Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
kYXIeLflel.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\AutoIt3\SciTE\api\DcGCAukyUlBjBtCNMvgN.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Microsoft Office\Office16\RuntimeBroker.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\WindowsPowerShell\Modules\DcGCAukyUlBjBtCNMvgN.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\jDownloader\config\DcGCAukyUlBjBtCNMvgN.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Windows Defender\Offline\WinStore.App.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Windows Media Player\Visualizations\DcGCAukyUlBjBtCNMvgN.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Windows NT\DcGCAukyUlBjBtCNMvgN.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\SoftwareDistribution\DcGCAukyUlBjBtCNMvgN.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\Idle.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\Default\OneDrive\DcGCAukyUlBjBtCNMvgN.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\Default\Pictures\RuntimeBroker.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\p82JRgI16Y.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\SKB\LanguageModels\dllhost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\AutoIt3\SciTE\api\5ea78a9590d30c
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\AutoIt3\SciTE\api\DcGCAukyUlBjBtCNMvgN.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Microsoft Office\Office16\9e8d7a4ca61bd9
|
ASCII text, with very long lines (509), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\Microsoft Office\Office16\RuntimeBroker.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Windows Multimedia Platform\886983d96e3d3e
|
ASCII text, with very long lines (785), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\WindowsPowerShell\Modules\5ea78a9590d30c
|
ASCII text, with very long lines (621), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\WindowsPowerShell\Modules\DcGCAukyUlBjBtCNMvgN.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\jDownloader\config\5ea78a9590d30c
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\jDownloader\config\DcGCAukyUlBjBtCNMvgN.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Windows Defender\Offline\WinStore.App.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Windows Defender\Offline\fd168b19609dff
|
ASCII text, with very long lines (606), with no line terminators
|
dropped
|
||
C:\Program Files\Windows Media Player\Visualizations\5ea78a9590d30c
|
ASCII text, with very long lines (821), with no line terminators
|
dropped
|
||
C:\Program Files\Windows Media Player\Visualizations\DcGCAukyUlBjBtCNMvgN.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Windows NT\5ea78a9590d30c
|
ASCII text, with very long lines (383), with no line terminators
|
dropped
|
||
C:\Program Files\Windows NT\DcGCAukyUlBjBtCNMvgN.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\SoftwareDistribution\5ea78a9590d30c
|
ASCII text, with very long lines (335), with no line terminators
|
dropped
|
||
C:\ProgramData\SoftwareDistribution\DcGCAukyUlBjBtCNMvgN.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Recovery\5ea78a9590d30c
|
ASCII text, with very long lines (692), with no line terminators
|
dropped
|
||
C:\Recovery\6ccacd8608530f
|
ASCII text, with very long lines (423), with no line terminators
|
dropped
|
||
C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Recovery\Idle.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\Default\OneDrive\5ea78a9590d30c
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\Default\OneDrive\DcGCAukyUlBjBtCNMvgN.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\Default\Pictures\9e8d7a4ca61bd9
|
ASCII text, with very long lines (571), with no line terminators
|
dropped
|
||
C:\Users\Default\Pictures\RuntimeBroker.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\DcGCAukyUlBjBtCNMvgN.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RuntimeBroker.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\kYXIeLflel.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6sws7LH3dX
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\SKB\LanguageModels\5940a34987c991
|
ASCII text, with very long lines (663), with no line terminators
|
dropped
|
||
C:\Windows\SKB\LanguageModels\dllhost.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 38 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\kYXIeLflel.exe
|
"C:\Users\user\Desktop\kYXIeLflel.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\Documents\My Pictures\RuntimeBroker.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Default User\Documents\My Pictures\RuntimeBroker.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\Documents\My Pictures\RuntimeBroker.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 13 /tr "'C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgN" /sc ONLOGON /tr "'C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 5 /tr "'C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows NT\DcGCAukyUlBjBtCNMvgN.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgN" /sc ONLOGON /tr "'C:\Program Files\Windows NT\DcGCAukyUlBjBtCNMvgN.exe'" /rl
HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows NT\DcGCAukyUlBjBtCNMvgN.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\windowspowershell\Modules\DcGCAukyUlBjBtCNMvgN.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgN" /sc ONLOGON /tr "'C:\Program Files (x86)\windowspowershell\Modules\DcGCAukyUlBjBtCNMvgN.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\windowspowershell\Modules\DcGCAukyUlBjBtCNMvgN.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 7 /tr "'C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgN" /sc ONLOGON /tr "'C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 6 /tr "'C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe'" /rl HIGHEST
/f
|
||
C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe
|
C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe
|
||
C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe
|
C:\Recovery\DcGCAukyUlBjBtCNMvgN.exe
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\autoit3\SciTE\api\DcGCAukyUlBjBtCNMvgN.exe'"
/f
|
||
C:\Users\Default\Pictures\RuntimeBroker.exe
|
"C:\Users\Default User\Documents\My Pictures\RuntimeBroker.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgN" /sc ONLOGON /tr "'C:\Program Files (x86)\autoit3\SciTE\api\DcGCAukyUlBjBtCNMvgN.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\autoit3\SciTE\api\DcGCAukyUlBjBtCNMvgN.exe'"
/rl HIGHEST /f
|
||
C:\Users\Default\Pictures\RuntimeBroker.exe
|
"C:\Users\Default User\Documents\My Pictures\RuntimeBroker.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 7 /tr "'C:\Users\Default\OneDrive\DcGCAukyUlBjBtCNMvgN.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgN" /sc ONLOGON /tr "'C:\Users\Default\OneDrive\DcGCAukyUlBjBtCNMvgN.exe'" /rl
HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 14 /tr "'C:\Users\Default\OneDrive\DcGCAukyUlBjBtCNMvgN.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\SoftwareDistribution\DcGCAukyUlBjBtCNMvgN.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgN" /sc ONLOGON /tr "'C:\Users\All Users\SoftwareDistribution\DcGCAukyUlBjBtCNMvgN.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\SoftwareDistribution\DcGCAukyUlBjBtCNMvgN.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\jdownloader\config\DcGCAukyUlBjBtCNMvgN.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgN" /sc ONLOGON /tr "'C:\Program Files (x86)\jdownloader\config\DcGCAukyUlBjBtCNMvgN.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "DcGCAukyUlBjBtCNMvgND" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\jdownloader\config\DcGCAukyUlBjBtCNMvgN.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Windows\SKB\LanguageModels\dllhost.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\SKB\LanguageModels\dllhost.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Windows\SKB\LanguageModels\dllhost.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\microsoft office\Office16\RuntimeBroker.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\microsoft office\Office16\RuntimeBroker.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\microsoft office\Office16\RuntimeBroker.exe'"
/rl HIGHEST /f
|
There are 28 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://a0950998.xsph.ru/@zd3bk5Wa3RHb1FmZlR0X
|
|||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
EnableLUA
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
PromptOnSecureDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\1eeac47e1570cbf1d06630aabc52dc2dda7d7efb
|
a684272e718290128734b6b22fa6fb40aa2b3b08
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.ApplicationCompany
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3185000
|
trusted library allocation
|
page read and write
|
||
2D21000
|
trusted library allocation
|
page read and write
|
||
2CFD000
|
trusted library allocation
|
page read and write
|
||
3431000
|
trusted library allocation
|
page read and write
|
||
2CC1000
|
trusted library allocation
|
page read and write
|
||
2A11000
|
trusted library allocation
|
page read and write
|
||
2D5D000
|
trusted library allocation
|
page read and write
|
||
2A61000
|
trusted library allocation
|
page read and write
|
||
12A6D000
|
trusted library allocation
|
page read and write
|
||
1AD50000
|
trusted library allocation
|
page read and write
|
||
1C6FE000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
1C8D5000
|
heap
|
page read and write
|
||
1363A000
|
trusted library allocation
|
page read and write
|
||
12F2D000
|
trusted library allocation
|
page read and write
|
||
12CC1000
|
trusted library allocation
|
page read and write
|
||
2C0B000
|
trusted library allocation
|
page read and write
|
||
3165000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
1C7EB000
|
heap
|
page read and write
|
||
12E2A000
|
trusted library allocation
|
page read and write
|
||
12B05000
|
trusted library allocation
|
page read and write
|
||
33CA000
|
trusted library allocation
|
page read and write
|
||
2A30000
|
trusted library section
|
page read and write
|
||
12F62000
|
trusted library allocation
|
page read and write
|
||
136E0000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
12D4D000
|
trusted library allocation
|
page read and write
|
||
7FF848FC6000
|
trusted library allocation
|
page read and write
|
||
13557000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
12E38000
|
trusted library allocation
|
page read and write
|
||
12C0C000
|
trusted library allocation
|
page read and write
|
||
7FF8491C1000
|
trusted library allocation
|
page read and write
|
||
2E53000
|
trusted library allocation
|
page read and write
|
||
1B602000
|
heap
|
page read and write
|
||
1B13D000
|
stack
|
page read and write
|
||
3323000
|
trusted library allocation
|
page read and write
|
||
3C2000
|
unkown
|
page readonly
|
||
1BAD0000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
12AF9000
|
trusted library allocation
|
page read and write
|
||
136C0000
|
trusted library allocation
|
page read and write
|
||
12E8E000
|
trusted library allocation
|
page read and write
|
||
1C8C0000
|
heap
|
page read and write
|
||
12D36000
|
trusted library allocation
|
page read and write
|
||
12F62000
|
trusted library allocation
|
page read and write
|
||
10FF000
|
stack
|
page read and write
|
||
12B7F000
|
trusted library allocation
|
page read and write
|
||
12CB4000
|
trusted library allocation
|
page read and write
|
||
2C03000
|
trusted library allocation
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
331B000
|
trusted library allocation
|
page read and write
|
||
12D6E000
|
trusted library allocation
|
page read and write
|
||
12F65000
|
trusted library allocation
|
page read and write
|
||
BBE000
|
heap
|
page read and write
|
||
7FF848E1C000
|
trusted library allocation
|
page read and write
|
||
2F84000
|
trusted library allocation
|
page read and write
|
||
3296000
|
trusted library allocation
|
page read and write
|
||
12C15000
|
trusted library allocation
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
1354E000
|
trusted library allocation
|
page read and write
|
||
12F26000
|
trusted library allocation
|
page read and write
|
||
1C6F1000
|
heap
|
page read and write
|
||
12E2B000
|
trusted library allocation
|
page read and write
|
||
D0C000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
1BE59000
|
stack
|
page read and write
|
||
12DCA000
|
trusted library allocation
|
page read and write
|
||
12E02000
|
trusted library allocation
|
page read and write
|
||
7FF8492E0000
|
trusted library allocation
|
page execute and read and write
|
||
E2C000
|
heap
|
page read and write
|
||
1B490000
|
trusted library section
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
7FF849088000
|
trusted library allocation
|
page read and write
|
||
7FF8490F9000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
164D1000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
12B8D000
|
trusted library allocation
|
page read and write
|
||
DCF000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
1B430000
|
trusted library section
|
page read and write
|
||
12B9E000
|
trusted library allocation
|
page read and write
|
||
12A21000
|
trusted library allocation
|
page read and write
|
||
12C1B000
|
trusted library allocation
|
page read and write
|
||
12AFC000
|
trusted library allocation
|
page read and write
|
||
12E9C000
|
trusted library allocation
|
page read and write
|
||
146D1000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library section
|
page read and write
|
||
12B90000
|
trusted library allocation
|
page read and write
|
||
1030000
|
trusted library section
|
page read and write
|
||
2ED5000
|
trusted library allocation
|
page read and write
|
||
1BD5A000
|
stack
|
page read and write
|
||
1B8CE000
|
stack
|
page read and write
|
||
13677000
|
trusted library allocation
|
page read and write
|
||
2EDF000
|
trusted library allocation
|
page read and write
|
||
12CC0000
