Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.MSIL.Kryptik.AECS.24576.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Microsoft
Visual Studio - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com 16.6.255.35071, Subject: Microsoft Visual Studio
- UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com, Author: Microsoft Corporation, Keywords: Installer, Template:
x64;1033, Revision Number: {49C681E5-45C4-4467-92EE-456F1E355C5F}, Create Time/Date: Sun Feb 7 22:37:14 2021, Last Saved
Time/Date: Sun Feb 7 22:37:14 2021, Number of Pages: 200, Number of Words: 2, Name of Creating Application: MSI Wrapper (10.0.50.0),
Security: 2
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\MW-71322570-7008-46b5-bb73-77098af1b752\files\02f017f8dcfd4885887fe1ceb996bbc7$dpx$.tmp\cfa11b188d32074992aa4060114f8638.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-71322570-7008-46b5-bb73-77098af1b752\files\server.exe (copy)
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Config.Msi\6537bf.rbs
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\server.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-71322570-7008-46b5-bb73-77098af1b752\files.cab
|
Microsoft Cabinet archive data, 669935 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MW-71322570-7008-46b5-bb73-77098af1b752\msiwrapper.ini
|
data
|
dropped
|
||
C:\Windows\Installer\6537be.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Microsoft
Visual Studio - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com 16.6.255.35071, Subject: Microsoft Visual Studio
- UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com, Author: Microsoft Corporation, Keywords: Installer, Template:
x64;1033, Revision Number: {49C681E5-45C4-4467-92EE-456F1E355C5F}, Create Time/Date: Sun Feb 7 22:37:14 2021, Last Saved
Time/Date: Sun Feb 7 22:37:14 2021, Number of Pages: 200, Number of Words: 2, Name of Creating Application: MSI Wrapper (10.0.50.0),
Security: 2
|
dropped
|
||
C:\Windows\Installer\6537c0.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Microsoft
Visual Studio - UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com 16.6.255.35071, Subject: Microsoft Visual Studio
- UNREGISTERED - Wrapped using MSI Wrapper from www.exemsi.com, Author: Microsoft Corporation, Keywords: Installer, Template:
x64;1033, Revision Number: {49C681E5-45C4-4467-92EE-456F1E355C5F}, Create Time/Date: Sun Feb 7 22:37:14 2021, Last Saved
Time/Date: Sun Feb 7 22:37:14 2021, Number of Pages: 200, Number of Words: 2, Name of Creating Application: MSI Wrapper (10.0.50.0),
Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI3B77.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIAA7E.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSIAA7F.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIBF62.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Windows\Installer\SourceHash{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Logs\DPX\setupact.log
|
UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\MsDtc\Trace\dtctrace.log
|
data
|
dropped
|
||
C:\Windows\Temp\~DF03391F73031C0A34.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF22D398DA2AC0F842.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF25DC81189B88B007.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF4B4630A3D90165FC.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF51AB674798AB773E.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF580A4C0E4BCBE8F6.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF5D4C48B55B4BFC19.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF6CC46065D10C7A25.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFB5C2126B1B76E891.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFC6CBD75861280262.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFCF309A9E155014E3.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFFCD8D26BF9AB481A.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
There are 22 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\AppData\Local\Temp\MW-71322570-7008-46b5-bb73-77098af1b752\files\server.exe
|
"C:\Users\user\AppData\Local\Temp\MW-71322570-7008-46b5-bb73-77098af1b752\files\server.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" "RegSvcs.exe" ENABLE
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" ..
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" ..
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" ..
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\SecuriteInfo.com.MSIL.Kryptik.AECS.24576.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding 8427D5518DE818285DF2E5650B3C2701
|
||
C:\Windows\SysWOW64\icacls.exe
|
"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-71322570-7008-46b5-bb73-77098af1b752\." /SETINTEGRITYLEVEL
(CI)(OI)HIGH
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\expand.exe
|
"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess.exe
|
||
C:\Windows\SysWOW64\icacls.exe
|
"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-71322570-7008-46b5-bb73-77098af1b752\." /SETINTEGRITYLEVEL
(CI)(OI)LOW
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-71322570-7008-46b5-bb73-77098af1b752\files"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\msdtc.exe
|
C:\Windows\System32\msdtc.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 15 hidden processes, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
njlove.duckdns.org
|
66.154.111.162
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
66.154.111.162
|
njlove.duckdns.org
|
Canada
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER
|
di
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
|
040b20e882d013c0c9f6ceff16d97f7a
|
||
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6537bf.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\6537bf.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C6F01EDE4F03AC245B7CDA9B504EB5CF
|
C76D1928B0E217E40B4390FA0E33388E
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EXEMSI.COM\MSI Wrapper\Installed
|
LogonUser
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EXEMSI.COM\MSI Wrapper\Installed
|
USERNAME
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EXEMSI.COM\MSI Wrapper\Installed
|
Date
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EXEMSI.COM\MSI Wrapper\Installed
|
Time
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EXEMSI.COM\MSI Wrapper\Installed
|
WRAPPED_ARGUMENTS
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\180352C37AFA8F54F983CA2E352031AE
|
C76D1928B0E217E40B4390FA0E33388E
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{8291D67C-2E0B-4E71-B034-09AFE03383E8}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\C76D1928B0E217E40B4390FA0E33388E
|
ProductFeature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\Features
|
ProductFeature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\C76D1928B0E217E40B4390FA0E33388E\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C76D1928B0E217E40B4390FA0E33388E
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C76D1928B0E217E40B4390FA0E33388E
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C76D1928B0E217E40B4390FA0E33388E
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C76D1928B0E217E40B4390FA0E33388E
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C76D1928B0E217E40B4390FA0E33388E
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C76D1928B0E217E40B4390FA0E33388E
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C76D1928B0E217E40B4390FA0E33388E
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C76D1928B0E217E40B4390FA0E33388E
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C76D1928B0E217E40B4390FA0E33388E
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\180352C37AFA8F54F983CA2E352031AE
|
C76D1928B0E217E40B4390FA0E33388E
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C76D1928B0E217E40B4390FA0E33388E\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C76D1928B0E217E40B4390FA0E33388E\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C76D1928B0E217E40B4390FA0E33388E\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C76D1928B0E217E40B4390FA0E33388E
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\C76D1928B0E217E40B4390FA0E33388E\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_CURRENT_USER\Software\040b20e882d013c0c9f6ceff16d97f7a
|
hp
|
||
HKEY_CURRENT_USER\Software\040b20e882d013c0c9f6ceff16d97f7a
|
i
|
||
HKEY_CURRENT_USER\Environment
|
SEE_MASK_NOZONECHECKS
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
|
040b20e882d013c0c9f6ceff16d97f7a
|
||
HKEY_CURRENT_USER\Software\040b20e882d013c0c9f6ceff16d97f7a
|
kl
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f2\52C64B7E
|
LanguageList
|
||
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\f2\52C64B7E
|
@C:\Windows\SysWOW64\FirewallControlPanel.dll,-12122
|
There are 82 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
5A51000
|
trusted library allocation
|
page read and write
|
||
45A6000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
4613000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
4371000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
3695000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
2CDE000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library section
|
page read and write
|
||
3371000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
2CA0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
36C7000
|
trusted library allocation
|
page read and write
|
||
6BA1000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
594D000
|
stack
|
page read and write
|
||
201EA6C9000
|
heap
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
3639000
|
trusted library allocation
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
4DB5000
|
trusted library allocation
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
1526BB08000
|
unkown
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
349E000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
201E9AA4000
|
heap
|
page read and write
|
||
29D9AE69000
|
unkown
|
page read and write
|
||
3461000
|
trusted library allocation
|
page read and write
|
||
201EA6A1000
|
heap
|
page read and write
|
||
15B6A191000
|
unkown
|
page read and write
|
||
4DD3000
|
trusted library allocation
|
page read and write
|
||
97A000
|
heap
|
page read and write
|
||
51D1000
|
trusted library allocation
|
page read and write
|
||
1210000
|
remote allocation
|
page read and write
|
||
3439000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
2558C83C000
|
unkown
|
page read and write
|
||
575E000
|
trusted library allocation
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
52B5000
|
trusted library allocation
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
4DD3000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
151A000
|
trusted library allocation
|
page execute and read and write
|
||
52B5000
|
trusted library allocation
|
page read and write
|
||
8EC000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
16AF000
|
stack
|
page read and write
|
||
2558C879000
|
unkown
|
page read and write
|
||
35A7000
|
trusted library allocation
|
page read and write
|
||
1056000
|
heap
|
page read and write
|
||
15B69F80000
|
remote allocation
|
page read and write
|
||
3493000
|
trusted library allocation
|
page read and write
|
||
15B6A1B2000
|
unkown
|
page read and write
|
||
1556EF7000
|
stack
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
2CA3000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
341E000
|
trusted library allocation
|
page read and write
|
||
15B69700000
|
heap
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
201EA696000
|
heap
|
page read and write
|
||
1376000
|
heap
|
page read and write
|
||
3474000
|
trusted library allocation
|
page read and write
|
||
4DC5000
|
trusted library allocation
|
page read and write
|
||
4DCA000
|
trusted library allocation
|
page read and write
|
||
201EA684000
|
heap
|
page read and write
|
||
201EA5A0000
|
heap
|
page read and write
|
||
201EA5C1000
|
heap
|
page read and write
|
||
201E9A85000
|
heap
|
page read and write
|
||
34D0000
|
trusted library allocation
|
page read and write
|
||
8EE000
|
heap
|
page read and write
|
||
201EA737000
|
heap
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
5162000
|
trusted library allocation
|
page read and write
|
||
201E9ACC000
|
heap
|
page read and write
|
||
5E25000
|
trusted library allocation
|
page read and write
|
||
29D9AE7C000
|
unkown
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
201EA650000
|
heap
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
1706000
|
heap
|
page read and write
|
||
201EA6C9000
|
heap
|
page read and write
|
||
28A74B50000
|
heap
|
page read and write
|
||
EB0000
|
unkown
|
page readonly
|
||
6076000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
4DC7000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
51DB000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5654000
|
trusted library allocation
|
page read and write
|
||
7F6A8000
|
trusted library allocation
|
page execute and read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
92C000
|
heap
|
page read and write
|
||
28A74B5D000
|
heap
|
page read and write
|
||
122D000
|
stack
|
page read and write
|
||
15B6A604000
|
unkown
|
page read and write
|
||
3747000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
D60000
|
remote allocation
|
page read and write
|
||
33DE000
|
trusted library allocation
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
28A74B3B000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
2E98000
|
heap
|
page read and write
|
||
3630000
|
trusted library allocation
|
page read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
D60000
|
remote allocation
|
page read and write
|
||
5A3E000
|
stack
|
page read and write
|
||
2558C913000
|
unkown
|
page read and write
|
||
F67000
|
heap
|
page read and write
|
||
3852000
|
trusted library allocation
|
page read and write
|
||
DB7000
|
heap
|
page read and write
|
||
EB2000
|
unkown
|
page readonly
|
||
29D9AE29000
|
unkown
|
page read and write
|
||
4DDC000
|
trusted library allocation
|
page read and write
|
||
A5D000
|
stack
|
page read and write
|
||
201E9AFD000
|
heap
|
page read and write
|
||
1526BA84000
|
unkown
|
page read and write
|
||
15B6A604000
|
unkown
|
