Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Xmz1XDgtah.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\uPlspWkqijAQ.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Windows Mail\uPlspWkqijAQ.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\plug_ins3d\uPlspWkqijAQ.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Windows Portable Devices\SystemSettings.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\RuntimeBroker.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\uPlspWkqijAQ.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\Default\uPlspWkqijAQ.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\33d07815358cfe
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\uPlspWkqijAQ.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Windows Mail\33d07815358cfe
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\Windows Mail\uPlspWkqijAQ.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\plug_ins3d\33d07815358cfe
|
ASCII text, with very long lines (874), with no line terminators
|
dropped
|
||
C:\Program Files\Adobe\Acrobat DC\Acrobat\plug_ins3d\uPlspWkqijAQ.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Windows Portable Devices\9e60a5f7a3bd80
|
ASCII text, with very long lines (442), with no line terminators
|
dropped
|
||
C:\Program Files\Windows Portable Devices\SystemSettings.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\9e8d7a4ca61bd9
|
ASCII text, with no line terminators
|
dropped
|
||
C:\ProgramData\RuntimeBroker.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Recovery\33d07815358cfe
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Recovery\uPlspWkqijAQ.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\Default\33d07815358cfe
|
ASCII text, with very long lines (995), with no line terminators
|
dropped
|
||
C:\Users\Default\uPlspWkqijAQ.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RuntimeBroker.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SystemSettings.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Xmz1XDgtah.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\uPlspWkqijAQ.exe.log
|
CSV text
|
dropped
|
There are 16 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Xmz1XDgtah.exe
|
"C:\Users\user\Desktop\Xmz1XDgtah.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\RuntimeBroker.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\All Users\RuntimeBroker.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\RuntimeBroker.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\reference assemblies\Microsoft\Framework\uPlspWkqijAQ.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "uPlspWkqijAQ" /sc ONLOGON /tr "'C:\Program Files (x86)\reference assemblies\Microsoft\Framework\uPlspWkqijAQ.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\reference assemblies\Microsoft\Framework\uPlspWkqijAQ.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 8 /tr "'C:\Program Files\Adobe\Acrobat DC\Acrobat\plug_ins3d\uPlspWkqijAQ.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "uPlspWkqijAQ" /sc ONLOGON /tr "'C:\Program Files\Adobe\Acrobat DC\Acrobat\plug_ins3d\uPlspWkqijAQ.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 6 /tr "'C:\Program Files\Adobe\Acrobat DC\Acrobat\plug_ins3d\uPlspWkqijAQ.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "SystemSettingsS" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Portable Devices\SystemSettings.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "SystemSettings" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\SystemSettings.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "SystemSettingsS" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Portable Devices\SystemSettings.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 7 /tr "'C:\Users\Default\uPlspWkqijAQ.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "uPlspWkqijAQ" /sc ONLOGON /tr "'C:\Users\Default\uPlspWkqijAQ.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 13 /tr "'C:\Users\Default\uPlspWkqijAQ.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 7 /tr "'C:\Recovery\uPlspWkqijAQ.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "uPlspWkqijAQ" /sc ONLOGON /tr "'C:\Recovery\uPlspWkqijAQ.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 14 /tr "'C:\Recovery\uPlspWkqijAQ.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\windows mail\uPlspWkqijAQ.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "uPlspWkqijAQ" /sc ONLOGON /tr "'C:\Program Files (x86)\windows mail\uPlspWkqijAQ.exe'" /rl HIGHEST
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "uPlspWkqijAQu" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\windows mail\uPlspWkqijAQ.exe'" /rl
HIGHEST /f
|
||
C:\ProgramData\RuntimeBroker.exe
|
"C:\Users\All Users\RuntimeBroker.exe"
|
||
C:\ProgramData\RuntimeBroker.exe
|
"C:\Users\All Users\RuntimeBroker.exe"
|
||
C:\ProgramData\RuntimeBroker.exe
|
"C:\Users\All Users\RuntimeBroker.exe"
|
||
C:\Program Files\Windows Portable Devices\SystemSettings.exe
|
"C:\Program Files\Windows Portable Devices\SystemSettings.exe"
|
||
C:\Program Files\Windows Portable Devices\SystemSettings.exe
|
"C:\Program Files\Windows Portable Devices\SystemSettings.exe"
|
||
C:\Program Files (x86)\Windows Mail\uPlspWkqijAQ.exe
|
"C:\Program Files (x86)\windows mail\uPlspWkqijAQ.exe"
|
||
C:\Program Files (x86)\Windows Mail\uPlspWkqijAQ.exe
|
"C:\Program Files (x86)\windows mail\uPlspWkqijAQ.exe"
|
There are 19 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://fghjdtgujkjdgkdettygdbnbbn.000webhostapp.com
|
unknown
|
||
http://fghjdtgujkjdgkdettygdbnbbn.000webhostapp.com/@zd3bk5Wa3RHb1FmZlR0X
|
|||
http://fghjdtgujkjdgkdettygdbnbbn.000webhostapp.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
us-east-1.route-1.000webhost.awex.io
|
145.14.145.191
|
||
fghjdtgujkjdgkdettygdbnbbn.000webhostapp.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
145.14.145.191
|
us-east-1.route-1.000webhost.awex.io
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\2f2835e5d4876ac1404532ec76233e99ff61127a
|
dcbc3dbdb0abc40181298a0d36a05a10ec856e51
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2801000
|
trusted library allocation
|
page read and write
|
||
12BEF000
|
trusted library allocation
|
page read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
2EE1000
|
trusted library allocation
|
page read and write
|
||
2AB1000
|
trusted library allocation
|
page read and write
|
||
2AEC000
|
trusted library allocation
|
page read and write
|
||
309B000
|
trusted library allocation
|
