Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Gulvmaattens.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\nskEE19.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nskEE19.tmp\nsExec.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Falder99\Interelectrode\Overvejendes\Airplane_2.bmp
|
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data,
big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
|
dropped
|
||
C:\Users\user\Falder99\Interelectrode\Overvejendes\Dystomic.Bel
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\Falder99\Interelectrode\Overvejendes\Pleasurelessly\Anodiserende.opa
|
data
|
dropped
|
||
C:\Users\user\Falder99\Interelectrode\Overvejendes\english.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\Falder99\Interelectrode\Overvejendes\sqmapi.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Falder99\Interelectrode\Overvejendes\vfslog.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Gulvmaattens.exe
|
"C:\Users\user\Desktop\Gulvmaattens.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x78^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x76^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x61^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x7D^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x76^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x7F^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x00^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x01^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x09^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x09^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x70^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x41^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x56^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x52^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x47^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x56^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x75^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x5A^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x5F^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x56^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x72^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x1B^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x5E^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x13^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x41^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x07^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x13^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x1F^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x13^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x5A^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x13^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x03^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x4B^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x0B^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x03^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x03^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x03^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x03^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x03^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x03^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x03^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x1F^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x13^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x5A^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x13^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x03^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x1F^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x13^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x43^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x13^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x03^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x1F^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x13^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x5A^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x13^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x07^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x1F^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x13^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x5A^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x13^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x03^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x4B^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x0B^51"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /c set /a "0x03^51"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
"C:\Users\user\Desktop\Gulvmaattens.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
"C:\Users\user\Desktop\Gulvmaattens.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
"C:\Users\user\Desktop\Gulvmaattens.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
"C:\Users\user\Desktop\Gulvmaattens.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
|
"C:\Users\user\Desktop\Gulvmaattens.exe"
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 125 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://212.192.246.226/jLIEsqMZom33.asdL
|
unknown
|
||
ftp://ftp.gettoner.com.mx/droid
|
unknown
|
||
http://212.192.246.226/jLIEsqMZom33.asdm
|
unknown
|
||
http://212.192.246.226/jLIEsqMZom33.asd
|
212.192.246.226
|
||
http://127.0.0.1:HTTP/1.1
|
unknown
|
||
http://DynDns.comDynDNS
|
unknown
|
||
http://crl.certum.pl/ctsca2021.crl0o
|
unknown
|
||
http://repository.certum.pl/ctnca.cer09
|
unknown
|
||
http://repository.certum.pl/ctsca2021.cer0
|
unknown
|
||
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
|
unknown
|
||
http://crl.certum.pl/ctnca.crl0k
|
unknown
|
||
http://subca.ocsp-certum.com05
|
unknown
|
||
http://subca.ocsp-certum.com02
|
unknown
|
||
http://subca.ocsp-certum.com01
|
unknown
|
||
http://crl.certum.pl/ctnca2.crl0l
|
unknown
|
||
http://repository.certum.pl/ctnca2.cer09
|
unknown
|
||
http://NwSpLV.com
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://www.certum.pl/CPS0
|
unknown
|
There are 9 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
212.192.246.226
|
unknown
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1D021000
|
trusted library allocation
|
page read and write
|
||
2AA0000
|
direct allocation
|
page execute and read and write
|
||
B00000
|
remote allocation
|
page execute and read and write
|
||
45F000
|
unkown
|
page readonly
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
2B8EBB74000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
E47000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1018000
|
heap
|
page read and write
|
||
2B8EB240000
|
heap
|
page read and write
|
||
F4C8B79000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
401000
|
unkown
|
page execute read
