Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
TGQfHfehsY.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\pjavpo.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6kvziwv34i
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv8D09.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x08024e91, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\brtwja
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\holderwb.txt
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\pid.txt
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\pidloc.txt
|
ASCII text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\TGQfHfehsY.exe
|
"C:\Users\user\Desktop\TGQfHfehsY.exe"
|
||
C:\Users\user\AppData\Local\Temp\pjavpo.exe
|
C:\Users\user\AppData\Local\Temp\pjavpo.exe C:\Users\user\AppData\Local\Temp\brtwja
|
||
C:\Users\user\AppData\Local\Temp\pjavpo.exe
|
C:\Users\user\AppData\Local\Temp\pjavpo.exe C:\Users\user\AppData\Local\Temp\brtwja
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holdermail.txt"
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\holderwb.txt"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.google.com/chrome/static/css/main.v2.min.css
|
unknown
|
||
https://www.msn.com//searchp/LinkId=255141
|
unknown
|
||
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwj8k7G9rJDsAhWNTxUIHZZGDCQQ
|
unknown
|
||
https://dl.google.com/tag/s/appguid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7B83C84637
|
unknown
|
||
http://www.msn.com
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
https://deff.nelreports.net/api/report?cat=msn
|
unknown
|
||
https://contextual.media.net/__media__/js/util/nrrV9140.js
|
unknown
|
||
https://mem.gfx.ms/me/MeControl/10.19168.0/en-US/meCore.min.js
|
unknown
|
||
https://www.google.com/chrome/static/images/download-browser/big_pixel_phone.png
|
unknown
|
||
http://images.outbrainimg.com/transform/v3/eyJpdSI6Ijk4OGQ1ZDgwMWE2ODQ2NDNkM2ZkMmYyMGEwOTgwMWQ3MDE2Z
|
unknown
|
||
https://s.yimg.com/lo/api/res/1.2/BXjlWewXmZ47HeV5NPvUYA--~A/Zmk9ZmlsbDt3PTYyMjtoPTM2ODthcHBpZD1nZW1
|
unknown
|
||
https://www.google.com/intl/en_uk/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrows
|
unknown
|
||
http://whatismyipaddress.com/-
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.site.com/logs.php
|
unknown
|
||
http://whatismyipaddress.com/
|
104.16.155.36
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://www.carterandcone.commg
|
unknown
|
||
https://logincdn.msauth.net/16.000/Converged_v21033_-0mnSwu67knBd7qR7YN9GQ2.css
|
unknown
|
||
https://www.google.com/complete/search?q&cp=0&client=psy-ab&xssi=t&gs_ri=gws-wiz&hl=en&authuser=0&ps
|
unknown
|
||
https://logincdn.msauth.net/16.000.28666.10/content/images/microsoft_logo_ee5c8d9fb6248c938fd0dc1937
|
unknown
|
||
https://logincdn.msauth.net/16.000.28666.10/content/images/ellipsis_white_5ac590ee72bfe06a7cecfd75b5
|
unknown
|
||
https://www.google.com/complete/search?q&cp=0&client=psy-ab&xssi=t&gs_ri=gws-wiz&hl=en&authuser=0&pq
|
unknown
|
||
https://www.google.com/search?source=hp&ei=djJ0X6TKCL6IjLsPqriogAY&q=chrome&oq=chrome&gs_lcp=CgZwc3k
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC5bdddb231cf54f958a5b6e76e9d8eee
|
unknown
|
||
https://logincdn.msauth.net/16.000.28666.10/content/images/ellipsis_grey_2b5d393db04a5e6e1f739cb266e
|
unknown
|
||
https://cvision.media.net/new/300x300/2/41/100/83/b5cbfa68-1c93-41c9-8797-4f9b532bc0b6.jpg?v=9
|
unknown
|
||
https://www.google.com/chrome/static/images/download-browser/pixel_phone.png
|
unknown
|
||
https://www.google.com/chrome/static/images/homepage/hero-anim-top-right.png
|
unknown
|
||
https://pki.goog/repository/0
|
unknown
|
||
https://www.msn.com/
|
unknown
|
||
https://mem.gfx.ms/meversion?partner=RetailStore2&market=en-us&uhf=1
|
unknown
|
||
https://www.google.com/xjs/_/js/k=xjs.s.en_GB.u8fwEfmm86E.O/ck=xjs.s.hyRG9kR79v8.L.I11.O/m=IvlUe
|
unknown
|
||
https://www.google.com/favicon.ico
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.msn.com/
|
unknown
|
||
http://www.founder.com.cn/cn/rL
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://www.google.com/chrome/static/images/fallback/google-logo-one-color.jpg
|
unknown
|
||
https://172.217.23.78/
|
unknown
|
||
https://www.google.com/images/nav_logo299.png
|
unknown
|
||
https://www.google.com/chrome/static/images/fallback/icon-help.jpg
|
unknown
|
||
https://www.google.com/complete/search?q=c&cp=1&client=psy-ab&xssi=t&gs_ri=gws-wiz&hl=en&authuser=0&
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
https://consent.google.com/set?pc=s&uxe=4421591
|
unknown
|
||
http://images.outbrainimg.com/transform/v3/eyJpdSI6ImYxODk5OTBhOWZjYjFmZjNjNmMxNDhmYjkzM2M3NzY1Mzk3Z
|
unknown
|
||
https://www.google.com/images/hpp/Chrome_Owned_96x96.png
|
unknown
|
||
http://crl.pki.goog/gsr2/gsr2.crl0?
