Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Mt6QkZnVbc.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Google\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Google\RCX75E9.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Windows Mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Windows Mail\RCX69BF.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\google\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe (copy)
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\windows mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe (copy)
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Windows Portable Devices\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Windows Portable Devices\RCX7115.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\RCX67AA.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\RCX6C11.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\RCX786B.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\dwm.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\services.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\sihost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\Mt6QkZnVbc.exe (copy)
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\RCX6567.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\SKB\LanguageModels\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\SKB\LanguageModels\RCX6E93.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\Desktop\RCX73C5.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Google\5d095569012eb4
|
ASCII text, with very long lines (357), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\Google\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Windows Mail\5d095569012eb4
|
ASCII text, with very long lines (594), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\Windows Mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Windows Portable Devices\5d095569012eb4
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files\Windows Portable Devices\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Recovery\66fc9ff0ee96c2
|
ASCII text, with very long lines (672), with no line terminators
|
dropped
|
||
C:\Recovery\6cb0b6c459d5d3
|
ASCII text, with very long lines (717), with no line terminators
|
dropped
|
||
C:\Recovery\c5b4cb5e9653cc
|
ASCII text, with very long lines (312), with no line terminators
|
dropped
|
||
C:\Recovery\dwm.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Recovery\services.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Recovery\sihost.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Mt6QkZnVbc.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\UserOOBEBroker.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dwm.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\services.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\sihost.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\59a07570a8a8386aa1a299e6ab573f686e7e81544.5.321e942f7529053d3bf5a939edfacdca5e36682859
|
ASCII text, with very long lines (644), with no line terminators
|
dropped
|
||
C:\Windows\SKB\LanguageModels\5d095569012eb4
|
ASCII text, with very long lines (735), with no line terminators
|
dropped
|
||
C:\Windows\SKB\LanguageModels\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\Desktop\7ccfebd9e92364
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 34 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Mt6QkZnVbc.exe
|
"C:\Users\user\Desktop\Mt6QkZnVbc.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Recovery\services.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\services.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Recovery\services.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjnB" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\windows mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjn" /sc ONLOGON /tr "'C:\Program Files (x86)\windows mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjnB" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\windows mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Recovery\dwm.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\dwm.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Recovery\dwm.exe'" /rl HIGHEST /f
|
||
C:\Program Files (x86)\Windows Mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe
|
"C:\Program Files (x86)\windows mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjnB" /sc MINUTE /mo 10 /tr "'C:\Windows\SKB\LanguageModels\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'"
/f
|
||
C:\Program Files (x86)\Windows Mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe
|
"C:\Program Files (x86)\windows mail\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjn" /sc ONLOGON /tr "'C:\Windows\SKB\LanguageModels\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjnB" /sc MINUTE /mo 6 /tr "'C:\Windows\SKB\LanguageModels\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'"
/rl HIGHEST /f
|
||
C:\Recovery\dwm.exe
|
C:\Recovery\dwm.exe
|
||
C:\Recovery\dwm.exe
|
C:\Recovery\dwm.exe
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjnB" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Portable Devices\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjn" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'"
/rl HIGHEST /f
|
||
C:\Recovery\services.exe
|
C:\Recovery\services.exe
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjnB" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Portable Devices\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'"
/rl HIGHEST /f
|
||
C:\Recovery\services.exe
|
C:\Recovery\services.exe
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "UserOOBEBrokerU" /sc MINUTE /mo 12 /tr "'C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "UserOOBEBroker" /sc ONLOGON /tr "'C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "UserOOBEBrokerU" /sc MINUTE /mo 14 /tr "'C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjnB" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\google\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjn" /sc ONLOGON /tr "'C:\Program Files (x86)\google\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "BxpXDwLzzgPDKkwHFtsUbGgAjnB" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\google\BxpXDwLzzgPDKkwHFtsUbGgAjn.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Recovery\sihost.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Recovery\sihost.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Recovery\sihost.exe'" /rl HIGHEST /f
|
||
C:\Recovery\sihost.exe
|
C:\Recovery\sihost.exe
|
||
C:\Recovery\sihost.exe
|
C:\Recovery\sihost.exe
|
||
C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe
|
C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe
|
||
C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe
|
C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe
|
||
C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe
|
"C:\Windows\ServiceProfiles\LocalService\Desktop\UserOOBEBroker.exe"
|
There are 26 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://aka.ms/Vh5j3kta
