Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
7.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\WindowsUpdate.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\WindowsUpdate.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\WindowsUpdate.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\bhv4267.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x8b6baa0f, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\holderwb.txt
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\pid.txt
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\pidloc.txt
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\7.exe
|
"C:\Users\user\Desktop\7.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt"
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt"
|
||
C:\Users\user\AppData\Roaming\WindowsUpdate.exe
|
"C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
|
||
C:\Users\user\AppData\Roaming\WindowsUpdate.exe
|
"C:\Users\user\AppData\Roaming\WindowsUpdate.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.google.com/chrome/static/css/main.v2.min.css
|
unknown
|
||
https://www.msn.com//searchp/LinkId=255141
|
unknown
|
||
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwj8k7G9rJDsAhWNTxUIHZZGDCQQ
|
unknown
|
||
https://dl.google.com/tag/s/appguid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7B83C84637
|
unknown
|
||
http://www.msn.com
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
https://deff.nelreports.net/api/report?cat=msn
|
unknown
|
||
https://contextual.media.net/__media__/js/util/nrrV9140.js
|
unknown
|
||
https://mem.gfx.ms/me/MeControl/10.19168.0/en-US/meCore.min.js
|
unknown
|
||
https://www.google.com/chrome/static/images/download-browser/big_pixel_phone.png
|
unknown
|
||
http://images.outbrainimg.com/transform/v3/eyJpdSI6Ijk4OGQ1ZDgwMWE2ODQ2NDNkM2ZkMmYyMGEwOTgwMWQ3MDE2Z
|
unknown
|
||
https://s.yimg.com/lo/api/res/1.2/BXjlWewXmZ47HeV5NPvUYA--~A/Zmk9ZmlsbDt3PTYyMjtoPTM2ODthcHBpZD1nZW1
|
unknown
|
||
https://www.google.com/intl/en_uk/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrows
|
unknown
|
||
http://whatismyipaddress.com/-
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.jiyu-kobo.co.jp/)
|
unknown
|
||
http://www.site.com/logs.php
|
unknown
|
||
http://whatismyipaddress.com/
|
104.16.154.36
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://www.carterandcone.como.
|
unknown
|
||
https://whatismyipaddress.comx&Qq
|
unknown
|
||
https://logincdn.msauth.net/16.000/Converged_v21033_-0mnSwu67knBd7qR7YN9GQ2.css
|
unknown
|
||
https://www.google.com/complete/search?q&cp=0&client=psy-ab&xssi=t&gs_ri=gws-wiz&hl=en&authuser=0&ps
|
unknown
|
||
https://logincdn.msauth.net/16.000.28666.10/content/images/microsoft_logo_ee5c8d9fb6248c938fd0dc1937
|
unknown
|
||
https://logincdn.msauth.net/16.000.28666.10/content/images/ellipsis_white_5ac590ee72bfe06a7cecfd75b5
|
unknown
|
||
http://www.sandoll.co.kru
|
unknown
|
||
https://www.google.com/complete/search?q&cp=0&client=psy-ab&xssi=t&gs_ri=gws-wiz&hl=en&authuser=0&pq
|
unknown
|
||
http://www.jiyu-kobo.co.jp/R
|
unknown
|
||
https://www.google.com/search?source=hp&ei=djJ0X6TKCL6IjLsPqriogAY&q=chrome&oq=chrome&gs_lcp=CgZwc3k
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC5bdddb231cf54f958a5b6e76e9d8eee
|
unknown
|
||
https://logincdn.msauth.net/16.000.28666.10/content/images/ellipsis_grey_2b5d393db04a5e6e1f739cb266e
|
unknown
|
||
https://cvision.media.net/new/300x300/2/41/100/83/b5cbfa68-1c93-41c9-8797-4f9b532bc0b6.jpg?v=9
|
unknown
|
||
https://www.google.com/chrome/static/images/download-browser/pixel_phone.png
|
unknown
|
||
https://www.google.com/chrome/static/images/homepage/hero-anim-top-right.png
|
unknown
|
||
http://www.jiyu-kobo.co.jp/D
|
unknown
|
||
https://pki.goog/repository/0
|
unknown
|
||
https://www.msn.com/
|
unknown
|
||
https://mem.gfx.ms/meversion?partner=RetailStore2&market=en-us&uhf=1
|
unknown
|
||
http://www.carterandcone.comcoc
|
unknown
|
||
https://www.google.com/xjs/_/js/k=xjs.s.en_GB.u8fwEfmm86E.O/ck=xjs.s.hyRG9kR79v8.L.I11.O/m=IvlUe
|
unknown
|
||
https://www.google.com/favicon.ico
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.msn.com/
|
unknown
|
||
http://www.founder.com.cn/cnlYM
|
unknown
|
||
https://www.google.com/chrome/static/images/fallback/google-logo-one-color.jpg
|
unknown
|
||
https://172.217.23.78/
|
unknown
|
||
https://www.google.com/images/nav_logo299.png
|
unknown
|
||
https://www.google.com/chrome/static/images/fallback/icon-help.jpg
|
unknown
|
||
http://www.founder.com.cn/cnicr
|
unknown
|
||
https://www.google.com/complete/search?q=c&cp=1&client=psy-ab&xssi=t&gs_ri=gws-wiz&hl=en&authuser=0&
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
http://www.carterandcone.comnte
|
unknown
|
||
https://consent.google.com/set?pc=s&uxe=4421591
|
unknown
|
||
http://images.outbrainimg.com/transform/v3/eyJpdSI6ImYxODk5OTBhOWZjYjFmZjNjNmMxNDhmYjkzM2M3NzY1Mzk3Z
|
unknown
|
||
https://www.google.com/images/hpp/Chrome_Owned_96x96.png
|
unknown
|
||
http://crl.pki.goog/gsr2/gsr2.crl0?
