusted library allocation
|
page read and write
|
||
6B60000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
4E2E000
|
stack
|
page read and write
|
||
5BFE000
|
stack
|
page read and write
|
||
1D638550000
|
heap
|
page read and write
|
||
194131AE000
|
heap
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
6DF0000
|
trusted library allocation
|
page read and write
|
||
16A7000
|
heap
|
page read and write
|
||
3DF4000
|
trusted library allocation
|
page read and write
|
||
761F2FE000
|
stack
|
page read and write
|
||
1D4E6591000
|
heap
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
154D000
|
trusted library allocation
|
page execute and read and write
|
||
1D4E3F3C000
|
heap
|
page read and write
|
||
7FF84919E000
|
trusted library allocation
|
page read and write
|
||
E80000
|
unkown
|
page readonly
|
||
5CFE000
|
stack
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
1D4183B1000
|
heap
|
page read and write
|
||
35D1000
|
trusted library allocation
|
page read and write
|
||
1D430894000
|
heap
|
page read and write
|
||
3B94000
|
trusted library allocation
|
page read and write
|
||
7FF70F150000
|
unkown
|
page readonly
|
||
2D884D64000
|
heap
|
page read and write
|
||
1D4E40E5000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1012000
|
trusted library allocation
|
page read and write
|
||
2B80000
|
heap
|
page execute and read and write
|
||
2C1B000
|
trusted library allocation
|
page read and write
|
||
2D886B7D000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page execute and read and write
|
||
1D416B55000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1D4E3E68000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
29D1000
|
trusted library allocation
|
page read and write
|
||
14774F9000
|
stack
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page execute and read and write
|
||
19415094000
|
heap
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
1577000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
6BA1000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
14771FE000
|
stack
|
page read and write
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
6CE0000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page execute and read and write
|
||
2B36000
|
trusted library allocation
|
page read and write
|
||
2CC5000
|
trusted library allocation
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
7FF70F15C000
|
unkown
|
page write copy
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
29EC000
|
stack
|
page read and write
|
||
355D000
|
trusted library allocation
|
page read and write
|
||
537D000
|
stack
|
page read and write
|
||
F2391FF000
|
stack
|
page read and write
|
||
512F000
|
stack
|
page read and write
|
||
574F000
|
stack
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
2BE9000
|
trusted library allocation
|
page read and write
|
||
1D4E3F14000
|
heap
|
page read and write
|
||
5463000
|
trusted library allocation
|
page read and write
|
||
2E43000
|
trusted library allocation
|
page read and write
|
||
25C0000
|
heap
|
page execute and read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page read and write
|
||
1D430E50000
|
heap
|
page read and write
|
||
C33000
|
heap
|
page read and write
|
||
D73000
|
trusted library allocation
|
page execute and read and write
|
||
3886000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
6CE5000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
53BF000
|
stack
|
page read and write
|
||
AA4000
|
trusted library allocation
|
page read and write
|
||
1D4168FE000
|
heap
|
page read and write
|
||
2C3F000
|
trusted library allocation
|
page read and write
|
||
1D4E5CD0000
|
heap
|
page read and write
|
||
6DFB000
|
trusted library allocation
|
page read and write
|
||
6E6F000
|
trusted library allocation
|
page read and write
|
||
54CF000
|
stack
|
page read and write
|
||
2BE1000
|
trusted library allocation
|
page read and write
|
||
7228000
|
trusted library allocation
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
2C06000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
286E000
|
stack
|
page read and write
|
||
1D430B60000
|
heap
|
page read and write
|
||
7700000
|
trusted library allocation
|
page read and write
|
||
42A1000
|
trusted library allocation
|
page read and write
|
||
1D41A126000
|
trusted library allocation
|
page read and write
|
||
7FF84900B000
|
trusted library allocation
|
page read and write
|
||
4B6D000
|
stack
|
page read and write
|
||
4753000
|
trusted library allocation
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
6120000
|
heap
|
page read and write
|
||
4751000
|
trusted library allocation
|
page read and write
|
||
306B000
|
trusted library allocation
|
page read and write
|
||
6F69000
|
heap
|
page read and write
|
||
4C4C000
|
trusted library allocation
|
page read and write
|
||
618E000
|
stack
|
page read and write
|
||
7FF8492C0000
|
trusted library allocation
|
page read and write
|
||
761E7FF000
|
stack
|
page read and write
|
||
6E00000
|
trusted library allocation
|
page read and write
|
||
7FF849002000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
27B0000
|
trusted library allocation
|
page read and write
|
||
4F6E000
|
stack
|
page read and write
|
||
1D41A12A000
|
trusted library allocation
|
page read and write
|
||
1111000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
47D9000
|
trusted library allocation
|
page read and write
|
||
194133A5000
|
heap
|
page read and write
|
||
70B0000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1D4E6878000
|
heap
|
page read and write
|
||
352D000
|
trusted library allocation
|
page read and write
|
||
583E000
|
stack
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page execute and read and write
|
||
1D4286B1000
|
trusted library allocation
|
page read and write
|
||
2D886B92000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
761ECFE000
|
stack
|
page read and write
|
||
5461000
|
trusted library allocation
|
page read and write
|
||
2D884C30000
