Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\num[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000976001\976d9f40c1.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000977001\606f2f6db0.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000978001\2d569de7b1.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000979001\num.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\7RNKVR1EZ552XQ73.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\QDDSFWH7TPMYGYIMIOWX7SBOU5.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\S14AV77TIR9DRWSCWIW0.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\QDDSFWH7TPMYGYIMIOWX7SBOU5.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\compatibility.ini
|
Windows WIN.INI
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
modified
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
|
ASCII text, with very long lines (1743), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1743), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Windows\Tasks\skotes.job
|
data
|
dropped
|
There are 17 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\S14AV77TIR9DRWSCWIW0.exe
|
"C:\Users\user\AppData\Local\Temp\S14AV77TIR9DRWSCWIW0.exe"
|
||
C:\Users\user\AppData\Local\Temp\7RNKVR1EZ552XQ73.exe
|
"C:\Users\user\AppData\Local\Temp\7RNKVR1EZ552XQ73.exe"
|
||
C:\Users\user\AppData\Local\Temp\QDDSFWH7TPMYGYIMIOWX7SBOU5.exe
|
"C:\Users\user\AppData\Local\Temp\QDDSFWH7TPMYGYIMIOWX7SBOU5.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\1000976001\976d9f40c1.exe
|
"C:\Users\user\AppData\Local\Temp\1000976001\976d9f40c1.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000977001\606f2f6db0.exe
|
"C:\Users\user\AppData\Local\Temp\1000977001\606f2f6db0.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000976001\976d9f40c1.exe
|
"C:\Users\user\AppData\Local\Temp\1000976001\976d9f40c1.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000978001\2d569de7b1.exe
|
"C:\Users\user\AppData\Local\Temp\1000978001\2d569de7b1.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000976001\976d9f40c1.exe
|
"C:\Users\user\AppData\Local\Temp\1000976001\976d9f40c1.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000979001\num.exe
|
"C:\Users\user\AppData\Local\Temp\1000979001\num.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000977001\606f2f6db0.exe
|
"C:\Users\user\AppData\Local\Temp\1000977001\606f2f6db0.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000978001\2d569de7b1.exe
|
"C:\Users\user\AppData\Local\Temp\1000978001\2d569de7b1.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000979001\num.exe
|
"C:\Users\user\AppData\Local\Temp\1000979001\num.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2184 -parentBuildID 20230927232528 -prefsHandle 2132
-prefMapHandle 2128 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {b40077cd-dd11-4133-b7ff-87ccb7cbcf33} 7456 "\\.\pipe\gecko-crash-server-pipe.7456" 1378e86ed10 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2948 -parentBuildID 20230927232528 -prefsHandle 4268
-prefMapHandle 3212 -prefsLen 30974 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0ae1ecd2-7e69-4001-87b4-63ef548d530a}
7456 "\\.\pipe\gecko-crash-server-pipe.7456" 1379e087210 rdd
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2140 -parentBuildID 20230927232528 -prefsHandle 2076
-prefMapHandle 2068 -prefsLen 26596 -prefMapSize 238335 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {02f5810b-dd2b-4de0-96e0-9800a8c8aecc} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" 1a0b0b6ff10 socket
|
There are 33 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
dissapoiznw.store
|
|||
https://steamcommunity.com/profiles/76561199724331900
|
104.102.49.254
|
||
https://www.cloudflare.com/learning/access-management/phishing-attack/
|
unknown
|
||
http://mozilla.org/#/properties/bestMatchBlockingEnabledhttp://mozilla.org/#/properties/merinoClient
|
unknown
|
||
https://youtube.com/accountservices.sync.log.logger.browserPanelUI-remotetabs-setupsyncappMenu-heade
|
unknown
|
||
http://mozilla.org/#/properties/proposedEnrollment
|
unknown
|
||
http://mozilla.org/#/properties/branches/anyOf/1http://mozilla.org/#/properties/targeting
|
unknown
|
||
http://mozilla.org/#/properties/networkPredictor4fb599b7-2bfe-40fa-aec3-5b51dcdef652
|
unknown
|
||
http://mozilla.org/#/properties/schemaVersion
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
|
unknown
|
||
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/feature/properties/value
|
unknown
|
||
https://sergei-esenin.com/
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://www.gstatic.cn/recaptcha/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=UuGFpt56D9L4&l=
|
unknown
|
||
http://mozilla.org/#/properties/disableGreaseOnFallback
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
|
unknown
|
||
http://mozilla.org/#/properties/originsDaysCutOff
|
unknown
|
||
http://mozilla.org/#/properties/quickSuggestRemoteSettingsDataType
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://screenshots.firefox.com
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
http://mozilla.org/#/properties/addonsShowLessFrequentlyCapextension/webcompat
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpz
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpy
|
unknown
|
||
http://mozilla.org/#/properties/quickSuggestSponsoredEnabled
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpcoded
|
unknown
|
||
http://mozilla.org/#/properties/branches/anyOf/1/items/properties/features/items/properties/valuehtt
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpa
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
http://mozilla.org/#/properties/quickSuggestImpressionCapsNonSponsoredEnabledhttp://mozilla.org/#/pr
|
unknown
|
||
http://mozilla.org/#/properties/quickSuggestScoreMapExtension:RegisterContentScriptsComplete
|
unknown
|
||
http://mozilla.org/#/properties/outcomes/items
|
unknown
|
||
http://mozilla.org/#/properties/quickSuggestSponsoredIndex
|
unknown
|
||
http://mozilla.org/#/properties/endDatecreateContextWithTimeout/get/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
|
unknown
|
||
http://mozilla.org/#/properties/csvImport
|
unknown
|
||
http://mozilla.org/#/properties/quickSuggestAllowPositionInSuggestions
|
unknown
|
||
http://mozilla.org/#/properties/branches/anyOf/0/items/properties/feature
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1&
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://lv.queniujq.cn
|
unknown
|
||
https://www.cloudflare.com/5xx-error-landing
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=qYlgdgWOD4Ng&
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
|
unknown
|
||
http://185.215.113.16/well/random.exe=b
|
unknown
|
||
http://mozilla.org/#/properties/enabled
|
unknown
|
||
http://mozilla.org/#/properties/featureIds/itemshttp://mozilla.org/#/properties/branches
|
unknown
|
||
http://mozilla.org/#/properties/quickSuggestImpressionCapsSponsoredEnabled
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://json-schema.org/draft-07/schema#Unique
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
|
unknown
|
||
https://static.adsafeprotected.com/firefox-etp-js
|
unknown
|
||
https://checkout.steampowered.com/
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
http://mozilla.org/#/properties/appIdwebcompat
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
http://mozilla.org/#/properties/ehPreloadEnabledthis-is-included-for-desktop-pre-95-support
|
unknown
|
||
http://mozilla.org/#/properties/branches/anyOf/2/items/properties/features/items/properties/featureI
|
unknown
|
||
http://mozilla.org/#/properties/endDate
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=KkhJqW2NGKiM&l=engli
|
unknown
|
||
http://mozilla.org/#/properties/branches/anyOf/2/itemsnuo-extensions-migration-in-embedded-import-wi
|
unknown
|
||
http://mozilla.org/#/properties/addonsFeatureGate
|
unknown
|
||
http://mozilla.org/#/properties/addonsShowLessFrequentlyCap
|
unknown
|
||
http://mozilla.org/#/properties/autoFillAdaptiveHistoryEnabled
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
|
unknown
|
||
https://json-schema.org/draft/2019-09/schemaplaces.sqlite#1:
|
unknown
|
||
https://help.steampowered.com/en/
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://mozilla.org/#/properties/outcomeshttp://mozilla.org/#/properties/outcomes/itemshttp://mozilla
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
|
unknown
|
||
https://getpocket.com/recommendationsEnable
|
unknown
|
||
http://mozilla.org/#/properties/quickSuggestNonSponsoredEnabledextension/webcompat
|
unknown
|
||
https://www.cloudflare.com/lear
|
unknown
|
||
http://mozilla.org/#/properties/enrollmentEndDate
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
|
unknown
|
||
https://login.microsoftonline.com
|
unknown
|
||
https://broadcast.st.dl.eccdnx.com
|
unknown
|
||
https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/f0f51715-7f5e-48de-839
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://mozilla.org/#/properties/forceWaitHttpsRR
|
unknown
|
||
http://mozilla.org/#/properties/autoFillAdaptiveHistoryMinCharsThreshold
|
unknown
|
||
http://mozilla.org/#/properties/branches/anyOf/0http://mozilla.org/#/properties/userFacingName
|
unknown
|
||
http://mozilla.org/#/properties/outcomes
|
unknown
|
||
https://steamcommunity.com/workshop/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
http://mozilla.org/#/properties/quickSuggestSponsoredEnabledhttp://mozilla.org/#/properties/dnsMaxAn
|
unknown
|
||
http://185.215.113.37/Jp
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en
|
unknown
|
||
https://contile.services.mozilla.com/v1/tiles
|
unknown
|
||
https://www.amazon.co.uk/
|
unknown
|
||
https://screenshots.firefox.com/
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php6-535557bcc5fa00
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggestresource://gre/modules/translation/LanguageDetecto
|
unknown
|
||
https://gpuweb.github.io/gpuweb/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
sergei-esenin.com
|
172.67.206.204
|
||
steamcommunity.com
|
104.102.49.254
|
||
spirittunek.store
|
unknown
|
||
licendfilteo.site
|
unknown
|
||
eaglepawnoy.store
|
unknown
|
||
bathdoomgaz.store
|
unknown
|
||
studennotediw.store
|
unknown
|
||
mobbipenju.store
|
unknown
|
||
clearancek.site
|
unknown
|
||
dissapoiznw.store
|
unknown
|
||
example.org
|
93.184.215.14
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
142.250.185.142
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
ipv4only.arpa
|
192.0.0.170
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
There are 19 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.43
|
unknown
|
Portugal
|
||
185.215.113.37
|
unknown
|
Portugal
|
||
172.67.206.204
|
sergei-esenin.com
|
United States
|
||
104.102.49.254
|
steamcommunity.com
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
142.250.185.142
|
youtube.com
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
976d9f40c1.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
606f2f6db0.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
2d569de7b1.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
num.exe
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
481000
|
unkown
|
page execute and write copy
|
||
4FF0000
|
direct allocation
|
page read and write
|
||
2D1000
|
unkown
|
page execute and read and write
|
||
53C0000
|
direct allocation
|
page read and write
|
||
FE1000
|
unkown
|
page execute and read and write
|
||
E1000
|
unkown
|
page execute and read and write
|
||
B5B000
|
heap
|
page read and write
|
||
481000
|
unkown
|
page execute and write copy
|
||
4A80000
|
direct allocation
|
page read and write
|
||
124E000
|
heap
|
page read and write
|
||
5110000
|
direct allocation
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
481000
|
unkown
|
page execute and write copy
|
||
E1000
|
unkown
|
page execute and read and write
|
||
B2E000
|
heap
|
page read and write
|
||
1388000
|
heap
|
page read and write
|
||
481000
|
unkown
|
page execute and write copy
|
||
E0E000
|
heap
|
page read and write
|
||
D57000
|
heap
|
page read and write
|
||
FE1000
|
unkown
|
page execute and read and write
|
||
DE1000
|
unkown
|
page execute and read and write
|
||
5250000
|
direct allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
446F000
|
stack
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
1A0BC57D000
|
trusted library allocation
|
page read and write
|
||
137A003B000
|
trusted library allocation
|
page read and write
|
||
2297506F6000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1379E9CB000
|
trusted library allocation
|
page read and write
|
||
17FE000
|
stack
|
page read and write
|
||
1A0BC5B1000
|
trusted library allocation
|
page read and write
|
||
1379B5B2000
|
trusted library allocation
|
page read and write
|
||
3B2000
|
unkown
|
page execute and read and write
|
||
2311D865000
|
trusted library allocation
|
page read and write
|
||
1379F000000
|
trusted library allocation
|
page read and write
|
||
137A69E4000
|
trusted library allocation
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
137A91CF000
|
trusted library allocation
|
page read and write
|
||
1260000
|
unkown
|
page execute and write copy
|
||
137A011C000
|
trusted library allocation
|
page read and write
|
||
1379C49D000
|
trusted library allocation
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
6DC000
|
unkown
|
page readonly
|
||
CD4000
|
heap
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
1A0BC152000
|
trusted library allocation
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
D3B000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
5C9E000
|
trusted library allocation
|
page read and write
|
||
EE9000
|
heap
|
page read and write
|
||
2E4D7F7000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1379BC06000
|
trusted library allocation
|
page read and write
|
||
137A0370000
|
trusted library allocation
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
137A69D2000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
1379557A000
|
heap
|
page read and write
|
||
22612A504000
|
trusted library allocation
|
page read and write
|
||
1AECF000
|
stack
|
page read and write
|
||
137A01C4000
|
trusted library allocation
|
page read and write
|
||
137A0FDB000
|
trusted library allocation
|
page read and write
|
||
5530000
|
direct allocation
|
page execute and read and write
|
||
1A0B0810000
|
trusted library allocation
|
page read and write
|
||
1379DF4A000
|
trusted library allocation
|
page read and write
|
||
137A0058000
|
trusted library allocation
|
page read and write
|
||
137A6242000
|
trusted library allocation
|
page read and write
|
||
1379C47C000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
direct allocation
|
page read and write
|
||
1379556E000
|
heap
|
page read and write
|
||
137A004B000
|
trusted library allocation
|
page read and write
|
||
137A6242000
|
trusted library allocation
|
page read and write
|
||
137A6973000
|
trusted library allocation
|
page read and write
|
||
16CF000
|
heap
|
page read and write
|
||
13795546000
|
heap
|
page read and write
|
||
2E4C0BD000
|
stack
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
439F000
|
stack
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
137A66A7000
|
trusted library allocation
|
page read and write
|
||
5ECB77D000
|
stack
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
1379E369000
|
trusted library allocation
|
page read and write
|
||
137A92F6000
|
trusted library allocation
|
page read and write
|
||
1379E100000
|
trusted library allocation
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
137A6244000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
1379B84F000
|
heap
|
page read and write
|
||
C8C000
|
unkown
|
page execute and write copy
|
||
1D836E5B000
|
trusted library allocation
|
page read and write
|
||
137A6913000
|
trusted library allocation
|
page read and write
|
||
1379C008000
|
trusted library allocation
|
page read and write
|
||
137A05D5000
|
trusted library allocation
|
page read and write
|
||
1379F4EE000
|
trusted library allocation
|
page read and write
|
||
2E4C1BB000
|
stack
|
page read and write
|
||
1379550F000
|
heap
|
page read and write
|
||
1A0B0660000
|
unclassified section
|
page readonly
|
||
10CB000
|
heap
|
page read and write
|
||
137A6274000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
137A026F000
|
trusted library allocation
|
page read and write
|
||
1264000
|
unkown
|
page execute and write copy
|
||
2311E4AC000
|
heap
|
page read and write
|
||
1804BECB000
|
trusted library allocation
|
page read and write
|
||
2E5441C000
|
stack
|
page read and write
|
||
191000
|
unkown
|
page execute and read and write
|
||
10CF000
|
heap
|
page read and write
|
||
137A9188000
|
trusted library allocation
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
DE0000
|
unkown
|
page read and write
|
||
47AF000
|
stack
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
127D000
|
unkown
|
page execute and read and write
|
||
1378E5F0000
|
heap
|
page readonly
|
||
137A1B49000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
1A0BF54B000
|
trusted library allocation
|
page read and write
|
||
13795583000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
1379E0AC000
|
trusted library allocation
|
page read and write
|
||
13795574000
|
heap
|
page read and write
|
||
1379ED5C000
|
trusted library allocation
|
page read and write
|
||
1A0BD709000
|
trusted library allocation
|
page read and write
|
||
3DDF000
|
stack
|
page read and write
|
||
1379E9CB000
|
trusted library allocation
|
page read and write
|
||
540E000
|
stack
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
1A0BF53C000
|
trusted library allocation
|
page read and write
|
||
137A61B6000
|
trusted library allocation
|
page read and write
|
||
C38000
|
unkown
|
page execute and write copy
|
||
1379E3C7000
|
trusted library allocation
|
page read and write
|
||
1218000
|
unkown
|
page execute and write copy
|
||
1379F2AB000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
137A11E3000
|
trusted library allocation
|
page read and write
|
||
1D30F000
|
stack
|
page read and write
|
||
1379F6D7000
|
trusted library allocation
|
page read and write
|
||
C53000
|
unkown
|
page execute and read and write
|
||
13795516000
|
heap
|
page read and write
|
||
1379F303000
|
trusted library allocation
|
page read and write
|
||
1379A8D7000
|
trusted library allocation
|
page read and write
|
||
1379FF7C000
|
trusted library allocation
|
page read and write
|
||
137A02E4000
|
trusted library allocation
|
page read and write
|
||
137A67D7000
|
trusted library allocation
|
page read and write
|
||
5EC787E000
|
stack
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
150E000
|
stack
|
page read and write
|
||
5E3E000
|
trusted library allocation
|
page read and write
|
||
D97000
|
heap
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
11FF000
|
unkown
|
page execute and read and write
|
||
1379F4D6000
|
trusted library allocation
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
14A3000
|
unkown
|
page execute and read and write
|
||
13795525000
|
heap
|
page read and write
|
||
1379A0A2000
|
trusted library allocation
|
page read and write
|
||
2E568FB000
|
stack
|
page read and write
|
||
13B8000
|
heap
|
page read and write
|
||
137A63CC000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
350E000
|
stack
|
page read and write
|
||
137A679B000
|
trusted library allocation
|
page read and write
|
||
1379E91D000
|
trusted library allocation
|
page read and write
|
||
2311E5B7000
|
heap
|
page read and write
|
||
5991000
|
trusted library allocation
|
page read and write
|
||
E83000
|
heap
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1379E042000
|
trusted library allocation
|
page read and write
|
||
1379ED95000
|
trusted library allocation
|
page read and write
|
||
137A1BCB000
|
trusted library allocation
|
page read and write
|
||
2311E56A000
|
heap
|
page read and write
|
||
13795519000
|
heap
|
page read and write
|
||
137A0F5E000
|
trusted library allocation
|
page read and write
|
||
137A92DA000
|
trusted library allocation
|
page read and write
|
||
1379DF3B000
|
trusted library allocation
|
page read and write
|
||
10E8000
|
heap
|
page read and write
|
||
10D6000
|
heap
|
page read and write
|
||
137A029B000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
13795519000
|
heap
|
page read and write
|
||
137A039B000
|
trusted library allocation
|
page read and write
|
||
16F8000
|
heap
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
38DF000
|
stack
|
page read and write
|
||
C3C000
|
unkown
|
page execute and read and write
|
||
137A05AB000
|
trusted library allocation
|
page read and write
|
||
1379EAD7000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
1379B7C3000
|
trusted library allocation
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
1263000
|
unkown
|
page execute and read and write
|
||
1379C49D000
|
trusted library allocation
|
page read and write
|
||
2E4C5B0000
|
stack
|
page read and write
|
||
137A015B000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
3EBF000
|
stack
|
page read and write
|
||
EB5000
|
heap
|
page read and write
|
||
137A035E000
|
trusted library allocation
|
page read and write
|
||
13795565000
|
heap
|
page read and write
|
||
120F000
|
unkown
|
page execute and write copy
|
||
BC7000
|
unkown
|
page execute and write copy
|
||
137A0370000
|
trusted library allocation
|
page read and write
|
||
6675000
|
heap
|
page read and write
|
||
1379E8C0000
|
trusted library section
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
1A0BCAA4000
|
trusted library allocation
|
page read and write
|
||
1379EA96000
|
trusted library allocation
|
page read and write
|
||
5ACF000
|
trusted library allocation
|
page read and write
|
||
5A98000
|
trusted library allocation
|
page read and write
|
||
59BA000
|
trusted library allocation
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
2311E5B7000
|
heap
|
page read and write
|
||
45A0000
|
direct allocation
|
page read and write
|
||
13795564000
|
heap
|
page read and write
|
||
59BB000
|
trusted library allocation
|
page read and write
|
||
455F000
|
stack
|
page read and write
|
||
1D836F19000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
1379E3B1000
|
trusted library allocation
|
page read and write
|
||
137A0311000
|
trusted library allocation
|
page read and write
|
||
1A0BFC13000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
137A88F7000
|
trusted library allocation
|
page read and write
|
||
1379A3E0000
|
unclassified section
|
page read and write
|
||
139B000
|
heap
|
page read and write
|
||
1379EC43000
|
trusted library allocation
|
page read and write
|
||
59A0000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
direct allocation
|
page read and write
|
||
59BE000
|
trusted library allocation
|
page read and write
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
59AA000
|
trusted library allocation
|
page read and write
|
||
3C9F000
|
stack
|
page read and write
|
||
2311E56A000
|
heap
|
page read and write
|
||
458F000
|
stack
|
page read and write
|
||
1379A8A1000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A013A000
|
trusted library allocation
|
page read and write
|
||
16E5000
|
heap
|
page read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
1379BD19000
|
trusted library allocation
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
128C000
|
unkown
|
page execute and write copy
|
||
1379556E000
|
heap
|
page read and write
|
||
137904BA000
|
heap
|
page read and write
|
||
1379E7BD000
|
trusted library allocation
|
page read and write
|
||
1379552D000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1A0B0BE7000
|
trusted library allocation
|
page read and write
|
||
FF1000
|
unkown
|
page execute and read and write
|
||
BF4000
|
heap
|
page read and write
|
||
76E000
|
unkown
|
page execute and write copy
|
||
FB0000
|
direct allocation
|
page read and write
|
||
137A0DED000
|
trusted library allocation
|
page read and write
|
||
1379556B000
|
heap
|
page read and write
|
||
48EF000
|
stack
|
page read and write
|
||
1CA0E000
|
stack
|
page read and write
|
||
373F000
|
stack
|
page read and write
|
||
2311E4CD000
|
heap
|
page read and write
|
||
11F9000
|
unkown
|
page execute and write copy
|
||
2E541DE000
|
stack
|
page read and write
|
||
137A9191000
|
trusted library allocation
|
page read and write
|
||
4700000
|
direct allocation
|
page read and write
|
||
F74000
|
heap
|
page read and write
|
||
1A9C53E000
|
stack
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
1379DF9B000
|
trusted library allocation
|
page read and write
|
||
1379F700000
|
trusted library allocation
|
page read and write
|
||
1A0BF3BB000
|
trusted library allocation
|
page read and write
|
||
137A63D0000
|
trusted library allocation
|
page read and write
|
||
569F000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1379DD03000
|
trusted library allocation
|
page read and write
|
||
2311D926000
|
unkown
|
page execute read
|
||
33EE000
|
stack
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
5F05000
|
trusted library allocation
|
page read and write
|
||
1379ED4F000
|
trusted library allocation
|
page read and write
|
||
1379550E000
|
heap
|
page read and write
|
||
6DC000
|
unkown
|
page readonly
|
||
5F24000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
1379DF8A000
|
trusted library allocation
|
page read and write
|
||
13795572000
|
heap
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
1A0BF303000
|
trusted library allocation
|
page read and write
|
||
137A69E6000
|
trusted library allocation
|
page read and write
|
||
137A10B4000
|
trusted library allocation
|
page read and write
|
||
10E5000
|
heap
|
page read and write
|
||
1379F287000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
5ECBF7E000
|
stack
|
page read and write
|
||
137A6295000
|
trusted library allocation
|
page read and write
|
||
1379C400000
|
trusted library allocation
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
1379FF8B000
|
trusted library allocation
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
1379A3E2000
|
unclassified section
|
page read and write
|
||
3EFE000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
1379556E000
|
heap
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A6280000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
2A554700000
|
trusted library allocation
|
page read and write
|
||
137A0CE8000
|
trusted library allocation
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
1A0BF89E000
|
trusted library allocation
|
page read and write
|
||
137A69BA000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
137A92EF000
|
trusted library allocation
|
page read and write
|
||
137A10C4000
|
trusted library allocation
|
page read and write
|
||
1379DDD8000
|
trusted library allocation
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
137A62A5000
|
trusted library allocation
|
page read and write
|
||
1A0B0B00000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A902C000
|
trusted library allocation
|
page read and write
|
||
D3C000
|
unkown
|
page readonly
|
||
4A10000
|
heap
|
page execute and read and write
|
||
5BED000
|
stack
|
page read and write
|
||
1379A955000
|
trusted library allocation
|
page read and write
|
||
5F8A000
|
trusted library allocation
|
page read and write
|
||
59D1000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
137A62C5000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
1A0BF729000
|
trusted library allocation
|
page read and write
|
||
1379FFFB000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
512F000
|
stack
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
1379EAD7000
|
trusted library allocation
|
page read and write
|
||
137A8F1F000
|
trusted library allocation
|
page read and write
|
||
5F36000
|
trusted library allocation
|
page read and write
|
||
5F87000
|
trusted library allocation
|
page read and write
|
||
2EDF000
|
stack
|
page read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
137A61DF000
|
trusted library allocation
|
page read and write
|
||
1379557B000
|
heap
|
page read and write
|
||
1379E0DA000
|
trusted library allocation
|
page read and write
|
||
11FA000
|
unkown
|
page execute and read and write
|
||
F7F000
|
heap
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1379FF76000
|
trusted library allocation
|
page read and write
|
||
4B70000
|
heap
|
page read and write
|
||
1379550E000
|
heap
|
page read and write
|
||
1381000
|
heap
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
7250000
|
heap
|
page read and write
|
||
35AE000
|
stack
|
page read and write
|
||
137A019B000
|
trusted library allocation
|
page read and write
|
||
1379E7B7000
|
trusted library allocation
|
page read and write
|
||
473C000
|
stack
|
page read and write
|
||
249FC200000
|
trusted library allocation
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
1379E3CD000
|
trusted library allocation
|
page read and write
|
||
5E36000
|
trusted library allocation
|
page read and write
|
||
D74000
|
unkown
|
page readonly
|
||
1A0BC5B6000
|
trusted library allocation
|
page read and write
|
||
543D000
|
stack
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
36CE000
|
stack
|
page read and write
|
||
C52000
|
unkown
|
page execute and write copy
|
||
137A02DB000
|
trusted library allocation
|
page read and write
|
||
2311E5AE000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
13795564000
|
heap
|
page read and write
|
||
1379FF9C000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
494F000
|
stack
|
page read and write
|
||
1D836D00000
|
trusted library allocation
|
page read and write
|
||
2311D430000
|
unclassified section
|
page readonly
|
||
78C000
|
unkown
|
page execute and read and write
|
||
E10000
|
heap
|
page read and write
|
||
137A3020000
|
trusted library allocation
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
137A11B2000
|
trusted library allocation
|
page read and write
|
||
EC9000
|
heap
|
page read and write
|
||
137A8F27000
|
trusted library allocation
|
page read and write
|
||
137A0049000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
direct allocation
|
page execute and read and write
|
||
137A0393000
|
trusted library allocation
|
page read and write
|
||
1379E694000
|
trusted library allocation
|
page read and write
|
||
1A0BCA9A000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1379BD14000
|
trusted library allocation
|
page read and write
|
||
1379E3F1000
|
trusted library allocation
|
page read and write
|
||
13795560000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
5580000
|
direct allocation
|
page execute and read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
1379F117000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
13795564000