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1C1F0000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1F2C0000
|
trusted library allocation
|
page read and write
|
||
2B8EBB76000
|
heap
|
page read and write
|
||
E51000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
1A5A765D000
|
heap
|
page read and write
|
||
816858B000
|
stack
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
A7A000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
F4C8DFB000
|
stack
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1F290000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1D005000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
2019E000
|
stack
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
1F1F2000
|
trusted library allocation
|
page read and write
|
||
2BA1000
|
trusted library allocation
|
page read and write
|
||
1F255000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E51000
|
trusted library allocation
|
page read and write
|
||
F4C86CB000
|
stack
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page execute and read and write
|
||
2B8EBB00000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
1A5A7659000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
100E000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1F2E0000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
2B8EBB37000
|
heap
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
1F1DE000
|
trusted library allocation
|
page read and write
|
||
1F240000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
1F258000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
E51000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
1A5A7632000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
2B8EBB2D000
|
heap
|
page read and write
|
||
F4C8EFF000
|
stack
|
page read and write
|
||
1F1C0000
|
trusted library allocation
|
page read and write
|
||
2B8EB29F000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DF3000
|
trusted library allocation
|
page read and write
|
||
F48000
|
heap
|
page read and write
|
||
DF3000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1CE0D000
|
trusted library allocation
|
page execute and read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1D005000
|
trusted library allocation
|
page read and write
|
||
1C2A6000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
FDB000
|
heap
|
page read and write
|
||
1A5A761A000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
AAA000
|
trusted library allocation
|
page read and write
|
||
8168D7A000
|
stack
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
E58000
|
trusted library allocation
|
page read and write
|
||
E42000
|
trusted library allocation
|
page read and write
|
||
46F9000
|
trusted library allocation
|
page read and write
|
||
1F276000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
1CFD0000
|
trusted library allocation
|
page execute and read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1F200000
|
trusted library allocation
|
page read and write
|
||
A9A000
|
trusted library allocation
|
page read and write
|
||
1CE2A000
|
trusted library allocation
|
page execute and read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
2B8EBB2F000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1D007000
|
trusted library allocation
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
1F2D0000
|
trusted library allocation
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
71406000
|
unkown
|
page readonly
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
E40000
|
trusted library allocation
|
page execute and read and write
|
||
1D005000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1F290000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
trusted library allocation
|
page read and write
|
||
101D000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
E76000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
F97000
|
heap
|
page read and write
|
||
1A5A7664000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1004000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1A5A7600000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
FF5000
|
heap
|
page read and write
|
||
1F240000
|
trusted library allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1F2A0000
|
trusted library allocation
|
page execute and read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1F2D0000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
FCB000
|
heap
|
page read and write
|
||
1A5A7649000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1F2D0000
|
trusted library allocation
|
page read and write
|
||
1F84E000
|
stack
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1008000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
E11000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1F2E0000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
E35000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
8168C7E000
|
stack
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1CDF0000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1110000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
2B8EBB13000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
45B000
|
unkown
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1F1DA000
|
trusted library allocation
|
page read and write
|
||
2B8EB296000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
2B8EBB56000
|
heap
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E11000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
2510000
|
trusted library allocation
|
page read and write
|
||
1F2E0000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E51000
|
trusted library allocation
|
page read and write
|
||
1F2D0000
|
trusted library allocation
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
B00000
|
remote allocation
|
page execute and read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
E51000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
DEC000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1CE30000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
unclassified section
|
page readonly
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1CE00000
|
trusted library allocation
|
page read and write
|
||
2B8EBB70000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
DFC000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
1F2E0000
|
trusted library allocation
|
page read and write
|
||
2B8EBB29000
|
heap
|
page read and write
|
||
1F2D0000
|
trusted library allocation
|
page read and write
|
||
2B8EBA15000
|
heap
|
page read and write
|
||
71400000
|
unkown
|
page readonly
|
||
2B8EBB02000
|
heap
|
page read and write
|
||
2B8EB27B000
|
heap
|
page read and write
|
||
2B8EBB2A000
|
heap
|
page read and write
|
||
1E049000
|
trusted library allocation
|
page read and write
|
||
2B8EBB0E000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1F2D0000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
