Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
LFfjUMuUFU.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\tmpB10A.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\1235.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\456.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\AAkXVY.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\1235.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\456.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AAkXVY.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\LFfjUMuUFU.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2by1qqhr.v2o.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2dpgkpne.mwu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aj0yfvw2.fxv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cpsiy2y2.cwq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ffh2uun2.mab.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gugt5cve.car.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hzfhgg3y.0od.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ii3qv5fm.mzo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jupybj1y.ffc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lfahsoru.goy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nuosarsu.pwf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oenvilbs.svw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q30yhu3j.y4r.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qaclka2h.azz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_raxl4rxb.cvp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s3qk5ezd.ejw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sycmqwvg.i2z.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tttu44pf.e0f.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uapxnnyf.zue.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_va0kevy1.y0a.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vnfbifjy.qzl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vqoumm42.idf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vwypdu52.oc3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zf1fewl2.ll4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpE9DD.tmp
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\AAkXVY.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 27 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\LFfjUMuUFU.exe
|
"C:\Users\user\Desktop\LFfjUMuUFU.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\LFfjUMuUFU.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AAkXVY.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AAkXVY" /XML "C:\Users\user\AppData\Local\Temp\tmpB10A.tmp"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
|
||
C:\Users\user\AppData\Roaming\AAkXVY.exe
|
C:\Users\user\AppData\Roaming\AAkXVY.exe
|
||
C:\Users\user\AppData\Roaming\456.exe
|
"C:\Users\user\AppData\Roaming\456.exe"
|
||
C:\Users\user\AppData\Roaming\1235.exe
|
"C:\Users\user\AppData\Roaming\1235.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\1235.exe'
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AAkXVY" /XML "C:\Users\user\AppData\Local\Temp\tmpE9DD.tmp"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
|
||
C:\Users\user\AppData\Roaming\456.exe
|
"C:\Users\user\AppData\Roaming\456.exe"
|
||
C:\Users\user\AppData\Roaming\1235.exe
|
"C:\Users\user\AppData\Roaming\1235.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '1235.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 14 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
beshomandotestbesnd.run.place
|
|||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
45.61.150.201
|
|||
127.0.0.1
|
|||
http://tempuri.org/DataSetGen.xsd
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://www.micrm/pki/certs/MicR_2010-06-23.crt0
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 12 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
beshomandotestbesnd.run.place
|
45.88.186.125
|
||
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
api.telegram.org
|
149.154.167.220
|
||
fp2e7a.wpc.phicdn.net
|
192.229.211.108
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.61.150.201
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
45.88.186.125
|
beshomandotestbesnd.run.place
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\742D0701C511376451FD
|
648D1D9E4AE2F0DC8C47BA685FB1523F0B37AA06CE6AA7F4D08C04AD7F0B55D4
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
342F000
|
trusted library allocation
|
page read and write
|
||
E12000
|
unkown
|
page readonly
|
||
67F0000
|
trusted library section
|
page read and write
|
||
31C1000
|
trusted library allocation
|
page read and write
|
||
9A2000
|
unkown
|
page readonly
|
||
2551000
|
trusted library allocation
|
page read and write
|
||
7340000
|
trusted library section
|
page read and write
|
||
3031000
|
trusted library allocation
|
page read and write
|
||
2D61000
|
trusted library allocation
|
page read and write
|
||
7300000
|
trusted library section
|
page read and write
|
||
3D61000
|
trusted library allocation
|
page read and write
|
||
2E91000
|
trusted library allocation
|
page read and write
|
||
27BF000
|
trusted library allocation
|
page read and write
|
||
15B3AC6D000
|
heap
|
page read and write
|
||
1B555E10000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
7FF848D10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
A6EE000
|
stack
|
page read and write
|
||
4B253D000
|
stack
|
page read and write
|
||
4B2379000
|
stack
|
page read and write
|
||
1B57000A000
|
heap
|
page read and write
|
||
16D70937000
|
heap
|
page read and write
|
||
A36E000
|
stack
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
15BC000
|
stack
|
page read and write
|
||
716D000
|
stack
|
page read and write
|
||
5689000
|
stack
|
page read and write
|
||
15B209E7000
|
heap
|
page read and write
|
||
1B558C99000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page read and write
|
||
4B2436000
|
stack
|
page read and write
|
||
1B70F4CA000
|
trusted library allocation
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
1330000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
1B727A40000
|
heap
|
page read and write
|
||
247F000
|
stack
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
1B70D8EF000
|
heap
|
page read and write
|
||
16D01906000
|
trusted library allocation
|
page read and write
|
||
4B20F9000
|
stack
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
7FF848F5C000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page read and write
|
||
1B71047F000
|
trusted library allocation
|
page read and write
|
||
4B1DDE000
|
stack
|
page read and write
|
||
87A000
|
stack
|
page read and write
|
||
1B567A5D000
|
trusted library allocation
|
page read and write
|
||
780000
|
trusted library allocation
|
page execute and read and write
|
||
1266000
|
trusted library allocation
|
page execute and read and write
|
||
1560000
|
heap
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
16D70D9D000
|
heap
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
62000
|
unkown
|
page readonly
|
||
1B70D991000
|
heap
|
page read and write
|
||
1B727C40000
|
trusted library allocation
|
page read and write
|
||
A4AD000
|
stack
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
7FF848E37000
|
trusted library allocation
|
page read and write
|
||
16D70D25000
|
heap
|
page read and write
|
||
31337F9000
|
stack
|
page read and write
|
||
7FF848BEC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E74000
|
trusted library allocation
|
page read and write
|
||
1B727AB8000
|
heap
|
page read and write
|
||
1BC8E000
|
stack
|
page read and write
|
||
16D6EAE0000
|
heap
|
page read and write
|
||
5A90000
|
heap
|
page read and write
|
||
1B555CB3000
|
heap
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
3347000
|
trusted library allocation
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
7326000
|
trusted library allocation
|
page read and write
|
||
1197000
|
trusted library allocation
|
page execute and read and write
|
||
1B557EBD000
|
trusted library allocation
|
page read and write
|
||
15B23DC2000
|
trusted library allocation
|
page read and write
|
||
130E000
|
heap
|
page read and write
|
||
16D70CF0000
|
heap
|
page read and write
|
||
C5C000
|
stack
|
page read and write
|
||
A5EE000
|
stack
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
5A78000
|
trusted library allocation
|
page read and write
|
||
2B0A000
|
heap
|
page read and write
|
||
1B567A00000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
16D70E47000
|
heap
|
page read and write
|
||
15B23500000
|
trusted library allocation
|
page read and write
|
||
14B2000
|
trusted library allocation
|
page read and write
|
||
1140000
|
trusted library allocation
|
page read and write
|
||
26CC000
|
trusted library allocation
|
page read and write
|
||
114F000
|
stack
|
page read and write
|
||
6E0000
|
trusted library allocation
|
page read and write
|
||
5215000
|
trusted library allocation
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
trusted library allocation
|
page read and write
|
||
7FF848CE0000
|
trusted library allocation
|
page read and write
|
||
15B3A860000
|
heap
|
page read and write
|
||
7FF848C0C000
|
trusted library allocation
|
page execute and read and write
|
||
15B20950000
|
trusted library allocation
|
page read and write
|
||
9BC000
|
heap
|
page read and write
|
||
4B25BE000
|
stack
|
page read and write
|
||
16D6E8DB000
