Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1008370001\870da04327.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\Tasks\skotes.job
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\1008370001\870da04327.exe
|
"C:\Users\user\AppData\Local\Temp\1008370001\870da04327.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2368 --field-trial-handle=2212,i,12169460362055514967,5517979539831141923,262144
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://anglebug.com/7724J
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actionsh
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
https://anglebug.com/72466
|
unknown
|
||
https://crbug.com/368855.)
|
unknown
|
||
http://polymer.github.io/AUTHORS.txt
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php0001
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://photos.google.com?referrer=CHROME_NTP
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpcoded
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpomf
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://docs.googl0
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://docs.google.com/presentation/
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
http://polymer.github.io/PATENTS.txt
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpFIL
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
https://docs.google.com/spreadsheets/
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://drive-daily-4.c
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
|
34.116.198.130
|
||
http://185.215.113.43/Zu7JuNko/index.phpWin~
|
unknown
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
http://anglebug.com/7279?
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php32#
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://31.41.244.11/files/random.exe5062
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpJ
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
http://anglebug.com/7036N
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php:
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpA
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpncodedU
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fvtekk5pn.top
|
34.116.198.130
|
||
www.google.com
|
142.250.181.100
|
||
fvtekk5pn.top
|
34.116.198.130
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.43
|
unknown
|
Portugal
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
34.116.198.130
|
home.fvtekk5pn.top
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
31.41.244.11
|
unknown
|
Russian Federation
|
||
142.250.181.100
|
www.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
61000
|
unkown
|
page execute and read and write
|
||
51E0000
|
direct allocation
|
page read and write
|
||
61000
|
unkown
|
page execute and read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page read and write
|
||
61000
|
unkown
|
page execute and read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
9F1000
|
unkown
|
page execute and read and write
|
||
321E000
|
stack
|
page read and write
|
||
21900034C000
|
trusted library allocation
|
page read and write
|
||
219000E8C000
|
trusted library allocation
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
219000BDC000
|
trusted library allocation
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
1C1C3420000
|
heap
|
page read and write
|
||
398F000
|
stack
|
page read and write
|
||
219000380000
|
trusted library allocation
|
page read and write
|
||
2CF0002DC000
|
trusted library allocation
|
page read and write
|
||
219000380000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
direct allocation
|
page read and write
|
||
2190008A0000
|
trusted library allocation
|
page read and write
|
||
2FBF000
|
stack
|
page read and write
|
||
CC000
|
unkown
|
page execute and read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
13F1000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
A6FFFFE000
|
unkown
|
page readonly
|
||
3ACF000
|
stack
|
page read and write
|
||
65E5000
|
heap
|
page read and write
|
||
93C000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
A6887FE000
|
stack
|
page read and write
|
||
219001044000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
C70000
|
direct allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
2CF000201000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
1C1BD1DE000
|
heap
|
page read and write
|
||
2CF0007D0000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
219000FD8000
|
trusted library allocation
|
page read and write
|
||
219000708000
|
trusted library allocation
|
page read and write
|
||
CB000
|
unkown
|
page execute and read and write
|
||
74BA000
|
heap
|
page read and write
|
||
A6FBFFE000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
2CF0006E8000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1441000
|
heap
|
page read and write
|
||
1C1C3BEE000
|
trusted library section
|
page read and write
|
||
2CF000878000
|
trusted library allocation
|
page read and write
|
||
61000
|
unkown
|
page execute and write copy
|
||
219000F2C000
|
trusted library allocation
|
page read and write
|
||
2190001DC000
|
trusted library allocation
|
page read and write
|
||
72DE000
|
heap
|
page read and write
|
||
219000340000
|
trusted library allocation
|
page read and write
|
||
7179000
|
heap
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
219000294000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
A6E8FFE000
|
unkown
|
page readonly
|
||
219000354000
|
trusted library allocation
|
page read and write
|
||
21900097D000
|
trusted library allocation
|
page read and write
|
||
525F000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
ED8002C0000
|
trusted library allocation
|
page read and write
|
||
528000
|
unkown
|
page execute and write copy
|
||
219000184000
|
trusted library allocation
|
page read and write
|
||
21900093D000
|
trusted library allocation
|
page read and write
|
||
21900034C000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2190002B4000
|
trusted library allocation
|
page read and write
|
||
72DE000
|
heap
|
page read and write
|
||
219000894000
|
trusted library allocation
|
page read and write
|
||
219000C98000
|
trusted library allocation
|
page read and write
|
||
A6F47FC000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
2CF0006D4000
|
trusted library allocation
|
page read and write
|
||
A6FAFFE000
|
unkown
|
page readonly
|
||
21900000C000
|
trusted library allocation
|
page read and write
|
||
C70000
|
direct allocation
|
page read and write
|
||
219000EC8000
|
trusted library allocation
|
page read and write
|
||
219000F74000
|
trusted library allocation
|
page read and write
|
||
5970000
|
heap
|
page read and write
|
||
219000958000
|
trusted library allocation
|
page read and write
|
||
141000
|
unkown
|
page execute and write copy
|
||
2CF000850000
|
trusted library allocation
|
page read and write
|
||
1C1C3C30000
|
trusted library section
|
page read and write
|
||
219000B58000
|
trusted library allocation
|
page read and write
|
||
A6FA7FE000
|
stack
|
page read and write
|
||
13C3000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
219000228000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
6D69000
|
heap
|
page read and write
|
||
734E000
|
heap
|
page read and write
|
||
219000D38000
|
trusted library allocation
|
page read and write
|
||
BE7000
|
unkown
|
page execute and read and write
|
||
D11000
|
unkown
|
page execute and read and write
|
||
E04000
|
heap
|
page read and write
|
||
6D50000
|
heap
|
page read and write
|
||
1C1C3443000
|
heap
|
page read and write
|
||
2CF000894000
|
trusted library allocation
|
page read and write
|
||
219000354000
|
trusted library allocation
|
page read and write
|
||
C70000
|
direct allocation
|
page read and write
|
||
F0E000
|
stack
|
page read and write
|
||
4B90000
|
trusted library allocation
|
page read and write
|
||
8AC002EC000
|
direct allocation
|
page read and write
|
||
51E0000
|
direct allocation
|
page read and write
|
||
7457000
|
heap
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
2190008F8000
|
trusted library allocation
|
page read and write
|
||
8AC00217000
|
direct allocation
|
page read and write
|
||
717B000
|
heap
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
1C1C3020000
|
heap
|
page read and write
|
||
425E000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
6BD0000
|
trusted library allocation
|
page read and write
|
||
257000
|
unkown
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
717F000
|
heap
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
2CF000404000
|
trusted library allocation
|
page read and write
|
||
43CE000
|
stack
|
page read and write
|
||
E20000
|
direct allocation
|
page read and write
|
||
A6F0FFE000
|
unkown
|
page readonly
|
||
21900034C000
|
trusted library allocation
|
page read and write
|
||
66EF000
|
stack
|
page read and write
|
||
721D000
|
heap
|
page read and write
|
||
7311000
|
heap
|
page read and write
|
||
219000D74000
|
trusted library allocation
|
page read and write
|
||
382000
|
unkown
|
page execute and write copy
|
||
ED8002BC000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
219000CD0000
|
trusted library allocation
|
page read and write
|
||
ED800230000
|
trusted library allocation
|
page read and write
|
||
2CF000830000
|
trusted library allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
8AC0020C000
|
direct allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
49D0000
|
heap
|
page read and write
|
||
219000C98000
|
trusted library allocation
|
page read and write
|
||
219000F50000
|
trusted library allocation
|
page read and write
|
||
65E0000
|
heap
|
page read and write
|
||
8AC002E4000
|
direct allocation
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
36B000
|
unkown
|
page execute and read and write
|
||
219001128000
|
trusted library allocation
|
page read and write
|
||
219000FE4000
|
trusted library allocation
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
2CF0006E8000
|
trusted library allocation
