Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Win64.DropperX-gen.15585.25265.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\sihost.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\svnchost.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\explorer.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\payload%20(3)[1].bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0pxwixjb.1rt.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_agmmmj2u.r1r.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_brxfgbnl.2jx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eml0hcb4.new.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eyrvlnkn.d0t.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hak5ihvi.vml.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rtxhcdgx.fav.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_saxl1loi.f3a.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_te40lobw.o5x.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tizxviga.xmx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tpezu4ec.upl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_voeazagn.ngh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wfc5dkif.klc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wk4ftmw0.xp1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xapnh1wn.515.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y02vojvz.pk1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\sihost.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svnchost.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Mar 31 10:36:31
2024, mtime=Sun Mar 31 10:36:31 2024, atime=Sun Mar 31 10:36:31 2024, length=5141208, window=hide
|
modified
|
There are 14 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15585.25265.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.DropperX-gen.15585.25265.exe"
|
||
C:\Windows\explorer.exe
|
"C:\\Windows\\explorer.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks /create /tn Windows-Update-Manager /tr 'C:\Users\user\AppData\Local\Temp\sihost.exe' /sc minute /mo 1 /st 00:01 /f
|
||
C:\Users\user\AppData\Local\Temp\sihost.exe
|
C:\Users\user\AppData\Local\Temp\sihost.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\explorer.exe'
|
||
C:\Windows\explorer.exe
|
"C:\\Windows\\explorer.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'explorer.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\svnchost.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svnchost.exe'
|
||
C:\Users\user\AppData\Local\Temp\sihost.exe
|
C:\Users\user\AppData\Local\Temp\sihost.exe
|
||
C:\Windows\explorer.exe
|
"C:\\Windows\\explorer.exe"
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svnchost" /tr "C:\Users\user\AppData\Local\Temp\svnchost.exe"
|
||
C:\Users\user\AppData\Local\Temp\svnchost.exe
|
C:\Users\user\AppData\Local\Temp\svnchost.exe
|
||
C:\Windows\explorer.exe
|
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
|
||
C:\Users\user\AppData\Local\Temp\svnchost.exe
|
"C:\Users\user\AppData\Local\Temp\svnchost.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
|
||
C:\Users\user\AppData\Local\Temp\svnchost.exe
|
"C:\Users\user\AppData\Local\Temp\svnchost.exe"
|
||
C:\Windows\explorer.exe
|
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
|
||
C:\Users\user\AppData\Local\Temp\sihost.exe
|
C:\Users\user\AppData\Local\Temp\sihost.exe
|
||
C:\Windows\explorer.exe
|
"C:\\Windows\\explorer.exe"
|
||
C:\Users\user\AppData\Local\Temp\svnchost.exe
|
C:\Users\user\AppData\Local\Temp\svnchost.exe
|
||
C:\Windows\explorer.exe
|
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 18 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
94.156.10.234
|
|||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://aka.ms/Vh5j3kalSizeQf#
|
unknown
|
||
https://raw.githubusercontent.com/g
|
unknown
|
||
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binonicleaks/z/main/payload%20(3).
|
unknown
|
||
http://schemas.m
|
unknown
|
||
https://raw.githubuserconten
|
unknown
|
||
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).bin4
|
unknown
|
||
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).bin6
|
unknown
|
||
https://github.com/zonicleaks/z/raw/main/payload%20(3).bindll
|
unknown
|
||
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).bin8
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://raw.githubusercontent.com/;eS
|
unknown
|
||
https://aka.ms/Vh5j3k(
|
unknown
|
||
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binA
|
unknown
|
||
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binA-rXv
|
unknown
|
||
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binioC:
|
unknown
|
||
https://raw.githubusercontent.com/1ei
|
unknown
|
||
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binJ
|
unknown
|
||
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binI
|
unknown
|
||
https://aka.ms/odirm
|
unknown
|
||
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binN
|
unknown
|
||
https://github.com/zonicleaks/z/raw/main/payload%20(3).binal
|
unknown
|
||
https://github.com/
|
unknown
|
||
https://aka.ms/Vh5j3kZ
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).bincoC:
|
unknown
|
||
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binthC:
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://go.microsoft.cor
|
unknown
|
||
https://github.com/zonicleaks/z/raw/main/payload%20(3).binl
|
unknown
|
||
https://aka.ms/Vh5j3kDk
|
unknown
|
||
https://aka.ms/odirmReading
|
unknown
|
||
https://raw.githubusercontent.com/-
|
unknown
|
||
https://github.com/zonicleaks/z/raw/main/payload%20(3).binsI;Q
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://github.com/zonicleaks/z/raw/main/payload%20(3).bind
|
unknown
|
||
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binz
|
unknown
|
||
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).bin
|
185.199.111.133
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://github.com/Om;
|
unknown
|
||
https://raw.githubusercontent.com/2
|
unknown
|
||
https://raw.githubusercontent.com/7
|
unknown
|
||
http://schemas.m;
|
unknown
|
||
https://github.com/zonicleaks/z/raw/main/payload%20(3).binl8d
|
unknown
|
||
https://aka.ms/odirmH
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://raw.githubusercontent.com/
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://raw.githubusercontent.com/Q
|
unknown
|
||
https://github.com/zonicleaks/z/raw/main/payload%20(3).bin;=
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://github.com/bO&Q
|
unknown
|
||
http://schemas.microsoft.co_
|
unknown
|
||
https://github.com/&
|
unknown
|
||
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binLMEM
|
unknown
|
||
https://github.com/zonicleaks/z/raw/main/payload%20(3).binllz
|
unknown
|
||
https://raw.githubusercontent.com/LMEMx
|
unknown
|
||
https://raw.githubusercontent.com/tj
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://github.com/zonicleaks/z/raw/main/payload%20(3).bin8
|
unknown
|
||
https://raw.githubusercontent.com/_
|
unknown
|
||
https://raw.githubusercontent.com/zonicleaks/z/main/payload%20(3).binC5
|
unknown
|
||
https://github.com/zonicleaks/z/raw/main/payload%20(3).bin
|
140.82.113.3
|
There are 59 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
github.com
|
140.82.113.3
|
||
raw.githubusercontent.com
|
185.199.111.133
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
94.156.10.234
|
unknown
|
Bulgaria
|
||
140.82.113.3
|
github.com
|
United States
|
||
185.199.111.133
|
raw.githubusercontent.com
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
svnchost
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
|
MRUListEx
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
|
LastUpdate
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1F70000
|
trusted library section
|
page read and write
|
||
2A80000
|
trusted library section
|
page read and write
|
||
2D20000
|
trusted library section
|
page read and write
|
||
2E11000
|
trusted library allocation
|
page read and write
|
||
1B4D0000
|
trusted library section
|
page read and write
|
||
2C01000
|
trusted library allocation
|
page read and write
|
||
2131000
|
trusted library allocation
|
page read and write
|
||
1EBAED71000
|
trusted library allocation
|
page read and write
|
||
7FF657B85000
|
unkown
|
page readonly
|
||
1A12B3C0000
|
heap
|
page read and write
|
||
7FFD9BAC8000
|
trusted library allocation
|
page read and write
|
||
2175DE36000
|
heap
|
page read and write
|
||
6D707FB000
|
stack
|
page read and write
|
||
1EBC5C4F000
|
heap
|
page read and write
|
||
F068BFF000
|
stack
|
page read and write
|
||
1EBAD4D0000
|
heap
|
page read and write
|
||
217780B6000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
2176FB41000
|
trusted library allocation
|
page read and write
|
||
7038000
|
heap
|
page read and write
|
||
F06907F000
|
stack
|
page read and write
|
||
6F1000
|
heap
|
page read and write
|
||
2175FA10000
|
heap
|
page execute and read and write
|
||
B58000
|
heap
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
7FF657B87000
|
unkown
|
page readonly
|
||
2A00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC9000
|
trusted library allocation
|
page read and write
|
||
7FF6576E0000
|
unkown
|
page readonly
|
||
1267000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
29C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B934000
|
trusted library allocation
|
page read and write
|
||
32F5000
|
stack
|
page read and write
|
||
5A2000
|
heap
|
page read and write
|
||
7DF4996B0000
|
trusted library allocation
|
page execute and read and write
|
||
1139000
|
heap
|
page read and write
|
||
1EBAE790000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
1DC1EDF7000
|
trusted library allocation
|
page read and write
|
||
5F8AA4E000
|
stack
|
page read and write
|
||
2D43000
|
trusted library allocation
|
page read and write
|
||
7FF657A5F000
|
unkown
|
page readonly
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
68ED000
|
stack
|
page read and write
|
||
1FC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
FB6000
|
heap
|
page read and write
|
||
21761936000
|
trusted library allocation
|
page read and write
|
||
1A114358000
|
trusted library allocation
|
page read and write
|
||
1DC1B7B9000
|
heap
|
page read and write
|
||
1EBAB962000
|
heap
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
1A12B557000
|
heap
|
page execute and read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
24399714000
|
heap
|
page read and write
|
||
1DC357E0000
|
heap
|
page read and write
|
||
1A113DFE000
|
trusted library allocation
|
page read and write
|
||
7FF657B56000
|
unkown
|
page readonly
|
||
1A12B876000
|
heap
|
page read and write
|
||
1B5E0000
|
trusted library allocation
|
page read and write
|
||
2E99000
|
stack
|
page read and write
|
||
2175DEA8000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
5F8ABCE000
|
stack
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
32A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
21760A88000
|
trusted library allocation
|
page read and write
|
||
21760B46000
|
trusted library allocation
|
page read and write
|
||
1DC1E203000
|
trusted library allocation
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
1A114E5F000
|
trusted library allocation
|
page read and write
|
||
2D43000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8FD000
|
trusted library allocation
|
page execute and read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
7FF699B11000
|
unkown
|
page write copy
|
||
AD0000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
2175FD39000
|
trusted library allocation
|
page read and write
|
||
7DF4996A0000
|
trusted library allocation
|
page execute and read and write
