Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
h3yRbjNWk1.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\1000350002\6a8d4317d4.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\num[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000349001\ea2c7beae0.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000357001\4af6eb3e1f.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000401001\num.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8X6R8OO7U6CNLMSAL.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\K46P1Y9YPMFY7JJQPHSRNJ30DZ0HXET.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TG9CYTS7E59ZPZXS3YT9LXONWNDMZM8.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4af6eb3e1f.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Tasks\skotes.job
|
data
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\h3yRbjNWk1.exe
|
"C:\Users\user\Desktop\h3yRbjNWk1.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\1000349001\ea2c7beae0.exe
|
"C:\Users\user\AppData\Local\Temp\1000349001\ea2c7beae0.exe"
|
||
C:\Users\user\1000350002\6a8d4317d4.exe
|
"C:\Users\user\1000350002\6a8d4317d4.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000349001\ea2c7beae0.exe
|
"C:\Users\user\AppData\Local\Temp\1000349001\ea2c7beae0.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000357001\4af6eb3e1f.exe
|
"C:\Users\user\AppData\Local\Temp\1000357001\4af6eb3e1f.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
|
||
C:\Users\user\1000350002\6a8d4317d4.exe
|
"C:\Users\user\1000350002\6a8d4317d4.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000401001\num.exe
|
"C:\Users\user\AppData\Local\Temp\1000401001\num.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000349001\ea2c7beae0.exe
|
"C:\Users\user\AppData\Local\Temp\1000349001\ea2c7beae0.exe"
|
||
C:\Users\user\1000350002\6a8d4317d4.exe
|
"C:\Users\user\1000350002\6a8d4317d4.exe"
|
||
C:\Users\user\AppData\Local\Temp\TG9CYTS7E59ZPZXS3YT9LXONWNDMZM8.exe
|
"C:\Users\user\AppData\Local\Temp\TG9CYTS7E59ZPZXS3YT9LXONWNDMZM8.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000401001\num.exe
|
"C:\Users\user\AppData\Local\Temp\1000401001\num.exe"
|
||
C:\Users\user\AppData\Local\Temp\K46P1Y9YPMFY7JJQPHSRNJ30DZ0HXET.exe
|
"C:\Users\user\AppData\Local\Temp\K46P1Y9YPMFY7JJQPHSRNJ30DZ0HXET.exe"
|
||
C:\Users\user\AppData\Local\Temp\8X6R8OO7U6CNLMSAL.exe
|
"C:\Users\user\AppData\Local\Temp\8X6R8OO7U6CNLMSAL.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 10 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/S
|
unknown
|
||
http://185.215.113.37/L
|
unknown
|
||
http://185.215.113.37/M
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpo
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpv
|
unknown
|
||
studennotediw.store
|
|||
http://185.215.113.37/v
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phps
|
unknown
|
||
http://185.215.113.37/s
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpd
|
unknown
|
||
dissapoiznw.store
|
|||
https://steamcommunity.com/profiles/76561199724331900t
|
unknown
|
||
http://185.215.113.37/ata
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900
|
104.102.49.254
|
||
eaglepawnoy.store
|
|||
https://steamcommunity.com/profiles/76561199724331900/inventory/
|
unknown
|
||
http://185.215.113.37/
|
185.215.113.37
|
||
https://www.cloudflare.com/learning/access-management/phishing-attack/
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php395d7fac00b58987e8fff7a7df309c5441f
|
unknown
|
||
https://www.cloudflare.com/learning/acces
|
unknown
|
||
http://185.215.113.103/luma/random.exe
|
185.215.113.103
|
||
https://community.steamstat=_
|
unknown
|
||
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
|
unknown
|
||
https://licendfilteo.site/
|
unknown
|
||
https://sergei-esenin.com/
|
unknown
|
||
https://community.steamstatic.com/public/css/globalv2.css?v=dQy8Omh4p9PH&l=english
|
unknown
|
||
https://www.gstatic.cn/recaptcha/
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpnu
|
unknown
|
||
http://www.valvesoftware.com/legal.htm
|
unknown
|
||
https://www.youtube.com
|
unknown
|
||
https://sergei-esenin.com/rs
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php38c2817dba29a4b5b25dcf03
|
unknown
|
||
https://sergei-esenin.com/pki/ceP
|
unknown
|
||
https://eaglepawnoy.store:443/api4Y
|
unknown
|
||
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
|
unknown
|
||
https://sergei-esenin.com/bisy
|
unknown
|
||
https://clearancek.site/J
|
unknown
|
||
https://s.ytimg.com;
|
unknown
|
||
https://eaglepawnoy.store:443/api
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
|
unknown
|
||
https://licendfilteo.site:443/apiH
|
unknown
|
||
https://www.cloudflare.com/learning/a
|
unknown
|
||
https://studennotediw.store:443/api:d
|
unknown
|
||
https://sergei-esenin.com/om
|
unknown
|
||
https://community.steamstatic.com/public/css/skin_1/pr
|
unknown
|
||
https://community.steamstatic.com/public/css/skin_1/profilev2.css?v=t9xiI4DlPpEB&l=english
|
unknown
|
||
http://store.st
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
http://185.215.113.103/mine/random.exeP
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://community.steamstatic.com/p
|
unknown
|
||
https://lv.queniujq.cn
|
unknown
|
||
https://sergei-esenin.com/s.j
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://licendfilteo.site:443/apiF1
|
unknown
|
||
https://www.cloudflare.com/5xx-error-landing
|
unknown
|
||
https://sergei-esenin.com/pi
|
unknown
|
||
https://www.google.com/recaptcha/
|
unknown
|
||
https://checkout.steampowered.com/
|
unknown
|
||
https://community.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
|
unknown
|
||
http://185.215.113.103/mine/random.exe
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpded
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phprPe
|
unknown
|
||
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpqy
|
unknown
|
||
https://community.steamstatic.com/public/css/promo/summer2017/stickers.css?v=P8gOPraCSjV6&l=engl
|
unknown
|
||
https://community.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL&l=
|
unknown
|
||
https://help.steampowered.com/en/
|
unknown
|
||
http://185.215.113.372
|
unknown
|
||
https://sergei-esenin.com/Cy
|
unknown
|
||
https://sergei-esenin.com/D
|
unknown
|
||
https://community.steamstatic.com/public/javascript/global.js?v=7qlUmHSJhPRN&l=english
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpC
|
unknown
|
||
https://sergei-esenin.com/5
|
unknown
|
||
https://sergei-esenin.com/6
|
unknown
|
||
http://185.215.113.103/steam/random.exeV;
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpJ
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpH
|
unknown
|
||
https://recaptcha.net/recaptcha/;
|
unknown
|
||
https://dissapoiznw.store:443/api
|
unknown
|
||
https://sergei-esenin.com/4
|
unknown
|
||
https://community.steamstatic.com/public/shared/css/shared_responsive.css?v=kR7y
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php4
|
unknown
|
||
https://sergei-esenin.com:443/api4p.default-release/key4.dbPK
|
unknown
|
||
https://broadcast.st.dl.eccdnx.com
|
unknown
|
||
https://sergei-esenin.com/Up
|
unknown
|
||
https://community.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
|
unknown
|
||
https://sergei-esenin.com/ia_id
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://community.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
|
unknown
|
||
https://community.steamstatic.com/public/shared/css/buttons.css?v=-WV9f1LdxEjq&l=english
|
unknown
|
||
https://community.steamstatic.com/public/javascript/applications/community/libraries~b28b7af69.js?v=
|
unknown
|
||
https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a61J
|
unknown
|
||
https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a61
|
unknown
|
||
https://sergei-esenin.com/apipE
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
steamcommunity.com
|
104.102.49.254
|
||
sergei-esenin.com
|
104.21.53.8
|
||
eaglepawnoy.store
|
unknown
|
||
bathdoomgaz.store
|
unknown
|
||
spirittunek.store
|
unknown
|
||
licendfilteo.site
|
unknown
|
||
studennotediw.store
|
unknown
|
||
mobbipenju.store
|
unknown
|
||
clearancek.site
|
unknown
|
||
dissapoiznw.store
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.43
|
unknown
|
Portugal
|
||
104.21.53.8
|
sergei-esenin.com
|
United States
|
||
185.215.113.37
|
unknown
|
Portugal
|
||
104.102.49.254
|
steamcommunity.com
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
185.215.113.103
|
unknown
|
Portugal
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
ea2c7beae0.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
6a8d4317d4.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
num.exe
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
There are 2 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
651000
|
unkown
|
page execute and write copy
|
||
95E000
|
heap
|
page read and write
|
||
7C1000
|
unkown
|
page execute and read and write
|
||
A51000
|
unkown
|
page execute and read and write
|
||
5150000
|
direct allocation
|
page read and write
|
||
4F50000
|
direct allocation
|
page read and write
|
||
4EC0000
|
direct allocation
|
page read and write
|
||
5160000
|
direct allocation
|
page read and write
|
||
651000
|
unkown
|
page execute and write copy
|
||
A51000
|
unkown
|
page execute and read and write
|
||
D21000
|
unkown
|
page execute and read and write
|
||
D21000
|
unkown
|
page execute and read and write
|
||
651000
|
unkown
|
page execute and write copy
|
||
11EE000
|
heap
|
page read and write
|
||
94B000
|
heap
|
page read and write
|
||
651000
|
unkown
|
page execute and write copy
|
||
C47000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
A51000
|
unkown
|
page execute and read and write
|
||
5490000
|
direct allocation
|
page read and write
|
||
D21000
|
unkown
|
page execute and read and write
|
||
4AE0000
|
direct allocation
|
page read and write
|
||
D58000
|
heap
|
page read and write
|
||
5210000
|
direct allocation
|
page read and write
|
||
162B000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page read and write
|
||
438E000
|
stack
|
page read and write
|
||
838000
|
heap
|
page read and write
|
||
A99000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
B31000
|
unkown
|
page execute and write copy
|
||
5AC8000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
23C000
|
unkown
|
page readonly
|
||
13BF000
|
stack
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
49A000
|
unkown
|
page execute and read and write
|
||
4851000
|
heap
|
page read and write
|
||
16EF000
|
heap
|
page read and write
|
||
3A0E000
|
stack
|
page read and write
|
||
59B5000
|
trusted library allocation
|
page read and write
|
||
3E8F000
|
stack
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
A51000
|
unkown
|
page execute and write copy
|
||
1244000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
E67000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
3390000
|
direct allocation
|
page read and write
|
||
553C000
|
trusted library allocation
|
page read and write
|
||
1669000
|
heap
|
page read and write
|
||
853000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
13D5000
|
unkown
|
page execute and write copy
|
||
4D81000
|
heap
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
1054000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
AF4000
|
heap
|
page read and write
|
||
C5E000
|
unkown
|
page execute and read and write
|
||
800000
|
heap
|
page read and write
|
||
561A000
|
trusted library allocation
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
5B9000
|
unkown
|
page execute and write copy
|
||
AF4000
|
heap
|
page read and write
|
||
D90000
|
direct allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
direct allocation
|
page execute and read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
552F000
|
trusted library allocation
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
4B1F000
|
stack
|
page read and write
|
||
5250000
|
direct allocation
|
page read and write
|
||
53B5000
|
trusted library allocation
|
page read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
1D54E000
|
stack
|
page read and write
|
||
5367000
|
trusted library allocation
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
59EE000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
47E1000
|
heap
|
page read and write
|
||
E2B000
|
unkown
|
page execute and write copy
|
||
550E000
|
trusted library allocation
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
398F000
|
stack
|
page read and write
|
||
E22000
|
heap
|
page read and write
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
551A000
|
trusted library allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
DAC000
|
unkown
|
page execute and write copy
|
||
4D10000
|
heap
|
page execute and read and write
|
||
47E1000
|
heap
|
page read and write
|
||
550D000
|
trusted library allocation
|
page read and write
|
||
119E000
|
stack
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
716E000
|
stack
|
page read and write
|
||
565E000
|
stack
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
376F000
|
stack
|
page read and write
|
||
4B40000
|
trusted library allocation
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
5312000
|
trusted library allocation
|
page read and write
|
||
27B0000
|
direct allocation
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
36DF000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
53C6000
|
trusted library allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
33CB000
|
heap
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
D1D000
|
unkown
|
page execute and read and write
|
||
4411000
|
heap
|
page read and write
|
||
D79000
|
unkown
|
page execute and write copy
|
||
33CE000
|
stack
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
40DF000
|
stack
|
page read and write
|
||
5A10000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
1330000
|
direct allocation
|
page read and write
|
||
3390000
|
direct allocation
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
6215000
|
heap
|
page read and write
|
||
A29000
|
heap
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
A51000
|
unkown
|
page execute and write copy
|
||
4CC1000
|
heap
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
67B000
|
unkown
|
page write copy
|
||
FC4000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
59AA000
|
trusted library allocation
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
AAA000
|
heap
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
AC6000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
473F000
|
stack
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
51AF000
|
stack
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
4650000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
59A5000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
59A6000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4E20000
|
remote allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
411E000
|
stack
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