page read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
36F3000
|
trusted library allocation
|
page read and write
|
||
F7A000
|
heap
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
8BF000
|
heap
|
page read and write
|
||
15B6A18A000
|
unkown
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
201EA682000
|
heap
|
page read and write
|
||
15B69F80000
|
remote allocation
|
page read and write
|
||
3515000
|
trusted library allocation
|
page read and write
|
||
1525000
|
trusted library allocation
|
page execute and read and write
|
||
3425000
|
trusted library allocation
|
page read and write
|
||
15B6A1AE000
|
unkown
|
page read and write
|
||
1442000
|
heap
|
page read and write
|
||
51C5000
|
trusted library allocation
|
page read and write
|
||
D37000
|
stack
|
page read and write
|
||
94F000
|
heap
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
5770000
|
trusted library allocation
|
page read and write
|
||
201EA662000
|
heap
|
page read and write
|
||
F56000
|
unkown
|
page readonly
|
||
3764000
|
trusted library allocation
|
page read and write
|
||
D70000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
8F5000
|
heap
|
page read and write
|
||
4FBC000
|
trusted library allocation
|
page execute and read and write
|
||
201EA6A4000
|
heap
|
page read and write
|
||
AEDD50C000
|
stack
|
page read and write
|
||
201E9AFE000
|
heap
|
page read and write
|
||
201E9970000
|
remote allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
3667000
|
trusted library allocation
|
page read and write
|
||
103A000
|
heap
|
page read and write
|
||
96F000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
2EAF000
|
heap
|
page read and write
|
||
55AD000
|
stack
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
||
979000
|
heap
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
94F000
|
heap
|
page read and write
|
||
15B6A181000
|
unkown
|
page read and write
|
||
3450000
|
trusted library allocation
|
page read and write
|
||
201EA650000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
3877000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
35A9000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
24A10220000
|
remote allocation
|
page read and write
|
||
362C000
|
trusted library allocation
|
page read and write
|
||
378C000
|
trusted library allocation
|
page read and write
|
||
96A000
|
heap
|
page read and write
|
||
1092000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
28A74B57000
|
heap
|
page read and write
|
||
201EA6C9000
|
heap
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page read and write
|
||
4DB4000
|
trusted library allocation
|
page read and write
|
||
5730000
|
trusted library allocation
|
page read and write
|
||
1706000
|
heap
|
page read and write
|
||
108D000
|
stack
|
page read and write
|
||
201E9A9D000
|
heap
|
page read and write
|
||
29BD000
|
stack
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
DAB000
|
trusted library allocation
|
page execute and read and write
|
||
33D5000
|
trusted library allocation
|
page read and write
|
||
201EA6C9000
|
heap
|
page read and write
|
||
92E000
|
heap
|
page read and write
|
||
3491000
|
trusted library allocation
|
page read and write
|
||
201EA6A4000
|
heap
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
3CD1000
|
trusted library allocation
|
page read and write
|
||
3897000
|
trusted library allocation
|
page read and write
|
||
1B52A7F000
|
stack
|
page read and write
|
||
201E9AFB000
|
heap
|
page read and write
|
||
3570000
|
trusted library allocation
|
page read and write
|
||
F73000
|
heap
|
page read and write
|
||
97D000
|
heap
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
2FA97F9000
|
stack
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
5670000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
35D0000
|
trusted library allocation
|
page read and write
|
||
201EA684000
|
heap
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
967000
|
heap
|
page read and write
|
||
384E000
|
trusted library allocation
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
||
15B6A114000
|
unkown
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
603E000
|
stack
|
page read and write
|
||
3833000
|
trusted library allocation
|
page read and write
|
||
52B5000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
388F000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
939000
|
heap
|
page read and write
|
||
201EA6AD000
|
heap
|
page read and write
|
||
8EE000
|
heap
|
page read and write
|
||
1056000
|
heap
|
page read and write
|
||
1300000
|
remote allocation
|
page read and write
|
||
4500000
|
heap
|
page read and write
|
||
201E9AD8000
|
heap
|
page read and write
|
||
8F5000
|
heap
|
page read and write
|
||
540E000
|
stack
|
page read and write
|
||
201EA673000
|
heap
|
page read and write
|
||
15AE000
|
stack
|
page read and write
|
||
676E000
|
stack
|
page read and write
|
||
201EA5E0000
|
heap
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
201E9AD9000
|
heap
|
page read and write
|
||
201E9AA5000
|
heap
|
page read and write
|
||
201E9A35000
|
heap
|
page read and write
|
||
4DBB000
|
trusted library allocation
|
page read and write
|
||
F6B000
|
heap
|
page read and write
|
||
877000
|
heap
|
page read and write
|
||
94F000
|
heap
|
page read and write
|
||
5730000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201EA6A4000
|
heap
|
page read and write
|
||
52B1000
|
trusted library allocation
|
page read and write
|
||
201E9AE7000
|
heap
|
page read and write
|
||
28A74B5D000
|
heap
|
page read and write
|
||
637F000
|
stack
|
page read and write
|
||
354B000
|
trusted library allocation
|
page read and write
|
||
4DB3000
|
trusted library allocation
|
page read and write
|
||
4DD9000
|
trusted library allocation
|
page read and write
|
||
1B5212C000
|
stack
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
28A74B6D000
|
heap
|
page read and write
|
||
201EA648000
|
heap
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
4DC8000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
35F8000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
4DB8000
|
trusted library allocation
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
33EE000
|
trusted library allocation
|
page read and write
|
||
28A74B5F000
|
heap
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
3673000
|
trusted library allocation
|
page read and write
|
||
5B3E000
|
stack
|
page read and write
|
||
4DA9000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
3405000
|
trusted library allocation
|
page read and write
|
||
6BA1000
|
heap
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
1526BA4C000
|
unkown
|
page read and write
|
||
5B90000
|
remote allocation
|
page read and write
|
||
3675000
|
trusted library allocation
|
page read and write
|
||
4DB3000
|
trusted library allocation
|
page read and write
|
||
47E0000
|
trusted library allocation
|
page read and write
|
||
342F000
|
trusted library allocation
|
page read and write
|
||
38B4000
|
trusted library allocation
|
page read and write
|
||
15B6A175000
|
unkown
|
page read and write
|
||
595E000
|
stack
|
page read and write
|
||
15B6A193000
|
unkown
|
page read and write
|
||
B80000
|
unkown
|
page readonly
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
4DD3000
|
trusted library allocation
|
page read and write
|
||
33E2000
|
trusted library allocation
|
page read and write
|
||
353A000
|
trusted library allocation
|
page read and write
|
||
3771000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
341C000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
363B000
|
trusted library allocation
|
page read and write
|
||
3751000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
heap
|
page execute and read and write
|
||
8EA000
|
heap
|
page read and write
|
||
390000
|
remote allocation
|
page read and write
|
||
15B69813000
|
unkown
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
D60000
|
remote allocation
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
343B000
|
trusted library allocation
|
page read and write
|
||
201E9AFD000
|
heap
|
page read and write
|
||
201EA5C0000
|
heap
|
page read and write
|
||
374F000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
trusted library allocation
|
page read and write
|
||
15B6A192000
|
unkown
|
page read and write
|
||
1526BA7D000
|
unkown
|
page read and write
|
||
361A000
|
trusted library allocation
|
page read and write
|
||
3577000
|
trusted library allocation
|
page read and write
|
||
34DF000
|
trusted library allocation
|
page read and write
|
||
33D7000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
trusted library allocation
|
page read and write
|
||
28A74B42000
|
heap
|
page read and write
|
||
15B69863000
|
unkown
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5068000
|
trusted library allocation
|
page read and write
|
||
201EA683000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201EA5C0000
|
heap
|
page read and write
|
||
97B000
|
heap
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
558E000
|
stack
|
page read and write
|
||
4DD5000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
201E9A9B000
|
heap
|
page read and write
|
||
6080000
|
trusted library allocation
|
page read and write
|
||
52B5000
|
trusted library allocation
|
page read and write
|
||
201EA600000
|
heap
|
page read and write
|
||
A62777E000
|
stack
|
page read and write
|
||
29D9AE00000
|
unkown
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
4DB2000
|
trusted library allocation
|
page read and write
|
||
33D3000
|
trusted library allocation
|
page read and write
|
||
38BB000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
201E9AD8000
|
heap
|
page read and write
|
||
34D4000
|
trusted library allocation
|
page read and write
|
||
201EA648000
|
heap
|
page read and write
|
||
9DD000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
967000
|
heap
|
page read and write
|
||
700E000
|
stack
|
page read and write
|
||
201EA6C9000
|
heap
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page read and write
|
||
991000
|
heap
|
page read and write
|
||
385A000
|
trusted library allocation
|
page read and write
|
||
D7D000
|
trusted library allocation
|
page execute and read and write
|
||
201E9AEA000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
362A000
|
trusted library allocation
|
page read and write
|
||
4DDE000
|
trusted library allocation
|
page read and write
|
||
3854000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
6ECE000
|
stack
|
page read and write
|
||
4DC2000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
201EA668000
|
heap
|
page read and write
|
||
C66000
|
heap
|
page read and write
|
||
7F3C8000
|
trusted library allocation
|
page execute and read and write
|
||
CF7000
|
heap
|
page read and write
|
||
3766000
|
trusted library allocation
|
page read and write
|
||
379C000
|
trusted library allocation
|
page read and write
|
||
99B000
|
heap
|
page read and write
|
||
15B698F7000
|
unkown
|
page read and write
|
||
2558C86A000
|
unkown
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
543F000
|
stack
|
page read and write
|
||
15B6A181000
|
unkown
|
page read and write
|
||
28A74B5D000
|
heap
|
page read and write
|
||
358E000
|
trusted library allocation
|
page read and write
|
||
3467000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5E80000
|
trusted library allocation
|
page read and write
|
||
1526BA00000
|
unkown
|
page read and write
|
||
35BE000
|
trusted library allocation
|
page read and write
|
||
1410000
|
trusted library allocation
|
page read and write
|
||
5110000
|
heap
|
page read and write
|
||
51D5000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
1670000
|
trusted library allocation
|
page read and write
|
||
2E6D000
|
trusted library allocation
|
page execute and read and write
|
||
1350000
|
heap
|
page read and write
|
||
4DDA000
|
trusted library allocation
|
page read and write
|
||
15B6A181000
|
unkown
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
28E8000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
1526C202000
|
unkown
|
page read and write
|
||
201EA6A9000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
4770000
|
trusted library allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
201EA659000
|
heap
|
page read and write
|
||
15B6A181000
|
unkown
|
page read and write
|
||
F91000
|
heap
|
page read and write
|
||
350A000
|
trusted library allocation
|
page read and write
|
||
FC7000
|
heap
|
page read and write
|
||
99A000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
617E000
|
stack
|
page read and write
|
||
96F000
|
heap
|
page read and write
|
||
8F9000
|
heap
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
15B6A197000
|
unkown
|
page read and write
|
||
AEDDA7B000
|
stack
|
page read and write
|
||
2FA927E000
|
stack
|
page read and write
|
||
4DDE000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
201E9AEA000
|
heap
|
page read and write
|
||
BA0000
|
unkown
|
page read and write
|
||
F71000
|
heap
|
page read and write
|
||
6CB0000
|
trusted library allocation
|
page read and write
|
||
547E000
|
stack
|
page read and write
|
||
356C000
|
trusted library allocation
|
page read and write
|
||
2AE1000
|
trusted library allocation
|
page read and write
|
||
A9C000
|
stack
|
page read and write
|
||
2BE8000
|
trusted library allocation
|
page read and write
|
||
201EA67A000
|
heap
|
page read and write
|
||
187F000
|
stack
|
page read and write
|
||
EB2000
|
unkown
|
page readonly
|
||
ED0000
|
heap
|
page read and write
|
||
376A000
|
trusted library allocation
|
page read and write
|
||
201EA6C9000
|
heap
|
page read and write
|
||
1210000
|
remote allocation
|
page read and write
|
||
68AF000
|
stack
|
page read and write
|
||
936000
|
heap
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page execute and read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
201EA668000
|
heap
|
page read and write
|
||
1210000
|
remote allocation
|
page read and write
|
||
949000
|
heap
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
28A74A30000
|
heap
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
6CC0000
|
trusted library allocation
|
page read and write
|
||
33F4000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
3423000
|