|
unknown
|
||
https://aka.ms/odirmogram
|
unknown
|
||
http://a0941979.xsph.ru/@zd3bk5Wa3RHb1FmZlR0X
|
|||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
EnableLUA
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
PromptOnSecureDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
|
CheckSetting
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3081000
|
trusted library allocation
|
page read and write
|
||
2501000
|
trusted library allocation
|
page read and write
|
||
235C000
|
trusted library allocation
|
page read and write
|
||
254C000
|
trusted library allocation
|
page read and write
|
||
2321000
|
trusted library allocation
|
page read and write
|
||
2511000
|
trusted library allocation
|
page read and write
|
||
336C000
|
trusted library allocation
|
page read and write
|
||
29B1000
|
trusted library allocation
|
page read and write
|
||
29B1000
|
trusted library allocation
|
page read and write
|
||
29EC000
|
trusted library allocation
|
page read and write
|
||
343F000
|
trusted library allocation
|
page read and write
|
||
2C0C000
|
trusted library allocation
|
page read and write
|
||
EC2000
|
unkown
|
page readonly
|
||
2AA1000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
trusted library allocation
|
page read and write
|
||
3331000
|
trusted library allocation
|
page read and write
|
||
3401000
|
trusted library allocation
|
page read and write
|
||
2BD1000
|
trusted library allocation
|
page read and write
|
||
25A1000
|
trusted library allocation
|
page read and write
|
||
3860000
|
trusted library allocation
|
page read and write
|
||
1B0B0000
|
trusted library allocation
|
page read and write
|
||
1B60E000
|
stack
|
page read and write
|
||
1BD4E000
|
stack
|
page read and write
|
||
7FFD9B786000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
1190000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
7FFD9B8F7000
|
trusted library allocation
|
page read and write
|
||
33D6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76B000
|
trusted library allocation
|
page read and write
|
||
AAD000
|
heap
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
1A9E0000
|
trusted library allocation
|
page read and write
|
||
1BF3E000
|
stack
|
page read and write
|
||
7FFD9B96B000
|
trusted library allocation
|
page read and write
|
||
137F000
|
heap
|
page read and write
|
||
14270000
|
trusted library allocation
|
page read and write
|
||
12508000
|
trusted library allocation
|
page read and write
|
||
1AE30000
|
heap
|
page read and write
|
||
3B71000
|
trusted library allocation
|
page read and write
|
||
37DC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page execute and read and write
|
||
18E0000
|
heap
|
page execute and read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
1C814000
|
heap
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
1C1A0000
|
heap
|
page read and write
|
||
125A3000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B929000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
1C5F0000
|
trusted library section
|
page read and write
|
||
A0E000
|
heap
|
page read and write
|
||
1155000
|
heap
|
page read and write
|
||
2A6B000
|
trusted library allocation
|
page read and write
|
||
1C3A3000
|
stack
|
page read and write
|
||
1C5E0000
|
trusted library section
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
1BB4F000
|
stack
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
39D3000
|
trusted library allocation
|
page read and write
|
||
1BBE0000
|
trusted library section
|
page read and write
|
||
29AF000
|
stack
|
page read and write
|
||
353E000
|
trusted library allocation
|
page read and write
|
||
39D7000
|
trusted library allocation
|
page read and write
|
||
1B85C000
|
stack
|
page read and write
|
||
1A9E0000
|
trusted library allocation
|
page read and write
|
||
CCA000
|
heap
|
page read and write
|
||
3A5B000
|
trusted library allocation
|
page read and write
|
||
3946000
|
trusted library allocation
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page read and write
|
||
1B13E000
|
stack
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
9D8000
|
heap
|
page read and write
|
||
3948000
|
trusted library allocation
|
page read and write
|
||
3C05000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91E000
|
trusted library allocation
|
page read and write
|
||
C49000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
530000
|
heap
|
page read and write
|
||
13454000
|
trusted library allocation
|
page read and write
|
||
1C502000
|
heap
|
page execute and read and write
|
||
12BDD000
|
trusted library allocation
|
page read and write
|
||
23D0000
|
heap
|
page execute and read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
7C5000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
2C86000
|
trusted library allocation
|
page read and write
|
||
7FFD9B962000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page execute and read and write
|
||
BA0000
|
heap
|
page execute and read and write
|
||
13088000
|
trusted library allocation
|
page read and write
|
||
138F000
|
heap
|
page read and write
|
||
17F0000
|
trusted library allocation
|
page read and write
|
||
1BB6E000
|
stack
|
page read and write
|
||
7FF45A4A0000
|
trusted library allocation
|
page execute and read and write
|
||
CA0000
|
heap
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
1C7BD000
|
heap
|
page read and write
|
||
1AE60000
|
heap
|
page execute and read and write
|
||
DF0000
|
heap
|
page read and write
|
||
2C83000
|
trusted library allocation
|
page read and write
|
||
30F6000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
1985000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
580000
|
heap
|
page read and write
|
||
38E5000
|
trusted library allocation
|
page read and write
|
||
19AD000
|
stack
|
page read and write
|
||
1B460000
|
heap
|
page read and write
|
||
7FFD9B7AC000
|
trusted library allocation
|
page execute and read and write
|
||
1493000
|
heap
|
page read and write
|
||
38E1000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
3473000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page execute and read and write
|
||
7FFD9B924000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
unkown
|
page readonly
|
||
2450000
|
heap
|
page execute and read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
3B6F000
|
trusted library allocation
|
page read and write
|
||
381C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
37DA000
|
trusted library allocation
|
page read and write
|
||
1C8BB000
|
heap
|
page read and write
|
||
1C316000
|
heap
|
page read and write
|
||
1C402000
|
heap
|
page read and write
|
||
132D1000
|
trusted library allocation
|
page read and write
|
||
7E6000
|
stack
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
F25000
|
heap
|
page read and write
|
||
17F5000
|
heap
|
page read and write
|
||
C1F000
|
heap
|
page read and write
|
||
1C7DC000
|
heap
|
page read and write
|
||
1C610000
|
trusted library section