|
||
29E0000
|
trusted library allocation
|
page read and write
|
||
243996EB000
|
heap
|
page read and write
|
||
7128000
|
heap
|
page read and write
|
||
7FF657B66000
|
unkown
|
page readonly
|
||
7FFD9B79B000
|
trusted library allocation
|
page read and write
|
||
680F000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
21760BA3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
7A47000
|
heap
|
page read and write
|
||
21760A99000
|
trusted library allocation
|
page read and write
|
||
B66000
|
heap
|
page read and write
|
||
74ED000
|
stack
|
page read and write
|
||
D22000
|
stack
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FF657A58000
|
unkown
|
page write copy
|
||
7FF657A7F000
|
unkown
|
page readonly
|
||
1B550000
|
trusted library allocation
|
page read and write
|
||
7FF6D4331000
|
unkown
|
page execute read
|
||
123B000
|
heap
|
page read and write
|
||
1EB0000
|
trusted library allocation
|
page read and write
|
||
7FF699B00000
|
unkown
|
page readonly
|
||
1B610000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
772E000
|
stack
|
page read and write
|
||
12D41000
|
trusted library allocation
|
page read and write
|
||
69D0000
|
heap
|
page read and write
|
||
1A114EA9000
|
trusted library allocation
|
page read and write
|
||
1EBAE7F2000
|
trusted library allocation
|
page read and write
|
||
F28000
|
heap
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
A0BD3F7000
|
stack
|
page read and write
|
||
4D06000
|
heap
|
page read and write
|
||
E35000
|
heap
|
page read and write
|
||
1DC1E219000
|
trusted library allocation
|
page read and write
|
||
1A12B430000
|
heap
|
page read and write
|
||
1EBC5A80000
|
heap
|
page execute and read and write
|
||
36447FE000
|
stack
|
page read and write
|
||
DE2000
|
stack
|
page read and write
|
||
6363000
|
heap
|
page read and write
|
||
7FFD9BB8C000
|
trusted library allocation
|
page read and write
|
||
1DC35B3D000
|
heap
|
page read and write
|
||
7C22000
|
heap
|
page read and write
|
||
1DC358C1000
|
heap
|
page read and write
|
||
7DF4E5E50000
|
trusted library allocation
|
page execute and read and write
|
||
F068723000
|
stack
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1BB9A000
|
stack
|
page read and write
|
||
23D3BE20000
|
heap
|
page read and write
|
||
131C8000
|
trusted library allocation
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
1A8EE000
|
stack
|
page read and write
|
||
23D3BF3F000
|
heap
|
page read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
7FF657B9F000
|
unkown
|
page readonly
|
||
7FF6576E0000
|
unkown
|
page readonly
|
||
8EB000
|
stack
|
page read and write
|
||
1A12B407000
|
heap
|
page read and write
|
||
1F93000
|
trusted library allocation
|
page read and write
|
||
4C40000
|
heap
|
page read and write
|
||
1B570000
|
trusted library allocation
|
page read and write
|
||
1EBBD7E7000
|
trusted library allocation
|
page read and write
|
||
2176FB31000
|
trusted library allocation
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
1A123081000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
1DC1E404000
|
trusted library allocation
|
page read and write
|
||
6E0000
|
trusted library allocation
|
page read and write
|
||
696D000
|
stack
|
page read and write
|
||
270F000
|
stack
|
page read and write
|
||
7FF699B00000
|
unkown
|
page readonly
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
74AD000
|
stack
|
page read and write
|
||
1EBC5CDA000
|
heap
|
page read and write
|
||
7FFD9B94A000
|
trusted library allocation
|
page read and write
|
||
7FF6D4344000
|
unkown
|
page readonly
|
||
1DC35B82000
|
heap
|
page read and write
|
||
1B4E0000
|
trusted library allocation
|
page read and write
|
||
1B4F3000
|
trusted library allocation
|
page read and write
|
||
6623000
|
heap
|
page read and write
|
||
7FF657B66000
|
unkown
|
page readonly
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7DF41A1B0000
|
trusted library allocation
|
page execute and read and write
|
||
FD0000
|
heap
|
page read and write
|
||
2F94000
|
stack
|
page read and write
|
||
74BF8FF000
|
stack
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
1A941000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
5D8000
|
heap
|
page read and write
|
||
7FF657B9F000
|
unkown
|
page readonly
|
||
1B530000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
36445FE000
|
stack
|
page read and write
|
||
FC5000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
6D701FE000
|
stack
|
page read and write
|
||
4EC0000
|
heap
|
page read and write
|
||
1EBAD4E1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
5F8B3FE000
|
stack
|
page read and write
|
||
5F8A9CE000
|
stack
|
page read and write
|
||
2175DD70000
|
trusted library allocation
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
1DC1E5CA000
|
trusted library allocation
|
page read and write
|
||
2175F980000
|
heap
|
page read and write
|
||
2D0D000
|
stack
|
page read and write
|
||
23D3DC29000
|
heap
|
page execute and read and write
|
||
21760E16000
|
trusted library allocation
|
page read and write
|
||
7DF418440000
|
trusted library allocation
|
page execute and read and write
|
||
1EBAB8F0000
|
heap
|
page read and write
|
||
24399722000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
1DC1B864000
|
heap
|
page read and write
|
||
2B40000
|
trusted library allocation
|
page read and write
|
||
E13000
|
heap
|
page read and write
|
||
2B33000
|
trusted library allocation
|
page read and write
|
||
691B000
|
stack
|
page read and write
|
||
7FF6576E0000
|
unkown
|
page readonly
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
24399749000
|
heap
|
page read and write
|
||
7FF699B0E000
|
unkown
|
page readonly
|
||
1DC1F2CE000
|
trusted library allocation
|
page read and write
|
||
7FF657BB4000
|
unkown
|
page readonly
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
74C07CE000
|
stack
|
page read and write
|
||
1B4F3000
|
trusted library allocation
|
page read and write
|
||
1B513000
|
trusted library allocation
|
page read and write
|
||
7FF657B81000
|
unkown
|
page readonly
|
||
7FF657B96000
|
unkown
|
page readonly
|
||
2175DD40000
|
trusted library section
|
page read and write
|
||
53AA1FF000
|
stack
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
2D60000
|
heap
|
page execute and read and write
|
||
1EBAE2BF000
|
trusted library allocation
|
page read and write
|
||
7FF6576E0000
|
unkown
|
page readonly
|
||
2176FE09000
|
trusted library allocation
|
page read and write
|
||
F068DF7000
|
stack
|
page read and write
|
||
2439972D000
|
heap
|
page read and write
|
||
7FF657BB7000
|
unkown
|
page readonly
|
||
1B490000
|
trusted library allocation
|
page read and write
|
||
1DC359E0000
|
heap
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
7FF6D4341000
|
unkown
|
page write copy
|
||
1A1114E3000
|
heap
|
page read and write
|
||
12F2000
|
heap
|
page read and write
|
||
1E01EC99000
|
heap
|
page read and write
|
||
1B513000
|
trusted library allocation
|
page read and write
|
||
100000
|
remote allocation
|
page execute and read and write
|
||
1B4F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
19396CD0000
|
remote allocation
|
page read and write
|
||
6FD0000
|
heap
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
2175FFDD000
|
trusted library allocation
|
page read and write
|
||
1A12B45E000
|
heap
|
page read and write
|
||
F068C77000
|
stack
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
660E000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
5F8A8CF000
|
stack
|
page read and write
|
||
2175F778000
|
heap
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
1DC2D513000
|
trusted library allocation
|
page read and write
|
||
21778078000
|
heap
|
page read and write
|
||
7FFD9BAA3000
|
trusted library allocation
|
page read and write
|
||
7FF657B7A000
|
unkown
|
page readonly
|
||
7FF6D433B000
|
unkown
|
page readonly
|
||
7FF657BA6000
|
unkown
|
page readonly
|
||
5F89979000
|
stack
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
1EBAD2F0000
|
trusted library allocation
|
page read and write
|
||
1BD000
|
stack
|
page read and write
|
||
1A114447000
|
trusted library allocation
|
page read and write
|
||
1DC35A44000
|
heap
|
page read and write
|
||
7FF657B9F000
|
unkown
|
page readonly
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
7F2E000
|
stack
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1FC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
1A12B81B000
|
heap
|
page read and write
|
||
7FF657B66000
|
unkown
|
page readonly
|
||
2B40000
|
heap
|
page execute and read and write
|
||
7FFD9B918000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF699B0A000
|
unkown
|
page read and write
|
||
1A111410000
|
heap
|
page read and write
|
||
E36000
|
heap
|
page read and write
|
||
1A1114A0000
|
heap
|
page read and write
|
||
7FF657B9F000
|
unkown
|
page readonly
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
1B7C0000
|
heap
|
page execute and read and write
|
||
26B0000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
66FB000
|
heap
|
page read and write
|
||
7FF657B66000
|
unkown
|
page readonly
|
||
29E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
7FF657A58000
|
unkown
|
page read and write
|
||
7FF6579A6000
|
unkown
|
page readonly
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
trusted library allocation
|
page read and write
|
||
100D000
|
heap
|
page read and write
|
||
1DC1B794000
|
heap
|
page read and write
|
||
1EC0000
|
trusted library allocation
|
page read and write
|
||
5F89EFB000
|
stack
|
page read and write
|
||
1DC35A54000
|
heap
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
7FF699B01000
|
unkown
|
page execute read
|
||
1B740000
|
heap
|
page read and write
|
||
2B40000
|
trusted library allocation
|
page read and write
|
||
12F9000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
53A97FF000
|
stack
|
page read and write
|
||
243994F0000
|
heap
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
11E6000
|
heap
|
page read and write
|
||
4D0D000
|
heap
|
page read and write
|
||
1EBAE68D000
|
trusted library allocation
|
page read and write
|
||
F61000
|
heap
|
page read and write
|
||
2176071B000
|
trusted library allocation
|
page read and write
|
||
7FF657B89000
|
unkown
|
page readonly
|
||
1A114806000
|
trusted library allocation
|
page read and write
|
||
2176FE19000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
15BF000
|
stack
|
page read and write
|
||
23D3BE76000
|
heap
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page read and write
|
||
2175F9A9000
|
heap
|
page read and write
|
||
7FF657B6A000
|
unkown
|
page readonly
|
||
1B4E3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB7A000
|
trusted library allocation
|
page read and write
|
||
106F000
|
heap
|
page read and write
|
||
1DC1B990000
|
heap
|
page read and write
|
||
1A112E70000
|
heap
|
page read and write
|
||
1A920000
|
trusted library allocation
|
page read and write
|
||
6670000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
1DC1E09E000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
trusted library allocation
|
page read and write
|
||
1675000
|
heap
|
page read and write
|
||
1DC35900000
|
heap
|
page read and write
|
||
7FFD9BAD4000
|
trusted library allocation
|
page read and write
|
||
12D9000
|
heap
|
page read and write
|
||
1153000
|
heap
|
page read and write
|
||
6E6000
|
heap
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
74BF7FE000
|
stack
|
page read and write
|
||
12D58000
|
trusted library allocation
|
page read and write
|
||
7FD4000
|
heap
|
page read and write
|
||
7A5A000
|
heap
|
page read and write
|
||
21760E4E000
|
trusted library allocation
|
page read and write
