Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\fontcreator[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\num[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1003142001\fontcreator.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1003143001\fontcreator.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1003144001\9eba8044e7.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1003145001\1553f88169.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1003146001\661f3ff865.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1003147001\num.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\7URDKE3CJSA37VV3INEEM0S4N1C.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\FT773VWATWFL9SRK5RTU4.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\KOLH45MMED0OMDDRYHIG.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\SWJQ0719J9GFR3PZ91XO7LBLZA7.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\NVFTVRDLL64.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\_isetup\_isdecmp.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\ddETWExternal.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\is-9EFK3.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\is-BB72E.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\is-GF03F.tmp
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\nvfvsdksvc_x64.exe (copy)
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-1UGLR.tmp\fontcreator.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-6RCEE.tmp\_isetup\_isdecmp.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\NVFTVRDLL64.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\_isetup\_isdecmp.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\ddETWExternal.dll (copy)
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\is-5MQTR.tmp
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\is-7T5A6.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\is-DEVD7.tmp
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\nvfvsdksvc_x64.exe (copy)
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-FANHF.tmp\_isetup\_isdecmp.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-H6BOG.tmp\fontcreator.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-OPEFN.tmp\fontcreator.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-R63KU.tmp\fontcreator.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\hangbird\Updater.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\hangbird\is-21RVC.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\hangbird\is-8C9AL.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FT773VWATWFL9SRK5RTU4.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\NvFrapsOpenVR.man (copy)
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\ddETWExternal.xml (copy)
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (399), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\htcvive_install.bat (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\is-94945.tmp
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (399), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\is-H5QIF.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\is-QAUKJ.tmp
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\is-UAEL0.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-0PK7I.tmp\nvinstall.cmd (copy)
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-6RCEE.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\NvFrapsOpenVR.man (copy)
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\ddETWExternal.xml (copy)
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (399), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\htcvive_install.bat (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\is-FMCKE.tmp
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\is-J075V.tmp
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (399), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\is-PT4NM.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\is-SFQQ2.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-BBOTN.tmp\nvinstall.cmd (copy)
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-FANHF.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\hangbird\caliculus.csv (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\hangbird\caliculus.zip (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\hangbird\is-2VLJU.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\hangbird\is-69DVH.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\hangbird\is-TACJK.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\hangbird\is-V0B5I.tmp
|
data
|
dropped
|
||
C:\Windows\Tasks\skotes.job
|
data
|
dropped
|
There are 58 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\FT773VWATWFL9SRK5RTU4.exe
|
"C:\Users\user\AppData\Local\Temp\FT773VWATWFL9SRK5RTU4.exe"
|
||
C:\Users\user\AppData\Local\Temp\KOLH45MMED0OMDDRYHIG.exe
|
"C:\Users\user\AppData\Local\Temp\KOLH45MMED0OMDDRYHIG.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\1003144001\9eba8044e7.exe
|
"C:\Users\user\AppData\Local\Temp\1003144001\9eba8044e7.exe"
|
||
C:\Users\user\AppData\Local\Temp\1003142001\fontcreator.exe
|
"C:\Users\user\AppData\Local\Temp\1003142001\fontcreator.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-H6BOG.tmp\fontcreator.tmp
|
"C:\Users\user\AppData\Local\Temp\is-H6BOG.tmp\fontcreator.tmp" /SL5="$C0076,2820349,845824,C:\Users\user\AppData\Local\Temp\1003142001\fontcreator.exe"
|
||
C:\Users\user\AppData\Local\Temp\1003142001\fontcreator.exe
|
"C:\Users\user\AppData\Local\Temp\1003142001\fontcreator.exe" /VERYSILENT
|
||
C:\Users\user\AppData\Local\Temp\is-OPEFN.tmp\fontcreator.tmp
|
"C:\Users\user\AppData\Local\Temp\is-OPEFN.tmp\fontcreator.tmp" /SL5="$50284,2820349,845824,C:\Users\user\AppData\Local\Temp\1003142001\fontcreator.exe"
/VERYSILENT
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
|
||
C:\Windows\System32\find.exe
|
find /I "wrsa.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH
|
||
C:\Windows\System32\find.exe
|
find /I "opssvc.exe"
|
||
C:\Users\user\AppData\Local\Temp\1003143001\fontcreator.exe
|
"C:\Users\user\AppData\Local\Temp\1003143001\fontcreator.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH
|
||
C:\Windows\System32\find.exe
|
find /I "avastui.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-R63KU.tmp\fontcreator.tmp
|
"C:\Users\user\AppData\Local\Temp\is-R63KU.tmp\fontcreator.tmp" /SL5="$30472,2820349,845824,C:\Users\user\AppData\Local\Temp\1003143001\fontcreator.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH
|
||
C:\Windows\System32\find.exe
|
find /I "avgui.exe"
|
||
C:\Users\user\AppData\Local\Temp\1003143001\fontcreator.exe
|
"C:\Users\user\AppData\Local\Temp\1003143001\fontcreator.exe" /VERYSILENT
|
||
C:\Users\user\AppData\Local\Temp\is-1UGLR.tmp\fontcreator.tmp
|
"C:\Users\user\AppData\Local\Temp\is-1UGLR.tmp\fontcreator.tmp" /SL5="$40474,2820349,845824,C:\Users\user\AppData\Local\Temp\1003143001\fontcreator.exe"
/VERYSILENT
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH
|
||
C:\Windows\System32\find.exe
|
find /I "nswscsvc.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
|
||
C:\Windows\System32\find.exe
|
find /I "wrsa.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH
|
||
C:\Windows\System32\find.exe
|
find /I "sophoshealth.exe"
|
||
C:\Users\user\AppData\Local\hangbird\Updater.exe
|
"C:\Users\user\AppData\Local\hangbird\\Updater.exe" "C:\Users\user\AppData\Local\hangbird\\caliculus.csv"
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH
|
||
C:\Windows\System32\find.exe
|
find /I "opssvc.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH
|
||
C:\Windows\System32\find.exe
|
find /I "avastui.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH
|
||
C:\Windows\System32\find.exe
|
find /I "avgui.exe"
|
||
C:\Windows\System32\cmd.exe
|
"cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\tasklist.exe
|
tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH
|
There are 48 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.43/Zu7JuNko/index.phpncoded
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpnu
|
unknown
|
||
necklacedmny.store
|
|||
fadehairucw.store
|
|||
http://185.215.113.43/Zu7JuNko/index.php
|
185.215.113.43
|
||
founpiuer.store
|
|||
crisiwarny.store
|
|||
scriptyprefej.store
|
|||
presticitpo.store
|
|||
http://185.215.113.43/Zu7JuNko/index.phpgPZk
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php4
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpA
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpUsers
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://185.215.113.16/off/def.exeeh
|
unknown
|
||
http://cscasha2.ocsp-ce
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
http://185.215.113.16/off/def.exeev
|
unknown
|
||
http://repository.certum.pl/ccsca2021.cer0
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://www.remobjects.com/ps
|
unknown
|
||
http://185.215.113.16/off/def.exez
|
unknown
|
||
https://www.innosetup.com/
|
unknown
|
||
https://necklacedmny.store/apiRy
|
unknown
|
||
http://ccsca2021.ocsp-certum.com05
|
unknown
|
||
http://www.certum.pl/CPS0
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
http://185.215.113.16/off/def.exee
|
unknown
|
||
https://necklacedmny.store:443/api:w
|
unknown
|
||
https://necklacedmny.store/apiC
|
unknown
|
||
http://185.215.113.16/well/random.exe
|
unknown
|
||
http://185.215.113.43/fac00b58987e8fff7a7df309c5441f056fc49#
|
unknown
|
||
http://crl.certum.pl/ctnca.crl0k
|
unknown
|
||
http://185.215.113.43/ferences.SourceAumid0#
|
unknown
|
||
http://www.entrust.net/rpa03
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://crl.rootca1.amazontrust.com/rootca1.crl0
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://185.215.113.43/Pictures
|
unknown
|
||
http://www.autoitscript.com/autoit3/X
|
unknown
|
||
http://185.215.113.43/15.113.43/ows
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
|
unknown
|
||
http://crl.microsoft:
|
unknown
|
||
https://necklacedmny.store/apiP
|
unknown
|
||
https://necklacedmny.store/d
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
|
unknown
|
||
http://185.215.113.43/ones
|
unknown
|
||
https://necklacedmny.store/_
|
unknown
|
||
https://support.microsof
|
unknown
|
||
https://necklacedmny.store/J
|
unknown
|
||
https://necklacedmny.store/apit
|
unknown
|
||
http://185.215.113.16/mine/random.exet
|
unknown
|
||
http://185.215.113.16/1
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
https://necklacedmny.store/D
|
unknown
|
||
http://185.215.113.16/(
|
unknown
|
||
http://crl.entrust.net/2048ca.crl0
|
unknown
|
||
https://www.entrust.net/rpa0
|
unknown
|
||
https://necklacedmny.store/:
|
unknown
|
||
http://repository.certum.pl/ctsca2021.cer0A
|
unknown
|
||
http://crl.certum.pl/ctsca2021.crl0o
|
unknown
|
||
http://repository.certum.pl/cscasha2.cer0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://31.41.244.11/files/fontcreator.exe
|
unknown
|
||
http://ocsp.entrust.net03
|
unknown
|
||
https://necklacedmny.store/B
|
unknown
|
||
http://ocsp.entrust.net02
|
unknown
|
||
http://185.215.113.16/mine/random.exe
|
unknown
|
||
http://ccsca2021.crl.certum.pl/ccsca2021.crl0s
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://185.215.113.16/steam/random.exek
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
|
unknown
|
||
http://31.41.244.11/files/fontcreator.exeVj
|
unknown
|
||
http://185.215.113.16/luma/random.exe
|
unknown
|
||
http://185.215.113.16/test/num.exe
|
unknown
|
||
https://necklacedmny.store:443/apin
|
unknown
|
||
http://subca.ocsp-certum.com05
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
|
unknown
|
||
http://subca.ocsp-certum.com02
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
http://subca.ocsp-certum.com01
|
unknown
|
||
https://sectigo.com/CPS0D
|
unknown
|
||
http://crl.certum.pl/ctnca2.crl0l
|
unknown
|
||
http://repository.certum.pl/ctnca2.cer09
|
unknown
|
||
https://jrsoftware.org0
|
unknown
|
||
https://jrsoftware.org/
|
unknown
|
||
http://crl.entrust.net/ts1ca.crl0
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://necklacedmny.store:443/api
|
unknown
|
||
http://31.41.244.11/files/fontcreator.exe1
|
unknown
|
||
http://185.215.113.16:80/off/def.exeault-release/key4.dbPK
|
unknown
|
||
http://repository.certum.pl/ctnca.cer09
|
unknown
|
||
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
necklacedmny.store
|
188.114.97.3
|
||
presticitpo.store
|
unknown
|
||
thumbystriw.store
|
unknown
|
||
crisiwarny.store
|
unknown
|
||
fadehairucw.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.43
|
unknown
|
Portugal
|
||
188.114.97.3
|
necklacedmny.store
|
European Union
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
31.41.244.11
|
unknown
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
9eba8044e7.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
1553f88169.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
661f3ff865.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
num.exe
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
391000
|
unkown
|
page execute and read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
EE1000
|
unkown
|
page execute and read and write
|
||
EE1000
|
unkown
|
page execute and read and write
|
||
4CA0000
|
direct allocation
|
page read and write
|
||
47E0000
|
direct allocation
|
page read and write
|
||
2032F790000
|
heap
|
page read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
3A5E000
|
stack
|
page read and write
|
||
D6F000
|
unkown
|
page read and write
|
||
5E5E000
|
trusted library allocation
|
page read and write
|
||
636D000
|
trusted library allocation
|
page read and write
|
||
1383000
|
direct allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
4C4F000
|
stack
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
5E17000
|
trusted library allocation
|
page read and write
|
||
580A000
|
trusted library allocation
|
page read and write
|
||
143E000
|
heap
|
page read and write
|
||
5278000
|
trusted library allocation
|
page read and write
|
||
61ED000
|
trusted library allocation
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
2032F587000
|
heap
|
page read and write
|
||
ECFCAFF000
|
stack
|
page read and write
|
||
4F20000
|
heap
|
page read and write
|
||
40CE000
|
stack
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
65C0000
|
heap
|
page read and write
|
||
1D428C0B000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
6259000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
344C000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
420F000
|
stack
|
page read and write
|
||
6276000
|
trusted library allocation
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
61ED000
|
trusted library allocation
|
page read and write
|
||
1643AE80000
|
heap
|
page read and write
|
||
5E37000
|
trusted library allocation
|
page read and write
|
||
11E6000
|
unkown
|
page execute and write copy
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
19FA321C000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
19A2BA2D000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
6117000
|
trusted library allocation
|
page read and write
|
||
61E6000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
563C000
|
trusted library allocation
|
page read and write
|
||
2B8F000
|
stack
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
4F17000
|
heap
|
page read and write
|
||
5E37000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5E78000
|
trusted library allocation
|
page read and write
|
||
42D1000
|
heap
|
page read and write
|
||
54E1000
|
heap
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
CC4000
|
unkown
|
page write copy
|
||
6654000
|
trusted library allocation
|
page read and write
|
||
12FE000
|
direct allocation
|
page read and write
|
||
56EA000
|
trusted library allocation
|
page read and write
|
||
97D40FF000
|
stack
|
page read and write
|
||
661D000
|
trusted library allocation
|
page read and write
|
||
26C8000
|
direct allocation
|
page read and write
|
||
2A9307F000
|
stack
|
page read and write
|
||
52DA000
|
trusted library allocation
|
page read and write
|
||
5EBD47E000
|
stack
|
page read and write
|
||
5767000
|
trusted library allocation
|
page read and write
|
||
4BBD000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
523E000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
57AE000
|
trusted library allocation
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
61DD000
|
trusted library allocation
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
EF3487E000
|
stack
|
page read and write
|
||
5721000
|
trusted library allocation
|
page read and write
|
||
63F1000
|
trusted library allocation
|
page read and write
|
||
7EFEB000
|
direct allocation
|
page read and write
|
||
56EC000
|
trusted library allocation
|
page read and write
|
||
A56000
|
unkown
|
page write copy
|
||
1C918595000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
33F4000
|
heap
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
1781000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
4FCB000
|
stack
|
page read and write
|
||
542F1EB000
|
stack
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
920000
|
direct allocation
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
6112000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
5BA000
|
heap
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
DCC000
|
direct allocation
|
page read and write
|
||
6117000
|
trusted library allocation
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
BCF000
|
unkown
|
page execute and read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
52C4000
|
trusted library allocation
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
19A2BA1A000
|
heap
|
page read and write
|
||
BD7000
|
unkown
|
page execute and read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
4FD1000
|
heap
|
page read and write
|
||
575D000
|
trusted library allocation
|
page read and write
|
||
3C52000
|
direct allocation
|
page read and write
|
||
2841B650000
|
heap
|
page read and write
|
||
D72000
|
unkown
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
1771000
|
heap
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
F70000
|
remote allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
42D1000
|
heap
|
page read and write
|
||
11E6000
|
unkown
|
page execute and read and write
|
||
2B5727E000
|
stack
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
5240000
|
trusted library allocation
|
page read and write
|
||
288F000
|
stack
|
page read and write
|
||
6F1D57E000
|
stack
|
page read and write
|
||
1D4757C0000
|
heap
|
page read and write
|
||
12B4000
|
direct allocation
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
20CD1B000
|
stack
|
page read and write
|
||
FE3000
|
heap
|
page read and write
|
||
5633000
|
trusted library allocation
|
page read and write
|
||
19FA3208000
|
heap
|
page read and write
|
||
5431000
|
trusted library allocation
|
page read and write
|
||
576B000
|
trusted library allocation
|
page read and write
|
||
4960000
|
direct allocation
|
page execute and read and write
|
||
C0E000
|
heap
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
608000
|
heap
|
page read and write
|
||
B8D000
|
unkown
|
page execute read
|
||
6FD000
|
stack
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
344D000
|
heap
|
page read and write
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
611B000
|
trusted library allocation
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
2E5A26C0000
|
heap
|
page read and write
|
||
2589000
|
direct allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