1B09F000
|
stack
|
page read and write
|
||
552F000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
327F000
|
stack
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
A15000
|
heap
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
1676000
|
heap
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
ACA000
|
unkown
|
page execute and write copy
|
||
453F000
|
stack
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
5110000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
E29000
|
unkown
|
page execute and write copy
|
||
10B0000
|
direct allocation
|
page read and write
|
||
47E0000
|
heap
|
page read and write
|
||
B4C000
|
stack
|
page read and write
|
||
E58000
|
heap
|
page read and write
|
||
A50000
|
unkown
|
page readonly
|
||
DB3000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
AB9000
|
unkown
|
page write copy
|
||
13FB000
|
heap
|
page read and write
|
||
1218000
|
unkown
|
page execute and read and write
|
||
4CF6000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
503D000
|
stack
|
page read and write
|
||
54F7000
|
trusted library allocation
|
page read and write
|
||
5384000
|
trusted library allocation
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
3390000
|
direct allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
1119000
|
unkown
|
page execute and read and write
|
||
DA2000
|
unkown
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
53B3000
|
trusted library allocation
|
page read and write
|
||
53E3000
|
trusted library allocation
|
page read and write
|
||
103E000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
4EB0000
|
direct allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
DAE000
|
heap
|
page read and write
|
||
4EB0000
|
direct allocation
|
page read and write
|
||
1330000
|
direct allocation
|
page read and write
|
||
4F50000
|
direct allocation
|
page read and write
|
||
574F000
|
stack
|
page read and write
|
||
6DC000
|
stack
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
134C000
|
heap
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
538C000
|
trusted library allocation
|
page read and write
|
||
598F000
|
trusted library allocation
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
102F000
|
heap
|
page read and write
|
||
2907000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
5955000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page read and write
|
||
4CAF000
|
stack
|
page read and write
|
||
4D05000
|
trusted library allocation
|
page read and write
|
||
1B9000
|
unkown
|
page write copy
|
||
1071000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
FFE000
|
heap
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
4F70000
|
direct allocation
|
page execute and read and write
|
||
318E000
|
stack
|
page read and write
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
1D09E000
|
stack
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
53AD000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4E00000
|
direct allocation
|
page execute and read and write
|
||
53C6000
|
trusted library allocation
|
page read and write
|
||
53B1000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
55CC000
|
trusted library allocation
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
AC2000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
ABF000
|
heap
|
page read and write
|
||
54F3000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
3067000
|
heap
|
page read and write
|
||
554D000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
BBF000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
478E000
|
stack
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
D95000
|
unkown
|
page execute and write copy
|
||
855000
|
heap
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
1244000
|
heap
|
page read and write
|
||
E77000
|
heap
|
page read and write
|
||
1D12D000
|
stack
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
5508000
|
trusted library allocation
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
5A33000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
3D5E000
|
stack
|
page read and write
|
||
5504000
|
trusted library allocation
|
page read and write
|
||
535C000
|
trusted library allocation
|
page read and write
|
||
DAA000
|
heap
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
5A0B000
|
trusted library allocation
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
9DB000
|
stack
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
D98000
|
heap
|
page read and write
|
||
ABB000
|
unkown
|
page execute and read and write
|
||
5399000
|
trusted library allocation
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
3390000
|
direct allocation
|
page read and write
|
||
53F6000
|
trusted library allocation
|
page read and write
|
||
5374000
|
trusted library allocation
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
4950000
|
trusted library allocation
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
4AC0000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
54F1000
|
trusted library allocation
|
page read and write
|
||
852000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
E59000
|
heap
|
page read and write
|
||
5383000
|
trusted library allocation
|
page read and write
|
||
53AD000
|
trusted library allocation
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
5314000
|
trusted library allocation
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
5369000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
B31000
|
unkown
|
page execute and write copy
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
48CE000
|
stack
|
page read and write
|
||
58D6000
|
trusted library allocation
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
5320000
|
direct allocation
|
page execute and read and write
|
||
3ACF000
|
stack
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
5566000
|
trusted library allocation
|
page read and write
|
||
A4B000
|
heap
|
page read and write
|
||
23C000
|
unkown
|
page readonly
|
||
AF4000
|
heap
|
page read and write
|
||
B31000
|
unkown
|
page execute and read and write
|
||
26CC000
|
heap
|
page read and write
|
||
2D0F000
|
stack
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
AB1000
|
unkown
|
page execute and read and write
|
||
122E000
|
unkown
|
page execute and read and write
|
||
153E000
|
stack
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
7DA000
|
heap
|
page read and write
|
||
AB5000
|
heap
|
page read and write
|
||
535B000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
56EE000
|
stack
|
page read and write
|
||
118E000
|
stack
|
page read and write
|
||
DD1000
|
unkown
|
page execute and read and write
|
||
535F000
|
trusted library allocation
|
page read and write
|
||
5506000
|
trusted library allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
54CD000
|
trusted library allocation
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
338E000
|
stack
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
A3F000
|
heap
|
page read and write
|
||
D61000
|
unkown
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
57E000
|
unkown
|
page execute and write copy
|
||
4DB1000
|
heap
|
page read and write
|
||
550B000
|
trusted library allocation
|
page read and write
|
||
1B35D000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
AC6000
|
heap
|
page read and write
|
||
5538000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
48E0000
|
trusted library allocation
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
10B0000
|
direct allocation
|
page read and write
|
||
5369000
|
trusted library allocation
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
122F000
|
unkown
|
page execute and write copy
|
||
5A3E000
|
trusted library allocation
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
54D7000
|
trusted library allocation
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
53AA000
|
trusted library allocation
|
page read and write
|
||
4C40000
|
trusted library allocation
|
page read and write
|
||
D82000
|
heap
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
AAF000
|
heap
|
page read and write
|
||
B10000
|
direct allocation
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
E67000
|
heap
|
page read and write
|
||
A29000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
FC4000
|
heap
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
DB6000
|
unkown
|
page execute and read and write
|
||
552C000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
316E000
|
stack
|
page read and write
|
||
D4F000
|
unkown
|
page execute and write copy
|
||
4411000
|
heap
|
page read and write
|
||
58D2000
|
trusted library allocation
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
58D8000
|
trusted library allocation
|
page read and write
|
||
E6C000
|
heap
|
page read and write
|
||
438F000
|
stack
|
page read and write
|
||
31A000
|
unkown
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
71000
|
unkown
|
page execute and write copy
|
||
9DE000
|
stack
|
page read and write
|
||
AB9000
|
unkown
|
page write copy
|
||
537F000
|
trusted library allocation
|
page read and write
|
||
1052000
|
heap
|
page read and write
|
||
ACC000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
28FF000
|
stack
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
1330000
|
direct allocation
|
page read and write
|
||
8F5000
|
stack
|
page read and write
|
||
5372000
|
trusted library allocation
|
page read and write
|
||
CF8000
|
unkown
|
page execute and write copy
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
AF4000
|
heap
|
page read and write
|
||
58DB000
|
trusted library allocation
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
557B000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
E82000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
7CD000
|
heap
|
page read and write
|
||
D85000
|
heap
|
page read and write
|
||
360F000
|
stack
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
489E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
E31000
|
unkown
|
page execute and write copy
|
||
54DD000
|
trusted library allocation
|
page read and write
|
||
4A58000
|
heap
|
page read and write
|
||
5AE9000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
5517000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
A87000
|
heap
|
page read and write
|
||
16F5000
|
heap
|
page read and write
|
||
53BD000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
58D7000
|
trusted library allocation
|
page read and write
|
||
5596000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
4CC1000
|
heap
|
page read and write
|
||
509D000
|
stack
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
D12000
|
unkown
|
page execute and read and write
|
||
E3C000
|
heap
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
C85000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
845000
|
heap
|
page read and write
|
||
59BA000
|
trusted library allocation
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
D90000
|
direct allocation
|
page read and write
|
||
D90000
|
direct allocation
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
5B59000
|
trusted library allocation
|
page read and write
|
||
4C2D000
|
trusted library allocation
|
page execute and read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
15A4000
|
heap
|
page read and write
|
||
9FF000
|
stack
|
page read and write
|
||
4940000
|
direct allocation
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
560F000
|
trusted library allocation
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
537F000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
58DA000
|
trusted library allocation
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
40CF000
|
stack
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
11A7000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
1083000
|
heap
|
page read and write
|
||
55E2000
|
trusted library allocation
|
page read and write
|
||
48BE000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
E58000
|
heap
|
page read and write
|
||
4DC3000
|
trusted library allocation
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
10DB000
|
heap
|
page read and write
|
||
AB9000
|
unkown
|
page write copy
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
40FF000
|
stack
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
D41000
|
unkown
|
page execute and read and write
|
||
4FFF000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
702E000
|
stack
|
page read and write
|
||
537D000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
E1D000
|
unkown
|
page execute and write copy
|
||
C84000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
13D4000
|
unkown
|
page execute and read and write
|
||
E6A000
|
heap
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
5367000
|
trusted library allocation
|
page read and write
|
||
E00000
|
unkown
|
page execute and read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
D1D000
|
unkown
|
page execute and read and write
|
||
C84000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
10B0000
|
direct allocation
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
F6A000
|
unkown
|
page execute and read and write
|
||
4880000
|
remote allocation
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
7BD000
|
heap
|
page read and write
|
||
4EB0000
|
direct allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
B9B000
|
unkown
|
page execute and read and write
|
||
1CBBF000
|
stack
|
page read and write
|
||
5356000
|
trusted library allocation
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
54D7000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
536B000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
54FE000
|
trusted library allocation
|
page read and write
|
||
5367000
|
trusted library allocation
|
page read and write
|
||
9B7000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
3D8E000
|
stack
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
A1C000
|
stack
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
47AF000
|
stack
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
A29000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
E2A000
|
unkown
|
page execute and read and write
|
||
10C8000
|
heap
|
page read and write
|
||
4D0D000
|
trusted library allocation
|
page read and write
|
||
45D0000
|
trusted library allocation
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
1B31D000
|
stack
|
page read and write
|
||
3ECE000
|
stack
|
page read and write
|
||
329F000
|
stack
|
page read and write
|
||
A50000
|
unkown
|
page readonly
|
||
D44000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
5250000
|
direct allocation
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
D26000
|
unkown
|
page execute and write copy
|
||
59F7000
|
trusted library allocation
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
7DD000
|
stack
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
108F000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
75E000
|
unkown
|
page execute and write copy