|
page read and write
|
||
219000688000
|
trusted library allocation
|
page read and write
|
||
1C1BBB50000
|
heap
|
page read and write
|
||
1C1C3431000
|
heap
|
page read and write
|
||
2190006D8000
|
trusted library allocation
|
page read and write
|
||
729E000
|
heap
|
page read and write
|
||
74AC000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
219000290000
|
trusted library allocation
|
page read and write
|
||
1C1C29E0000
|
trusted library section
|
page read and write
|
||
219000488000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
219000BD0000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2CF000920000
|
trusted library allocation
|
page read and write
|
||
ED8002C0000
|
trusted library allocation
|
page read and write
|
||
2CF0007C0000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
CB000
|
unkown
|
page execute and read and write
|
||
3ECE000
|
stack
|
page read and write
|
||
2CF000401000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
219000944000
|
trusted library allocation
|
page read and write
|
||
2CF000860000
|
trusted library allocation
|
page read and write
|
||
A6FDFFE000
|
unkown
|
page readonly
|
||
1C1BD6D7000
|
heap
|
page read and write
|
||
219000B00000
|
trusted library allocation
|
page read and write
|
||
4D60000
|
heap
|
page read and write
|
||
8AC00303000
|
direct allocation
|
page read and write
|
||
2CF000601000
|
trusted library allocation
|
page read and write
|
||
21900036C000
|
trusted library allocation
|
page read and write
|
||
2CF0007AC000
|
trusted library allocation
|
page read and write
|
||
A6E17FB000
|
stack
|
page read and write
|
||
4D1F000
|
stack
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
4DF0000
|
direct allocation
|
page execute and read and write
|
||
381000
|
unkown
|
page execute and read and write
|
||
1C1C2EB0000
|
heap
|
page read and write
|
||
219000C8C000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
309B000
|
stack
|
page read and write
|
||
1C1BD6C7000
|
heap
|
page read and write
|
||
219000CB0000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
A6EDFFE000
|
unkown
|
page readonly
|
||
21900034C000
|
trusted library allocation
|
page read and write
|
||
2190005A4000
|
trusted library allocation
|
page read and write
|
||
2190001B4000
|
trusted library allocation
|
page read and write
|
||
4E00000
|
direct allocation
|
page execute and read and write
|
||
33BE000
|
stack
|
page read and write
|
||
C9000
|
unkown
|
page write copy
|
||
6D4C000
|
stack
|
page read and write
|
||
219000900000
|
trusted library allocation
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
1C1BD1E3000
|
heap
|
page read and write
|
||
1452000
|
heap
|
page read and write
|
||
C9000
|
unkown
|
page write copy
|
||
1C1BD1F0000
|
heap
|
page read and write
|
||
219000360000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
421F000
|
stack
|
page read and write
|
||
2CF00039C000
|
trusted library allocation
|
page read and write
|
||
219000F34000
|
trusted library allocation
|
page read and write
|
||
219000F1C000
|
trusted library allocation
|
page read and write
|
||
2190006CC000
|
trusted library allocation
|
page read and write
|
||
499F000
|
stack
|
page read and write
|
||
219000B70000
|
trusted library allocation
|
page read and write
|
||
E20000
|
direct allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
8AC002A8000
|
direct allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
2CF0007E4000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
direct allocation
|
page execute and read and write
|
||
219000930000
|
trusted library allocation
|
page read and write
|
||
3FCF000
|
stack
|
page read and write
|
||
A6897FE000
|
stack
|
page read and write
|
||
7424000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
55AD000
|
stack
|
page read and write
|
||
4ADF000
|
stack
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
219000CC0000
|
trusted library allocation
|
page read and write
|
||
1C1C30F3000
|
trusted library section
|
page read and write
|
||
C57000
|
heap
|
page read and write
|
||
143E000
|
heap
|
page read and write
|
||
1C1B9CCE000
|
heap
|
page read and write
|
||
C5C000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
C70000
|
direct allocation
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
A689FFE000
|
unkown
|
page readonly
|
||
3EFE000
|
stack
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
219000304000
|
trusted library allocation
|
page read and write
|
||
8AC002AC000
|
direct allocation
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
3D5E000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
4C61000
|
direct allocation
|
page read and write
|
||
219000958000
|
trusted library allocation
|
page read and write
|
||
2CF000424000
|
trusted library allocation
|
page read and write
|
||
2CF000418000
|
trusted library allocation
|
page read and write
|
||
219000214000
|
trusted library allocation
|
page read and write
|
||
71D2000
|
direct allocation
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
13BD000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
219000124000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
A6817FE000
|
stack
|
page read and write
|
||
E20000
|
direct allocation
|
page read and write
|
||
2190012BC000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
85DC000
|
stack
|
page read and write
|
||
219000B20000
|
trusted library allocation
|
page read and write
|
||
219000C80000
|
trusted library allocation
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
219000068000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
7110000
|
heap
|
page read and write
|
||
84A0000
|
heap
|
page read and write
|
||
219000E80000
|
trusted library allocation
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
219000C0C000
|
trusted library allocation
|
page read and write
|
||
360E000
|
stack
|
page read and write
|
||
219000294000
|
trusted library allocation
|
page read and write
|
||
CC000
|
unkown
|
page execute and read and write
|
||
1C1C3E2E000
|
trusted library section
|
page read and write
|
||
2190002A4000
|
trusted library allocation
|
page read and write
|
||
4A71000
|
direct allocation
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
4591000
|
heap
|
page read and write
|
||
73D9000
|
heap
|
page read and write
|
||
219000360000
|
trusted library allocation
|
page read and write
|
||
219000A6C000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
A6F1FFE000
|
unkown
|
page readonly
|
||
4C00000
|
direct allocation
|
page read and write
|
||
2CF00087C000
|
trusted library allocation
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
2190003D8000
|
trusted library allocation
|
page read and write
|
||
A6827FD000
|
stack
|
page read and write
|
||
D02000
|
unkown
|
page execute and read and write
|
||
2CF00079C000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
C70000
|
direct allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
7173000
|
heap
|
page read and write
|
||
219000500000
|
trusted library allocation
|
page read and write
|
||
2190001EC000
|
trusted library allocation
|
page read and write
|
||
4B50000
|
direct allocation
|
page execute and read and write
|
||
21900101C000
|
trusted library allocation
|
page read and write
|
||
219000298000
|
trusted library allocation
|
page read and write
|
||
21900064C000
|
trusted library allocation
|
page read and write
|
||
60000
|
unkown
|
page read and write
|
||
53EE000
|
stack
|
page read and write
|
||
219000C6C000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
219000218000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
7173000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
2190002C0000
|
trusted library allocation
|
page read and write
|
||
4E00000
|
direct allocation
|
page execute and read and write
|
||
30D0000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
A52000
|
unkown
|
page execute and read and write
|
||
7175000
|
heap
|
page read and write
|
||
219000858000
|
trusted library allocation
|
page read and write
|
||
AFD000
|
stack
|
page read and write
|
||
2CF000898000
|
trusted library allocation
|
page read and write
|
||
219000310000
|
trusted library allocation
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
7265000
|
heap
|
page read and write
|
||
531F000
|
stack
|
page read and write
|
||
219001220000
|
trusted library allocation
|
page read and write
|
||
219000C98000
|
trusted library allocation
|
page read and write
|
||
2190009C0000
|
trusted library allocation
|
page read and write
|
||
219000EBC000
|
trusted library allocation
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
219000CA8000
|
trusted library allocation
|
page read and write
|
||
219000174000
|
trusted library allocation
|
page read and write
|
||
A6E9FFE000
|
unkown
|
page readonly
|
||
3B3E000
|
stack
|
page read and write
|
||
8AC002DC000
|
direct allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
435F000
|
stack
|
page read and write
|
||
257000
|
unkown
|
page execute and read and write
|
||
C70000
|
direct allocation
|
page read and write
|
||
2190007F4000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
21900060C000
|
trusted library allocation
|
page read and write
|
||
219000304000
|
trusted library allocation
|
page read and write
|
||
8AC002D0000
|
direct allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
2CF000948000
|
trusted library allocation
|
page read and write
|
||
2CF000801000
|
trusted library allocation
|
page read and write
|
||
2190001C4000
|
trusted library allocation
|
page read and write
|
||
21900074C000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
219000714000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
direct allocation
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
219000A4C000
|
trusted library allocation
|
page read and write
|
||
1C1B9BE0000
|
heap
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
219000401000
|
trusted library allocation
|
page read and write
|
||
2CF000880000
|
trusted library allocation
|
page read and write
