Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
slowday.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winlogons.url
|
MS Windows 95 Internet shortcut text (URL=<file:///C:\Users\user\AppData\Roaming\winlogons\winlogons.exe>), ASCII text, with
CR line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\winlogons\winlogons.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\18da55c1-2652-5cda-252b-e5d7f7077c5d
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv2307.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x35b8f545, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv8783.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x9c149ac1, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhvAE74.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x9c149ac1, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhvBB7.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x35b8f545, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhvCA97.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x9c149ac1, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhvCE9E.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x9c149ac1, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhvED61.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x2dfa5ec5, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp33E2.tmp
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp36CB.tmp
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp43C.tmp
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp7E2A.tmp
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp8255.tmp
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpC5B7.tmp
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpF1A4.tmp
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\winlogons\winlogons.vbs
|
ASCII text, with CR line terminators
|
dropped
|
There are 9 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\slowday.exe
|
"C:\Users\user\Desktop\slowday.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmpF1A4.tmp
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmp33E2.tmp
|
||
C:\Users\user\AppData\Roaming\winlogons\winlogons.exe
|
"C:\Users\user\AppData\Roaming\winlogons\winlogons.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmp8255.tmp
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmp36CB.tmp
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmp7E2A.tmp
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmpC5B7.tmp
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmp43C.tmp
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmp8271.tmp
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\user\AppData\Local\Temp\tmp4F4.tmp
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://a.pomf.cat/
|
unknown
|
||
http://pomf.cat/upload.php&https://a.pomf.cat/
|
unknown
|
||
http://pomf.cat/upload.php
|
unknown
|
||
http://www.msn.com/de-ch/entertainment/_h/c920645c/webcore/externalscripts/oneTrustV2/scripttemplate
|
unknown
|
||
https://www.google.com/chrome/static/images/folder-applications.svg
|
unknown
|
||
https://www.google.com/chrome/static/css/main.v2.min.css
|
unknown
|
||
https://www.google.com/chrome/static/images/fallback/google-chrome-logo.jpg
|
unknown
|
||
http://www.msn.com
|
unknown
|
||
http://www.nirsoft.net
|
unknown
|
||
https://deff.nelreports.net/api/report?cat=msn
|
unknown
|
||
https://www.google.com/chrome/static/images/chrome-logo.svg
|
unknown
|
||
https://www.google.com/chrome/static/images/homepage/homepage_features.png
|
unknown
|
||
https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gtm=
|
unknown
|
||
https://www.google.com/chrome/static/images/download-browser/big_pixel_phone.png
|
unknown
|
||
https://www.google.com/chrome/
|
unknown
|
||
https://2542116.fls.doubleclick.net/activityi;src22
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCc13122162a9a46c3b4cbf05ffccde0f
|
unknown
|
||
https://www.google.com/chrome/static/images/homepage/hero-anim-bottom-left.png
|
unknown
|
||
https://www.google.com/chrome/static/images/chrome_safari-behavior.jpg
|
unknown
|
||
https://login.microsoftonline.com/common/oauth2/authorizeclient_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e3
|
unknown
|
||
https://maps.windows.com/windows-app-web-link
|
unknown
|
||
http://www.msn.com/?ocid=iehp
|
unknown
|
||
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=68568119166
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCee0d4d5fd4424c8390d703b105f82c3
|
unknown
|
||
https://srtb.msn.com/auction?a=de-ch&b=a8415ac9f9644a1396bc1648a4599445&c=MSN&d=http%3A%2F%2Fwww.msn
|
unknown
|
||
http://crl.pki.goog/GTS1O1core.crl0
|
unknown
|
||
https://www.google.com/chrome/static/images/icon-announcement.svg
|
unknown
|
||
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://c
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
https://www.google.com/chrome/static/images/homepage/hero-anim-middle.png
|
unknown
|
||
https://www.google.com/chrome/static/css/main.v3.min.css
|
unknown
|
||
https://www.google.com/chrome/application/x-msdownloadC:
|
unknown
|
||
https://www.google.com/chrome/static/images/fallback/icon-file-download.jpg
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC5bdddb231cf54f958a5b6e76e9d8eee
|
unknown
|
||
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=447687274835
|
unknown
|
||
https://www.google.com/chrome/static/images/download-browser/pixel_phone.png
|
unknown
|
||
http://pki.goog/gsr2/GTS1O1.crt0
|
unknown
|
||
https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
|
unknown
|
||
https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml
|
unknown
|
||
https://www.google.com/chrome/static/images/app-store-download.png
|
unknown
|
||
https://www.google.com/chrome/static/images/homepage/hero-anim-top-right.png
|
unknown
|
||
https://contextual.media.net/
|
unknown
|
||
https://pki.goog/repository/0
|
unknown
|
||
https://cvision.media.net/new/300x300/3/167/174/27/39ab3103-8560-4a55-bfc4-401f897cf6f2.jpg?v=9
|
unknown
|
||
http://www.msn.com/
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC828bc1cde9f04b788c98b5423157734
|
unknown
|
||
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=1463674
|
unknown
|
||
https://www.google.com/chrome/static/images/fallback/google-logo-one-color.jpg
|
unknown
|
||
https://www.google.com/chrome/static/images/fallback/icon-twitter.jpg
|
unknown
|
||
http://www.msn.com/de-ch/entertainment/_h/c920645c/webcore/externalscripts/oneTrustV2/consent/55a804
|
unknown
|
||
https://contextual.media.net/803288796/fcmain.js?&gdpr=0&cid=8CU157172&cpcd=pC3JHgSCqY8UHihgrvGr0A%3
|
unknown
|
||
https://contextual.media.net/48/nrrV18753.js
|
unknown
|
||
https://www.google.com/chrome/static/images/fallback/icon-help.jpg
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
https://www.google.com/chrome/static/images/homepage/google-enterprise.png
|
unknown
|
||
https://www.google.com/chrome/static/images/homepage/google-dev.png
|
unknown
|
||
https://www.google.com/chrome/static/images/thank-you/thankyou-animation.json
|
unknown
|
||
http://crl.pki.goog/gsr2/gsr2.crl0?
|
unknown
|
||
http://pki.goog/gsr2/GTSGIAG3.crt0)
|
unknown
|
||
https://www.google.com/
|
unknown
|
||
https://www.google.com/chrome/static/images/fallback/icon-fb.jpg
|
unknown
|
||
https://www.google.com/chrome/static/images/mac-ico.png
|
unknown
|
||
http://pki.goog/gsr2/GTS1O1.crt0#
|
unknown
|
||
https://aefd.nelreports.net/api/report?cat=bingth
|
unknown
|
||
https://www.google.com/chrome/static/images/google-play-download.png
|
unknown
|
||
https://www.google.com/chrome/static/images/chrome_throbber_fast.gif
|
unknown
|
||
https://www.google.com/chrome/static/images/homepage/google-canary.png
|
unknown
|
||
https://www.google.com/chrome/static/images/favicons/favicon-16x16.png
|
unknown
|
||
https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
|
unknown
|
||
https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.js
|
unknown
|
||
https://www.google.com/chrome/static/images/homepage/laptop_desktop.png
|
unknown
|
||
https://www.google.com/chrome/static/js/main.v2.min.js
|
unknown
|
||
https://www.google.com/chrome/static/images/fallback/icon-description-white-blue-bg.jpg
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCfd484f9188564713bbc5d13d862ebbf
|
unknown
|
||
https://login.microsoftonline.com/common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e
|
unknown
|
||
https://www.google.com/chrome/static/images/homepage/homepage_privacy.png
|
unknown
|
||
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
|
unknown
|
||
https://www.google.com/chrome/static/images/fallback/icon-youtube.jpg
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0
|
unknown
|
||
https://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&
|
unknown
|
||
https://dl.google.com/tag/s/appguid%3D%7B8A69D345-D564-463C-AFF1-A69D9E530F96%7D%26iid%3D%7BFD3B6173
|
unknown
|
||
https://www.google.com/chrome/static/images/cursor-replay.cur
|
unknown
|
||
https://www.google.com/chrome/static/js/installer.min.js
|
unknown
|
||
http://crl.pki.goog/GTSGIAG3.crl0
|
unknown
|
||
https://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=6856811916691;gt
|
unknown
|
||
https://www.google.com/chrome/static/images/download-browser/pixel_tablet.png
|
unknown
|
||
https://www.google.com/chrome/static/images/homepage/homepage_tools.png
|
unknown
|
||
http://bot.whatismyipaddress.com/
|
unknown
|
||
http://pki.goog/gsr2/GTS1O1.crt0M
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RCc71c68d7b8f049b6a6f3b669bd5d00c
|
unknown
|
||
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
|
unknown
|
||
https://www.google.com/chrome/static/images/homepage/google-beta.png
|
unknown
|
||
http://www.msn.com/de-ch/?ocid=iehp
|
unknown
|
||
https://www.google.com/chrome/static/images/icon-file-download.svg
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC9b2d2bc73c8a4a1d8dd5c3d69b6634a
|
unknown
|
||
https://aefd.nelreports.net/api/report?cat=bingaot
|
unknown
|
||
https://amp.azure.net/libs/amp/1.8.0/azuremediaplayer.min.js
|
unknown
|
||
https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
|
unknown
|
||
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/434d91f2e635/RC54c8a2b02c3446f48a60b41e8a5ff47
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.1
|
unknown
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2B09000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute read
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3B52000
|
direct allocation
|
page execute and read and write
|
||
2F69000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3792000
|
direct allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute read
|
||
402000
|
remote allocation
|
page execute read
|
||
4363000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
47C3000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2BB2000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
EC0000
|
trusted library section
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3106000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2C6D000
|
trusted library allocation
|
page read and write
|
||
2D53000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
trusted library section
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
6981000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2D12000
|
trusted library allocation
|
page read and write
|
||
3234000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute read
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
2E12000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3176000
|
trusted library allocation
|
page read and write
|
||
3960000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3012000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3790000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
66D1000
|
trusted library allocation
|
page read and write
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
B1E000
|
trusted library allocation
|
page read and write
|
||
1002000
|
heap
|
page read and write
|
||
1DEB4520000
|
trusted library allocation
|
page read and write
|
||
2288000
|
trusted library allocation
|
page read and write
|
||
2268000
|
trusted library allocation
|
page read and write
|
||
21C1000
|
trusted library allocation
|
page read and write
|
||
B0D8C7D000
|
stack
|
page read and write
|
||
ACF000
|
stack
|
page read and write
|
||
20D2B202000
|
heap
|
page read and write
|
||
2158000
|
trusted library allocation
|
page read and write
|
||
227D000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
9F5000
|
trusted library allocation
|
page read and write
|
||
31C3000
|
trusted library allocation
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
7EE0000
|
trusted library allocation
|
page read and write
|
||
1DEB4760000
|
trusted library allocation
|
page read and write
|
||
20D2B38A000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
7710000
|
heap
|
page read and write
|
||
8F6000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1DEB48F5000
|
heap
|
page read and write
|
||
20D2AA57000
|
heap
|
page read and write
|
||
2841000
|
trusted library allocation
|
page read and write
|
||
2960000
|
trusted library allocation
|
page read and write
|
||
DB55B7C000
|
stack
|