|
heap
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
7FF848E79000
|
trusted library allocation
|
page read and write
|
||
15B22F22000
|
trusted library allocation
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
16D01401000
|
trusted library allocation
|
page read and write
|
||
7FF848D28000
|
trusted library allocation
|
page read and write
|
||
7AA000
|
heap
|
page read and write
|
||
1180000
|
trusted library allocation
|
page read and write
|
||
7FF848C00000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
491053E000
|
stack
|
page read and write
|
||
3551000
|
trusted library allocation
|
page read and write
|
||
835E000
|
stack
|
page read and write
|
||
5696000
|
trusted library allocation
|
page read and write
|
||
4B21FE000
|
stack
|
page read and write
|
||
E6A000
|
heap
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
A98E000
|
stack
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
1527000
|
trusted library allocation
|
page execute and read and write
|
||
318E000
|
stack
|
page read and write
|
||
72AE000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
1B56FED5000
|
heap
|
page read and write
|
||
15B20A2E000
|
heap
|
page read and write
|
||
1B5592E5000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
1B5578EC000
|
heap
|
page read and write
|
||
A69E000
|
stack
|
page read and write
|
||
1B5579F1000
|
trusted library allocation
|
page read and write
|
||
6E4000
|
trusted library allocation
|
page read and write
|
||
7FF848BF6000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
4B24B8000
|
stack
|
page read and write
|
||
7FF848F99000
|
trusted library allocation
|
page read and write
|
||
50FA74C000
|
stack
|
page read and write
|
||
50F967F000
|
stack
|
page read and write
|
||
7FF848EA8000
|
trusted library allocation
|
page read and write
|
||
535B000
|
stack
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
1B559344000
|
trusted library allocation
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page execute and read and write
|
||
1340000
|
heap
|
page read and write
|
||
71AE000
|
stack
|
page read and write
|
||
6E3000
|
trusted library allocation
|
page execute and read and write
|
||
49102F9000
|
stack
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
1B567A11000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
1B56FF4A000
|
heap
|
page read and write
|
||
E48000
|
heap
|
page read and write
|
||
16D102DF000
|
trusted library allocation
|
page read and write
|
||
15B2099B000
|
heap
|
page read and write
|
||
313347D000
|
stack
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
1B5700F0000
|
heap
|
page read and write
|
||
E75000
|
heap
|
page read and write
|
||
7520000
|
trusted library allocation
|
page read and write
|
||
15B2299D000
|
trusted library allocation
|
page read and write
|
||
15B20A23000
|
heap
|
page read and write
|
||
126C1000
|
trusted library allocation
|
page read and write
|
||
58FE000
|
stack
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
1B72786D000
|
heap
|
page read and write
|
||
16D70D61000
|
heap
|
page read and write
|
||
1B70D8C2000
|
heap
|
page read and write
|
||
1105000
|
heap
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
15B327C5000
|
trusted library allocation
|
page read and write
|
||
6DAE000
|
stack
|
page read and write
|
||
16D6EA70000
|
heap
|
page readonly
|
||
15B20960000
|
heap
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
16C0000
|
trusted library allocation
|
page read and write
|
||
1B70D9A5000
|
heap
|
page read and write
|
||
6ACB000
|
trusted library allocation
|
page read and write
|
||
15B3AC53000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1B710453000
|
trusted library allocation
|
page read and write
|
||
16D6E973000
|
heap
|
page read and write
|
||
569E000
|
trusted library allocation
|
page read and write
|
||
1B56FEB3000
|
heap
|
page read and write
|
||
1B7277C9000
|
heap
|
page read and write
|
||
4B1D53000
|
stack
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
16D6EA80000
|
trusted library allocation
|
page read and write
|
||
56B1000
|
trusted library allocation
|
page read and write
|
||
153C000
|
stack
|
page read and write
|
||
136E000
|
heap
|
page read and write
|
||
44E6000
|
trusted library allocation
|
page read and write
|
||
7FF848BDF000
|
trusted library allocation
|
page execute and read and write
|
||
1B555C81000
|
heap
|
page read and write
|
||
49C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D20000
|
trusted library allocation
|
page read and write
|
||
1B70FEA1000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
59EC000
|
stack
|
page read and write
|
||
1B555E40000
|
trusted library allocation
|
page read and write
|
||
1B69C000
|
stack
|
page read and write
|
||
25D8000
|
trusted library allocation
|
page read and write
|
||
7650000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CD1000
|
trusted library allocation
|
page read and write
|
||
1B727873000
|
heap
|
page read and write
|
||
5B3E000
|
stack
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
7FF848B8C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CE1000
|
trusted library allocation
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
551E000
|
stack
|
page read and write
|
||
7DF4B6400000
|
trusted library allocation
|
page execute and read and write
|
||
15B2346D000
|
trusted library allocation
|
page read and write
|
||
1B5597F5000
|
trusted library allocation
|
page read and write
|
||
1190000
|
trusted library allocation
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
1B56FF20000
|
heap
|
page read and write
|
||
1B558A22000
|
trusted library allocation
|
page read and write
|
||
1B7278C0000
|
heap
|
page execute and read and write
|
||
A0DF000
|
stack
|
page read and write
|
||
1B555CB5000
|
heap
|
page read and write
|
||
1B70D934000
|
heap
|
page read and write
|
||
1B56FF0C000
|
heap
|
page read and write
|
||
1B70F290000
|
trusted library allocation
|
page read and write
|
||
16D6E8DE000
|
heap
|
page read and write
|
||
16D6EA30000
|
trusted library allocation
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
632E000
|
stack
|
page read and write
|
||
7FF848D20000
|
trusted library allocation
|
page execute and read and write
|
||
16D6EA50000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
249E000
|
trusted library allocation
|
page read and write
|
||
15B3AC77000
|
heap
|
page read and write
|
||
15B3AE10000
|
heap
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
83A000
|
heap
|
page read and write
|
||
16D70430000
|
heap
|
page read and write
|
||
32F7000
|
trusted library allocation
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
1B56FEB8000
|
heap
|
page read and write
|
||
76D0000
|
trusted library allocation
|
page execute and read and write
|
||
16D709D6000
|
heap
|
page read and write
|
||
16D1030D000
|
trusted library allocation
|
page read and write
|
||
1B557883000
|
heap
|
page read and write
|
||
1B555D54000
|
heap
|
page read and write
|
||
1B558765000
|
trusted library allocation
|
page read and write
|
||
652E000
|
stack
|
page read and write
|
||
12E3000
|
heap
|
page read and write
|
||
1382000
|
heap
|
page read and write
|
||
16D70290000
|
trusted library allocation
|
page read and write
|
||
7FF848E53000
|
trusted library allocation
|
page read and write
|
||
4B85000
|
heap
|
page read and write
|
||
115D000
|
trusted library allocation
|
page execute and read and write
|
||
98DE000
|
stack
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
15B20A60000
|
heap
|
page readonly
|
||
1B558CFA000
|
trusted library allocation
|
page read and write
|
||
1624000
|
heap
|
page read and write
|
||
1B70D9B0000
|
trusted library section
|
page read and write
|
||
56EF000
|
trusted library allocation
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
1B71F471000
|
trusted library allocation
|
page read and write
|
||
2DA5000
|
trusted library allocation
|
page read and write
|
||
7FF848B24000
|
trusted library allocation
|
page read and write
|
||
7FF848B54000
|
trusted library allocation
|
page read and write
|
||
9B9000
|
heap
|
page read and write
|
||
7FF848CC2000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
7320000
|
trusted library allocation
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1B727973000
|
heap
|
page read and write
|
||
14E7000
|
heap
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page read and write
|
||
7FF848E84000
|
trusted library allocation
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
16D01430000
|
trusted library allocation
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
1B56FF24000
|
heap
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
1B727790000
|
heap
|
page read and write
|
||
662E000
|
stack
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
16D708F6000
|
heap
|
page execute and read and write
|
||
1B70F451000
|
trusted library allocation
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
16D102E4000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
7FF848CF0000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
24B2000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
16D70957000
|
heap
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
1284000
|
trusted library allocation
|
page read and write
|
||
8F1000
|
stack
|
page read and write
|
||
5443000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
5750000
|
trusted library allocation
|
