Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\GuardTech Solutions\K
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\GuardTech Solutions\LionGuard.js
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\GuardTech Solutions\LionGuard.scr
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\InnoSphere Dynamics\InnoSphere.scr
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\InnoSphere Dynamics\l
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[2].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\QwGWuQZ[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\fMb18eF[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1008733001\779ae05f2f.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1008738001\fMb18eF.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1008743001\QwGWuQZ.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1008744001\3907f97605.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1008745001\3ee5495637.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1008746001\04dc07bf76.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1008747001\c7f41aa061.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\662510\A
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\662510\Ryan.com
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\768032\Finish.com
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\768032\G
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\All
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Become
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Bermuda
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Blond
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Bt
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Cameras
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Candidates
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Client
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Contained
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Courts
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Dallas
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Defend
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Dist
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Distribution
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Ecommerce
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Editor
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Enabling
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Extensive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Falls
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Fw
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Howard
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Id
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Kg
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Lady
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Los
|
OpenPGP Public Key
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Love
|
DOS executable (COM)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Malta
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Mel
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Mental
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\More
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Myers
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Optimum
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Parameter
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Participation
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Principal
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Quantitative
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Raise
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Remedy
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Republicans
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Rocky
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Statement
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Strange
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Streams
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tablets
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tests
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tft
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Thursday
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tourist
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Transsexual
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Unit
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Vatican
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Vermont
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Webmaster
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\William
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Wow
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LionGuard.url
|
MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\GuardTech Solutions\LionGuard.js" >), ASCII text,
with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\InnoSphere Dynamics\InnoSphere.js
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\c7f41aa061.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Config
|
ASCII text, with very long lines (5591), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Config.cmd
|
ASCII text, with very long lines (5591), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Feeling
|
ASCII text, with very long lines (1181), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Feeling.cmd
|
ASCII text, with very long lines (1181), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InnoSphere.url
|
MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\InnoSphere Dynamics\InnoSphere.js" >), ASCII text,
with CRLF line terminators
|
dropped
|
||
C:\Windows\Tasks\skotes.job
|
data
|
dropped
|
||
Chrome Cache Entry: 135
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 136
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 137
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 138
|
ASCII text, with very long lines (65410)
|
downloaded
|
||
Chrome Cache Entry: 139
|
HTML document, ASCII text, with very long lines (639), with CRLF, LF line terminators
|
downloaded
|
||
Chrome Cache Entry: 140
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 141
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 142
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 143
|
ASCII text, with very long lines (52717), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 144
|
exported SGML document, ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 145
|
PNG image data, 533 x 478, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 146
|
MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
|
downloaded
|
||
Chrome Cache Entry: 147
|
ASCII text, with very long lines (46884)
|
downloaded
|
||
Chrome Cache Entry: 148
|
PNG image data, 658 x 480, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 149
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 150
|
PNG image data, 475 x 212, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 151
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 152
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1528x402, components
3
|
downloaded
|
||
Chrome Cache Entry: 153
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 154
|
Web Open Font Format (Version 2), TrueType, length 19696, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 155
|
ASCII text, with very long lines (33148), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 156
|
JSON data
|
downloaded
|
There are 103 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\1008733001\779ae05f2f.exe
|
"C:\Users\user\AppData\Local\Temp\1008733001\779ae05f2f.exe"
|
||
C:\Users\user\AppData\Local\Temp\1008738001\fMb18eF.exe
|
"C:\Users\user\AppData\Local\Temp\1008738001\fMb18eF.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c copy Config Config.cmd && Config.cmd
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /I "wrsa opssvc"
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c md 662510
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c copy /b ..\Cameras + ..\Webmaster + ..\Contained + ..\More + ..\Wow + ..\Kg + ..\Love + ..\Parameter + ..\Dallas +
..\Falls + ..\Principal + ..\Tft + ..\Enabling + ..\Id + ..\Raise + ..\Tests + ..\Fw + ..\Dist + ..\Optimum + ..\Editor +
..\Lady + ..\William + ..\Myers + ..\Distribution + ..\All + ..\Republicans + ..\Candidates + ..\Blond + ..\Bermuda + ..\Tablets
+ ..\Defend + ..\Statement + ..\Streams + ..\Extensive + ..\Ecommerce + ..\Tourist + ..\Transsexual + ..\Participation + ..\Strange
+ ..\Remedy + ..\Thursday + ..\Client + ..\Courts + ..\Malta + ..\Mel + ..\Quantitative A
|
||
C:\Users\user\AppData\Local\Temp\662510\Ryan.com
|
Ryan.com A
|
||
C:\Windows\System32\cmd.exe
|
cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LionGuard.url"
& echo URL="C:\Users\user\AppData\Local\GuardTech Solutions\LionGuard.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start
Menu\Programs\Startup\LionGuard.url" & exit
|
||
C:\Users\user\AppData\Local\Temp\1008743001\QwGWuQZ.exe
|
"C:\Users\user\AppData\Local\Temp\1008743001\QwGWuQZ.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c copy Feeling Feeling.cmd && Feeling.cmd
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /I "wrsa opssvc"
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\GuardTech Solutions\LionGuard.js"
|
||
C:\Users\user\AppData\Local\GuardTech Solutions\LionGuard.scr
|
"C:\Users\user\AppData\Local\GuardTech Solutions\LionGuard.scr" "C:\Users\user\AppData\Local\GuardTech Solutions\K"
|
||
C:\Users\user\AppData\Local\Temp\1008744001\3907f97605.exe
|
"C:\Users\user\AppData\Local\Temp\1008744001\3907f97605.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c md 768032
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c copy /b ..\Howard + ..\Los + ..\Become + ..\Mental + ..\Vermont + ..\Bt + ..\Vatican G
|
||
C:\Users\user\AppData\Local\Temp\768032\Finish.com
|
Finish.com G
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InnoSphere.url"
& echo URL="C:\Users\user\AppData\Local\InnoSphere Dynamics\InnoSphere.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start
Menu\Programs\Startup\InnoSphere.url" & exit
|
||
C:\Users\user\AppData\Local\Temp\1008745001\3ee5495637.exe
|
"C:\Users\user\AppData\Local\Temp\1008745001\3ee5495637.exe"
|
||
C:\Users\user\AppData\Local\Temp\1008744001\3907f97605.exe
|
"C:\Users\user\AppData\Local\Temp\1008744001\3907f97605.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2468 --field-trial-handle=2224,i,1451387400477687369,13867640751301481737,262144
/prefetch:8
|
||
C:\Users\user\AppData\Local\Temp\1008746001\04dc07bf76.exe
|
"C:\Users\user\AppData\Local\Temp\1008746001\04dc07bf76.exe"
|
||
C:\Users\user\AppData\Local\Temp\1008745001\3ee5495637.exe
|
"C:\Users\user\AppData\Local\Temp\1008745001\3ee5495637.exe"
|
||
C:\Users\user\AppData\Local\Temp\1008747001\c7f41aa061.exe
|
"C:\Users\user\AppData\Local\Temp\1008747001\c7f41aa061.exe"
|
||
C:\Users\user\AppData\Local\Temp\1008746001\04dc07bf76.exe
|
"C:\Users\user\AppData\Local\Temp\1008746001\04dc07bf76.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\choice.exe
|
choice /d y /t 5
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\choice.exe
|
choice /d y /t 5
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 49 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.206/
|
185.215.113.206
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
|
34.116.198.130
|
||
https://property-imper.sbs/api
|
104.21.33.116
|
||
http://185.215.113.206/68b591d6548ec281/sqlite3.dll
|
185.215.113.206
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
http://anglebug.com/7760ty
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhoneX
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpnu
|
unknown
|
||
http://31.41.244.11/files/6856384433/fMb18eF.exe
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=bX
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/hjh%
|
unknown
|
||
https://property-imper.sbs/api0R
|
unknown
|
||
https://aka.ms/feedback/report?space=61
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
http://www.entrust.net/rpa03
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions7
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://www.autoitscript.com/autoit3/X
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347w
|
unknown
|
||
https://chrome.google.com/webstoreX
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.icoresent.
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://drive-daily-3.corp.googlP8
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
http://31.41.244.11/files/6856384433/fMb18eF.exeXYZ0123456789
|
unknown
|
||
http://anglebug.com/7036a
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://unisolated.invalid/a
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://chrome.google.com/webstorekgejglhpjiefppelpmljglcjbhoiplfn
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
EaUMrTLEnhJoi.EaUMrTLEnhJoi
|
unknown
|
||
aXoOEZERyLjmcASXxTaZGLMxwNjgk.aXoOEZERyLjmcASXxTaZGLMxwNjgk
|
unknown
|
||
home.fvtekk5pn.top
|
34.116.198.130
|
||
services.addons.mozilla.org
|
151.101.1.91
|
||
property-imper.sbs
|
104.21.33.116
|
||
www.google.com
|
142.250.181.68
|
||
s-part-0035.t-0009.t-msedge.net
|
13.107.246.63
|
||
normandy-cdn.services.mozilla.com
|
35.201.103.21
|
||
fvtekk5pn.top
|
34.116.198.130
|
||
xmr-eu2.nanopool.org
|
51.15.89.13
|
||
js.monitor.azure.com
|
unknown
|
||
normandy.cdn.mozilla.net
|
unknown
|
||
mdec.nelreports.net
|
unknown
|
There are 3 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.43
|
unknown
|
Portugal
|
||
185.215.113.206
|
unknown
|
Portugal
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
104.21.33.116
|
property-imper.sbs
|
United States
|
||
34.116.198.130
|
home.fvtekk5pn.top
|
United States
|
||
142.250.181.68
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
31.41.244.11
|
unknown
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
3907f97605.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
3ee5495637.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
04dc07bf76.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
c7f41aa061.exe
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
|
JScriptSetScriptStateStarted
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
There are 10 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
691000
|
unkown
|
page execute and read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
4860000
|
direct allocation
|
page read and write
|
||
5120000
|
direct allocation
|
page read and write
|
||
4870000
|
direct allocation
|
page read and write
|
||
A1000
|
unkown
|
page execute and read and write
|
||
5060000
|
direct allocation
|
page read and write
|
||
691000
|
unkown
|
page execute and read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
256800320000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
5818001AC000
|
trusted library allocation
|
page read and write
|
||
282E000
|
heap
|
page read and write
|
||
1142000
|
heap
|
page read and write
|
||
3BBFBFE000
|
unkown
|
page readonly
|
||
4A30000
|
direct allocation
|
page execute and read and write
|
||
284C000
|
heap
|
page read and write
|
||
1505000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
17E4000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
3BC13FD000
|
stack
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
581800D6E000
|
trusted library allocation
|
page read and write
|
||
328E000
|
heap
|
page read and write
|
||
3732000
|
heap
|
page read and write
|
||
1163000
|
heap
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
4205000
|
trusted library allocation
|
page read and write
|
||
3BA9BFE000
|
unkown
|
page readonly
|
||
61E4000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
5818012EC000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
58180075C000
|
trusted library allocation
|
page read and write
|
||
256800698000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
5D99000
|
trusted library allocation
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
E19000
|
heap
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
581800C80000
|
trusted library allocation
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
1BB8B141000
|
heap
|
page read and write
|
||
5A86000
|
trusted library allocation
|
page read and write
|
||
581800368000
|
trusted library allocation
|
page read and write
|
||
1166000
|
heap
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
1BB8AB60000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
1BB8B0F4000
|
heap
|
page read and write
|
||
2AB8000
|
heap
|
page read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
5818003A4000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
74C9000
|
heap
|
page read and write
|
||
2940000
|
direct allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
51B000217000
|
direct allocation
|
page read and write
|
||
3BCA3F4000
|
stack
|
page read and write
|
||
3731000
|
heap
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
41FD000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
2AF9000
|
heap
|
page read and write
|
||
7CA000
|
heap
|
page read and write
|
||
BE1000
|
heap
|
page read and write
|
||
5818001AC000
|
trusted library allocation
|
page read and write
|
||
5A56000
|
trusted library allocation
|
page read and write
|
||
74CF000
|
heap
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
43D1000
|
heap
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
2095907F000
|
unkown
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
131D000
|
trusted library allocation
|
page read and write
|
||
20958F90000
|
unkown
|
page read and write
|
||
1780000
|
direct allocation
|
page read and write
|
||
1267000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
EB0000
|
direct allocation
|
page read and write
|
||
670000
|
direct allocation
|
page read and write
|
||
B94000
|
heap
|
page read and write
|
||
5A6A000
|
trusted library allocation
|
page read and write
|
||
7FF6183B5000
|
unkown
|
page readonly
|
||
3C4F000
|
stack
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
581800309000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
3981000
|
heap
|
page read and write
|
||
2833000
|
heap
|
page read and write
|
||
581800134000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5DB000
|
stack
|
page read and write
|
||
17E4000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
3BBB3FC000
|
stack
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
2F1000
|
unkown
|
page execute read
|
||
5818000BC000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
2E9D000
|
heap
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
17E4000
|
heap
|
page read and write
|
||
328E000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
3BC2BFE000
|
unkown
|
page readonly
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
3BB93FC000
|
stack
|
page read and write
|
||
22DB000
|
heap
|
page read and write
|
||
4A40000
|
direct allocation
|
page execute and read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
256800658000
|
trusted library allocation
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
2AF3000
|
heap
|
page read and write
|
||
5591000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
direct allocation
|
page read and write
|
||
14D3000
|
heap
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
1BB8AB9C000
|
heap
|
page read and write
|
||
1BB8F2C0000
|
heap
|
page read and write
|
||
7571000
|
heap
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
1F729685000
|
heap
|
page read and write
|
||
17E4000
|
heap
|