page read and write
|
||
235D000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
trusted library allocation
|
page execute and read and write
|
||
8AF000
|
stack
|
page read and write
|
||
31BA000
|
trusted library allocation
|
page read and write
|
||
240E000
|
trusted library allocation
|
page read and write
|
||
2259000
|
trusted library allocation
|
page read and write
|
||
149F8DF0000
|
remote allocation
|
page read and write
|
||
66F000
|
stack
|
page read and write
|
||
89C000
|
heap
|
page read and write
|
||
3291000
|
trusted library allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page readonly
|
||
7FD0000
|
trusted library allocation
|
page read and write
|
||
278F1E53000
|
heap
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
55B000
|
stack
|
page read and write
|
||
2418000
|
trusted library allocation
|
page read and write
|
||
20D2AAC9000
|
heap
|
page read and write
|
||
45B1EFE000
|
stack
|
page read and write
|
||
2290000
|
trusted library allocation
|
page read and write
|
||
A0D000
|
trusted library allocation
|
page read and write
|
||
AC5000
|
heap
|
page read and write
|
||
B2F000
|
trusted library allocation
|
page read and write
|
||
8080000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
20D2B1C0000
|
remote allocation
|
page read and write
|
||
AF8000
|
heap
|
page read and write
|
||
20D2B369000
|
heap
|
page read and write
|
||
69E000
|
stack
|
page read and write
|
||
3210000
|
trusted library allocation
|
page read and write
|
||
1DEB4790000
|
trusted library allocation
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
45B207E000
|
stack
|
page read and write
|
||
CFA000
|
trusted library allocation
|
page execute and read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
1DEB4861000
|
heap
|
page read and write
|
||
1DEB4660000
|
trusted library allocation
|
page read and write
|
||
E87000
|
unkown
|
page readonly
|
||
1DEB4490000
|
trusted library allocation
|
page read and write
|
||
2271000
|
trusted library allocation
|
page read and write
|
||
B23000
|
trusted library allocation
|
page read and write
|
||
2288000
|
trusted library allocation
|
page read and write
|
||
2290000
|
trusted library allocation
|
page read and write
|
||
867000
|
heap
|
page read and write
|
||
7FE0000
|
trusted library allocation
|
page read and write
|
||
20D2B390000
|
heap
|
page read and write
|
||
419000
|
remote allocation
|
page execute and read and write
|
||
AD0000
|
heap
|
page read and write
|
||
20D2B3A4000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
45B1DFE000
|
stack
|
page read and write
|
||
2259000
|
trusted library allocation
|
page read and write
|
||
2D97000
|
trusted library allocation
|
page read and write
|
||
B24000
|
trusted library allocation
|
page read and write
|
||
3172000
|
trusted library allocation
|
page read and write
|
||
B3C000
|
heap
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
7FC000
|
stack
|
page read and write
|
||
8090000
|
trusted library allocation
|
page read and write
|
||
20D2AA4D000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
2033D6C2000
|
heap
|
page read and write
|
||
31C1000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
E4F000
|
unkown
|
page readonly
|
||
5F4000
|
heap
|
page read and write
|
||
31B0000
|
trusted library allocation
|
page read and write
|
||
20D2B38A000
|
heap
|
page read and write
|
||
226D000
|
trusted library allocation
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
7CF000
|
stack
|
page read and write
|
||
227E000
|
trusted library allocation
|
page read and write
|
||
9F3000
|
heap
|
page read and write
|
||
2288000
|
trusted library allocation
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
278F1E10000
|
heap
|
page read and write
|
||
6E8000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
8080000
|
trusted library allocation
|
page read and write
|
||
B34000
|
trusted library allocation
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
B2F000
|
trusted library allocation
|
page read and write
|
||
84F000
|
heap
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
8060000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
2DC3000
|
trusted library allocation
|
page read and write
|
||
195000
|
stack
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
220F000
|
trusted library allocation
|
page read and write
|
||
9D2000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
E7E000
|
unkown
|
page read and write
|
||
991000
|
trusted library allocation
|
page read and write
|
||
26E1000
|
trusted library allocation
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
20D2B399000
|
heap
|
page read and write
|
||
84F000
|
heap
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
AF7DCFB000
|
stack
|
page read and write
|
||
7C73000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
trusted library allocation
|
page read and write
|
||
7FE0000
|
trusted library allocation
|
page read and write
|
||
2DFA0800000
|
heap
|
page read and write
|
||
8F9000
|
stack
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
1DEB4630000
|
trusted library allocation
|
page read and write
|
||
45B1C7B000
|
stack
|
page read and write
|
||
20DB1402000
|
heap
|
page read and write
|
||
2206000
|
trusted library allocation
|
page read and write
|
||
2E46000
|
trusted library allocation
|
page read and write
|
||
27EB000
|
trusted library allocation
|
page read and write
|
||
20D2AA51000
|
heap
|
page read and write
|
||
149F8E2A000
|
heap
|
page read and write
|
||
6DE000
|
stack
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
B2F000
|
trusted library allocation
|
page read and write
|
||
1DEB00D0000
|
trusted library section
|
page readonly
|
||
454000
|
remote allocation
|
page execute and read and write
|
||
20D2B3A0000
|
heap
|
page read and write
|
||
BA9000
|
heap
|
page read and write
|
||
2351000
|
trusted library allocation
|
page read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
2DE6000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
18F3EB60000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
A3D000
|
heap
|
page read and write
|
||
B13000
|
trusted library allocation
|
page read and write
|
||
E86FCFE000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
B26000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
6A826F8000
|
stack
|
page read and write
|
||
49E000
|
stack
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
18F3EBF0000
|
trusted library allocation
|
page read and write
|
||
9F3000
|
trusted library allocation
|
page read and write
|
||
227E000
|
trusted library allocation
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
75D000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page readonly
|
||
B13000
|
trusted library allocation
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
865000
|
heap
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
B23000
|
trusted library allocation
|
page read and write
|
||
18F3EC3C000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
199000
|
stack
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
18F3EC00000
|
heap
|
page read and write
|
||
2224000
|
trusted library allocation
|
page read and write
|
||
2DFA084A000
|
heap
|
page read and write
|
||
2361000
|
trusted library allocation
|
page read and write
|
||
1DEAEFD0000
|
heap
|
page read and write
|
||
2801000
|
trusted library allocation
|
page read and write
|
||
1DEAF000000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
1DEAF900000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
2926000
|
trusted library allocation
|
page read and write
|
||
327A000
|
trusted library allocation
|
page read and write
|
||
AF7DB7C000
|
stack
|
page read and write
|
||
2630000
|
heap
|
page read and write
|
||
20DB1413000
|
heap
|
page read and write
|
||
2130000
|
trusted library allocation
|
page read and write
|
||
E82000
|
unkown
|
page write copy
|
||
DFB5B7E000
|
stack
|
page read and write
|
||
2D9E000
|
trusted library allocation
|
page read and write
|
||
620000
|
trusted library allocation
|
page read and write
|
||
215BA902000
|
heap
|
page read and write
|
||
B26000
|
trusted library allocation
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
2948000
|
trusted library allocation
|
page read and write
|
||
8A9000
|
heap
|
page read and write
|
||
22BFAA4F000
|
heap
|
page read and write
|
||
2150000
|
trusted library allocation
|
page read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
196DD7E000
|
stack
|
page read and write
|
||
2DFA0868000
|
heap
|
page read and write
|
||
2DFA0880000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
7D70000
|
trusted library allocation
|
page read and write
|
||
1DEB0480000
|
trusted library allocation
|
page read and write
|
||
731E000
|
stack
|
page read and write
|
||
3205000
|
trusted library allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
2DB1000
|
trusted library allocation
|
page read and write
|
||
7BE000
|
stack
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
2418000
|
trusted library allocation
|
page read and write
|
||
195000
|
stack
|
page read and write
|
||
31F6000
|
trusted library allocation
|
page read and write
|
||
1DEB4750000
|
trusted library allocation
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
B26000
|
trusted library allocation
|
page read and write
|
||
20D2B38E000
|
heap
|
page read and write
|
||
AD3000
|
heap
|
page read and write
|
||
2DFA0865000
|
heap
|
page read and write
|
||
820000
|
trusted library allocation
|
page read and write
|
||
2E4A000
|
trusted library allocation
|
page read and write
|
||
A79000
|
trusted library allocation
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
A54000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
2DFA084D000
|
heap
|
page read and write
|
||
52E000
|
stack
|
page read and write
|
||
9E9000
|
trusted library allocation
|
page read and write
|
||
28F6000
|
trusted library allocation
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
31D9000
|
trusted library allocation
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
107A000
|
heap
|
page read and write
|
||
B1E000
|
trusted library allocation
|
page read and write
|
||
7FE0000
|
trusted library allocation
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
5F7000
|
heap
|
page read and write
|
||
45B1F7E000
|
stack
|
page read and write
|
||
1DEAF959000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
2033D644000
|
heap
|
page read and write
|
||
28B6000
|
trusted library allocation
|
page read and write
|
||
21B1000
|
trusted library allocation
|
page read and write
|
||
877000
|
heap
|
page read and write
|
||
B24000
|
heap
|
page read and write
|
||
26E1000
|
trusted library allocation
|
page read and write
|
||
1DEAF102000
|
heap
|
page read and write
|
||
A55000
|
heap
|
page read and write
|
||
A2F000
|
stack
|
page read and write
|
||
2273000
|
trusted library allocation
|
page read and write
|
||
B80000
|
remote allocation
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
1342000
|
unkown
|
page write copy
|
||
1C0000
|
remote allocation
|
page read and write
|
||
7F470000
|
trusted library allocation
|
page execute and read and write
|
||
5F9000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
149F8C60000
|
heap
|
page read and write
|
||
2670000
|
heap
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
22BFAB08000
|
heap
|
page read and write
|
||
31D0000
|
trusted library allocation
|
page read and write
|
||
8A6087B000
|
stack
|
page read and write
|
||
18F3EC2A000
|
heap
|
page read and write
|
||
6A845FD000
|
stack
|
page read and write
|
||
AEF000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
20D2B3B6000
|
heap
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
81C000
|
stack
|
page read and write
|
||
20D2B862000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
226B000
|
trusted library allocation
|
page read and write
|
||
2741000
|
heap
|
page read and write
|
||
3201000
|
trusted library allocation
|
page read and write
|
||
2DFA087D000
|
heap
|
page read and write
|
||
B1F000
|
trusted library allocation
|
page read and write
|
||
A3D000
|
heap
|
page read and write
|
||
1DEB4790000
|
remote allocation
|
page read and write
|
||
2C69000
|
trusted library allocation
|
page read and write
|
||
20D2B30D000
|
heap
|
page read and write
|
||
7D67000
|
trusted library allocation
|
page read and write
|
||
20DB1380000
|
trusted library allocation
|
page read and write
|
||
1BE0000
|
direct allocation
|
page execute and read and write
|
||
AA8000
|
heap
|
page read and write
|
||
25E1000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
887000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page readonly
|
||
B0D84F7000
|
stack
|
page read and write
|
||
1077000
|
heap
|
page read and write
|
||
20DB1C02000
|
trusted library allocation
|
page read and write
|
||
2B179C63000
|
heap
|
page read and write
|
||
B34000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
B1F000
|
trusted library allocation
|
page read and write
|
||
2DCE000
|
trusted library allocation
|
page read and write
|
||
300E000
|
trusted library allocation
|
page read and write
|
||
CCA000
|
trusted library allocation
|
page execute and read and write
|
||
8070000
|