|
unknown
|
||
http://pki.goog/gsr2/GTSGIAG3.crt0)
|
unknown
|
||
https://googleads.g.doubleclick.net/adsid/google/ui?gadsid=AORoGNQP1yCl9r5iywZTFTjpazv-DURVxDidzMfrF
|
unknown
|
||
https://googleads.g.doubleclick.net/adsid/google/ui?gadsid=AORoGNSrZsXAj6n_sYvivJecwrpYgMhb9ihVGAlz2
|
unknown
|
||
https://www.google.com/chrome/static/images/fallback/icon-fb.jpg
|
unknown
|
||
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.9Ky5Gf3gP0o.O/m=gapi_iframes
|
unknown
|
||
https://adservice.google.com/adsid/google/si?gadsid=AORoGNSvKHbjRugN8Bruw1IrFif72u8bwsJvZ4BRSrMAhil_
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
https://ogs.google.com/widget/callout?prid=19020392&pgid=19020380&puid=93eb0881ae9ec1db&origin=https
|
unknown
|
||
https://www.google.com/complete/search?q=chrome&cp=6&client=psy-ab&xssi=t&gs_ri=gws-wiz&hl=en&authus
|
unknown
|
||
https://www.google.com/images/phd/px.gif
|
unknown
|
||
https://www.google.com/chrome/static/images/homepage/google-canary.png
|
unknown
|
||
https://adservice.google.co.uk/adsid/google/ui?gadsid=AORoGNQXg7AHkvg6J6S0TqGFa_0HynGV3_XxYfs4fLINJG
|
unknown
|
||
https://play.google.com/intl/en_us/badges/images/generic/de_badge_web_generic.png
|
unknown
|
||
https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.js
|
unknown
|
||
https://www.google.com/chrome/static/js/main.v2.min.js
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCfd484f9188564713bbc5d13d862ebbf
|
unknown
|
||
https://cvision.media.net/new/100x75/2/89/162/29/8ee7a9a3-dec9-4d15-94e1-5c73b17d2de1.jpg?v=9
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
https://whatismyipaddress.comx&Qqt
|
unknown
|
||
http://fontfabrik.com
|
unknown
|
||
https://googleads.g.doubleclick.net/adsid/google/si?gadsid=AORoGNTXuGHPo1zFjYPXt7mTG-4GALGGk8bjqjvBm
|
unknown
|
||
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
|
unknown
|
||
https://www.google.com/intl/en_uk/chrome/
|
unknown
|
||
https://www.google.com/chrome/static/images/fallback/icon-youtube.jpg
|
unknown
|
||
https://googleads.g.doubleclick.net/adsid/google/si?gadsid=AORoGNQXwBwQrE_SUsnWzwpadcOOdc8yOg6JxthQN
|
unknown
|
||
https://www.google.com/intl/en_uk/chrome/application/x-msdownloadC:
|
unknown
|
||
http://www.sakkal.comuv
|
unknown
|
||
http://images.outbrainimg.com/transform/v3/eyJpdSI6IjJkYTFhZDAwNDEyNzQ2M2E3MGUyMWVkZmIxNmUyZjQ2MjBkM
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://www.urwpp.de
|
unknown
|
||
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=4510094
|
unknown
|
||
https://www.google.com/chrome/static/js/installer.min.js
|
unknown
|
||
https://www.google.com/search
|
unknown
|
||
https://www.google.com/chrome/static/images/download-browser/pixel_tablet.png
|
unknown
|
||
http://whatismyipaddress.com
|
unknown
|
||
https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en_5QoHC_ilFOmb96M0pIeJ
|
unknown
|
||
https://www.google.com/images/icons/material/system/1x/email_grey600_24dp.png
|
unknown
|
||
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
|
unknown
|
||
https://www.google.com/chrome/static/images/homepage/google-beta.png
|
unknown
|
||
http://www.msn.com/de-ch/?ocid=iehp
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.fontbureau.com91S
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
|
unknown
|
||
https://logincdn.msauth.net/16.000/content/js/OldConvergedLogin_PCore_xqcDwEKeDux9oCNjuqEZ-A2.js
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC54c8a2b02c3446f48a60b41e8a5ff47
|
unknown
|
||
http://cookies.onetrust.mgr.consensu.org/onetrust-logo.svg
|
unknown
|
||
https://www.msn.com/http://www.google.com/ms-appx-web://microsoft.microsoftedge/ms-appx-web://micros
|
unknown
|
||
http://support.google.com/accounts/answer/151657
|
unknown
|
||
https://logincdn.msauth.net/16.000.28230.00/images/microsoft_logo.svg?x=ee5c8d9fb6248c938fd0dc19370e
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ftp.manchutimefashion.com
|
66.70.204.222
|
||
whatismyipaddress.com
|
104.16.155.36
|
||
63.155.11.0.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
66.70.204.222
|
ftp.manchutimefashion.com
|
Canada
|
||
104.16.154.36
|
unknown
|
United States
|
||
104.16.155.36
|
whatismyipaddress.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
|
Hidden
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\pjavpo_RASMANCS
|
FileDirectory
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4A22000
|
trusted library allocation
|
page execute and read and write
|
||
20E0000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3801000
|
trusted library allocation
|
page read and write
|
||
414000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2801000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4990000
|
trusted library section
|
page read and write
|
||
4908000
|
trusted library allocation
|
page read and write
|
||
414000
|
remote allocation
|
page execute and read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
233DE88A000
|
unkown
|
page read and write
|
||
92009FE000
|
stack
|
page read and write
|
||
9EB000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
27E6000
|
trusted library allocation
|
page read and write
|
||
1FDABD60000
|
heap
|
page read and write
|
||
27CD5B40000
|
unkown
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
6203BFD000
|
stack
|
page read and write
|
||
76C0000
|
trusted library allocation
|
page read and write
|
||
1A2DF000
|
trusted library allocation
|
page read and write
|
||
1C5F9A02000
|
unkown
|
page read and write
|
||
2172000
|
trusted library allocation
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
604000
|
heap
|
page read and write
|
||
1FDABCB5000
|
heap
|
page read and write
|
||
1E246E02000
|
unkown
|
page read and write
|
||
220C000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
452000
|
remote allocation
|
page execute and read and write
|
||
4F8E000
|
trusted library allocation
|
page read and write
|
||
2090E43B000
|
unkown
|
page read and write
|
||
686000
|
heap
|
page read and write
|
||
4F7B000
|
trusted library allocation
|
page read and write
|
||
2090E432000
|
unkown
|
page read and write
|
||
4DCC000
|
stack
|
page read and write
|
||
4E55000
|
heap
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
1E24BE00000
|
trusted library allocation
|
page read and write
|
||
1E24BD05000
|
unkown
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
27CD6583000
|
unkown
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
27E2000
|
trusted library allocation
|
page read and write
|
||
1E24BBE0000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
233E0270000
|
trusted library allocation
|
page read and write
|
||
62039FE000
|
stack
|
page read and write
|
||
1A2DB000
|
trusted library allocation
|
page read and write
|
||
7E90000
|
heap
|
page read and write
|
||
1A146000
|
trusted library allocation
|
page read and write
|
||
27CD59D0000
|
heap
|
page read and write
|
||
4F83000
|
trusted library allocation
|
page read and write
|
||
B71C7F9000
|
stack
|
page read and write
|
||
4FBF000
|
trusted library allocation
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
66FE000
|
trusted library allocation
|
page read and write
|
||
1E246600000
|
unkown
|
page read and write
|
||
605000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
B71C3FA000
|
stack
|
page read and write
|
||
4FBF000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
6DDE000
|
stack
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
2090E400000
|
unkown
|
page read and write
|
||
27CD6A62000
|
unkown
|
page read and write
|
||
27CD65A1000
|
unkown
|
page read and write
|
||
4FBF000
|
trusted library allocation
|
page read and write
|
||
1C5F9960000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1FA22DB0000
|
remote allocation
|
page read and write
|
||
2090E457000
|
unkown
|
page read and write
|
||
220D000
|
trusted library allocation
|
page read and write
|
||
4FC8000
|
trusted library allocation
|
page read and write
|
||
1A146000
|
trusted library allocation
|
page read and write
|
||
27E8000
|
trusted library allocation
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
221A000
|
trusted library allocation
|
page read and write
|
||
4FAD000
|
trusted library allocation
|
page read and write
|
||
CE445FB000
|
stack
|
page read and write
|
||
4FAE000
|
trusted library allocation
|
page read and write
|
||
6700000
|
trusted library allocation
|
page read and write
|
||
7170000
|
remote allocation
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
4F83000
|
trusted library allocation
|
page read and write
|
||
4F86000
|
trusted library allocation
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
27E5000
|
trusted library allocation
|
page read and write
|
||
4FC1000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
27CD5C29000
|
unkown
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
21B0000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
26E0000
|
heap
|
page read and write
|
||
1E246678000
|
unkown
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1E247A33000
|
trusted library allocation
|
page read and write
|
||
1A2DF000
|
trusted library allocation
|