|
heap
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1A0BF59F000
|
trusted library allocation
|
page read and write
|
||
10C9000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
2E4BDFE000
|
stack
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
1379DC00000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
137A0284000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
1379FE11000
|
trusted library allocation
|
page read and write
|
||
137A007F000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
1379A946000
|
trusted library allocation
|
page read and write
|
||
1379E3C7000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
13795568000
|
heap
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
16FE000
|
stack
|
page read and write
|
||
46B0000
|
heap
|
page read and write
|
||
137A69EC000
|
trusted library allocation
|
page read and write
|
||
1379EAE7000
|
trusted library allocation
|
page read and write
|
||
2311E529000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
A10000
|
direct allocation
|
page read and write
|
||
12EB000
|
unkown
|
page execute and write copy
|
||
4C81000
|
heap
|
page read and write
|
||
13795572000
|
heap
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
7251000
|
heap
|
page read and write
|
||
137A8F40000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379E99C000
|
trusted library allocation
|
page read and write
|
||
137A92D2000
|
trusted library allocation
|
page read and write
|
||
1379556E000
|
heap
|
page read and write
|
||
1A6CF000
|
stack
|
page read and write
|
||
E9F000
|
heap
|
page read and write
|
||
1804B9F0000
|
unclassified section
|
page readonly
|
||
2E5449D000
|
stack
|
page read and write
|
||
1379A582000
|
trusted library allocation
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
137A69F8000
|
trusted library allocation
|
page read and write
|
||
137A92A3000
|
trusted library allocation
|
page read and write
|
||
1379F6B6000
|
trusted library allocation
|
page read and write
|
||
137A025D000
|
trusted library allocation
|
page read and write
|
||
5A3C000
|
trusted library allocation
|
page read and write
|
||
516F000
|
stack
|
page read and write
|
||
137A8F92000
|
trusted library allocation
|
page read and write
|
||
137A05F8000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
1379F4CF000
|
trusted library allocation
|
page read and write
|
||
1379E644000
|
trusted library allocation
|
page read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
10CC000
|
heap
|
page read and write
|
||
5F56000
|
trusted library allocation
|
page read and write
|
||
1379E3F1000
|
trusted library allocation
|
page read and write
|
||
480F000
|
stack
|
page read and write
|
||
137A3026000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
11FE000
|
unkown
|
page execute and write copy
|
||
137A1BD3000
|
trusted library allocation
|
page read and write
|
||
1379EDF3000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
1379BE1D000
|
trusted library allocation
|
page read and write
|
||
137A8FCE000
|
trusted library allocation
|
page read and write
|
||
10E8000
|
heap
|
page read and write
|
||
128C000
|
unkown
|
page execute and write copy
|
||
623B000
|
trusted library allocation
|
page read and write
|
||
3D2E000
|
stack
|
page read and write
|
||
167E000
|
heap
|
page read and write
|
||
1379EC03000
|
trusted library allocation
|
page read and write
|
||
53FE000
|
stack
|
page read and write
|
||
1379EA85000
|
trusted library allocation
|
page read and write
|
||
1A0BC95D000
|
trusted library allocation
|
page read and write
|
||
1379551E000
|
heap
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
1379E9CB000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
1A0BCAFD000
|
trusted library allocation
|
page read and write
|
||
1379E965000
|
trusted library allocation
|
page read and write
|
||
1379E3B8000
|
trusted library allocation
|
page read and write
|
||
137A029B000
|
trusted library allocation
|
page read and write
|
||
1266000
|
unkown
|
page execute and write copy
|
||
1A0BCA03000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A3004000
|
trusted library allocation
|
page read and write
|
||
1379F4D2000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1804BC80000
|
heap
|
page read and write
|
||
1379B954000
|
heap
|
page read and write
|
||
5370000
|
trusted library allocation
|
page read and write
|
||
32EF000
|
stack
|
page read and write
|
||
1379DC6A000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
unkown
|
page execute and read and write
|
||
1379E29A000
|
trusted library allocation
|
page read and write
|
||
12EF000
|
unkown
|
page execute and read and write
|
||
1379A517000
|
trusted library allocation
|
page read and write
|
||
13795582000
|
heap
|
page read and write
|
||
137A02C1000
|
trusted library allocation
|
page read and write
|
||
1A0BCBF0000
|
heap
|
page read and write
|
||
137A4114000
|
trusted library allocation
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
137A0261000
|
trusted library allocation
|
page read and write
|
||
405F000
|
stack
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
1379DF4E000
|
trusted library allocation
|
page read and write
|
||
1379556A000
|
heap
|
page read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
53D000
|
unkown
|
page read and write
|
||
137A01A1000
|
trusted library allocation
|
page read and write
|
||
13795566000
|
heap
|
page read and write
|
||
1A0BD2E6000
|
trusted library allocation
|
page read and write
|
||
2311E5B7000
|
heap
|
page read and write
|
||
5F4B000
|
trusted library allocation
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
1379BC12000
|
trusted library allocation
|
page read and write
|
||
2EEB000
|
stack
|
page read and write
|
||
13795526000
|
heap
|
page read and write
|
||
1379553B000
|
heap
|
page read and write
|
||
1379557A000
|
heap
|
page read and write
|
||
1273000
|
unkown
|
page execute and read and write
|
||
32E0000
|
direct allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A6242000
|
trusted library allocation
|
page read and write
|
||
137A9265000
|
trusted library allocation
|
page read and write
|
||
85F0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
377E000
|
stack
|
page read and write
|
||
1379EAB3000
|
trusted library allocation
|
page read and write
|
||
1379A9A5000
|
trusted library allocation
|
page read and write
|
||
1264000
|
unkown
|
page execute and write copy
|
||
13795568000
|
heap
|
page read and write
|
||
137A91AC000
|
trusted library allocation
|
page read and write
|
||
1379552B000
|
heap
|
page read and write
|
||
259F000
|
stack
|
page read and write
|
||
137A06EE000
|
trusted library allocation
|
page read and write
|
||
1311000
|
heap
|
page read and write
|
||
FD0000
|
direct allocation
|
page read and write
|
||
1230000
|
direct allocation
|
page execute and read and write
|
||
1379557D000
|
heap
|
page read and write
|
||
2E5431C000
|
stack
|
page read and write
|
||
2311E599000
|
heap
|
page read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
1379E795000
|
trusted library allocation
|
page read and write
|
||
1379E146000
|
trusted library allocation
|
page read and write
|
||
5A98000
|
trusted library allocation
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
137A06EE000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
1804BBFA000
|
heap
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
DE0000
|
unkown
|
page readonly
|
||
137A0650000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
E0000
|
unkown
|
page readonly
|
||
506F000
|
stack
|
page read and write
|
||
8B3000
|
unkown
|
page execute and write copy
|
||
1379E3A5000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
13795560000
|
heap
|
page read and write
|
||
137A0281000
|
trusted library allocation
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
1379A600000
|
trusted library allocation
|
page read and write
|
||
480000
|
unkown
|
page readonly
|
||
1D836E6E000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
4787000
|
trusted library allocation
|
page execute and read and write
|
||
47B1000
|
heap
|
page read and write
|
||
137A02C1000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
13AA000
|
heap
|
page read and write
|
||
5DAE000
|
stack
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
10D6000
|
heap
|
page read and write
|
||
1379B5A8000
|
trusted library allocation
|
page read and write
|
||
13795560000
|
heap
|
page read and write
|
||
1A0BFADF000
|
trusted library allocation
|
page read and write
|
||
137A3008000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
13795572000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
4B80000
|
heap
|
page read and write
|
||
13795583000
|
heap
|
page read and write
|
||
1379FF80000
|
trusted library allocation
|
page read and write
|
||
13795533000
|
heap
|
page read and write
|
||
55AE000
|
stack
|
page read and write
|
||
5EE8000
|
trusted library allocation
|
page read and write
|
||
1D836F03000
|
trusted library allocation
|
page read and write
|
||
137A61FD000
|
trusted library allocation
|
page read and write
|
||
2311E540000
|
heap
|
page read and write
|
||
137A104A000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
11DE000
|
unkown
|
page execute and read and write
|
||
C43000
|
unkown
|
page execute and write copy
|
||
CD4000
|
heap
|
page read and write
|
||
1379E58B000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
1379550E000
|
heap
|
page read and write
|
||
1379BBA0000
|
trusted library section
|
page readonly
|
||
F5F000
|
heap
|
page read and write
|
||
BA2000
|
unkown
|
page execute and write copy
|
||
2311E4AC000
|
heap
|
page read and write
|
||
1379556A000
|
heap
|
page read and write
|
||
1379E3F0000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
137A9300000
|
trusted library allocation
|
page read and write
|
||
137A92D2000
|
trusted library allocation
|
page read and write
|
||
1314000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
137A907E000
|
trusted library allocation
|
page read and write
|
||
13795572000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
1379BD0D000
|
trusted library allocation
|
page read and write
|
||
1379F200000
|
trusted library allocation
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
1A0BEC49000
|
trusted library allocation
|
page read and write
|
||
1379A9AA000
|
trusted library allocation
|
page read and write
|
||
53CB000
|
trusted library allocation
|
page read and write
|
||
13795546000
|
heap
|
page read and write
|
||
1379F36E000
|
trusted library allocation
|
page read and write
|
||
1379EC1F000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
13799E98000
|
trusted library allocation
|
page read and write
|
||
1A0BF980000
|
trusted library allocation
|
page read and write
|
||
53D000
|
unkown
|
page read and write
|
||
1379E403000
|
trusted library allocation
|
page read and write
|
||
1379DC44000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
5EC6078000
|
stack
|
page read and write
|
||
123E000
|
unkown
|
page execute and read and write
|
||
4C81000
|
heap
|
page read and write
|
||
137A0E8D000
|
trusted library allocation
|
page read and write
|
||
5A33000
|
trusted library allocation
|
page read and write
|
||
137A02CE000
|
trusted library allocation
|
page read and write
|
||
13795565000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A0370000
|
trusted library allocation
|
page read and write
|
||
5E3C000
|
trusted library allocation
|
page read and write
|
||
5160000
|
direct allocation
|
page execute and read and write
|
||
3A6F000
|
stack
|
page read and write
|
||
2D1F000
|
stack
|
page read and write
|
||
1A0BCC00000
|
heap
|
page read and write
|
||
E78000
|
heap
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
137A9191000
|
trusted library allocation
|
page read and write
|
||
137A0281000
|
trusted library allocation
|
page read and write
|
||
76E000
|
unkown
|
page execute and write copy
|
||
4AB1000
|
heap
|
page read and write
|
||
1A0BD22A000
|
trusted library allocation
|
page read and write
|
||
137A01FB000
|
trusted library allocation
|
page read and write
|
||
1A0BD274000
|
trusted library allocation
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
12F3000
|
unkown
|
page execute and write copy
|
||
137A0322000
|
trusted library allocation
|
page read and write
|
||
5B45000
|
trusted library allocation
|
page read and write
|
||
1804BEB9000
|
trusted library allocation
|
page read and write
|
||
1A0BC57E000
|
trusted library allocation
|
page read and write
|
||
1C9CF000
|
stack
|
page read and write
|
||
1379EAE3000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
remote allocation
|
page read and write
|
||
1A0BF8ED000
|
trusted library allocation
|
page read and write
|
||
137A6246000
|
trusted library allocation
|
page read and write
|
||
1379550E000
|
heap
|
page read and write
|
||
1804BEA2000
|
trusted library allocation
|
page read and write
|
||
2311E531000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
5A98000
|
trusted library allocation
|
page read and write
|
||
1379DF8D000
|
trusted library allocation
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
1A0BCA9A000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page write copy
|
||
29D0000
|
heap
|
page read and write
|
||
1A0BC254000
|
trusted library allocation
|
page read and write
|
||
137A6612000
|
trusted library allocation
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
1379FF97000
|
trusted library allocation
|
page read and write
|
||
137A1B00000
|
trusted library allocation
|
page read and write
|
||
137A0EBA000
|
trusted library allocation
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
1379E399000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
137A008B000
|
trusted library allocation
|
page read and write
|
||
CCE000
|
stack
|
page read and write
|
||
2311E49F000
|
heap
|
page read and write
|
||
1379FF8B000
|
trusted library allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
CA0000
|
unkown
|
page readonly
|
||
137A8F58000
|
trusted library allocation
|
page read and write
|
||
13795529000
|
heap
|
page read and write
|
||
1379BD11000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1379DF5F000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
1A0BD500000
|
trusted library allocation
|
page read and write
|
||
1378E7B4000
|
heap
|
page read and write
|
||
1379EA96000
|
trusted library allocation
|
page read and write
|
||
5BB2000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
trusted library allocation
|
page read and write
|
||
1379FFDE000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
13795573000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
531000
|
unkown
|
page read and write
|
||
162A000
|
heap
|
page read and write
|
||
5F4E000
|
trusted library allocation
|
page read and write
|
||
2E4D9F1000
|
stack
|
page read and write
|
||
137A0378000
|
trusted library allocation
|
page read and write
|
||
1A0BF9B0000
|
trusted library allocation
|
page read and write
|
||
137A10D4000
|
trusted library allocation
|
page read and write
|
||
99C000
|
stack
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
6D7F000
|
stack
|
page read and write
|
||
1379FF80000
|
trusted library allocation
|
page read and write
|
||
1A0BC181000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
137A63B4000
|
trusted library allocation
|
page read and write
|
||
1379A8AD000
|
trusted library allocation
|
page read and write
|
||
FAA4581000
|
trusted library allocation
|
page execute read
|
||
1A0BD2C0000
|
trusted library allocation
|
page read and write
|
||
3C7E000
|
stack
|
page read and write
|
||
1A9B4FE000
|
unkown
|
page readonly
|
||
59F0000
|
trusted library allocation
|
page read and write
|
||
1379EAAB000
|
trusted library allocation
|
page read and write
|
||
50BC000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1379E970000
|
trusted library allocation
|
page read and write
|
||
137A633A000
|
trusted library allocation
|
page read and write
|
||
1A0BF6A6000
|
trusted library allocation
|
page read and write
|
||
5564000
|
heap
|
page read and write
|
||
D6C000
|
unkown
|
page read and write
|
||
1379A807000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
137A8F42000
|
trusted library allocation
|
page read and write
|
||
137A6073000
|
trusted library allocation
|
page read and write
|
||
1D59E000
|
stack
|
page read and write
|
||
1379A07E000
|
trusted library allocation
|
page read and write
|
||
1379E3C9000
|
trusted library allocation
|
page read and write
|
||
1379FFDE000
|
trusted library allocation
|
page read and write
|
||
137A02EC000
|
trusted library allocation
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
5C97000
|
trusted library allocation
|
page read and write
|
||
5ECAD7D000
|
stack
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
104B000
|
unkown
|
page execute and read and write
|
||
1A0BC582000
|
trusted library allocation
|
page read and write
|
||
1379556A000
|
heap
|
page read and write
|
||
137A6344000
|
trusted library allocation
|
page read and write
|
||
2311E4A9000
|
heap
|
page read and write
|
||
137A69A6000
|
trusted library allocation
|
page read and write
|
||
C3D000
|
unkown
|
page execute and write copy
|
||
137A0086000
|
trusted library allocation
|
page read and write
|
||
1379FB48000
|
trusted library allocation
|
page read and write
|
||
1A0BFCB2000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
2311E531000
|
heap
|
page read and write
|
||
1379E362000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1A0BC5B4000
|
trusted library allocation
|
page read and write
|
||
137A62B2000
|
trusted library allocation
|
page read and write
|
||
137A0167000
|
trusted library allocation
|
page read and write
|
||
137A8F45000
|
trusted library allocation
|
page read and write
|
||
1379F221000
|
trusted library allocation
|
page read and write
|
||
F6D000
|
heap
|
page read and write
|
||
2E4CDFF000
|
stack
|
page read and write
|
||
4E4F000
|
stack
|
page read and write
|
||
5AD8000
|
trusted library allocation
|
page read and write
|
||
5A5A000
|
trusted library allocation
|
page read and write
|
||
1379551C000
|
heap
|
page read and write
|
||
69BE000
|
stack
|
page read and write
|
||
1379EDDA000
|
trusted library allocation
|
page read and write
|
||
137A012A000
|
trusted library allocation
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
1379557F000
|
heap
|
page read and write
|
||
1302000
|
unkown
|
page execute and write copy
|
||
F5D000
|
stack
|
page read and write
|
||
1A0BF50C000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
137A636E000
|
trusted library allocation
|
page read and write
|
||
1379C46B000
|
trusted library allocation
|
page read and write
|
||
229750604000
|
trusted library allocation
|
page read and write
|
||
137A01E3000
|
trusted library allocation
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
2311E584000
|
heap
|
page read and write
|
||
1379FF97000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
355E000
|
stack
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
1F4000
|
heap
|
page read and write
|
||
EAB000
|
heap
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1D836A30000
|
heap
|
page read and write
|
||
2E548DE000
|
stack
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
137A0656000
|
trusted library allocation
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
5ECA77E000
|
stack
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
137A8F45000
|
trusted library allocation
|
page read and write
|
||
1379E99C000
|
trusted library allocation
|
page read and write
|
||
AEE000
|
stack
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
1379FFEB000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
8AB000
|
unkown
|
page execute and write copy
|
||
1265000
|
unkown
|
page execute and read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1379E3C9000
|
trusted library allocation
|
page read and write
|
||
E5C000
|
stack
|
page read and write
|
||
C7E000
|
unkown
|
page execute and write copy
|
||
1379558B000
|
heap
|
page read and write
|
||
292F5784000
|
heap
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
57EF000
|
stack
|
page read and write
|
||
2311E53D000
|
heap
|
page read and write
|
||
1379556B000
|
heap
|
page read and write
|
||
1379E565000
|
trusted library allocation
|
page read and write
|
||
1D836E2E000
|
trusted library allocation
|
page read and write
|
||
137A6A26000
|
trusted library allocation
|
page read and write
|
||
137A010B000
|
trusted library allocation
|
page read and write
|
||
137A03D7000
|
trusted library allocation
|
page read and write
|
||
CDD000
|
unkown
|
page execute and write copy
|
||
137A92A8000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A9200000
|
trusted library allocation
|
page read and write
|
||
3EA0000
|
heap
|
page read and write
|
||
1379E300000
|
trusted library allocation
|
page read and write
|
||
1379557A000
|
heap
|
page read and write
|
||
1379557B000
|
heap
|
page read and write
|
||
623C000
|
trusted library allocation
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
137A064B000
|
trusted library allocation
|
page read and write
|
||
137A02A4000
|
trusted library allocation
|
page read and write
|
||
1379A400000
|
trusted library allocation
|
page read and write
|
||
292F5788000
|
heap
|
page read and write
|
||
137A01DF000
|
trusted library allocation
|
page read and write
|
||
5A3C000
|
trusted library allocation
|
page read and write
|
||
1A0BF84C000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
383F000
|
stack
|
page read and write
|
||
1379FF2C000
|
trusted library allocation
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
2311E4E8000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
137A9287000
|
trusted library allocation
|
page read and write
|
||
1379552D000
|
heap
|
page read and write
|
||
4FB0000
|
direct allocation
|
page execute and read and write
|
||
2BAF000
|
stack
|
page read and write
|
||
2E5429C000
|
stack
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
137A9003000
|
trusted library allocation
|
page read and write
|
||
1379B503000
|
trusted library allocation
|
page read and write
|
||
599B000
|
trusted library allocation
|
page read and write
|
||
12ED000
|
unkown
|
page execute and read and write
|
||
1D836F1B000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379EAAB000
|
trusted library allocation
|
page read and write
|
||
137A4100000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
1A0BC200000
|
trusted library allocation
|
page read and write
|
||
137A6324000
|
trusted library allocation
|
page read and write
|
||
124D000
|
unkown
|
page execute and read and write
|
||
137A0167000
|
trusted library allocation
|
page read and write
|
||
12DB000
|
unkown
|
page execute and write copy
|
||
137A02B7000
|
trusted library allocation
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
594E000
|
stack
|
page read and write
|
||
137A6286000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A8FF5000
|
trusted library allocation
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
430F000
|
stack
|
page read and write
|
||
137A9089000
|
trusted library allocation
|
page read and write
|
||
52FB000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
137A0590000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
637F000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
direct allocation
|
page execute and read and write
|
||
35DF000
|
stack
|
page read and write
|
||
137A6240000
|
trusted library allocation
|
page read and write
|
||
1379E426000
|
trusted library allocation
|
page read and write
|
||
2311E520000
|
heap
|
page read and write
|
||
1804BE2E000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1A0BCF00000
|
trusted library allocation
|
page read and write
|
||
1D1CE000
|
stack
|
page read and write
|
||
1379E399000
|
trusted library allocation
|
page read and write
|
||
137A63C3000
|
trusted library allocation
|
page read and write
|
||
137A0648000
|
trusted library allocation
|
page read and write
|
||
1A0BF469000
|
trusted library allocation
|
page read and write
|
||
1A0BC8FE000
|
trusted library allocation
|
page read and write
|
||
3E1E000
|
stack
|
page read and write
|
||
6AF0000
|
heap
|
page read and write
|
||
1260000
|
unkown
|
page execute and write copy
|
||
137A67A0000
|
trusted library allocation
|
page read and write
|
||
1379E3AE000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
5EC335E000
|
stack
|
page read and write
|
||
52E5000
|
trusted library allocation
|
page read and write
|
||
137A91B6000
|
trusted library allocation
|
page read and write
|
||
1379E3C9000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
137A61C3000
|
trusted library allocation
|
page read and write
|
||
2311D863000
|
trusted library allocation
|
page read and write
|
||
1379C209000
|
trusted library allocation
|
page read and write
|
||
570E000
|
stack
|
page read and write
|
||
137A92B9000
|
trusted library allocation
|
page read and write
|
||
1379F299000
|
trusted library allocation
|
page read and write
|
||
1B7E000
|
stack
|
page read and write
|
||
137A02A4000
|
trusted library allocation
|
page read and write
|
||
49DF000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
1A0B0BC9000
|
trusted library allocation
|
page read and write
|
||
1379FF74000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
1379DD3F000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
6DC000
|
unkown
|
page readonly
|
||
321F000
|
stack
|
page read and write
|
||
2DEF000
|
stack
|
page read and write
|
||
51FD000
|
stack
|
page read and write
|
||
1247000
|
unkown
|
page execute and write copy
|
||
45A0000
|
direct allocation
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
1379E333000
|
trusted library allocation
|
page read and write
|
||
1A0BF863000
|
trusted library allocation
|
page read and write
|
||
4780000
|
direct allocation
|
page execute and read and write
|
||
137A0143000
|
trusted library allocation
|
page read and write
|
||
387F000
|
stack
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
137A0589000
|
trusted library allocation
|
page read and write
|
||
1379E3CD000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
direct allocation
|
page read and write
|
||
292F5660000
|
heap
|
page read and write
|
||
C96000
|
unkown
|
page execute and read and write
|
||
4601000
|
heap
|
page read and write
|
||
1379E937000
|
trusted library allocation
|
page read and write
|
||
137A6903000
|
trusted library allocation
|
page read and write
|
||
137A8F3E000
|
trusted library allocation
|
page read and write
|
||
1379ED03000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
4753000
|
trusted library allocation
|
page execute and read and write
|
||
453E000
|
stack
|
page read and write
|
||
137A6395000
|
trusted library allocation
|
page read and write
|
||
2311E52F000
|
heap
|
page read and write
|
||
A46000
|
unkown
|
page execute and write copy
|
||
49C0000
|
direct allocation
|
page read and write
|
||
1379A867000
|
trusted library allocation
|
page read and write
|
||
1A0BD215000
|
trusted library allocation
|
page read and write
|
||
137A1BCB000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379EF00000
|
trusted library allocation
|
page read and write
|
||
2311E003000
|
trusted library allocation
|
page read and write
|
||
5F5F000
|
trusted library allocation
|
page read and write
|
||
2311E523000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
13795566000
|
heap
|
page read and write
|
||
2311E4A0000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page write copy
|
||
1333000
|
heap
|
page read and write
|
||
1D836EB3000
|
trusted library allocation
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
3CCF000
|
stack
|
page read and write
|
||
59AD000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1A0BC5E2000
|
trusted library allocation
|
page read and write
|
||
13795565000
|
heap
|
page read and write
|
||
137A6654000
|
trusted library allocation
|
page read and write
|
||
137A69CE000
|
trusted library allocation
|
page read and write
|
||
1379EDED000
|
trusted library allocation
|
page read and write
|
||
1A0BF700000
|
trusted library allocation
|
page read and write
|
||
1379EAE7000
|
trusted library allocation
|
page read and write
|
||
137A69C9000
|
trusted library allocation
|
page read and write
|
||
137A63E5000
|
trusted library allocation
|
page read and write
|
||
1379E3B8000
|
trusted library allocation
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
1A0BFAF2000
|
trusted library allocation
|
page read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
137A6789000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
13795536000
|
heap
|
page read and write
|
||
137A90B8000
|
trusted library allocation
|
page read and write
|
||
52B4000
|
trusted library allocation
|
page read and write
|
||
137A0098000
|
trusted library allocation
|
page read and write
|
||
5EC897E000
|
stack
|
page read and write
|
||
13795588000
|
heap
|
page read and write
|
||
137A6200000
|
trusted library allocation
|
page read and write
|
||
10E8000
|
heap
|
page read and write
|
||
55A0000
|
direct allocation
|
page execute and read and write
|
||
48CF000
|
stack
|
page read and write
|
||
1379DF46000
|
trusted library allocation
|
page read and write
|
||
137A8F33000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
5EC4DFF000
|
stack
|
page read and write
|
||
137A61FA000
|
trusted library allocation
|
page read and write
|
||
1379E3B1000
|
trusted library allocation
|
page read and write
|
||
1A0BC3D7000
|
trusted library allocation
|
page read and write
|
||
137A6715000
|
trusted library allocation
|
page read and write
|
||
1379F708000
|
trusted library allocation
|
page read and write
|
||
5A99000
|
trusted library allocation
|
page read and write
|
||
137A1BCB000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
292F7258000
|
heap
|
page read and write
|
||
161E000
|
stack
|
page read and write
|
||
137A0E03000
|
trusted library allocation
|
page read and write
|
||
382E000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1A0B0820000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
direct allocation
|
page execute and read and write
|
||
137A11BA000
|
trusted library allocation
|
page read and write
|
||
1379F6F3000
|
trusted library allocation
|
page read and write
|
||
4610000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
45A0000
|
direct allocation
|
page read and write
|
||
1379F4D2000
|
trusted library allocation
|
page read and write
|
||
1379EA5B000
|
trusted library allocation
|
page read and write
|
||
129D000
|
unkown
|
page execute and write copy
|
||
47B1000
|
heap
|
page read and write
|
||
292F7240000
|
heap
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
32E0000
|
direct allocation
|
page read and write
|
||
1379EDD7000
|