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
A76000
|
heap
|
page read and write
|
||
1C133000
|
stack
|
page read and write
|
||
33F0000
|
heap
|
page execute and read and write
|
||
15B2000
|
heap
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
7C1000
|
heap
|
page read and write
|
||
9F5000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
342A000
|
trusted library allocation
|
page read and write
|
||
1B2FE000
|
stack
|
page read and write
|
||
7FFD9B919000
|
trusted library allocation
|
page read and write
|
||
1379000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
1B66E000
|
stack
|
page read and write
|
||
1C32E000
|
heap
|
page read and write
|
||
14FC000
|
heap
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B798000
|
trusted library allocation
|
page read and write
|
||
1C7CC000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
171F000
|
stack
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
EFF000
|
stack
|
page read and write
|
||
142E000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
3C89000
|
trusted library allocation
|
page read and write
|
||
35FF000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
12323000
|
trusted library allocation
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
12AA1000
|
trusted library allocation
|
page read and write
|
||
1250D000
|
trusted library allocation
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
2367000
|
trusted library allocation
|
page read and write
|
||
1C2D0000
|
heap
|
page read and write
|
||
23A0000
|
heap
|
page execute and read and write
|
||
15DE000
|
heap
|
page read and write
|
||
1232D000
|
trusted library allocation
|
page read and write
|
||
AA5000
|
heap
|
page read and write
|
||
1BA63000
|
stack
|
page read and write
|
||
37E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92E000
|
trusted library allocation
|
page read and write
|
||
1BF9E000
|
stack
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
CC5000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
1B53F000
|
stack
|
page read and write
|
||
D5E000
|
heap
|
page read and write
|
||
3822000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
865000
|
heap
|
page read and write
|
||
546000
|
stack
|
page read and write
|
||
381A000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
1A5D0000
|
trusted library allocation
|
page read and write
|
||
1A350000
|
trusted library allocation
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
3C8D000
|
trusted library allocation
|
page read and write
|
||
2410000
|
trusted library allocation
|
page read and write
|
||
A3C000
|
heap
|
page read and write
|
||
3A64000
|
trusted library allocation
|
page read and write
|
||
1980000
|
heap
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
2645000
|
trusted library allocation
|
page read and write
|
||
1B45F000
|
stack
|
page read and write
|
||
38EB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
B6E000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page execute and read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
1C035000
|
stack
|
page read and write
|
||
7FFD9B927000
|
trusted library allocation
|
page read and write
|
||
1AF1D000
|
stack
|
page read and write
|
||
159F000
|
heap
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
3126000
|
trusted library allocation
|
page read and write
|
||
2A62000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
14D8000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
7DA000
|
heap
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
189F000
|
stack
|
page read and write
|
||
33E2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B798000
|
trusted library allocation
|
page read and write
|
||
820000
|
trusted library allocation
|
page read and write
|
||
346D000
|
trusted library allocation
|
page read and write
|
||
848000
|
heap
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
1CC03000
|
heap
|
page read and write
|
||
7FFD9B798000
|
trusted library allocation
|
page read and write
|
||
346F000
|
trusted library allocation
|
page read and write
|
||
1C00E000
|
stack
|
page read and write
|
||
379C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A8000
|
trusted library allocation
|
page read and write
|
||
132DF000
|
trusted library allocation
|
page read and write
|
||
1B433000
|
stack
|
page read and write
|
||
7FFD9B753000
|
trusted library allocation
|
page execute and read and write
|
||
36C7000
|
trusted library allocation
|
page read and write
|
||
1C842000
|
heap
|
page read and write
|
||
2C81000
|
trusted library allocation
|
page read and write
|
||
129B3000
|
trusted library allocation
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
1BC4E000
|
stack
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
B9C000
|
heap
|
page read and write
|
||
9F9000
|
heap
|
page read and write
|
||
3467000
|
trusted library allocation
|
page read and write
|
||
13674000
|
trusted library allocation
|
page read and write
|
||
3C85000
|
trusted library allocation
|
page read and write
|
||
1505000
|
heap
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
1B37E000
|
stack
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
34F3000
|
trusted library allocation
|
page read and write
|
||
3469000
|
trusted library allocation
|
page read and write
|
||
12328000
|
trusted library allocation
|
page read and write
|
||
CAD000
|
heap
|
page read and write
|
||
1CAFE000
|
stack
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
132D8000
|
trusted library allocation
|
page read and write
|
||
1BFAE000
|
stack
|
page read and write
|
||
C3D000
|
heap
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
33D9000
|
trusted library allocation
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
A0C000
|
heap
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
3864000
|
trusted library allocation
|
page read and write
|
||
1B63E000
|
stack
|
page read and write
|
||
29F6000
|
trusted library allocation
|
page read and write
|
||
3649000
|
trusted library allocation
|
page read and write
|
||
2A9F000
|
stack
|
page read and write
|
||
1A530000
|
trusted library allocation
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
EB5000
|
heap
|
page read and write
|
||
C78000
|
heap
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page read and write
|
||
AE1000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
746000
|
stack
|
page read and write
|
||
3790000
|
trusted library allocation
|
page read and write
|
||
1BA50000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
AE7000
|
heap
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
1419E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
3B79000
|
trusted library allocation
|
page read and write
|
||
DFF000
|
stack
|
page read and write
|
||
7FFD9B8A5000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
1BCFE000
|
stack
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
1359000
|
heap
|
page read and write
|
||
2A53000
|
trusted library allocation
|
page read and write
|
||
13BA000
|
heap
|
page read and write