trusted library allocation
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
35AB000
|
trusted library allocation
|
page read and write
|
||
377D000
|
trusted library allocation
|
page read and write
|
||
201E9A4E000
|
heap
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
3684000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
2E7D000
|
trusted library allocation
|
page execute and read and write
|
||
DB5000
|
heap
|
page read and write
|
||
368A000
|
trusted library allocation
|
page read and write
|
||
F67000
|
heap
|
page read and write
|
||
987000
|
heap
|
page read and write
|
||
201E9ABB000
|
heap
|
page read and write
|
||
201EA628000
|
heap
|
page read and write
|
||
3506000
|
trusted library allocation
|
page read and write
|
||
F73000
|
heap
|
page read and write
|
||
3481000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5DE0000
|
trusted library allocation
|
page read and write
|
||
8F8000
|
heap
|
page read and write
|
||
6DCE000
|
stack
|
page read and write
|
||
35B5000
|
trusted library allocation
|
page read and write
|
||
52B5000
|
trusted library allocation
|
page read and write
|
||
5CE0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
15B6A14F000
|
unkown
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
995000
|
heap
|
page read and write
|
||
59B1000
|
trusted library allocation
|
page read and write
|
||
3749000
|
trusted library allocation
|
page read and write
|
||
1273000
|
trusted library allocation
|
page read and write
|
||
577D000
|
stack
|
page read and write
|
||
15B698E6000
|
unkown
|
page read and write
|
||
4DBB000
|
trusted library allocation
|
page read and write
|
||
3456000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
965000
|
heap
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page read and write
|
||
3636000
|
heap
|
page read and write
|
||
1071000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
201EA628000
|
heap
|
page read and write
|
||
4DA5000
|
trusted library allocation
|
page read and write
|
||
201EA6A7000
|
heap
|
page read and write
|
||
989000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
33D9000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
38D8000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201EA737000
|
heap
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
15B6A1A3000
|
unkown
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
1556CFB000
|
stack
|
page read and write
|
||
9F0000
|
remote allocation
|
page read and write
|
||
389B000
|
trusted library allocation
|
page read and write
|
||
1304000
|
trusted library allocation
|
page read and write
|
||
2558C82A000
|
unkown
|
page read and write
|
||
201E9FB2000
|
heap
|
page read and write
|
||
56F9000
|
trusted library allocation
|
page execute and read and write
|
||
36F1000
|
trusted library allocation
|
page read and write
|
||
4DA9000
|
trusted library allocation
|
page read and write
|
||
29D9AE3C000
|
unkown
|
page read and write
|
||
2A3A000
|
trusted library allocation
|
page execute and read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
1406000
|
heap
|
page read and write
|
||
372B000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page execute and read and write
|
||
1430000
|
heap
|
page read and write
|
||
3530000
|
trusted library allocation
|
page read and write
|
||
D84000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
34B2000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page execute and read and write
|
||
201E9A85000
|
heap
|
page read and write
|
||
2EAF000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
||
29D9AC00000
|
heap
|
page read and write
|
||
2B49000
|
trusted library allocation
|
page read and write
|
||
3669000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
heap
|
page execute and read and write
|
||
568E000
|
stack
|
page read and write
|
||
4DA7000
|
trusted library allocation
|
page read and write
|
||
6CB0000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
4DC3000
|
trusted library allocation
|
page read and write
|
||
201EA686000
|
heap
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
35F4000
|
trusted library allocation
|
page read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
15B6A1B0000
|
unkown
|
page read and write
|
||
201EA656000
|
heap
|
page read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
201E9ACE000
|
heap
|
page read and write
|
||
438E000
|
stack
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
15B6A187000
|
unkown
|
page read and write
|
||
360B000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
8F3000
|
heap
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
15B6A194000
|
unkown
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
15B69855000
|
unkown
|
page read and write
|
||
201EA648000
|
heap
|
page read and write
|
||
201E9A5E000
|
heap
|
page read and write
|
||
201EA67A000
|
heap
|
page read and write
|
||
3463000
|
trusted library allocation
|
page read and write
|
||
3485000
|
trusted library allocation
|
page read and write
|
||
1071000
|
trusted library allocation
|
page read and write
|
||
1526BA70000
|
unkown
|
page read and write
|
||
15568CB000
|
stack
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
201E9AA8000
|
heap
|
page read and write
|
||
201EA5E0000
|
heap
|
page read and write
|
||
201EA668000
|
heap
|
page read and write
|
||
1B529FF000
|
stack
|
page read and write
|
||
6274000
|
trusted library allocation
|
page read and write
|
||
29D9AE70000
|
unkown
|
page read and write
|
||
201EA699000
|
heap
|
page read and write
|
||
2558C84E000
|
unkown
|
page read and write
|
||
201EA5E1000
|
heap
|
page read and write
|
||
4DBD000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
3512000
|
trusted library allocation
|
page read and write
|
||
1B5297E000
|
stack
|
page read and write
|
||
F56000
|
unkown
|
page readonly
|
||
13E3000
|
heap
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
15B69916000
|
unkown
|
page read and write
|
||
35FF000
|
trusted library allocation
|
page read and write
|
||
5CC0000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
5CBC000
|
stack
|
page read and write
|
||
3661000
|
trusted library allocation
|
page read and write
|
||
364A000
|
trusted library allocation
|
page read and write
|
||
34B4000
|
trusted library allocation
|
page read and write
|
||
3536000
|
trusted library allocation
|
page read and write
|
||
2CB0000
|
heap
|
page execute and read and write
|
||
1300000
|
remote allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
4DC8000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
353C000
|
trusted library allocation
|
page read and write
|
||
386F000
|
trusted library allocation
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page execute and read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
2FA9477000
|
stack
|
page read and write
|
||
999000
|
heap
|
page read and write
|
||
512E000
|
stack
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
3564000
|
trusted library allocation
|
page read and write
|
||
201E9AFB000
|
heap
|
page read and write
|
||
1526BA3C000
|
unkown
|
page read and write
|
||
376E000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
99A000
|
heap
|
page read and write
|
||
201EA66B000
|
heap
|
page read and write
|
||
3654000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
201EA668000
|
heap
|
page read and write
|
||
35DD000
|
trusted library allocation
|
page read and write
|
||
3534000
|
trusted library allocation
|
page read and write
|
||
201EA677000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
15B6980B000
|
unkown
|
page read and write
|
||
15B69902000
|
unkown
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
3562000
|
trusted library allocation
|
page read and write
|
||
1286000
|
heap
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
351F000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
34C1000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
344E000
|
trusted library allocation
|
page read and write
|
||
6CA2000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
134A000
|
heap
|
page read and write
|
||
8D4000
|
heap
|
page read and write
|
||
201EA63C000
|
heap
|
page read and write
|
||
35C8000
|
trusted library allocation
|
page read and write
|
||
201E9A4E000
|
heap
|
page read and write
|
||
15B698D0000
|
unkown
|
page read and write
|
||
201E9AD8000
|
heap
|
page read and write
|
||
52F9000
|
stack
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
15B6A16F000
|
unkown
|
page read and write
|
||
28A74DD5000
|
heap
|
page read and write
|
||
201EA677000
|
heap
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
4DA7000
|
trusted library allocation
|
page read and write
|
||
3454000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201EA63C000
|
heap
|
page read and write
|
||
15B6A18E000
|
unkown
|
page read and write
|
||
C72000
|
heap
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
15B6A1D4000
|
unkown
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
1512000
|
trusted library allocation
|
page read and write
|
||
168B000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
201EA68C000
|
heap
|
page read and write
|
||
34F9000
|
trusted library allocation
|
page read and write
|
||
3609000
|
trusted library allocation
|
page read and write
|
||
15B6A18A000
|
unkown
|
page read and write
|
||
201E9A4E000
|
heap
|
page read and write
|
||
1706000
|
heap
|
page read and write
|
||
201E9A97000
|
heap
|
page read and write
|
||
D60000
|
remote allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
2A36000
|
trusted library allocation
|
page execute and read and write
|
||
201EA648000
|
heap
|
page read and write
|
||
56FD000
|
stack
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
5650000
|
trusted library allocation
|
page read and write
|
||
3575000
|
trusted library allocation
|
page read and write
|
||
56BF000
|
stack
|
page read and write
|
||
5736000
|
trusted library allocation
|
page read and write
|
||
36DA000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
D74000
|
trusted library allocation
|
page read and write
|
||
360F000
|
trusted library allocation
|
page read and write
|
||
201EA65A000
|
heap
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
5650000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
51C8000
|
trusted library allocation
|
page read and write
|
||
126D000
|
trusted library allocation
|
page execute and read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
6D00000
|
trusted library allocation
|
page read and write
|
||
201E9AE5000
|
heap
|
page read and write
|
||
3414000
|
trusted library allocation
|
page read and write
|
||
201E9A9E000
|
heap
|
page read and write
|
||
326C000
|
stack
|
page read and write
|
||
1245000
|
heap
|
page read and write
|
||
1706000
|
heap
|
page read and write
|
||
1526BA72000
|
unkown
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
2E9E000
|
heap
|
page read and write
|
||
36E9000
|
trusted library allocation
|
page read and write
|
||
4DC3000
|
trusted library allocation
|
page read and write
|
||
5167000
|
trusted library allocation
|
page read and write
|
||
3596000
|
trusted library allocation
|
page read and write
|
||
143A000
|
heap
|
page read and write
|
||
201EA6CA000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
4DB5000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
201EA698000
|
heap
|
page read and write
|
||
28A748E0000
|
heap
|
page read and write
|
||
4DB2000
|
trusted library allocation
|
page read and write
|
||
201EA65B000
|
heap
|
page read and write
|
||
3873000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
36C3000
|
trusted library allocation
|
page read and write
|
||
346B000
|
trusted library allocation
|
page read and write
|
||
15B69908000
|
unkown
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
2EAF000
|
heap
|
page read and write
|
||
201E9AD8000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
3403000
|
trusted library allocation
|
page read and write
|
||
AF7000
|
stack
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
13B0000
|
trusted library allocation
|
page read and write
|
||
201EA675000
|
heap
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
5FE1000
|
trusted library allocation
|
page read and write
|
||
15B69829000
|
unkown
|
page read and write
|
||
5390000
|
heap
|
page execute and read and write
|
||
2FA9A7A000
|
stack
|
page read and write
|
||
4DC7000
|
trusted library allocation
|
page read and write
|
||
34C7000
|
trusted library allocation
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
D8D000
|
trusted library allocation
|
page execute and read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
F79000
|
heap
|
page read and write
|
||
201EA5E0000
|
heap
|
page read and write
|
||
33C9000
|
trusted library allocation
|
page read and write
|
||
56C0000
|
trusted library allocation
|
page read and write
|
||
936000
|
heap
|
page read and write
|
||
3658000
|
trusted library allocation
|
page read and write
|
||
15B698DD000
|
unkown
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
3754000
|
trusted library allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
201EA66C000
|
heap
|
page read and write
|
||
3615000
|
trusted library allocation
|
page read and write
|
||
36E4000
|
trusted library allocation
|
page read and write
|
||
201E9A5E000
|
heap
|
page read and write
|
||
15B6A191000
|
unkown
|
page read and write
|
||
96F000
|
heap
|
page read and write
|
||
201E9AA8000
|
heap
|
page read and write
|
||
2A4B000
|
trusted library allocation
|
page execute and read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
33D1000
|
trusted library allocation
|
page read and write
|
||
374B000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
trusted library allocation
|
page read and write
|
||
3613000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
51FD000
|
stack
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
989000
|
heap
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
28A74B5F000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
348D000
|
trusted library allocation
|
page read and write
|
||
35FA000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
201E9AF9000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
36DC000
|
trusted library allocation
|
page read and write