page read and write
|
||
313367E000
|
stack
|
page read and write
|
||
7FF848B43000
|
trusted library allocation
|
page execute and read and write
|
||
15B23D39000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
136A000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
15B224A0000
|
trusted library allocation
|
page read and write
|
||
137F000
|
heap
|
page read and write
|
||
1B56FFBA000
|
heap
|
page read and write
|
||
15B236A9000
|
trusted library allocation
|
page read and write
|
||
56CD000
|
trusted library allocation
|
page read and write
|
||
679C000
|
heap
|
page read and write
|
||
7FF848B60000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
16D01348000
|
trusted library allocation
|
page read and write
|
||
1B727B72000
|
heap
|
page read and write
|
||
1B710056000
|
trusted library allocation
|
page read and write
|
||
4B22FD000
|
stack
|
page read and write
|
||
119B000
|
trusted library allocation
|
page execute and read and write
|
||
16D6EA55000
|
heap
|
page read and write
|
||
1192000
|
trusted library allocation
|
page read and write
|
||
4B217E000
|
stack
|
page read and write
|
||
1B5579E0000
|
heap
|
page read and write
|
||
1B557980000
|
heap
|
page execute and read and write
|
||
16D709EF000
|
heap
|
page read and write
|
||
7FF848B4D000
|
trusted library allocation
|
page execute and read and write
|
||
15B3A8A6000
|
heap
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
3195000
|
trusted library allocation
|
page read and write
|
||
4576000
|
trusted library allocation
|
page read and write
|
||
3345000
|
trusted library allocation
|
page read and write
|
||
7FF848CE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
1B71122C000
|
trusted library allocation
|
page read and write
|
||
1B567CE3000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
3FD000
|
stack
|
page read and write
|
||
1B71062A000
|
trusted library allocation
|
page read and write
|
||
9C20000
|
heap
|
page read and write
|
||
1B567CDB000
|
trusted library allocation
|
page read and write
|
||
1A1E000
|
stack
|
page read and write
|
||
7FF848B23000
|
trusted library allocation
|
page execute and read and write
|
||
5D0000
|
heap
|
page read and write
|
||
116D000
|
trusted library allocation
|
page execute and read and write
|
||
3111000
|
trusted library allocation
|
page read and write
|
||
2C40000
|
trusted library allocation
|
page read and write
|
||
52FB000
|
stack
|
page read and write
|
||
4B3287000
|
stack
|
page read and write
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
A35F000
|
stack
|
page read and write
|
||
7FF848B4D000
|
trusted library allocation
|
page execute and read and write
|
||
1182000
|
trusted library allocation
|
page read and write
|
||
12C8000
|
heap
|
page read and write
|
||
12AB000
|
trusted library allocation
|
page execute and read and write
|
||
60000
|
unkown
|
page readonly
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1710000
|
heap
|
page read and write
|
||
1B5586FF000
|
trusted library allocation
|
page read and write
|
||
7FF848BE0000
|
trusted library allocation
|
page execute and read and write
|
||
E35000
|
heap
|
page read and write
|
||
13AC000
|
heap
|
page read and write
|
||
9D30000
|
trusted library allocation
|
page execute and read and write
|
||
1B555EB5000
|
heap
|
page read and write
|
||
491073B000
|
stack
|
page read and write
|
||
490FCC3000
|
stack
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
7FF848CDA000
|
trusted library allocation
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page read and write
|
||
15B20999000
|
heap
|
page read and write
|
||
1640000
|
trusted library allocation
|
page execute and read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
7581000
|
trusted library allocation
|
page read and write
|
||
1B56FF18000
|
heap
|
page read and write
|
||
1B555EB0000
|
heap
|
page read and write
|
||
15B3AC25000
|
heap
|
page read and write
|
||
2500000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
7FF848C40000
|
trusted library allocation
|
page execute and read and write
|
||
15B23111000
|
trusted library allocation
|
page read and write
|
||
6750000
|
heap
|
page read and write
|
||
7DF42C7C0000
|
trusted library allocation
|
page execute and read and write
|
||
4B273B000
|
stack
|
page read and write
|
||
3349000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
16D70CD0000
|
heap
|
page read and write
|
||
1B5597D0000
|
trusted library allocation
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
7330000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page read and write
|
||
1B567CE5000
|
trusted library allocation
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
9AF000
|
heap
|
page read and write
|
||
1B710DA0000
|
trusted library allocation
|
page read and write
|
||
2540000
|
heap
|
page execute and read and write
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
16D6E961000
|
heap
|
page read and write
|
||
16D70DF6000
|
heap
|
page read and write
|
||
7FF848BE0000
|
trusted library allocation
|
page read and write
|
||
15B242F7000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page execute and read and write
|
||
31B0000
|
heap
|
page read and write
|
||
15B242F2000
|
trusted library allocation
|
page read and write
|
||
31331F2000
|
stack
|
page read and write
|
||
7FF848F76000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page execute and read and write
|
||
16D01263000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
16D708F0000
|
heap
|
page execute and read and write
|
||
4B310E000
|
stack
|
page read and write
|
||
A4B000
|
heap
|
page read and write
|
||
7FF848F23000
|
trusted library allocation
|
page read and write
|
||
1195000
|
trusted library allocation
|
page execute and read and write
|
||
16D6EA60000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
BBC000
|
stack
|
page read and write
|
||
7FF848B33000
|
trusted library allocation
|
page execute and read and write
|
||
15B209E4000
|
heap
|
page read and write
|
||
1661000
|
heap
|
page read and write
|
||
1B710571000
|
trusted library allocation
|
page read and write
|
||
6BED000
|
stack
|
page read and write
|
||
7E7000
|
heap
|
page read and write
|
||
7FF848D38000
|
trusted library allocation
|
page read and write
|
||
1B5577C0000
|
heap
|
page execute and read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
15B20A25000
|
heap
|
page read and write
|
||
12A7000
|
trusted library allocation
|
page execute and read and write
|
||
15B22557000
|
trusted library allocation
|
page read and write
|
||
1B71F738000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page execute and read and write
|
||
126C8000
|
trusted library allocation
|
page read and write
|
||
751E000
|
stack
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
A52000
|
heap
|
page read and write
|
||
9D7D000
|
stack
|
page read and write
|
||
153B000
|
trusted library allocation
|
page execute and read and write
|
||
1153000
|
trusted library allocation
|
page execute and read and write
|
||
63A000
|
stack
|
page read and write
|
||
16D70E27000
|
heap
|
page read and write
|
||
1B555C70000
|
heap
|
page read and write
|
||
14A6000
|
trusted library allocation
|
page execute and read and write
|
||
1B71F740000
|
trusted library allocation
|
page read and write
|
||
7FF848EA2000
|
trusted library allocation
|
page read and write
|
||
7FF848C36000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
1B711252000
|
trusted library allocation
|
page read and write
|
||
7FF848CF0000
|
trusted library allocation
|
page execute and read and write
|
||
6D0000
|
heap
|
page read and write
|
||
7FF848D22000
|
trusted library allocation
|
page read and write
|
||
15B32501000
|
trusted library allocation
|
page read and write
|
||
3351000
|
trusted library allocation
|
page read and write
|
||
1B727960000
|
heap
|
page read and write
|
||
1B555CFA000
|
heap
|
page read and write
|
||
7620000
|
trusted library allocation
|
page execute and read and write
|
||
31A0000
|
trusted library allocation
|
page read and write
|
||
56BD000
|
trusted library allocation
|
page read and write
|
||
9AE000
|
stack
|
page read and write
|
||
120F000
|
stack
|
page read and write
|
||
2ECC000
|
trusted library allocation
|
page read and write
|
||
1B558C06000
|
trusted library allocation
|
page read and write
|
||
7FF848B3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C06000
|
trusted library allocation
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
2B88000
|
trusted library allocation
|
page read and write
|
||
7FF848B42000
|
trusted library allocation
|
page read and write
|
||
1B71F751000
|
trusted library allocation
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
ED5000
|
heap
|
page read and write
|
||
2F31000
|
trusted library allocation
|
page read and write
|
||
1B555C50000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
99F000
|
heap
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
1B0F0000
|
heap
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page execute and read and write
|
||
3671000
|
trusted library allocation
|
page read and write
|
||
50FA64E000
|
stack
|
page read and write
|
||
1B70D840000
|
heap
|
page read and write
|
||
58AE000
|
stack
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page read and write
|
||
7FF848E15000
|
trusted library allocation
|
page read and write
|
||
569B000
|
trusted library allocation
|
page read and write
|
||