|
unkown
|
page readonly
|
||
C76000
|
heap
|
page read and write
|
||
2B91000
|
trusted library allocation
|
page read and write
|
||
536F000
|
trusted library allocation
|
page read and write
|
||
1D4E6580000
|
heap
|
page read and write
|
||
2CC7000
|
trusted library allocation
|
page read and write
|
||
53CD000
|
stack
|
page read and write
|
||
2E73000
|
trusted library allocation
|
page read and write
|
||
658000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
28B2000
|
trusted library allocation
|
page read and write
|
||
7FF84931C000
|
trusted library allocation
|
page read and write
|
||
1D416895000
|
heap
|
page read and write
|
||
6D4E000
|
heap
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
71EE000
|
stack
|
page read and write
|
||
2860000
|
trusted library allocation
|
page execute and read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
297F000
|
stack
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page execute and read and write
|
||
27C3000
|
trusted library allocation
|
page execute and read and write
|
||
3747000
|
trusted library allocation
|
page read and write
|
||
3F9B000
|
trusted library allocation
|
page read and write
|
||
294B000
|
trusted library allocation
|
page read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
1D416AF0000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
516D000
|
stack
|
page read and write
|
||
2E3F000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
2810000
|
trusted library allocation
|
page read and write
|
||
1D4E659C000
|
heap
|
page read and write
|
||
6E40000
|
trusted library allocation
|
page read and write
|
||
1D4E3EF9000
|
heap
|
page read and write
|
||
2C22000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
4281000
|
trusted library allocation
|
page read and write
|
||
194131BF000
|
heap
|
page read and write
|
||
C4D000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
3512000
|
trusted library allocation
|
page read and write
|
||
586E000
|
heap
|
page read and write
|
||
C32000
|
trusted library allocation
|
page read and write
|
||
1D4E3F51000
|
heap
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page execute and read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
1D419853000
|
trusted library allocation
|
page read and write
|
||
4EED000
|
stack
|
page read and write
|
||
B88000
|
heap
|
page read and write
|
||
6140000
|
trusted library allocation
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
3542000
|
trusted library allocation
|
page read and write
|
||
561E000
|
stack
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
1D638940000
|
heap
|
page read and write
|
||
2AED000
|
stack
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page execute and read and write
|
||
194131BF000
|
heap
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
1D4184C0000
|
heap
|
page execute and read and write
|
||
1D4E5C7B000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
95E000
|
heap
|
page read and write
|
||
F1B000
|
stack
|
page read and write
|
||
74B0000
|
trusted library allocation
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
49B3000
|
trusted library allocation
|
page read and write
|
||
100A000
|
trusted library allocation
|
page execute and read and write
|
||
1180000
|
heap
|
page read and write
|
||
578F000
|
trusted library allocation
|
page read and write
|
||
761F1FF000
|
stack
|
page read and write
|
||
6FA2000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page execute and read and write
|
||
3E90000
|
trusted library allocation
|
page read and write
|
||
7F980000
|
trusted library allocation
|
page execute and read and write
|
||
BA0000
|
trusted library allocation
|
page execute and read and write
|
||
2E31000
|
trusted library allocation
|
page read and write
|
||
3FF1000
|
trusted library allocation
|
page read and write
|
||
7090000
|
trusted library allocation
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
2D885040000
|
heap
|
page read and write
|
||
5160000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
6CFC000
|
heap
|
page read and write
|
||
583D000
|
stack
|
page read and write
|
||
6E10000
|
trusted library allocation
|
page read and write
|
||
50E0000
|
trusted library allocation
|
page execute and read and write
|
||
689E000
|
stack
|
page read and write
|
||
FED000
|
trusted library allocation
|
page execute and read and write
|
||
F70000
|
heap
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
1D430BCF000
|
heap
|
page read and write
|
||
27EA000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
58C3000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3D1B000
|
trusted library allocation
|
page read and write
|
||
2D884D20000
|
heap
|
page read and write
|
||
2C45000
|
trusted library allocation
|
page read and write
|
||
7FF848FD1000
|
trusted library allocation
|
page read and write
|
||
FF9000
|
trusted library allocation
|
page read and write
|
||
514D000
|
stack
|
page read and write
|
||
C2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF70F15E000
|
unkown
|
page readonly
|
||
C13000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
FF000000
|
trusted library allocation
|
page execute and read and write
|
||
2BEB000
|
trusted library allocation
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
1D4E7965000
|
heap
|
page read and write
|
||
4F8000
|
stack
|
page read and write
|
||
7050000
|
trusted library allocation
|
page read and write
|
||
74C4000
|
trusted library allocation
|
page read and write
|
||
50F9000
|
trusted library allocation
|
page read and write
|
||
7060000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
1D418330000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
5A5B000
|
trusted library allocation
|
page read and write
|
||
1D416925000
|
heap
|
page read and write
|
||
19413170000
|
heap
|
page read and write
|
||
5ABD000
|
stack
|
page read and write
|
||
70D0000
|
trusted library allocation
|
page read and write
|
||
7658000
|
heap
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