6E3000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
23C2D590000
|
heap
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
C27000
|
unkown
|
page execute and write copy
|
||
35D1000
|
heap
|
page read and write
|
||
5670000
|
heap
|
page read and write
|
||
5E2C000
|
trusted library allocation
|
page read and write
|
||
33DF000
|
stack
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
639F000
|
trusted library allocation
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
6F1D5FF000
|
stack
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
83B000
|
stack
|
page read and write
|
||
F4B000
|
unkown
|
page execute and read and write
|
||
1D428C2C000
|
heap
|
page read and write
|
||
53F1000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
5E5D000
|
trusted library allocation
|
page read and write
|
||
5746000
|
trusted library allocation
|
page read and write
|
||
6276000
|
trusted library allocation
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
1BB9688F000
|
heap
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
5E1C000
|
trusted library allocation
|
page read and write
|
||
1D5000
|
heap
|
page read and write
|
||
181000
|
unkown
|
page execute and write copy
|
||
356A000
|
heap
|
page read and write
|
||
785E000
|
stack
|
page read and write
|
||
5245000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
81A000
|
heap
|
page read and write
|
||
5721000
|
trusted library allocation
|
page read and write
|
||
2563000
|
direct allocation
|
page read and write
|
||
274C000
|
direct allocation
|
page read and write
|
||
2A5E000
|
stack
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
570F000
|
trusted library allocation
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
C3B000
|
unkown
|
page execute and write copy
|
||
611B000
|
trusted library allocation
|
page read and write
|
||
2E5A2778000
|
heap
|
page read and write
|
||
3080000
|
direct allocation
|
page read and write
|
||
5E62000
|
trusted library allocation
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
506D000
|
stack
|
page read and write
|
||
2032F57B000
|
heap
|
page read and write
|
||
4D519FF000
|
stack
|
page read and write
|
||
A1ECEDB000
|
stack
|
page read and write
|
||
1D47555E000
|
heap
|
page read and write
|
||
5330000
|
heap
|
page execute and read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
19A2BA05000
|
heap
|
page read and write
|
||
579D000
|
trusted library allocation
|
page read and write
|
||
3877000
|
direct allocation
|
page read and write
|
||
588C000
|
trusted library allocation
|
page read and write
|
||
2E5A278E000
|
heap
|
page read and write
|
||
527C000
|
trusted library allocation
|
page read and write
|
||
369E000
|
stack
|
page read and write
|
||
1C91859B000
|
heap
|
page read and write
|
||
175A000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
19A2B880000
|
heap
|
page read and write
|
||
7F3000
|
heap
|
page read and write
|
||
5E8C000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
2701000
|
direct allocation
|
page read and write
|
||
2A3E000
|
heap
|
page read and write
|
||
5722000
|
trusted library allocation
|
page read and write
|
||
1D428C06000
|
heap
|
page read and write
|
||
329F000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
4950000
|
direct allocation
|
page execute and read and write
|
||
3547000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
113B000
|
heap
|
page read and write
|
||
563B000
|
trusted library allocation
|
page read and write
|
||
252CB760000
|
heap
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
1750000
|
heap
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
35F4000
|
heap
|
page read and write
|
||
5E1E000
|
trusted library allocation
|
page read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
56DE000
|
trusted library allocation
|
page read and write
|
||
2032F58C000
|
heap
|
page read and write
|
||
56EE000
|
trusted library allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
2587000
|
direct allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
56DD000
|
trusted library allocation
|
page read and write
|
||
25F8000
|
direct allocation
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
384E000
|
stack
|
page read and write
|
||
5FC3000
|
trusted library allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
582C000
|
trusted library allocation
|
page read and write
|
||
25C1000
|
direct allocation
|
page read and write
|
||
D40000
|
direct allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
5E25000
|
trusted library allocation
|
page read and write
|
||
FA2000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
61E7000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
B91000
|
heap
|
page read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
CB5000
|
unkown
|
page write copy
|
||
3080000
|
direct allocation
|
page read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
610000
|
direct allocation
|
page read and write
|
||
6119000
|
trusted library allocation
|
page read and write
|
||
37AE000
|
direct allocation
|
page read and write
|
||
365E000
|
stack
|
page read and write
|
||
252CB76B000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
61A8000
|
trusted library allocation
|
page read and write
|
||
10B3000
|
heap
|
page read and write
|
||
279C000
|
direct allocation
|
page read and write
|
||
5253000
|
trusted library allocation
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
5E6D000
|
trusted library allocation
|
page read and write
|
||
A69000
|
unkown
|
page write copy
|
||
4DCD000
|
stack
|
page read and write
|
||
734A000
|
heap
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
1BB96848000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
C1F000
|
stack
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
524B000
|
trusted library allocation
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
6265000
|
trusted library allocation
|
page read and write
|
||
6246000
|
trusted library allocation
|
page read and write
|
||
5769000
|
trusted library allocation
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
80E000
|
heap
|
page read and write
|
||
BEF000
|
unkown
|
page execute and write copy
|
||
3A1F000
|
stack
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
26C0000
|
direct allocation
|
page read and write
|
||
5E9000
|
heap
|
page read and write
|
||
495E000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
132B000
|
direct allocation
|
page read and write
|
||
344C000
|
heap
|
page read and write
|
||
7EF000
|
heap
|
page read and write
|
||
2BF0000
|
direct allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
5888000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
4BA8000
|
trusted library allocation
|
page read and write
|
||
58BC000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
19BAFE87000
|
heap
|
page read and write
|
||
522F000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
25FC000
|
direct allocation
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
42DF000
|
stack
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
91D000
|
unkown
|
page execute read
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
65F6000
|
trusted library allocation
|
page read and write
|
||
7F7000
|
heap
|
page read and write
|
||
25D4B795000
|
heap
|
page read and write
|
||
FD2000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
523E000
|
trusted library allocation
|
page read and write
|
||
5768000
|
trusted library allocation
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
4B9B000
|
trusted library allocation
|
page read and write
|
||
C54000
|
unkown
|
page execute and read and write
|
||
679000
|
heap
|
page read and write
|
||
5729000
|
trusted library allocation
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
1B441C80000
|
heap
|
page read and write
|
||
B1F000
|
stack
|
page read and write
|
||
176F000
|
heap
|
page read and write
|
||
522D000
|
trusted library allocation
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
2538000
|
direct allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
135F000
|
stack
|
page read and write
|
||
5226000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
1BB9688C000
|
heap
|
page read and write
|
||
A52000
|
unkown
|
page execute and write copy
|
||
4800000
|
direct allocation
|
page read and write
|
||
177E000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
88AB000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
174F000
|
heap
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
275A000
|
direct allocation
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
563E000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
CE5C12F000
|
stack
|
page read and write
|
||
D79000
|
unkown
|
page readonly
|
||
57BA000
|
trusted library allocation
|
page read and write
|
||
3F1F000
|
stack
|
page read and write
|
||
5221000
|
trusted library allocation
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
344D000
|
heap
|
page read and write
|
||
118D000
|
heap
|
page read and write
|
||
10FF000
|
stack
|
page read and write
|
||
2E5A2766000
|
heap
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
5EAE000
|
trusted library allocation
|
page read and write
|
||
5080000
|
heap
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
FD6000
|
heap
|
page read and write
|
||
37B0000
|
direct allocation
|
page read and write
|
||
5638000
|
trusted library allocation
|
page read and write
|
||
F49000
|
unkown
|
page write copy
|
||
4351000
|
heap
|
page read and write
|
||
BEE000
|
unkown
|
page execute and read and write
|
||
5BF000
|
heap
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
6257000
|
trusted library allocation
|
page read and write
|
||
5E1000
|
heap
|
page read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
146000
|
stack
|
page read and write
|
||
62FB000
|
trusted library allocation
|
page read and write
|
||
6659000
|
trusted library allocation
|
page read and write
|
||
5639000
|
trusted library allocation
|
page read and write
|
||
6279000
|
trusted library allocation
|
page read and write
|
||
61B1000
|
trusted library allocation
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
752D000
|
stack
|
page read and write
|
||
4820000
|
heap
|
page read and write
|
||
2515000
|
direct allocation
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
12E1000
|
direct allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
19BAFEBC000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
CEC000
|
unkown
|
page execute and read and write
|
||
1763000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
F61000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
19BAFEAD000
|
heap
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
12C3000
|
direct allocation
|
page read and write
|
||
4450000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
22A4B420000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
5E1F000
|
trusted library allocation
|
page read and write
|
||
448C000
|
stack
|
page read and write
|
||
25D4B790000
|
heap
|
page read and write
|
||
262B000
|
direct allocation
|
page read and write
|
||
522F000
|
trusted library allocation
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
7D9000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
1BB96864000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
1DB000
|
unkown
|
page execute and write copy
|
||
394F000
|
stack
|
page read and write
|
||
629D000
|
trusted library allocation
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
62F9000
|
trusted library allocation
|
page read and write
|
||
524F000
|
trusted library allocation
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
563A000
|
trusted library allocation
|
page read and write
|
||
137C000
|
direct allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
10B1000
|
heap
|
page read and write
|
||
563C000
|
trusted library allocation
|
page read and write
|
||
6267000
|
trusted library allocation
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
5636000
|
trusted library allocation
|
page read and write
|
||
5E23000
|
trusted library allocation
|
page read and write
|
||
1068000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
1BB9687B000
|
heap
|
page read and write
|
||
109E000
|
heap
|
page read and write
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
7EF000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
4D51A7F000
|
stack
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
5E7C000
|
trusted library allocation
|
page read and write
|
||
5255000
|
trusted library allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
344C000
|
heap
|
page read and write
|
||
62EA000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
CB0000
|
unkown
|
page write copy
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
334D000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
500C000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
48A0000
|
direct allocation
|
page execute and read and write
|
||
5746000
|
trusted library allocation
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
10C5000
|
unkown
|
page execute and read and write
|
||
54D7000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
5E1F000
|
trusted library allocation
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
5E19000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
stack
|
page read and write
|
||
C72000
|
unkown
|
page execute and write copy
|
||
1255000
|
unkown
|
page readonly
|
||
E15000
|
heap
|
page read and write
|
||
523E000
|
trusted library allocation
|
page read and write
|
||
2786000
|
direct allocation
|
page read and write
|
||
D00000
|
unkown
|
page readonly
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
2622000
|
direct allocation
|
page read and write
|
||
67A000
|
heap
|
page read and write
|
||
52BD000
|
trusted library allocation
|
page read and write
|
||
52CC000
|
trusted library allocation
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
5E95000
|
trusted library allocation
|
page read and write
|
||
1BB96866000
|
heap
|
page read and write
|
||
7F3000
|
heap
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
4FA000
|
stack
|
page read and write
|
||
37CD000
|
direct allocation
|
page read and write
|
||
577A000
|
trusted library allocation
|
page read and write
|
||
621F000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
direct allocation
|
page read and write
|
||
61AA000
|
trusted library allocation
|
page read and write
|
||
FE3000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
2032F59C000
|
heap
|
page read and write
|
||
2B56D8B000
|
stack
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
2736000
|
direct allocation
|
page read and write
|
||
F49000
|
unkown
|
page write copy
|
||
E14000
|
heap
|
page read and write
|
||
7F3000
|
heap
|
page read and write
|
||
2780000
|
direct allocation
|
page read and write
|
||
5E94000
|
trusted library allocation
|
page read and write
|
||
2577000
|
direct allocation
|
page read and write
|
||
138A000
|
direct allocation
|
page read and write
|
||
344D000
|
heap
|
page read and write
|
||
920000
|
direct allocation
|
page read and write
|
||
4640000
|
heap
|
page read and write
|
||
358F000
|
stack
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
5E1D000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
5E1C000
|
trusted library allocation
|
page read and write
|
||
5278000
|
trusted library allocation
|
page read and write
|
||
ECFCA7F000
|
stack
|
page read and write
|
||
2638000
|
direct allocation
|
page read and write
|
||
263F000
|
direct allocation
|
page read and write
|
||
ADE000
|
stack
|
page read and write
|
||
2678000
|
direct allocation
|
page read and write
|
||
622E000
|
trusted library allocation
|
page read and write
|
||
455F000
|
stack
|
page read and write
|
||
16D3B0FF000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
16D3B0FC000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
23C2D350000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
5228000
|
trusted library allocation
|
page read and write
|
||
5E94000
|
trusted library allocation
|
page read and write
|
||
5ED5000
|
trusted library allocation
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
259E000
|
direct allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
C07000
|
unkown
|
page execute and write copy
|
||
6DC01FF000
|
stack
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
6274000
|
trusted library allocation
|
page read and write
|
||
11E7000
|
unkown
|
page execute and write copy
|
||
D90000
|
heap
|
page read and write
|
||
5E4E000
|
trusted library allocation
|
page read and write
|
||
38D92FF000
|
stack
|
page read and write
|
||
4D01000
|
direct allocation
|
page read and write
|
||
5789000
|
trusted library allocation
|
page read and write
|
||
5786000
|
trusted library allocation
|
page read and write
|
||
6F1D4FF000
|
stack
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
19BAFED4000
|
heap
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
82A000
|
unkown
|
page execute and write copy
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
624D000
|
trusted library allocation
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
523F000
|
trusted library allocation
|
page read and write
|
||
260D000
|
direct allocation
|
page read and write
|
||
65E8000
|
heap
|
page read and write
|
||
1B441D8F000
|
heap
|
page read and write
|
||
6223000
|
trusted library allocation
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
6217000
|
trusted library allocation
|
page read and write
|
||
E1E000
|
stack
|
page read and write
|
||
6FC000
|
stack
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
1C918596000
|
heap
|
page read and write
|
||
3080000
|
direct allocation
|
page read and write
|
||
61A8000
|
trusted library allocation
|
page read and write
|
||
52CC000
|
trusted library allocation
|
page read and write
|
||
58BE000
|
trusted library allocation
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
967000
|
unkown
|
page readonly
|
||
654000
|
heap
|
page read and write
|
||
5701000
|
trusted library allocation
|
page read and write
|
||
611F000
|
trusted library allocation
|
page read and write
|
||
52C5000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
F42000
|
unkown
|
page execute and read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
6270000
|
trusted library allocation
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
5EBD3FE000
|
stack
|
page read and write
|
||
532F000
|
stack
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
1B441D75000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
582B000
|
trusted library allocation
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
6208000
|
trusted library allocation
|
page read and write
|
||
6221000
|
trusted library allocation
|
page read and write
|
||
19A2BA2D000
|
heap
|
page read and write
|
||
74D1000
|
heap
|
page read and write
|
||
1BB96840000
|
heap
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
19FA31F7000
|
heap
|
page read and write
|
||
2E5A2740000
|
heap
|
page read and write
|
||
344C000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
577C000
|
trusted library allocation
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
93E000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
5E94000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
533F000
|
trusted library allocation
|
page read and write
|
||
390000
|
unkown
|
page readonly
|
||
1D475564000
|
heap
|
page read and write
|
||
2E5A2AA5000
|
heap
|
page read and write
|
||
6263000
|
trusted library allocation
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