page read and write
|
||
76C0000
|
unkown
|
page read and write
|
||
4FBE000
|
trusted library allocation
|
page read and write
|
||
4F7E000
|
trusted library allocation
|
page read and write
|
||
1CDE1713000
|
unkown
|
page read and write
|
||
2460C28C000
|
unkown
|
page read and write
|
||
1FA22CE0000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
4C0F000
|
stack
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
233DE859000
|
unkown
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
1CDE1650000
|
unkown
|
page read and write
|
||
629000
|
heap
|
page read and write
|
||
2214000
|
trusted library allocation
|
page read and write
|
||
6CBD000
|
stack
|
page read and write
|
||
CE447FF000
|
stack
|
page read and write
|
||
22F0000
|
trusted library allocation
|
page read and write
|
||
4FC6000
|
trusted library allocation
|
page read and write
|
||
7E87000
|
heap
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
27E8000
|
trusted library allocation
|
page read and write
|
||
1FDABD4F000
|
heap
|
page read and write
|
||
27CD658A000
|
unkown
|
page read and write
|
||
1A030000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
27E6000
|
trusted library allocation
|
page read and write
|
||
1A2DB000
|
trusted library allocation
|
page read and write
|
||
26909C00000
|
unkown
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
41D000
|
unkown
|
page write copy
|
||
B37000
|
heap
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
6713000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
16A57702000
|
unkown
|
page read and write
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
1E246DF0000
|
trusted library section
|
page readonly
|
||
7EB0000
|
heap
|
page read and write
|
||
1E24BF40000
|
remote allocation
|
page read and write
|
||
1FA22F02000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
27CD5C53000
|
unkown
|
page read and write
|
||
4F7C000
|
trusted library allocation
|
page read and write
|
||
28D3000
|
trusted library allocation
|
page read and write
|
||
27CD65A0000
|
unkown
|
page read and write
|
||
6F2E000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
4F95000
|
trusted library allocation
|
page read and write
|
||
4FC8000
|
trusted library allocation
|
page read and write
|
||
279F000
|
stack
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
233DE869000
|
unkown
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
2156000
|
trusted library allocation
|
page execute and read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
233E02B0000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
27CD6A02000
|
unkown
|
page read and write
|
||
2460C200000
|
unkown
|
page read and write
|
||
1E24BCED000
|
unkown
|
page read and write
|
||
27CD65A1000
|
unkown
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
B1E00F8000
|
stack
|
page read and write
|
||
B3D000
|
heap
|
page read and write
|
||
B71C87E000
|
stack
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
1A2DB000
|
trusted library allocation
|
page read and write
|
||
1A2DF000
|
trusted library allocation
|
page read and write
|
||
7EA0000
|
heap
|
page read and write
|
||
233DE82A000
|
unkown
|
page read and write
|
||
1E2466A2000
|
unkown
|
page read and write
|
||
1A2DF000
|
trusted library allocation
|
page read and write
|
||
B1A000
|
trusted library allocation
|
page execute and read and write
|
||
1E24BC40000
|
unkown
|
page read and write
|
||
1CDE164B000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F95000
|
trusted library allocation
|
page read and write
|
||
2090E310000
|
heap
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
1FDABD61000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
530000
|
trusted library allocation
|
page read and write
|
||
4FB5000
|
trusted library allocation
|
page read and write
|
||
1CDE163C000
|
unkown
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
1E247A30000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
26E1000
|
heap
|
page read and write
|
||
2460C1A0000
|
unkown
|
page read and write
|
||
2460C24F000
|
unkown
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
27CD5CD6000
|
unkown
|
page read and write
|
||
7EAA000
|
heap
|
page read and write
|
||
27CD5CA7000
|
unkown
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
693E000
|
stack
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
1C5F9B02000
|
unkown
|
page read and write
|
||
4FC9000
|
trusted library allocation
|
page read and write
|
||
26E1000
|
heap
|
page read and write
|
||
1A2DB000
|
trusted library allocation
|
page read and write
|
||
27E6000
|
trusted library allocation
|
page read and write
|
||
4FBE000
|
trusted library allocation
|
page read and write
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
16A5768A000
|
unkown
|
page read and write
|
||
2090E413000
|
unkown
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
7D7E000
|
stack
|
page read and write
|
||
4F87000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
555000
|
heap
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
6DB6F7D000
|
stack
|
page read and write
|
||
27CD5C56000
|
unkown
|
page read and write
|
||
2460C030000
|
heap
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
27CD65D3000
|
unkown
|
page read and write
|
||
221C000
|
trusted library allocation
|
page read and write
|
||
9200AFB000
|
stack
|
page read and write
|
||
27CD658F000
|
unkown
|
page read and write
|
||
4F76000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
CE446F7000
|
stack
|
page read and write
|
||
58E000
|
stack
|
page read and write
|
||
4FBF000
|
trusted library allocation
|
page read and write
|
||
4F83000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
26909C53000
|
unkown
|
page read and write
|
||
27E7000
|
trusted library allocation
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
1FA22DB0000
|
remote allocation
|
page read and write
|
||
7D40000
|
trusted library allocation
|
page read and write
|
||
1A030000
|
trusted library allocation
|
page read and write
|
||
1E246693000
|
unkown
|
page read and write
|
||
27CD65A1000
|
unkown
|
page read and write
|
||
1E24BF40000
|
remote allocation
|
page read and write
|
||
1E246700000
|
unkown
|
page read and write
|
||
1A030000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
trusted library allocation
|
page read and write
|
||
4FB6000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page read and write
|
||
221C000
|
trusted library allocation
|
page read and write
|
||
27E7000
|
trusted library allocation
|
page read and write
|
||
2090E44E000
|
unkown
|
page read and write
|
||
62038FF000
|
stack
|
page read and write
|
||
27CD6587000
|
unkown
|
page read and write
|
||
1A146000
|
trusted library allocation
|
page read and write
|
||
29B9000
|
trusted library allocation
|
page read and write
|
||
233DE813000
|
unkown
|
page read and write
|
||
27CD6587000
|
unkown
|
page read and write
|
||
4F77000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
1E24BCFD000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
7E82AFD000
|
stack
|
page read and write
|
||
27CD5C4B000
|
unkown
|
page read and write
|
||
16A5764A000
|
unkown
|
page read and write
|
||
16A57670000
|
unkown
|
page read and write
|
||
1E24BE0E000
|
trusted library allocation
|
page read and write
|
||
1E247A40000
|
trusted library allocation
|
page read and write
|
||
27CD6589000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
6748000
|
trusted library allocation
|
page read and write
|
||
29B2000
|
trusted library allocation
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
233DE780000
|
unkown
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
7A5AFE000
|
stack
|
page read and write
|
||
72FE000
|
stack
|
page read and write
|
||
221A000
|
trusted library allocation
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
1DE29DD000
|
stack
|
page read and write
|
||
1E246DB0000
|
trusted library section
|
page readonly
|
||
221A000
|
trusted library allocation
|
page read and write
|
||
5AF000
|
heap
|
page read and write
|
||
4FBF000
|
trusted library allocation
|
page read and write
|
||
28DE000
|
trusted library allocation
|
page read and write
|
||
4FC5000
|
trusted library allocation
|
page read and write
|
||
6DB6AFE000
|
stack
|
page read and write
|
||
27CD5CA0000
|
unkown
|
page read and write
|
||
1FDABD4F000
|
heap
|
page read and write
|
||
26909D13000
|
unkown
|
page read and write
|
||
1A2DF000
|
trusted library allocation
|
page read and write
|
||
26909AF0000
|
heap
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
299F000
|
stack
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1E24BBF0000
|
trusted library allocation
|
page read and write
|
||
2150000
|
trusted library allocation
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
1E246F13000
|
unkown
|
page read and write
|
||
41D000
|
unkown
|
page read and write
|
||
1E24BC4D000
|
unkown
|
page read and write
|
||
4F83000
|
trusted library allocation
|
page read and write
|
||
199000
|
stack
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
1E24BC87000
|
unkown
|
page read and write
|
||
2260000
|
heap
|
page read and write