trusted library allocation
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
2253000
|
trusted library allocation
|
page read and write
|
||
951000
|
trusted library allocation
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1DEB4660000
|
trusted library allocation
|
page read and write
|
||
25E1000
|
heap
|
page read and write
|
||
278F1E36000
|
heap
|
page read and write
|
||
21FA000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
7CF000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
22BFA970000
|
heap
|
page read and write
|
||
2214000
|
trusted library allocation
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page execute and read and write
|
||
654000
|
heap
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
2DFA083E000
|
heap
|
page read and write
|
||
2B179D02000
|
heap
|
page read and write
|
||
6A842FE000
|
stack
|
page read and write
|
||
2631000
|
heap
|
page read and write
|
||
806F000
|
trusted library allocation
|
page read and write
|
||
149F8E13000
|
heap
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
1DEAF09D000
|
heap
|
page read and write
|
||
31EF000
|
trusted library allocation
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
B1A000
|
trusted library allocation
|
page read and write
|
||
AF7D9FE000
|
stack
|
page read and write
|
||
2DFA1002000
|
trusted library allocation
|
page read and write
|
||
A71000
|
trusted library allocation
|
page read and write
|
||
17C000
|
stack
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
2269000
|
trusted library allocation
|
page read and write
|
||
3263000
|
trusted library allocation
|
page read and write
|
||
20D2B38A000
|
heap
|
page read and write
|
||
1DEB48A7000
|
heap
|
page read and write
|
||
7FE0000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
881000
|
heap
|
page read and write
|
||
31ED000
|
trusted library allocation
|
page read and write
|
||
8A60C77000
|
stack
|
page read and write
|
||
2DA9000
|
trusted library allocation
|
page read and write
|
||
2216000
|
trusted library allocation
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
B1E000
|
trusted library allocation
|
page read and write
|
||
2DFA0848000
|
heap
|
page read and write
|
||
77DF000
|
stack
|
page read and write
|
||
8DC000
|
heap
|
page read and write
|
||
DFB577E000
|
stack
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
1DEB463E000
|
trusted library allocation
|
page read and write
|
||
BCD000
|
heap
|
page read and write
|
||
20DB1441000
|
heap
|
page read and write
|
||
1FE000
|
stack
|
page read and write
|
||
1DEB4674000
|
trusted library allocation
|
page read and write
|
||
7BCE000
|
stack
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
A08000
|
trusted library allocation
|
page read and write
|
||
DFA000
|
trusted library allocation
|
page execute and read and write
|
||
7EAD000
|
stack
|
page read and write
|
||
2218000
|
trusted library allocation
|
page read and write
|
||
460000
|
trusted library allocation
|
page read and write
|
||
AF9000
|
heap
|
page read and write
|
||
278F1E40000
|
heap
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
2DFA0841000
|
heap
|
page read and write
|
||
6A843F7000
|
stack
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
20D2AA87000
|
heap
|
page read and write
|
||
215BA913000
|
heap
|
page read and write
|
||
2770000
|
trusted library allocation
|
page read and write
|
||
31FF000
|
trusted library allocation
|
page read and write
|
||
8F9000
|
heap
|
page read and write
|
||
2273000
|
trusted library allocation
|
page read and write
|
||
881000
|
heap
|
page read and write
|
||
20D2AA55000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
D0B000
|
trusted library allocation
|
page execute and read and write
|
||
B44000
|
trusted library allocation
|
page read and write
|
||
26E1000
|
trusted library allocation
|
page read and write
|
||
240A000
|
trusted library allocation
|
page read and write
|
||
7D61000
|
trusted library allocation
|
page read and write
|
||
9F3000
|
trusted library allocation
|
page read and write
|
||
27EC000
|
trusted library allocation
|
page read and write
|
||
1DEAF730000
|
trusted library allocation
|
page read and write
|
||
454000
|
remote allocation
|
page execute and read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
770B000
|
stack
|
page read and write
|
||
20D2AB08000
|
heap
|
page read and write
|
||
C2602FB000
|
stack
|
page read and write
|
||
6A844FF000
|
stack
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
20D2B367000
|
heap
|
page read and write
|
||
2DB8000
|
trusted library allocation
|
page read and write
|
||
1DEB48FD000
|
heap
|
page read and write
|
||
278F1E40000
|
heap
|
page read and write
|
||
2275000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
2033D6E1000
|
heap
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
2E05000
|
trusted library allocation
|
page read and write
|
||
419000
|
remote allocation
|
page execute and read and write
|
||
A3E000
|
heap
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
20D2B3C3000
|
heap
|
page read and write
|
||
326B000
|
trusted library allocation
|
page read and write
|
||
149F8DC0000
|
trusted library allocation
|
page read and write
|
||
454000
|
remote allocation
|
page execute and read and write
|
||
B0D8B7E000
|
stack
|
page read and write
|
||
6A8427B000
|
stack
|
page read and write
|
||
454000
|
remote allocation
|
page execute and read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
4D5000
|
heap
|
page read and write
|
||
30CB000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
A0B000
|
trusted library allocation
|
page read and write
|
||
20D2B3B3000
|
heap
|
page read and write
|
||
275C000
|
trusted library allocation
|
page read and write
|
||
2E3C000
|
trusted library allocation
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
18F3F402000
|
trusted library allocation
|
page read and write
|
||
B2E000
|
trusted library allocation
|
page read and write
|
||
26E1000
|
trusted library allocation
|
page read and write
|
||
DB55A7E000
|
stack
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
2DF8000
|
trusted library allocation
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
1077000
|
heap
|
page read and write
|
||
21A1000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
8A60E7F000
|
stack
|
page read and write
|
||
1DEAF902000
|
heap
|
page read and write
|
||
278F1F40000
|
heap
|
page read and write
|
||
20D2B821000
|
heap
|
page read and write
|
||
2421000
|
trusted library allocation
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
AF7DDFD000
|
stack
|
page read and write
|
||
3174000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
5F4000
|
heap
|
page read and write
|
||
6A825FE000
|
unkown
|
page read and write
|
||
9F3000
|
trusted library allocation
|
page read and write
|
||
86C000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
1DEB0461000
|
trusted library allocation
|
page read and write
|
||
2DFA0E70000
|
trusted library allocation
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
75F000
|
stack
|
page read and write
|
||
2DFA0861000
|
heap
|
page read and write
|
||
322B000
|
trusted library allocation
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
2AF0000
|
trusted library allocation
|
page read and write
|
||
149F8DF0000
|
remote allocation
|
page read and write
|
||
B17000
|
heap
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
2279000
|
trusted library allocation
|
page read and write
|
||
2300000
|
trusted library allocation
|
page read and write
|
||
2B179B10000
|
heap
|
page read and write
|
||
485000
|
heap
|
page read and write
|
||
2DC7000
|
trusted library allocation
|
page read and write
|
||
27E6000
|
trusted library allocation
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
18F3ED08000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
30D1000
|
trusted library allocation
|
page read and write
|
||
B07000
|
heap
|
page read and write
|
||
295B000
|
trusted library allocation
|
page read and write
|
||
3250000
|
trusted library allocation
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
2DFA0863000
|
heap
|
page read and write
|
||
CC2000
|
trusted library allocation
|
page execute and read and write
|
||
759E000
|
stack
|
page read and write
|
||
DB558FE000
|
stack
|
page read and write
|
||
23B1000
|
heap
|
page read and write
|
||
20D2AA4E000
|
heap
|
page read and write
|
||
A71000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
3226000
|
trusted library allocation
|
page read and write
|
||
B17000
|
heap
|
page read and write
|
||
1DEAF079000
|
heap
|
page read and write
|
||
17C000
|
stack
|
page read and write
|
||
2DFA087C000
|
heap
|
page read and write
|
||
A6D000
|
trusted library allocation
|
page read and write
|
||
2DFC000
|
trusted library allocation
|
page read and write
|
||
A11000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
DB55AFF000
|
stack
|
page read and write
|
||
2DE4000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
454000
|
remote allocation
|
page execute and read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
7A8F000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
B38000
|
trusted library allocation
|
page read and write
|
||
70000
|
heap
|
page read and write
|
||
22BFAB00000
|
heap
|
page read and write
|
||
8AA000
|
heap
|
page read and write
|
||
580000
|
remote allocation
|
page read and write
|
||
2273000
|
trusted library allocation
|
page read and write
|
||
2160000
|
trusted library allocation
|
page read and write
|
||
8A60D7F000
|
stack
|
page read and write
|
||
45B23FD000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
220F000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
E74000
|
unkown
|
page readonly
|
||
580000
|
remote allocation
|
page read and write
|
||
B0D86FB000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
2279000
|
trusted library allocation
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
18F3EC5A000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
20DB1210000
|
heap
|
page read and write
|
||
ACF000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
20D2B371000
|
heap
|
page read and write
|
||
A49000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
B2B000
|
heap
|
page read and write
|
||
BA7000
|
heap
|
page read and write
|
||
1031000
|
heap
|
page read and write
|
||
2268000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
29D4000
|
heap
|
page execute and read and write
|
||
5B0000
|
heap
|
page read and write
|
||
20D2B392000
|
heap
|
page read and write
|
||
20D2B1C0000
|
remote allocation
|
page read and write
|
||
CE6000
|
trusted library allocation
|
page execute and read and write
|
||
1DEB4780000
|
trusted library allocation
|
page read and write
|
||
1DEB4904000
|
heap
|
page read and write
|
||
DFB51FB000
|
stack
|
page read and write
|
||
22BFAA3C000
|
heap
|
page read and write
|
||
2DFA0833000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
226D000
|
trusted library allocation
|
page read and write
|
||
1DEB4740000
|
trusted library allocation
|
page read and write
|
||
1DEAF076000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
215BA87B000
|
heap
|
page read and write
|
||
2DFA0813000
|
heap
|
page read and write
|
||
7AE0000
|
trusted library allocation
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
E87000
|
unkown
|
page readonly
|
||
1C0000
|
remote allocation
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
2203000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
E07000
|
trusted library allocation
|
page execute and read and write
|
||
1DEB00C0000
|
trusted library section
|
page readonly
|
||
30000
|
heap
|
page read and write
|
||
6D7000
|
heap
|
page read and write
|
||
B25000
|
trusted library allocation
|
page read and write
|
||
29CE000
|
stack
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
A78000
|
trusted library allocation
|
page read and write
|
||
ADF000
|
heap
|
page read and write
|
||
322F000
|
trusted library allocation
|
page read and write
|
||
2249000
|
trusted library allocation
|
page read and write
|
||
1DEB44A0000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2E0E000
|
trusted library allocation
|
page read and write
|
||
3B50000
|
direct allocation
|
page execute and read and write
|
||
DFB597F000
|
stack
|
page read and write
|
||
2214000
|
trusted library allocation
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
6AE000
|
stack
|
page read and write
|
||
8B6000
|
heap
|
page read and write
|
||
A5B000
|
stack
|
page read and write
|
||
755E000
|
stack
|
page read and write
|
||
881000
|
heap
|
page read and write
|
||
EA0000
|
trusted library allocation
|
page read and write
|
||
21A1000
|
trusted library allocation
|
page read and write
|
||
881000
|
heap
|
page read and write
|
||
9EA000
|
trusted library allocation
|
page read and write
|
||
26E1000
|
trusted library allocation
|
page read and write
|
||
E86FDFF000
|
stack
|
page read and write
|
||
580000
|
remote allocation
|
page read and write
|
||
B1E000
|
trusted library allocation
|
page read and write
|
||
226B000
|
trusted library allocation
|
page read and write
|
||
454000
|
remote allocation
|
page execute and read and write
|
||
20D2AAB5000
|
heap
|
