Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1008392001\f7fa65d988.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\Tasks\skotes.job
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\1008392001\f7fa65d988.exe
|
"C:\Users\user\AppData\Local\Temp\1008392001\f7fa65d988.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2912 --field-trial-handle=2744,i,15832663537055450618,8229323892131128527,262144
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actionsManage
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.icoNames)
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/hjxf
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=b(
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpded
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php8392001
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
|
34.116.198.130
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpU
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://unisolated.invalid/a
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpIk
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpncodedb
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://.jpg
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php1
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
https://anglebug.com/7369H
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
||
https://drive-autopush.corp.google.com/
|
unknown
|
||
https://anglebug.com/7162
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fvtekk5pn.top
|
34.116.198.130
|
||
www.google.com
|
172.217.21.36
|
||
fvtekk5pn.top
|
34.116.198.130
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.43
|
unknown
|
Portugal
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
34.116.198.130
|
home.fvtekk5pn.top
|
United States
|
||
172.217.21.36
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
31.41.244.11
|
unknown
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4BF0000
|
direct allocation
|
page read and write
|
||
52A0000
|
direct allocation
|
page read and write
|
||
4B30000
|
direct allocation
|
page read and write
|
||
CC1000
|
unkown
|
page execute and read and write
|
||
961000
|
unkown
|
page execute and read and write
|
||
5180000
|
direct allocation
|
page read and write
|
||
961000
|
unkown
|
page execute and read and write
|
||
961000
|
unkown
|
page execute and read and write
|
||
22499FE000
|
unkown
|
page readonly
|
||
9C2000
|
unkown
|
page execute and read and write
|
||
66780033C000
|
trusted library allocation
|
page read and write
|
||
28F000D78000
|
trusted library allocation
|
page read and write
|
||
18B93358000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
28F00075C000
|
trusted library allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
28F000C44000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
C66000
|
unkown
|
page execute and read and write
|
||
4E11000
|
heap
|
page read and write
|
||
6A20000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
22649FE000
|
unkown
|
page readonly
|
||
18B915F3000
|
heap
|
page read and write
|
||
A7B000
|
heap
|
page read and write
|
||
18B92DAD000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
CC0000
|
unkown
|
page readonly
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
6678006B8000
|
trusted library allocation
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
667800678000
|
trusted library allocation
|
page read and write
|
||
18B92D9E000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
14E7000
|
heap
|
page read and write
|
||
7DC0000
|
heap
|
page read and write
|
||
28F000BD4000
|
trusted library allocation
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
7420002E4000
|
direct allocation
|
page read and write
|
||
6678006FC000
|
trusted library allocation
|
page read and write
|
||
18B92DA3000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
6678006EC000
|
trusted library allocation
|
page read and write
|
||
2B6F000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
28F000EA4000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
83DA000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
31B400230000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
A1C000
|
heap
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
28F000E1C000
|
trusted library allocation
|
page read and write
|
||
18B93352000
|
heap
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
A7C000
|
heap
|
page read and write
|
||
22491FB000
|
stack
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
A1F000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
28F00041C000
|
trusted library allocation
|
page read and write
|
||
A5D000
|
heap
|
page read and write
|
||
31B400260000
|
trusted library allocation
|
page read and write
|
||
990000
|
direct allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
667800320000
|
trusted library allocation
|
page read and write
|
||
7DD9000
|
heap
|
page read and write
|
||
18B92D98000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
667800718000
|
trusted library allocation
|
page read and write
|
||
28F0006EC000
|
trusted library allocation
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
C66000
|
unkown
|
page execute and read and write
|
||
56FF000
|
stack
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
2FC0000
|
direct allocation
|
page read and write
|
||
28F0007A4000
|
trusted library allocation
|
page read and write
|
||
C5C000
|
stack
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
226A1FA000
|
stack
|
page read and write
|
||
28F000124000
|
trusted library allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B933A2000
|
heap
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
2930000
|
direct allocation
|
page read and write
|
||
28F000380000
|
trusted library allocation
|
page read and write
|
||
667800668000
|
trusted library allocation
|
page read and write
|
||
28F0000DC000
|
trusted library allocation
|
page read and write
|
||
22631FD000
|
stack
|
page read and write
|
||
C66000
|
unkown
|
page execute and read and write
|
||
667800644000
|
trusted library allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
83B1000
|
heap
|
page read and write
|
||
82AB000
|
stack
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
300D000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
6678002FC000
|
trusted library allocation
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
667800310000
|
trusted library allocation
|
page read and write
|
||
18B92D9B000
|
heap
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
7BEE000
|
heap
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
18B97377000
|
unclassified section
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
28F0003B0000
|
trusted library allocation
|
page read and write
|
||
990000
|
direct allocation
|
page read and write
|
||
7DA1000
|
heap
|
page read and write
|
||
990000
|
direct allocation
|
page read and write
|
||
18B933D4000
|
heap
|
page read and write
|
||
2A2F000
|
stack
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
A7C000
|
heap
|
page read and write
|
||
961000
|
unkown
|
page execute and write copy
|
||
18B92DB0000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
31B400264000
|
trusted library allocation
|
page read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
46B1000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
4E11000
|
heap
|
page read and write
|
||
18B8F730000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
A55000
|
heap
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
28F000EA0000
|
trusted library allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
28F00035C000
|
trusted library allocation
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
18B8F9F5000
|
heap
|
page read and write
|
||
4B6E000
|
stack
|
page read and write
|
||
667800624000
|
trusted library allocation
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
28F00020C000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
224C9FE000
|
unkown
|
page readonly
|
||
28F0002F0000
|
trusted library allocation
|
page read and write
|
||
18B933C4000
|
heap
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
31B4002A0000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
A5D000
|
heap
|
page read and write
|
||
28F000380000
|
trusted library allocation
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
18B999F8000
|
trusted library section
|
page read and write
|
||
66780060C000
|
trusted library allocation
|
page read and write
|
||
5410000
|
direct allocation
|
page execute and read and write
|
||
7201000
|
heap
|
page read and write
|
||
7C9A000
|
heap
|
page read and write
|
||
18B92DCF000
|
heap
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
139A000
|
heap
|
page read and write
|
||
18B92DAB000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
7BE5000
|
heap
|
page read and write
|
||
28F00043C000
|
trusted library allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
7BE7000
|
heap
|
page read and write
|
||
18B999F2000
|
trusted library section
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
E20000
|
unkown
|
page execute and write copy
|
||
667800364000
|
trusted library allocation
|
page read and write
|
||
7BE1000
|
heap
|
page read and write
|
||
18B93327000
|
heap
|
page read and write
|
||
28F000BC4000
|
trusted library allocation
|
page read and write
|
||
22689FE000
|
unkown
|
page readonly
|
||
F6E000
|
stack
|
page read and write
|
||
28F0001C4000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
52DB000
|
stack
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
28F000001000
|
trusted library allocation
|
page read and write
|
||
2930000
|
direct allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
9F5000
|
heap
|
page read and write
|
||
224D1FE000
|
stack
|
page read and write
|
||
225A1FD000
|
stack
|
page read and write
|
||
28F000228000
|
trusted library allocation
|
page read and write
|
||
667800250000
|
trusted library allocation
|