page read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
505F000
|
stack
|
page read and write
|
||
3BC53FE000
|
stack
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
3C4000
|
unkown
|
page readonly
|
||
27AF000
|
stack
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
607F000
|
stack
|
page read and write
|
||
55CB000
|
trusted library allocation
|
page read and write
|
||
4A4F000
|
stack
|
page read and write
|
||
3BA13FE000
|
stack
|
page read and write
|
||
1265000
|
trusted library allocation
|
page read and write
|
||
2095A081000
|
unkown
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
4FDF000
|
stack
|
page read and write
|
||
581800EBC000
|
trusted library allocation
|
page read and write
|
||
256800220000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
49C0000
|
direct allocation
|
page execute and read and write
|
||
1F729480000
|
heap
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
581800E58000
|
trusted library allocation
|
page read and write
|
||
5818005B0000
|
trusted library allocation
|
page read and write
|
||
2E93000
|
heap
|
page read and write
|
||
581800D78000
|
trusted library allocation
|
page read and write
|
||
256800380000
|
trusted library allocation
|
page read and write
|
||
581800FEC000
|
trusted library allocation
|
page read and write
|
||
581800358000
|
trusted library allocation
|
page read and write
|
||
58180120C000
|
trusted library allocation
|
page read and write
|
||
2275CB44000
|
heap
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
374F000
|
stack
|
page read and write
|
||
C52000
|
unkown
|
page execute and write copy
|
||
3BBF3FE000
|
stack
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
581800FB0000
|
trusted library allocation
|
page read and write
|
||
2AFC000
|
heap
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
414F000
|
stack
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
41FA000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
5F7F000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
5818002F0000
|
trusted library allocation
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
284F000
|
heap
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
3C0000
|
unkown
|
page write copy
|
||
5818012C8000
|
trusted library allocation
|
page read and write
|
||
75EC000
|
heap
|
page read and write
|
||
2568006CC000
|
trusted library allocation
|
page read and write
|
||
3732000
|
heap
|
page read and write
|
||
2EA1000
|
heap
|
page read and write
|
||
2960000
|
direct allocation
|
page read and write
|
||
581800658000
|
trusted library allocation
|
page read and write
|
||
5ABA000
|
trusted library allocation
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
5700000
|
remote allocation
|
page read and write
|
||
5818004F8000
|
trusted library allocation
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
2095A15C000
|
unkown
|
page read and write
|
||
168C000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
2568006E4000
|
trusted library allocation
|
page read and write
|
||
256800390000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
15BE000
|
heap
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
58180000C000
|
trusted library allocation
|
page read and write
|
||
1BB8ABC4000
|
heap
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
1166000
|
heap
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
58180047C000
|
trusted library allocation
|
page read and write
|
||
17E4000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
BC2000
|
heap
|
page read and write
|
||
14D7000
|
heap
|
page read and write
|
||
1BB8B080000
|
heap
|
page read and write
|
||
2275C900000
|
heap
|
page read and write
|
||
5080000
|
heap
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
3BA23FE000
|
stack
|
page read and write
|
||
5818007D4000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
150E000
|
trusted library allocation
|
page read and write
|
||
42306FE000
|
stack
|
page read and write
|
||
5818003AC000
|
trusted library allocation
|
page read and write
|
||
1BB89DD0000
|
unkown
|
page read and write
|
||
581800504000
|
trusted library allocation
|
page read and write
|
||
159B000
|
heap
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
3BCBBFE000
|
unkown
|
page readonly
|
||
2EEF000
|
stack
|
page read and write
|
||
2095A081000
|
unkown
|
page read and write
|
||
2095A580000
|
unkown
|
page read and write
|
||
2940000
|
direct allocation
|
page read and write
|
||
3BB83FC000
|
stack
|
page read and write
|
||
5CDC00294000
|
trusted library allocation
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
1BB8B146000
|
heap
|
page read and write
|
||
1475000
|
heap
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
1BB8ABC4000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
5CDC002A0000
|
trusted library allocation
|
page read and write
|
||
5A9D000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
256800654000
|
trusted library allocation
|
page read and write
|
||
15A2000
|
heap
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
1F7294D3000
|
heap
|
page read and write
|
||
1BB8B0FC000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
83E000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
1F7294DC000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
C04000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
1BB878A0000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
691000
|
unkown
|
page execute and write copy
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
E1D000
|
unkown
|
page readonly
|
||
5818000E4000
|
trusted library allocation
|
page read and write
|
||
581800801000
|
trusted library allocation
|
page read and write
|
||
9AA000
|
unkown
|
page write copy
|
||
594000
|
heap
|
page read and write
|
||
5818001AC000
|
trusted library allocation
|
page read and write
|
||
2E91000
|
heap
|
page read and write
|
||
2095A3C7000
|
unkown
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
55ED000
|
trusted library allocation
|
page read and write
|
||
3D91000
|
heap
|
page read and write
|
||
1265000
|
trusted library allocation
|
page read and write
|
||
40C000
|
unkown
|
page read and write
|
||
5A58000
|
trusted library allocation
|
page read and write
|
||
1F7294E2000
|
heap
|
page read and write
|
||
256800718000
|
trusted library allocation
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
288E000
|
stack
|
page read and write
|
||
325E000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
49B0000
|
direct allocation
|
page execute and read and write
|
||
14ED000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
14DF000
|
heap
|
page read and write
|
||
581800F84000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
581800368000
|
trusted library allocation
|
page read and write
|
||
14D2000
|
heap
|
page read and write
|
||
581800E68000
|
trusted library allocation
|
page read and write
|
||
581801090000
|
trusted library allocation
|
page read and write
|
||
581800E84000
|
trusted library allocation
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
1507000
|
trusted library allocation
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
765B000
|
heap
|
page read and write
|
||
58180018C000
|
trusted library allocation
|
page read and write
|
||
2095A081000
|
unkown
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
396000
|
unkown
|
page execute and read and write
|
||
EE4000
|
heap
|
page read and write
|
||
4209000
|
trusted library allocation
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
5CDC00270000
|
trusted library allocation
|
page read and write
|
||
2568006FC000
|
trusted library allocation
|
page read and write
|
||
292C000
|
stack
|
page read and write
|
||
3A0E000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
1BB8ABC4000
|
heap
|
page read and write
|
||
1780000
|
direct allocation
|
page read and write
|
||
581800F5C000
|
trusted library allocation
|
page read and write
|
||
2095A351000
|
unkown
|
page read and write
|
||
43CF000
|
stack
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
2568006C4000
|
trusted library allocation
|
page read and write
|
||
1780000
|
direct allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
807000
|
heap
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
2568002FC000
|
trusted library allocation
|
page read and write
|
||
5A99000
|
trusted library allocation
|
page read and write
|
||
5CDC002BC000
|
trusted library allocation
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
3BB7BFE000
|
unkown
|
page readonly
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
581800DA8000
|
trusted library allocation
|
page read and write
|
||
58180081C000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
51B00020C000
|
direct allocation
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
1BB8776B000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
530000
|
direct allocation
|
page read and write
|
||
327B000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
581800A0C000
|
trusted library allocation
|
page read and write
|
||
581800C38000
|
trusted library allocation
|
page read and write
|
||
20B0000
|
trusted library allocation
|
page read and write
|
||
256800210000
|
trusted library allocation
|
page read and write
|
||
4860000
|
trusted library allocation
|
page read and write
|
||
284C000
|
heap
|
page read and write
|
||
1BB875E0000
|
heap
|
page readonly
|
||
43D1000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
C0A000
|
heap
|
page read and write
|
||
581800F1C000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
58180020C000
|
trusted library allocation
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
1F7294DE000
|
heap
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
2095A1E1000
|
unkown
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
2095906A000
|
unkown
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
1BB8B0EF000
|
heap
|
page read and write
|
||
586000
|
heap
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
41ED000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
D24000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
3BCABFE000
|
unkown
|
page readonly
|
||
1BB8AB87000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
581800F68000
|
trusted library allocation
|
page read and write
|
||
1BB8B12B000
|
heap
|
page read and write
|
||
1BB87678000
|
heap
|
page read and write
|
||
27EF000
|
stack
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
126A000
|
trusted library allocation
|
page read and write
|
||
15C6000
|
heap
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
581800784000
|
trusted library allocation
|
page read and write
|
||
5A98000
|
trusted library allocation
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
3BB33FD000
|
stack
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
B34000
|
unkown
|
page execute and write copy
|
||
5818012D4000
|
trusted library allocation
|
page read and write
|
||
1780000
|
direct allocation
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
581800DCC000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
530000
|
direct allocation
|
page read and write
|
||
256800788000
|
trusted library allocation
|
page read and write
|
||
5CDC002BC000
|
trusted library allocation
|
page read and write
|
||
256800248000
|
trusted library allocation
|
page read and write
|
||
2F1000
|
unkown
|
page execute read
|
||
5818012C0000
|
trusted library allocation
|
page read and write
|
||
599C79D000
|
stack
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
2095A231000
|
unkown
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
328E000
|
heap
|
page read and write
|
||
294F000
|
stack
|
page read and write
|
||
20B0000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
114B000
|
heap
|
page read and write
|
||
2F2C000
|
stack
|
page read and write
|
||
5818002D0000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
direct allocation
|
page read and write
|
||
1BB8B112000
|
heap
|
page read and write
|
||
5818003E8000
|
trusted library allocation
|
page read and write
|
||
55ED000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
29C0D054000
|
heap
|
page read and write
|
||
1BB8AB98000
|
heap
|
page read and write
|
||
14E7000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
5818000F4000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
271E000
|
stack
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
3BC0BFE000
|
unkown
|
page readonly
|
||
43D1000
|
heap
|
page read and write
|
||
1BB91820000
|
trusted library section
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
D81000
|
unkown
|
page execute read
|
||
4BF1000
|
heap
|
page read and write
|
||
1166000
|
heap
|
page read and write
|
||
5AEC000
|
trusted library allocation
|
page read and write
|
||
1BB8775C000
|
heap
|
page read and write
|
||
586000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
581800368000
|
trusted library allocation
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
3BB8BFE000
|
unkown
|
page readonly
|
||
2C2F000
|
stack
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
51B000290000
|
direct allocation
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
1BB8B16D000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
5CDC00235000
|
trusted library allocation
|
page read and write
|
||
51B000201000
|
direct allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
581800CCC000
|
trusted library allocation
|
page read and write
|
||
581800C01000
|
trusted library allocation
|
page read and write
|
||
581800EB0000
|
trusted library allocation
|
page read and write
|
||
20959BF3000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
29C0D350000
|
unkown
|
page read and write
|
||
256800374000
|
trusted library allocation
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
5818002C0000
|
trusted library allocation
|
page read and write
|
||
5818010F8000
|
trusted library allocation
|
page read and write
|
||
4C24000
|
direct allocation
|
page read and write
|
||
691000
|
unkown
|
page execute and write copy
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
222E000
|
stack
|
page read and write
|
||
D9000
|
unkown
|
page execute and read and write
|
||
6A21000
|
heap
|
page read and write
|
||
5818004BC000
|
trusted library allocation
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
1BB8B0CC000
|
heap
|
page read and write
|
||
5607000
|
trusted library allocation
|
page read and write
|
||
1F729488000
|
heap
|
page read and write
|
||
866000
|
unkown
|
page write copy
|
||
5A8C000
|
trusted library allocation
|
page read and write
|
||
1311000
|
trusted library allocation
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
281F000
|
stack
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
1BB91852000
|
trusted library section
|
page read and write
|
||
1302000
|
trusted library allocation
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
4CEF000
|
stack
|
page read and write
|
||
256800624000
|
trusted library allocation
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
EB0000
|
direct allocation
|
page read and write
|
||
20959BF3000
|
heap
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page read and write
|
||
42304FE000
|
stack
|
page read and write
|
||
51B0002A8000
|
direct allocation
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
581800198000
|
trusted library allocation
|
page read and write
|
||
55F4000
|
trusted library allocation
|
page read and write
|
||
48C1000
|
direct allocation
|
page read and write
|
||
581800C90000
|
trusted library allocation
|
page read and write
|
||
1F72968C000
|
heap
|
page read and write
|
||
1267000
|
trusted library allocation
|
page read and write
|
||
49D0000
|
direct allocation
|
page execute and read and write
|
||
581800398000
|
trusted library allocation
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
2998000
|
heap
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
41DE000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
7619000
|
heap
|
page read and write
|
||
429E000
|
trusted library allocation
|
page read and write
|
||
25680060C000
|
trusted library allocation
|
page read and write
|
||
256800744000
|
trusted library allocation
|
page read and write
|
||
58180029A000
|
trusted library allocation
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
256800330000
|
trusted library allocation
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
2EB3000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
3B9F3FF000
|
stack
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
1BB8B0E4000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5CDC002F4000
|
trusted library allocation
|
page read and write
|
||
58C000
|
heap
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
146B000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
1BB91F76000
|
trusted library section
|
page read and write
|
||
16A9000
|
heap
|
page read and write
|
||
20958830000
|
unkown
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
55CD000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
49B0000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
256800640000
|
trusted library allocation
|
page read and write
|
||
2B20000
|
heap
|
page read and write
|
||
1142000
|
heap
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
5818010E8000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
C52000
|
unkown
|
page execute and write copy
|
||
4BBF000
|
stack
|
page read and write
|
||
581800C50000
|
trusted library allocation
|
page read and write
|
||
1BB91710000
|
trusted library allocation
|
page read and write
|
||
2EEC000
|
stack
|
page read and write
|
||
5A9B000
|
trusted library allocation
|
page read and write
|
||
17E4000
|
heap
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
581801140000
|
trusted library allocation
|
page read and write
|
||
760C000
|
heap
|
page read and write
|
||
256800688000
|
trusted library allocation
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
15BB000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1D5C0000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
5D9B000
|
trusted library allocation
|
page read and write
|
||
7622000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
5156000
|
direct allocation
|
page read and write
|
||
690000
|
unkown
|
page read and write
|
||
4A30000
|
direct allocation
|
page execute and read and write
|
||
126B000
|
trusted library allocation
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
5591000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
1BB8B11B000
|
heap
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
55CE000
|
trusted library allocation
|
page read and write
|
||
3268000
|
heap
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
4453000
|
trusted library allocation
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
41FF000
|
trusted library allocation
|
page read and write
|
||
581800DA0000
|
trusted library allocation
|
page read and write
|
||
1F729670000
|
heap
|
page read and write
|
||
581800CCC000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
3BA83FB000
|
stack
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
256800354000
|
trusted library allocation
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
278F000
|
stack
|
page read and write
|
||
20958F93000
|
unkown
|
page read and write
|
||
1266000
|
trusted library allocation
|
page read and write
|
||
4AE1000
|
direct allocation
|
page read and write
|
||
41F4000
|
trusted library allocation
|
page read and write
|
||
55AF000
|
trusted library allocation
|
page read and write
|
||
3BB43FE000
|
stack