page read and write
|
||
B0D8F7C000
|
stack
|
page read and write
|
||
21FC000
|
trusted library allocation
|
page read and write
|
||
2DE2000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
2405000
|
trusted library allocation
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
B12000
|
heap
|
page read and write
|
||
2870000
|
trusted library allocation
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
AE5000
|
heap
|
page read and write
|
||
B2F000
|
trusted library allocation
|
page read and write
|
||
2DDB000
|
trusted library allocation
|
page read and write
|
||
580000
|
remote allocation
|
page read and write
|
||
220F000
|
trusted library allocation
|
page read and write
|
||
20D2B38E000
|
heap
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2205000
|
trusted library allocation
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
2416000
|
trusted library allocation
|
page read and write
|
||
D02000
|
trusted library allocation
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
DCA000
|
trusted library allocation
|
page execute and read and write
|
||
B2E000
|
trusted library allocation
|
page read and write
|
||
B0D917F000
|
stack
|
page read and write
|
||
1DEB4902000
|
heap
|
page read and write
|
||
1281000
|
unkown
|
page execute read
|
||
3215000
|
trusted library allocation
|
page read and write
|
||
867000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
20D2B803000
|
heap
|
page read and write
|
||
1DEAF02A000
|
heap
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
2DBC000
|
trusted library allocation
|
page read and write
|
||
3278000
|
trusted library allocation
|
page read and write
|
||
1BC0000
|
trusted library allocation
|
page read and write
|
||
23B1000
|
heap
|
page read and write
|
||
18F3EC5C000
|
heap
|
page read and write
|
||
278F1E26000
|
heap
|
page read and write
|
||
B5F000
|
heap
|
page read and write
|
||
2DFA0879000
|
heap
|
page read and write
|
||
2100000
|
heap
|
page read and write
|
||
2E38000
|
trusted library allocation
|
page read and write
|
||
2DFA083B000
|
heap
|
page read and write
|
||
B8A000
|
heap
|
page read and write
|
||
2D4D000
|
trusted library allocation
|
page read and write
|
||
316C000
|
trusted library allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
1DEAF918000
|
heap
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
B16000
|
trusted library allocation
|
page read and write
|
||
ADA000
|
heap
|
page read and write
|
||
1DEB4651000
|
trusted library allocation
|
page read and write
|
||
22BFAB13000
|
heap
|
page read and write
|
||
25E1000
|
heap
|
page read and write
|
||
31CE000
|
trusted library allocation
|
page read and write
|
||
22BFA960000
|
heap
|
page read and write
|
||
7DD000
|
stack
|
page read and write
|
||
220F000
|
trusted library allocation
|
page read and write
|
||
265E000
|
stack
|
page read and write
|
||
278F1E4D000
|
heap
|
page read and write
|
||
20D2AA53000
|
heap
|
page read and write
|
||
A08000
|
trusted library allocation
|
page read and write
|
||
2403000
|
trusted library allocation
|
page read and write
|
||
B0C000
|
trusted library allocation
|
page read and write
|
||
22BFA9D0000
|
heap
|
page read and write
|
||
2E48000
|
trusted library allocation
|
page read and write
|
||
BAA000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
B36000
|
trusted library allocation
|
page read and write
|
||
454000
|
remote allocation
|
page execute and read and write
|
||
AD4000
|
heap
|
page read and write
|
||
3222000
|
trusted library allocation
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
2276000
|
trusted library allocation
|
page read and write
|
||
DFB537B000
|
stack
|
page read and write
|
||
2671000
|
heap
|
page read and write
|
||
195000
|
stack
|
page read and write
|
||
2421000
|
trusted library allocation
|
page read and write
|
||
C0000
|
trusted library allocation
|
page read and write
|
||
9FC000
|
heap
|
page read and write
|
||
20D2B39C000
|
heap
|
page read and write
|
||
650000
|
trusted library allocation
|
page read and write
|
||
B34000
|
trusted library allocation
|
page read and write
|
||
20D2B3D8000
|
heap
|
page read and write
|
||
1DEAF074000
|
heap
|
page read and write
|
||
228B000
|
trusted library allocation
|
page read and write
|
||
9F4000
|
trusted library allocation
|
page read and write
|
||
89E000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
trusted library allocation
|
page read and write
|
||
AC3000
|
heap
|
page read and write
|
||
1077000
|
heap
|
page read and write
|
||
149F8E02000
|
heap
|
page read and write
|
||
1065000
|
heap
|
page read and write
|
||
17BF000
|
stack
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
18F3EC52000
|
heap
|
page read and write
|
||
84F000
|
heap
|
page read and write
|
||
133E000
|
unkown
|
page write copy
|
||
2203000
|
trusted library allocation
|
page read and write
|
||
3880000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2033D6CC000
|
heap
|
page read and write
|
||
225E000
|
trusted library allocation
|
page read and write
|
||
485000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
1DEB00F0000
|
trusted library section
|
page readonly
|
||
9F3000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page execute and read and write
|
||
22BFAA52000
|
heap
|
page read and write
|
||
2801000
|
trusted library allocation
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
B89000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
22BFB130000
|
trusted library allocation
|
page read and write
|
||
2DFA0845000
|
heap
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
2E42000
|
trusted library allocation
|
page read and write
|
||
2273000
|
trusted library allocation
|
page read and write
|
||
B2F000
|
trusted library allocation
|
page read and write
|
||
B0A000
|
trusted library allocation
|
page read and write
|
||
31DE000
|
trusted library allocation
|
page read and write
|
||
3267000
|
trusted library allocation
|
page read and write
|
||
2841000
|
trusted library allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
B0D88FB000
|
stack
|
page read and write
|
||
DEA000
|
trusted library allocation
|
page execute and read and write
|
||
2360000
|
trusted library allocation
|
page read and write
|
||
AF6000
|
heap
|
page read and write
|
||
941000
|
trusted library allocation
|
page read and write
|
||
215BA800000
|
heap
|
page read and write
|
||
4D5000
|
heap
|
page read and write
|
||
20D2AA13000
|
heap
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
215BA908000
|
heap
|
page read and write
|
||
818000
|
heap
|
page read and write
|
||
1DEAF03D000
|
heap
|
page read and write
|
||
B80000
|
remote allocation
|
page read and write
|
||
2DAD000
|
trusted library allocation
|
page read and write
|
||
B13000
|
trusted library allocation
|
page read and write
|
||
2418000
|
trusted library allocation
|
page read and write
|
||
7AF000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2268000
|
trusted library allocation
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
2E07000
|
trusted library allocation
|
page read and write
|
||
21C8000
|
trusted library allocation
|
page read and write
|
||
225B000
|
trusted library allocation
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
20D2AA4C000
|
heap
|
page read and write
|
||
AC1000
|
heap
|
page read and write
|
||
321E000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
trusted library allocation
|
page read and write
|
||
20D2AAAA000
|
heap
|
page read and write
|
||
85F000
|
heap
|
page read and write
|
||
1C7F000
|
stack
|
page read and write
|
||
E86F97E000
|
stack
|
page read and write
|
||
454000
|
remote allocation
|
page execute and read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
3F74000
|
trusted library allocation
|
page read and write
|
||
149F8CC0000
|
heap
|
page read and write
|
||
485000
|
heap
|
page read and write
|
||
B1F000
|
trusted library allocation
|
page read and write
|
||
A11000
|
trusted library allocation
|
page read and write
|
||
7980000
|
trusted library allocation
|
page execute and read and write
|
||
31DB000
|
trusted library allocation
|
page read and write
|
||
316E000
|
trusted library allocation
|
page read and write
|
||
2841000
|
trusted library allocation
|
page read and write
|
||
56E000
|
stack
|
page read and write
|
||
2530000
|
trusted library allocation
|
page read and write
|
||
B36000
|
trusted library allocation
|
page read and write
|
||
1DEAF113000
|
heap
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
B17000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
20D2B3A7000
|
heap
|
page read and write
|
||
B23000
|
trusted library allocation
|
page read and write
|
||
226A000
|
trusted library allocation
|
page read and write
|
||
1334000
|
unkown
|
page readonly
|
||
2DFA086D000
|
heap
|
page read and write
|
||
2033D600000
|
heap
|
page read and write
|
||
149F8E00000
|
heap
|
page read and write
|
||
A11000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
1077000
|
heap
|
page read and write
|
||
B1F000
|
trusted library allocation
|
page read and write
|
||
B0D87FE000
|
stack
|
page read and write
|
||
1062000
|
heap
|
page read and write
|
||
20D2B802000
|
heap
|
page read and write
|
||
B2C000
|
heap
|
page read and write
|
||
2B179C55000
|
heap
|
page read and write
|
||
834000
|
heap
|
page read and write
|
||
1DEB0110000
|
trusted library section
|
page readonly
|
||
81E000
|
stack
|
page read and write
|
||
20D2B392000
|
heap
|
page read and write
|
||
AFB000
|
heap
|
page read and write
|
||
2F63000
|
trusted library allocation
|
page read and write
|
||
2286000
|
trusted library allocation
|
page read and write
|
||
2DFA086F000
|
heap
|
page read and write
|
||
1DEB48A3000
|
heap
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
20D2AB16000
|
heap
|
page read and write
|
||
8060000
|
trusted library allocation
|
page read and write
|
||
2268000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
20D2B38C000
|
heap
|
page read and write
|
||
A38000
|
heap
|
page read and write
|
||
20D2AA29000
|
heap
|
page read and write
|
||
20D2B386000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
EA000
|
stack
|
page read and write
|
||
17C000
|
stack
|
page read and write
|
||
B5F000
|
heap
|
page read and write
|
||
2E2F000
|
trusted library allocation
|
page read and write
|
||
B34000
|
trusted library allocation
|
page read and write
|
||
215BA827000
|
heap
|
page read and write
|
||
B2B000
|
heap
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
20D2B1C0000
|
remote allocation
|
page read and write
|
||
8A60A7C000
|
stack
|
page read and write
|
||
320A000
|
trusted library allocation
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
2224000
|
trusted library allocation
|
page read and write
|
||
74CD000
|
stack
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
2DFA0860000
|
heap
|
page read and write
|
||
2033D629000
|
heap
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
20D2AA3C000
|
heap
|
page read and write
|
||
838000
|
heap
|
page read and write
|
||
3217000
|
trusted library allocation
|
page read and write
|
||
B2F000
|
trusted library allocation
|
page read and write
|
||
31EB000
|
trusted library allocation
|
page read and write
|
||
B80000
|
remote allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
B24000
|
trusted library allocation
|
page read and write
|
||
2B179C02000
|
heap
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
48C000
|
remote allocation
|
page readonly
|
||
225B000
|
trusted library allocation
|
page read and write
|
||
873000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
275B000
|
trusted library allocation
|
page read and write
|
||
325B000
|
trusted library allocation
|
page read and write
|
||
B47000
|
heap
|
page read and write
|
||
21F9000
|
trusted library allocation
|
page read and write
|
||
18F3EBC0000
|
heap
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
1DEAF08B000
|
heap
|
page read and write
|
||
18F3ED02000
|
heap
|
page read and write
|
||
B0000
|
heap
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
278F1E21000
|
heap
|
page read and write
|
||
B35000
|
trusted library allocation
|
page read and write
|
||
240E000
|
trusted library allocation
|
page read and write
|
||
DFB587E000
|
stack
|
page read and write
|
||
2796000
|
trusted library allocation
|
page read and write
|
||
2421000
|
trusted library allocation
|
page read and write
|
||
20D2AA5B000
|
heap
|
page read and write
|
||
485000
|
heap
|
page read and write
|
||
2B17A402000
|
trusted library allocation
|
page read and write
|
||
B0D000
|
heap
|
page read and write
|
||
21D0000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
133E000
|
unkown
|
page read and write
|
||
2DB6000
|
trusted library allocation
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
278F1E40000
|
heap
|
page read and write
|
||
31C7000
|
trusted library allocation
|
page read and write
|
||
22BFB202000
|
trusted library allocation
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
6FC000
|
heap
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
A4A000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
4D5D000
|
stack
|
page read and write
|
||
31B2000
|
trusted library allocation
|