|
||
5022000
|
trusted library allocation
|
page read and write
|
||
535B000
|
trusted library allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
E3F000
|
unkown
|
page execute and read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
53DD000
|
stack
|
page read and write
|
||
A29000
|
heap
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
B10000
|
direct allocation
|
page read and write
|
||
A50000
|
unkown
|
page readonly
|
||
399F000
|
stack
|
page read and write
|
||
ABA000
|
heap
|
page read and write
|
||
39CE000
|
stack
|
page read and write
|
||
C3E000
|
unkown
|
page execute and read and write
|
||
1AB2C000
|
stack
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
334E000
|
stack
|
page read and write
|
||
310C000
|
stack
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
5030000
|
heap
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
598E000
|
trusted library allocation
|
page read and write
|
||
4F5F000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
D82000
|
heap
|
page read and write
|
||
A0F000
|
heap
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
13D4000
|
unkown
|
page execute and read and write
|
||
E31000
|
unkown
|
page execute and write copy
|
||
378F000
|
stack
|
page read and write
|
||
1D37D000
|
stack
|
page read and write
|
||
E26000
|
heap
|
page read and write
|
||
49D0000
|
direct allocation
|
page execute and read and write
|
||
D59000
|
unkown
|
page execute and write copy
|
||
4980000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
ABE000
|
heap
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
1A9ED000
|
stack
|
page read and write
|
||
4EB0000
|
direct allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
266B000
|
stack
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4A6E000
|
stack
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
4C24000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
5B4F000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
12FD000
|
stack
|
page read and write
|
||
ACA000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
1A8ED000
|
stack
|
page read and write
|
||
A42000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
45DF000
|
stack
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
E1A000
|
unkown
|
page execute and write copy
|
||
B00000
|
direct allocation
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
A36A000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
59FD000
|
stack
|
page read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
54EF000
|
trusted library allocation
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
68FB000
|
stack
|
page read and write
|
||
79F000
|
heap
|
page read and write
|
||
384F000
|
stack
|
page read and write
|
||
1052000
|
heap
|
page read and write
|
||
D51000
|
unkown
|
page execute and write copy
|
||
3B0E000
|
stack
|
page read and write
|
||
5518000
|
trusted library allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
D90000
|
direct allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
D59000
|
unkown
|
page execute and write copy
|
||
FC4000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
2D7F000
|
stack
|
page read and write
|
||
5A12000
|
trusted library allocation
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
538E000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
49F0000
|
direct allocation
|
page execute and read and write
|
||
7E4000
|
heap
|
page read and write
|
||
FC4000
|
heap
|
page read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
AFB000
|
stack
|
page read and write
|
||
1330000
|
direct allocation
|
page read and write
|
||
4B0F000
|
stack
|
page read and write
|
||
A51000
|
unkown
|
page execute and write copy
|
||
44CF000
|
stack
|
page read and write
|
||
E58000
|
heap
|
page read and write
|
||
E31000
|
unkown
|
page execute and write copy
|
||
C3E000
|
unkown
|
page execute and read and write
|
||
56A2000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
D20000
|
unkown
|
page readonly
|
||
A29000
|
heap
|
page read and write
|
||
53AA000
|
trusted library allocation
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
E02000
|
unkown
|
page execute and read and write
|
||
B90000
|
unkown
|
page execute and read and write
|
||
58D3000
|
trusted library allocation
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
539D000
|
trusted library allocation
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
58D3000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
E96000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
1D50F000
|
stack
|
page read and write
|
||
F7E000
|
unkown
|
page execute and read and write
|
||
7E4000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
334C000
|
stack
|
page read and write
|
||
58D9000
|
trusted library allocation
|
page read and write
|
||
531E000
|
trusted library allocation
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
18EE000
|
stack
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
376F000
|
stack
|
page read and write
|
||
5316000
|
trusted library allocation
|
page read and write
|
||
27FE000
|
stack
|
page read and write
|
||
E7F000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
66E000
|
unkown
|
page readonly
|
||
ACA000
|
heap
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
1B4AE000
|
stack
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
647E000
|
heap
|
page read and write
|
||
1B21D000
|
stack
|
page read and write
|
||
461E000
|
stack
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
6F5000
|
stack
|
page read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
5561000
|
trusted library allocation
|
page read and write
|
||
D59000
|
unkown
|
page execute and write copy
|
||
411E000
|
stack
|
page read and write
|
||
CCC000
|
stack
|
page read and write
|
||
B10000
|
direct allocation
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
D78000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
E1A000
|
unkown
|
page execute and write copy
|
||
3390000
|
direct allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
53C6000
|
trusted library allocation
|
page read and write
|
||
1A2F000
|
stack
|
page read and write
|
||
6480000
|
heap
|
page read and write
|
||
DCF000
|
unkown
|
page execute and write copy
|
||
537D000
|
trusted library allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
54CA000
|
trusted library allocation
|
page read and write
|
||
E67000
|
heap
|
page read and write
|
||
4D7F000
|
stack
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
DC5000
|
stack
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
C84000
|
heap
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
B90000
|
unkown
|
page execute and read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
B10000
|
direct allocation
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
4C30000
|
trusted library allocation
|
page read and write
|
||
3E9E000
|
stack
|
page read and write
|
||
5250000
|
direct allocation
|
page read and write
|
||
4A50000
|
heap
|
page read and write
|
||
4F3D000
|
stack
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
4EFE000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
A25E000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
direct allocation
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page readonly
|
||
425E000
|
stack
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
4C70000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
C84000
|
heap
|
page read and write
|
||
5122000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
2D4F000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
467F000
|
stack
|
page read and write
|
||
10CE000
|
heap
|
page read and write
|
||
511F000
|
trusted library allocation
|
page read and write
|
||
58A0000
|
remote allocation
|
page read and write
|
||
B9A000
|
unkown
|
page execute and write copy
|
||
572E000
|
stack
|
page read and write
|
||
FC4000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
550D000
|
stack
|
page read and write
|
||
54E4000
|
trusted library allocation
|
page read and write
|
||
F1E000
|
stack
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
470F000
|
stack
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
E40000
|
unkown
|
page execute and write copy
|
||
1244000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
435F000
|
stack
|
page read and write
|
||
10B0000
|
direct allocation
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
3F0E000
|
stack
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
D90000
|
direct allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2C6E000
|
stack
|
page read and write
|
||
54D7000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
5143000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
AF4000
|
heap
|
page read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
58DD000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
47E1000
|
heap
|
page read and write
|
||
72CE000
|
stack
|
page read and write
|
||
5402000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
59E5000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
82D000
|
heap
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
84E000
|
heap
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
60CC000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
55CF000
|
stack
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
167E000
|
heap
|
page read and write
|
||
551E000
|
trusted library allocation
|
page read and write
|
||
439E000
|
stack
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
538C000
|
trusted library allocation
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
151000
|
unkown
|
page execute and write copy
|
||
5011000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
AAE000
|
heap
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
47BF000
|
stack
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
5356000
|
trusted library allocation
|
page read and write
|
||
7C7000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
4CCD000
|
stack
|
page read and write
|
||
388F000
|
stack
|
page read and write
|
||
5100000
|
trusted library allocation
|
page read and write
|
||
4C3F000
|
stack
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
5367000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
823E000
|
stack
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
AB6000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
395F000
|
stack
|
page read and write
|
||
B9C000
|
unkown
|
page execute and write copy
|
||
47E1000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
B10000
|
direct allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
55EE000
|
stack
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
FC4000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
2B07000
|
heap
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
54D7000
|
trusted library allocation
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
ADE000
|
stack
|
page read and write
|
||
701000
|
unkown
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
14B9000
|
heap
|
page read and write
|
||
D20000
|
unkown
|
page read and write
|
||
85E000
|
heap
|
page read and write
|
||
75C000
|
unkown
|
page execute and write copy
|
||
27B0000
|
direct allocation
|
page read and write
|
||
AAF000
|
heap
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
F6A000
|
unkown
|
page execute and read and write
|
||
49A1000
|
heap
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
DD2000
|
unkown
|
page execute and write copy
|
||
78E000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
449F000
|
stack
|
page read and write
|
||
D59000
|
unkown
|
page execute and read and write
|
||
1244000
|
heap
|
page read and write
|
||
58D5000
|
trusted library allocation
|
page read and write
|
||
5402000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
48EF000
|
stack
|
page read and write
|
||
DAD000
|
unkown
|
page execute and read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
D59000
|
unkown
|
page execute and write copy
|
||
2C5F000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
538C000
|
trusted library allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
27CF000
|
stack
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
550F000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
D5A000
|
unkown
|
page execute and write copy
|
||
A44000
|
heap
|
page read and write
|
||
11EF000
|
unkown
|
page execute and read and write
|
||
1115000
|
heap
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page read and write
|
||
4800000
|
heap
|
page read and write
|
||
538A000
|
trusted library allocation
|
page read and write
|
||
58D8000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4C4F000
|
stack
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
E40000
|
unkown
|
page execute and write copy
|
||
4DB1000
|
heap
|
page read and write
|
||
485F000
|
stack
|
page read and write
|
||
12FD000
|
stack
|
page read and write
|
||
CCE000
|
stack
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
3390000
|
direct allocation
|
page read and write
|
||
569A000
|
trusted library allocation
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4410000
|
heap
|
page read and write
|
||
5B0D000
|
trusted library allocation
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
107B000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
10D7000
|
heap
|
page read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
5579000
|
trusted library allocation
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
5370000
|
direct allocation
|
page execute and read and write
|
||
7E4000
|
heap
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
A0AA000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
4970000
|
heap
|
page read and write
|
||
10B0000
|
direct allocation
|
page read and write
|
||
168A000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
84E000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
5507000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
75E000
|
unkown
|
page execute and write copy
|
||
634000
|
heap
|
page read and write
|
||
3D1E000
|
stack
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
D50000
|
unkown
|
page execute and read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
1AF5E000
|
stack
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page execute and read and write
|
||
5508000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
3DCE000
|
stack
|
page read and write
|
||
AA3000
|
heap
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
421F000
|
stack
|
page read and write
|
||
414E000
|
stack
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
35DE000
|
stack
|
page read and write
|
||
1CFED000
|
stack
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
4C5B000
|
trusted library allocation
|
page execute and read and write
|
||
1310000
|
heap
|
page read and write
|
||
DE4000
|
heap
|
page read and write
|
||
712E000
|
stack
|
page read and write
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
4A60000
|
heap
|