page read and write
|
||
283F000
|
trusted library allocation
|
page read and write
|
||
2BE1000
|
trusted library allocation
|
page read and write
|
||
34A1000
|
trusted library allocation
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
26BB000
|
trusted library allocation
|
page read and write
|
||
26A1000
|
trusted library allocation
|
page read and write
|
||
306D000
|
trusted library allocation
|
page read and write
|
||
11FB000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
3274000
|
trusted library allocation
|
page read and write
|
||
1BBCB000
|
stack
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page read and write
|
||
12EE1000
|
trusted library allocation
|
page read and write
|
||
1C816000
|
heap
|
page read and write
|
||
12ABD000
|
trusted library allocation
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
8CA000
|
heap
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
131BD000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
946000
|
stack
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
306C000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
1BB50000
|
heap
|
page read and write
|
||
A6F000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
1B8AF000
|
stack
|
page read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
2EFC000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
134A8000
|
trusted library allocation
|
page read and write
|
||
7FF848F4F000
|
trusted library allocation
|
page execute and read and write
|
||
13C69000
|
trusted library allocation
|
page read and write
|
||
7FF8490AD000
|
trusted library allocation
|
page read and write
|
||
2E95000
|
trusted library allocation
|
page read and write
|
||
7FF848F96000
|
trusted library allocation
|
page read and write
|
||
1D4FE000
|
stack
|
page read and write
|
||
C5A000
|
heap
|
page read and write
|
||
1BDCF000
|
stack
|
page read and write
|
||
3181000
|
trusted library allocation
|
page read and write
|
||
1BAEE000
|
heap
|
page read and write
|
||
1286D000
|
trusted library allocation
|
page read and write
|
||
7FF848E33000
|
trusted library allocation
|
page read and write
|
||
39F0000
|
trusted library allocation
|
page read and write
|
||
1387000
|
heap
|
page read and write
|
||
1C775000
|
heap
|
page read and write
|
||
7FF848E33000
|
trusted library allocation
|
page read and write
|
||
313C000
|
trusted library allocation
|
page read and write
|
||
7FF849008000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FBB000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
846000
|
heap
|
page read and write
|
||
104D000
|
heap
|
page read and write
|
||
1C8FE000
|
stack
|
page read and write
|
||
3276000
|
trusted library allocation
|
page read and write
|
||
3484000
|
trusted library allocation
|
page read and write
|
||
2751000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
12BE8000
|
trusted library allocation
|
page read and write
|
||
1BCC3000
|
stack
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
790000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1BB04000
|
heap
|
page read and write
|
||
7FF84915A000
|
trusted library allocation
|
page read and write
|
||
7FF848E33000
|
trusted library allocation
|
page read and write
|
||
1CDFE000
|
stack
|
page read and write
|
||
710000
|
unkown
|
page readonly
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
16AC000
|
heap
|
page read and write
|
||
2AAF000
|
stack
|
page read and write
|
||
2F62000
|
trusted library allocation
|
page read and write
|
||
2F99000
|
trusted library allocation
|
page read and write
|
||
712000
|
unkown
|
page readonly
|
||
16E5000
|
heap
|
page read and write
|
||
1C706000
|
heap
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
34FE000
|
trusted library allocation
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
1030000
|
heap
|
page read and write
|
||
7FF848FE7000
|
trusted library allocation
|
page read and write
|
||
334D000
|
trusted library allocation
|
page read and write
|
||
31A9000
|
trusted library allocation
|
page read and write
|
||
30D6000
|
trusted library allocation
|
page read and write
|
||
3076000
|
trusted library allocation
|
page read and write
|
||
3A58000
|
trusted library allocation
|
page read and write
|
||
1AF10000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
7FF848E4D000
|
trusted library allocation
|
page execute and read and write
|
||
A30000
|
heap
|
page read and write
|
||
1BC5E000
|
stack
|
page read and write
|
||
7FF848F4B000
|
trusted library allocation
|
page execute and read and write
|
||
12CAC000
|
trusted library allocation
|
page read and write
|
||
7FF848E37000
|
trusted library allocation
|
page read and write
|
||
2EEC000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
19FF000
|
stack
|
page read and write
|
||
2EE6000
|
trusted library allocation
|
page read and write
|
||
7FF848FB3000
|
trusted library allocation
|
page read and write
|
||
1620000
|
trusted library allocation
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page execute and read and write
|
||
7C0000
|
heap
|
page read and write
|
||
341C000
|
trusted library allocation
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
AD9000
|
heap
|
page read and write
|
||
1611000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
3551000
|
trusted library allocation
|
page read and write
|
||
34FC000
|
trusted library allocation
|
page read and write
|
||
1AF6C000
|
heap
|
page read and write
|
||
13D46000
|
trusted library allocation
|
page read and write
|
||
13927000
|
trusted library allocation
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
heap
|
page execute and read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F4B000
|
trusted library allocation
|
page execute and read and write
|
||
2FFF000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
7FF848FE3000
|
trusted library allocation
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
126B1000
|
trusted library allocation
|
page read and write
|
||
ED5000
|
heap
|
page read and write
|
||
3078000
|
trusted library allocation
|
page read and write
|
||
313E000
|
trusted library allocation
|
page read and write
|
||
1C712000
|
heap
|
page read and write
|
||
1BB1D000
|
heap
|
page read and write
|
||
BBF000
|
heap
|
page read and write
|
||
2FFE000
|
trusted library allocation
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
2ED8000
|
trusted library allocation
|
page read and write
|
||
34F2000
|
trusted library allocation
|
page read and write
|
||
1C7CB000
|
heap
|
page read and write