1537000
|
trusted library allocation
|
page execute and read and write
|
||
52B0000
|
heap
|
page execute and read and write
|
||
5C7D000
|
stack
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
1B727B34000
|
heap
|
page read and write
|
||
706000
|
trusted library allocation
|
page execute and read and write
|
||
3559000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
831000
|
heap
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
24D5000
|
trusted library allocation
|
page read and write
|
||
A39C000
|
stack
|
page read and write
|
||
3DC6000
|
trusted library allocation
|
page read and write
|
||
1B70D8A0000
|
trusted library section
|
page read and write
|
||
56AB000
|
trusted library allocation
|
page read and write
|
||
16D00001000
|
trusted library allocation
|
page read and write
|
||
16D70DDB000
|
heap
|
page read and write
|
||
1B727D00000
|
heap
|
page read and write
|
||
7FF848B24000
|
trusted library allocation
|
page read and write
|
||
6380000
|
trusted library allocation
|
page read and write
|
||
15B224D1000
|
trusted library allocation
|
page read and write
|
||
50F91FE000
|
stack
|
page read and write
|
||
5A30000
|
heap
|
page read and write
|
||
15B3AC81000
|
heap
|
page read and write
|
||
7FF848D02000
|
trusted library allocation
|
page read and write
|
||
867000
|
heap
|
page read and write
|
||
ADE000
|
stack
|
page read and write
|
||
7FF848E63000
|
trusted library allocation
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
1B55866F000
|
trusted library allocation
|
page read and write
|
||
1B70D820000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
1B57004B000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
1B557970000
|
heap
|
page execute and read and write
|
||
1B5578C9000
|
heap
|
page read and write
|
||
71B000
|
trusted library allocation
|
page execute and read and write
|
||
15B3A9A0000
|
heap
|
page execute and read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
7FF848DC0000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
16D7090C000
|
heap
|
page read and write
|
||
50FA6C9000
|
stack
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page read and write
|
||
1B559282000
|
trusted library allocation
|
page read and write
|
||
5860000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
A88E000
|
stack
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
83D000
|
heap
|
page read and write
|
||
15B22470000
|
heap
|
page read and write
|
||
7FF848BE6000
|
trusted library allocation
|
page read and write
|
||
7FF848C16000
|
trusted library allocation
|
page execute and read and write
|
||
15B20890000
|
heap
|
page read and write
|
||
7FF848BFC000
|
trusted library allocation
|
page execute and read and write
|
||
490FD4F000
|
stack
|
page read and write
|
||
1B555D90000
|
heap
|
page read and write
|
||
15B23891000
|
trusted library allocation
|
page read and write
|
||
AAD0000
|
trusted library allocation
|
page execute and read and write
|
||
5A3E000
|
stack
|
page read and write
|
||
3133938000
|
stack
|
page read and write
|
||
127D000
|
trusted library allocation
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
7040000
|
trusted library section
|
page read and write
|
||
3875000
|
trusted library allocation
|
page read and write
|
||
1B727B32000
|
heap
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page read and write
|
||
83D000
|
stack
|
page read and write
|
||
16D70928000
|
heap
|
page read and write
|
||
AC5E000
|
stack
|
page read and write
|
||
1186000
|
trusted library allocation
|
page execute and read and write
|
||
15B324F1000
|
trusted library allocation
|
page read and write
|
||
15B20B20000
|
heap
|
page execute and read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
6730000
|
heap
|
page read and write
|
||
1563000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
7FF848E82000
|
trusted library allocation
|
page read and write
|
||
1B7277C7000
|
heap
|
page read and write
|
||
7FF848EA9000
|
trusted library allocation
|
page read and write
|
||
1B7106A0000
|
trusted library allocation
|
page read and write
|
||
1B555D62000
|
heap
|
page read and write
|
||
558A000
|
stack
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
15B23E20000
|
trusted library allocation
|
page read and write
|
||
5270000
|
heap
|
page read and write
|
||
F59000
|
stack
|
page read and write
|
||
7FF848B5D000
|
trusted library allocation
|
page execute and read and write
|
||
1163000
|
trusted library allocation
|
page execute and read and write
|
||
1B557823000
|
heap
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
15B23D5F000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
16D6EAE5000
|
heap
|
page read and write
|
||
1B5578D7000
|
heap
|
page read and write
|
||
7FF848B3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CE2000
|
trusted library allocation
|
page read and write
|
||
5873000
|
heap
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
7FF848C50000
|
trusted library allocation
|
page execute and read and write
|
||
15B23775000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
heap
|
page read and write
|
||
464C000
|
stack
|
page read and write
|
||
7F760000
|
trusted library allocation
|
page execute and read and write
|
||
1410000
|
heap
|
page read and write
|
||
50F91B3000
|
stack
|
page read and write
|
||
15B20968000
|
heap
|
page read and write
|
||
1B727ACE000
|
heap
|
page read and write
|
||
15B3A958000
|
heap
|
page read and write
|
||
7FF848BDC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B7C000
|
trusted library allocation
|
page execute and read and write
|
||
56A2000
|
trusted library allocation
|
page read and write
|
||
7FF848C16000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C60000
|
trusted library allocation
|
page execute and read and write
|
||
5AF0000
|
heap
|
page read and write
|
||
15B20910000
|
trusted library section
|
page read and write
|
||
311C000
|
trusted library allocation
|
page read and write
|
||
313488E000
|
stack
|
page read and write
|
||
16D0136F000
|
trusted library allocation
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1B5585EB000
|
trusted library allocation
|
page read and write
|
||
5A73000
|
trusted library allocation
|
page read and write
|
||
1B710CDF000
|
trusted library allocation
|
page read and write
|
||
16D6E9A0000
|
heap
|
page read and write
|
||
1B555C98000
|
heap
|
page read and write
|
||
1B555CBD000
|
heap
|
page read and write
|
||
491128C000
|
stack
|
page read and write
|
||
1244000
|
trusted library allocation
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
15B20B60000
|
heap
|
page read and write
|
||
6761000
|
heap
|
page read and write
|
||
131A000
|
heap
|
page read and write
|
||
7FF848B44000
|
trusted library allocation
|
page read and write
|
||
5850000
|
trusted library section
|
page readonly
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
4B318C000
|
stack
|
page read and write
|
||
1B7278C6000
|
heap
|
page execute and read and write
|
||
50F9B7B000
|
stack
|
page read and write
|
||
15B3AB20000
|
heap
|
page read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
9E7000
|
heap
|
page read and write
|
||
7FF848B2D000
|
trusted library allocation
|
page execute and read and write
|
||
696E000
|
stack
|
page read and write
|
||
6A6E000
|
stack
|
page read and write
|
||
3D89000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
16D102E6000
|
trusted library allocation
|
page read and write
|
||
A59F000
|
stack
|
page read and write
|
||
50F957E000
|
stack
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
7FF848E98000
|
trusted library allocation
|
page read and write
|
||
1B56FFE3000
|
heap
|
page read and write
|
||
56BE000
|
trusted library allocation
|
page read and write
|
||
1B5578AD000
|
heap
|
page read and write
|
||
3134789000
|
stack
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
7FF848BAC000
|
trusted library allocation
|
page execute and read and write
|
||
F7A000
|
heap
|
page read and write
|
||
554C000
|
stack
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
2FF0000
|
heap
|
page execute and read and write
|
||
334F000
|
trusted library allocation
|
page read and write
|
||
1B08F000
|
stack
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
15B208B0000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
7FF848C26000
|
trusted library allocation
|
page execute and read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
1B70D8B8000
|
heap
|
page read and write
|
||
D8B000
|
stack
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
4B0B000
|
stack
|
page read and write
|
||
31338B8000
|
stack
|
page read and write
|
||
64F0000
|
heap
|
page read and write
|
||
56F0000
|
heap
|
page read and write
|
||
7FF848E9C000
|
trusted library allocation
|
page read and write
|
||
1B1FF000
|
stack
|
page read and write
|
||
7FF848CF1000
|
trusted library allocation
|
page read and write
|
||
313468A000
|
stack
|
page read and write
|
||
1B7105AC000
|
trusted library allocation
|
page read and write
|
||
1B71075D000
|
trusted library allocation
|
page read and write
|
||
56C2000
|
trusted library allocation
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
56C6000
|
trusted library allocation
|
page read and write
|
||
2DAA000
|
trusted library allocation
|
page read and write
|
||
1041000
|
heap
|
page read and write
|
||
7FF848BE0000
|
trusted library allocation
|
page read and write
|
||
5C2E000
|
stack
|