page read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
304E000
|
stack
|
page read and write
|
||
7F16000
|
heap
|
page read and write
|
||
447E000
|
stack
|
page read and write
|
||
46AF000
|
stack
|
page read and write
|
||
18B92DA2000
|
heap
|
page read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
18B92DA2000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
3F2F000
|
stack
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
B56000
|
unkown
|
page execute and read and write
|
||
22411FF000
|
stack
|
page read and write
|
||
41AF000
|
stack
|
page read and write
|
||
18B92DA2000
|
heap
|
page read and write
|
||
6678002ED000
|
trusted library allocation
|
page read and write
|
||
803E000
|
stack
|
page read and write
|
||
224B1FC000
|
stack
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
E1E000
|
unkown
|
page execute and read and write
|
||
28F0007C0000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
31B400201000
|
trusted library allocation
|
page read and write
|
||
6A30000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
4D2F000
|
stack
|
page read and write
|
||
18B988E2000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B92DCF000
|
heap
|
page read and write
|
||
5EC0000
|
heap
|
page read and write
|
||
22451FD000
|
stack
|
page read and write
|
||
225A9FE000
|
unkown
|
page readonly
|
||
28F0004B4000
|
trusted library allocation
|
page read and write
|
||
28F000CC0000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
B56000
|
unkown
|
page execute and read and write
|
||
480E000
|
stack
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
18B92D70000
|
heap
|
page read and write
|
||
14E2000
|
heap
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
224F1FD000
|
stack
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
28F00017C000
|
trusted library allocation
|
page read and write
|
||
A5D000
|
heap
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
7CF5000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
12D4000
|
heap
|
page read and write
|
||
28F000F1C000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
2930000
|
direct allocation
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
||
28F000662000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
28F000444000
|
trusted library allocation
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
28F000B78000
|
trusted library allocation
|
page read and write
|
||
2930000
|
direct allocation
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
A69000
|
heap
|
page read and write
|
||
7BE5000
|
heap
|
page read and write
|
||
18B915F0000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
A6A000
|
heap
|
page read and write
|
||
28F000D30000
|
trusted library allocation
|
page read and write
|
||
225F1FC000
|
stack
|
page read and write
|
||
7D72000
|
heap
|
page read and write
|
||
28F000AC0000
|
trusted library allocation
|
page read and write
|
||
28F0006FA000
|
trusted library allocation
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
314F000
|
stack
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
66780035C000
|
trusted library allocation
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
7640000
|
trusted library allocation
|
page read and write
|
||
22489FE000
|
unkown
|
page readonly
|
||
C7C000
|
unkown
|
page execute and write copy
|
||
28F0002E0000
|
trusted library allocation
|
page read and write
|
||
165F000
|
stack
|
page read and write
|
||
18B932EE000
|
heap
|
page read and write
|
||
28F000928000
|
trusted library allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
7CE0000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
7BE1000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
990000
|
direct allocation
|
page read and write
|
||
18B92DAB000
|
heap
|
page read and write
|
||
18B92DA3000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B92DBA000
|
heap
|
page read and write
|
||
28F000A34000
|
trusted library allocation
|
page read and write
|
||
28F00057C000
|
trusted library allocation
|
page read and write
|
||
83B0000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
667800201000
|
trusted library allocation
|
page read and write
|
||
457F000
|
stack
|
page read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
4E11000
|
heap
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
2A67000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
28F000DF8000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
6678006C4000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B999C0000
|
trusted library section
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
74200020C000
|
direct allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
28F000CE0000
|
trusted library allocation
|
page read and write
|
||
28F000294000
|
trusted library allocation
|
page read and write
|
||
31B4002B0000
|
trusted library allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
990000
|
direct allocation
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B99380000
|
trusted library section
|
page read and write
|
||
28F000E24000
|
trusted library allocation
|
page read and write
|
||
28F000A74000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
7C42000
|
direct allocation
|
page read and write
|
||
22409FE000
|
unkown
|
page readonly
|
||
4E11000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
51E1000
|
direct allocation
|
page read and write
|
||
18B93336000
|
heap
|
page read and write
|
||
A63000
|
heap
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
18B92D9E000
|
heap
|
page read and write
|
||
18B98F80000
|
heap
|
page read and write
|
||
667800390000
|
trusted library allocation
|
page read and write
|
||
C7C000
|
unkown
|
page execute and write copy
|
||
22559FE000
|
unkown
|
page readonly
|
||
2930000
|
direct allocation
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
28F000C90000
|
trusted library allocation
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
9CB000
|
unkown
|
page execute and read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
318B000
|
stack
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
28F0002F0000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
18B8F7E3000
|
heap
|
page read and write
|
||
667800320000
|
trusted library allocation
|
page read and write
|
||
22569FE000
|
unkown
|
page readonly
|
||
7201000
|
heap
|
page read and write
|
||
22459FE000
|
unkown
|
page readonly
|
||
28F000CEC000
|
trusted library allocation
|
page read and write
|
||
28F000E48000
|
trusted library allocation
|
page read and write
|
||
18B99BAE000
|
trusted library section
|
page read and write
|
||
28F0001D8000
|
trusted library allocation
|
page read and write
|
||
28F000093000
|
trusted library allocation
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
4E00000
|
trusted library allocation
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
7D57000
|
heap
|
page read and write
|
||
B56000
|
unkown
|
page execute and read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
4E11000
|
heap
|
page read and write
|
||
66780069C000
|
trusted library allocation
|
page read and write
|
||
18B9332A000
|
heap
|
page read and write
|
||
28F00015C000
|
trusted library allocation
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
667800714000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
224B9FE000
|
unkown
|
page readonly
|
||
990000
|
direct allocation
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
28F000C90000
|
trusted library allocation
|
page read and write
|
||
28F000218000
|
trusted library allocation
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
38EF000
|
stack
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
22509FE000
|
unkown
|
page readonly
|
||
18B954C0000
|
trusted library allocation
|
page read and write
|
||
FBD000
|
stack
|
page read and write
|
||
28F0002A4000
|
trusted library allocation
|
page read and write
|
||
7D7C000
|
heap
|
page read and write
|
||
28F000494000
|
trusted library allocation
|
page read and write
|
||
224E1FE000
|
stack
|
page read and write
|
||
52BF000
|
stack
|
page read and write
|
||
6FA000
|
stack
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
28F000638000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
direct allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
28F000CFC000
|
trusted library allocation
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
7BE6000
|
heap
|
page read and write
|
||
4E0F000
|
stack
|
page read and write
|
||
6140000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
7D39000
|
heap
|
page read and write
|
||
22481FE000
|
stack
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
31B4002BC000
|
trusted library allocation
|
page read and write
|
||
A81000
|
heap
|
page read and write
|
||
1E1B000
|
heap
|
page read and write
|
||
7D0C000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
28F0001EC000
|
trusted library allocation
|
page read and write
|
||
18B92D80000
|
heap
|
page read and write
|
||
22531FE000
|
stack
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
990000
|
direct allocation
|
page read and write
|
||
150D000
|
heap
|
page read and write
|
||
28F000A14000
|
trusted library allocation
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B9337E000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
28F000294000
|
trusted library allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
667800658000
|
trusted library allocation
|
page read and write
|
||
E31000
|
unkown
|
page execute and write copy
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
28F000C3A000
|
trusted library allocation
|
page read and write
|
||
18B988AC000
|
heap
|
page read and write
|
||
28F0000EC000
|
trusted library allocation
|
page read and write
|
||
22639FE000
|
unkown
|
page readonly
|
||
6678006B0000
|
trusted library allocation
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
28F000E54000
|
trusted library allocation
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
7DB6000
|
heap
|
page read and write