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
5A5B000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
818000
|
heap
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
29C0CE51000
|
heap
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
5CDC002C0000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
5818003D8000
|
trusted library allocation
|
page read and write
|
||
581800C70000
|
trusted library allocation
|
page read and write
|
||
6F9000
|
unkown
|
page write copy
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
256800310000
|
trusted library allocation
|
page read and write
|
||
263000
|
unkown
|
page execute and read and write
|
||
5AAB000
|
trusted library allocation
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
5A87000
|
trusted library allocation
|
page read and write
|
||
2095A1FC000
|
unkown
|
page read and write
|
||
5A5E000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
direct allocation
|
page read and write
|
||
5A5A000
|
trusted library allocation
|
page read and write
|
||
1BB8F2CF000
|
heap
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
2095A085000
|
unkown
|
page read and write
|
||
38C000
|
unkown
|
page readonly
|
||
2568007C8000
|
trusted library allocation
|
page read and write
|
||
883000
|
unkown
|
page execute and read and write
|
||
504000
|
heap
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
5A64000
|
trusted library allocation
|
page read and write
|
||
285E000
|
heap
|
page read and write
|
||
3CB2000
|
heap
|
page read and write
|
||
1BB9100E000
|
trusted library section
|
page read and write
|
||
578000
|
heap
|
page read and write
|
||
41F8000
|
trusted library allocation
|
page read and write
|
||
3BBA3FC000
|
stack
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
58180022C000
|
trusted library allocation
|
page read and write
|
||
294F000
|
unkown
|
page read and write
|
||
5AFC000
|
trusted library allocation
|
page read and write
|
||
74C3000
|
heap
|
page read and write
|
||
41F2000
|
trusted library allocation
|
page read and write
|
||
29C0CD3B000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
5A64000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
25680033C000
|
trusted library allocation
|
page read and write
|
||
285E000
|
heap
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
5818001B4000
|
trusted library allocation
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
15BB000
|
heap
|
page read and write
|
||
14E7000
|
heap
|
page read and write
|
||
14C4000
|
heap
|
page read and write
|
||
3BC000
|
unkown
|
page read and write
|
||
1780000
|
direct allocation
|
page read and write
|
||
115B000
|
heap
|
page read and write
|
||
26A7000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
74F000
|
stack
|
page read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
328E000
|
stack
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
5818006B0000
|
trusted library allocation
|
page read and write
|
||
581800D10000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
150B000
|
trusted library allocation
|
page read and write
|
||
15BB000
|
heap
|
page read and write
|
||
20956B23000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
74C0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
369000
|
unkown
|
page execute and read and write
|
||
C10000
|
heap
|
page read and write
|
||
29C0D1E1000
|
unkown
|
page read and write
|
||
5818003AC000
|
trusted library allocation
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
55B9000
|
trusted library allocation
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
5A64000
|
trusted library allocation
|
page read and write
|
||
581800588000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
5A6A000
|
trusted library allocation
|
page read and write
|
||
126B000
|
trusted library allocation
|
page read and write
|
||
74C4000
|
heap
|
page read and write
|
||
1BB91F92000
|
trusted library section
|
page read and write
|
||
2D1E000
|
stack
|
page read and write
|
||
256800668000
|
trusted library allocation
|
page read and write
|
||
51B00023C000
|
direct allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
1BB90EE3000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
5A64000
|
trusted library allocation
|
page read and write
|
||
E07000
|
heap
|
page read and write
|
||
5CDC00288000
|
trusted library allocation
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
581800C7C000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
1BB90DA0000
|
heap
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
5818006FD000
|
trusted library allocation
|
page read and write
|
||
1265000
|
trusted library allocation
|
page read and write
|
||
40C000
|
unkown
|
page write copy
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
20958830000
|
unkown
|
page read and write
|
||
3D91000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
5818003B8000
|
trusted library allocation
|
page read and write
|
||
5CDC002BC000
|
trusted library allocation
|
page read and write
|
||
1F7294BF000
|
heap
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
5D40000
|
heap
|
page read and write
|
||
1607000
|
heap
|
page read and write
|
||
29C0D366000
|
unkown
|
page read and write
|
||
1BB8AB98000
|
heap
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
5CDC00264000
|
trusted library allocation
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
5700000
|
remote allocation
|
page read and write
|
||
581800F30000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
5818009E0000
|
trusted library allocation
|
page read and write
|
||
5818001AC000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
581800144000
|
trusted library allocation
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
504000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
14D3000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
3732000
|
heap
|
page read and write
|
||
61E1000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
74CB000
|
heap
|
page read and write
|
||
1780000
|
direct allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
43E1000
|
heap
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
29C0D37C000
|
unkown
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
4F9E000
|
stack
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
5818009C4000
|
trusted library allocation
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
2940000
|
direct allocation
|
page read and write
|
||
1BB8ABC4000
|
heap
|
page read and write
|
||
581800DA8000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
41DC000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
25EE000
|
stack
|
page read and write
|
||
2FB0000
|
direct allocation
|
page read and write
|
||
B34000
|
unkown
|
page execute and write copy
|
||
4D20000
|
heap
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
1145000
|
heap
|
page read and write
|
||
581800AF8000
|
trusted library allocation
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
74C4000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
5CDC002B0000
|
trusted library allocation
|
page read and write
|
||
30F6000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
5818008EC000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
1132000
|
heap
|
page read and write
|
||
150B000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
581800C90000
|
trusted library allocation
|
page read and write
|
||
1BB8B10B000
|
heap
|
page read and write
|
||
55BF000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
544000
|
unkown
|
page execute and write copy
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
581800CF4000
|
trusted library allocation
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page readonly
|
||
2C6F000
|
stack
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
3BC03FD000
|
stack
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
3BAF3FE000
|
stack
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
3268000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
29C0CF43000
|
heap
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
29C0CD3B000
|
heap
|
page read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
15BB000
|
heap
|
page read and write
|
||
3A8000
|
heap
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
2568006B8000
|
trusted library allocation
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
122F000
|
stack
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
1263000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
115B000
|
heap
|
page read and write
|
||
143E000
|
stack
|
page read and write
|
||
5700000
|
remote allocation
|
page read and write
|
||
20958830000
|
unkown
|
page read and write
|
||
2095A20E000
|
unkown
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
38C000
|
unkown
|
page readonly
|
||
29C09CDF000
|
heap
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
1BB8B101000
|
heap
|
page read and write
|
||
20B0000
|
trusted library allocation
|
page read and write
|
||
58180075C000
|
trusted library allocation
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
959000
|
unkown
|
page execute and read and write
|
||
2095A081000
|
unkown
|
page read and write
|
||
5A68000
|
trusted library allocation
|
page read and write
|
||
581800998000
|
trusted library allocation
|
page read and write
|
||
5818001D0000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
581800F88000
|
trusted library allocation
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
2FB0000
|
direct allocation
|
page read and write
|
||
75A6000
|
heap
|
page read and write
|
||
4B60000
|
heap
|
page read and write
|
||
29C0D1E1000
|
unkown
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
50C1000
|
direct allocation
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
20959E38000
|
heap
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
98C000
|
unkown
|
page execute and read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
2095A209000
|
unkown
|
page read and write
|
||
20956B34000
|
heap
|
page read and write
|
||
581800BD4000
|
trusted library allocation
|
page read and write
|
||
1502000
|
trusted library allocation
|
page read and write
|
||
2095A220000
|
unkown
|
page read and write
|
||
463C000
|
stack
|
page read and write
|
||
55E6000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
direct allocation
|
page read and write
|
||
26FD000
|
stack
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
58180020C000
|
trusted library allocation
|
page read and write
|
||
581800210000
|
trusted library allocation
|
page read and write
|
||
1BB8ABC4000
|
heap
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
31FF000
|
stack
|
page read and write
|
||
20958830000
|
unkown
|
page read and write
|
||
29C0D33A000
|
unkown
|
page read and write
|
||
1BB8B10B000
|
heap
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
768B000
|
heap
|
page read and write
|
||
5A96000
|
trusted library allocation
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
43D1000
|
heap
|
page read and write
|
||
7FF6D84FE000
|
unkown
|
page write copy
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
61E4000
|
heap
|
page read and write
|
||
581800D5C000
|
trusted library allocation
|
page read and write
|
||
150D000
|
trusted library allocation
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
256800644000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
4201000
|
trusted library allocation
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
5818008A0000
|
trusted library allocation
|
page read and write
|
||
813C000
|
stack
|
page read and write
|
||
5598000
|
trusted library allocation
|
page read and write
|
||
581800CC0000
|
trusted library allocation
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
256800320000
|
trusted library allocation
|
page read and write
|
||
3BC5BFE000
|
unkown
|
page readonly
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
20958F90000
|
unkown
|
page read and write
|
||
3BB03FE000
|
stack
|
page read and write
|
||
7608000
|
heap
|
page read and write
|
||
EB0000
|
direct allocation
|
page read and write
|
||
58180129C000
|
trusted library allocation
|
page read and write
|
||
46AF000
|
stack
|
page read and write
|
||
1510000
|
trusted library allocation
|
page read and write
|
||
581800298000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
25680075C000
|
trusted library allocation
|
page read and write
|
||
1BB8B109000
|
heap
|
page read and write
|
||
3BA53FA000
|
stack
|
page read and write
|
||
3BAA3FE000
|
stack
|
page read and write
|
||
290E000
|
stack
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
75B3000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
55B000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
1BB8ABB3000
|
heap
|
page read and write
|
||
581800CDC000
|
trusted library allocation
|
page read and write
|
||
2670000
|
direct allocation
|
page execute and read and write
|
||
67B0000
|
heap
|
page read and write
|
||
3731000
|
heap
|
page read and write
|
||
3BBD3FB000
|
stack
|
page read and write
|
||
2568002D4000
|
trusted library allocation
|
page read and write
|
||
1BB87853000
|
heap
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
20958F90000
|
unkown
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
14ED000
|
heap
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
2960000
|
direct allocation
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
74CA000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
53A000
|
heap
|
page read and write
|
||
581800560000
|
trusted library allocation
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
5060000
|
direct allocation
|
page read and write
|
||
20B0000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
55AF000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
BE1000
|
heap
|
page read and write
|
||
5C31000
|
trusted library allocation
|
page read and write
|
||
56E000
|
heap
|
page read and write
|
||
29C0CDBB000
|
heap
|
page read and write
|
||
20958F90000
|
unkown
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
2950000
|
direct allocation
|
page execute and read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
14F2000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
20958830000
|
unkown
|
page read and write
|
||
284C000
|
heap
|
page read and write
|
||
5818003A4000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
A1000
|
unkown
|
page execute and write copy
|
||
1BB8B107000
|
heap
|
page read and write
|
||
2EA1000
|
heap
|
page read and write
|
||
EB0000
|
direct allocation
|
page read and write
|
||
5CDC002A0000
|
trusted library allocation
|
page read and write
|
||
51B0002D0000
|
direct allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
1BB8ABB3000
|
heap
|
page read and write
|
||
17A0000
|
direct allocation
|
page read and write
|
||
3234000
|
heap
|
page read and write
|
||
256800250000
|
trusted library allocation
|
page read and write
|
||
2568002C8000
|
trusted library allocation
|
page read and write
|
||
1265000
|
trusted library allocation
|
page read and write
|
||
20958830000
|
unkown
|
page read and write
|
||
1F7294B7000
|
heap
|
page read and write
|
||
BE1000
|
heap
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
581800DF0000
|
trusted library allocation
|
page read and write
|
||
55C6000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
29C0D1E1000
|
unkown
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
3D8F000
|
stack
|
page read and write
|
||
581800D2C000
|
trusted library allocation
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
581800154000
|
trusted library allocation
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
20959185000
|
heap
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
581800F5C000
|
trusted library allocation
|
page read and write
|
||
5A5C000
|
trusted library allocation
|
page read and write
|
||
B0E000
|
unkown
|
page execute and write copy
|
||
55D8000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
49D0000
|
direct allocation
|
page execute and read and write
|
||
581800CCC000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
25680080C000
|
trusted library allocation
|
page read and write
|
||
29C0CF6F000
|
heap
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
3BA6BFE000
|
unkown
|
page readonly
|
||
1F7294E3000
|
heap
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
55AF000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
4600000
|
heap
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
126D000
|
trusted library allocation
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
25680020C000
|
trusted library allocation
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
3BB9BFE000
|
unkown
|
page readonly
|
||
43D1000
|
heap
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
4461000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
2230000
|
heap
|
page read and write
|
||
159A000
|
heap
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
1BB87880000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
1475000
|
heap
|
page read and write
|
||
5AB4000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
581800B04000
|
trusted library allocation
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
58180066C000
|
trusted library allocation
|
page read and write
|
||
75A9000
|
direct allocation
|
page read and write
|
||
BF6000
|
heap
|
page read and write
|
||
1BB8ABB3000
|
heap
|
page read and write
|
||
581800401000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
581800D44000
|
trusted library allocation
|
page read and write
|
||
1BB8F2C4000
|
heap
|
page read and write
|
||
581800B78000
|
trusted library allocation
|
page read and write
|
||
5A5E000
|
trusted library allocation
|
page read and write
|
||
1471000
|
heap
|
page read and write
|
||
581800228000
|
trusted library allocation
|
page read and write
|
||
7686000
|
heap
|
page read and write
|
||
20959BF3000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
126F000
|
trusted library allocation
|
page read and write
|
||
1BB8AB96000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
256800630000
|
trusted library allocation
|
page read and write
|
||
3BA63FE000
|
stack
|
page read and write
|
||
20958F90000
|
unkown
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5818001B4000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
581800B85000
|
trusted library allocation
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
1F7294AA000
|
heap
|
page read and write
|
||
581800A24000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
581800FB0000
|
trusted library allocation
|
page read and write
|
||
77CF000
|
heap
|
page read and write
|
||
5AC8000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
2940000
|
direct allocation
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
5A6A000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
2568002F4000
|
trusted library allocation
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
581800BF8000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
20959D26000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
15C3000
|
heap
|
page read and write
|
||
581800310000
|
trusted library allocation
|
page read and write
|
||
1F7294DB000
|
heap
|
page read and write
|
||
7FF618301000
|
unkown
|
page execute read
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
2394000
|
heap
|
page read and write
|
||
1508000
|
trusted library allocation
|
page read and write
|
||
3B2000
|
unkown
|
page readonly
|
||
2D10000
|
direct allocation
|
page read and write
|
||
3FE000
|
stack
|
page read and write
|
||
2568002C0000
|
trusted library allocation