E51000
|
trusted library allocation
|
page read and write
|
||
1E07D000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
101E000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1F2F4000
|
heap
|
page read and write
|
||
71401000
|
unkown
|
page execute read
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1CFE0000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
FD5000
|
heap
|
page read and write
|
||
1C9AE000
|
stack
|
page read and write
|
||
1D006000
|
trusted library allocation
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
E11000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
DF3000
|
trusted library allocation
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
204A0000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
2B8EB286000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1A5A763C000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1029000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
F8B000
|
heap
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
1F2D0000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
2B8EBB7C000
|
heap
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
A91000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
DF5000
|
trusted library allocation
|
page read and write
|
||
F4C8CFC000
|
stack
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
2B8EBB2C000
|
heap
|
page read and write
|
||
E35000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
2B8EB28D000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
A06000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1F028000
|
trusted library allocation
|
page read and write
|
||
1F290000
|
trusted library allocation
|
page read and write
|
||
E11000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1F255000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1F255000
|
trusted library allocation
|
page read and write
|
||
FCE000
|
heap
|
page read and write
|
||
1D010000
|
heap
|
page execute and read and write
|
||
E65000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
F4C90FE000
|
stack
|
page read and write
|
||
E11000
|
trusted library allocation
|
page read and write
|
||
A8E000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
F4C91FE000
|
stack
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
E53000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
1A5A764D000
|
heap
|
page read and write
|
||
2B8EB190000
|
unclassified section
|
page readonly
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
2B8EBA00000
|
heap
|
page read and write
|
||
FF1000
|
heap
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
71404000
|
unkown
|
page readonly
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
2560000
|
heap
|
page read and write
|
||
1F255000
|
trusted library allocation
|
page read and write
|
||
1037000
|
heap
|
page read and write
|
||
1CE03000
|
trusted library allocation
|
page execute and read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
DF3000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1F2D0000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E71000
|
trusted library allocation
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
2B8EBB6D000
|
heap
|
page read and write
|
||
101E000
|
heap
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
600000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1CAB0000
|
heap
|
page read and write
|
||
2B8EB27C000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1A5A7602000
|
heap
|
page read and write
|
||
1F1D2000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
2B8EBB2C000
|
heap
|
page read and write
|
||
1F2E0000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
DF3000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
1C6EE000
|
stack
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1F2D0000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
2B8EB26B000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
BC4000
|
heap
|
page read and write
|
||
2B8EB020000
|
heap
|
page read and write
|
||
DFA000
|
trusted library allocation
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
E51000
|
trusted library allocation
|
page read and write
|
||
1CFF0000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1F255000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E11000
|
trusted library allocation
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
A00000
|
trusted library allocation
|
page read and write
|
||
1F21B000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
103A000
|
heap
|
page read and write
|
||
1F240000
|
trusted library allocation
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
107E000
|
stack
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
100E000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
2B8EB1B0000
|
heap
|
page read and write
|
||
2B8EBB2C000
|
heap
|
page read and write
|
||
1C1EE000
|
stack
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1F2D0000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
1F220000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page execute and read and write
|
||
1F50C000
|
stack
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
2B8EBB5B000
|
heap
|
page read and write
|
||
2B8EB302000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
7F320000
|
trusted library allocation
|
page execute and read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1F2D0000
|
trusted library allocation
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1F270000
|
trusted library allocation
|
page read and write
|
||
1F230000
|
trusted library allocation
|
page read and write
|
||
29AF000
|
stack
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
FE3000
|
heap
|
page read and write
|
||
1F210000
|
trusted library allocation
|
page read and write
|
||
2B8EB2A5000
|
heap
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1F240000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
A9F000
|
trusted library allocation
|
page read and write
|
||
1A5A75C0000
|
unclassified section
|
page readonly
|
||
1BFF1000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
F93000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1D005000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
1F2E0000
|
trusted library allocation
|
page read and write
|
||
1F255000
|
trusted library allocation
|
page read and write
|
||
FEB000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1F255000
|
trusted library allocation
|
page read and write
|
||
1CEBC000
|
stack
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
2B8EB283000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1F255000
|
trusted library allocation
|
page read and write
|
||
E53000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
A63000
|
trusted library allocation
|
page read and write
|
||
2B8EB2A2000
|
heap
|
page read and write
|
||