page read and write
|
||
2B1C000
|
heap
|
page read and write
|
||
B36000
|
trusted library allocation
|
page read and write
|
||
7FF848DC0000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
AD5F000
|
stack
|
page read and write
|
||
1B5589F6000
|
trusted library allocation
|
page read and write
|
||
16D00D54000
|
trusted library allocation
|
page read and write
|
||
7FF848C50000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
7FF848B60000
|
trusted library allocation
|
page read and write
|
||
7FF848BD0000
|
trusted library allocation
|
page read and write
|
||
16D70900000
|
heap
|
page read and write
|
||
4B2279000
|
stack
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
15B209E2000
|
heap
|
page read and write
|
||
1B56FF1C000
|
heap
|
page read and write
|
||
50FA7CE000
|
stack
|
page read and write
|
||
16D70D35000
|
heap
|
page read and write
|
||
5870000
|
heap
|
page read and write
|
||
1B56FEAB000
|
heap
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
6711000
|
heap
|
page read and write
|
||
1B727B04000
|
heap
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
605000
|
heap
|
page read and write
|
||
491027D000
|
stack
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
7FF848CC0000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
A4B0000
|
heap
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
7FF848CFA000
|
trusted library allocation
|
page read and write
|
||
7650000
|
heap
|
page read and write
|
||
9A0000
|
unkown
|
page readonly
|
||
99E000
|
stack
|
page read and write
|
||
4B23BE000
|
stack
|
page read and write
|
||
1B70D90D000
|
heap
|
page read and write
|
||
16D70D6E000
|
heap
|
page read and write
|
||
1B557800000
|
heap
|
page read and write
|
||
7FF848B32000
|
trusted library allocation
|
page read and write
|
||
1632000
|
heap
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
26C1000
|
trusted library allocation
|
page read and write
|
||
91F000
|
unkown
|
page read and write
|
||
1B70DAB0000
|
heap
|
page read and write
|
||
741E000
|
stack
|
page read and write
|
||
773000
|
heap
|
page read and write
|
||
1B70F260000
|
trusted library allocation
|
page read and write
|
||
5B2E000
|
stack
|
page read and write
|
||
16D10001000
|
trusted library allocation
|
page read and write
|
||
15B3AA40000
|
heap
|
page read and write
|
||
15FE000
|
heap
|
page read and write
|
||
1B56FF10000
|
heap
|
page read and write
|
||
15B20A70000
|
trusted library allocation
|
page read and write
|
||
15B207B0000
|
heap
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
1B7103EF000
|
trusted library allocation
|
page read and write
|
||
1B711276000
|
trusted library allocation
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
15B20AA0000
|
trusted library allocation
|
page read and write
|
||
1687000
|
heap
|
page read and write
|
||
16D70E2E000
|
heap
|
page read and write
|
||
F1E000
|
stack
|
page read and write
|
||
7FF848E73000
|
trusted library allocation
|
page read and write
|
||
15B22440000
|
heap
|
page execute and read and write
|
||
7520000
|
trusted library allocation
|
page execute and read and write
|
||
49104BB000
|
stack
|
page read and write
|
||
1495000
|
heap
|
page read and write
|
||
671A000
|
heap
|
page read and write
|
||
15D4000
|
trusted library allocation
|
page read and write
|
||
15D6000
|
trusted library allocation
|
page read and write
|
||
712000
|
trusted library allocation
|
page read and write
|
||
1BB80000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
7DF42C7D0000
|
trusted library allocation
|
page execute and read and write
|
||
16D70E4D000
|
heap
|
page read and write
|
||
AB1D000
|
stack
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
15B2362D000
|
trusted library allocation
|
page read and write
|
||
15B20A29000
|
heap
|
page read and write
|
||
6774000
|
heap
|
page read and write
|
||
1B70D8EC000
|
heap
|
page read and write
|
||
16D00073000
|
trusted library allocation
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page execute and read and write
|
||
15B327D6000
|
trusted library allocation
|
page read and write
|
||
7F330000
|
trusted library allocation
|
page execute and read and write
|
||
988000
|
heap
|
page read and write
|
||
1B727823000
|
heap
|
page read and write
|
||
49B0000
|
trusted library allocation
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page read and write
|
||
1254000
|
trusted library allocation
|
page read and write
|
||
1B70F91D000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
57F0000
|
heap
|
page execute and read and write
|
||
16D6E8A8000
|
heap
|
page read and write
|
||
1B55876E000
|
trusted library allocation
|
page read and write
|
||
1B567A21000
|
trusted library allocation
|
page read and write
|
||
44AA000
|
trusted library allocation
|
page read and write
|
||
62EE000
|
stack
|
page read and write
|
||
99F000
|
stack
|
page read and write
|
||
16D6E7B0000
|
heap
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
3248000
|
trusted library allocation
|
page read and write
|
||
261E000
|
stack
|
page read and write
|
||
1B70D8B0000
|
heap
|
page read and write
|
||
7FF848FA3000
|
trusted library allocation
|
page read and write
|
||
15B3253F000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
4B320D000
|
stack
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
1615000
|
heap
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
66EE000
|
stack
|
page read and write
|
||
96DE000
|
stack
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
9DBE000
|
stack
|
page read and write
|
||
1B71F733000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
700000
|
trusted library allocation
|
page read and write
|
||
66F0000
|
heap
|
page read and write
|
||
15B237D6000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
1B5585F7000
|
trusted library allocation
|
page read and write
|
||
7DF4B07A0000
|
trusted library allocation
|
page execute and read and write
|
||
1B7101CD000
|
trusted library allocation
|
page read and write
|
||
13118000
|
trusted library allocation
|
page read and write
|
||
7FF848C06000
|
trusted library allocation
|
page execute and read and write
|
||
980000
|
heap
|
page read and write
|
||
16A3000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
1B70D740000
|
heap
|
page read and write
|
||
90E000
|
unkown
|
page read and write
|
||
15B224C5000
|
heap
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page read and write
|
||
49101F6000
|
stack
|
page read and write
|
||
10F7000
|
stack
|
page read and write
|
||
7FF848B2D000
|
trusted library allocation
|
page execute and read and write
|
||
6ED000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
129C000
|
stack
|
page read and write
|
||
15B234D4000
|
trusted library allocation
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
135F000
|
heap
|
page read and write
|
||
1B557C19000
|
trusted library allocation
|
page read and write
|
||
49106BE000
|
stack
|
page read and write
|
||
1B710817000
|
trusted library allocation
|
page read and write
|
||
12E9000
|
heap
|
page read and write
|
||
7FF848D04000
|
trusted library allocation
|
page read and write
|
||
5752000
|
trusted library allocation
|
page read and write
|
||
57F0000
|
trusted library allocation
|
page read and write
|
||
50F947E000
|
stack
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
24C0000
|
trusted library allocation
|
page read and write
|
||
1B555DF0000
|
trusted library allocation
|
page read and write
|
||
7FF848D0A000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
15B3AA65000
|
heap
|
page read and write
|
||
6AEC000
|
stack
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
1B727B25000
|
heap
|
page read and write
|
||
1154000
|
trusted library allocation
|
page read and write
|
||
313357F000
|
stack
|
page read and write
|
||
383A000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
1B3CE000
|
stack
|
page read and write
|
||
3133B3E000
|
stack
|
page read and write
|
||
16D702C0000
|
trusted library allocation
|
page read and write
|
||
E3B000
|
stack
|
page read and write
|
||
1B555E80000
|
trusted library allocation
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
15B230BB000
|
trusted library allocation
|
page read and write
|
||
16D01901000
|
trusted library allocation
|
page read and write
|
||
1B70D9F0000
|
heap
|
page readonly
|
||
1B7106F8000
|
trusted library allocation
|
page read and write
|
||
4D9D000
|
stack
|
page read and write
|
||
971E000
|
stack
|
page read and write
|
||
334B000
|
trusted library allocation
|
page read and write
|
||
6CAC000
|
stack
|
page read and write
|
||
5840000
|
trusted library allocation
|
page read and write
|
||
7FB30000
|
trusted library allocation
|
page execute and read and write
|
||
1C02E000
|
stack
|
page read and write
|
||
1B557976000
|
heap
|
page execute and read and write
|
||
F86000
|
heap
|
page read and write
|
||
1B70DAB5000
|
heap
|
page read and write
|
||
1B55981A000
|
trusted library allocation
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
49105BF000
|
stack
|
page read and write
|
||
1B70F440000
|
heap
|
page execute and read and write
|
||
12A0000
|
trusted library allocation
|
page execute and read and write
|
||
12D6000
|
heap
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
5830000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
51D5000
|
heap
|
page read and write
|
||
56A4000
|
trusted library allocation
|
page read and write
|
||
2C30000