1D47553D000
|
heap
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
4F10000
|
heap
|
page read and write
|
||
6618000
|
trusted library allocation
|
page read and write
|
||
711000
|
heap
|
page read and write
|
||
1B442085000
|
heap
|
page read and write
|
||
2A1F000
|
stack
|
page read and write
|
||
56CF000
|
trusted library allocation
|
page read and write
|
||
FE9000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
6249000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
12CA000
|
direct allocation
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
27AC000
|
direct allocation
|
page read and write
|
||
1C918595000
|
heap
|
page read and write
|
||
438B000
|
stack
|
page read and write
|
||
34EB000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
56F6000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
BEC000
|
unkown
|
page execute and write copy
|
||
33D1000
|
heap
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
11E6000
|
unkown
|
page execute and read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
576A000
|
trusted library allocation
|
page read and write
|
||
5224000
|
trusted library allocation
|
page read and write
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
611F000
|
trusted library allocation
|
page read and write
|
||
F61000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
F42000
|
unkown
|
page execute and read and write
|
||
344F000
|
stack
|
page read and write
|
||
2CD0000
|
heap
|
page read and write
|
||
25B4000
|
direct allocation
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
35F4000
|
heap
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
635F000
|
trusted library allocation
|
page read and write
|
||
1D428C05000
|
heap
|
page read and write
|
||
FA2000
|
heap
|
page read and write
|
||
508C000
|
stack
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
1C9184B0000
|
heap
|
page read and write
|
||
1D47555E000
|
heap
|
page read and write
|
||
356E000
|
direct allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
6257000
|
trusted library allocation
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
3FB000
|
unkown
|
page execute and read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
1643AE20000
|
heap
|
page read and write
|
||
441E000
|
stack
|
page read and write
|
||
5E4E000
|
trusted library allocation
|
page read and write
|
||
6F1D1DB000
|
stack
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
5653000
|
trusted library allocation
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
5239000
|
trusted library allocation
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
559F000
|
stack
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
2772000
|
direct allocation
|
page read and write
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
2EA10A57000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
35F4000
|
heap
|
page read and write
|
||
37DD000
|
direct allocation
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
FD3000
|
heap
|
page read and write
|
||
1D428C0B000
|
heap
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
5D2000
|
heap
|
page read and write
|
||
54E1000
|
heap
|
page read and write
|
||
34CA000
|
heap
|
page read and write
|
||
BE2000
|
unkown
|
page execute and write copy
|
||
1B441D8D000
|
heap
|
page read and write
|
||
585C000
|
trusted library allocation
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
463F000
|
stack
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
52C5000
|
trusted library allocation
|
page read and write
|
||
59D007B000
|
stack
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
563A000
|
trusted library allocation
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
5E18000
|
trusted library allocation
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
DDEA8FF000
|
stack
|
page read and write
|
||
52CC000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
unkown
|
page write copy
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
2032F59C000
|
heap
|
page read and write
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
1D47554E000
|
heap
|
page read and write
|
||
344C000
|
heap
|
page read and write
|
||
5221000
|
trusted library allocation
|
page read and write
|
||
39C1000
|
heap
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
1282000
|
direct allocation
|
page read and write
|
||
35F4000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
2EA109B5000
|
heap
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
2711000
|
direct allocation
|
page read and write
|
||
6236000
|
trusted library allocation
|
page read and write
|
||
2032F58C000
|
heap
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
742C000
|
stack
|
page read and write
|
||
700000
|
direct allocation
|
page read and write
|
||
5E62000
|
trusted library allocation
|
page read and write
|
||
391E000
|
stack
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
608B000
|
trusted library allocation
|
page read and write
|
||
4A9E000
|
stack
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
5723000
|
trusted library allocation
|
page read and write
|
||
26DF000
|
direct allocation
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
355B000
|
direct allocation
|
page read and write
|
||
A1ED37F000
|
stack
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
A5A000
|
unkown
|
page execute and write copy
|
||
4E41000
|
heap
|
page read and write
|
||
8AEE000
|
stack
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
B18000
|
heap
|
page read and write
|
||
344C000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
25A6000
|
direct allocation
|
page read and write
|
||
3080000
|
direct allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
19BAFDF0000
|
heap
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
56DC000
|
trusted library allocation
|
page read and write
|
||
1C9185BF000
|
heap
|
page read and write
|
||
94E000
|
unkown
|
page write copy
|
||
3FCE000
|
stack
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
61DB000
|
trusted library allocation
|
page read and write
|
||
576D000
|
trusted library allocation
|
page read and write
|
||
4B0B000
|
stack
|
page read and write
|
||
5735000
|
trusted library allocation
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
1BB9688C000
|
heap
|
page read and write
|
||
D75000
|
unkown
|
page write copy
|
||
20D07F000
|
stack
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
1B441D6B000
|
heap
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
25E6000
|
direct allocation
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
AA5000
|
heap
|
page read and write
|
||
1D47555E000
|
heap
|
page read and write
|
||
25C1000
|
direct allocation
|
page read and write
|
||
C08000
|
unkown
|
page execute and read and write
|
||
13D5000
|
heap
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
26D0000
|
direct allocation
|
page read and write
|
||
ED0000
|
direct allocation
|
page execute and read and write
|
||
334D000
|
heap
|
page read and write
|
||
2AE3000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
54E1000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
B91000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
1771000
|
heap
|
page read and write
|
||
5E46000
|
trusted library allocation
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
DA8000
|
direct allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
1643AE00000
|
heap
|
page read and write
|
||
48A0000
|
direct allocation
|
page execute and read and write
|
||
E14000
|
heap
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
A01000
|
unkown
|
page execute read
|
||
6257000
|
trusted library allocation
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
563F000
|
trusted library allocation
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
5774000
|
trusted library allocation
|
page read and write
|
||
5E51000
|
trusted library allocation
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
356A000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
5E5D000
|
trusted library allocation
|
page read and write
|
||
5237000
|
trusted library allocation
|
page read and write
|
||
563A000
|
trusted library allocation
|
page read and write
|
||
5EA5000
|
trusted library allocation
|
page read and write
|
||
52CC000
|
trusted library allocation
|
page read and write
|
||
405F000
|
stack
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
39C0000
|
heap
|
page read and write
|
||
450000
|
unkown
|
page execute and write copy
|
||
E14000
|
heap
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
8CE000
|
stack
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
135F000
|
direct allocation
|
page read and write
|
||
42D1000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
EE0000
|
unkown
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
6F1D67F000
|
stack
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
5E9000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
624B000
|
trusted library allocation
|
page read and write
|
||
F81000
|
heap
|
page read and write
|
||
4740000
|
trusted library allocation
|
page read and write
|
||
920000
|
direct allocation
|
page read and write
|
||
4641000
|
heap
|
page read and write
|
||
8FC000
|
stack
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
19FA321C000
|
heap
|
page read and write
|
||
75D0000
|
heap
|
page read and write
|
||
575E000
|
trusted library allocation
|
page read and write
|
||
610000
|
direct allocation
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
CEE000
|
unkown
|
page execute and write copy
|
||
5F22000
|
trusted library allocation
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
BBB000
|
unkown
|
page execute read
|
||
33D1000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
4BFF000
|
stack
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
5283000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
direct allocation
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
255B000
|
direct allocation
|
page read and write
|
||
828000
|
heap
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
7EF000
|
heap
|
page read and write
|
||
5222000
|
trusted library allocation
|
page read and write
|
||
FEC000
|
heap
|
page read and write
|
||
1BB9688C000
|
heap
|
page read and write
|
||
611F000
|
trusted library allocation
|
page read and write
|
||
1D47554E000
|
heap
|
page read and write
|
||
272D000
|
direct allocation
|
page read and write
|
||
54DA000
|
heap
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
49D0000
|
direct allocation
|
page execute and read and write
|
||
367F000
|
stack
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
4B21000
|
direct allocation
|
page read and write
|
||
13093320000
|
heap
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
5257000
|
trusted library allocation
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
56DF000
|
trusted library allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
264D000
|
direct allocation
|
page read and write
|
||
612E000
|
stack
|
page read and write
|
||
261C000
|
direct allocation
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
ECFC7CC000
|
stack
|
page read and write
|
||
524F000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
DDF000
|
stack
|
page read and write
|
||
1D428C2F000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
5E7D000
|
trusted library allocation
|
page read and write
|
||
5224000
|
trusted library allocation
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
7F200000
|
direct allocation
|
page read and write
|
||
628E000
|
trusted library allocation
|
page read and write
|
||
525F000
|
trusted library allocation
|
page read and write
|
||
FBF000
|
heap
|
page read and write
|
||
1D428BD0000
|
heap
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
3CF0000
|
heap
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
6202000
|
trusted library allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
DBD000
|
direct allocation
|
page read and write
|
||
BE5000
|
unkown
|
page execute and read and write
|
||
434F000
|
stack
|
page read and write
|
||
2581000
|
direct allocation
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
1275000
|
direct allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
7F7000
|
heap
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
1DB000
|
unkown
|
page execute and write copy
|
||
5638000
|
trusted library allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
5228000
|
trusted library allocation
|
page read and write
|
||
26ED000
|
direct allocation
|
page read and write
|
||
526D000
|
trusted library allocation
|
page read and write
|
||
2032F575000
|
heap
|
page read and write
|
||
FC6000
|
heap
|
page read and write
|
||
FDB000
|
unkown
|
page execute and write copy
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
577A000
|
trusted library allocation
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
344D000
|
heap
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
53E0000
|
heap
|
page read and write
|
||
2841B610000
|
heap
|
page read and write
|
||
1DA817E0000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
5E14000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
61BC000
|
trusted library allocation
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
7F7000
|
heap
|
page read and write
|
||
2522000
|
direct allocation
|
page read and write
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
6270000
|
trusted library allocation
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
DB6000
|
direct allocation
|
page read and write
|
||
12B7000
|
unkown
|
page readonly
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
2A92DAF000
|
stack
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
B91000
|
heap
|
page read and write
|
||
5299000
|
trusted library allocation
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
F7B000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
56EA000
|
trusted library allocation
|
page read and write
|
||
1250000
|
unkown
|
page execute and write copy
|
||
54A0000
|
heap
|
page read and write
|
||
611B000
|
trusted library allocation
|
page read and write
|
||
1C9185C2000
|
heap
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
622F000
|
trusted library allocation
|
page read and write
|
||
19FA31FD000
|
heap
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
2590000
|
direct allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
783000
|
heap
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
38FF000
|
stack
|
page read and write
|
||
270A000
|
direct allocation
|
page read and write
|
||
5275000
|
trusted library allocation
|
page read and write
|
||
19BAFE60000
|
heap
|
page read and write
|
||
59D01FF000
|
stack
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
124D000
|
unkown
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
61DD000
|
trusted library allocation
|
page read and write
|
||
563C000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
208B8A70000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
6117000
|
trusted library allocation
|
page read and write
|
||
1D428C31000
|
heap
|
page read and write
|
||
D3A000
|
stack
|
page read and write
|
||
5754000
|
trusted library allocation
|
page read and write
|
||
36CD000
|
stack
|
page read and write
|
||
953133E000
|
stack
|
page read and write
|
||
25FF000
|
direct allocation
|
page read and write
|
||
3ACE000
|
stack
|
page read and write
|
||
22A4B320000
|
heap
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
3080000
|
direct allocation
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
D01000
|
unkown
|
page execute read
|
||
E14000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
208B8AE0000
|
heap
|
page read and write
|
||
6119000
|
trusted library allocation
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
522D000
|
trusted library allocation
|
page read and write
|
||
DFB000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
611B000
|
trusted library allocation
|
page read and write
|
||
62FE000
|
trusted library allocation
|
page read and write
|
||
5253000
|
trusted library allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
696000
|
unkown
|
page execute and read and write
|
||
E14000
|
heap
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
7E5000
|
heap
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
1C918775000
|
heap
|
page read and write
|
||
FF4000
|
heap
|
page read and write
|
||
2032F59E000
|
heap
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
61BC000
|
trusted library allocation
|
page read and write
|
||
625F000
|
trusted library allocation
|
page read and write
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
2CCF000
|
stack
|
page read and write
|
||
56F5000
|
trusted library allocation
|
page read and write
|
||
CE8000
|
direct allocation
|
page read and write
|
||
1D475560000
|
heap
|
page read and write
|
||
61AA000
|
trusted library allocation
|
page read and write
|
||
4910000
|
trusted library allocation
|
page read and write
|
||
2E5A2690000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
19BAFECE000
|
heap
|
page read and write
|
||
344C000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
1095000
|
heap
|
page read and write
|
||
1D428C05000
|
heap
|
page read and write
|
||
F49000
|
unkown
|
page write copy
|
||
2E00000
|
heap
|
page read and write
|
||
356A000
|
heap
|
page read and write
|
||
5299000
|
trusted library allocation
|
page read and write
|
||
4F01000
|
heap
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
D5D000
|
direct allocation
|
page read and write
|
||
5EA5000
|
trusted library allocation
|
page read and write
|
||
2726000
|
direct allocation
|
page read and write
|
||
2511000
|
direct allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
19BAFE65000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
623C000
|
trusted library allocation
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
1D428C2D000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
5EC6000
|
trusted library allocation
|
page read and write
|
||
19BAFEB7000
|
heap
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
2654000
|
direct allocation
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
1B441D66000
|
heap
|
page read and write
|
||
7FB000
|
heap
|
page read and write
|
||
298F000
|
stack
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
CF6000
|
direct allocation
|
page read and write
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
816000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
647E000
|
stack
|
page read and write
|
||
A1ED2FE000
|
stack
|
page read and write
|
||
D24000
|
direct allocation
|
page read and write
|
||
54DA000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
5E5D000
|
trusted library allocation
|
page read and write
|
||
5E9B000
|
trusted library allocation
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
7F1000
|
heap
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
56DD000
|
trusted library allocation
|
page read and write
|
||
7348000
|
heap
|
page read and write
|
||
379F000
|
stack
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
43D0000
|
trusted library allocation
|
page read and write
|
||
56C7000
|
trusted library allocation
|
page read and write
|
||
1BB96800000
|
heap
|
page read and write
|
||
6201000
|
trusted library allocation
|
page read and write
|
||
133B000
|
direct allocation
|
page read and write
|
||
5639000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
344C000
|
heap
|
page read and write
|
||
5E7D000
|
trusted library allocation
|
page read and write
|
||
5EA000
|