|
||
27CD65C3000
|
unkown
|
page read and write
|
||
1CDE1679000
|
unkown
|
page read and write
|
||
2090E47E000
|
unkown
|
page read and write
|
||
26909A80000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
90E000
|
stack
|
page read and write
|
||
C7497FF000
|
stack
|
page read and write
|
||
27CD6402000
|
unkown
|
page read and write
|
||
77FC000
|
stack
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
27CD5CC4000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
221C000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1E2466B1000
|
unkown
|
page read and write
|
||
60D000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
544000
|
heap
|
page read and write
|
||
A53000
|
heap
|
page read and write
|
||
4F7F000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
4F83000
|
trusted library allocation
|
page read and write
|
||
66EF000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
4F83000
|
trusted library allocation
|
page read and write
|
||
4FAE000
|
trusted library allocation
|
page read and write
|
||
4F85000
|
trusted library allocation
|
page read and write
|
||
1E246658000
|
unkown
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
233DE7D0000
|
remote allocation
|
page read and write
|
||
2460C313000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1A030000
|
trusted library allocation
|
page read and write
|
||
26909D00000
|
unkown
|
page read and write
|
||
4F7C000
|
trusted library allocation
|
page read and write
|
||
233DE913000
|
unkown
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
27CD65C5000
|
unkown
|
page read and write
|
||
221A000
|
trusted library allocation
|
page read and write
|
||
B3D000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
7AA0000
|
trusted library section
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
C749879000
|
stack
|
page read and write
|
||
6DB6BFE000
|
stack
|
page read and write
|
||
26909C5D000
|
unkown
|
page read and write
|
||
71AE000
|
stack
|
page read and write
|
||
2090E45F000
|
unkown
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
4F85000
|
trusted library allocation
|
page read and write
|
||
233DE858000
|
unkown
|
page read and write
|
||
B1E047E000
|
stack
|
page read and write
|
||
4FC5000
|
trusted library allocation
|
page read and write
|
||
220C000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1E24663E000
|
unkown
|
page read and write
|
||
B1E0578000
|
stack
|
page read and write
|
||
1E24BE24000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
2090E466000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
2337000
|
heap
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
2090E47A000
|
unkown
|
page read and write
|
||
27E8000
|
trusted library allocation
|
page read and write
|
||
27CD6588000
|
unkown
|
page read and write
|
||
2090E45A000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
27CD6510000
|
unkown
|
page read and write
|
||
24B7000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
699000
|
heap
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
27CD5C82000
|
unkown
|
page read and write
|
||
233DE7A0000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
1FDABD36000
|
heap
|
page read and write
|
||
1C5F9A5A000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
27CD654F000
|
unkown
|
page read and write
|
||
C74997C000
|
stack
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1C5F9A00000
|
unkown
|
page read and write
|
||
1E246F00000
|
unkown
|
page read and write
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
243F000
|
stack
|
page read and write
|
||
1E246440000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1E24BE24000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2460C24C000
|
unkown
|
page read and write
|
||
1FDABD46000
|
heap
|
page read and write
|
||
17E000
|
stack
|
page read and write
|
||
2460C229000
|
unkown
|
page read and write
|
||
4FC6000
|
trusted library allocation
|
page read and write
|
||
1E24668E000
|
unkown
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
1A030000
|
trusted library allocation
|
page read and write
|
||
1C5F99F0000
|
unkown
|
page read and write
|
||
2460C276000
|
unkown
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
2152000
|
trusted library allocation
|
page read and write
|
||
920097B000
|
stack
|
page read and write
|
||
76D0000
|
trusted library allocation
|
page read and write
|
||
1A146000
|
trusted library allocation
|
page read and write
|
||
16A57DA0000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1DE295E000
|
stack
|
page read and write
|
||
1E246673000
|
unkown
|
page read and write
|
||
28D2000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F8A000
|
trusted library allocation
|
page read and write
|
||
233DE802000
|
unkown
|
page read and write
|
||
65E000
|
stack
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
233DE849000
|
unkown
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1E24BCA9000
|
unkown
|
page read and write
|
||
4F7D000
|
trusted library allocation
|
page read and write
|
||
85F000
|
stack
|
page read and write
|
||
221A000
|
trusted library allocation
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4E3C000
|
stack
|
page read and write
|
||
1DE307F000
|
stack
|
page read and write
|
||
233DE6E0000
|
heap
|
page read and write
|
||
605000
|
heap
|
page read and write
|
||
1E247101000
|
trusted library allocation
|
page read and write
|
||
27CD65B0000
|
unkown
|
page read and write
|
||
27CD63A0000
|
remote allocation
|
page read and write
|
||
26909C3C000
|
unkown
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
233DE7D0000
|
remote allocation
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
2090E2B0000
|
heap
|
page read and write
|
||
27CD659F000
|
unkown
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
2090E502000
|
unkown
|
page read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
CE441BF000
|
stack
|
page read and write
|
||
221A000
|
trusted library allocation
|
page read and write
|
||
27CD6589000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1E2475F0000
|
trusted library allocation
|
page read and write
|
||
7E82DFF000
|
stack
|
page read and write
|
||
1FDABD2B000
|
heap
|
page read and write
|
||
9EC000
|
heap
|
page read and write
|
||
216A000
|
trusted library allocation
|
page execute and read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
4FC6000
|
trusted library allocation
|
page read and write
|
||
221C000
|
trusted library allocation
|
page read and write
|
||
1CDE1654000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F83000
|
trusted library allocation
|
page read and write
|
||
1CDE168A000
|
unkown
|
page read and write
|
||
520000
|
trusted library allocation
|
page read and write
|
||
28E1000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
27E6000
|
trusted library allocation
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
B1E05FF000
|
unkown
|
page read and write
|
||
7FE50000
|
trusted library allocation
|
page execute and read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
702F000
|
stack
|
page read and write
|
||
2090E460000
|
unkown
|
page read and write
|
||
7E829FE000
|
stack
|
page read and write
|
||
1E24BBE0000
|
trusted library allocation
|
page read and write
|
||
1A146000
|
trusted library allocation
|
page read and write
|
||
233DE902000
|
unkown
|
page read and write
|
||
1E24BD00000
|
unkown
|
page read and write
|
||
66A000
|
heap
|
page read and write
|
||
1C5F9B13000
|
unkown
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
1E24BE21000
|
trusted library allocation
|
page read and write
|
||
1E24BC61000
|
unkown
|
page read and write
|
||
7E7D000
|
stack
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
27CD6A02000
|
unkown
|
page read and write
|
||
4FBE000
|
trusted library allocation
|
page read and write
|
||
7E830FF000
|
stack
|
page read and write
|
||
27CD658E000
|
unkown
|
page read and write
|
||
1A030000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
27CD6A43000
|
unkown
|
page read and write
|
||
1E246629000
|
unkown
|
page read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
B71BB9B000
|
stack
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
27CD65B0000
|
unkown
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
1E24BBF0000
|
trusted library allocation
|
page read and write
|
||
4FAE000
|
trusted library allocation
|
page read and write
|
||
1A1C0000
|
trusted library allocation
|
page read and write
|
||
6203AFC000
|
stack
|
page read and write
|
||
2090E469000
|
unkown
|
page read and write
|
||
1E246691000
|
unkown
|
page read and write
|
||
1E24BC89000
|
unkown
|
page read and write
|
||
27CD659D000
|
unkown
|
page read and write
|
||
27CD65A1000
|
unkown
|
page read and write
|
||
27CD6588000
|
unkown
|
page read and write
|
||
2214000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1E24BC2F000
|
unkown
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
27CD5A40000
|
heap
|
page read and write
|
||
4FC7000
|
trusted library allocation
|
page read and write
|
||
21E0000
|
heap
|
page read and write
|
||
4F87000
|
trusted library allocation