trusted library allocation
|
page read and write
|
||
137A0388000
|
trusted library allocation
|
page read and write
|
||
137A6189000
|
trusted library allocation
|
page read and write
|
||
2311D876000
|
trusted library allocation
|
page read and write
|
||
10C3000
|
heap
|
page read and write
|
||
137A605B000
|
trusted library allocation
|
page read and write
|
||
137A62A5000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
191000
|
unkown
|
page execute and read and write
|
||
137A1BA8000
|
trusted library allocation
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
1A0BC5CE000
|
trusted library allocation
|
page read and write
|
||
2311E48D000
|
heap
|
page read and write
|
||
1B3F000
|
stack
|
page read and write
|
||
107E000
|
heap
|
page read and write
|
||
137A108E000
|
trusted library allocation
|
page read and write
|
||
1379558B000
|
heap
|
page read and write
|
||
1804BF3D000
|
trusted library allocation
|
page read and write
|
||
1379A9C3000
|
trusted library allocation
|
page read and write
|
||
1A0BC800000
|
trusted library allocation
|
page read and write
|
||
1379F100000
|
trusted library allocation
|
page read and write
|
||
137A02E9000
|
trusted library allocation
|
page read and write
|
||
137A0032000
|
trusted library allocation
|
page read and write
|
||
D70000
|
unkown
|
page write copy
|
||
502D000
|
stack
|
page read and write
|
||
1238000
|
unkown
|
page execute and write copy
|
||
445E000
|
stack
|
page read and write
|
||
1379EA86000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
1CD3E000
|
stack
|
page read and write
|
||
1A0BC1DF000
|
trusted library allocation
|
page read and write
|
||
1D836E67000
|
trusted library allocation
|
page read and write
|
||
1379DF85000
|
trusted library allocation
|
page read and write
|
||
1300000
|
unkown
|
page execute and write copy
|
||
137A61B6000
|
trusted library allocation
|
page read and write
|
||
137A6954000
|
trusted library allocation
|
page read and write
|
||
1379F44B000
|
trusted library allocation
|
page read and write
|
||
1D836EEF000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
1379557B000
|
heap
|
page read and write
|
||
E57000
|
heap
|
page read and write
|
||
137A9257000
|
trusted library allocation
|
page read and write
|
||
167A000
|
heap
|
page read and write
|
||
137A1BF8000
|
trusted library allocation
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
4C0E000
|
stack
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
1A0BF745000
|
trusted library allocation
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
1379A577000
|
trusted library allocation
|
page read and write
|
||
2A554430000
|
heap
|
page read and write
|
||
2B856EB00000
|
trusted library allocation
|
page read and write
|
||
1A0BD408000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
431E000
|
stack
|
page read and write
|
||
13795562000
|
heap
|
page read and write
|
||
137A02AE000
|
trusted library allocation
|
page read and write
|
||
1D836EC9000
|
trusted library allocation
|
page read and write
|
||
5410000
|
direct allocation
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
137A61ED000
|
trusted library allocation
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
2311D823000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
direct allocation
|
page execute and read and write
|
||
137A9026000
|
trusted library allocation
|
page read and write
|
||
1379EACE000
|
trusted library allocation
|
page read and write
|
||
172B000
|
heap
|
page read and write
|
||
82F000
|
stack
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
137A1BC3000
|
trusted library allocation
|
page read and write
|
||
1379551C000
|
heap
|
page read and write
|
||
1379E965000
|
trusted library allocation
|
page read and write
|
||
1A0BD29A000
|
trusted library allocation
|
page read and write
|
||
16E5000
|
heap
|
page read and write
|
||
323F000
|
stack
|
page read and write
|
||
1379E76C000
|
trusted library allocation
|
page read and write
|
||
5CA4000
|
trusted library allocation
|
page read and write
|
||
1379C474000
|
trusted library allocation
|
page read and write
|
||
5E34000
|
trusted library allocation
|
page read and write
|
||
137A026C000
|
trusted library allocation
|
page read and write
|
||
12A3000
|
unkown
|
page execute and read and write
|
||
137A623D000
|
trusted library allocation
|
page read and write
|
||
137A1003000
|
trusted library allocation
|
page read and write
|
||
1378E600000
|
trusted library allocation
|
page read and write
|
||
137A02DB000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
14A5000
|
unkown
|
page execute and write copy
|
||
BF4000
|
heap
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
137A0B4F000
|
trusted library allocation
|
page read and write
|
||
1379C469000
|
trusted library allocation
|
page read and write
|
||
137A0D49000
|
trusted library allocation
|
page read and write
|
||
2E4ABAB000
|
stack
|
page read and write
|
||
1A0BC803000
|
trusted library allocation
|
page read and write
|
||
5E35000
|
trusted library allocation
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
1379E8E0000
|
trusted library section
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
623B000
|
trusted library allocation
|
page read and write
|
||
137A054E000
|
trusted library allocation
|
page read and write
|
||
137A01EC000
|
trusted library allocation
|
page read and write
|
||
1379F96D000
|
unclassified section
|
page read and write
|
||
4A6E000
|
stack
|
page read and write
|
||
5F7B000
|
trusted library allocation
|
page read and write
|
||
562000
|
unkown
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
137A058C000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
6F5E000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
7C5000
|
unkown
|
page execute and read and write
|
||
1379E99C000
|
trusted library allocation
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
1379F4D8000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379FB19000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
BAE000
|
heap
|
page read and write
|
||
1379EA86000
|
trusted library allocation
|
page read and write
|
||
137A60A5000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
10C7000
|
heap
|
page read and write
|
||
1A0B0880000
|
heap
|
page read and write
|
||
1379C44D000
|
trusted library allocation
|
page read and write
|
||
1A0BC1CE000
|
trusted library allocation
|
page read and write
|
||
9756FFD000
|
stack
|
page read and write
|
||
E8A000
|
heap
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
137A62C9000
|
trusted library allocation
|
page read and write
|
||
1379A00F000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
292F56B0000
|
heap
|
page read and write
|
||
13AA000
|
heap
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
137A61E3000
|
trusted library allocation
|
page read and write
|
||
16CC000
|
heap
|
page read and write
|
||
1379EAB9000
|
trusted library allocation
|
page read and write
|
||
1379A9E3000
|
trusted library allocation
|
page read and write
|
||
E49000
|
unkown
|
page write copy
|
||
4F9000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
13799F45000
|
trusted library allocation
|
page read and write
|
||
13795564000
|
heap
|
page read and write
|
||
1D836F33000
|
trusted library allocation
|
page read and write
|
||
137A1000000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
1379E785000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1CE9E000
|
stack
|
page read and write
|
||
368F000
|
stack
|
page read and write
|
||
137A036C000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A032D000
|
trusted library allocation
|
page read and write
|
||
1379E38A000
|
trusted library allocation
|
page read and write
|
||
137A0690000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
137A9080000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
3C4F000
|
stack
|
page read and write
|
||
163C000
|
stack
|
page read and write
|
||
1379EFA7000
|
trusted library allocation
|
page read and write
|
||
F6D000
|
heap
|
page read and write
|
||
538F000
|
stack
|
page read and write
|
||
7260000
|
heap
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
137A0394000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
57F000
|
heap
|
page read and write
|
||
1379FED3000
|
trusted library allocation
|
page read and write
|
||
1A0BC5E2000
|
trusted library allocation
|
page read and write
|
||
5EEB000
|
trusted library allocation
|
page read and write
|
||
1100000
|
unkown
|
page execute and write copy
|
||
1B07E000
|
stack
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
1379A8E3000
|
trusted library allocation
|
page read and write
|
||
1379E98A000
|
trusted library allocation
|
page read and write
|
||
46EF000
|
stack
|
page read and write
|
||
1A0BF603000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A8F42000
|
trusted library allocation
|
page read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
A32000
|
unkown
|
page execute and write copy
|
||
1379FFB4000
|
trusted library allocation
|
page read and write
|
||
13795572000
|
heap
|
page read and write
|
||
BB3000
|
heap
|
page read and write
|
||
5EDC000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1379E3E2000
|
trusted library allocation
|
page read and write
|
||
137A69C7000
|
trusted library allocation
|
page read and write
|
||
1379EAA0000
|
trusted library allocation
|
page read and write
|
||
5EC607B000
|
stack
|
page read and write
|
||
5CF5000
|
trusted library allocation
|
page read and write
|
||
1379FE9D000
|
trusted library allocation
|
page read and write
|
||
1B1BE000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1272000
|
unkown
|
page execute and write copy
|
||
137A0000000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1379BE08000
|
trusted library allocation
|
page read and write
|
||
137A0E9B000
|
trusted library allocation
|
page read and write
|
||
1379557F000
|
heap
|
page read and write
|
||
1379F4CF000
|
trusted library allocation
|
page read and write
|
||
137A623B000
|
trusted library allocation
|
page read and write
|
||
2311D560000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1A0BC5BD000
|
trusted library allocation
|
page read and write
|
||
603C000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
43FE000
|
stack
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
137A0157000
|
trusted library allocation
|
page read and write
|
||
1379FE00000
|
trusted library allocation
|
page read and write
|
||
1379F9F0000
|
trusted library section
|
page readonly
|
||
1379550E000
|
heap
|
page read and write
|
||
1379A526000
|
trusted library allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
1379E99C000
|
trusted library allocation
|
page read and write
|
||
59BA000
|
trusted library allocation
|
page read and write
|
||
1379F6AF000
|
trusted library allocation
|
page read and write
|
||
13795535000
|
heap
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
1A0BCAE8000
|
trusted library allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
16BF000
|
heap
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
E2A000
|
heap
|
page read and write
|
||
137A8F45000
|
trusted library allocation
|
page read and write
|
||
1379F4E0000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
137A91A1000
|
trusted library allocation
|
page read and write
|
||
1379EFEF000
|
trusted library allocation
|
page read and write
|
||
1A0BF741000
|
trusted library allocation
|
page read and write
|
||
1379F003000
|
trusted library allocation
|
page read and write
|
||
2311E5B7000
|
heap
|
page read and write
|
||
F85000
|
heap
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
13795560000
|
heap
|
page read and write
|
||
C93000
|
unkown
|
page execute and read and write
|
||
B44000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
1379BF14000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
heap
|
page read and write
|
||
1A0BC203000
|
trusted library allocation
|
page read and write
|
||
590E000
|
stack
|
page read and write
|
||
4DBF000
|
stack
|
page read and write
|
||
3A1F000
|
stack
|
page read and write
|
||
137A114D000
|
trusted library allocation
|
page read and write
|
||
2311E561000
|
heap
|
page read and write
|
||
1A0BC916000
|
trusted library allocation
|
page read and write
|
||
10C7000
|
heap
|
page read and write
|
||
1A0B0BD7000
|
trusted library allocation
|
page read and write
|
||
45A0000
|
direct allocation
|
page read and write
|
||
2250CC504000
|
trusted library allocation
|
page read and write
|
||
137A6A2B000
|
trusted library allocation
|
page read and write
|
||
59D4000
|
trusted library allocation
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
13799E03000
|
trusted library allocation
|
page read and write
|
||
1378E8FE000
|
trusted library allocation
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
CD5000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
13795525000
|
heap
|
page read and write
|
||
137A1BD3000
|
trusted library allocation
|
page read and write
|
||
137A9D00000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1A0BFC97000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1A0B2425000
|
heap
|
page read and write
|
||
137A62B5000
|
trusted library allocation
|
page read and write
|
||
5520000
|
direct allocation
|
page execute and read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
1379C4B9000
|
trusted library allocation
|
page read and write
|
||
137A1054000
|
trusted library allocation
|
page read and write
|
||
1A0BC227000
|
trusted library allocation
|
page read and write
|
||
137A8F3E000
|
trusted library allocation
|
page read and write
|
||
1379F10B000
|
trusted library allocation
|
page read and write
|
||
137A033B000
|
trusted library allocation
|
page read and write
|
||
1379EFA3000
|
trusted library allocation
|
page read and write
|
||
1333000
|
heap
|
page read and write
|
||
5590000
|
direct allocation
|
page execute and read and write
|
||
137A6A00000
|
trusted library allocation
|
page read and write
|
||
13795525000
|
heap
|
page read and write
|
||
1379552D000
|
heap
|
page read and write
|
||
5E38000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
direct allocation
|
page execute and read and write
|
||
2311DEC9000
|
unkown
|
page execute read
|
||
CFE000
|
stack
|
page read and write
|
||
1379A0FC000
|
trusted library allocation
|
page read and write
|
||
2311E52F000
|
heap
|
page read and write
|
||
1A0B0AA2000
|
unclassified section
|
page read and write
|
||
545272D000
|
stack
|
page read and write
|
||
1379EAB0000
|
trusted library allocation
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
5EC339E000
|
stack
|
page read and write
|
||
1726000
|
heap
|
page read and write
|
||
1A0BD2C8000
|
trusted library allocation
|
page read and write
|
||
137A01AD000
|
trusted library allocation
|
page read and write
|
||
1379557E000
|
heap
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
2E545DD000
|
stack
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
59AD000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A8F00000
|
trusted library allocation
|
page read and write
|
||
CEC000
|
unkown
|
page execute and write copy
|
||
137A0CF6000
|
trusted library allocation
|
page read and write
|
||
5EC77BE000
|
stack
|
page read and write
|
||
1379C489000
|
trusted library allocation
|
page read and write
|
||
45A0000
|
direct allocation
|
page read and write
|
||
137A67AD000
|
trusted library allocation
|
page read and write
|
||
137A021A000
|
trusted library allocation
|
page read and write
|
||
1379F355000
|
trusted library allocation
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
13A5000
|
heap
|
page read and write
|
||
2D0000
|
unkown
|
page readonly
|
||
4B71000
|
heap
|
page read and write
|
||
1A0BF5E5000
|
trusted library allocation
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
2311D500000
|
heap
|
page read and write
|
||
1379E12B000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1A0BC395000
|
trusted library allocation
|
page read and write
|
||
6E5F000
|
stack
|
page read and write
|
||
137A69FC000
|
trusted library allocation
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
137A0370000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
42DF000
|
stack
|
page read and write
|
||
1A0BF9DA000
|
trusted library allocation
|
page read and write
|
||
137A1BC3000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A6663000
|
trusted library allocation
|
page read and write
|
||
414F000
|
stack
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
137A003B000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1379551C000
|
heap
|
page read and write
|
||
13795574000
|
heap
|
page read and write
|
||
137A62B5000
|
trusted library allocation
|
page read and write
|
||
137A69F8000
|
trusted library allocation
|
page read and write
|
||
5791000
|
trusted library allocation
|
page read and write
|
||
401E000
|
stack
|
page read and write
|
||
137A69E2000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1379EDDC000
|
trusted library allocation
|
page read and write
|
||
137A90B2000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
1D05E000
|
stack
|
page read and write
|
||
1379FF00000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
1A0BC26D000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
5EC797E000
|
stack
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
5E32000
|
trusted library allocation
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
1303000
|
unkown
|
page execute and write copy
|
||
4F91000
|
heap
|
page read and write
|
||
E6B61FF000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1A0B24E0000
|
heap
|
page read and write
|
||
1266000
|
unkown
|
page execute and write copy
|
||
5A68000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
1379551C000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
3A0E000
|
stack
|
page read and write
|
||
13795566000
|
heap
|
page read and write
|
||
E6B59FF000
|
stack
|
page read and write
|
||
52A000
|
heap
|
page read and write
|
||
137A69C9000
|
trusted library allocation
|
page read and write
|
||
12F3000
|
unkown
|
page execute and write copy
|
||
59BE000
|
trusted library allocation
|
page read and write
|
||
137A0053000
|
trusted library allocation
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
4E50000
|
remote allocation
|
page read and write
|
||
49D1000
|
heap
|
page read and write
|
||
137A0740000
|
trusted library section
|
page readonly
|
||
32E0000
|
direct allocation
|
page read and write
|
||
137A63F4000
|
trusted library allocation
|
page read and write
|
||
5560000
|
heap
|
page read and write
|
||
1379FB43000
|
trusted library allocation
|
page read and write
|
||
5B7000
|
heap
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
5AA9000
|
trusted library allocation
|
page read and write
|
||
4D0F000
|
stack
|
page read and write
|
||
2311D690000
|
trusted library section
|
page readonly
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
16F8000
|
heap
|
page read and write
|
||
1225000
|
unkown
|
page execute and read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
137A6240000
|
trusted library allocation
|
page read and write
|
||
1379EAB6000
|
trusted library allocation
|
page read and write
|
||
1379553B000
|
heap
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
5E37000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1379E1CB000
|
trusted library allocation
|
page read and write
|
||
1379EC00000
|
trusted library allocation
|
page read and write
|
||
5ECC7DC000
|
stack
|
page read and write
|
||
6F2C000
|
stack
|
page read and write
|
||
281F000
|
stack
|
page read and write
|
||
1379558D000
|
heap
|
page read and write
|
||
137A69C7000
|
trusted library allocation
|
page read and write
|
||
137A10BF000
|
trusted library allocation
|
page read and write
|
||
14A5000
|
unkown
|
page execute and write copy
|
||
DBE000
|
stack
|
page read and write
|
||
13CE000
|
heap
|
page read and write
|
||
52D5000
|
trusted library allocation
|
page read and write
|
||
137A10B1000
|
trusted library allocation
|
page read and write
|
||
137A69E0000
|
trusted library allocation
|
page read and write
|
||
1804BBB0000
|
heap
|
page read and write
|
||
FAA4431000
|
trusted library allocation
|
page execute read
|
||
DD4000
|
heap
|
page read and write
|
||
2E50DFE000
|
stack
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
2E5469B000
|
stack
|
page read and write
|
||
137A1BB1000
|
trusted library allocation
|
page read and write
|
||
137A064B000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
direct allocation
|
page execute and read and write
|
||
5A19000
|
trusted library allocation
|
page read and write
|
||
1379E99C000
|
trusted library allocation
|
page read and write
|
||
5B1000
|
unkown
|
page execute and write copy
|
||
1379EABC000
|
trusted library allocation
|
page read and write
|
||
1A0B0890000
|
heap
|
page read and write
|
||
1AC1F000
|
stack
|
page read and write
|
||
1A0BC19E000
|
trusted library allocation
|
page read and write
|
||
249FBEE3000
|
heap
|
page read and write
|
||
1379552C000
|
heap
|
page read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
1A0BC100000
|
trusted library allocation
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
137A06EE000
|
trusted library allocation
|
page read and write
|
||
137A6295000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
137A6016000
|
trusted library allocation
|
page read and write
|
||
137A0CA1000
|
trusted library allocation
|
page read and write
|
||
137A055C000
|
trusted library allocation
|
page read and write
|
||
137A6700000
|
trusted library allocation
|
page read and write
|
||
1A0BD28F000
|
trusted library allocation
|
page read and write
|
||
13799F03000
|
trusted library allocation
|
page read and write
|
||
1A0BF8FD000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
1A0BC1C3000
|
trusted library allocation
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
1399DD00000
|
trusted library section
|
page readonly
|
||
137A8F5D000
|
trusted library allocation
|
page read and write
|
||
1D836F1D000
|
trusted library allocation
|
page read and write
|
||
137A63C3000
|
trusted library allocation
|
page read and write
|
||
120F000
|
unkown
|
page execute and write copy
|
||
1379E38C000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1379EAAF000
|
trusted library allocation
|
page read and write
|
||
137A013A000
|
trusted library allocation
|
page read and write
|
||
13795583000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
1379F2E1000
|
trusted library allocation
|
page read and write
|
||
1379DF23000
|
trusted library allocation
|
page read and write
|
||
5AA9000
|
trusted library allocation
|
page read and write
|
||
137A6274000
|
trusted library allocation
|
page read and write
|
||
43BF000
|
stack
|
page read and write
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
10FF000
|
unkown
|
page execute and read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1A0BD300000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A0204000
|
trusted library allocation
|
page read and write
|
||
137A0380000
|
trusted library allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
137A104C000
|
trusted library allocation
|
page read and write
|
||
1D836E5D000
|
trusted library allocation
|
page read and write
|
||
1A0BC2D1000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
137A0F03000
|
trusted library allocation
|
page read and write
|
||
1379B7FC000
|
trusted library allocation
|
page read and write
|
||
11DE000
|
unkown
|
page execute and read and write
|
||
4601000
|
heap
|
page read and write
|
||
1379DD54000
|
trusted library allocation
|
page read and write
|
||
137A10A4000
|
trusted library allocation
|
page read and write
|
||
1264000
|
unkown
|
page execute and write copy
|
||
137A02B4000
|
trusted library allocation
|
page read and write
|
||
1CBBF000
|
stack
|
page read and write
|
||
1A0BC51E000
|
trusted library allocation
|
page read and write
|
||
137A0394000
|
trusted library allocation
|
page read and write
|
||
1D836E47000
|
trusted library allocation
|
page read and write
|
||
1A0BD251000
|
trusted library allocation
|
page read and write
|
||
137A9902000
|
trusted library allocation
|
page read and write
|
||
1379C411000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
1CF1D000
|
stack
|
page read and write
|
||
1A0BC23F000
|
trusted library allocation
|
page read and write
|
||
CEC000
|
unkown
|
page execute and read and write
|
||
137A6310000
|
trusted library allocation
|
page read and write
|
||
137A922E000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
137A0F6E000
|
trusted library allocation
|
page read and write
|
||
2311D940000
|
heap
|
page read and write
|
||
1266000
|
unkown
|
page execute and write copy
|
||
3DAF000
|
stack
|
page read and write
|
||
137A0193000
|
trusted library allocation
|
page read and write
|
||
2E4EDFE000
|
stack
|
page read and write
|
||
137A67AD000
|
trusted library allocation
|
page read and write
|
||
137A300C000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
heap
|
page read and write
|
||
1A0BF8DF000
|
trusted library allocation
|
page read and write
|
||
137A1BCF000
|
trusted library allocation
|
page read and write
|
||
4BCF000
|
stack
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
1379B5E2000
|
trusted library allocation
|
page read and write
|
||
7AF000
|
unkown
|
page execute and read and write
|
||
38EE000
|
stack
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
2E5415B000
|
stack
|
page read and write
|
||
1379ED46000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
direct allocation
|
page read and write
|
||
1379A885000
|
trusted library allocation
|
page read and write
|
||
1379EAC3000
|
trusted library allocation
|
page read and write
|
||
1315000
|
heap
|
page read and write
|
||
137A91ED000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
1379FB03000
|
trusted library allocation
|
page read and write
|
||
FAA4421000
|
trusted library allocation
|
page execute read
|
||
249FBED7000
|
heap
|
page read and write
|
||
3B3E000
|
stack
|
page read and write
|
||
1379EE6A000
|
trusted library allocation
|
page read and write
|
||
5590000
|
direct allocation
|
page execute and read and write
|
||
2311D420000
|
unclassified section
|
page readonly
|
||
2E5445C000
|
stack
|
page read and write
|
||
1A0BC513000
|
trusted library allocation
|
page read and write
|
||
1379A403000
|
trusted library allocation
|
page read and write
|
||
4ABB000
|
stack
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
2311D848000
|
trusted library allocation
|
page read and write
|
||
137A63CE000
|
trusted library allocation
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1379E022000
|
trusted library allocation
|
page read and write
|
||
2E5381C000
|
stack
|
page read and write
|
||
137A6999000
|
trusted library allocation
|
page read and write
|
||
137A63B7000
|
trusted library allocation
|
page read and write
|
||
1A0B0B11000
|
trusted library allocation
|
page read and write
|
||
137A02E6000
|
trusted library allocation
|
page read and write
|
||
137A0B72000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
137A0FD9000
|
trusted library allocation
|
page read and write
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
unkown
|
page read and write
|
||
1379E938000
|
trusted library allocation
|
page read and write
|
||
137A02B0000
|
trusted library allocation
|
page read and write
|
||
1B2BF000
|
stack
|
page read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
1A0B23E8000
|
heap
|
page read and write
|
||
13795530000
|
heap
|
page read and write
|
||
137A92DA000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
13795579000
|
heap
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
137A69E0000
|
trusted library allocation
|
page read and write
|
||
137A66D4000
|
trusted library allocation
|
page read and write
|
||
2E5385E000
|
stack
|
page read and write
|
||
71BF000
|
stack
|
page read and write
|
||
1A0BFC40000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
1804BF00000
|
trusted library allocation
|
page read and write
|
||
1804BC50000
|
heap
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
2E5421F000
|
stack
|
page read and write
|
||
137A90C8000
|
trusted library allocation
|
page read and write
|
||
10D1000
|
heap
|
page read and write
|
||
1379551C000
|
heap
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
2E561EF000
|
stack
|
page read and write
|
||
137A636B000
|
trusted library allocation
|
page read and write
|
||
137A619F000
|
trusted library allocation
|
page read and write
|
||
5110000
|
direct allocation
|
page read and write
|
||
4C8F000
|
stack
|
page read and write
|
||
137A9125000
|
trusted library allocation
|
page read and write
|
||
1A0BC8F0000
|
trusted library allocation
|
page read and write
|
||
1379EF37000
|
trusted library allocation
|
page read and write
|
||
1379E0EE000
|
trusted library allocation
|
page read and write
|
||
13795581000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
137A02D3000
|
trusted library allocation
|
page read and write
|
||
1379DF48000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
137A8F33000
|
trusted library allocation
|
page read and write
|
||
59BC000
|
trusted library allocation
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
137A63D7000
|
trusted library allocation
|
page read and write
|
||
340F000
|
stack
|
page read and write
|
||
1379554E000
|
heap
|
page read and write
|
||
174E000
|
heap
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
137A67D7000
|
trusted library allocation
|
page read and write
|
||
13799DF4000
|
heap
|
page read and write
|
||
CA1000
|
unkown
|
page execute read
|
||
3B4E000
|
stack
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
137A015E000
|
trusted library allocation
|
page read and write
|
||
1379DDC5000
|
trusted library allocation
|
page read and write
|
||
1050000
|
unkown
|
page execute and write copy
|
||
BF4000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
5B8D000
|
trusted library allocation
|
page read and write
|
||
13799E4A000
|
trusted library allocation
|
page read and write
|
||
137A619F000
|
trusted library allocation
|
page read and write
|
||
1379E959000
|
trusted library allocation
|
page read and write
|
||
137A61FA000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
1379C421000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
3EA1000
|
heap
|
page read and write
|
||
137A0394000
|
trusted library allocation
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
5A2E000
|
trusted library allocation
|
page read and write
|
||
4770000
|
trusted library allocation
|
page read and write
|
||
1379ED1B000
|
trusted library allocation
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
137A067E000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
137A6237000
|
trusted library allocation
|