|
trusted library allocation
|
page read and write
|
||
248B000
|
trusted library allocation
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
E77000
|
heap
|
page read and write
|
||
6736000
|
heap
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
B1E000
|
stack
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
1B7103F1000
|
trusted library allocation
|
page read and write
|
||
730000
|
trusted library allocation
|
page read and write
|
||
1B71072C000
|
trusted library allocation
|
page read and write
|
||
14BB000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F2C000
|
trusted library allocation
|
page read and write
|
||
313460D000
|
stack
|
page read and write
|
||
7530000
|
trusted library allocation
|
page read and write
|
||
16D101A0000
|
trusted library allocation
|
page read and write
|
||
7DF4B0790000
|
trusted library allocation
|
page execute and read and write
|
||
1B70D9C0000
|
trusted library allocation
|
page read and write
|
||
7667000
|
heap
|
page read and write
|
||
15B209A7000
|
heap
|
page read and write
|
||
56C1000
|
trusted library allocation
|
page read and write
|
||
15B208F0000
|
heap
|
page read and write
|
||
166E000
|
stack
|
page read and write
|
||
1361000
|
heap
|
page read and write
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
59FE000
|
stack
|
page read and write
|
||
1B555CCF000
|
heap
|
page read and write
|
||
1B7107D9000
|
trusted library allocation
|
page read and write
|
||
16D102FF000
|
trusted library allocation
|
page read and write
|
||
49100FA000
|
stack
|
page read and write
|
||
A16F000
|
stack
|
page read and write
|
||
1B557A6B000
|
trusted library allocation
|
page read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page read and write
|
||
F61000
|
stack
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
6DB000
|
heap
|
page read and write
|
||
7FF848B22000
|
trusted library allocation
|
page read and write
|
||
9B1D000
|
stack
|
page read and write
|
||
152E000
|
stack
|
page read and write
|
||
7FF848BD6000
|
trusted library allocation
|
page read and write
|
||
1B555E00000
|
heap
|
page readonly
|
||
7FF848D10000
|
trusted library allocation
|
page execute and read and write
|
||
16D6E909000
|
heap
|
page read and write
|
||
1177000
|
heap
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
1B555C30000
|
heap
|
page read and write
|
||
15B23473000
|
trusted library allocation
|
page read and write
|
||
1530000
|
trusted library allocation
|
page read and write
|
||
7FF848B8C000
|
trusted library allocation
|
page execute and read and write
|
||
1B557815000
|
heap
|
page read and write
|
||
1B710795000
|
trusted library allocation
|
page read and write
|
||
148D000
|
trusted library allocation
|
page execute and read and write
|
||
56B6000
|
trusted library allocation
|
page read and write
|
||
7FF848D18000
|
trusted library allocation
|
page read and write
|
||
1474000
|
trusted library allocation
|
page read and write
|
||
1B555CF8000
|
heap
|
page read and write
|
||
16D6E9C0000
|
heap
|
page read and write
|
||
1B555C77000
|
heap
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
14EF000
|
stack
|
page read and write
|
||
F2C000
|
heap
|
page read and write
|
||
491110E000
|
stack
|
page read and write
|
||
50F95F9000
|
stack
|
page read and write
|
||
7FF848B32000
|
trusted library allocation
|
page read and write
|
||
41C1000
|
trusted library allocation
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
129A000
|
trusted library allocation
|
page execute and read and write
|
||
124D000
|
trusted library allocation
|
page execute and read and write
|
||
3134707000
|
stack
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
A25E000
|
stack
|
page read and write
|
||
1164000
|
trusted library allocation
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
313377E000
|
stack
|
page read and write
|
||
1296000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
1B55925C000
|
trusted library allocation
|
page read and write
|
||
1B567C14000
|
trusted library allocation
|
page read and write
|
||
2510000
|
heap
|
page execute and read and write
|
||
16D70840000
|
heap
|
page execute and read and write
|
||
5760000
|
trusted library allocation
|
page execute and read and write
|
||
1B710C79000
|
trusted library allocation
|
page read and write
|
||
50F9877000
|
stack
|
page read and write
|
||
1B727814000
|
heap
|
page read and write
|
||
15B3AC7B000
|
heap
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
heap
|
page read and write
|
||
18EF000
|
stack
|
page read and write
|
||
F6D000
|
heap
|
page read and write
|
||
1B56FFFC000
|
heap
|
page read and write
|
||
126A000
|
trusted library allocation
|
page execute and read and write
|
||
717000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
A9CC000
|
stack
|
page read and write
|
||
5A70000
|
trusted library allocation
|
page read and write
|
||
5CAE000
|
heap
|
page read and write
|
||
1210000
|
trusted library allocation
|
page execute and read and write
|
||
512E000
|
stack
|
page read and write
|
||
3353000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
17EF000
|
stack
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
AACC000
|
stack
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
4B26BE000
|
stack
|
page read and write
|
||
7FF848F4C000
|
trusted library allocation
|
page read and write
|
||
1B70F2D4000
|
heap
|
page read and write
|
||
1B70D8F1000
|
heap
|
page read and write
|
||
3F31000
|
trusted library allocation
|
page read and write
|
||
491033E000
|
stack
|
page read and write
|
||
16D708A0000
|
trusted library allocation
|
page read and write
|
||
C5C000
|
stack
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
1B5679F1000
|
trusted library allocation
|
page read and write
|
||
311F000
|
trusted library allocation
|
page read and write
|
||
50F96F7000
|
stack
|
page read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page read and write
|
||
7FF848D24000
|
trusted library allocation
|
page read and write
|
||
7FF848CEA000
|
trusted library allocation
|
page read and write
|
||
1B70D880000
|
heap
|
page read and write
|
||
1274000
|
trusted library allocation
|
page read and write
|
||
12F8000
|
heap
|
page read and write
|
||
8995000
|
trusted library allocation
|
page read and write
|
||
A3D000
|
heap
|
page read and write
|
||
9BE000
|
heap
|
page read and write
|
||
15B3AA54000
|
heap
|
page read and write
|
||
7976000
|
trusted library allocation
|
page read and write
|
||
576E000
|
stack
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
7FF848D00000
|
trusted library allocation
|
page execute and read and write
|
||
5A95000
|
heap
|
page read and write
|
||
1B70F919000
|
trusted library allocation
|
page read and write
|
||
7FF848E1E000
|
trusted library allocation
|
page read and write
|
||
1B558BCD000
|
trusted library allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
797B000
|
trusted library allocation
|
page read and write
|
||
15B3A9A7000
|
heap
|
page execute and read and write
|
||
50FA5CC000
|
stack
|
page read and write
|
||
A3AD000
|
stack
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
15FA000
|
heap
|
page read and write
|
||
313383E000
|
stack
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
556F000
|
stack
|
page read and write
|
||
15B23246000
|
trusted library allocation
|
page read and write
|
||
7FF848D34000
|
trusted library allocation
|
page read and write
|
||
7FF848B7C000
|
trusted library allocation
|
page execute and read and write
|
||
1B555DD0000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
heap
|
page read and write
|
||
32E2000
|
trusted library allocation
|
page read and write
|
||
5200000
|
trusted library allocation
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
49103B7000
|
stack
|
page read and write
|
||
4A10000
|
heap
|
page read and write
|
||
15B3ABCC000
|
heap
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
1473000
|
trusted library allocation
|
page execute and read and write
|
||
54D0000
|
heap
|
page read and write
|
||
5B9D000
|
stack
|
page read and write
|
||
50F977D000
|
stack
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
16D10066000
|
trusted library allocation
|
page read and write
|
||
5720000
|
heap
|
page read and write
|
||
16D709E6000
|
heap
|
page read and write
|
||
15B20AE0000
|
trusted library allocation
|
page read and write
|
||
7FF848EA4000
|
trusted library allocation
|
page read and write
|
||
7FF848BD0000
|
trusted library allocation
|
page read and write
|
||
7FF848B53000
|
trusted library allocation
|
page execute and read and write
|
||
51FE000
|
stack
|
page read and write
|
||
10EE000
|
stack
|
page read and write
|
||
334D000
|
trusted library allocation
|
page read and write
|
||
1B55766B000
|
heap
|
page read and write
|
||
15B242AD000
|
trusted library allocation
|
page read and write
|
||
A26F000
|
stack
|
page read and write
|
||
24E0000
|
trusted library allocation
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
7C8000
|
heap
|
page read and write
|
||
7DF4B63F0000
|
trusted library allocation
|
page execute and read and write
|
||
420000
|
remote allocation
|
page execute and read and write
|
||
9C1D000
|
stack
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page read and write
|
||
42B3000
|
trusted library allocation
|
page read and write
|
||
4B263E000
|
stack
|
page read and write
|
||
15B2099D000
|
heap