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
direct allocation
|
page read and write
|
||
581800DCC000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
direct allocation
|
page read and write
|
||
1BB91831000
|
trusted library section
|
page read and write
|
||
5818012A8000
|
trusted library allocation
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
74C6000
|
heap
|
page read and write
|
||
1271000
|
trusted library allocation
|
page read and write
|
||
5080000
|
direct allocation
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
5CDC002BC000
|
trusted library allocation
|
page read and write
|
||
5A82000
|
trusted library allocation
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
3BA3BFE000
|
unkown
|
page readonly
|
||
27F0000
|
heap
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
1BB8B101000
|
heap
|
page read and write
|
||
5AB5000
|
trusted library allocation
|
page read and write
|
||
8975000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
49B0000
|
direct allocation
|
page execute and read and write
|
||
5AC8000
|
trusted library allocation
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
5818001EC000
|
trusted library allocation
|
page read and write
|
||
20B0000
|
trusted library allocation
|
page read and write
|
||
1BB8B0E1000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
1269000
|
trusted library allocation
|
page read and write
|
||
E0B000
|
heap
|
page read and write
|
||
581800F68000
|
trusted library allocation
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
1F7294D3000
|
heap
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
51B000220000
|
direct allocation
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
767E000
|
heap
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
1034000
|
heap
|
page read and write
|
||
581800CCC000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
1269000
|
trusted library allocation
|
page read and write
|
||
2AF9000
|
heap
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
1BB8AB9C000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
2800000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
3D91000
|
heap
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
5818004EC000
|
trusted library allocation
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
4CF0000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
14EB000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
3BC83FA000
|
stack
|
page read and write
|
||
58180066D000
|
trusted library allocation
|
page read and write
|
||
5818006D0000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
1510000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
75C2000
|
heap
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
3BB3BFE000
|
unkown
|
page readonly
|
||
3287000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
581800C0C000
|
trusted library allocation
|
page read and write
|
||
581800718000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
5818001D4000
|
trusted library allocation
|
page read and write
|
||
256800684000
|
trusted library allocation
|
page read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
5818003A4000
|
trusted library allocation
|
page read and write
|
||
581800368000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
74C3000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
5CDC00201000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
5AE2000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
5A9B000
|
trusted library allocation
|
page read and write
|
||
115B000
|
heap
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
5818008D0000
|
trusted library allocation
|
page read and write
|
||
61BF000
|
stack
|
page read and write
|
||
20958830000
|
unkown
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
6F2000
|
unkown
|
page execute and read and write
|
||
2707000
|
heap
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
74CF000
|
heap
|
page read and write
|
||
1132000
|
heap
|
page read and write
|
||
29C0CE67000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
285E000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
737000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
1509000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
581800304000
|
trusted library allocation
|
page read and write
|
||
CA9000
|
stack
|
page read and write
|
||
5A5E000
|
trusted library allocation
|
page read and write
|
||
58180060C000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
3BB5BFE000
|
unkown
|
page readonly
|
||
74C0000
|
heap
|
page read and write
|
||
5CDC002C0000
|
trusted library allocation
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
17E4000
|
heap
|
page read and write
|
||
581800BB8000
|
trusted library allocation
|
page read and write
|
||
284C000
|
heap
|
page read and write
|
||
5AA3000
|
trusted library allocation
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
1509000
|
trusted library allocation
|
page read and write
|
||
2829000
|
heap
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
114C000
|
heap
|
page read and write
|
||
5818007E4000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
5B58000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
2AFC000
|
heap
|
page read and write
|
||
581800FC0000
|
trusted library allocation
|
page read and write
|
||
2568006B0000
|
trusted library allocation
|
page read and write
|
||
88E000
|
stack
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
1269000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
74CA000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
1305000
|
trusted library allocation
|
page read and write
|
||
37D000
|
unkown
|
page execute and write copy
|
||
2940000
|
direct allocation
|
page read and write
|
||
256800368000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
581800F3C000
|
trusted library allocation
|
page read and write
|
||
58180009C000
|
trusted library allocation
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
803B000
|
stack
|
page read and write
|
||
99B000
|
unkown
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
2AD2000
|
heap
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
1598000
|
heap
|
page read and write
|
||
14E1000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page readonly
|
||
4367000
|
trusted library allocation
|
page read and write
|
||
1BB8AB91000
|
heap
|
page read and write
|
||
581801108000
|
trusted library allocation
|
page read and write
|
||
1471000
|
heap
|
page read and write
|
||
1309000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
2095A37E000
|
unkown
|
page read and write
|
||
581800A18000
|
trusted library allocation
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
1BB90EE0000
|
heap
|
page read and write
|
||
55F3000
|
trusted library allocation
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
3248000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
20956B53000
|
heap
|
page read and write
|
||
1BB90D87000
|
unclassified section
|
page read and write
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
5CDC00260000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
256800700000
|
trusted library allocation
|
page read and write
|
||
1BB8776A000
|
heap
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
1BB91BBE000
|
trusted library section
|
page read and write
|
||
1BB8B0E4000
|
heap
|
page read and write
|
||
49F0000
|
direct allocation
|
page execute and read and write
|
||
D44000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
1D6F000
|
stack
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
EB0000
|
direct allocation
|
page read and write
|
||
5C29000
|
trusted library allocation
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
5818006A8000
|
trusted library allocation
|
page read and write
|
||
29C0CE3B000
|
heap
|
page read and write
|
||
55C7000
|
trusted library allocation
|
page read and write
|
||
13DB000
|
stack
|
page read and write
|
||
20959C61000
|
heap
|
page read and write
|
||
1F7294F2000
|
heap
|
page read and write
|
||
581800E01000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
581800494000
|
trusted library allocation
|
page read and write
|
||
5A8B000
|
trusted library allocation
|
page read and write
|
||
755E000
|
heap
|
page read and write
|
||
12FD000
|
trusted library allocation
|
page read and write
|
||
256800704000
|
trusted library allocation
|
page read and write
|
||
48D1000
|
direct allocation
|
page read and write
|
||
27DC000
|
stack
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
293000
|
unkown
|
page execute and read and write
|
||
1BB91F9D000
|
trusted library section
|
page read and write
|
||
61E4000
|
heap
|
page read and write
|
||
51B000280000
|
direct allocation
|
page read and write
|
||
2EB4000
|
heap
|
page read and write
|
||
3BC6BFE000
|
unkown
|
page readonly
|
||
2EAF000
|
stack
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
3BB63FB000
|
stack
|
page read and write
|
||
20958830000
|
unkown
|
page read and write
|
||
2FB0000
|
direct allocation
|
page read and write
|
||
2E8F000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
A8A000
|
stack
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
5CDC00238000
|
trusted library allocation
|
page read and write
|
||
7609000
|
heap
|
page read and write
|
||
17E4000
|
heap
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
2ADB000
|
heap
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
5CDC00278000
|
trusted library allocation
|
page read and write
|
||
2275C8D0000
|
heap
|
page read and write
|
||
15A5000
|
heap
|
page read and write
|
||
5818008C8000
|
trusted library allocation
|
page read and write
|
||
5A84000
|
trusted library allocation
|
page read and write
|
||
1261000
|
trusted library allocation
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
1128000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
2940000
|
direct allocation
|
page read and write
|
||
5598000
|
trusted library allocation
|
page read and write
|
||
57C000
|
stack
|
page read and write
|
||
581800E2C000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
7624000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
7FF6183EE000
|
unkown
|
page write copy
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
1F7294B7000
|
heap
|
page read and write
|
||
5A69000
|
trusted library allocation
|
page read and write
|
||
581800708000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
5818003E8000
|
trusted library allocation
|
page read and write
|
||
1F7294E7000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
9ED000
|
unkown
|
page execute and write copy
|
||
B0C000
|
unkown
|
page execute and write copy
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
581800AE8000
|
trusted library allocation
|
page read and write
|
||
5A69000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
126C000
|
trusted library allocation
|
page read and write
|
||
61E1000
|
heap
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
5D9B000
|
trusted library allocation
|
page read and write
|
||
3AB000
|
unkown
|
page execute and read and write
|
||
20958F90000
|
unkown
|
page read and write
|
||
77FE000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
3F0E000
|
stack
|
page read and write
|
||
581800AC8000
|
trusted library allocation
|
page read and write
|
||
581801198000
|
trusted library allocation
|
page read and write
|
||
42A6000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
21FE000
|
stack
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
5AD8000
|
trusted library allocation
|
page read and write
|
||
1592000
|
heap
|
page read and write
|
||
58180068C000
|
trusted library allocation
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
256800614000
|
trusted library allocation
|
page read and write
|
||
581800C68000
|
trusted library allocation
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
29AF000
|
stack
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
2960000
|
direct allocation
|
page execute and read and write
|
||
256800424000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
51B000294000
|
direct allocation
|
page read and write
|
||
581800488000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
74C6000
|
heap
|
page read and write
|
||
1F7294C0000
|
heap
|
page read and write
|
||
2160000
|
heap
|
page read and write
|
||
20B0000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
81000
|
unkown
|
page execute and write copy
|
||
1BB8B103000
|
heap
|
page read and write
|
||
3B2000
|
unkown
|
page readonly
|
||
510000
|
direct allocation
|
page read and write
|
||
7452000
|
direct allocation
|
page read and write
|
||
581800BF8000
|
trusted library allocation
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
5818003A4000
|
trusted library allocation
|
page read and write
|
||
7FF6D8411000
|
unkown
|
page execute read
|
||
428F000
|
stack
|
page read and write
|
||
130E000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
5CFE000
|
stack
|
page read and write
|
||
B87000
|
heap
|
page read and write
|
||
1BB8B154000
|
heap
|
page read and write
|
||
75AE000
|
heap
|
page read and write
|
||
1F7294CD000
|
heap
|
page read and write
|
||
74C7000
|
heap
|
page read and write
|
||
2FB0000
|
direct allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
15A2000
|
heap
|
page read and write
|
||
581800BF8000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
EB1000
|
unkown
|
page execute and write copy
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
21CE000
|
stack
|
page read and write
|
||
581801308000
|
trusted library allocation
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
190F000
|
stack
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
60BE000
|
stack
|
page read and write
|
||
429E000
|
trusted library allocation
|
page read and write
|
||
26A0000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
29C0CD3B000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
2FB0000
|
direct allocation
|
page read and write
|
||
581800738000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
direct allocation
|
page read and write
|
||
1BB8B144000
|
heap
|
page read and write
|
||
670000
|
direct allocation
|
page read and write
|
||
5D70000
|
heap
|
page read and write
|
||
388F000
|
stack
|
page read and write
|
||
1BB87764000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
1326000
|
trusted library allocation
|
page read and write
|
||
3BBC3FD000
|
stack
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
256800230000
|
trusted library allocation
|
page read and write
|
||
581800F5C000
|
trusted library allocation
|
page read and write
|
||
3BC7BFE000
|
unkown
|
page readonly
|
||
48AE000
|
stack
|
page read and write
|
||
581800294000
|
trusted library allocation
|
page read and write
|
||
581800368000
|
trusted library allocation
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
51B000210000
|
direct allocation
|
page read and write
|
||
737000
|
heap
|
page read and write
|
||
418E000
|
stack
|
page read and write
|
||
17E4000
|
heap
|
page read and write
|
||
2095A081000
|
unkown
|
page read and write
|
||
5CDC00248000
|
trusted library allocation
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
1F72949C000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
5CDC002C0000
|
trusted library allocation
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page read and write
|
||
2EBE000
|
heap
|
page read and write
|
||
75EC000
|
heap
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
29C0D094000
|
heap
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
581800AA0000
|
trusted library allocation
|
page read and write
|
||
1BB914FC000
|
trusted library section
|
page read and write
|
||
5818003CC000
|
trusted library allocation
|
page read and write
|
||
75E3000
|
heap
|
page read and write
|
||
581800358000
|
trusted library allocation
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
559B000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
76CE000
|
heap
|
page read and write
|
||
1BB912F0000
|
trusted library section
|
page read and write
|
||
22D0000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
23530000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
3271000
|
heap
|
page read and write
|
||
581800601000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
5A5E000
|
trusted library allocation
|
page read and write
|
||
3BC63FE000
|
stack
|
page read and write
|
||
690000
|
unkown
|
page readonly
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
5CDC00250000
|
trusted library allocation
|
page read and write
|
||
3258000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
5818010A4000
|
trusted library allocation
|
page read and write
|
||
2AF9000
|
heap
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
3C4000
|
unkown
|
page readonly
|
||
5A5B000
|
trusted library allocation
|
page read and write
|
||
75BD000
|
heap
|
page read and write
|
||
581800214000
|
trusted library allocation
|
page read and write
|
||
2568007B4000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
115B000
|
heap
|
page read and write
|
||
5A86000
|
trusted library allocation
|
page read and write
|
||
2E8F000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
C05000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
581800F68000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
67BE000
|
heap
|
page read and write
|
||
58180098F000
|
trusted library allocation
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
581800F5C000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
581800294000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
55B7000
|
trusted library allocation
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
504000
|
heap
|
page read and write
|
||
5CDC002A0000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
1BB8EC17000
|
unclassified section
|
page read and write
|
||
74C9000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
58180100C000
|
trusted library allocation
|
page read and write
|
||
3BC4BFE000
|
unkown
|
page readonly
|
||
1BB8B154000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
6F9000
|
unkown
|
page write copy
|
||
B32000
|
unkown
|
page execute and read and write
|
||
B92000
|
heap
|
page read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
B4A000
|
heap
|
page read and write
|
||
581800F5C000
|
trusted library allocation
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
58180084C000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
581801078000
|
trusted library allocation
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
256800348000
|
trusted library allocation
|
page read and write
|
||
1163000
|
heap
|
page read and write
|
||
3BB6BFE000
|
unkown
|
page readonly
|
||
2940000
|
direct allocation
|
page read and write
|
||
3BAB3FE000
|
stack
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
29C0CDB6000
|
heap
|
page read and write
|
||
5818006A1000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
581800F5C000
|
trusted library allocation
|
page read and write
|
||
256800294000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
58180030B000
|
trusted library allocation
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
29C0CD3B000
|
heap
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
67B1000
|
heap
|
page read and write
|
||
74C0000
|
heap
|
page read and write
|
||
420E000
|
trusted library allocation
|
page read and write
|
||
4203000
|
trusted library allocation
|
page read and write
|
||
20958865000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
25680069C000
|
trusted library allocation