|
||
24A10220000
|
remote allocation
|
page read and write
|
||
4FB9000
|
trusted library allocation
|
page execute and read and write
|
||
3682000
|
trusted library allocation
|
page read and write
|
||
627E000
|
stack
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
704E000
|
stack
|
page read and write
|
||
97A000
|
heap
|
page read and write
|
||
201EA66F000
|
heap
|
page read and write
|
||
201EA6A2000
|
heap
|
page read and write
|
||
16BF000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
3628000
|
trusted library allocation
|
page read and write
|
||
35EE000
|
trusted library allocation
|
page read and write
|
||
8BF000
|
heap
|
page read and write
|
||
15B6A665000
|
unkown
|
page read and write
|
||
34EF000
|
trusted library allocation
|
page read and write
|
||
201E9AE2000
|
heap
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201EA656000
|
heap
|
page read and write
|
||
2CB0000
|
trusted library allocation
|
page read and write
|
||
EDA000
|
heap
|
page read and write
|
||
B80000
|
unkown
|
page readonly
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
345F000
|
trusted library allocation
|
page read and write
|
||
E9A000
|
heap
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
34C9000
|
trusted library allocation
|
page read and write
|
||
33CB000
|
trusted library allocation
|
page read and write
|
||
34B7000
|
trusted library allocation
|
page read and write
|
||
15B6A184000
|
unkown
|
page read and write
|
||
56D0000
|
remote allocation
|
page read and write
|
||
5710000
|
heap
|
page read and write
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
51DB000
|
trusted library allocation
|
page read and write
|
||
15B6A184000
|
unkown
|
page read and write
|
||
36AA000
|
trusted library allocation
|
page read and write
|
||
201EA65F000
|
heap
|
page read and write
|
||
201EA668000
|
heap
|
page read and write
|
||
3704000
|
trusted library allocation
|
page read and write
|
||
4DAF000
|
trusted library allocation
|
page read and write
|
||
1300000
|
remote allocation
|
page read and write
|
||
98C000
|
heap
|
page read and write
|
||
3592000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
201EA674000
|
heap
|
page read and write
|
||
90C000
|
heap
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
967000
|
heap
|
page read and write
|
||
2FA96FE000
|
stack
|
page read and write
|
||
201E9AD8000
|
heap
|
page read and write
|
||
201EA683000
|
heap
|
page read and write
|
||
34E1000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
2558C6F0000
|
heap
|
page read and write
|
||
3155000
|
heap
|
page read and write
|
||
F31000
|
heap
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
575D000
|
stack
|
page read and write
|
||
4DA6000
|
trusted library allocation
|
page read and write
|
||
6230000
|
trusted library allocation
|
page read and write
|
||
30CB000
|
trusted library allocation
|
page read and write
|
||
992000
|
heap
|
page read and write
|
||
2EA7000
|
heap
|
page read and write
|
||
3BB000
|
stack
|
page read and write
|
||
1303000
|
trusted library allocation
|
page execute and read and write
|
||
352A000
|
trusted library allocation
|
page read and write
|
||
36ED000
|
trusted library allocation
|
page read and write
|
||
201EA668000
|
heap
|
page read and write
|
||
3871000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
FEC000
|
stack
|
page read and write
|
||
1337000
|
trusted library allocation
|
page execute and read and write
|
||
38E0000
|
trusted library allocation
|
page read and write
|
||
201E9AEB000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201EA654000
|
heap
|
page read and write
|
||
4DC8000
|
trusted library allocation
|
page read and write
|
||
5F1E000
|
stack
|
page read and write
|
||
201EA67E000
|
heap
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
34EB000
|
trusted library allocation
|
page read and write
|
||
15B6A15B000
|
unkown
|
page read and write
|
||
201EA6A2000
|
heap
|
page read and write
|
||
34A2000
|
trusted library allocation
|
page read and write
|
||
201E9AB9000
|
heap
|
page read and write
|
||
4DDA000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
4DBF000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
15B69864000
|
unkown
|
page read and write
|
||
2A47000
|
trusted library allocation
|
page execute and read and write
|
||
990000
|
heap
|
page read and write
|
||
201EA659000
|
heap
|
page read and write
|
||
4DBD000
|
trusted library allocation
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
5631000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
35CE000
|
trusted library allocation
|
page read and write
|
||
3433000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
34C3000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
59C0000
|
trusted library allocation
|
page read and write
|
||
F4C000
|
heap
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
3686000
|
trusted library allocation
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
201EA656000
|
heap
|
page read and write
|
||
38C5000
|
trusted library allocation
|
page read and write
|
||
15B6983C000
|
unkown
|
page read and write
|
||
370E000
|
trusted library allocation
|
page read and write
|
||
15B6A15A000
|
unkown
|
page read and write
|
||
201EA67A000
|
heap
|
page read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
201EA628000
|
heap
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
4DD8000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
368E000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
2E70000
|
trusted library allocation
|
page read and write
|
||
1526BA88000
|
unkown
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
579E000
|
stack
|
page read and write
|
||
3738000
|
trusted library allocation
|
page read and write
|
||
55EE000
|
stack
|
page read and write
|
||
2FA8F3B000
|
stack
|
page read and write
|
||
201E9A89000
|
heap
|
page read and write
|
||
35EC000
|
trusted library allocation
|
page read and write
|
||
15B6A602000
|
unkown
|
page read and write
|
||
6A60000
|
trusted library allocation
|
page read and write
|
||
D60000
|
remote allocation
|
page read and write
|
||
201EA6A6000
|
heap
|
page read and write
|
||
201E9A49000
|
heap
|
page read and write
|
||
35BA000
|
trusted library allocation
|
page read and write
|
||
2E24000
|
trusted library allocation
|
page read and write
|
||
201E9A85000
|
heap
|
page read and write
|
||
201EA5E0000
|
heap
|
page read and write
|
||
2558C800000
|
unkown
|
page read and write
|
||
4DB2000
|
trusted library allocation
|
page read and write
|
||
3785000
|
trusted library allocation
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
15B6A184000
|
unkown
|
page read and write
|
||
15B6A181000
|
unkown
|
page read and write
|
||
4DC5000
|
trusted library allocation
|
page read and write
|
||
1526BA67000
|
unkown
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
201E9FB0000
|
heap
|
page read and write
|
||
36E2000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
201EA5E0000
|
heap
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
5220000
|
heap
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
98F000
|
heap
|
page read and write
|
||
201EA6C9000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
D00000
|
trusted library allocation
|
page read and write
|
||
97F000
|
heap
|
page read and write
|
||
133B000
|
trusted library allocation
|
page execute and read and write
|
||
3557000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
38B6000
|
trusted library allocation
|
page read and write
|
||
201E9A85000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
3B3000
|
stack
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201EA698000
|
heap
|
page read and write
|
||
96A000
|
heap
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
38CD000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
516A000
|
trusted library allocation
|
page read and write
|
||
1420000
|
trusted library allocation
|
page execute and read and write
|
||
28A74A10000
|
heap
|
page read and write
|
||
BA0000
|
unkown
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
19BF000
|
stack
|
page read and write
|
||
347A000
|
trusted library allocation
|
page read and write
|
||
354F000
|
trusted library allocation
|
page read and write
|
||
1706000
|
heap
|
page read and write
|
||
985000
|
heap
|
page read and write
|
||
568E000
|
stack
|
page read and write
|
||
201E9A49000
|
heap
|
page read and write
|
||
967000
|
heap
|
page read and write
|
||
3579000
|
trusted library allocation
|
page read and write
|
||
345D000
|
trusted library allocation
|
page read and write
|
||
15B696F0000
|
heap
|
page read and write
|
||
35F6000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
3635000
|
trusted library allocation
|
page read and write
|
||
3762000
|
trusted library allocation
|
page read and write
|
||
15B698E8000
|
unkown
|
page read and write
|
||
5B80000
|
trusted library allocation
|
page read and write
|
||
35A1000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
29D9AF08000
|
unkown
|
page read and write
|
||
AEDDC7F000
|
stack
|
page read and write
|
||
15B6A184000
|
unkown
|
page read and write
|
||
33F8000
|
trusted library allocation
|
page read and write
|
||
A6276FE000
|
stack
|
page read and write
|
||
72E000
|
stack
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
1036000
|
heap
|
page read and write
|
||
FB8000
|
heap
|
page read and write
|
||
59E6000
|
trusted library allocation
|
page read and write
|
||
996000
|
heap
|
page read and write
|
||
201E9AA8000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
3671000
|
trusted library allocation
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
201E9A5E000
|
heap
|
page read and write
|
||
1015000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
600E000
|
stack
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
15B6A1AE000
|
unkown
|
page read and write
|
||
15B6985B000
|
unkown
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5590000
|
trusted library allocation
|
page execute and read and write
|
||
96F000
|
heap
|
page read and write
|
||
5623000
|
trusted library allocation
|
page read and write
|
||
581E000
|
stack
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
152B000
|
trusted library allocation
|
page execute and read and write
|
||
387E000
|
trusted library allocation
|
page read and write
|
||
99E000
|
heap
|
page read and write
|
||
3594000
|
trusted library allocation
|
page read and write
|
||
6B90000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
201E9ACE000
|
heap
|
page read and write
|
||
201EA64C000
|
heap
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
97A000
|
heap
|
page read and write
|
||
99A000
|
heap
|
page read and write
|
||
201E9CC5000
|
heap
|
page read and write
|
||
3497000
|
trusted library allocation
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
35F2000
|
trusted library allocation
|
page read and write
|
||
15B6A60B000
|
unkown
|
page read and write
|
||
4DA9000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
201EA698000
|
heap
|
page read and write
|
||
993000
|
heap
|
page read and write
|
||
4065000
|
trusted library allocation
|
page read and write
|
||
142E000
|
heap
|
page read and write
|
||
5EB5000
|
trusted library allocation
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
D60000
|
remote allocation
|
page read and write
|
||
201EA684000
|
heap
|
page read and write
|
||
28A74B6D000
|
heap
|
page read and write
|
||
201EA683000
|
heap
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
571E000
|
stack
|
page read and write
|
||
15B6A182000
|
unkown
|
page read and write
|
||
95C000
|
heap
|
page read and write
|
||
15B6A181000
|
unkown
|
page read and write
|
||
2E29000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
1B5267C000
|
stack
|
page read and write
|
||
4E31000
|
trusted library allocation
|
page read and write
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
4DAE000
|
trusted library allocation
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
38D6000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
352E000
|
trusted library allocation
|
page read and write
|
||
201EA6A0000
|
heap
|
page read and write
|
||
36AE000
|
trusted library allocation
|
page read and write
|
||
4DDA000
|
trusted library allocation
|
page read and write
|
||
A6277FA000
|
stack
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
4DAE000
|
trusted library allocation
|
page read and write
|
||
29D9AF13000
|
unkown
|
page read and write
|
||
993000
|
heap
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
201EA684000
|
heap
|
page read and write
|
||
2FA967E000
|
stack
|
page read and write
|
||
8F9000
|
heap
|
page read and write
|
||
201EA600000
|
heap
|
page read and write
|
||
4DD6000
|
trusted library allocation
|
page read and write
|
||
201E9AA0000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
113E000
|
stack
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
36A8000
|
trusted library allocation
|
page read and write
|
||
3835000
|
trusted library allocation
|
page read and write
|
||
35DF000
|
trusted library allocation
|
page read and write
|
||
15B6A604000
|
unkown
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
8D5000
|
heap
|
page read and write
|
||
7F3B0000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
3499000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
2558D002000
|
unkown
|
page read and write
|
||
201E9CC0000
|
heap
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
remote allocation
|
page read and write
|
||
60F0000
|
heap
|
page read and write
|
||
D60000
|
remote allocation
|
page read and write
|
||
59E7000
|
trusted library allocation
|
page read and write
|
||
3665000
|
trusted library allocation
|
page read and write
|
||
15B6A1D4000
|
unkown
|
page read and write
|
||
3712000
|
trusted library allocation
|
page read and write
|
||
4DA5000
|
trusted library allocation
|
page read and write
|
||
99E000
|
heap
|
page read and write
|
||
3446000
|
trusted library allocation
|
page read and write
|
||
531E000
|
stack
|
page read and write
|
||
96A000
|
heap
|
page read and write
|
||
4DDE000
|
trusted library allocation
|
page read and write
|
||
28A74DD0000
|
heap
|
page read and write
|
||
1F195900000
|
remote allocation
|