1D4168B2000
|
heap
|
page read and write
|
||
27C0000
|
trusted library allocation
|
page read and write
|
||
5361000
|
trusted library allocation
|
page read and write
|
||
1002000
|
trusted library allocation
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
C69000
|
heap
|
page read and write
|
||
7FF848FDA000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
5868000
|
heap
|
page read and write
|
||
2D884F10000
|
heap
|
page read and write
|
||
2931000
|
trusted library allocation
|
page read and write
|
||
F2392FE000
|
stack
|
page read and write
|
||
27E6000
|
trusted library allocation
|
page execute and read and write
|
||
7870000
|
trusted library allocation
|
page read and write
|
||
49D8000
|
trusted library allocation
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF70F150000
|
unkown
|
page readonly
|
||
5A55000
|
trusted library allocation
|
page read and write
|
||
F23853D000
|
stack
|
page read and write
|
||
2E8F000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
1D430930000
|
heap
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
27F2000
|
trusted library allocation
|
page read and write
|
||
1D41A061000
|
trusted library allocation
|
page read and write
|
||
2C4C000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
2E5E000
|
trusted library allocation
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
8320000
|
trusted library allocation
|
page read and write
|
||
8F7000
|
stack
|
page read and write
|
||
1D4E3E60000
|
heap
|
page read and write
|
||
F2393FE000
|
stack
|
page read and write
|
||
1125000
|
heap
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
2B50000
|
heap
|
page execute and read and write
|
||
7750000
|
trusted library allocation
|
page read and write
|
||
1D4E5C95000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
1D418589000
|
trusted library allocation
|
page read and write
|
||
14CE000
|
stack
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
2EA3000
|
trusted library allocation
|
page read and write
|
||
D8D000
|
trusted library allocation
|
page execute and read and write
|
||
3514000
|
trusted library allocation
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
15A7000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
2EA7000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page execute and read and write
|
||
3CD1000
|
trusted library allocation
|
page read and write
|
||
2D89F1E2000
|
heap
|
page read and write
|
||
539E000
|
stack
|
page read and write
|
||
D96000
|
trusted library allocation
|
page execute and read and write
|
||
53E0000
|
heap
|
page read and write
|
||
761E5F5000
|
stack
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
F238FFE000
|
stack
|
page read and write
|
||
762A000
|
heap
|
page read and write
|
||
1107000
|
heap
|
page read and write
|
||
27F0000
|
trusted library allocation
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
2D8967FE000
|
trusted library allocation
|
page read and write
|
||
5330000
|
trusted library allocation
|
page execute and read and write
|
||
7FF70F15C000
|
unkown
|
page read and write
|
||
5770000
|
trusted library allocation
|
page execute and read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
F238CFC000
|
stack
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page execute and read and write
|
||
2EA1000
|
trusted library allocation
|
page read and write
|
||
3D3B000
|
trusted library allocation
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
1D4E5CAA000
|
heap
|
page read and write
|
||
2D886B48000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
2D89F100000
|
trusted library section
|
page read and write
|
||
5850000
|
heap
|
page read and write
|
||
C7A000
|
heap
|
page read and write
|
||
28AC000
|
stack
|
page read and write
|
||
15EE000
|
stack
|
page read and write
|
||
7686000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
5A7E000
|
stack
|
page read and write
|
||
C5F000
|
heap
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
76E0000
|
trusted library allocation
|
page execute and read and write
|
||
3EE6000
|
trusted library allocation
|
page read and write
|
||
2C24000
|
trusted library allocation
|
page read and write
|
||
10AA000
|
heap
|
page read and write
|
||
6110000
|
trusted library allocation
|
page execute and read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
69FE000
|
stack
|
page read and write
|
||
7760000
|
trusted library allocation
|
page read and write
|
||
68A0000
|
trusted library allocation
|
page read and write
|
||
688000
|
heap
|
page read and write
|
||
2C15000
|
trusted library allocation
|
page read and write
|
||
3549000
|
trusted library allocation
|
page read and write
|
||
101B000
|
trusted library allocation
|
page execute and read and write
|
||
2E49000
|
trusted library allocation
|
page read and write
|
||
D74000
|
trusted library allocation
|
page read and write
|
||
FE4000
|
trusted library allocation
|
page read and write
|
||
2C02000
|
trusted library allocation
|
page read and write
|
||
2D884D8B000
|
heap
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
570F000
|
heap
|
page read and write
|
||
3159000
|
trusted library allocation
|
page read and write
|
||
5800000
|
trusted library allocation
|
page execute and read and write
|
||
1D4E3F53000
|
heap
|
page read and write
|
||
6E17000
|
trusted library allocation
|
page read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
257E000
|
stack
|
page read and write
|
||
6D3A000
|
heap
|
page read and write
|
||
4759000
|
trusted library allocation
|
page read and write
|
||
2D89F170000
|
heap
|
page read and write
|
||
5E3F000
|
stack
|
page read and write
|
||
2D89F1F1000
|
heap
|
page read and write
|
||
30B0000
|
trusted library allocation
|
page execute and read and write
|
||
2C2A000
|
heap
|
page read and write
|
||
2D884D05000
|
heap
|
page read and write
|
||
ADB000
|
trusted library allocation
|
page execute and read and write
|
||
E82000
|
unkown
|
page readonly
|
||
2C2A000
|