|
unknown
|
||
http://www.founder.com.cn/cnate
|
unknown
|
||
http://www.jiyu-kobo.co.jp/a
|
unknown
|
||
http://pki.goog/gsr2/GTSGIAG3.crt0)
|
unknown
|
||
https://googleads.g.doubleclick.net/adsid/google/ui?gadsid=AORoGNQP1yCl9r5iywZTFTjpazv-DURVxDidzMfrF
|
unknown
|
||
https://googleads.g.doubleclick.net/adsid/google/ui?gadsid=AORoGNSrZsXAj6n_sYvivJecwrpYgMhb9ihVGAlz2
|
unknown
|
||
https://www.google.com/chrome/static/images/fallback/icon-fb.jpg
|
unknown
|
||
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.9Ky5Gf3gP0o.O/m=gapi_iframes
|
unknown
|
||
https://adservice.google.com/adsid/google/si?gadsid=AORoGNSvKHbjRugN8Bruw1IrFif72u8bwsJvZ4BRSrMAhil_
|
unknown
|
||
http://www.carterandcone.com$
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
https://ogs.google.com/widget/callout?prid=19020392&pgid=19020380&puid=93eb0881ae9ec1db&origin=https
|
unknown
|
||
https://www.google.com/complete/search?q=chrome&cp=6&client=psy-ab&xssi=t&gs_ri=gws-wiz&hl=en&authus
|
unknown
|
||
https://www.google.com/images/phd/px.gif
|
unknown
|
||
https://www.google.com/chrome/static/images/homepage/google-canary.png
|
unknown
|
||
https://adservice.google.co.uk/adsid/google/ui?gadsid=AORoGNQXg7AHkvg6J6S0TqGFa_0HynGV3_XxYfs4fLINJG
|
unknown
|
||
https://play.google.com/intl/en_us/badges/images/generic/de_badge_web_generic.png
|
unknown
|
||
https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.js
|
unknown
|
||
https://www.google.com/chrome/static/js/main.v2.min.js
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCfd484f9188564713bbc5d13d862ebbf
|
unknown
|
||
https://cvision.media.net/new/100x75/2/89/162/29/8ee7a9a3-dec9-4d15-94e1-5c73b17d2de1.jpg?v=9
|
unknown
|
||
http://www.founder.com.cn/cnn-u~
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.carterandcone.comyo
|
unknown
|
||
http://www.zhongyicts.com.cnte
|
unknown
|
||
http://fontfabrik.com
|
unknown
|
||
https://googleads.g.doubleclick.net/adsid/google/si?gadsid=AORoGNTXuGHPo1zFjYPXt7mTG-4GALGGk8bjqjvBm
|
unknown
|
||
http://www.monotype.EN~
|
unknown
|
||
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
|
unknown
|
||
https://www.google.com/intl/en_uk/chrome/
|
unknown
|
||
https://www.google.com/chrome/static/images/fallback/icon-youtube.jpg
|
unknown
|
||
https://googleads.g.doubleclick.net/adsid/google/si?gadsid=AORoGNQXwBwQrE_SUsnWzwpadcOOdc8yOg6JxthQN
|
unknown
|
||
https://www.google.com/intl/en_uk/chrome/application/x-msdownloadC:
|
unknown
|
||
http://images.outbrainimg.com/transform/v3/eyJpdSI6IjJkYTFhZDAwNDEyNzQ2M2E3MGUyMWVkZmIxNmUyZjQ2MjBkM
|
unknown
|
||
http://www.founder.com.cn/cnn-u
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.carterandcone.comT
|
unknown
|
||
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=4510094
|
unknown
|
||
https://www.google.com/chrome/static/js/installer.min.js
|
unknown
|
||
https://www.google.com/search
|
unknown
|
||
https://www.google.com/chrome/static/images/download-browser/pixel_tablet.png
|
unknown
|
||
http://whatismyipaddress.com
|
unknown
|
||
http://www.jiyu-kobo.co.jp/jp/
|
unknown
|
||
https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en_5QoHC_ilFOmb96M0pIeJ
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
whatismyipaddress.com
|
104.16.154.36
|
||
us-east-1.route-1000.000webhost.awex.io
|
145.14.144.149
|
||
files.000webhost.com
|
unknown
|
||
49.124.12.0.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.16.154.36
|
whatismyipaddress.com
|
United States
|
||
145.14.144.149
|
us-east-1.route-1000.000webhost.awex.io
|
Netherlands
|
||
192.168.2.1
|
unknown
|
unknown
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
|
Hidden
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\7_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
|
Windows Update
|
There are 7 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C92000
|
unkown
|
page readonly
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4A2000
|
unkown
|
page readonly
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
142000
|
unkown
|
page readonly
|
||
3771000
|
trusted library allocation
|
page read and write
|
||
4A2000
|
unkown
|
page readonly
|
||
C92000
|
unkown
|
page readonly
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
142000
|
unkown
|
page readonly
|
||
2823000
|
trusted library allocation
|
page read and write
|
||
6B00000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
6674000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
598D000
|
stack
|
page read and write
|
||
1C01AC21000
|
heap
|
page read and write
|
||
20B44800000
|
heap
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
3438000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
87B747F000
|
stack
|
page read and write
|
||
24811613000
|
heap
|
page read and write
|
||
70E0000
|
remote allocation
|
page read and write
|
||
142B000
|
trusted library allocation
|
page execute and read and write
|
||
1C016740000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1649B7C000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
4EA6000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
6660000
|
trusted library allocation
|
page read and write
|
||
1649F7F000
|
stack
|
page read and write
|
||
4EC9000
|
trusted library allocation
|
page read and write
|
||
BF8000
|
heap
|
page read and write
|
||
1C53CB90000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1C01AF80000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
heap
|
page execute and read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4E9E000
|
trusted library allocation
|
page read and write
|
||
12C19813000
|
heap
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
221A000
|
trusted library allocation
|
page read and write
|
||
4EC9000
|
trusted library allocation
|
page read and write
|
||
21A5E002000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
AEC000
|
trusted library allocation
|
page execute and read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
A05000
|
heap
|
page read and write
|
||
6655000
|
trusted library allocation
|
page read and write
|
||
8EE000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
BF92FB000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
1C016850000
|
trusted library section
|
page readonly
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
2725000
|
trusted library allocation
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
12C1984C000
|
heap
|
page read and write
|
||
1C01AC9A000
|
heap
|
page read and write
|
||
18EFA0A0000
|
remote allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC2000
|
trusted library allocation
|
page read and write
|
||
1C01567A000
|
heap
|
page read and write
|
||
2B61000
|
trusted library allocation
|
page read and write
|
||
87B737F000
|
stack
|
page read and write
|
||
2729000
|
trusted library allocation
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
2728000
|
trusted library allocation
|
page read and write
|
||
1C0156A5000
|
heap
|
page read and write
|
||
568E000
|
stack
|
page read and write
|
||
4EAA000
|
trusted library allocation
|
page read and write
|
||
4EA6000
|
trusted library allocation
|
page read and write
|
||
2723000
|
trusted library allocation
|
page read and write
|
||
21FD000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
1C53CC29000
|
heap
|
page read and write
|
||
45A000
|
stack
|
page read and write
|
||
6122000
|
trusted library allocation
|
page read and write
|
||
2726000
|
trusted library allocation
|
page read and write
|
||
221A000
|
trusted library allocation
|
page read and write
|
||
24811708000
|
heap
|
page read and write
|
||
2266CEB4000
|
heap
|
page read and write
|
||
1BAE5213000
|
heap
|
page read and write
|
||
5DB1C78000
|
stack
|
page read and write
|
||
21A5DE70000
|
trusted library allocation
|
page read and write
|
||
4EC2000
|
trusted library allocation
|
page read and write
|
||
18EF9858000
|
heap
|
page read and write
|
||
20B4487D000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
ACE000
|
heap
|
page read and write
|
||
2266DC02000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
4EA6000
|
trusted library allocation
|
page read and write
|
||
1C016830000
|
trusted library section
|
page readonly
|
||
24811713000
|
heap
|
page read and write
|
||
2481163C000
|
heap
|
page read and write
|
||
1402000
|
trusted library allocation
|
page read and write
|
||
4EC2000
|
trusted library allocation
|
page read and write
|
||
146E000
|
stack
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
1FF0444A000
|
heap
|
page read and write
|
||
220C000
|
trusted library allocation
|
page read and write
|
||
4E92000
|
trusted library allocation
|
page read and write
|
||
20B44870000
|
heap
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
7958000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
4ED6000
|
trusted library allocation
|
page read and write
|
||
1BAE5229000
|
heap
|
page read and write
|