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
702000
|
trusted library allocation
|
page read and write
|
||
16D6E8A0000
|
heap
|
page read and write
|
||
1B557810000
|
heap
|
page read and write
|
||
9ADE000
|
stack
|
page read and write
|
||
4489000
|
trusted library allocation
|
page read and write
|
||
1B56FDC0000
|
heap
|
page read and write
|
||
15B209A1000
|
heap
|
page read and write
|
||
7FF848CC0000
|
trusted library allocation
|
page read and write
|
||
6AC0000
|
trusted library allocation
|
page read and write
|
||
7FF848B23000
|
trusted library allocation
|
page execute and read and write
|
||
E90000
|
heap
|
page read and write
|
||
1B70D8F9000
|
heap
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
15B2231F000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
5CA0000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B4B000
|
trusted library allocation
|
page read and write
|
||
1B70D939000
|
heap
|
page read and write
|
||
11C0000
|
heap
|
page execute and read and write
|
||
50F97F9000
|
stack
|
page read and write
|
||
24D0000
|
trusted library allocation
|
page read and write
|
||
15B2099F000
|
heap
|
page read and write
|
||
7FF848B3B000
|
trusted library allocation
|
page read and write
|
||
116D000
|
trusted library allocation
|
page execute and read and write
|
||
152A000
|
trusted library allocation
|
page execute and read and write
|
||
AC1F000
|
stack
|
page read and write
|
||
1B555CB9000
|
heap
|
page read and write
|
||
5AEC000
|
stack
|
page read and write
|
||
5278000
|
heap
|
page read and write
|
||
15B2358F000
|
trusted library allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
7FF848B9C000
|
trusted library allocation
|
page execute and read and write
|
||
313458E000
|
stack
|
page read and write
|
||
16AD000
|
stack
|
page read and write
|
||
15B209BB000
|
heap
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
1B71F451000
|
trusted library allocation
|
page read and write
|
||
35A7000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
7FF848E94000
|
trusted library allocation
|
page read and write
|
||
15B20B65000
|
heap
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
1BE2E000
|
stack
|
page read and write
|
||
1B71F481000
|
trusted library allocation
|
page read and write
|
||
7FF848C06000
|
trusted library allocation
|
page execute and read and write
|
||
13113000
|
trusted library allocation
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
7FF848CD0000
|
trusted library allocation
|
page read and write
|
||
15B3A906000
|
heap
|
page read and write
|
||
491118E000
|
stack
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
7FF848D10000
|
trusted library allocation
|
page execute and read and write
|
||
1B56FF14000
|
heap
|
page read and write
|
||
13111000
|
trusted library allocation
|
page read and write
|
||
12F5000
|
heap
|
page read and write
|
||
E1E000
|
unkown
|
page readonly
|
||
70A000
|
trusted library allocation
|
page execute and read and write
|
||
7A0000
|
heap
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
1273000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DC0000
|
trusted library allocation
|
page read and write
|
||
7970000
|
trusted library allocation
|
page read and write
|
||
1B70F420000
|
heap
|
page execute and read and write
|
||
50F94FE000
|
stack
|
page read and write
|
||
1B558A87000
|
trusted library allocation
|
page read and write
|
||
35F5000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
9A7000
|
heap
|
page read and write
|
||
4B10000
|
trusted library allocation
|
page execute and read and write
|
||
4B330D000
|
stack
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
7FF848B3D000
|
trusted library allocation
|
page execute and read and write
|
||
136F000
|
heap
|
page read and write
|
||
706C000
|
stack
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
7FF848B34000
|
trusted library allocation
|
page read and write
|
||
191E000
|
stack
|
page read and write
|
||
5E10000
|
trusted library allocation
|
page execute and read and write
|
||
2E00000
|
heap
|
page read and write
|
||
15B327BD000
|
trusted library allocation
|
page read and write
|
||
313480C000
|
stack
|
page read and write
|
||
7DF47C960000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
31339B9000
|
stack
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
1B558443000
|
trusted library allocation
|
page read and write
|
||
16D6E8E0000
|
heap
|
page read and write
|
||
6755000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page execute and read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
50F98FA000
|
stack
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
15B209A3000
|
heap
|
page read and write
|
||
1B727B4A000
|
heap
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
5B7C000
|
stack
|
page read and write
|
||
1B559177000
|
trusted library allocation
|
page read and write
|
||
3133ABE000
|
stack
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
1170000
|
trusted library allocation
|
page read and write
|
||
1B56FEC9000
|
heap
|
page read and write
|
||
7FF848C40000
|
trusted library allocation
|
page execute and read and write
|
||
5CBE000
|
stack
|
page read and write
|
||
1B5CF000
|
stack
|
page read and write
|
||
1313000
|
heap
|
page read and write
|
||
16D018BC000
|
trusted library allocation
|
page read and write
|
||
31335F9000
|
stack
|
page read and write
|
||
1B710CB8000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
D59000
|
stack
|
page read and write
|
||
1155000
|
heap
|
page read and write
|
||
16D70D4D000
|
heap
|
page read and write
|
||
16D6E9F0000
|
heap
|
page read and write
|
||
15B20920000
|
trusted library section
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
1660000
|
heap
|
page execute and read and write
|
||
9F9E000
|
stack
|
page read and write
|
||
7FF848B34000
|
trusted library allocation
|
page read and write
|
||
F37000
|
stack
|
page read and write
|
||
1B727966000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
53FD000
|
stack
|
page read and write
|
||
16D70DAF000
|
heap
|
page read and write
|
||
64FE000
|
heap
|
page read and write
|
||
7DF4B63E0000
|
trusted library allocation
|
page execute and read and write
|
||
8DE000
|
unkown
|
page read and write
|
||
1B567CF5000
|
trusted library allocation
|
page read and write
|
||
138C000
|
heap
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
333D000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
1B555B50000
|
heap
|
page read and write
|
||
6EAE000
|
stack
|
page read and write
|
||
3100000
|
heap
|
page execute and read and write
|
||
13B6000
|
heap
|
page read and write
|
||
1B57002C000
|
heap
|
page read and write
|
||
127B000
|
trusted library allocation
|
page execute and read and write
|
||
1B1F000
|
stack
|
page read and write
|
||
14AA000
|
trusted library allocation
|
page execute and read and write
|
||
5420000
|
heap
|
page execute and read and write
|
||
1B70F67A000
|
trusted library allocation
|
page read and write
|
||
439E000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
trusted library section
|
page read and write
|
||
1B56FF82000
|
heap
|
page read and write
|
||
D59000
|
stack
|
page read and write
|
||
7FF848EB8000
|
trusted library allocation
|
page read and write
|
||
8C0F000
|
stack
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
16D102EC000
|
trusted library allocation
|
page read and write
|
||
1BB40000
|
heap
|
page execute and read and write
|
||
16D10505000
|
trusted library allocation
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
41C9000
|
trusted library allocation
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1277000
|
trusted library allocation
|
page execute and read and write
|
||
15B242D2000
|
trusted library allocation
|
page read and write
|
||
491007E000
|
stack
|
page read and write
|
||
26B0000
|
heap
|
page execute and read and write
|
||
7FF848BF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D08000
|
trusted library allocation
|
page read and write
|
||
7FF848B5B000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
1B71F460000
|
trusted library allocation
|
page read and write
|
||
7FF848BF0000
|
trusted library allocation
|
page read and write
|
||
15B231DF000
|
trusted library allocation
|
page read and write
|
||
1B70D8F3000
|
heap
|
page read and write
|
||
7FF848B52000
|
trusted library allocation
|
page read and write
|
||
16D016B4000
|
trusted library allocation
|
page read and write
|
||
16D6EAB0000
|
heap
|
page execute and read and write
|
||
1B57004E000
|
heap
|
page read and write
|
||
1BADD000
|
stack
|
page read and write
|
||
1B56FEA0000
|
heap
|
page read and write
|
||
7FF848E83000
|
trusted library allocation
|
page read and write
|
||
7FF848DC0000
|
trusted library allocation
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
15B3AC1C000
|
heap
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
7FF848CD0000
|
trusted library allocation
|
page read and write
|
||
1B70DA20000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
491063C000
|
stack
|
page read and write
|
||
16D018E2000
|
trusted library allocation
|
page read and write
|
||
1B727B84000
|
heap
|
page read and write
|
||
7FF848B33000
|
trusted library allocation
|
page execute and read and write
|
||
16D7030D000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
7DF47C950000
|
trusted library allocation
|
page execute and read and write
|
||
1B2C0000
|
heap
|
page execute and read and write