trusted library allocation
|
page read and write
|
||
44A1000
|
trusted library allocation
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
1006000
|
trusted library allocation
|
page execute and read and write
|
||
5AAE000
|
stack
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
5230000
|
heap
|
page execute and read and write
|
||
187F000
|
stack
|
page read and write
|
||
948000
|
heap
|
page read and write
|
||
59EF000
|
trusted library allocation
|
page read and write
|
||
7FF8492B0000
|
trusted library allocation
|
page read and write
|
||
2510000
|
trusted library allocation
|
page read and write
|
||
2D897733000
|
trusted library allocation
|
page read and write
|
||
5240000
|
trusted library section
|
page read and write
|
||
3CC7000
|
trusted library allocation
|
page read and write
|
||
2E8A000
|
trusted library allocation
|
page read and write
|
||
2980000
|
trusted library allocation
|
page read and write
|
||
562E000
|
stack
|
page read and write
|
||
57F3000
|
trusted library allocation
|
page read and write
|
||
F2394FF000
|
stack
|
page read and write
|
||
2400000
|
heap
|
page read and write
|
||
6FB8000
|
trusted library allocation
|
page read and write
|
||
1D4E3E40000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
53AE000
|
stack
|
page read and write
|
||
BB8000
|
heap
|
page read and write
|
||
4DCD000
|
stack
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
6DFE000
|
trusted library allocation
|
page read and write
|
||
1D4184F0000
|
heap
|
page read and write
|
||
5A30000
|
heap
|
page read and write
|
||
50A3000
|
trusted library allocation
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
2D89E820000
|
trusted library allocation
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
D70000
|
trusted library allocation
|
page read and write
|
||
7FF8492F0000
|
trusted library allocation
|
page read and write
|
||
6B8B000
|
trusted library allocation
|
page read and write
|
||
3F7B000
|
trusted library allocation
|
page read and write
|
||
2580000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
53FE000
|
stack
|
page read and write
|
||
1D4E3EB8000
|
heap
|
page read and write
|
||
2E64000
|
trusted library allocation
|
page read and write
|
||
2BD3000
|
trusted library allocation
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page execute and read and write
|
||
1D4308CE000
|
heap
|
page read and write
|
||
1D42856F000
|
trusted library allocation
|
page read and write
|
||
FC7000
|
heap
|
page read and write
|
||
49B1000
|
trusted library allocation
|
page read and write
|
||
7764000
|
trusted library allocation
|
page read and write
|
||
524F000
|
stack
|
page read and write
|
||
140000000
|
remote allocation
|
page execute and read and write
|
||
1D416820000
|
heap
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
4D41000
|
trusted library allocation
|
page read and write
|
||
6DF0000
|
trusted library allocation
|
page read and write
|
||
D92000
|
trusted library allocation
|
page read and write
|
||
679E000
|
stack
|
page read and write
|
||
507F000
|
stack
|
page read and write
|
||
1D4308D0000
|
heap
|
page read and write
|
||
1D430890000
|
heap
|
page read and write
|
||
2D8867F1000
|
trusted library allocation
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
3561000
|
trusted library allocation
|
page read and write
|
||
56BE000
|
stack
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
2E88000
|
trusted library allocation
|
page read and write
|
||
6E00000
|
trusted library allocation
|
page read and write
|
||
7FF84903C000
|
trusted library allocation
|
page read and write
|
||
1D4E3EEA000
|
heap
|
page read and write
|
||
49B9000
|
trusted library allocation
|
page read and write
|
||
4BFE000
|
stack
|
page read and write
|
||
2BFC000
|
trusted library allocation
|
page read and write
|
||
588F000
|
stack
|
page read and write
|
||
3510000
|
trusted library allocation
|
page read and write
|
||
BE9000
|
heap
|
page read and write
|
||
2D884EF0000
|
heap
|
page read and write
|
||
1D4E3E30000
|
heap
|
page read and write
|
||
1D4E5CA1000
|
heap
|
page read and write
|
||
5650000
|
trusted library allocation
|
page execute and read and write
|
||
6DE0000
|
trusted library allocation
|
page read and write
|
||
27E2000
|
trusted library allocation
|
page read and write
|
||
1D4E6710000
|
heap
|
page read and write
|
||
2C13000
|
trusted library allocation
|
page read and write
|
||
3FC9000
|
trusted library allocation
|
page read and write
|
||
6B8E000
|
trusted library allocation
|
page read and write
|
||
5230000
|
heap
|
page read and write
|
||
7FF70F159000
|
unkown
|
page readonly
|
||
2D89F1B6000
|
heap
|
page read and write
|
||
5130000
|
heap
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
7080000
|
trusted library allocation
|
page read and write
|
||
56D5000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
2D886B37000
|
trusted library allocation
|
page read and write
|
||
977000
|
heap
|
page read and write
|
||
AD2000
|
trusted library allocation
|
page read and write
|
||
E24000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
1D4E3F03000
|
heap
|
page read and write
|
||
2E27000
|
trusted library allocation
|
page read and write
|
||
74BB000
|
trusted library allocation
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
7A10000
|
trusted library allocation
|
page read and write
|
||
5190000
|
trusted library allocation
|
page execute and read and write
|
||
79D0000
|
trusted library allocation
|
page read and write
|
||
1D4168A0000
|
heap
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page execute and read and write
|
||
14772FE000
|
stack
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
FCF000
|
stack
|
page read and write
|
||
2D884C34000
|
unkown
|
page readonly
|
||
CB21B5F000
|
stack
|
page read and write
|
||
74D1000
|
trusted library allocation
|
page read and write
|
||
41BE000
|
trusted library allocation
|
page read and write
|
||
F2388FE000
|
stack
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