|
page read and write
|
||
27CD5CBE000
|
unkown
|
page read and write
|
||
27E8000
|
trusted library allocation
|
page read and write
|
||
B12000
|
trusted library allocation
|
page execute and read and write
|
||
1A2DF000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
621000
|
heap
|
page read and write
|
||
4F86000
|
trusted library allocation
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
2219000
|
trusted library allocation
|
page read and write
|
||
233DE848000
|
unkown
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
27CD65C0000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
27CD6593000
|
unkown
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
95F000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
2090E474000
|
unkown
|
page read and write
|
||
26909BF0000
|
unkown
|
page read and write
|
||
4F74000
|
trusted library allocation
|
page read and write
|
||
1A2DB000
|
trusted library allocation
|
page read and write
|
||
1CDE1647000
|
unkown
|
page read and write
|
||
16A5764B000
|
unkown
|
page read and write
|
||
1A146000
|
trusted library allocation
|
page read and write
|
||
27CD6593000
|
unkown
|
page read and write
|
||
1FDABC10000
|
heap
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
4F84000
|
trusted library allocation
|
page read and write
|
||
4FBF000
|
trusted library allocation
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
1E24BA40000
|
trusted library allocation
|
page read and write
|
||
2190000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2311000
|
trusted library allocation
|
page read and write
|
||
7BF0000
|
trusted library section
|
page read and write
|
||
28D3000
|
trusted library allocation
|
page read and write
|
||
4FA3000
|
trusted library allocation
|
page read and write
|
||
27CD6591000
|
unkown
|
page read and write
|
||
7E82BFE000
|
stack
|
page read and write
|
||
2221000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
29C9000
|
trusted library allocation
|
page read and write
|
||
27CD5D08000
|
unkown
|
page read and write
|
||
4F8C000
|
trusted library allocation
|
page read and write
|
||
217B000
|
trusted library allocation
|
page execute and read and write
|
||
16A5764E000
|
unkown
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
7AB0000
|
trusted library allocation
|
page read and write
|
||
27E7000
|
trusted library allocation
|
page read and write
|
||
2177000
|
trusted library allocation
|
page execute and read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
1E24BC14000
|
unkown
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
2220000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
7E82CFF000
|
stack
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
27CD659F000
|
unkown
|
page read and write
|
||
1A2DF000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
4AA2000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
27CD5CF3000
|
unkown
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
1E24BBF0000
|
trusted library allocation
|
page read and write
|
||
4F86000
|
trusted library allocation
|
page read and write
|
||
1E24BF10000
|
trusted library allocation
|
page read and write
|
||
27CD6B02000
|
unkown
|
page read and write
|
||
72AF000
|
stack
|
page read and write
|
||
1E24BF40000
|
remote allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1E24BCE2000
|
unkown
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
16A57500000
|
heap
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
1C5FA402000
|
unkown
|
page read and write
|
||
221C000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
1C5F9A23000
|
unkown
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
B1E0377000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
16A5764F000
|
unkown
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
26909C5D000
|
unkown
|
page read and write
|
||
4FC2000
|
trusted library allocation
|
page read and write
|
||
27CD65C0000
|
unkown
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
2162000
|
trusted library allocation
|
page execute and read and write
|
||
4F7F000
|
trusted library allocation
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
2214000
|
trusted library allocation
|
page read and write
|
||
16A5763C000
|
unkown
|
page read and write
|
||
2090E440000
|
unkown
|
page read and write
|
||
27CD6587000
|
unkown
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
1E24BC00000
|
unkown
|
page read and write
|
||
1FA23802000
|
unkown
|
page read and write
|
||
2090E483000
|
unkown
|
page read and write
|
||
5F8000
|
heap
|
page read and write
|
||
2090EC02000
|
unkown
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
1CDE167F000
|
unkown
|
page read and write
|
||
2090E43D000
|
unkown
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
6AF000
|
heap
|
page read and write
|
||
CE444FB000
|
stack
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
B3D000
|
heap
|
page read and write
|
||
1CDE1600000
|
unkown
|
page read and write
|
||
2460C300000
|
unkown
|
page read and write
|
||
1FA22DB0000
|
remote allocation
|
page read and write
|
||
838D5EB000
|
stack
|
page read and write
|
||
27E6000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
221C000
|
trusted library allocation
|
page read and write
|
||
76FD000
|
stack
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
6717000
|
trusted library allocation
|
page read and write
|
||
2460C26F000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
7170000
|
remote allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1FDABD20000
|
heap
|
page read and write
|
||
2460C22C000
|
unkown
|
page read and write
|
||
7170000
|
remote allocation
|
page read and write
|
||
222A000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
2460C308000
|
unkown
|
page read and write
|
||
220D000
|
trusted library allocation
|
page read and write
|
||
1C5F9A62000
|
unkown
|
page read and write
|
||
2231000
|
trusted library allocation
|
page read and write
|
||
B71C4FB000
|
stack
|
page read and write
|
||
26909C81000
|
unkown
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
78C000
|
stack
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
66C0000
|
trusted library allocation
|
page read and write
|
||
27CD5D02000
|
unkown
|
page read and write
|
||
B71C6FF000
|
stack
|
page read and write
|
||
26909C49000
|
unkown
|
page read and write
|
||
676F000
|
trusted library allocation
|
page read and write
|
||
27E8000
|
trusted library allocation
|
page read and write
|
||
26909A90000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
1E246713000
|
unkown
|
page read and write
|
||
55E000
|
stack
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
1C5F99C0000
|
heap
|
page read and write
|
||
221D000
|
trusted library allocation
|
page read and write
|
||
59E000
|
stack
|
page read and write
|
||
1E246F59000
|
unkown
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
1DE2F77000
|
stack
|
page read and write
|
||
220D000
|
trusted library allocation
|
page read and write
|
||
4F7C000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1E246702000
|
unkown
|
page read and write
|
||
4F95000
|
trusted library allocation
|
page read and write
|
||
4F7F000
|
trusted library allocation
|
page read and write
|
||
27CD6587000
|
unkown
|
page read and write
|
||
1FDABD31000
|
heap
|
page read and write
|
||
1E24BD02000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
B3D000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
C74967A000
|
stack
|
page read and write
|
||
7A518B000
|
stack
|
page read and write
|
||
2090E467000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
27CD65C5000
|
unkown
|
page read and write
|
||
4F74000
|
trusted library allocation
|
page read and write
|
||
1A030000
|
trusted library allocation
|
page read and write
|
||
4F85000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
1E246613000
|
unkown
|
page read and write
|
||
4FB5000
|
trusted library allocation
|
page read and write
|
||
68FF000
|
stack
|
page read and write
|
||
27CD6A02000
|
unkown
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
B03000
|
trusted library allocation
|
page read and write
|
||
4FBE000
|
trusted library allocation
|
page read and write
|
||
7A55FC000
|
stack
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
27CD65A1000
|
unkown
|
page read and write
|
||
16A57651000
|
unkown
|
page read and write
|
||
1A146000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1FDABD66000
|
heap
|
page read and write
|
||
B71C9FA000
|
stack
|
page read and write
|
||
60E000
|
stack
|
page read and write
|
||
41D000
|
unkown
|
page write copy
|
||
1C0000
|
remote allocation
|
page read and write
|
||
500000
|
trusted library allocation
|
page read and write
|
||
2460C040000
|
heap
|
page read and write
|
||
2214000
|
trusted library allocation
|
page read and write
|
||
6DB65BB000
|
stack
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1FDABC30000
|
heap
|
page read and write
|
||
4F85000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
4F86000
|
trusted library allocation
|
page read and write
|
||
4F74000
|
trusted library allocation
|
page read and write