|
||
2190001F0000
|
trusted library allocation
|
page read and write
|
||
3D8E000
|
stack
|
page read and write
|
||
2CF000890000
|
trusted library allocation
|
page read and write
|
||
219001201000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
3E0F000
|
stack
|
page read and write
|
||
2CF000864000
|
trusted library allocation
|
page read and write
|
||
219000488000
|
trusted library allocation
|
page read and write
|
||
ED8002C0000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
direct allocation
|
page execute and read and write
|
||
43FE000
|
stack
|
page read and write
|
||
1C1C3C20000
|
trusted library section
|
page read and write
|
||
381000
|
unkown
|
page execute and write copy
|
||
E20000
|
direct allocation
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
EA1000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
A6F77FE000
|
unkown
|
page readonly
|
||
21900034C000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
1C1B9D40000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1C1BD1F0000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1C1BD1EA000
|
heap
|
page read and write
|
||
21900061C000
|
trusted library allocation
|
page read and write
|
||
ED800294000
|
trusted library allocation
|
page read and write
|
||
72F6000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
21900050C000
|
trusted library allocation
|
page read and write
|
||
2FFE000
|
stack
|
page read and write
|
||
1360000
|
direct allocation
|
page read and write
|
||
4B90000
|
direct allocation
|
page execute and read and write
|
||
2190001B4000
|
trusted library allocation
|
page read and write
|
||
A6F37FC000
|
stack
|
page read and write
|
||
1413000
|
heap
|
page read and write
|
||
A6FCFFE000
|
unkown
|
page readonly
|
||
310E000
|
stack
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
2CF000818000
|
trusted library allocation
|
page read and write
|
||
219000C01000
|
trusted library allocation
|
page read and write
|
||
30D7000
|
heap
|
page read and write
|
||
A6807FD000
|
stack
|
page read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
219000584000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
E45000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
2190003C8000
|
trusted library allocation
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
710E000
|
heap
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
30CF000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
219000CA8000
|
trusted library allocation
|
page read and write
|
||
1C1C1382000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
729D000
|
heap
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
2CF000884000
|
trusted library allocation
|
page read and write
|
||
219000ABC000
|
trusted library allocation
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
2CF00084C000
|
trusted library allocation
|
page read and write
|
||
219000EB4000
|
trusted library allocation
|
page read and write
|
||
2190001D8000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
2CF0007A0000
|
trusted library allocation
|
page read and write
|
||
731F000
|
heap
|
page read and write
|
||
ED800201000
|
trusted library allocation
|
page read and write
|
||
219000354000
|
trusted library allocation
|
page read and write
|
||
A6E5FFE000
|
unkown
|
page readonly
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1360000
|
direct allocation
|
page read and write
|
||
21900120C000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
219001080000
|
trusted library allocation
|
page read and write
|
||
ED800274000
|
trusted library allocation
|
page read and write
|
||
ED8002A0000
|
trusted library allocation
|
page read and write
|
||
219000304000
|
trusted library allocation
|
page read and write
|
||
A6F5FFC000
|
stack
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
8AC00280000
|
direct allocation
|
page read and write
|
||
E20000
|
direct allocation
|
page read and write
|
||
1413000
|
heap
|
page read and write
|
||
FBA000
|
heap
|
page read and write
|
||
2CF00040C000
|
trusted library allocation
|
page read and write
|
||
F5E000
|
heap
|
page read and write
|
||
7308000
|
heap
|
page read and write
|
||
219001134000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
A6DDFFE000
|
unkown
|
page readonly
|
||
4591000
|
heap
|
page read and write
|
||
219000054000
|
trusted library allocation
|
page read and write
|
||
C70000
|
direct allocation
|
page read and write
|
||
219001210000
|
trusted library allocation
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
219000A74000
|
trusted library allocation
|
page read and write
|
||
C70000
|
direct allocation
|
page read and write
|
||
219001090000
|
trusted library allocation
|
page read and write
|
||
2190012E4000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
13F2000
|
heap
|
page read and write
|
||
2CF0002ED000
|
trusted library allocation
|
page read and write
|
||
1C1BD680000
|
heap
|
page read and write
|
||
CFD000
|
stack
|
page read and write
|
||
21900020C000
|
trusted library allocation
|
page read and write
|
||
414E000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1441000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
C70000
|
direct allocation
|
page read and write
|
||
21900005F000
|
trusted library allocation
|
page read and write
|
||
4596000
|
heap
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
3BCD000
|
stack
|
page read and write
|
||
8AC00201000
|
direct allocation
|
page read and write
|
||
219000F1C000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
219000294000
|
trusted library allocation
|
page read and write
|
||
219000418000
|
trusted library allocation
|
page read and write
|
||
21900034C000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
219000F74000
|
trusted library allocation
|
page read and write
|
||
3C1E000
|
stack
|
page read and write
|
||
6E80000
|
direct allocation
|
page execute and read and write
|
||
2CF000964000
|
trusted library allocation
|
page read and write
|
||
40DF000
|
stack
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
219000E0C000
|
trusted library allocation
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
143C000
|
heap
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
3CCF000
|
stack
|
page read and write
|
||
ED800260000
|
trusted library allocation
|
page read and write
|
||
2CF0006BC000
|
trusted library allocation
|
page read and write
|
||
36CE000
|
stack
|
page read and write
|
||
2190011A4000
|
trusted library allocation
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
1457000
|
heap
|
page read and write
|
||
ED8002B0000
|
trusted library allocation
|
page read and write
|
||
7173000
|
heap
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
2CF0006AC000
|
trusted library allocation
|
page read and write
|
||
1C1BD1D8000
|
heap
|
page read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
C2000
|
unkown
|
page execute and read and write
|
||
2190008D8000
|
trusted library allocation
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
C70000
|
direct allocation
|
page read and write
|
||
2190003D8000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
1425000
|
heap
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
39CE000
|
stack
|
page read and write
|
||
2CF00080C000
|
trusted library allocation
|
page read and write
|
||
2CF0006E0000
|
trusted library allocation
|
page read and write
|
||
3A9F000
|
stack
|
page read and write
|
||
36B000
|
unkown
|
page execute and read and write
|
||
2190010E8000
|
trusted library allocation
|
page read and write
|
||
7484000
|
heap
|
page read and write
|
||
2190004A4000
|
trusted library allocation
|
page read and write
|
||
528000
|
unkown
|
page execute and write copy
|
||
A6F57FE000
|
unkown
|
page readonly
|
||
143B000
|
heap
|
page read and write
|
||
7100000
|
heap
|
page read and write
|
||
1C1C3092000
|
trusted library section
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
219000CAB000
|
trusted library allocation
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
1C1BD6C9000
|
heap
|
page read and write
|
||
1413000
|
heap
|
page read and write
|
||
A6F4FFC000
|
stack
|
page read and write
|
||
2190003D8000
|
trusted library allocation
|
page read and write
|
||
219001128000
|
trusted library allocation
|
page read and write
|
||
ED8002F8000
|
trusted library allocation
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
D12000
|
unkown
|
page execute and write copy
|
||
219000A5C000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
219000954000
|
trusted library allocation
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
13C5000
|
heap
|
page read and write
|
||
5450000
|
heap
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
2190003E8000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
heap
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
2CF00091C000
|
trusted library allocation
|
page read and write
|
||
219000C1F000
|
trusted library allocation
|
page read and write
|
||
2190006FC000
|
trusted library allocation
|
page read and write
|
||
219000F74000
|
trusted library allocation
|
page read and write
|
||
219000B94000
|
trusted library allocation
|
page read and write
|
||
7222000
|
heap
|
page read and write
|
||
1C1C3E20000
|
trusted library section
|
page read and write
|
||
1C1C3D60000
|
trusted library section
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
E20000
|
direct allocation
|
page read and write
|
||
219000BD0000
|
trusted library allocation
|
page read and write
|
||
721E000
|
heap
|
page read and write
|
||
219000D14000
|
trusted library allocation
|
page read and write
|
||
219000201000
|
trusted library allocation
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
8AC00215000
|
direct allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
722E000
|
heap
|
page read and write
|
||
1C1BD6EE000
|
heap
|
page read and write
|
||
2190000DC000
|
trusted library allocation
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
219000E78000
|
trusted library allocation
|
page read and write