page read and write
|
||
5359000
|
trusted library allocation
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
414F000
|
stack
|
page read and write
|
||
A50000
|
unkown
|
page read and write
|
||
4F60000
|
direct allocation
|
page execute and read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
DD1000
|
unkown
|
page execute and read and write
|
||
47E1000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
5410000
|
direct allocation
|
page execute and read and write
|
||
59CC000
|
trusted library allocation
|
page read and write
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
ACA000
|
heap
|
page read and write
|
||
466F000
|
stack
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
D20000
|
unkown
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
A3D000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
2A9E000
|
stack
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
418E000
|
stack
|
page read and write
|
||
3390000
|
direct allocation
|
page read and write
|
||
50DD000
|
stack
|
page read and write
|
||
5C2D000
|
stack
|
page read and write
|
||
56D1000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
E82000
|
heap
|
page read and write
|
||
4880000
|
remote allocation
|
page read and write
|
||
DBF000
|
unkown
|
page execute and read and write
|
||
C84000
|
heap
|
page read and write
|
||
54CB000
|
trusted library allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
832000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
853000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
AE0000
|
direct allocation
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
547C000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
4DF0000
|
direct allocation
|
page execute and read and write
|
||
E58000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
B4F000
|
stack
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
FDB000
|
stack
|
page read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
5A07000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
E61000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
54F5000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
6D0000
|
remote allocation
|
page execute and read and write
|
||
415E000
|
stack
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
4C57000
|
trusted library allocation
|
page execute and read and write
|
||
10B0000
|
direct allocation
|
page read and write
|
||
4A3F000
|
stack
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
339000
|
stack
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
5555000
|
trusted library allocation
|
page read and write
|
||
58D5000
|
trusted library allocation
|
page read and write
|
||
A29000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
4BF9000
|
trusted library allocation
|
page read and write
|
||
378E000
|
stack
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
58D3000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
54E7000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
5CED000
|
stack
|
page read and write
|
||
5A0F000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
53A5000
|
trusted library allocation
|
page read and write
|
||
16AA000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
83D000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
51B1000
|
direct allocation
|
page read and write
|
||
A99000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
11EF000
|
stack
|
page read and write
|
||
D1D000
|
unkown
|
page execute and write copy
|
||
D90000
|
direct allocation
|
page read and write
|
||
122E000
|
unkown
|
page execute and write copy
|
||
8AC000
|
unkown
|
page readonly
|
||
54E9000
|
trusted library allocation
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
3A9F000
|
stack
|
page read and write
|
||
DAE000
|
unkown
|
page execute and write copy
|
||
47D0000
|
direct allocation
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
1071000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
5362000
|
trusted library allocation
|
page read and write
|
||
AF9000
|
stack
|
page read and write
|
||
D4B000
|
unkown
|
page execute and read and write
|
||
4CC6000
|
trusted library allocation
|
page read and write
|
||
E77000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
2A0F000
|
stack
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
5548000
|
trusted library allocation
|
page read and write
|
||
A50000
|
unkown
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
4510000
|
trusted library allocation
|
page read and write
|
||
E3F000
|
unkown
|
page execute and write copy
|
||
805000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
E02000
|
unkown
|
page execute and read and write
|
||
1A6AE000
|
stack
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
5377000
|
trusted library allocation
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
545E000
|
stack
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
5B6F000
|
trusted library allocation
|
page read and write
|
||
103E000
|
heap
|
page read and write
|
||
FAC000
|
stack
|
page read and write
|
||
66E000
|
unkown
|
page readonly
|
||
5372000
|
trusted library allocation
|
page read and write
|
||
537D000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
5369000
|
trusted library allocation
|
page read and write
|
||
589E000
|
stack
|
page read and write
|
||
10B0000
|
direct allocation
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
D44000
|
heap
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
DD1000
|
unkown
|
page execute and read and write
|
||
47E1000
|
heap
|
page read and write
|
||
165F000
|
heap
|
page read and write
|
||
5535000
|
trusted library allocation
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
26C000
|
unkown
|
page write copy
|
||
59D8000
|
trusted library allocation
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
839000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
5515000
|
trusted library allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
54EF000
|
trusted library allocation
|
page read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
5586000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
3D8F000
|
stack
|
page read and write
|
||
182E000
|
stack
|
page read and write
|
||
DBF000
|
unkown
|
page execute and read and write
|
||
58D1000
|
trusted library allocation
|
page read and write
|
||
1D3A4000
|
heap
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
D85000
|
unkown
|
page execute and write copy
|
||
1110000
|
heap
|
page read and write
|
||
10CA000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
54CF000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
5999000
|
trusted library allocation
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
407D000
|
stack
|
page read and write
|
||
1CF9E000
|
stack
|
page read and write
|
||
DCF000
|
stack
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
1CCFF000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
448F000
|
stack
|
page read and write
|
||
5597000
|
trusted library allocation
|
page read and write
|
||
306D000
|
heap
|
page read and write
|
||
4A70000
|
trusted library allocation
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
1218000
|
unkown
|
page execute and read and write
|
||
A0F000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
E3F000
|
unkown
|
page execute and write copy
|
||
11EA000
|
heap
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
5395000
|
trusted library allocation
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
54C6000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
direct allocation
|
page read and write
|
||
58D7000
|
trusted library allocation
|
page read and write
|
||
C3E000
|
unkown
|
page execute and read and write
|
||
312000
|
unkown
|
page execute and read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
5A9F000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
heap
|
page read and write
|
||
852000
|
heap
|
page read and write
|
||
1D1DF000
|
stack
|
page read and write
|
||
D21000
|
unkown
|
page execute and write copy
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
AC6000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
E29000
|
unkown
|
page execute and write copy
|
||
B20000
|
direct allocation
|
page read and write
|
||
539D000
|
trusted library allocation
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
310000
|
unkown
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
5376000
|
trusted library allocation
|
page read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
1AE5E000
|
stack
|
page read and write
|
||
1D22C000
|
stack
|
page read and write
|
||
1CE5E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
58D5000
|
trusted library allocation
|
page read and write
|
||
6215000
|
heap
|
page read and write
|
||
B90000
|
unkown
|
page execute and write copy
|
||
C84000
|
heap
|
page read and write
|
||
2C4E000
|
stack
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
3E5F000
|
stack
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
5010000
|
direct allocation
|
page execute and read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
1330000
|
direct allocation
|
page read and write
|
||
1077000
|
heap
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
5369000
|
trusted library allocation
|
page read and write
|
||
CF8000
|
unkown
|
page execute and write copy
|
||
1D33D000
|
stack
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
5369000
|
trusted library allocation
|
page read and write
|
||
39CF000
|
stack
|
page read and write
|
||
101F000
|
stack
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
4F5C000
|
stack
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
274000
|
unkown
|
page readonly
|
||
3CBE000
|
stack
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
53A8000
|
trusted library allocation
|
page read and write
|
||
35DE000
|
stack
|
page read and write
|
||
650000
|
unkown
|
page readonly
|
||
7E4000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
598D000
|
trusted library allocation
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
26AE000
|
stack
|
page read and write
|
||
AB9000
|
unkown
|
page write copy
|
||
4CC1000
|
heap
|
page read and write
|
||
ABF000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
13D5000
|
unkown
|
page execute and write copy
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
67EC000
|
stack
|
page read and write
|
||
4E51000
|
trusted library allocation
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
846000
|
heap
|
page read and write
|
||
345F000
|
stack
|
page read and write
|
||
836000
|
heap
|
page read and write
|
||
5E6A000
|
trusted library allocation
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
ACC000
|
heap
|
page read and write
|
||
AA1000
|
heap
|
page read and write
|
||
5E51000
|
trusted library allocation
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
A8D000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
59AD000
|
trusted library allocation
|
page read and write
|
||
A36A000
|
heap
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
53C6000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
5B2D000
|
stack
|
page read and write
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
5A2F000
|
trusted library allocation
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
359F000
|
stack
|
page read and write
|
||
551F000
|
trusted library allocation
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
1D3A0000
|
heap
|
page read and write
|
||
D59000
|
unkown
|
page execute and write copy
|
||
A70000
|
direct allocation
|
page read and write
|
||
312000
|
unkown
|
page execute and write copy
|
||
4411000
|
heap
|
page read and write
|
||
E7F000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
5384000
|
trusted library allocation
|
page read and write
|
||
5372000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
144E000
|
heap
|
page read and write
|
||
D12000
|
unkown
|
page execute and read and write
|
||
312F000
|
stack
|
page read and write
|
||
1330000
|
direct allocation
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
400F000
|
stack
|
page read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
EF0000
|
unkown
|
page execute and write copy
|
||
754000
|
heap
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
1033000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
5018000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
84E000
|
heap
|
page read and write
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
3390000
|
direct allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
554E000
|
trusted library allocation
|
page read and write
|
||
DDD000
|
unkown
|
page execute and read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
5100000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
1465000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
1330000
|
direct allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
2917000
|
heap
|
page read and write
|
||
829000
|
unkown
|
page write copy
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
D28000
|
unkown
|
page execute and write copy
|
||
54D7000
|
trusted library allocation
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
5377000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
499F000
|
stack
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
1244000
|
heap
|
page read and write
|
||
89A000
|
unkown
|
page read and write
|
||
FC4000
|
heap
|
page read and write
|
||
53C9000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
3BDF000
|
stack
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
5271000
|
direct allocation
|
page read and write
|
||
58D4000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
10B0000
|
direct allocation
|
page read and write
|
||
7CF000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
28CF000
|
stack
|
page read and write
|
||
83FA000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
165F000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
493E000
|
stack
|
page read and write
|
||
49CF000
|
stack
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
1676000
|
heap
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
4890000
|
direct allocation
|
page read and write
|
||
26C000
|
unkown
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
53C6000
|
trusted library allocation
|
page read and write
|
||
D1D000
|
unkown
|
page execute and write copy
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
AC6000
|
heap
|
page read and write
|
||
62DF000
|
stack
|
page read and write
|
||
5150000
|
direct allocation
|
page read and write
|
||
E1B000
|
heap
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
58D3000
|
trusted library allocation
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
551C000
|
trusted library allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
EEE000
|
unkown
|
page execute and read and write
|
||
D41000
|
unkown
|
page execute and read and write
|
||
564E000
|
stack
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
10D6000
|
heap
|
page read and write
