Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
13ZNp2xvRU.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Google\Update\RRVGfHJzvQMYfWe.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Java\RRVGfHJzvQMYfWe.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\smartscreen.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\RRVGfHJzvQMYfWe.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\PLA\Templates\RRVGfHJzvQMYfWe.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Panther\setup.exe\fontdrvhost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\twain_32\Registry.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Google\Update\4ed18479ee5d61
|
ASCII text, with very long lines (949), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\Google\Update\RRVGfHJzvQMYfWe.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Java\4ed18479ee5d61
|
ASCII text, with very long lines (682), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\Java\RRVGfHJzvQMYfWe.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\2afe4ed40d5a86
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\smartscreen.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Recovery\4ed18479ee5d61
|
ASCII text, with very long lines (992), with no line terminators
|
dropped
|
||
C:\Recovery\RRVGfHJzvQMYfWe.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\13ZNp2xvRU.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RRVGfHJzvQMYfWe.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Registry.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\UserOOBEBroker.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fontdrvhost.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\smartscreen.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\IME\IMETC\HELP\7ccfebd9e92364
|
ASCII text, with very long lines (810), with no line terminators
|
dropped
|
||
C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\PLA\Templates\4ed18479ee5d61
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\PLA\Templates\RRVGfHJzvQMYfWe.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Panther\setup.exe\5b884080fd4f94
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\Panther\setup.exe\fontdrvhost.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\twain_32\Registry.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\twain_32\ee2ad38f3d4382
|
ASCII text, with no line terminators
|
dropped
|
There are 21 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\13ZNp2xvRU.exe
|
"C:\Users\user\Desktop\13ZNp2xvRU.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 6 /tr "'C:\Recovery\RRVGfHJzvQMYfWe.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RRVGfHJzvQMYfWe" /sc ONLOGON /tr "'C:\Recovery\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 7 /tr "'C:\Recovery\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Windows\twain_32\Registry.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Windows\twain_32\Registry.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 6 /tr "'C:\Windows\twain_32\Registry.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "smartscreens" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\smartscreen.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "smartscreen" /sc ONLOGON /tr "'C:\Users\All Users\smartscreen.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "smartscreens" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\smartscreen.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 12 /tr "'C:\Windows\PLA\Templates\RRVGfHJzvQMYfWe.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RRVGfHJzvQMYfWe" /sc ONLOGON /tr "'C:\Windows\PLA\Templates\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 10 /tr "'C:\Windows\PLA\Templates\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\google\Update\RRVGfHJzvQMYfWe.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RRVGfHJzvQMYfWe" /sc ONLOGON /tr "'C:\Program Files (x86)\google\Update\RRVGfHJzvQMYfWe.exe'" /rl
HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\google\Update\RRVGfHJzvQMYfWe.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "UserOOBEBrokerU" /sc MINUTE /mo 6 /tr "'C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "UserOOBEBroker" /sc ONLOGON /tr "'C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "UserOOBEBrokerU" /sc MINUTE /mo 12 /tr "'C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe'" /rl HIGHEST
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 10 /tr "'C:\Recovery\RRVGfHJzvQMYfWe.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RRVGfHJzvQMYfWe" /sc ONLOGON /tr "'C:\Recovery\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 14 /tr "'C:\Recovery\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\java\RRVGfHJzvQMYfWe.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RRVGfHJzvQMYfWe" /sc ONLOGON /tr "'C:\Program Files (x86)\java\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RRVGfHJzvQMYfWeR" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\java\RRVGfHJzvQMYfWe.exe'" /rl HIGHEST
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Windows\Panther\setup.exe\fontdrvhost.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Windows\Panther\setup.exe\fontdrvhost.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Windows\Panther\setup.exe\fontdrvhost.exe'" /rl HIGHEST
/f
|
||
C:\Program Files (x86)\Google\Update\RRVGfHJzvQMYfWe.exe
|
"C:\Program Files (x86)\google\Update\RRVGfHJzvQMYfWe.exe"
|
||
C:\Windows\Panther\setup.exe\fontdrvhost.exe
|
C:\Windows\Panther\setup.exe\fontdrvhost.exe
|
||
C:\Windows\Panther\setup.exe\fontdrvhost.exe
|
C:\Windows\Panther\setup.exe\fontdrvhost.exe
|
||
C:\Windows\twain_32\Registry.exe
|
C:\Windows\twain_32\Registry.exe
|
||
C:\Windows\twain_32\Registry.exe
|
C:\Windows\twain_32\Registry.exe
|
||
C:\Program Files (x86)\Java\RRVGfHJzvQMYfWe.exe
|
"C:\Program Files (x86)\java\RRVGfHJzvQMYfWe.exe"
|
||
C:\Program Files (x86)\Java\RRVGfHJzvQMYfWe.exe
|
"C:\Program Files (x86)\java\RRVGfHJzvQMYfWe.exe"