7FF70F151000
|
unkown
|
page execute read
|
||
194131AE000
|
heap
|
page read and write
|
||
156A000
|
trusted library allocation
|
page execute and read and write
|
||
1D4308FD000
|
heap
|
page read and write
|
||
2A7E000
|
trusted library allocation
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
240A000
|
heap
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
58AF000
|
stack
|
page read and write
|
||
568E000
|
stack
|
page read and write
|
||
23D0000
|
trusted library allocation
|
page execute and read and write
|
||
2B90000
|
trusted library allocation
|
page read and write
|
||
1D419131000
|
trusted library allocation
|
page read and write
|
||
2D884D8D000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
5A50000
|
trusted library allocation
|
page read and write
|
||
3EDB000
|
trusted library allocation
|
page read and write
|
||
1D430B8F000
|
heap
|
page read and write
|
||
1D4168E8000
|
heap
|
page read and write
|
||
194133A0000
|
heap
|
page read and write
|
||
761F3FF000
|
stack
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
F238EFE000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
B57000
|
stack
|
page read and write
|
||
5C80000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
3F66000
|
trusted library allocation
|
page read and write
|
||
57F5000
|
trusted library allocation
|
page read and write
|
||
2BFE000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
trusted library allocation
|
page read and write
|
||
3ADF000
|
trusted library allocation
|
page read and write
|
||
166C000
|
stack
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
BAA000
|
heap
|
page read and write
|
||
D9A000
|
trusted library allocation
|
page execute and read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
2B9C000
|
trusted library allocation
|
page read and write
|
||
3AC9000
|
trusted library allocation
|
page read and write
|
||
4196000
|
trusted library allocation
|
page read and write
|
||
2E47000
|
trusted library allocation
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
AB0000
|
trusted library allocation
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
7FB20000
|
trusted library allocation
|
page execute and read and write
|
||
3CD9000
|
trusted library allocation
|
page read and write
|
||
D7D000
|
trusted library allocation
|
page execute and read and write
|
||
7850000
|
trusted library allocation
|
page execute and read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
6B80000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
1D428501000
|
trusted library allocation
|
page read and write
|
||
6F80000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
B65000
|
heap
|
page read and write
|
||
7A40000
|
trusted library allocation
|
page execute and read and write
|
||
3FDB000
|
trusted library allocation
|
page read and write
|
||
2D886D72000
|
trusted library allocation
|
page read and write
|
||
1D418501000
|
trusted library allocation
|
page read and write
|
||
7740000
|
trusted library allocation
|
page read and write
|
||
6630000
|
trusted library allocation
|
page read and write
|
||
3EDF000
|
trusted library allocation
|
page read and write
|
||
3C35000
|
trusted library allocation
|
page read and write
|
||
2F12000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
2960000
|
trusted library allocation
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
2E9F000
|
trusted library allocation
|
page read and write
|
||
2D89EB74000
|
heap
|
page read and write
|
||
39FD000
|
trusted library allocation
|
page read and write
|
||
2D8967F1000
|
trusted library allocation
|
page read and write
|
||
4A8000
|
remote allocation
|
page execute and read and write
|
||
3E8A000
|
trusted library allocation
|
page read and write
|
||
6FA6000
|
heap
|
page read and write
|
||
2D886B5B000
|
trusted library allocation
|
page read and write
|
||
1BC000
|
stack
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
168E000
|
heap
|
page read and write
|
||
C36000
|
trusted library allocation
|
page execute and read and write
|
||
FF990000
|
trusted library allocation
|
page execute and read and write
|
||
14775FE000
|
stack
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
1017000
|
trusted library allocation
|
page execute and read and write
|
||
2E9D000
|
trusted library allocation
|
page read and write
|
||
8070000
|
trusted library allocation
|
page read and write
|
||
40E1000
|
trusted library allocation
|
page read and write
|
||
2338000
|
trusted library allocation
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
1476D9F000
|
unkown
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
2C20000
|
heap
|
page read and write
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
1D4E68B1000
|
heap
|
page read and write
|
||
2C2D000
|
heap
|
page read and write
|
||
2E7A000
|
trusted library allocation
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
1D430B8D000
|
heap
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
355F000
|
trusted library allocation
|
page read and write
|
||
7FF8492DA000
|
trusted library allocation
|
page read and write
|
||
71E0000
|
trusted library allocation
|
page execute and read and write
|
||
930000
|
heap
|
page read and write
|
||
7220000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
5878000
|
heap
|
page read and write
|
||
761E5EB000
|
stack
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
2D884C32000
|
unkown
|
page readonly
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
2BE3000
|
trusted library allocation
|
page read and write
|
||
638E000
|
stack
|
page read and write
|
||
2990000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
6890000
|
trusted library allocation
|
page read and write
|
||
2C4B000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
98C000
|
stack
|
page read and write
|
||
3525000
|
trusted library allocation
|
page read and write
|
||
7780000
|
trusted library allocation
|
page execute and read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