|
||
7FF84906D000
|
trusted library allocation
|
page read and write
|
||
1BBB0000
|
trusted library section
|
page read and write
|
||
3716000
|
trusted library allocation
|
page read and write
|
||
3347000
|
trusted library allocation
|
page read and write
|
||
1C9FE000
|
stack
|
page read and write
|
||
CAD000
|
heap
|
page read and write
|
||
3215000
|
trusted library allocation
|
page read and write
|
||
1C0CE000
|
stack
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
327E000
|
trusted library allocation
|
page read and write
|
||
1038000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
13AA7000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
2EE4000
|
trusted library allocation
|
page read and write
|
||
7FF848F8C000
|
trusted library allocation
|
page read and write
|
||
7FF848DF7000
|
trusted library allocation
|
page read and write
|
||
7FF848E9C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E44000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
35D2000
|
trusted library allocation
|
page read and write
|
||
1648000
|
heap
|
page read and write
|
||
1C807000
|
heap
|
page read and write
|
||
7FF848FD6000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
1BBA3000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
33AF000
|
trusted library allocation
|
page read and write
|
||
1BB3D000
|
heap
|
page read and write
|
||
7FF848FC1000
|
trusted library allocation
|
page read and write
|
||
1B6BF000
|
stack
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
trusted library allocation
|
page read and write
|
||
131C1000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E96000
|
trusted library allocation
|
page read and write
|
||
DFF000
|
stack
|
page read and write
|
||
27F0000
|
heap
|
page execute and read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
756000
|
stack
|
page read and write
|
||
2EE8000
|
trusted library allocation
|
page read and write
|
||
28BC000
|
trusted library allocation
|
page read and write
|
||
26FF000
|
stack
|
page read and write
|
||
3143000
|
trusted library allocation
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
7FF848FD6000
|
trusted library allocation
|
page read and write
|
||
119E000
|
stack
|
page read and write
|
||
1321A000
|
trusted library allocation
|
page read and write
|
||
A9C000
|
heap
|
page read and write
|
||
1BC70000
|
trusted library section
|
page read and write
|
||
1CE59000
|
heap
|
page read and write
|
||
126A3000
|
trusted library allocation
|
page read and write
|
||
12F6000
|
stack
|
page read and write
|
||
12AB3000
|
trusted library allocation
|
page read and write
|
||
7FF848FD1000
|
trusted library allocation
|
page read and write
|
||
13003000
|
trusted library allocation
|
page read and write
|
||
3418000
|
trusted library allocation
|
page read and write
|
||
7FF848F46000
|
trusted library allocation
|
page execute and read and write
|
||
2D6D000
|
trusted library allocation
|
page read and write
|
||
1BECE000
|
stack
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
34E2000
|
trusted library allocation
|
page read and write
|
||
2E8F000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
12F3A000
|
trusted library allocation
|
page read and write
|
||
1C10E000
|
stack
|
page read and write
|
||
1B46E000
|
stack
|
page read and write
|
||
1AF6E000
|
stack
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
1AE60000
|
trusted library allocation
|
page read and write
|
||
1BFC3000
|
stack
|
page read and write
|
||
7FF848F12000
|
trusted library allocation
|
page execute and read and write
|
||
1B5BE000
|
stack
|
page read and write
|
||
1C723000
|
heap
|
page read and write
|
||
2E62000
|
trusted library allocation
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
7FF848E37000
|
trusted library allocation
|
page read and write
|
||
1BBA1000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
163C000
|
heap
|
page read and write
|
||
E6F000
|
stack
|
page read and write
|
||
7FF848DED000
|
trusted library allocation
|
page execute and read and write
|
||
3112000
|
trusted library allocation
|
page read and write
|
||
1642000
|
heap
|
page read and write
|
||
1780000
|
trusted library allocation
|
page read and write
|
||
15EF000
|
stack
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
1B010000
|
heap
|
page read and write
|
||
1687000
|
heap
|
page read and write
|
||
2EFA000
|
trusted library allocation
|
page read and write
|
||
13044000
|
trusted library allocation
|
page read and write
|
||
12D5D000
|
trusted library allocation
|
page read and write
|
||
1CE71000
|
heap
|
page read and write
|
||
7FF848F0F000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
2F95000
|
trusted library allocation
|
page read and write
|
||
2B63000
|
trusted library allocation
|
page read and write
|
||
3775000
|
trusted library allocation
|
page read and write
|
||
1B7AF000
|
stack
|
page read and write
|
||
32E8000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E03000
|
trusted library allocation
|
page read and write
|
||
1BABE000
|
stack
|
page read and write
|
||
BC2000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
2E6C000
|
trusted library allocation
|
page read and write
|
||
1BB44000
|
heap
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page execute and read and write
|
||
1DEFD000
|
stack
|
page read and write
|
||
370C000
|
trusted library allocation
|
page read and write
|
||
2EF7000
|
trusted library allocation
|
page read and write
|
||
710000
|
unkown
|
page readonly
|
||
3004000
|
trusted library allocation
|
page read and write
|
||
3A56000
|
trusted library allocation
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
1CE0C000
|
heap
|
page read and write
|
||
1B4D0000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
trusted library allocation
|
page read and write
|
||
7FF849142000
|
trusted library allocation
|
page read and write
|
||
2F34000
|
trusted library allocation
|
page read and write
|
||
7FF848E1C000
|
trusted library allocation
|
page read and write
|
||
1B9BE000
|
stack
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
32E6000
|
trusted library allocation
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FE3000
|
trusted library allocation
|
page read and write
|
||
30A3000
|
trusted library allocation
|
page read and write
|
||
3852000
|
trusted library allocation
|
page read and write
|
||
1BB5A000
|
heap
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page read and write
|
||
B89000
|
heap
|
page read and write
|
||
34F0000