|
||
7FF699B00000
|
unkown
|
page readonly
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1EBBD7CF000
|
trusted library allocation
|
page read and write
|
||
7FF657B85000
|
unkown
|
page readonly
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FF657B87000
|
unkown
|
page readonly
|
||
1EBBD501000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B762000
|
trusted library allocation
|
page read and write
|
||
12AE000
|
stack
|
page read and write
|
||
21760A7F000
|
trusted library allocation
|
page read and write
|
||
1B4C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
7FF657B27000
|
unkown
|
page readonly
|
||
1A12B7B1000
|
heap
|
page read and write
|
||
53A95F7000
|
stack
|
page read and write
|
||
7FF657A5F000
|
unkown
|
page readonly
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
7FF6D433A000
|
unkown
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
6B68000
|
stack
|
page read and write
|
||
24399800000
|
remote allocation
|
page read and write
|
||
6EF0000
|
heap
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
1A52D000
|
stack
|
page read and write
|
||
1B7A8000
|
heap
|
page read and write
|
||
7FF657BAA000
|
unkown
|
page readonly
|
||
7C1F000
|
heap
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
F78000
|
stack
|
page read and write
|
||
7FFD9BAEC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC3000
|
trusted library allocation
|
page read and write
|
||
7FF6D433E000
|
unkown
|
page readonly
|
||
2B33000
|
trusted library allocation
|
page read and write
|
||
1B520000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
53A99FF000
|
stack
|
page read and write
|
||
6213000
|
heap
|
page read and write
|
||
7FF657B5F000
|
unkown
|
page readonly
|
||
3644BFE000
|
stack
|
page read and write
|
||
12E11000
|
trusted library allocation
|
page read and write
|
||
7FFD9B944000
|
trusted library allocation
|
page read and write
|
||
1DC1E410000
|
trusted library allocation
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
1DC1B7F6000
|
heap
|
page read and write
|
||
1DC2D78C000
|
trusted library allocation
|
page read and write
|
||
7FF657B66000
|
unkown
|
page readonly
|
||
7FFD9B912000
|
trusted library allocation
|
page read and write
|
||
1096000
|
heap
|
page read and write
|
||
1B510000
|
trusted library allocation
|
page read and write
|
||
23D3BE50000
|
heap
|
page read and write
|
||
2EC8000
|
stack
|
page read and write
|
||
5F89CF8000
|
stack
|
page read and write
|
||
1A12337B000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
heap
|
page readonly
|
||
15AE000
|
stack
|
page read and write
|
||
7FFD9B75D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF699B0E000
|
unkown
|
page readonly
|
||
AE8000
|
stack
|
page read and write
|
||
74BF87A000
|
stack
|
page read and write
|
||
11E6000
|
heap
|
page read and write
|
||
7F30000
|
heap
|
page read and write
|
||
1A12B7BC000
|
heap
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
74BF3FE000
|
stack
|
page read and write
|
||
7FF699B11000
|
unkown
|
page write copy
|
||
2D7F000
|
stack
|
page read and write
|
||
1A123373000
|
trusted library allocation
|
page read and write
|
||
1A11425B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
7FF657A5F000
|
unkown
|
page readonly
|
||
1EBAF304000
|
trusted library allocation
|
page read and write
|
||
E10000
|
remote allocation
|
page execute and read and write
|
||
E30000
|
heap
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
1EBC5CAB000
|
heap
|
page read and write
|
||
11A9000
|
heap
|
page read and write
|
||
F5C000
|
heap
|
page read and write
|
||
7FF6576E0000
|
unkown
|
page readonly
|
||
2175DD30000
|
trusted library section
|
page read and write
|
||
5F8B47E000
|
stack
|
page read and write
|
||
1A112DF0000
|
heap
|
page read and write
|
||
7FF657BAA000
|
unkown
|
page readonly
|
||
7FF657B7A000
|
unkown
|
page readonly
|
||
F0687EE000
|
stack
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
1A111499000
|
heap
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
1B63E000
|
stack
|
page read and write
|
||
1EBAB99A000
|
heap
|
page read and write
|
||
1EBAD350000
|
trusted library allocation
|
page read and write
|
||
1182000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1DC1E400000
|
trusted library allocation
|
page read and write
|
||
74BFC7E000
|
stack
|
page read and write
|
||
4961000
|
heap
|
page read and write
|
||
1EBAB990000
|
heap
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
1A111551000
|
heap
|
page read and write
|
||
7FF657BB4000
|
unkown
|
page readonly
|
||
1DC35806000
|
heap
|
page read and write
|
||
1375000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
F0690FB000
|
stack
|
page read and write
|
||
1FE0000
|
trusted library allocation
|
page read and write
|
||
A0BE7FE000
|
stack
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
67BD000
|
heap
|
page read and write
|
||
1A1116F5000
|
heap
|
page read and write
|
||
1B4F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F5000
|
trusted library allocation
|
page read and write
|
||
1DC1DEF3000
|
trusted library allocation
|
page read and write
|
||
FD6000
|
heap
|
page read and write
|
||
7FF6D4331000
|
unkown
|
page execute read
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
21761460000
|
trusted library allocation
|
page read and write
|
||
7FF699B14000
|
unkown
|
page readonly
|
||
F068EF8000
|
stack
|
page read and write
|
||
31F9000
|
stack
|
page read and write
|
||
11F6000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
1A12B550000
|
heap
|
page execute and read and write
|
||
7FF657BA6000
|
unkown
|
page readonly
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
67EA000
|
heap
|
page read and write
|
||
1A12B8DF000
|
heap
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
1DC35A80000
|
heap
|
page read and write
|
||
1DC1D230000
|
heap
|
page execute and read and write
|
||
6F1000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
7FF657B6A000
|
unkown
|
page readonly
|
||
10C0000
|
heap
|
page read and write
|
||
2120000
|
heap
|
page execute and read and write
|
||
1DC1B7F4000
|
heap
|
page read and write
|
||
1B510000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB9C000
|
trusted library allocation
|
page read and write
|
||
36451FB000
|
stack
|
page read and write
|
||
1DC35B4B000
|
heap
|
page read and write
|
||
1EBC5987000
|
heap
|
page read and write
|
||
24399746000
|
heap
|
page read and write
|
||
1DC358CC000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
1E01ED80000
|
heap
|
page read and write
|
||
2B10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FF657A5F000
|
unkown
|
page readonly
|
||
7FFD9BB8A000
|
trusted library allocation
|
page read and write
|
||
1EBC5AB0000
|
heap
|
page read and write
|
||
1EBAEE3F000
|
trusted library allocation
|
page read and write
|
||
2175DD50000
|
trusted library allocation
|
page read and write
|
||
7FF699B01000
|
unkown
|
page execute read
|
||
F068CFD000
|
stack
|
page read and write
|
||
6733000
|
heap
|
page read and write
|
||
1DC1D267000
|
heap
|
page execute and read and write
|
||
1B4F0000
|
trusted library allocation
|
page read and write
|
||
1A114117000
|
trusted library allocation
|
page read and write
|
||
19396D29000
|
heap
|
page execute and read and write
|
||
7FFD9BAD2000
|
trusted library allocation
|
page read and write
|
||
7FF6576E0000
|
unkown
|
page readonly
|
||
7FF657B85000
|
unkown
|
page readonly
|
||
7FF6579A6000
|
unkown
|
page readonly
|
||
AC0000
|
heap
|
page read and write
|
||
7FF657B6A000
|
unkown
|
page readonly
|
||
14AD000
|
stack
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC4000
|
trusted library allocation
|
page read and write
|
||
1EBAD310000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
FC0000
|
heap
|
page read and write
|
||
1ED0000
|
heap
|
page read and write
|
||
3644DFE000
|
stack
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
2176FE01000
|
trusted library allocation
|
page read and write
|
||
1EBC5A60000
|
heap
|
page execute and read and write
|
||
D60000
|
remote allocation
|
page execute and read and write
|
||
2176FB11000
|
trusted library allocation
|
page read and write
|
||
6BE9000
|
stack
|
page read and write
|
||
DEF000
|
stack
|
page read and write
|
||
7FF657B9F000
|
unkown
|
page readonly
|
||
21761912000
|
trusted library allocation
|
page read and write
|
||
127D000
|
heap
|
page read and write
|
||
21760BCF000
|
trusted library allocation
|
page read and write
|
||
23D3DC00000
|
remote allocation
|
page read and write
|
||
23D3BF59000
|
heap
|
page read and write
|
||
1EBAD565000
|
trusted library allocation
|
page read and write
|
||
1DC1D190000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
3A1B000
|
heap
|
page read and write
|
||
1F90000
|
trusted library allocation
|
page read and write
|
||
1DC1B920000
|
trusted library allocation
|
page read and write
|
||
7FF657BB7000
|
unkown
|
page readonly
|
||
1F90000
|
trusted library allocation
|
page read and write
|
||
7FF699B14000
|
unkown
|
page readonly
|
||
2AFF000
|
stack
|
page read and write
|
||
2439B3A9000
|
heap
|
page execute and read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
69F0000
|
heap
|
page read and write
|
||
1A930000
|
trusted library allocation
|
page read and write
|
||
1DC1E222000
|
trusted library allocation
|
page read and write
|
||
1B620000
|
trusted library allocation
|
page read and write
|
||
2C80000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
B53000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
7FF6579A6000
|
unkown
|
page readonly
|
||
7026000
|
heap
|
page read and write
|
||
DDF000
|
stack
|
page read and write
|
||
F069D4C000
|
stack
|
page read and write
|
||
131F000
|
heap
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
36457FE000
|
stack
|
page read and write
|
||
23D3BF54000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
217618EC000
|
trusted library allocation
|
page read and write
|
||
F068AFE000
|
stack
|
page read and write
|
||
6CE8000
|
stack
|
page read and write
|
||
B29000
|
heap
|
page read and write
|
||
7FF699B00000
|
unkown
|
page readonly
|
||
5F8B57E000
|
stack
|
page read and write
|
||
12131000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAD9000
|
trusted library allocation
|
page read and write
|
||
1FC0000
|
trusted library allocation
|
page read and write
|
||
1F90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B948000
|
trusted library allocation
|
page read and write
|
||
1B4CE000
|
stack
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
7FF657B7A000
|
unkown
|
page readonly
|
||
1EBAF2E4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B908000
|
trusted library allocation
|
page execute and read and write
|
||
67E000
|
stack
|
page read and write
|
||
7FFD9BA93000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
24399707000
|
heap
|
page read and write
|
||
36455FE000
|
stack
|
page read and write
|
||
7FF657B56000
|
unkown
|
page readonly
|
||
1016000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
1A12B8D2000
|
heap
|
page read and write
|
||
2175DD80000
|
heap
|
page readonly
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF657BAA000
|
unkown
|
page readonly
|
||
1A112D40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
12139000
|
trusted library allocation
|
page read and write
|
||
2175F9FA000
|
heap
|
page read and write
|
||
6F6000
|
heap
|
page read and write
|
||
7FFD9B964000
|
trusted library allocation
|
page read and write
|
||
F068D79000
|
stack
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
1FB0000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
7F75000
|
heap
|
page read and write
|
||
1EBAB98D000
|
heap
|
page read and write