|
||
B4E000
|
heap
|
page read and write
|
||
1B04F000
|
stack
|
page read and write
|
||
7FFD9B939000
|
trusted library allocation
|
page read and write
|
||
2642000
|
trusted library allocation
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
3950000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
3B73000
|
trusted library allocation
|
page read and write
|
||
1146000
|
stack
|
page read and write
|
||
7FFD9B7A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B927000
|
trusted library allocation
|
page read and write
|
||
18D0000
|
heap
|
page execute and read and write
|
||
129B8000
|
trusted library allocation
|
page read and write
|
||
33E9000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
1BE00000
|
heap
|
page execute and read and write
|
||
1CBBB000
|
stack
|
page read and write
|
||
7FFD9B80C000
|
trusted library allocation
|
page execute and read and write
|
||
33DF000
|
trusted library allocation
|
page read and write
|
||
C3F000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1B14F000
|
stack
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
25BA000
|
trusted library allocation
|
page read and write
|
||
1B87D000
|
stack
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
1C7C0000
|
heap
|
page read and write
|
||
33DC000
|
trusted library allocation
|
page read and write
|
||
1B3FE000
|
stack
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page execute and read and write
|
||
C50000
|
heap
|
page read and write
|
||
17F5000
|
heap
|
page read and write
|
||
1AA9D000
|
stack
|
page read and write
|
||
DCF000
|
stack
|
page read and write
|
||
CED000
|
heap
|
page read and write
|
||
7FFD9B80C000
|
trusted library allocation
|
page execute and read and write
|
||
1BEAE000
|
stack
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
1CAFE000
|
stack
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
38E9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B788000
|
trusted library allocation
|
page read and write
|
||
1C7F0000
|
heap
|
page read and write
|
||
1583000
|
heap
|
page read and write
|
||
34B7000
|
trusted library allocation
|
page read and write
|
||
157C000
|
heap
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
1AC00000
|
trusted library allocation
|
page read and write
|
||
1B080000
|
heap
|
page read and write
|
||
A3A000
|
heap
|
page read and write
|
||
1910000
|
heap
|
page read and write
|
||
35FD000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1576000
|
heap
|
page read and write
|
||
C13000
|
heap
|
page read and write
|
||
7FFD9B796000
|
trusted library allocation
|
page read and write
|
||
1C8A2000
|
heap
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
1AEF0000
|
heap
|
page execute and read and write
|
||
7FFD9B92E000
|
trusted library allocation
|
page read and write
|
||
1AB9F000
|
stack
|
page read and write
|
||
B5C000
|
heap
|
page read and write
|
||
A22000
|
heap
|
page read and write
|
||
1C325000
|
heap
|
page read and write
|
||
3690000
|
trusted library allocation
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
1B28F000
|
stack
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
3820000
|
trusted library allocation
|
page read and write
|
||
1B430000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
173F000
|
stack
|
page read and write
|
||
CDB000
|
heap
|
page read and write
|
||
1C9F3000
|
stack
|
page read and write
|
||
1BCA0000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B937000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
B72000
|
heap
|
page read and write
|
||
3757000
|
trusted library allocation
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
3138000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
3717000
|
trusted library allocation
|
page read and write
|
||
1C600000
|
trusted library section
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
3B75000
|
trusted library allocation
|
page read and write
|
||
2A59000
|
trusted library allocation
|
page read and write
|
||
A43000
|
heap
|
page read and write
|
||
30C9000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
7FFD9B806000
|
trusted library allocation
|
page read and write
|
||
3538000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
3532000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B5000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
D02000
|
heap
|
page read and write
|
||
38E3000
|
trusted library allocation
|
page read and write
|
||
1C9FA000
|
stack
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
A00000
|
heap
|
page read and write
|
||
57F000
|
heap
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
17C0000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
2B46000
|
trusted library allocation
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page read and write
|
||
7FFD9B806000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1C74D000
|
stack
|
page read and write
|
||
1915000
|
heap
|
page read and write
|
||
C46000
|
heap
|
page read and write
|
||
1AD10000
|
heap
|
page read and write
|
||
1B384000
|
stack
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
14BC000
|
heap
|
page read and write
|
||
1654000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
1B400000
|
heap
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
7FFD9B8F4000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
1C640000
|
trusted library section
|
page read and write
|
||
A76000
|
heap
|
page read and write
|
||
1A8F000
|
stack
|
page read and write
|
||
7FFD9B75D000
|
trusted library allocation
|
page execute and read and write
|
||
1C19E000
|
stack
|
page read and write
|
||
1C803000
|
heap
|
page read and write
|
||
57A000
|
heap
|
page read and write
|
||
7FFD9B927000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
1B1FB000
|
stack
|
page read and write
|
||
CC1000
|
heap
|
page read and write
|
||
379A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93E000
|
trusted library allocation
|
page read and write
|
||
8EF000
|
heap
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
3C83000
|
trusted library allocation
|
page read and write
|
||
3AE6000
|
trusted library allocation
|
page read and write
|
||
1AF7F000
|
stack
|
page read and write
|
||
1AFDF000
|
stack
|
page read and write
|
||
1850000
|
heap
|
page execute and read and write
|
||
39DD000
|
trusted library allocation
|
page read and write
|
||
1BD2E000
|
stack
|
page read and write
|
||
1B640000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
1BC20000
|
heap
|
page execute and read and write
|
||
12AA8000
|
trusted library allocation
|
page read and write
|
||
12501000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
1CBFE000
|
stack
|
page read and write
|
||
23CD000
|
trusted library allocation
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
13401000
|
trusted library allocation
|
page read and write
|
||
12BD3000
|
trusted library allocation
|
page read and write
|
||
381E000
|
trusted library allocation
|
page read and write
|
||
39DB000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