heap
|
page read and write
|
||
1D475563000
|
heap
|
page read and write
|
||
1771000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
7F2EA000
|
direct allocation
|
page read and write
|
||
AC38FFF000
|
stack
|
page read and write
|
||
19FA3375000
|
heap
|
page read and write
|
||
61D3000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
FD6000
|
heap
|
page read and write
|
||
6112000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
A6B000
|
unkown
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
522D000
|
trusted library allocation
|
page read and write
|
||
1B441D77000
|
heap
|
page read and write
|
||
15CF000
|
stack
|
page read and write
|
||
1306000
|
direct allocation
|
page read and write
|
||
C8F000
|
unkown
|
page execute and write copy
|
||
95313BE000
|
stack
|
page read and write
|
||
EE0000
|
unkown
|
page read and write
|
||
3F8F000
|
stack
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
1B441D91000
|
heap
|
page read and write
|
||
2603000
|
direct allocation
|
page read and write
|
||
74D0000
|
heap
|
page read and write
|
||
610000
|
direct allocation
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
783000
|
heap
|
page read and write
|
||
96E000
|
heap
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
13093327000
|
heap
|
page read and write
|
||
4360000
|
heap
|
page read and write
|
||
523E000
|
trusted library allocation
|
page read and write
|
||
7B8000
|
heap
|
page read and write
|
||
1D428B50000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
5253000
|
trusted library allocation
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
19A2B980000
|
heap
|
page read and write
|
||
4890000
|
direct allocation
|
page execute and read and write
|
||
1B0000
|
heap
|
page read and write
|
||
BD6000
|
unkown
|
page execute and write copy
|
||
33D1000
|
heap
|
page read and write
|
||
BD7000
|
unkown
|
page readonly
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
35D1000
|
heap
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
522D000
|
trusted library allocation
|
page read and write
|
||
6381000
|
trusted library allocation
|
page read and write
|
||
5226000
|
trusted library allocation
|
page read and write
|
||
11E6000
|
unkown
|
page execute and write copy
|
||
107A000
|
heap
|
page read and write
|
||
61CD000
|
trusted library allocation
|
page read and write
|
||
2671000
|
direct allocation
|
page read and write
|
||
2623000
|
direct allocation
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
19FA31F7000
|
heap
|
page read and write
|
||
1B442080000
|
heap
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
7F1000
|
heap
|
page read and write
|
||
5190000
|
heap
|
page read and write
|
||
3501000
|
heap
|
page read and write
|
||
6247000
|
trusted library allocation
|
page read and write
|
||
6616000
|
trusted library allocation
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
409E000
|
stack
|
page read and write
|
||
6119000
|
trusted library allocation
|
page read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
5254000
|
trusted library allocation
|
page read and write
|
||
5E7D000
|
trusted library allocation
|
page read and write
|
||
137A000
|
unkown
|
page execute and write copy
|
||
2778000
|
direct allocation
|
page read and write
|
||
53FF000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
unkown
|
page write copy
|
||
2C03000
|
heap
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
2A37000
|
heap
|
page read and write
|
||
1245000
|
unkown
|
page read and write
|
||
1C918770000
|
heap
|
page read and write
|
||
2761000
|
direct allocation
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
CE5C1AF000
|
stack
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
63C2000
|
trusted library allocation
|
page read and write
|
||
611B000
|
trusted library allocation
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
1D428C2C000
|
heap
|
page read and write
|
||
365E000
|
stack
|
page read and write
|
||
6136000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
19FA30B0000
|
heap
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
3CA6000
|
direct allocation
|
page read and write
|
||
D56000
|
direct allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
259B000
|
direct allocation
|
page read and write
|
||
A1ECFDF000
|
stack
|
page read and write
|
||
1D475538000
|
heap
|
page read and write
|
||
19FA3190000
|
heap
|
page read and write
|
||
CFD000
|
direct allocation
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
491F000
|
stack
|
page read and write
|
||
2C60000
|
direct allocation
|
page read and write
|
||
A69000
|
unkown
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
F81000
|
unkown
|
page execute and write copy
|
||
33D1000
|
heap
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
19FA31D7000
|
heap
|
page read and write
|
||
563B000
|
trusted library allocation
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
781F000
|
stack
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
5639000
|
trusted library allocation
|
page read and write
|
||
518E000
|
stack
|
page read and write
|
||
56D3000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
12D0000
|
direct allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
FE9000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
252CB767000
|
heap
|
page read and write
|
||
634F000
|
trusted library allocation
|
page read and write
|
||
5EBD27F000
|
stack
|
page read and write
|
||
C70000
|
unkown
|
page execute and write copy
|
||
1B441D8D000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
5E6000
|
heap
|
page read and write
|
||
469F000
|
stack
|
page read and write
|
||
20D17F000
|
stack
|
page read and write
|
||
1D428B30000
|
heap
|
page read and write
|
||
610000
|
direct allocation
|
page read and write
|
||
1334000
|
direct allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
2EA10A50000
|
heap
|
page read and write
|
||
34CA000
|
heap
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
523F000
|
trusted library allocation
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
FBF000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
2B5707F000
|
stack
|
page read and write
|
||
344D000
|
heap
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
26B8000
|
direct allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
26A8000
|
direct allocation
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
56CD000
|
trusted library allocation
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
AC38F7C000
|
stack
|
page read and write
|
||
3F5E000
|
stack
|
page read and write
|
||
19FA31D0000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
60EE000
|
stack
|
page read and write
|
||
EF3477F000
|
stack
|
page read and write
|
||
80C000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
25D4B4C0000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
10AA000
|
heap
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
10B1000
|
heap
|
page read and write
|
||
252CB620000
|
heap
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
447E000
|
stack
|
page read and write
|
||
95D000
|
unkown
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
61AE000
|
trusted library allocation
|
page read and write
|
||
5EA5000
|
trusted library allocation
|
page read and write
|
||
4ECF000
|
stack
|
page read and write
|
||
F90000
|
unkown
|
page readonly
|
||
27B3000
|
direct allocation
|
page read and write
|
||
52D7000
|
trusted library allocation
|
page read and write
|
||
27B1000
|
direct allocation
|
page read and write
|
||
611F000
|
trusted library allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
2CB0000
|
trusted library allocation
|
page read and write
|
||
696000
|
unkown
|
page execute and write copy
|
||
E14000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page execute and read and write
|
||
DE0000
|
heap
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
1C9185AC000
|
heap
|
page read and write
|
||
19BAFEA8000
|
heap
|
page read and write
|
||
1437000
|
heap
|
page read and write
|
||
3BCC000
|
stack
|
page read and write
|
||
3BB000
|
stack
|
page read and write
|
||
4490000
|
heap
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
6234000
|
trusted library allocation
|
page read and write
|
||
C7B000
|
unkown
|
page execute and read and write
|
||
1780000
|
heap
|
page read and write
|
||
42D1000
|
heap
|
page read and write
|
||
19A2B960000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
6248000
|
trusted library allocation
|
page read and write
|
||
BCE000
|
unkown
|
page execute and write copy
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
174F000
|
heap
|
page read and write
|
||
A72000
|
unkown
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
C2F000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
25C4000
|
direct allocation
|
page read and write
|
||
16D3B0FC000
|
heap
|
page read and write
|
||
C5C000
|
unkown
|
page execute and write copy
|
||
5782000
|
trusted library allocation
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
BD4000
|
unkown
|
page write copy
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
611B000
|
trusted library allocation
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
2EA10A5B000
|
heap
|
page read and write
|
||
3DDF000
|
stack
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
1D9000
|
unkown
|
page write copy
|
||
82E000
|
stack
|
page read and write
|
||
16D3B1D0000
|
heap
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
177E000
|
heap
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
5772000
|
trusted library allocation
|
page read and write
|
||
805000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
56EE000
|
trusted library allocation
|
page read and write
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
529B000
|
trusted library allocation
|
page read and write
|
||
4822000
|
heap
|
page read and write
|
||
3080000
|
direct allocation
|
page read and write
|
||
610000
|
direct allocation
|
page read and write
|
||
920000
|
direct allocation
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
771E000
|
stack
|
page read and write
|
||
3080000
|
direct allocation
|
page read and write
|
||
563D000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
174F000
|
heap
|
page read and write
|
||
920000
|
direct allocation
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
11D8000
|
unkown
|
page execute and read and write
|
||
334D000
|
heap
|
page read and write
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
5E2C000
|
trusted library allocation
|
page read and write
|
||
627B000
|
trusted library allocation
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page execute and read and write
|
||
654000
|
heap
|
page read and write
|
||
2EA108D0000
|
heap
|
page read and write
|
||
5E1B000
|
trusted library allocation
|
page read and write
|
||
5E6E000
|
trusted library allocation
|
page read and write
|
||
1271000
|
direct allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
563A000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
5E37000
|
trusted library allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
5715000
|
trusted library allocation
|
page read and write
|
||
5F3B000
|
trusted library allocation
|
page read and write
|
||
1398000
|
direct allocation
|
page read and write
|
||
3546000
|
heap
|
page read and write
|
||
76D0000
|
heap
|
page execute and read and write
|
||
2EE3E7F000
|
stack
|
page read and write
|
||
A00000
|
unkown
|
page readonly
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
2C20000
|
direct allocation
|
page read and write
|
||
2703000
|
direct allocation
|
page read and write
|
||
2D50000
|
trusted library allocation
|
page read and write
|
||
1D4754A0000
|
heap
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
54E4000
|
heap
|
page read and write
|
||
177A000
|
heap
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
13DE000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
33D1000
|
heap
|
page read and write
|
||
6112000
|
trusted library allocation
|
page read and write
|
||
CD5000
|
unkown
|
page execute and write copy
|
||
1250000
|
unkown
|
page write copy
|
||
5752000
|
trusted library allocation
|
page read and write
|
||
41DE000
|
stack
|
page read and write
|
||
56C9000
|
trusted library allocation
|
page read and write
|
||
5782000
|
trusted library allocation
|
page read and write
|
||
1D428C17000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
61FF000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
1772000
|
heap
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
19A2BA17000
|
heap
|
page read and write
|
||
563C000
|
trusted library allocation
|
page read and write
|
||
5639000
|
trusted library allocation
|
page read and write
|
||
5E61000
|
trusted library allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
EB3000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
950000
|
unkown
|
page read and write
|
||
EE5BA7F000
|
stack
|
page read and write
|
||
391000
|
unkown
|
page execute and write copy
|
||
19FA31F8000
|
heap
|
page read and write
|
||
563B000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
5711000
|
trusted library allocation
|
page read and write
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
unkown
|
page readonly
|
||
5E8000
|
heap
|
page read and write
|
||
688000
|
unkown
|
page execute and read and write
|
||
5299000
|
trusted library allocation
|
page read and write
|
||
610000
|
direct allocation
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
711000
|
heap
|
page read and write
|
||
4810000
|
heap
|
page read and write
|
||
BBE000
|
unkown
|
page write copy
|
||
12A6000
|
direct allocation
|
page read and write
|
||
63A5000
|
trusted library allocation
|
page read and write
|
||
FBF000
|
heap
|
page read and write
|
||
16D3B210000
|
heap
|
page read and write
|
||
6119000
|
trusted library allocation
|
page read and write
|
||
278D000
|
direct allocation
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
3F1D000
|
direct allocation
|
page read and write
|
||
6F1D47F000
|
stack
|
page read and write
|
||
5297000
|
trusted library allocation
|
page read and write
|
||
5E77000
|
trusted library allocation
|
page read and write
|
||
1786000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
EE0000
|
unkown
|
page readonly
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
524B000
|
trusted library allocation
|
page read and write
|
||
44FF000
|
stack
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
C5D000
|
unkown
|
page execute and read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
51BA000
|
trusted library allocation
|
page execute and read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
25AD000
|
direct allocation
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
A6B000
|
unkown
|
page write copy
|
||
C0B000
|
heap
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
3C8D000
|
direct allocation
|
page read and write
|
||
6200000
|
trusted library allocation
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
1158000
|
heap
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
678000
|
heap
|
page read and write
|
||
4E00000
|
direct allocation
|
page execute and read and write
|
||
6DC027F000
|
stack
|
page read and write
|
||
CCD000
|
direct allocation
|
page read and write
|
||
2A92D2C000
|
stack
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
1309332B000
|
heap
|
page read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
139000
|
stack
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
920000
|
direct allocation
|
page read and write
|
||
174F000
|
heap
|
page read and write
|
||
4EC000
|
stack
|
page read and write
|
||
61BE000
|
trusted library allocation
|
page read and write
|
||
8D7C000
|
stack
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
19BAFED0000
|
heap
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
2C3D000
|
direct allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
254D000
|
direct allocation
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
626E000
|
trusted library allocation
|
page read and write
|
||
20CD9F000
|
stack
|
page read and write
|
||
950000
|
unkown
|
page write copy
|
||
6211000
|
trusted library allocation
|
page read and write
|
||
FD9000
|
unkown
|
page write copy
|
||
5232000
|
trusted library allocation
|
page read and write
|
||
5E7C000
|
trusted library allocation
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
38DF000
|
stack
|
page read and write
|
||
2762000
|
direct allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
2629000
|
direct allocation
|
page read and write
|
||
38D937F000
|
stack
|
page read and write
|
||
4D5197E000
|
stack
|
page read and write
|
||
6A1000
|
unkown
|
page execute read
|
||
53E000
|
stack
|
page read and write
|
||
C71000
|
unkown
|
page execute and read and write
|
||
54D8000
|
heap
|
page read and write
|
||
2638000
|
direct allocation
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
113B000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
97D407F000
|
stack
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
FE3000
|
heap
|
page read and write
|
||
A1ECF5F000
|
stack
|
page read and write
|
||
6FC000
|
stack
|
page read and write
|
||
27A3000
|
direct allocation
|
page read and write
|
||
22A4B32B000
|
heap
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
5754000
|
trusted library allocation
|
page read and write
|
||
51CB000
|
trusted library allocation
|
page execute and read and write
|
||
52C9000
|
trusted library allocation
|
page read and write
|
||
1266000
|
unkown
|
page execute and write copy
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
523E000
|
trusted library allocation
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
19BAFEBC000
|
heap
|
page read and write
|
||
542F4FF000
|
stack
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
7EFD0000
|
direct allocation
|
page read and write
|
||
208B8D35000
|
heap
|
page read and write
|
||
49B0000
|
direct allocation
|
page execute and read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
4B9F000
|
stack
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
5FEB000
|
trusted library allocation
|
page read and write
|
||
12E9000
|
direct allocation
|
page read and write
|
||
563C000
|
trusted library allocation
|
page read and write
|
||
2716000
|
direct allocation
|
page read and write
|
||
D0B000
|
direct allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
5719000
|
trusted library allocation
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
3E4F000
|
stack
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
AA9000
|
heap
|
page read and write
|
||
920000
|
direct allocation
|
page read and write
|
||
1771000
|
heap
|
page read and write
|
||
1DA81730000
|
heap
|
page read and write
|
||
5239000
|
trusted library allocation
|
page read and write
|
||
63C1000
|
trusted library allocation
|
page read and write
|
||
4960000
|
direct allocation
|
page execute and read and write
|
||
1750000
|
heap
|
page read and write
|
||
176F000
|
heap
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
4353000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
6130000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
1358000
|
direct allocation
|
page read and write
|
||
524B000
|
trusted library allocation
|
page read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
7EF000
|
heap
|
page read and write
|
||
1773000
|
heap
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
5221000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
7EF000
|
heap
|
page read and write
|
||