|
||
69AE000
|
stack
|
page read and write
|
||
2190002FB000
|
trusted library allocation
|
page read and write
|
||
219000338000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
2190012CC000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
1C1B9AF0000
|
heap
|
page read and write
|
||
2190002F0000
|
trusted library allocation
|
page read and write
|
||
219000C50000
|
trusted library allocation
|
page read and write
|
||
141000
|
unkown
|
page execute and write copy
|
||
7171000
|
heap
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
717E000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
717C000
|
heap
|
page read and write
|
||
A59000
|
unkown
|
page write copy
|
||
219000C38000
|
trusted library allocation
|
page read and write
|
||
219000850000
|
trusted library allocation
|
page read and write
|
||
2CF0007BC000
|
trusted library allocation
|
page read and write
|
||
219000958000
|
trusted library allocation
|
page read and write
|
||
219000ADC000
|
trusted library allocation
|
page read and write
|
||
3C3F000
|
stack
|
page read and write
|
||
A6F6FFD000
|
stack
|
page read and write
|
||
4B8C000
|
stack
|
page read and write
|
||
2CF0006C8000
|
trusted library allocation
|
page read and write
|
||
359F000
|
stack
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
219000AE4000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
2CF000230000
|
trusted library allocation
|
page read and write
|
||
1C1C3136000
|
trusted library section
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
696F000
|
stack
|
page read and write
|
||
A6E2FFE000
|
unkown
|
page readonly
|
||
21900118C000
|
trusted library allocation
|
page read and write
|
||
1C1C3C41000
|
trusted library section
|
page read and write
|
||
72F8000
|
heap
|
page read and write
|
||
7175000
|
heap
|
page read and write
|
||
381000
|
unkown
|
page execute and read and write
|
||
72FF000
|
heap
|
page read and write
|
||
2190003E8000
|
trusted library allocation
|
page read and write
|
||
1C1C3D06000
|
trusted library section
|
page read and write
|
||
219000998000
|
trusted library allocation
|
page read and write
|
||
219000CEC000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
381F000
|
stack
|
page read and write
|
||
219000BF4000
|
trusted library allocation
|
page read and write
|
||
12FA000
|
stack
|
page read and write
|
||
A6F67FE000
|
unkown
|
page readonly
|
||
2CF0008F4000
|
trusted library allocation
|
page read and write
|
||
F58000
|
heap
|
page read and write
|
||
219000194000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2190002E0000
|
trusted library allocation
|
page read and write
|
||
45B0000
|
heap
|
page read and write
|
||
6C20000
|
direct allocation
|
page read and write
|
||
3D7F000
|
stack
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
381000
|
unkown
|
page execute and write copy
|
||
219000294000
|
trusted library allocation
|
page read and write
|
||
ED800278000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
A6FEFFE000
|
unkown
|
page readonly
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
2CF000848000
|
trusted library allocation
|
page read and write
|
||
73CA000
|
heap
|
page read and write
|
||
7176000
|
heap
|
page read and write
|
||
1360000
|
direct allocation
|
page read and write
|
||
219000801000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
A6877FC000
|
stack
|
page read and write
|
||
2190004F4000
|
trusted library allocation
|
page read and write
|
||
CC9000
|
unkown
|
page execute and read and write
|
||
395F000
|
stack
|
page read and write
|
||
2977000
|
heap
|
page read and write
|
||
219000164000
|
trusted library allocation
|
page read and write
|
||
2CF00081C000
|
trusted library allocation
|
page read and write
|
||
2CF0008C8000
|
trusted library allocation
|
page read and write
|
||
72CD000
|
heap
|
page read and write
|
||
A6F97FE000
|
unkown
|
page readonly
|
||
2CF000248000
|
trusted library allocation
|
page read and write
|
||
219000360000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
8AC00260000
|
direct allocation
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
339000
|
unkown
|
page execute and read and write
|
||
4BE0000
|
direct allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
219000304000
|
trusted library allocation
|
page read and write
|
||
2CF0008F0000
|
trusted library allocation
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2CF0008E4000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
2190009E4000
|
trusted library allocation
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2CF00078C000
|
trusted library allocation
|
page read and write
|
||
7110000
|
heap
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
13EE000
|
heap
|
page read and write
|
||
21900063C000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
65E6000
|
heap
|
page read and write
|
||
4C3E000
|
stack
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
A6E47FC000
|
stack
|
page read and write
|
||
ED800248000
|
trusted library allocation
|
page read and write
|
||
E20000
|
direct allocation
|
page read and write
|
||
38BE000
|
stack
|
page read and write
|
||
219000A98000
|
trusted library allocation
|
page read and write
|
||
2CF000294000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
3BDF000
|
stack
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
219000F74000
|
trusted library allocation
|
page read and write
|
||
219000C4C000
|
trusted library allocation
|
page read and write
|
||
2190002F4000
|
trusted library allocation
|
page read and write
|
||
7317000
|
heap
|
page read and write
|
||
72FD000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
8AC00210000
|
direct allocation
|
page read and write
|
||
7378000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
C2000
|
unkown
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
219000635000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
1C1BD1DE000
|
heap
|
page read and write
|
||
7175000
|
heap
|
page read and write
|
||
2CF0002F0000
|
trusted library allocation
|
page read and write
|
||
A6DFFFE000
|
unkown
|
page readonly
|
||
5350000
|
direct allocation
|
page execute and read and write
|
||
1C1BD1B0000
|
heap
|
page read and write
|
||
9F1000
|
unkown
|
page execute and write copy
|
||
219000428000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
2190003E8000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
2190001F4000
|
trusted library allocation
|
page read and write
|
||
E1E000
|
stack
|
page read and write
|
||
2190001D4000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
A6FB7FE000
|
stack
|
page read and write
|
||
477F000
|
stack
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
720E000
|
heap
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
A6EBFFE000
|
unkown
|
page readonly
|
||
4591000
|
heap
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
21900034C000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1439000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
3F9F000
|
stack
|
page read and write
|
||
A6DEFFE000
|
unkown
|
page readonly
|
||
21900100C000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
219000360000
|
trusted library allocation
|
page read and write
|
||
2190012B4000
|
trusted library allocation
|
page read and write
|
||
400E000
|
stack
|
page read and write
|
||
464E000
|
stack
|
page read and write
|
||
CB000
|
unkown
|
page execute and read and write
|
||
1C1B9EA5000
|
heap
|
page read and write
|
||
14EA000
|
heap
|
page read and write
|
||
21900029E000
|
trusted library allocation
|
page read and write
|
||
21900034C000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
36DF000
|
stack
|
page read and write
|
||
345F000
|
stack
|
page read and write
|
||
21900090B000
|
trusted library allocation
|
page read and write
|
||
1452000
|
heap
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
1C1B9CAE000
|
heap
|
page read and write
|
||
A6857FE000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
4591000
|
heap
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
A6EEFFE000
|
unkown
|
page readonly
|
||
2CF0002FC000
|
trusted library allocation
|
page read and write
|
||
2190001E0000
|
trusted library allocation
|
page read and write
|
||
1C1B9C27000
|
heap
|
page read and write
|
||
ED8002B0000
|
trusted library allocation
|
page read and write
|
||
122F000
|
stack
|
page read and write
|
||
5340000
|
direct allocation
|
page execute and read and write
|
||
4591000
|
heap
|
page read and write
|
||
F3B000
|
stack
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
4FAF000
|
stack
|
page read and write
|
||
97C000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1C1C3BB0000
|
trusted library section
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
7329000
|
direct allocation
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
3B8F000
|
stack
|
page read and write
|
||
219000F80000
|
trusted library allocation
|
page read and write
|
||
1C1BD1EF000
|
heap
|
page read and write
|
||
4DF0000
|
direct allocation
|
page execute and read and write
|
||
E60000
|
direct allocation
|
page read and write
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1445000
|
heap
|
page read and write
|
||
475E000
|
stack
|
page read and write
|
||
1C1BD75A000
|
heap
|
page read and write
|
||
C70000
|
direct allocation
|
page read and write
|
||
13D2000
|
heap
|
page read and write
|
||
8AC00270000
|
direct allocation
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
1C1BD5D0000
|
trusted library section
|
page read and write
|
||
142D000
|
heap
|
page read and write
|
||
4781000
|
heap
|
page read and write
|
||
1C1BD6D4000
|
heap
|
page read and write
|
||
219000958000
|
trusted library allocation
|
page read and write
|
||
2CF0008E8000
|
trusted library allocation
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
ED8002D8000
|
trusted library allocation
|
page read and write
|
||
219000878000
|
trusted library allocation
|
page read and write
|
||
219000080000
|
trusted library allocation
|
page read and write
|
||
2A0F000
|