|
||
C:\ProgramData\smartscreen.exe
|
"C:\Users\All Users\smartscreen.exe"
|
||
C:\ProgramData\smartscreen.exe
|
"C:\Users\All Users\smartscreen.exe"
|
||
C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe
|
C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe
|
||
C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe
|
C:\Windows\IME\IMETC\HELP\UserOOBEBroker.exe
|
There are 29 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://45.130.42.16/6/api144/9Wp/
|
unknown
|
||
http://45.130.42.16
|
unknown
|
||
http://45.130.42.16/6/api144/9Wp/@0xWdhZWZkRWYvx2ZpJUdwNWb2V2Zh1WS
|
|||
http://45.130.42.16/upload/resize_cache/bitlate_proshop/e2e/968_503_1/9w9p11chf5twz88a77wq28ajd28u8b
|
unknown
|
||
http://45.130.42.16/6/api144/9Wp/ImagevmcpuBigloaddefault.php?MCq8kxznRpE60jYE6i=lG5zicKtIWeAP&wK0sd
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.130.42.16
|
unknown
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\a2308a5fb7cb542ba94f40ef8d7e7d23fb64f0d0
|
0d5c896f05c6dc460e3ebc77c5fa5625e2a6754e
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RRVGfHJzvQMYfWe_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3251000
|
trusted library allocation
|
page read and write
|
||
2C41000
|
trusted library allocation
|
page read and write
|
||
2D91000
|
trusted library allocation
|
page read and write
|
||
2C0E000
|
trusted library allocation
|
page read and write
|
||
2CA7000
|
trusted library allocation
|
page read and write
|
||
2BC1000
|
trusted library allocation
|
page read and write
|
||
2DD8000
|
trusted library allocation
|
page read and write
|
||
2681000
|
trusted library allocation
|
page read and write
|
||
28A8000
|
trusted library allocation
|
page read and write
|
||
252D000
|
trusted library allocation
|
page read and write
|
||
2381000
|
trusted library allocation
|
page read and write
|
||
2C81000
|
trusted library allocation
|
page read and write
|
||
24E1000
|
trusted library allocation
|
page read and write
|
||
23D2000
|
trusted library allocation
|
page read and write
|
||
26C8000
|
trusted library allocation
|
page read and write
|
||
2E64000
|
trusted library allocation
|
page read and write
|
||
2481000
|
trusted library allocation
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
2B51000
|
trusted library allocation
|
page read and write
|
||
23CB000
|
trusted library allocation
|
page read and write
|
||
2D41000
|
trusted library allocation
|
page read and write
|
||
7FFD9B953000
|
trusted library allocation
|
page read and write
|
||
1B66E000
|
stack
|
page read and write
|
||
13253000
|
trusted library allocation
|
page read and write
|
||
1B64E000
|
stack
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
7FFD9B787000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
1BAF0000
|
heap
|
page read and write
|
||
6D6000
|
heap
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
F93000
|
heap
|
page read and write
|
||
7FFD9B78C000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page execute and read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
10F6000
|
stack
|
page read and write
|
||
13251000
|
trusted library allocation
|
page read and write
|
||
7FFD9B75D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
7FFD9B941000
|
trusted library allocation
|
page read and write
|
||
FC5000
|
heap
|
page read and write
|
||
1AA6E000
|
stack
|
page read and write
|
||
1BB00000
|
heap
|
page read and write
|
||
2A70000
|
heap
|
page execute and read and write
|
||
ABB000
|
heap
|
page read and write
|
||
7FFD9B89F000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8FC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AC000
|
trusted library allocation
|
page execute and read and write
|
||
9C0000
|
heap
|
page read and write
|
||
7FFD9B896000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8FE000
|
trusted library allocation
|
page read and write
|
||
F5F000
|
heap
|
page read and write
|
||
1B77E000
|
stack
|
page read and write
|
||
FC2000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
1BD56000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
1BD13000
|
stack
|
page read and write
|
||
1B14D000
|
stack
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
2543000
|
trusted library allocation
|
page read and write
|
||
3D5000
|
heap
|
page read and write
|
||
1BA73000
|
stack
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
2CCB000
|
trusted library allocation
|
page read and write
|
||
2CA5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AC000
|
trusted library allocation
|
page read and write
|
||
12FD000
|
heap
|
page read and write
|
||
F8B000
|
heap
|
page read and write
|
||
2560000
|
heap
|
page read and write
|
||
B33000
|
heap
|
page read and write
|
||
1B6A0000
|
heap
|
page read and write
|
||
1BABC000
|
heap
|
page read and write
|
||
7FFD9B931000
|
trusted library allocation
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
1B9DF000
|
stack
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
1ACB0000
|
trusted library allocation
|
page read and write
|
||
1BE00000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
12C0000
|
heap
|
page read and write
|
||
109C000
|
heap
|
page read and write
|
||
CC5000
|
heap
|
page read and write
|
||
7FFD9B913000
|
trusted library allocation
|
page read and write
|
||
12BC8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
2D55000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
1BC0B000
|
heap
|
page read and write
|
||
12BCD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
2546000
|
trusted library allocation
|
page read and write
|
||
17F5000
|
heap
|
page read and write
|
||
E35000
|
heap
|
page read and write
|
||
1B91F000
|
stack
|
page read and write
|
||
FB6000
|
heap
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
B36000
|
heap
|
page read and write
|
||
1ADE0000
|
heap
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76C000
|
trusted library allocation
|