|
trusted library allocation
|
page read and write
|
||
32E2000
|
trusted library allocation
|
page read and write
|
||
1CE6D000
|
heap
|
page read and write
|
||
7FF848FAC000
|
trusted library allocation
|
page read and write
|
||
131B3000
|
trusted library allocation
|
page read and write
|
||
1AB1C000
|
stack
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
12811000
|
trusted library allocation
|
page read and write
|
||
38B8000
|
trusted library allocation
|
page read and write
|
||
26E4000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
307A000
|
trusted library allocation
|
page read and write
|
||
1C602000
|
heap
|
page read and write
|
||
15C0000
|
heap
|
page execute and read and write
|
||
2720000
|
trusted library allocation
|
page read and write
|
||
2F64000
|
trusted library allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
2F01000
|
trusted library allocation
|
page read and write
|
||
CCB000
|
heap
|
page read and write
|
||
2A90000
|
trusted library section
|
page read and write
|
||
7FF848FED000
|
trusted library allocation
|
page read and write
|
||
3779000
|
trusted library allocation
|
page read and write
|
||
1622000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
12AB1000
|
trusted library allocation
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
7FF848FA3000
|
trusted library allocation
|
page read and write
|
||
2EFD000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
B86000
|
heap
|
page read and write
|
||
1C846000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
2770000
|
heap
|
page execute and read and write
|
||
1CC9E000
|
stack
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
16C0000
|
heap
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
1CB9D000
|
stack
|
page read and write
|
||
1BDCF000
|
stack
|
page read and write
|
||
341E000
|
trusted library allocation
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
850000
|
heap
|
page read and write
|
||
7FF848FA3000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
heap
|
page execute and read and write
|
||
7FF848E4B000
|
trusted library allocation
|
page execute and read and write
|
||
3108000
|
trusted library allocation
|
page read and write
|
||
D02000
|
heap
|
page read and write
|
||
2DC4000
|
trusted library allocation
|
page read and write
|
||
131C1000
|
trusted library allocation
|
page read and write
|
||
1645000
|
heap
|
page read and write
|
||
7FF848FBB000
|
trusted library allocation
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page execute and read and write
|
||
83C000
|
heap
|
page read and write
|
||
7FF848DE2000
|
trusted library allocation
|
page read and write
|
||
1310F000
|
trusted library allocation
|
page read and write
|
||
E62000
|
heap
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
1329000
|
heap
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
39EE000
|
trusted library allocation
|
page read and write
|
||
3A5A000
|
trusted library allocation
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
1B47E000
|
stack
|
page read and write
|
||
2DFA000
|
trusted library allocation
|
page read and write
|
||
1C57F000
|
stack
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
348A000
|
trusted library allocation
|
page read and write
|
||
1B9BE000
|
stack
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
7FF4A6130000
|
trusted library allocation
|
page execute and read and write
|
||
3480000
|
trusted library allocation
|
page read and write
|
||
7FF849108000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
391D000
|
trusted library allocation
|
page read and write
|
||
384E000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page execute and read and write
|
||
1C3FE000
|
stack
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
18FF000
|
stack
|
page read and write
|
||
7FF848DFC000
|
trusted library allocation
|
page read and write
|
||
1C5FE000
|
stack
|
page read and write
|
||
7FF848DE3000
|
trusted library allocation
|
page execute and read and write
|
||
1C75A000
|
heap
|
page read and write
|
||
12AC1000
|
trusted library allocation
|
page read and write
|
||
1C102000
|
heap
|
page execute and read and write
|
||
822000
|
heap
|
page read and write
|
||
1BF02000
|
heap
|
page execute and read and write
|
||
12BBD000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
307E000
|
trusted library allocation
|
page read and write
|
||
1BB0B000
|
heap
|
page read and write
|
||
12EE3000
|
trusted library allocation
|
page read and write
|
||
1DDFE000
|
stack
|
page read and write
|
||
134AD000
|
trusted library allocation
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page execute and read and write
|
||
1C78B000
|
heap
|
page read and write
|
||
C1F000
|
heap
|
page read and write
|
||
1CBF1000
|
stack
|
page read and write
|
||
3850000
|
trusted library allocation
|
page read and write
|
||
D02000
|
heap
|
page read and write
|
||
327A000
|
trusted library allocation
|
page read and write
|
||
2EEA000
|
trusted library allocation
|
page read and write
|
||
1B3CF000
|
stack
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page execute and read and write
|
||
1BED0000
|
trusted library section
|
page read and write
|
||
3714000
|
trusted library allocation
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
7FF849001000
|
trusted library allocation
|
page read and write
|
||
1BC80000
|
trusted library section
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
35D8000
|
trusted library allocation
|
page read and write
|
||
2F33000
|
trusted library allocation
|
page read and write
|
||
B07000
|
heap
|
page read and write
|
||
2EF6000
|
trusted library allocation
|
page read and write
|
||
31AD000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
2AB0000
|
trusted library section
|
page read and write
|
||
1C7E2000
|
heap
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
FC5000
|
heap
|
page read and write
|
||
875000
|
heap
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
990000
|
unkown
|
page readonly
|
||
1C002000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1C7F8000
|
heap
|
page read and write
|
||
306E000
|
trusted library allocation
|
page read and write
|
||
C51000
|
heap
|
page read and write
|
||
1D2F3000
|
stack
|
page read and write
|
||
7FF848F9B000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3071000
|
trusted library allocation
|
page read and write
|
||
2A70000
|
trusted library section
|
page read and write
|
||
A9F000
|
heap
|
page read and write
|
||
1C53E000
|