|
trusted library allocation
|
page read and write
|
||
2C09000
|
trusted library allocation
|
page read and write
|
||
2F56000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
1B42F000
|
stack
|
page read and write
|
||
7FF848F41000
|
trusted library allocation
|
page execute and read and write
|
||
1358D000
|
trusted library allocation
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page execute and read and write
|
||
E13000
|
heap
|
page read and write
|
||
1B702000
|
heap
|
page execute and read and write
|
||
314D000
|
trusted library allocation
|
page read and write
|
||
2CFA000
|
trusted library allocation
|
page read and write
|
||
12E0A000
|
trusted library allocation
|
page read and write
|
||
12D2D000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
2F70000
|
trusted library allocation
|
page read and write
|
||
13668000
|
trusted library allocation
|
page read and write
|
||
1B4E0000
|
heap
|
page read and write
|
||
3137000
|
trusted library allocation
|
page read and write
|
||
7FF409510000
|
trusted library allocation
|
page execute and read and write
|
||
2F7C000
|
trusted library allocation
|
page read and write
|
||
3319000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page execute and read and write
|
||
2F58000
|
trusted library allocation
|
page read and write
|
||
1C7A9000
|
heap
|
page read and write
|
||
1367F000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
trusted library section
|
page read and write
|
||
12DEA000
|
trusted library allocation
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
1202000
|
heap
|
page read and write
|
||
12F48000
|
trusted library allocation
|
page read and write
|
||
159B000
|
heap
|
page read and write
|
||
1BCFE000
|
stack
|
page read and write
|
||
1BF50000
|
heap
|
page execute and read and write
|
||
12EAC000
|
trusted library allocation
|
page read and write
|
||
2CF7000
|
trusted library allocation
|
page read and write
|
||
12B01000
|
trusted library allocation
|
page read and write
|
||
7FF8492BA000
|
trusted library allocation
|
page read and write
|
||
7FF849112000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
heap
|
page execute and read and write
|
||
2F82000
|
trusted library allocation
|
page read and write
|
||
1B500000
|
heap
|
page execute and read and write
|
||
12C63000
|
trusted library allocation
|
page read and write
|
||
1C7EF000
|
heap
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
135A7000
|
trusted library allocation
|
page read and write
|
||
1354A000
|
trusted library allocation
|
page read and write
|
||
1BE60000
|
trusted library section
|
page read and write
|
||
1B4C0000
|
heap
|
page read and write
|
||
1B4C0000
|
trusted library allocation
|
page read and write
|
||
1AA60000
|
trusted library allocation
|
page read and write
|
||
12D28000
|
trusted library allocation
|
page read and write
|
||
1BBF3000
|
stack
|
page read and write
|
||
12BDF000
|
trusted library allocation
|
page read and write
|
||
12E72000
|
trusted library allocation
|
page read and write
|
||
7FF848E2C000
|
trusted library allocation
|
page read and write
|
||
1C81F000
|
heap
|
page read and write
|
||
946000
|
stack
|
page read and write
|
||
12D34000
|
trusted library allocation
|
page read and write
|
||
315D000
|
trusted library allocation
|
page read and write
|
||
7FF84912D000
|
trusted library allocation
|
page read and write
|
||
3161000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
12EDD000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
9B0000
|
heap
|
page read and write
|
||
136C6000
|
trusted library allocation
|
page read and write
|
||
12BC9000
|
trusted library allocation
|
page read and write
|
||
30BB000
|
trusted library allocation
|
page read and write
|
||
1BAFF000
|
stack
|
page read and write
|
||
2ED7000
|
trusted library allocation
|
page read and write
|
||
EE5000
|
heap
|
page read and write
|
||
1BA9A000
|
heap
|
page read and write
|
||
12E4D000
|
trusted library allocation
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
135BA000
|
trusted library allocation
|
page read and write
|
||
7FF848FD3000
|
trusted library allocation
|
page read and write
|
||
2DD1000
|
trusted library allocation
|
page read and write
|
||
1B5E0000
|
trusted library section
|
page read and write
|
||
1C7E4000
|
heap
|
page read and write
|
||
12D40000
|
trusted library allocation
|
page read and write
|
||
3321000
|
trusted library allocation
|
page read and write
|
||
7FF849202000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
heap
|
page execute and read and write
|
||
7FF8492BD000
|
trusted library allocation
|
page read and write
|
||
12E1A000
|
trusted library allocation
|
page read and write
|
||
136B5000
|
trusted library allocation
|
page read and write
|
||
7FF848FCB000
|
trusted library allocation
|
page read and write
|
||
15AD1000
|
trusted library allocation
|
page read and write
|
||
12EA4000
|
trusted library allocation
|
page read and write
|
||
1B3A0000
|
heap
|
page execute and read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
1B602000
|
heap
|
page read and write
|
||
1B4AF000
|
stack
|
page read and write
|
||
12AE9000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
2DDB000
|
trusted library allocation
|
page read and write
|
||
1B5CE000
|
stack
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
12AF0000
|
trusted library allocation
|
page read and write
|
||
12E6F000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FD7000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
12CC8000
|
trusted library allocation
|
page read and write
|
||
12CC3000
|
trusted library allocation
|
page read and write
|
||
12A1D000
|
trusted library allocation
|
page read and write
|
||
12FC5000
|
trusted library allocation
|
page read and write
|
||
12ECD000
|
trusted library allocation
|
page read and write
|
||
DC3000
|
heap
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
12CAF000
|
trusted library allocation
|
page read and write
|
||
EE3000
|
heap
|
page read and write
|
||
12F54000
|
trusted library allocation
|
page read and write
|
||
1202000
|
heap
|
page read and write
|
||
1C82F000
|
heap
|
page read and write
|
||
1320C000
|
trusted library allocation
|
page read and write
|
||
E3D000
|
heap
|
page read and write
|
||
B8C000
|
heap
|
page read and write
|
||
EF2000
|
heap
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
1C708000
|
heap
|
page read and write
|
||
2F6C000
|
trusted library allocation
|
page read and write
|
||
12ED0000
|
trusted library allocation
|
page read and write
|
||
1B480000
|
trusted library section
|
page read and write
|
||
13682000
|
trusted library allocation
|
page read and write
|
||
BEA000
|
heap
|
page read and write
|
||
1C45E000
|
stack
|
page read and write
|
||
12C24000
|
trusted library allocation
|
page read and write
|
||
12DC6000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
EC1000
|
heap
|
page read and write
|
||
12CCD000
|
trusted library allocation
|
page read and write
|
||
2DD9000