page read and write
|
||
5B09000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
direct allocation
|
page read and write
|
||
137A9157000
|
trusted library allocation
|
page read and write
|
||
1379F32E000
|
trusted library allocation
|
page read and write
|
||
4AB1000
|
heap
|
page read and write
|
||
137A6237000
|
trusted library allocation
|
page read and write
|
||
137A1015000
|
trusted library allocation
|
page read and write
|
||
5EC693E000
|
stack
|
page read and write
|
||
1CE1D000
|
stack
|
page read and write
|
||
10E2000
|
heap
|
page read and write
|
||
137A63F4000
|
trusted library allocation
|
page read and write
|
||
1379E000000
|
trusted library allocation
|
page read and write
|
||
1A0B2420000
|
heap
|
page read and write
|
||
10CB000
|
heap
|
page read and write
|
||
137A63CE000
|
trusted library allocation
|
page read and write
|
||
137A01A5000
|
trusted library allocation
|
page read and write
|
||
137A0365000
|
trusted library allocation
|
page read and write
|
||
4DE1000
|
heap
|
page read and write
|
||
137A013D000
|
trusted library allocation
|
page read and write
|
||
137A02E4000
|
trusted library allocation
|
page read and write
|
||
13795533000
|
heap
|
page read and write
|
||
1D836E96000
|
trusted library allocation
|
page read and write
|
||
2311E523000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1A0B0870000
|
trusted library allocation
|
page execute read
|
||
9F0000
|
heap
|
page read and write
|
||
1804BE7A000
|
trusted library allocation
|
page read and write
|
||
1379F217000
|
trusted library allocation
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
1379E577000
|
trusted library allocation
|
page read and write
|
||
49E000
|
unkown
|
page readonly
|
||
3B50000
|
heap
|
page read and write
|
||
529C000
|
stack
|
page read and write
|
||
1A0BCACF000
|
trusted library allocation
|
page read and write
|
||
1379E5F4000
|
trusted library allocation
|
page read and write
|
||
1379FD03000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
unkown
|
page execute and read and write
|
||
1379EE00000
|
trusted library allocation
|
page read and write
|
||
5310000
|
direct allocation
|
page execute and read and write
|
||
59BF000
|
trusted library allocation
|
page read and write
|
||
2E568B7000
|
stack
|
page read and write
|
||
137A02CE000
|
trusted library allocation
|
page read and write
|
||
137A8F3C000
|
trusted library allocation
|
page read and write
|
||
4B7E000
|
stack
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
1379E9A2000
|
trusted library allocation
|
page read and write
|
||
53C3000
|
trusted library allocation
|
page read and write
|
||
137A61E7000
|
trusted library allocation
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
1379B935000
|
heap
|
page read and write
|
||
124D000
|
unkown
|
page execute and read and write
|
||
1379E333000
|
trusted library allocation
|
page read and write
|
||
1804BC66000
|
heap
|
page read and write
|
||
137A6244000
|
trusted library allocation
|
page read and write
|
||
415E000
|
stack
|
page read and write
|
||
1A0BC2AD000
|
trusted library allocation
|
page read and write
|
||
1379EAE9000
|
trusted library allocation
|
page read and write
|
||
137A9062000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379556A000
|
heap
|
page read and write
|
||
137A02AE000
|
trusted library allocation
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
249FBE80000
|
heap
|
page read and write
|
||
11B5000
|
unkown
|
page execute and read and write
|
||
137A8F9C000
|
trusted library allocation
|
page read and write
|
||
5ED2000
|
trusted library allocation
|
page read and write
|
||
137A0D61000
|
trusted library allocation
|
page read and write
|
||
1379FF3F000
|
trusted library allocation
|
page read and write
|
||
1A0BC19E000
|
trusted library allocation
|
page read and write
|
||
117F000
|
stack
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
480000
|
unkown
|
page readonly
|
||
137A69E8000
|
trusted library allocation
|
page read and write
|
||
E0D000
|
heap
|
page read and write
|
||
56EE000
|
stack
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
1A0BFCA2000
|
trusted library allocation
|
page read and write
|
||
1379CA00000
|
heap
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
1379557E000
|
heap
|
page read and write
|
||
556F000
|
stack
|
page read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
1378E847000
|
trusted library allocation
|
page read and write
|
||
6C3C000
|
stack
|
page read and write
|
||
137A9028000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A1137000
|
trusted library allocation
|
page read and write
|
||
137A0370000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1379EAD6000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A0372000
|
trusted library allocation
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
1D8369F0000
|
heap
|
page read and write
|
||
1804BE63000
|
trusted library allocation
|
page read and write
|
||
5080000
|
direct allocation
|
page execute and read and write
|
||
4C81000
|
heap
|
page read and write
|
||
45A0000
|
direct allocation
|
page read and write
|
||
137A0EE4000
|
trusted library allocation
|
page read and write
|
||
5A98000
|
trusted library allocation
|
page read and write
|
||
1A0B246A000
|
heap
|
page read and write
|
||
122E000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
5A2F000
|
trusted library allocation
|
page read and write
|
||
5E3C000
|
trusted library allocation
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
137A1052000
|
trusted library allocation
|
page read and write
|
||
5F4C000
|
trusted library allocation
|
page read and write
|
||
1379DF8D000
|
trusted library allocation
|
page read and write
|
||
4760000
|
trusted library allocation
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
137A0E84000
|
trusted library allocation
|
page read and write
|
||
1379556A000
|
heap
|
page read and write
|
||
137A0E71000
|
trusted library allocation
|
page read and write
|
||
1303000
|
unkown
|
page execute and write copy
|
||
137A0536000
|
trusted library allocation
|
page read and write
|
||
137A0256000
|
trusted library allocation
|
page read and write
|
||
137A0191000
|
trusted library allocation
|
page read and write
|
||
137A02DB000
|
trusted library allocation
|
page read and write
|
||
1379DFFE000
|
trusted library allocation
|
page read and write
|
||
1379554F000
|
heap
|
page read and write
|
||
1379557A000
|
heap
|
page read and write
|
||
137A05F5000
|
trusted library allocation
|
page read and write
|
||
1379F263000
|
trusted library allocation
|
page read and write
|
||
1379A87C000
|
trusted library allocation
|
page read and write
|
||
137A90E7000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
137A91FA000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
1A0B2485000
|
heap
|
page read and write
|
||
1A0BC88D000
|
trusted library allocation
|
page read and write
|
||
E1000
|
unkown
|
page execute and write copy
|
||
EF4000
|
heap
|
page read and write
|
||
1379DF5B000
|
trusted library allocation
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1379A526000
|
trusted library allocation
|
page read and write
|
||
1379E3B8000
|
trusted library allocation
|
page read and write
|
||
2E536FE000
|
stack
|
page read and write
|
||
137A1C00000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1A0BF923000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1379DF16000
|
trusted library allocation
|
page read and write
|
||
1379FE9D000
|
trusted library allocation
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
16E8000
|
heap
|
page read and write
|
||
137A0372000
|
trusted library allocation
|
page read and write
|
||
55C0000
|
direct allocation
|
page execute and read and write
|
||
137A2E02000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
1379E799000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
1379BC0D000
|
trusted library allocation
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
5E3D000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
1A0BC89B000
|
trusted library allocation
|
page read and write
|
||
1379EAE2000
|
trusted library allocation
|
page read and write
|
||
2311E4EA000
|
heap
|
page read and write
|
||
C6D000
|
unkown
|
page execute and read and write
|
||
1379554F000
|
heap
|
page read and write
|
||
13795535000
|
heap
|
page read and write
|
||
13AB000
|
heap
|
page read and write
|
||
4F6E000
|
stack
|
page read and write
|
||
49D1000
|
heap
|
page read and write
|
||
137A628C000
|
trusted library allocation
|
page read and write
|
||
5ECC77E000
|
stack
|
page read and write
|
||
1AF1E000
|
stack
|
page read and write
|
||
137A0400000
|
trusted library allocation
|
page read and write
|
||
137A1BE0000
|
trusted library allocation
|
page read and write
|
||
137A6938000
|
trusted library allocation
|
page read and write
|
||
1804BB90000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
137A8F1F000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
1265000
|
unkown
|
page execute and read and write
|
||
1379DB52000
|
unclassified section
|
page read and write
|
||
1379EAC5000
|
trusted library allocation
|
page read and write
|
||
1379EC07000
|
trusted library allocation
|
page read and write
|
||
1379DF03000
|
trusted library allocation
|
page read and write
|
||
1379F4EE000
|
trusted library allocation
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
97567FF000
|
stack
|
page read and write
|
||
1379557A000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
1379E362000
|
trusted library allocation
|
page read and write
|
||
1379551C000
|
heap
|
page read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
1379A3EF000
|
unclassified section
|
page read and write
|
||
2E4C17E000
|
stack
|
page read and write
|
||
1D836EA7000
|
trusted library allocation
|
page read and write
|
||
F68000
|
heap
|
page read and write
|
||
137A0378000
|
trusted library allocation
|
page read and write
|
||
137A0C4E000
|
trusted library allocation
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
137A6AE8000
|
trusted library allocation
|
page read and write
|
||
ECB000
|
heap
|
page read and write
|
||
1A0BF363000
|
trusted library allocation
|
page read and write
|
||
137A0D95000
|
trusted library allocation
|
page read and write
|
||
A3C000
|
stack
|
page read and write
|
||
1379E9A2000
|
trusted library allocation
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
13799ECD000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
13795583000
|
heap
|
page read and write
|
||
1379C4B3000
|
trusted library allocation
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
47A0000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
C5E000
|
unkown
|
page execute and read and write
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
137A108B000
|
trusted library allocation
|
page read and write
|
||
12BB000
|
unkown
|
page execute and read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A61ED000
|
trusted library allocation
|
page read and write
|
||
5E32000
|
trusted library allocation
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
1CF8E000
|
stack
|
page read and write
|
||
5D6000
|
unkown
|
page execute and write copy
|
||
137A62B2000
|
trusted library allocation
|
page read and write
|
||
1379557B000
|
heap
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
1379EACE000
|
trusted library allocation
|
page read and write
|
||
137A1C66000
|
trusted library allocation
|
page read and write
|
||
1379E394000
|
trusted library allocation
|
page read and write
|
||
1300000
|
unkown
|
page execute and write copy
|
||
1379BF11000
|
trusted library allocation
|
page read and write
|
||
389CD151000
|
trusted library allocation
|
page execute read
|
||
137A0153000
|
trusted library allocation
|
page read and write
|
||
137A01A8000
|
trusted library allocation
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
1379A8BA000
|
trusted library allocation
|
page read and write
|
||
137A6783000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
F63000
|
heap
|
page read and write
|
||
1804BE72000
|
trusted library allocation
|
page read and write
|
||
E42000
|
unkown
|
page execute and read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
E4B000
|
heap
|
page read and write
|
||
1379E55F000
|
trusted library allocation
|
page read and write
|
||
162E000
|
heap
|
page read and write
|
||
365F000
|
stack
|
page read and write
|
||
11DC000
|
unkown
|
page execute and write copy
|
||
3D8F000
|
stack
|
page read and write
|
||
1379C41E000
|
trusted library allocation
|
page read and write
|
||
2311D85C000
|
trusted library allocation
|
page read and write
|
||
137A8800000
|
trusted library allocation
|
page read and write
|
||
1379FF9C000
|
trusted library allocation
|
page read and write
|
||
137A0648000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
137A6981000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
1338000
|
heap
|
page read and write
|
||
F5D000
|
stack
|
page read and write
|
||
137A6AEA000
|
trusted library allocation
|
page read and write
|
||
5ECA97D000
|
stack
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
2311D8F1000
|
trusted library allocation
|
page read and write
|
||
5E3D000
|
trusted library allocation
|
page read and write
|
||
13795567000
|
heap
|
page read and write
|
||
137A6947000
|
trusted library allocation
|
page read and write
|
||
2311E531000
|
heap
|
page read and write
|
||
1379F214000
|
trusted library allocation
|
page read and write
|
||
666E000
|
stack
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
137A004B000
|
trusted library allocation
|
page read and write
|
||
137A0032000
|
trusted library allocation
|
page read and write
|
||
12BB000
|
unkown
|
page execute and read and write
|
||
2E4ABFF000
|
stack
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
3D9E000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
FAA4461000
|
trusted library allocation
|
page execute read
|
||
308E000
|
stack
|
page read and write
|
||
137A6A2D000
|
trusted library allocation
|
page read and write
|
||
137A027C000
|
trusted library allocation
|
page read and write
|
||
1A0BC3CE000
|
trusted library allocation
|
page read and write
|
||
1379A973000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
173E000
|
stack
|
page read and write
|
||
5EE5000
|
trusted library allocation
|
page read and write
|
||
2A7F000
|
stack
|
page read and write
|
||
137A300A000
|
trusted library allocation
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
1379B91E000
|
heap
|
page read and write
|
||
137A1087000
|
trusted library allocation
|
page read and write
|
||
5FBC000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1379556E000
|
heap
|
page read and write
|
||
1A0BCA92000
|
trusted library allocation
|
page read and write
|
||
137A037D000
|
trusted library allocation
|
page read and write
|
||
137A0E29000
|
trusted library allocation
|
page read and write
|
||
1379FFCC000
|
trusted library allocation
|
page read and write
|
||
1A991E7000
|
stack
|
page read and write
|
||
285E000
|
stack
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
13795572000
|
heap
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
1379E78E000
|
trusted library allocation
|
page read and write
|
||
2E540DC000
|
stack
|
page read and write
|
||
C2A000
|
unkown
|
page execute and read and write
|
||
137A0256000
|
trusted library allocation
|
page read and write
|
||
5A2F000
|
trusted library allocation
|
page read and write
|
||
34BF000
|
stack
|
page read and write
|
||
137A6678000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A1BE0000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
137A69E8000
|
trusted library allocation
|
page read and write
|
||
489F000
|
stack
|
page read and write
|
||
3B9E000
|
stack
|
page read and write
|
||
1379B7C3000
|
trusted library allocation
|
page read and write
|
||
137A612E000
|
trusted library allocation
|
page read and write
|
||
137A0153000
|
trusted library allocation
|
page read and write
|
||
1A0BD271000
|
trusted library allocation
|
page read and write
|
||
13799E98000
|
trusted library allocation
|
page read and write
|
||
1A0BCAA4000
|
trusted library allocation
|
page read and write
|
||
137A1C8B000
|
trusted library allocation
|
page read and write
|
||
1042000
|
unkown
|
page execute and read and write
|
||
D24000
|
heap
|
page read and write
|
||
2A5544E0000
|
heap
|
page read and write
|
||
2311D810000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1D49D000
|
stack
|
page read and write
|
||
8811000
|
heap
|
page read and write
|
||
5F2D000
|
trusted library allocation
|
page read and write
|
||
5EC78FC000
|
stack
|
page read and write
|
||
1A0BC134000
|
trusted library allocation
|
page read and write
|
||
392F000
|
stack
|
page read and write
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
A36000
|
unkown
|
page write copy
|
||
9BC000
|
stack
|
page read and write
|
||
13795569000
|
heap
|
page read and write
|
||
1378E4B0000
|
trusted library allocation
|
page read and write
|
||
13795540000
|
heap
|
page read and write
|
||
1379B5CE000
|
trusted library allocation
|
page read and write
|
||
F6E000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1A0BC92C000
|
trusted library allocation
|
page read and write
|
||
1379ED53000
|
trusted library allocation
|
page read and write
|
||
13795565000
|
heap
|
page read and write
|
||
C73000
|
unkown
|
page execute and write copy
|
||
2311D6E0000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
direct allocation
|
page execute and read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
unkown
|
page read and write
|
||
137A9279000
|
trusted library allocation
|
page read and write
|
||
137A69C4000
|
trusted library allocation
|
page read and write
|
||
137A0383000
|
trusted library allocation
|
page read and write
|
||
137A91E3000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1804BEC8000
|
trusted library allocation
|
page read and write
|
||
1A0BF45F000
|
trusted library allocation
|
page read and write
|
||
1379FF83000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
137A064B000
|
trusted library allocation
|
page read and write
|
||
1050000
|
unkown
|
page execute and read and write
|
||
1379FF9C000
|
trusted library allocation
|
page read and write
|
||
137A1079000
|
trusted library allocation
|
page read and write
|
||
1379553E000
|
heap
|
page read and write
|
||
1A0BF5C0000
|
trusted library allocation
|
page read and write
|
||
5A98000
|
trusted library allocation
|
page read and write
|
||
1379E974000
|
trusted library allocation
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
5C8000
|
unkown
|
page execute and read and write
|
||
5EDB000
|
trusted library allocation
|
page read and write
|
||
1379EEFE000
|
trusted library allocation
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
1A0BF403000
|
trusted library allocation
|
page read and write
|
||
1A0B23E0000
|
heap
|
page read and write
|
||
1379DF74000
|
trusted library allocation
|
page read and write
|
||
137A0372000
|
trusted library allocation
|
page read and write
|
||
137A69EC000
|
trusted library allocation
|
page read and write
|
||
2311D700000
|
trusted library allocation
|
page read and write
|
||
1D836E12000
|
trusted library allocation
|
page read and write
|
||
1A0BF98A000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
E7B000
|
heap
|
page read and write
|
||
137A69FA000
|
trusted library allocation
|
page read and write
|
||
1379EAEC000
|
trusted library allocation
|
page read and write
|
||
1379DD23000
|
trusted library allocation
|
page read and write
|
||
5CD5000
|
trusted library allocation
|
page read and write
|
||
137A018E000
|
trusted library allocation
|
page read and write
|
||
1379F362000
|
trusted library allocation
|
page read and write
|
||
34BE000
|
stack
|
page read and write
|
||
45B0000
|
heap
|
page read and write
|
||
1804BF13000
|
trusted library allocation
|
page read and write
|
||
137A0193000
|
trusted library allocation
|
page read and write
|
||
292F590A000
|
trusted library allocation
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
137A0394000
|
trusted library allocation
|
page read and write
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
1A0BD26E000
|
trusted library allocation
|
page read and write
|
||
1379E110000
|
trusted library allocation
|
page read and write
|
||
137A027C000
|
trusted library allocation
|
page read and write
|
||
1379E9A2000
|
trusted library allocation
|
page read and write
|
||
606D000
|
trusted library allocation
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
1379E503000
|
trusted library allocation
|
page read and write
|
||
59AE000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
13799F8A000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1A0BCA00000
|
trusted library allocation
|
page read and write
|
||
1379FF55000
|
trusted library allocation
|
page read and write
|
||
1379EAA0000
|
trusted library allocation
|
page read and write
|
||
137A015B000
|
trusted library allocation
|
page read and write
|
||
13795588000
|
heap
|
page read and write
|
||
2311D944000
|
heap
|
page read and write
|
||
1A0BF8F4000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
1379EA7B000
|
trusted library allocation
|
page read and write
|
||
1379A56A000
|
trusted library allocation
|
page read and write
|
||
9DC000
|
stack
|
page read and write
|
||
13795572000
|
heap
|
page read and write
|
||
10D6000
|
heap
|
page read and write
|
||
1379E060000
|
trusted library allocation
|
page read and write
|
||
D2DB3FD000
|
stack
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
137A0DAB000
|
trusted library allocation
|
page read and write
|
||
5FAE000
|
trusted library allocation
|
page read and write
|
||
1A0BFC2A000
|
trusted library allocation
|
page read and write
|
||
59E3000
|
trusted library allocation
|
page read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
E21047E000
|
unkown
|
page readonly
|
||
1A0B23A0000
|
heap
|
page read and write
|
||
137A63DC000
|
trusted library allocation
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
10C6000
|
heap
|
page read and write
|
||
1379F21F000
|
trusted library allocation
|
page read and write
|
||
1379E99C000
|
trusted library allocation
|
page read and write
|
||
1379E500000
|
trusted library allocation
|
page read and write
|
||
1379C9C0000
|
trusted library section
|
page readonly
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
2E4DDEE000
|
stack
|
page read and write
|
||
1A0B24E4000
|
heap
|
page read and write
|
||
137A648E000
|
trusted library allocation
|
page read and write
|
||
1A9C57E000
|
unkown
|
page readonly
|
||
2311D886000
|
trusted library allocation
|
page read and write
|
||
1379E979000
|
trusted library allocation
|
page read and write
|
||
1379EA39000
|
trusted library allocation
|
page read and write
|
||
1379F4D6000
|
trusted library allocation
|
page read and write
|
||
4C90000
|
heap
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
1379FEE9000
|
trusted library allocation
|
page read and write
|
||
1218000
|
unkown
|
page execute and write copy
|
||
E0D000
|
heap
|
page read and write
|
||
1379F2A0000
|
trusted library allocation
|
page read and write
|
||
BE4000
|
unkown
|
page execute and read and write
|
||
13799E00000
|
trusted library allocation
|
page read and write
|
||
137A6A03000
|
trusted library allocation
|
page read and write
|
||
10D6000
|
heap
|
page read and write
|
||
1379E3AE000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
137A0C7B000
|
trusted library allocation
|
page read and write
|
||
523D000
|
stack
|
page read and write
|
||
137A63A3000
|
trusted library allocation
|
page read and write
|
||
FE1000
|
unkown
|
page execute and write copy
|
||
1A0B0B60000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
5C1E000
|
stack
|
page read and write
|
||
181F000
|
stack
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
137A04EC000
|
trusted library allocation
|
page read and write
|
||
13795573000
|
heap
|
page read and write
|
||
120F000
|
stack
|
page read and write
|
||
137A11D3000
|
trusted library allocation
|
page read and write
|
||
1379556E000
|
heap
|
page read and write
|
||
137A0800000
|
trusted library allocation
|
page read and write
|
||
1379E3AE000
|
trusted library allocation
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
33E000
|
unkown
|
page execute and read and write
|
||
137A6AF0000
|
trusted library allocation
|
page read and write
|
||
2311E57B000
|
heap
|
page read and write
|
||
137A00C7000
|
trusted library allocation
|
page read and write
|
||
137A693E000
|
trusted library allocation
|
page read and write
|
||
137A0641000
|
trusted library allocation
|
page read and write
|
||
1379EAB3000
|
trusted library allocation
|
page read and write
|
||
1A0BD24C000
|
trusted library allocation
|
page read and write
|
||
137A69F8000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1379556A000
|
heap
|
page read and write
|
||
2E543DC000
|
stack
|
page read and write
|
||
1804BBF0000
|
heap
|
page read and write
|
||
1A0BC190000
|
trusted library allocation
|
page read and write
|
||
10AF000
|
stack
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
137A663B000
|
trusted library allocation
|
page read and write
|
||
1378E8EC000
|
trusted library allocation
|
page read and write
|
||
137A0056000
|
trusted library allocation
|
page read and write
|
||
59C4000
|
trusted library allocation
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
EC9000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
1211000
|
unkown
|
page execute and read and write
|
||
137A69FA000
|
trusted library allocation
|
page read and write
|
||
123E000
|
unkown
|
page execute and read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1A0BC559000
|
trusted library allocation
|
page read and write
|
||
292F726B000
|
heap
|
page read and write
|
||
12EB000
|
unkown
|
page execute and write copy
|
||
1379E573000
|
trusted library allocation
|
page read and write
|
||
137A6237000
|
trusted library allocation
|
page read and write
|
||
13799FAD000
|
trusted library allocation
|
page read and write
|
||
137A036C000
|
trusted library allocation
|
page read and write
|
||
1379BF0D000
|
trusted library allocation
|
page read and write
|
||
1379E6C8000
|
trusted library allocation
|
page read and write
|
||
1A0B0889000
|
heap
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
599B000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
5EC78BC000
|
stack
|
page read and write
|
||
137A61F7000
|
trusted library allocation
|
page read and write
|
||
114F000
|
stack
|
page read and write
|
||
32E0000
|
direct allocation
|
page read and write
|
||
137A63D1000
|
trusted library allocation
|
page read and write
|
||
466F000
|
stack
|
page read and write
|
||
1379DB5D000
|
unclassified section
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A0650000
|
trusted library allocation
|
page read and write
|
||
6CA000
|
unkown
|
page read and write
|
||
137A053A000
|
trusted library allocation
|
page read and write
|
||
1AA8C000
|
stack
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
C75000
|
unkown
|
page execute and read and write
|
||
1379A510000
|
trusted library allocation
|
page read and write
|
||
137A0F5E000
|
trusted library allocation
|
page read and write
|
||
C29000
|
unkown
|
page execute and write copy
|
||
138E000
|
stack
|
page read and write
|
||
137A1156000
|
trusted library allocation
|
page read and write
|
||
1AC5E000
|
stack
|
page read and write
|
||
137A88F4000
|
trusted library allocation
|
page read and write
|
||
1379BE0D000
|
trusted library allocation
|
page read and write
|
||
1379E791000
|
trusted library allocation
|
page read and write
|
||
1379F104000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
2311E5AE000
|
heap
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
10CD000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1379DDDC000
|
trusted library allocation
|
page read and write
|
||
5E34000
|
trusted library allocation
|
page read and write
|
||
13795562000
|
heap
|
page read and write
|
||
137A0CA7000
|
trusted library allocation
|
page read and write
|
||
55B0000
|
direct allocation
|
page execute and read and write
|
||
13795510000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
2E517FA000
|
stack
|
page read and write
|
||
1D836F3C000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A91D3000
|
trusted library allocation
|
page read and write
|
||
13795529000
|
heap
|
page read and write
|
||
1A0BF9F2000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1379EAE5000
|
trusted library allocation
|
page read and write
|
||
5BF000
|
unkown
|
page execute and read and write
|
||
E2103FE000
|
unkown
|
page readonly
|
||
DD4000
|
heap
|
page read and write
|
||
1378E830000
|
trusted library allocation
|
page read and write
|
||
E6B51FC000
|
stack
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
1379E1BC000
|
trusted library allocation
|
page read and write
|
||
59CB000
|
trusted library allocation
|
page read and write
|
||
1ABDE000
|
stack
|
page read and write
|
||
137A619B000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
5A2E000
|
trusted library allocation
|
page read and write
|
||
1379E7DE000
|
trusted library allocation
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
1D08F000
|
stack
|
page read and write
|
||
137A69F5000
|
trusted library allocation
|
page read and write
|
||
137A0316000
|
trusted library allocation
|
page read and write
|
||
137A69FC000
|
trusted library allocation
|
page read and write
|
||
13795564000
|
heap
|
page read and write
|
||
562000
|
unkown
|
page read and write
|
||
137A9110000
|
trusted library allocation
|
page read and write
|
||
1379553B000
|
heap
|
page read and write
|
||
1379DF4A000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
76D000
|
unkown
|
page execute and read and write
|
||
1A0B0B6B000
|
trusted library allocation
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
137A907A000
|
trusted library allocation
|
page read and write
|
||
1379F37D000
|
trusted library allocation
|
page read and write
|
||
1379E187000
|
trusted library allocation
|
page read and write
|
||
137A0223000
|
trusted library allocation
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
F7F000
|
heap
|
page read and write
|
||
1272000
|
unkown
|
page execute and write copy
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
1379ED37000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
13795529000
|
heap
|
page read and write
|
||
2311D82F000
|
trusted library allocation
|
page read and write
|
||
1A70E000
|
stack
|
page read and write
|
||
137A6996000
|
trusted library allocation
|
page read and write
|
||
13795529000
|
heap
|
page read and write
|
||
D6C000
|
unkown
|
page read and write
|
||
1A0BC922000
|
trusted library allocation
|
page read and write