|
||
1DC1B778000
|
heap
|
page read and write
|
||
69D6000
|
heap
|
page read and write
|
||
23D3BF3F000
|
heap
|
page read and write
|
||
72EA000
|
stack
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
7FF6579A6000
|
unkown
|
page readonly
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
19394F9B000
|
heap
|
page read and write
|
||
217780B9000
|
heap
|
page read and write
|
||
7FF657B81000
|
unkown
|
page readonly
|
||
7FFD9BAE4000
|
trusted library allocation
|
page read and write
|
||
7FF6576E0000
|
unkown
|
page readonly
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
112E000
|
heap
|
page read and write
|
||
1DC1D96F000
|
trusted library allocation
|
page read and write
|
||
7FF657B27000
|
unkown
|
page readonly
|
||
1DC1E419000
|
trusted library allocation
|
page read and write
|
||
3644FFF000
|
stack
|
page read and write
|
||
1306000
|
heap
|
page read and write
|
||
1DC1E564000
|
trusted library allocation
|
page read and write
|
||
19394F46000
|
heap
|
page read and write
|
||
7DF440050000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1FA0000
|
heap
|
page execute and read and write
|
||
36443F7000
|
stack
|
page read and write
|
||
1EBAE4B1000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
23D3BF10000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
trusted library allocation
|
page read and write
|
||
7FF657BAA000
|
unkown
|
page readonly
|
||
1A111468000
|
heap
|
page read and write
|
||
7FF657BA6000
|
unkown
|
page readonly
|
||
2175DDB0000
|
heap
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
FE1000
|
heap
|
page read and write
|
||
1DC35822000
|
heap
|
page read and write
|
||
A7B000
|
stack
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
1100000
|
direct allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
6D70DFD000
|
stack
|
page read and write
|
||
1EBAEC65000
|
trusted library allocation
|
page read and write
|
||
53AA9FE000
|
stack
|
page read and write
|
||
74A9000
|
stack
|
page read and write
|
||
2176FB81000
|
trusted library allocation
|
page read and write
|
||
1DC1ED36000
|
trusted library allocation
|
page read and write
|
||
1DC1D526000
|
trusted library allocation
|
page read and write
|
||
1F93000
|
trusted library allocation
|
page read and write
|
||
5F8B378000
|
stack
|
page read and write
|
||
5F89E7E000
|
stack
|
page read and write
|
||
74BF673000
|
stack
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
7FF657A58000
|
unkown
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
11E8000
|
heap
|
page read and write
|
||
A0BDFFE000
|
stack
|
page read and write
|
||
F069DCE000
|
stack
|
page read and write
|
||
7FF657B85000
|
unkown
|
page readonly
|
||
1DC1E681000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1DC1D2B5000
|
heap
|
page read and write
|
||
1EBAB958000
|
heap
|
page read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
1B4B0000
|
trusted library allocation
|
page read and write
|
||
7FF657BB4000
|
unkown
|
page readonly
|
||
7FF699B0B000
|
unkown
|
page readonly
|
||
1A12B8EF000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
1298000
|
heap
|
page read and write
|
||
75A1000
|
heap
|
page read and write
|
||
1A1141A5000
|
trusted library allocation
|
page read and write
|
||
74BFDFB000
|
stack
|
page read and write
|
||
1A1112D0000
|
heap
|
page read and write
|
||
1EBABCC5000
|
heap
|
page read and write
|
||
1A12B405000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
2176FE07000
|
trusted library allocation
|
page read and write
|
||
1324000
|
heap
|
page read and write
|
||
1F90000
|
trusted library allocation
|
page read and write
|
||
7FF6D4344000
|
unkown
|
page readonly
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1DC1D260000
|
heap
|
page execute and read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
131BF000
|
trusted library allocation
|
page read and write
|
||
1125000
|
heap
|
page read and write
|
||
1DC1D490000
|
heap
|
page execute and read and write
|
||
1DC1D6CA000
|
trusted library allocation
|
page read and write
|
||
562000
|
heap
|
page read and write
|
||
1A12B7F6000
|
heap
|
page read and write
|
||
1DC1D430000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
4972000
|
heap
|
page read and write
|
||
7FF657B7A000
|
unkown
|
page readonly
|
||
1DC35A3C000
|
heap
|
page read and write
|
||
1A114E84000
|
trusted library allocation
|
page read and write
|
||
1DC1E74D000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
1A12B4C0000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
1A113020000
|
heap
|
page execute and read and write
|
||
2175DCB0000
|
heap
|
page read and write
|
||
7FF699B0A000
|
unkown
|
page read and write
|
||
1E01EC10000
|
heap
|
page read and write
|
||
1EBBD7CD000
|
trusted library allocation
|
page read and write
|
||
6D703FE000
|
stack
|
page read and write
|
||
2175DD90000
|
trusted library allocation
|
page read and write
|
||
7597000
|
heap
|
page read and write
|
||
7FF699B0B000
|
unkown
|
page readonly
|
||
DD0000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
3AA0000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
1EBC5A00000
|
heap
|
page read and write
|
||
7FFD9BAE9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BACC000
|
trusted library allocation
|
page read and write
|
||
131E3000
|
trusted library allocation
|
page read and write
|
||
12C0E000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
trusted library allocation
|
page read and write
|
||
2B39000
|
trusted library allocation
|
page read and write
|
||
7FF6D4341000
|
unkown
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
7FF6579A6000
|
unkown
|
page readonly
|
||
7FFD9B91A000
|
trusted library allocation
|
page read and write
|
||
7FF6579A6000
|
unkown
|
page readonly
|
||
7FF6D433B000
|
unkown
|
page readonly
|
||
1455000
|
heap
|
page read and write
|
||
1DC1B7FB000
|
heap
|
page read and write
|
||
7608000
|
stack
|
page read and write
|
||
7FF6576E1000
|
unkown
|
page execute read
|
||
294F000
|
stack
|
page read and write
|
||
1EBAB996000
|
heap
|
page read and write
|
||
23D3DC00000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
1DC1E476000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
1DC2D4C1000
|
trusted library allocation
|
page read and write
|
||
7FF6576E0000
|
unkown
|
page readonly
|
||
7FF657B7A000
|
unkown
|
page readonly
|
||
21760B4C000
|
trusted library allocation
|
page read and write
|
||
19396D00000
|
heap
|
page read and write
|
||
81E000
|
stack
|
page read and write
|
||
1A11354D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
2175DE34000
|
heap
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
2B60000
|
trusted library allocation
|
page read and write
|
||
2B1E000
|
stack
|
page read and write
|
||
11D7000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
29C0000
|
trusted library allocation
|
page read and write
|
||
1DC1E538000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
49A5000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
1A12B3C7000
|
heap
|
page read and write
|
||
5F89513000
|
stack
|
page read and write
|
||
7FF699B14000
|
unkown
|
page readonly
|
||
4F0000
|
direct allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
21760A10000
|
trusted library allocation
|
page read and write
|
||
F069CC9000
|
stack
|
page read and write
|
||
56A000
|
heap
|
page read and write
|
||
1167000
|
heap
|
page read and write
|
||
23D3BF46000
|
heap
|
page read and write
|
||
576000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
132E000
|
heap
|
page read and write
|
||
23D3BF5C000
|
heap
|
page read and write
|
||
2439973B000
|
heap
|
page read and write
|
||
132E000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page readonly
|
||
5F8AEFE000
|
stack
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
2175DDFC000
|
heap
|
page read and write
|
||
1269000
|
heap
|
page read and write
|
||
7FF657B66000
|
unkown
|
page readonly
|
||
7FF657A5F000
|
unkown
|
page readonly
|
||
19394FCB000
|
heap
|
page read and write
|
||
7FF657BAA000
|
unkown
|
page readonly
|
||
1EBAE151000
|
trusted library allocation
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
29F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
1EBC5DC0000
|
trusted library allocation
|
page read and write
|
||
12E19000
|
trusted library allocation
|
page read and write
|
||
2175DE0E000
|
heap
|
page read and write
|
||
6A9000
|
heap
|
page read and write
|
||
1EBC5930000
|
heap
|
page read and write
|
||
1B600000
|
trusted library allocation
|
page read and write
|
||
7FF657B85000
|
unkown
|
page readonly
|
||
1EBC5BA0000
|
heap
|
page read and write
|
||
1EBAE738000
|
trusted library allocation
|
page read and write
|
||
7FFD9B941000
|
trusted library allocation
|
page read and write
|
||
5F8C04E000
|
stack
|
page read and write
|
||
5F8C24E000
|
stack
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
7FF657BA6000
|
unkown
|
page readonly
|
||
218E000
|
stack
|
page read and write
|
||
7A70000
|
heap
|
page read and write
|
||
19394F4C000
|
heap
|
page read and write
|
||
4CF8000
|
heap
|
page read and write
|
||
7FF657B5F000
|
unkown
|
page readonly
|
||
E00000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
1390000
|
trusted library allocation
|
page read and write
|
||
2175E060000
|
heap
|
page read and write
|
||
19396E10000
|
heap
|
page read and write
|
||
A0BE5FA000
|
stack
|
page read and write
|
||
4C30000
|
heap
|
page read and write
|
||
2439971B000
|
heap
|
page read and write
|
||
7FF657A5F000
|
unkown
|
page readonly
|
||
19394FC3000
|
heap
|
page read and write
|
||
66BF000
|
heap
|
page read and write
|
||
7FF657B6D000
|
unkown
|
page readonly
|
||
1EBC5DF0000
|
heap
|
page read and write
|
||
7FF657B6D000
|
unkown
|
page readonly
|
||
5F8987E000
|
stack
|
page read and write
|
||
4BDB000
|
heap
|
page read and write
|
||
1EBAD400000
|
heap
|
page read and write
|
||
1B500000
|
trusted library allocation
|
page read and write
|
||
1DC35A7A000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1DC1E597000
|
trusted library allocation
|
page read and write
|
||
1E01EB10000
|
heap
|
page read and write
|
||
7DF4158E0000
|
trusted library allocation
|
page execute and read and write
|
||
12FE000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
217780CC000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
74C0A4E000
|
stack
|
page read and write
|
||
1A114328000
|
trusted library allocation
|
page read and write
|
||
1B57D000
|
stack
|
page read and write
|
||
5F8AB93000
|
stack
|
page read and write
|
||
21761293000
|
trusted library allocation
|
page read and write
|
||
1A11149C000
|
heap
|
page read and write
|
||
1F93000
|
trusted library allocation
|
page read and write
|
||
1164000
|
heap
|
page read and write
|
||
1A1140B2000
|
trusted library allocation
|
page read and write
|
||
5F89A77000
|
stack
|
page read and write
|
||
19396E00000
|
heap
|
page read and write
|
||
7DF41A1D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B93A000
|
trusted library allocation
|
page read and write
|
||
F5E000
|
stack
|
page read and write
|
||
5F8AFF9000
|
stack
|
page read and write
|
||
1A1114BC000
|
heap
|
page read and write
|
||
1EBABCC0000
|
heap
|
page read and write
|
||
2175F9D8000
|
heap
|
page read and write
|
||
23D3BF4E000
|
heap
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
2B53000
|
trusted library allocation
|
page read and write
|
||
7FF699B0B000
|
unkown
|
page readonly
|
||
1DC357F3000
|
heap
|
page read and write
|
||
2C22000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1E01EE20000
|
remote allocation
|
page read and write
|
||
7FF657BAA000
|
unkown
|
page readonly
|
||
1EBAE8AD000
|
trusted library allocation
|
page read and write