|
trusted library allocation
|
page read and write
|
||
1BEFE000
|
stack
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FD3000
|
trusted library allocation
|
page read and write
|
||
30C1000
|
trusted library allocation
|
page read and write
|
||
12E28000
|
trusted library allocation
|
page read and write
|
||
1B4A0000
|
heap
|
page execute and read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
12B8A000
|
trusted library allocation
|
page read and write
|
||
7FF848FBC000
|
trusted library allocation
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
1BD80000
|
heap
|
page read and write
|
||
12BBE000
|
trusted library allocation
|
page read and write
|
||
12F5F000
|
trusted library allocation
|
page read and write
|
||
EC8000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
31A0000
|
trusted library allocation
|
page read and write
|
||
12E3D000
|
trusted library allocation
|
page read and write
|
||
12EE1000
|
trusted library allocation
|
page read and write
|
||
12F0A000
|
trusted library allocation
|
page read and write
|
||
2BF0000
|
trusted library allocation
|
page read and write
|
||
1355D000
|
trusted library allocation
|
page read and write
|
||
15E7000
|
heap
|
page read and write
|
||
1C733000
|
heap
|
page read and write
|
||
2FE9000
|
trusted library allocation
|
page read and write
|
||
15E9000
|
heap
|
page read and write
|
||
1C743000
|
heap
|
page read and write
|
||
12C99000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
1C799000
|
heap
|
page read and write
|
||
3216000
|
trusted library allocation
|
page read and write
|
||
2F4E000
|
trusted library allocation
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
1ADE5000
|
heap
|
page read and write
|
||
7FF849290000
|
trusted library allocation
|
page read and write
|
||
2C7E000
|
trusted library allocation
|
page read and write
|
||
12ECC000
|
trusted library allocation
|
page read and write
|
||
12DA2000
|
trusted library allocation
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
12CB1000
|
trusted library allocation
|
page read and write
|
||
12DB0000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
7FF848FA3000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
3298000
|
trusted library allocation
|
page read and write
|
||
12E9A000
|
trusted library allocation
|
page read and write
|
||
12E47000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
12B2B000
|
trusted library allocation
|
page read and write
|
||
315F000
|
trusted library allocation
|
page read and write
|
||
331F000
|
trusted library allocation
|
page read and write
|
||
1B630000
|
trusted library section
|
page read and write
|
||
1C15A000
|
stack
|
page read and write
|
||
12DB9000
|
trusted library allocation
|
page read and write
|
||
1BACE000
|
stack
|
page read and write
|
||
1C805000
|
heap
|
page read and write
|
||
12FD0000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
1020000
|
trusted library section
|
page read and write
|
||
1B5CF000
|
stack
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
726000
|
unkown
|
page readonly
|
||
14F6000
|
stack
|
page read and write
|
||
7FF848FAC000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
1BEA0000
|
trusted library section
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
3155000
|
trusted library allocation
|
page read and write
|
||
135EA000
|
trusted library allocation
|
page read and write
|
||
1C92D000
|
heap
|
page read and write
|
||
12F70000
|
trusted library allocation
|
page read and write
|
||
135F4000
|
trusted library allocation
|
page read and write
|
||
1C791000
|
heap
|
page read and write
|
||
7FF8490BB000
|
trusted library allocation
|
page read and write
|
||
1C7D8000
|
heap
|
page read and write
|
||
E46000
|
heap
|
page read and write
|
||
7FF848E27000
|
trusted library allocation
|
page read and write
|
||
12EC7000
|
trusted library allocation
|
page read and write
|
||
1C05F000
|
stack
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
1353C000
|
trusted library allocation
|
page read and write
|
||
E13000
|
heap
|
page read and write
|
||
1B5B0000
|
trusted library section
|
page read and write
|
||
12D77000
|
trusted library allocation
|
page read and write
|
||
12E10000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
12D58000
|
trusted library allocation
|
page read and write
|
||
13610000
|
trusted library allocation
|
page read and write
|
||
12C18000
|
trusted library allocation
|
page read and write
|
||
321E000
|
trusted library allocation
|
page read and write
|
||
7FF848FCA000
|
trusted library allocation
|
page read and write
|
||
12F30000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
12B2F000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
12D89000
|
trusted library allocation
|
page read and write
|
||
7FF848E4D000
|
trusted library allocation
|
page execute and read and write
|
||
BEC000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
7FF8492B6000
|
trusted library allocation
|
page read and write
|
||
12DB4000
|
trusted library allocation
|
page read and write
|
||
2BC6000
|
trusted library allocation
|
page read and write
|
||
1C83B000
|
heap
|
page read and write
|
||
12ECA000
|
trusted library allocation
|
page read and write
|
||
12BE9000
|
trusted library allocation
|
page read and write
|
||
7FF848F35000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8492C0000
|
trusted library allocation
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
321A000
|
trusted library allocation
|
page read and write
|
||
12B1D000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
1AA90000
|
trusted library allocation
|
page read and write
|
||
2D34000
|
trusted library allocation
|
page read and write
|
||
13619000
|
trusted library allocation
|
page read and write
|
||
12D28000
|
trusted library allocation
|
page read and write
|
||
12DA8000
|
trusted library allocation
|
page read and write
|
||
12ED3000
|
trusted library allocation
|
page read and write
|
||
1B610000
|
trusted library section
|
page read and write
|
||
12E00000
|
trusted library allocation
|
page read and write
|
||
2F54000
|
trusted library allocation
|
page read and write
|
||
12A91000
|
trusted library allocation
|
page read and write
|
||
313B000
|
trusted library allocation
|
page read and write
|
||
1BC8E000
|
stack
|
page read and write
|
||
12B0E000
|
trusted library allocation
|
page read and write
|
||
EAE000
|
heap
|
page read and write
|
||
2A20000
|
trusted library section
|
page read and write
|
||
131AB000
|
trusted library allocation
|
page read and write
|
||
12D45000
|
trusted library allocation
|
page read and write
|
||
12E4F000
|
trusted library allocation
|
page read and write
|
||
13542000
|
trusted library allocation
|
page read and write
|
||
1BD8E000
|
stack
|
page read and write
|
||
12EF8000
|
trusted library allocation
|
page read and write
|
||
1B620000
|
trusted library section
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
1C91E000
|
heap
|
page read and write
|
||