|
||
16A57708000
|
unkown
|
page read and write
|
||
4FC1000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
2210000
|
trusted library allocation
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
2460C258000
|
unkown
|
page read and write
|
||
AF0000
|
trusted library section
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
9200DFF000
|
stack
|
page read and write
|
||
27CD659E000
|
unkown
|
page read and write
|
||
2330000
|
heap
|
page read and write
|
||
2460C257000
|
unkown
|
page read and write
|
||
92005BE000
|
stack
|
page read and write
|
||
28E3000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
1A030000
|
trusted library allocation
|
page read and write
|
||
7A58FD000
|
stack
|
page read and write
|
||
1E24BEF0000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
221A000
|
trusted library allocation
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
16A57713000
|
unkown
|
page read and write
|
||
716E000
|
stack
|
page read and write
|
||
220D000
|
trusted library allocation
|
page read and write
|
||
4F8A000
|
trusted library allocation
|
page read and write
|
||
233DE7D0000
|
remote allocation
|
page read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
1CDE1702000
|
unkown
|
page read and write
|
||
27CD65A6000
|
unkown
|
page read and write
|
||
26909C24000
|
unkown
|
page read and write
|
||
73FF000
|
stack
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
2090E459000
|
unkown
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
2460C259000
|
unkown
|
page read and write
|
||
4F8A000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
B71CBFF000
|
stack
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
2460C0A0000
|
heap
|
page read and write
|
||
2460C247000
|
unkown
|
page read and write
|
||
16A574A0000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1E24BCFB000
|
unkown
|
page read and write
|
||
2090E445000
|
unkown
|
page read and write
|
||
530000
|
trusted library allocation
|
page read and write
|
||
7A54FE000
|
stack
|
page read and write
|
||
6CE0000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
9EE000
|
heap
|
page read and write
|
||
4F7B000
|
trusted library allocation
|
page read and write
|
||
27CD5C70000
|
unkown
|
page read and write
|
||
1E24BCDC000
|
unkown
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1E246DD0000
|
trusted library section
|
page readonly
|
||
60E0000
|
trusted library allocation
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
598000
|
heap
|
page read and write
|
||
2240000
|
heap
|
page execute and read and write
|
||
2460C213000
|
unkown
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
27CD6569000
|
unkown
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
220C000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
27E9000
|
trusted library allocation
|
page read and write
|
||
221A000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1FA22D80000
|
unkown
|
page read and write
|
||
CE440BB000
|
stack
|
page read and write
|
||
4F7D000
|
trusted library allocation
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
838DAFE000
|
stack
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
A0F000
|
stack
|
page read and write
|
||
1E246697000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
221A000
|
trusted library allocation
|
page read and write
|
||
9EC000
|
heap
|
page read and write
|
||
4FBF000
|
trusted library allocation
|
page read and write
|
||
1E24BEB0000
|
trusted library allocation
|
page read and write
|
||
4F88000
|
trusted library allocation
|
page read and write
|
||
1A2DF000
|
trusted library allocation
|
page read and write
|
||
221D000
|
trusted library allocation
|
page read and write
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
1DE2CFB000
|
stack
|
page read and write
|
||
1FDABD42000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
838DCFE000
|
stack
|
page read and write
|
||
24B0000
|
heap
|
page read and write
|
||
1E24BC22000
|
unkown
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
2460C281000
|
unkown
|
page read and write
|
||
27E7000
|
trusted library allocation
|
page read and write
|
||
7E826FB000
|
stack
|
page read and write
|
||
671B000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
trusted library allocation
|
page read and write
|
||
4FAD000
|
trusted library allocation
|
page read and write
|
||
4F88000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page execute and read and write
|
||
B1E0277000
|
stack
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
198000
|
stack
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
6202000
|
trusted library allocation
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
219E000
|
stack
|
page read and write
|
||
2170000
|
trusted library allocation
|
page read and write
|
||
1E24BCF9000
|
unkown
|
page read and write
|
||
602000
|
heap
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
27CD6565000
|
unkown
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
578000
|
heap
|
page read and write
|
||
9EE000
|
heap
|
page read and write
|
||
4F86000
|
trusted library allocation
|
page read and write
|
||
6DB6D7E000
|
stack
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
1CDE1490000
|
heap
|
page read and write
|
||
27CD6500000
|
unkown
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4FAC000
|
trusted library allocation
|
page read and write
|
||
233DE6F0000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
233DE859000
|
unkown
|
page read and write
|
||
4FBF000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
2090EBB0000
|
unkown
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
27CD5C00000
|
unkown
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
C7496FF000
|
stack
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
4F7F000
|
trusted library allocation
|
page read and write
|
||
2090E458000
|
unkown
|
page read and write
|
||
4F74000
|
trusted library allocation
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
B71BFF7000
|
stack
|
page read and write
|
||
9EC000
|
heap
|
page read and write
|
||
4FC6000
|
trusted library allocation
|
page read and write
|
||
1CDE1DA0000
|
unkown
|
page read and write
|
||
27CD65D1000
|
unkown
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
6726000
|
trusted library allocation
|
page read and write
|
||
6DB6A7F000
|
stack
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
221A000
|
trusted library allocation
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
224B000
|
heap
|
page execute and read and write
|
||
27CD6597000
|
unkown
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page execute and read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
27CD5CDE000
|
unkown
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
1A1C0000
|
trusted library allocation
|
page read and write
|
||
41D000
|
unkown
|
page write copy
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
2090E461000
|
unkown
|
page read and write
|
||
1E24BAD0000
|
trusted library allocation
|
page read and write
|
||
27CD63B0000
|
unkown
|
page read and write
|
||
4F7F000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
27CD6593000
|
unkown
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
27E3000
|
trusted library allocation
|
page read and write
|
||
1CDE1E02000
|
unkown
|
page read and write
|
||
1E2463E0000
|
heap
|
page read and write
|
||
26909C70000
|
unkown
|
page read and write
|
||
6A7D000
|
stack
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
2090E2A0000
|
heap
|
page read and write
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
2090E463000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
221D000
|
trusted library allocation
|
page read and write
|
||
27CD5CEA000
|
unkown
|
page read and write
|
||
2090E429000
|
unkown
|
page read and write
|
||
27CD5C4E000
|
unkown
|
page read and write
|
||
B71C1FB000
|
stack
|
page read and write
|
||
28D3000
|
trusted library allocation
|
page read and write
|
||
27CD659D000
|
unkown
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
2090E479000
|
unkown
|
page read and write
|
||
6A3F000
|
stack
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1C5F9A29000
|
unkown
|
page read and write
|
||
B3D000
|
heap
|
page read and write
|
||
B71C8FE000
|
stack
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
26909C76000
|
unkown
|
page read and write
|
||
233E0402000
|
unkown
|
page read and write
|
||
233DE840000
|
unkown
|
page read and write
|
||
1E246E00000
|
unkown
|
page read and write
|
||
27CD6B00000
|
unkown
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
1E24BE08000
|
trusted library allocation
|
page read and write
|
||
682000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
27E9000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F7D000
|
trusted library allocation
|
page read and write
|
||
27CD5D16000
|
unkown
|
page read and write
|
||
4C64000
|
heap
|
page read and write
|
||
27CD659F000
|
unkown
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
1FA22D50000
|
heap
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
289F000
|
stack
|
page read and write
|
||
B1DFBFC000