106A000
|
heap
|
page read and write
|
||
6E20000
|
trusted library allocation
|
page read and write
|
||
2D886B71000
|
trusted library allocation
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
4080000
|
trusted library allocation
|
page read and write
|
||
2BEE000
|
stack
|
page read and write
|
||
4124000
|
trusted library allocation
|
page read and write
|
||
3A71000
|
trusted library allocation
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
D80000
|
trusted library allocation
|
page read and write
|
||
7950000
|
trusted library allocation
|
page execute and read and write
|
||
2EB2000
|
trusted library allocation
|
page read and write
|
||
2E62000
|
trusted library allocation
|
page read and write
|
||
FCF000
|
stack
|
page read and write
|
||
58BA000
|
heap
|
page read and write
|
||
1D416AE0000
|
heap
|
page readonly
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
C45000
|
heap
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
A5B000
|
stack
|
page read and write
|
||
7730000
|
trusted library allocation
|
page read and write
|
||
2D886B3D000
|
trusted library allocation
|
page read and write
|
||
1543000
|
trusted library allocation
|
page execute and read and write
|
||
538E000
|
stack
|
page read and write
|
||
CF8000
|
stack
|
page read and write
|
||
5874000
|
heap
|
page read and write
|
||
520F000
|
stack
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page execute and read and write
|
||
C2B000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
6E30000
|
trusted library allocation
|
page read and write
|
||
2D84CBC000
|
stack
|
page read and write
|
||
4AF0000
|
heap
|
page execute and read and write
|
||
5D3E000
|
stack
|
page read and write
|
||
4041000
|
trusted library allocation
|
page read and write
|
||
2EA9000
|
trusted library allocation
|
page read and write
|
||
7FF8492E0000
|
trusted library allocation
|
page read and write
|
||
7770000
|
trusted library allocation
|
page read and write
|
||
1D638945000
|
heap
|
page read and write
|
||
70EE000
|
stack
|
page read and write
|
||
194131C1000
|
heap
|
page read and write
|
||
147717D000
|
stack
|
page read and write
|
||
E84000
|
unkown
|
page readonly
|
||
2BEF000
|
trusted library allocation
|
page read and write
|
||
352F000
|
trusted library allocation
|
page read and write
|
||
2E58000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
FEE30000
|
trusted library allocation
|
page execute and read and write
|
||
2407000
|
heap
|
page read and write
|
||
7DC000
|
stack
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
2C2F000
|
trusted library allocation
|
page read and write
|
||
2D8968D5000
|
trusted library allocation
|
page read and write
|
||
F238AFE000
|
stack
|
page read and write
|
||
1103000
|
heap
|
page read and write
|
||
1D4E40E0000
|
heap
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
5BBF000
|
stack
|
page read and write
|
||
1D416AD0000
|
trusted library allocation
|
page read and write
|
||
6F82000
|
heap
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
3130000
|
heap
|
page execute and read and write
|
||
29C0000
|
heap
|
page execute and read and write
|
||
1D430BCC000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
EAC000
|
heap
|
page read and write
|
||
194131BF000
|
heap
|
page read and write
|
||
5340000
|
trusted library allocation
|
page execute and read and write
|
||
3140000
|
trusted library allocation
|
page read and write
|
||
39D5000
|
trusted library allocation
|
page read and write
|
||
14770FE000
|
stack
|
page read and write
|
||
1D4E5C76000
|
heap
|
page read and write
|
||
E42000
|
trusted library allocation
|
page read and write
|
||
3531000
|
trusted library allocation
|
page read and write
|
||
537D000
|
stack
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
2D884F60000
|
trusted library allocation
|
page read and write
|
||
1440000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
1D416999000
|
heap
|
page read and write
|
||
2330000
|
trusted library allocation
|
page read and write
|
||
6390000
|
heap
|
page read and write
|
||
1D4183A0000
|
heap
|
page execute and read and write
|
||
1D4E7870000
|
heap
|
page read and write
|
||
14773F6000
|
stack
|
page read and write
|
||
1076000
|
heap
|
page read and write
|
||
2C02000
|
trusted library allocation
|
page read and write
|
||
6E60000
|
trusted library allocation
|
page read and write
|
||
2E8C000
|
trusted library allocation
|
page read and write
|
||
C4B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
74D7000
|
trusted library allocation
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
2D89F890000
|
unkown
|
page read and write
|
||
742000
|
heap
|
page read and write
|
||
74CE000
|
trusted library allocation
|
page read and write
|
||
F238DFE000
|
stack
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
53EE000
|
stack
|
page read and write
|
||
30A0000
|
trusted library allocation
|
page read and write
|
||
2D884D00000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
C1D000
|
trusted library allocation
|
page execute and read and write
|
||
2D884CD0000
|
heap
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
4341000
|
trusted library allocation
|
page read and write
|
||
357E000
|
trusted library allocation
|
page read and write
|
||
1D4E5BD0000
|
heap
|
page read and write
|
||
1D4168DD000
|
heap
|
page read and write
|
||
4C41000
|
trusted library allocation
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
1D430BD2000
|
heap
|
page read and write
|
||
59A0000
|
heap
|
page read and write
|
||
593F000
|
stack
|
page read and write
|
||
1D430B7E000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF849320000
|
trusted library allocation
|
page read and write
|
||
6DF6000
|
trusted library allocation
|
page read and write
|
||
4F3E000
|
stack
|
page read and write
|
||
1D63A280000
|
heap
|
page read and write
|
||
2D884FD0000
|
heap
|
page execute and read and write
|
||
1D4E3F25000
|
heap
|
page read and write
|
||
27C4000
|