page read and write
|
||
1526BB00000
|
unkown
|
page read and write
|
||
AB0000
|
remote allocation
|
page read and write
|
||
6CA0000
|
trusted library allocation
|
page read and write
|
||
BD6000
|
stack
|
page read and write
|
||
67AE000
|
stack
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
6330000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
||
8F3000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
ADC000
|
stack
|
page read and write
|
||
201EA620000
|
heap
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
2CD1000
|
trusted library allocation
|
page read and write
|
||
5FF0000
|
trusted library allocation
|
page read and write
|
||
988000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
141E000
|
heap
|
page read and write
|
||
2D4B000
|
trusted library allocation
|
page read and write
|
||
2558C908000
|
unkown
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
366B000
|
trusted library allocation
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
unkown
|
page read and write
|
||
15B6A604000
|
unkown
|
page read and write
|
||
3745000
|
trusted library allocation
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
98A000
|
heap
|
page read and write
|
||
341A000
|
trusted library allocation
|
page read and write
|
||
3411000
|
trusted library allocation
|
page read and write
|
||
8F9000
|
heap
|
page read and write
|
||
1346000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5E8E000
|
stack
|
page read and write
|
||
8F1000
|
heap
|
page read and write
|
||
8DF000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
F56000
|
unkown
|
page readonly
|
||
5703000
|
trusted library allocation
|
page read and write
|
||
164E000
|
stack
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
4EF3000
|
trusted library allocation
|
page read and write
|
||
5A50000
|
trusted library allocation
|
page read and write
|
||
201E9A00000
|
heap
|
page read and write
|
||
52B7000
|
trusted library allocation
|
page read and write
|
||
250000
|
heap
|
page read and write
|
||
383B000
|
trusted library allocation
|
page read and write
|
||
15B6A11F000
|
unkown
|
page read and write
|
||
201E9A5E000
|
heap
|
page read and write
|
||
1556FFF000
|
stack
|
page read and write
|
||
15B6A183000
|
unkown
|
page read and write
|
||
4F14000
|
trusted library allocation
|
page read and write
|
||
29D9ADD0000
|
unkown
|
page read and write
|
||
92B000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page execute and read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
4DA3000
|
trusted library allocation
|
page read and write
|
||
201EA6A2000
|
heap
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
6CA0000
|
trusted library allocation
|
page read and write
|
||
EB2000
|
unkown
|
page readonly
|
||
1B525F9000
|
stack
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
2558C680000
|
heap
|
page read and write
|
||
15B6A19E000
|
unkown
|
page read and write
|
||
755000
|
heap
|
page read and write
|
||
15B6A1B2000
|
unkown
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
201E9AE7000
|
heap
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
614E000
|
stack
|
page read and write
|
||
3418000
|
trusted library allocation
|
page read and write
|
||
AEDD58F000
|
stack
|
page read and write
|
||
4DDC000
|
trusted library allocation
|
page read and write
|
||
4DB2000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
2E98000
|
heap
|
page read and write
|
||
5860000
|
trusted library allocation
|
page read and write
|
||
34CE000
|
trusted library allocation
|
page read and write
|
||
14F3000
|
trusted library allocation
|
page execute and read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
5178000
|
trusted library allocation
|
page read and write
|
||
343E000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
15B6A19F000
|
unkown
|
page read and write
|
||
201E9A35000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
F6A000
|
heap
|
page read and write
|
||
3555000
|
trusted library allocation
|
page read and write
|
||
99E000
|
heap
|
page read and write
|
||
97B000
|
heap
|
page read and write
|
||
357B000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
3794000
|
trusted library allocation
|
page read and write
|
||
2A42000
|
trusted library allocation
|
page read and write
|
||
939000
|
heap
|
page read and write
|
||
56D0000
|
remote allocation
|
page read and write
|
||
965000
|
heap
|
page read and write
|
||
F5F000
|
stack
|
page read and write
|
||
201EA6AD000
|
heap
|
page read and write
|
||
201EA5A1000
|
heap
|
page read and write
|
||
AEDDD7F000
|
stack
|
page read and write
|
||
35EA000
|
trusted library allocation
|
page read and write
|
||
3AE5000
|
trusted library allocation
|
page read and write
|
||
3598000
|
trusted library allocation
|
page read and write
|
||
33F6000
|
trusted library allocation
|
page read and write
|
||
6BA1000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5CBE000
|
stack
|
page read and write
|
||
201EA649000
|
heap
|
page read and write
|
||
201E9AEB000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
trusted library allocation
|
page read and write
|
||
36C9000
|
trusted library allocation
|
page read and write
|
||
99B000
|
heap
|
page read and write
|
||
4DC2000
|
trusted library allocation
|
page read and write
|
||
AEDDB77000
|
stack
|
page read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
15B6A19F000
|
unkown
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
201EA696000
|
heap
|
page read and write
|
||
3538000
|
trusted library allocation
|
page read and write
|
||
3465000
|
trusted library allocation
|
page read and write
|
||
5C21000
|
trusted library allocation
|
page read and write
|
||
368C000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
30C4000
|
trusted library allocation
|
page read and write
|
||
362E000
|
heap
|
page read and write
|
||
6080000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
3823000
|
trusted library allocation
|
page read and write
|
||
33F0000
|
trusted library allocation
|
page read and write
|
||
201EA664000
|
heap
|
page read and write
|
||
34FC000
|
trusted library allocation
|
page read and write
|
||
19D0000
|
heap
|
page read and write
|
||
46D0000
|
heap
|
page read and write
|
||
15B6A171000
|
unkown
|
page read and write
|
||
33FF000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201E9A4E000
|
heap
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
8E1000
|
heap
|
page read and write
|
||
52B5000
|
trusted library allocation
|
page read and write
|
||
3521000
|
trusted library allocation
|
page read and write
|
||
FED000
|
stack
|
page read and write
|
||
201EA6A1000
|
heap
|
page read and write
|
||
201E9AE1000
|
heap
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
B80000
|
unkown
|
page readonly
|
||
EB2000
|
unkown
|
page readonly
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
3478000
|
trusted library allocation
|
page read and write
|
||
34DC000
|
trusted library allocation
|
page read and write
|
||
5330000
|
trusted library allocation
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
201E9AFD000
|
heap
|
page read and write
|
||
15B6A181000
|
unkown
|
page read and write
|
||
4DA1000
|
trusted library allocation
|
page read and write
|
||
3881000
|
trusted library allocation
|
page read and write
|
||
201E9AFD000
|
heap
|
page read and write
|
||
F5F000
|
heap
|
page read and write
|
||
201E9A99000
|
heap
|
page read and write
|
||
1B5277F000
|
stack
|
page read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
4DD3000
|
trusted library allocation
|
page read and write
|
||
201EA67A000
|
heap
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
2558C848000
|
unkown
|
page read and write
|
||
955000
|
heap
|
page read and write
|
||
356A000
|
trusted library allocation
|
page read and write
|
||
33CD000
|
trusted library allocation
|
page read and write
|
||
8EC000
|
heap
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
201E9AF0000
|
heap
|
page read and write
|
||
4DDE000
|
trusted library allocation
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
15B6985D000
|
unkown
|
page read and write
|
||
7FBC8000
|
trusted library allocation
|
page execute and read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
2BC000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
38CF000
|
trusted library allocation
|
page read and write
|
||
2E97000
|
trusted library allocation
|
page execute and read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
F71000
|
heap
|
page read and write
|
||
6F0E000
|
stack
|
page read and write
|
||
347C000
|
trusted library allocation
|
page read and write
|
||
4DA9000
|
trusted library allocation
|
page read and write
|
||
29D9AE88000
|
unkown
|
page read and write
|
||
201EA672000
|
heap
|
page read and write
|
||
5600000
|
heap
|
page read and write
|
||
201E9AFC000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
15B6A181000
|
unkown
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
130D000
|
trusted library allocation
|
page execute and read and write
|
||
149E000
|
stack
|
page read and write
|
||
201EA683000
|
heap
|
page read and write
|
||
F7B000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
201E9AA8000
|
heap
|
page read and write
|
||
201EA686000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
15B6A192000
|
unkown
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
4DA5000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
36DE000
|
trusted library allocation
|
page read and write
|
||
1418000
|
heap
|
page read and write
|
||
3495000
|
trusted library allocation
|
page read and write
|
||
15B6A192000
|
unkown
|
page read and write
|
||
15B6A181000
|
unkown
|
page read and write
|
||
D60000
|
remote allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
4DCA000
|
trusted library allocation
|
page read and write
|
||
61FE000
|
stack
|
page read and write
|
||
201E9930000
|
heap
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
3559000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
90A000
|
heap
|
page read and write
|
||
346D000
|
trusted library allocation
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
29D9ABA0000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5C7E000
|
stack
|
page read and write
|
||
8F9000
|
heap
|
page read and write
|
||
201EA6C9000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
29D9AE69000
|
unkown
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
1526BA67000
|
unkown
|
page read and write
|
||
3480000
|
trusted library allocation
|
page read and write
|
||
201EA683000
|
heap
|
page read and write
|
||
589E000
|
stack
|
page read and write
|
||
4DC3000
|
trusted library allocation
|
page read and write
|
||
201E9ADC000
|
heap
|
page read and write
|
||
4DA1000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
15B69868000
|
unkown
|
page read and write
|
||
33E4000
|
trusted library allocation
|
page read and write
|
||
201E9AFA000
|
heap
|
page read and write
|
||
6D10000
|
trusted library allocation
|
page read and write
|
||
15B6A1B4000
|
unkown
|
page read and write
|
||
35B7000
|
trusted library allocation
|
page read and write
|
||
949000
|
heap
|
page read and write
|
||
201EA6A1000
|
heap
|
page read and write
|
||
201EA638000
|
heap
|
page read and write
|
||
94F000
|
heap
|
page read and write
|
||
29D9AF02000
|
unkown
|
page read and write
|
||
3435000
|
trusted library allocation
|
page read and write
|
||
15B6A100000
|
unkown
|
page read and write
|
||
EB0000
|
unkown
|
page readonly
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201EA64D000
|
heap
|
page read and write
|
||
34AA000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
2E9E000
|
heap
|
page read and write
|
||
29D9AE51000
|
unkown
|
page read and write
|
||
383F000
|
trusted library allocation
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
1526B920000
|
heap
|
page read and write
|
||
2558C813000
|
unkown
|
page read and write
|
||
541F000
|
stack
|
page read and write
|
||
15B6A193000
|
unkown
|
page read and write
|
||
3768000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
unkown
|
page read and write
|
||
5739000
|
stack
|
page read and write
|
||
52B6000
|
trusted library allocation
|
page read and write
|
||
C74000
|
heap
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
F76000
|
heap
|
page read and write
|
||
15B6A1D3000
|
unkown
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
D0F000
|
heap
|
page read and write
|
||
4DDC000
|
trusted library allocation
|
page read and write
|
||
5E2E000
|
stack
|
page read and write
|
||
6080000
|
trusted library allocation
|
page read and write
|
||
201EA6CA000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
4DDA000
|
trusted library allocation
|
page read and write
|
||
F56000
|
unkown
|
page readonly
|
||
F6C000
|
heap
|
page read and write
|
||
5E37000
|
trusted library allocation
|
page read and write
|
||
2E98000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
4DDC000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
345B000
|
trusted library allocation
|
page read and write
|
||
351D000
|
trusted library allocation
|
page read and write
|
||
34D2000
|
trusted library allocation
|
page read and write
|
||
1526BB02000
|
unkown
|
page read and write
|
||
3508000
|
trusted library allocation
|
page read and write
|
||
34BD000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
6B80000
|
trusted library allocation
|
page read and write
|
||
379A000
|
trusted library allocation
|
page read and write
|
||
52B5000
|
trusted library allocation
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
5A0E000
|
stack
|
page read and write
|
||
201EA652000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
3626000
|
trusted library allocation
|
page read and write
|
||
15B6A187000
|
unkown
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
6CE0000
|
trusted library allocation
|
page read and write
|
||
3693000
|
trusted library allocation
|
page read and write
|
||
5E6E000
|
trusted library allocation
|
page read and write
|
||
5CDE000
|
stack
|
page read and write
|
||
3483000
|
trusted library allocation
|
page read and write
|
||
1B527FE000
|
stack
|
page read and write
|
||
A7D000
|
stack
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
201E97D0000
|
heap
|