|
stack
|
page read and write
|
||
2090E447000
|
unkown
|
page read and write
|
||
233DE750000
|
heap
|
page read and write
|
||
920087E000
|
stack
|
page read and write
|
||
4F85000
|
trusted library allocation
|
page read and write
|
||
6CA000
|
heap
|
page read and write
|
||
27E3000
|
trusted library allocation
|
page read and write
|
||
27CD6A02000
|
unkown
|
page read and write
|
||
B71C0FD000
|
stack
|
page read and write
|
||
7E82EFF000
|
stack
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
1FDABD47000
|
heap
|
page read and write
|
||
1E24BF00000
|
trusted library allocation
|
page read and write
|
||
4F7D000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
27CD659D000
|
unkown
|
page read and write
|
||
7E828FD000
|
stack
|
page read and write
|
||
16A5767F000
|
unkown
|
page read and write
|
||
4F78000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
B1DFE7E000
|
stack
|
page read and write
|
||
545000
|
heap
|
page read and write
|
||
1C5F9A70000
|
unkown
|
page read and write
|
||
27CD6A62000
|
unkown
|
page read and write
|
||
6DB697E000
|
stack
|
page read and write
|
||
1E24BCF3000
|
unkown
|
page read and write
|
||
1E24BF20000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1E246F02000
|
unkown
|
page read and write
|
||
1E246DC0000
|
trusted library section
|
page readonly
|
||
1FDABD66000
|
heap
|
page read and write
|
||
4FB6000
|
trusted library allocation
|
page read and write
|
||
2460C246000
|
unkown
|
page read and write
|
||
1C5F9A78000
|
unkown
|
page read and write
|
||
2460C24B000
|
unkown
|
page read and write
|
||
6BBE000
|
stack
|
page read and write
|
||
7A56FB000
|
stack
|
page read and write
|
||
6D10000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
8BF000
|
stack
|
page read and write
|
||
16A5764C000
|
unkown
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
26909C13000
|
unkown
|
page read and write
|
||
1A2DB000
|
trusted library allocation
|
page read and write
|
||
1C5F9950000
|
heap
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
1FA22E56000
|
unkown
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
27CD63A0000
|
remote allocation
|
page read and write
|
||
620347B000
|
stack
|
page read and write
|
||
4F83000
|
trusted library allocation
|
page read and write
|
||
1E246540000
|
unkown
|
page read and write
|
||
2090E477000
|
unkown
|
page read and write
|
||
6203DFC000
|
stack
|
page read and write
|
||
29C1000
|
trusted library allocation
|
page read and write
|
||
52E000
|
stack
|
page read and write
|
||
CE448FF000
|
stack
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
1E24BE00000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
67D000
|
stack
|
page read and write
|
||
409000
|
unkown
|
page write copy
|
||
220D000
|
stack
|
page read and write
|
||
CE4413F000
|
stack
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
27CD6A00000
|
unkown
|
page read and write
|
||
16A57490000
|
heap
|
page read and write
|
||
1A146000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1E2463D0000
|
heap
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
544000
|
heap
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
1E2466A4000
|
unkown
|
page read and write
|
||
1A2DB000
|
trusted library allocation
|
page read and write
|
||
27CD5C6E000
|
unkown
|
page read and write
|
||
1FDABCB0000
|
heap
|
page read and write
|
||
1A1C0000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
27CD5C27000
|
unkown
|
page read and write
|
||
7C18000
|
trusted library allocation
|
page read and write
|
||
221C000
|
trusted library allocation
|
page read and write
|
||
4FC6000
|
trusted library allocation
|
page read and write
|
||
B71C2FF000
|
stack
|
page read and write
|
||
16A57E02000
|
unkown
|
page read and write
|
||
1A146000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
6722000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
16A57629000
|
unkown
|
page read and write
|
||
2690A402000
|
unkown
|
page read and write
|
||
1E24BA50000
|
trusted library allocation
|
page read and write
|
||
2090E45C000
|
unkown
|
page read and write
|
||
28E3000
|
trusted library allocation
|
page read and write
|
||
41D000
|
unkown
|
page write copy
|
||
2090E464000
|
unkown
|
page read and write
|
||
4F87000
|
trusted library allocation
|
page read and write
|
||
16A57602000
|
unkown
|
page read and write
|
||
27CD5C13000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1CDE1684000
|
unkown
|
page read and write
|
||
4F7F000
|
trusted library allocation
|
page read and write
|
||
233DE800000
|
unkown
|
page read and write
|
||
4FC5000
|
trusted library allocation
|
page read and write
|
||
1CDE14A0000
|
heap
|
page read and write
|
||
16A57600000
|
unkown
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
698000
|
heap
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
27CD6585000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1CDE1500000
|
heap
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
1FDABD44000
|
heap
|
page read and write
|
||
7A57F7000
|
stack
|
page read and write
|
||
27E8000
|
trusted library allocation
|
page read and write
|
||
1E24667C000
|
unkown
|
page read and write
|
||
1FA22E29000
|
unkown
|
page read and write
|
||
221C000
|
trusted library allocation
|
page read and write
|
||
220C000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
4F7E000
|
trusted library allocation
|
page read and write
|
||
2290000
|
heap
|
page read and write
|
||
27E8000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
1A1C0000
|
trusted library allocation
|
page read and write
|
||
21BE000
|
stack
|
page read and write
|
||
2214000
|
trusted library allocation
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
1C0000
|
remote allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1A1C0000
|
trusted library allocation
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
1FDABD4F000
|
heap
|
page read and write
|
||
27CD5C3C000
|
unkown
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
4F8C000
|
trusted library allocation
|
page read and write
|
||
27CD6587000
|
unkown
|
page read and write
|
||
7E822FB000
|
stack
|
page read and write
|
||
27CD659F000
|
unkown
|
page read and write
|
||
7A547E000
|
stack
|
page read and write
|
||
1E24BC54000
|
unkown
|
page read and write
|
||
1C5F9A40000
|
unkown
|
page read and write
|
||
7410000
|
trusted library allocation
|
page execute and read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
221A000
|
trusted library allocation
|
page read and write
|
||
1A2DB000
|
trusted library allocation
|
page read and write
|
||
1CDE164F000
|
unkown
|
page read and write
|
||
2090E442000
|
unkown
|
page read and write
|
||
4F8A000
|
trusted library allocation
|
page read and write
|
||
1FA22CF0000
|
heap
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
B71C57F000
|
stack
|
page read and write
|
||
2090E462000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
420000
|
unkown
|
page readonly
|
||
1E246DA0000
|
trusted library section
|
page readonly
|
||
1A1C0000
|
trusted library allocation
|
page read and write
|
||
2460C24D000
|
unkown
|
page read and write
|
||
4F82000
|
trusted library allocation
|
page read and write
|
||
2A70000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
3919000
|
trusted library allocation
|
page read and write
|
||
9ED000
|
heap
|
page read and write
|
||
4F7E000
|
trusted library allocation
|
page read and write
|
||
220D000
|
trusted library allocation
|
page read and write
|
||
41D000
|
unkown
|
page write copy
|
||
196000
|
stack
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
2300000
|
trusted library allocation
|
page execute and read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
27CD5CAF000
|
unkown
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
B1E017E000
|
stack
|
page read and write
|
||
1E24BD02000
|
unkown
|
page read and write
|
||
1E24BE20000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
27CD659F000
|
unkown
|
page read and write
|
||
B71C5FE000
|
stack
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
9200CFE000
|
stack
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page read and write
|
||
418000
|
remote allocation
|
page execute and read and write
|
||
9EE000
|
heap
|
page read and write
|
||
2258000
|
trusted library allocation
|
page read and write
|
||
26909D02000
|
unkown
|
page read and write
|
||
7800000
|
trusted library allocation
|
page read and write
|
||
220C000
|
trusted library allocation
|
page read and write
|
||
27CD6A02000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
920053B000
|
stack
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
838D8FE000
|
stack
|
page read and write
|
||
4FB5000
|
trusted library allocation
|
page read and write
|
||
4C40000
|
trusted library section
|
page readonly
|
||
620367C000
|
stack
|
page read and write
|
||
2090E47B000
|
unkown
|
page read and write
|
||
2090E441000
|
unkown
|
page read and write
|
||
1A1C0000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
4F7B000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1C5F9A13000
|
unkown
|
page read and write
|
||