1336000
|
stack
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
EB0000
|
heap
|
page read and write
|
||
72E000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
3792000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
3BFF000
|
trusted library allocation
|
page read and write
|
||
1B0F3000
|
stack
|
page read and write
|
||
3AEC000
|
trusted library allocation
|
page read and write
|
||
631000
|
heap
|
page read and write
|
||
39D9000
|
trusted library allocation
|
page read and write
|
||
2BC0000
|
heap
|
page execute and read and write
|
||
7FFD9B754000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
7FFD9B9B2000
|
trusted library allocation
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
1D26B000
|
stack
|
page read and write
|
||
7FFD9B895000
|
trusted library allocation
|
page execute and read and write
|
||
1C876000
|
heap
|
page read and write
|
||
12AAD000
|
trusted library allocation
|
page read and write
|
||
3B6D000
|
trusted library allocation
|
page read and write
|
||
1635000
|
heap
|
page read and write
|
||
14064000
|
trusted library allocation
|
page read and write
|
||
C32000
|
heap
|
page read and write
|
||
2A56000
|
trusted library allocation
|
page read and write
|
||
E02000
|
heap
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
231E000
|
stack
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page read and write
|
||
CCD000
|
heap
|
page read and write
|
||
3868000
|
trusted library allocation
|
page read and write
|
||
CA6000
|
heap
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page execute and read and write
|
||
C0F000
|
stack
|
page read and write
|
||
3862000
|
trusted library allocation
|
page read and write
|
||
17CE000
|
stack
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
A81000
|
heap
|
page read and write
|
||
1C3D0000
|
trusted library section
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
18A0000
|
heap
|
page read and write
|
||
7FFD9B9F4000
|
trusted library allocation
|
page read and write
|
||
24DF000
|
stack
|
page read and write
|
||
1C6FE000
|
stack
|
page read and write
|
||
1B744000
|
stack
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
7FFD9B788000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
1E83E000
|
stack
|
page read and write
|
||
12518000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1C402000
|
heap
|
page read and write
|
||
1611000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
7FFD9B917000
|
trusted library allocation
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
385E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
820000
|
heap
|
page read and write
|
||
33E7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
14207000
|
trusted library allocation
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
BD7000
|
heap
|
page read and write
|
||
1C8FE000
|
stack
|
page read and write
|
||
14135000
|
trusted library allocation
|
page read and write
|
||
CBB000
|
heap
|
page read and write
|
||
1BA4E000
|
stack
|
page read and write
|
||
1770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
1B18F000
|
stack
|
page read and write
|
||
7FFD9B7BD000
|
trusted library allocation
|
page execute and read and write
|
||
FFF000
|
stack
|
page read and write
|
||
13333000
|
trusted library allocation
|
page read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
1B350000
|
heap
|
page execute and read and write
|
||
13338000
|
trusted library allocation
|
page read and write
|
||
1C780000
|
heap
|
page read and write
|
||
1622000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page execute and read and write
|
||
38ED000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
7FFD9B902000
|
trusted library allocation
|
page read and write
|
||
129B3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
1B864000
|
stack
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
7FFD9B92E000
|
trusted library allocation
|
page read and write
|
||
1AAD0000
|
trusted library allocation
|
page read and write
|
||
A1F000
|
stack
|
page read and write
|
||
1B652000
|
heap
|
page read and write
|
||
3647000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
2B4D000
|
stack
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
1510000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
346B000
|
trusted library allocation
|
page read and write
|
||
125A8000
|
trusted library allocation
|
page read and write
|
||
13F6000
|
heap
|
page read and write
|
||
1B76E000
|
stack
|
page read and write
|
||
1B440000
|
heap
|
page read and write
|
||
15E1000
|
heap
|
page read and write
|
||
38E7000
|
trusted library allocation
|
page read and write
|
||
1AFD0000
|
heap
|
page execute and read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
EE0000
|
trusted library allocation
|
page read and write
|
||
2648000
|
trusted library allocation
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
1B84B000
|
stack
|
page read and write
|
||
BE2000
|
heap
|
page read and write
|
||
1B590000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page execute and read and write
|
||
1C390000
|
trusted library section
|
page read and write
|
||
1C7E3000
|
heap
|
page read and write
|
||
7B8000
|
heap
|
page read and write
|
||
7FFD9B919000
|
trusted library allocation
|
page read and write
|
||
9E6000
|
stack
|
page read and write
|
||
3471000
|
trusted library allocation
|
page read and write
|
||
7FFD9B925000
|
trusted library allocation
|
page read and write
|
||
161B000
|
heap
|
page read and write
|
||
C22000
|
heap
|
page read and write
|
||
12BD1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page read and write
|
||
370A000
|
trusted library allocation
|
page read and write
|
||
3645000
|
trusted library allocation
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8FE000
|
trusted library allocation
|
page read and write
|
||
582000
|
heap
|
page read and write
|
||
34B5000
|
trusted library allocation
|
page read and write
|
||
13403000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
AC9000
|
heap
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
29AF000
|
stack
|
page read and write
|
||
2A67000
|
trusted library allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
18FE000
|
stack
|
page read and write
|
||
36D3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76B000
|
trusted library allocation
|
page read and write
|
||
BCF000
|
stack
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
535000
|
heap
|
page read and write
|
||
1C2AA000
|
stack
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
13ABD000
|
trusted library allocation
|
page read and write
|
||
1AE2D000
|
stack
|
page read and write
|
||
7FFD9B752000
|
trusted library allocation
|
page read and write
|
||
9DF000
|
heap
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
7FFD9B768000
|
trusted library allocation
|
page read and write
|
||
3C8B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
1C0A4000
|
stack
|
page read and write
|
||
3818000
|
trusted library allocation
|
page read and write