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
20B0000
|
trusted library allocation
|
page read and write
|
||
BC7000
|
heap
|
page read and write
|
||
256800354000
|
trusted library allocation
|
page read and write
|
||
1BB8ABB3000
|
heap
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
256800408000
|
trusted library allocation
|
page read and write
|
||
2095A081000
|
unkown
|
page read and write
|
||
5818003A4000
|
trusted library allocation
|
page read and write
|
||
542000
|
unkown
|
page execute and read and write
|
||
581800FD8000
|
trusted library allocation
|
page read and write
|
||
5CDC002A0000
|
trusted library allocation
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
5CDC002F0000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
581801201000
|
trusted library allocation
|
page read and write
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
2095A081000
|
unkown
|
page read and write
|
||
7712000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
1164000
|
heap
|
page read and write
|
||
2ACE000
|
heap
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
21BE000
|
stack
|
page read and write
|
||
1746000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page readonly
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
115B000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
280E000
|
stack
|
page read and write
|
||
5AAD000
|
trusted library allocation
|
page read and write
|
||
74CC000
|
heap
|
page read and write
|
||
41D9000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
1BB8AB8A000
|
heap
|
page read and write
|
||
20958F90000
|
unkown
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
758C000
|
heap
|
page read and write
|
||
1BB91002000
|
trusted library section
|
page read and write
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
581800CE4000
|
trusted library allocation
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
2940000
|
direct allocation
|
page read and write
|
||
7592000
|
heap
|
page read and write
|
||
256800734000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
67C0000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
581800504000
|
trusted library allocation
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
20959CF6000
|
heap
|
page read and write
|
||
7645000
|
heap
|
page read and write
|
||
20959C71000
|
heap
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
1BB876FC000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
1244000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
5818002B4000
|
trusted library allocation
|
page read and write
|
||
2940000
|
direct allocation
|
page read and write
|
||
3BBEBFE000
|
unkown
|
page readonly
|
||
5818000AC000
|
trusted library allocation
|
page read and write
|
||
1BB8B14F000
|
heap
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
1BB8D380000
|
trusted library allocation
|
page read and write
|
||
29C0CE7B000
|
heap
|
page read and write
|
||
2095A1F6000
|
unkown
|
page read and write
|
||
1265000
|
trusted library allocation
|
page read and write
|
||
2568002DC000
|
trusted library allocation
|
page read and write
|
||
41EF000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
5D76000
|
heap
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
4761000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
2700000
|
heap
|
page read and write
|
||
1509000
|
trusted library allocation
|
page read and write
|
||
3732000
|
heap
|
page read and write
|
||
581800770000
|
trusted library allocation
|
page read and write
|
||
5A98000
|
trusted library allocation
|
page read and write
|
||
6F9000
|
unkown
|
page write copy
|
||
7646000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
280F000
|
stack
|
page read and write
|
||
1BB8ABA8000
|
heap
|
page read and write
|
||
55B9000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
1BB918A0000
|
trusted library section
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
1BB918B1000
|
trusted library section
|
page read and write
|
||
1F7294CC000
|
heap
|
page read and write
|
||
16A7000
|
heap
|
page read and write
|
||
3BCD3FE000
|
stack
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
74C1000
|
heap
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
2F1000
|
unkown
|
page execute read
|
||
75DB000
|
heap
|
page read and write
|
||
3BA73FB000
|
stack
|
page read and write
|
||
2940000
|
direct allocation
|
page read and write
|
||
1BB8AB98000
|
heap
|
page read and write
|
||
3478000
|
heap
|
page read and write
|
||
1166000
|
heap
|
page read and write
|
||
1BB8B141000
|
heap
|
page read and write
|
||
150B000
|
trusted library allocation
|
page read and write
|
||
2940000
|
direct allocation
|
page read and write
|
||
6564000
|
trusted library allocation
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
5AA9000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
1ADA000
|
heap
|
page read and write
|
||
1264000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
2AFC000
|
heap
|
page read and write
|
||
C1F000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
2280000
|
heap
|
page read and write
|
||
5A64000
|
trusted library allocation
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
256800237000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
574000
|
heap
|
page read and write
|
||
74C6000
|
heap
|
page read and write
|
||
7FF6D8410000
|
unkown
|
page readonly
|
||
400000
|
unkown
|
page readonly
|
||
670000
|
direct allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
1BB87500000
|
heap
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
1F7294A0000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
61C0000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
1F7294D3000
|
heap
|
page read and write
|
||
5CDC002B0000
|
trusted library allocation
|
page read and write
|
||
3271000
|
heap
|
page read and write
|
||
17E4000
|
heap
|
page read and write
|
||
A0000
|
unkown
|
page readonly
|
||
5A7D000
|
trusted library allocation
|
page read and write
|
||
3640000
|
heap
|
page read and write
|
||
1267000
|
trusted library allocation
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
5818012BC000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
256800364000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
1598000
|
heap
|
page read and write
|
||
5CDC002D8000
|
trusted library allocation
|
page read and write
|
||
E43000
|
unkown
|
page readonly
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
5AE2000
|
trusted library allocation
|
page read and write
|
||
2095A3A3000
|
unkown
|
page read and write
|
||
41FC000
|
trusted library allocation
|
page read and write
|
||
581800EE4000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
1F7294AA000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
7C8B000
|
stack
|
page read and write
|
||
51B000270000
|
direct allocation
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
9AA000
|
unkown
|
page write copy
|
||
1AFE000
|
heap
|
page read and write
|
||
126D000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
58180119C000
|
trusted library allocation
|
page read and write
|
||
581800384000
|
trusted library allocation
|
page read and write
|
||
1F7294EA000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
74C0000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
43D1000
|
heap
|
page read and write
|
||
1F72B190000
|
heap
|
page read and write
|
||
4210000
|
trusted library allocation
|
page read and write
|
||
61D9000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
581801198000
|
trusted library allocation
|
page read and write
|
||
3BB53FB000
|
stack
|
page read and write
|
||
3BC8BFE000
|
unkown
|
page readonly
|
||
2977000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
41F6000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
38AF000
|
stack
|
page read and write
|
||
1BB8B16D000
|
heap
|
page read and write
|
||
765C000
|
heap
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
1780000
|
direct allocation
|
page read and write
|
||
1BB8ABA9000
|
heap
|
page read and write
|
||
3AB000
|
unkown
|
page execute and write copy
|
||
2568006D0000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1BB8AB70000
|
heap
|
page read and write
|
||
EB0000
|
direct allocation
|
page read and write
|
||
578000
|
heap
|
page read and write
|
||
581800844000
|
trusted library allocation
|
page read and write
|
||
2235000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
7CE000
|
heap
|
page read and write
|
||
2A56000
|
heap
|
page read and write
|
||
55E5000
|
trusted library allocation
|
page read and write
|
||
360F000
|
stack
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
3732000
|
heap
|
page read and write
|
||
1BB8AB99000
|
heap
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
5A7C000
|
trusted library allocation
|
page read and write
|
||
581800D20000
|
trusted library allocation
|
page read and write
|
||
581800D38000
|
trusted library allocation
|
page read and write
|
||
3BA8BFE000
|
unkown
|
page readonly
|
||
581800EFC000
|
trusted library allocation
|
page read and write
|
||
3B4E000
|
stack
|
page read and write
|
||
581800E84000
|
trusted library allocation
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
17A0000
|
direct allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
1BB87830000
|
trusted library section
|
page readonly
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
2690000
|
direct allocation
|
page execute and read and write
|
||
29C0CD3B000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
A0000
|
unkown
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
29C0D1E1000
|
unkown
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
5818007AC000
|
trusted library allocation
|
page read and write
|
||
1BB87620000
|
heap
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
2EA1000
|
heap
|
page read and write
|
||
1F7294DB000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
581800D04000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
67C0000
|
heap
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
581800F4C000
|
trusted library allocation
|
page read and write
|
||
599000
|
heap
|
page read and write
|
||
45FF000
|
stack
|
page read and write
|
||
581800224000
|
trusted library allocation
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
10AE000
|
stack
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
17C0000
|
direct allocation
|
page execute and read and write
|
||
55D6000
|
trusted library allocation
|
page read and write
|
||
55B2000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9C000
|
heap
|
page read and write
|
||
20959C66000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
76FE000
|
heap
|
page read and write
|
||
2275CB40000
|
heap
|
page read and write
|
||
20B0000
|
trusted library allocation
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
29D0000
|
heap
|
page read and write
|
||
5CDC00230000
|
trusted library allocation
|
page read and write
|
||
581800E80000
|
trusted library allocation
|
page read and write
|
||
761000
|
unkown
|
page execute and write copy
|
||
17E4000
|
heap
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
115E000
|
heap
|
page read and write
|
||
1F7294B7000
|
heap
|
page read and write
|
||
1BB8ABC4000
|
heap
|
page read and write
|
||
BE1000
|
heap
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
581800BA8000
|
trusted library allocation
|
page read and write
|
||
760A000
|
heap
|
page read and write
|
||
1BB8B2B0000
|
trusted library section
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
581800504000
|
trusted library allocation
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
5CDC002BC000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
D7000
|
unkown
|
page write copy
|
||
5818007C4000
|
trusted library allocation
|
page read and write
|
||
5AAC000
|
trusted library allocation
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
670000
|
direct allocation
|
page read and write
|
||
74CB000
|
heap
|
page read and write
|
||
4810000
|
trusted library allocation
|
page read and write
|
||
E4D000
|
unkown
|
page write copy
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
581800E3C000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
direct allocation
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
862000
|
unkown
|
page execute and write copy
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
6F2000
|
unkown
|
page execute and read and write
|
||
256800201000
|
trusted library allocation
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
499F000
|
stack
|
page read and write
|
||
7630000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
581800B94000
|
trusted library allocation
|
page read and write
|
||
42300FA000
|
stack
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
5604000
|
trusted library allocation
|
page read and write
|
||
256800280000
|
trusted library allocation
|
page read and write
|
||
51B000215000
|
direct allocation
|
page read and write
|
||
114B000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
99C000
|
unkown
|
page execute and write copy
|
||
4BD1000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
5818001A0000
|
trusted library allocation
|
page read and write
|
||
1BB910A6000
|
trusted library section
|
page read and write
|
||
B4E000
|
heap
|
page read and write
|
||
4207000
|
trusted library allocation
|
page read and write
|
||
581800230000
|
trusted library allocation
|
page read and write
|
||
1BB8ABB0000
|
heap
|
page read and write
|
||
7814000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
2095A081000
|
unkown
|
page read and write
|
||
7622000
|
heap
|
page read and write
|
||
7FF6D84E8000
|
unkown
|
page readonly
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
113B000
|
heap
|
page read and write
|
||
1F7294A9000
|
heap
|
page read and write
|
||
599CAFF000
|
unkown
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
5818001E4000
|
trusted library allocation
|
page read and write
|
||
75FE000
|
heap
|
page read and write
|
||
581800BE0000
|
trusted library allocation
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
5591000
|
trusted library allocation
|
page read and write
|
||
21E4000
|
heap
|
page read and write
|
||
83E000
|
heap
|
page read and write
|
||
1BB8B107000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
1F7292D0000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
55AA000
|
trusted library allocation
|
page read and write
|
||
2ECC000
|
stack
|
page read and write
|
||
5A62000
|
trusted library allocation
|
page read and write
|
||
99C000
|
unkown
|
page execute and write copy
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
7637000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
5818005C8000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
1138000
|
heap
|
page read and write
|
||
3BBDBFE000
|
unkown
|
page readonly
|
||
4BF1000
|
heap
|
page read and write
|
||
1BB8ABAB000
|
heap
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
581801094000
|
trusted library allocation
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
581800CCC000
|
trusted library allocation
|
page read and write
|
||
1F7294D9000
|
heap
|
page read and write
|
||
1BB914F0000
|
trusted library section
|
page read and write
|
||
3BA33FD000
|
stack
|
page read and write
|
||
29C09CFF000
|
heap
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
378E000
|
stack
|
page read and write
|
||
2EAF000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
E0F000
|
stack
|
page read and write
|
||
1BB8B0FC000
|
heap
|
page read and write
|
||
14C4000
|
heap
|
page read and write
|
||
40C000
|
unkown
|
page write copy
|
||
1BB8B124000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
2818000
|
heap
|
page read and write
|
||
1BB8AB99000
|
heap
|
page read and write
|
||
99B000
|
unkown
|
page execute and write copy
|
||
2CA6000
|
heap
|
page read and write
|
||
581800786000
|
trusted library allocation
|
page read and write
|
||
55C7000
|
trusted library allocation
|
page read and write
|
||
690000
|
unkown
|
page readonly
|
||
20958830000
|
unkown
|
page read and write
|
||
5A63000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
direct allocation
|
page read and write
|
||
3B9E3FE000
|
unkown
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
14BE000
|
heap
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
327F000
|
heap
|
page read and write
|
||
2095A171000
|
unkown
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
1780000
|
direct allocation
|
page read and write
|
||
1BB91063000
|
trusted library section
|
page read and write
|
||
3DCE000
|
stack
|
page read and write
|
||
43F0000
|
heap
|
page read and write
|
||
581800058000
|
trusted library allocation
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
473C000
|
stack
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
3BBCBFE000
|
unkown
|
page readonly
|
||
EB0000
|
direct allocation
|
page read and write
|
||
2AF9000
|
heap
|
page read and write
|
||
74C1000
|
heap
|
page read and write
|
||
E4F000
|
stack
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
4860000
|
direct allocation
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
55F5000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
1BB91890000
|
trusted library section
|
page read and write
|
||
3BC93FC000
|
stack
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
15C9000
|
heap
|
page read and write
|
||
58180064C000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
29C0A180000
|
trusted library allocation
|
page read and write
|
||
16A9000
|
heap
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
EB0000
|
direct allocation
|
page read and write
|
||
99B000
|
unkown
|
page execute and write copy
|
||
690000
|
unkown
|
page read and write
|
||
581800AC0000
|
trusted library allocation
|
page read and write
|
||
2568006D4000
|
trusted library allocation
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
3A0000
|
heap
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
5818006CC000
|
trusted library allocation
|
page read and write
|
||
41E9000
|
trusted library allocation
|
page read and write
|
||
1BB87640000
|
trusted library allocation
|
page read and write
|
||
2568006B4000
|
trusted library allocation
|
page read and write
|
||
581800368000
|
trusted library allocation
|
page read and write
|
||
E19000
|
heap
|
page read and write
|
||
1F7294E3000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
5080000
|
direct allocation
|
page read and write
|
||
74CC000
|
heap
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
1F7293B0000
|
heap
|
page read and write
|
||
5A5B000
|
trusted library allocation
|
page read and write
|
||
126B000
|
trusted library allocation
|
page read and write
|
||
581800F3C000
|
trusted library allocation
|
page read and write
|
||
3981000
|
heap
|
page read and write
|
||
2E77000
|
heap
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
5CF3000
|
trusted library allocation
|
page read and write
|
||
55A8000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
1F7294DA000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
29C0CDB0000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
54A000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
6F9000
|
unkown
|
page write copy
|
||
D7000
|
unkown
|
page write copy
|
||
3BADBFE000
|
unkown
|
page readonly
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
409000
|
unkown
|
page readonly
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
75E4000
|
heap
|
page read and write
|
||
98C000
|
unkown
|
page execute and read and write
|
||
581800CDF000
|