stack
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
E60000
|
direct allocation
|
page read and write
|
||
219000CA8000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
2CF00071C000
|
trusted library allocation
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
ED8002A0000
|
trusted library allocation
|
page read and write
|
||
460F000
|
stack
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
7175000
|
heap
|
page read and write
|
||
72AD000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
219000C98000
|
trusted library allocation
|
page read and write
|
||
2CF00070C000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4A4C000
|
stack
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
219000A38000
|
trusted library allocation
|
page read and write
|
||
72CB000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
21900022C000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1360000
|
direct allocation
|
page read and write
|
||
11AF000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
21900093A000
|
trusted library allocation
|
page read and write
|
||
2190002B0000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
A6E4FFE000
|
unkown
|
page readonly
|
||
526000
|
unkown
|
page execute and read and write
|
||
4591000
|
heap
|
page read and write
|
||
A6E37FA000
|
stack
|
page read and write
|
||
1C1BBB53000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2190012B4000
|
trusted library allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
219000958000
|
trusted library allocation
|
page read and write
|
||
2190000A0000
|
trusted library allocation
|
page read and write
|
||
219000BD0000
|
trusted library allocation
|
page read and write
|
||
2CF0008D8000
|
trusted library allocation
|
page read and write
|
||
2190006D8000
|
trusted library allocation
|
page read and write
|
||
1C1C3152000
|
trusted library section
|
page read and write
|
||
2190000B4000
|
trusted library allocation
|
page read and write
|
||
2CF000298000
|
trusted library allocation
|
page read and write
|
||
21900088A000
|
trusted library allocation
|
page read and write
|
||
219000124000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
2190004A8000
|
trusted library allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
1C1BD70D000
|
heap
|
page read and write
|
||
13F9000
|
heap
|
page read and write
|
||
219000B68000
|
trusted library allocation
|
page read and write
|
||
84A4000
|
heap
|
page read and write
|
||
219000E64000
|
trusted library allocation
|
page read and write
|
||
219000C98000
|
trusted library allocation
|
page read and write
|
||
2CF000238000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
A688FFE000
|
unkown
|
page readonly
|
||
219000B84000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
717E000
|
heap
|
page read and write
|
||
2CF000220000
|
trusted library allocation
|
page read and write
|
||
ED800288000
|
trusted library allocation
|
page read and write
|
||
1C1B9D10000
|
heap
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
7287000
|
heap
|
page read and write
|
||
219000DBC000
|
trusted library allocation
|
page read and write
|
||
2CF000778000
|
trusted library allocation
|
page read and write
|
||
2CF0002E4000
|
trusted library allocation
|
page read and write
|
||
257000
|
unkown
|
page execute and read and write
|
||
ED8002F4000
|
trusted library allocation
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
2CF0008AC000
|
trusted library allocation
|
page read and write
|
||
219001170000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
219000DAC000
|
trusted library allocation
|
page read and write
|
||
7364000
|
heap
|
page read and write
|
||
FB5000
|
heap
|
page read and write
|
||
13C1000
|
heap
|
page read and write
|
||
219000320000
|
trusted library allocation
|
page read and write
|
||
219000E50000
|
trusted library allocation
|
page read and write
|
||
A6DD7FE000
|
stack
|
page read and write
|
||
3E4E000
|
stack
|
page read and write
|
||
21900012C000
|
trusted library allocation
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
219000A2C000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
CFB000
|
unkown
|
page execute and read and write
|
||
1C1C3BC1000
|
trusted library section
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
A6F8FFE000
|
stack
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
2190010E0000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
137A000
|
heap
|
page read and write
|
||
2CF000904000
|
trusted library allocation
|
page read and write
|
||
A685FFE000
|
unkown
|
page readonly
|
||
112F000
|
stack
|
page read and write
|
||
7233000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2D3F000
|
stack
|
page read and write
|
||
2CF00060C000
|
trusted library allocation
|
page read and write
|
||
ED800220000
|
trusted library allocation
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
474F000
|
stack
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
7179000
|
heap
|
page read and write
|
||
ED8002B0000
|
trusted library allocation
|
page read and write
|
||
372000
|
unkown
|
page execute and read and write
|
||
7178000
|
heap
|
page read and write
|
||
3D0E000
|
stack
|
page read and write
|
||
ED8002A0000
|
trusted library allocation
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
61000
|
unkown
|
page execute and write copy
|
||
4D61000
|
heap
|
page read and write
|
||
2F8F000
|
stack
|
page read and write
|
||
489E000
|
stack
|
page read and write
|
||
8AC00284000
|
direct allocation
|
page read and write
|
||
13D2000
|
heap
|
page read and write
|
||
1C1B9CAA000
|
heap
|
page read and write
|
||
219001224000
|
trusted library allocation
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
2190010EA000
|
trusted library allocation
|
page read and write
|
||
2CF0007D4000
|
trusted library allocation
|
page read and write
|
||
219000A1C000
|
trusted library allocation
|
page read and write
|
||
411E000
|
stack
|
page read and write
|
||
49DE000
|
stack
|
page read and write
|
||
1360000
|
direct allocation
|
page read and write
|
||
735B000
|
heap
|
page read and write
|
||
A6FE7FC000
|
stack
|
page read and write
|
||
2CF000408000
|
trusted library allocation
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
2CF000874000
|
trusted library allocation
|
page read and write
|
||
21900019C000
|
trusted library allocation
|
page read and write
|
||
1C1C3D2D000
|
trusted library section
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
219000984000
|
trusted library allocation
|
page read and write
|
||
2CF000828000
|
trusted library allocation
|
page read and write
|
||
219000A01000
|
trusted library allocation
|
page read and write
|
||
21900008C000
|
trusted library allocation
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
439E000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
21900032C000
|
trusted library allocation
|
page read and write
|
||
C9000
|
unkown
|
page write copy
|
||
9F0000
|
unkown
|
page readonly
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
4781000
|
heap
|
page read and write
|
||
A6E77FE000
|
stack
|
page read and write
|
||
7177000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
2CF000728000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
3E9E000
|
stack
|
page read and write
|
||
471F000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
219001128000
|
trusted library allocation
|
page read and write
|
||
A6E0FFE000
|
unkown
|
page readonly
|
||
1360000
|
direct allocation
|
page read and write
|
||
2CF0008C4000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
219000230000
|
trusted library allocation
|
page read and write
|
||
21900083C000
|
trusted library allocation
|
page read and write
|
||
2190005D8000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2190002F7000
|
trusted library allocation
|
page read and write
|
||
349E000
|
stack
|
page read and write
|
||
A6FF7FE000
|
stack
|
page read and write
|
||
72C4000
|
heap
|
page read and write
|
||
339000
|
unkown
|
page execute and read and write
|
||
F25000
|
heap
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
C70000
|
direct allocation
|
page read and write
|
||
A687FFE000
|
unkown
|
page readonly
|
||
387F000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
3F4F000
|
stack
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
219000A8C000
|
trusted library allocation
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
1C1BD6E6000
|
heap
|
page read and write
|
||
4D2B000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
1C1C344F000
|
heap
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
219001068000
|
trusted library allocation
|
page read and write
|
||
ED800238000
|
trusted library allocation
|
page read and write
|
||
ED8002F0000
|
trusted library allocation
|
page read and write
|
||
1360000
|
direct allocation
|
page read and write
|
||
6E90000
|
direct allocation
|
page execute and read and write
|
||
4591000
|
heap
|
page read and write
|
||
372000
|
unkown
|
page execute and read and write
|
||
C9000
|
unkown
|
page write copy
|
||
4D61000
|
heap
|
page read and write
|
||
1C1C31E3000
|
trusted library section
|
page read and write
|
||
2190003C8000
|
trusted library allocation
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
1C1C3220000
|
trusted library section
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
4DE0000
|
direct allocation
|
page execute and read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
219000E34000
|
trusted library allocation
|
page read and write
|
||
219000CC0000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
717A000
|
heap
|
page read and write
|
||
45DF000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
4751000
|
heap
|
page read and write
|
||
2190006B0000
|
trusted library allocation
|
page read and write
|
||
32CF000
|
stack
|
page read and write
|
||
7171000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
7174000
|
heap
|
page read and write
|
||
219000D80000
|
trusted library allocation
|
page read and write
|
||
430F000
|
stack