7FF848DE4000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
18E5000
|
heap
|
page read and write
|
||
3325000
|
trusted library allocation
|
page read and write
|
||
12D47000
|
trusted library allocation
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page execute and read and write
|
||
F50000
|
trusted library section
|
page read and write
|
||
E93000
|
heap
|
page read and write
|
||
7FF848DF7000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
12BB3000
|
trusted library allocation
|
page read and write
|
||
1C761000
|
heap
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
12E3E000
|
trusted library allocation
|
page read and write
|
||
1588000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
2BB0000
|
heap
|
page execute and read and write
|
||
12EA9000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
7FF848FBA000
|
trusted library allocation
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
12F59000
|
trusted library allocation
|
page read and write
|
||
1C81A000
|
heap
|
page read and write
|
||
1359B000
|
trusted library allocation
|
page read and write
|
||
1B520000
|
trusted library allocation
|
page read and write
|
||
12ED0000
|
trusted library allocation
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
2F74000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
trusted library section
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
7FF8492B3000
|
trusted library allocation
|
page read and write
|
||
12DA6000
|
trusted library allocation
|
page read and write
|
||
1AF9D000
|
stack
|
page read and write
|
||
7FF8491CF000
|
trusted library allocation
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF848FC3000
|
trusted library allocation
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
12D30000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page execute and read and write
|
||
2C01000
|
trusted library allocation
|
page read and write
|
||
12A68000
|
trusted library allocation
|
page read and write
|
||
12D32000
|
trusted library allocation
|
page read and write
|
||
12D9D000
|
trusted library allocation
|
page read and write
|
||
130A9000
|
trusted library allocation
|
page read and write
|
||
12F4B000
|
trusted library allocation
|
page read and write
|
||
12DF3000
|
trusted library allocation
|
page read and write
|
||
2D3A000
|
trusted library allocation
|
page read and write
|
||
347B000
|
trusted library allocation
|
page read and write
|
||
3477000
|
trusted library allocation
|
page read and write
|
||
1C77A000
|
heap
|
page read and write
|
||
12E05000
|
trusted library allocation
|
page read and write
|
||
3163000
|
trusted library allocation
|
page read and write
|
||
13573000
|
trusted library allocation
|
page read and write
|
||
12CD1000
|
trusted library allocation
|
page read and write
|
||
12C21000
|
trusted library allocation
|
page read and write
|
||
7FF848E9C000
|
trusted library allocation
|
page execute and read and write
|
||
7D0000
|
heap
|
page read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page execute and read and write
|
||
12DD1000
|
trusted library allocation
|
page read and write
|
||
12B57000
|
trusted library allocation
|
page read and write
|
||
12BFD000
|
trusted library allocation
|
page read and write
|
||
12FB7000
|
trusted library allocation
|
page read and write
|
||
2F64000
|
trusted library allocation
|
page read and write
|
||
136BD000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
12C96000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
16ED1000
|
trusted library allocation
|
page read and write
|
||
7FF848DE3000
|
trusted library allocation
|
page execute and read and write
|
||
3141000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
12ADC000
|
trusted library allocation
|
page read and write
|
||
12E37000
|
trusted library allocation
|
page read and write
|
||
12AC1000
|
trusted library allocation
|
page read and write
|
||
1B9FE000
|
stack
|
page read and write
|
||
F02000
|
heap
|
page read and write
|
||
135A3000
|
trusted library allocation
|
page read and write
|
||
12DB6000
|
trusted library allocation
|
page read and write
|
||
12BF2000
|
trusted library allocation
|
page read and write
|
||
F90000
|
trusted library section
|
page read and write
|
||
12D8C000
|
trusted library allocation
|
page read and write
|
||
2F52000
|
trusted library allocation
|
page read and write
|
||
12BD0000
|
trusted library allocation
|
page read and write
|
||
19EF000
|
stack
|
page read and write
|
||
15EC000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
1BE80000
|
trusted library section
|
page read and write
|
||
12AE4000
|
trusted library allocation
|
page read and write
|
||
1D005000
|
heap
|
page read and write
|
||
7FF848E27000
|
trusted library allocation
|
page read and write
|
||
1B8AD000
|
stack
|
page read and write
|
||
1AA40000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
12F29000
|
trusted library allocation
|
page read and write
|
||
1C747000
|
heap
|
page read and write
|
||
12DA4000
|
trusted library allocation
|
page read and write
|
||
B86000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
12DCF000
|
trusted library allocation
|
page read and write
|
||
2C7A000
|
trusted library allocation
|
page read and write
|
||
12E94000
|
trusted library allocation
|
page read and write
|
||
2EDC000
|
trusted library allocation
|
page read and write
|
||
1B8FE000
|
stack
|
page read and write
|
||
2F72000
|
trusted library allocation
|
page read and write
|
||
1D002000
|
heap
|
page read and write
|
||
12D65000
|
trusted library allocation
|
page read and write
|
||
7FF848F8C000
|
trusted library allocation
|
page read and write
|
||
135E5000
|
trusted library allocation
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
12CA5000
|
trusted library allocation
|
page read and write
|
||
2F7A000
|
trusted library allocation
|
page read and write
|
||
12E74000
|
trusted library allocation
|
page read and write
|
||
12E79000
|
trusted library allocation
|
page read and write
|
||
1B7C3000
|
stack
|
page read and write
|
||
184F000
|
stack
|
page read and write
|
||
7FF8492B0000
|
trusted library allocation
|
page read and write
|
||
12B98000
|
trusted library allocation
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
1BE8E000
|
stack
|
page read and write
|
||
7FF848FC3000
|
trusted library allocation
|
page read and write
|
||
1D002000
|
heap
|
page read and write
|
||
12DD8000
|
trusted library allocation
|
page read and write
|
||
7FF849188000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
30BD000
|
trusted library allocation
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
2D3C000
|
trusted library allocation
|
page read and write
|
||
135E8000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
12E7F000
|
trusted library allocation
|
page read and write
|
||
1C970000
|
heap
|
page read and write
|
||
12C13000
|
trusted library allocation
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
12F5F000
|
trusted library allocation
|
page read and write
|
||
12DAB000