|
||
168D000
|
heap
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
4F5000
|
stack
|
page read and write
|
||
A35E000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
1076000
|
heap
|
page read and write
|
||
4EB0000
|
direct allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
AA3000
|
heap
|
page read and write
|
||
47EE000
|
stack
|
page read and write
|
||
B90000
|
unkown
|
page execute and write copy
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
12C000
|
stack
|
page read and write
|
||
D9E000
|
unkown
|
page execute and write copy
|
||
C84000
|
heap
|
page read and write
|
||
4CFC000
|
stack
|
page read and write
|
||
5318000
|
trusted library allocation
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
460F000
|
stack
|
page read and write
|
||
435F000
|
stack
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
2AE0000
|
direct allocation
|
page execute and read and write
|
||
AA1000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
1CE000
|
stack
|
page read and write
|
||
A9E000
|
heap
|
page read and write
|
||
597F000
|
trusted library allocation
|
page read and write
|
||
4EB4000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
2C2F000
|
stack
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
D4F000
|
unkown
|
page execute and write copy
|
||
D90000
|
direct allocation
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
154F000
|
stack
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
11EF000
|
unkown
|
page execute and read and write
|
||
AF4000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
A9E000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
54FC000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
471F000
|
stack
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
1077000
|
heap
|
page read and write
|
||
3FDE000
|
stack
|
page read and write
|
||
1468000
|
heap
|
page read and write
|
||
1CF9F000
|
stack
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
82B000
|
unkown
|
page execute and read and write
|
||
2A8F000
|
stack
|
page read and write
|
||
1D40E000
|
stack
|
page read and write
|
||
59DA000
|
trusted library allocation
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
2E8F000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
3390000
|
direct allocation
|
page read and write
|
||
53C3000
|
trusted library allocation
|
page read and write
|
||
13DE000
|
stack
|
page read and write
|
||
10B0000
|
direct allocation
|
page read and write
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
E2A000
|
unkown
|
page execute and read and write
|
||
C60000
|
unkown
|
page execute and write copy
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
1B1DF000
|
stack
|
page read and write
|
||
5300000
|
direct allocation
|
page execute and read and write
|
||
E40000
|
heap
|
page read and write
|
||
A0F000
|
heap
|
page read and write
|
||
E67000
|
heap
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
DF3000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
5E75000
|
trusted library allocation
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
E1E000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
3C1D000
|
stack
|
page read and write
|
||
67B000
|
unkown
|
page write copy
|
||
54EF000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
484F000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
52F0000
|
direct allocation
|
page execute and read and write
|
||
3C8D000
|
stack
|
page read and write
|
||
539D000
|
trusted library allocation
|
page read and write
|
||
4940000
|
remote allocation
|
page read and write
|
||
5312000
|
trusted library allocation
|
page read and write
|
||
70D000
|
unkown
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
47AF000
|
stack
|
page read and write
|
||
55D0000
|
direct allocation
|
page execute and read and write
|
||
3AB000
|
stack
|
page read and write
|
||
B30000
|
unkown
|
page readonly
|
||
A51000
|
unkown
|
page execute and write copy
|
||
B10000
|
direct allocation
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4950000
|
direct allocation
|
page read and write
|
||
1330000
|
direct allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
AB2000
|
unkown
|
page execute and read and write
|
||
42BF000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
2AD0000
|
direct allocation
|
page read and write
|
||
CF6000
|
unkown
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
5577000
|
trusted library allocation
|
page read and write
|
||
535D000
|
stack
|
page read and write
|
||
2F5F000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
C88000
|
heap
|
page read and write
|
||
10C9000
|
heap
|
page read and write
|
||
1A1000
|
unkown
|
page execute read
|
||
345F000
|
stack
|
page read and write
|
||
B10000
|
direct allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
5732000
|
trusted library allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
66EC000
|
stack
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
49CF000
|
stack
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
3DBF000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
33C7000
|
heap
|
page read and write
|
||
553D000
|
trusted library allocation
|
page read and write
|
||
1A0000
|
unkown
|
page readonly
|
||
B31000
|
unkown
|
page execute and read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
E75000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
7C0000
|
unkown
|
page readonly
|
||
D4B000
|
unkown
|
page execute and read and write
|
||
4A41000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
A29000
|
heap
|
page read and write
|
||
767000
|
heap
|
page read and write
|
||
3E9E000
|
stack
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
5011000
|
heap
|
page read and write
|
||
5610000
|
heap
|
page read and write
|
||
1084000
|
heap
|
page read and write
|
||
59AA000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
545D000
|
trusted library allocation
|
page read and write
|
||
732000
|
unkown
|
page read and write
|
||
4CC6000
|
heap
|
page read and write
|
||
49BF000
|
stack
|
page read and write
|
||
5A5E000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
EEE000
|
unkown
|
page execute and read and write
|
||
A3D000
|
heap
|
page read and write
|
||
F6A000
|
unkown
|
page execute and read and write
|
||
4DFD000
|
stack
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
358F000
|
stack
|
page read and write
|
||
58DC000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
845000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
A50000
|
unkown
|
page readonly
|
||
5020000
|
direct allocation
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
539F000
|
trusted library allocation
|
page read and write
|
||
1330000
|
direct allocation
|
page read and write
|
||
E1A000
|
unkown
|
page execute and write copy
|
||
B00000
|
direct allocation
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
B10000
|
direct allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
1D7AF000
|
stack
|
page read and write
|
||
5389000
|
trusted library allocation
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
3EFF000
|
stack
|
page read and write
|
||
535A000
|
trusted library allocation
|
page read and write
|
||
4CE0000
|
heap
|
page read and write
|
||
E1D000
|
unkown
|
page execute and write copy
|
||
31DF000
|
stack
|
page read and write
|
||
1AA2E000
|
stack
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
192E000
|
stack
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
9CF000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
D29000
|
unkown
|
page execute and read and write
|
||
47E1000
|
heap
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
48FF000
|
stack
|
page read and write
|
||
D68000
|
heap
|
page read and write
|
||
732000
|
unkown
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
E69000
|
heap
|
page read and write
|
||
84A000
|
heap
|
page read and write
|
||
395F000
|
stack
|
page read and write
|
||
53B5000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
47B0000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
EEE000
|
unkown
|
page execute and read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
direct allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
ACE000
|
stack
|
page read and write
|
||
554E000
|
trusted library allocation
|
page read and write
|
||
E58000
|
heap
|
page read and write
|
||
1A5AF000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
2B0D000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
E77000
|
heap
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
66E000
|
unkown
|
page readonly
|
||
4AE0000
|
direct allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
5369000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
429E000
|
stack
|
page read and write
|
||
460000
|
remote allocation
|
page execute and read and write
|
||
D97000
|
unkown
|
page execute and read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
3D1F000
|
stack
|
page read and write
|
||
70D000
|
unkown
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
2B9F000
|
stack
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
262000
|
unkown
|
page readonly
|
||
754000
|
heap
|
page read and write
|
||
F7E000
|
unkown
|
page execute and read and write
|
||
7D0000
|
heap
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
89A000
|
unkown
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
1472000
|
heap
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
D44000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
A8D000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
133A000
|
heap
|
page read and write
|
||
49A1000
|
heap
|
page read and write
|
||
D2E000
|
heap
|
page read and write
|
||
124F000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
7DB000
|
heap
|
page read and write
|
||
4AE0000
|
direct allocation
|
page read and write
|
||
4AD0000
|
direct allocation
|
page read and write
|
||
6FED000
|
stack
|
page read and write
|
||
1CF5F000
|
stack
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
AB2000
|
unkown
|
page execute and read and write
|
||
1244000
|
heap
|
page read and write
|
||
799000
|
heap
|
page read and write
|
||
4420000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
1244000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
500F000
|
stack
|
page read and write
|
||
3ADE000
|
stack
|
page read and write
|
||
5987000
|
trusted library allocation
|
page read and write
|
||
381F000
|
stack
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
3EE000
|
stack
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
ACB000
|
heap
|
page read and write
|
||
5535000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
53EF000
|
trusted library allocation
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
4660000
|
heap
|
page read and write
|
||
54CF000
|
trusted library allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
58D1000
|
trusted library allocation
|
page read and write
|
||
829000
|
unkown
|
page write copy
|
||
5B5F000
|
stack
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
4C23000
|
trusted library allocation
|
page execute and read and write
|
||
E40000
|
heap
|
page read and write
|
||
A8B000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
538F000
|
stack
|
page read and write
|
||
11EF000
|
unkown
|
page execute and read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
1CD1E000
|
stack
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
5508000
|
trusted library allocation
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
5504000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
566A000
|
trusted library allocation
|
page read and write
|
||
45FF000
|
stack
|
page read and write
|
||
295B000
|
stack
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
55C9000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
83DC000
|
stack
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
6470000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
55F0000
|
direct allocation
|
page execute and read and write
|
||
40DF000
|
stack
|
page read and write
|
||
55FA000
|
trusted library allocation
|
page read and write
|
||
5AA6000
|
trusted library allocation
|
page read and write
|
||
107A000
|
heap
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
AF5000
|
heap
|
page read and write
|
||
4940000
|
remote allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
3B4E000
|
stack
|
page read and write
|
||
53BB000
|
trusted library allocation
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
D12000
|
unkown
|
page execute and read and write
|
||
492E000
|
stack
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
846000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
85D000
|
heap
|
page read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
65B0000
|
heap
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
1A8AF000
|
stack
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
54CF000
|
trusted library allocation
|
page read and write
|
||
59CE000
|
trusted library allocation
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
641F000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
552A000
|
trusted library allocation
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
E29000
|
unkown
|
page execute and write copy
|
||
539D000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
54DA000
|
trusted library allocation
|
page read and write
|
||
DB6000
|
unkown
|
page execute and read and write
|
||
4430000
|
heap
|
page read and write
|
||
11CE000
|
heap
|
page read and write
|
||
D27000
|
unkown
|
page execute and read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
536B000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
58D3000
|
trusted library allocation
|
page read and write
|
||
5F80000
|
heap
|
page read and write
|
||
95A000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
5999000
|
trusted library allocation
|
page read and write
|
||
262000
|
unkown
|
page readonly
|
||
AF4000
|
heap
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
ABB000
|
unkown
|
page execute and read and write
|
||
A95000
|
heap
|
page read and write
|
||
26C7000
|
heap
|
page read and write
|
||
2E1F000
|
stack
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
4940000
|
remote allocation
|
page read and write
|
||
3F9F000
|
stack
|
page read and write
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
4D0C000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
31C000
|
stack
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
4DBF000
|
stack
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
53C4000
|
trusted library allocation
|
page read and write
|
||
ABB000
|
unkown
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
2B0F000
|
stack
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
A25E000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
122F000
|
unkown
|
page execute and write copy
|
||
ACA000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
53C6000
|
trusted library allocation
|
page read and write
|
||
54EF000
|