|
page read and write
|
||
5241000
|
direct allocation
|
page read and write
|
||
1C1BD6CC000
|
heap
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
219000632000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D3F000
|
stack
|
page read and write
|
||
672E000
|
stack
|
page read and write
|
||
219000294000
|
trusted library allocation
|
page read and write
|
||
A6DE7FE000
|
stack
|
page read and write
|
||
219000F50000
|
trusted library allocation
|
page read and write
|
||
219000AA8000
|
trusted library allocation
|
page read and write
|
||
1C1BD1EB000
|
heap
|
page read and write
|
||
219000668000
|
trusted library allocation
|
page read and write
|
||
219000601000
|
trusted library allocation
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
1C1BD1DE000
|
heap
|
page read and write
|
||
717C000
|
heap
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
143F000
|
heap
|
page read and write
|
||
21900119C000
|
trusted library allocation
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
381000
|
unkown
|
page execute and read and write
|
||
1441000
|
heap
|
page read and write
|
||
3E8F000
|
stack
|
page read and write
|
||
219001154000
|
trusted library allocation
|
page read and write
|
||
449F000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
219000C1C000
|
trusted library allocation
|
page read and write
|
||
2CF0006C8000
|
trusted library allocation
|
page read and write
|
||
167E000
|
stack
|
page read and write
|
||
ED800235000
|
trusted library allocation
|
page read and write
|
||
7270000
|
heap
|
page read and write
|
||
A683FFE000
|
unkown
|
page readonly
|
||
219000374000
|
trusted library allocation
|
page read and write
|
||
1C1C3DB7000
|
unclassified section
|
page read and write
|
||
2CF00085C000
|
trusted library allocation
|
page read and write
|
||
219000F40000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
F10000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
408F000
|
stack
|
page read and write
|
||
44CF000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1360000
|
direct allocation
|
page read and write
|
||
2CF0007E0000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
direct allocation
|
page execute and read and write
|
||
219000CF8000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
219000D24000
|
trusted library allocation
|
page read and write
|
||
1C1C322E000
|
trusted library section
|
page read and write
|
||
219000ED8000
|
trusted library allocation
|
page read and write
|
||
219000340000
|
trusted library allocation
|
page read and write
|
||
1C1BD1E2000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1C1BF940000
|
trusted library allocation
|
page read and write
|
||
438F000
|
stack
|
page read and write
|
||
4C41000
|
direct allocation
|
page read and write
|
||
717C000
|
heap
|
page read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
1C1C3E07000
|
unclassified section
|
page read and write
|
||
219000F1C000
|
trusted library allocation
|
page read and write
|
||
65DE000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
A6F87FE000
|
unkown
|
page readonly
|
||
C94000
|
heap
|
page read and write
|
||
2CF0002C8000
|
trusted library allocation
|
page read and write
|
||
4C1F000
|
stack
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
2190006EC000
|
trusted library allocation
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
2CF000260000
|
trusted library allocation
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
ECF000
|
heap
|
page read and write
|
||
2CF0008B8000
|
trusted library allocation
|
page read and write
|
||
35DE000
|
stack
|
page read and write
|
||
7178000
|
heap
|
page read and write
|
||
219000C1C000
|
trusted library allocation
|
page read and write
|
||
2190005BC000
|
trusted library allocation
|
page read and write
|
||
2190003C8000
|
trusted library allocation
|
page read and write
|
||
219000958000
|
trusted library allocation
|
page read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
7173000
|
heap
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
4DA0000
|
direct allocation
|
page execute and read and write
|
||
219000CC0000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
A6F07FD000
|
stack
|
page read and write
|
||
1C1C309E000
|
trusted library section
|
page read and write
|
||
1C1B9BD0000
|
heap
|
page readonly
|
||
2190001A8000
|
trusted library allocation
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
1452000
|
heap
|
page read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
1C1C3BE2000
|
trusted library section
|
page read and write
|
||
219000304000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
219001164000
|
trusted library allocation
|
page read and write
|
||
4D6E000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
13D2000
|
heap
|
page read and write
|
||
4DA0000
|
direct allocation
|
page execute and read and write
|
||
403E000
|
stack
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
2190003C8000
|
trusted library allocation
|
page read and write
|
||
881F000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
72E6000
|
heap
|
page read and write
|
||
219000C60000
|
trusted library allocation
|
page read and write
|
||
219000BD4000
|
trusted library allocation
|
page read and write
|
||
2CF000280000
|
trusted library allocation
|
page read and write
|
||
219000D4C000
|
trusted library allocation
|
page read and write
|
||
219000980000
|
trusted library allocation
|
page read and write
|
||
4D5F000
|
stack
|
page read and write
|
||
2CF000788000
|
trusted library allocation
|
page read and write
|
||
ED8002BC000
|
trusted library allocation
|
page read and write
|
||
2190009C8000
|
trusted library allocation
|
page read and write
|
||
5454000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
A6FD7FD000
|
stack
|
page read and write
|
||
219000220000
|
trusted library allocation
|
page read and write
|
||
E5B000
|
stack
|
page read and write
|
||
219000BCC000
|
trusted library allocation
|
page read and write
|
||
4C5E000
|
stack
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
E20000
|
direct allocation
|
page read and write
|
||
219000594000
|
trusted library allocation
|
page read and write
|
||
A6DCFFE000
|
unkown
|
page readonly
|
||
56AE000
|
stack
|
page read and write
|
||
1C1BC5A0000
|
unkown
|
page read and write
|
||
ED8002C0000
|
trusted library allocation
|
page read and write
|
||
1C1BD758000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
21900080C000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
direct allocation
|
page execute and read and write
|
||
7236000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
2CF000250000
|
trusted library allocation
|
page read and write
|
||
219001168000
|
trusted library allocation
|
page read and write
|
||
8AC00274000
|
direct allocation
|
page read and write
|
||
2CF000868000
|
trusted library allocation
|
page read and write
|
||
219001180000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2190010F4000
|
trusted library allocation
|
page read and write
|
||
7178000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
219000EA4000
|
trusted library allocation
|
page read and write
|
||
7449000
|
heap
|
page read and write
|
||
1360000
|
direct allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
219001078000
|
trusted library allocation
|
page read and write
|
||
E7B000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
ED800250000
|
trusted library allocation
|
page read and write
|
||
143B000
|
heap
|
page read and write
|
||
528000
|
unkown
|
page execute and write copy
|
||
7178000
|
heap
|
page read and write
|
||
143B000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
BDB000
|
unkown
|
page execute and write copy
|
||
219000154000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
219000E1C000
|
trusted library allocation
|
page read and write
|
||
2190001E8000
|
trusted library allocation
|
page read and write
|
||
1C1BD770000
|
trusted library section
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
7170000
|
heap
|
page read and write
|
||
36B000
|
unkown
|
page execute and read and write
|
||
2CF0008EC000
|
trusted library allocation
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
72B2000
|
heap
|
page read and write
|
||
458F000
|
stack
|
page read and write
|
||
219000354000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2190001F8000
|
trusted library allocation
|
page read and write
|
||
7177000
|
heap
|
page read and write
|
||
1C1B9D07000
|
heap
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
2CF000790000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
219000D74000
|
trusted library allocation
|
page read and write
|
||
143F000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
384F000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
219000B58000
|
trusted library allocation
|
page read and write
|
||
733C000
|
heap
|
page read and write
|
||
A6EE7FB000
|
stack
|
page read and write
|
||
21900113C000
|
trusted library allocation
|
page read and write
|
||
2190000EC000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
21900105C000
|
trusted library allocation
|
page read and write
|
||
1C1BD6DB000
|
heap
|
page read and write
|
||
E20000
|
direct allocation
|
page read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
4B80000
|
direct allocation
|
page execute and read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
ED80020C000
|
trusted library allocation
|
page read and write
|
||
39FE000
|
stack
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
219000EF4000
|
trusted library allocation
|
page read and write
|
||
ED8002BC000
|
trusted library allocation
|
page read and write
|
||
7178000
|
heap
|
page read and write
|
||
2CF000918000
|
trusted library allocation
|
page read and write
|
||
219001108000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
A681FFE000
|
unkown
|
page readonly
|
||
29BE000
|
stack
|
page read and write
|
||
2CF0006F4000
|
trusted library allocation
|
page read and write
|
||
2CF000960000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