|
trusted library allocation
|
page read and write
|
||
1785C000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
2F78000
|
trusted library allocation
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
12D55000
|
trusted library allocation
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
3420000
|
heap
|
page execute and read and write
|
||
150D1000
|
trusted library allocation
|
page read and write
|
||
2D77000
|
trusted library allocation
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
12FAA000
|
trusted library allocation
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page execute and read and write
|
||
1B4A0000
|
heap
|
page read and write
|
||
DA4000
|
heap
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page execute and read and write
|
||
12F57000
|
trusted library allocation
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
E79000
|
heap
|
page read and write
|
||
12DB2000
|
trusted library allocation
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
12D73000
|
trusted library allocation
|
page read and write
|
||
12E44000
|
trusted library allocation
|
page read and write
|
||
316B000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
1BA61000
|
heap
|
page read and write
|
||
12AAA000
|
trusted library allocation
|
page read and write
|
||
2F50000
|
trusted library allocation
|
page read and write
|
||
1302000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
2DD4000
|
trusted library allocation
|
page read and write
|
||
12DEA000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
18266000
|
trusted library allocation
|
page read and write
|
||
1B480000
|
heap
|
page read and write
|
||
1BB0D000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
2A40000
|
trusted library section
|
page read and write
|
||
13575000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
2CBA000
|
trusted library allocation
|
page read and write
|
||
EC9000
|
heap
|
page read and write
|
||
12C8D000
|
trusted library allocation
|
page read and write
|
||
15BD000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
1CFBE000
|
stack
|
page read and write
|
||
11FF000
|
stack
|
page read and write
|
||
EFB000
|
heap
|
page read and write
|
||
135E1000
|
trusted library allocation
|
page read and write
|
||
12FA7000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
CF0000
|
trusted library allocation
|
page read and write
|
||
12C7A000
|
trusted library allocation
|
page read and write
|
||
7FF848DE2000
|
trusted library allocation
|
page read and write
|
||
E4A000
|
heap
|
page read and write
|
||
7FF848FBB000
|
trusted library allocation
|
page read and write
|
||
EB6000
|
heap
|
page read and write
|
||
12FC3000
|
trusted library allocation
|
page read and write
|
||
12D91000
|
trusted library allocation
|
page read and write
|
||
12DAA000
|
trusted library allocation
|
page read and write
|
||
331D000
|
trusted library allocation
|
page read and write
|
||
12E4B000
|
trusted library allocation
|
page read and write
|
||
1343D000
|
trusted library allocation
|
page read and write
|
||
12D39000
|
trusted library allocation
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page execute and read and write
|
||
1C904000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
12C31000
|
trusted library allocation
|
page read and write
|
||
1BE70000
|
trusted library section
|
page read and write
|
||
7FF848E96000
|
trusted library allocation
|
page read and write
|
||
1C95C000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page execute and read and write
|
||
1C8FA000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
12C5B000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
D06000
|
heap
|
page read and write
|
||
12EDB000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library section
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
1BDFE000
|
stack
|
page read and write
|
||
1C8C5000
|
heap
|
page read and write
|
||
2BCA000
|
trusted library allocation
|
page read and write
|
||
1C254000
|
stack
|
page read and write
|
||
2F7E000
|
trusted library allocation
|
page read and write
|
||
2F86000
|
trusted library allocation
|
page read and write
|
||
12ED6000
|
trusted library allocation
|
page read and write
|
||
13441000
|
trusted library allocation
|
page read and write
|
||
3151000
|
trusted library allocation
|
page read and write
|
||
12A18000
|
trusted library allocation
|
page read and write
|
||
321C000
|
trusted library allocation
|
page read and write
|
||
12D70000
|
trusted library allocation
|
page read and write
|
||
12D95000
|
trusted library allocation
|
page read and write
|
||
12E55000
|
trusted library allocation
|
page read and write
|
||
12AD7000
|
trusted library allocation
|
page read and write
|
||
7FF848E34000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
7FF848E4B000
|
trusted library allocation
|
page execute and read and write
|
||
2F76000
|
trusted library allocation
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
12F00000
|
trusted library allocation
|
page read and write
|
||
3159000
|
trusted library allocation
|
page read and write
|
||
1BE90000
|
trusted library section
|
page read and write
|
||
EFF000
|
heap
|
page read and write
|
||
13431000
|
trusted library allocation
|
page read and write
|
||
1AFED000
|
stack
|
page read and write
|
||
7FF848DFC000
|
trusted library allocation
|
page read and write
|
||
12DFE000
|
trusted library allocation
|
page read and write
|
||
2D02000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
2F6A000
|
trusted library allocation
|
page read and write
|
||
132D1000
|
trusted library allocation
|
page read and write
|
||
1C7FB000
|
heap
|
page read and write
|
||
12D2A000
|
trusted library allocation
|
page read and write
|
||
12F1D000
|
trusted library allocation
|
page read and write
|
||
3294000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
2CBC000
|
trusted library allocation
|
page read and write
|
||
12F22000
|
trusted library allocation
|
page read and write
|
||
1CDBE000
|
stack
|
page read and write
|
||
1C83F000
|
heap
|
page read and write
|
||
135B3000
|
trusted library allocation
|
page read and write
|
||
12D95000
|
trusted library allocation
|
page read and write
|
||
7FF8490AE000
|
trusted library allocation
|
page read and write
|
||
2E12000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library section
|
page read and write
|
||
1BE8E000
|
stack
|
page read and write
|
||
12A9E000
|
trusted library allocation
|
page read and write
|
||
12F04000
|
trusted library allocation
|
page read and write
|
||
1BEEE000
|
stack
|
page read and write
|
||
1C6C0000
|
heap
|
page read and write
|
||
7FF848FB3000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
12C53000
|
trusted library allocation
|
page read and write
|
||
12DCE000
|
trusted library allocation
|
page read and write
|
||
12D8F000
|
trusted library allocation
|
page read and write
|
||
1C942000
|
heap
|
page read and write
|
||
3153000
|
trusted library allocation
|
page read and write