5222000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
419F000
|
stack
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
522E000
|
trusted library allocation
|
page read and write
|
||
626C000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
58C8000
|
trusted library allocation
|
page read and write
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
76F000
|
heap
|
page read and write
|
||
1461000
|
heap
|
page read and write
|
||
5293000
|
trusted library allocation
|
page read and write
|
||
89AC000
|
stack
|
page read and write
|
||
2B00000
|
direct allocation
|
page read and write
|
||
CC7000
|
unkown
|
page readonly
|
||
45E000
|
unkown
|
page execute and write copy
|
||
C0B000
|
heap
|
page read and write
|
||
1418000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
176E000
|
heap
|
page read and write
|
||
FD6000
|
heap
|
page read and write
|
||
A6C000
|
unkown
|
page read and write
|
||
61B9000
|
trusted library allocation
|
page read and write
|
||
7F5000
|
heap
|
page read and write
|
||
16D3B0B8000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
5752000
|
trusted library allocation
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
5E5C000
|
trusted library allocation
|
page read and write
|
||
2C44000
|
direct allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
59D00FE000
|
stack
|
page read and write
|
||
19FA3220000
|
heap
|
page read and write
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
920000
|
direct allocation
|
page read and write
|
||
574D000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
61CF000
|
trusted library allocation
|
page read and write
|
||
1771000
|
heap
|
page read and write
|
||
19FA321F000
|
heap
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
B91000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
5737000
|
trusted library allocation
|
page read and write
|
||
6E9000
|
heap
|
page read and write
|
||
6BC000
|
unkown
|
page execute read
|
||
EE0000
|
heap
|
page read and write
|
||
4990000
|
direct allocation
|
page execute and read and write
|
||
5E14000
|
trusted library allocation
|
page read and write
|
||
584E000
|
trusted library allocation
|
page read and write
|
||
344C000
|
heap
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
344D000
|
heap
|
page read and write
|
||
6117000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
6110000
|
trusted library allocation
|
page read and write
|
||
3080000
|
direct allocation
|
page read and write
|
||
6DC007E000
|
stack
|
page read and write
|
||
524B000
|
trusted library allocation
|
page read and write
|
||
35F4000
|
heap
|
page read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
130936D5000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
2C5A000
|
direct allocation
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
7F2000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
22A4B327000
|
heap
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
19A2B9F7000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
19FA321C000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
C1C000
|
unkown
|
page execute and read and write
|
||
4350000
|
heap
|
page read and write
|
||
23C2D437000
|
heap
|
page read and write
|
||
2B00000
|
direct allocation
|
page read and write
|
||
7F1000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
5637000
|
trusted library allocation
|
page read and write
|
||
524B000
|
trusted library allocation
|
page read and write
|
||
5E74000
|
trusted library allocation
|
page read and write
|
||
2570000
|
direct allocation
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
61BE000
|
trusted library allocation
|
page read and write
|
||
5E5C000
|
trusted library allocation
|
page read and write
|
||
5636000
|
trusted library allocation
|
page read and write
|
||
A50000
|
unkown
|
page readonly
|
||
336E000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
B16000
|
unkown
|
page execute read
|
||
2E5A277B000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
76F000
|
heap
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
2E5A2790000
|
heap
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
457F000
|
stack
|
page read and write
|
||
563C000
|
trusted library allocation
|
page read and write
|
||
81C000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
2841B990000
|
heap
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
19A2BA1A000
|
heap
|
page read and write
|
||
5E9D000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
11A1000
|
unkown
|
page execute and read and write
|
||
5F2000
|
heap
|
page read and write
|
||
4F01000
|
heap
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
261A000
|
direct allocation
|
page read and write
|
||
56F4000
|
trusted library allocation
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
D8B000
|
direct allocation
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
5784000
|
trusted library allocation
|
page read and write
|
||
26FA000
|
direct allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
253F000
|
direct allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
578E000
|
trusted library allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
6261000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
3E1E000
|
stack
|
page read and write
|
||
5226000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
208B8AEB000
|
heap
|
page read and write
|
||
3792000
|
direct allocation
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
356A000
|
heap
|
page read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
5717000
|
trusted library allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
611B000
|
trusted library allocation
|
page read and write
|
||
57E7000
|
trusted library allocation
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
BE0000
|
direct allocation
|
page execute and read and write
|
||
1763000
|
heap
|
page read and write
|
||
1D47553D000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
27B8000
|
direct allocation
|
page read and write
|
||
D6B000
|
unkown
|
page read and write
|
||
10B7000
|
heap
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
137A000
|
unkown
|
page execute and write copy
|
||
C6B000
|
unkown
|
page execute and write copy
|
||
279D000
|
direct allocation
|
page read and write
|
||
583D000
|
trusted library allocation
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
5270000
|
trusted library allocation
|
page read and write
|
||
23C2D430000
|
heap
|
page read and write
|
||
25A4000
|
direct allocation
|
page read and write
|
||
4841000
|
direct allocation
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
1C9185BC000
|
heap
|
page read and write
|
||
610000
|
direct allocation
|
page read and write
|
||
56FF000
|
trusted library allocation
|
page read and write
|
||
81A000
|
heap
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
67A000
|
heap
|
page read and write
|
||
5273000
|
trusted library allocation
|
page read and write
|
||
12D4000
|
direct allocation
|
page read and write
|
||
2606000
|
direct allocation
|
page read and write
|
||
2032F59C000
|
heap
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
1DA8161B000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
4D5187F000
|
stack
|
page read and write
|
||
CAE000
|
unkown
|
page write copy
|
||
680000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
620F000
|
trusted library allocation
|
page read and write
|
||
1771000
|
heap
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
5DA000
|
heap
|
page read and write
|
||
5326000
|
trusted library allocation
|
page read and write
|
||
56F6000
|
trusted library allocation
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
D69000
|
unkown
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
1314000
|
direct allocation
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
355E000
|
stack
|
page read and write
|
||
23C2D550000
|
heap
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
2751000
|
direct allocation
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
51AD000
|
stack
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
2032F510000
|
heap
|
page read and write
|
||
26F3000
|
direct allocation
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
13DA000
|
heap
|
page read and write
|
||
1B441D8E000
|
heap
|
page read and write
|
||
26F4000
|
direct allocation
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
1D428A50000
|
heap
|
page read and write
|
||
563C000
|
trusted library allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
F70000
|
remote allocation
|
page read and write
|
||
5631000
|
trusted library allocation
|
page read and write
|
||
474000
|
unkown
|
page execute and write copy
|
||
19A2BA15000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
41FE000
|
stack
|
page read and write
|
||
57AE000
|
trusted library allocation
|
page read and write
|
||
526F000
|
trusted library allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
CB917DF000
|
stack
|
page read and write
|
||
42D1000
|
heap
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
2E5A278D000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
5E7B000
|
trusted library allocation
|
page read and write
|
||
67A000
|
heap
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
38BE000
|
stack
|
page read and write
|
||
FDD000
|
heap
|
page read and write
|
||
7F3000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
920000
|
direct allocation
|
page read and write
|
||
1C9185AC000
|
heap
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
2841B657000
|
heap
|
page read and write
|
||
180000
|
unkown
|
page readonly
|
||
636F000
|
trusted library allocation
|
page read and write
|
||
256A000
|
direct allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
252CB700000
|
heap
|
page read and write
|
||
25AB000
|
direct allocation
|
page read and write
|
||
1771000
|
heap
|
page read and write
|
||
398E000
|
stack
|
page read and write
|
||
63A7000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
1298000
|
direct allocation
|
page read and write
|
||
5221000
|
trusted library allocation
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
524A000
|
trusted library allocation
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
7DB000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
C3E000
|
unkown
|
page execute and write copy
|
||
25E2000
|
direct allocation
|
page read and write
|
||
526B000
|
trusted library allocation
|
page read and write
|
||
5E46000
|
trusted library allocation
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
D8C000
|
stack
|
page read and write
|
||
563A000
|
trusted library allocation
|
page read and write
|
||
610000
|
direct allocation
|
page read and write
|
||
61C9000
|
trusted library allocation
|
page read and write
|
||
272E000
|
direct allocation
|
page read and write
|
||
46DE000
|
stack
|
page read and write
|
||
4641000
|
heap
|
page read and write
|
||
2546000
|
direct allocation
|
page read and write
|
||
2F00000
|
direct allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
524B000
|
trusted library allocation
|
page read and write
|
||
563E000
|
trusted library allocation
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
6235000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
unkown
|
page read and write
|
||
1774000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
4DDF000
|
stack
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
563E000
|
trusted library allocation
|
page read and write
|
||
670000
|
direct allocation
|
page execute and read and write
|
||
6FD000
|
heap
|
page read and write
|
||
56F4000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
BC5000
|
unkown
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
16D3AFD0000
|
heap
|
page read and write
|
||
2032F550000
|
heap
|
page read and write
|
||
1D428BE8000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
D9D000
|
unkown
|
page readonly
|
||
4351000
|
heap
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
5241000
|
trusted library allocation
|
page read and write
|
||
1775000
|
heap
|
page read and write
|
||
7FF000
|
heap
|
page read and write
|
||
EF347FE000
|
stack
|
page read and write
|
||
8CD000
|
stack
|
page read and write
|
||
62B000
|
heap
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
19BAFEAD000
|
heap
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
3564000
|
direct allocation
|
page read and write
|
||
265C000
|
direct allocation
|
page read and write
|
||
46BF000
|
stack
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
1125000
|
heap
|
page read and write
|
||
6261000
|
trusted library allocation
|
page read and write
|
||
6121000
|
trusted library allocation
|
page read and write
|
||
A5A000
|
unkown
|
page execute and read and write
|
||
6278000
|
trusted library allocation
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
356A000
|
heap
|
page read and write
|
||
3080000
|
direct allocation
|
page read and write
|
||
5633000
|
trusted library allocation
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
6135000
|
heap
|
page read and write
|
||
5E37000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
A72000
|
unkown
|
page read and write
|
||
A1ED27F000
|
stack
|
page read and write
|
||
5273000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
C2B000
|
unkown
|
page execute and read and write
|
||
5278000
|
trusted library allocation
|
page read and write
|
||
1D428C32000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
7EF000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
5221000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
5632000
|
trusted library allocation
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
25DB000
|
direct allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
526B000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
D13000
|
direct allocation
|
page read and write
|
||
1D47554A000
|
heap
|
page read and write
|
||
B91000
|
heap
|
page read and write
|
||
5707000
|
trusted library allocation
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
11E7000
|
unkown
|
page execute and write copy
|
||
346E000
|
heap
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
1BB96760000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
D4B000
|
direct allocation
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
5237000
|
trusted library allocation
|
page read and write
|
||
10C5000
|
heap
|
page read and write
|
||
57AC000
|
trusted library allocation
|
page read and write
|
||
22A4B475000
|
heap
|
page read and write
|
||
7F3000
|
heap
|
page read and write
|
||
2646000
|
direct allocation
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
2596000
|
direct allocation
|
page read and write
|
||
620B000
|
trusted library allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
920000
|
direct allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
26D7000
|
direct allocation
|
page read and write
|
||
1378000
|
unkown
|
page execute and read and write
|
||
357E000
|
stack
|
page read and write
|
||
2C1E000
|
direct allocation
|
page read and write
|
||
2E5A26A0000
|
heap
|
page read and write
|
||
1082000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
81A000
|
heap
|
page read and write
|
||
3F9000
|
unkown
|
page write copy
|
||
2841B995000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
A6F000
|
unkown
|
page read and write
|
||
34CA000
|
heap
|
page read and write
|
||
3CB000
|
stack
|
page read and write
|
||
5705000
|
trusted library allocation
|
page read and write
|
||
263F000
|
direct allocation
|
page read and write
|
||
DA0000
|
direct allocation
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
EF3439B000
|
stack
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
5237000
|
trusted library allocation
|
page read and write
|
||
581E000
|
trusted library allocation
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
1D475537000
|
heap
|
page read and write
|
||
5E8A000
|
trusted library allocation
|
page read and write
|
||
344C000
|
heap
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
836000
|
stack
|
page read and write
|
||
2745000
|
direct allocation
|
page read and write
|
||
7ED000
|
heap
|
page read and write
|
||
136D000
|
direct allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
5EA000
|
heap
|
page read and write
|
||
22A4B470000
|
heap
|
page read and write
|
||
577D000
|
trusted library allocation
|
page read and write
|
||
5E73000
|
trusted library allocation
|
page read and write
|
||
6265000
|
trusted library allocation
|
page read and write
|
||
5BD000
|
heap
|
page read and write
|
||
2EEC000
|
stack
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
96E000
|
heap
|
page read and write
|
||
26FB000
|
direct allocation
|
page read and write
|
||
56F7000
|
trusted library allocation
|
page read and write
|
||
403E000
|
stack
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
DBF000
|
stack
|
page read and write
|
||
2C4B000
|
direct allocation
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
626E000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
F9E000
|
heap
|
page read and write
|
||
EE5000
|
heap
|
page read and write
|
||
25A4000
|
direct allocation
|
page read and write
|
||
FE9000
|
heap
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
344C000
|
heap
|
page read and write
|
||
1324000
|
direct allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
1789000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
16D3B0DB000
|
heap
|
page read and write
|
||
2500000
|
direct allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
A69000
|
unkown
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
6278000
|
trusted library allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
34EE000
|
heap
|
page read and write
|
||
2EA109C0000
|
heap
|
page read and write
|
||
EF3467F000
|
stack
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
1BB9686B000
|
heap
|
page read and write
|
||
62A9000
|
trusted library allocation
|
page read and write
|
||
CBD000
|
unkown
|
page read and write
|
||
19BAFEA7000
|
heap
|
page read and write
|
||
5294000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
1771000
|
heap
|
page read and write
|
||
81E000
|
stack
|
page read and write
|
||
4AFE000
|
stack
|
page read and write
|
||
271F000
|
direct allocation
|
page read and write
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
D77000
|
unkown
|
page readonly
|
||
1772000
|
heap
|
page read and write
|
||
8C7C000
|
stack
|
page read and write
|
||
6BA000
|
heap
|
page read and write
|
||
F70000
|
remote allocation
|
page read and write
|
||
6A8000
|
heap
|
page read and write
|
||
5F1C000
|
trusted library allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
75AE000
|
stack
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
19FA3370000
|
heap
|
page read and write
|
||
563A000
|
trusted library allocation
|
page read and write
|
||
CD1000
|
unkown
|
page execute and write copy
|
||
35CE000
|
stack
|
page read and write
|
||
578B000
|
trusted library allocation
|
page read and write
|
||
6276000
|
trusted library allocation
|
page read and write
|
||
5E5C000
|
trusted library allocation
|
page read and write
|
||
16D3B0D5000
|
heap
|
page read and write
|
||
5E79000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
unkown
|
page readonly
|
||
1214000
|
heap
|
page read and write
|
||
2663000
|
direct allocation
|
page read and write
|
||
445E000
|
stack
|
page read and write
|
||
356A000
|
heap
|
page read and write
|
||
26E4000
|
direct allocation
|
page read and write
|
||
6288000
|
trusted library allocation
|