||
4778000
|
trusted library allocation
|
page read and write
|
||
1C01AC5F000
|
heap
|
page read and write
|
||
CCC000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
2B81000
|
trusted library allocation
|
page read and write
|
||
220C000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
1FF04508000
|
heap
|
page read and write
|
||
1C53CC6A000
|
heap
|
page read and write
|
||
2621000
|
heap
|
page read and write
|
||
6669000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
ACC000
|
heap
|
page read and write
|
||
4EB6000
|
trusted library allocation
|
page read and write
|
||
21A5C42A000
|
heap
|
page read and write
|
||
1FF04502000
|
heap
|
page read and write
|
||
21B0000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
C68000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page execute and read and write
|
||
2266D5A0000
|
trusted library allocation
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
1C53CC5B000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
7680000
|
trusted library allocation
|
page read and write
|
||
4EAE000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
24811600000
|
heap
|
page read and write
|
||
4E9E000
|
trusted library allocation
|
page read and write
|
||
20B45002000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
6B10000
|
trusted library allocation
|
page read and write
|
||
4EA4000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
4ECA000
|
trusted library allocation
|
page read and write
|
||
664C000
|
trusted library allocation
|
page read and write
|
||
ABB0000
|
trusted library allocation
|
page read and write
|
||
66A6000
|
trusted library allocation
|
page read and write
|
||
E42000
|
trusted library allocation
|
page read and write
|
||
20B44857000
|
heap
|
page read and write
|
||
6A9D000
|
stack
|
page read and write
|
||
522000
|
unkown
|
page readonly
|
||
24811670000
|
heap
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
70E0000
|
remote allocation
|
page read and write
|
||
2728000
|
trusted library allocation
|
page read and write
|
||
8A9000
|
heap
|
page read and write
|
||
220A000
|
trusted library allocation
|
page read and write
|
||
96C000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
220D000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
A4F4178000
|
stack
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2266D790000
|
heap
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
BF91FF000
|
stack
|
page read and write
|
||
2620000
|
heap
|
page read and write
|
||
2266D76F000
|
heap
|
page read and write
|
||
21FD000
|
trusted library allocation
|
page read and write
|
||
4A6D000
|
stack
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page execute and read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
668E000
|
trusted library allocation
|
page read and write
|
||
A9B0000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
2266CEDA000
|
heap
|
page read and write
|
||
4EA5000
|
trusted library allocation
|
page read and write
|
||
220C000
|
trusted library allocation
|
page read and write
|
||
4ECF000
|
trusted library allocation
|
page read and write
|
||
87B6E7C000
|
stack
|
page read and write
|
||
6A8000
|
heap
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
1C01B0B0000
|
trusted library allocation
|
page read and write
|
||
18EFA0A0000
|
remote allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
2427000
|
heap
|
page read and write
|
||
7990000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
18EF9824000
|
heap
|
page read and write
|
||
1C01AF50000
|
trusted library allocation
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
18EFA070000
|
trusted library allocation
|
page read and write
|
||
77CE000
|
stack
|
page read and write
|
||
2720000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
1C01AC11000
|
heap
|
page read and write
|
||
8DC000
|
heap
|
page read and write
|
||
A39937C000
|
stack
|
page read and write
|
||
1C016840000
|
trusted library section
|
page readonly
|
||
1C01AD00000
|
heap
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
1BAE5302000
|
heap
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
4990000
|
trusted library allocation
|
page read and write
|
||
4ECC000
|
trusted library allocation
|
page read and write
|
||
2266D77D000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1C016015000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EBF000
|
trusted library allocation
|
page read and write
|
||
1C01568F000
|
heap
|
page read and write
|
||
2C59000
|
trusted library allocation
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
6677000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
141A000
|
trusted library allocation
|
page execute and read and write
|
||
E4B000
|
trusted library allocation
|
page execute and read and write
|
||
21E0000
|
trusted library allocation
|
page read and write
|
||
ADA000
|
trusted library allocation
|
page execute and read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
1BAE5257000
|
heap
|
page read and write
|
||
2812000
|
trusted library allocation
|
page read and write
|
||
E02000
|
trusted library allocation
|
page execute and read and write
|
||
84093FE000
|
stack
|
page read and write
|
||
18EFA202000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
6F8D000
|
stack
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
6668000
|
trusted library allocation
|
page read and write
|
||
4B44000
|
heap
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
1C01B0B0000
|
remote allocation
|
page read and write
|
||
A8B0000
|
heap
|
page read and write
|
||
12C1988A000
|
heap
|
page read and write
|
||
12C19660000
|
heap
|
page read and write
|
||
220A000
|
trusted library allocation
|
page read and write
|
||
4EA5000
|
trusted library allocation
|
page read and write
|
||
2721000
|
trusted library allocation
|
page read and write
|
||
20B4487E000
|
heap
|
page read and write
|
||
2266D700000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
18EF9829000
|
heap
|
page read and write
|
||
2728000
|
trusted library allocation
|
page read and write
|
||
16F0000
|
trusted library allocation
|
page execute and read and write
|
||
30000
|
heap
|
page read and write
|
||
220C000
|
trusted library allocation
|
page read and write
|
||
7650000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EAF000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
21FC000
|
trusted library allocation
|
page read and write
|
||
4ECF000
|
trusted library allocation
|
page read and write
|
||
2721000
|
trusted library allocation
|
page read and write
|
||
2266D790000
|
heap
|
page read and write
|
||
4E9E000
|
trusted library allocation
|
page read and write
|
||
4ED3000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
526E67F000
|
stack
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
2266CCA0000
|
heap
|
page read and write
|
||
4EA3000
|
trusted library allocation
|
page read and write
|
||
70CE000
|
stack
|
page read and write
|
||
2266D766000
|
heap
|
page read and write
|
||
20B44878000
|
heap
|
page read and write
|
||
4ECA000
|
trusted library allocation
|
page read and write
|
||
24811648000
|
heap
|
page read and write
|
||
2266CE00000
|
heap
|
page read and write
|
||
6676000
|
trusted library allocation
|
page read and write
|
||
1C53CD02000
|
heap
|
page read and write
|
||
1422000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
5DB1F7F000
|
stack
|
page read and write
|
||
4ED9000
|
trusted library allocation
|
page read and write
|
||
18EF9802000
|
heap
|
page read and write
|
||
4E93000
|
trusted library allocation
|
page read and write
|
||
1C01B0B0000
|
remote allocation
|
page read and write
|
||
2721000
|
trusted library allocation
|
page read and write
|
||
2DA8000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
4ED3000
|
trusted library allocation
|
page read and write
|
||
526E3AE000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EBF000
|
trusted library allocation
|
page read and write
|
||
2821000
|
trusted library allocation
|
page read and write
|
||
4EBF000
|
trusted library allocation
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
21A5C370000
|
heap
|
page read and write
|
||
1C01AF94000
|
trusted library allocation
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
12C19600000
|
heap
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
4EA3000
|
trusted library allocation
|
page read and write
|
||
4ECA000
|
trusted library allocation
|
page read and write
|
||
50E9C7E000
|
stack
|
page read and write
|
||
4E9B000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
BF93F7000
|
stack
|
page read and write
|
||
7F0B000
|
stack
|
page read and write
|
||
2266DC00000
|
heap
|
page read and write
|
||
1C01ACEC000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
1C01B0B0000
|
remote allocation
|
page read and write
|
||
6669000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1BAE5288000