|
||
1B8FF000
|
stack
|
page read and write
|
||
313D000
|
trusted library allocation
|
page read and write
|
||
1366E000
|
trusted library allocation
|
page read and write
|
||
1B6CE000
|
stack
|
page read and write
|
||
15A5000
|
heap
|
page read and write
|
||
E51000
|
heap
|
page read and write
|
||
D73000
|
heap
|
page read and write
|
||
12C7F000
|
trusted library allocation
|
page read and write
|
||
1C73C000
|
heap
|
page read and write
|
||
1326E000
|
trusted library allocation
|
page read and write
|
||
1C822000
|
heap
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
2ACC000
|
trusted library allocation
|
page read and write
|
||
1C6ED000
|
heap
|
page read and write
|
||
12D89000
|
trusted library allocation
|
page read and write
|
||
12AA7000
|
trusted library allocation
|
page read and write
|
||
12EA2000
|
trusted library allocation
|
page read and write
|
||
12F60000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
2A00000
|
trusted library section
|
page read and write
|
||
BF3000
|
heap
|
page read and write
|
||
1D0BE000
|
stack
|
page read and write
|
||
7FF84920B000
|
trusted library allocation
|
page read and write
|
||
1BACB000
|
heap
|
page read and write
|
||
12C9C000
|
trusted library allocation
|
page read and write
|
||
3327000
|
trusted library allocation
|
page read and write
|
||
12B54000
|
trusted library allocation
|
page read and write
|
||
12A61000
|
trusted library allocation
|
page read and write
|
||
2C05000
|
trusted library allocation
|
page read and write
|
||
12F71000
|
trusted library allocation
|
page read and write
|
||
12D51000
|
trusted library allocation
|
page read and write
|
||
E45000
|
heap
|
page read and write
|
||
135A9000
|
trusted library allocation
|
page read and write
|
||
12DB4000
|
trusted library allocation
|
page read and write
|
||
F80000
|
trusted library section
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
12EB0000
|
trusted library allocation
|
page read and write
|
||
12D21000
|
trusted library allocation
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
329C000
|
trusted library allocation
|
page read and write
|
||
135DB000
|
trusted library allocation
|
page read and write
|
||
1C721000
|
heap
|
page read and write
|
||
12F10000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
7FF848FBE000
|
trusted library allocation
|
page read and write
|
||
7FF849057000
|
trusted library allocation
|
page read and write
|
||
7FF848FDB000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
7FF848E37000
|
trusted library allocation
|
page read and write
|
||
1B955000
|
stack
|
page read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
1B853000
|
stack
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
7FF848FF8000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
F02000
|
heap
|
page read and write
|
||
1361E000
|
trusted library allocation
|
page read and write
|
||
1BCEE000
|
stack
|
page read and write
|
||
DC0000
|
trusted library section
|
page read and write
|
||
12E30000
|
trusted library allocation
|
page read and write
|
||
1BB16000
|
heap
|
page read and write
|
||
E2E000
|
heap
|
page read and write
|
||
12B95000
|
trusted library allocation
|
page read and write
|
||
12A9C000
|
trusted library allocation
|
page read and write
|
||
12E5F000
|
trusted library allocation
|
page read and write
|
||
2C07000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
12F0F000
|
trusted library allocation
|
page read and write
|
||
1045000
|
heap
|
page read and write
|
||
7FF848DED000
|
trusted library allocation
|
page execute and read and write
|
||
12DED000
|
trusted library allocation
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
1580000
|
heap
|
page read and write
|
||
1B650000
|
heap
|
page execute and read and write
|
||
E75000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
12E1C000
|
trusted library allocation
|
page read and write
|
||
12DF6000
|
trusted library allocation
|
page read and write
|
||
1353F000
|
trusted library allocation
|
page read and write
|
||
12A11000
|
trusted library allocation
|
page read and write
|
||
D43000
|
heap
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
12D31000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
13433000
|
trusted library allocation
|
page read and write
|
||
D6D000
|
heap
|
page read and write
|
||
12B7C000
|
trusted library allocation
|
page read and write
|
||
7FF849198000
|
trusted library allocation
|
page read and write
|
||
1B9CE000
|
stack
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
1B5AF000
|
stack
|
page read and write
|
||
11FF000
|
stack
|
page read and write
|
||
12E41000
|
trusted library allocation
|
page read and write
|
||
2C7C000
|
trusted library allocation
|
page read and write
|
||
12DC0000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
7FF848FE3000
|
trusted library allocation
|
page read and write
|
||
1B600000
|
trusted library section
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page read and write
|
||
12DFF000
|
trusted library allocation
|
page read and write
|
||
12DF0000
|
trusted library allocation
|
page read and write
|
||
2DD7000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
heap
|
page execute and read and write
|
||
12F8E000
|
trusted library allocation
|
page read and write
|
||
15BB000
|
heap
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
FA0000
|
trusted library section
|
page read and write
|
||
30BF000
|
trusted library allocation
|
page read and write
|
||
BC1000
|
heap
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
1B702000
|
heap
|
page execute and read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
12F39000
|
trusted library allocation
|
page read and write
|
||
12C4A000
|
trusted library allocation
|
page read and write
|
||
12E55000
|
trusted library allocation
|
page read and write
|
||
1C719000
|
heap
|
page read and write
|
||
13657000
|
trusted library allocation
|
page read and write
|
||
2F88000
|
trusted library allocation
|
page read and write
|
||
CF6000
|
stack
|
page read and write
|
||
1BC5A000
|
stack
|
page read and write
|
||
7FF849296000
|
trusted library allocation
|
page read and write
|
||
12B0B000
|
trusted library allocation
|
page read and write
|
||
7FF848F9B000
|
trusted library allocation
|
page read and write
|
||
1C354000
|
stack
|
page read and write
|
||
13CD1000
|
trusted library allocation
|
page read and write
|
||
12BEE000
|
trusted library allocation
|
page read and write
|
||
1B9FE000
|
stack
|
page read and write
|
||
2BC8000
|
trusted library allocation
|
page read and write
|
||
3135000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
12E13000
|
trusted library allocation
|
page read and write
|
||
7FF848E44000
|
trusted library allocation
|
page read and write
|
||
7FF848E2C000
|
trusted library allocation
|
page read and write
|
||
162E000
|
heap
|
page read and write
|
||
12F25000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
2DD7000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page read and write