page read and write
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
61C9000
|
trusted library allocation
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
61B3000
|
trusted library allocation
|
page read and write
|
||
C50000
|
unkown
|
page execute and write copy
|
||
D90000
|
heap
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
1424000
|
heap
|
page read and write
|
||
22A4B440000
|
heap
|
page read and write
|
||
1643AEE7000
|
heap
|
page read and write
|
||
1257000
|
unkown
|
page readonly
|
||
2770000
|
direct allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
5221000
|
trusted library allocation
|
page read and write
|
||
5638000
|
trusted library allocation
|
page read and write
|
||
5638000
|
trusted library allocation
|
page read and write
|
||
1DA81530000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
6219000
|
trusted library allocation
|
page read and write
|
||
1D475517000
|
heap
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
56E1000
|
trusted library allocation
|
page read and write
|
||
525C000
|
trusted library allocation
|
page read and write
|
||
5E29000
|
trusted library allocation
|
page read and write
|
||
563C000
|
trusted library allocation
|
page read and write
|
||
7FE000
|
heap
|
page read and write
|
||
1D47555E000
|
heap
|
page read and write
|
||
5257000
|
trusted library allocation
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
4370000
|
heap
|
page read and write
|
||
5008000
|
heap
|
page read and write
|
||
F0E000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
344D000
|
heap
|
page read and write
|
||
23C2D530000
|
heap
|
page read and write
|
||
1643AD20000
|
heap
|
page read and write
|
||
5D38000
|
trusted library allocation
|
page read and write
|
||
5EBCFEB000
|
stack
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
5266000
|
trusted library allocation
|
page read and write
|
||
6597000
|
trusted library allocation
|
page read and write
|
||
25CF000
|
direct allocation
|
page read and write
|
||
58A8000
|
trusted library allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
2C12000
|
direct allocation
|
page read and write
|
||
2032F795000
|
heap
|
page read and write
|
||
13093280000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
19BAFECE000
|
heap
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
25AB000
|
direct allocation
|
page read and write
|
||
11D0000
|
unkown
|
page execute and read and write
|
||
10A0000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
1BB96805000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
A76000
|
unkown
|
page write copy
|
||
8C8000
|
stack
|
page read and write
|
||
542F47F000
|
stack
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
D69000
|
unkown
|
page read and write
|
||
5641000
|
trusted library allocation
|
page read and write
|
||
858000
|
heap
|
page read and write
|
||
903000
|
heap
|
page read and write
|
||
344C000
|
heap
|
page read and write
|
||
25CB000
|
direct allocation
|
page read and write
|
||
5E7D000
|
trusted library allocation
|
page read and write
|
||
265C000
|
direct allocation
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
6415000
|
trusted library allocation
|
page read and write
|
||
48A0000
|
direct allocation
|
page execute and read and write
|
||
16D3B1B0000
|
heap
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
5E5C000
|
trusted library allocation
|
page read and write
|
||
10F9000
|
stack
|
page read and write
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
1BB9687B000
|
heap
|
page read and write
|
||
CC0000
|
unkown
|
page readonly
|
||
5228000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
61C7000
|
trusted library allocation
|
page read and write
|
||
7570000
|
trusted library allocation
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
63F4000
|
trusted library allocation
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
2B570FE000
|
stack
|
page read and write
|
||
344C000
|
heap
|
page read and write
|
||
270F000
|
direct allocation
|
page read and write
|
||
431E000
|
stack
|
page read and write
|
||
5638000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
39FE000
|
stack
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
5E52000
|
trusted library allocation
|
page read and write
|
||
1DA817E5000
|
heap
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
620A000
|
trusted library allocation
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
2B5717F000
|
stack
|
page read and write
|
||
61EB000
|
trusted library allocation
|
page read and write
|
||
61BB000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
5298000
|
trusted library allocation
|
page read and write
|
||
25D4B4A0000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
5256000
|
trusted library allocation
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
5226000
|
trusted library allocation
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
2C53000
|
direct allocation
|
page read and write
|
||
96F000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
576A000
|
trusted library allocation
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
1DA81710000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
25BA000
|
direct allocation
|
page read and write
|
||
955000
|
unkown
|
page write copy
|
||
2C2F000
|
direct allocation
|
page read and write
|
||
3C5D000
|
direct allocation
|
page read and write
|
||
5639000
|
trusted library allocation
|
page read and write
|
||
16D3B0E8000
|
heap
|
page read and write
|
||
491F000
|
stack
|
page read and write
|
||
1B441D8D000
|
heap
|
page read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
2032F58C000
|
heap
|
page read and write
|
||
398E000
|
stack
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
563F000
|
trusted library allocation
|
page read and write
|
||
1B441D6B000
|
heap
|
page read and write
|
||
95316FE000
|
stack
|
page read and write
|
||
CC0000
|
direct allocation
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
BCD000
|
unkown
|
page execute and read and write
|
||
4641000
|
heap
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
1D47554E000
|
heap
|
page read and write
|
||
524B000
|
trusted library allocation
|
page read and write
|
||
52CC000
|
trusted library allocation
|
page read and write
|
||
795E000
|
stack
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
4351000
|
heap
|
page read and write
|
||
16D3B0E6000
|
heap
|
page read and write
|
||
5E2C000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
FDD000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
EE0000
|
unkown
|
page readonly
|
||
4351000
|
heap
|
page read and write
|
||
48FC000
|
trusted library allocation
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
420E000
|
stack
|
page read and write
|
||
278F000
|
direct allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
62C8000
|
trusted library allocation
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
563A000
|
trusted library allocation
|
page read and write
|
||
2796000
|
direct allocation
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
C3B000
|
stack
|
page read and write
|
||
A50000
|
unkown
|
page read and write
|
||
1C918570000
|
heap
|
page read and write
|
||
6231000
|
trusted library allocation
|
page read and write
|
||
622C000
|
trusted library allocation
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
CDB000
|
unkown
|
page execute and write copy
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
59D027E000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
4830000
|
heap
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
10B3000
|
heap
|
page read and write
|
||
5E6B000
|
trusted library allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
25C8000
|
direct allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
16D3B102000
|
heap
|
page read and write
|
||
2C36000
|
direct allocation
|
page read and write
|
||
5264000
|
trusted library allocation
|
page read and write
|
||
563F000
|
trusted library allocation
|
page read and write
|
||
B91000
|
heap
|
page read and write
|
||
1DA81610000
|
heap
|
page read and write
|
||
2032F591000
|
heap
|
page read and write
|
||
5636000
|
trusted library allocation
|
page read and write
|
||
5268000
|
trusted library allocation
|
page read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
DDEA5BC000
|
stack
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
5F12000
|
trusted library allocation
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
6319000
|
trusted library allocation
|
page read and write
|
||
2E5A2748000
|
heap
|
page read and write
|
||
CB5000
|
unkown
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
3350000
|
heap
|
page read and write
|
||
2A8F000
|
stack
|
page read and write
|
||
628C000
|
trusted library allocation
|
page read and write
|
||
CC1000
|
unkown
|
page execute read
|
||
3080000
|
direct allocation
|
page read and write
|
||
5EBD37E000
|
stack
|
page read and write
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
2630000
|
direct allocation
|
page read and write
|
||
6119000
|
trusted library allocation
|
page read and write
|
||
261B000
|
direct allocation
|
page read and write
|
||
563B000
|
trusted library allocation
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
5294000
|
trusted library allocation
|
page read and write
|
||
B91000
|
heap
|
page read and write
|
||
274A000
|
direct allocation
|
page read and write
|
||
65B3000
|
trusted library allocation
|
page read and write
|
||
5E73000
|
trusted library allocation
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
5228000
|
trusted library allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
5637000
|
trusted library allocation
|
page read and write
|
||
344C000
|
heap
|
page read and write
|
||
657F000
|
stack
|
page read and write
|
||
2622000
|
direct allocation
|
page read and write
|
||
37E6000
|
direct allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
5250000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
2032F57B000
|
heap
|
page read and write
|
||
40CF000
|
stack
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
5E63000
|
trusted library allocation
|
page read and write
|
||
176E000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
5228000
|
trusted library allocation
|
page read and write
|
||
571F000
|
trusted library allocation
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
2AF7000
|
heap
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
37FE000
|
stack
|
page read and write
|
||
53C7000
|
trusted library allocation
|
page read and write
|
||
12FB000
|
direct allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
5357000
|
trusted library allocation
|
page read and write
|
||
620C000
|
trusted library allocation
|
page read and write
|
||
522B000
|
trusted library allocation
|
page read and write
|
||
611B000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
heap
|
page read and write
|
||
5084000
|
heap
|
page read and write
|
||
1C9185B0000
|
heap
|
page read and write
|
||
2E5A276B000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
5241000
|
trusted library allocation
|
page read and write
|
||
62C1000
|
trusted library allocation
|
page read and write
|
||
5259000
|
trusted library allocation
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
6DC00FE000
|
stack
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
5886000
|
trusted library allocation
|
page read and write
|
||
56D7000
|
trusted library allocation
|
page read and write
|
||
1099000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page execute and read and write
|
||
63FA000
|
trusted library allocation
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
7E1000
|
heap
|
page read and write
|
||
5239000
|
trusted library allocation
|
page read and write
|
||
7DB000
|
heap
|
page read and write
|
||
4811000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
5224000
|
trusted library allocation
|
page read and write
|
||
526C000
|
trusted library allocation
|
page read and write
|
||
5E2C000
|
trusted library allocation
|
page read and write
|
||
25ED000
|
direct allocation
|
page read and write
|
||
F91000
|
unkown
|
page execute read
|
||
830000
|
heap
|
page read and write
|
||
34C000
|
unkown
|
page execute and write copy
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
1BB9688C000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
26CF000
|
direct allocation
|
page read and write
|
||
D04000
|
direct allocation
|
page read and write
|
||
2032F4E0000
|
heap
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
2E5A277B000
|
heap
|
page read and write
|
||
252CB960000
|
heap
|
page read and write
|
||
5252000
|
trusted library allocation
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
6286000
|
trusted library allocation
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
3080000
|
direct allocation
|
page read and write
|
||
2EE3B9C000
|
stack
|
page read and write
|
||
208B8A90000
|
heap
|
page read and write
|
||
5633000
|
trusted library allocation
|
page read and write
|
||
1B441D40000
|
heap
|
page read and write
|
||
5637000
|
trusted library allocation
|
page read and write
|
||
6300000
|
trusted library allocation
|
page read and write
|
||
98E000
|
heap
|
page read and write
|
||
5271000
|
trusted library allocation
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
2718000
|
direct allocation
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
DE8000
|
direct allocation
|
page read and write
|
||
1C9184D0000
|
heap
|
page read and write
|
||
D99000
|
direct allocation
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
563E000
|
trusted library allocation
|
page read and write
|
||
D73000
|
unkown
|
page read and write
|
||
5709000
|
trusted library allocation
|
page read and write
|
||
5F3000
|
heap
|
page read and write
|
||
523E000
|
trusted library allocation
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
25B3000
|
direct allocation
|
page read and write
|
||
5636000
|
trusted library allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
2841B65B000
|
heap
|
page read and write
|
||
7340000
|
heap
|
page read and write
|
||
61EF000
|
trusted library allocation
|
page read and write
|
||
6259000
|
trusted library allocation
|
page read and write
|
||
26B8000
|
direct allocation
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
F80000
|
unkown
|
page readonly
|
||
5821000
|
trusted library allocation
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
BBC000
|
unkown
|
page execute and write copy
|
||
2788000
|
direct allocation
|
page read and write
|
||
2769000
|
direct allocation
|
page read and write
|
||
27C8000
|
direct allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
7EF000
|
heap
|
page read and write
|
||
2B571FE000
|
stack
|
page read and write
|
||
5637000
|
trusted library allocation
|
page read and write
|
||
610000
|
direct allocation
|
page read and write
|
||
97D3DFC000
|
stack
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
5242000
|
trusted library allocation
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
953167E000
|
stack
|
page read and write
|
||
74E0000
|
heap
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
56F1000
|
trusted library allocation
|
page read and write
|
||
23C2D595000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
1771000
|
heap
|
page read and write
|
||
D74000
|
direct allocation
|
page read and write
|
||
5015000
|
heap
|
page read and write
|
||
522E000
|
trusted library allocation
|
page read and write
|
||
5E62000
|
trusted library allocation
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
527E000
|
trusted library allocation
|
page read and write
|
||
25D4B3C0000
|
heap
|
page read and write
|
||
82F000
|
stack
|
page read and write
|
||
828000
|
unkown
|
page execute and read and write
|
||
3080000
|
direct allocation
|
page read and write
|
||
63F1000
|
trusted library allocation
|
page read and write
|
||
5E68000
|
trusted library allocation
|
page read and write
|
||
4A5F000
|
stack
|
page read and write
|
||
5E17000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
529C000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
EE1000
|
unkown
|
page execute and write copy
|
||
CB91A7F000
|
stack
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
1771000
|
heap
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
1D428C18000
|
heap
|
page read and write
|
||
528B000
|
trusted library allocation
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
1C9185BC000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
1C9185BC000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
1274000
|
unkown
|
page execute and write copy
|
||
26E6000
|
direct allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
EA0000
|
direct allocation
|
page execute and read and write
|
||
336E000
|
heap
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
611C000
|
trusted library allocation
|
page read and write
|
||
54E1000
|
heap
|
page read and write
|
||
123E000
|
unkown
|
page read and write
|
||
5268000
|
trusted library allocation
|
page read and write
|
||
DD5000
|
unkown
|
page readonly
|
||
DEE000
|
stack
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
6225000
|
trusted library allocation
|
page read and write
|
||
6206000
|
trusted library allocation
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
273D000
|
direct allocation
|
page read and write
|
||
5E75000
|
trusted library allocation
|
page read and write
|
||
2735000
|
direct allocation
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
19FA31B0000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
1785000
|
heap
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
680000
|
unkown
|
page execute and read and write
|
||
EF346FF000
|
stack
|
page read and write
|
||
61DB000
|
trusted library allocation
|
page read and write
|
||
1771000
|
heap
|
page read and write
|
||
2568000
|
direct allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
1772000
|
heap
|
page read and write
|
||
2614000
|
direct allocation
|
page read and write
|
||
130932A0000
|
heap
|
page read and write
|
||
5765000
|
trusted library allocation
|
page read and write
|
||
61C7000
|
trusted library allocation
|
page read and write
|
||
5253000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
527C000
|
trusted library allocation
|
page read and write
|
||
6259000
|
trusted library allocation
|
page read and write
|
||
6117000
|
trusted library allocation
|
page read and write
|
||
5784000
|
trusted library allocation
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
63BF000
|
trusted library allocation
|
page read and write
|
||
5E46000
|
trusted library allocation
|
page read and write
|
||
1BB96740000
|
heap
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
2EA109E0000
|
heap
|
page read and write
|
||
536D000
|
stack
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
1B441D64000
|
heap
|
page read and write
|
||
542F5FE000
|
stack
|
page read and write
|
||
5EB5000
|
trusted library allocation
|
page read and write
|
||
35F4000
|
heap
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
549E000
|
stack
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
C06000
|
unkown
|
page execute read
|
||
5050000
|
direct allocation
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
5758000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
575F000
|
trusted library allocation
|
page read and write
|
||
59D02FF000
|
stack
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
5E17000
|
trusted library allocation
|
page read and write
|
||
C8B000
|
unkown
|