219000728000
|
trusted library allocation
|
page read and write
|
||
45A0000
|
heap
|
page read and write
|
||
2190000FC000
|
trusted library allocation
|
page read and write
|
||
A6EC7FE000
|
stack
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
219000298000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
60000
|
unkown
|
page read and write
|
||
A6E87FE000
|
stack
|
page read and write
|
||
1C1BD1E3000
|
heap
|
page read and write
|
||
219000D68000
|
trusted library allocation
|
page read and write
|
||
E0E000
|
stack
|
page read and write
|
||
2CF00082C000
|
trusted library allocation
|
page read and write
|
||
219000CC0000
|
trusted library allocation
|
page read and write
|
||
7265000
|
heap
|
page read and write
|
||
717D000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
A6847FD000
|
stack
|
page read and write
|
||
1360000
|
direct allocation
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
2190009AF000
|
trusted library allocation
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
4590000
|
heap
|
page read and write
|
||
CFD000
|
stack
|
page read and write
|
||
A6F17FB000
|
stack
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
219001128000
|
trusted library allocation
|
page read and write
|
||
A680FFE000
|
unkown
|
page readonly
|
||
A59000
|
unkown
|
page write copy
|
||
4D61000
|
heap
|
page read and write
|
||
1C1BD6C3000
|
heap
|
page read and write
|
||
1C1B9CD8000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
142D000
|
heap
|
page read and write
|
||
1360000
|
direct allocation
|
page read and write
|
||
A6DBFFE000
|
unkown
|
page readonly
|
||
2CF000430000
|
trusted library allocation
|
page read and write
|
||
733E000
|
heap
|
page read and write
|
||
219000DC0000
|
trusted library allocation
|
page read and write
|
||
2CF000248000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
1C1BD6DF000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
219000B8C000
|
trusted library allocation
|
page read and write
|
||
219000124000
|
trusted library allocation
|
page read and write
|
||
1C1BD1E2000
|
heap
|
page read and write
|
||
219000E01000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
3D1F000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
8AC0024C000
|
direct allocation
|
page read and write
|
||
C70000
|
direct allocation
|
page read and write
|
||
1C1C3C53000
|
trusted library section
|
page read and write
|
||
1C1BD718000
|
heap
|
page read and write
|
||
ED8002BC000
|
trusted library allocation
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
2190000AC000
|
trusted library allocation
|
page read and write
|
||
382000
|
unkown
|
page execute and write copy
|
||
4C1E000
|
stack
|
page read and write
|
||
2190008E8000
|
trusted library allocation
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
3FDE000
|
stack
|
page read and write
|
||
2CF000840000
|
trusted library allocation
|
page read and write
|
||
219000144000
|
trusted library allocation
|
page read and write
|
||
C2000
|
unkown
|
page execute and read and write
|
||
219000E5C000
|
trusted library allocation
|
page read and write
|
||
C9000
|
unkown
|
page write copy
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
C94000
|
heap
|
page read and write
|
||
E20000
|
direct allocation
|
page read and write
|
||
7350000
|
heap
|
page read and write
|
||
219000C98000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
40CE000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
21900027C000
|
trusted library allocation
|
page read and write
|
||
E37000
|
heap
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
420E000
|
stack
|
page read and write
|
||
ED8002E4000
|
trusted library allocation
|
page read and write
|
||
219000E28000
|
trusted library allocation
|
page read and write
|
||
1C1C344C000
|
heap
|
page read and write
|
||
2CF0002F4000
|
trusted library allocation
|
page read and write
|
||
1C1C3870000
|
trusted library section
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
A684FFE000
|
unkown
|
page readonly
|
||
219000D1C000
|
trusted library allocation
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
257000
|
unkown
|
page execute and read and write
|
||
6AE0000
|
heap
|
page read and write
|
||
1C1B9C18000
|
heap
|
page read and write
|
||
6C4C000
|
stack
|
page read and write
|
||
EEA000
|
heap
|
page read and write
|
||
219000498000
|
trusted library allocation
|
page read and write
|
||
EB6000
|
unkown
|
page execute and read and write
|
||
2190007E4000
|
trusted library allocation
|
page read and write
|
||
219000574000
|
trusted library allocation
|
page read and write
|
||
219000D5C000
|
trusted library allocation
|
page read and write
|
||
1360000
|
direct allocation
|
page read and write
|
||
7244000
|
heap
|
page read and write
|
||
143C000
|
heap
|
page read and write
|
||
219000918000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
7538000
|
heap
|
page read and write
|
||
219001040000
|
trusted library allocation
|
page read and write
|
||
143B000
|
heap
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1C1BD6D9000
|
heap
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
1360000
|
direct allocation
|
page read and write
|
||
3A4F000
|
stack
|
page read and write
|
||
4780000
|
heap
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
219000E60000
|
trusted library allocation
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
72DE000
|
heap
|
page read and write
|
||
163E000
|
stack
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
1C1C31A2000
|
trusted library section
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
A6F3FFE000
|
unkown
|
page readonly
|
||
E20000
|
direct allocation
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
4DE0000
|
direct allocation
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
8AC00220000
|
direct allocation
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
7264000
|
heap
|
page read and write
|
||
ED8002BC000
|
trusted library allocation
|
page read and write
|
||
A6867FA000
|
stack
|
page read and write
|
||
FBE000
|
heap
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
750F000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2CF000844000
|
trusted library allocation
|
page read and write
|
||
21900040C000
|
trusted library allocation
|
page read and write
|
||
7175000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
F38000
|
heap
|
page read and write
|
||
ED8002A0000
|
trusted library allocation
|
page read and write
|
||
725A000
|
heap
|
page read and write
|
||
A5B000
|
unkown
|
page execute and read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
A6EA7FA000
|
stack
|
page read and write
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
1C1B9EA0000
|
heap
|
page read and write
|
||
ED8002C0000
|
trusted library allocation
|
page read and write
|
||
A6F27FB000
|
stack
|
page read and write
|
||
ED8002BC000
|
trusted library allocation
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
44FF000
|
stack
|
page read and write
|
||
219000DE8000
|
trusted library allocation
|
page read and write
|
||
4750000
|
heap
|
page read and write
|
||
A6E57FC000
|
stack
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
21900020C000
|
trusted library allocation
|
page read and write
|
||
2190001B4000
|
trusted library allocation
|
page read and write
|
||
219000EF4000
|
trusted library allocation
|
page read and write
|
||
A6DAFFE000
|
unkown
|
page readonly
|
||
434E000
|
stack
|
page read and write
|
||
177E000
|
stack
|
page read and write
|
||
137E000
|
heap
|
page read and write
|
||
21900097B000
|
trusted library allocation
|
page read and write
|
||
4EAE000
|
stack
|
page read and write
|
||
A6EF7FC000
|
stack
|
page read and write
|
||
86DC000
|
stack
|
page read and write
|
||
485F000
|
stack
|
page read and write
|
||
219000E98000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
6C20000
|
direct allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
3E5F000
|
stack
|
page read and write
|
||
5330000
|
direct allocation
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
2CF0006F0000
|
trusted library allocation
|
page read and write
|
||
526000
|
unkown
|
page execute and read and write
|
||
257000
|
unkown
|
page execute and read and write
|
||
1C1BD3A0000
|
heap
|
page read and write
|
||
1C1BD1C0000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
ED800264000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
C70000
|
direct allocation
|
page read and write
|
||
A6E97FD000
|
stack
|
page read and write
|
||
2CF0006AC000
|
trusted library allocation
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
21900021C000
|
trusted library allocation
|
page read and write
|
||
2190009A8000
|
trusted library allocation
|
page read and write
|
||
1C1C3080000
|
trusted library section
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
1445000
|
heap
|
page read and write
|
||
382000
|
unkown
|
page execute and write copy
|
||
219000224000
|
trusted library allocation
|
page read and write
|
||
EB8000
|
unkown
|
page execute and write copy
|
||
4591000
|
heap
|
page read and write
|
||
3ADE000
|
stack
|
page read and write
|
||
143B000
|
heap
|
page read and write
|
||
2190004D0000
|
trusted library allocation
|
page read and write
|
||
1C1BD6DD000
|
heap
|
page read and write
|
||
219000DCC000
|
trusted library allocation
|
page read and write
|
||
219000EBC000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
6AAF000
|
stack
|
page read and write
|
||
A6E07FB000
|
stack
|
page read and write
|
||
7345000
|
heap
|
page read and write
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
1C1BD729000
|
heap
|
page read and write
|
||
219000CE0000
|
trusted library allocation
|
page read and write
|
||
2CF0006AC000
|
trusted library allocation
|
page read and write
|
||
219000A0C000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
381000
|
unkown
|
page execute and write copy
|
||
4E6F000
|
stack
|
page read and write
|
||
2190003E8000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