|
||
12AE0000
|
trusted library allocation
|
page read and write
|
||
17866000
|
trusted library allocation
|
page read and write
|
||
1BB1E000
|
heap
|
page read and write
|
||
1C7C6000
|
heap
|
page read and write
|
||
315B000
|
trusted library allocation
|
page read and write
|
||
12D49000
|
trusted library allocation
|
page read and write
|
||
12E6C000
|
trusted library allocation
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
12EC4000
|
trusted library allocation
|
page read and write
|
||
12F32000
|
trusted library allocation
|
page read and write
|
||
18E0000
|
heap
|
page read and write
|
||
7FF8492F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
12B9B000
|
trusted library allocation
|
page read and write
|
||
7FF848F3F000
|
trusted library allocation
|
page execute and read and write
|
||
12AA2000
|
trusted library allocation
|
page read and write
|
||
12D9E000
|
trusted library allocation
|
page read and write
|
||
12A8A000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
trusted library section
|
page read and write
|
||
130E8000
|
trusted library allocation
|
page read and write
|
||
12E77000
|
trusted library allocation
|
page read and write
|
||
2CBE000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
3139000
|
trusted library allocation
|
page read and write
|
||
2F9F000
|
trusted library allocation
|
page read and write
|
||
2F66000
|
trusted library allocation
|
page read and write
|
||
1C6E5000
|
heap
|
page read and write
|
||
30C5000
|
trusted library allocation
|
page read and write
|
||
13438000
|
trusted library allocation
|
page read and write
|
||
1C914000
|
heap
|
page read and write
|
||
303D000
|
trusted library allocation
|
page read and write
|
||
1BB43000
|
stack
|
page read and write
|
||
12AEE000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
7FF848E17000
|
trusted library allocation
|
page read and write
|
||
12E96000
|
trusted library allocation
|
page read and write
|
||
1510000
|
trusted library allocation
|
page read and write
|
||
1B75F000
|
stack
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
F60000
|
trusted library section
|
page read and write
|
||
12B07000
|
trusted library allocation
|
page read and write
|
||
1BFE5000
|
stack
|
page read and write
|
||
7FF848FCC000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
12E61000
|
trusted library allocation
|
page read and write
|
||
12E06000
|
trusted library allocation
|
page read and write
|
||
12DE6000
|
trusted library allocation
|
page read and write
|
||
12E18000
|
trusted library allocation
|
page read and write
|
||
12EA8000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page read and write
|
||
12DE8000
|
trusted library allocation
|
page read and write
|
||
12DD2000
|
trusted library allocation
|
page read and write
|
||
12E3B000
|
trusted library allocation
|
page read and write
|
||
319D000
|
trusted library allocation
|
page read and write
|
||
314F000
|
trusted library allocation
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
12B12000
|
trusted library allocation
|
page read and write
|
||
3167000
|
trusted library allocation
|
page read and write
|
||
7FF849300000
|
trusted library allocation
|
page read and write
|
||
13647000
|
trusted library allocation
|
page read and write
|
||
2F6E000
|
trusted library allocation
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
1302000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
2F68000
|
trusted library allocation
|
page read and write
|
||
12C9F000
|
trusted library allocation
|
page read and write
|
||
12FA2000
|
trusted library allocation
|
page read and write
|
||
7FF848FBC000
|
trusted library allocation
|
page read and write
|
||
7FF848E34000
|
trusted library allocation
|
page read and write
|
||
135EE000
|
trusted library allocation
|
page read and write
|
||
12E83000
|
trusted library allocation
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page execute and read and write
|
||
1B640000
|
trusted library section
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
E3B000
|
heap
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
7FF848E33000
|
trusted library allocation
|
page read and write
|
||
12D3C000
|
trusted library allocation
|
page read and write
|
||
7FF8492A0000
|
trusted library allocation
|
page read and write
|
||
13149000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
12B19000
|
trusted library allocation
|
page read and write
|
||
1ACF0000
|
trusted library allocation
|
page read and write
|
||
1BA5D000
|
stack
|
page read and write
|
||
12E9F000
|
trusted library allocation
|
page read and write
|
||
2D1E000
|
stack
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
135C1000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
7FF8492D0000
|
trusted library allocation
|
page read and write
|
||
E4F000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
12E66000
|
trusted library allocation
|
page read and write
|
||
12D23000
|
trusted library allocation
|
page read and write
|
||
12F6C000
|
trusted library allocation
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
135D4000
|
trusted library allocation
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library section
|
page read and write
|
||
1B460000
|
trusted library allocation
|
page read and write
|
||
2DCE000
|
trusted library allocation
|
page read and write
|
||
30C7000
|
trusted library allocation
|
page read and write
|
||
1C78D000
|
heap
|
page read and write
|
||
12A13000
|
trusted library allocation
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
12C11000
|
trusted library allocation
|
page read and write
|
||
3169000
|
trusted library allocation
|
page read and write
|
||
1B19D000
|
stack
|
page read and write
|
||
12D8B000
|
trusted library allocation
|
page read and write
|
||
12F0D000
|
trusted library allocation
|
page read and write
|
||
12D98000
|
trusted library allocation
|
page read and write
|
||
F85000
|
heap
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849062000
|
trusted library allocation
|
page read and write
|
||
1B5F0000
|
trusted library section
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
EFD000
|
heap
|
page read and write
|
||
12D4B000
|
trusted library allocation
|
page read and write
|
||
15A8000
|
heap
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
1C704000
|
heap
|
page read and write
|
||
12F4E000
|
trusted library allocation
|
page read and write
|
||
329A000
|
trusted library allocation
|
page read and write
|
||
13591000
|
trusted library allocation
|
page read and write
|
||
12D93000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
3157000
|
trusted library allocation
|
page read and write
|
||
12B20000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
12EC0000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
1D2EC000
|
stack
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
12E7C000
|
trusted library allocation
|
page read and write
|
There are 953 hidden memdumps, click here to show them.