|
||
3B0F000
|
stack
|
page read and write
|
||
137A92D5000
|
trusted library allocation
|
page read and write
|
||
1A0BF543000
|
trusted library allocation
|
page read and write
|
||
396E000
|
stack
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
C6DD8E04000
|
trusted library allocation
|
page read and write
|
||
2311E520000
|
heap
|
page read and write
|
||
137A0207000
|
trusted library allocation
|
page read and write
|
||
1379EB03000
|
trusted library allocation
|
page read and write
|
||
2311E4A4000
|
heap
|
page read and write
|
||
137A7A00000
|
trusted library allocation
|
page read and write
|
||
2E54B1F000
|
stack
|
page read and write
|
||
FE1000
|
unkown
|
page execute and write copy
|
||
4601000
|
heap
|
page read and write
|
||
13795533000
|
heap
|
page read and write
|
||
137A0C62000
|
trusted library allocation
|
page read and write
|
||
E9F000
|
heap
|
page read and write
|
||
1379E369000
|
trusted library allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
2311E531000
|
heap
|
page read and write
|
||
10C6000
|
heap
|
page read and write
|
||
13795575000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1A0BCACF000
|
trusted library allocation
|
page read and write
|
||
5E34000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
2311E5B7000
|
heap
|
page read and write
|
||
137A02CE000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
F31000
|
heap
|
page read and write
|
||
137A019C000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
33DF000
|
stack
|
page read and write
|
||
2E52E7D000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
137A02AE000
|
trusted library allocation
|
page read and write
|
||
4EED000
|
stack
|
page read and write
|
||
12EB000
|
unkown
|
page execute and write copy
|
||
5AAD000
|
stack
|
page read and write
|
||
A36000
|
unkown
|
page write copy
|
||
13795553000
|
heap
|
page read and write
|
||
1A0BC1CE000
|
trusted library allocation
|
page read and write
|
||
38CE000
|
stack
|
page read and write
|
||
1A0BF990000
|
trusted library allocation
|
page read and write
|
||
137A61DF000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
unkown
|
page readonly
|
||
137A0B3F000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
13AA000
|
heap
|
page read and write
|
||
13BB000
|
heap
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
1378E4C0000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
10C7000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
1379FF8B000
|
trusted library allocation
|
page read and write
|
||
13795542000
|
heap
|
page read and write
|
||
1379E3E2000
|
trusted library allocation
|
page read and write
|
||
1379E9A2000
|
trusted library allocation
|
page read and write
|
||
1379ED22000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1379FE90000
|
trusted library allocation
|
page read and write
|
||
608C000
|
trusted library allocation
|
page read and write
|
||
2311D8FB000
|
trusted library allocation
|
page read and write
|
||
137A01AD000
|
trusted library allocation
|
page read and write
|
||
1379ED22000
|
trusted library allocation
|
page read and write
|
||
1379EA45000
|
trusted library allocation
|
page read and write
|
||
13795546000
|
heap
|
page read and write
|
||
1378E7B0000
|
heap
|
page read and write
|
||
137A02E9000
|
trusted library allocation
|
page read and write
|
||
292F7250000
|
heap
|
page read and write
|
||
55C0000
|
direct allocation
|
page execute and read and write
|
||
2E2C000
|
stack
|
page read and write
|
||
137A013D000
|
trusted library allocation
|
page read and write
|
||
13795574000
|
heap
|
page read and write
|
||
1A0BC282000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
direct allocation
|
page read and write
|
||
1379ED5C000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A90A9000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
2311E57B000
|
heap
|
page read and write
|
||
11F9000
|
unkown
|
page execute and write copy
|
||
DD4000
|
heap
|
page read and write
|
||
1A0BF6FB000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
59A3000
|
trusted library allocation
|
page read and write
|
||
295F000
|
stack
|
page read and write
|
||
10E8000
|
heap
|
page read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
1A9B47E000
|
unkown
|
page readonly
|
||
66B6000
|
trusted library allocation
|
page read and write
|
||
1A0BF75B000
|
trusted library allocation
|
page read and write
|
||
1379A51B000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
12FF000
|
unkown
|
page execute and read and write
|
||
137A69E0000
|
trusted library allocation
|
page read and write
|
||
13795533000
|
heap
|
page read and write
|
||
1A0BF9A2000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
137A63BD000
|
trusted library allocation
|
page read and write
|
||
1CB0F000
|
stack
|
page read and write
|
||
A3A000
|
unkown
|
page execute and read and write
|
||
1D35D000
|
stack
|
page read and write
|
||
1A0BF9C6000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
1A0BF6A3000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1379E02A000
|
trusted library allocation
|
page read and write
|
||
1379C4B3000
|
trusted library allocation
|
page read and write
|
||
1D0CE000
|
stack
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
4B21000
|
trusted library allocation
|
page read and write
|
||
13795572000
|
heap
|
page read and write
|
||
1379FF03000
|
trusted library allocation
|
page read and write
|
||
1379DF46000
|
trusted library allocation
|
page read and write
|
||
5EC55FE000
|
stack
|
page read and write
|
||
374F000
|
stack
|
page read and write
|
||
1302000
|
unkown
|
page execute and read and write
|
||
DD4000
|
heap
|
page read and write
|
||
10BB000
|
unkown
|
page execute and read and write
|
||
47E1000
|
heap
|
page read and write
|
||
5EC937E000
|
stack
|
page read and write
|
||
53B5000
|
trusted library allocation
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
4EF0000
|
heap
|
page read and write
|
||
1379BE03000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
10F4000
|
heap
|
page read and write
|
||
5E33000
|
trusted library allocation
|
page read and write
|
||
13795565000
|
heap
|
page read and write
|
||
137A1C03000
|
trusted library allocation
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
137A63CC000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
2E542DB000
|
stack
|
page read and write
|
||
137A1CF6000
|
trusted library allocation
|
page read and write
|
||
CF5000
|
stack
|
page read and write
|
||
1CE4E000
|
stack
|
page read and write
|
||
55BF000
|
stack
|
page read and write
|
||
137A0261000
|
trusted library allocation
|
page read and write
|
||
137A0195000
|
trusted library allocation
|
page read and write
|
||
1379FF24000
|
trusted library allocation
|
page read and write
|
||
45B1000
|
heap
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
137A699B000
|
trusted library allocation
|
page read and write
|
||
1379EAF8000
|
trusted library allocation
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
direct allocation
|
page read and write
|
||
137A0281000
|
trusted library allocation
|
page read and write
|
||
137A3006000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A61CD000
|
trusted library allocation
|
page read and write
|
||
1333000
|
heap
|
page read and write
|
||
137A0013000
|
trusted library allocation
|
page read and write
|
||
4AB0000
|
heap
|
page read and write
|
||
137A009C000
|
trusted library allocation
|
page read and write
|
||
137A7A00000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
137A62A5000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
1379E3BE000
|
trusted library allocation
|
page read and write
|
||
2E52EBE000
|
stack
|
page read and write
|
||
1379556A000
|
heap
|
page read and write
|
||
1379FFFB000
|
trusted library allocation
|
page read and write
|
||
1378E3C0000
|
unclassified section
|
page readonly
|
||
47EE000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1379A3F0000
|
trusted library section
|
page readonly
|
||
1378E7D0000
|
heap
|
page read and write
|
||
1379EAEC000
|
trusted library allocation
|
page read and write
|
||
137A639A000
|
trusted library allocation
|
page read and write
|
||
FAA4541000
|
trusted library allocation
|
page execute read
|
||
CD4000
|
heap
|
page read and write
|
||
1273000
|
unkown
|
page execute and read and write
|
||
1379E77F000
|
trusted library allocation
|
page read and write
|
||
137A8F47000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
3C393C000000
|
trusted library allocation
|
page read and write
|
||
2E4AB6E000
|
stack
|
page read and write
|
||
1273000
|
unkown
|
page execute and read and write
|
||
137A0106000
|
trusted library allocation
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
137A0544000
|
trusted library allocation
|
page read and write
|
||
13799E9E000
|
trusted library allocation
|
page read and write
|
||
137A69D2000
|
trusted library allocation
|
page read and write
|
||
C4A000
|
unkown
|
page execute and read and write
|
||
1379FFFE000
|
trusted library allocation
|
page read and write
|
||
137A6AEA000
|
trusted library allocation
|
page read and write
|
||
137A6300000
|
trusted library allocation
|
page read and write
|
||
1379C434000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
4BB000
|
unkown
|
page execute and read and write
|
||
137A90FA000
|
trusted library allocation
|
page read and write
|
||
5FD5000
|
trusted library allocation
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
1379557D000
|
heap
|
page read and write
|
||
1A0BF552000
|
trusted library allocation
|
page read and write
|
||
BCF000
|
stack
|
page read and write
|
||
1316000
|
heap
|
page read and write
|
||
2311E5AE000
|
heap
|
page read and write
|
||
137A6286000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A6AEE000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1379E7B2000
|
trusted library allocation
|
page read and write
|
||
30F7000
|
heap
|
page read and write
|
||
E4B000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
5EC60BD000
|
stack
|
page read and write
|
||
13790477000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
137A63BD000
|
trusted library allocation
|
page read and write
|
||
137A8F3E000
|
trusted library allocation
|
page read and write
|
||
137A1BFC000
|
trusted library allocation
|
page read and write
|
||
1379E78E000
|
trusted library allocation
|
page read and write
|
||
137A0F00000
|
trusted library allocation
|
page read and write
|
||
351F000
|
stack
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
2311E528000
|
heap
|
page read and write
|
||
1379C418000
|
trusted library allocation
|
page read and write
|
||
1A0BC5B2000
|
trusted library allocation
|
page read and write
|
||
13795530000
|
heap
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
1379FF97000
|
trusted library allocation
|
page read and write
|
||
137A10BC000
|
trusted library allocation
|
page read and write
|
||
137A6274000
|
trusted library allocation
|
page read and write
|
||
137A031B000
|
trusted library allocation
|
page read and write
|
||
107B000
|
heap
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
FE0000
|
unkown
|
page read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
2311D80C000
|
trusted library allocation
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
1337000
|
heap
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
137A63F9000
|
trusted library allocation
|
page read and write
|
||
137A6063000
|
trusted library allocation
|
page read and write
|
||
1379B5A8000
|
trusted library allocation
|
page read and write
|
||
1379FF34000
|
trusted library allocation
|
page read and write
|
||
10C9000
|
heap
|
page read and write
|
||
1379B8AF000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
72E000
|
stack
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
5F7F000
|
trusted library allocation
|
page read and write
|
||
137A118D000
|
trusted library allocation
|
page read and write
|
||
137A02C1000
|
trusted library allocation
|
page read and write
|
||
137A67B4000
|
trusted library allocation
|
page read and write
|
||
1A0BF9DA000
|
trusted library allocation
|
page read and write
|
||
FAA44B1000
|
trusted library allocation
|
page execute read
|
||
1379556F000
|
heap
|
page read and write
|
||
137A61EB000
|
trusted library allocation
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
137A0E2B000
|
trusted library allocation
|
page read and write
|
||
1379C431000
|
trusted library allocation
|
page read and write
|
||
1A0BCA16000
|
trusted library allocation
|
page read and write
|
||
5B21000
|
trusted library allocation
|
page read and write
|
||
1379ED17000
|
trusted library allocation
|
page read and write
|
||
1379B958000
|
heap
|
page read and write
|
||
137A9039000
|
trusted library allocation
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
1379F3EE000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379E639000
|
trusted library allocation
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
1379556A000
|
heap
|
page read and write
|
||
7B8000
|
unkown
|
page execute and read and write
|
||
137A633F000
|
trusted library allocation
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
533D000
|
stack
|
page read and write
|
||
2311E49C000
|
heap
|
page read and write
|
||
1379556A000
|
heap
|
page read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
137A1BF8000
|
trusted library allocation
|
page read and write
|
||
1D8369CC000
|
remote allocation
|
page execute read
|
||
13795572000
|
heap
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
137A025D000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A03F7000
|
trusted library allocation
|
page read and write
|
||
1379B59A000
|
trusted library allocation
|
page read and write
|
||
137A8F03000
|
trusted library allocation
|
page read and write
|
||
1A9912E000
|
stack
|
page read and write
|
||
D62000
|
unkown
|
page readonly
|
||
1379E096000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
2311E4E1000
|
heap
|
page read and write
|
||
137A7A3C000
|
trusted library allocation
|
page read and write
|
||
13795560000
|
heap
|
page read and write
|
||
1379DFDF000
|
trusted library allocation
|
page read and write
|
||
59AA000
|
trusted library allocation
|
page read and write
|
||
1379EA66000
|
trusted library allocation
|
page read and write
|
||
13799E90000
|
trusted library allocation
|
page read and write
|
||
2E5411B000
|
stack
|
page read and write
|
||
356F000
|
stack
|
page read and write
|
||
1209F4C0F000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1379A8EE000
|
trusted library allocation
|
page read and write
|
||
1379EAE3000
|
trusted library allocation
|
page read and write
|
||
6C5D000
|
stack
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
1379EAD9000
|
trusted library allocation
|
page read and write
|
||
137A00FC000
|
trusted library allocation
|
page read and write
|
||
174E000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
13795527000
|
heap
|
page read and write
|
||
1379E99C000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
137A6AF3000
|
trusted library allocation
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
59BF000
|
trusted library allocation
|
page read and write
|
||
137A0CE3000
|
trusted library allocation
|
page read and write
|
||
DDB000
|
heap
|
page read and write
|
||
137A69A8000
|
trusted library allocation
|
page read and write
|
||
2E54B9E000
|
stack
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
1379BC03000
|
trusted library allocation
|
page read and write
|
||
2311E528000
|
heap
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
4601000
|
heap
|
page read and write
|
||
FF1000
|
unkown
|
page execute and write copy
|
||
1379DFD0000
|
trusted library allocation
|
page read and write
|
||
1379E200000
|
trusted library allocation
|
page read and write
|
||
45B1000
|
heap
|
page read and write
|
||
1A0BFC83000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
1A0BF756000
|
trusted library allocation
|
page read and write
|
||
5F77000
|
trusted library allocation
|
page read and write
|
||
13795565000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
37DE000
|
stack
|
page read and write
|
||
1A0B0BCE000
|
trusted library allocation
|
page read and write
|
||
13795565000
|
heap
|
page read and write
|
||
5580000
|
direct allocation
|
page execute and read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1379F342000
|
trusted library allocation
|
page read and write
|
||
599B000
|
trusted library allocation
|
page read and write
|
||
1A0BC42F000
|
trusted library allocation
|
page read and write
|
||
1379A9B0000
|
trusted library allocation
|
page read and write
|
||
137A61E7000
|
trusted library allocation
|
page read and write
|
||
1A0BCDC0000
|
heap
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
1379F4EB000
|
trusted library allocation
|
page read and write
|
||
13795583000
|
heap
|
page read and write
|
||
325E000
|
stack
|
page read and write
|
||
13795530000
|
heap
|
page read and write
|
||
137A1072000
|
trusted library allocation
|
page read and write
|
||
137A01A5000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
137A9287000
|
trusted library allocation
|
page read and write
|
||
1A0BF4E6000
|
trusted library allocation
|
page read and write
|
||
137A01F3000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
137A6103000
|
trusted library allocation
|
page read and write
|
||
137A00C9000
|
trusted library allocation
|
page read and write
|
||
13795535000
|
heap
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
12FF000
|
unkown
|
page execute and write copy
|
||
1393000
|
heap
|
page read and write
|
||
1804BE66000
|
trusted library allocation
|
page read and write
|
||
13795584000
|
heap
|
page read and write
|
||
59EB000
|
trusted library allocation
|
page read and write
|
||
1379BE16000
|
trusted library allocation
|
page read and write
|
||
1A0BC526000
|
trusted library allocation
|
page read and write
|
||
4780000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
137A302C000
|
trusted library allocation
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
1379C409000
|
trusted library allocation
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
137A015E000
|
trusted library allocation
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
137A00F5000
|
trusted library allocation
|
page read and write
|
||
51D6000
|
trusted library allocation
|
page read and write
|
||
1379F4F1000
|
trusted library allocation
|
page read and write
|
||
1379E400000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
127D000
|
unkown
|
page execute and read and write
|
||
5AF1000
|
trusted library allocation
|
page read and write
|
||
13795533000
|
heap
|
page read and write
|
||
137A1B03000
|
trusted library allocation
|
page read and write
|
||
5A60000
|
remote allocation
|
page read and write
|
||
1379B500000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
137A0193000
|
trusted library allocation
|
page read and write
|
||
389CD171000
|
trusted library allocation
|
page execute read
|
||
2E4B5D8000
|
stack
|
page read and write
|
||
1379A89F000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A026F000
|
trusted library allocation
|
page read and write
|
||
1379E800000
|
trusted library section
|
page readonly
|
||
11FA000
|
unkown
|
page execute and read and write
|
||
1379B55F000
|
trusted library allocation
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
EE9000
|
heap
|
page read and write
|
||
1379E79B000
|
trusted library allocation
|
page read and write
|
||
1379DF48000
|
trusted library allocation
|
page read and write
|
||
45A0000
|
direct allocation
|
page read and write
|
||
137A91ED000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
5D6D000
|
trusted library allocation
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
1379E3E2000
|
trusted library allocation
|
page read and write
|
||
C90000
|
unkown
|
page execute and write copy
|
||
1379EACE000
|
trusted library allocation
|
page read and write
|
||
137A8F47000
|
trusted library allocation
|
page read and write
|
||
41DE000
|
stack
|
page read and write
|
||
15DE000
|
stack
|
page read and write
|
||
137A69C4000
|
trusted library allocation
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
137A0BCB000
|
trusted library allocation
|
page read and write
|
||
1A0BC579000
|
trusted library allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
39FE000
|
stack
|
page read and write
|
||
1379EA7B000
|
trusted library allocation
|
page read and write
|
||
137A909A000
|
trusted library allocation
|
page read and write
|
||
1379B46C000
|
trusted library allocation
|
page read and write
|
||
249FC1D0000
|
heap
|
page read and write
|
||
599B000
|
trusted library allocation
|
page read and write
|
||
1A0BC26A000
|
trusted library allocation
|
page read and write
|
||
5454A7E000
|
unkown
|
page readonly
|
||
D54000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1379E369000
|
trusted library allocation
|
page read and write
|
||
1379FF89000
|
trusted library allocation
|
page read and write
|
||
1A0BF8DF000
|
trusted library allocation
|
page read and write
|
||
5A36000
|
trusted library allocation
|
page read and write
|
||
E9A000
|
heap
|
page read and write
|
||
1A0BF4C1000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1379F108000
|
trusted library allocation
|
page read and write
|
||
FF1000
|
unkown
|
page execute and write copy
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
1379553B000
|
heap
|
page read and write
|
||
1A0BD287000
|
trusted library allocation
|
page read and write
|
||
5A34000
|
trusted library allocation
|
page read and write
|
||
1379E203000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
stack
|
page read and write
|
||
137A91F5000
|
trusted library allocation
|
page read and write
|
||
BD2000
|
unkown
|
page execute and write copy
|
||
137A0157000
|
trusted library allocation
|
page read and write
|
||
13795572000
|
heap
|
page read and write
|
||
1379FEB8000
|
trusted library allocation
|
page read and write
|
||
5C8000
|
unkown
|
page execute and read and write
|
||
4601000
|
heap
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
1225000
|
unkown
|
page execute and read and write
|
||
1379BF03000
|
trusted library allocation
|
page read and write
|
||
1A0BEC01000
|
trusted library allocation
|
page read and write
|
||
1379BE20000
|
trusted library allocation
|
page read and write
|
||
1A0BFC7D000
|
trusted library allocation
|
page read and write
|
||
137A0696000
|
trusted library allocation
|
page read and write
|
||
1379A0F7000
|
trusted library allocation
|
page read and write
|
||
3FDF000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1316000
|
heap
|
page read and write
|
||
1379EEC7000
|
trusted library allocation
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
45B1000
|
heap
|
page read and write
|
||
1379FA01000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
62380D00000
|
trusted library allocation
|
page read and write
|
||
14A3000
|
unkown
|
page execute and read and write
|
||
1379E325000
|
trusted library allocation
|
page read and write
|
||
137A698C000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A6295000
|
trusted library allocation
|
page read and write
|
||
1AADD000
|
stack
|
page read and write
|
||
2E5455A000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1A0BC293000
|
trusted library allocation
|
page read and write
|
||
1379A503000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
6D1E000
|
stack
|
page read and write
|
||
47248503000
|
trusted library allocation
|
page read and write
|
||
1A0BF98A000
|
trusted library allocation
|
page read and write
|
||
137A6A24000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
1A0BF51E000
|
trusted library allocation
|
page read and write
|
||
137A8F81000
|
trusted library allocation
|
page read and write
|
||
137A69CE000
|
trusted library allocation
|
page read and write
|
||
137A9203000
|
trusted library allocation
|
page read and write
|
||
1379A0B1000
|
trusted library allocation
|
page read and write
|
||
D74000
|
unkown
|
page readonly
|
||
1379E890000
|
trusted library section
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
1379F4DD000
|
trusted library allocation
|
page read and write
|
||
13795524000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
53D9000
|
trusted library allocation
|
page read and write
|
||
137A003B000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
2A554890000
|
heap
|
page read and write
|
||
D62000
|
unkown
|
page readonly
|
||
137A3024000
|
trusted library allocation
|
page read and write
|
||
137A6337000
|
trusted library allocation
|
page read and write
|
||
137A11C5000
|
trusted library allocation
|
page read and write
|
||
137A6239000
|
trusted library allocation
|
page read and write
|
||
1379A8FD000
|
trusted library allocation
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
1A0BFC23000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
1379EA94000
|
trusted library allocation
|
page read and write
|
||
1379B400000
|
trusted library allocation
|
page read and write
|
||
5455A7E000
|
unkown
|
page readonly
|
||
1A0BC286000
|
trusted library allocation
|
page read and write
|
||
2311E5AE000
|
heap
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
1804BEA4000
|
trusted library allocation
|
page read and write
|
||
13795549000
|
heap
|
page read and write
|
||
13795560000
|
heap
|
page read and write
|
||
137A63BA000
|
trusted library allocation
|
page read and write
|
||
1379EA94000
|
trusted library allocation
|
page read and write
|
||
1379A000000
|
trusted library allocation
|
page read and write
|
||
137A107C000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
BBF000
|
stack
|
page read and write
|
||
1263000
|
unkown
|
page execute and read and write
|
||
44DF000
|
stack
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
1378E811000
|
trusted library allocation
|
page read and write
|
||
1D836F00000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1379F4F1000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
137A10C7000
|
trusted library allocation
|
page read and write
|
||
292F5788000
|
heap
|
page read and write
|
||
1379F376000
|
trusted library allocation
|
page read and write
|
||
137A6A37000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
heap
|
page read and write
|
||
129F000
|
unkown
|
page execute and read and write
|
||
137A9177000
|
trusted library allocation
|
page read and write
|
||
1A9ABFE000
|
stack
|
page read and write
|
||
5AA9000
|
trusted library allocation
|
page read and write
|
||
13795529000
|
heap
|
page read and write
|
||
1379E303000
|
trusted library allocation
|
page read and write
|
||
137A3002000
|
trusted library allocation
|
page read and write
|
||
54541FE000
|
stack
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
1379FF51000
|
trusted library allocation
|
page read and write
|
||
C12000
|
unkown
|
page execute and read and write
|
||
13795575000
|
heap
|
page read and write
|
||
13795566000
|
heap
|
page read and write
|
||
E5C000
|
stack
|
page read and write
|
||
137A030F000
|
trusted library allocation
|
page read and write
|
||
1A0B247D000
|
heap
|
page read and write
|
||
2311E584000
|
heap
|
page read and write
|
||
137A018B000
|
trusted library allocation
|
page read and write
|
||
1379EFF2000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
137A8F25000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1379557A000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A90FC000
|
trusted library allocation
|
page read and write
|
||
5249000
|
stack
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1D836C20000
|
unclassified section
|
page readonly
|
||
5EC783F000
|
stack
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A69A3000
|
trusted library allocation
|
page read and write
|
||
137A0410000
|
trusted library allocation
|
page read and write
|
||
137A69E2000
|
trusted library allocation
|
page read and write
|
||
1804BE0D000
|
trusted library allocation
|
page read and write
|
||
1379EF9D000
|
trusted library allocation
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
137A9103000
|
trusted library allocation
|
page read and write
|
||
1A0BC892000
|
trusted library allocation
|
page read and write
|
||
3A4F000
|
stack
|
page read and write
|
||
2E4C078000
|
stack
|
page read and write
|
||
11FA000
|
unkown
|
page execute and read and write
|
||
1379A51E000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A026F000
|
trusted library allocation
|
page read and write
|
||
1379E77F000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
1A0BC300000
|
trusted library allocation
|
page read and write
|
||
6C7D000
|
stack
|
page read and write
|
||
2311D946000
|
heap
|
page read and write
|
||
137A62C9000
|
trusted library allocation
|
page read and write
|
||
4BF0000
|
trusted library allocation
|
page read and write
|
||
5A98000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1A09DB100000
|
trusted library allocation
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
1379B471000
|
trusted library allocation
|
page read and write
|
||
1379DD70000
|
trusted library allocation
|
page read and write
|
||
1379EF03000
|
trusted library allocation
|
page read and write
|
||
5CBD000
|
trusted library allocation
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
5F02000
|
trusted library allocation
|
page read and write
|
||
542B000
|
stack
|
page read and write
|
||
4F20000
|
remote allocation
|
page read and write
|
||
1C2000
|
unkown
|
page execute and read and write
|
||
545527E000
|
stack
|
page read and write
|
||
1379EADC000
|
trusted library allocation
|
page read and write
|
||
137A623D000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
137A0227000
|
trusted library allocation
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
1A0BF9B0000
|
trusted library allocation
|
page read and write
|
||
1379E423000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
137A0F4B000
|
trusted library allocation
|
page read and write
|
||
137A611E000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
13795540000
|
heap
|
page read and write
|
||
137A02B4000
|
trusted library allocation
|
page read and write
|
||
137A6125000
|
trusted library allocation
|
page read and write
|
||
477F000
|
stack
|
page read and write
|
||
137A6975000
|
trusted library allocation
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
6B3C000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
1A0B0AA0000
|
unclassified section
|
page read and write
|
||
137A0279000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
59F9000
|
trusted library allocation
|
page read and write
|
||
5F6E000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
direct allocation
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
7E5000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1379550E000