1F1C6000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E35000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
2B8EBB40000
|
heap
|
page read and write
|
||
1D005000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1A5A7620000
|
heap
|
page read and write
|
||
1F1CE000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1F2D0000
|
trusted library allocation
|
page read and write
|
||
2B8EB298000
|
heap
|
page read and write
|
||
1A5A7670000
|
heap
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E11000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
2B8EBB10000
|
heap
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
1F1E1000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
20000
|
unclassified section
|
page readonly
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
2B8EB28F000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
E11000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
FF7000
|
heap
|
page read and write
|
||
1F220000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
remote allocation
|
page read and write
|
||
1D00A000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
2B8EB9A0000
|
trusted library allocation
|
page read and write
|
||
1D005000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1A5A762A000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1D005000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
1F1E6000
|
trusted library allocation
|
page read and write
|
||
2B8EB2C0000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
E51000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1A5A7520000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1A5A7654000
|
heap
|
page read and write
|
||
1FF9E000
|
unkown
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1D005000
|
trusted library allocation
|
page read and write
|
||
E35000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
A08000
|
trusted library allocation
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
1CE7E000
|
stack
|
page read and write
|
||
1F258000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
1CFCE000
|
stack
|
page read and write
|
||
2B8EB22A000
|
heap
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
E11000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1BFF0000
|
heap
|
page read and write
|
||
2B8EBB74000
|
heap
|
page read and write
|
||
1F255000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
1A5A7670000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1A5A8002000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1D008000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1A5A7613000
|
heap
|
page read and write
|
||
1F255000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
1C00C000
|
heap
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
2B8EB29A000
|
heap
|
page read and write
|
||
1CE10000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1D133000
|
trusted library allocation
|
page read and write
|
||
1CAAF000
|
stack
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1E021000
|
trusted library allocation
|
page read and write
|
||
1CE20000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1D005000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
2B8EB2B0000
|
heap
|
page read and write
|
||
2B8EBB2C000
|
heap
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
2B8EBB6B000
|
heap
|
page read and write
|
||
1CE22000
|
trusted library allocation
|
page read and write
|
||
1F2B0000
|
trusted library allocation
|
page execute and read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
1D008000
|
trusted library allocation
|
page read and write
|
||
A7D000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E35000
|
trusted library allocation
|
page read and write
|
||
DF3000
|
trusted library allocation
|
page read and write
|
||
E35000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1F240000
|
trusted library allocation
|
page read and write
|
||
1F255000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1D007000
|
trusted library allocation
|
page read and write
|
||
334C000
|
stack
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E51000
|
trusted library allocation
|
page read and write
|
||
2B8EBB29000
|
heap
|
page read and write
|
||
1F240000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
1F1BE000
|
stack
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
1A5A7627000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
438000
|
unkown
|
page read and write
|
||
1A5A7640000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1CEC0000
|
heap
|
page read and write
|
||
1008000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1A5A7656000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1CE1D000
|
trusted library allocation
|
page execute and read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
1F4C0000
|
heap
|
page execute and read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
1CE3B000
|
trusted library allocation
|
page execute and read and write
|
||
A6C000
|
trusted library allocation
|
page read and write
|
||
E51000
|
trusted library allocation
|
page read and write
|
||
1C2A0000
|
heap
|
page read and write
|
||
1A5A75D0000
|
heap
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E7E000
|
trusted library allocation
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
2B8EBA02000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1A5A7646000
|
heap
|
page read and write
|
||
100B000
|
heap
|
page read and write
|
||
1F2B0000
|
trusted library allocation
|
page read and write
|
||
1F2D1000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
FA5000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1D005000
|
trusted library allocation
|
page read and write
|
||
1F2D0000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
2B8EB2B0000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1D005000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E06000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
2B8EBB7C000
|
heap
|
page read and write
|
||
E51000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1F2D0000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
2029C000
|
stack
|
page read and write
|
||
DF3000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1D005000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E35000
|
trusted library allocation
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
1A5A7627000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
1A5A7E90000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1F255000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E35000
|
trusted library allocation
|
page read and write
|
||
E51000
|
trusted library allocation
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
2B8EB25F000
|
heap
|
page read and write
|
||
1D131000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
F85000
|
heap
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1A5A7702000