|
||
2370000
|
trusted library allocation
|
page read and write
|
||
1A8AD000
|
stack
|
page read and write
|
||
3AEA000
|
trusted library allocation
|
page read and write
|
||
1C84F000
|
heap
|
page read and write
|
||
ABE000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
34ED000
|
trusted library allocation
|
page read and write
|
||
2A5C000
|
trusted library allocation
|
page read and write
|
||
1ACEE000
|
stack
|
page read and write
|
||
3B77000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
1618000
|
heap
|
page read and write
|
||
153E000
|
heap
|
page read and write
|
||
7FFD9B929000
|
trusted library allocation
|
page read and write
|
||
18A5000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
140CC000
|
trusted library allocation
|
page read and write
|
||
176F000
|
stack
|
page read and write
|
||
8A6000
|
heap
|
page read and write
|
||
3C03000
|
trusted library allocation
|
page read and write
|
||
1C8C7000
|
heap
|
page read and write
|
||
1002000
|
heap
|
page read and write
|
||
3759000
|
trusted library allocation
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
1C33E000
|
heap
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
370D000
|
trusted library allocation
|
page read and write
|
||
2A5F000
|
trusted library allocation
|
page read and write
|
||
1511000
|
heap
|
page read and write
|
||
36C9000
|
trusted library allocation
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
23C7000
|
trusted library allocation
|
page read and write
|
||
29ED000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1C1AE000
|
stack
|
page read and write
|
||
7FFD9B75D000
|
trusted library allocation
|
page execute and read and write
|
||
1C7F7000
|
heap
|
page read and write
|
||
B5F000
|
heap
|
page read and write
|
||
1D270000
|
heap
|
page read and write
|
||
23CA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
21D0000
|
heap
|
page execute and read and write
|
||
2A5C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F7000
|
trusted library allocation
|
page read and write
|
||
1AB2D000
|
stack
|
page read and write
|
||
1C5DA000
|
stack
|
page read and write
|
||
129B1000
|
trusted library allocation
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
125A1000
|
trusted library allocation
|
page read and write
|
||
2657000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
38A9000
|
trusted library allocation
|
page read and write
|
||
1C7BB000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
102F000
|
stack
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
CDD000
|
heap
|
page read and write
|
||
7FFD9B8F9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9F8000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
18AB000
|
heap
|
page read and write
|
||
1C80D000
|
heap
|
page read and write
|
||
1BBA0000
|
trusted library section
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
1AE70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
4F6000
|
stack
|
page read and write
|
||
1C240000
|
heap
|
page read and write
|
||
3798000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
7FFD9B962000
|
trusted library allocation
|
page read and write
|
||
6F6000
|
stack
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
1CBFE000
|
stack
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
39D5000
|
trusted library allocation
|
page read and write
|
||
1C236000
|
stack
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
7FFD9B927000
|
trusted library allocation
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
3C07000
|
trusted library allocation
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
1C82B000
|
heap
|
page read and write
|
||
139AD000
|
trusted library allocation
|
page read and write
|
||
385C000
|
trusted library allocation
|
page read and write
|
||
D08000
|
heap
|
page read and write
|
||
1AFFF000
|
stack
|
page read and write
|
||
264B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
A55000
|
heap
|
page read and write
|
||
2A68000
|
trusted library allocation
|
page read and write
|
||
34AD000
|
trusted library allocation
|
page read and write
|
||
D06000
|
heap
|
page read and write
|
||
1251D000
|
trusted library allocation
|
page read and write
|
||
13083000
|
trusted library allocation
|
page read and write
|
||
13331000
|
trusted library allocation
|
page read and write
|
||
36CD000
|
trusted library allocation
|
page read and write
|
||
1AF4E000
|
stack
|
page read and write
|
||
2A64000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
32C0000
|
heap
|
page read and write
|
||
34B1000
|
trusted library allocation
|
page read and write
|
||
1475000
|
heap
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
1B943000
|
stack
|
page read and write
|
||
24FE000
|
stack
|
page read and write
|
||
23DC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93C000
|
trusted library allocation
|
page read and write
|
||
2B4C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B776000
|
trusted library allocation
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
1B583000
|
stack
|
page read and write
|
||
1308D000
|
trusted library allocation
|
page read and write
|
||
3643000
|
trusted library allocation
|
page read and write
|
||
144A000
|
heap
|
page read and write
|
||
3AF0000
|
trusted library allocation
|
page read and write
|
||
3601000
|
trusted library allocation
|
page read and write
|
||
12513000
|
trusted library allocation
|
page read and write
|
||
33E7000
|
trusted library allocation
|
page read and write
|
||
13408000
|
trusted library allocation
|
page read and write
|
||
1C2AE000
|
heap
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1BDA0000
|
heap
|
page execute and read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
B3C000
|
heap
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
34F7000
|
trusted library allocation
|
page read and write
|
||
10FF000
|
stack
|
page read and write
|
||
A6C000
|
heap
|
page read and write
|
||
125AD000
|
trusted library allocation
|
page read and write
|
||
23B0000
|
trusted library allocation
|
page read and write
|
||
1340D000
|
trusted library allocation
|
page read and write
|
||
B59000
|
heap
|
page read and write
|
||
312C000
|
trusted library allocation
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
74E000
|
heap
|
page read and write
|
||
D0B000
|
heap
|
page read and write
|
||
7FFD9B798000
|
trusted library allocation
|
page read and write
|
||
3536000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
36CB000
|
trusted library allocation
|
page read and write
|
||
1C2F8000
|
heap
|
page read and write
|
||
1C2E1000
|
heap
|
page read and write
|
||
86D000
|
heap
|
page read and write
|
||
1C3B0000
|
heap
|
page read and write
|
||
7FFD9B754000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91E000
|
trusted library allocation
|
page read and write
|
||
142D9000
|
trusted library allocation
|
page read and write
|
||
3BFB000
|
trusted library allocation
|
page read and write
|
||
364B000
|
trusted library allocation
|
page read and write
|