trusted library allocation
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
54DF000
|
trusted library allocation
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
5568000
|
trusted library allocation
|
page read and write
|
||
99B000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
3FDD000
|
stack
|
page read and write
|
||
5610000
|
direct allocation
|
page execute and read and write
|
||
5376000
|
trusted library allocation
|
page read and write
|
||
A50000
|
unkown
|
page read and write
|
||
554D000
|
trusted library allocation
|
page read and write
|
||
D90000
|
direct allocation
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
3ACE000
|
stack
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
4F9E000
|
stack
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
1330000
|
direct allocation
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
2AD0000
|
direct allocation
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
108F000
|
heap
|
page read and write
|
||
324F000
|
stack
|
page read and write
|
||
1218000
|
unkown
|
page execute and read and write
|
||
728E000
|
stack
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
5630000
|
direct allocation
|
page execute and read and write
|
||
C54000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
550F000
|
trusted library allocation
|
page read and write
|
||
464E000
|
stack
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
B30000
|
unkown
|
page readonly
|
||
4651000
|
heap
|
page read and write
|
||
310000
|
unkown
|
page readonly
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
A82000
|
unkown
|
page execute and read and write
|
||
70B000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
59E2000
|
trusted library allocation
|
page read and write
|
||
FC4000
|
heap
|
page read and write
|
||
A0AA000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
A0E000
|
heap
|
page read and write
|
||
D12000
|
unkown
|
page execute and read and write
|
||
5555000
|
trusted library allocation
|
page read and write
|
||
420F000
|
stack
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
73CE000
|
stack
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4C50000
|
trusted library allocation
|
page read and write
|
||
588F000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
54B4000
|
trusted library allocation
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
4CF9000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
5AEC000
|
stack
|
page read and write
|
||
7C7000
|
heap
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
54F7000
|
trusted library allocation
|
page read and write
|
||
535B000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
528F000
|
stack
|
page read and write
|
||
4A0E000
|
stack
|
page read and write
|
||
1D7C0000
|
heap
|
page read and write
|
||
168A000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
4B0B000
|
stack
|
page read and write
|
||
53B8000
|
trusted library allocation
|
page read and write
|
||
10DF000
|
heap
|
page read and write
|
||
D82000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
3390000
|
direct allocation
|
page read and write
|
||
45DF000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
121F000
|
unkown
|
page execute and read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
A51000
|
unkown
|
page execute and write copy
|
||
578D000
|
stack
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
54CF000
|
trusted library allocation
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
FC4000
|
heap
|
page read and write
|
||
58DA000
|
trusted library allocation
|
page read and write
|
||
1330000
|
direct allocation
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
5396000
|
trusted library allocation
|
page read and write
|
||
270000
|
unkown
|
page write copy
|
||
D70000
|
heap
|
page read and write
|
||
535B000
|
trusted library allocation
|
page read and write
|
||
A0F000
|
heap
|
page read and write
|
||
5ED000
|
remote allocation
|
page execute and read and write
|
||
274000
|
unkown
|
page readonly
|
||
1CE9E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
4CE1000
|
heap
|
page read and write
|
||
53B0000
|
trusted library allocation
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
54FC000
|
trusted library allocation
|
page read and write
|
||
3080000
|
direct allocation
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
5A28000
|
trusted library allocation
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
C4F000
|
stack
|
page read and write
|
||
2F5F000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
58DB000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
D90000
|
direct allocation
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
554D000
|
trusted library allocation
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
A50000
|
unkown
|
page readonly
|
||
DAC000
|
unkown
|
page execute and write copy
|
||
11E4000
|
heap
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
634000
|
heap
|
page read and write
|
||
287E000
|
stack
|
page read and write
|
||
11B0000
|
direct allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
1119000
|
unkown
|
page execute and read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
58DE000
|
trusted library allocation
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
4A45000
|
trusted library allocation
|
page read and write
|
||
829000
|
heap
|
page read and write
|
||
E00000
|
unkown
|
page execute and read and write
|
||
754000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
A99000
|
heap
|
page read and write
|
||
4A2F000
|
stack
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
8AC000
|
unkown
|
page readonly
|
||
2BDE000
|
stack
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
58D5000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4A90000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
531B000
|
trusted library allocation
|
page read and write
|
||
55CF000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
43CE000
|
stack
|
page read and write
|
||
D9E000
|
unkown
|
page execute and write copy
|
||
398E000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
58D4000
|
trusted library allocation
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
107B000
|
heap
|
page read and write
|
||
520E000
|
stack
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
1AC6E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
ACA000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
ACA000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
47F6000
|
heap
|
page read and write
|
||
DDD000
|
unkown
|
page execute and read and write
|
||
FC4000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
FFD000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
10B0000
|
direct allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
5340000
|
direct allocation
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
4AB0000
|
direct allocation
|
page execute and read and write
|
||
3390000
|
direct allocation
|
page read and write
|
||
5382000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
54C5000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
4ECF000
|
stack
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
D50000
|
unkown
|
page execute and read and write
|
||
554E000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
46BE000
|
stack
|
page read and write
|
||
538B000
|
trusted library allocation
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
E12000
|
heap
|
page read and write
|
||
26C0000
|
heap
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
6471000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
5DEE000
|
stack
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
5988000
|
trusted library allocation
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
DAD000
|
unkown
|
page execute and read and write
|
||
2AF0000
|
direct allocation
|
page execute and read and write
|
||
AF4000
|
heap
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
D44000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
165A000
|
heap
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
49E0000
|
direct allocation
|
page execute and read and write
|
||
474F000
|
stack
|
page read and write
|
||
D7E000
|
heap
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
575F000
|
stack
|
page read and write
|
||
61DE000
|
stack
|
page read and write
|
||
5600000
|
direct allocation
|
page execute and read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
A99000
|
heap
|
page read and write
|
||
4FA0000
|
direct allocation
|
page execute and read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
58D7000
|
trusted library allocation
|
page read and write
|
||
108F000
|
heap
|
page read and write
|
||
A50000
|
unkown
|
page readonly
|
||
54CE000
|
stack
|
page read and write
|
||
54D2000
|
trusted library allocation
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
AB9000
|
unkown
|
page write copy
|
||
3BDF000
|
stack
|
page read and write
|
||
5367000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
5FCB000
|
stack
|
page read and write
|
||
5136000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
9EF000
|
stack
|
page read and write
|
||
54F0000
|
trusted library allocation
|
page read and write
|
||
D59000
|
unkown
|
page execute and read and write
|
||
1B0DE000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
4E6E000
|
trusted library allocation
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
163F000
|
stack
|
page read and write
|
||
83E0000
|
heap
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
4A41000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
E29000
|
unkown
|
page execute and write copy
|
||
4411000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
54CD000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
459000
|
unkown
|
page execute and write copy
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
58D5000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
A35B000
|
heap
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
5535000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
300B000
|
stack
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
CF6000
|
unkown
|
page execute and read and write
|
||
554D000
|
trusted library allocation
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
536B000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
A99000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
5356000
|
trusted library allocation
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
2F5F000
|
stack
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
400E000
|
stack
|
page read and write
|
||
B90000
|
unkown
|
page execute and write copy
|
||
AF4000
|
heap
|
page read and write
|
||
D79000
|
unkown
|
page execute and write copy
|
||
5210000
|
direct allocation
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
AB3000
|
heap
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
539A000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
5388000
|
trusted library allocation
|
page read and write
|
||
5A9000
|
unkown
|
page execute and read and write
|
||
58D7000
|
trusted library allocation
|
page read and write
|
||
122E000
|
unkown
|
page execute and write copy
|
||
3390000
|
direct allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
58D4000
|
trusted library allocation
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
AB9000
|
unkown
|
page write copy
|
||
421F000
|
stack
|
page read and write
|
||
AB9000
|
unkown
|
page write copy
|
||
A10000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
5358000
|
trusted library allocation
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
537E000
|
trusted library allocation
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
E12000
|
heap
|
page read and write
|
||
53B8000
|
trusted library allocation
|
page read and write
|
||
4FE000
|
stack
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
4E81000
|
direct allocation
|
page read and write
|
||
13D4000
|
unkown
|
page execute and read and write
|
||
425F000
|
stack
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
77B000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
D26000
|
unkown
|
page execute and write copy
|
||
6FA000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
AAE000
|
heap
|
page read and write
|
||
54F4000
|
trusted library allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
4C4A000
|
trusted library allocation
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
5385000
|
trusted library allocation
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
1CD3E000
|
stack
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
313F000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
47D0000
|
direct allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
4DE7000
|
trusted library allocation
|
page read and write
|
||
DD3000
|
unkown
|
page execute and read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
AB2000
|
unkown
|
page execute and read and write
|
||
340E000
|
stack
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
35FE000
|
stack
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
70F000
|
remote allocation
|
page execute and read and write
|
||
3E5F000
|
stack
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
A8D000
|
heap
|
page read and write
|
||
4DD0000
|
direct allocation
|
page execute and read and write
|
||
4C9E000
|
stack
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
ABB000
|
unkown
|
page execute and read and write
|
||
54AE000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
AB9000
|
unkown
|
page write copy
|
||
AF4000
|
heap
|
page read and write
|
||
38CE000
|
stack
|
page read and write
|
||
E3F000
|
unkown
|
page execute and write copy
|
||
53E9000
|
trusted library allocation
|
page read and write
|
||
D95000
|
unkown
|
page execute and write copy
|
||
488F000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
B10000
|
direct allocation
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
3390000
|
direct allocation
|
page read and write
|
||
168D000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
D90000
|
direct allocation
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
E31000
|
unkown
|
page execute and write copy
|
||
5384000
|
trusted library allocation
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
3390000
|
direct allocation
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
4C5F000
|
stack
|
page read and write
|
||
121F000
|
unkown
|
page execute and read and write
|
||
554E000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
3080000
|
direct allocation
|
page read and write
|
||
582F000
|
stack
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
A35E000
|
heap
|
page read and write
|
||
2A5F000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
4AFF000
|
stack
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
D90000
|
direct allocation
|
page read and write
|
||
1D1E0000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
A35B000
|
heap
|
page read and write
|
||
16AA000
|
heap