A6F2FFE000
|
unkown
|
page readonly
|
||
2950000
|
direct allocation
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
7398000
|
heap
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
21900053C000
|
trusted library allocation
|
page read and write
|
||
686E000
|
stack
|
page read and write
|
||
1413000
|
heap
|
page read and write
|
||
2CF0008A8000
|
trusted library allocation
|
page read and write
|
||
752A000
|
heap
|
page read and write
|
||
219000FD8000
|
trusted library allocation
|
page read and write
|
||
140000
|
unkown
|
page readonly
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
C20000
|
heap
|
page read and write
|
||
1445000
|
heap
|
page read and write
|
||
871E000
|
stack
|
page read and write
|
||
2CF0002C0000
|
trusted library allocation
|
page read and write
|
||
219000F80000
|
trusted library allocation
|
page read and write
|
||
A6E1FFE000
|
unkown
|
page readonly
|
||
ED8002C8000
|
trusted library allocation
|
page read and write
|
||
2CF00020C000
|
trusted library allocation
|
page read and write
|
||
1C1B9D30000
|
trusted library allocation
|
page read and write
|
||
219000294000
|
trusted library allocation
|
page read and write
|
||
219000320000
|
trusted library allocation
|
page read and write
|
||
41CF000
|
stack
|
page read and write
|
||
6EA0000
|
direct allocation
|
page execute and read and write
|
||
A6E3FFE000
|
unkown
|
page readonly
|
||
1C1BD726000
|
heap
|
page read and write
|
||
C9000
|
unkown
|
page write copy
|
||
219000210000
|
trusted library allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
A6DA7FE000
|
unkown
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
461E000
|
stack
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1C1C3BD0000
|
trusted library section
|
page read and write
|
||
2CF000974000
|
trusted library allocation
|
page read and write
|
||
A6EAFFE000
|
unkown
|
page readonly
|
||
1C1B9C10000
|
heap
|
page read and write
|
||
A6DB7FF000
|
stack
|
page read and write
|
||
219000814000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
219000EBC000
|
trusted library allocation
|
page read and write
|
||
219000CA8000
|
trusted library allocation
|
page read and write
|
||
219000A6E000
|
trusted library allocation
|
page read and write
|
||
E20000
|
direct allocation
|
page read and write
|
||
219000C98000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
A6E27FE000
|
stack
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
8AC00234000
|
direct allocation
|
page read and write
|
||
1C1C3D22000
|
trusted library section
|
page read and write
|
||
219000BD4000
|
trusted library allocation
|
page read and write
|
||
1C1BD1D9000
|
heap
|
page read and write
|
||
7177000
|
heap
|
page read and write
|
||
21900032C000
|
trusted library allocation
|
page read and write
|
||
7177000
|
heap
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
219000848000
|
trusted library allocation
|
page read and write
|
||
2190002A4000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
direct allocation
|
page execute and read and write
|
||
A6E67FE000
|
stack
|
page read and write
|
||
A6DF7FD000
|
stack
|
page read and write
|
||
21900077C000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
717B000
|
heap
|
page read and write
|
||
5370000
|
direct allocation
|
page execute and read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
21900001C000
|
trusted library allocation
|
page read and write
|
||
2190004B0000
|
trusted library allocation
|
page read and write
|
||
7172000
|
heap
|
page read and write
|
||
143F000
|
heap
|
page read and write
|
||
8AC00294000
|
direct allocation
|
page read and write
|
||
1C1C2FB7000
|
unclassified section
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
1C1BD670000
|
heap
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
52AD000
|
stack
|
page read and write
|
||
219000770000
|
trusted library allocation
|
page read and write
|
||
A682FFE000
|
unkown
|
page readonly
|
||
219001030000
|
trusted library allocation
|
page read and write
|
||
A6F9FFE000
|
unkown
|
page readonly
|
||
2B4F000
|
stack
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
4591000
|
heap
|
page read and write
|
||
1C1C31AE000
|
trusted library section
|
page read and write
|
||
399E000
|
stack
|
page read and write
|
||
7172000
|
heap
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
77C000
|
stack
|
page read and write
|
||
2CF00039C000
|
trusted library allocation
|
page read and write
|
||
A6F7FFB000
|
stack
|
page read and write
|
||
2190002B4000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
2190003C8000
|
trusted library allocation
|
page read and write
|
||
60000
|
unkown
|
page read and write
|
||
2E4F000
|
stack
|
page read and write
|
||
219000FDA000
|
trusted library allocation
|
page read and write
|
||
8AC0023C000
|
direct allocation
|
page read and write
|
||
A6E6FFE000
|
unkown
|
page readonly
|
||
4D61000
|
heap
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
2190001D0000
|
trusted library allocation
|
page read and write
|
||
E20000
|
direct allocation
|
page read and write
|
||
219000D04000
|
trusted library allocation
|
page read and write
|
||
4B60000
|
direct allocation
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
A6837FD000
|
stack
|
page read and write
|
||
1C1C2F27000
|
unclassified section
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
219000234000
|
trusted library allocation
|
page read and write
|
||
E20000
|
direct allocation
|
page read and write
|
||
219000D44000
|
trusted library allocation
|
page read and write
|
||
A6DC7FE000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
7101000
|
heap
|
page read and write
|
||
725F000
|
heap
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
50EF000
|
stack
|
page read and write
|
||
4C00000
|
direct allocation
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
1C1C3077000
|
unclassified section
|
page read and write
|
||
2190006D8000
|
trusted library allocation
|
page read and write
|
||
1C1C3620000
|
trusted library section
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
2CF000700000
|
trusted library allocation
|
page read and write
|
||
F4F000
|
stack
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
1360000
|
direct allocation
|
page read and write
|
||
7170000
|
heap
|
page read and write
|
||
A6ED7FE000
|
stack
|
page read and write
|
||
72B9000
|
heap
|
page read and write
|
||
53AD000
|
stack
|
page read and write
|
||
444F000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
A6ECFFE000
|
unkown
|
page readonly
|
||
219000001000
|
trusted library allocation
|
page read and write
|
||
ED800270000
|
trusted library allocation
|
page read and write
|
||
7338000
|
heap
|
page read and write
|
||
219000790000
|
trusted library allocation
|
page read and write
|
||
A6E7FFE000
|
unkown
|
page readonly
|
||
60000
|
unkown
|
page readonly
|
||
463F000
|
stack
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
219000F40000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
1C1C3040000
|
trusted library section
|
page read and write
|
||
219001001000
|
trusted library allocation
|
page read and write
|
||
1437000
|
heap
|
page read and write
|
||
219000964000
|
trusted library allocation
|
page read and write
|
||
A6FC7FE000
|
stack
|
page read and write
|
||
219000CA8000
|
trusted library allocation
|
page read and write
|
||
2190001E4000
|
trusted library allocation
|
page read and write
|
||
219000C2C000
|
trusted library allocation
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
2CF00095C000
|
trusted library allocation
|
page read and write
|
||
4591000
|
heap
|
page read and write
|
||
733C000
|
heap
|
page read and write
|
||
339000
|
unkown
|
page execute and read and write
|
||
526000
|
unkown
|
page execute and read and write
|
||
6C20000
|
direct allocation
|
page read and write
|
||
8AC00230000
|
direct allocation
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
4D61000
|
heap
|
page read and write
|
||
A6EB7FE000
|
stack
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
372000
|
unkown
|
page execute and read and write
|
||
8AC00250000
|
direct allocation
|
page read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
219001214000
|
trusted library allocation
|
page read and write
|
||
1C1BD1E2000
|
heap
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
717E000
|
heap
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
ED8002BC000
|
trusted library allocation
|
page read and write
|
||
2CF000210000
|
trusted library allocation
|
page read and write
|
||
1C1C2EB3000
|
heap
|
page read and write
|
||
A686FFE000
|
unkown
|
page readonly
|
||
1C1B9E80000
|
trusted library section
|
page readonly
|
||
EB9000
|
heap
|
page read and write
|
||
2190010AC000
|
trusted library allocation
|
page read and write
|
||
2190007C8000
|
trusted library allocation
|
page read and write
|
||
732B000
|
direct allocation
|
page read and write
|
||
219000074000
|
trusted library allocation
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
8AC00290000
|
direct allocation
|
page read and write
|
||
13C6000
|
heap
|
page read and write
|
||
2190003C8000
|
trusted library allocation
|
page read and write
|
||
1453000
|
heap
|
page read and write
|
||
3320000
|
direct allocation
|
page read and write
|
||
4D61000
|
heap
|
page read and write
|
||
1C1B9CD5000
|
heap
|
page read and write
|
||
73FC000
|
heap
|
page read and write
|
||
D11000
|
unkown
|
page execute and write copy
|
||
A6D97EF000
|
stack
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
682F000
|
stack
|
page read and write
|
||
1C1C315D000
|
trusted library section
|
page read and write
|
||
219000E60000
|
trusted library allocation
|
page read and write
|
||
385E000
|
stack
|
page read and write
|
||
A6EFFFE000
|
unkown
|
page readonly
|
||
61000
|
unkown
|
page execute and write copy
|
||
219000F74000
|
trusted library allocation
|
page read and write
|
||
6791000
|
heap
|
page read and write
|
There are 1750 hidden memdumps, click here to show them.