|
||
7D50000
|
heap
|
page read and write
|
||
31B400235000
|
trusted library allocation
|
page read and write
|
||
28F0001E8000
|
trusted library allocation
|
page read and write
|
||
FDD000
|
unkown
|
page execute and write copy
|
||
18B92DAA000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
66780039C000
|
trusted library allocation
|
page read and write
|
||
9C2000
|
unkown
|
page execute and read and write
|
||
4870000
|
trusted library allocation
|
page read and write
|
||
66780033C000
|
trusted library allocation
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
667800320000
|
trusted library allocation
|
page read and write
|
||
225E9FE000
|
unkown
|
page readonly
|
||
18B93356000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
28F00029A000
|
trusted library allocation
|
page read and write
|
||
5340000
|
direct allocation
|
page execute and read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
7DC3000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
226E9FE000
|
unkown
|
page readonly
|
||
490F000
|
stack
|
page read and write
|
||
7D4D000
|
heap
|
page read and write
|
||
226B9FE000
|
unkown
|
page readonly
|
||
A60000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
28F000704000
|
trusted library allocation
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
4E11000
|
heap
|
page read and write
|
||
7D7E000
|
heap
|
page read and write
|
||
28F0005C8000
|
trusted library allocation
|
page read and write
|
||
402E000
|
stack
|
page read and write
|
||
28F000224000
|
trusted library allocation
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
18B99A51000
|
trusted library section
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
18B99DA0000
|
trusted library section
|
page read and write
|
||
28F000F28000
|
trusted library allocation
|
page read and write
|
||
42AE000
|
stack
|
page read and write
|
||
22679FE000
|
unkown
|
page readonly
|
||
28F000D04000
|
trusted library allocation
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
742000230000
|
direct allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
1D84000
|
heap
|
page read and write
|
||
71F0000
|
direct allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B933D4000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
2FE0000
|
direct allocation
|
page execute and read and write
|
||
667800320000
|
trusted library allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
18B8F810000
|
heap
|
page read and write
|
||
4DD0000
|
direct allocation
|
page execute and read and write
|
||
31B4002C0000
|
trusted library allocation
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
31B4002BC000
|
trusted library allocation
|
page read and write
|
||
28F00009F000
|
trusted library allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
3DCF000
|
stack
|
page read and write
|
||
A63000
|
heap
|
page read and write
|
||
224F9FE000
|
unkown
|
page readonly
|
||
628F000
|
stack
|
page read and write
|
||
667800664000
|
trusted library allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
742000270000
|
direct allocation
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
18B99DAE000
|
trusted library section
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
A7E000
|
heap
|
page read and write
|
||
18E5000
|
unkown
|
page execute and write copy
|
||
18B92DB5000
|
heap
|
page read and write
|
||
22529FE000
|
unkown
|
page readonly
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
36AE000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
28F000394000
|
trusted library allocation
|
page read and write
|
||
6678002F4000
|
trusted library allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
28F00074C000
|
trusted library allocation
|
page read and write
|
||
7420002A8000
|
direct allocation
|
page read and write
|
||
28F000F64000
|
trusted library allocation
|
page read and write
|
||
18B93336000
|
heap
|
page read and write
|
||
28F000AF0000
|
trusted library allocation
|
page read and write
|
||
7BE1000
|
heap
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
C6D000
|
unkown
|
page execute and read and write
|
||
4BCE000
|
stack
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
742000280000
|
direct allocation
|
page read and write
|
||
667800408000
|
trusted library allocation
|
page read and write
|
||
742000274000
|
direct allocation
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
28F000968000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
28F000844000
|
trusted library allocation
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
18B8F750000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
28F000E60000
|
trusted library allocation
|
page read and write
|
||
1D84000
|
heap
|
page read and write
|
||
31B40020C000
|
trusted library allocation
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
28F00065C000
|
trusted library allocation
|
page read and write
|
||
18B92D9E000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
990000
|
direct allocation
|
page read and write
|
||
18B93356000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
5ACF000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
37B000
|
stack
|
page read and write
|
||
A5C000
|
heap
|
page read and write
|
||
742000294000
|
direct allocation
|
page read and write
|
||
18B92DAD000
|
heap
|
page read and write
|
||
22469FE000
|
unkown
|
page readonly
|
||
7BE4000
|
heap
|
page read and write
|
||
28F000234000
|
trusted library allocation
|
page read and write
|
||
667800788000
|
trusted library allocation
|
page read and write
|
||
22601FE000
|
stack
|
page read and write
|
||
78F0000
|
direct allocation
|
page execute and read and write
|
||
C3A000
|
unkown
|
page execute and read and write
|
||
433E000
|
stack
|
page read and write
|
||
667800248000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
28F000A40000
|
trusted library allocation
|
page read and write
|
||
7BE0000
|
heap
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
7BE7000
|
heap
|
page read and write
|
||
46B0000
|
heap
|
page read and write
|
||
22589FE000
|
unkown
|
page readonly
|
||
224E9FE000
|
unkown
|
page readonly
|
||
452E000
|
stack
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
5490000
|
direct allocation
|
page execute and read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
28F000368000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B93358000
|
heap
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
7EBC000
|
heap
|
page read and write
|
||
587E000
|
stack
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
28F0001F0000
|
trusted library allocation
|
page read and write
|
||
D29000
|
unkown
|
page write copy
|
||
18B9332A000
|
heap
|
page read and write
|
||
28F00049C000
|
trusted library allocation
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page read and write
|
||
28F000690000
|
trusted library allocation
|
page read and write
|
||
7CAC000
|
heap
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
A6A000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
46BF000
|
stack
|
page read and write
|
||
FDC000
|
unkown
|
page execute and read and write
|
||
42CF000
|
stack
|
page read and write
|
||
18B933E0000
|
trusted library section
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
28F00065C000
|
trusted library allocation
|
page read and write
|
||
28F000328000
|
trusted library allocation
|
page read and write
|
||
223F1EF000
|
stack
|
page read and write
|
||
7D1E000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
7BE7000
|
heap
|
page read and write
|
||
22591FC000
|
stack
|
page read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
7D9D000
|
heap
|
page read and write
|
||
28F000685000
|
trusted library allocation
|
page read and write
|
||
9AE000
|
heap
|
page read and write
|
||
31B4002C0000
|
trusted library allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
22661FE000
|
stack
|
page read and write
|
||
18B93392000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
28F000310000
|
trusted library allocation
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
4E34000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
18B8F980000
|
trusted library allocation
|
page read and write
|
||
28F000C34000
|
trusted library allocation
|
page read and write
|
||
28F000370000
|
trusted library allocation
|
page read and write
|
||
71F0000
|
direct allocation
|
page read and write
|
||
A5C000
|
heap
|
page read and write
|
||
4771000
|
heap
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
28F00014C000
|
trusted library allocation
|
page read and write
|
||
7FAF000
|
heap
|
page read and write
|
||
28F00077C000
|
trusted library allocation
|
page read and write
|
||
5320000
|
direct allocation
|
page execute and read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
FDE000
|
heap
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
28F0005D8000
|
trusted library allocation
|
page read and write
|
||
7CFC000
|
heap
|
page read and write
|
||
28F000344000
|
trusted library allocation
|
page read and write
|
||
225D9FE000
|
unkown
|
page readonly
|
||
18B92DAA000
|
heap
|
page read and write
|
||
9CB000
|
unkown
|
page execute and read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
22621FC000
|
stack
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
28F000D5C000
|
trusted library allocation
|
page read and write
|
||
667800730000
|
trusted library allocation
|
page read and write
|
||
31B400274000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
28F000EBC000
|
trusted library allocation
|
page read and write
|
||
458E000
|
stack
|
page read and write
|
||
4C2E000
|
stack
|
page read and write
|
||
18B96F02000
|
trusted library allocation
|
page read and write
|
||
FDC000
|
unkown
|
page execute and write copy
|
||
7201000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
18B99817000
|
unclassified section
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
4E20000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
742000210000
|