B1DFEFD000
|
stack
|
page read and write
|
||
1DE317F000
|
stack
|
page read and write
|
||
1CDE1708000
|
unkown
|
page read and write
|
||
2214000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
1A2DF000
|
trusted library allocation
|
page read and write
|
||
1E246550000
|
trusted library section
|
page read and write
|
||
6DB6CFD000
|
stack
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
233DE849000
|
unkown
|
page read and write
|
||
222A000
|
trusted library allocation
|
page read and write
|
||
27CD6597000
|
unkown
|
page read and write
|
||
1FA22E13000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
A5D000
|
heap
|
page read and write
|
||
420000
|
unkown
|
page readonly
|
||
27CD5C88000
|
unkown
|
page read and write
|
||
2460C23C000
|
unkown
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
69E000
|
heap
|
page read and write
|
||
4F83000
|
trusted library allocation
|
page read and write
|
||
1A030000
|
trusted library allocation
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
26909C4E000
|
unkown
|
page read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
1E246F18000
|
unkown
|
page read and write
|
||
64E000
|
stack
|
page read and write
|
||
27E8000
|
trusted library allocation
|
page read and write
|
||
27CD6597000
|
unkown
|
page read and write
|
||
2160000
|
trusted library allocation
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
1CDE1613000
|
unkown
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
16A57649000
|
unkown
|
page read and write
|
||
1A1C0000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
28E5000
|
trusted library allocation
|
page read and write
|
||
6BE000
|
stack
|
page read and write
|
||
1DE2E7B000
|
stack
|
page read and write
|
||
27CD65A1000
|
unkown
|
page read and write
|
||
2214000
|
trusted library allocation
|
page read and write
|
||
4F7D000
|
trusted library allocation
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
4FC8000
|
trusted library allocation
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
27CD659D000
|
unkown
|
page read and write
|
||
1E246E15000
|
unkown
|
page read and write
|
||
27CD5CB1000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
220D000
|
trusted library allocation
|
page read and write
|
||
1FA22E02000
|
unkown
|
page read and write
|
||
6DB6E7D000
|
stack
|
page read and write
|
||
4F8A000
|
trusted library allocation
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
4F85000
|
trusted library allocation
|
page read and write
|
||
27CD65C1000
|
unkown
|
page read and write
|
||
4F7E000
|
trusted library allocation
|
page read and write
|
||
221A000
|
trusted library allocation
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
B71C67F000
|
stack
|
page read and write
|
||
27E8000
|
trusted library allocation
|
page read and write
|
||
1A2DB000
|
trusted library allocation
|
page read and write
|
||
27CD5D13000
|
unkown
|
page read and write
|
||
1FDABD64000
|
heap
|
page read and write
|
||
9EE000
|
heap
|
page read and write
|
||
21F0000
|
trusted library allocation
|
page read and write
|
||
4F95000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
1E24BAC0000
|
trusted library allocation
|
page read and write
|
||
221C000
|
trusted library allocation
|
page read and write
|
||
26909D08000
|
unkown
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
510000
|
trusted library allocation
|
page read and write
|
||
27CD659F000
|
unkown
|
page read and write
|
||
1CDE1700000
|
unkown
|
page read and write
|
||
4F7E000
|
trusted library allocation
|
page read and write
|
||
4F88000
|
trusted library allocation
|
page read and write
|
||
4FC6000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
7E82FFE000
|
stack
|
page read and write
|
||
1FA22E00000
|
unkown
|
page read and write
|
||
27CD65C5000
|
unkown
|
page read and write
|
||
418000
|
remote allocation
|
page execute and read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1E246F18000
|
unkown
|
page read and write
|
||
221A000
|
trusted library allocation
|
page read and write
|
||
1CDE1670000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
2460C255000
|
unkown
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
1E24BCA6000
|
unkown
|
page read and write
|
||
1E247A11000
|
trusted library allocation
|
page read and write
|
||
560000
|
trusted library section
|
page read and write
|
||
222A000
|
trusted library allocation
|
page read and write
|
||
4FAD000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
699000
|
heap
|
page read and write
|
||
4F83000
|
trusted library allocation
|
page read and write
|
||
2090E45E000
|
unkown
|
page read and write
|
||
6D00000
|
trusted library allocation
|
page read and write
|
||
2090E475000
|
unkown
|
page read and write
|
||
C74977F000
|
stack
|
page read and write
|
||
40B000
|
unkown
|
page read and write
|
||
27CD6513000
|
unkown
|
page read and write
|
||
1FDABD36000
|
heap
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
C7498FE000
|
stack
|
page read and write
|
||
2231000
|
trusted library allocation
|
page read and write
|
||
4F8C000
|
trusted library allocation
|
page read and write
|
||
233DE918000
|
unkown
|
page read and write
|
||
6203CFE000
|
stack
|
page read and write
|
||
2460C302000
|
unkown
|
page read and write
|
||
27CD65B2000
|
unkown
|
page read and write
|
||
672C000
|
trusted library allocation
|
page read and write
|
||
27CD6A02000
|
unkown
|
page read and write
|
||
16A57613000
|
unkown
|
page read and write
|
||
1E246F59000
|
unkown
|
page read and write
|
||
1CDE1629000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
27CD658B000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
4F96000
|
trusted library allocation
|
page read and write
|
||
27CD65C1000
|
unkown
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
27CD59E0000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
233DE900000
|
unkown
|
page read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
4F86000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
trusted library allocation
|
page read and write
|
||
2460C252000
|
unkown
|
page read and write
|
||
16A57700000
|
unkown
|
page read and write
|
||
4F9F000
|
trusted library allocation
|
page read and write
|
||
A5D000
|
heap
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
4FBD000
|
trusted library allocation
|
page read and write
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
62037FF000
|
stack
|
page read and write
|
||
1DE28DB000
|
stack
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
1E246DE0000
|
trusted library section
|
page readonly
|
||
9200BF7000
|
stack
|
page read and write
|
||
4FBF000
|
trusted library allocation
|
page read and write
|
||
4F85000
|
trusted library allocation
|
page read and write
|
||
1FA22E41000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
6710000
|
trusted library allocation
|
page read and write
|
||
2090E444000
|
unkown
|
page read and write
|
||
6B7D000
|
stack
|
page read and write
|
||
27CD63A0000
|
remote allocation
|
page read and write
|
||
414000
|
remote allocation
|
page execute and read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2460C250000
|
unkown
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2090E446000
|
unkown
|
page read and write
|
||
838DBFE000
|
stack
|
page read and write
|
||
418000
|
unkown
|
page readonly
|
||
4F7E000
|
trusted library allocation
|
page read and write
|
||
7A59FF000
|
stack
|
page read and write
|
||
608000
|
heap
|
page read and write
|
||
1DE2D7E000
|
stack
|
page read and write
|
||
7E827FE000
|
stack
|
page read and write
|
||
27CD6572000
|
unkown
|
page read and write
|
||
4FBE000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
2490000
|
trusted library allocation
|
page execute and read and write
|
||
4F8B000
|
trusted library allocation
|
page read and write
|
||
28E5000
|
trusted library allocation
|
page read and write
|
||
27CD6587000
|
unkown
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page execute and read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
216C000
|
trusted library allocation
|
page execute and read and write
|
||
27CD659F000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
27E3000
|
trusted library allocation
|
page read and write
|
||
222A000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
B22000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2460CA02000
|
unkown
|
page read and write
|
||
4F8D000
|
trusted library allocation
|
page read and write
|
||
4F98000
|
trusted library allocation
|
page read and write
|
||
838D87E000
|
stack
|
page read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1A1C0000
|
trusted library allocation
|
page read and write
|
||
215A000
|
trusted library allocation
|
page execute and read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
26909C4C000
|
unkown
|
page read and write
|
||
4F9E000
|
trusted library allocation
|
page read and write
|
||
1FDABAE0000
|
heap
|
page read and write
|
||
67FE000
|
stack
|
page read and write
|
||
27E9000
|
trusted library allocation
|
page read and write
|
There are 1471 hidden memdumps, click here to show them.