page read and write
|
||
26A4000
|
heap
|
page execute and read and write
|
||
20D2B313000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
20DB142A000
|
heap
|
page read and write
|
||
4CAB000
|
trusted library allocation
|
page read and write
|
||
45B22FD000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1DEAF802000
|
heap
|
page read and write
|
||
2218000
|
trusted library allocation
|
page read and write
|
||
2DF1000
|
trusted library allocation
|
page read and write
|
||
7BC0000
|
trusted library allocation
|
page read and write
|
||
80000
|
trusted library allocation
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
2E0C000
|
trusted library allocation
|
page read and write
|
||
E74000
|
unkown
|
page readonly
|
||
220B000
|
trusted library allocation
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
E86F8FE000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
6A81CFC000
|
stack
|
page read and write
|
||
215BA900000
|
heap
|
page read and write
|
||
80EE000
|
stack
|
page read and write
|
||
1280000
|
unkown
|
page readonly
|
||
650000
|
heap
|
page read and write
|
||
325D000
|
trusted library allocation
|
page read and write
|
||
106F000
|
heap
|
page read and write
|
||
5FA000
|
heap
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
2DFA0902000
|
heap
|
page read and write
|
||
1DEAFFE0000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
224A000
|
trusted library allocation
|
page read and write
|
||
3AF1000
|
trusted library allocation
|
page read and write
|
||
1DEB4510000
|
trusted library allocation
|
page read and write
|
||
6A8417C000
|
stack
|
page read and write
|
||
4D5000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2218000
|
trusted library allocation
|
page read and write
|
||
2DF6000
|
trusted library allocation
|
page read and write
|
||
DFB4DAB000
|
stack
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
20D2B803000
|
heap
|
page read and write
|
||
187E000
|
stack
|
page read and write
|
||
A08000
|
trusted library allocation
|
page read and write
|
||
2D4F000
|
trusted library allocation
|
page read and write
|
||
3276000
|
trusted library allocation
|
page read and write
|
||
278F1E54000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
B2B000
|
heap
|
page read and write
|
||
2960000
|
trusted library allocation
|
page read and write
|
||
2418000
|
trusted library allocation
|
page read and write
|
||
2DFA0864000
|
heap
|
page read and write
|
||
320E000
|
trusted library allocation
|
page read and write
|
||
AC3000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
B2F000
|
trusted library allocation
|
page read and write
|
||
2DFA0853000
|
heap
|
page read and write
|
||
2B179BB0000
|
trusted library allocation
|
page read and write
|
||
B24000
|
trusted library allocation
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
B80000
|
remote allocation
|
page read and write
|
||
B0D8CFF000
|
stack
|
page read and write
|
||
20DB1466000
|
heap
|
page read and write
|
||
3288000
|
trusted library allocation
|
page read and write
|
||
2DFA086B000
|
heap
|
page read and write
|
||
1DEB4908000
|
heap
|
page read and write
|
||
31B8000
|
trusted library allocation
|
page read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
23A1000
|
trusted library allocation
|
page read and write
|
||
A08000
|
trusted library allocation
|
page read and write
|
||
2406000
|
trusted library allocation
|
page read and write
|
||
B24000
|
trusted library allocation
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
B0D8D7F000
|
stack
|
page read and write
|
||
31E2000
|
trusted library allocation
|
page read and write
|
||
1DEB0490000
|
trusted library allocation
|
page read and write
|
||
784E000
|
stack
|
page read and write
|
||
20D2AA50000
|
heap
|
page read and write
|
||
84F000
|
heap
|
page read and write
|
||
20D2B39C000
|
heap
|
page read and write
|
||
322D000
|
trusted library allocation
|
page read and write
|
||
7D60000
|
trusted library allocation
|
page read and write
|
||
987000
|
heap
|
page read and write
|
||
B2B000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
trusted library allocation
|
page read and write
|
||
107C000
|
heap
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
7D63000
|
trusted library allocation
|
page read and write
|
||
20D2B802000
|
heap
|
page read and write
|
||
20DB1470000
|
heap
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
2D99000
|
trusted library allocation
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
8B8000
|
heap
|
page read and write
|
||
8060000
|
trusted library allocation
|
page read and write
|
||
CD2000
|
trusted library allocation
|
page execute and read and write
|
||
1DEAF058000
|
heap
|
page read and write
|
||
2273000
|
trusted library allocation
|
page read and write
|
||
2801000
|
trusted library allocation
|
page read and write
|
||
3252000
|
trusted library allocation
|
page read and write
|
||
2252000
|
trusted library allocation
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
2418000
|
trusted library allocation
|
page read and write
|
||
2033D702000
|
heap
|
page read and write
|
||
760D000
|
stack
|
page read and write
|
||
2871000
|
trusted library allocation
|
page read and write
|
||
328C000
|
trusted library allocation
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
798E000
|
stack
|
page read and write
|
||
AEF000
|
heap
|
page read and write
|
||
3269000
|
trusted library allocation
|
page read and write
|
||
320C000
|
trusted library allocation
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page execute and read and write
|
||
2DBA000
|
trusted library allocation
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
2033D4D0000
|
heap
|
page read and write
|
||
AF7D87C000
|
stack
|
page read and write
|
||
20D2AA71000
|
heap
|
page read and write
|
||
ADF000
|
heap
|
page read and write
|
||
7C6F000
|
trusted library allocation
|
page read and write
|
||
454000
|
remote allocation
|
page execute and read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
220E000
|
trusted library allocation
|
page read and write
|
||
3219000
|
trusted library allocation
|
page read and write
|
||
950000
|
trusted library allocation
|
page read and write
|
||
2631000
|
heap
|
page read and write
|
||
948000
|
trusted library allocation
|
page read and write
|
||
321B000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
18F3EC13000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2403000
|
trusted library allocation
|
page read and write
|
||
B59000
|
stack
|
page read and write
|
||
B0D85FA000
|
stack
|
page read and write
|
||
2741000
|
heap
|
page read and write
|
||
75CE000
|
stack
|
page read and write
|
||
31FA000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
direct allocation
|
page execute and read and write
|
||
2C6B000
|
trusted library allocation
|
page read and write
|
||
A7D000
|
trusted library allocation
|
page read and write
|
||
2214000
|
trusted library allocation
|
page read and write
|
||
18F3EB50000
|
heap
|
page read and write
|
||
6BF000
|
stack
|
page read and write
|
||
419000
|
remote allocation
|
page execute and read and write
|
||
20D2B394000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
20D2B3A5000
|
heap
|
page read and write
|
||
2216000
|
trusted library allocation
|
page read and write
|
||
83D000
|
heap
|
page read and write
|
||
2AF1000
|
trusted library allocation
|
page read and write
|
||
2033D66F000
|
heap
|
page read and write
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
20D2B3B3000
|
heap
|
page read and write
|
||
CEA000
|
trusted library allocation
|
page execute and read and write
|
||
21A8000
|
trusted library allocation
|
page read and write
|
||
2871000
|
trusted library allocation
|
page read and write
|
||
17B000
|
stack
|
page read and write
|
||
1DEB4790000
|
remote allocation
|
page read and write
|
||
20D2B38C000
|
heap
|
page read and write
|
||
3B14000
|
trusted library allocation
|
page read and write
|
||
2DA6000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
81EE000
|
stack
|
page read and write
|
||
2403000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
B1F000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
2266000
|
trusted library allocation
|
page read and write
|
||
20D2B38C000
|
heap
|
page read and write
|
||
FBB000
|
heap
|
page read and write
|
||
2B179C28000
|
heap
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
2771000
|
heap
|
page read and write
|
||
2DBF000
|
trusted library allocation
|
page read and write
|
||
B56000
|
stack
|
page read and write
|
||
B44000
|
trusted library allocation
|
page read and write
|
||
2290000
|
trusted library allocation
|
page read and write
|
||
23FA000
|
trusted library allocation
|
page read and write
|
||
2970000
|
trusted library allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
80F000
|
stack
|
page read and write
|
||
2402000
|
trusted library allocation
|
page read and write
|
||
298E000
|
stack
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
1334000
|
unkown
|
page readonly
|
||
2B179C68000
|
heap
|
page read and write
|
||
B34000
|
trusted library allocation
|
page read and write
|
||
ADF000
|
heap
|
page read and write
|
||
220F000
|
trusted library allocation
|
page read and write
|
||
A08000
|
trusted library allocation
|
page read and write
|
||
9FF000
|
trusted library allocation
|
page read and write
|
||
20D2B38E000
|
heap
|
page read and write
|
||
AEF000
|
heap
|
page read and write
|
||
570000
|
trusted library allocation
|
page read and write
|
||
2151000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
196DC77000
|
stack
|
page read and write
|
||
215BA740000
|
heap
|
page read and write
|
||
2E36000
|
trusted library allocation
|
page read and write
|
||
22BFAA13000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
20DB1220000
|
heap
|
page read and write
|
||
21A1000
|
trusted library allocation
|
page read and write
|
||
B2F000
|
trusted library allocation
|
page read and write
|
||
AEF000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
31BC000
|
trusted library allocation
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
3295000
|
trusted library allocation
|
page read and write
|
||
20D2B397000
|
heap
|
page read and write
|
||
2268000
|
trusted library allocation
|
page read and write
|
||
327C000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
||
4EE000
|
stack
|
page read and write
|
||
2DFA0849000
|
heap
|
page read and write
|
||
1347000
|
unkown
|
page readonly
|
||
1085000
|
heap
|
page read and write
|
||
31BF000
|
trusted library allocation
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
20D2B38B000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
3286000
|
trusted library allocation
|
page read and write
|
||
21B0000
|
trusted library allocation
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
215BA83C000
|
heap
|
page read and write
|
||
20D2B802000
|
heap
|
page read and write
|
||
620000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
6F8000
|
heap
|
page read and write
|
||
454000
|
remote allocation
|
page execute and read and write
|
||
E9E000
|
stack
|
page read and write
|
||
20D2B3A2000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
326D000
|
trusted library allocation
|
page read and write
|
||
1DEB481B000
|
heap
|
page read and write
|
||
E86FAFE000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
B1F000
|
trusted library allocation
|
page read and write
|
||
275C000
|
trusted library allocation
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
26E1000
|
trusted library allocation
|
page read and write
|
||
1077000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
20D2B3A4000
|
heap
|
page read and write
|
||
DF2000
|
trusted library allocation
|
page execute and read and write
|
||
4D4000
|
heap
|
page read and write
|
||
2D0E000
|
trusted library allocation
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
18F3EC8B000
|
heap
|
page read and write
|
||
B28000
|
trusted library allocation
|
page read and write
|
||
278F1E32000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
2033D6BB000
|
heap
|
page read and write
|
||
620000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
70D000
|
heap
|
page read and write
|
||
D07000
|
trusted library allocation
|
page execute and read and write
|
||
2403000
|
trusted library allocation
|
page read and write
|
||
883000
|
heap
|
page read and write
|
||
AF7DC7E000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
20DB1280000
|
heap
|
page read and write
|
||
21A0000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
2180000
|
trusted library allocation
|
page read and write
|
||
941000
|
trusted library allocation
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
4A0000
|
trusted library allocation
|
page read and write
|
||
1DEB483C000
|
heap
|
page read and write
|
||
48C000
|
remote allocation
|
page readonly
|
||
1DEAF959000
|
heap
|
page read and write
|
||
2351000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
1DEAF013000
|
heap
|
page read and write
|
||
23FA000
|
trusted library allocation
|
page read and write
|
||
325F000
|
trusted library allocation
|
page read and write
|
||
20D2B30F000
|
heap
|
page read and write
|
||