|
||
686D000
|
heap
|
page read and write
|
||
2175FB8E000
|
trusted library allocation
|
page read and write
|
||
1E01EEC5000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
19394F30000
|
heap
|
page read and write
|
||
7FFD9B762000
|
trusted library allocation
|
page read and write
|
||
1016000
|
heap
|
page read and write
|
||
6D709FE000
|
stack
|
page read and write
|
||
21760A84000
|
trusted library allocation
|
page read and write
|
||
108C000
|
heap
|
page read and write
|
||
7FFD9B962000
|
trusted library allocation
|
page read and write
|
||
4920000
|
heap
|
page read and write
|
||
7FF657A58000
|
unkown
|
page read and write
|
||
6865000
|
heap
|
page read and write
|
||
2175F910000
|
heap
|
page read and write
|
||
1FD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB9000
|
trusted library allocation
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
1DC35A50000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1A112D70000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
21777FA8000
|
heap
|
page read and write
|
||
7FFD9BB7C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
1939502D000
|
heap
|
page read and write
|
||
1DC359FF000
|
heap
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
7FFD9B974000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FF657BB7000
|
unkown
|
page readonly
|
||
7DF418460000
|
trusted library allocation
|
page execute and read and write
|
||
36EF000
|
stack
|
page read and write
|
||
7FFD9B915000
|
trusted library allocation
|
page read and write
|
||
131EE000
|
trusted library allocation
|
page read and write
|
||
23D3BF46000
|
heap
|
page read and write
|
||
1A1114A8000
|
heap
|
page read and write
|
||
5F8C0C7000
|
stack
|
page read and write
|
||
1A114143000
|
trusted library allocation
|
page read and write
|
||
1A111460000
|
heap
|
page read and write
|
||
1EBAE5A5000
|
trusted library allocation
|
page read and write
|
||
2175DD10000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
1EBBD4E1000
|
trusted library allocation
|
page read and write
|
||
2F1A000
|
stack
|
page read and write
|
||
1EBAE642000
|
trusted library allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
7FF657B66000
|
unkown
|
page readonly
|
||
2175E065000
|
heap
|
page read and write
|
||
131CF000
|
trusted library allocation
|
page read and write
|
||
1EBAE25B000
|
trusted library allocation
|
page read and write
|
||
63F0000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
2175F989000
|
heap
|
page read and write
|
||
A0BD9FE000
|
stack
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
11D9000
|
heap
|
page read and write
|
||
7FF699B11000
|
unkown
|
page read and write
|
||
1020000
|
remote allocation
|
page execute and read and write
|
||
7FF657B56000
|
unkown
|
page readonly
|
||
2A84000
|
heap
|
page read and write
|
||
6530000
|
heap
|
page read and write
|
||
7FF657B7A000
|
unkown
|
page readonly
|
||
163E000
|
stack
|
page read and write
|
||
131D3000
|
trusted library allocation
|
page read and write
|
||
2DF8000
|
stack
|
page read and write
|
||
F74000
|
heap
|
page read and write
|
||
1EBBD511000
|
trusted library allocation
|
page read and write
|
||
1A12338B000
|
trusted library allocation
|
page read and write
|
||
1EBAB9DA000
|
heap
|
page read and write
|
||
1A12B803000
|
heap
|
page read and write
|
||
2175F9AE000
|
heap
|
page read and write
|
||
6B35000
|
heap
|
page read and write
|
||
7FF657B96000
|
unkown
|
page readonly
|
||
6A38000
|
heap
|
page read and write
|
||
1213E000
|
trusted library allocation
|
page read and write
|
||
3AEB000
|
heap
|
page read and write
|
||
131D6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
1E01EE20000
|
remote allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1E01ED5E000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
6600000
|
heap
|
page read and write
|
||
24399800000
|
remote allocation
|
page read and write
|
||
1F90000
|
trusted library allocation
|
page read and write
|
||
1A11438B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
trusted library allocation
|
page read and write
|
||
7FF657B96000
|
unkown
|
page readonly
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
220E000
|
stack
|
page read and write
|
||
74BF977000
|
stack
|
page read and write
|
||
7FFD9B911000
|
trusted library allocation
|
page read and write
|
||
1DC1B770000
|
heap
|
page read and write
|
||
1B650000
|
trusted library allocation
|
page read and write
|
||
12F5000
|
heap
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
21777F50000
|
heap
|
page read and write
|
||
7FF657B6D000
|
unkown
|
page readonly
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
12DD000
|
heap
|
page read and write
|
||
7FF657B6A000
|
unkown
|
page readonly
|
||
132D000
|
heap
|
page read and write
|
||
1A12B8F3000
|
heap
|
page read and write
|
||
1EBAE2C9000
|
trusted library allocation
|
page read and write
|
||
7FF657B56000
|
unkown
|
page readonly
|
||
6930000
|
heap
|
page read and write
|
||
1EBC54E1000
|
heap
|
page read and write
|
||
1FC0000
|
trusted library allocation
|
page read and write
|
||
6D705FE000
|
stack
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
1130000
|
heap
|
page read and write
|
||
7FF657A58000
|
unkown
|
page read and write
|
||
1A1149D3000
|
trusted library allocation
|
page read and write
|
||
2439972D000
|
heap
|
page read and write
|
||
1321D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
7FF699B01000
|
unkown
|
page execute read
|
||
1EBAED4B000
|
trusted library allocation
|
page read and write
|
||
7DF4158D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
21760ED1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
6745000
|
heap
|
page read and write
|
||
1A1114AC000
|
heap
|
page read and write
|
||
1A113AD2000
|
trusted library allocation
|
page read and write
|
||
2439973B000
|
heap
|
page read and write
|
||
7FFD9B916000
|
trusted library allocation
|
page execute and read and write
|
||
1FD3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
1B4F0000
|
trusted library allocation
|
page read and write
|
||
7FF699B11000
|
unkown
|
page read and write
|
||
1A111450000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1DC1B7B3000
|
heap
|
page read and write
|
||
7FF657B89000
|
unkown
|
page readonly
|
||
5C8000
|
heap
|
page read and write
|
||
6F6000
|
heap
|
page read and write
|
||
1304000
|
heap
|
page read and write
|
||
1A1230B1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
1FC0000
|
trusted library allocation
|
page read and write
|
||
7FF657A7F000
|
unkown
|
page readonly
|
||
1095000
|
heap
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
6B71000
|
heap
|
page read and write
|
||
7FF657BB4000
|
unkown
|
page readonly
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
7FF699B14000
|
unkown
|
page readonly
|
||
E23000
|
heap
|
page read and write
|
||
7FF657B27000
|
unkown
|
page readonly
|
||
29C0000
|
trusted library allocation
|
page read and write
|
||
1B47E000
|
stack
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
A0BE1FD000
|
stack
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
1A1148EB000
|
trusted library allocation
|
page read and write
|
||
65AF000
|
heap
|
page read and write
|
||
7FF699B14000
|
unkown
|
page readonly
|
||
6684000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBED000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
8590000
|
heap
|
page read and write
|
||
19394FD3000
|
heap
|
page read and write
|
||
1DC2D4A1000
|
trusted library allocation
|
page read and write
|
||
74BFBFA000
|
stack
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page read and write
|
||
1AD70000
|
trusted library allocation
|
page read and write
|
||
1310000
|
direct allocation
|
page read and write
|
||
1FD0000
|
trusted library allocation
|
page read and write
|
||
5F89D7F000
|
stack
|
page read and write
|
||
7FF657BAA000
|
unkown
|
page readonly
|
||
7FFD9B958000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
7FF657B81000
|
unkown
|
page readonly
|
||
7FFD9BBD6000
|
trusted library allocation
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
7F7B000
|
heap
|
page read and write
|
||
1A12B580000
|
heap
|
page read and write
|
||
19394FE2000
|
heap
|
page read and write
|
||
7FF657B5F000
|
unkown
|
page readonly
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
1FD0000
|
trusted library allocation
|
page read and write
|
||
746D000
|
stack
|
page read and write
|
||
24399719000
|
heap
|
page read and write
|
||
2E34000
|
heap
|
page read and write
|
||
1BB1C000
|
stack
|
page read and write
|
||
6BA7000
|
heap
|
page read and write
|
||
21760A7B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1DC35B6C000
|
heap
|
page read and write
|
||
19396CD0000
|
remote allocation
|
page read and write
|
||
1B5B0000
|
heap
|
page execute and read and write
|
||
6D6FDFE000
|
stack
|
page read and write
|
||
1B8BE000
|
stack
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B931000
|
trusted library allocation
|
page read and write
|
||
7FF657B87000
|
unkown
|
page readonly
|
||
7DF440040000
|
trusted library allocation
|
page execute and read and write
|
||
63EA000
|
heap
|
page read and write
|
||
7FF657B27000
|
unkown
|
page readonly
|
||
2D49000
|
trusted library allocation
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4E5E70000
|
trusted library allocation
|
page execute and read and write
|
||
1EBABA43000
|
heap
|
page read and write
|
||
1A8F0000
|
trusted library allocation
|
page read and write
|
||
5F8959D000
|
stack
|
page read and write
|
||
6C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1DC2D79A000
|
trusted library allocation
|
page read and write
|
||
7FF699B0A000
|
unkown
|
page read and write
|
||
2175DDF6000
|
heap
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
2A03000
|
trusted library allocation
|
page read and write
|
||
62E0000
|
heap
|
page read and write
|
||
BB8000
|
stack
|
page read and write
|
||
1A112DB0000
|
trusted library allocation
|
page read and write
|
||
6730000
|
heap
|
page read and write
|
||
1F90000
|
trusted library allocation
|
page read and write
|
||
69E000
|
stack
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
5F89BF6000
|
stack
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FF657B96000
|
unkown
|
page readonly
|
||
2DB000
|
stack
|
page read and write
|
||
7FF657BA6000
|
unkown
|
page readonly
|
||
21760895000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
66F5000
|
heap
|
page read and write
|
||
19394FE1000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1095000
|
heap
|
page read and write
|
||
7FF657B6A000
|
unkown
|
page readonly
|
||
23D3BF46000
|
heap
|
page read and write
|
||
1EBAE82A000
|
trusted library allocation
|
page read and write
|
||
1A114EA4000
|
trusted library allocation
|
page read and write
|
||
5EC000
|
heap
|
page read and write
|
||
1EBAE6C2000
|
trusted library allocation
|
page read and write
|
||
1DC1D2A0000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page execute and read and write
|
||
107B000
|
stack
|
page read and write
|
||
5F8AAC9000
|
stack
|
page read and write
|
||
1A12B842000
|
heap
|
page read and write
|
||
24399741000
|
heap
|
page read and write
|
||
7FF699B0E000
|
unkown
|
page readonly
|
||
2110000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
1043000
|
heap
|
page read and write
|
||
74C094B000
|
stack
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
716D000
|
stack
|
page read and write
|
||
7FF657B66000
|
unkown
|
page readonly
|
||
7FF657A7F000
|
unkown
|
page readonly
|
||
1DC1E41D000
|
trusted library allocation
|
page read and write
|
||
7FF6576E1000
|
unkown
|
page execute read
|
||