page read and write
|
||
1AC0D000
|
stack
|
page read and write
|
||
1AE70000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
2E50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B94B000
|
trusted library allocation
|
page read and write
|
||
FDF000
|
heap
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page read and write
|
||
124F000
|
stack
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page read and write
|
||
1018000
|
heap
|
page read and write
|
||
1A3B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
1260000
|
heap
|
page read and write
|
||
2C67000
|
trusted library allocation
|
page read and write
|
||
1B07F000
|
stack
|
page read and write
|
||
1B6D0000
|
heap
|
page execute and read and write
|
||
B95000
|
heap
|
page read and write
|
||
1BA9E000
|
stack
|
page read and write
|
||
7FFD9B87A000
|
trusted library allocation
|
page execute and read and write
|
||
1BB8E000
|
stack
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
13C5000
|
heap
|
page read and write
|
||
1B060000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
1B01E000
|
stack
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
1B87E000
|
stack
|
page read and write
|
||
ACB000
|
heap
|
page read and write
|
||
2CA6000
|
trusted library allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1B570000
|
heap
|
page read and write
|
||
7FFD9B89F000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
1425000
|
heap
|
page read and write
|
||
7FFD9B896000
|
trusted library allocation
|
page execute and read and write
|
||
1BC36000
|
heap
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page execute and read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
930000
|
heap
|
page read and write
|
||
762000
|
unkown
|
page readonly
|
||
7FFD9B8A1000
|
trusted library allocation
|
page execute and read and write
|
||
11E0000
|
heap
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page execute and read and write
|
||
F6D000
|
heap
|
page read and write
|
||
7FFD9B934000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
1BD17000
|
heap
|
page read and write
|
||
1AE1D000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
1BC81000
|
heap
|
page read and write
|
||
ACD000
|
heap
|
page read and write
|
||
1BBF7000
|
heap
|
page read and write
|
||
1B590000
|
heap
|
page read and write
|
||
2E53000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93B000
|
trusted library allocation
|
page read and write
|
||
2951000
|
trusted library allocation
|
page read and write
|
||
7FFD9B891000
|
trusted library allocation
|
page execute and read and write
|
||
28EB000
|
trusted library allocation
|
page read and write
|
||
1B184000
|
stack
|
page read and write
|
||
1BCE4000
|
heap
|
page read and write
|
||
1B97E000
|
stack
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
870000
|
trusted library allocation
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
12898000
|
trusted library allocation
|
page read and write
|
||
BE6000
|
heap
|
page read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
D5F000
|
stack
|
page read and write
|
||
237E000
|
stack
|
page read and write
|
||
2C5F000
|
trusted library allocation
|
page read and write
|
||
EF6000
|
stack
|
page read and write
|
||
12D98000
|
trusted library allocation
|
page read and write
|
||
12E5000
|
heap
|
page read and write
|
||
1BB3D000
|
heap
|
page read and write
|
||
1BBA0000
|
heap
|
page read and write
|
||
1B48E000
|
stack
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1B08E000
|
stack
|
page read and write
|
||
1B1BE000
|
stack
|
page read and write
|
||
7FFD9B787000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
heap
|
page execute and read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
119F000
|
stack
|
page read and write
|
||
7FFD9B896000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B806000
|
trusted library allocation
|
page read and write
|
||
7FFD9B777000
|
trusted library allocation
|
page read and write
|
||
7FFD9B913000
|
trusted library allocation
|
page read and write
|
||
1BD80000
|
heap
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B75D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B89A000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B91A000
|
trusted library allocation
|
page read and write
|
||
1C09E000
|
stack
|
page read and write
|
||
2B9E000
|
trusted library allocation
|
page read and write
|
||
12D9D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page read and write
|
||
DB3000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
70F000
|
heap
|
page read and write
|
||
124E3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B916000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
7FFD9B8FC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
2D3F000
|
trusted library allocation
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page execute and read and write
|
||
2C70000
|
heap
|
page execute and read and write
|
||
2250000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1B650000
|
heap
|
page execute and read and write
|
||
103C000
|
heap
|
page read and write
|
||
1BB12000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page execute and read and write
|
||
12B51000
|
trusted library allocation
|
page read and write
|
||
7FFD9B89A000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B89A000
|
trusted library allocation
|
page execute and read and write
|
||
12D48000
|
trusted library allocation
|
page read and write
|
||
28A5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
1C19E000
|
stack
|
page read and write
|
||
1BC1B000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
800000
|
trusted library allocation
|
page read and write
|
||
AB5000
|
heap
|
page read and write
|
||
2270000
|
heap
|
page execute and read and write
|
||
1B670000
|
heap
|
page execute and read and write
|
||
1BA84000
|
stack
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B957000
|
trusted library allocation