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
122E000
|
unkown
|
page execute and read and write
|
||
E81000
|
heap
|
page read and write
|
||
5600000
|
direct allocation
|
page execute and read and write
|
||
A43000
|
heap
|
page read and write
|
||
1D64F000
|
stack
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
121F000
|
unkown
|
page execute and read and write
|
||
4EB0000
|
direct allocation
|
page read and write
|
||
5330000
|
direct allocation
|
page execute and read and write
|
||
847000
|
heap
|
page read and write
|
||
5527000
|
trusted library allocation
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
53BD000
|
trusted library allocation
|
page read and write
|
||
4DC6000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
364E000
|
stack
|
page read and write
|
||
5386000
|
trusted library allocation
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page read and write
|
||
E1F000
|
heap
|
page read and write
|
||
54FB000
|
trusted library allocation
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
10B0000
|
direct allocation
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
15AE000
|
stack
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
33B0000
|
direct allocation
|
page read and write
|
||
5402000
|
trusted library allocation
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
B10000
|
direct allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
D90000
|
direct allocation
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
4411000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
440E000
|
stack
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
83D000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
58A0000
|
remote allocation
|
page read and write
|
||
CA1000
|
heap
|
page read and write
|
||
852000
|
heap
|
page read and write
|
||
D8B000
|
unkown
|
page execute and read and write
|
||
D1D000
|
unkown
|
page execute and write copy
|
||
47E1000
|
heap
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
54DF000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4DAF000
|
stack
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
460E000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
D51000
|
unkown
|
page execute and write copy
|
||
67B000
|
unkown
|
page write copy
|
||
33B0000
|
direct allocation
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
4DD2000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
direct allocation
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
2D6F000
|
stack
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
79C000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
56C000
|
stack
|
page read and write
|
||
5350000
|
direct allocation
|
page execute and read and write
|
||
59E8000
|
trusted library allocation
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
4A30000
|
direct allocation
|
page execute and read and write
|
||
5210000
|
direct allocation
|
page read and write
|
||
59C9000
|
trusted library allocation
|
page read and write
|
||
7CD000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
103E000
|
stack
|
page read and write
|
||
A37F000
|
heap
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4971000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
DD2000
|
unkown
|
page execute and write copy
|
||
1AE1F000
|
stack
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
10CE000
|
heap
|
page read and write
|
||
58D4000
|
trusted library allocation
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
2CDF000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
38CF000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
795000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
58DE000
|
trusted library allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
487F000
|
stack
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
385E000
|
stack
|
page read and write
|
||
44DE000
|
stack
|
page read and write
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
55AF000
|
stack
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
349E000
|
stack
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
360E000
|
stack
|
page read and write
|
||
53DE000
|
trusted library allocation
|
page read and write
|
||
D59000
|
unkown
|
page execute and write copy
|
||
399E000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
518B000
|
stack
|
page read and write
|
||
53A6000
|
trusted library allocation
|
page read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
156F000
|
stack
|
page read and write
|
||
51DE000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
5315000
|
trusted library allocation
|
page read and write
|
||
6480000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
55C3000
|
trusted library allocation
|
page read and write
|
||
14B4000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4C1F000
|
stack
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
5F95000
|
heap
|
page read and write
|
||
556F000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
B10000
|
direct allocation
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
3FCF000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
537D000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
5A05000
|
trusted library allocation
|
page read and write
|
||
8AC000
|
unkown
|
page readonly
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
A29000
|
heap
|
page read and write
|
||
5692000
|
trusted library allocation
|
page read and write
|
||
5B2E000
|
trusted library allocation
|
page read and write
|
||
DF2000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
560E000
|
stack
|
page read and write
|
||
5369000
|
trusted library allocation
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
4A80000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
54CF000
|
trusted library allocation
|
page read and write
|
||
701000
|
unkown
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
58D1000
|
trusted library allocation
|
page read and write
|
||
1A7AF000
|
stack
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
9BF000
|
stack
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
300E000
|
stack
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
D41000
|
unkown
|
page execute and read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
3DCF000
|
stack
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
85E000
|
heap
|
page read and write
|
||
54F6000
|
trusted library allocation
|
page read and write
|
||
425E000
|
stack
|
page read and write
|
||
598B000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
C45000
|
stack
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4E20000
|
remote allocation
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
4850000
|
heap
|
page read and write
|
||
A37F000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
58DC000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
C84000
|
heap
|
page read and write
|
||
5566000
|
trusted library allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
1038000
|
heap
|
page read and write
|
||
523D000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
4CD0000
|
direct allocation
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
546B000
|
stack
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
D7D000
|
unkown
|
page execute and read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
4DE0000
|
direct allocation
|
page execute and read and write
|
||
37BE000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4C30000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4960000
|
direct allocation
|
page read and write
|
||
5494000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
4E20000
|
remote allocation
|
page read and write
|
||
A0F000
|
heap
|
page read and write
|
||
43CF000
|
stack
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
4B6F000
|
stack
|
page read and write
|
||
53B1000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
28BC000
|
stack
|
page read and write
|
||
1D0DE000
|
stack
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
166A000
|
heap
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
D28000
|
unkown
|
page execute and write copy
|
||
384E000
|
stack
|
page read and write
|
||
98A000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
55E0000
|
direct allocation
|
page execute and read and write
|
||
A50000
|
unkown
|
page readonly
|
||
F7E000
|
unkown
|
page execute and read and write
|
||
38AF000
|
stack
|
page read and write
|
||
339F000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
6F9000
|
remote allocation
|
page execute and read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
58FD000
|
stack
|
page read and write
|
||
5F90000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
4B12000
|
trusted library allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
399E000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
54DD000
|
trusted library allocation
|
page read and write
|
||
5366000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
5500000
|
trusted library allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
1AF9E000
|
stack
|
page read and write
|
||
535A000
|
trusted library allocation
|
page read and write
|
||
8AC000
|
unkown
|
page readonly
|
||
1AB6E000
|
stack
|
page read and write
|
||
5220000
|
heap
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
58D3000
|
trusted library allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
E3F000
|
unkown
|
page execute and read and write
|
||
58DD000
|
trusted library allocation
|
page read and write
|
||
A0F000
|
heap
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
464F000
|
stack
|
page read and write
|
||
44D1000
|
heap
|
page read and write
|
||
554D000
|
trusted library allocation
|
page read and write
|
||
385E000
|
stack
|
page read and write
|
||
49A0000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
3F8F000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
59B1000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
54C1000
|
trusted library allocation
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
3F9F000
|
stack
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
1D28E000
|
stack
|
page read and write
|
||
B9A000
|
unkown
|
page execute and write copy
|
||
359F000
|
stack
|
page read and write
|
||
FC4000
|
heap
|
page read and write
|
||
3A9F000
|
stack
|
page read and write
|
||
9A1000
|
heap
|
page read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
E58000
|
heap
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
29CF000
|
stack
|
page read and write
|
||
DDD000
|
unkown
|
page execute and read and write
|
||
A5B000
|
heap
|
page read and write
|
||
D7D000
|
unkown
|
page execute and read and write
|
||
A11000
|
heap
|
page read and write
|
||
58DF000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
1330000
|
direct allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
1330000
|
direct allocation
|
page read and write
|
||
58D2000
|
trusted library allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
5B8000
|
unkown
|
page execute and write copy
|
||
397F000
|
stack
|
page read and write
|
||
10DD000
|
heap
|
page read and write
|
||
DEB000
|
heap
|
page read and write
|
||
54D7000
|
trusted library allocation
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
54D7000
|
trusted library allocation
|
page read and write
|
||
A29000
|
heap
|
page read and write
|
||
439E000
|
stack
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
5A8F000
|
trusted library allocation
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
552D000
|
trusted library allocation
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
54EF000
|
trusted library allocation
|
page read and write
|
||
5518000
|
trusted library allocation
|
page read and write
|
||
B31000
|
unkown
|
page execute and write copy
|
||
7BB000
|
heap
|
page read and write
|
||
E77000
|
heap
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
512E000
|
trusted library allocation
|
page read and write
|
||
682E000
|
stack
|
page read and write
|
||
D85000
|
unkown
|
page execute and write copy
|
||
4F50000
|
direct allocation
|
page read and write
|
||
DAE000
|
unkown
|
page execute and write copy
|
||
7C7000
|
heap
|
page read and write
|
||
A372000
|
heap
|
page read and write
|
||
401000
|
remote allocation
|
page execute and read and write
|
||
53D6000
|
trusted library allocation
|
page read and write
|
||
D20000
|
unkown
|
page readonly
|
||
2B2B000
|
stack
|
page read and write
|
||
54F4000
|
trusted library allocation
|
page read and write
|
||
106D000
|
heap
|
page read and write
|
||
552F000
|
trusted library allocation
|
page read and write
|
||
D27000
|
unkown
|
page execute and read and write
|
||
12D4000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
163B000
|
heap
|
page read and write
|
||
4D9F000
|
stack
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
166A000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
D21000
|
unkown
|
page execute and write copy
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
314F000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
381F000
|
stack
|
page read and write
|
||
EF0000
|
unkown
|
page execute and write copy
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
3197000
|
heap
|
page read and write
|
||
5150000
|
direct allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
E1D000
|
unkown
|
page execute and write copy
|
||
1084000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
47FE000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
D4B000
|
unkown
|
page execute and read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
58DC000
|
trusted library allocation
|
page read and write
|
||
1D91E000
|
stack
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
3EE000
|
stack
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
122E000
|
unkown
|
page execute and write copy
|
||
59F8000
|
trusted library allocation
|
page read and write
|
||
4880000
|
remote allocation
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
70000
|
unkown
|
page readonly
|
||
C54000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
F8C000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
10CD000
|
heap
|
page read and write
|
||
150000
|
unkown
|
page readonly
|
||
5350000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
A0F000
|
heap
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
5B8000
|
unkown
|
page execute and read and write
|
||
1D23D000
|
stack
|
page read and write
|
||
634000
|
heap
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
475E000
|
stack
|
page read and write
|
||
5FD5000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
AB9000
|
unkown
|
page write copy
|
||
370000
|
heap
|
page read and write
|
||
DA2000
|
unkown
|
page execute and read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
5504000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
300F000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
450F000
|
stack
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
DB7000
|
unkown
|
page execute and write copy
|