|
heap
|
page read and write
|
||
5B0000
|
unkown
|
page readonly
|
||
137A1B3E000
|
trusted library allocation
|
page read and write
|
||
1A0BF811000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
1A0BCA87000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
137A91C1000
|
trusted library allocation
|
page read and write
|
||
5550000
|
direct allocation
|
page execute and read and write
|
||
1379557D000
|
heap
|
page read and write
|
||
1A0BC25C000
|
trusted library allocation
|
page read and write
|
||
A3A000
|
unkown
|
page execute and write copy
|
||
1379E9CB000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
1379BF09000
|
trusted library allocation
|
page read and write
|
||
137A01ED000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
1A65F000
|
stack
|
page read and write
|
||
2F2F000
|
stack
|
page read and write
|
||
4764000
|
trusted library allocation
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
514C000
|
stack
|
page read and write
|
||
5E3A000
|
trusted library allocation
|
page read and write
|
||
1804BC70000
|
unclassified section
|
page read and write
|
||
1A0BF59B000
|
trusted library allocation
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
172B000
|
heap
|
page read and write
|
||
137A032E000
|
trusted library allocation
|
page read and write
|
||
1D836C10000
|
heap
|
page read and write
|
||
1379F2DE000
|
trusted library allocation
|
page read and write
|
||
BDE000
|
unkown
|
page execute and write copy
|
||
4ACE000
|
stack
|
page read and write
|
||
1804BE23000
|
trusted library allocation
|
page read and write
|
||
F6B000
|
heap
|
page read and write
|
||
1379E3F1000
|
trusted library allocation
|
page read and write
|
||
13799E34000
|
trusted library allocation
|
page read and write
|
||
12DD000
|
unkown
|
page execute and write copy
|
||
11B7000
|
unkown
|
page execute and write copy
|
||
4F91000
|
heap
|
page read and write
|
||
137A62C5000
|
trusted library allocation
|
page read and write
|
||
137A8FFD000
|
trusted library allocation
|
page read and write
|
||
137A636B000
|
trusted library allocation
|
page read and write
|
||
137A7A00000
|
trusted library allocation
|
page read and write
|
||
1804BE98000
|
trusted library allocation
|
page read and write
|
||
2311D8BC000
|
trusted library allocation
|
page read and write
|
||
41EF000
|
stack
|
page read and write
|
||
1379FB9E000
|
trusted library allocation
|
page read and write
|
||
13795566000
|
heap
|
page read and write
|
||
1A58F000
|
stack
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
137A6286000
|
trusted library allocation
|
page read and write
|
||
1379FE6E000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
137A0378000
|
trusted library allocation
|
page read and write
|
||
1379E616000
|
trusted library allocation
|
page read and write
|
||
3740000
|
heap
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
1379A925000
|
trusted library allocation
|
page read and write
|
||
2311E5B7000
|
heap
|
page read and write
|
||
2311E598000
|
heap
|
page read and write
|
||
1D836EAE000
|
trusted library allocation
|
page read and write
|
||
1379557D000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1A0BF813000
|
trusted library allocation
|
page read and write
|
||
59D3000
|
trusted library allocation
|
page read and write
|
||
47F0000
|
heap
|
page read and write
|
||
1804BF17000
|
trusted library allocation
|
page read and write
|
||
A9B000
|
stack
|
page read and write
|
||
1A0BC5C3000
|
trusted library allocation
|
page read and write
|
||
55B0000
|
direct allocation
|
page execute and read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1378E8EF000
|
trusted library allocation
|
page read and write
|
||
1A0BC8DA000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379557F000
|
heap
|
page read and write
|
||
1A0BD822000
|
trusted library allocation
|
page read and write
|
||
1379E3A7000
|
trusted library allocation
|
page read and write
|
||
11FF000
|
unkown
|
page execute and read and write
|
||
1379557A000
|
heap
|
page read and write
|
||
137A02C1000
|
trusted library allocation
|
page read and write
|
||
5410000
|
direct allocation
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
2C1E000
|
stack
|
page read and write
|
||
137A0120000
|
trusted library allocation
|
page read and write
|
||
381000
|
unkown
|
page execute and read and write
|
||
E0000
|
unkown
|
page readonly
|
||
4601000
|
heap
|
page read and write
|
||
13795562000
|
heap
|
page read and write
|
||
1379F6DA000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
1379E18D000
|
trusted library allocation
|
page read and write
|
||
1379B7C9000
|
trusted library allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
1379EF76000
|
trusted library allocation
|
page read and write
|
||
6B5C000
|
stack
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
1272000
|
unkown
|
page execute and write copy
|
||
137A63DC000
|
trusted library allocation
|
page read and write
|
||
13795562000
|
heap
|
page read and write
|
||
1379E609000
|
trusted library allocation
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
FD0000
|
direct allocation
|
page read and write
|
||
1247000
|
unkown
|
page execute and write copy
|
||
137A6AFD000
|
trusted library allocation
|
page read and write
|
||
1379E7DE000
|
trusted library allocation
|
page read and write
|
||
3C1F000
|
stack
|
page read and write
|
||
1379E3BE000
|
trusted library allocation
|
page read and write
|
||
413F000
|
stack
|
page read and write
|
||
5590000
|
direct allocation
|
page execute and read and write
|
||
B90000
|
heap
|
page read and write
|
||
D3C000
|
unkown
|
page readonly
|
||
1379F335000
|
trusted library allocation
|
page read and write
|
||
29D7000
|
heap
|
page read and write
|
||
137A0098000
|
trusted library allocation
|
page read and write
|
||
1A2BEC00000
|
trusted library section
|
page readonly
|
||
3D9E000
|
stack
|
page read and write
|
||
1D836BBF000
|
unclassified section
|
page read and write
|
||
1379E7BD000
|
trusted library allocation
|
page read and write
|
||
1379F4EB000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
5A3B000
|
trusted library allocation
|
page read and write
|
||
137A6053000
|
trusted library allocation
|
page read and write
|
||
2311E4BF000
|
heap
|
page read and write
|
||
441F000
|
stack
|
page read and write
|
||
2311E4A0000
|
heap
|
page read and write
|
||
4E10000
|
direct allocation
|
page execute and read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
697F000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
2311E4A9000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
361E000
|
stack
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
137A0800000
|
trusted library allocation
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
87F1000
|
heap
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
4700000
|
direct allocation
|
page read and write
|
||
13AA000
|
heap
|
page read and write
|
||
D2DBBFF000
|
stack
|
page read and write
|
||
137A69A3000
|
trusted library allocation
|
page read and write
|
||
5A5D000
|
trusted library allocation
|
page read and write
|
||
2F7F000
|
stack
|
page read and write
|
||
137A91B3000
|
trusted library allocation
|
page read and write
|
||
137A90C5000
|
trusted library allocation
|
page read and write
|
||
59C9000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
1379E3A5000
|
trusted library allocation
|
page read and write
|
||
1379BD09000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
direct allocation
|
page execute and read and write
|
||
1379E3A7000
|
trusted library allocation
|
page read and write
|
||
137A0053000
|
trusted library allocation
|
page read and write
|
||
137A0412000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
137A0383000
|
trusted library allocation
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
1379550E000
|
heap
|
page read and write
|
||
2E564BA000
|
stack
|
page read and write
|
||
1A0BF44C000
|
trusted library allocation
|
page read and write
|
||
1379E3F1000
|
trusted library allocation
|
page read and write
|
||
13795533000
|
heap
|
page read and write
|
||
32A000
|
unkown
|
page execute and read and write
|
||
430000
|
heap
|
page read and write
|
||
1A0BC600000
|
trusted library allocation
|
page read and write
|
||
5A39000
|
trusted library allocation
|
page read and write
|
||
1D836F13000
|
trusted library allocation
|
page read and write
|
||
137A61D5000
|
trusted library allocation
|
page read and write
|
||
5A3E000
|
trusted library allocation
|
page read and write
|
||
428F000
|
stack
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1A0BC261000
|
trusted library allocation
|
page read and write
|
||
79C000
|
unkown
|
page execute and write copy
|
||
1379E620000
|
trusted library allocation
|
page read and write
|
||
13795572000
|
heap
|
page read and write
|
||
137A0720000
|
trusted library section
|
page readonly
|
||
1A0BCA69000
|
trusted library allocation
|
page read and write
|
||
5590000
|
direct allocation
|
page execute and read and write
|
||
13795516000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
137A8F94000
|
trusted library allocation
|
page read and write
|
||
5A2E000
|
trusted library allocation
|
page read and write
|
||
1804BE03000
|
trusted library allocation
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
29DB000
|
heap
|
page read and write
|
||
1A0BD28C000
|
trusted library allocation
|
page read and write
|
||
3B54000
|
heap
|
page read and write
|
||
547E000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
BE7000
|
heap
|
page read and write
|
||
1379FFFB000
|
trusted library allocation
|
page read and write
|
||
1A0BF9F6000
|
trusted library allocation
|
page read and write
|
||
137A8F4C000
|
trusted library allocation
|
page read and write
|
||
1378E85E000
|
trusted library allocation
|
page read and write
|
||
1379DC8F000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A00A5000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A0569000
|
trusted library allocation
|
page read and write
|
||
2E5435E000
|
stack
|
page read and write
|
||
10C6000
|
heap
|
page read and write
|
||
13795560000
|
heap
|
page read and write
|
||
137A91D3000
|
trusted library allocation
|
page read and write
|
||
1A0BD600000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
37EF000
|
stack
|
page read and write
|
||
137A0E7B000
|
trusted library allocation
|
page read and write
|
||
137A00A5000
|
trusted library allocation
|
page read and write
|
||
1379F600000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
137A919A000
|
trusted library allocation
|
page read and write
|
||
1379FF4A000
|
trusted library allocation
|
page read and write
|
||
1D12D000
|
stack
|
page read and write
|
||
1379ED22000
|
trusted library allocation
|
page read and write
|
||
1A0BC22D000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
1379FE03000
|
trusted library allocation
|
page read and write
|
||
1379F3A7000
|
trusted library allocation
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
137A63F4000
|
trusted library allocation
|
page read and write
|
||
D4C000
|
stack
|
page read and write
|
||
137A905E000
|
trusted library allocation
|
page read and write
|
||
137A0F35000
|
trusted library allocation
|
page read and write
|
||
1A0BC55E000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
5590000
|
direct allocation
|
page execute and read and write
|
||
13AB000
|
heap
|
page read and write
|
||
292F5750000
|
heap
|
page read and write
|
||
1177000
|
heap
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
1379E98B000
|
trusted library allocation
|
page read and write
|
||
1A0BFC87000
|
trusted library allocation
|
page read and write
|
||
3D0E000
|
stack
|
page read and write
|
||
124A000
|
heap
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
1379F403000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
137A623B000
|
trusted library allocation
|
page read and write
|
||
137A01A1000
|
trusted library allocation
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
137A9B00000
|
trusted library allocation
|
page read and write
|
||
1379E9CB000
|
trusted library allocation
|
page read and write
|
||
1379F38B000
|
trusted library allocation
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
5F0E000
|
trusted library allocation
|
page read and write
|
||
1379F23D000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
1379EAB3000
|
trusted library allocation
|
page read and write
|
||
1D836BB0000
|
unclassified section
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
3CDE000
|
stack
|
page read and write
|
||
1378E4D9000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
388643424000
|
trusted library allocation
|
page read and write
|
||
137A6803000
|
trusted library allocation
|
page read and write
|
||
1804BE83000
|
trusted library allocation
|
page read and write
|
||
F73000
|
heap
|
page read and write
|
||
137A6703000
|
trusted library allocation
|
page read and write
|
||
2311E5B9000
|
heap
|
page read and write
|
||
1211000
|
unkown
|
page execute and read and write
|
||
423F000
|
stack
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
137A619B000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
126A000
|
unkown
|
page execute and read and write
|
||
172B000
|
heap
|
page read and write
|
||
137A01B0000
|
trusted library allocation
|
page read and write
|
||
5EC8B7E000
|
stack
|
page read and write
|
||
1379DF95000
|
trusted library allocation
|
page read and write
|
||
1A0BF8A8000
|
trusted library allocation
|
page read and write
|
||
62D8000
|
trusted library allocation
|
page read and write
|
||
FD6000
|
unkown
|
page execute and read and write
|
||
137A0357000
|
trusted library allocation
|
page read and write
|
||
1379EAA8000
|
trusted library allocation
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
137A0650000
|
trusted library allocation
|
page read and write
|
||
2311E4CA000
|
heap
|
page read and write
|
||
DFF000
|
heap
|
page read and write
|
||
13B8000
|
heap
|
page read and write
|
||
137A038F000
|
trusted library allocation
|
page read and write
|
||
1379F6F5000
|
trusted library allocation
|
page read and write
|
||
490E000
|
stack
|
page read and write
|
||
137A6374000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1263000
|
unkown
|
page execute and read and write
|
||
16B6000
|
heap
|
page read and write
|
||
137A003B000
|
trusted library allocation
|
page read and write
|
||
1A0BC5CC000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
direct allocation
|
page execute and read and write
|
||
4F91000
|
heap
|
page read and write
|
||
137A9285000
|
trusted library allocation
|
page read and write
|
||
1379E3B8000
|
trusted library allocation
|
page read and write
|
||
1A0BF9A2000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
1379E983000
|
trusted library allocation
|
page read and write
|
||
1379E700000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
586F000
|
stack
|
page read and write
|
||
3741000
|
heap
|
page read and write
|
||
3307000
|
heap
|
page read and write
|
||
2311E56A000
|
heap
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
1A0BC181000
|
trusted library allocation
|
page read and write
|
||
1A0B0AB5000
|
heap
|
page read and write
|
||
1C2000
|
unkown
|
page execute and read and write
|
||
1D0000
|
heap
|
page read and write
|
||
1A0BF7E2000
|
trusted library allocation
|
page read and write
|
||
1A0BC500000
|
trusted library allocation
|
page read and write
|
||
1379EAB9000
|
trusted library allocation
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
137A01A1000
|
trusted library allocation
|
page read and write
|
||
1A0BC883000
|
trusted library allocation
|
page read and write
|
||
137A0180000
|
trusted library allocation
|
page read and write
|
||
1379E148000
|
trusted library allocation
|
page read and write
|
||
1379E1A5000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
1379EA59000
|
trusted library allocation
|
page read and write
|
||
E3FE0E00000
|
trusted library allocation
|
page read and write
|
||
1379DBC0000
|
trusted library section
|
page read and write
|
||
1379B7FC000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1D8369D0000
|
unclassified section
|
page readonly
|
||
13795553000
|
heap
|
page read and write
|
||
32A000
|
unkown
|
page execute and read and write
|
||
6670000
|
heap
|
page read and write
|
||
1379DD4B000
|
trusted library allocation
|
page read and write
|
||
360F000
|
stack
|
page read and write
|
||
137A0013000
|
trusted library allocation
|
page read and write
|
||
1A0BCA27000
|
trusted library allocation
|
page read and write
|
||
1A0B0B30000
|
trusted library allocation
|
page read and write
|
||
137A0372000
|
trusted library allocation
|
page read and write
|
||
137A0053000
|
trusted library allocation
|
page read and write
|
||
5ECC79E000
|
stack
|
page read and write
|
||
FF0000
|
unkown
|
page readonly
|
||
4C0E000
|
stack
|
page read and write
|
||
137A6379000
|
trusted library allocation
|
page read and write
|
||
610000
|
unkown
|
page execute and write copy
|
||
1A0BFA01000
|
trusted library allocation
|
page read and write
|
||
137A0B90000
|
trusted library allocation
|
page read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
CD7000
|
unkown
|
page execute and write copy
|
||
1A0BC925000
|
trusted library allocation
|
page read and write
|
||
137A065E000
|
trusted library allocation
|
page read and write
|
||
5D45000
|
trusted library allocation
|
page read and write
|
||
13795569000
|
heap
|
page read and write
|
||
1379E592000
|
trusted library allocation
|
page read and write
|
||
1379E0B0000
|
trusted library allocation
|
page read and write
|
||
137A8F2F000
|
trusted library allocation
|
page read and write
|
||
1379B7C9000
|
trusted library allocation
|
page read and write
|
||
5A2F000
|
trusted library allocation
|
page read and write
|
||
10D1000
|
heap
|
page read and write
|
||
1379E0BB000
|
trusted library allocation
|
page read and write
|
||
137A0149000
|
trusted library allocation
|
page read and write
|
||
13795567000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
45A0000
|
direct allocation
|
page read and write
|
||
1A0BFC0D000
|
trusted library allocation
|
page read and write
|
||
1379556E000
|
heap
|
page read and write
|
||
1379A5E3000
|
trusted library allocation
|
page read and write
|
||
411F000
|
stack
|
page read and write
|
||
137A8F3E000
|
trusted library allocation
|
page read and write
|
||
5ECB17D000
|
stack
|
page read and write
|
||
1AB1E000
|
stack
|
page read and write
|
||
32E0000
|
direct allocation
|
page read and write
|
||
19D000
|
unkown
|
page execute and read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
137A69FA000
|
trusted library allocation
|
page read and write
|
||
13795572000
|
heap
|
page read and write
|
||
137A11A3000
|
trusted library allocation
|
page read and write
|
||
137A3010000
|
trusted library allocation
|
page read and write
|
||
1A0BF9A2000
|
trusted library allocation
|
page read and write
|
||
47D0000
|
trusted library allocation
|
page read and write
|
||
137A037D000
|
trusted library allocation
|
page read and write
|
||
13795585000
|
heap
|
page read and write
|
||
9A5000
|
heap
|
page read and write
|
||
1379EAB9000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
1343000
|
heap
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
1A0BF92A000
|
trusted library allocation
|
page read and write
|
||
11B7000
|
unkown
|
page execute and write copy
|
||
54549FE000
|
unkown
|
page readonly
|
||
4E60000
|
direct allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
137A0327000
|
trusted library allocation
|
page read and write
|
||
137A6212000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
A30000
|
unkown
|
page read and write
|
||
6676000
|
heap
|
page read and write
|
||
2F9F000
|
stack
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
137A6100000
|
trusted library allocation
|
page read and write
|
||
4AB1000
|
heap
|
page read and write
|
||
13795583000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
137A7A00000
|
trusted library allocation
|
page read and write
|
||
2311D68F000
|
unclassified section
|
page read and write
|
||
4EFF000
|
stack
|
page read and write
|
||
137A6AFD000
|
trusted library allocation
|
page read and write
|
||
137A6334000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
585E000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A8F62000
|
trusted library allocation
|
page read and write
|
||
137A9188000
|
trusted library allocation
|
page read and write
|
||
1379BC09000
|
trusted library allocation
|
page read and write
|
||
1379FE2F000
|
trusted library allocation
|
page read and write
|
||
45A0000
|
direct allocation
|
page read and write
|
||
432F000
|
stack
|
page read and write
|
||
1A0BC389000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
direct allocation
|
page read and write
|
||
47E000
|
stack
|
page read and write
|
||
FAA4501000
|
trusted library allocation
|
page execute read
|
||
595F000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
13795572000
|
heap
|
page read and write
|
||
137A9285000
|
trusted library allocation
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
1225000
|
unkown
|
page execute and read and write
|
||
F66000
|
heap
|
page read and write
|
||
1A0BC8B4000
|
trusted library allocation
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
38EE000
|
stack
|
page read and write
|
||
1A0BF933000
|
trusted library allocation
|
page read and write
|
||
129F000
|
unkown
|
page execute and read and write
|
||
2E54B5E000
|
stack
|
page read and write
|
||
137A628C000
|
trusted library allocation
|
page read and write
|
||
478F000
|
stack
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
2311E5AE000
|
heap
|
page read and write
|
||
1379BE00000
|
trusted library allocation
|
page read and write
|
||
F88000
|
heap
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
137A1B5E000
|
trusted library allocation
|
page read and write
|
||
1A0BEC17000
|
trusted library allocation
|
page read and write
|
||
1379E3CE000
|
trusted library allocation
|
page read and write
|
||
1379EFA3000
|
trusted library allocation
|
page read and write
|
||
1D836A26000
|
heap
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
1379E3DE000
|
trusted library allocation
|
page read and write
|
||
1379E3C9000
|
trusted library allocation
|
page read and write
|
||
1379EA03000
|
trusted library allocation
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
608F000
|
trusted library allocation
|
page read and write
|
||
1379E7B7000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
E2A000
|
heap
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
619F000
|
trusted library allocation
|
page read and write
|
||
59C7000
|
trusted library allocation
|
page read and write
|
||
1379ED1F000
|
trusted library allocation
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
137A026C000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1A0BF900000
|
trusted library allocation
|
page read and write
|
||
1379FF36000
|
trusted library allocation
|
page read and write
|
||
137A1BB1000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
unkown
|
page readonly
|
||
4601000
|
heap
|
page read and write
|
||
13795560000
|
heap
|
page read and write
|
||
137A63F4000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
AAF000
|
stack
|
page read and write
|
||
137A6ACD000
|
trusted library allocation
|
page read and write
|
||
137A6190000
|
trusted library allocation
|
page read and write
|
||
F7F000
|
heap
|
page read and write
|
||
129D000
|
unkown
|
page execute and write copy
|
||
1379E3E6000
|
trusted library allocation
|
page read and write
|
||
1A5CE000
|
stack
|
page read and write
|
||
137A61FE000
|
trusted library allocation
|
page read and write
|
||
1A0BF443000
|
trusted library allocation
|
page read and write
|
||
1A84E000
|
stack
|
page read and write
|
||
137A065E000
|
trusted library allocation
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
2E4C3B5000
|
stack
|
page read and write
|
||
2311E52F000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1379556E000
|
heap
|
page read and write
|
||
137A8F27000
|
trusted library allocation
|
page read and write
|
||
2E537DC000
|
stack
|
page read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
10CF000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1379B7FC000
|
trusted library allocation
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
5E36000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
1379A014000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
2311E598000
|
heap
|
page read and write
|
||
137A61F7000
|
trusted library allocation
|
page read and write
|
||
1379552D000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
1379E19E000
|
trusted library allocation
|
page read and write
|
||
1379E8B0000
|
trusted library section
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1A0BF99B000
|
trusted library allocation
|
page read and write
|
||
1379A9BF000
|
trusted library allocation
|
page read and write
|
||
1379A4FB000
|
trusted library allocation
|
page read and write
|
||
137A0239000
|
trusted library allocation
|
page read and write
|
||
137A1046000
|
trusted library allocation
|
page read and write
|
||
1247000
|
unkown
|
page execute and write copy
|
||
10F4000
|
heap
|
page read and write
|
||
2E4ABED000
|
stack
|
page read and write
|
||
137A009C000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
4DE0000
|
direct allocation
|
page execute and read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
480000
|
unkown
|
page readonly
|
||
137A8F47000
|
trusted library allocation
|
page read and write
|
||
1379F4CF000
|
trusted library allocation
|
page read and write
|
||
52D0000
|
direct allocation
|
page execute and read and write
|
||
940000
|
heap
|
page read and write
|
||
10D1000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A0F3D000
|
trusted library allocation
|
page read and write
|
||
137A01CE000
|
trusted library allocation
|
page read and write
|
||
137A8F45000
|
trusted library allocation
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
2FE0000
|
direct allocation
|
page execute and read and write
|
||
434E000
|
stack
|
page read and write
|
||
1379E9CB000
|
trusted library allocation
|
page read and write
|
||
1379FD43000
|
trusted library allocation
|
page read and write
|
||
3A5E000
|
stack
|
page read and write
|
||
137A6A05000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
1379556E000
|
heap
|
page read and write
|
||
2E5439C000
|
stack
|
page read and write
|
||
13799F43000
|
trusted library allocation
|
page read and write
|
||
1A0BD60B000
|
trusted library allocation
|
page read and write
|
||
1379E3BE000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
292F576F000
|
heap
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
1379E36F000
|
trusted library allocation
|
page read and write
|
||
1379EDA4000
|
trusted library allocation
|
page read and write
|
||
5410000
|
direct allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
137A9263000
|
trusted library allocation
|
page read and write
|
||
1379E7F0000
|
trusted library allocation
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
137A69DC000
|
trusted library allocation
|
page read and write
|
||
1379E3E6000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
13A3000
|
heap
|
page read and write
|
||
11DC000
|
unkown
|
page execute and write copy
|
||
D2DABFF000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
4D6F000
|
stack
|
page read and write
|
||
137A00A5000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
89B000
|
unkown
|
page execute and write copy
|
||
1050000
|
unkown
|
page execute and read and write
|
||
13795516000
|
heap
|
page read and write
|
||
2BDF000
|
stack
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
13795562000
|
heap
|
page read and write
|
||
137A637F000
|
trusted library allocation
|
page read and write
|
||
1379E953000
|
trusted library allocation
|
page read and write
|
||
249FBE40000
|
heap
|
page read and write
|
||
137A1048000
|
trusted library allocation
|
page read and write
|
||
1A0BD103000
|
trusted library allocation
|
page read and write
|
||
13795574000
|
heap
|
page read and write
|
||
1A0BC859000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
292F5782000
|
heap
|
page read and write
|
||
1379E96F000
|
trusted library allocation
|
page read and write
|
||
292F56A0000
|
heap
|
page read and write
|
||
1379A8D9000
|
trusted library allocation
|
page read and write
|
||
137A0186000
|
trusted library allocation
|
page read and write
|
||
1379F25D000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
5EC33DB000
|
stack
|
page read and write
|
||
2E4FDFE000
|
stack
|
page read and write
|
||
1A0BF8CD000
|
trusted library allocation
|
page read and write
|
||
1379EAB3000
|
trusted library allocation
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
2311E521000
|
heap
|
page read and write
|
||
1804BBC0000
|
heap
|
page read and write
|
||
137A1107000
|
trusted library allocation
|
page read and write
|
||
137A61B6000
|
trusted library allocation
|
page read and write
|
||
3B1E000
|
stack
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
1379DD00000
|
trusted library allocation
|
page read and write
|
||
52FD000
|
stack
|
page read and write
|
||
2E505FE000
|
stack
|
page read and write
|
||
B2A000
|
heap
|
page read and write
|
||
1A0B0A10000
|
trusted library section
|
page read and write
|
||
10E8000
|
heap
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
486E000
|
stack
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
13795572000
|
heap
|
page read and write
|
||
2311E4A0000
|
heap
|
page read and write
|
||
2E5373C000
|
stack
|
page read and write
|
||
5E35000
|
trusted library allocation
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
1AD2E000
|
stack
|
page read and write
|
||
1379FC00000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
9758FFF000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
89D000
|
unkown
|
page execute and write copy
|
||
1379E12F000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
heap
|
page read and write
|
||
108C000
|
heap
|
page read and write
|
||
4C20000
|
remote allocation
|
page read and write
|
||
1379FF5D000
|
trusted library allocation
|
page read and write
|
||
12C2000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
48BF000
|
stack
|
page read and write
|
||
137A1B5F000
|
trusted library allocation
|
page read and write
|
||
1D230000
|
heap
|
page read and write
|
||
1379557D000
|
heap
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
4F20000
|
remote allocation
|
page read and write
|
||
137A69D2000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
2311E000000
|
trusted library allocation
|
page read and write
|
||
15EE000
|
stack
|
page read and write