trusted library allocation
|
page read and write
|
||
670000
|
direct allocation
|
page read and write
|
||
51B00024C000
|
direct allocation
|
page read and write
|
||
429E000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
115B000
|
heap
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
5CDC002BC000
|
trusted library allocation
|
page read and write
|
||
807000
|
heap
|
page read and write
|
||
3268000
|
heap
|
page read and write
|
||
14CE000
|
heap
|
page read and write
|
||
2275C90C000
|
heap
|
page read and write
|
||
5818003E8000
|
trusted library allocation
|
page read and write
|
||
46B0000
|
heap
|
page read and write
|
||
1BB8ABC4000
|
heap
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
3BB0BFE000
|
unkown
|
page readonly
|
||
74CB000
|
heap
|
page read and write
|
||
5AEB000
|
trusted library allocation
|
page read and write
|
||
1BB910CD000
|
trusted library section
|
page read and write
|
||
1BB8B0D5000
|
heap
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
581800294000
|
trusted library allocation
|
page read and write
|
||
55AF000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
15A2000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
5A59000
|
trusted library allocation
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
670000
|
direct allocation
|
page read and write
|
||
599000
|
heap
|
page read and write
|
||
55CA000
|
trusted library allocation
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
55EE000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
E0E000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
20959BF3000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
5CDC002B0000
|
trusted library allocation
|
page read and write
|
||
20B0000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
44E0000
|
trusted library allocation
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
29C0CF9B000
|
heap
|
page read and write
|
||
581801080000
|
trusted library allocation
|
page read and write
|
||
5CDC002E4000
|
trusted library allocation
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
39C000
|
unkown
|
page execute and read and write
|
||
3B4000
|
heap
|
page read and write
|
||
5818002A4000
|
trusted library allocation
|
page read and write
|
||
61D6000
|
heap
|
page read and write
|
||
20959D11000
|
heap
|
page read and write
|
||
5A97000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
74C5000
|
heap
|
page read and write
|
||
2568007CC000
|
trusted library allocation
|
page read and write
|
||
670000
|
direct allocation
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
51B000250000
|
direct allocation
|
page read and write
|
||
559B000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
51B0002AC000
|
direct allocation
|
page read and write
|
||
1592000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
324F000
|
stack
|
page read and write
|
||
5818012E0000
|
trusted library allocation
|
page read and write
|
||
26DF000
|
stack
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
5AAB000
|
trusted library allocation
|
page read and write
|
||
80B000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5270000
|
remote allocation
|
page read and write
|
||
5CDC002BC000
|
trusted library allocation
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
1BB87761000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
5818006EC000
|
trusted library allocation
|
page read and write
|
||
5818010D0000
|
trusted library allocation
|
page read and write
|
||
5A66000
|
trusted library allocation
|
page read and write
|
||
1263000
|
trusted library allocation
|
page read and write
|
||
3BA1BFE000
|
unkown
|
page readonly
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
38C000
|
unkown
|
page readonly
|
||
20B0000
|
trusted library allocation
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
3BB23FB000
|
stack
|
page read and write
|
||
3B2000
|
unkown
|
page readonly
|
||
256800758000
|
trusted library allocation
|
page read and write
|
||
1780000
|
direct allocation
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
5270000
|
remote allocation
|
page read and write
|
||
2940000
|
direct allocation
|
page read and write
|
||
762E000
|
heap
|
page read and write
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
E07000
|
heap
|
page read and write
|
||
15C6000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
14C4000
|
heap
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
1780000
|
direct allocation
|
page read and write
|
||
2EBF000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
20958830000
|
unkown
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
3262000
|
heap
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
425C000
|
trusted library allocation
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
298F000
|
stack
|
page read and write
|
||
D3E000
|
stack
|
page read and write
|
||
5818004E0000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
1BB8B14F000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
46B000
|
unkown
|
page read and write
|
||
3BCCBFE000
|
unkown
|
page readonly
|
||
4D10000
|
direct allocation
|
page read and write
|
||
46B000
|
unkown
|
page read and write
|
||
4ACF000
|
stack
|
page read and write
|
||
581801124000
|
trusted library allocation
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
256800298000
|
trusted library allocation
|
page read and write
|
||
581800E8C000
|
trusted library allocation
|
page read and write
|
||
1BB8B11B000
|
heap
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
3E90000
|
trusted library allocation
|
page read and write
|
||
2AF9000
|
heap
|
page read and write
|
||
1780000
|
direct allocation
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
20958D90000
|
trusted library allocation
|
page read and write
|
||
4375000
|
trusted library allocation
|
page read and write
|
||
1BB87700000
|
heap
|
page read and write
|
||
55BE000
|
trusted library allocation
|
page read and write
|
||
2EAE000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
581800040000
|
trusted library allocation
|
page read and write
|
||
256800330000
|
trusted library allocation
|
page read and write
|
||
20959C6C000
|
heap
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
3BA03FE000
|
stack
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
3BB4BFE000
|
unkown
|
page readonly
|
||
1BB91927000
|
unclassified section
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
1BB87650000
|
trusted library allocation
|
page read and write
|
||
5818003A4000
|
trusted library allocation
|
page read and write
|
||
3ECF000
|
stack
|
page read and write
|
||
2F1000
|
unkown
|
page execute read
|
||
43D1000
|
heap
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
5818008FC000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
58180021C000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
581800001000
|
trusted library allocation
|
page read and write
|
||
737000
|
heap
|
page read and write
|
||
1F7293D0000
|
heap
|
page read and write
|
||
20B0000
|
trusted library allocation
|
page read and write
|
||
581800CB4000
|
trusted library allocation
|
page read and write
|
||
51B0002E4000
|
direct allocation
|
page read and write
|
||
55E9000
|
trusted library allocation
|
page read and write
|
||
E3A000
|
heap
|
page read and write
|
||
1695000
|
heap
|
page read and write
|
||
58180004C000
|
trusted library allocation
|
page read and write
|
||
5CDC002F8000
|
trusted library allocation
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
55AF000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
2568006F0000
|
trusted library allocation
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
55F3000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
1BB8B13B000
|
heap
|
page read and write
|
||
284E000
|
unkown
|
page read and write
|
||
14ED000
|
heap
|
page read and write
|
||
3BA2BFE000
|
unkown
|
page readonly
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
5818001F0000
|
trusted library allocation
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
7ECF000
|
stack
|
page read and write
|
||
581800310000
|
trusted library allocation
|
page read and write
|
||
1BB878A5000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
49C0000
|
direct allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
4761000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
2690000
|
direct allocation
|
page execute and read and write
|
||
29C0D4CB000
|
unkown
|
page read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
3BA43FB000
|
stack
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
29C0D49F000
|
unkown
|
page read and write
|
||
58180093C000
|
trusted library allocation
|
page read and write
|
||
5ABB000
|
trusted library allocation
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
256800310000
|
trusted library allocation
|
page read and write
|
||
6F9000
|
unkown
|
page write copy
|
||
17E4000
|
heap
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
559C000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
2AB0000
|
heap
|
page read and write
|
||
7789000
|
heap
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
2568006C8000
|
trusted library allocation
|
page read and write
|
||
284F000
|
stack
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
51B000234000
|
direct allocation
|
page read and write
|
||
1BB87762000
|
heap
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
2800000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
4A80000
|
direct allocation
|
page execute and read and write
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
25680035C000
|
trusted library allocation
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
5AAC000
|
trusted library allocation
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
670000
|
direct allocation
|
page read and write
|
||
5A58000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
2095A081000
|
unkown
|
page read and write
|
||
76B8000
|
heap
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
EE4000
|
heap
|
page read and write
|
||
1BB8AB89000
|
heap
|
page read and write
|
||
581800374000
|
trusted library allocation
|
page read and write
|
||
2095A329000
|
unkown
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
7D8C000
|
stack
|
page read and write
|
||
27CE000
|
stack
|
page read and write
|
||
3288000
|
heap
|
page read and write
|
||
8CE000
|
stack
|
page read and write
|
||
43D0000
|
heap
|
page read and write
|
||
1163000
|
heap
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
1507000
|
trusted library allocation
|
page read and write
|
||
3BA4BFE000
|
unkown
|
page readonly
|
||
2390000
|
heap
|
page read and write
|
||
761000
|
unkown
|
page execute and write copy
|
||
3BC1BFE000
|
unkown
|
page readonly
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
581800574000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
5A67000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
581800201000
|
trusted library allocation
|
page read and write
|
||
670000
|
direct allocation
|
page read and write
|
||
55C7000
|
trusted library allocation
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
81000
|
unkown
|
page execute and write copy
|
||
20959BF3000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
1BB8B0CE000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
670000
|
direct allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
4DB3000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
2FB0000
|
direct allocation
|
page read and write
|
||
1BB8B0EF000
|
heap
|
page read and write
|
||
29C0CD3B000
|
heap
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
581800FB0000
|
trusted library allocation
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
74CD000
|
heap
|
page read and write
|
||
1BB8B0E1000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
670000
|
direct allocation
|
page read and write
|
||
1261000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
38CE000
|
stack
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
55CD000
|
trusted library allocation
|
page read and write
|
||
263000
|
unkown
|
page execute and read and write
|
||
3BA0BFE000
|
unkown
|
page readonly
|
||
6A21000
|
heap
|
page read and write
|
||
5818002B4000
|
trusted library allocation
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
4860000
|
direct allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
40C000
|
unkown
|
page read and write
|
||
20958830000
|
unkown
|
page read and write
|
||
581800390000
|
trusted library allocation
|
page read and write
|
||
256800750000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
581800294000
|
trusted library allocation
|
page read and write
|
||
25680035C000
|
trusted library allocation
|
page read and write
|
||
2170000
|
heap
|
page read and write
|
||
5818009D0000
|
trusted library allocation
|
page read and write
|
||
5060000
|
heap
|
page read and write
|
||
1506000
|
trusted library allocation
|
page read and write
|
||
5A68000
|
trusted library allocation
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
581800CA0000
|
trusted library allocation
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
581800294000
|
trusted library allocation
|
page read and write
|
||
5CDC00220000
|
trusted library allocation
|
page read and write
|
||
5A9B000
|
trusted library allocation
|
page read and write
|
||
986000
|
unkown
|
page execute and read and write
|
||
5A59000
|
trusted library allocation
|
page read and write
|
||
ADE000
|
stack
|
page read and write
|
||
67E000
|
stack
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
25680078C000
|
trusted library allocation
|
page read and write
|
||
81E000
|
heap
|
page read and write
|
||
2670000
|
heap
|
page read and write
|
||
75B7000
|
heap
|
page read and write
|
||
581800598000
|
trusted library allocation
|
page read and write
|
||
17E4000
|
heap
|
page read and write
|
||
BFD000
|
heap
|
page read and write
|
||
1BB91960000
|
trusted library section
|
page read and write
|
||
1BB8B13B000
|
heap
|
page read and write
|
||
55C3000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
43D1000
|
heap
|
page read and write
|
||
581800A94000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
80B000
|
heap
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
2275CB50000
|
heap
|
page read and write
|
||
73C1000
|
heap
|
page read and write
|
||
1BB8B149000
|
heap
|
page read and write
|
||
20B0000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
1328000
|
trusted library allocation
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
55AA000
|
trusted library allocation
|
page read and write
|
||
7FF6D84C5000
|
unkown
|
page readonly
|
||
1244000
|
heap
|
page read and write
|
||
5AC3000
|
trusted library allocation
|
page read and write
|
||
5AE2000
|
trusted library allocation
|
page read and write
|
||
51B0002DC000
|
direct allocation
|
page read and write
|
||
130B000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
3BC3BFE000
|
unkown
|
page readonly
|
||
4BD1000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
14D8000
|
heap
|
page read and write
|
||
581800D6E000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
20958F90000
|
unkown
|
page read and write
|
||
1BB8B12B000
|
heap
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
2ADC000
|
heap
|
page read and write
|
||
5818006DC000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
5609000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
256800664000
|
trusted library allocation
|
page read and write
|
||
1F7294DD000
|
heap
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
986000
|
unkown
|
page execute and read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
5A54000
|
trusted library allocation
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
5818009F0000
|
trusted library allocation
|
page read and write
|
||
581801018000
|
trusted library allocation
|
page read and write
|
||
29C0C2E8000
|
heap
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
C3D000
|
stack
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
581800D98000
|
trusted library allocation
|
page read and write
|
||
1780000
|
direct allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
2AEA000
|
heap
|
page read and write
|
||
1BB8F2E4000
|
heap
|
page read and write
|
||
99B000
|
unkown
|
page execute and write copy
|
||
58180075C000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
29C0CD3B000
|
heap
|
page read and write
|
||
3BA93FC000
|
stack
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
5AAE000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
5CDC002C8000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
1F7294EA000
|
heap
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
5C21000
|
trusted library allocation
|
page read and write
|
||
58180011C000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
E51000
|
unkown
|
page write copy
|
||
158F000
|
heap
|
page read and write
|
||
581800218000
|
trusted library allocation
|
page read and write
|
||
2568007D0000
|
trusted library allocation
|
page read and write
|
||
1508000
|
trusted library allocation
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
29C0CDAB000
|
heap
|
page read and write
|
||
12FB000
|
trusted library allocation
|
page read and write
|
||
302C000
|
stack
|
page read and write
|
||
2568006AC000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
5818012B4000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
256800401000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
581800420000
|
trusted library allocation
|
page read and write
|
||
691000
|
unkown
|
page execute and write copy
|
||
2CC000
|
stack
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
D9000
|
unkown
|
page execute and read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
3BC000
|
unkown
|
page write copy
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
29C0D1E1000
|
unkown
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
6FB000
|
unkown
|
page execute and read and write
|
||
1262000
|
trusted library allocation
|
page read and write
|
||
4D21000
|
heap
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
5A5E000
|
trusted library allocation
|
page read and write
|
||
17E4000
|
heap
|
page read and write
|
||
581800640000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
25680033C000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
7FF6183EA000
|
unkown
|
page write copy
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
2AF4000
|
heap
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
3008000
|
heap
|
page read and write
|
||
3BA7BFE000
|
unkown
|
page readonly
|
||
E0D000
|
heap
|
page read and write
|
||
7579000
|
heap
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
direct allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
E55000
|
unkown
|
page readonly
|
||
15C8000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
256800610000
|
trusted library allocation
|
page read and write
|
||
1BB8AB8B000
|
heap
|
page read and write
|
||
8FA000
|
stack
|
page read and write
|
||
5A69000
|
trusted library allocation
|
page read and write
|
||
581800874000
|
trusted library allocation
|
page read and write
|
||
5AAD000
|
trusted library allocation
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
1BB90F37000
|
unclassified section
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
581800304000
|
trusted library allocation
|
page read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1168000
|
heap
|
page read and write
|
||
1BB87600000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
1BB87722000
|
heap
|