||
1391000
|
heap
|
page read and write
|
||
15DC000
|
heap
|
page read and write
|
||
34AB000
|
trusted library allocation
|
page read and write
|
||
5BC000
|
heap
|
page read and write
|
||
2B58000
|
trusted library allocation
|
page read and write
|
||
2A59000
|
trusted library allocation
|
page read and write
|
||
132DD000
|
trusted library allocation
|
page read and write
|
||
39DF000
|
trusted library allocation
|
page read and write
|
||
1541000
|
heap
|
page read and write
|
||
1C40E000
|
stack
|
page read and write
|
||
1BDAE000
|
stack
|
page read and write
|
||
3AE4000
|
trusted library allocation
|
page read and write
|
||
1C620000
|
trusted library section
|
page read and write
|
||
7FFD9B8A5000
|
trusted library allocation
|
page execute and read and write
|
||
1C7B4000
|
heap
|
page read and write
|
||
30F8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
1526000
|
heap
|
page read and write
|
||
1BBC0000
|
trusted library section
|
page read and write
|
||
74C000
|
heap
|
page read and write
|
||
129BD000
|
trusted library allocation
|
page read and write
|
||
2750000
|
heap
|
page execute and read and write
|
||
12BD8000
|
trusted library allocation
|
page read and write
|
||
2A5F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B955000
|
trusted library allocation
|
page read and write
|
||
1516000
|
heap
|
page read and write
|
||
637000
|
heap
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
28A0000
|
heap
|
page execute and read and write
|
||
33EB000
|
trusted library allocation
|
page read and write
|
||
141D9000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
143E000
|
heap
|
page read and write
|
||
B9E000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
1459000
|
heap
|
page read and write
|
||
7FFD9B929000
|
trusted library allocation
|
page read and write
|
||
1356000
|
heap
|
page read and write
|
||
17E0000
|
heap
|
page read and write
|
||
CB3000
|
heap
|
page read and write
|
||
12511000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
606000
|
heap
|
page read and write
|
||
D4D000
|
heap
|
page read and write
|
||
1B48E000
|
stack
|
page read and write
|
||
7FFD9B7AC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B917000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
3866000
|
trusted library allocation
|
page read and write
|
||
1C6FF000
|
stack
|
page read and write
|
||
11C6000
|
stack
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
F02000
|
heap
|
page read and write
|
||
A99000
|
heap
|
page read and write
|
||
2500000
|
heap
|
page execute and read and write
|
||
1B38E000
|
stack
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
1441000
|
heap
|
page read and write
|
||
38AB000
|
trusted library allocation
|
page read and write
|
||
255E000
|
stack
|
page read and write
|
||
394C000
|
trusted library allocation
|
page read and write
|
||
1BA4E000
|
stack
|
page read and write
|
||
1B96E000
|
stack
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
1410000
|
heap
|
page read and write
|
||
13BC000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
1456000
|
heap
|
page read and write
|
||
1333D000
|
trusted library allocation
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
1790000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
37DE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
389F000
|
trusted library allocation
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page execute and read and write
|
||
129BD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B752000
|
trusted library allocation
|
page read and write
|
||
12503000
|
trusted library allocation
|
page read and write
|
||
7B4000
|
heap
|
page read and write
|
||
A32000
|
heap
|
page read and write
|
||
1C103000
|
stack
|
page read and write
|
||
CBF000
|
heap
|
page read and write
|
||
394A000
|
trusted library allocation
|
page read and write
|
||
1B483000
|
stack
|
page read and write
|
||
13F9000
|
heap
|
page read and write
|
||
7FFD9B8A5000
|
trusted library allocation
|
page execute and read and write
|
||
364F000
|
trusted library allocation
|
page read and write
|
||
12321000
|
trusted library allocation
|
page read and write
|
||
3796000
|
trusted library allocation
|
page read and write
|
||
3944000
|
trusted library allocation
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
3534000
|
trusted library allocation
|
page read and write
|
||
28AF000
|
stack
|
page read and write
|
||
13E98000
|
trusted library allocation
|
page read and write
|
||
8AE000
|
stack
|
page read and write
|
||
1C3A0000
|
trusted library section
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A5000
|
trusted library allocation
|
page execute and read and write
|
||
5B0000
|
heap
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
1C7C6000
|
heap
|
page read and write
|
||
1C7FE000
|
stack
|
page read and write
|
||
1C831000
|
heap
|
page read and write
|
||
34EF000
|
trusted library allocation
|
page read and write
|
||
1AF6E000
|
stack
|
page read and write
|
||
34F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
1C822000
|
heap
|
page read and write
|
||
14FE000
|
heap
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
2B52000
|
trusted library allocation
|
page read and write
|
||
147E000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
1C7FF000
|
stack
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page read and write
|
||
13FFB000
|
trusted library allocation
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
1C20E000
|
stack
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
23A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
1AF3D000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
3824000
|
trusted library allocation
|
page read and write
|
||
A8B000
|
heap
|
page read and write
|
||
1C30E000
|
stack
|
page read and write
|
||
1BE3E000
|
stack
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page read and write
|
||
1B58B000
|
stack
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
A38000
|
heap
|
page read and write
|
||
264E000
|
trusted library allocation
|
page read and write
|
||
34A8000
|
trusted library allocation
|
page read and write
|
||
1B8BD000
|
stack
|
page read and write
|
||
1CCFE000
|
stack
|
page read and write
|
||
A46000
|
heap
|
page read and write
|
||
3C81000
|
trusted library allocation
|
page read and write
|
||
7FFD9B895000
|
trusted library allocation
|
page execute and read and write
|
||
3603000
|
trusted library allocation
|
page read and write
|
||
23D6000
|
trusted library allocation
|
page read and write
|
||
73B000
|
heap
|
page read and write
|
||
3A67000
|
trusted library allocation
|
page read and write
|
||
25A9000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
1C3C0000
|
trusted library section
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page execute and read and write
|
||
C07000
|
heap
|
page read and write
|
||
37D6000
|
trusted library allocation
|
page read and write
|
||
1B030000
|
heap
|
page read and write
|
||
35FB000
|
trusted library allocation