page read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
5540000
|
trusted library allocation
|
page execute and read and write
|
||
3787000
|
trusted library allocation
|
page read and write
|
||
3620000
|
heap
|
page read and write
|
||
3891000
|
trusted library allocation
|
page read and write
|
||
15B6A1A2000
|
unkown
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
657F000
|
stack
|
page read and write
|
||
4DAE000
|
trusted library allocation
|
page read and write
|
||
3678000
|
trusted library allocation
|
page read and write
|
||
4DC3000
|
trusted library allocation
|
page read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
58CE000
|
stack
|
page read and write
|
||
A6278FE000
|
stack
|
page read and write
|
||
201EA64D000
|
heap
|
page read and write
|
||
15B698A8000
|
unkown
|
page read and write
|
||
4DA9000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
2558C84B000
|
unkown
|
page read and write
|
||
15B6A186000
|
unkown
|
page read and write
|
||
5370000
|
trusted library allocation
|
page read and write
|
||
359D000
|
trusted library allocation
|
page read and write
|
||
353E000
|
trusted library allocation
|
page read and write
|
||
4DCA000
|
trusted library allocation
|
page read and write
|
||
36F5000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
trusted library allocation
|
page read and write
|
||
AF3CC7E000
|
stack
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
5380000
|
trusted library allocation
|
page read and write
|
||
6090000
|
trusted library allocation
|
page read and write
|
||
201EA67E000
|
heap
|
page read and write
|
||
3656000
|
trusted library allocation
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
3706000
|
trusted library allocation
|
page read and write
|
||
6040000
|
trusted library allocation
|
page read and write
|
||
201E9AA8000
|
heap
|
page read and write
|
||
5640000
|
heap
|
page execute and read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
2558C690000
|
heap
|
page read and write
|
||
350E000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
3517000
|
trusted library allocation
|
page read and write
|
||
201EA6C9000
|
heap
|
page read and write
|
||
15B6A600000
|
unkown
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
1056000
|
heap
|
page read and write
|
||
15B6A604000
|
unkown
|
page read and write
|
||
201E9AD8000
|
heap
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
28A74B5F000
|
heap
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
DA7000
|
trusted library allocation
|
page execute and read and write
|
||
5164000
|
trusted library allocation
|
page read and write
|
||
3633000
|
trusted library allocation
|
page read and write
|
||
201EA6A7000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
28A74B51000
|
heap
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
1526B8C0000
|
heap
|
page read and write
|
||
35F0000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
5154000
|
trusted library allocation
|
page read and write
|
||
96A000
|
heap
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
15B69790000
|
unkown
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
3427000
|
trusted library allocation
|
page read and write
|
||
201E9ACC000
|
heap
|
page read and write
|
||
201EA696000
|
heap
|
page read and write
|
||
201EA663000
|
heap
|
page read and write
|
||
94D000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
AEDD87F000
|
stack
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
957000
|
heap
|
page read and write
|
||
55BE000
|
stack
|
page read and write
|
||
15569CE000
|
stack
|
page read and write
|
||
5F61000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
5175000
|
trusted library allocation
|
page read and write
|
||
201EA675000
|
heap
|
page read and write
|
||
378A000
|
trusted library allocation
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
4B30000
|
trusted library allocation
|
page read and write
|
||
15B6985F000
|
unkown
|
page read and write
|
||
201E9AA7000
|
heap
|
page read and write
|
||
5339000
|
trusted library allocation
|
page execute and read and write
|
||
15B6A195000
|
unkown
|
page read and write
|
||
28A74B6D000
|
heap
|
page read and write
|
||
201EA66B000
|
heap
|
page read and write
|
||
15B6A18E000
|
unkown
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
370A000
|
trusted library allocation
|
page read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
36AC000
|
trusted library allocation
|
page read and write
|
||
363E000
|
trusted library allocation
|
page read and write
|
||
98C000
|
heap
|
page read and write
|
||
90A000
|
heap
|
page read and write
|
||
2E90000
|
trusted library allocation
|
page read and write
|
||
4DBB000
|
trusted library allocation
|
page read and write
|
||
98C000
|
heap
|
page read and write
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
501E000
|
stack
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
1052000
|
heap
|
page read and write
|
||
36E7000
|
trusted library allocation
|
page read and write
|
||
AF3D1FF000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
3590000
|
trusted library allocation
|
page read and write
|
||
201EA696000
|
heap
|
page read and write
|
||
201EA620000
|
heap
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
5181000
|
trusted library allocation
|
page read and write
|
||
201E9ACC000
|
heap
|
page read and write
|
||
993000
|
heap
|
page read and write
|
||
4DCD000
|
trusted library allocation
|
page read and write
|
||
5D8E000
|
stack
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
C4A000
|
heap
|
page read and write
|
||
2ABD000
|
stack
|
page read and write
|
||
8F9000
|
heap
|
page read and write
|
||
EB2000
|
unkown
|
page readonly
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
38DE000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
4DCB000
|
trusted library allocation
|
page read and write
|
||
5F40000
|
remote allocation
|
page read and write
|
||
15570FF000
|
stack
|
page read and write
|
||
4DB8000
|
trusted library allocation
|
page read and write
|
||
15B6A15A000
|
unkown
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201EA5A1000
|
heap
|
page read and write
|
||
3D0000
|
unkown
|
page readonly
|
||
201EA6A4000
|
heap
|
page read and write
|
||
EB0000
|
unkown
|
page readonly
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
15B6A18A000
|
unkown
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
34AE000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
8BF000
|
heap
|
page read and write
|
||
15B6A615000
|
unkown
|
page read and write
|
||
F67000
|
heap
|
page read and write
|
||
1B528FE000
|
stack
|
page read and write
|
||
949000
|
heap
|
page read and write
|
||
36B0000
|
trusted library allocation
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
8F8000
|
heap
|
page read and write
|
||
59E1000
|
trusted library allocation
|
page read and write
|
||
201EA67C000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
15B6A181000
|
unkown
|
page read and write
|
||
4DA1000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
15B69800000
|
unkown
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
AF3CFF7000
|
stack
|
page read and write
|
||
5C4E000
|
stack
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
6CA0000
|
trusted library allocation
|
page read and write
|
||
1314000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
||
999000
|
heap
|
page read and write
|
||
F6B000
|
heap
|
page read and write
|
||
6080000
|
trusted library allocation
|
page read and write
|
||
5370000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
140E000
|
heap
|
page read and write
|
||
3476000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
5184000
|
trusted library allocation
|
page read and write
|
||
6B90000
|
trusted library allocation
|
page execute and read and write
|
||
201EA648000
|
heap
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
155694E000
|
stack
|
page read and write
|
||
201EA648000
|
heap
|
page read and write
|
||
201EA66A000
|
heap
|
page read and write
|
||
52B5000
|
trusted library allocation
|
page read and write
|
||
3458000
|
trusted library allocation
|
page read and write
|
||
5133000
|
heap
|
page read and write
|
||
201E9A49000
|
heap
|
page read and write
|
||
933000
|
heap
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
8E7000
|
heap
|
page read and write
|
||
201EA66B000
|
heap
|
page read and write
|
||
2E9A000
|
heap
|
page read and write
|
||
201E9ADA000
|
heap
|
page read and write
|
||
201EA6A7000
|
heap
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
2E9B000
|
trusted library allocation
|
page execute and read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
201E9ACE000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5E70000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5340000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
965000
|
heap
|
page read and write
|
||
1384000
|
heap
|
page read and write
|
||
36EB000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
131D000
|
trusted library allocation
|
page execute and read and write
|
||
28A74B56000
|
heap
|
page read and write
|
||
201EA675000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
D23000
|
heap
|
page read and write
|
||
35D9000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
34F1000
|
trusted library allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
15B6986C000
|
unkown
|
page read and write
|
||
34FE000
|
trusted library allocation
|
page read and write
|
||
376C000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
390000
|
remote allocation
|
page read and write
|
||
3603000
|
trusted library allocation
|
page read and write
|
||
2CAD000
|
stack
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201E9A89000
|
heap
|
page read and write
|
||
201EA66F000
|
heap
|
page read and write
|
||
1436000
|
heap
|
page read and write
|
||
F6B000
|
heap
|
page read and write
|
||
DB7000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
3429000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
201EA648000
|
heap
|
page read and write
|
||
3617000
|
trusted library allocation
|
page read and write
|
||
517C000
|
trusted library allocation
|
page read and write
|
||
38D1000
|
trusted library allocation
|
page read and write
|
||
38AE000
|
trusted library allocation
|
page read and write
|
||
3452000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
366D000
|
trusted library allocation
|
page read and write
|
||
38C7000
|
trusted library allocation
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
2EAF000
|
heap
|
page read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
201E9970000
|
remote allocation
|
page read and write
|
||
35D7000
|
trusted library allocation
|
page read and write
|
||
34ED000
|
trusted library allocation
|
page read and write
|
||
28A74B47000
|
heap
|
page read and write
|
||
15B6A15C000
|
unkown
|
page read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
2FA937C000
|
stack
|
page read and write
|
||
201E9A35000
|
heap
|
page read and write
|
||
34F5000
|
trusted library allocation
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
19C0000
|
heap
|
page execute and read and write
|
||
145E000
|
stack
|
page read and write
|
||
14F4000
|
trusted library allocation
|
page read and write
|
||
99A000
|
heap
|
page read and write
|
||
5D4E000
|
stack
|
page read and write
|
||
340B000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
354D000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
3646000
|
trusted library allocation
|
page read and write
|
||
6CD3000
|
trusted library allocation
|
page read and write
|
||
5130000
|
heap
|
page read and write
|
||
4DC4000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201EA660000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
unkown
|
page readonly
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
1330000
|
trusted library allocation
|
page read and write
|
||
127D000
|
trusted library allocation
|
page execute and read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5860000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
5B90000
|
remote allocation
|
page read and write
|
||
201E9AF9000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
15B698BC000
|
unkown
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
33FA000
|
trusted library allocation
|
page read and write
|
||
33E6000
|
trusted library allocation
|
page read and write
|
||
F7C000
|
heap
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
936000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
2FA9B7F000
|
stack
|
page read and write
|
||
201EA697000
|
heap
|
page read and write
|
||
FAD000
|
heap
|
page read and write
|
||
7FBB0000
|
trusted library allocation
|
page execute and read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
51C6000
|
trusted library allocation
|
page read and write
|
||
4DAE000
|
trusted library allocation
|
page read and write
|
||
15B69913000
|
unkown
|
page read and write
|
||
3899000
|
trusted library allocation
|
page read and write
|
||
5637000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
508E000
|
stack
|
page read and write
|
||
6B90000
|
trusted library allocation
|
page read and write
|
||
8F9000
|
heap
|
page read and write
|
||
364E000
|
trusted library allocation
|
page read and write
|
||
3820000
|
trusted library allocation
|
page read and write
|
||
15B698E0000
|
unkown
|
page read and write
|
||
56E4000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
141D000
|
stack
|
page read and write
|
||
3572000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
2E98000
|
heap
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
4DC8000
|
trusted library allocation
|
page read and write
|
||
36CD000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
remote allocation
|
page read and write
|
||
3586000
|
trusted library allocation
|
page read and write
|
||
8A8000
|
heap
|
page read and write
|
||
2AAE000
|
stack
|
page read and write
|
||
4DD2000
|
trusted library allocation
|
page read and write
|
||
8B6000
|
heap
|
page read and write
|
||
33C7000
|
trusted library allocation
|
page read and write
|
||
61BE000
|
stack
|
page read and write
|
||
F62000
|
heap
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
13C1000
|
trusted library allocation
|
page read and write