page read and write
|
||
102000
|
unkown
|
page execute and read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
1BB8B109000
|
heap
|
page read and write
|
||
327B000
|
heap
|
page read and write
|
||
1757000
|
heap
|
page read and write
|
||
581800EA4000
|
trusted library allocation
|
page read and write
|
||
B32000
|
unkown
|
page execute and read and write
|
||
51B000230000
|
direct allocation
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
1507000
|
trusted library allocation
|
page read and write
|
||
BA1000
|
heap
|
page read and write
|
||
581800A01000
|
trusted library allocation
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
2568006E8000
|
trusted library allocation
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
5260000
|
trusted library allocation
|
page read and write
|
||
581800398000
|
trusted library allocation
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
131F000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
1BB91840000
|
trusted library section
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
3BCB3FE000
|
stack
|
page read and write
|
||
581800358000
|
trusted library allocation
|
page read and write
|
||
233E000
|
stack
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
55D8000
|
trusted library allocation
|
page read and write
|
||
5818001D8000
|
trusted library allocation
|
page read and write
|
||
1BB8B11D000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
74C3000
|
heap
|
page read and write
|
||
4830000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
285E000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
581800A18000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
1BB8B030000
|
trusted library section
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
126A000
|
trusted library allocation
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
223B000
|
heap
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
3BAC3FE000
|
stack
|
page read and write
|
||
581800DE4000
|
trusted library allocation
|
page read and write
|
||
4392000
|
trusted library allocation
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
5BF9000
|
trusted library allocation
|
page read and write
|
||
2EB7000
|
heap
|
page read and write
|
||
C1F000
|
heap
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
2A2F000
|
stack
|
page read and write
|
||
112F000
|
heap
|
page read and write
|
||
5818003A4000
|
trusted library allocation
|
page read and write
|
||
14ED000
|
heap
|
page read and write
|
||
29C0CDA0000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
2AEA000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
581800E24000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
326D000
|
heap
|
page read and write
|
||
58180000C000
|
trusted library allocation
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
3732000
|
heap
|
page read and write
|
||
3A4F000
|
stack
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
400F000
|
stack
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
43D1000
|
heap
|
page read and write
|
||
50C4000
|
direct allocation
|
page read and write
|
||
55F6000
|
trusted library allocation
|
page read and write
|
||
113A000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
581800B14000
|
trusted library allocation
|
page read and write
|
||
5A98000
|
trusted library allocation
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
5B71000
|
trusted library allocation
|
page read and write
|
||
C0A000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
20959BF3000
|
heap
|
page read and write
|
||
256800694000
|
trusted library allocation
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
581800D84000
|
trusted library allocation
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
D80000
|
unkown
|
page readonly
|
||
5818003B8000
|
trusted library allocation
|
page read and write
|
||
581800F78000
|
trusted library allocation
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
5200000
|
direct allocation
|
page execute and read and write
|
||
E19000
|
heap
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
581800488000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
256800724000
|
trusted library allocation
|
page read and write
|
||
581800910000
|
trusted library allocation
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
1BB8B0CC000
|
heap
|
page read and write
|
||
5818003A4000
|
trusted library allocation
|
page read and write
|
||
3BC73FD000
|
stack
|
page read and write
|
||
256800770000
|
trusted library allocation
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
1BB90F10000
|
trusted library section
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
2680000
|
direct allocation
|
page execute and read and write
|
||
1440000
|
heap
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
74C1000
|
heap
|
page read and write
|
||
20959F24000
|
heap
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
1475000
|
heap
|
page read and write
|
||
2275CB45000
|
heap
|
page read and write
|
||
20958830000
|
unkown
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
74C1000
|
heap
|
page read and write
|
||
5D3E000
|
stack
|
page read and write
|
||
20958F90000
|
unkown
|
page read and write
|
||
3BAABFE000
|
unkown
|
page readonly
|
||
434000
|
unkown
|
page read and write
|
||
364E000
|
stack
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
3B2000
|
unkown
|
page readonly
|
||
1263000
|
trusted library allocation
|
page read and write
|
||
5A67000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
51B000284000
|
direct allocation
|
page read and write
|
||
3BB1BFE000
|
unkown
|
page readonly
|
||
2FAF000
|
stack
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
759E000
|
heap
|
page read and write
|
||
1BB90D07000
|
unclassified section
|
page read and write
|
||
581800CDC000
|
trusted library allocation
|
page read and write
|
||
20B0000
|
trusted library allocation
|
page read and write
|
||
2E8F000
|
stack
|
page read and write
|
||
256800678000
|
trusted library allocation
|
page read and write
|
||
1401000
|
heap
|
page read and write
|
||
4BC4000
|
heap
|
page read and write
|
||
581800B24000
|
trusted library allocation
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
581800D10000
|
trusted library allocation
|
page read and write
|
||
670000
|
direct allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
4BE000
|
stack
|
page read and write
|
||
5060000
|
direct allocation
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
3271000
|
heap
|
page read and write
|
||
14E7000
|
heap
|
page read and write
|
||
58180017F000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
5A87000
|
trusted library allocation
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
55A2000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
313F000
|
stack
|
page read and write
|
||
55D2000
|
trusted library allocation
|
page read and write
|
||
1141000
|
heap
|
page read and write
|
||
581800E18000
|
trusted library allocation
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
5818001E8000
|
trusted library allocation
|
page read and write
|
||
581800164000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
581800CDC000
|
trusted library allocation
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
15C3000
|
heap
|
page read and write
|
||
29C0A180000
|
trusted library allocation
|
page read and write
|
||
581801001000
|
trusted library allocation
|
page read and write
|
||
1BB87850000
|
heap
|
page read and write
|
||
325E000
|
heap
|
page read and write
|
||
263E000
|
stack
|
page read and write
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
581800358000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
74CB000
|
heap
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
581800A60000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
55D5000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
direct allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
2095A081000
|
unkown
|
page read and write
|
||
256800320000
|
trusted library allocation
|
page read and write
|
||
20958830000
|
unkown
|
page read and write
|
||
7665000
|
heap
|
page read and write
|
||
2E9C000
|
heap
|
page read and write
|
||
1BB91BB0000
|
trusted library section
|
page read and write
|
||
6EA0000
|
direct allocation
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
5CDC00274000
|
trusted library allocation
|
page read and write
|
||
5818001F8000
|
trusted library allocation
|
page read and write
|
||
581800F88000
|
trusted library allocation
|
page read and write
|
||
1317000
|
trusted library allocation
|
page read and write
|
||
581800BB0000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
581800790000
|
trusted library allocation
|
page read and write
|
||
282E000
|
heap
|
page read and write
|
||
2940000
|
direct allocation
|
page read and write
|
||
20958F90000
|
unkown
|
page read and write
|
||
5818002FF000
|
trusted library allocation
|
page read and write
|
||
22C0000
|
heap
|
page read and write
|
||
5CDC0020C000
|
trusted library allocation
|
page read and write
|
||
1780000
|
direct allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
15A2000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
2690000
|
direct allocation
|
page execute and read and write
|
||
581800DCC000
|
trusted library allocation
|
page read and write
|
||
126B000
|
trusted library allocation
|
page read and write
|
||
74C8000
|
heap
|
page read and write
|
||
75AF000
|
heap
|
page read and write
|
||
5080000
|
direct allocation
|
page read and write
|
||
1F7294EA000
|
heap
|
page read and write
|
||
3BA5BFE000
|
unkown
|
page readonly
|
||
581800A18000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
1578000
|
heap
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
74C0000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
5CC1000
|
trusted library allocation
|
page read and write
|
||
256800320000
|
trusted library allocation
|
page read and write
|
||
1F7294B7000
|
heap
|
page read and write
|
||
3BABBFE000
|
unkown
|
page readonly
|
||
1262000
|
trusted library allocation
|
page read and write
|
||
581800DA8000
|
trusted library allocation
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
55C4000
|
trusted library allocation
|
page read and write
|
||
2095A3F0000
|
unkown
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
39BE000
|
stack
|
page read and write
|
||
5A6A000
|
trusted library allocation
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FF6D84FA000
|
unkown
|
page write copy
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
1BB9196E000
|
trusted library section
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
10E4000
|
heap
|
page read and write
|
||
15A2000
|
heap
|
page read and write
|
||
5AC8000
|
trusted library allocation
|
page read and write
|
||
581800DCC000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
28AF000
|
stack
|
page read and write
|
||
58180067C000
|
trusted library allocation
|
page read and write
|
||
3BBBBFE000
|
unkown
|
page readonly
|
||
30C000
|
stack
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
74C6000
|
heap
|
page read and write
|
||
14ED000
|
heap
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
5818006B8000
|
trusted library allocation
|
page read and write
|
||
256800418000
|
trusted library allocation
|
page read and write
|
||
E20000
|
direct allocation
|
page execute and read and write
|
||
1F729680000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
3732000
|
heap
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
20959BF3000
|
heap
|
page read and write
|
||
2275CB46000
|
heap
|
page read and write
|
||
5CDC002C0000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
5596000
|
trusted library allocation
|
page read and write
|
||
E7F000
|
stack
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
7FF6183D8000
|
unkown
|
page readonly
|
||
86A000
|
unkown
|
page execute and write copy
|
||
5A74000
|
trusted library allocation
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
762E000
|
heap
|
page read and write
|
||
55DD000
|
trusted library allocation
|
page read and write
|
||
296C000
|
stack
|
page read and write
|
||
5818010B0000
|
trusted library allocation
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
581800174000
|
trusted library allocation
|
page read and write
|
||
14D2000
|
heap
|
page read and write
|
||
2FB0000
|
direct allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
14D4000
|
heap
|
page read and write
|
||
29C0CD3B000
|
heap
|
page read and write
|
||
5CF2000
|
trusted library allocation
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
150E000
|
trusted library allocation
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
630000
|
heap
|
page read and write
|
||
51B0002EC000
|
direct allocation
|
page read and write
|
||
3BB2BFE000
|
unkown
|
page readonly
|
||
2095A081000
|
unkown
|
page read and write
|
||
581800E98000
|
trusted library allocation
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
680000
|
direct allocation
|
page execute and read and write
|
||
1314000
|
heap
|
page read and write
|
||
581800C24000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
4A70000
|
direct allocation
|
page execute and read and write
|
||
10E4000
|
heap
|
page read and write
|
||
7638000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
3C4000
|
unkown
|
page readonly
|
||
39CF000
|
stack
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
29CE000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
256800730000
|
trusted library allocation
|
page read and write
|
||
100E000
|
stack
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
6A21000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
74C0000
|
heap
|
page read and write
|
||
581801130000
|
trusted library allocation
|
page read and write
|
||
1780000
|
direct allocation
|
page read and write
|
||
77A9000
|
heap
|
page read and write
|
||
256800620000
|
trusted library allocation
|
page read and write
|
||
10B000
|
unkown
|
page execute and read and write
|
||
2E8C000
|
stack
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
5818003C4000
|
trusted library allocation
|
page read and write
|
||
55D8000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
581800D4C000
|
trusted library allocation
|
page read and write
|
||
581800728000
|
trusted library allocation
|
page read and write
|
||
581800CCC000
|
trusted library allocation
|
page read and write
|
||
E6B000
|
stack
|
page read and write
|
||
5BA9000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
3BAEBFE000
|
unkown
|
page readonly
|
||
1BB8F2CB000
|
heap
|
page read and write
|
||
20956B32000
|
heap
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
1BB8B16D000
|
heap
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
30C000
|
stack
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
7FF6D8504000
|
unkown
|
page readonly
|
||
670000
|
direct allocation
|
page read and write
|
||
327B000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
3732000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
421000
|
unkown
|
page execute and write copy
|
||
14D0000
|
heap
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
E5F000
|
stack
|
page read and write
|
||
5AF4000
|
trusted library allocation
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
3BCC3FE000
|
stack
|
page read and write
|
||
1475000
|
heap
|
page read and write
|
||
2275C8C0000
|
heap
|
page read and write
|
||
670000
|
direct allocation
|
page read and write
|
||
20958F90000
|
unkown
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
1F7294B7000
|
heap
|
page read and write
|
||
2275CAD0000
|
heap
|
page read and write
|
||
581800F68000
|
trusted library allocation
|
page read and write
|
||
55B9000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1BB90FF0000
|
trusted library section
|
page read and write
|
||
3731000
|
heap
|
page read and write
|
||
3BB73FD000
|
stack
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
256800248000
|
trusted library allocation
|
page read and write
|
||
425C000
|
trusted library allocation
|
page read and write
|
||
7553000
|
heap
|
page read and write
|
||
5818002A8000
|
trusted library allocation
|
page read and write
|
||
289F000
|
stack
|
page read and write
|
||
4C91000
|
heap
|
page read and write
|
||
5A5B000
|
trusted library allocation
|
page read and write
|
||
605C000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
581800B78000
|
trusted library allocation
|
page read and write
|
||
581800298000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
49AF000
|
stack
|
page read and write
|
||
131E000
|
trusted library allocation
|
page read and write
|
||
1BB8AB89000
|
heap
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
581800E0C000
|
trusted library allocation
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
45FF000
|
stack
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
3BAD3FD000
|
stack
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
266E000
|
stack
|
page read and write
|
||
5B52000
|
trusted library allocation
|
page read and write
|
||
860000
|
unkown
|
page readonly
|
||
EE4000
|
heap
|
page read and write
|
||
37D000
|
unkown
|
page execute and write copy
|
||
1BB87670000
|
heap
|
page read and write
|
||
2ACE000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
1BB8B112000
|
heap
|
page read and write
|
||
581800C68000
|
trusted library allocation
|
page read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
581800B38000
|
trusted library allocation
|
page read and write
|
||
3BC23FD000
|
stack
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
5D75000
|
heap
|
page read and write
|
||
5A5B000
|
trusted library allocation
|
page read and write
|
||
3981000
|
heap
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
1244000
|
heap
|
page read and write
|
||
EC000
|
stack
|
page read and write
|
||
20B0000
|
trusted library allocation
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
2690000
|
direct allocation
|
page execute and read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
43D1000
|
heap
|
page read and write
|
||
70E0000
|
direct allocation
|
page execute and read and write
|
||
29C09CFF000
|
heap
|
page read and write
|
||
42305FE000
|
stack
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
41F1000
|
trusted library allocation
|
page read and write
|
||
256800714000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
285E000
|
heap
|
page read and write
|
||
1307000
|
trusted library allocation
|
page read and write
|
||
12F5000
|
trusted library allocation
|
page read and write
|
||
1BB8B0F4000
|
heap
|
page read and write
|
||
1BB8EE74000
|
trusted library allocation
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
131C000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
4761000
|
heap
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
58180096C000
|
trusted library allocation
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
581800064000
|
trusted library allocation
|
page read and write
|
||
58180026C000
|
trusted library allocation
|
page read and write
|
||
150D000
|
trusted library allocation
|
page read and write
|
||
B94000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
42302FF000
|
stack
|
page read and write
|
||
581800EF0000
|
trusted library allocation
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
55F5000
|
trusted library allocation
|
page read and write
|
||
5270000
|
remote allocation
|
page read and write
|
||
5ACB000
|
trusted library allocation
|
page read and write
|
||
55D8000
|
trusted library allocation
|