|
||
1A0BFC76000
|
trusted library allocation
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
4620000
|
heap
|
page read and write
|
||
1379E158000
|
trusted library allocation
|
page read and write
|
||
137A61F0000
|
trusted library allocation
|
page read and write
|
||
13795567000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1A0BD211000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379EAE7000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
direct allocation
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
1A0BF300000
|
trusted library allocation
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
5EC9B7E000
|
stack
|
page read and write
|
||
FCF000
|
stack
|
page read and write
|
||
22D7D7A04000
|
trusted library allocation
|
page read and write
|
||
13795575000
|
heap
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
1A0BF49C000
|
trusted library allocation
|
page read and write
|
||
137A0CB3000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
137A02D0000
|
trusted library allocation
|
page read and write
|
||
137A8F35000
|
trusted library allocation
|
page read and write
|
||
1379E3B1000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
direct allocation
|
page read and write
|
||
137A0096000
|
trusted library allocation
|
page read and write
|
||
440E000
|
stack
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
4DF0000
|
direct allocation
|
page execute and read and write
|
||
137A02F8000
|
trusted library allocation
|
page read and write
|
||
137A8F3C000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
137A8F42000
|
trusted library allocation
|
page read and write
|
||
1A0B0BAA000
|
trusted library allocation
|
page read and write
|
||
137A8F5B000
|
trusted library allocation
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
1D836940000
|
unclassified section
|
page readonly
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
5A43000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
1379DBD0000
|
heap
|
page read and write
|
||
1379A9CD000
|
trusted library allocation
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
4FA1000
|
heap
|
page read and write
|
||
1379DD95000
|
trusted library allocation
|
page read and write
|
||
128C000
|
unkown
|
page execute and write copy
|
||
1381000
|
heap
|
page read and write
|
||
1379ED46000
|
trusted library allocation
|
page read and write
|
||
137A0153000
|
trusted library allocation
|
page read and write
|
||
137A6961000
|
trusted library allocation
|
page read and write
|
||
13799F6D000
|
trusted library allocation
|
page read and write
|
||
137A6497000
|
trusted library allocation
|
page read and write
|
||
1A0BCE08000
|
trusted library allocation
|
page read and write
|
||
559D000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1379E573000
|
trusted library allocation
|
page read and write
|
||
1A99BD8000
|
stack
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
FD0000
|
direct allocation
|
page read and write
|
||
59AA000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
62DA000
|
trusted library allocation
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
1379E698000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
FD0000
|
direct allocation
|
page read and write
|
||
5A2E000
|
trusted library allocation
|
page read and write
|
||
1379BE11000
|
trusted library allocation
|
page read and write
|
||
107B000
|
heap
|
page read and write
|
||
2FE0000
|
direct allocation
|
page execute and read and write
|
||
137A110B000
|
trusted library allocation
|
page read and write
|
||
137A00C9000
|
trusted library allocation
|
page read and write
|
||
1804BC64000
|
heap
|
page read and write
|
||
1A0BFB03000
|
trusted library allocation
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
1A0BF464000
|
trusted library allocation
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
137A0261000
|
trusted library allocation
|
page read and write
|
||
5F01000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
direct allocation
|
page read and write
|
||
59B4000
|
trusted library allocation
|
page read and write
|
||
1379E987000
|
trusted library allocation
|
page read and write
|
||
137A0363000
|
trusted library allocation
|
page read and write
|
||
1379BD16000
|
trusted library allocation
|
page read and write
|
||
1A3F000
|
stack
|
page read and write
|
||
1A0BF99B000
|
trusted library allocation
|
page read and write
|
||
1379554E000
|
heap
|
page read and write
|
||
1379FD58000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
137A6464000
|
trusted library allocation
|
page read and write
|
||
1A0BF923000
|
trusted library allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
1A0BCAFD000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
1379556A000
|
heap
|
page read and write
|
||
16FC000
|
heap
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
137A61D5000
|
trusted library allocation
|
page read and write
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
1379FFE8000
|
trusted library allocation
|
page read and write
|
||
1A0BC8FC000
|
trusted library allocation
|
page read and write
|
||
2311D682000
|
unclassified section
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
2E4BFFE000
|
stack
|
page read and write
|
||
1A0BF50E000
|
trusted library allocation
|
page read and write
|
||
137A63F9000
|
trusted library allocation
|
page read and write
|
||
1CF4F000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379C4B9000
|
trusted library allocation
|
page read and write
|
||
25DC000
|
stack
|
page read and write
|
||
292F7267000
|
heap
|
page read and write
|
||
137A9176000
|
trusted library allocation
|
page read and write
|
||
5F2D000
|
trusted library allocation
|
page read and write
|
||
2E519FA000
|
stack
|
page read and write
|
||
54531D8000
|
stack
|
page read and write
|
||
1A0BC3DB000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
1379A01C000
|
trusted library allocation
|
page read and write
|
||
5E0D000
|
trusted library allocation
|
page read and write
|
||
2311E584000
|
heap
|
page read and write
|
||
292F5800000
|
trusted library allocation
|
page read and write
|
||
1379550E000
|
heap
|
page read and write
|
||
2FE0000
|
direct allocation
|
page execute and read and write
|
||
DD4000
|
heap
|
page read and write
|
||
2A9F000
|
stack
|
page read and write
|
||
1379E3BE000
|
trusted library allocation
|
page read and write
|
||
329F000
|
stack
|
page read and write
|
||
1A0BC886000
|
trusted library allocation
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
137A008B000
|
trusted library allocation
|
page read and write
|
||
1A0BF600000
|
trusted library allocation
|
page read and write
|
||
137A6AF0000
|
trusted library allocation
|
page read and write
|
||
45A0000
|
direct allocation
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
1379EAEC000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
unkown
|
page execute read
|
||
D6C000
|
unkown
|
page write copy
|
||
1379B763000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
16F8000
|
heap
|
page read and write
|
||
12BC000
|
unkown
|
page execute and read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
13795579000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
FF0000
|
unkown
|
page readonly
|
||
59A3000
|
trusted library allocation
|
page read and write
|
||
1379F20B000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
128F000
|
unkown
|
page execute and read and write
|
||
1379F4CF000
|
trusted library allocation
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
477A000
|
trusted library allocation
|
page execute and read and write
|
||
10D1000
|
heap
|
page read and write
|
||
5B9D000
|
trusted library allocation
|
page read and write
|
||
E69000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
2E566BE000
|
stack
|
page read and write
|
||
1379ED1F000
|
trusted library allocation
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
1379F4EB000
|
trusted library allocation
|
page read and write
|
||
1A0BC546000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
623D000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
137A619F000
|
trusted library allocation
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
3FFF000
|
stack
|
page read and write
|
||
137A0F64000
|
trusted library allocation
|
page read and write
|
||
7EF000
|
stack
|
page read and write
|
||
58A8000
|
trusted library allocation
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
550B000
|
stack
|
page read and write
|
||
2E4C0FE000
|
stack
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
137A1C5A000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
137A91C0000
|
trusted library allocation
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
1A0BF3C1000
|
trusted library allocation
|
page read and write
|
||
1379EAE7000
|
trusted library allocation
|
page read and write
|
||
137A6000000
|
trusted library allocation
|
page read and write
|
||
1D836F23000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
1804BF32000
|
trusted library allocation
|
page read and write
|
||
2E5409B000
|
stack
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1A0BC198000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
4DF2000
|
trusted library allocation
|
page read and write
|
||
13795562000
|
heap
|
page read and write
|
||
1A0BFC87000
|
trusted library allocation
|
page read and write
|
||
52E000
|
unkown
|
page execute and read and write
|
||
13795583000
|
heap
|
page read and write
|
||
137A69E6000
|
trusted library allocation
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
45EE000
|
stack
|
page read and write
|
||
1379556A000
|
heap
|
page read and write
|
||
FD0000
|
direct allocation
|
page read and write
|
||
1379A9DE000
|
trusted library allocation
|
page read and write
|
||
C5B000
|
unkown
|
page execute and write copy
|
||
4F20000
|
direct allocation
|
page read and write
|
||
137A8F45000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
137A61F7000
|
trusted library allocation
|
page read and write
|
||
137A63D1000
|
trusted library allocation
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
5421000
|
direct allocation
|
page read and write
|
||
137A02BB000
|
trusted library allocation
|
page read and write
|
||
137A6370000
|
trusted library allocation
|
page read and write
|
||
1A98E000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A8F27000
|
trusted library allocation
|
page read and write
|
||
59F2000
|
trusted library allocation
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
2311D8A7000
|
trusted library allocation
|
page read and write
|
||
3C3F000
|
stack
|
page read and write
|
||
137A02CE000
|
trusted library allocation
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
1D836BC0000
|
heap
|
page read and write
|
||
137A0CF4000
|
trusted library allocation
|
page read and write
|
||
137A63E8000
|
trusted library allocation
|
page read and write
|
||
137A699D000
|
trusted library allocation
|
page read and write
|
||
5ECB57D000
|
stack
|
page read and write
|
||
1379F4EB000
|
trusted library allocation
|
page read and write
|
||
59D4000
|
trusted library allocation
|
page read and write
|
||
11DE000
|
unkown
|
page execute and read and write
|
||
13795564000
|
heap
|
page read and write
|
||
369E000
|
stack
|
page read and write
|
||
129F000
|
unkown
|
page execute and read and write
|
||
1A0BC400000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A1BE0000
|
trusted library allocation
|
page read and write
|
||
1A0BC880000
|
trusted library allocation
|
page read and write
|
||
1A0BC900000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
direct allocation
|
page execute and read and write
|
||
1F0000
|
heap
|
page read and write
|
||
137A6246000
|
trusted library allocation
|
page read and write
|
||
1379A5DB000
|
trusted library allocation
|
page read and write
|
||
1A0BF8EA000
|
trusted library allocation
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
1A0BF8E3000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
116B000
|
stack
|
page read and write
|
||
2311D874000
|
trusted library allocation
|
page read and write
|
||
1260000
|
unkown
|
page execute and write copy
|
||
137A0353000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
137A69A8000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
1A0BF8C2000
|
trusted library allocation
|
page read and write
|
||
47E0000
|
heap
|
page read and write
|
||
1379C423000
|
trusted library allocation
|
page read and write
|
||
5C90000
|
trusted library allocation
|
page read and write
|
||
59D2000
|
trusted library allocation
|
page read and write
|
||
1379F4EE000
|
trusted library allocation
|
page read and write
|
||
128F000
|
unkown
|
page execute and read and write
|
||
4B71000
|
heap
|
page read and write
|
||
137A8F06000
|
trusted library allocation
|
page read and write
|
||
10C3000
|
heap
|
page read and write
|
||
137A1BA8000
|
trusted library allocation
|
page read and write
|
||
4750000
|
direct allocation
|
page execute and read and write
|
||
D74000
|
unkown
|
page readonly
|
||
1744000
|
heap
|
page read and write
|
||
1379A476000
|
trusted library allocation
|
page read and write
|
||
1A0BC225000
|
trusted library allocation
|
page read and write
|
||
1379FF5D000
|
trusted library allocation
|
page read and write
|
||
13795524000
|
heap
|
page read and write
|
||
137A1BEC000
|
trusted library allocation
|
page read and write
|
||
137A69C4000
|
trusted library allocation
|
page read and write
|
||
1302000
|
unkown
|
page execute and write copy
|
||
DD4000
|
heap
|
page read and write
|
||
1379552D000
|
heap
|
page read and write
|
||
1379E074000
|
trusted library allocation
|
page read and write
|
||
1379E5F7000
|
trusted library allocation
|
page read and write
|
||
137A6503000
|
trusted library allocation
|
page read and write
|
||
1379C4D7000
|
trusted library allocation
|
page read and write
|
||
482F000
|
stack
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
4600000
|
heap
|
page read and write
|
||
137A6132000
|
trusted library allocation
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
1379E32A000
|
trusted library allocation
|
page read and write
|
||
137A63AC000
|
trusted library allocation
|
page read and write
|
||
2311DF80000
|
heap
|
page read and write
|
||
1379A0E9000
|
trusted library allocation
|
page read and write
|
||
1379557D000
|
heap
|
page read and write
|
||
12EF000
|
unkown
|
page execute and read and write
|
||
1A0BCCF0000
|
heap
|
page read and write
|
||
59CC000
|
trusted library allocation
|
page read and write
|
||
C25000
|
unkown
|
page execute and read and write
|
||
FF0000
|
unkown
|
page read and write
|
||
1379ED53000
|
trusted library allocation
|
page read and write
|
||
137A026F000
|
trusted library allocation
|
page read and write
|
||
137A02B4000
|
trusted library allocation
|
page read and write
|
||
126A000
|
unkown
|
page execute and read and write
|
||
13799F54000
|
trusted library allocation
|
page read and write
|
||
4A0F000
|
stack
|
page read and write
|
||
315F000
|
stack
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
137A014A000
|
trusted library allocation
|
page read and write
|
||
1A0BC57D000
|
trusted library allocation
|
page read and write
|
||
137A02AE000
|
trusted library allocation
|
page read and write
|
||
137A067E000
|
trusted library allocation
|
page read and write
|
||
1379E565000
|
trusted library allocation
|
page read and write
|
||
1379B80F000
|
heap
|
page read and write
|
||
2CEE000
|
stack
|
page read and write
|
||
2311E598000
|
heap
|
page read and write
|
||
478B000
|
trusted library allocation
|
page execute and read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1A0BCACF000
|
trusted library allocation
|
page read and write
|
||
59BD000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A0191000
|
trusted library allocation
|
page read and write
|
||
1A0BC5EA000
|
trusted library allocation
|
page read and write
|
||
600C000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
11B7000
|
unkown
|
page execute and write copy
|
||
137A0159000
|
trusted library allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
1379EA7B000
|
trusted library allocation
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
2311E531000
|
heap
|
page read and write
|
||
4C5F000
|
stack
|
page read and write
|
||
3ECF000
|
stack
|
page read and write
|
||
1218000
|
unkown
|
page execute and write copy
|
||
1379FEB8000
|
trusted library allocation
|
page read and write
|
||
54FF000
|
stack
|
page read and write
|
||
1379B5D5000
|
trusted library allocation
|
page read and write
|
||
1A0BFC03000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
1379552D000
|
heap
|
page read and write
|
||
1378E8D8000
|
trusted library allocation
|
page read and write
|
||
137A6119000
|
trusted library allocation
|
page read and write
|
||
2311D85F000
|
trusted library allocation
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
1379E903000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
2311D934000
|
unkown
|
page execute read
|
||
3C3E000
|
stack
|
page read and write
|
||
1A0BF907000
|
trusted library allocation
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
13795562000
|
heap
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
FD5000
|
heap
|
page read and write
|
||
137A6207000
|
trusted library allocation
|
page read and write
|
||
137A06FD000
|
trusted library allocation
|
page read and write
|
||
137A9100000
|
trusted library allocation
|
page read and write
|
||
137A69CE000
|
trusted library allocation
|
page read and write
|
||
1A0B24A0000
|
trusted library section
|
page readonly
|
||
137A7A16000
|
trusted library allocation
|
page read and write
|
||
1D836E83000
|
trusted library allocation
|
page read and write
|
||
5BAD000
|
stack
|
page read and write
|
||
1379FF83000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1A0BF3A4000
|
trusted library allocation
|
page read and write
|
||
2311D56A000
|
heap
|
page read and write
|
||
137A035E000
|
trusted library allocation
|
page read and write
|
||
427F000
|
stack
|
page read and write
|
||
97587FF000
|
stack
|
page read and write
|
||
CEE000
|
unkown
|
page execute and write copy
|
||
2A55470A000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
1A0BC386000
|
trusted library allocation
|
page read and write
|
||
5ECA37E000
|
stack
|
page read and write
|
||
137A0137000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
unkown
|
page execute and write copy
|
||
13799EDF000
|
trusted library allocation
|
page read and write
|
||
13795529000
|
heap
|
page read and write
|
||
C7F000
|
unkown
|
page execute and read and write
|
||
137A8FDC000
|
trusted library allocation
|
page read and write
|
||
1379DD2A000
|
trusted library allocation
|
page read and write
|
||
5EEB000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
4DAF000
|
stack
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
137A0F7A000
|
trusted library allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1D45C000
|
stack
|
page read and write
|
||
13795574000
|
heap
|
page read and write
|
||
1804BF03000
|
trusted library allocation
|
page read and write
|
||
137A91F9000
|
trusted library allocation
|
page read and write
|
||
137A01B9000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
137A1B13000
|
trusted library allocation
|
page read and write
|
||
12A5000
|
unkown
|
page execute and write copy
|
||
249FC000000
|
trusted library allocation
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
137A005B000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
unkown
|
page execute and write copy
|
||
1A0BF990000
|
trusted library allocation
|
page read and write
|
||
137A02B0000
|
trusted library allocation
|
page read and write
|
||
13795565000
|
heap
|
page read and write
|
||
137A009C000
|
trusted library allocation
|
page read and write
|
||
137A6AD9000
|
trusted library allocation
|
page read and write
|
||
137A67A1000
|
trusted library allocation
|
page read and write
|
||
137A8FCE000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1379FF80000
|
trusted library allocation
|
page read and write
|
||
5ED2000
|
trusted library allocation
|
page read and write
|
||
3F5E000
|
stack
|
page read and write
|
||
2311E5B7000
|
heap
|
page read and write
|
||
137A915A000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
5A3E000
|
trusted library allocation
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page read and write
|
||
12ED000
|
unkown
|
page execute and read and write
|
||
2E4C5FD000
|
stack
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
249FC207000
|
trusted library allocation
|
page read and write
|
||
70BE000
|
stack
|
page read and write
|
||
137A9157000
|
trusted library allocation
|
page read and write
|
||
6ABF000
|
stack
|
page read and write
|
||
1A0BD25A000
|
trusted library allocation
|
page read and write
|
||
378E000
|
stack
|
page read and write
|
||
137A009C000
|
trusted library allocation
|
page read and write
|
||
13799EB3000
|
trusted library allocation
|
page read and write
|
||
137A0730000
|
trusted library section
|
page read and write
|
||
2311E4BD000
|
heap
|
page read and write
|
||
1379E3A5000
|
trusted library allocation
|
page read and write
|
||
1379DF12000
|
trusted library allocation
|
page read and write
|
||
CFD000
|
stack
|
page read and write
|
||
F73000
|
heap
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A1BC3000
|
trusted library allocation
|
page read and write
|
||
5EEC000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1379E32A000
|
trusted library allocation
|
page read and write
|
||
137A0F5C000
|
trusted library allocation
|
page read and write
|
||
137A0193000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
direct allocation
|
page execute and read and write
|
||
1A0BF928000
|
trusted library allocation
|
page read and write
|
||
13C1000
|
heap
|
page read and write
|
||
2E4E5FE000
|
stack
|
page read and write
|
||
137A0CEC000
|
trusted library allocation
|
page read and write
|
||
524F000
|
stack
|
page read and write
|
||
2B1F000
|
stack
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
1379E3C7000
|
trusted library allocation
|
page read and write
|
||
137A033B000
|
trusted library allocation
|
page read and write
|
||
137A1C3F000
|
trusted library allocation
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
13FE000
|
stack
|
page read and write
|
||
1A0BD2D0000
|
trusted library allocation
|
page read and write
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
1379EAB6000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
137A02F4000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
unkown
|
page read and write
|
||
137A6759000
|
trusted library allocation
|
page read and write
|
||
1379557A000
|
heap
|
page read and write
|
||
1379550E000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
5C9B000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
1379E900000
|
trusted library allocation
|
page read and write
|
||
5C92000
|
trusted library allocation
|
page read and write
|
||
137A6193000
|
trusted library allocation
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
137A1B98000
|
trusted library allocation
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
60BB000
|
trusted library allocation
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1379FFE3000
|
trusted library allocation
|
page read and write
|
||
137A0D91000
|
trusted library allocation
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
1A0BF803000
|
trusted library allocation
|
page read and write
|
||
371F000
|
stack
|
page read and write
|
||
1379551C000
|
heap
|
page read and write
|
||
49E000
|
unkown
|
page readonly
|
||
1379B92F000
|
heap
|
page read and write
|
||
13795583000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A0357000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
BBC000
|
unkown
|
page execute and read and write
|
||
62D7000
|
trusted library allocation
|
page read and write
|
||
1379DF70000
|
trusted library allocation
|
page read and write
|
||
137A62BA000
|
trusted library allocation
|
page read and write
|
||
1050000
|
unkown
|
page execute and read and write
|
||
1A0BF4FE000
|
trusted library allocation
|
page read and write
|
||
137A001F000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
43DE000
|
stack
|
page read and write
|
||
137A8FE4000
|
trusted library allocation
|
page read and write
|
||
1379F4F1000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
13795530000
|
heap
|
page read and write
|
||
1A0B0BDF000
|
trusted library allocation
|
page read and write
|
||
1A9916E000
|
unkown
|
page readonly
|
||
1CE3E000
|
stack
|
page read and write
|
||
4B3F000
|
stack
|
page read and write
|
||
137A0279000
|
trusted library allocation
|
page read and write
|
||
59AA000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
1379E762000
|
trusted library allocation
|
page read and write
|
||
1379F4CB000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
5023000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
2311E562000
|
heap
|
page read and write
|
||
2311E4A0000
|
heap
|
page read and write
|
||
50A4000
|
trusted library allocation
|
page read and write
|
||
137A9047000
|
trusted library allocation
|
page read and write
|
||
137A0281000
|
trusted library allocation
|
page read and write
|
||
137A0FB4000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1379F34E000
|
trusted library allocation
|
page read and write
|
||
137A0278000
|
trusted library allocation
|
page read and write
|
||
1A0BF9F6000
|
trusted library allocation
|
page read and write
|
||
113E000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1379F289000
|
trusted library allocation
|
page read and write
|
||
1379F4D6000
|
trusted library allocation
|
page read and write
|
||
59D1000
|
trusted library allocation
|
page read and write
|
||
1379E3DE000
|
trusted library allocation
|
page read and write
|
||
10E2000
|
heap
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
97567FA000
|
stack
|
page read and write
|
||
1379DD3C000
|
trusted library allocation
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
13A8000
|
heap
|
page read and write
|
||
1379E31C000
|
trusted library allocation
|
page read and write
|
||
337E000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
11FF000
|
unkown
|
page execute and read and write
|
||
E04000
|
heap
|
page read and write
|
||
8FE0D704000
|
trusted library allocation
|
page read and write
|
||
5590000
|
direct allocation
|
page execute and read and write
|
||
2D0000
|
unkown
|
page read and write
|
||
490E000
|
stack
|
page read and write
|
||
13795588000
|
heap
|
page read and write
|
||
1379E962000
|
trusted library allocation
|
page read and write
|
||
1379F28C000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
12DD000
|
unkown
|
page execute and write copy
|
||
137A8FFD000
|
trusted library allocation
|
page read and write
|
||
2E4D5FE000
|
stack
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
137A6303000
|
trusted library allocation
|
page read and write
|
||
1294000
|
heap
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
5E31000
|
trusted library allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
137A035E000
|
trusted library allocation
|
page read and write
|
||
1379FDC8000
|
trusted library allocation
|
page read and write
|
||
1379557E000
|
heap
|
page read and write
|
||
137A63D6000
|
trusted library allocation
|
page read and write
|
||
2311DEB0000
|
trusted library allocation
|
page read and write
|
||
1A0BC552000
|
trusted library allocation
|
page read and write
|
||
1379EACE000
|
trusted library allocation
|
page read and write
|
||
F86000
|
heap
|
page read and write
|
||
1379DC67000
|
trusted library allocation
|
page read and write
|
||
3BCE000
|
stack
|
page read and write
|
||
137A61E7000
|
trusted library allocation
|
page read and write
|
||
137A904D000
|
trusted library allocation
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
1379DF26000
|
trusted library allocation
|
page read and write
|
||
CDD000
|
unkown
|
page execute and write copy
|
||
137A0288000
|
trusted library allocation
|
page read and write
|
||
1379EF9D000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
1379557E000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
1A0BF9F2000
|
trusted library allocation
|
page read and write
|
||
2311E02E000
|
trusted library allocation
|
page read and write
|
||
1A0B06E0000
|
heap
|
page read and write
|
||
1379F020000
|
trusted library allocation
|
page read and write
|
||
E57000
|
heap
|
page read and write
|
||
1379E98B000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
D6C000
|
unkown
|
page write copy
|
||
1A0B0BF0000
|
trusted library allocation
|
page read and write
|
||
41AD000
|
stack
|
page read and write
|
||
1A0BC1AB000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A6AD4000
|
trusted library allocation
|
page read and write
|
||
137A0370000
|
trusted library allocation
|
page read and write
|
||
1378E8E6000
|
trusted library allocation
|
page read and write
|
||
1A0BF9C6000
|
trusted library allocation
|
page read and write
|
||
2311E4A0000
|
heap
|
page read and write
|
||
137A05A3000
|
trusted library allocation
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
137A1BCF000
|
trusted library allocation
|
page read and write
|
||
C26000
|
unkown
|
page execute and write copy
|
||
1379DC03000
|
trusted library allocation
|
page read and write
|
||
137A91FA000
|
trusted library allocation
|
page read and write
|
||
1379EAA3000
|
trusted library allocation
|
page read and write
|
||
137A8F3E000
|
trusted library allocation
|
page read and write
|
||
599E000
|
trusted library allocation
|
page read and write
|
||
1A0BC8F3000
|
trusted library allocation
|
page read and write
|
||
137A0288000
|
trusted library allocation
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
1379A8E7000
|
trusted library allocation
|
page read and write
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
1379A003000
|
trusted library allocation
|
page read and write
|
||
1A0BFC6E000
|
trusted library allocation
|
page read and write
|
||
3AFF000
|
stack
|
page read and write
|
||
137A91B1000
|
trusted library allocation
|
page read and write
|
||
C94000
|
unkown
|
page execute and write copy
|
||
10D1000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
5AA9000
|
trusted library allocation
|
page read and write
|
||
1379BB00000
|
trusted library section
|
page readonly
|
||
A32000
|
unkown
|
page execute and read and write
|
||
1379E362000
|
trusted library allocation
|
page read and write
|
||
2D9F000
|
stack
|
page read and write
|
||
1A0BC937000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
137A67B4000
|
trusted library allocation
|
page read and write
|
||
496F000
|
stack
|
page read and write
|
||
137A623B000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
13795574000