|
page read and write
|
||
1D13E000
|
stack
|
page read and write
|
||
87B000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
3C92000
|
trusted library allocation
|
page read and write
|
||
1AA8D000
|
stack
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
13081000
|
trusted library allocation
|
page read and write
|
||
586000
|
stack
|
page read and write
|
||
35F7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page read and write
|
||
37D8000
|
trusted library allocation
|
page read and write
|
||
2A65000
|
trusted library allocation
|
page read and write
|
||
3431000
|
trusted library allocation
|
page read and write
|
||
1BD30000
|
heap
|
page read and write
|
||
23D9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
1AE40000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
1C867000
|
heap
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page read and write
|
||
1C83B000
|
heap
|
page read and write
|
||
1D03D000
|
stack
|
page read and write
|
||
7FFD9B7BB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B756000
|
trusted library allocation
|
page read and write
|
||
3755000
|
trusted library allocation
|
page read and write
|
||
779000
|
heap
|
page read and write
|
||
1B54E000
|
stack
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
1B244000
|
stack
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
1810000
|
trusted library allocation
|
page read and write
|
||
1B334000
|
stack
|
page read and write
|
||
1C8F3000
|
stack
|
page read and write
|
||
13EF000
|
heap
|
page read and write
|
||
25DD000
|
trusted library allocation
|
page read and write
|
||
2651000
|
trusted library allocation
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
1514000
|
heap
|
page read and write
|
||
38A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
55C000
|
heap
|
page read and write
|
||
129B8000
|
trusted library allocation
|
page read and write
|
||
38A7000
|
trusted library allocation
|
page read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
1B56E000
|
stack
|
page read and write
|
||
1BC10000
|
trusted library section
|
page read and write
|
||
1C3B0000
|
trusted library section
|
page read and write
|
||
14F4000
|
heap
|
page read and write
|
||
1A540000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
EC0000
|
unkown
|
page readonly
|
||
1336000
|
stack
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
147A000
|
heap
|
page read and write
|
||
1B23E000
|
stack
|
page read and write
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
34F9000
|
trusted library allocation
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
1AE1E000
|
stack
|
page read and write
|
||
592000
|
heap
|
page read and write
|
||
3712000
|
trusted library allocation
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
3BFD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B875000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B929000
|
trusted library allocation
|
page read and write
|
||
34F5000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
353C000
|
trusted library allocation
|
page read and write
|
||
1C4DA000
|
stack
|
page read and write
|
||
CF6000
|
heap
|
page read and write
|
||
35B5000
|
trusted library allocation
|
page read and write
|
||
3AE8000
|
trusted library allocation
|
page read and write
|
||
1547000
|
heap
|
page read and write
|
||
7FFD9B7A3000
|
trusted library allocation
|
page read and write
|
||
2A56000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9D6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
3070000
|
heap
|
page read and write
|
||
C2D000
|
heap
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1BE93000
|
stack
|
page read and write
|
||
1C502000
|
heap
|
page execute and read and write
|
||
556000
|
heap
|
page read and write
|
||
7FFD9B927000
|
trusted library allocation
|
page read and write
|
||
342E000
|
trusted library allocation
|
page read and write
|
||
2654000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
1C78F000
|
heap
|
page read and write
|
||
37D4000
|
trusted library allocation
|
page read and write
|
||
AC7000
|
heap
|
page read and write
|
||
C26000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
343C000
|
trusted library allocation
|
page read and write
|
||
B53000
|
heap
|
page read and write
|
||
14D6000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
1B64F000
|
stack
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B753000
|
trusted library allocation
|
page execute and read and write
|
||
3794000
|
trusted library allocation
|
page read and write
|
||
357F000
|
trusted library allocation
|
page read and write
|
||
1C89D000
|
heap
|
page read and write
|
||
1C630000
|
trusted library section
|
page read and write
|
||
74A000
|
heap
|
page read and write
|
||
740000
|
trusted library allocation
|
page read and write
|
||
B02000
|
heap
|
page read and write
|
||
33E4000
|
trusted library allocation
|
page read and write
|
||
36D1000
|
trusted library allocation
|
page read and write
|
||
3C01000
|
trusted library allocation
|
page read and write
|
||
C44000
|
heap
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
35F9000
|
trusted library allocation
|
page read and write
|
||
1B360000
|
trusted library allocation
|
page read and write
|
||
1BBD0000
|
trusted library section
|
page read and write
|
||
17D0000
|
trusted library allocation
|
page read and write
|
||
36CF000
|
trusted library allocation
|
page read and write
|
||
23D0000
|
trusted library allocation
|
page read and write
|
||
2440000
|
trusted library allocation
|
page read and write
|
||
18E0000
|
trusted library allocation
|
page read and write
|
||
394E000
|
trusted library allocation
|
page read and write
|
||
1CE02000
|
heap
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
AFE000
|
heap
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
112E000
|
stack
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
129B1000
|
trusted library allocation
|
page read and write
|
||
1900000
|
heap
|
page execute and read and write
|
||
17C5000
|
heap
|
page read and write
|
||
7FFD9B917000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
AC5000
|
heap
|
page read and write
|
||
13A56000
|
trusted library allocation
|
page read and write
|
||
B36000
|
heap
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1B68E000
|
stack
|
page read and write
|
||
12AA3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B937000
|
trusted library allocation
|
page read and write
|
||
3753000
|
trusted library allocation
|
page read and write
|
||
1BF0E000
|
stack
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
5BE000
|
heap
|
page read and write
|
||
1BC00000
|
trusted library section
|
page read and write
|
||
165C000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page execute and read and write
|
||
139F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
1C09E000
|
stack
|
page read and write
|
||
1840000
|
trusted library allocation
|
page read and write
|
There are 1138 hidden memdumps, click here to show them.