|
heap
|
page read and write
|
||
3E043FF000
|
stack
|
page read and write
|
||
1C53CC8A000
|
heap
|
page read and write
|
||
24811550000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC9000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
7F3D0000
|
trusted library allocation
|
page execute and read and write
|
||
3E042FF000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2727000
|
trusted library allocation
|
page read and write
|
||
3E03BAB000
|
stack
|
page read and write
|
||
4EC9000
|
trusted library allocation
|
page read and write
|
||
6658000
|
trusted library allocation
|
page read and write
|
||
2722000
|
trusted library allocation
|
page read and write
|
||
4ECA000
|
trusted library allocation
|
page read and write
|
||
1C53CB20000
|
heap
|
page read and write
|
||
1407000
|
trusted library allocation
|
page execute and read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1FF04452000
|
heap
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
1412000
|
trusted library allocation
|
page execute and read and write
|
||
2266CE29000
|
heap
|
page read and write
|
||
56E000
|
stack
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
7F6D0000
|
trusted library allocation
|
page execute and read and write
|
||
52B0000
|
remote allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4ECA000
|
trusted library allocation
|
page read and write
|
||
220D000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
4970000
|
trusted library allocation
|
page read and write
|
||
33B1000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
CCC000
|
heap
|
page read and write
|
||
5AA0000
|
remote allocation
|
page read and write
|
||
12EA000
|
trusted library allocation
|
page execute and read and write
|
||
20B44620000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
18EF97D0000
|
heap
|
page read and write
|
||
AD6000
|
trusted library allocation
|
page execute and read and write
|
||
20B445C0000
|
heap
|
page read and write
|
||
4EB4000
|
trusted library allocation
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
1C01AD02000
|
heap
|
page read and write
|
||
164A07E000
|
stack
|
page read and write
|
||
C90000
|
unkown
|
page readonly
|
||
1C016118000
|
heap
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
84092FE000
|
stack
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
1C53CC60000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
21A5C458000
|
heap
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1BAE5040000
|
heap
|
page read and write
|
||
1FF0444F000
|
heap
|
page read and write
|
||
4E9E000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
stack
|
page read and write
|
||
21FD000
|
trusted library allocation
|
page read and write
|
||
522000
|
unkown
|
page readonly
|
||
21A5DEC0000
|
trusted library allocation
|
page read and write
|
||
2420000
|
heap
|
page read and write
|
||
1C016002000
|
heap
|
page read and write
|
||
2266D78E000
|
heap
|
page read and write
|
||
C2C000
|
heap
|
page read and write
|
||
50E9EFF000
|
stack
|
page read and write
|
||
1C53CC3F000
|
heap
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
12C19865000
|
heap
|
page read and write
|
||
21FC000
|
trusted library allocation
|
page read and write
|
||
1C01AF50000
|
trusted library allocation
|
page read and write
|
||
1C01AC4D000
|
heap
|
page read and write
|
||
220A000
|
trusted library allocation
|
page read and write
|
||
1C01B070000
|
trusted library allocation
|
page read and write
|
||
AD2000
|
trusted library allocation
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
122E000
|
stack
|
page read and write
|
||
20B44863000
|
heap
|
page read and write
|
||
A4F427A000
|
stack
|
page read and write
|
||
2266CF13000
|
heap
|
page read and write
|
||
220A000
|
trusted library allocation
|
page read and write
|
||
E2A000
|
trusted library allocation
|
page execute and read and write
|
||
1C016102000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
708000
|
heap
|
page read and write
|
||
20B4485A000
|
heap
|
page read and write
|
||
21FD000
|
trusted library allocation
|
page read and write
|
||
4E97000
|
trusted library allocation
|
page read and write
|
||
21FC000
|
trusted library allocation
|
page read and write
|
||
1FF04413000
|
heap
|
page read and write
|
||
2204000
|
trusted library allocation
|
page read and write
|
||
24811681000
|
heap
|
page read and write
|
||
84094FE000
|
stack
|
page read and write
|
||
2266DBA0000
|
remote allocation
|
page read and write
|
||
2266CEAA000
|
heap
|
page read and write
|
||
556000
|
stack
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
5DB20FF000
|
stack
|
page read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
A4F437B000
|
stack
|
page read and write
|
||
1C01AC6A000
|
heap
|
page read and write
|
||
2266D7B9000
|
heap
|
page read and write
|
||
50E972C000
|
stack
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
484D000
|
stack
|
page read and write
|
||
1C01AC74000
|
heap
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
2727000
|
trusted library allocation
|
page read and write
|
||
6BF000
|
stack
|
page read and write
|
||
E32000
|
trusted library allocation
|
page execute and read and write
|
||
220A000
|
trusted library allocation
|
page read and write
|
||
E27000
|
trusted library allocation
|
page execute and read and write
|
||
96D000
|
heap
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
4EB7000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
87B6F7E000
|
stack
|
page read and write
|
||
4EB6000
|
trusted library allocation
|
page read and write
|
||
282A000
|
trusted library allocation
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
5DB172B000
|
stack
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
4EA6000
|
trusted library allocation
|
page read and write
|
||
A39927F000
|
stack
|
page read and write
|
||
4EA3000
|
trusted library allocation
|
page read and write
|
||
7780000
|
trusted library allocation
|
page read and write
|
||
4EB7000
|
trusted library allocation
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
3D21000
|
trusted library allocation
|
page read and write
|
||
A39947D000
|
stack
|
page read and write
|
||
220C000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
164A27F000
|
stack
|
page read and write
|
||
4ECA000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2C6F000
|
trusted library allocation
|
page read and write
|
||
2813000
|
trusted library allocation
|
page read and write
|
||
52E000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
21A5C43D000
|
heap
|
page read and write
|
||
4ED3000
|
trusted library allocation
|
page read and write
|
||
20B44847000
|
heap
|
page read and write
|
||
1C01567C000
|
heap
|
page read and write
|
||
12C1A002000
|
trusted library allocation
|
page read and write
|
||
6AF0000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2813000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
12C19902000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
A4F3D6B000
|
stack
|
page read and write
|
||
20B44829000
|
heap
|
page read and write
|
||
6100000
|
trusted library allocation
|
page read and write
|
||
20B44865000
|
heap
|
page read and write
|
||
2B55000
|
trusted library allocation
|
page read and write
|
||
1BAE5140000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
87B717B000
|
stack
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
1FF04500000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
27CD000
|
stack
|
page read and write
|
||
21A5C360000
|
heap
|
page read and write
|
||
3420000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2729000
|
trusted library allocation
|
page read and write
|
||
21A5DF80000
|
remote allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
2721000
|
trusted library allocation
|
page read and write
|
||
4EBF000
|
trusted library allocation
|
page read and write
|
||
4E9E000
|
trusted library allocation
|
page read and write
|
||
4EB4000
|
trusted library allocation
|
page read and write
|
||
4ED3000
|
trusted library allocation
|
page read and write
|
||
1C01AF80000
|
trusted library allocation
|
page read and write
|
||
4ED3000
|
trusted library allocation
|
page read and write
|
||
2B69000
|
trusted library allocation
|
page read and write
|
||
2481164E000
|
heap
|
page read and write
|
||
52B0000
|
remote allocation
|
page read and write
|
||
2266CEEB000
|
heap
|
page read and write
|
||
4E9E000
|
trusted library allocation
|
page read and write
|
||
2D9C000
|
trusted library allocation
|
page read and write
|
||
8F6000
|
stack
|
page read and write
|
||
4EA6000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
840907B000
|
stack
|
page read and write
|
||
4EB7000
|
trusted library allocation
|
page read and write
|
||
4E9B000
|
trusted library allocation
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
E22000
|
trusted library allocation