page read and write
|
||
1BB8EB90000
|
trusted library section
|
page read and write
|
||
29C0B9C9000
|
heap
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
5A63000
|
trusted library allocation
|
page read and write
|
||
5A87000
|
trusted library allocation
|
page read and write
|
||
581800CA4000
|
trusted library allocation
|
page read and write
|
||
756D000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
1471000
|
heap
|
page read and write
|
||
780C000
|
heap
|
page read and write
|
||
2568002F2000
|
trusted library allocation
|
page read and write
|
||
327B000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
581800234000
|
trusted library allocation
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
17D0000
|
direct allocation
|
page execute and read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
2AEA000
|
heap
|
page read and write
|
||
326C000
|
heap
|
page read and write
|
||
1BB8AB96000
|
heap
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
1BB8ABA0000
|
heap
|
page read and write
|
||
883000
|
unkown
|
page execute and read and write
|
||
E0C000
|
heap
|
page read and write
|
||
1263000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
1F7294EA000
|
heap
|
page read and write
|
||
2095A081000
|
unkown
|
page read and write
|
||
1166000
|
heap
|
page read and write
|
||
489E000
|
stack
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
3271000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
5AE8000
|
trusted library allocation
|
page read and write
|
||
1263000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
55E5000
|
trusted library allocation
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
581800F20000
|
trusted library allocation
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
5818012F8000
|
trusted library allocation
|
page read and write
|
||
6B5000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
256800754000
|
trusted library allocation
|
page read and write
|
||
1F7294E0000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
599CBFF000
|
stack
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
1166000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
3C0000
|
unkown
|
page write copy
|
||
43D1000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
510000
|
direct allocation
|
page read and write
|
||
58180040C000
|
trusted library allocation
|
page read and write
|
||
328E000
|
heap
|
page read and write
|
||
51B000274000
|
direct allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
BC9000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
20959CFB000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
2690000
|
direct allocation
|
page execute and read and write
|
||
581800C5C000
|
trusted library allocation
|
page read and write
|
||
75AB000
|
direct allocation
|
page read and write
|
||
E10000
|
direct allocation
|
page read and write
|
||
256800760000
|
trusted library allocation
|
page read and write
|
||
581800F68000
|
trusted library allocation
|
page read and write
|
||
2AFD000
|
heap
|
page read and write
|
||
15AB000
|
heap
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
15A2000
|
heap
|
page read and write
|
||
581800290000
|
trusted library allocation
|
page read and write
|
||
3BACBFE000
|
unkown
|
page readonly
|
||
19B000
|
stack
|
page read and write
|
||
757B000
|
heap
|
page read and write
|
||
3644000
|
heap
|
page read and write
|
||
760000
|
unkown
|
page readonly
|
||
EE4000
|
heap
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
3BC000
|
unkown
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
1F7294B5000
|
heap
|
page read and write
|
||
70F0000
|
direct allocation
|
page execute and read and write
|
||
29C0D4F7000
|
unkown
|
page read and write
|
||
1BB8B103000
|
heap
|
page read and write
|
||
3C4000
|
unkown
|
page readonly
|
||
1686000
|
heap
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
150A000
|
trusted library allocation
|
page read and write
|
||
5818003B8000
|
trusted library allocation
|
page read and write
|
||
1508000
|
trusted library allocation
|
page read and write
|
||
113C000
|
heap
|
page read and write
|
||
1BB8B105000
|
heap
|
page read and write
|
||
3BAE3FA000
|
stack
|
page read and write
|
||
1267000
|
trusted library allocation
|
page read and write
|
||
1313000
|
trusted library allocation
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
7FF6183F4000
|
unkown
|
page readonly
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
3732000
|
heap
|
page read and write
|
||
3BC43FE000
|
stack
|
page read and write
|
||
2D4F000
|
stack
|
page read and write
|
||
150A000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
25AF000
|
stack
|
page read and write
|
||
20958830000
|
trusted library allocation
|
page read and write
|
||
1BB8773B000
|
heap
|
page read and write
|
||
55B2000
|
trusted library allocation
|
page read and write
|
||
23AD000
|
stack
|
page read and write
|
||
292E000
|
stack
|
page read and write
|
||
3732000
|
heap
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
74CB000
|
heap
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
20959E0C000
|
heap
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
581800CCC000
|
trusted library allocation
|
page read and write
|
||
1319000
|
trusted library allocation
|
page read and write
|
||
46E0000
|
heap
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
20958F90000
|
unkown
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
581800220000
|
trusted library allocation
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
1472000
|
heap
|
page read and write
|
||
1F7294AA000
|
heap
|
page read and write
|
||
2F2C000
|
stack
|
page read and write
|
||
74C4000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
1F7294A0000
|
heap
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
25680040C000
|
trusted library allocation
|
page read and write
|
||
74C8000
|
heap
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
1BB91FD0000
|
trusted library section
|
page read and write
|
||
55C7000
|
trusted library allocation
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
3D90000
|
heap
|
page read and write
|
||
581800A18000
|
trusted library allocation
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
74C9000
|
heap
|
page read and write
|
||
3980000
|
heap
|
page read and write
|
||
766B000
|
heap
|
page read and write
|
||
15C6000
|
heap
|
page read and write
|
||
42307FE000
|
stack
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
5CDC002C0000
|
trusted library allocation
|
page read and write
|
||
1F7294E6000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
818000
|
heap
|
page read and write
|
||
20959BF3000
|
heap
|
page read and write
|
||
74CE000
|
heap
|
page read and write
|
||
4C6F000
|
stack
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
760000
|
unkown
|
page readonly
|
||
14DD000
|
heap
|
page read and write
|
||
3BC9BFE000
|
unkown
|
page readonly
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
42308FF000
|
stack
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
581800A3C000
|
trusted library allocation
|
page read and write
|
||
5A7F000
|
trusted library allocation
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
5818002B9000
|
trusted library allocation
|
page read and write
|
||
29C0CDA5000
|
heap
|
page read and write
|
||
7FF000
|
heap
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
7DCE000
|
stack
|
page read and write
|
||
159F000
|
heap
|
page read and write
|
||
20958F90000
|
unkown
|
page read and write
|
||
76BA000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
5B01000
|
trusted library allocation
|
page read and write
|
||
4D10000
|
direct allocation
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
BE1000
|
heap
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
58180061C000
|
trusted library allocation
|
page read and write
|
||
5818010E4000
|
trusted library allocation
|
page read and write
|
||
3732000
|
heap
|
page read and write
|
||
3732000
|
heap
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
5818001B4000
|
trusted library allocation
|
page read and write
|
||
420C000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
B9F000
|
heap
|
page read and write
|
||
256800330000
|
trusted library allocation
|
page read and write
|
||
25680039C000
|
trusted library allocation
|
page read and write
|
||
1BB8AB94000
|
heap
|
page read and write
|
||
29C09D01000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
13EF000
|
stack
|
page read and write
|
||
5A6A000
|
trusted library allocation
|
page read and write
|
||
581800294000
|
trusted library allocation
|
page read and write
|
||
2568006EC000
|
trusted library allocation
|
page read and write
|
||
5818001F4000
|
trusted library allocation
|
page read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
2568006E0000
|
trusted library allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
61EA000
|
heap
|
page read and write
|
||
3188000
|
heap
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
15C6000
|
heap
|
page read and write
|
||
109000
|
unkown
|
page write copy
|
||
581800980000
|
trusted library allocation
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
38C000
|
unkown
|
page readonly
|
||
1588000
|
heap
|
page read and write
|
||
256800601000
|
trusted library allocation
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
74C2000
|
heap
|
page read and write
|
||
690000
|
unkown
|
page readonly
|
||
D24000
|
heap
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
5818001E0000
|
trusted library allocation
|
page read and write
|
||
2568003EC000
|
trusted library allocation
|
page read and write
|
||
1ED000
|
stack
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
2EB8000
|
heap
|
page read and write
|
||
5818003AC000
|
trusted library allocation
|
page read and write
|
||
14E3000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
2095A494000
|
unkown
|
page read and write
|
||
D0F000
|
stack
|
page read and write
|
||
581800EC8000
|
trusted library allocation
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
420B000
|
trusted library allocation
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
3BAFBFE000
|
unkown
|
page readonly
|
||
C22000
|
heap
|
page read and write
|
||
581800A18000
|
trusted library allocation
|
page read and write
|
||
1BB9185E000
|
trusted library section
|
page read and write
|
||
41EB000
|
trusted library allocation
|
page read and write
|
||
256800784000
|
trusted library allocation
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
3B9D3EF000
|
stack
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
581801028000
|
trusted library allocation
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
5818003E8000
|
trusted library allocation
|
page read and write
|
||
AFC000
|
unkown
|
page execute and write copy
|
||
827000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
4AA1000
|
trusted library allocation
|
page read and write
|
||
55D6000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
1BB8AB8C000
|
heap
|
page read and write
|
||
3C8E000
|
stack
|
page read and write
|
||
3BB13FE000
|
stack
|
page read and write
|
||
274C000
|
stack
|
page read and write
|
||
3BBABFE000
|
unkown
|
page readonly
|
||
53C000
|
stack
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
55AF000
|
trusted library allocation
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
10E4000
|
heap
|
page read and write
|
||
1BB918C3000
|
trusted library section
|
page read and write
|
||
5818001DC000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
1BB8B14F000
|
heap
|
page read and write
|
||
126C000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
581800104000
|
trusted library allocation
|
page read and write
|
||
1BB8EE92000
|
trusted library allocation
|
page read and write
|
||
1BB8AB90000
|
heap
|
page read and write
|
||
279C000
|
stack
|
page read and write
|
||
2EA1000
|
heap
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
1166000
|
heap
|
page read and write
|
||
7637000
|
heap
|
page read and write
|
||
3AC000
|
unkown
|
page execute and write copy
|
||
7FF618300000
|
unkown
|
page readonly
|
||
581800888000
|
trusted library allocation
|
page read and write
|
||
7754000
|
heap
|
page read and write
|
||
1BB8B105000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
7561000
|
heap
|
page read and write
|
||
5818001C4000
|
trusted library allocation
|
page read and write
|
||
99B000
|
unkown
|
page execute and read and write
|
||
3731000
|
heap
|
page read and write
|
||
5818005DC000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
direct allocation
|
page read and write
|
||
959000
|
unkown
|
page execute and read and write
|
||
1269000
|
trusted library allocation
|
page read and write
|
||
581800550000
|
trusted library allocation
|
page read and write
|
||
15A1000
|
heap
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
581800AB0000
|
trusted library allocation
|
page read and write
|
||
BFD000
|
heap
|
page read and write
|
||
2AEA000
|
heap
|
page read and write
|
||
425D000
|
trusted library allocation
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
4C36000
|
direct allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
581800D10000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
direct allocation
|
page read and write
|
||
167E000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
51B000260000
|
direct allocation
|
page read and write
|
||
5A64000
|
trusted library allocation
|
page read and write
|
||
5818003E8000
|
trusted library allocation
|
page read and write
|
||
7603000
|
heap
|
page read and write
|
||
5B89000
|
trusted library allocation
|
page read and write
|
||
5AB3000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
3E90000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
4A40000
|
direct allocation
|
page execute and read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
29C09D20000
|
heap
|
page read and write
|
||
2676000
|
heap
|
page read and write
|
||
5A7A000
|
trusted library allocation
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
15A5000
|
heap
|
page read and write
|
||
256800430000
|
trusted library allocation
|
page read and write
|
||
5AE9000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
49F0000
|
direct allocation
|
page execute and read and write
|
||
1264000
|
trusted library allocation
|
page read and write
|
||
3BC33FD000
|
stack
|
page read and write
|
||
256800404000
|
trusted library allocation
|
page read and write
|
||
29C0D1E1000
|
unkown
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
2690000
|
direct allocation
|
page execute and read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
581801044000
|
trusted library allocation
|
page read and write
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
53E000
|
heap
|
page read and write
|
||
29C0A180000
|
unkown
|
page read and write
|
||
159C000
|
heap
|
page read and write
|
||
2095A1D1000
|
unkown
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
5818003B8000
|
trusted library allocation
|
page read and write
|
||
55FF000
|
trusted library allocation
|
page read and write
|
||
3BC000
|
unkown
|
page write copy
|
||
1244000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
80000
|
unkown
|
page readonly
|
||
3BBE3FE000
|
stack
|
page read and write
|
||
42301FE000
|
stack
|
page read and write
|
||
6FB000
|
unkown
|
page execute and read and write
|
||
2E10000
|
heap
|
page read and write
|
||
4BF1000
|
heap
|
page read and write
|
||
14C4000
|
heap
|
page read and write
|
||
5A8A000
|
trusted library allocation
|
page read and write
|
||
13FD000
|
stack
|
page read and write
|
||
2DE8000
|
heap
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
82C000
|
heap
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
581800358000
|
trusted library allocation
|
page read and write
|
||
581800183000
|
trusted library allocation
|
page read and write
|
||
581800ED8000
|
trusted library allocation
|
page read and write
|
||
55AA000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
17E4000
|
heap
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
29C0CD3B000
|
heap
|
page read and write
|
||
1F7294F2000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
1BB8772F000
|
heap
|
page read and write
|
||
5818001B4000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
5A69000
|
trusted library allocation
|
page read and write
|
||
4BD1000
|
heap
|
page read and write
|
||
5818003B8000
|
trusted library allocation
|
page read and write
|
||
109000
|
unkown
|
page write copy
|
||
43D1000
|
heap
|
page read and write
|
||
29C0D1E1000
|
unkown
|
page read and write
|
||
43D1000
|
heap
|
page read and write
|
||
E3E000
|
heap
|
page read and write
|
||
1BB8AB9D000
|
heap
|
page read and write
|
||
1BB8ABA2000
|
heap
|
page read and write
|
||
327E000
|
heap
|
page read and write
|
||
581800948000
|
trusted library allocation
|
page read and write
|
||
5A6F000
|
trusted library allocation
|
page read and write
|
||
9BF000
|
stack
|
page read and write
|
||
22D5000
|
heap
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
15BF000
|
heap
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
256800260000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
direct allocation
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
5A61000
|
trusted library allocation
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
43D1000
|
heap
|
page read and write
|
||
5A7B000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
3B4000
|
heap
|
page read and write
|
||
2568002EC000
|
trusted library allocation
|
page read and write
|
||
298B000
|
heap
|
page read and write
|
||
7B50000
|
heap
|
page read and write
|
||
51B000303000
|
direct allocation
|
page read and write
|
||
58180080C000
|
trusted library allocation
|
page read and write
|
||
5818008B0000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
1BB8AB95000
|
heap
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
1BB8ABA7000
|
heap
|
page read and write
|
||
5AE9000
|
trusted library allocation
|
page read and write
|
||
41A1000
|
trusted library allocation
|
page read and write
|
||
5A86000
|
trusted library allocation
|
page read and write
|
||
3BCDBFE000
|
unkown
|
page readonly
|
||
1BB910C2000
|
trusted library section
|
page read and write
|
||
5B5A000
|
trusted library allocation
|
page read and write
|
||
1BB8ABA8000
|
heap
|
page read and write
|
||
14D2000
|
heap
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
12F7000
|
trusted library allocation
|
page read and write
|
||
15C4000
|
heap
|
page read and write
|
||
43F1000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5818006AD000
|
trusted library allocation
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
964000
|
heap
|
page read and write
|
||
2F0000
|
unkown
|
page readonly
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
2940000
|
direct allocation
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
55EC000
|
trusted library allocation
|
page read and write
|
There are 3838 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=3907f97605.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=3907f97605.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=3907f97605.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=3907f97605.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=3907f97605.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|
||
https://learn.microsoft.com/en-us/dotnet/framework/install/application-not-started?version=(null)&processName=3907f97605.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
|