page execute and write copy
|
||
95E000
|
stack
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
634D000
|
trusted library allocation
|
page read and write
|
||
563A000
|
trusted library allocation
|
page read and write
|
||
56CD000
|
trusted library allocation
|
page read and write
|
||
3C3F000
|
stack
|
page read and write
|
||
25F5000
|
direct allocation
|
page read and write
|
||
710000
|
direct allocation
|
page execute and read and write
|
||
4CDE000
|
stack
|
page read and write
|
||
CB9175C000
|
stack
|
page read and write
|
||
CD4000
|
unkown
|
page execute and read and write
|
||
1C9185A8000
|
heap
|
page read and write
|
||
5221000
|
trusted library allocation
|
page read and write
|
||
2C0D000
|
direct allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
208B8D30000
|
heap
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
920000
|
direct allocation
|
page read and write
|
||
C7D000
|
unkown
|
page execute read
|
||
5299000
|
trusted library allocation
|
page read and write
|
||
651000
|
unkown
|
page execute and read and write
|
||
524B000
|
trusted library allocation
|
page read and write
|
||
7EF000
|
heap
|
page read and write
|
||
1785000
|
heap
|
page read and write
|
||
4DF0000
|
direct allocation
|
page execute and read and write
|
||
1C9185A7000
|
heap
|
page read and write
|
||
4E29000
|
stack
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
503D000
|
trusted library allocation
|
page execute and read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
12D7000
|
direct allocation
|
page read and write
|
||
574F000
|
trusted library allocation
|
page read and write
|
||
BCD000
|
unkown
|
page read and write
|
||
65B0000
|
heap
|
page read and write
|
||
BF2000
|
unkown
|
page execute and read and write
|
||
E14000
|
heap
|
page read and write
|
||
42D1000
|
heap
|
page read and write
|
||
25CF000
|
direct allocation
|
page read and write
|
||
D6C000
|
unkown
|
page read and write
|
||
273C000
|
direct allocation
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
1771000
|
heap
|
page read and write
|
||
49F0000
|
direct allocation
|
page execute and read and write
|
||
6F4000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page read and write
|
||
CAF000
|
stack
|
page read and write
|
||
19BAFEB9000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
C10000
|
unkown
|
page execute and write copy
|
||
336E000
|
heap
|
page read and write
|
||
4641000
|
heap
|
page read and write
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
25BA000
|
direct allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
56DE000
|
trusted library allocation
|
page read and write
|
||
47E0000
|
direct allocation
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
5E2C000
|
trusted library allocation
|
page read and write
|
||
25D4B4E7000
|
heap
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
27C1000
|
direct allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
252CB965000
|
heap
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
F4B000
|
unkown
|
page execute and read and write
|
||
3CDE000
|
stack
|
page read and write
|
||
528F000
|
trusted library allocation
|
page read and write
|
||
19BAFE20000
|
heap
|
page read and write
|
||
42D1000
|
heap
|
page read and write
|
||
1D4753C0000
|
heap
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
1260000
|
direct allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
3D7F000
|
stack
|
page read and write
|
||
526D000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
5294000
|
trusted library allocation
|
page read and write
|
||
7E1000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
251D000
|
direct allocation
|
page read and write
|
||
5ECE000
|
trusted library allocation
|
page read and write
|
||
63A1000
|
trusted library allocation
|
page read and write
|
||
54A2000
|
heap
|
page read and write
|
||
953177E000
|
stack
|
page read and write
|
||
19BAFEA7000
|
heap
|
page read and write
|
||
344D000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
275A000
|
direct allocation
|
page read and write
|
||
1342000
|
direct allocation
|
page read and write
|
||
2611000
|
direct allocation
|
page read and write
|
||
5008000
|
heap
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
113B000
|
heap
|
page read and write
|
||
356A000
|
heap
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
920000
|
direct allocation
|
page read and write
|
||
5044000
|
trusted library allocation
|
page read and write
|
||
920000
|
direct allocation
|
page read and write
|
||
A1C000
|
unkown
|
page execute read
|
||
5241000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
5CD000
|
heap
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
E14000
|
heap
|
page read and write
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
5E7D000
|
trusted library allocation
|
page read and write
|
||
803000
|
heap
|
page read and write
|
||
27A4000
|
direct allocation
|
page read and write
|
||
D6D000
|
direct allocation
|
page read and write
|
||
D92000
|
direct allocation
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
6114000
|
trusted library allocation
|
page read and write
|
||
1099000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
277F000
|
direct allocation
|
page read and write
|
||
2032F59C000
|
heap
|
page read and write
|
||
768000
|
heap
|
page read and write
|
||
805000
|
heap
|
page read and write
|
||
5632000
|
trusted library allocation
|
page read and write
|
||
266A000
|
direct allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
3F2000
|
unkown
|
page execute and read and write
|
||
252CB720000
|
heap
|
page read and write
|
||
208B8990000
|
heap
|
page read and write
|
||
1C9185BC000
|
heap
|
page read and write
|
||
51C7000
|
trusted library allocation
|
page execute and read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
1BB9686B000
|
heap
|
page read and write
|
||
2638000
|
direct allocation
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
527B000
|
trusted library allocation
|
page read and write
|
||
174F000
|
heap
|
page read and write
|
||
525C000
|
trusted library allocation
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
16D3B0D6000
|
heap
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
19BAFED3000
|
heap
|
page read and write
|
||
58BA000
|
trusted library allocation
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
5808000
|
trusted library allocation
|
page read and write
|
||
2C05000
|
direct allocation
|
page read and write
|
||
C43000
|
unkown
|
page execute and read and write
|
||
1366000
|
direct allocation
|
page read and write
|
||
CDB000
|
unkown
|
page execute and write copy
|
||
C8E000
|
unkown
|
page execute and read and write
|
||
1D428C2C000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
A66000
|
unkown
|
page execute and write copy
|
||
32D1000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
11A1000
|
unkown
|
page execute and read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
3B5E000
|
stack
|
page read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
68F000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
1D4754C0000
|
heap
|
page read and write
|
||
5221000
|
trusted library allocation
|
page read and write
|
||
262A000
|
direct allocation
|
page read and write
|
||
13093270000
|
heap
|
page read and write
|
||
26C7000
|
direct allocation
|
page read and write
|
||
10C5000
|
unkown
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
629F000
|
trusted library allocation
|
page read and write
|
||
20D0FF000
|
stack
|
page read and write
|
||
16D3B0D5000
|
heap
|
page read and write
|
||
583F000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
6A0000
|
unkown
|
page readonly
|
||
62A7000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
2794000
|
direct allocation
|
page read and write
|
||
9D7000
|
unkown
|
page execute read
|
||
4351000
|
heap
|
page read and write
|
||
6117000
|
trusted library allocation
|
page read and write
|
||
63EF000
|
trusted library allocation
|
page read and write
|
||
4970000
|
direct allocation
|
page execute and read and write
|
||
33D1000
|
heap
|
page read and write
|
||
5703000
|
trusted library allocation
|
page read and write
|
||
35F4000
|
heap
|
page read and write
|
||
BBE000
|
unkown
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
FDD000
|
heap
|
page read and write
|
||
1EE000
|
stack
|
page read and write
|
||
2E5A278D000
|
heap
|
page read and write
|
||
610000
|
direct allocation
|
page read and write
|
||
259D000
|
direct allocation
|
page read and write
|
||
2032F4F0000
|
heap
|
page read and write
|
||
5E69000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
5E7E000
|
trusted library allocation
|
page read and write
|
||
DDEA87F000
|
stack
|
page read and write
|
||
5741000
|
trusted library allocation
|
page read and write
|
||
5637000
|
trusted library allocation
|
page read and write
|
||
5633000
|
trusted library allocation
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
344C000
|
heap
|
page read and write
|
||
1D428BE0000
|
heap
|
page read and write
|
||
573E000
|
trusted library allocation
|
page read and write
|
||
5637000
|
trusted library allocation
|
page read and write
|
||
4EA0000
|
direct allocation
|
page execute and read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
524B000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
2C28000
|
direct allocation
|
page read and write
|
||
5E32000
|
trusted library allocation
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
5767000
|
trusted library allocation
|
page read and write
|
||
5E32000
|
trusted library allocation
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
42D1000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
10B2000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
5279000
|
trusted library allocation
|
page read and write
|
||
19A2B9E8000
|
heap
|
page read and write
|
||
56DB000
|
trusted library allocation
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
5015000
|
heap
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
D4E000
|
direct allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
57B5000
|
trusted library allocation
|
page read and write
|
||
1B441C90000
|
heap
|
page read and write
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
5A8000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
208B8AE7000
|
heap
|
page read and write
|
||
B91000
|
heap
|
page read and write
|
||
2554000
|
direct allocation
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
5637000
|
trusted library allocation
|
page read and write
|
||
947000
|
heap
|
page read and write
|
||
5637000
|
trusted library allocation
|
page read and write
|
||
5727000
|
trusted library allocation
|
page read and write
|
||
5768000
|
trusted library allocation
|
page read and write
|
||
BBA000
|
unkown
|
page execute and read and write
|
||
4811000
|
heap
|
page read and write
|
||
56E9000
|
trusted library allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
5033000
|
trusted library allocation
|
page execute and read and write
|
||
CD2000
|
direct allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
7F1000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
500B000
|
heap
|
page read and write
|
||
2C03000
|
direct allocation
|
page read and write
|
||
63C4000
|
trusted library allocation
|
page read and write
|
||
1D475561000
|
heap
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
542F57E000
|
stack
|
page read and write
|
||
5E56000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
6652000
|
trusted library allocation
|
page read and write
|
||
125E000
|
unkown
|
page execute and write copy
|
||
5E12000
|
trusted library allocation
|
page read and write
|
||
114C000
|
unkown
|
page execute and write copy
|
||
61AC000
|
trusted library allocation
|
page read and write
|
||
7530000
|
trusted library allocation
|
page execute and read and write
|
||
37DE000
|
stack
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
563D000
|
trusted library allocation
|
page read and write
|
||
42D1000
|
heap
|
page read and write
|
||
610000
|
direct allocation
|
page read and write
|
||
5717000
|
trusted library allocation
|
page read and write
|
||
610000
|
direct allocation
|
page read and write
|
||
481C000
|
stack
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
EE5B7AC000
|
stack
|
page read and write
|
||
522E000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
38D927C000
|
stack
|
page read and write
|
||
D84000
|
direct allocation
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
611F000
|
trusted library allocation
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
6110000
|
trusted library allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
63B000
|
heap
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
356A000
|
heap
|
page read and write
|
||
3C79000
|
direct allocation
|
page read and write
|
||
DE1000
|
direct allocation
|
page read and write
|
||
F47000
|
heap
|
page read and write
|
||
697000
|
unkown
|
page execute and write copy
|
||
2513000
|
direct allocation
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
4930000
|
direct allocation
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
351F000
|
stack
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
10A3000
|
heap
|
page read and write
|
||
5253000
|
trusted library allocation
|
page read and write
|
||
5259000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
16D3B215000
|
heap
|
page read and write
|
||
58AA000
|
trusted library allocation
|
page read and write
|
||
5FF000
|
heap
|
page read and write
|
||
5940000
|
remote allocation
|
page read and write
|
||
5298000
|
trusted library allocation
|
page read and write
|
||
37B9000
|
direct allocation
|
page read and write
|
||
910000
|
unkown
|
page readonly
|
||
74DE000
|
heap
|
page read and write
|
||
13D9000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
5055000
|
heap
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
1643AEE0000
|
heap
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
47DF000
|
stack
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
524B000
|
trusted library allocation
|
page read and write
|
||
1D475537000
|
heap
|
page read and write
|
||
6119000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
12AD000
|
direct allocation
|
page read and write
|
||
CEF000
|
direct allocation
|
page read and write
|
||
19A2B9D5000
|
heap
|
page read and write
|
||
6112000
|
trusted library allocation
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
611B000
|
trusted library allocation
|
page read and write
|
||
5255000
|
trusted library allocation
|
page read and write
|
||
60E000
|
heap
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
87E000
|
stack
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
1391000
|
direct allocation
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
526C000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
955000
|
unkown
|
page read and write
|
||
67A000
|
heap
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
DD3000
|
direct allocation
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
35F4000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
1643AE85000
|
heap
|
page read and write
|
||
AC3927F000
|
stack
|
page read and write
|
||
16D3B0B0000
|
heap
|
page read and write
|
||
94E000
|
unkown
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
CAB000
|
unkown
|
page execute read
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
FA2000
|
heap
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
610000
|
direct allocation
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
EC0000
|
direct allocation
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
643F000
|
stack
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
7D9000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
344C000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
548F000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
4F01000
|
heap
|
page read and write
|
||
16D3B0FC000
|
heap
|
page read and write
|
||
563C000
|
trusted library allocation
|
page read and write
|
||
522F000
|
trusted library allocation
|
page read and write
|
||
6223000
|
trusted library allocation
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
57E9000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
D31000
|
direct allocation
|
page read and write
|
||
5377000
|
trusted library allocation
|
page read and write
|
||
2E5A276B000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
3CCC000
|
stack
|
page read and write
|
||
6237000
|
trusted library allocation
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
2580000
|
direct allocation
|
page read and write
|
||
52A4000
|
trusted library allocation
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
A5F000
|
stack
|
page read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
10AB000
|
heap
|
page read and write
|
||
5FF3000
|
trusted library allocation
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
1BB9688D000
|
heap
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
523F000
|
trusted library allocation
|
page read and write
|
||
52C5000
|
trusted library allocation
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
D64000
|
direct allocation
|
page read and write
|
||
47E0000
|
direct allocation
|
page read and write
|
||
5E37000
|
trusted library allocation
|
page read and write
|
||
53EF000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
25D6000
|
direct allocation
|
page read and write
|
||
25DE000
|
direct allocation
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
1D475510000
|
heap
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
811000
|
heap
|
page read and write
|
||
582D000
|
trusted library allocation
|
page read and write
|
||
542F67F000
|
stack
|
page read and write
|
||
26EB000
|
direct allocation
|
page read and write
|
||
2E5A2AA0000
|
heap
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
3F9000
|
unkown
|
page write copy
|
||
4351000
|
heap
|
page read and write
|
||
5638000
|
trusted library allocation
|
page read and write
|
||
19BAFE80000
|
heap
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
573F000
|
trusted library allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
94B000
|
unkown
|
page execute read
|
||
1BB9687B000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
2EE3EFF000
|
stack
|
page read and write
|
||
611A000
|
trusted library allocation
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
C92000
|
unkown
|
page execute and read and write
|
||
32F4000
|
heap
|
page read and write
|
||
1290000
|
direct allocation
|
page read and write
|
||
D4C000
|
stack
|
page read and write
|
||
611E000
|
trusted library allocation
|
page read and write
|
||
2E5A278D000
|
heap
|
page read and write
|
||
76AF000
|
stack
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
2841B5F0000
|
heap
|
page read and write
|
||
2E5A277B000
|
heap
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
1C9185B1000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
6267000
|
trusted library allocation
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
266A000
|
direct allocation
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
3090000
|
direct allocation
|
page execute and read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
4940000
|
direct allocation
|
page execute and read and write
|
||
3C9F000
|
stack
|
page read and write
|
||
52A9000
|
trusted library allocation
|
page read and write
|
||
5E4E000
|
trusted library allocation
|
page read and write
|
||
1BB96877000
|
heap
|