|
page read and write
|
||
12D91000
|
trusted library allocation
|
page read and write
|
||
24CF000
|
stack
|
page read and write
|
||
7FFD9B951000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
F58000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
1BBD4000
|
stack
|
page read and write
|
||
690000
|
unkown
|
page readonly
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
2470000
|
heap
|
page execute and read and write
|
||
7FFD9B787000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B926000
|
trusted library allocation
|
page read and write
|
||
12BC1000
|
trusted library allocation
|
page read and write
|
||
DDF000
|
heap
|
page read and write
|
||
F15000
|
heap
|
page read and write
|
||
986000
|
heap
|
page read and write
|
||
7FFD9B913000
|
trusted library allocation
|
page read and write
|
||
2DEB000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
1B61E000
|
stack
|
page read and write
|
||
2D34000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
1AD4E000
|
stack
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
1BB42000
|
heap
|
page read and write
|
||
1AD70000
|
trusted library allocation
|
page read and write
|
||
6A5000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
1065000
|
heap
|
page read and write
|
||
1B310000
|
heap
|
page read and write
|
||
1C29D000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
28ED000
|
trusted library allocation
|
page read and write
|
||
2E59000
|
trusted library allocation
|
page read and write
|
||
1238D000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
1A90C000
|
stack
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
1BCD3000
|
heap
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91E000
|
trusted library allocation
|
page read and write
|
||
2480000
|
trusted library allocation
|
page read and write
|
||
1B9F0000
|
heap
|
page execute and read and write
|
||
10D8000
|
heap
|
page read and write
|
||
79B000
|
heap
|
page read and write
|
||
12688000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
281E000
|
stack
|
page read and write
|
||
2B40000
|
heap
|
page execute and read and write
|
||
C09000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
1BB81000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
2670000
|
heap
|
page execute and read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
2CB9000
|
trusted library allocation
|
page read and write
|
||
1B213000
|
stack
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
1B283000
|
stack
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
16BF000
|
stack
|
page read and write
|
||
1392000
|
heap
|
page read and write
|
||
12D93000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B89A000
|
trusted library allocation
|
page execute and read and write
|
||
10DD000
|
heap
|
page read and write
|
||
DE2000
|
heap
|
page read and write
|
||
12D41000
|
trusted library allocation
|
page read and write
|
||
D9F000
|
heap
|
page read and write
|
||
2A10000
|
heap
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
BEC000
|
heap
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
610000
|
heap
|
page read and write
|
||
1A4B0000
|
trusted library allocation
|
page read and write
|
||
DA1000
|
heap
|
page read and write
|
||
24A0000
|
heap
|
page execute and read and write
|
||
7FFD9B937000
|
trusted library allocation
|
page read and write
|
||
1B894000
|
stack
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
849000
|
heap
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
6FA000
|
heap
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
1B0DC000
|
stack
|
page read and write
|
||
1BB7E000
|
stack
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
7FFD9B7A3000
|
trusted library allocation
|
page read and write
|
||
2CE4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
73F000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
124E8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page read and write
|
||
1B38E000
|
stack
|
page read and write
|
||
7FFD9B958000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77C000
|
trusted library allocation
|
page read and write
|
||
EF6000
|
stack
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
7FFD9B79C000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B90E000
|
trusted library allocation
|
page read and write
|
||
2957000
|
trusted library allocation
|
page read and write
|
||
1295000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B933000
|
trusted library allocation
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
114F000
|
stack
|
page read and write
|
||
F96000
|
heap
|
page read and write
|
||
1BBDE000
|
heap
|
page read and write
|
||
7FFD9B752000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
625000
|
heap
|
page read and write
|
||
2555000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
1080000
|
heap
|
page read and write
|
||
1BC61000
|
heap
|
page read and write
|
||
7FFD9B943000
|
trusted library allocation
|
page read and write
|
||
1B69E000
|
stack
|
page read and write
|
||
7FFD9B896000
|
trusted library allocation
|
page execute and read and write
|
||
101F000
|
heap
|
page read and write
|
||
A25000
|
heap
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
2DB8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
1A510000
|
trusted library allocation
|
page read and write
|
||
1B17F000
|
stack
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
28D9000
|
trusted library allocation
|
page read and write
|
||
A34000
|
heap
|
page read and write
|
||
1B79E000
|
stack
|
page read and write
|
||
628000
|
heap
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
FBF000
|
heap
|
page read and write
|
||
D36000
|
stack
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page read and write
|
||
7FFD9B89F000
|
trusted library allocation
|
page execute and read and write
|
||
1BB5E000
|
stack
|
page read and write
|
||
1AF80000
|
heap
|
page execute and read and write
|
||