|
page read and write
|
||
4EA7000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
671E000
|
stack
|
page read and write
|
||
84095FF000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1C01ACF3000
|
heap
|
page read and write
|
||
4ED3000
|
trusted library allocation
|
page read and write
|
||
1C016000000
|
heap
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
1FF04513000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page execute and read and write
|
||
76C0000
|
trusted library allocation
|
page read and write
|
||
7E0E000
|
stack
|
page read and write
|
||
4EB6000
|
trusted library allocation
|
page read and write
|
||
E1A000
|
trusted library allocation
|
page execute and read and write
|
||
2266CEC7000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1C015600000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
18EF9902000
|
heap
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
A4F46FF000
|
stack
|
page read and write
|
||
24811700000
|
heap
|
page read and write
|
||
6ADE000
|
stack
|
page read and write
|
||
18EF983D000
|
heap
|
page read and write
|
||
A4F467B000
|
stack
|
page read and write
|
||
21A5C47F000
|
heap
|
page read and write
|
||
511E000
|
stack
|
page read and write
|
||
1BAE5300000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2728000
|
trusted library allocation
|
page read and write
|
||
18EF9813000
|
heap
|
page read and write
|
||
1649E7D000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EBF000
|
trusted library allocation
|
page read and write
|
||
6BFE000
|
stack
|
page read and write
|
||
6665000
|
trusted library allocation
|
page read and write
|
||
1C016BC0000
|
trusted library allocation
|
page read and write
|
||
E47000
|
trusted library allocation
|
page execute and read and write
|
||
7F4D000
|
stack
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
3E040FB000
|
stack
|
page read and write
|
||
4EC9000
|
trusted library allocation
|
page read and write
|
||
4EB4000
|
trusted library allocation
|
page read and write
|
||
2727000
|
trusted library allocation
|
page read and write
|
||
220A000
|
trusted library allocation
|
page read and write
|
||
1C2000
|
unkown
|
page readonly
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
343D000
|
trusted library allocation
|
page read and write
|
||
6E4E000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2266D713000
|
heap
|
page read and write
|
||
4EB6000
|
trusted library allocation
|
page read and write
|
||
B4F000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2266D77B000
|
heap
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
2D21000
|
trusted library allocation
|
page read and write
|
||
21A5C448000
|
heap
|
page read and write
|
||
3E041F7000
|
stack
|
page read and write
|
||
4ECA000
|
trusted library allocation
|
page read and write
|
||
4E10000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
4EAA000
|
trusted library allocation
|
page read and write
|
||
72C000
|
heap
|
page read and write
|
||
4EA4000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
remote allocation
|
page read and write
|
||
5920000
|
trusted library allocation
|
page execute and read and write
|
||
4ECA000
|
trusted library allocation
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
220A000
|
trusted library allocation
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
1C01B060000
|
trusted library allocation
|
page read and write
|
||
1C53CC00000
|
heap
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
90F000
|
stack
|
page read and write
|
||
4ECF000
|
trusted library allocation
|
page read and write
|
||
21A5DF80000
|
remote allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
666C000
|
trusted library allocation
|
page read and write
|
||
20B4485F000
|
heap
|
page read and write
|
||
20B44902000
|
heap
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
20B44839000
|
heap
|
page read and write
|
||
241F000
|
stack
|
page read and write
|
||
1C016159000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
AEA000
|
trusted library allocation
|
page execute and read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
7660000
|
trusted library allocation
|
page read and write
|
||
1C2000
|
unkown
|
page readonly
|
||
1F0000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2721000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1FF0443C000
|
heap
|
page read and write
|
||
16498FB000
|
stack
|
page read and write
|
||
66A3000
|
trusted library allocation
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
1502000
|
heap
|
page read and write
|
||
20B4487C000
|
heap
|
page read and write
|
||
21A5C447000
|
heap
|
page read and write
|
||
2266CEEE000
|
heap
|
page read and write
|
||
1C01563F000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
4980000
|
trusted library allocation
|
page execute and read and write
|
||
1C53CC02000
|
heap
|
page read and write
|
||
2266CEC0000
|
heap
|
page read and write
|
||
4EB7000
|
trusted library allocation
|
page read and write
|
||
CCC000
|
heap
|
page read and write
|
||
1649C7E000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
1BAE5251000
|
heap
|
page read and write
|
||
9F0000
|
trusted library allocation
|
page read and write
|
||
87B707B000
|
stack
|
page read and write
|
||
126E000
|
stack
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
2621000
|
heap
|
page read and write
|
||
4E9B000
|
trusted library allocation
|
page read and write
|
||
ACC000
|
heap
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
164A37F000
|
stack
|
page read and write
|
||
3E03FFB000
|
stack
|
page read and write
|
||
71B000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
E1C000
|
trusted library allocation
|
page execute and read and write
|
||
ABA000
|
trusted library allocation
|
page execute and read and write
|
||
4EAE000
|
trusted library allocation
|
page read and write
|
||
4EB7000
|
trusted library allocation
|
page read and write
|
||
2728000
|
trusted library allocation
|
page read and write
|
||
452000
|
remote allocation
|
page execute and read and write
|
||
1C015672000
|
heap
|
page read and write
|
||
2266DBA0000
|
remote allocation
|
page read and write
|
||
21A5DF00000
|
trusted library allocation
|
page read and write
|
||
963000
|
heap
|
page read and write
|
||
70E0000
|
remote allocation
|
page read and write
|
||
24812002000
|
trusted library allocation
|
page read and write
|
||
220C000
|
trusted library allocation
|
page read and write
|
||
4EB7000
|
trusted library allocation
|
page read and write
|
||
21A5C3D0000
|
heap
|
page read and write
|
||
2721000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
trusted library allocation
|
page execute and read and write
|
||
220A000
|
trusted library allocation
|
page read and write
|
||
4EAC000
|
trusted library allocation
|
page read and write
|
||
1FF04400000
|
heap
|
page read and write
|
||
8FA000
|
stack
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
4E97000
|
trusted library allocation
|
page read and write
|
||
2266D790000
|
heap
|
page read and write
|
||
ACC000
|
heap
|
page read and write
|
||
2266D75E000
|
heap
|
page read and write
|
||
18EF9770000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
667B000
|
trusted library allocation
|
page read and write
|
||
2726000
|
trusted library allocation
|
page read and write
|
||
12C195F0000
|
heap
|
page read and write
|
||
4EAA000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2204000
|
trusted library allocation
|
page read and write
|
||
2990000
|
trusted library allocation
|
page execute and read and write
|
||
50E9E7D000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2221000
|
trusted library allocation
|
page read and write
|
||
2266D768000
|
heap
|
page read and write
|
||
220C000
|
trusted library allocation
|
page read and write
|
||
A4F487F000
|
stack
|
page read and write
|
||
1C01B080000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
trusted library allocation
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
526E77B000
|
stack
|
page read and write
|
||
BF95FC000
|
stack
|
page read and write
|
||
4EB7000
|
trusted library allocation
|
page read and write
|
||
1C01B090000
|
trusted library allocation
|
page read and write
|
||
2723000
|
trusted library allocation
|
page read and write
|
||
1C016860000
|
trusted library section
|
page readonly
|
||
7960000
|
trusted library allocation
|
page read and write
|
||
4EA5000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
2726000
|
trusted library allocation
|
page read and write
|
||
8C5000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
1C0155E0000
|
trusted library allocation
|
page read and write
|
||
726D000
|
stack
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
A39907F000
|
stack
|
page read and write
|
||
4EC8000
|
trusted library allocation
|
page read and write
|
||
12C19913000
|
heap
|
page read and write