trusted library allocation
|
page read and write
|
||
7070000
|
trusted library allocation
|
page read and write
|
||
70DF000
|
trusted library allocation
|
page read and write
|
||
11E7000
|
heap
|
page read and write
|
||
7FF849300000
|
trusted library allocation
|
page read and write
|
||
2D96000
|
trusted library allocation
|
page read and write
|
||
2E2E000
|
trusted library allocation
|
page read and write
|
||
61E000
|
stack
|
page read and write
|
||
29BC000
|
stack
|
page read and write
|
||
59D0000
|
trusted library allocation
|
page execute and read and write
|
||
2D884D4C000
|
heap
|
page read and write
|
||
ACA000
|
trusted library allocation
|
page execute and read and write
|
||
1562000
|
trusted library allocation
|
page read and write
|
||
14781CE000
|
stack
|
page read and write
|
||
2D8975AA000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page execute and read and write
|
||
536C000
|
trusted library allocation
|
page read and write
|
||
3D29000
|
trusted library allocation
|
page read and write
|
||
2C27000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
2D886B51000
|
trusted library allocation
|
page read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
79D0000
|
trusted library allocation
|
page execute and read and write
|
||
2C52000
|
trusted library allocation
|
page read and write
|
||
4229000
|
trusted library allocation
|
page read and write
|
||
4C4F000
|
trusted library allocation
|
page read and write
|
||
DA7000
|
trusted library allocation
|
page execute and read and write
|
||
AD7000
|
trusted library allocation
|
page execute and read and write
|
||
39D1000
|
trusted library allocation
|
page read and write
|
||
2BE7000
|
trusted library allocation
|
page read and write
|
||
761EDFB000
|
stack
|
page read and write
|
||
AAD000
|
trusted library allocation
|
page execute and read and write
|
||
B70000
|
heap
|
page read and write
|
||
30F0000
|
heap
|
page execute and read and write
|
||
597D000
|
stack
|
page read and write
|
||
2D886B3B000
|
trusted library allocation
|
page read and write
|
||
3667000
|
trusted library allocation
|
page read and write
|
||
4221000
|
trusted library allocation
|
page read and write
|
||
3533000
|
trusted library allocation
|
page read and write
|
||
1476D13000
|
stack
|
page read and write
|
||
2BE5000
|
trusted library allocation
|
page read and write
|
||
147777C000
|
stack
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
1D4E5CE2000
|
heap
|
page read and write
|
||
387B000
|
trusted library allocation
|
page read and write
|
||
6B70000
|
trusted library allocation
|
page read and write
|
||
2C31000
|
trusted library allocation
|
page read and write
|
||
55BE000
|
stack
|
page read and write
|
||
56CF000
|
heap
|
page read and write
|
||
1D4E5F70000
|
heap
|
page read and write
|
||
3C30000
|
trusted library allocation
|
page read and write
|
||
6E30000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
6E0E000
|
trusted library allocation
|
page read and write
|
||
1D4E5CA3000
|
heap
|
page read and write
|
||
1D416AB0000
|
trusted library allocation
|
page read and write
|
||
6BA3000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
trusted library allocation
|
page read and write
|
||
2E99000
|
trusted library allocation
|
page read and write
|
||
DAB000
|
trusted library allocation
|
page execute and read and write
|
||
71B0000
|
trusted library allocation
|
page execute and read and write
|
||
B80000
|
heap
|
page read and write
|
||
DA2000
|
trusted library allocation
|
page read and write
|
||
549E000
|
stack
|
page read and write
|
||
506F000
|
stack
|
page read and write
|
||
6F50000
|
heap
|
page read and write
|
||
157B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
1590000
|
trusted library allocation
|
page read and write
|
||
1D418731000
|
trusted library allocation
|
page read and write
|
||
2E75000
|
trusted library allocation
|
page read and write
|
||
82E0000
|
trusted library allocation
|
page execute and read and write
|
||
6BB5000
|
trusted library allocation
|
page read and write
|
||
5330000
|
trusted library allocation
|
page read and write
|
||
2D885045000
|
heap
|
page read and write
|
||
2E3B000
|
trusted library allocation
|
page read and write
|
||
2D886B7B000
|
trusted library allocation
|
page read and write
|
||
EC5000
|
heap
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
1D419E1E000
|
trusted library allocation
|
page read and write
|
||
3C7F000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
2C08000
|
trusted library allocation
|
page read and write
|
||
2D89759D000
|
trusted library allocation
|
page read and write
|
||
7880000
|
trusted library allocation
|
page execute and read and write
|
||
4A2D000
|
stack
|
page read and write
|
||
6CE8000
|
heap
|
page read and write
|
||
1D416929000
|
heap
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
1D430982000
|
heap
|
page read and write
|
||
7FF70F159000
|
unkown
|
page readonly
|
||
6D08000
|
heap
|
page read and write
|
||
25B0000
|
trusted library allocation
|
page execute and read and write
|
||
1D428510000
|
trusted library allocation
|
page read and write
|
||
1D416B50000
|
heap
|
page read and write
|
||
2C3F000
|
trusted library allocation
|
page read and write
|
||
2AB2000
|
trusted library allocation
|
page read and write
|
||
1477379000
|
stack
|
page read and write
|
||
14776FE000
|
stack
|
page read and write
|
||
147727E000
|
stack
|
page read and write
|
||
2D89E7F0000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
2C17000
|
trusted library allocation
|
page read and write
|
||
2D886B7F000
|
trusted library allocation
|
page read and write
|
||
2520000
|
trusted library allocation
|
page read and write
|
||
6BC0000
|
trusted library allocation
|
page read and write
|
||
2D884F40000
|
trusted library allocation
|
page read and write
|
||
7FF849330000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
1D4168EC000
|
heap
|
page read and write
|
||
3150000
|
trusted library allocation
|
page read and write