direct allocation
|
page read and write
|
||
1D84000
|
heap
|
page read and write
|
||
6678007D0000
|
trusted library allocation
|
page read and write
|
||
28F000432000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
1D84000
|
heap
|
page read and write
|
||
28F000940000
|
trusted library allocation
|
page read and write
|
||
28F0008FC000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
224C1FE000
|
stack
|
page read and write
|
||
573E000
|
stack
|
page read and write
|
||
28F00088C000
|
trusted library allocation
|
page read and write
|
||
A63000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
28F0003A4000
|
trusted library allocation
|
page read and write
|
||
18B92DAF000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
4C6F000
|
stack
|
page read and write
|
||
C7C000
|
unkown
|
page execute and read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
28F000801000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
5330000
|
direct allocation
|
page execute and read and write
|
||
31B4002BC000
|
trusted library allocation
|
page read and write
|
||
18B92DB6000
|
heap
|
page read and write
|
||
7CEB000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
6678007C8000
|
trusted library allocation
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
226D9FE000
|
unkown
|
page readonly
|
||
960000
|
unkown
|
page readonly
|
||
7201000
|
heap
|
page read and write
|
||
28EE000
|
stack
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
28F000C50000
|
trusted library allocation
|
page read and write
|
||
28F000AD8000
|
trusted library allocation
|
page read and write
|
||
28F0009A0000
|
trusted library allocation
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
28F0001E0000
|
trusted library allocation
|
page read and write
|
||
742000217000
|
direct allocation
|
page read and write
|
||
28F0001A0000
|
trusted library allocation
|
page read and write
|
||
667800760000
|
trusted library allocation
|
page read and write
|
||
667800354000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
37AF000
|
stack
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
E1E000
|
unkown
|
page execute and read and write
|
||
4E11000
|
heap
|
page read and write
|
||
7D3B000
|
heap
|
page read and write
|
||
667800238000
|
trusted library allocation
|
page read and write
|
||
18B92DCB000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
2FC0000
|
direct allocation
|
page read and write
|
||
22429FE000
|
unkown
|
page readonly
|
||
4E11000
|
heap
|
page read and write
|
||
14B8000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
28F0008E8000
|
trusted library allocation
|
page read and write
|
||
28F0007DC000
|
trusted library allocation
|
page read and write
|
||
28F000DBC000
|
trusted library allocation
|
page read and write
|
||
31B4002A0000
|
trusted library allocation
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
46B1000
|
heap
|
page read and write
|
||
ECC000
|
stack
|
page read and write
|
||
28F000DA4000
|
trusted library allocation
|
page read and write
|
||
28F000788000
|
trusted library allocation
|
page read and write
|
||
28F0001D4000
|
trusted library allocation
|
page read and write
|
||
28F000C80000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
direct allocation
|
page execute and read and write
|
||
18B988A0000
|
heap
|
page read and write
|
||
E20000
|
unkown
|
page execute and write copy
|
||
2930000
|
direct allocation
|
page read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
7E8C000
|
heap
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
4DA0000
|
direct allocation
|
page execute and read and write
|
||
6A30000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
E20000
|
unkown
|
page execute and write copy
|
||
6678006B4000
|
trusted library allocation
|
page read and write
|
||
7EFC000
|
stack
|
page read and write
|
||
28F000300000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
224A9FE000
|
unkown
|
page readonly
|
||
18B93373000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
667800280000
|
trusted library allocation
|
page read and write
|
||
71F0000
|
direct allocation
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
5350000
|
direct allocation
|
page execute and read and write
|
||
D29000
|
unkown
|
page write copy
|
||
D22000
|
unkown
|
page execute and read and write
|
||
37EE000
|
stack
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
4CCF000
|
stack
|
page read and write
|
||
156B000
|
heap
|
page read and write
|
||
FCD000
|
stack
|
page read and write
|
||
31B4002BC000
|
trusted library allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B92DA2000
|
heap
|
page read and write
|
||
28F00051C000
|
trusted library allocation
|
page read and write
|
||
71F0000
|
direct allocation
|
page read and write
|
||
31B4002A0000
|
trusted library allocation
|
page read and write
|
||
28F000A01000
|
trusted library allocation
|
page read and write
|
||
18B9335A000
|
heap
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
226C1FE000
|
stack
|
page read and write
|
||
742000220000
|
direct allocation
|
page read and write
|
||
5301000
|
direct allocation
|
page read and write
|
||
28F000201000
|
trusted library allocation
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
28F000268000
|
trusted library allocation
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
990000
|
direct allocation
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
7D1E000
|
heap
|
page read and write
|
||
28F000B6C000
|
trusted library allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
7D27000
|
heap
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
4E11000
|
heap
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
28F000E7C000
|
trusted library allocation
|
page read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
28F0001D0000
|
trusted library allocation
|
page read and write
|
||
225E1FB000
|
stack
|
page read and write
|
||
28F000994000
|
trusted library allocation
|
page read and write
|
||
18B92DAD000
|
heap
|
page read and write
|
||
4E30000
|
heap
|
page read and write
|
||
28F000984000
|
trusted library allocation
|
page read and write
|
||
7E18000
|
heap
|
page read and write
|
||
618E000
|
stack
|
page read and write
|
||
6400000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
7BEB000
|
heap
|
page read and write
|
||
1D84000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
22521FE000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B92DA2000
|
heap
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
418F000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B9333E000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
22539FE000
|
unkown
|
page readonly
|
||
18B92FE0000
|
heap
|
page read and write
|
||
667800404000
|
trusted library allocation
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
667800401000
|
trusted library allocation
|
page read and write
|
||
28F00029C000
|
trusted library allocation
|
page read and write
|
||
28F000CFC000
|
trusted library allocation
|
page read and write
|
||
28F0005D4000
|
trusted library allocation
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
FC6000
|
unkown
|
page execute and read and write
|
||
440F000
|
stack
|
page read and write
|
||
28F000D80000
|
trusted library allocation
|
page read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
18B9331E000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
28F000B0C000
|
trusted library allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
7420002D0000
|
direct allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
28F000A8C000
|
trusted library allocation
|
page read and write
|
||
82E000
|
stack
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
225D1FD000
|
stack
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
667800734000
|
trusted library allocation
|
page read and write
|
||
A6A000
|
heap
|
page read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
7201000
|
heap
|
page read and write
|
||
6678006AC000
|
trusted library allocation
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
7D46000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
18B92DA3000
|
heap
|
page read and write
|
||
28F000508000
|
trusted library allocation
|
page read and write
|
||
28F000E0C000
|
trusted library allocation
|
page read and write
|
||
667800620000
|
trusted library allocation
|
page read and write
|
||
18B98F57000
|
unclassified section
|
page read and write
|
||
28F0004B2000
|
trusted library allocation
|
page read and write
|
||
28F0000B4000
|
trusted library allocation
|
page read and write
|
||
31B400294000
|
trusted library allocation
|
page read and write
|
||
1D84000
|
heap
|
page read and write
|
||
28F000298000
|
trusted library allocation
|
page read and write
|
||
A63000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
31B4002BC000
|
trusted library allocation
|
page read and write
|
||
28F00022C000
|
trusted library allocation
|
page read and write
|
||
7BE4000
|
heap
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
28F0002A8000
|
trusted library allocation
|
page read and write
|
||
5EC6000
|
heap
|
page read and write
|
||
28F000E88000
|
trusted library allocation
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
28F0006EC000
|
trusted library allocation
|
page read and write
|
||
1D84000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
1D84000
|
heap
|
page read and write
|
||
742000250000
|
direct allocation
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
41BF000
|
stack
|
page read and write
|
||
22511FE000
|
stack
|
page read and write
|
||
18B92D9E000
|
heap
|
page read and write
|
||
22401FE000
|
unkown
|
page read and write
|
||
22669FE000
|
unkown
|
page readonly
|
||
C7C000
|
unkown
|
page execute and read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
117E000
|
unkown
|
page execute and read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
7BE4000
|
heap
|
page read and write
|
||
28F000F0C000
|
trusted library allocation
|