1BC5E000
|
stack
|
page read and write
|
||
1BC60000
|
heap
|
page read and write
|
||
7FFD9B7A4000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
2E03000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
7FFD9B923000
|
trusted library allocation
|
page read and write
|
||
DB1000
|
heap
|
page read and write
|
||
5F6000
|
stack
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
1BC4F000
|
heap
|
page read and write
|
||
7FFD9B951000
|
trusted library allocation
|
page read and write
|
||
5AE000
|
heap
|
page read and write
|
||
C1F000
|
heap
|
page read and write
|
||
7FFD9B90B000
|
trusted library allocation
|
page read and write
|
||
F7B000
|
heap
|
page read and write
|
||
86B000
|
heap
|
page read and write
|
||
12C83000
|
trusted library allocation
|
page read and write
|
||
2D45000
|
trusted library allocation
|
page read and write
|
||
1B16F000
|
stack
|
page read and write
|
||
2D20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
12E8000
|
heap
|
page read and write
|
||
1BC7E000
|
stack
|
page read and write
|
||
1C053000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
776000
|
stack
|
page read and write
|
||
1BCAD000
|
heap
|
page read and write
|
||
7FFD9B91E000
|
trusted library allocation
|
page read and write
|
||
73C000
|
heap
|
page read and write
|
||
136D000
|
heap
|
page read and write
|
||
12C41000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
2D49000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BD000
|
trusted library allocation
|
page execute and read and write
|
||
12FB000
|
heap
|
page read and write
|
||
9C2000
|
heap
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
1AA0D000
|
stack
|
page read and write
|
||
7FFD9B89F000
|
trusted library allocation
|
page execute and read and write
|
||
704000
|
heap
|
page read and write
|
||
98C000
|
heap
|
page read and write
|
||
31DC000
|
stack
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
54C000
|
heap
|
page read and write
|
||
7FFD9B951000
|
trusted library allocation
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A1000
|
trusted library allocation
|
page execute and read and write
|
||
12481000
|
trusted library allocation
|
page read and write
|
||
28FF000
|
stack
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
1210000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
1B91E000
|
stack
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
583000
|
heap
|
page read and write
|
||
9B4000
|
heap
|
page read and write
|
||
1265000
|
heap
|
page read and write
|
||
C8E000
|
heap
|
page read and write
|
||
1BB14000
|
heap
|
page read and write
|
||
695000
|
heap
|
page read and write
|
||
1BD22000
|
heap
|
page read and write
|
||
12681000
|
trusted library allocation
|
page read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
12C8D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
12E5000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
890000
|
trusted library allocation
|
page read and write
|
||
1BC8D000
|
heap
|
page read and write
|
||
DDD000
|
heap
|
page read and write
|
||
12B5D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page execute and read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
7FFD9B91E000
|
trusted library allocation
|
page read and write
|
||
2E38000
|
trusted library allocation
|
page read and write
|
||
12C88000
|
trusted library allocation
|
page read and write
|
||
12383000
|
trusted library allocation
|
page read and write
|
||
9ED000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
A90000
|
heap
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
2C86000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
12C51000
|
trusted library allocation
|
page read and write
|
||
6C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
B61000
|
heap
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
1BCC6000
|
heap
|
page read and write
|
||
7FFD9B913000
|
trusted library allocation
|
page read and write
|
||
7FF4D83A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B951000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
87B000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
B2F000
|
stack
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
1BC84000
|
heap
|
page read and write
|
||
1BB2D000
|
heap
|
page read and write
|
||
1BDE0000
|
heap
|
page read and write
|
||
1B25F000
|
stack
|
page read and write
|
||
1BAA0000
|
heap
|
page read and write
|
||
2E65000
|
trusted library allocation
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
2190000
|
heap
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
1A6B0000
|
trusted library allocation
|
page read and write
|
||
820000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77C000
|
trusted library allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
109E000
|
heap
|
page read and write
|
||
1BC02000
|
heap
|
page read and write
|
||
5FE000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
7FFD9B913000
|
trusted library allocation
|
page read and write
|
||
F38000
|
heap
|
page read and write
|
||
7FFD9B767000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
692000
|
unkown
|
page readonly
|
||
CB8000
|
heap
|
page read and write
|
||
A25000
|
heap
|
page read and write
|
||
2C26000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page read and write
|
||
E25000
|
heap
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page execute and read and write
|
||
E90000
|
heap
|
page read and write
|
||
7FFD9B754000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
2D43000
|
trusted library allocation
|
page read and write
|
||
1B1DD000
|
stack
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
1B11E000
|
stack
|
page read and write
|
||
7FFD9B91C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B944000
|
trusted library allocation
|
page read and write
|
||
7FFD9B80C000
|
trusted library allocation
|
page execute and read and write
|
||
4F6000
|
stack
|
page read and write
|
||
7FFD9B93B000
|