|
||
84090FE000
|
stack
|
page read and write
|
||
2266DBA0000
|
remote allocation
|
page read and write
|
||
20B4487A000
|
heap
|
page read and write
|
||
721F000
|
stack
|
page read and write
|
||
1C015FE0000
|
trusted library allocation
|
page read and write
|
||
2726000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
A8C8000
|
heap
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1C53CC60000
|
heap
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
83A000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
4EB4000
|
trusted library allocation
|
page read and write
|
||
4E9B000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
1C01AE30000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC8000
|
trusted library allocation
|
page read and write
|
||
526E32C000
|
stack
|
page read and write
|
||
2266D7B1000
|
heap
|
page read and write
|
||
5BDF000
|
stack
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
20B4484E000
|
heap
|
page read and write
|
||
248115B0000
|
heap
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
12C19865000
|
heap
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
4EA6000
|
trusted library allocation
|
page read and write
|
||
10F6000
|
stack
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
4EB7000
|
trusted library allocation
|
page read and write
|
||
20B44830000
|
heap
|
page read and write
|
||
16E0000
|
trusted library allocation
|
page read and write
|
||
4ECD000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
526EAFE000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
6645000
|
trusted library allocation
|
page read and write
|
||
21FD000
|
trusted library allocation
|
page read and write
|
||
12C19900000
|
heap
|
page read and write
|
||
2B6B000
|
trusted library allocation
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
E0A000
|
trusted library allocation
|
page execute and read and write
|
||
17E000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
C9B000
|
trusted library allocation
|
page execute and read and write
|
||
3060000
|
heap
|
page execute and read and write
|
||
ABAD000
|
stack
|
page read and write
|
||
6A9000
|
heap
|
page read and write
|
||
4EB5000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
4EC9000
|
trusted library allocation
|
page read and write
|
||
A39917F000
|
stack
|
page read and write
|
||
1FF0448F000
|
heap
|
page read and write
|
||
21A5C489000
|
heap
|
page read and write
|
||
681F000
|
stack
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
E12000
|
trusted library allocation
|
page execute and read and write
|
||
20B445B0000
|
heap
|
page read and write
|
||
1C01AC2F000
|
heap
|
page read and write
|
||
5DB1A7E000
|
stack
|
page read and write
|
||
20B44879000
|
heap
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
12C19849000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page execute and read and write
|
||
BF907E000
|
stack
|
page read and write
|
||
220A000
|
trusted library allocation
|
page read and write
|
||
1FF04370000
|
trusted library allocation
|
page read and write
|
||
4E9F000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1FF04210000
|
heap
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
1BAE527E000
|
heap
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
2266CEEE000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
76C0000
|
trusted library allocation
|
page read and write
|
||
A4F497F000
|
stack
|
page read and write
|
||
1649D7E000
|
stack
|
page read and write
|
||
12C19824000
|
heap
|
page read and write
|
||
2813000
|
trusted library allocation
|
page read and write
|
||
1C01AF58000
|
trusted library allocation
|
page read and write
|
||
2266CF02000
|
heap
|
page read and write
|
||
52B0000
|
remote allocation
|
page read and write
|
||
2266D75B000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
ACB000
|
heap
|
page read and write
|
||
4EA6000
|
trusted library allocation
|
page read and write
|
||
76C0000
|
trusted library allocation
|
page read and write
|
||
16494BC000
|
stack
|
page read and write
|
||
4ED3000
|
trusted library allocation
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
1C53CC6B000
|
heap
|
page read and write
|
||
3E03EFE000
|
stack
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
220A000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
2980000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
1C015540000
|
heap
|
page read and write
|
||
24811702000
|
heap
|
page read and write
|
||
282A000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2721000
|
trusted library allocation
|
page read and write
|
||
4EA6000
|
trusted library allocation
|
page read and write
|
||
4E9F000
|
trusted library allocation
|
page read and write
|
||
6FCE000
|
stack
|
page read and write
|
||
12C1984B000
|
heap
|
page read and write
|
||
21FC000
|
trusted library allocation
|
page read and write
|
||
4EBF000
|
trusted library allocation
|
page read and write
|
||
7B8D000
|
stack
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
1C01AF5E000
|
trusted library allocation
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
1C016100000
|
heap
|
page read and write
|
||
CC7000
|
heap
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
20B44885000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
2C77000
|
trusted library allocation
|
page read and write
|
||
24811540000
|
heap
|
page read and write
|
||
21A5C500000
|
heap
|
page read and write
|
||
1C015629000
|
heap
|
page read and write
|
||
685E000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2823000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
1C01B020000
|
trusted library allocation
|
page read and write
|
||
2204000
|
trusted library allocation
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2266CEAA000
|
heap
|
page read and write
|
||
4ECB000
|
trusted library allocation
|
page read and write
|
||
4EBF000
|
trusted library allocation
|
page read and write
|
||
2DAD000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
8C5000
|
heap
|
page read and write
|
||
4ECB000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
4ECB000
|
trusted library allocation
|
page read and write
|
||
87B7277000
|
stack
|
page read and write
|
||
21A5DF80000
|
remote allocation
|
page read and write
|
||
4ECD000
|
trusted library allocation
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
21A5C413000
|
heap
|
page read and write
|
||
1BAE523C000
|
heap
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
2266D602000
|
heap
|
page read and write
|
||
668A000
|
trusted library allocation
|
page read and write
|
||
C97000
|
trusted library allocation
|
page execute and read and write
|
||
AB2000
|
trusted library allocation
|
page execute and read and write
|
||
4991000
|
trusted library allocation
|
page read and write
|
||
1C01ABC0000
|
trusted library allocation
|
page read and write
|
||
20B4486A000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
4EB7000
|
trusted library allocation
|
page read and write
|
||
2727000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2721000
|
trusted library allocation
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
65E0000
|
trusted library allocation
|
page read and write
|
||
24811654000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
699D000
|
stack
|
page read and write
|
||
2FF1000
|
trusted library allocation
|
page read and write
|
||
AF7000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
12C1984A000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
1BAE5200000
|
heap
|
page read and write
|
||
4B40000
|
heap
|
page read and write
|
||
140A000
|
trusted library allocation
|
page execute and read and write
|
||
4EA6000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
12C19802000
|
heap
|
page read and write
|
||
2266D715000
|
heap
|
page read and write
|
||
5AA0000
|
remote allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
221A000
|
trusted library allocation
|
page read and write
|
||
2FED000
|
stack
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
21A5C513000
|
heap
|
page read and write
|
||
12DA000
|
trusted library allocation
|
page execute and read and write
|
||
164A17E000
|
stack
|
page read and write
|
||
526E7FF000
|
stack
|
page read and write
|
||
6E8E000
|
stack
|
page read and write
|
||
21A5C402000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1FF0444B000
|
heap
|
page read and write
|
||
220A000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
220A000
|
trusted library allocation
|
page read and write
|
||
BF8D5B000
|
stack
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
1FF04481000
|
heap
|
page read and write
|
||
43B1000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
6D4E000
|
stack
|
page read and write
|
||
21A5C518000
|
heap
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
DEF000
|
stack
|
page read and write
|
||
711E000
|
stack
|
page read and write