20D2AAE3000
|
heap
|
page read and write
|
||
81AB000
|
stack
|
page read and write
|
||
3265000
|
trusted library allocation
|
page read and write
|
||
2DFA0710000
|
heap
|
page read and write
|
||
2DA2000
|
trusted library allocation
|
page read and write
|
||
6A82377000
|
stack
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
196DE7F000
|
stack
|
page read and write
|
||
AC9000
|
heap
|
page read and write
|
||
DFB557F000
|
stack
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
B13000
|
trusted library allocation
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
20D2A9D0000
|
trusted library allocation
|
page read and write
|
||
B2E000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1DEAF740000
|
trusted library section
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2848000
|
trusted library allocation
|
page read and write
|
||
910000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
848000
|
heap
|
page read and write
|
||
1DEB0100000
|
trusted library section
|
page readonly
|
||
94D000
|
trusted library allocation
|
page read and write
|
||
2731000
|
trusted library allocation
|
page read and write
|
||
3256000
|
trusted library allocation
|
page read and write
|
||
2B179D13000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
2D93000
|
trusted library allocation
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
1DEB4902000
|
heap
|
page read and write
|
||
18F3ED00000
|
heap
|
page read and write
|
||
2288000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
2033DE02000
|
heap
|
page read and write
|
||
28EB000
|
trusted library allocation
|
page read and write
|
||
20D2B3B7000
|
heap
|
page read and write
|
||
A55000
|
heap
|
page read and write
|
||
2DB4000
|
trusted library allocation
|
page read and write
|
||
7C60000
|
heap
|
page read and write
|
||
B24000
|
trusted library allocation
|
page read and write
|
||
215BA865000
|
heap
|
page read and write
|
||
278F1F10000
|
heap
|
page read and write
|
||
1DEB4849000
|
heap
|
page read and write
|
||
4A0000
|
trusted library allocation
|
page read and write
|
||
FCF000
|
heap
|
page read and write
|
||
2033D613000
|
heap
|
page read and write
|
||
EB7000
|
heap
|
page read and write
|
||
2253000
|
trusted library allocation
|
page read and write
|
||
618000
|
heap
|
page read and write
|
||
3254000
|
trusted library allocation
|
page read and write
|
||
2826000
|
trusted library allocation
|
page read and write
|
||
278F1E37000
|
heap
|
page read and write
|
||
2DFA0846000
|
heap
|
page read and write
|
||
22BFAB02000
|
heap
|
page read and write
|
||
278F1F50000
|
heap
|
page read and write
|
||
1347000
|
unkown
|
page readonly
|
||
1C00000
|
trusted library allocation
|
page read and write
|
||
1DEB4650000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
trusted library allocation
|
page read and write
|
||
6A8407E000
|
stack
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
B34000
|
trusted library allocation
|
page read and write
|
||
196D8FD000
|
stack
|
page read and write
|
||
9FF000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
1DEB48DE000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
215BA855000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
DB559F8000
|
stack
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
A9C000
|
heap
|
page read and write
|
||
2DDE000
|
trusted library allocation
|
page read and write
|
||
2DC5000
|
trusted library allocation
|
page read and write
|
||
31E0000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
20D2AA00000
|
heap
|
page read and write
|
||
89C000
|
heap
|
page read and write
|
||
2272000
|
trusted library allocation
|
page read and write
|
||
49E000
|
stack
|
page read and write
|
||
2203000
|
trusted library allocation
|
page read and write
|
||
2DFA000
|
trusted library allocation
|
page read and write
|
||
E4F000
|
unkown
|
page readonly
|
||
AF7DFFC000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
8060000
|
trusted library allocation
|
page read and write
|
||
26A0000
|
heap
|
page execute and read and write
|
||
A08000
|
trusted library allocation
|
page read and write
|
||
22BFAA70000
|
heap
|
page read and write
|
||
2033D6C6000
|
heap
|
page read and write
|
||
2DC1000
|
trusted library allocation
|
page read and write
|
||
2E03000
|
trusted library allocation
|
page read and write
|
||
18F3EC59000
|
heap
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
B1B000
|
trusted library allocation
|
page read and write
|
||
2418000
|
trusted library allocation
|
page read and write
|
||
B28000
|
trusted library allocation
|
page read and write
|
||
241B000
|
trusted library allocation
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
1DEB4638000
|
trusted library allocation
|
page read and write
|
||
2214000
|
trusted library allocation
|
page read and write
|
||
2271000
|
trusted library allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
56E000
|
stack
|
page read and write
|
||
2256000
|
trusted library allocation
|
page read and write
|
||
31CC000
|
trusted library allocation
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
DD2000
|
trusted library allocation
|
page execute and read and write
|
||
FEF000
|
heap
|
page read and write
|
||
20D2AAEB000
|
heap
|
page read and write
|
||
8060000
|
trusted library allocation
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
9F2000
|
trusted library allocation
|
page read and write
|
||
8A608FE000
|
stack
|
page read and write
|
||
F48000
|
trusted library allocation
|
page read and write
|
||
B37000
|
heap
|
page read and write
|
||
B2F000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
30CD000
|
trusted library allocation
|
page read and write
|
||
B43000
|
heap
|
page read and write
|
||
12A000
|
stack
|
page read and write
|
||
2033D530000
|
heap
|
page read and write
|
||
1281000
|
unkown
|
page execute read
|
||
4CDE000
|
stack
|
page read and write
|
||
721D000
|
stack
|
page read and write
|
||
215BA6D0000
|
heap
|
page read and write
|
||
2DFA0832000
|
heap
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
833000
|
heap
|
page read and write
|
||
2771000
|
heap
|
page read and write
|
||
1DEAF092000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
8CC000
|
stack
|
page read and write
|
||
4D5000
|
heap
|
page read and write
|
||
B05000
|
heap
|
page read and write
|
||
ADF000
|
heap
|
page read and write
|
||
2B179C79000
|
heap
|
page read and write
|
||
DC1000
|
unkown
|
page execute read
|
||
220F000
|
trusted library allocation
|
page read and write
|
||
2033D713000
|
heap
|
page read and write
|
||
215BA888000
|
heap
|
page read and write
|
||
20D2B396000
|
heap
|
page read and write
|
||
2D0A000
|
trusted library allocation
|
page read and write
|
||
220D000
|
trusted library allocation
|
page read and write
|
||
228E000
|
trusted library allocation
|
page read and write
|
||
8A7000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
8072000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
AE7000
|
heap
|
page read and write
|
||
8B6000
|
heap
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
B1C000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
149F8E36000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
20D2AAC2000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
B1D000
|
trusted library allocation
|
page read and write
|
||
A9D000
|
heap
|
page read and write
|
||
B34000
|
trusted library allocation
|
page read and write
|
||
3280000
|
trusted library allocation
|
page read and write
|
||
AC7000
|
heap
|
page read and write
|
||
25E1000
|
heap
|
page read and write
|
||
7FC10000
|
trusted library allocation
|
page execute and read and write
|
||
20D2B3B6000
|
heap
|
page read and write
|
||
278F1CE0000
|
heap
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
2E3E000
|
trusted library allocation
|
page read and write
|
||
31F8000
|
trusted library allocation
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
215BA86F000
|
heap
|
page read and write
|
||
AF7DAFE000
|
stack
|
page read and write
|
||
21FA000
|
trusted library allocation
|
page read and write
|
||
2E10000
|
trusted library allocation
|
page read and write
|
||
B24000
|
trusted library allocation
|
page read and write
|
||
2DFA06A0000
|
heap
|
page read and write
|
||
2214000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
220F000
|
trusted library allocation
|
page read and write
|
||
1DEB48FE000
|
heap
|
page read and write
|
||
2660000
|
trusted library allocation
|
page read and write
|
||
2B03000
|
trusted library allocation
|
page read and write
|
||
215BA813000
|
heap
|
page read and write
|
||
1DEB4906000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
1BF4000
|
heap
|
page read and write
|
||
2730000
|
trusted library allocation
|
page read and write
|
||
4CA5000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
unkown
|
page execute read
|
||
B38000
|
trusted library allocation
|
page read and write
|
||
833000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
2E3A000
|
trusted library allocation
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
8073000
|
trusted library allocation
|
page read and write
|
||
20DB1437000
|
heap
|
page read and write
|
||
B13000
|
heap
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
83C000
|
heap
|
page read and write
|
||
570000
|
trusted library allocation
|
page read and write
|
||
B16000
|
trusted library allocation
|
page read and write
|
||
2224000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2D8F000
|
trusted library allocation
|
page read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
AE2000
|
heap
|
page read and write
|
||
570000
|
trusted library allocation
|
page read and write
|
||
B2F000
|
trusted library allocation
|
page read and write
|
||
B0D8E7F000
|
stack
|
page read and write
|
||
79E000
|
stack
|
page read and write
|
||
B09000
|
trusted library allocation
|
page read and write
|
||
195000
|
stack
|
page read and write
|
||
8EC000
|
heap
|
page read and write
|
||
215BB002000
|
trusted library allocation
|
page read and write
|
||
2206000
|
trusted library allocation
|
page read and write
|
||
2159000
|
trusted library allocation
|
page read and write
|
||
A68000
|
trusted library allocation
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
20D2B375000
|
heap
|
page read and write
|
||
20D2B398000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2274000
|
trusted library allocation
|
page read and write
|
||
A2F000
|
stack
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
3170000
|
trusted library allocation
|
page read and write
|
||
20D2B3AD000
|
heap
|
page read and write
|
||
2282000
|
trusted library allocation
|
page read and write
|
||
149F8E40000
|
heap
|
page read and write
|
||
A0D000
|
trusted library allocation
|
page read and write
|
||
9F3000
|
trusted library allocation
|
page read and write
|
||
278F1E34000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
30CF000
|
trusted library allocation
|
page read and write
|
||
6A83D2C000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
B1F000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
B28000
|
trusted library allocation
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
EC7000
|
heap
|
page read and write
|
||
DE6000
|
trusted library allocation
|
page execute and read and write
|
||
89C000
|
heap
|
page read and write
|
||
3231000
|
trusted library allocation
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
25E1000
|
heap
|
page read and write
|
||
2DEB000
|
trusted library allocation
|
page read and write
|
||
B0A000
|
trusted library allocation
|
page read and write
|
||
6A8227A000
|
stack
|
page read and write
|
||
2DE9000
|
trusted library allocation
|
page read and write
|
||
2741000
|
heap
|
page read and write
|
||
3282000
|
trusted library allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
2DD2000
|
trusted library allocation
|
page read and write
|
||
B44000
|
trusted library allocation
|
page read and write
|
||
20D2B397000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
B1E000
|
trusted library allocation
|
page read and write
|
||
21C0000
|
trusted library allocation
|
page read and write
|
||
2DFA06B0000
|
heap
|
page read and write
|
||
2300000
|
trusted library allocation
|
page read and write
|
||
2403000
|
trusted library allocation
|
page read and write
|
||
DC2000
|
trusted library allocation
|
page execute and read and write
|
||
20D2B802000
|
heap
|
page read and write
|
||
A11000
|
trusted library allocation
|
page read and write
|
||
745E000
|
stack
|
page read and write
|
||
149F9602000
|
trusted library allocation
|
page read and write
|
||
8FA000
|
heap
|
page read and write
|
||
4D5000
|
heap
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
20D2B397000
|
heap
|
page read and write
|
||
9EA000
|
trusted library allocation
|
page read and write
|
||
20D2B81A000
|
heap
|
page read and write
|
||
220F000
|
trusted library allocation
|
page read and write
|
||
8A60B7B000
|
stack
|
page read and write
|
||
215BA86F000
|
heap
|
page read and write
|
||
149F8F02000
|
heap
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
195000
|
stack
|
page read and write
|
||
1DEAF918000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