trusted library allocation
|
page read and write
|
||
631000
|
heap
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page read and write
|
||
2D89000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
1BAD3000
|
stack
|
page read and write
|
||
1B7DE000
|
stack
|
page read and write
|
||
D76000
|
heap
|
page read and write
|
||
F20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
C9C000
|
heap
|
page read and write
|
||
2E0E000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
1B31D000
|
stack
|
page read and write
|
||
1BB1F000
|
stack
|
page read and write
|
||
1B51E000
|
stack
|
page read and write
|
||
1BCE9000
|
heap
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
1BCC0000
|
heap
|
page read and write
|
||
7FFD9B926000
|
trusted library allocation
|
page read and write
|
||
11FF000
|
stack
|
page read and write
|
||
865000
|
heap
|
page read and write
|
||
7FFD9B767000
|
trusted library allocation
|
page read and write
|
||
1B993000
|
stack
|
page read and write
|
||
12C8000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
1B51F000
|
stack
|
page read and write
|
||
1BCF2000
|
heap
|
page read and write
|
||
1BBFB000
|
heap
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page execute and read and write
|
||
690000
|
unkown
|
page readonly
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
266E000
|
stack
|
page read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
1B41F000
|
stack
|
page read and write
|
||
1BF9E000
|
stack
|
page read and write
|
||
F5C000
|
heap
|
page read and write
|
||
12C81000
|
trusted library allocation
|
page read and write
|
||
2552000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
1C23B000
|
stack
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
1BB98000
|
heap
|
page read and write
|
||
1BAA8000
|
heap
|
page read and write
|
||
2D46000
|
trusted library allocation
|
page read and write
|
||
10A1000
|
heap
|
page read and write
|
||
1B363000
|
stack
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
FFB000
|
heap
|
page read and write
|
||
2D2C000
|
trusted library allocation
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
2891000
|
trusted library allocation
|
page read and write
|
||
12483000
|
trusted library allocation
|
page read and write
|
||
1A8C0000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
trusted library allocation
|
page read and write
|
||
14BE000
|
stack
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
7FFD9B896000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B89F000
|
trusted library allocation
|
page execute and read and write
|
||
DA5000
|
heap
|
page read and write
|
||
1B75E000
|
stack
|
page read and write
|
||
8E3000
|
heap
|
page read and write
|
||
D7C000
|
heap
|
page read and write
|
||
1B5A0000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
FB0000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B933000
|
trusted library allocation
|
page read and write
|
||
12BC3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B89A000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B787000
|
trusted library allocation
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
670000
|
trusted library allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
7FFD9B88A000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B937000
|
trusted library allocation
|
page read and write
|
||
12B58000
|
trusted library allocation
|
page read and write
|
||
1BAC5000
|
heap
|
page read and write
|
||
2D64000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
7FFD9B7BB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B76C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page execute and read and write
|
||
A42000
|
heap
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A1000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B776000
|
trusted library allocation
|
page read and write
|
||
7FFD9B806000
|
trusted library allocation
|
page read and write
|
||
12C4D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78C000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
1BC78000
|
heap
|
page read and write
|
||
15B5000
|
heap
|
page read and write
|
||
2540000
|
trusted library allocation
|
page read and write
|
||
12D4D000
|
trusted library allocation
|
page read and write
|
||
1B8DF000
|
stack
|
page read and write
|
||
1BDEA000
|
heap
|
page read and write
|
||
F5E000
|
stack
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
1BB8D000
|
heap
|
page read and write
|
||
FD1000
|
heap
|
page read and write
|
||
2BB4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
1BF5E000
|
stack
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
B7F000
|
stack
|
page read and write
|
||
73A000
|
heap
|
page read and write
|
||
1B98E000
|
stack
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7FFD9B91E000
|
trusted library allocation
|
page read and write
|
||
1BC93000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
1329000
|
heap
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B933000
|
trusted library allocation
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page read and write
|
||
2D52000
|
trusted library allocation
|
page read and write
|
||
1248D000
|
trusted library allocation
|
page read and write
|
||
1B57E000
|
stack
|
page read and write
|
||
5E7000
|
heap
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
122F000
|
stack
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
1B810000
|
heap
|
page execute and read and write
|
||
8A6000
|
heap
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
1BD83000
|
stack
|
page read and write
|
||
571000
|
heap
|
page read and write
|
||
2C90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91C000
|
trusted library allocation
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
7FFD9B933000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
274E000
|
trusted library allocation
|
page read and write
|
||
1B373000
|
stack
|
page read and write
|
||