1A12B7A0000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1DC35851000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF699B0B000
|
unkown
|
page readonly
|
||
680A000
|
heap
|
page read and write
|
||
21760A8C000
|
trusted library allocation
|
page read and write
|
||
7FF6D4330000
|
unkown
|
page readonly
|
||
11AC000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
2177805A000
|
heap
|
page read and write
|
||
5F8B1F9000
|
stack
|
page read and write
|
||
13215000
|
trusted library allocation
|
page read and write
|
||
1A12B8E2000
|
heap
|
page read and write
|
||
7FF657B89000
|
unkown
|
page readonly
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF657B6A000
|
unkown
|
page readonly
|
||
53A9FFE000
|
stack
|
page read and write
|
||
A0BE9FE000
|
stack
|
page read and write
|
||
74C08CA000
|
stack
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
2D0D000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
7FF657B81000
|
unkown
|
page readonly
|
||
1205000
|
heap
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
2175F6B0000
|
trusted library allocation
|
page read and write
|
||
6D6F9F7000
|
stack
|
page read and write
|
||
4C47000
|
heap
|
page read and write
|
||
1EBC5BB2000
|
heap
|
page read and write
|
||
23D3BF5C000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
19395026000
|
heap
|
page read and write
|
||
7FF6576E1000
|
unkown
|
page execute read
|
||
B43000
|
heap
|
page read and write
|
||
100D000
|
heap
|
page read and write
|
||
7FF699B0B000
|
unkown
|
page readonly
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
11E1000
|
heap
|
page read and write
|
||
A0BD7FF000
|
stack
|
page read and write
|
||
116C000
|
heap
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
24399800000
|
remote allocation
|
page read and write
|
||
1A113070000
|
heap
|
page execute and read and write
|
||
2E0A000
|
stack
|
page read and write
|
||
1EBBD80B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page execute and read and write
|
||
21761931000
|
trusted library allocation
|
page read and write
|
||
2439973E000
|
heap
|
page read and write
|
||
1EBAD340000
|
heap
|
page execute and read and write
|
||
1E01ED2C000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
2175F995000
|
heap
|
page read and write
|
||
1A113106000
|
trusted library allocation
|
page read and write
|
||
7FF657A58000
|
unkown
|
page write copy
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
13A5000
|
heap
|
page read and write
|
||
1A12B8AC000
|
heap
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
2176139F000
|
trusted library allocation
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
2177808B000
|
heap
|
page read and write
|
||
7FF657B6D000
|
unkown
|
page readonly
|
||
7FF657B81000
|
unkown
|
page readonly
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
1EBAD320000
|
heap
|
page readonly
|
||
9BF000
|
stack
|
page read and write
|
||
74BFA79000
|
stack
|
page read and write
|
||
1EBAE513000
|
trusted library allocation
|
page read and write
|
||
74BFAF7000
|
stack
|
page read and write
|
||
13208000
|
trusted library allocation
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
7FB1000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
6F1000
|
heap
|
page read and write
|
||
1DC35AC2000
|
heap
|
page read and write
|
||
5F895DE000
|
stack
|
page read and write
|
||
21778096000
|
heap
|
page read and write
|
||
6690000
|
heap
|
page read and write
|
||
24399737000
|
heap
|
page read and write
|
||
1F5E000
|
stack
|
page read and write
|
||
B43000
|
heap
|
page read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7DF4F3650000
|
trusted library allocation
|
page execute and read and write
|
||
6E5D000
|
stack
|
page read and write
|
||
1B630000
|
trusted library allocation
|
page read and write
|
||
BD3000
|
stack
|
page read and write
|
||
719C000
|
heap
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
2D20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
B59000
|
heap
|
page read and write
|
||
61D0000
|
heap
|
page read and write
|
||
67C9000
|
heap
|
page read and write
|
||
23D3BE70000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
1DC1E605000
|
trusted library allocation
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
6C6D000
|
stack
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
1B4F0000
|
trusted library allocation
|
page read and write
|
||
1DC35B75000
|
heap
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
1140000
|
trusted library section
|
page read and write
|
||
1B4F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
7FFD9B928000
|
trusted library allocation
|
page execute and read and write
|
||
243996A7000
|
heap
|
page read and write
|
||
7FFD9B754000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
131FF000
|
trusted library allocation
|
page read and write
|
||
21760DB4000
|
trusted library allocation
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
1B7B6000
|
heap
|
page read and write
|
||
6A0F000
|
heap
|
page read and write
|
||
11F6000
|
heap
|
page read and write
|
||
7FF657B89000
|
unkown
|
page readonly
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1A910000
|
trusted library allocation
|
page read and write
|
||
1EBAE4E8000
|
trusted library allocation
|
page read and write
|
||
1DC1F2A9000
|
trusted library allocation
|
page read and write
|
||
1EBADF32000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
132E000
|
heap
|
page read and write
|
||
7FFD9BAF2000
|
trusted library allocation
|
page read and write
|
||
1DC35A4C000
|
heap
|
page read and write
|
||
7FF657B89000
|
unkown
|
page readonly
|
||
7FF657B89000
|
unkown
|
page readonly
|
||
1DC1E7AE000
|
trusted library allocation
|
page read and write
|
||
7DF4AE820000
|
trusted library allocation
|
page execute and read and write
|
||
1EBBD54F000
|
trusted library allocation
|
page read and write
|
||
1A1114A4000
|
heap
|
page read and write
|
||
1F93000
|
trusted library allocation
|
page read and write
|
||
1328000
|
heap
|
page read and write
|
||
1174000
|
heap
|
page read and write
|
||
7FF6576E1000
|
unkown
|
page execute read
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
1EBAE607000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
1EBBD7C8000
|
trusted library allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
3B5E000
|
stack
|
page read and write
|
||
74BF9FE000
|
stack
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
29F7000
|
trusted library allocation
|
page read and write
|
||
1DC1B680000
|
heap
|
page read and write
|
||
7FFD9B924000
|
trusted library allocation
|
page read and write
|
||
19394F10000
|
heap
|
page read and write
|
||
2B33000
|
trusted library allocation
|
page read and write
|
||
6D79000
|
stack
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
1279000
|
heap
|
page read and write
|
||
6229000
|
heap
|
page read and write
|
||
101E000
|
heap
|
page read and write
|
||
1FD0000
|
trusted library allocation
|
page read and write
|
||
1A12B7C0000
|
heap
|
page read and write
|
||
7FF699B00000
|
unkown
|
page readonly
|
||
1FB5000
|
heap
|
page read and write
|
||
1DC1B890000
|
heap
|
page read and write
|
||
1EBAE825000
|
trusted library allocation
|
page read and write
|
||
7FF699B01000
|
unkown
|
page execute read
|
||
1DC1B7CD000
|
heap
|
page read and write
|
||
1DC1B940000
|
trusted library allocation
|
page read and write
|
||
1E01EBF0000
|
heap
|
page read and write
|
||
1A114912000
|
trusted library allocation
|
page read and write
|
||
243995D0000
|
heap
|
page read and write
|
||
7FFD9B903000
|
trusted library allocation
|
page read and write
|
||
1B640000
|
trusted library allocation
|
page read and write
|
||
1EBC5CE4000
|
heap
|
page read and write
|
||
29CE000
|
stack
|
page read and write
|
||
5F8AF7E000
|
stack
|
page read and write
|
||
1EBAD9AD000
|
trusted library allocation
|
page read and write
|
||
7FF657B85000
|
unkown
|
page readonly
|
||
7FFD9B972000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page execute and read and write
|
||
4D93000
|
heap
|
page read and write
|
||
5F898FF000
|
stack
|
page read and write
|
||
F069BCE000
|
stack
|
page read and write
|
||
2B40000
|
trusted library allocation
|
page read and write
|
||
1320F000
|
trusted library allocation
|
page read and write
|
||
7FF657B96000
|
unkown
|
page readonly
|
||
1DC35DA0000
|
heap
|
page read and write
|
||
2439971B000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
7FF699B00000
|
unkown
|
page readonly
|
||
23D3BE7C000
|
heap
|
page read and write
|
||
74BF77E000
|
stack
|
page read and write
|
||
1EBAB8D0000
|
heap
|
page read and write
|
||
21760712000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
1DC1B9B5000
|
heap
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
FE7000
|
heap
|
page read and write
|
||
7DF4F3640000
|
trusted library allocation
|
page execute and read and write
|
||
2175DCD0000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
4CE4000
|
heap
|
page read and write
|
||
7FF657B87000
|
unkown
|
page readonly
|
||
1A1114E7000
|
heap
|
page read and write
|
||
7FF657BB7000
|
unkown
|
page readonly
|
||
5F8B17D000
|
stack
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
7FF657B81000
|
unkown
|
page readonly
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
23D3BF2E000
|
heap
|
page read and write
|
||
23D3BE00000
|
heap
|
page read and write
|
||
23D3BE25000
|
heap
|
page read and write
|
||
1A900000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
1EBAEE32000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
1E01ECE5000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1360000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
1A1114A6000
|
heap
|
page read and write
|
||
1DC35A14000
|
heap
|
page read and write
|
||
7FFD9B915000
|
trusted library allocation
|
page read and write
|
||
79AA000
|
stack
|
page read and write
|
||
1E01ED2E000
|
heap
|
page read and write
|
||
3AF5000
|
heap
|
page read and write
|
||
1EBAF2BF000
|
trusted library allocation
|
page read and write
|
||
5F89C79000
|
stack
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
11F3000
|
heap
|
page read and write
|
||
7589000
|
stack
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
1B560000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
1DC1EC2A000
|
trusted library allocation
|
page read and write
|
||
1EBC5CF8000
|
heap
|
page read and write
|
||
1EBAD330000
|
trusted library allocation
|
page read and write
|
||
1DC1E40C000
|
trusted library allocation
|
page read and write
|
||
1DC1B900000
|
trusted library allocation
|
page read and write
|
||
19394FDF000
|
heap
|
page read and write
|
||
23D3BF4C000
|
heap
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
7FF657BB7000
|
unkown
|
page readonly
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
7FF657BA6000
|
unkown
|
page readonly
|
||
C3000
|
stack
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
7FFD9BAE2000
|
trusted library allocation
|
page read and write
|
||
1B5C0000
|
heap
|
page execute and read and write
|
||
7FF6576E1000
|
unkown
|
page execute read
|
||
12DD000
|
heap
|
page read and write
|
||
1B500000
|
trusted library allocation
|
page read and write
|
||
1E0209B0000
|
heap
|
page read and write
|
||
2D43000
|
trusted library allocation
|
page read and write
|
||
F068B79000
|
stack
|
page read and write
|
||
2175FA60000
|
heap
|
page execute and read and write
|
||
7FF699B01000
|
unkown
|
page execute read
|
||
1E01ED47000
|
heap
|
page read and write
|
||
7FF657B87000
|
unkown
|
page readonly
|
||
1A1113D0000
|
heap
|
page read and write
|
||
1092000
|
heap
|
page read and write
|
||
A0BD5FE000
|
stack
|
page read and write
|
||
7FF657B6D000
|
unkown
|
page readonly
|
||