page read and write
|
||
1D84000
|
heap
|
page read and write
|
||
667800784000
|
trusted library allocation
|
page read and write
|
||
F9A000
|
unkown
|
page execute and read and write
|
||
47FF000
|
stack
|
page read and write
|
||
667800310000
|
trusted library allocation
|
page read and write
|
||
9CB000
|
unkown
|
page execute and read and write
|
||
28F000918000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
31B400250000
|
trusted library allocation
|
page read and write
|
||
28F000304000
|
trusted library allocation
|
page read and write
|
||
C7C000
|
unkown
|
page execute and read and write
|
||
55BB000
|
stack
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
28F00001C000
|
trusted library allocation
|
page read and write
|
||
155C000
|
heap
|
page read and write
|
||
71F0000
|
direct allocation
|
page read and write
|
||
18B93290000
|
trusted library section
|
page read and write
|
||
9FE000
|
heap
|
page read and write
|
||
7BEC000
|
heap
|
page read and write
|
||
7CCE000
|
heap
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
A54000
|
heap
|
page read and write
|
||
2B6F000
|
stack
|
page read and write
|
||
18B8F758000
|
heap
|
page read and write
|
||
742000284000
|
direct allocation
|
page read and write
|
||
2A40000
|
direct allocation
|
page execute and read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
28F000210000
|
trusted library allocation
|
page read and write
|
||
28F000CFC000
|
trusted library allocation
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
28F000C9C000
|
trusted library allocation
|
page read and write
|
||
28F000D70000
|
trusted library allocation
|
page read and write
|
||
A28000
|
heap
|
page read and write
|
||
667800418000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
742000303000
|
direct allocation
|
page read and write
|
||
18B988E9000
|
heap
|
page read and write
|
||
31B4002C0000
|
trusted library allocation
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
5C5D000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B92DBE000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
22439FE000
|
unkown
|
page readonly
|
||
46B1000
|
heap
|
page read and write
|
||
28F000EB0000
|
trusted library allocation
|
page read and write
|
||
18B8F950000
|
heap
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
4A4F000
|
stack
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
28F0002C0000
|
trusted library allocation
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
18B92DA2000
|
heap
|
page read and write
|
||
18B92D99000
|
heap
|
page read and write
|
||
13AD000
|
heap
|
page read and write
|
||
18B8F7DF000
|
heap
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
28F0007AC000
|
trusted library allocation
|
page read and write
|
||
71F0000
|
direct allocation
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
47CF000
|
stack
|
page read and write
|
||
7BE4000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
CC1000
|
unkown
|
page execute and write copy
|
||
46B1000
|
heap
|
page read and write
|
||
18B999D1000
|
trusted library section
|
page read and write
|
||
A7C000
|
heap
|
page read and write
|
||
A69000
|
heap
|
page read and write
|
||
4BFE000
|
stack
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
28F000E6C000
|
trusted library allocation
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
66780035C000
|
trusted library allocation
|
page read and write
|
||
C7D000
|
unkown
|
page execute and write copy
|
||
28F000CD0000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
28F000BA4000
|
trusted library allocation
|
page read and write
|
||
A2A000
|
heap
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
28F000344000
|
trusted library allocation
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
667800698000
|
trusted library allocation
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
5B1D000
|
stack
|
page read and write
|
||
28F000134000
|
trusted library allocation
|
page read and write
|
||
4771000
|
heap
|
page read and write
|
||
83E0000
|
heap
|
page read and write
|
||
18B8F970000
|
trusted library allocation
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
6678007B4000
|
trusted library allocation
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
28F00080C000
|
trusted library allocation
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
7CC2000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
2930000
|
direct allocation
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
A6A000
|
heap
|
page read and write
|
||
22551FB000
|
stack
|
page read and write
|
||
18B8F740000
|
heap
|
page readonly
|
||
6678006D4000
|
trusted library allocation
|
page read and write
|
||
2930000
|
direct allocation
|
page read and write
|
||
28F000878000
|
trusted library allocation
|
page read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
4E11000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
28F000CD0000
|
trusted library allocation
|
page read and write
|
||
28F00033C000
|
trusted library allocation
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
597E000
|
stack
|
page read and write
|
||
D2B000
|
unkown
|
page execute and read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
18B8F80A000
|
heap
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
392E000
|
stack
|
page read and write
|
||
22449FE000
|
unkown
|
page readonly
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
2930000
|
direct allocation
|
page read and write
|
||
667800640000
|
trusted library allocation
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
28F000F54000
|
trusted library allocation
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
18B999E0000
|
trusted library section
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
2A6F000
|
stack
|
page read and write
|
||
31B4002F8000
|
trusted library allocation
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
18B9335A000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
7DAA000
|
heap
|
page read and write
|
||
28F00000C000
|
trusted library allocation
|
page read and write
|
||
18B98917000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
18B92DAD000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
7201000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
28F000ED0000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
9C2000
|
unkown
|
page execute and read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
7BE9000
|
heap
|
page read and write
|
||
156C000
|
heap
|
page read and write
|
||
6678003EC000
|
trusted library allocation
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
4B91000
|
direct allocation
|
page read and write
|
||
28F00073C000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B932E0000
|
heap
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
6678006E8000
|
trusted library allocation
|
page read and write
|
||
18B92DAD000
|
heap
|
page read and write
|
||
22571FD000
|
stack
|
page read and write
|
||
28F000F50000
|
trusted library allocation
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
A63000
|
heap
|
page read and write
|
||
7E54000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
28F0009E0000
|
trusted library allocation
|
page read and write
|
||
9C9000
|
unkown
|
page write copy
|
||
18B92DA4000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
7D11000
|
heap
|
page read and write
|
||
667800298000
|
trusted library allocation
|
page read and write
|
||
18B93334000
|
heap
|
page read and write
|
||
6678006F0000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
18B93380000
|
heap
|
page read and write
|
||
28F000A34000
|
trusted library allocation
|
page read and write
|
||
28F000401000
|
trusted library allocation
|
page read and write
|
||
71F0000
|
direct allocation
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
225B1FE000
|
stack
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
2A50000
|
direct allocation
|
page execute and read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
990000
|
direct allocation
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
667800614000
|
trusted library allocation
|
page read and write
|
||
7F72000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
2930000
|
direct allocation
|
page read and write
|
||
667800210000
|
trusted library allocation
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
28F00031C000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
28F00033C000
|
trusted library allocation
|
page read and write
|
||
28F0000FC000
|
trusted library allocation
|
page read and write
|
||
C7C000
|
unkown
|
page execute and write copy
|
||
497E000
|
stack
|
page read and write
|
||
31B4002C0000
|
trusted library allocation
|
page read and write
|
||
18B92DAD000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
28F000CA0000
|
trusted library allocation
|
page read and write
|
||
6678006CC000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
28F000B1C000
|
trusted library allocation
|
page read and write
|
||
28F000A50000
|
trusted library allocation
|
page read and write
|
||
22609FE000
|
unkown
|
page readonly
|
||
28F000298000
|
trusted library allocation
|
page read and write
|
||
667800688000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
28F0001B4000
|
trusted library allocation
|
page read and write
|
||
4A7F000
|
stack
|
page read and write
|
||
FDA000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
4B8F000
|
stack
|
page read and write
|
||
225B9FE000
|
unkown
|
page readonly
|
||
18B92DB3000
|
heap
|
page read and write
|
||
22519FE000
|
unkown
|
page readonly
|
||
46B1000
|
heap
|
page read and write
|
||
28F0002FB000
|
trusted library allocation
|
page read and write
|
||
6A2E000
|
heap
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
66C000
|
stack
|
page read and write
|
||
7BE0000
|
heap
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
364F000
|
stack
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
18B93389000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
28F0000AC000