D9B000
|
heap
|
page read and write
|
||
2D4C000
|
trusted library allocation
|
page read and write
|
||
AB9000
|
heap
|
page read and write
|
||
907000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
7FFD9B776000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
1B47E000
|
stack
|
page read and write
|
||
586000
|
heap
|
page read and write
|
||
1BA50000
|
heap
|
page read and write
|
||
12891000
|
trusted library allocation
|
page read and write
|
||
1B274000
|
stack
|
page read and write
|
||
7FFD9B881000
|
trusted library allocation
|
page execute and read and write
|
||
690000
|
heap
|
page read and write
|
||
114F000
|
stack
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
1BA51000
|
stack
|
page read and write
|
||
7FFD9B7A7000
|
trusted library allocation
|
page read and write
|
||
1BBC6000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
7FFD9B753000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
6DC000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B926000
|
trusted library allocation
|
page read and write
|
||
1B85E000
|
stack
|
page read and write
|
||
80F000
|
stack
|
page read and write
|
||
1BBB4000
|
heap
|
page read and write
|
||
107F000
|
stack
|
page read and write
|
||
12683000
|
trusted library allocation
|
page read and write
|
||
1BD7E000
|
stack
|
page read and write
|
||
1BADB000
|
heap
|
page read and write
|
||
7FFD9B91A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
AF6000
|
heap
|
page read and write
|
||
7FFD9B906000
|
trusted library allocation
|
page read and write
|
||
C4C000
|
heap
|
page read and write
|
||
1B75E000
|
stack
|
page read and write
|
||
7FFD9B92C000
|
trusted library allocation
|
page read and write
|
||
1268D000
|
trusted library allocation
|
page read and write
|
||
17BE000
|
stack
|
page read and write
|
||
2440000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
D36000
|
stack
|
page read and write
|
||
2455000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B91E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
12EE000
|
stack
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page execute and read and write
|
||
7FFD9B923000
|
trusted library allocation
|
page read and write
|
||
124ED000
|
trusted library allocation
|
page read and write
|
||
DB7000
|
heap
|
page read and write
|
||
7FFD9B91C000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
254C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91B000
|
trusted library allocation
|
page read and write
|
||
1BB91000
|
heap
|
page read and write
|
||
1C13E000
|
stack
|
page read and write
|
||
C22000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
F69000
|
heap
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
AF8000
|
heap
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
5F4000
|
heap
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
1BBE1000
|
heap
|
page read and write
|
||
1ABF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
D40000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
1BCE2000
|
heap
|
page read and write
|
||
7FFD9B88F000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
7FFD9B797000
|
trusted library allocation
|
page read and write
|
||
2D41000
|
trusted library allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
711000
|
heap
|
page read and write
|
||
FB8000
|
heap
|
page read and write
|
||
7FFD9B91C000
|
trusted library allocation
|
page read and write
|
||
2E5C000
|
trusted library allocation
|
page read and write
|
||
868000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
8A8000
|
heap
|
page read and write
|
||
2DA4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
12C43000
|
trusted library allocation
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
3240000
|
heap
|
page execute and read and write
|
||
D30000
|
heap
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
1BACB000
|
heap
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
2CA3000
|
trusted library allocation
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
2D47000
|
trusted library allocation
|
page read and write
|
||
12488000
|
trusted library allocation
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
F70000
|
heap
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
1BB5F000
|
stack
|
page read and write
|
||
7FFD9B78C000
|
trusted library allocation
|
page read and write
|
||
139F000
|
stack
|
page read and write
|
||
25AF000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
1AB80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
7FFD9B90C000
|
trusted library allocation
|
page read and write
|
||
1036000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page execute and read and write
|
||
4F6000
|
stack
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page read and write
|
||
1325D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page read and write
|
||
13258000
|
trusted library allocation
|
page read and write
|
||
3316000
|
trusted library allocation
|
page read and write
|
||
24C0000
|
trusted library allocation
|
page read and write
|
||
1B2D0000
|
heap
|
page execute and read and write
|
||
1B613000
|
stack
|
page read and write
|
||
F91000
|
heap
|
page read and write
|
||
7FFD9B886000
|
trusted library allocation
|
page execute and read and write
|
||
2D1E000
|
trusted library allocation
|
page read and write
|
||
CDE000
|
heap
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B777000
|
trusted library allocation
|
page read and write
|
||
1B280000
|
trusted library allocation
|
page read and write
|
||
7FFD9B933000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
2443000
|
trusted library allocation
|
page read and write
|
||
F1F000
|
stack
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
2E62000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A1000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7AC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B93C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B777000