1DC1F2C9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
74C09CD000
|
stack
|
page read and write
|
||
19394F40000
|
heap
|
page read and write
|
||
1DC1B7B5000
|
heap
|
page read and write
|
||
29C0000
|
trusted library allocation
|
page read and write
|
||
1A1141E0000
|
trusted library allocation
|
page read and write
|
||
36453FE000
|
stack
|
page read and write
|
||
2B40000
|
trusted library allocation
|
page read and write
|
||
131E000
|
stack
|
page read and write
|
||
7000000
|
heap
|
page read and write
|
||
23D3BF54000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
1B4A0000
|
trusted library allocation
|
page read and write
|
||
278F000
|
stack
|
page read and write
|
||
2176088C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
7FFD9B944000
|
trusted library allocation
|
page read and write
|
||
6B4D000
|
stack
|
page read and write
|
||
7FF657B5F000
|
unkown
|
page readonly
|
||
F58000
|
heap
|
page read and write
|
||
5F8B276000
|
stack
|
page read and write
|
||
1BC17000
|
stack
|
page read and write
|
||
130000
|
heap
|
page read and write
|
||
2B53000
|
trusted library allocation
|
page read and write
|
||
6D70BFE000
|
stack
|
page read and write
|
||
7FFD9BAFC000
|
trusted library allocation
|
page read and write
|
||
24399895000
|
heap
|
page read and write
|
||
1A1113B0000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
1DC2D754000
|
trusted library allocation
|
page read and write
|
||
2B40000
|
trusted library allocation
|
page read and write
|
||
4D2C000
|
heap
|
page read and write
|
||
7FF657B5F000
|
unkown
|
page readonly
|
||
1939502D000
|
heap
|
page read and write
|
||
2439B380000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
74BFD7E000
|
stack
|
page read and write
|
||
F069B4D000
|
stack
|
page read and write
|
||
965000
|
heap
|
page read and write
|
||
7FF657B96000
|
unkown
|
page readonly
|
||
7FFD9B91D000
|
trusted library allocation
|
page execute and read and write
|
||
5F8C1CC000
|
stack
|
page read and write
|
||
7FF657BAA000
|
unkown
|
page readonly
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
19394FDA000
|
heap
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
2D43000
|
trusted library allocation
|
page read and write
|
||
24399890000
|
heap
|
page read and write
|
||
7FF6576E1000
|
unkown
|
page execute read
|
||
2151000
|
trusted library allocation
|
page read and write
|
||
752B000
|
stack
|
page read and write
|
||
5F8B07E000
|
stack
|
page read and write
|
||
7FF657BB4000
|
unkown
|
page readonly
|
||
7FF657B7A000
|
unkown
|
page readonly
|
||
23D3BE30000
|
heap
|
page read and write
|
||
6BC7000
|
heap
|
page read and write
|
||
4CAD000
|
heap
|
page read and write
|
||
23D3BF38000
|
heap
|
page read and write
|
||
2175F760000
|
heap
|
page read and write
|
||
766A000
|
stack
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B978000
|
trusted library allocation
|
page read and write
|
||
131EA000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
1A12B8A6000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
1939502D000
|
heap
|
page read and write
|
||
2DF3000
|
trusted library allocation
|
page read and write
|
||
713D000
|
heap
|
page read and write
|
||
7FF699B11000
|
unkown
|
page read and write
|
||
1A114086000
|
trusted library allocation
|
page read and write
|
||
243995F0000
|
heap
|
page read and write
|
||
2176FDFA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FF657B6A000
|
unkown
|
page readonly
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FF657B27000
|
unkown
|
page readonly
|
||
53AA3FB000
|
stack
|
page read and write
|
||
7FF657B9F000
|
unkown
|
page readonly
|
||
74BFB7B000
|
stack
|
page read and write
|
||
1B10D000
|
stack
|
page read and write
|
||
6CC8000
|
stack
|
page read and write
|
||
1204000
|
heap
|
page read and write
|
||
1B500000
|
trusted library allocation
|
page read and write
|
||
21760C32000
|
trusted library allocation
|
page read and write
|
||
1E01EE20000
|
remote allocation
|
page read and write
|
||
2E48000
|
stack
|
page read and write
|
||
1E0209D9000
|
heap
|
page execute and read and write
|
||
2E31000
|
trusted library allocation
|
page read and write
|
||
2175FA17000
|
heap
|
page execute and read and write
|
||
1A12B8A4000
|
heap
|
page read and write
|
||
23D3DC00000
|
remote allocation
|
page read and write
|
||
69EB000
|
stack
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
direct allocation
|
page read and write
|
||
104D000
|
heap
|
page read and write
|
||
1A112D20000
|
trusted library allocation
|
page read and write
|
||
2175FAF0000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
2175FA80000
|
trusted library allocation
|
page read and write
|
||
2175FB11000
|
trusted library allocation
|
page read and write
|
||
1EBAB930000
|
heap
|
page read and write
|
||
12D49000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
115E000
|
heap
|
page read and write
|
||
11F6000
|
heap
|
page read and write
|
||
1DC1E4D4000
|
trusted library allocation
|
page read and write
|
||
7FF657A58000
|
unkown
|
page write copy
|
||
15D5000
|
heap
|
page read and write
|
||
7FF657A7E000
|
unkown
|
page write copy
|
||
7FF657BB4000
|
unkown
|
page readonly
|
||
D55000
|
heap
|
page read and write
|
||
66F4000
|
heap
|
page read and write
|
||
1E01EEC0000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
705000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
2176FDFF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
1DC1B7BB000
|
heap
|
page read and write
|
||
7FF6576E1000
|
unkown
|
page execute read
|
||
F068FFF000
|
stack
|
page read and write
|
||
5F8ABDE000
|
stack
|
page read and write
|
||
4991000
|
heap
|
page read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
1DC1D160000
|
trusted library allocation
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
2175F765000
|
heap
|
page read and write
|
||
1B510000
|
trusted library allocation
|
page read and write
|
||
1A12B83C000
|
heap
|
page read and write
|
||
79F0000
|
heap
|
page read and write
|
||
7FAB000
|
heap
|
page read and write
|
||
2B33000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
1EBC5989000
|
heap
|
page read and write
|
||
F069C4E000
|
stack
|
page read and write
|
||
1DC2D7AA000
|
trusted library allocation
|
page read and write
|
||
1DC35AA0000
|
heap
|
page read and write
|
||
7DF4158C0000
|
trusted library allocation
|
page execute and read and write
|
||
2175F97C000
|
heap
|
page read and write
|
||
1A1230A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B752000
|
trusted library allocation
|
page read and write
|
||
5F8B2FA000
|
stack
|
page read and write
|
||
24399741000
|
heap
|
page read and write
|
||
7DF41A1C0000
|
trusted library allocation
|
page execute and read and write
|
||
2D33000
|
trusted library allocation
|
page read and write
|
||
132E000
|
stack
|
page read and write
|
||
7FF657B56000
|
unkown
|
page readonly
|
||
DF9000
|
heap
|
page read and write
|
||
12E1E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
7DF4E5E60000
|
trusted library allocation
|
page execute and read and write
|
||
12FF000
|
heap
|
page read and write
|
||
7FFD9B90D000
|
trusted library allocation
|
page execute and read and write
|
||
123D000
|
heap
|
page read and write
|
||
1B540000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
7FF657B6D000
|
unkown
|
page readonly
|
||
5F8AE7F000
|
stack
|
page read and write
|
||
7DF4AE810000
|
trusted library allocation
|
page execute and read and write
|
||
F068A7E000
|
stack
|
page read and write
|
||
1EBC5BF8000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
500000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
7FF657B87000
|
unkown
|
page readonly
|
||
1A12B790000
|
heap
|
page read and write
|
||
1EBAB8C0000
|
heap
|
page read and write
|
||
1DC1B7AD000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FF6579A6000
|
unkown
|
page readonly
|
||
7A13000
|
heap
|
page read and write
|
||
1331000
|
heap
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
1DC2D4D1000
|
trusted library allocation
|
page read and write
|
||
7FF657B7A000
|
unkown
|
page readonly
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
131F2000
|
trusted library allocation
|
page read and write
|
||
1A1116F0000
|
heap
|
page read and write
|
||
1DC1E86B000
|
trusted library allocation
|
page read and write
|
||
5F89DFE000
|
stack
|
page read and write
|
||
23D3BF62000
|
heap
|
page read and write
|
||
6D6FFFF000
|
stack
|
page read and write
|
||
217780B4000
|
heap
|
page read and write
|
||
24399650000
|
heap
|
page read and write
|
||
6D8000
|
heap
|
page read and write
|
||
7FF6576E1000
|
unkown
|
page execute read
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
FD8000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
19394FE2000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
1DC35A8C000
|
heap
|
page read and write
|
||
19394EE0000
|
heap
|
page read and write
|
||
2175DDF4000
|
heap
|
page read and write
|
||
1EBAD709000
|
trusted library allocation
|
page read and write
|
||
1EBAE6FB000
|
trusted library allocation
|
page read and write
|
||
7FF657BB7000
|
unkown
|
page readonly
|
||
7FF657B96000
|
unkown
|
page readonly
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
5F8AB4D000
|
stack
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF699B0B000
|
unkown
|
page readonly
|
||
7FF657A7F000
|
unkown
|
page readonly
|
||
24399658000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FF657A58000
|
unkown
|
page write copy
|
||
7FFD9B944000
|
trusted library allocation
|
page read and write
|
||
7FF657B56000
|
unkown
|
page readonly
|
||
21760563000
|
trusted library allocation
|
page read and write
|
||
1EBC597F000
|
heap
|
page read and write
|
||
62F0000
|
heap
|
page read and write
|
||
7FF657B6A000
|
unkown
|
page readonly
|
||
7FFD9B968000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
1278000
|
heap
|
page read and write
|
||
2175F900000
|
heap
|
page read and write
|
||
1DC1B7B1000
|
heap
|
page read and write
|
||
7FFD9B753000
|
trusted library allocation
|
page execute and read and write
|
||
2A30000
|
trusted library allocation
|
page read and write
|
||
53AA7FD000
|
stack
|
page read and write
|
||
265E000
|
stack
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
1B500000
|
trusted library allocation
|
page read and write
|
||
4D16000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
7FF657BA6000
|
unkown
|
page readonly
|
||
1A12B8CC000
|
heap
|
page read and write
|
||
7FF699B14000
|
unkown
|
page readonly
|
||
7FF6D4330000
|
unkown
|
page readonly
|
||
930000
|
heap
|
page read and write
|
||
7FF657A7E000
|
unkown
|
page write copy
|
||
133A000
|
heap
|
page read and write
|
||
7F7E000
|
heap
|
page read and write
|
||
7FF657BB7000
|
unkown
|
page readonly
|
||
1DC35B7A000
|
heap
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
1068000
|
heap
|
page read and write
|
||
F48000
|
stack
|
page read and write
|
||
74C084C000
|
stack
|
page read and write
|
||
7FF657B6D000
|
unkown
|
page readonly
|
||
6B39000
|
heap
|
page read and write
|
||
7FF657B27000
|
unkown
|
page readonly
|
||
19394EF0000
|
heap
|
page read and write
|
||
1A1132AA000
|
trusted library allocation
|
page read and write
|
||
2175DBD0000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
E29000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
F0687AD000
|
stack
|
page read and write
|
||
19396CD0000
|
remote allocation
|
page read and write
|
||
74BFCFE000
|
stack
|
page read and write
|
||
768D000
|
stack
|
page read and write
|
||
1DC1F284000
|
trusted library allocation
|
page read and write
|
||
2B70000
|
heap
|
page read and write
|
||
7DF4AE800000
|
trusted library allocation
|
page execute and read and write
|
||