|
trusted library allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
A67000
|
heap
|
page read and write
|
||
28F0002B4000
|
trusted library allocation
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
667800758000
|
trusted library allocation
|
page read and write
|
||
667800754000
|
trusted library allocation
|
page read and write
|
||
22681FE000
|
stack
|
page read and write
|
||
28F000CBC000
|
trusted library allocation
|
page read and write
|
||
1D84000
|
heap
|
page read and write
|
||
28F000A0C000
|
trusted library allocation
|
page read and write
|
||
31B4002BC000
|
trusted library allocation
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
2A30000
|
direct allocation
|
page execute and read and write
|
||
813F000
|
stack
|
page read and write
|
||
5EC5000
|
heap
|
page read and write
|
||
226D1FE000
|
stack
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
7BE9000
|
heap
|
page read and write
|
||
22599FE000
|
unkown
|
page readonly
|
||
224D9FE000
|
unkown
|
page readonly
|
||
961000
|
unkown
|
page execute and write copy
|
||
39EE000
|
stack
|
page read and write
|
||
1375000
|
heap
|
page read and write
|
||
4E10000
|
heap
|
page read and write
|
||
31B400288000
|
trusted library allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
28F0005E0000
|
trusted library allocation
|
page read and write
|
||
28F0004AC000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
28F0001B4000
|
trusted library allocation
|
page read and write
|
||
18B933B1000
|
heap
|
page read and write
|
||
28F000D90000
|
trusted library allocation
|
page read and write
|
||
7690000
|
direct allocation
|
page read and write
|
||
7BEA000
|
heap
|
page read and write
|
||
990000
|
direct allocation
|
page read and write
|
||
22441FE000
|
stack
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
66780075C000
|
trusted library allocation
|
page read and write
|
||
667800380000
|
trusted library allocation
|
page read and write
|
||
7F8E000
|
heap
|
page read and write
|
||
28F000330000
|
trusted library allocation
|
page read and write
|
||
28F0009BC000
|
trusted library allocation
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
9AA000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
18B92DAD000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
C3A000
|
unkown
|
page execute and read and write
|
||
7201000
|
heap
|
page read and write
|
||
18B92DA2000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
18B93361000
|
heap
|
page read and write
|
||
71F0000
|
direct allocation
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
7D73000
|
heap
|
page read and write
|
||
22431FE000
|
stack
|
page read and write
|
||
7BE9000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
31B4002BC000
|
trusted library allocation
|
page read and write
|
||
28F000230000
|
trusted library allocation
|
page read and write
|
||
2930000
|
direct allocation
|
page read and write
|
||
31B4002B0000
|
trusted library allocation
|
page read and write
|
||
28F00090C000
|
trusted library allocation
|
page read and write
|
||
A1D000
|
heap
|
page read and write
|
||
28F0005A4000
|
trusted library allocation
|
page read and write
|
||
22629FE000
|
unkown
|
page readonly
|
||
7BE7000
|
heap
|
page read and write
|
||
28F00018C000
|
trusted library allocation
|
page read and write
|
||
667800260000
|
trusted library allocation
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
18B92DCF000
|
heap
|
page read and write
|
||
EBC000
|
stack
|
page read and write
|
||
28F0001F8000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
667800744000
|
trusted library allocation
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
22671FE000
|
stack
|
page read and write
|
||
2930000
|
direct allocation
|
page read and write
|
||
31B400248000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
C6D000
|
unkown
|
page execute and read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
46B1000
|
heap
|
page read and write
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
18B92DB6000
|
heap
|
page read and write
|
||
18B92DA3000
|
heap
|
page read and write
|
||
28F000590000
|
trusted library allocation
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
4E17000
|
heap
|
page read and write
|
||
7CE0000
|
heap
|
page read and write
|
||
28F000290000
|
trusted library allocation
|
page read and write
|
||
28F000ED8000
|
trusted library allocation
|
page read and write
|
||
7BEE000
|
heap
|
page read and write
|
||
18B93373000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
990000
|
direct allocation
|
page read and write
|
||
FCD000
|
unkown
|
page execute and read and write
|
||
22541FE000
|
stack
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
7D75000
|
heap
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
74200024C000
|
direct allocation
|
page read and write
|
||
28F0001F4000
|
trusted library allocation
|
page read and write
|
||
28F0002F3000
|
trusted library allocation
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
4DE0000
|
direct allocation
|
page execute and read and write
|
||
78E0000
|
direct allocation
|
page execute and read and write
|
||
7201000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
2967000
|
heap
|
page read and write
|
||
28F000470000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
9F4000
|
heap
|
page read and write
|
||
38CF000
|
stack
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
28F000CB0000
|
trusted library allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
28F000E7C000
|
trusted library allocation
|
page read and write
|
||
7900000
|
direct allocation
|
page execute and read and write
|
||
4C51000
|
direct allocation
|
page read and write
|
||
71F0000
|
direct allocation
|
page read and write
|
||
1D84000
|
heap
|
page read and write
|
||
28F000850000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
6678002DC000
|
trusted library allocation
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
7BEE000
|
heap
|
page read and write
|
||
F2F000
|
stack
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
C3A000
|
unkown
|
page execute and read and write
|
||
4E11000
|
heap
|
page read and write
|
||
528C000
|
stack
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
667800654000
|
trusted library allocation
|
page read and write
|
||
31B400270000
|
trusted library allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
7D15000
|
heap
|
page read and write
|
||
31B4002F4000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
7BED000
|
heap
|
page read and write
|
||
28F000DCC000
|
trusted library allocation
|
page read and write
|
||
9E6000
|
heap
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
7690000
|
direct allocation
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
224A1FC000
|
stack
|
page read and write
|
||
28F000B30000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
292E000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page read and write
|
||
28F000304000
|
trusted library allocation
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
742000215000
|
direct allocation
|
page read and write
|
||
6678006D0000
|
trusted library allocation
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B93392000
|
heap
|
page read and write
|
||
7BE2000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
9C9000
|
unkown
|
page write copy
|
||
28F000554000
|
trusted library allocation
|
page read and write
|
||
28F000D4C000
|
trusted library allocation
|
page read and write
|
||
28F000294000
|
trusted library allocation
|
page read and write
|
||
7BE4000
|
heap
|
page read and write
|
||
7BE3000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
28F0006F8000
|
trusted library allocation
|
page read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
18B92DCB000
|
heap
|
page read and write
|
||
28F000BE0000
|
trusted library allocation
|
page read and write
|
||
742000234000
|
direct allocation
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
28F00016C000
|
trusted library allocation
|
page read and write
|
||
667800330000
|
trusted library allocation
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
6678007CC000
|
trusted library allocation
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
28F00040C000
|
trusted library allocation
|
page read and write
|
||
7420002EC000
|
direct allocation
|
page read and write
|
||
28F000F88000
|
trusted library allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
7FFC000
|
stack
|
page read and write
|
||
18B92DCB000
|
heap
|
page read and write
|
||
28F00020C000
|
trusted library allocation
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
66780080C000
|
trusted library allocation
|
page read and write
|
||
28F000E01000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
667800724000
|
trusted library allocation
|
page read and write
|
||
28F000D14000
|
trusted library allocation
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
5F1E000
|
stack
|
page read and write
|
||
28F000B94000
|
trusted library allocation
|
page read and write
|
||
83AC000
|
stack
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
7F5F000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
28F000CEC000
|
trusted library allocation
|
page read and write
|
||
66780078C000
|
trusted library allocation
|
page read and write
|
||
28F000060000
|
trusted library allocation
|
page read and write
|
||
28F000B2C000
|
trusted library allocation
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
22419FE000
|
unkown
|
page readonly
|
||
18B92DA4000
|
heap
|
page read and write
|
||
28F000C20000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
71F0000
|
direct allocation
|
page read and write
|
||
CB0000
|
direct allocation
|
page read and write
|
||
9C9000
|
unkown
|
page write copy
|
||
1370000
|
direct allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
A63000
|
heap
|
page read and write
|
||
7BEC000
|
heap
|
page read and write
|
||
76D000
|
stack
|
page read and write
|
||
4D0E000