stack
|
page read and write
|
||
2F94000
|
trusted library allocation
|
page read and write
|
||
3777000
|
trusted library allocation
|
page read and write
|
||
306F000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
1B5C4000
|
stack
|
page read and write
|
||
1C7C0000
|
heap
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
13354000
|
trusted library allocation
|
page read and write
|
||
34EC000
|
trusted library allocation
|
page read and write
|
||
2EDA000
|
trusted library allocation
|
page read and write
|
||
7FF848DED000
|
trusted library allocation
|
page execute and read and write
|
||
3488000
|
trusted library allocation
|
page read and write
|
||
C4C000
|
heap
|
page read and write
|
||
306A000
|
trusted library allocation
|
page read and write
|
||
994000
|
unkown
|
page readonly
|
||
3006000
|
trusted library allocation
|
page read and write
|
||
1BAAD000
|
stack
|
page read and write
|
||
320F000
|
trusted library allocation
|
page read and write
|
||
1B5AE000
|
stack
|
page read and write
|
||
7FF848F91000
|
trusted library allocation
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
1D5FF000
|
stack
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
131B1000
|
trusted library allocation
|
page read and write
|
||
1C4F3000
|
stack
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
2DA9000
|
trusted library allocation
|
page read and write
|
||
7FF84912A000
|
trusted library allocation
|
page read and write
|
||
7FF848FEB000
|
trusted library allocation
|
page read and write
|
||
1BE8A000
|
stack
|
page read and write
|
||
3504000
|
trusted library allocation
|
page read and write
|
||
12D7D000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
31AB000
|
trusted library allocation
|
page read and write
|
||
39F4000
|
trusted library allocation
|
page read and write
|
||
31A5000
|
trusted library allocation
|
page read and write
|
||
16FB000
|
heap
|
page read and write
|
||
1B2CE000
|
stack
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
306B000
|
trusted library allocation
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
2EFF000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
2EFB000
|
trusted library allocation
|
page read and write
|
||
1C825000
|
heap
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
126A1000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
7FF849001000
|
trusted library allocation
|
page read and write
|
||
102B000
|
heap
|
page read and write
|
||
17F5000
|
heap
|
page read and write
|
||
3486000
|
trusted library allocation
|
page read and write
|
||
1CD9B000
|
stack
|
page read and write
|
||
12FE000
|
stack
|
page read and write
|
||
1013000
|
heap
|
page read and write
|
||
2EF2000
|
trusted library allocation
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page execute and read and write
|
||
31F2000
|
trusted library allocation
|
page read and write
|
||
3A5C000
|
trusted library allocation
|
page read and write
|
||
902000
|
heap
|
page read and write
|
||
7FF848E37000
|
trusted library allocation
|
page read and write
|
||
2B5D000
|
trusted library allocation
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
AFF000
|
stack
|
page read and write
|
||
1D3AA000
|
stack
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page execute and read and write
|
||
12C7D000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page read and write
|
||
1D29A000
|
stack
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
1C2CE000
|
stack
|
page read and write
|
||
3A5E000
|
trusted library allocation
|
page read and write
|
||
3420000
|
trusted library allocation
|
page read and write
|
||
2CC2000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
7FF848E44000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
1590000
|
heap
|
page execute and read and write
|
||
DF0000
|
heap
|
page read and write
|
||
2EF9000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
35DA000
|
trusted library allocation
|
page read and write
|
||
133B000
|
heap
|
page read and write
|
||
2E5A000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
377D000
|
trusted library allocation
|
page read and write
|
||
2E5C000
|
trusted library allocation
|
page read and write
|
||
2F32000
|
trusted library allocation
|
page read and write
|
||
33B9000
|
trusted library allocation
|
page read and write
|
||
1400000
|
trusted library allocation
|
page read and write
|
||
7FF848FCE000
|
trusted library allocation
|
page read and write
|
||
3502000
|
trusted library allocation
|
page read and write
|
||
30D2000
|
trusted library allocation
|
page read and write
|
||
126A8000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
7FF848F46000
|
trusted library allocation
|
page execute and read and write
|
||
C02000
|
heap
|
page read and write
|
||
2DBC000
|
trusted library allocation
|
page read and write
|
||
1BEA0000
|
trusted library section
|
page read and write
|
||
1B8B3000
|
stack
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1C6D9000
|
heap
|
page read and write
|
||
B16000
|
stack
|
page read and write
|
||
2F66000
|
trusted library allocation
|
page read and write
|
||
12BB1000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
1D0FE000
|
stack
|
page read and write
|
||
2E68000
|
trusted library allocation
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
12BE1000
|
trusted library allocation
|
page read and write
|
||
A72000
|
heap
|
page read and write
|
||
1D1FF000
|
stack
|
page read and write
|
||
310E000
|
trusted library allocation
|
page read and write
|
||
104B000
|
heap
|
page read and write
|
||
7FF849172000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
A36000
|
heap
|
page read and write
|
||
83F000
|
heap
|
page read and write
|
||
1B4CF000
|
stack
|
page read and write
|
||
3554000
|
trusted library allocation
|
page read and write
|
||
1045000
|
heap
|
page read and write
|
||
82D000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
2B6F000
|
trusted library allocation
|
page read and write
|
||
C13000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
31F4000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
F36000
|
stack
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
841000
|
heap
|
page read and write
|
||
1BB00000
|
heap
|
page read and write
|
||
1AAE0000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
2FFC000
|
trusted library allocation
|
page read and write
|
||
1B1C0000
|
heap
|
page read and write
|
||
1B9A6000
|
stack
|
page read and write
|
||
11D6000
|
stack
|
page read and write
|
||