|
||
3188000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
trusted library allocation
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
383D000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
4DB5000
|
trusted library allocation
|
page read and write
|
||
201E9ADE000
|
heap
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
5DBE000
|
stack
|
page read and write
|
||
377F000
|
trusted library allocation
|
page read and write
|
||
5A50000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page execute and read and write
|
||
351B000
|
trusted library allocation
|
page read and write
|
||
F7A000
|
heap
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
14A5000
|
heap
|
page read and write
|
||
F7C000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
370C000
|
trusted library allocation
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
201E9AEB000
|
heap
|
page read and write
|
||
201EA6C9000
|
heap
|
page read and write
|
||
2CC0000
|
heap
|
page execute and read and write
|
||
2558C900000
|
unkown
|
page read and write
|
||
201EA656000
|
heap
|
page read and write
|
||
201E9FA0000
|
heap
|
page read and write
|
||
2FA997E000
|
stack
|
page read and write
|
||
4DD5000
|
trusted library allocation
|
page read and write
|
||
AF3C9CE000
|
stack
|
page read and write
|
||
3727000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201EA698000
|
heap
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
56D0000
|
remote allocation
|
page read and write
|
||
3781000
|
trusted library allocation
|
page read and write
|
||
201EA5E1000
|
heap
|
page read and write
|
||
15B6A188000
|
unkown
|
page read and write
|
||
201EA6A4000
|
heap
|
page read and write
|
||
5CC0000
|
trusted library allocation
|
page read and write
|
||
1526C080000
|
unkown
|
page read and write
|
||
75D000
|
stack
|
page read and write
|
||
201E9AA8000
|
heap
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
386B000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
533C000
|
trusted library allocation
|
page execute and read and write
|
||
85E000
|
stack
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
15B6A15A000
|
unkown
|
page read and write
|
||
1187000
|
stack
|
page read and write
|
||
3431000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
F83000
|
heap
|
page read and write
|
||
201E9AB9000
|
heap
|
page read and write
|
||
3061000
|
trusted library allocation
|
page read and write
|
||
201E9A4E000
|
heap
|
page read and write
|
||
3AE1000
|
trusted library allocation
|
page read and write
|
||
201EA656000
|
heap
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
38D3000
|
trusted library allocation
|
page read and write
|
||
5F30000
|
trusted library allocation
|
page read and write
|
||
201EA673000
|
heap
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
201EA675000
|
heap
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
remote allocation
|
page read and write
|
||
4DAF000
|
trusted library allocation
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
3159000
|
heap
|
page read and write
|
||
201EA672000
|
heap
|
page read and write
|
||
3416000
|
trusted library allocation
|
page read and write
|
||
58A0000
|
trusted library section
|
page read and write
|
||
936000
|
heap
|
page read and write
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
2E63000
|
trusted library allocation
|
page execute and read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
3708000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
4DC3000
|
trusted library allocation
|
page read and write
|
||
5BDE000
|
stack
|
page read and write
|
||
5810000
|
trusted library allocation
|
page read and write
|
||
5940000
|
heap
|
page execute and read and write
|
||
52B5000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
D6F000
|
stack
|
page read and write
|
||
3837000
|
trusted library allocation
|
page read and write
|
||
201E9A85000
|
heap
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
AF3C94C000
|
stack
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
CB6000
|
heap
|
page read and write
|
||
38C9000
|
trusted library allocation
|
page read and write
|
||
201E9AFD000
|
heap
|
page read and write
|
||
8EE000
|
heap
|
page read and write
|
||
8E7000
|
heap
|
page read and write
|
||
365B000
|
trusted library allocation
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
15B698A3000
|
unkown
|
page read and write
|
||
12F8000
|
stack
|
page read and write
|
||
201EA6A1000
|
heap
|
page read and write
|
||
2E9E000
|
heap
|
page read and write
|
||
42B0000
|
trusted library allocation
|
page read and write
|
||
1526BA53000
|
unkown
|
page read and write
|
||
3409000
|
trusted library allocation
|
page read and write
|
||
29D9AB90000
|
heap
|
page read and write
|
||
5550000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
3740000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
2E77000
|
heap
|
page read and write
|
||
4DD2000
|
trusted library allocation
|
page read and write
|
||
357D000
|
trusted library allocation
|
page read and write
|
||
5B7E000
|
stack
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
15B6A116000
|
unkown
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
1526BB13000
|
unkown
|
page read and write
|
||
3636000
|
heap
|
page read and write
|
||
201EA661000
|
heap
|
page read and write
|
||
201EA620000
|
heap
|
page read and write
|
||
3624000
|
trusted library allocation
|
page read and write
|
||
99B000
|
heap
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201E9AFC000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
BF7000
|
heap
|
page read and write
|
||
6CC0000
|
trusted library allocation
|
page read and write
|
||
666E000
|
stack
|
page read and write
|
||
201E9ACC000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
374D000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
34D8000
|
trusted library allocation
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
15B69859000
|
unkown
|
page read and write
|
||
3401000
|
trusted library allocation
|
page read and write
|
||
5040000
|
heap
|
page execute and read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
365F000
|
trusted library allocation
|
page read and write
|
||
15B698AD000
|
unkown
|
page read and write
|
||
1B5257F000
|
stack
|
page read and write
|
||
3581000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
340D000
|
trusted library allocation
|
page read and write
|
||
599E000
|
stack
|
page read and write
|
||
201E9A89000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
35CA000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
34B0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201E9AED000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
3532000
|
trusted library allocation
|
page read and write
|
||
3690000
|
trusted library allocation
|
page read and write
|
||
201EA696000
|
heap
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
F2E000
|
stack
|
page read and write
|
||
5E1E000
|
stack
|
page read and write
|
||
201E9AB9000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
3729000
|
trusted library allocation
|
page read and write
|
||
3867000
|
trusted library allocation
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
985000
|
heap
|
page read and write
|
||
52B5000
|
trusted library allocation
|
page read and write
|
||
34F3000
|
trusted library allocation
|
page read and write
|
||
4DBB000
|
trusted library allocation
|
page read and write
|
||
98A000
|
heap
|
page read and write
|
||
2A30000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
989000
|
heap
|
page read and write
|
||
2B60000
|
heap
|
page read and write
|
||
5F61000
|
heap
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
6CB1000
|
trusted library allocation
|
page read and write
|
||
5E2A000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
201EA651000
|
heap
|
page read and write
|
||
34E9000
|
trusted library allocation
|
page read and write
|
||
3725000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5A4E000
|
stack
|
page read and write
|
||
3525000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
98C000
|
heap
|
page read and write
|
||
15B6A181000
|
unkown
|
page read and write
|
||
6BA0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
5730000
|
trusted library allocation
|
page read and write
|
||
15B69888000
|
unkown
|
page read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
373C000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
730000
|
trusted library allocation
|
page read and write
|
||
516D000
|
trusted library allocation
|
page read and write
|
||
AF3CDFE000
|
stack
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
965000
|
heap
|
page read and write
|
||
56CD000
|
stack
|
page read and write
|
||
35D5000
|
trusted library allocation
|
page read and write
|
||
29D9AE4E000
|
unkown
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
201E9A99000
|
heap
|
page read and write
|
||
3547000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
51D5000
|
trusted library allocation
|
page read and write
|
||
28A74B30000
|
heap
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
366F000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
52BB000
|
stack
|
page read and write
|
||
624E000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
201EA682000
|
heap
|
page read and write
|
||
201EA5C0000
|
heap
|
page read and write
|
||
5CC0000
|
trusted library allocation
|
page read and write
|
||
52B4000
|
trusted library allocation
|
page read and write
|
||
201E9910000
|
heap
|
page read and write
|
||
201EA666000
|
heap
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
34D6000
|
trusted library allocation
|
page read and write
|
||
3510000
|
trusted library allocation
|
page read and write
|
||
2B44000
|
trusted library allocation
|
page read and write
|
||
1526BA4E000
|
unkown
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
201EA659000
|
heap
|
page read and write
|
||
6BA1000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201E9AA1000
|
heap
|
page read and write
|
||
15B6A002000
|
unkown
|
page read and write
|
||
54AE000
|
stack
|
page read and write
|
||
390000
|
remote allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
201E9AF1000
|
heap
|
page read and write
|
||
201EA67A000
|
heap
|
page read and write
|
||
29D9AF00000
|
unkown
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
trusted library allocation
|
page read and write
|
||
5710000
|
trusted library allocation
|
page execute and read and write
|
||
15B6A1A5000
|
unkown
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
4DBE000
|
trusted library allocation
|
page read and write
|
||
623E000
|
stack
|
page read and write
|
||
F62000
|
heap
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
373E000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
15B698E8000
|
unkown
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
201E9AB9000
|
heap
|
page read and write
|
||
1B5287D000
|
stack
|
page read and write
|
||
386D000
|
trusted library allocation
|
page read and write
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
201E9AFC000
|
heap
|
page read and write
|
||
97B000
|
heap
|
page read and write
|
||
5C10000
|
trusted library allocation
|
page read and write
|
||
4DA5000
|
trusted library allocation
|
page read and write
|
||
34BB000
|
trusted library allocation
|
page read and write
|
||
2E9E000
|
heap
|
page read and write
|
||
36C5000
|
trusted library allocation
|
page read and write
|
||
201EA670000
|
heap
|
page read and write
|
||
993000
|
heap
|
page read and write
|
||
15B698C2000
|
unkown
|
page read and write
|
||
1516000
|
trusted library allocation
|
page execute and read and write
|
||
3730000
|
trusted library allocation
|
page read and write
|
||
35C0000
|
trusted library allocation
|
page read and write
|
||
201E9A49000
|
heap
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
6272000
|
trusted library allocation
|
page read and write
|
||
102F000
|
stack
|
page read and write
|
||
201EA6A6000
|
heap
|
page read and write
|
||
1706000
|
heap
|
page read and write
|
||
AF3CEFB000
|
stack
|
page read and write
|
||
FCC000
|
heap
|
page read and write
|
||
15B6A16F000
|
unkown
|
page read and write
|
||
36D4000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
1526BA29000
|
unkown
|
page read and write
|
||
201EA5A1000
|
heap
|
page read and write
|
||
F74000
|
heap
|
page read and write
|
||
97B000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
3407000
|
trusted library allocation
|
page read and write
|
||
584E000
|
stack
|
page read and write
|
||
201E9ADC000
|
heap
|
page read and write
|
||
2DC1000
|
trusted library allocation
|
page read and write
|
||
340F000
|
trusted library allocation
|
page read and write
|
||
38B8000
|
trusted library allocation
|
page read and write
|
||
3DC5000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
201EA683000
|
heap
|
page read and write
|
||
2558C882000
|
unkown
|
page read and write
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
201EA6A4000
|
heap
|
page read and write
|
||
201EA686000
|
heap
|
page read and write
|
||
15B6A17B000
|
unkown
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
56E0000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
201EA66C000
|
heap
|
page read and write
|
||
6BA0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
201EA66B000
|
heap
|
page read and write
|
||
2CA4000
|
trusted library allocation
|
page read and write
|
||
15B6A177000
|
unkown
|
page read and write
|
||
1B526FE000
|
stack
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
3850000
|
trusted library allocation
|
page read and write
|
||
15B69F80000
|
remote allocation
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
359A000
|
trusted library allocation
|
page read and write
|
||
52B5000
|
trusted library allocation
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
4D1F000
|
stack
|
page read and write
|
||
15B698E9000
|
unkown
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
5F40000
|
remote allocation
|
page read and write
|
||
38B0000
|
trusted library allocation
|
page read and write
|
||
3831000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
5F2E000
|
stack
|
page read and write
|
||
5561000
|
trusted library allocation
|
page read and write
|
||
33DB000