page read and write
|
||
8A6000
|
unkown
|
page execute read
|
||
369E000
|
stack
|
page read and write
|
||
637F000
|
trusted library allocation
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
1BB96660000
|
heap
|
page read and write
|
||
6116000
|
trusted library allocation
|
page read and write
|
||
563E000
|
trusted library allocation
|
page read and write
|
||
C59000
|
heap
|
page read and write
|
||
2032F558000
|
heap
|
page read and write
|
||
C3D000
|
unkown
|
page execute and read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
33F4000
|
heap
|
page read and write
|
||
516D000
|
stack
|
page read and write
|
||
41BF000
|
stack
|
page read and write
|
||
48A0000
|
direct allocation
|
page execute and read and write
|
||
11D0000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
52C1000
|
trusted library allocation
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
276A000
|
direct allocation
|
page read and write
|
||
1129000
|
heap
|
page read and write
|
||
1BB96865000
|
heap
|
page read and write
|
||
FBF000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
4CA0000
|
direct allocation
|
page read and write
|
||
5034000
|
trusted library allocation
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
DAF000
|
direct allocation
|
page read and write
|
||
529C000
|
trusted library allocation
|
page read and write
|
||
113B000
|
heap
|
page read and write
|
||
5636000
|
trusted library allocation
|
page read and write
|
||
B2F000
|
stack
|
page read and write
|
||
62EC000
|
trusted library allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
25D4B4E0000
|
heap
|
page read and write
|
||
575000
|
unkown
|
page execute and read and write
|
||
33D1000
|
heap
|
page read and write
|
||
2EA109B0000
|
heap
|
page read and write
|
||
19BAFECE000
|
heap
|
page read and write
|
||
FA2000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
1092000
|
heap
|
page read and write
|
||
F70000
|
direct allocation
|
page read and write
|
||
588A000
|
trusted library allocation
|
page read and write
|
||
176E000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
6FD000
|
heap
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
C55000
|
heap
|
page read and write
|
||
5E3000
|
heap
|
page read and write
|
||
52AD000
|
stack
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
4960000
|
direct allocation
|
page execute and read and write
|
||
466000
|
unkown
|
page execute and write copy
|
||
3471000
|
heap
|
page read and write
|
||
19BAFEBC000
|
heap
|
page read and write
|
||
2708000
|
direct allocation
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
F7E000
|
heap
|
page read and write
|
||
48A0000
|
direct allocation
|
page execute and read and write
|
||
1C9183D0000
|
heap
|
page read and write
|
||
B8E000
|
heap
|
page read and write
|
||
6DBFDBB000
|
stack
|
page read and write
|
||
5EBD2FF000
|
stack
|
page read and write
|
||
19BAFE00000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
585A000
|
trusted library allocation
|
page read and write
|
||
89ED000
|
stack
|
page read and write
|
||
5015000
|
heap
|
page read and write
|
||
2530000
|
direct allocation
|
page read and write
|
||
EC0000
|
direct allocation
|
page read and write
|
||
1C9185AC000
|
heap
|
page read and write
|
||
3550000
|
direct allocation
|
page read and write
|
||
DD1000
|
unkown
|
page write copy
|
||
626E000
|
trusted library allocation
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
2654000
|
direct allocation
|
page read and write
|
||
49C0000
|
direct allocation
|
page execute and read and write
|
||
6112000
|
trusted library allocation
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
379D000
|
direct allocation
|
page read and write
|
||
5E7D000
|
trusted library allocation
|
page read and write
|
||
1771000
|
heap
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
11D8000
|
unkown
|
page execute and read and write
|
||
5769000
|
trusted library allocation
|
page read and write
|
||
2032F5A0000
|
heap
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
27AA000
|
direct allocation
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
49A0000
|
direct allocation
|
page execute and read and write
|
||
EEE000
|
stack
|
page read and write
|
||
5744000
|
trusted library allocation
|
page read and write
|
||
130936D0000
|
heap
|
page read and write
|
||
5E84000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
2AE0000
|
direct allocation
|
page execute and read and write
|
||
563D000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
259D000
|
direct allocation
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
FD3000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
524B000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
C6F000
|
unkown
|
page execute and read and write
|
||
3C9D000
|
direct allocation
|
page read and write
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
58DE000
|
trusted library allocation
|
page read and write
|
||
DC4000
|
direct allocation
|
page read and write
|
||
46FE000
|
stack
|
page read and write
|
||
4D518FF000
|
stack
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
25D4B4EB000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
5744000
|
trusted library allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
5632000
|
trusted library allocation
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
528B000
|
trusted library allocation
|
page read and write
|
||
5E9C000
|
trusted library allocation
|
page read and write
|
||
633F000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
12BB000
|
direct allocation
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
12F0000
|
direct allocation
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
42D1000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
631B000
|
trusted library allocation
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
61E8000
|
trusted library allocation
|
page read and write
|
||
7F6000
|
heap
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
3B9E000
|
stack
|
page read and write
|
||
5E27000
|
trusted library allocation
|
page read and write
|
||
19BAFED1000
|
heap
|
page read and write
|
||
5636000
|
trusted library allocation
|
page read and write
|
||
1771000
|
heap
|
page read and write
|
||
623E000
|
trusted library allocation
|
page read and write
|
||
522F000
|
trusted library allocation
|
page read and write
|
||
10BA000
|
heap
|
page read and write
|
||
27BA000
|
direct allocation
|
page read and write
|
||
19A2BA0B000
|
heap
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
CB0000
|
unkown
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
F70000
|
direct allocation
|
page execute and read and write
|
||
2743000
|
direct allocation
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
524A000
|
trusted library allocation
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
1D428C2C000
|
heap
|
page read and write
|
||
5F73000
|
trusted library allocation
|
page read and write
|
||
20D1FE000
|
stack
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
4EF0000
|
direct allocation
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
7F7000
|
heap
|
page read and write
|
||
481E000
|
stack
|
page read and write
|
||
65D3000
|
heap
|
page read and write
|
||
2F17000
|
heap
|
page read and write
|
||
570E000
|
trusted library allocation
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
5E9C000
|
trusted library allocation
|
page read and write
|
||
D69000
|
unkown
|
page write copy
|
||
2631000
|
direct allocation
|
page read and write
|
||
379A000
|
direct allocation
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
5E1C000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
1B441D8D000
|
heap
|
page read and write
|
||
CEC000
|
unkown
|
page execute and write copy
|
||
3550000
|
direct allocation
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
EE5BAFF000
|
stack
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
37C4000
|
direct allocation
|
page read and write
|
||
4BB0000
|
trusted library allocation
|
page read and write
|
||
563D000
|
trusted library allocation
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
524B000
|
trusted library allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
176F000
|
heap
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
1771000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
52C5000
|
trusted library allocation
|
page read and write
|
||
271E000
|
direct allocation
|
page read and write
|
||
B91000
|
heap
|
page read and write
|
||
1B441D65000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
4A96000
|
trusted library allocation
|
page read and write
|
||
390000
|
unkown
|
page read and write
|
||
386D000
|
direct allocation
|
page read and write
|
||
123E000
|
unkown
|
page write copy
|
||
1DA81618000
|
heap
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
80A000
|
heap
|
page read and write
|
||
2032F576000
|
heap
|
page read and write
|
||
19A2BA1A000
|
heap
|
page read and write
|
||
48A0000
|
direct allocation
|
page execute and read and write
|
||
4E41000
|
heap
|
page read and write
|
||
3371000
|
heap
|
page read and write
|
||
6115000
|
trusted library allocation
|
page read and write
|
||
1378000
|
unkown
|
page execute and read and write
|
||
F49000
|
unkown
|
page write copy
|
||
36C000
|
stack
|
page read and write
|
||
528F000
|
trusted library allocation
|
page read and write
|
||
D39000
|
direct allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
63F8000
|
trusted library allocation
|
page read and write
|
||
920000
|
direct allocation
|
page read and write
|
||
2032F574000
|
heap
|
page read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
2E5A2765000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
5ECD000
|
trusted library allocation
|
page read and write
|
||
563B000
|
trusted library allocation
|
page read and write
|
||
9C1000
|
unkown
|
page execute read
|
||
5E37000
|
trusted library allocation
|
page read and write
|
||
19A2B9E0000
|
heap
|
page read and write
|
||
1B441D92000
|
heap
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
CAE000
|
unkown
|
page read and write
|
||
2574000
|
direct allocation
|
page read and write
|
||
1D428BD5000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
92C000
|
unkown
|
page execute read
|
||
D80000
|
heap
|
page read and write
|
||
FC7000
|
heap
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
7FC000
|
heap
|
page read and write
|
||
DCD000
|
unkown
|
page write copy
|
||
E14000
|
heap
|
page read and write
|
||
5221000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
3580000
|
direct allocation
|
page read and write
|
||
1240000
|
unkown
|
page read and write
|
||
611D000
|
trusted library allocation
|
page read and write
|
||
56C4000
|
trusted library allocation
|
page read and write
|
||
5D4000
|
heap
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
2596000
|
direct allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
5636000
|
trusted library allocation
|
page read and write
|
||
19FA3209000
|
heap
|
page read and write
|
||
563A000
|
trusted library allocation
|
page read and write
|
||
129F000
|
direct allocation
|
page read and write
|
||
5940000
|
remote allocation
|
page read and write
|
||
3080000
|
direct allocation
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
1273000
|
direct allocation
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
5239000
|
trusted library allocation
|
page read and write
|
||
19A2B9D0000
|
heap
|
page read and write
|
||
6118000
|
trusted library allocation
|
page read and write
|
||
5631000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
52AC000
|
trusted library allocation
|
page read and write
|
||
5E1A000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
459E000
|
stack
|
page read and write
|
||
F8A000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
CEE000
|
unkown
|
page execute and write copy
|
||
6119000
|
trusted library allocation
|
page read and write
|
||
30B3000
|
heap
|
page read and write
|
||
CE5C0AC000
|
stack
|
page read and write
|
||
174F000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
2E5A2776000
|
heap
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
A79000
|
unkown
|
page readonly
|
||
334D000
|
heap
|
page read and write
|
||
D1A000
|
direct allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
563E000
|
trusted library allocation
|
page read and write
|
||
108E000
|
heap
|
page read and write
|
||
FD3000
|
heap
|
page read and write
|
||
35D1000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
5294000
|
trusted library allocation
|
page read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
6209000
|
trusted library allocation
|
page read and write
|
||
2C01000
|
direct allocation
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
2568000
|
direct allocation
|
page read and write
|
||
4D515AB000
|
stack
|
page read and write
|
||
346E000
|
heap
|
page read and write
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
5DA000
|
heap
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
524A000
|
trusted library allocation
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
23C2D43B000
|
heap
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
6924000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page read and write
|
||
3B5F000
|
stack
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
5E17000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
93C000
|
stack
|
page read and write
|
||
A56000
|
unkown
|
page write copy
|
||
33D1000
|
heap
|
page read and write
|
||
95312BB000
|
stack
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
22A4B230000
|
heap
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
522E000
|
trusted library allocation
|
page read and write
|
||
178D000
|
heap
|
page read and write
|
||
2032F588000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
3B8F000
|
stack
|
page read and write
|
||
2630000
|
direct allocation
|
page read and write
|
||
2E5A278D000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
57B000
|
stack
|
page read and write
|
||
25D4000
|
direct allocation
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
109D000
|
heap
|
page read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
35F4000
|
heap
|
page read and write
|
||
4980000
|
direct allocation
|
page execute and read and write
|
||
177B000
|
heap
|
page read and write
|
||
344D000
|
heap
|
page read and write
|
||
4800000
|
direct allocation
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
2779000
|
direct allocation
|
page read and write
|
||
5637000
|
trusted library allocation
|
page read and write
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
DDA000
|
direct allocation
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
FC7000
|
heap
|
page read and write
|
||
768000
|
heap
|
page read and write
|
||
1374000
|
direct allocation
|
page read and write
|
||
80A000
|
heap
|
page read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
6DC017E000
|
stack
|
page read and write
|
||
336E000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
5241000
|
trusted library allocation
|
page read and write
|
||
1BB96875000
|
heap
|
page read and write
|
||
5E75000
|
trusted library allocation
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
334D000
|
heap
|
page read and write
|
||
816000
|
heap
|
page read and write
|
||
B6D000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
35F4000
|
heap
|
page read and write
|
||
32D1000
|
heap
|
page read and write
|
||
C0E000
|
heap
|
page read and write
|
||
A52000
|
unkown
|
page execute and read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
4351000
|
heap
|
page read and write
|
||
174F000
|
heap
|
page read and write
|
||
525B000
|
trusted library allocation
|
page read and write
|
||
911000
|
unkown
|
page execute read
|
||
2E5A2765000
|
heap
|
page read and write
|
||
2841B5E0000
|
heap
|
page read and write
|
||
61D5000
|
trusted library allocation
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
D7B000
|
direct allocation
|
page read and write
|
||
127D000
|
direct allocation
|
page read and write
|
||
59D017F000
|
stack
|
page read and write
|
||
4F01000
|
heap
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
E14000
|
heap
|
page read and write
|
||
5639000
|
trusted library allocation
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
EE1000
|
unkown
|
page execute and write copy
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
113A000
|
heap
|
page read and write
|
||
5E70000
|
trusted library allocation
|
page read and write
|
||
174F000
|
heap
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
1643AEEB000
|
heap
|
page read and write
|
||
1D475548000
|
heap
|
page read and write
|
||
1D4757C5000
|
heap
|
page read and write
|
||
65D9000
|
trusted library allocation
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
11D0000
|
unkown
|
page execute and read and write
|
||
334E000
|
stack
|
page read and write
|
||
2032F592000
|
heap
|
page read and write
|
||
3471000
|
heap
|
page read and write
|
||
1B441CB0000
|
heap
|
page read and write
|
||
26D6000
|
direct allocation
|
page read and write
|
||
2726000
|
direct allocation
|
page read and write
|
||
610000
|
direct allocation
|
page read and write
|
||
16D3B0FC000
|
heap
|
page read and write
|
||
130D000
|
direct allocation
|
page read and write
|
||
7540000
|
heap
|
page read and write
|
||
10B7000
|
heap
|
page read and write
|
||
5FFB000
|
trusted library allocation
|
page read and write
|
||
6221000
|
trusted library allocation
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
6361000
|
trusted library allocation
|
page read and write
|
||
5940000
|
remote allocation
|
page read and write
|
||
501F000
|
stack
|
page read and write
|
||
19A2BA2D000
|
heap
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
524A000
|
trusted library allocation
|
page read and write
|
||
1093000
|
heap
|
page read and write
|
||
258F000
|
direct allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
5717000
|
trusted library allocation
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
62C3000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
9CA000
|
stack
|
page read and write
|
||
C0B000
|
heap
|
page read and write
|
||
5E2C000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
33D1000
|
heap
|
page read and write
|
||
19FA31FD000
|
heap
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
3C84000
|
direct allocation
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
5F53000
|
trusted library allocation
|
page read and write
|
||
26DD000
|
direct allocation
|
page read and write
|
||
62CA000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
57BC000
|
trusted library allocation
|
page read and write
|
||
5226000
|
trusted library allocation
|
page read and write
|
||
1774000
|
heap
|
page read and write
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
1C918578000
|
heap
|
page read and write
|
||
5639000
|
trusted library allocation
|
page read and write
|
||
4351000
|
heap
|
page read and write
|
||
47CC000
|
stack
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
4750000
|
direct allocation
|
page read and write
|
||
3080000
|
direct allocation
|
page read and write
|
||
19BAFECE000
|
heap
|
page read and write
|
||
53F7000
|
trusted library allocation
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
19FA321C000
|
heap
|
page read and write
|
||
964000
|
unkown
|
page write copy
|
||
3371000
|
heap
|
page read and write
|
||
1B441D48000
|
heap
|
page read and write
|
There are 3761 hidden memdumps, click here to show them.