|
||
1C130000
|
heap
|
page read and write
|
||
181F000
|
stack
|
page read and write
|
||
16D6E8C4000
|
heap
|
page read and write
|
||
13AA000
|
heap
|
page read and write
|
||
16D70E18000
|
heap
|
page read and write
|
||
1B570045000
|
heap
|
page read and write
|
||
7FF848D01000
|
trusted library allocation
|
page read and write
|
||
5820000
|
trusted library allocation
|
page execute and read and write
|
||
1B555CAF000
|
heap
|
page read and write
|
||
372E000
|
trusted library allocation
|
page read and write
|
||
849000
|
heap
|
page read and write
|
||
7FF848CF0000
|
trusted library allocation
|
page execute and read and write
|
||
1B70DA00000
|
trusted library allocation
|
page read and write
|
||
3343000
|
trusted library allocation
|
page read and write
|
||
6702000
|
heap
|
page read and write
|
||
7FF848E88000
|
trusted library allocation
|
page read and write
|
||
49B2000
|
trusted library allocation
|
page read and write
|
||
3E91000
|
trusted library allocation
|
page read and write
|
||
16D00A2C000
|
trusted library allocation
|
page read and write
|
||
5740000
|
heap
|
page read and write
|
||
15B226F9000
|
trusted library allocation
|
page read and write
|
||
15B324D1000
|
trusted library allocation
|
page read and write
|
||
9E9E000
|
stack
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
7FF848B44000
|
trusted library allocation
|
page read and write
|
||
1BF2E000
|
stack
|
page read and write
|
||
6370000
|
heap
|
page read and write
|
||
50F9AFE000
|
stack
|
page read and write
|
||
14BF000
|
stack
|
page read and write
|
||
672E000
|
stack
|
page read and write
|
||
15B3ABC0000
|
heap
|
page read and write
|
||
7FF46EE40000
|
trusted library allocation
|
page execute and read and write
|
||
1B56FF5D000
|
heap
|
page read and write
|
||
1B557832000
|
heap
|
page read and write
|
||
15B224C0000
|
heap
|
page read and write
|
||
7FF848D14000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
1363000
|
heap
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page read and write
|
||
1B70D9E0000
|
trusted library allocation
|
page read and write
|
||
A49C000
|
stack
|
page read and write
|
||
50F9979000
|
stack
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
15B327B8000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
490FDCE000
|
stack
|
page read and write
|
||
5DBE000
|
stack
|
page read and write
|
||
7FF848E4D000
|
trusted library allocation
|
page read and write
|
||
7FF848EB2000
|
trusted library allocation
|
page read and write
|
||
BD5000
|
heap
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
5ADE000
|
stack
|
page read and write
|
||
1B567CD6000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
7FF848DA0000
|
trusted library allocation
|
page read and write
|
||
1243000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D12000
|
trusted library allocation
|
page read and write
|
||
1B711271000
|
trusted library allocation
|
page read and write
|
||
1B557960000
|
trusted library allocation
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
9FDD000
|
stack
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
1B70DA45000
|
heap
|
page read and write
|
||
3133A3E000
|
stack
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
2C44000
|
trusted library allocation
|
page read and write
|
||
1B71050F000
|
trusted library allocation
|
page read and write
|
||
1B4CE000
|
stack
|
page read and write
|
||
9B2000
|
unkown
|
page readonly
|
||
1B70DA40000
|
heap
|
page read and write
|
||
16D6E90E000
|
heap
|
page read and write
|
||
1373000
|
heap
|
page read and write
|
||
1B558B16000
|
trusted library allocation
|
page read and write
|
||
9F6E000
|
stack
|
page read and write
|
||
5690000
|
trusted library allocation
|
page read and write
|
||
9FAE000
|
stack
|
page read and write
|
||
49A0000
|
heap
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
1A9000
|
stack
|
page read and write
|
||
5440000
|
heap
|
page read and write
|
||
1530000
|
trusted library allocation
|
page execute and read and write
|
||
59AB000
|
stack
|
page read and write
|
||
14B7000
|
trusted library allocation
|
page execute and read and write
|
||
50FA54E000
|
stack
|
page read and write
|
||
4A00000
|
trusted library section
|
page readonly
|
||
15B235F2000
|
trusted library allocation
|
page read and write
|
||
1AC4D000
|
stack
|
page read and write
|
||
1B555CB1000
|
heap
|
page read and write
|
||
16D6E8BE000
|
heap
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
7FF848E89000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
1B71F4BA000
|
trusted library allocation
|
page read and write
|
||
7FF848C70000
|
trusted library allocation
|
page execute and read and write
|
||
1160000
|
trusted library allocation
|
page read and write
|
||
1B7104E3000
|
trusted library allocation
|
page read and write
|
||
1540000
|
heap
|
page execute and read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
16D00227000
|
trusted library allocation
|
page read and write
|
||
118A000
|
trusted library allocation
|
page execute and read and write
|
||
3643000
|
trusted library allocation
|
page read and write
|
||
6778000
|
heap
|
page read and write
|
||
15B23C53000
|
trusted library allocation
|
page read and write
|
||
7FF848B42000
|
trusted library allocation
|
page read and write
|
||
1B567CDD000
|
trusted library allocation
|
page read and write
|
||
7FF848E99000
|
trusted library allocation
|
page read and write
|
||
15B3AC33000
|
heap
|
page read and write
|
||
1B727B76000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CF2000
|
trusted library allocation
|
page read and write
|
||
1B557805000
|
heap
|
page read and write
|
||
1342000
|
heap
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
4B207E000
|
stack
|
page read and write
|
||
FC5000
|
heap
|
page read and write
|
||
4031000
|
trusted library allocation
|
page read and write
|
||
16D00AD6000
|
trusted library allocation
|
page read and write
|
||
15B23564000
|
trusted library allocation
|
page read and write
|
||
14A2000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
7FF848D00000
|
trusted library allocation
|
page execute and read and write
|
||
1B558AB3000
|
trusted library allocation
|
page read and write
|
||
80D6000
|
trusted library allocation
|
page read and write
|
||
31334FE000
|
stack
|
page read and write
|
||
6FD000
|
trusted library allocation
|
page execute and read and write
|
||
960000
|
trusted library allocation
|
page read and write
|
||
24AD000
|
trusted library allocation
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
520000
|
unkown
|
page readonly
|
||
56AE000
|
trusted library allocation
|
page read and write
|
||
1B558DB5000
|
trusted library allocation
|
page read and write
|
||
4F7000
|
stack
|
page read and write
|
||
CDF000
|
stack
|
page read and write
|
||
4911209000
|
stack
|
page read and write
|
||
9C1000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page execute and read and write
|
||
16D01309000
|
trusted library allocation
|
page read and write
|
||
BD7000
|
heap
|
page read and write
|
||
16D10010000
|
trusted library allocation
|
page read and write
|
||
491017F000
|
stack
|
page read and write
|
||
4B338E000
|
stack
|
page read and write
|
||
16D0191E000
|
trusted library allocation
|
page read and write
|
||
16D70CE5000
|
heap
|
page read and write
|
||
159E000
|
stack
|
page read and write
|
||
6800000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
7FF848D32000
|
trusted library allocation
|
page read and write
|
||
2480000
|
trusted library allocation
|
page read and write
|
||
1174000
|
trusted library allocation
|
page read and write
|
||
16D00BE0000
|
trusted library allocation
|
page read and write
|
||
31336FB000
|
stack
|
page read and write
|
||
5770000
|
heap
|
page execute and read and write
|
||
16D70A20000
|
heap
|
page read and write
|
||
1B710BD3000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
16D70CE0000
|
heap
|
page read and write
|
||
50F99FE000
|
stack
|
page read and write
|
||
6D0000
|
trusted library allocation
|
page read and write
|
||
24A6000
|
trusted library allocation
|
page read and write
|
||
7AE000
|
heap
|
page read and write
|
||
561E000
|
stack
|
page read and write
|
||
6BF2000
|
trusted library allocation
|
page read and write
|
||
94F000
|
unkown
|
page read and write
|
||
7FF848E8C000
|
trusted library allocation
|
page read and write
|
||
5880000
|
heap
|
page read and write
|
||
3133BBB000
|
stack
|
page read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
24A1000
|
trusted library allocation
|
page read and write
|
||
99DE000
|
stack
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
491130E000
|
stack
|
page read and write
|
||
1B559815000
|
trusted library allocation
|
page read and write
|
||
50F9A7E000
|
stack
|
page read and write
|
||
4419000
|
trusted library allocation
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
7FF848B6B000
|
trusted library allocation
|
page read and write
|
||
636D000
|
stack
|
page read and write
|
||
126C3000
|
trusted library allocation
|
page read and write
|
||
15B20930000
|
trusted library allocation
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page read and write
|
||
5620000
|
heap
|
page execute and read and write
|
||
147D000
|
trusted library allocation
|
page execute and read and write
|
||
4910439000
|
stack
|
page read and write
|
There are 1501 hidden memdumps, click here to show them.