|
||
7650000
|
trusted library section
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1C53CB30000
|
heap
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
1BAE527C000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2266CEF7000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
281E000
|
trusted library allocation
|
page read and write
|
||
2204000
|
trusted library allocation
|
page read and write
|
||
736B000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EB6000
|
trusted library allocation
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
1FF04C02000
|
trusted library allocation
|
page read and write
|
||
12F5000
|
heap
|
page read and write
|
||
1C01ACC8000
|
heap
|
page read and write
|
||
663C000
|
trusted library allocation
|
page read and write
|
||
1C015550000
|
heap
|
page read and write
|
||
1C01AF70000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
221A000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4E93000
|
trusted library allocation
|
page read and write
|
||
4E9A000
|
trusted library allocation
|
page read and write
|
||
4E9E000
|
trusted library allocation
|
page read and write
|
||
4EB8000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
ACE000
|
heap
|
page read and write
|
||
1C01ACF1000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
20B4486B000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2266D76E000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
570000
|
trusted library allocation
|
page read and write
|
||
D12000
|
unkown
|
page readonly
|
||
4D70000
|
heap
|
page read and write
|
||
4EC8000
|
trusted library allocation
|
page read and write
|
||
4E9A000
|
trusted library allocation
|
page read and write
|
||
1FF04429000
|
heap
|
page read and write
|
||
2211000
|
trusted library allocation
|
page read and write
|
||
4ED3000
|
trusted library allocation
|
page read and write
|
||
1C016870000
|
trusted library section
|
page readonly
|
||
20B44862000
|
heap
|
page read and write
|
||
6650000
|
trusted library allocation
|
page read and write
|
||
7660000
|
trusted library allocation
|
page read and write
|
||
A4F4B7C000
|
stack
|
page read and write
|
||
50E9AFF000
|
stack
|
page read and write
|
||
6666000
|
trusted library allocation
|
page read and write
|
||
4EBF000
|
trusted library allocation
|
page read and write
|
||
2826000
|
trusted library allocation
|
page read and write
|
||
4E92000
|
trusted library allocation
|
page read and write
|
||
21FD000
|
trusted library allocation
|
page read and write
|
||
20B44876000
|
heap
|
page read and write
|
||
1BAE4FE0000
|
heap
|
page read and write
|
||
220D000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
5DB1B7D000
|
stack
|
page read and write
|
||
21A5DE90000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1C01AC40000
|
heap
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
4EBF000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
21A5C458000
|
heap
|
page read and write
|
||
1BAE5308000
|
heap
|
page read and write
|
||
21A5C457000
|
heap
|
page read and write
|
||
1C53CC70000
|
heap
|
page read and write
|
||
7950000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
4D75000
|
heap
|
page read and write
|
||
4EB7000
|
trusted library allocation
|
page read and write
|
||
4EA4000
|
trusted library allocation
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2728000
|
trusted library allocation
|
page read and write
|
||
4ED3000
|
trusted library allocation
|
page read and write
|
||
1C01AF71000
|
trusted library allocation
|
page read and write
|
||
297E000
|
stack
|
page read and write
|
||
ACE000
|
heap
|
page read and write
|
||
24811677000
|
heap
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
12C1986D000
|
heap
|
page read and write
|
||
1C015FE3000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
50E9D7E000
|
stack
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
1BAE5A02000
|
trusted library allocation
|
page read and write
|
||
1C015FF0000
|
trusted library allocation
|
page read and write
|
||
1C015613000
|
heap
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
12C19760000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
21A5C462000
|
heap
|
page read and write
|
||
A4F48FF000
|
stack
|
page read and write
|
||
4ECF000
|
trusted library allocation
|
page read and write
|
||
1C0155B0000
|
heap
|
page read and write
|
||
840917E000
|
stack
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
4E99000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
530000
|
trusted library allocation
|
page read and write
|
||
8B7000
|
heap
|
page read and write
|
||
6A5000
|
heap
|
page read and write
|
||
5DB1E7B000
|
stack
|
page read and write
|
||
C92000
|
trusted library allocation
|
page read and write
|
||
695E000
|
stack
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
526E8FB000
|
stack
|
page read and write
|
||
418000
|
remote allocation
|
page execute and read and write
|
||
20B4486C000
|
heap
|
page read and write
|
||
A94000
|
heap
|
page execute and read and write
|
||
8C2000
|
heap
|
page read and write
|
||
526E9F7000
|
stack
|
page read and write
|
||
4EB9000
|
trusted library allocation
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
24811629000
|
heap
|
page read and write
|
||
4D1C000
|
stack
|
page read and write
|
||
1C01565A000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
1C015FC1000
|
trusted library allocation
|
page read and write
|
||
2266CD00000
|
heap
|
page read and write
|
||
7F440000
|
trusted library allocation
|
page execute and read and write
|
||
1FF04270000
|
heap
|
page read and write
|
||
660F000
|
trusted library allocation
|
page read and write
|
||
20B44861000
|
heap
|
page read and write
|
||
BF917B000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2481168B000
|
heap
|
page read and write
|
||
2481168E000
|
heap
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
526EBFE000
|
stack
|
page read and write
|
||
4EC2000
|
trusted library allocation
|
page read and write
|
||
4EB5000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
198000
|
stack
|
page read and write
|
||
1BAE5270000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
7640000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
18EFA0A0000
|
remote allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
4EA1000
|
trusted library allocation
|
page read and write
|
||
2266CEE2000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
6682000
|
trusted library allocation
|
page read and write
|
||
50E9BFE000
|
stack
|
page read and write
|
||
2266D78C000
|
heap
|
page read and write
|
||
667F000
|
trusted library allocation
|
page read and write
|
||
BF8DDE000
|
stack
|
page read and write
|
||
7660000
|
trusted library section
|
page read and write
|
||
8C5000
|
heap
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
6658000
|
trusted library allocation
|
page read and write
|
||
20B44720000
|
trusted library allocation
|
page read and write
|
||
18EF9760000
|
heap
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
52AF000
|
stack
|
page read and write
|
||
1C01B0A0000
|
trusted library allocation
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
4EBF000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EBF000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
A39957F000
|
stack
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
4E92000
|
trusted library allocation
|
page read and write
|
||
1BAE5313000
|
heap
|
page read and write
|
||
51AE000
|
stack
|
page read and write
|
||
4ECE000
|
trusted library allocation
|
page read and write
|
||
7660000
|
trusted library allocation
|
page read and write
|
||
4E9A000
|
trusted library allocation
|
page read and write
|
||
1C016113000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1C53CC13000
|
heap
|
page read and write
|
||
1427000
|
trusted library allocation
|
page execute and read and write
|
||
1C01ACEA000
|
heap
|
page read and write
|
||
12D2000
|
trusted library allocation
|
page execute and read and write
|
||
248115E0000
|
trusted library allocation
|
page read and write
|
||
7670000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
trusted library allocation
|
page read and write
|
||
1C016118000
|
heap
|
page read and write
|
||
2204000
|
trusted library allocation
|
page read and write
|
||
2723000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1C015696000
|
heap
|
page read and write
|
||
A4F477F000
|
stack
|
page read and write
|
||
7700000
|
trusted library allocation
|
page read and write
|
||
3807000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
D12000
|
unkown
|
page readonly
|
||
6686000
|
trusted library allocation
|
page read and write
|
||
1C53D602000
|
trusted library allocation
|
page read and write
|
||
1C015677000
|
heap
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
21A5C400000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2481164B000