|
||
287D000
|
heap
|
page read and write
|
||
1D4309E0000
|
heap
|
page execute and read and write
|
||
C2F000
|
heap
|
page read and write
|
||
285E000
|
stack
|
page read and write
|
||
761E6FF000
|
stack
|
page read and write
|
||
C47000
|
trusted library allocation
|
page execute and read and write
|
||
3826000
|
trusted library allocation
|
page read and write
|
||
2404000
|
heap
|
page read and write
|
||
5881000
|
heap
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
CB21ADC000
|
stack
|
page read and write
|
||
3281000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
C00000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
1D430938000
|
heap
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
C3B000
|
heap
|
page read and write
|
||
54FE000
|
stack
|
page read and write
|
||
2CB2000
|
trusted library allocation
|
page read and write
|
||
293C000
|
trusted library allocation
|
page read and write
|
||
5B9E000
|
stack
|
page read and write
|
||
3FAE000
|
trusted library allocation
|
page read and write
|
||
7760000
|
trusted library allocation
|
page read and write
|
||
27CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF49C5E0000
|
trusted library allocation
|
page execute and read and write
|
||
F2389FE000
|
stack
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page execute and read and write
|
||
1048000
|
heap
|
page read and write
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
3112000
|
trusted library allocation
|
page read and write
|
||
2D89F680000
|
heap
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
2E56000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF8492C9000
|
trusted library allocation
|
page read and write
|
||
1476DDE000
|
stack
|
page read and write
|
||
3559000
|
trusted library allocation
|
page read and write
|
||
2C19000
|
trusted library allocation
|
page read and write
|
||
3931000
|
trusted library allocation
|
page read and write
|
||
194131B7000
|
heap
|
page read and write
|
||
F238BFE000
|
stack
|
page read and write
|
||
2D89F206000
|
heap
|
page read and write
|
||
6E25000
|
trusted library allocation
|
page read and write
|
||
74BE000
|
trusted library allocation
|
page read and write
|
||
1D4E3F2E000
|
heap
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
4481000
|
trusted library allocation
|
page read and write
|
||
1D416A70000
|
heap
|
page read and write
|
||
7720000
|
trusted library allocation
|
page read and write
|
||
1D416890000
|
heap
|
page read and write
|
||
766B000
|
heap
|
page read and write
|
||
3568000
|
trusted library allocation
|
page read and write
|
||
148E000
|
stack
|
page read and write
|
||
350E000
|
trusted library allocation
|
page read and write
|
||
2D886B81000
|
trusted library allocation
|
page read and write
|
||
1572000
|
trusted library allocation
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
2D886B84000
|
trusted library allocation
|
page read and write
|
||
70A0000
|
trusted library allocation
|
page read and write
|
||
560E000
|
stack
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
6FBC000
|
trusted library allocation
|
page read and write
|
||
27FB000
|
trusted library allocation
|
page execute and read and write
|
||
6E41000
|
trusted library allocation
|
page read and write
|
||
1D43094C000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
19413140000
|
heap
|
page read and write
|
||
6FB0000
|
trusted library allocation
|
page read and write
|
||
147707E000
|
stack
|
page read and write
|
||
2C41000
|
trusted library allocation
|
page read and write
|
||
1D4E5CB3000
|
heap
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
1D416830000
|
heap
|
page read and write
|
||
27D0000
|
trusted library allocation
|
page read and write
|
||
6BA7000
|
trusted library allocation
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
6DC0000
|
trusted library allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page execute and read and write
|
||
2D886B6A000
|
trusted library allocation
|
page read and write
|
||
6B90000
|
trusted library allocation
|
page read and write
|
||
2E41000
|
trusted library allocation
|
page read and write
|
||
3DA7000
|
trusted library allocation
|
page read and write
|
||
C3A000
|
trusted library allocation
|
page execute and read and write
|
||
240D000
|
heap
|
page read and write
|
||
6AFE000
|
stack
|
page read and write
|
||
2C24000
|
heap
|
page read and write
|
||
420E000
|
trusted library allocation
|
page read and write
|
||
AB9000
|
trusted library allocation
|
page read and write
|
||
1D638730000
|
heap
|
page read and write
|
||
E99000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page execute and read and write
|
||
4D43000
|
trusted library allocation
|
page read and write
|
||
252C000
|
trusted library allocation
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
3574000
|
trusted library allocation
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
1D430944000
|
heap
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
16C6000
|
heap
|
page read and write
|
||
78C0000
|
trusted library allocation
|
page read and write
|
||
2B80000
|
trusted library allocation
|
page read and write
|
||
975000
|
heap
|
page read and write
|
||
74B6000
|
trusted library allocation
|
page read and write
|
||
2D89F610000
|
trusted library section
|
page read and write
|
||
3161000
|
trusted library allocation
|
page read and write
|
||
2D884D61000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
19414E94000
|
heap
|
page read and write
|
||
155D000
|
trusted library allocation
|
page execute and read and write
|
||
2D884FF0000
|
heap
|
page read and write
|
||
2D886C34000
|
trusted library allocation
|
page read and write
|
||
27F7000
|
trusted library allocation
|
page execute and read and write
|
||
2E3D000
|
trusted library allocation
|
page read and write
|
||
1D416850000
|
heap
|
page read and write
|
||
2BCE000
|
trusted library allocation
|
page read and write
|
There are 1211 hidden memdumps, click here to show them.