1675000
|
heap
|
page read and write
|
||
1BCC0000
|
heap
|
page execute and read and write
|
||
C46000
|
heap
|
page read and write
|
||
37E7000
|
trusted library allocation
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
35D6000
|
trusted library allocation
|
page read and write
|
||
C41000
|
heap
|
page read and write
|
||
1C785000
|
heap
|
page read and write
|
||
12D05000
|
trusted library allocation
|
page read and write
|
||
32E4000
|
trusted library allocation
|
page read and write
|
||
1389000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
26E2000
|
trusted library allocation
|
page read and write
|
||
C26000
|
heap
|
page read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page read and write
|
||
7FF848DE3000
|
trusted library allocation
|
page execute and read and write
|
||
1D3FE000
|
stack
|
page read and write
|
||
134A3000
|
trusted library allocation
|
page read and write
|
||
1B8B0000
|
heap
|
page read and write
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
30D8000
|
trusted library allocation
|
page read and write
|
||
1AF50000
|
heap
|
page execute and read and write
|
||
25F0000
|
heap
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
7FF848DFC000
|
trusted library allocation
|
page read and write
|
||
275A000
|
trusted library allocation
|
page read and write
|
||
1CE48000
|
heap
|
page read and write
|
||
7FF848E07000
|
trusted library allocation
|
page read and write
|
||
1AF70000
|
trusted library allocation
|
page read and write
|
||
7FF849001000
|
trusted library allocation
|
page read and write
|
||
811000
|
heap
|
page read and write
|
||
1B73D000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
7FF848FC3000
|
trusted library allocation
|
page read and write
|
||
33B1000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
3508000
|
trusted library allocation
|
page read and write
|
||
30DA000
|
trusted library allocation
|
page read and write
|
||
7FF848E44000
|
trusted library allocation
|
page read and write
|
||
28B6000
|
trusted library allocation
|
page read and write
|
||
2EDE000
|
stack
|
page read and write
|
||
1430000
|
trusted library allocation
|
page read and write
|
||
C2A000
|
heap
|
page read and write
|
||
313A000
|
trusted library allocation
|
page read and write
|
||
2EEE000
|
trusted library allocation
|
page read and write
|
||
7FF848FCA000
|
trusted library allocation
|
page read and write
|
||
7FF849031000
|
trusted library allocation
|
page read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
320D000
|
trusted library allocation
|
page read and write
|
||
13DA1000
|
trusted library allocation
|
page read and write
|
||
38B6000
|
trusted library allocation
|
page read and write
|
||
1095000
|
heap
|
page read and write
|
||
130AD000
|
trusted library allocation
|
page read and write
|
||
2754000
|
trusted library allocation
|
page read and write
|
||
1C7DA000
|
heap
|
page read and write
|
||
1B6C3000
|
stack
|
page read and write
|
||
C3E000
|
heap
|
page read and write
|
||
391B000
|
trusted library allocation
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
30D4000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
39EC000
|
trusted library allocation
|
page read and write
|
||
2EDC000
|
trusted library allocation
|
page read and write
|
||
7FF848E33000
|
trusted library allocation
|
page read and write
|
||
1AF30000
|
heap
|
page read and write
|
||
1326A000
|
trusted library allocation
|
page read and write
|
||
1B9C0000
|
heap
|
page execute and read and write
|
||
CC2000
|
heap
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
12801000
|
trusted library allocation
|
page read and write
|
||
1B7B4000
|
stack
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
2DC2000
|
trusted library allocation
|
page read and write
|
||
1C700000
|
heap
|
page read and write
|
||
16C8000
|
heap
|
page read and write
|
||
7FF8490D8000
|
trusted library allocation
|
page read and write
|
||
39F2000
|
trusted library allocation
|
page read and write
|
||
12BBF000
|
trusted library allocation
|
page read and write
|
||
1AD8D000
|
stack
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
2EFE000
|
trusted library allocation
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
2EF4000
|
trusted library allocation
|
page read and write
|
||
2F68000
|
trusted library allocation
|
page read and write
|
||
1B8CE000
|
stack
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
1CA3F000
|
unkown
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
12C53000
|
trusted library allocation
|
page read and write
|
||
13745000
|
trusted library allocation
|
page read and write
|
||
3349000
|
trusted library allocation
|
page read and write
|
||
7FF848FCC000
|
trusted library allocation
|
page read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
trusted library allocation
|
page read and write
|
||
1C7D4000
|
heap
|
page read and write
|
||
129CD000
|
trusted library allocation
|
page read and write
|
||
12EED000
|
trusted library allocation
|
page read and write
|
||
33B7000
|
trusted library allocation
|
page read and write
|
||
2E6E000
|
trusted library allocation
|
page read and write
|
||
130B6000
|
trusted library allocation
|
page read and write
|
||
1C74F000
|
heap
|
page read and write
|
||
13CEB000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
7FF848FA3000
|
trusted library allocation
|
page read and write
|
||
7FF848F46000
|
trusted library allocation
|
page execute and read and write
|
||
C88000
|
heap
|
page read and write
|
||
12AB8000
|
trusted library allocation
|
page read and write
|
||
7FF848E96000
|
trusted library allocation
|
page read and write
|
||
1BB86000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
trusted library allocation
|
page read and write
|
||
7FF848F93000
|
trusted library allocation
|
page read and write
|
||
307C000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
1C843000
|
heap
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
1309D000
|
trusted library allocation
|
page read and write
|
||
135D000
|
heap
|
page read and write
|
||
1640000
|
trusted library allocation
|
page read and write
|
||
28B0000
|
trusted library allocation
|
page read and write
|
||
2ED4000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
2E5E000
|
trusted library allocation
|
page read and write
|
||
1C833000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
7FF84901D000
|
trusted library allocation
|
page read and write
|
||
35D4000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