|
stack
|
page read and write
|
||
28F000C39000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
C7D000
|
unkown
|
page execute and write copy
|
||
990000
|
direct allocation
|
page read and write
|
||
667800220000
|
trusted library allocation
|
page read and write
|
||
28F000C0C000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
30FF000
|
stack
|
page read and write
|
||
7DD1000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
28F000078000
|
trusted library allocation
|
page read and write
|
||
7D5D000
|
heap
|
page read and write
|
||
28F000294000
|
trusted library allocation
|
page read and write
|
||
C7D000
|
unkown
|
page execute and write copy
|
||
92E000
|
stack
|
page read and write
|
||
55FE000
|
stack
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
667800630000
|
trusted library allocation
|
page read and write
|
||
18B92DCF000
|
heap
|
page read and write
|
||
31B4002B0000
|
trusted library allocation
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
22691FD000
|
stack
|
page read and write
|
||
22641FD000
|
stack
|
page read and write
|
||
22479FE000
|
unkown
|
page readonly
|
||
2CAE000
|
stack
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
66780020C000
|
trusted library allocation
|
page read and write
|
||
18B92040000
|
unkown
|
page read and write
|
||
7BE7000
|
heap
|
page read and write
|
||
614F000
|
stack
|
page read and write
|
||
28F000438000
|
trusted library allocation
|
page read and write
|
||
131E000
|
stack
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
7BE7000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
31B400220000
|
trusted library allocation
|
page read and write
|
||
7CAC000
|
heap
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
28F000B00000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
5370000
|
direct allocation
|
page execute and read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
46C1000
|
heap
|
page read and write
|
||
18B933B1000
|
heap
|
page read and write
|
||
22611FE000
|
stack
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
28F000220000
|
trusted library allocation
|
page read and write
|
||
9C9000
|
unkown
|
page write copy
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
28F000B9C000
|
trusted library allocation
|
page read and write
|
||
4771000
|
heap
|
page read and write
|
||
7BE8000
|
heap
|
page read and write
|
||
9C9000
|
unkown
|
page write copy
|
||
7201000
|
heap
|
page read and write
|
||
667800601000
|
trusted library allocation
|
page read and write
|
||
A64000
|
heap
|
page read and write
|
||
18B98F33000
|
heap
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B9890D000
|
heap
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
667800330000
|
trusted library allocation
|
page read and write
|
||
18B92DA2000
|
heap
|
page read and write
|
||
28F00056C000
|
trusted library allocation
|
page read and write
|
||
31B4002C0000
|
trusted library allocation
|
page read and write
|
||
28F00079C000
|
trusted library allocation
|
page read and write
|
||
28F00081C000
|
trusted library allocation
|
page read and write
|
||
53DF000
|
stack
|
page read and write
|
||
28F000380000
|
trusted library allocation
|
page read and write
|
||
28F0006A4000
|
trusted library allocation
|
page read and write
|
||
6678002C8000
|
trusted library allocation
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
4771000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
28F000AB0000
|
trusted library allocation
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
5D5D000
|
stack
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
2950000
|
direct allocation
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
28F000F04000
|
trusted library allocation
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
9C9000
|
unkown
|
page write copy
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
28F00052C000
|
trusted library allocation
|
page read and write
|
||
28F000B6C000
|
trusted library allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
493F000
|
stack
|
page read and write
|
||
CB0000
|
direct allocation
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
71F0000
|
direct allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
28F000330000
|
trusted library allocation
|
page read and write
|
||
4770000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
667800750000
|
trusted library allocation
|
page read and write
|
||
7D52000
|
heap
|
page read and write
|
||
59CE000
|
stack
|
page read and write
|
||
7D71000
|
heap
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
7CFB000
|
heap
|
page read and write
|
||
7DA7000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
7E76000
|
heap
|
page read and write
|
||
604E000
|
stack
|
page read and write
|
||
18B92DBA000
|
heap
|
page read and write
|
||
18B93389000
|
heap
|
page read and write
|
||
18B93361000
|
heap
|
page read and write
|
||
5480000
|
direct allocation
|
page execute and read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
226C9FE000
|
unkown
|
page readonly
|
||
28F000294000
|
trusted library allocation
|
page read and write
|
||
71F0000
|
direct allocation
|
page read and write
|
||
667800374000
|
trusted library allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
667800424000
|
trusted library allocation
|
page read and write
|
||
583F000
|
stack
|
page read and write
|
||
28F000D54000
|
trusted library allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
31B400238000
|
trusted library allocation
|
page read and write
|
||
22549FE000
|
unkown
|
page readonly
|
||
6678006E0000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
direct allocation
|
page read and write
|
||
28F000328000
|
trusted library allocation
|
page read and write
|
||
18B92DA5000
|
heap
|
page read and write
|
||
6678006E4000
|
trusted library allocation
|
page read and write
|
||
18B92DD1000
|
heap
|
page read and write
|
||
667800368000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
heap
|
page read and write
|
||
28F0001E4000
|
trusted library allocation
|
page read and write
|
||
22651FE000
|
stack
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
7C77000
|
heap
|
page read and write
|
||
742000260000
|
direct allocation
|
page read and write
|
||
28F00021C000
|
trusted library allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
4771000
|
heap
|
page read and write
|
||
155B000
|
heap
|
page read and write
|
||
6678006C8000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
direct allocation
|
page execute and read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
28F000E30000
|
trusted library allocation
|
page read and write
|
||
5C1C000
|
stack
|
page read and write
|
||
71F0000
|
direct allocation
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
961000
|
unkown
|
page execute and write copy
|
||
7F32000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B8F9B0000
|
trusted library section
|
page readonly
|
||
18B92D9E000
|
heap
|
page read and write
|
||
18B92DAB000
|
heap
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
18B92DAD000
|
heap
|
page read and write
|
||
28F000A28000
|
trusted library allocation
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
28F0001AC000
|
trusted library allocation
|
page read and write
|
||
18B92DAE000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
7D9B000
|
direct allocation
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
18B92D9E000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
28F000DB8000
|
trusted library allocation
|
page read and write
|
||
22579FE000
|
unkown
|
page readonly
|
||
28F000DE8000
|
trusted library allocation
|
page read and write
|
||
28F000E98000
|
trusted library allocation
|
page read and write
|
||
4D01000
|
heap
|
page read and write
|
||
18B92DAD000
|
heap
|
page read and write
|
||
225C9FE000
|
unkown
|
page readonly
|
||
66780040C000
|
trusted library allocation
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
7BE8000
|
heap
|
page read and write
|
||
28F000054000
|
trusted library allocation
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
74200023C000
|
direct allocation
|
page read and write
|
||
28F000D04000
|
trusted library allocation
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
18B92DCB000
|
heap
|
page read and write
|
||
22659FE000
|
unkown
|
page readonly
|
||
412F000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B972E0000
|
trusted library section
|
page read and write
|
||
667800348000
|
trusted library allocation
|
page read and write
|
||
667800694000
|
trusted library allocation
|
page read and write
|
||
28F000601000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
22581FD000
|
stack
|
page read and write
|
||
226E1FE000
|
stack
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
A6A000
|
heap
|
page read and write
|
||
46FE000
|
stack
|
page read and write
|
||
7BE5000
|
heap
|
page read and write
|
||
667800610000
|
trusted library allocation
|
page read and write
|
||
28F00006C000
|
trusted library allocation
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
CC0000
|
unkown
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
28F000430000
|
trusted library allocation
|
page read and write
|
||
28F0002B8000
|
trusted library allocation
|
page read and write
|
||
667800684000
|
trusted library allocation
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
51BE000
|
stack
|
page read and write
|
||
742000290000
|
direct allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
E1E000
|
unkown
|
page execute and read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
7BE9000
|
heap
|
page read and write
|
||
31B4002F0000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
300B000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
6678002E4000
|
trusted library allocation
|
page read and write
|
||
28F00033C000
|
trusted library allocation
|
page read and write
|
||
28F000540000
|
trusted library allocation
|
page read and write
|
||
28F0006EC000
|