23D3DC00000
|
remote allocation
|
page read and write
|
||
67F0000
|
heap
|
page read and write
|
||
F9F000
|
heap
|
page read and write
|
||
1EBAB9D5000
|
heap
|
page read and write
|
||
1DC1B870000
|
heap
|
page read and write
|
||
1FF0000
|
heap
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
1DC1ED0F000
|
trusted library allocation
|
page read and write
|
||
7FF657B81000
|
unkown
|
page readonly
|
||
2175FB00000
|
heap
|
page execute and read and write
|
||
39D0000
|
heap
|
page read and write
|
||
7FF657B56000
|
unkown
|
page readonly
|
||
F069ACE000
|
stack
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
2175DDEE000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
6AF4000
|
heap
|
page read and write
|
||
F9B000
|
heap
|
page read and write
|
||
6F6000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
21761378000
|
trusted library allocation
|
page read and write
|
||
6B7E000
|
heap
|
page read and write
|
||
FD4000
|
heap
|
page read and write
|
||
7FF657B85000
|
unkown
|
page readonly
|
||
5F8B0F9000
|
stack
|
page read and write
|
||
1DC35A40000
|
heap
|
page read and write
|
||
1DC35B70000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7A79000
|
heap
|
page read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
12D71000
|
trusted library allocation
|
page read and write
|
||
29E0000
|
trusted library allocation
|
page read and write
|
||
21760A77000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD8000
|
trusted library allocation
|
page read and write
|
||
1EBAE0E5000
|
trusted library allocation
|
page read and write
|
||
66EF000
|
heap
|
page read and write
|
||
1F83000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
10F5000
|
heap
|
page read and write
|
||
53AA5FE000
|
stack
|
page read and write
|
||
5E1000
|
heap
|
page read and write
|
||
1DC1D2A5000
|
heap
|
page read and write
|
||
7FF6579A6000
|
unkown
|
page readonly
|
||
1DC2D790000
|
trusted library allocation
|
page read and write
|
||
11FC000
|
heap
|
page read and write
|
||
1EBC5CD0000
|
heap
|
page read and write
|
||
2B23000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
53A9DFE000
|
stack
|
page read and write
|
||
1DC3586B000
|
heap
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
1B4F0000
|
trusted library allocation
|
page read and write
|
||
70DE000
|
heap
|
page read and write
|
||
1EBAE579000
|
trusted library allocation
|
page read and write
|
||
217606EE000
|
trusted library allocation
|
page read and write
|
||
21777E70000
|
heap
|
page read and write
|
||
E35000
|
heap
|
page read and write
|
||
6C3000
|
heap
|
page read and write
|
||
2B20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
4C5B000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
6BAC000
|
heap
|
page read and write
|
||
1EBBD7D7000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page execute and read and write
|
||
7FF657B81000
|
unkown
|
page readonly
|
||
1A1230F3000
|
trusted library allocation
|
page read and write
|
||
6C30000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
2F04000
|
stack
|
page read and write
|
||
7DF418450000
|
trusted library allocation
|
page execute and read and write
|
||
1B4F9000
|
trusted library allocation
|
page read and write
|
||
1A112E75000
|
heap
|
page read and write
|
||
756B000
|
heap
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
1EBAD380000
|
trusted library allocation
|
page read and write
|
||
1EBAB9AE000
|
heap
|
page read and write
|
||
1EBC5A87000
|
heap
|
page execute and read and write
|
||
1F99000
|
trusted library allocation
|
page read and write
|
||
2AF0000
|
trusted library allocation
|
page read and write
|
||
1A113DF5000
|
trusted library allocation
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
7FF657A7E000
|
unkown
|
page write copy
|
||
7F94000
|
heap
|
page read and write
|
||
653E000
|
heap
|
page read and write
|
||
5F899FE000
|
stack
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
7FF699B0E000
|
unkown
|
page readonly
|
||
1DC1E415000
|
trusted library allocation
|
page read and write
|
||
2B20000
|
heap
|
page readonly
|
||
7FF657A5F000
|
unkown
|
page readonly
|
||
1B580000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
heap
|
page readonly
|
||
7FF657A5F000
|
unkown
|
page readonly
|
||
1A12B48D000
|
heap
|
page read and write
|
||
29D0000
|
trusted library allocation
|
page read and write
|
||
D6F000
|
stack
|
page read and write
|
||
7FF657BA6000
|
unkown
|
page readonly
|
||
1302000
|
heap
|
page read and write
|
||
6B50000
|
heap
|
page read and write
|
||
7A6E000
|
heap
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
2D40000
|
trusted library allocation
|
page read and write
|
||
19394F35000
|
heap
|
page read and write
|
||
7FF657B6D000
|
unkown
|
page readonly
|
||
12C01000
|
trusted library allocation
|
page read and write
|
||
7FF657BB4000
|
unkown
|
page readonly
|
||
23D3BF66000
|
heap
|
page read and write
|
||
5F8BFCE000
|
stack
|
page read and write
|
||
5F8B5FB000
|
stack
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
67A3000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
1A123371000
|
trusted library allocation
|
page read and write
|
||
1E01EC90000
|
heap
|
page read and write
|
||
7A05000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FF657B56000
|
unkown
|
page readonly
|
||
7FF6D433E000
|
unkown
|
page readonly
|
||
790E000
|
stack
|
page read and write
|
||
1DC1D5E7000
|
trusted library allocation
|
page read and write
|
||
19394FDA000
|
heap
|
page read and write
|
||
280F000
|
stack
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
F068F7E000
|
stack
|
page read and write
|
||
21778076000
|
heap
|
page read and write
|
||
4BF8000
|
heap
|
page read and write
|
||
7FF657B27000
|
unkown
|
page readonly
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FF657B5F000
|
unkown
|
page readonly
|
||
1A112E8A000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1EBAB992000
|
heap
|
page read and write
|
||
7B90000
|
heap
|
page read and write
|
||
1B510000
|
trusted library allocation
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
65A5000
|
heap
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
11AF000
|
stack
|
page read and write
|
||
5F89AFD000
|
stack
|
page read and write
|
||
53A9BFF000
|
stack
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
1DC1B8C0000
|
heap
|
page read and write
|
||
1A113081000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
7FF657B9F000
|
unkown
|
page readonly
|
||
B65000
|
heap
|
page read and write
|
||
7FF699B0E000
|
unkown
|
page readonly
|
||
23D3BF12000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
23D3BF5C000
|
heap
|
page read and write
|
||
14BE000
|
stack
|
page read and write
|
||
F068E7A000
|
stack
|
page read and write
|
||
2B30000
|
trusted library allocation
|
page read and write
|
||
1DC358AC000
|
heap
|
page read and write
|
||
7C2E000
|
stack
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
1EBAEDD4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
1939502D000
|
heap
|
page read and write
|
||
4D88000
|
heap
|
page read and write
|
||
7FF657B89000
|
unkown
|
page readonly
|
||
7FF699B0E000
|
unkown
|
page readonly
|
||
E13000
|
heap
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
2175DE39000
|
heap
|
page read and write
|
||
5F8C14C000
|
stack
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
6AE8000
|
stack
|
page read and write
|
||
6D6FBFE000
|
stack
|
page read and write
|
||
21760CE8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAB3000
|
trusted library allocation
|
page read and write
|
||
5080000
|
heap
|
page read and write
|
||
5F89B79000
|
stack
|
page read and write
|
||
1A12336C000
|
trusted library allocation
|
page read and write
|
||
11C8000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
2175DDB8000
|
heap
|
page read and write
|
||
7FFD9B91D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
F72000
|
heap
|
page read and write
|
||
2A50000
|
trusted library allocation
|
page read and write
|
||
7FF657BB4000
|
unkown
|
page readonly
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
7FF657B87000
|
unkown
|
page readonly
|
||
A0BDDFE000
|
stack
|
page read and write
|
||
1F80000
|
trusted library allocation
|
page read and write
|
||
13213000
|
trusted library allocation
|
page read and write
|
||
7530000
|
heap
|
page read and write
|
||
7FF699B01000
|
unkown
|
page execute read
|
||
23D3BEC7000
|
heap
|
page read and write
|
||
21760D21000
|
trusted library allocation
|
page read and write
|
||
2A44000
|
heap
|
page read and write
|
||
1A12B8F8000
|
heap
|
page read and write
|
||
1B5F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
1EBAD4D5000
|
heap
|
page read and write
|
||
2D41000
|
trusted library allocation
|
page read and write
|
||
7FFD9B928000
|
trusted library allocation
|
page execute and read and write
|
||
7158000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
1130000
|
trusted library section
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
13220000
|
trusted library allocation
|
page read and write
|
||
320000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FF657B9F000
|
unkown
|
page readonly
|
||
4BB0000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
299F000
|
stack
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
5F8A94D000
|
stack
|
page read and write
|
||
1096000
|
stack
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
2F44000
|
stack
|
page read and write
|
||
A0BDBFE000
|
stack
|
page read and write
|
||
74BF6FE000
|
stack
|
page read and write
|
||
1DC35B31000
|
heap
|
page read and write
|
||
7FF657B96000
|
unkown
|
page readonly
|
||
1B500000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF8000
|
trusted library allocation
|
page read and write
|
||
5F8B4FC000
|
stack
|
page read and write
|
||
1EBAB950000
|
heap
|
page read and write
|
||
131F0000
|
trusted library allocation
|
page read and write
|
||
1FD3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
A0BE3FE000
|
stack
|
page read and write
|
||
1B4F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
7FF657B5F000
|
unkown
|
page readonly
|
||
1EBC59E2000
|
heap
|
page read and write
|
||
7FF657B89000
|
unkown
|
page readonly
|
||
2DF3000
|
trusted library allocation
|
page read and write
|
||
1A11401B000
|
trusted library allocation
|
page read and write
|
||
7FF699B11000
|
unkown
|
page write copy
|
||
7FF657BB7000
|
unkown
|
page readonly
|
||
7FF657B27000
|
unkown
|
page readonly
|
||
7FFD9BB53000
|
trusted library allocation
|
page read and write
|
||
1B590000
|
trusted library allocation
|
page read and write
|
||
7FF657A7E000
|
unkown
|
page write copy
|
||
24399749000
|
heap
|
page read and write
|
||
7FF657B85000
|
unkown
|
page readonly
|
||
7FFD9BAB4000
|
trusted library allocation
|
page read and write
|
||
1A112D30000
|
heap
|
page readonly
|
||
2E88000
|
stack
|
page read and write
|
||
1DC1B9B0000
|
heap
|
page read and write
|
||
12C09000
|
trusted library allocation
|
page read and write
|
||
1DC1E0A5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FF657B5F000
|
unkown
|
page readonly
|
||
36449FE000
|
stack
|
page read and write
|
||
7FF657B87000
|
unkown
|
page readonly
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBDD000
|
trusted library allocation
|
page read and write
|
||
2A95000
|
heap
|
page read and write
|
||
1EBAF309000
|
trusted library allocation
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
1B480000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
1DC1B930000
|
heap
|
page readonly
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1DC1D4A1000
|
trusted library allocation
|
page read and write
|
There are 1963 hidden memdumps, click here to show them.