|
trusted library allocation
|
page read and write
|
||
1B6AF000
|
stack
|
page read and write
|
||
8F5000
|
heap
|
page read and write
|
||
F8D000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
1C03D000
|
stack
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
1B51E000
|
stack
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1B780000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page execute and read and write
|
||
1C15F000
|
stack
|
page read and write
|
||
1BD32000
|
heap
|
page read and write
|
||
1BCDE000
|
stack
|
page read and write
|
||
1AC70000
|
trusted library allocation
|
page read and write
|
||
1BC1E000
|
stack
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
F50000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
1BAC0000
|
heap
|
page read and write
|
||
124E1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
E40000
|
heap
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page read and write
|
||
7FFD9B926000
|
trusted library allocation
|
page read and write
|
||
F6B000
|
heap
|
page read and write
|
||
1019000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
1BA14000
|
stack
|
page read and write
|
||
2D97000
|
trusted library allocation
|
page read and write
|
||
7FFD9B753000
|
trusted library allocation
|
page execute and read and write
|
||
1B26E000
|
stack
|
page read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
5B1000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page execute and read and write
|
||
D70000
|
heap
|
page read and write
|
||
7FFD9B8A1000
|
trusted library allocation
|
page execute and read and write
|
||
DFE000
|
stack
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
C2F000
|
stack
|
page read and write
|
||
1BC8E000
|
stack
|
page read and write
|
||
C9F000
|
stack
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
650000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1BAD4000
|
heap
|
page read and write
|
||
1B7AF000
|
stack
|
page read and write
|
||
7FFD9B762000
|
trusted library allocation
|
page read and write
|
||
1BC23000
|
heap
|
page read and write
|
||
6F6000
|
stack
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
546000
|
heap
|
page read and write
|
||
12B61000
|
trusted library allocation
|
page read and write
|
||
F75000
|
heap
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91C000
|
trusted library allocation
|
page read and write
|
||
1B41B000
|
stack
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
2E56000
|
trusted library allocation
|
page read and write
|
||
7FFD9B787000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
1B46E000
|
stack
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page execute and read and write
|
||
9FE000
|
stack
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
1B81E000
|
stack
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
F40000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
23AE000
|
stack
|
page read and write
|
||
12DB000
|
heap
|
page read and write
|
||
12381000
|
trusted library allocation
|
page read and write
|
||
7FFD9B787000
|
trusted library allocation
|
page read and write
|
||
FBD000
|
heap
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B78C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
1AEEE000
|
stack
|
page read and write
|
||
7FFD9B911000
|
trusted library allocation
|
page read and write
|
||
1BC5E000
|
stack
|
page read and write
|
||
1ADC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page execute and read and write
|
||
1AF7E000
|
stack
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
1BDDF000
|
stack
|
page read and write
|
||
3313000
|
trusted library allocation
|
page read and write
|
||
1B31E000
|
stack
|
page read and write
|
||
12D43000
|
trusted library allocation
|
page read and write
|
||
1B04E000
|
stack
|
page read and write
|
||
1B954000
|
stack
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
FCA000
|
heap
|
page read and write
|
||
1B20E000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
2449000
|
trusted library allocation
|
page read and write
|
||
7FFD9B933000
|
trusted library allocation
|
page read and write
|
||
1AF1E000
|
stack
|
page read and write
|
||
1AE10000
|
heap
|
page execute and read and write
|
||
1B56F000
|
stack
|
page read and write
|
||
7FFD9B926000
|
trusted library allocation
|
page read and write
|
||
1B88E000
|
stack
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
1BB6B000
|
heap
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
A98000
|
heap
|
page read and write
|
||
1B520000
|
heap
|
page read and write
|
||
D70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
1072000
|
heap
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
1BD5F000
|
stack
|
page read and write
|
||
7FFD9B90C000
|
trusted library allocation
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
1BE54000
|
stack
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
9EB000
|
heap
|
page read and write
|
||
7FFD9B901000
|
trusted library allocation
|
page read and write
|
||
12388000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
1C2DE000
|
stack
|
page read and write
|
||
2549000
|
trusted library allocation
|
page read and write
|
||
7FFD9B87F000
|
trusted library allocation
|
page execute and read and write
|
||
F6B000
|
heap
|
page read and write
|
||
1289D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78C000
|
trusted library allocation
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
ABF000
|
heap
|
page read and write
|
||
7FFD9B93B000
|
trusted library allocation
|
page read and write
|
||
2446000
|
trusted library allocation
|
page read and write
|
||
12EB000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
1B71E000
|
stack
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
2930000
|
heap
|
page execute and read and write
|
||
12893000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
There are 1017 hidden memdumps, click here to show them.