|
trusted library allocation
|
page read and write
|
||
4061000
|
trusted library allocation
|
page read and write
|
||
33EA000
|
trusted library allocation
|
page read and write
|
||
35FD000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
8F8000
|
heap
|
page read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
4DDC000
|
trusted library allocation
|
page read and write
|
||
6CE0000
|
trusted library allocation
|
page read and write
|
||
15B6A171000
|
unkown
|
page read and write
|
||
3869000
|
trusted library allocation
|
page read and write
|
||
201EA686000
|
heap
|
page read and write
|
||
AF3D0FF000
|
stack
|
page read and write
|
||
201E9ACE000
|
heap
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
AEDD97B000
|
stack
|
page read and write
|
||
201EA659000
|
heap
|
page read and write
|
||
201E9A99000
|
heap
|
page read and write
|
||
1526BA13000
|
unkown
|
page read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
714E000
|
stack
|
page read and write
|
||
98D000
|
heap
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
3875000
|
trusted library allocation
|
page read and write
|
||
4DD8000
|
trusted library allocation
|
page read and write
|
||
34F7000
|
trusted library allocation
|
page read and write
|
||
1F195900000
|
remote allocation
|
page read and write
|
||
201E9AE2000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
15B6A189000
|
unkown
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201E9A35000
|
heap
|
page read and write
|
||
389E000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
34BF000
|
trusted library allocation
|
page read and write
|
||
3611000
|
trusted library allocation
|
page read and write
|
||
304D000
|
stack
|
page read and write
|
||
34AC000
|
trusted library allocation
|
page read and write
|
||
362E000
|
trusted library allocation
|
page read and write
|
||
3568000
|
trusted library allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
2558C902000
|
unkown
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
35E2000
|
trusted library allocation
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
7F690000
|
trusted library allocation
|
page execute and read and write
|
||
988000
|
heap
|
page read and write
|
||
6090000
|
trusted library allocation
|
page read and write
|
||
201EA638000
|
heap
|
page read and write
|
||
F56000
|
unkown
|
page readonly
|
||
201EA677000
|
heap
|
page read and write
|
||
3437000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
8F9000
|
heap
|
page read and write
|
||
2E64000
|
trusted library allocation
|
page read and write
|
||
201E9AEB000
|
heap
|
page read and write
|
||
29D9AE9C000
|
unkown
|
page read and write
|
||
2FA8FBE000
|
stack
|
page read and write
|
||
201EA5E0000
|
heap
|
page read and write
|
||
4DBD000
|
trusted library allocation
|
page read and write
|
||
35AD000
|
trusted library allocation
|
page read and write
|
||
1526B8B0000
|
heap
|
page read and write
|
||
201E9970000
|
remote allocation
|
page read and write
|
||
2CDC000
|
trusted library allocation
|
page read and write
|
||
5E25000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
5AA7000
|
trusted library allocation
|
page read and write
|
||
201EA677000
|
heap
|
page read and write
|
||
201EA6CA000
|
heap
|
page read and write
|
||
D3D000
|
heap
|
page read and write
|
||
361C000
|
trusted library allocation
|
page read and write
|
||
4DB3000
|
trusted library allocation
|
page read and write
|
||
201EA66F000
|
heap
|
page read and write
|
||
3440000
|
trusted library allocation
|
page read and write
|
||
A62767A000
|
stack
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
8D7000
|
heap
|
page read and write
|
||
5BA0000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
6BA0000
|
heap
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
1660000
|
trusted library allocation
|
page execute and read and write
|
||
35B3000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
1522000
|
trusted library allocation
|
page read and write
|
||
373A000
|
trusted library allocation
|
page read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
2FA98F9000
|
stack
|
page read and write
|
||
5A50000
|
trusted library allocation
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
1526BA49000
|
unkown
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
1263000
|
trusted library allocation
|
page execute and read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
201EA6A6000
|
heap
|
page read and write
|
||
35B1000
|
trusted library allocation
|
page read and write
|
||
18BE000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
trusted library allocation
|
page execute and read and write
|
||
34B9000
|
trusted library allocation
|
page read and write
|
||
4DAE000
|
trusted library allocation
|
page read and write
|
||
4340000
|
trusted library allocation
|
page read and write
|
||
6250000
|
trusted library allocation
|
page read and write
|
||
364C000
|
trusted library allocation
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
8B3000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
97B000
|
heap
|
page read and write
|
||
201E9AF9000
|
heap
|
page read and write
|
||
AB0000
|
remote allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
350C000
|
trusted library allocation
|
page read and write
|
||
2E73000
|
trusted library allocation
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
344C000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
unkown
|
page readonly
|
||
201EA668000
|
heap
|
page read and write
|
||
201EA66F000
|
heap
|
page read and write
|
||
1556DFB000
|
stack
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
15B6A604000
|
unkown
|
page read and write
|
||
F6A000
|
heap
|
page read and write
|
||
34C5000
|
trusted library allocation
|
page read and write
|
||
5C10000
|
trusted library allocation
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
A627879000
|
stack
|
page read and write
|
||
387C000
|
trusted library allocation
|
page read and write
|
||
A62797D000
|
stack
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
B90000
|
unkown
|
page readonly
|
||
14A0000
|
heap
|
page read and write
|
||
34DA000
|
trusted library allocation
|
page read and write
|
||
201E9AD8000
|
heap
|
page read and write
|
||
363E000
|
heap
|
page read and write
|
||
94A000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
955000
|
heap
|
page read and write
|
||
15B6986B000
|
unkown
|
page read and write
|
||
3519000
|
trusted library allocation
|
page read and write
|
||
201E9A49000
|
heap
|
page read and write
|
||
3723000
|
trusted library allocation
|
page read and write
|
||
5636000
|
trusted library allocation
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
201EA5C0000
|
heap
|
page read and write
|
||
3605000
|
trusted library allocation
|
page read and write
|
||
5750000
|
trusted library allocation
|
page read and write
|
||
3627000
|
heap
|
page read and write
|
||
D73000
|
trusted library allocation
|
page execute and read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
15B6985A000
|
unkown
|
page read and write
|
||
985000
|
heap
|
page read and write
|
||
38DC000
|
trusted library allocation
|
page read and write
|
||
B90000
|
unkown
|
page readonly
|
||
356E000
|
trusted library allocation
|
page read and write
|
||
6CB0000
|
trusted library allocation
|
page read and write
|
||
8EE000
|
heap
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page execute and read and write
|
||
568F000
|
stack
|
page read and write
|
||
5C30000
|
trusted library allocation
|
page read and write
|
||
201EA6A6000
|
heap
|
page read and write
|
||
647E000
|
stack
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
B90000
|
unkown
|
page readonly
|
||
3442000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
201EA65D000
|
heap
|
page read and write
|
||
201E9A93000
|
heap
|
page read and write
|
||
201EA6A4000
|
heap
|
page read and write
|
||
201EA670000
|
heap
|
page read and write
|
||
3DC1000
|
trusted library allocation
|
page read and write
|
||
2E9E000
|
heap
|
page read and write
|
||
56FC000
|
trusted library allocation
|
page execute and read and write
|
||
15B6985E000
|
unkown
|
page read and write
|
||
1510000
|
trusted library allocation
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
3AE000
|
stack
|
page read and write
|
||
3472000
|
trusted library allocation
|
page read and write
|
||
6B92000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
16BC000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
5635000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
201EA682000
|
heap
|
page read and write
|
||
36B2000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page execute and read and write
|
||
939000
|
heap
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
15B69866000
|
unkown
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
201E9A07000
|
heap
|
page read and write
|
||
35AF000
|
trusted library allocation
|
page read and write
|
||
36C1000
|
trusted library allocation
|
page read and write
|
||
D2E000
|
stack
|
page read and write
|
||
5E2C000
|
trusted library allocation
|
page read and write
|
||
3893000
|
trusted library allocation
|
page read and write
|
||
3553000
|
trusted library allocation
|
page read and write
|
||
59E0000
|
trusted library allocation
|
page read and write
|
||
29D9B402000
|
unkown
|
page read and write
|
||
5F40000
|
remote allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
||
36E0000
|
trusted library allocation
|
page read and write
|
||
522D000
|
stack
|
page read and write
|
||
1527000
|
trusted library allocation
|
page execute and read and write
|
||
385C000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
trusted library allocation
|
page read and write
|
||
4DDA000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
F5F000
|
heap
|
page read and write
|
||
6BA1000
|
heap
|
page read and write
|
||
2558C7F0000
|
unkown
|
page read and write
|
||
1264000
|
trusted library allocation
|
page read and write
|
||
201E9ADE000
|
heap
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
3688000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
29D9AE13000
|
unkown
|
page read and write
|
||
201E9AA8000
|
heap
|
page read and write
|
||
515B000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
4DA2000
|
trusted library allocation
|
page read and write
|
||
201EA649000
|
heap
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
15B6A18E000
|
unkown
|
page read and write
|
||
35CC000
|
trusted library allocation
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
2558C853000
|
unkown
|
page read and write
|
||
F04000
|
heap
|
page read and write
|
||
15B6A184000
|
unkown
|
page read and write
|
||
35D3000
|
trusted library allocation
|
page read and write
|
||
201E9A89000
|
heap
|
page read and write
|
||
51B0000
|
trusted library allocation
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
360D000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
99C000
|
heap
|
page read and write
|
||
4EBD000
|
stack
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
3469000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
4DD8000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
51C5000
|
trusted library allocation
|
page read and write
|
||
36EF000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
7F2A0000
|
trusted library allocation
|
page execute and read and write
|
||
6070000
|
trusted library allocation
|
page read and write
|
||
3551000
|
trusted library allocation
|
page read and write
|
||
201E9A92000
|
heap
|
page read and write
|
||
3420000
|
trusted library allocation
|
page read and write
|
||
38DA000
|
trusted library allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
9CD000
|
stack
|
page read and write
|
||
201EA649000
|
heap
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
3545000
|
trusted library allocation
|
page read and write
|
||
36CB000
|
trusted library allocation
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
38CB000
|
trusted library allocation
|
page read and write
|
||
59E4000
|
trusted library allocation
|
page read and write
|
||
33F2000
|
trusted library allocation
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
348F000
|
trusted library allocation
|
page read and write
|
||
94A000
|
heap
|
page read and write
|
||
99E000
|
heap
|
page read and write
|
||
6CB0000
|
trusted library allocation
|
page read and write
|
||
201E9A5E000
|
heap
|
page read and write
|
||
201EA620000
|
heap
|
page read and write
|
||
3BE000
|
stack
|
page read and write
|
||
FCC000
|
heap
|
page read and write
|
||
EF6000
|
heap
|
page read and write
|
||
1381000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
15B69760000
|
heap
|
page read and write
|
||
35A3000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
trusted library allocation
|
page read and write
|
||
363F000
|
heap
|
page read and write
|
||
610F000
|
stack
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
201EA5F4000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
2EAF000
|
heap
|
page read and write
|
||
51C1000
|
trusted library allocation
|
page read and write
|
||
3783000
|
trusted library allocation
|
page read and write
|
||
6CA0000
|
trusted library allocation
|
page read and write
|
||
2FA9577000
|
stack
|
page read and write
|
||
201EA5A1000
|
heap
|
page read and write
|
||
201EA6A7000
|
heap
|
page read and write
|
||
562E000
|
stack
|
page read and write
|
||
50E0000
|
trusted library allocation
|
page read and write
|
||
3721000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
remote allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
590E000
|
stack
|
page read and write
|
||
D80000
|
trusted library allocation
|
page read and write
|
||
5350000
|
trusted library allocation
|
page execute and read and write
|
||
29D9AE4B000
|
unkown
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
DEE000
|
stack
|
page read and write
|
||
201E9ADE000
|
heap
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
4DA5000
|
trusted library allocation
|
page read and write
|
||
5B7F000
|
stack
|
page read and write
|
||
EC2000
|
heap
|
page read and write
|
||
51D0000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
2EA6000
|
heap
|
page read and write
|
There are 2547 hidden memdumps, click here to show them.