|
heap
|
page read and write
|
||
2726000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
trusted library section
|
page readonly
|
||
4ED1000
|
trusted library allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
4ECB000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
220C000
|
trusted library allocation
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
2266CC90000
|
heap
|
page read and write
|
||
2266CE70000
|
heap
|
page read and write
|
||
10FA000
|
stack
|
page read and write
|
||
12E2000
|
trusted library allocation
|
page execute and read and write
|
||
4EA3000
|
trusted library allocation
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
1C53CD13000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
2266CE13000
|
heap
|
page read and write
|
||
4ED3000
|
trusted library allocation
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
1BAE4FD0000
|
heap
|
page read and write
|
||
2266D710000
|
heap
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
4EB7000
|
trusted library allocation
|
page read and write
|
||
2728000
|
trusted library allocation
|
page read and write
|
||
12EC000
|
trusted library allocation
|
page execute and read and write
|
||
20B4486E000
|
heap
|
page read and write
|
||
4EA3000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
66F000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
24811651000
|
heap
|
page read and write
|
||
2266CE89000
|
heap
|
page read and write
|
||
231E000
|
stack
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
AC2000
|
trusted library allocation
|
page execute and read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
20B4483C000
|
heap
|
page read and write
|
||
21A5C448000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1C01AF90000
|
trusted library allocation
|
page read and write
|
||
BF94FF000
|
stack
|
page read and write
|
||
4ECF000
|
trusted library allocation
|
page read and write
|
||
1C01AC97000
|
heap
|
page read and write
|
||
4EAE000
|
trusted library allocation
|
page read and write
|
||
E3A000
|
trusted library allocation
|
page execute and read and write
|
||
5BB000
|
stack
|
page read and write
|
||
278E000
|
stack
|
page read and write
|
||
A398AEB000
|
stack
|
page read and write
|
||
4EA7000
|
trusted library allocation
|
page read and write
|
||
2204000
|
trusted library allocation
|
page read and write
|
||
1C01ACEE000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC9000
|
trusted library allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
50E9FFD000
|
stack
|
page read and write
|
||
20B44873000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
5DB1D77000
|
stack
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
20B4487F000
|
heap
|
page read and write
|
||
4EA7000
|
trusted library allocation
|
page read and write
|
||
4EC2000
|
trusted library allocation
|
page read and write
|
||
4E92000
|
trusted library allocation
|
page read and write
|
||
220A000
|
trusted library allocation
|
page read and write
|
||
1BAE5202000
|
heap
|
page read and write
|
||
4ECA000
|
trusted library allocation
|
page read and write
|
||
A8C9000
|
heap
|
page read and write
|
||
690000
|
trusted library allocation
|
page read and write
|
||
342C000
|
trusted library allocation
|
page read and write
|
||
1C01AE40000
|
trusted library allocation
|
page read and write
|
||
4ECD000
|
trusted library allocation
|
page read and write
|
||
1531000
|
heap
|
page read and write
|
||
A4F457A000
|
stack
|
page read and write
|
||
78CE000
|
stack
|
page read and write
|
||
2209000
|
trusted library allocation
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
2266D74C000
|
heap
|
page read and write
|
||
1649A7F000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
A4F4D7F000
|
stack
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
ACE000
|
heap
|
page read and write
|
||
4ECB000
|
trusted library allocation
|
page read and write
|
||
12C1984E000
|
heap
|
page read and write
|
||
4EBF000
|
trusted library allocation
|
page read and write
|
||
A4F447F000
|
stack
|
page read and write
|
||
ACD000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2221000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1C01ACDE000
|
heap
|
page read and write
|
||
4C4E000
|
stack
|
page read and write
|
||
1FF04470000
|
heap
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
50EA0FD000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
4EAB000
|
trusted library allocation
|
page read and write
|
||
2729000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
4ED3000
|
trusted library allocation
|
page read and write
|
||
1BAE524B000
|
heap
|
page read and write
|
||
7680000
|
trusted library allocation
|
page read and write
|
||
2728000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
1C01ACE4000
|
heap
|
page read and write
|
||
1BAE522C000
|
heap
|
page read and write
|
||
B560000
|
heap
|
page execute and read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
DAB000
|
stack
|
page read and write
|
||
1C01AF74000
|
trusted library allocation
|
page read and write
|
||
2266CE3C000
|
heap
|
page read and write
|
||
20B44813000
|
heap
|
page read and write
|
||
4EB6000
|
trusted library allocation
|
page read and write
|
||
21FC000
|
trusted library allocation
|
page read and write
|
||
12C19908000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
2826000
|
trusted library allocation
|
page read and write
|
||
2204000
|
trusted library allocation
|
page read and write
|
||
4EAA000
|
trusted library allocation
|
page read and write
|
||
21A5C502000
|
heap
|
page read and write
|
||
29A1000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
5DB17AE000
|
stack
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
1FF04445000
|
heap
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
1FF04200000
|
heap
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
21A5C481000
|
heap
|
page read and write
|
||
4E9E000
|
trusted library allocation
|
page read and write
|
||
12C19800000
|
heap
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
1C53CBC0000
|
trusted library allocation
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
1C015702000
|
heap
|
page read and write
|
||
666A000
|
trusted library allocation
|
page read and write
|
||
8E2000
|
heap
|
page read and write
|
||
CCC000
|
heap
|
page read and write
|
||
2728000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
418000
|
remote allocation
|
page execute and read and write
|
||
4EB4000
|
trusted library allocation
|
page read and write
|
||
4EAD000
|
trusted library allocation
|
page read and write
|
||
14DA000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
53EF000
|
stack
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
87B6EFE000
|
stack
|
page read and write
|
||
18EF9800000
|
heap
|
page read and write
|
||
8FF000
|
stack
|
page read and write
|
||
58CE000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
1C015700000
|
heap
|
page read and write
|
||
20B44868000
|
heap
|
page read and write
|
||
1420000
|
trusted library allocation
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
12C1983C000
|
heap
|
page read and write
|
||
AE2000
|
trusted library allocation
|
page execute and read and write
|
||
2266CE82000
|
heap
|
page read and write
|
||
5DB207A000
|
stack
|
page read and write
|
||
220C000
|
trusted library allocation
|
page read and write
|
||
1C016820000
|
trusted library section
|
page readonly
|
||
4EC9000
|
trusted library allocation
|
page read and write
|
||
24811647000
|
heap
|
page read and write
|
||
A39967C000
|
stack
|
page read and write
|
||
4EBE000
|
trusted library allocation
|
page read and write
|
||
4DDE000
|
stack
|
page read and write
|
||
3E03E7E000
|
stack
|
page read and write
|
||
1C016159000
|
heap
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
4EA6000
|
trusted library allocation
|
page read and write
|
||
C90000
|
unkown
|
page readonly
|
||
6627000
|
trusted library allocation
|
page read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
4E97000
|
trusted library allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2190000
|
trusted library allocation
|
page read and write
|
||
A4F4A7E000
|
stack
|
page read and write
|
||
4EC5000
|
trusted library allocation
|
page read and write
|
||
790E000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
87B757F000
|
stack
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
4EC0000
|
trusted library allocation
|
page read and write
|
||
1C01AC00000
|
heap
|
page read and write
|
||
1C015713000
|
heap
|
page read and write
|
||
1C0155F0000
|
trusted library section
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
4EC1000
|
trusted library allocation
|
page read and write
|
||
2266D770000
|
heap
|
page read and write
|
||
A4F47FF000
|
stack
|
page read and write
|
There are 1410 hidden memdumps, click here to show them.