||
122F000
|
unkown
|
page execute and write copy
|
||
1100000
|
heap
|
page read and write
|
||
5F80000
|
heap
|
page read and write
|
||
54C2000
|
trusted library allocation
|
page read and write
|
||
54C8000
|
trusted library allocation
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
3C4F000
|
stack
|
page read and write
|
||
316000
|
unkown
|
page write copy
|
||
4CC1000
|
heap
|
page read and write
|
||
A9B000
|
heap
|
page read and write
|
||
AC9000
|
unkown
|
page execute and read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
474E000
|
stack
|
page read and write
|
||
4851000
|
heap
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
306B000
|
heap
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
D97000
|
unkown
|
page execute and read and write
|
||
554E000
|
trusted library allocation
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
A9E000
|
heap
|
page read and write
|
||
4CD0000
|
heap
|
page read and write
|
||
4A0D000
|
stack
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
5360000
|
trusted library allocation
|
page read and write
|
||
418F000
|
stack
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
560D000
|
stack
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
C84000
|
heap
|
page read and write
|
||
1D38F000
|
stack
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
619F000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
1434000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
54C6000
|
trusted library allocation
|
page read and write
|
||
4DDA000
|
trusted library allocation
|
page read and write
|
||
3D5E000
|
stack
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
449F000
|
stack
|
page read and write
|
||
D5A000
|
unkown
|
page execute and write copy
|
||
AF4000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
7C1000
|
unkown
|
page execute and write copy
|
||
60E000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
43DD000
|
stack
|
page read and write
|
||
701000
|
remote allocation
|
page execute and read and write
|
||
2E77000
|
heap
|
page read and write
|
||
83D000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
45CF000
|
stack
|
page read and write
|
||
4C7C000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
D5A000
|
unkown
|
page execute and write copy
|
||
3B0F000
|
stack
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
4411000
|
heap
|
page read and write
|
||
4E0F000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
59FC000
|
trusted library allocation
|
page read and write
|
||
58D2000
|
trusted library allocation
|
page read and write
|
||
ACC000
|
heap
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
AC2000
|
heap
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
EF0000
|
unkown
|
page execute and write copy
|
||
539B000
|
trusted library allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
1221000
|
heap
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
534F000
|
stack
|
page read and write
|
||
D59000
|
unkown
|
page execute and read and write
|
||
B10000
|
direct allocation
|
page read and write
|
||
D8B000
|
unkown
|
page execute and read and write
|
||
1A1000
|
unkown
|
page execute read
|
||
4D8F000
|
stack
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
531B000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
58A0000
|
remote allocation
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
1035000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
E40000
|
heap
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
5389000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
5374000
|
trusted library allocation
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
47E1000
|
heap
|
page read and write
|
||
1330000
|
direct allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
5374000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
3EA000
|
stack
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
5534000
|
trusted library allocation
|
page read and write
|
||
3B4E000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
75C000
|
unkown
|
page execute and read and write
|
||
E02000
|
unkown
|
page execute and read and write
|
||
E29000
|
unkown
|
page execute and write copy
|
||
822000
|
unkown
|
page execute and read and write
|
||
1244000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
DD3000
|
unkown
|
page execute and read and write
|
||
47E1000
|
heap
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
59EC000
|
trusted library allocation
|
page read and write
|
||
C73000
|
heap
|
page read and write
|
||
A372000
|
heap
|
page read and write
|
||
374F000
|
stack
|
page read and write
|
||
AC9000
|
unkown
|
page execute and write copy
|
||
4C34000
|
trusted library allocation
|
page read and write
|
||
1D95E000
|
stack
|
page read and write
|
||
122E000
|
unkown
|
page execute and read and write
|
||
4D81000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
D10000
|
direct allocation
|
page execute and read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
9AE000
|
unkown
|
page execute and read and write
|
||
C84000
|
heap
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
11E4000
|
heap
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
845000
|
heap
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
536D000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
||
5356000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
557F000
|
trusted library allocation
|
page read and write
|
||
1D47E000
|
stack
|
page read and write
|
||
1685000
|
heap
|
page read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
D12000
|
unkown
|
page execute and read and write
|
||
754000
|
heap
|
page read and write
|
||
5F96000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
85D000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
4CB0000
|
direct allocation
|
page read and write
|
||
D61000
|
unkown
|
page execute and read and write
|
||
532F000
|
stack
|
page read and write
|
||
5463000
|
trusted library allocation
|
page read and write
|
||
5E54000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
1479000
|
heap
|
page read and write
|
||
349E000
|
stack
|
page read and write
|
||
4FB1000
|
direct allocation
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
FC4000
|
heap
|
page read and write
|
||
D59000
|
unkown
|
page execute and write copy
|
||
44D1000
|
heap
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
5412000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
7F7000
|
heap
|
page read and write
|
||
48CB000
|
stack
|
page read and write
|
||
4EB0000
|
direct allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
4AB0000
|
direct allocation
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
AA1000
|
heap
|
page read and write
|
||
102A000
|
heap
|
page read and write
|
||
67B000
|
unkown
|
page write copy
|
||
AF4000
|
heap
|
page read and write
|
||
DFF000
|
heap
|
page read and write
|
||
1D0ED000
|
stack
|
page read and write
|
||
54EF000
|
trusted library allocation
|
page read and write
|
||
53C6000
|
trusted library allocation
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
531B000
|
trusted library allocation
|
page read and write
|
||
5A13000
|
trusted library allocation
|
page read and write
|
||
A48000
|
heap
|
page read and write
|
||
ACC000
|
heap
|
page read and write
|
||
5363000
|
trusted library allocation
|
page read and write
|
||
554E000
|
trusted library allocation
|
page read and write
|
||
1B5AE000
|
stack
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
B10000
|
direct allocation
|
page read and write
|
||
5538000
|
trusted library allocation
|
page read and write
|
||
853000
|
heap
|
page read and write
|
||
53A2000
|
trusted library allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
14DF000
|
stack
|
page read and write
|
||
5F5E000
|
stack
|
page read and write
|
||
5402000
|
trusted library allocation
|
page read and write
|
||
47F0000
|
heap
|
page read and write
|
||
58D9000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
B10000
|
direct allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
5586000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
107D000
|
heap
|
page read and write
|
||
DD1000
|
unkown
|
page execute and read and write
|
||
5375000
|
trusted library allocation
|
page read and write
|
||
54DF000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
2E60000
|
direct allocation
|
page read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
466F000
|
stack
|
page read and write
|
||
4D1A000
|
trusted library allocation
|
page read and write
|
||
316000
|
unkown
|
page write copy
|
||
FFA000
|
heap
|
page read and write
|
||
440F000
|
stack
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
58DE000
|
trusted library allocation
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
A51000
|
unkown
|
page execute and write copy
|
||
536C000
|
trusted library allocation
|
page read and write
|
||
44CE000
|
stack
|
page read and write
|
||
7C0000
|
unkown
|
page read and write
|
||
4EB0000
|
direct allocation
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
D90000
|
direct allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
5A09000
|
trusted library allocation
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
1D6AE000
|
stack
|
page read and write
|
||
5A5F000
|
trusted library allocation
|
page read and write
|
||
1071000
|
heap
|
page read and write
|
||
3C1E000
|
stack
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
D1E000
|
stack
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
531F000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
52DC000
|
stack
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
553D000
|
trusted library allocation
|
page read and write
|
||
9B6000
|
heap
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
13D5000
|
unkown
|
page execute and write copy
|
||
AB9000
|
unkown
|
page write copy
|
||
5010000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
E67000
|
heap
|
page read and write
|
||
5535000
|
trusted library allocation
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
5311000
|
trusted library allocation
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
E7F000
|
heap
|
page read and write
|
||
D90000
|
direct allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
5543000
|
trusted library allocation
|
page read and write
|
||
14B2000
|
heap
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
7FC000
|
stack
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
5316000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
D29000
|
unkown
|
page execute and read and write
|
||
451E000
|
stack
|
page read and write
|
||
3ADE000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
428F000
|
stack
|
page read and write
|
||
1CE1F000
|
stack
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
58D9000
|
trusted library allocation
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
B9B000
|
unkown
|
page execute and read and write
|
||
58D4000
|
trusted library allocation
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
4DF0000
|
direct allocation
|
page execute and read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
58DD000
|
trusted library allocation
|
page read and write
|
||
1DA5C000
|
stack
|
page read and write
|
||
3E4F000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
4B7E000
|
stack
|
page read and write
|
||
36DF000
|
stack
|
page read and write
|
||
DB7000
|
unkown
|
page execute and write copy
|
||
59BA000
|
trusted library allocation
|
page read and write
|
||
4D80000
|
heap
|
page read and write
|
||
5620000
|
direct allocation
|
page execute and read and write
|
||
4651000
|
heap
|
page read and write
|
||
D20000
|
unkown
|
page readonly
|
||
4A41000
|
heap
|
page read and write
|
||
403F000
|
stack
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
1119000
|
unkown
|
page execute and read and write
|
||
550F000
|
trusted library allocation
|
page read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
58DD000
|
trusted library allocation
|
page read and write
|
||
858000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
394F000
|
stack
|
page read and write
|
||
54E8000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
5011000
|
heap
|
page read and write
|
||
5538000
|
trusted library allocation
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
539A000
|
trusted library allocation
|
page read and write
|
||
D21000
|
unkown
|
page execute and write copy
|
||
452F000
|
stack
|
page read and write
|
||
1698000
|
heap
|
page read and write
|
||
2EB000
|
stack
|
page read and write
|
||
4850000
|
heap
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
5384000
|
trusted library allocation
|
page read and write
|
||
A70000
|
direct allocation
|
page read and write
|
||
C54000
|
heap
|
page read and write
|
||
53DC000
|
trusted library allocation
|
page read and write
|
||
54C4000
|
trusted library allocation
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
1CE3F000
|
stack
|
page read and write
|
||
4411000
|
heap
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
631E000
|
stack
|
page read and write
|
||
F5E000
|
stack
|
page read and write
|
||
D20000
|
unkown
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
DD1000
|
unkown
|
page execute and read and write
|
||
1437000
|
heap
|
page read and write
|
||
DCF000
|
unkown
|
page execute and write copy
|
||
1B45C000
|
stack
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
5555000
|
trusted library allocation
|
page read and write
|
||
54F7000
|
trusted library allocation
|
page read and write
|
||
58D8000
|
trusted library allocation
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
66E000
|
unkown
|
page readonly
|
||
4F90000
|
direct allocation
|
page execute and read and write
|
||
AA1000
|
heap
|
page read and write
|
||
AA1000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
A51000
|
unkown
|
page execute and write copy
|
||
1D3CF000
|
stack
|
page read and write
|
||
E31000
|
unkown
|
page execute and write copy
|
||
54F8000
|
trusted library allocation
|
page read and write
|
||
C84000
|
heap
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
7180000
|
heap
|
page execute and read and write
|
||
B9C000
|
unkown
|
page execute and write copy
|
||
2D1E000
|
stack
|
page read and write
|
||
2DBB000
|
stack
|
page read and write
|
||
4DB2000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
4B41000
|
direct allocation
|
page read and write
|
||
3ECF000
|
stack
|
page read and write
|
||
550C000
|
trusted library allocation
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
1D81D000
|
stack
|
page read and write
|
||
599F000
|
stack
|
page read and write
|
||
4651000
|
heap
|
page read and write
|
||
1CBFE000
|
stack
|
page read and write
|
||
536A000
|
trusted library allocation
|
page read and write
|
||
2EBF000
|
stack
|
page read and write
|
||
53A6000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
E2B000
|
unkown
|
page execute and write copy
|
There are 3639 hidden memdumps, click here to show them.