trusted library allocation
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
ADE000
|
stack
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
226B1FC000
|
stack
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
28F0005EC000
|
trusted library allocation
|
page read and write
|
||
22461FB000
|
stack
|
page read and write
|
||
28F000DF4000
|
trusted library allocation
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
7BE2000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
990000
|
direct allocation
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
18B92DAD000
|
heap
|
page read and write
|
||
22619FE000
|
unkown
|
page readonly
|
||
32CE000
|
stack
|
page read and write
|
||
28F000198000
|
trusted library allocation
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
1D84000
|
heap
|
page read and write
|
||
1D84000
|
heap
|
page read and write
|
||
2930000
|
direct allocation
|
page read and write
|
||
6678002F0000
|
trusted library allocation
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
667800330000
|
trusted library allocation
|
page read and write
|
||
C6D000
|
unkown
|
page execute and read and write
|
||
4E11000
|
heap
|
page read and write
|
||
28F000394000
|
trusted library allocation
|
page read and write
|
||
18B98F30000
|
heap
|
page read and write
|
||
667800770000
|
trusted library allocation
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
18B93354000
|
heap
|
page read and write
|
||
28F0008B0000
|
trusted library allocation
|
page read and write
|
||
28F00060C000
|
trusted library allocation
|
page read and write
|
||
31B4002E4000
|
trusted library allocation
|
page read and write
|
||
18B8F9F0000
|
heap
|
page read and write
|
||
28F00083B000
|
trusted library allocation
|
page read and write
|
||
7BE3000
|
heap
|
page read and write
|
||
7420002DC000
|
direct allocation
|
page read and write
|
||
18B92DAD000
|
heap
|
page read and write
|
||
7690000
|
direct allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
28F000C01000
|
trusted library allocation
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
22421FE000
|
stack
|
page read and write
|
||
18B92D9E000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
5E1D000
|
stack
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
28F000D24000
|
trusted library allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
9F2000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
22501FA000
|
stack
|
page read and write
|
||
667800294000
|
trusted library allocation
|
page read and write
|
||
5300000
|
direct allocation
|
page execute and read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
18B93354000
|
heap
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
4E11000
|
heap
|
page read and write
|
||
18B933B1000
|
heap
|
page read and write
|
||
18B93334000
|
heap
|
page read and write
|
||
28F000350000
|
trusted library allocation
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
18B92DB3000
|
heap
|
page read and write
|
||
31B4002D8000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
28F000EF4000
|
trusted library allocation
|
page read and write
|
||
468F000
|
stack
|
page read and write
|
||
18B99BA0000
|
trusted library section
|
page read and write
|
||
7C86000
|
heap
|
page read and write
|
||
667800248000
|
trusted library allocation
|
page read and write
|
||
31B400278000
|
trusted library allocation
|
page read and write
|
||
1370000
|
direct allocation
|
page read and write
|
||
28F000E7A000
|
trusted library allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
31B4002A0000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
EB6000
|
unkown
|
page execute and read and write
|
||
12D4000
|
heap
|
page read and write
|
||
18B9333E000
|
heap
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
7D89000
|
heap
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
28F0001DC000
|
trusted library allocation
|
page read and write
|
||
667800354000
|
trusted library allocation
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
28F0002BC000
|
trusted library allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
28F000E3C000
|
trusted library allocation
|
page read and write
|
||
18B8F920000
|
heap
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
28F000C4C000
|
trusted library allocation
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
9FE000
|
heap
|
page read and write
|
||
18B995D0000
|
trusted library section
|
page read and write
|
||
28F0001AC000
|
trusted library allocation
|
page read and write
|
||
18B92D9E000
|
heap
|
page read and write
|
||
865000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
1D84000
|
heap
|
page read and write
|
||
7DC3000
|
heap
|
page read and write
|
||
A6A000
|
heap
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
22561FA000
|
stack
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
7FC9000
|
heap
|
page read and write
|
||
31B4002C8000
|
trusted library allocation
|
page read and write
|
||
28F000D04000
|
trusted library allocation
|
page read and write
|
||
A24000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
7EDA000
|
heap
|
page read and write
|
||
7C8D000
|
heap
|
page read and write
|
||
7DEA000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
667800704000
|
trusted library allocation
|
page read and write
|
||
28F000864000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
71F0000
|
direct allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
28F000628000
|
trusted library allocation
|
page read and write
|
||
28F000EEC000
|
trusted library allocation
|
page read and write
|
||
18B93327000
|
heap
|
page read and write
|
||
63CF000
|
stack
|
page read and write
|
||
2FD0000
|
direct allocation
|
page execute and read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
18B933C4000
|
heap
|
page read and write
|
||
225F9FE000
|
unkown
|
page readonly
|
||
28F0001AC000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B96EE4000
|
trusted library allocation
|
page read and write
|
||
18B92DAD000
|
heap
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
28F000D44000
|
trusted library allocation
|
page read and write
|
||
28F0003C0000
|
trusted library allocation
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
4E11000
|
heap
|
page read and write
|
||
667800430000
|
trusted library allocation
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B933D3000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
742000201000
|
direct allocation
|
page read and write
|
||
A7E000
|
heap
|
page read and write
|
||
28F000438000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
18B98DF7000
|
unclassified section
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page read and write
|
||
1180000
|
unkown
|
page execute and write copy
|
||
18B93352000
|
heap
|
page read and write
|
||
18B92DAD000
|
heap
|
page read and write
|
||
28F000C74000
|
trusted library allocation
|
page read and write
|
||
7910000
|
direct allocation
|
page execute and read and write
|
||
667800230000
|
trusted library allocation
|
page read and write
|
||
2930000
|
direct allocation
|
page read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
18B92D9E000
|
heap
|
page read and write
|
||
1D84000
|
heap
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
18B92DB3000
|
heap
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
18B99A40000
|
trusted library section
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
2FF7000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
7D99000
|
direct allocation
|
page read and write
|
||
22471FB000
|
stack
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
28F0006EC000
|
trusted library allocation
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
28F000CEC000
|
trusted library allocation
|
page read and write
|
||
7CC2000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
7420002AC000
|
direct allocation
|
page read and write
|
||
4771000
|
heap
|
page read and write
|
||
18B92DCF000
|
heap
|
page read and write
|
||
28F000C58000
|
trusted library allocation
|
page read and write
|
||
442F000
|
stack
|
page read and write
|
||
28F0005CD000
|
trusted library allocation
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
28F000214000
|
trusted library allocation
|
page read and write
|
||
38FF000
|
stack
|
page read and write
|
||
22699FE000
|
unkown
|
page readonly
|
||
7201000
|
heap
|
page read and write
|
||
18B92DA2000
|
heap
|
page read and write
|
||
4CFF000
|
stack
|
page read and write
|
||
28F000B80000
|
trusted library allocation
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
667800700000
|
trusted library allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
62CE000
|
stack
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
28F000AD0000
|
trusted library allocation
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
225C1FC000
|
stack
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
7BE6000
|
heap
|
page read and write
|
||
156B000
|
heap
|
page read and write
|
||
28F0001B4000
|
trusted library allocation
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
28F0008D0000
|
trusted library allocation
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
1529000
|
heap
|
page read and write
|
||
18B92DA2000
|
heap
|
page read and write
|
||
18B92DB5000
|
heap
|
page read and write
|
||
7201000
|
heap
|
page read and write
|
||
18B92DAA000
|
heap
|
page read and write
|
||
18B92DA4000
|
heap
|
page read and write
|
||
226A9FE000
|
unkown
|
page readonly
|
||
28F00066C000
|
trusted library allocation
|
page read and write
|
||
7C82000
|
heap
|
page read and write
|
||
46B1000
|
heap
|
page read and write
|
||
18B92DAD000
|
heap
|
page read and write
|
||
28F000DDC000
|
trusted library allocation
|
page read and write
|
||
18B92DB0000
|
heap
|
page read and write
|
||
6678002C0000
|
trusted library allocation
|
page read and write
|
||
28F00029C000
|
trusted library allocation
|
page read and write
|
There are 2001 hidden memdumps, click here to show them.