13DF000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page execute and read and write
|
||
317F000
|
trusted library allocation
|
page read and write
|
||
2AA0000
|
heap
|
page execute and read and write
|
||
A3C000
|
heap
|
page read and write
|
||
1C6FE000
|
stack
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1B000000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
1337D000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
1B7CE000
|
stack
|
page read and write
|
||
1BECE000
|
stack
|
page read and write
|
||
7FF848FCC000
|
trusted library allocation
|
page read and write
|
||
1BD5F000
|
stack
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848F4F000
|
trusted library allocation
|
page execute and read and write
|
||
2F97000
|
trusted library allocation
|
page read and write
|
||
8AD000
|
heap
|
page read and write
|
||
310A000
|
trusted library allocation
|
page read and write
|
||
7FF848F52000
|
trusted library allocation
|
page execute and read and write
|
||
8B8000
|
heap
|
page read and write
|
||
2F61000
|
trusted library allocation
|
page read and write
|
||
34F8000
|
trusted library allocation
|
page read and write
|
||
2723000
|
trusted library allocation
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
1625000
|
heap
|
page read and write
|
||
38BA000
|
trusted library allocation
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
1CE24000
|
heap
|
page read and write
|
||
13595000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
1B91D000
|
stack
|
page read and write
|
||
334F000
|
trusted library allocation
|
page read and write
|
||
1CED3000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1C7B5000
|
heap
|
page read and write
|
||
7FF848F9A000
|
trusted library allocation
|
page read and write
|
||
1AC10000
|
trusted library allocation
|
page read and write
|
||
1C0FD000
|
stack
|
page read and write
|
||
1D0FD000
|
stack
|
page read and write
|
||
1DCFD000
|
stack
|
page read and write
|
||
11D0000
|
heap
|
page execute and read and write
|
||
3213000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
1CEC3000
|
heap
|
page read and write
|
||
1B4B0000
|
heap
|
page read and write
|
||
2F35000
|
trusted library allocation
|
page read and write
|
||
12808000
|
trusted library allocation
|
page read and write
|
||
BAA000
|
heap
|
page read and write
|
||
1BEC0000
|
trusted library section
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
31A3000
|
trusted library allocation
|
page read and write
|
||
25E0000
|
trusted library allocation
|
page read and write
|
||
2DE6000
|
trusted library allocation
|
page read and write
|
||
271C000
|
trusted library allocation
|
page read and write
|
||
1A02000
|
heap
|
page read and write
|
||
2FCC000
|
trusted library allocation
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
C2D000
|
heap
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
147A1000
|
trusted library allocation
|
page read and write
|
||
2F9B000
|
trusted library allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
2EE2000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
3069000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
101E000
|
stack
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
7FF848E37000
|
trusted library allocation
|
page read and write
|
||
FDF000
|
stack
|
page read and write
|
||
13C90000
|
trusted library allocation
|
page read and write
|
||
7FF848DE4000
|
trusted library allocation
|
page read and write
|
||
7FF848E17000
|
trusted library allocation
|
page read and write
|
||
13168000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
1CCFD000
|
stack
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
E8B000
|
heap
|
page read and write
|
||
7FF848FCE000
|
trusted library allocation
|
page read and write
|
||
1BD8A000
|
stack
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
1C6FA000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
25C0000
|
trusted library allocation
|
page read and write
|
||
1C702000
|
heap
|
page execute and read and write
|
||
7FF848F52000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E44000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page execute and read and write
|
||
355A000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
269E000
|
stack
|
page read and write
|
||
1345000
|
heap
|
page read and write
|
||
1B8A3000
|
stack
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page execute and read and write
|
||
1320000
|
heap
|
page read and write
|
||
2DBE000
|
trusted library allocation
|
page read and write
|
||
1C71E000
|
heap
|
page read and write
|
||
2E93000
|
trusted library allocation
|
page read and write
|
||
1C82D000
|
heap
|
page read and write
|
||
2EDE000
|
trusted library allocation
|
page read and write
|
||
1C7D6000
|
heap
|
page read and write
|
||
131B8000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
7FF848DF7000
|
trusted library allocation
|
page read and write
|
||
CF2000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page read and write
|
||
2E97000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
1BB6E000
|
heap
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
2E91000
|
trusted library allocation
|
page read and write
|
||
12BFA000
|
trusted library allocation
|
page read and write
|
||
1C6DF000
|
heap
|
page read and write
|
||
138F7000
|
trusted library allocation
|
page read and write
|
||
12FEB000
|
trusted library allocation
|
page read and write
|
||
1D64F000
|
stack
|
page read and write
|
||
134B1000
|
trusted library allocation
|
page read and write
|
||
3F6000
|
stack
|
page read and write
|
||
7FF848FD1000
|
trusted library allocation
|
page read and write
|
||
7FF848FAA000
|
trusted library allocation
|
page read and write
|
||
7FF848FC3000
|
trusted library allocation
|
page read and write
|
||
7FF848E4D000
|
trusted library allocation
|
page execute and read and write
|
||
10BE000
|
heap
|
page read and write
|
||
7FF848FCC000
|
trusted library allocation
|
page read and write
|
||
AE2000
|
heap
|
page read and write
|
||
1613000
|
heap
|
page read and write
|
||
2970000
|
heap
|
page execute and read and write
|
||
9A0000
|
heap
|
page read and write
|
||
12BED000
|
trusted library allocation
|
page read and write
|
||
1C749000
|
heap
|
page read and write
|
||
1280D000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
30A7000
|
trusted library allocation
|
page read and write
|
||
1BB8C000
|
heap
|
page read and write
|
||
7FF848F4B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E0C000
|