|
heap
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
A94000
|
trusted library allocation
|
page read and write
|
||
2B8EBB41000
|
heap
|
page read and write
|
||
E31000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
FA5000
|
heap
|
page read and write
|
||
E14000
|
trusted library allocation
|
page read and write
|
||
FB8000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1F21E000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
FB1000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1F241000
|
trusted library allocation
|
page read and write
|
||
A92000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
1D005000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
FCE000
|
heap
|
page read and write
|
||
1F270000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
D4F000
|
stack
|
page read and write
|
||
1CCCA000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1F2F0000
|
heap
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
FBF000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
2B8EBB32000
|
heap
|
page read and write
|
||
E35000
|
trusted library allocation
|
page read and write
|
||
24CF000
|
stack
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
24D0000
|
trusted library allocation
|
page read and write
|
||
2B8EBB76000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
FED000
|
heap
|
page read and write
|
||
102D000
|
heap
|
page read and write
|
||
73D000
|
heap
|
page read and write
|
||
2B8EBB70000
|
heap
|
page read and write
|
||
102A000
|
heap
|
page read and write
|
||
1F1ED000
|
trusted library allocation
|
page read and write
|
||
1F255000
|
trusted library allocation
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1A5A75B0000
|
unclassified section
|
page readonly
|
||
C25000
|
heap
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
2B8EBB0E000
|
heap
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
E35000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
F8E000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
1D005000
|
trusted library allocation
|
page read and write
|
||
2B8EB329000
|
heap
|
page read and write
|
||
46C0000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
E35000
|
trusted library allocation
|
page read and write
|
||
1CE32000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
E7B000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
2B8EBB7C000
|
heap
|
page read and write
|
||
8168B7F000
|
stack
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
1D135000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
344D000
|
stack
|
page read and write
|
||
DF3000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1A5A7580000
|
heap
|
page read and write
|
||
1CE35000
|
trusted library allocation
|
page execute and read and write
|
||
1D005000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
200DE000
|
stack
|
page read and write
|
||
1D008000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
2B8EB313000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1110000
|
trusted library allocation
|
page execute and read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
45F000
|
unkown
|
page readonly
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
2B8EB213000
|
heap
|
page read and write
|
||
FD9000
|
heap
|
page read and write
|
||
F4C8BFE000
|
stack
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1F280000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
2B8EB2C0000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1F260000
|
trusted library allocation
|
page read and write
|
||
E35000
|
trusted library allocation
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
E01000
|
trusted library allocation
|
page read and write
|
||
1CDC7000
|
stack
|
page read and write
|
||
1F254000
|
trusted library allocation
|
page read and write
|
||
1FFDE000
|
unkown
|
page read and write
|
||
1F255000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
2B8EB300000
|
heap
|
page read and write
|
||
E51000
|
trusted library allocation
|
page read and write
|
||
1F2D0000
|
trusted library allocation
|
page read and write
|
||
1F255000
|
trusted library allocation
|
page read and write
|
||
1023000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
726000
|
heap
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E3A000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E51000
|
trusted library allocation
|
page read and write
|
||
E51000
|
trusted library allocation
|
page read and write
|
||
1F2D0000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
F4C8FFD000
|
stack
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
1C007000
|
heap
|
page read and write
|
||
1D004000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
1CE26000
|
trusted library allocation
|
page execute and read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
2B8EBB3B000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1CE37000
|
trusted library allocation
|
page execute and read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
2B8EB272000
|
heap
|
page read and write
|
||
714000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
E52000
|
trusted library allocation
|
page read and write
|
||
1CE04000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
1A5A7660000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
72C000
|
heap
|
page read and write
|
||
10BB000
|
stack
|
page read and write
|
||
1F250000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
E03000
|
trusted library allocation
|
page read and write
|
||
2B8EB1A0000
|
unclassified section
|
page readonly
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E51000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
1A5A767D000
|
heap
|
page read and write
|
||
DF1000
|
trusted library allocation
|
page read and write
|
||
2B8EB090000
|
heap
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
1F1CB000
|
trusted library allocation
|
page read and write
|
||
1120000
|
trusted library allocation
|
page read and write
|
||
1D005000
|
trusted library allocation
|
page read and write
|
||
DF3000
|
trusted library allocation
|
page read and write
|
||
1BFF1000
|
heap
|
page read and write
|
||
F8A000
|
heap
|
page read and write
|
||
FF9000
|
heap
|
page read and write
|
||
DF0000
|
trusted library allocation
|
page read and write
|
||
E35000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
DE1000
|
trusted library allocation
|
page read and write
|
||
1F88D000
|
stack
|
page read and write
|
||
2B8EB2AF000
|
heap
|
page read and write
|
||
2B8EB200000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
||
1F2B0000
|
trusted library allocation
|
page read and write
|
||
1F255000
|
trusted library allocation
|
page read and write
|
||
1008000
|
heap
|
page read and write
|
||
1D000000
|
trusted library allocation
|
page read and write
|
There are 1090 hidden memdumps, click here to show them.