90F000
|
stack
|
page read and write
|
||
21AD000
|
trusted library allocation
|
page read and write
|
||
149F8E51000
|
heap
|
page read and write
|
||
2290000
|
trusted library allocation
|
page read and write
|
||
241D000
|
trusted library allocation
|
page read and write
|
||
4B78000
|
trusted library allocation
|
page read and write
|
||
2D08000
|
trusted library allocation
|
page read and write
|
||
220F000
|
trusted library allocation
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
27B8000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2DCC000
|
trusted library allocation
|
page read and write
|
||
A93000
|
heap
|
page read and write
|
||
DFB5A7F000
|
stack
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
76DE000
|
stack
|
page read and write
|
||
215BA770000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
AC3000
|
heap
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
220E000
|
trusted library allocation
|
page read and write
|
||
2206000
|
trusted library allocation
|
page read and write
|
||
2E40000
|
trusted library allocation
|
page read and write
|
||
2282000
|
trusted library allocation
|
page read and write
|
||
B7E000
|
heap
|
page read and write
|
||
9BF000
|
heap
|
page read and write
|
||
854000
|
heap
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
1DEAEF70000
|
heap
|
page read and write
|
||
2211000
|
trusted library allocation
|
page read and write
|
||
27AE000
|
stack
|
page read and write
|
||
2671000
|
heap
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
1DEB4829000
|
heap
|
page read and write
|
||
22BFAA8A000
|
heap
|
page read and write
|
||
1DEB4700000
|
trusted library allocation
|
page read and write
|
||
2DFA0886000
|
heap
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
2DFA0842000
|
heap
|
page read and write
|
||
3203000
|
trusted library allocation
|
page read and write
|
||
20D2B802000
|
heap
|
page read and write
|
||
31E9000
|
trusted library allocation
|
page read and write
|
||
21C1000
|
trusted library allocation
|
page read and write
|
||
1C90000
|
heap
|
page read and write
|
||
1DEAF06F000
|
heap
|
page read and write
|
||
2B179D00000
|
heap
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
C25FCEB000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
215BA860000
|
heap
|
page read and write
|
||
B23000
|
trusted library allocation
|
page read and write
|
||
2DFA084C000
|
heap
|
page read and write
|
||
AF7DEFF000
|
stack
|
page read and write
|
||
7C72000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
B26000
|
trusted library allocation
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
2DEF000
|
trusted library allocation
|
page read and write
|
||
C2604FE000
|
stack
|
page read and write
|
||
940000
|
trusted library allocation
|
page read and write
|
||
B2E000
|
trusted library allocation
|
page read and write
|
||
2033D4C0000
|
heap
|
page read and write
|
||
2253000
|
trusted library allocation
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
1DEB4770000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
B1F000
|
trusted library allocation
|
page read and write
|
||
21CD000
|
trusted library allocation
|
page read and write
|
||
B16000
|
trusted library allocation
|
page read and write
|
||
241D000
|
trusted library allocation
|
page read and write
|
||
E0B000
|
trusted library allocation
|
page execute and read and write
|
||
23B1000
|
heap
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
215BA88F000
|
heap
|
page read and write
|
||
CF2000
|
trusted library allocation
|
page execute and read and write
|
||
7FAB000
|
stack
|
page read and write
|
||
ACE000
|
heap
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
6A846FF000
|
stack
|
page read and write
|
||
2268000
|
trusted library allocation
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
3261000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1DEAF0FD000
|
heap
|
page read and write
|
||
31F4000
|
trusted library allocation
|
page read and write
|
||
6A83DAD000
|
stack
|
page read and write
|
||
20D2B3B5000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
2224000
|
trusted library allocation
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
7EE0000
|
trusted library allocation
|
page execute and read and write
|
||
130F000
|
unkown
|
page readonly
|
||
220F000
|
trusted library allocation
|
page read and write
|
||
2DFA0866000
|
heap
|
page read and write
|
||
454000
|
remote allocation
|
page execute and read and write
|
||
B5F000
|
heap
|
page read and write
|
||
A0B000
|
trusted library allocation
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
B34000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
20D2B3C8000
|
heap
|
page read and write
|
||
20D2B39A000
|
heap
|
page read and write
|
||
21A0000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
A61000
|
trusted library allocation
|
page read and write
|
||
1DEAF815000
|
heap
|
page read and write
|
||
27B8000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
678000
|
heap
|
page read and write
|
||
2B179C3D000
|
heap
|
page read and write
|
||
1DEB0483000
|
trusted library allocation
|
page read and write
|
||
A47000
|
heap
|
page read and write
|
||
228E000
|
trusted library allocation
|
page read and write
|
||
B0D8A7E000
|
stack
|
page read and write
|
||
20D2B3A0000
|
heap
|
page read and write
|
||
2206000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
22BFAA29000
|
heap
|
page read and write
|
||
B2E000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
20D2AA5A000
|
heap
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
6A8247F000
|
stack
|
page read and write
|
||
2B179C00000
|
heap
|
page read and write
|
||
278F1F45000
|
heap
|
page read and write
|
||
454000
|
remote allocation
|
page execute and read and write
|
||
18F3EC02000
|
heap
|
page read and write
|
||
A3D000
|
heap
|
page read and write
|
||
A69000
|
trusted library allocation
|
page read and write
|
||
7FEE000
|
stack
|
page read and write
|
||
6A8217E000
|
stack
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
80AD000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
B2D000
|
heap
|
page read and write
|
||
7C65000
|
trusted library allocation
|
page read and write
|
||
8BF000
|
heap
|
page read and write
|
||
196DB7E000
|
stack
|
page read and write
|
||
2796000
|
trusted library allocation
|
page read and write
|
||
B23000
|
trusted library allocation
|
page read and write
|
||
9FF000
|
stack
|
page read and write
|
||
20D2B3A3000
|
heap
|
page read and write
|
||
B57000
|
heap
|
page read and write
|
||
20D2AAAB000
|
heap
|
page read and write
|
||
18F3EC80000
|
heap
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
224A000
|
trusted library allocation
|
page read and write
|
||
2253000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2215000
|
trusted library allocation
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
9F9000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page execute and read and write
|
||
20D2AADB000
|
heap
|
page read and write
|
||
56E000
|
stack
|
page read and write
|
||
8F7000
|
heap
|
page read and write
|
||
149F8C50000
|
heap
|
page read and write
|
||
45B21FF000
|
stack
|
page read and write
|
||
833000
|
heap
|
page read and write
|
||
9F9000
|
trusted library allocation
|
page read and write
|
||
63D000
|
heap
|
page read and write
|
||
2E44000
|
trusted library allocation
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
4CB0000
|
trusted library allocation
|
page read and write
|
||
20D2B39C000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
C2601FB000
|
stack
|
page read and write
|
||
B16000
|
trusted library allocation
|
page read and write
|
||
2BAE000
|
trusted library allocation
|
page read and write
|
||
28EC000
|
trusted library allocation
|
page read and write
|
||
8065000
|
trusted library allocation
|
page read and write
|
||
B13000
|
trusted library allocation
|
page read and write
|
||
20D2AAF6000
|
heap
|
page read and write
|
||
220E000
|
trusted library allocation
|
page read and write
|
||
6A81DFD000
|
stack
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
AEF000
|
heap
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
2404000
|
trusted library allocation
|
page read and write
|
||
48C000
|
remote allocation
|
page readonly
|
||
20DB1513000
|
heap
|
page read and write
|
||
1BBE000
|
stack
|
page read and write
|
||
2DFA0847000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
881000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
B26000
|
trusted library allocation
|
page read and write
|
||
2271000
|
trusted library allocation
|
page read and write
|
||
31E6000
|
trusted library allocation
|
page read and write
|
||
B2F000
|
trusted library allocation
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
7ACE000
|
stack
|
page read and write
|
||
196D5CB000
|
stack
|
page read and write
|
||
278F1E4E000
|
heap
|
page read and write
|
||
8070000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page readonly
|
||
B0D89FE000
|
stack
|
page read and write
|
||
20DB1502000
|
heap
|
page read and write
|
||
2161000
|
trusted library allocation
|
page read and write
|
||
2254000
|
trusted library allocation
|
page read and write
|
||
93B000
|
heap
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
326F000
|
trusted library allocation
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
196DAFB000
|
stack
|
page read and write
|
||
24B0000
|
heap
|
page read and write
|
||
2DCA000
|
trusted library allocation
|
page read and write
|
||
98A000
|
heap
|
page read and write
|
||
8AD000
|
heap
|
page read and write
|
||
1072000
|
heap
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
419000
|
remote allocation
|
page execute and read and write
|
||
467000
|
heap
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
31CA000
|
trusted library allocation
|
page read and write
|
||
7FB0000
|
trusted library allocation
|
page read and write
|
||
1DEB488D000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
2690000
|
trusted library allocation
|
page read and write
|
||
31D7000
|
trusted library allocation
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
22BFAA00000
|
heap
|
page read and write
|
||
1DEB48FC000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
9F6000
|
trusted library allocation
|
page read and write
|
||
20D2B375000
|
heap
|
page read and write
|
||
B26000
|
trusted library allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
31C5000
|
trusted library allocation
|
page read and write
|
||
577000
|
heap
|
page read and write
|
||
1DEB4670000
|
trusted library allocation
|
page read and write
|
||
1DEB4800000
|
heap
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
B5F000
|
heap
|
page read and write
|
||
1DEB48E4000
|
heap
|
page read and write
|
||
220F000
|
trusted library allocation
|
page read and write
|
||
ADF000
|
heap
|
page read and write
|
||
48C000
|
remote allocation
|
page readonly
|
||
2AE0000
|
trusted library allocation
|
page read and write
|
||
8060000
|
trusted library allocation
|
page read and write
|
||
B44000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
852000
|
heap
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
20D2B394000
|
heap
|
page read and write
|
||
485000
|
heap
|
page read and write
|
||
E86FBFF000
|
stack
|
page read and write
|
||
31B6000
|
trusted library allocation
|
page read and write
|
||
E86F87B000
|
stack
|
page read and write
|
||
20D2B3A0000
|
heap
|
page read and write
|
||
B59000
|
heap
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
3284000
|
trusted library allocation
|
page read and write
|
||
17C000
|
stack
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
DB5597E000
|
stack
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
AC1000
|
trusted library allocation
|
page read and write
|
||
570000
|
trusted library allocation
|
page read and write
|
||
B28000
|
trusted library allocation
|
page read and write
|
||
20D2B802000
|
heap
|
page read and write
|
||
2D0C000
|
trusted library allocation
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
20DB145A000
|
heap
|
page read and write
|
||
454000
|
remote allocation
|
page execute and read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
2771000
|
heap
|
page read and write
|
||
328A000
|
trusted library allocation
|
page read and write
|
||
56E000
|
stack
|
page read and write
|
||
AC6000
|
heap
|
page read and write
|
||
17B000
|
stack
|
page read and write
|
||
220F000
|
trusted library allocation
|
page read and write
|
||
AF7E0FE000
|
stack
|
page read and write
|
||
220E000
|
trusted library allocation
|
page read and write
|
||
45E000
|
stack
|
page read and write
|
||
7C61000
|
heap
|
page read and write
|
||
1DEAF800000
|
heap
|
page read and write
|
||
20D2AB02000
|
heap
|
page read and write
|
||
6A82578000
|
stack
|
page read and write
|
||
3224000
|
trusted library allocation
|
page read and write
|
||
8080000
|
trusted library allocation
|
page read and write
|
||
17B000
|
stack
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
B38000
|
trusted library allocation
|
page read and write
|
||
130F000
|
unkown
|
page readonly
|
||
240A000
|
trusted library allocation
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