trusted library allocation
|
page read and write
|
||
370E000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
1A830000
|
trusted library allocation
|
page read and write
|
||
34EA000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
2ED6000
|
trusted library allocation
|
page read and write
|
||
1BFD5000
|
stack
|
page read and write
|
||
1BEB0000
|
trusted library section
|
page read and write
|
||
2D6F000
|
trusted library allocation
|
page read and write
|
||
8DD000
|
heap
|
page read and write
|
||
1CECB000
|
heap
|
page read and write
|
||
10B3000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
1B16D000
|
stack
|
page read and write
|
||
29A0000
|
heap
|
page execute and read and write
|
||
13C5C000
|
trusted library allocation
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
310C000
|
trusted library allocation
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
126AD000
|
trusted library allocation
|
page read and write
|
||
BEA000
|
heap
|
page read and write
|
||
12EF1000
|
trusted library allocation
|
page read and write
|
||
1002000
|
heap
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
8E4000
|
heap
|
page read and write
|
||
398D000
|
trusted library allocation
|
page read and write
|
||
377B000
|
trusted library allocation
|
page read and write
|
||
2BDE000
|
stack
|
page read and write
|
||
E8D000
|
heap
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page execute and read and write
|
||
1B03C000
|
stack
|
page read and write
|
||
13C36000
|
trusted library allocation
|
page read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F4F000
|
trusted library allocation
|
page execute and read and write
|
||
2F9D000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page execute and read and write
|
||
1BACF000
|
stack
|
page read and write
|
||
A5B000
|
heap
|
page read and write
|
||
7FF848F0B000
|
trusted library allocation
|
page execute and read and write
|
||
16E3000
|
heap
|
page read and write
|
||
162D000
|
heap
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
2EF8000
|
trusted library allocation
|
page read and write
|
||
7FF848F9C000
|
trusted library allocation
|
page read and write
|
||
1CE93000
|
heap
|
page read and write
|
||
37E3000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
1665000
|
heap
|
page read and write
|
||
7FF848FCC000
|
trusted library allocation
|
page read and write
|
||
135B000
|
heap
|
page read and write
|
||
28AA000
|
trusted library allocation
|
page read and write
|
||
2FD2000
|
trusted library allocation
|
page read and write
|
||
3005000
|
trusted library allocation
|
page read and write
|
||
1ABE0000
|
trusted library allocation
|
page read and write
|
||
32DE000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
7FF848F52000
|
trusted library allocation
|
page execute and read and write
|
||
770000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
3278000
|
trusted library allocation
|
page read and write
|
||
334B000
|
trusted library allocation
|
page read and write
|
||
12D72000
|
trusted library allocation
|
page read and write
|
||
3482000
|
trusted library allocation
|
page read and write
|
||
31A7000
|
trusted library allocation
|
page read and write
|
||
1CE00000
|
heap
|
page read and write
|
||
1B1E0000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
2FCA000
|
trusted library allocation
|
page read and write
|
||
7FF848F8C000
|
trusted library allocation
|
page read and write
|
||
3500000
|
trusted library allocation
|
page read and write
|
||
1C7A3000
|
heap
|
page read and write
|
||
1B6AE000
|
stack
|
page read and write
|
||
12EE8000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
8E2000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
12803000
|
trusted library allocation
|
page read and write
|
||
3007000
|
trusted library allocation
|
page read and write
|
||
2F83000
|
trusted library allocation
|
page read and write
|
||
1BE90000
|
trusted library section
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
37E5000
|
trusted library allocation
|
page read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FE3000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FE3000
|
trusted library allocation
|
page read and write
|
||
7FF84909B000
|
trusted library allocation
|
page read and write
|
||
1BAB5000
|
heap
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
26B9000
|
trusted library allocation
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
1702000
|
heap
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
275D000
|
trusted library allocation
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
2EC3000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
1C7FE000
|
stack
|
page read and write
|
||
7FF848FAB000
|
trusted library allocation
|
page read and write
|
||
8C1000
|
heap
|
page read and write
|
||
14C5000
|
heap
|
page read and write
|
||
7FF848F8E000
|
trusted library allocation
|
page read and write
|
||
1366D000
|
trusted library allocation
|
page read and write
|
||
3002000
|
trusted library allocation
|
page read and write
|
||
341A000
|
trusted library allocation
|
page read and write
|
||
825000
|
heap
|
page read and write
|
||
1035000
|
heap
|
page read and write
|
||
1077000
|
heap
|
page read and write
|
||
33B3000
|
trusted library allocation
|
page read and write
|
||
7FF848FCE000
|
trusted library allocation
|
page read and write
|
||
176E000
|
stack
|
page read and write
|
||
3000000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
12FF6000
|
trusted library allocation
|
page read and write
|
||
1BAB0000
|
heap
|
page read and write
|
||
34EE000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
7FF848FD6000
|
trusted library allocation
|
page read and write
|
||
1019000
|
heap
|
page read and write
|
||
1C1CF000
|
stack
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
E26000
|
heap
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
7A0000
|
heap
|
page read and write
|
||
12F92000
|
trusted library allocation
|
page read and write
|
||
7FF848E4B000
|
trusted library allocation
|
page execute and read and write
|
||
134A1000
|
trusted library allocation
|
page read and write
|
||
355D000
|
trusted library allocation
|
page read and write
|
||
31A0000
|
heap
|
page execute and read and write
|
||
1C2FE000
|
stack
|
page read and write
|
||
2DC0000
|
trusted library allocation
|
page read and write
|
||
1BE02000
|
heap
|
page read and write
|
||
1C6D0000
|
heap
|
page read and write
|
There are 1003 hidden memdumps, click here to show them.