820000
|
trusted library allocation
|
page read and write
|
||
2B179C60000
|
heap
|
page read and write
|
||
7D61000
|
trusted library allocation
|
page read and write
|
||
AB1000
|
trusted library allocation
|
page read and write
|
||
AD8000
|
heap
|
page read and write
|
||
2B179C13000
|
heap
|
page read and write
|
||
227D000
|
trusted library allocation
|
page read and write
|
||
2918000
|
trusted library allocation
|
page read and write
|
||
1BF0000
|
heap
|
page read and write
|
||
505000
|
heap
|
page read and write
|
||
2DAB000
|
trusted library allocation
|
page read and write
|
||
20D2B352000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
2330000
|
trusted library allocation
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
650000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
215BA829000
|
heap
|
page read and write
|
||
1DEB00E0000
|
trusted library section
|
page readonly
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
2E0A000
|
trusted library allocation
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
20D2B38E000
|
heap
|
page read and write
|
||
240E000
|
trusted library allocation
|
page read and write
|
||
82EF000
|
stack
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
2E31000
|
trusted library allocation
|
page read and write
|
||
2E01000
|
trusted library allocation
|
page read and write
|
||
241B000
|
trusted library allocation
|
page read and write
|
||
B15000
|
trusted library allocation
|
page read and write
|
||
9FD000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
560000
|
trusted library allocation
|
page read and write
|
||
794F000
|
stack
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
261E000
|
stack
|
page read and write
|
||
31D5000
|
trusted library allocation
|
page read and write
|
||
868000
|
heap
|
page read and write
|
||
228B000
|
trusted library allocation
|
page read and write
|
||
AC4000
|
heap
|
page read and write
|
||
7BF000
|
stack
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
3207000
|
trusted library allocation
|
page read and write
|
||
3790000
|
direct allocation
|
page execute and read and write
|
||
B02000
|
heap
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
DB5587A000
|
stack
|
page read and write
|
||
872000
|
heap
|
page read and write
|
||
220E000
|
trusted library allocation
|
page read and write
|
||
3229000
|
trusted library allocation
|
page read and write
|
||
1DEAFB01000
|
trusted library allocation
|
page read and write
|
||
A55000
|
heap
|
page read and write
|
||
316A000
|
trusted library allocation
|
page read and write
|
||
4B80000
|
trusted library allocation
|
page read and write
|
||
20D2A930000
|
heap
|
page read and write
|
||
227E000
|
trusted library allocation
|
page read and write
|
||
530000
|
trusted library allocation
|
page read and write
|
||
B2E000
|
trusted library allocation
|
page read and write
|
||
2203000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
20D2B3A0000
|
heap
|
page read and write
|
||
3540000
|
trusted library allocation
|
page read and write
|
||
7DC000
|
stack
|
page read and write
|
||
AEF000
|
heap
|
page read and write
|
||
20D2B38A000
|
heap
|
page read and write
|
||
2D9B000
|
trusted library allocation
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
2B179B20000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
B0D80DC000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
275B000
|
trusted library allocation
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
B1F000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
A71000
|
trusted library allocation
|
page read and write
|
||
B2F000
|
trusted library allocation
|
page read and write
|
||
31F1000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
2358000
|
trusted library allocation
|
page read and write
|
||
18F3EC90000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
20D2AB13000
|
heap
|
page read and write
|
||
B2F000
|
trusted library allocation
|
page read and write
|
||
B87000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2421000
|
trusted library allocation
|
page read and write
|
||
741C000
|
stack
|
page read and write
|
||
21D1000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
B22000
|
heap
|
page read and write
|
||
2033DF32000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
23F9000
|
trusted library allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
B25000
|
trusted library allocation
|
page read and write
|
||
31FC000
|
trusted library allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
20D2B300000
|
heap
|
page read and write
|
||
419000
|
remote allocation
|
page execute and read and write
|
||
DFB547D000
|
stack
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
20D2B38E000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
226A000
|
trusted library allocation
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
18F3ED13000
|
heap
|
page read and write
|
||
2631000
|
heap
|
page read and write
|
||
2DFA0843000
|
heap
|
page read and write
|
||
2DD5000
|
trusted library allocation
|
page read and write
|
||
2731000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
149F8DF0000
|
remote allocation
|
page read and write
|
||
215D000
|
trusted library allocation
|
page read and write
|
||
1DEB480F000
|
heap
|
page read and write
|
||
1280000
|
unkown
|
page readonly
|
||
215BA6E0000
|
heap
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
28D8000
|
trusted library allocation
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
A06000
|
trusted library allocation
|
page read and write
|
||
2214000
|
trusted library allocation
|
page read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
B1A000
|
trusted library allocation
|
page read and write
|
||
1024000
|
heap
|
page read and write
|
||
484000
|
heap
|
page read and write
|
||
9FE000
|
trusted library allocation
|
page read and write
|
||
31D3000
|
trusted library allocation
|
page read and write
|
||
B1F000
|
trusted library allocation
|
page read and write
|
||
20D2B391000
|
heap
|
page read and write
|
||
20D2A940000
|
heap
|
page read and write
|
||
25E1000
|
heap
|
page read and write
|
||
2DED000
|
trusted library allocation
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
B0D897E000
|
stack
|
page read and write
|
||
2671000
|
heap
|
page read and write
|
||
2288000
|
trusted library allocation
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
7D61000
|
trusted library allocation
|
page read and write
|
||
21F1000
|
trusted library allocation
|
page read and write
|
||
E02000
|
trusted library allocation
|
page read and write
|
||
4C90000
|
trusted library allocation
|
page execute and read and write
|
||
AC0000
|
heap
|
page read and write
|
||
2DAF000
|
trusted library allocation
|
page read and write
|
||
2871000
|
trusted library allocation
|
page read and write
|
||
20D2B3AD000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
E7E000
|
unkown
|
page write copy
|
||
8070000
|
trusted library allocation
|
page read and write
|
||
8060000
|
trusted library allocation
|
page read and write
|
||
327E000
|
trusted library allocation
|
page read and write
|
||
B80000
|
remote allocation
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
B2F000
|
trusted library allocation
|
page read and write
|
||
1BE000
|
stack
|
page read and write
|
||
20D2A9A0000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
220F000
|
trusted library allocation
|
page read and write
|
||
2731000
|
trusted library allocation
|
page read and write
|
||
2253000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
trusted library allocation
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page execute and read and write
|
||
9DF000
|
stack
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
2D91000
|
trusted library allocation
|
page read and write
|
||
4D1E000
|
stack
|
page read and write
|
||
225E000
|
trusted library allocation
|
page read and write
|
||
220F000
|
trusted library allocation
|
page read and write
|
||
A61000
|
trusted library allocation
|
page read and write
|
||
8A6097F000
|
stack
|
page read and write
|
||
B2B000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
1DEB4654000
|
trusted library allocation
|
page read and write
|
||
595000
|
heap
|
page read and write
|
||
2288000
|
trusted library allocation
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
20D2B38A000
|
heap
|
page read and write
|
||
2033DF00000
|
heap
|
page read and write
|
||
2DFA0829000
|
heap
|
page read and write
|
||
2DFA0862000
|
heap
|
page read and write
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
2033D560000
|
trusted library allocation
|
page read and write
|
||
29D0000
|
heap
|
page execute and read and write
|
||
454000
|
remote allocation
|
page execute and read and write
|
||
225E000
|
trusted library allocation
|
page read and write
|
||
196D87E000
|
stack
|
page read and write
|
||
2DFA085D000
|
heap
|
page read and write
|
||
AF7D67C000
|
stack
|
page read and write
|
||
989000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
AE2000
|
heap
|
page read and write
|
||
769E000
|
stack
|
page read and write
|
||
2B179B80000
|
heap
|
page read and write
|
||
22BFAA7C000
|
heap
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
81B0000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
2255000
|
trusted library allocation
|
page read and write
|
||
580000
|
remote allocation
|
page read and write
|
||
9D0000
|
trusted library allocation
|
page read and write
|
||
B1F000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
7FC000
|
stack
|
page read and write
|
||
195000
|
stack
|
page read and write
|
||
20D2B802000
|
heap
|
page read and write
|
||
3271000
|
trusted library allocation
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
47C000
|
heap
|
page read and write
|
||
F40000
|
trusted library allocation
|
page read and write
|
||
220E000
|
trusted library allocation
|
page read and write
|
||
98B000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
278F1E26000
|
heap
|
page read and write
|
||
20D2B802000
|
heap
|
page read and write
|
||
C2603FE000
|
stack
|
page read and write
|
||
7E8000
|
heap
|
page read and write
|
||
20DB1400000
|
heap
|
page read and write
|
||
1DEB4630000
|
trusted library allocation
|
page read and write
|
||
2DD7000
|
trusted library allocation
|
page read and write
|
||
650000
|
trusted library allocation
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
1072000
|
heap
|
page read and write
|
||
419000
|
remote allocation
|
page execute and read and write
|
||
B19000
|
trusted library allocation
|
page read and write
|
||
87B000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
20D2B3A4000
|
heap
|
page read and write
|
||
20D2B800000
|
heap
|
page read and write
|
||
B1E000
|
trusted library allocation
|
page read and write
|
||
2D51000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
A81000
|
trusted library allocation
|
page read and write
|
||
3293000
|
trusted library allocation
|
page read and write
|
||
1DEAF913000
|
heap
|
page read and write
|
||
4D4000
|
heap
|
page read and write
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
20D2B397000
|
heap
|
page read and write
|
||
849000
|
heap
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
2DA4000
|
trusted library allocation
|
page read and write
|
||
7AC000
|
stack
|
page read and write
|
||
195000
|
stack
|
page read and write
|
||
ACC000
|
heap
|
page read and write
|
||
31E4000
|
trusted library allocation
|
page read and write
|
||
20D2B3A2000
|
heap
|
page read and write
|
||
45B217D000
|
stack
|
page read and write
|
||
DFB567D000
|
stack
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
1DEB4790000
|
remote allocation
|
page read and write
|
||
3213000
|
trusted library allocation
|
page read and write
|
||
2203000
|
trusted library allocation
|
page read and write
|
||
6A81D7E000
|
stack
|
page read and write
|
||
215BA859000
|
heap
|
page read and write
|
||
2033D689000
|
heap
|
page read and write
|
||
2DD9000
|
trusted library allocation
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
31B4000
|
trusted library allocation
|
page read and write
|
||
215BA85D000
|
heap
|
page read and write
|
||
2955000
|
trusted library allocation
|
page read and write
|
||
B34000
|
trusted library allocation
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
1DEAEF60000
|
heap
|
page read and write
|
||
B5F000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
B1F000
|
trusted library allocation
|
page read and write
|
||
B1F000
|
trusted library allocation
|
page read and write
|
||
B34000
|
trusted library allocation
|
page read and write
|
||
B5A000
|
heap
|
page read and write
|
||
2151000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
2271000
|
trusted library allocation
|
page read and write
|
||
7AF000
|
stack
|
page read and write
|
||
1C0000
|
remote allocation
|
page read and write
|
||
AEF000
|
heap
|
page read and write
|
||
2808000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
AF6000
|
heap
|
page read and write
|
||
5B4000
|
heap
|
page read and write
|
||
B1F000
|
trusted library allocation
|
page read and write
|
There are 2167 hidden memdumps, click here to show them.