|
heap
|
page read and write
|
||
137A91E3000
|
trusted library allocation
|
page read and write
|
||
137A8F47000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1378E894000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
16BF000
|
heap
|
page read and write
|
||
13795540000
|
heap
|
page read and write
|
||
1302000
|
unkown
|
page execute and read and write
|
||
335F000
|
stack
|
page read and write
|
||
1CCFF000
|
stack
|
page read and write
|
||
1075000
|
heap
|
page read and write
|
||
1A0BC575000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
1379E3E2000
|
trusted library allocation
|
page read and write
|
||
CFF000
|
stack
|
page read and write
|
||
1379550E000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1A0BC2E4000
|
trusted library allocation
|
page read and write
|
||
1379A86C000
|
trusted library allocation
|
page read and write
|
||
13795572000
|
heap
|
page read and write
|
||
1379555E000
|
heap
|
page read and write
|
||
137A925C000
|
trusted library allocation
|
page read and write
|
||
1A0BF3BF000
|
trusted library allocation
|
page read and write
|
||
13795562000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
12C0000
|
direct allocation
|
page read and write
|
||
1379EADC000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
1379DF92000
|
trusted library allocation
|
page read and write
|
||
2311E4A0000
|
heap
|
page read and write
|
||
137A0558000
|
trusted library allocation
|
page read and write
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
5B24000
|
trusted library allocation
|
page read and write
|
||
5A43000
|
trusted library allocation
|
page read and write
|
||
1D836E00000
|
trusted library allocation
|
page read and write
|
||
137A0B00000
|
trusted library allocation
|
page read and write
|
||
137A91A0000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1A0BECEC000
|
trusted library allocation
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
1379552E000
|
heap
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
1379DF00000
|
trusted library allocation
|
page read and write
|
||
137A0250000
|
trusted library allocation
|
page read and write
|
||
137A021A000
|
trusted library allocation
|
page read and write
|
||
1379DF54000
|
trusted library allocation
|
page read and write
|
||
3741000
|
heap
|
page read and write
|
||
13795546000
|
heap
|
page read and write
|
||
1A0BC476000
|
trusted library allocation
|
page read and write
|
||
1A0B0900000
|
trusted library allocation
|
page read and write
|
||
10E8000
|
heap
|
page read and write
|
||
5A55000
|
trusted library allocation
|
page read and write
|
||
1379A5FE000
|
trusted library allocation
|
page read and write
|
||
137A02D0000
|
trusted library allocation
|
page read and write
|
||
1A0BF39C000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
1378E800000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
137A90DE000
|
trusted library allocation
|
page read and write
|
||
F7F000
|
heap
|
page read and write
|
||
1379C499000
|
trusted library allocation
|
page read and write
|
||
1379EAA2000
|
trusted library allocation
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
3C8E000
|
stack
|
page read and write
|
||
1379EAB0000
|
trusted library allocation
|
page read and write
|
||
137A1B90000
|
trusted library allocation
|
page read and write
|
||
137A9096000
|
trusted library allocation
|
page read and write
|
||
F7F000
|
heap
|
page read and write
|
||
10D6000
|
heap
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
1A0B0B5D000
|
trusted library allocation
|
page read and write
|
||
1379558F000
|
heap
|
page read and write
|
||
6D80000
|
heap
|
page read and write
|
||
137A92F6000
|
trusted library allocation
|
page read and write
|
||
13795592000
|
heap
|
page read and write
|
||
137A0195000
|
trusted library allocation
|
page read and write
|
||
137A02A4000
|
trusted library allocation
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
13795572000
|
heap
|
page read and write
|
||
1CF9F000
|
stack
|
page read and write
|
||
1379EFF9000
|
trusted library allocation
|
page read and write
|
||
1190000
|
direct allocation
|
page execute and read and write
|
||
1379F390000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A63B9000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
137A632B000
|
trusted library allocation
|
page read and write
|
||
1379E3B8000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
1379E3A5000
|
trusted library allocation
|
page read and write
|
||
137A0058000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1349000
|
heap
|
page read and write
|
||
1D836E03000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
1379E9CB000
|
trusted library allocation
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
2250CC500000
|
trusted library allocation
|
page read and write
|
||
55E0000
|
direct allocation
|
page execute and read and write
|
||
137A037D000
|
trusted library allocation
|
page read and write
|
||
1379E795000
|
trusted library allocation
|
page read and write
|
||
13799F72000
|
trusted library allocation
|
page read and write
|
||
52D7000
|
trusted library allocation
|
page read and write
|
||
1379550E000
|
heap
|
page read and write
|
||
1379BD00000
|
trusted library allocation
|
page read and write
|
||
1379557E000
|
heap
|
page read and write
|
||
1379A9A1000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
2311D4A0000
|
unclassified section
|
page readonly
|
||
1379EA94000
|
trusted library allocation
|
page read and write
|
||
10E7000
|
heap
|
page read and write
|
||
42CE000
|
stack
|
page read and write
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
1A991EB000
|
stack
|
page read and write
|
||
1CDCF000
|
stack
|
page read and write
|
||
5EC75BE000
|
stack
|
page read and write
|
||
45B1000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
137A676A000
|
trusted library allocation
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
137A698F000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
11D1000
|
unkown
|
page execute and read and write
|
||
137A69E6000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
2311E5AE000
|
heap
|
page read and write
|
||
1303000
|
unkown
|
page execute and write copy
|
||
1379A900000
|
trusted library allocation
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
1050000
|
unkown
|
page execute and write copy
|
||
346E000
|
stack
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
1A0BC503000
|
trusted library allocation
|
page read and write
|
||
50B4000
|
trusted library allocation
|
page read and write
|
||
13795564000
|
heap
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
1379FFAE000
|
trusted library allocation
|
page read and write
|
||
1A0BFD03000
|
trusted library allocation
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
79D000
|
stack
|
page read and write
|
||
1379F980000
|
unclassified section
|
page read and write
|
||
1A0BF48A000
|
trusted library allocation
|
page read and write
|
||
137A0D03000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1A0BC3C9000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
1804BA60000
|
remote allocation
|
page read and write
|
||
5C91000
|
trusted library allocation
|
page read and write
|
||
1379FFEB000
|
trusted library allocation
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
49D1000
|
heap
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
6DC000
|
unkown
|
page readonly
|
||
4F91000
|
heap
|
page read and write
|
||
1D836E60000
|
trusted library allocation
|
page read and write
|
||
137A0195000
|
trusted library allocation
|
page read and write
|
||
1379DF4C000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
1379A3D0000
|
trusted library section
|
page readonly
|
||
1A0BC515000
|
trusted library allocation
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
137A0159000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
249FBE50000
|
heap
|
page read and write
|
||
137A6941000
|
trusted library allocation
|
page read and write
|
||
123E000
|
unkown
|
page execute and read and write
|
||
5F7E000
|
trusted library allocation
|
page read and write
|
||
137A0120000
|
trusted library allocation
|
page read and write
|
||
1A0BF522000
|
trusted library allocation
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
1A0BF9F6000
|
trusted library allocation
|
page read and write
|
||
2311D878000
|
trusted library allocation
|
page read and write
|
||
2311E4A9000
|
heap
|
page read and write
|
||
4A2F000
|
stack
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
1379E7F8000
|
trusted library allocation
|
page read and write
|
||
137A06FD000
|
trusted library allocation
|
page read and write
|
||
1379E3B1000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
13799EF9000
|
trusted library allocation
|
page read and write
|
||
5EC57FF000
|
stack
|
page read and write
|
||
5455AFE000
|
unkown
|
page readonly
|
||
1379EAEC000
|
trusted library allocation
|
page read and write
|
||
E15000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1A0BC198000
|
trusted library allocation
|
page read and write
|
||
FD7000
|
heap
|
page read and write
|
||
1379E98B000
|
trusted library allocation
|
page read and write
|
||
1379E9A2000
|
trusted library allocation
|
page read and write
|
||
34DF000
|
stack
|
page read and write
|
||
137A619B000
|
trusted library allocation
|
page read and write
|
||
13795525000
|
heap
|
page read and write
|
||
4AAF000
|
stack
|
page read and write
|
||
1379E700000
|
trusted library allocation
|
page read and write
|
||
137A6397000
|
trusted library allocation
|
page read and write
|
||
2E525FD000
|
stack
|
page read and write
|
||
1379EAB6000
|
trusted library allocation
|
page read and write
|
||
1379E177000
|
trusted library allocation
|
page read and write
|
||
1379FAE6000
|
trusted library allocation
|
page read and write
|
||
13795519000
|
heap
|
page read and write
|
||
54527E7000
|
stack
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
1D22D000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1379A57D000
|
trusted library allocation
|
page read and write
|
||
362F000
|
stack
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
137A0383000
|
trusted library allocation
|
page read and write
|
||
53A0000
|
direct allocation
|
page execute and read and write
|
||
13795569000
|
heap
|
page read and write
|
||
13795569000
|
heap
|
page read and write
|
||
1A0B0AAF000
|
unclassified section
|
page read and write
|
||
137A0381000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A0258000
|
trusted library allocation
|
page read and write
|
||
399F000
|
stack
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
59CF000
|
trusted library allocation
|
page read and write
|
||
E8E000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1379C100000
|
trusted library allocation
|
page read and write
|
||
137A5C00000
|
trusted library allocation
|
page read and write
|
||
127C000
|
unkown
|
page execute and write copy
|
||
1378E4D0000
|
heap
|
page read and write
|
||
13795592000
|
heap
|
page read and write
|
||
137A1C6A000
|
trusted library allocation
|
page read and write
|
||
5E34000
|
trusted library allocation
|
page read and write
|
||
397F000
|
stack
|
page read and write
|
||
5A5E000
|
trusted library allocation
|
page read and write
|
||
124D000
|
unkown
|
page execute and read and write
|
||
4FA5000
|
trusted library allocation
|
page read and write
|
||
1A0BC5BA000
|
trusted library allocation
|
page read and write
|
||
1379FF78000
|
trusted library allocation
|
page read and write
|
||
59D2000
|
trusted library allocation
|
page read and write
|
||
1379C4DA000
|
trusted library allocation
|
page read and write
|
||
1379FAE6000
|
trusted library allocation
|
page read and write
|
||
5150000
|
direct allocation
|
page execute and read and write
|
||
1A0BD23F000
|
trusted library allocation
|
page read and write
|
||
12FF000
|
unkown
|
page execute and write copy
|
||
137A0261000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
FFF000
|
stack
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
13799F68000
|
trusted library allocation
|
page read and write
|
||
137A1BEC000
|
trusted library allocation
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
137A02EC000
|
trusted library allocation
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
1A0BF800000
|
trusted library allocation
|
page read and write
|
||
137A02CE000
|
trusted library allocation
|
page read and write
|
||
5F49000
|
trusted library allocation
|
page read and write
|
||
5AD3000
|
trusted library allocation
|
page read and write
|
||
1379E421000
|
trusted library allocation
|
page read and write
|
||
2A554320000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
2311D800000
|
trusted library allocation
|
page read and write
|
||
137A6143000
|
trusted library allocation
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
6013000
|
trusted library allocation
|
page read and write
|
||
1379550E000
|
heap
|
page read and write
|
||
5A39000
|
trusted library allocation
|
page read and write
|
||
1379E1F1000
|
trusted library allocation
|
page read and write
|
||
1379ED5F000
|
trusted library allocation
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
1379DDB4000
|
trusted library allocation
|
page read and write
|
||
419F000
|
stack
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
137A0EF9000
|
trusted library allocation
|
page read and write
|
||
B9A000
|
heap
|
page read and write
|
||
1379EA5B000
|
trusted library allocation
|
page read and write
|
||
1379A4FE000
|
trusted library allocation
|
page read and write
|
||
3E4E000
|
stack
|
page read and write
|
||
1379550E000
|
heap
|
page read and write
|
||
137A0FF5000
|
trusted library allocation
|
page read and write
|
||
249FBED0000
|
heap
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
52F0000
|
direct allocation
|
page execute and read and write
|
||
16B5000
|
heap
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
137A0288000
|
trusted library allocation
|
page read and write
|
||
1379FFE5000
|
trusted library allocation
|
page read and write
|
||
137A6A45000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A8F3E000
|
trusted library allocation
|
page read and write
|
||
2311D4E0000
|
heap
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
59D1000
|
trusted library allocation
|
page read and write
|
||
105C000
|
unkown
|
page execute and write copy
|
||
1D836E89000
|
trusted library allocation
|
page read and write
|
||
2311E526000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
162C000
|
stack
|
page read and write
|
||
137A1BD3000
|
trusted library allocation
|
page read and write
|
||
13790400000
|
heap
|
page read and write
|
||
137A0548000
|
trusted library allocation
|
page read and write
|
||
137A6931000
|
trusted library allocation
|
page read and write
|
||
1A0BC1A7000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
direct allocation
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
2311D921000
|
unkown
|
page execute read
|
||
CD4000
|
heap
|
page read and write
|
||
1A0BC878000
|
trusted library allocation
|
page read and write
|
||
1379BC15000
|
trusted library allocation
|
page read and write
|
||
1D836E85000
|
trusted library allocation
|
page read and write
|
||
137904D8000
|
heap
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
3F1E000
|
stack
|
page read and write
|
||
DB1000
|
heap
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
1379557D000
|
heap
|
page read and write
|
||
4BF0000
|
heap
|
page read and write
|
||
137A001B000
|
trusted library allocation
|
page read and write
|
||
1379FF78000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
137A0113000
|
trusted library allocation
|
page read and write
|
||
137904B7000
|
heap
|
page read and write
|
||
5A33000
|
trusted library allocation
|
page read and write
|
||
1379E3E2000
|
trusted library allocation
|
page read and write
|
||
E20E0EE000
|
unkown
|
page readonly
|
||
DD4000
|
heap
|
page read and write
|
||
FD0000
|
direct allocation
|
page read and write
|
||
137A7A32000
|
trusted library allocation
|
page read and write
|
||
4AB1000
|
heap
|
page read and write
|
||
137A63EB000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
1379EABD000
|
trusted library allocation
|
page read and write
|
||
1A0BF9C6000
|
trusted library allocation
|
page read and write
|
||
137A02D0000
|
trusted library allocation
|
page read and write
|
||
1379EA3B000
|
trusted library allocation
|
page read and write
|
||
2311D81B000
|
trusted library allocation
|
page read and write
|
||
1379FE64000
|
trusted library allocation
|
page read and write
|
||
52B1000
|
direct allocation
|
page read and write
|
||
26DF000
|
stack
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
1379FFFB000
|
trusted library allocation
|
page read and write
|
||
1A0B0840000
|
heap
|
page readonly
|
||
1379FE44000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
2E562BF000
|
stack
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
1379551C000
|
heap
|
page read and write
|
||
1379A903000
|
trusted library allocation
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379FB21000
|
trusted library allocation
|
page read and write
|
||
1804BA7A000
|
remote allocation
|
page execute read
|
||
16BC000
|
heap
|
page read and write
|
||
16EB000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
CA1000
|
unkown
|
page execute read
|
||
137A026C000
|
trusted library allocation
|
page read and write
|
||
137A0137000
|
trusted library allocation
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
59BB000
|
trusted library allocation
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
1379EA96000
|
trusted library allocation
|
page read and write
|
||
137A9300000
|
trusted library allocation
|
page read and write
|
||
16F9000
|
heap
|
page read and write
|
||
5EC73BC000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
137A6012000
|
trusted library allocation
|
page read and write
|
||
137A631B000
|
trusted library allocation
|
page read and write
|
||
2E523FD000
|
stack
|
page read and write
|
||
137A699D000
|
trusted library allocation
|
page read and write
|
||
2311D87F000
|
trusted library allocation
|
page read and write
|
||
137A02F4000
|
trusted library allocation
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
2E521FD000
|
stack
|
page read and write
|
||
1A0B06C0000
|
unclassified section
|
page readonly
|
||
137A3022000
|
trusted library allocation
|
page read and write
|
||
137A6AF3000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
1379552D000
|
heap
|
page read and write
|
||
137A8FE1000
|
trusted library allocation
|
page read and write
|
||
1379E983000
|
trusted library allocation
|
page read and write
|
||
1804BCA0000
|
unclassified section
|
page readonly
|
||
5F52000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
10C7000
|
heap
|
page read and write
|
||
1379EAE7000
|
trusted library allocation
|
page read and write
|
||
137A0378000
|
trusted library allocation
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
1379E799000
|
trusted library allocation
|
page read and write
|
||
1A0BFC73000
|
trusted library allocation
|
page read and write
|
||
E21043B000
|
stack
|
page read and write
|
||
12F3000
|
unkown
|
page execute and write copy
|
||
1A0BC54D000
|
trusted library allocation
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
137A92B9000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
59C000
|
unkown
|
page execute and read and write
|
||
316E000
|
stack
|
page read and write
|
||
137A8F33000
|
trusted library allocation
|
page read and write
|
||
1379EAFA000
|
trusted library allocation
|
page read and write
|
||
5171000
|
direct allocation
|
page read and write
|
||
1379550E000
|
heap
|
page read and write
|
||
55DE000
|
trusted library allocation
|
page read and write
|
||
1379F4CB000
|
trusted library allocation
|
page read and write
|
||
1379E3DE000
|
trusted library allocation
|
page read and write
|
||
425F000
|
stack
|
page read and write
|
||
1379558D000
|
heap
|
page read and write
|
||
5140000
|
direct allocation
|
page execute and read and write
|
||
49D1000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379E2DB000
|
trusted library allocation
|
page read and write
|
||
35BF000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
49D1000
|
heap
|
page read and write
|
||
137A009C000
|
trusted library allocation
|
page read and write
|
||
1379FFE8000
|
trusted library allocation
|
page read and write
|
||
1379E3C7000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
1A0BCA05000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
1379ED5F000
|
trusted library allocation
|
page read and write
|
||
137A0149000
|
trusted library allocation
|
page read and write
|
||
126A000
|
unkown
|
page execute and read and write
|
||
2311D8C6000
|
trusted library allocation
|
page read and write
|
||
2311E4A0000
|
heap
|
page read and write
|
||
137A02CE000
|
trusted library allocation
|
page read and write
|
||
1804BEAF000
|
trusted library allocation
|
page read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
137A01F3000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
27F7000
|
heap
|
page read and write
|
||
137A009C000
|
trusted library allocation
|
page read and write
|
||
5A60000
|
remote allocation
|
page read and write
|
||
137A11DB000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
137A8F40000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
137A02EC000
|
trusted library allocation
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
4E00000
|
direct allocation
|
page execute and read and write
|
||
137A61C3000
|
trusted library allocation
|
page read and write
|
||
1A0BF76F000
|
trusted library allocation
|
page read and write
|
||
1379E3CD000
|
trusted library allocation
|
page read and write
|
||
137A300E000
|
trusted library allocation
|
page read and write
|
||
5EC33EE000
|
stack
|
page read and write
|
||
49D1000
|
heap
|
page read and write
|
||
1379F4EE000
|
trusted library allocation
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
5EC717E000
|
stack
|
page read and write
|
||
1379E570000
|
trusted library allocation
|
page read and write
|
||
1379E3E2000
|
trusted library allocation
|
page read and write
|
||
1379E263000
|
trusted library allocation
|
page read and write
|
||
137A0153000
|
trusted library allocation
|
page read and write
|
||
137A1BB9000
|
trusted library allocation
|
page read and write
|
||
13795560000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379ED5C000
|
trusted library allocation
|
page read and write
|
||
137A0372000
|
trusted library allocation
|
page read and write
|
||
137A63C3000
|
trusted library allocation
|
page read and write
|
||
137A8F42000
|
trusted library allocation
|
page read and write
|
||
1379F6E4000
|
trusted library allocation
|
page read and write
|
||
13795562000
|
heap
|
page read and write
|
||
137A9176000
|
trusted library allocation
|
page read and write
|
||
137A911E000
|
trusted library allocation
|
page read and write
|
||
22A293A04000
|
trusted library allocation
|
page read and write
|
||
137A1181000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
5A60000
|
remote allocation
|
page read and write
|
||
1A0BF806000
|
trusted library allocation
|
page read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
454E000
|
stack
|
page read and write
|
||
11D1000
|
unkown
|
page execute and read and write
|
||
FD0000
|
direct allocation
|
page read and write
|
||
56B000
|
heap
|
page read and write
|
||
1379A963000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
705E000
|
stack
|
page read and write
|
||
12BC000
|
unkown
|
page execute and read and write
|
||
137A61F0000
|
trusted library allocation
|
page read and write
|
||
1A0BD204000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
51AE000
|
stack
|
page read and write
|
||
12EA000
|
heap
|
page read and write
|
||
137A69AE000
|
trusted library allocation
|
page read and write
|
||
137A02E6000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
direct allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
13795530000
|
heap
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
137A69DC000
|
trusted library allocation
|
page read and write
|
||
1A0BC847000
|
trusted library allocation
|
page read and write
|
||
1381000
|
heap
|
page read and write
|
||
13795560000
|
heap
|
page read and write
|
||
137A0086000
|
trusted library allocation
|
page read and write
|
||
1804BEEB000
|
trusted library allocation
|
page read and write
|
||
1A0B2446000
|
heap
|
page read and write
|
||
3E0F000
|
stack
|
page read and write
|
||
13795512000
|
heap
|
page read and write
|
||
6C9E000
|
stack
|
page read and write
|
||
10CF000
|
stack
|
page read and write
|
||
13795567000
|
heap
|
page read and write
|
||
10D1000
|
heap
|
page read and write
|
||
2A5544E9000
|
heap
|
page read and write
|
||
137A0B03000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
137A92A5000
|
trusted library allocation
|
page read and write
|
||
1A0BF400000
|
trusted library allocation
|
page read and write
|
||
137A90F7000
|
trusted library allocation
|
page read and write
|
||
4800000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
292F725B000
|
heap
|
page read and write
|
||
2297506EF000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A63F9000
|
trusted library allocation
|
page read and write
|
||
137A8FA3000
|
trusted library allocation
|
page read and write
|
||
137A01D5000
|
trusted library allocation
|
page read and write
|
||
137A8FFA000
|
trusted library allocation
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
1379A8D5000
|
trusted library allocation
|
page read and write
|
||
1379E0A7000
|
trusted library allocation
|
page read and write
|
||
137A0656000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
137A0383000
|
trusted library allocation
|
page read and write
|
||
13799F00000
|
trusted library allocation
|
page read and write
|
||
1AC2E000
|
stack
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1378E86B000
|
trusted library allocation
|
page read and write
|
||
137A63EB000
|
trusted library allocation
|
page read and write
|
||
137A029B000
|
trusted library allocation
|
page read and write
|
||
59EC000
|
trusted library allocation
|
page read and write
|
||
1379C41B000
|
trusted library allocation
|
page read and write
|
||
13795574000
|
heap
|
page read and write
|
||
1D836BA0000
|
heap
|
page readonly
|
||
49C0000
|
direct allocation
|
page read and write
|
||
DFF000
|
heap
|
page read and write
|
||
1804BAA0000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
5A3C000
|
trusted library allocation
|
page read and write
|
||
1379E5A9000
|
trusted library allocation
|
page read and write
|
||
13795574000
|
heap
|
page read and write
|
||
5110000
|
direct allocation
|
page read and write
|
||
1A0BC526000
|
trusted library allocation
|
page read and write
|
||
137A69E8000
|
trusted library allocation
|
page read and write
|
||
1379FF3A000
|
trusted library allocation
|
page read and write
|
||
1379E3AE000
|
trusted library allocation
|
page read and write
|
||
137A6977000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A8FA3000
|
trusted library allocation
|
page read and write
|
||
3DCE000
|
stack
|
page read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
1700000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1379E3E6000
|
trusted library allocation
|
page read and write
|
||
137A0303000
|
trusted library allocation
|
page read and write
|
||
137A1174000
|
trusted library allocation
|
page read and write
|
||
1302000
|
unkown
|
page execute and read and write
|
||
1379550E000
|
heap
|
page read and write
|
||
2E4C07A000
|
stack
|
page read and write
|
||
137A0EF0000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1A0B0B47000
|
trusted library allocation
|
page read and write
|
||
5AA9000
|
trusted library allocation
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
13795560000
|
heap
|
page read and write
|
||
13795575000
|
heap
|
page read and write
|
||
137A011C000
|
trusted library allocation
|
page read and write
|
||
137A0641000
|
trusted library allocation
|
page read and write
|
||
545276E000
|
unkown
|
page readonly
|
||
FAA4551000
|
trusted library allocation
|
page execute read
|
||
13799F1B000
|
trusted library allocation
|
page read and write
|
||
F72000
|
heap
|
page read and write
|
||
137A92F1000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379A009000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
1379C4BC000
|
trusted library allocation
|
page read and write
|
||
137A6765000
|
trusted library allocation
|
page read and write
|
||
137A8F88000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
4AB1000
|
heap
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
13795583000
|
heap
|
page read and write
|
||
1A0BF963000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1379E3E6000
|
trusted library allocation
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
1379551C000
|
heap
|
page read and write
|
||
10C1000
|
heap
|
page read and write
|
||
137A8F3C000
|
trusted library allocation
|
page read and write
|
||
137A0164000
|
trusted library allocation
|
page read and write
|
||
1265000
|
unkown
|
page execute and read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
1A0BFC36000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1A0BF479000
|
trusted library allocation
|
page read and write
|
||
5E34000
|
trusted library allocation
|
page read and write
|
||
137A0047000
|
trusted library allocation
|
page read and write
|
||
137A0279000
|
trusted library allocation
|
page read and write
|
||
1A0B0BFE000
|
trusted library allocation
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
137A6280000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379EABD000
|
trusted library allocation
|
page read and write
|
||
1A0BF8B1000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
1379C300000
|
trusted library allocation
|
page read and write
|
||
1A0B0B68000
|
trusted library allocation
|
page read and write
|
||
137A91BD000
|
trusted library allocation
|
page read and write
|
||
1D836C13000
|
heap
|
page read and write
|
||
BD3C8A04000
|
trusted library allocation
|
page read and write
|
||
1379F4CB000
|
trusted library allocation
|
page read and write
|
||
5ECC81D000
|
stack
|
page read and write
|
||
2311D4C0000
|
heap
|
page read and write
|
||
1A0BF8E8000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
4AB000
|
unkown
|
page write copy
|
||
30DC000
|
heap
|
page read and write
|
||
137A8F42000
|
trusted library allocation
|
page read and write
|
||
137A6246000
|
trusted library allocation
|
page read and write
|
||
475D000
|
trusted library allocation
|
page execute and read and write
|
||
4E50000
|
remote allocation
|
page read and write
|
||
1A0BC198000
|
trusted library allocation
|
page read and write
|
||
5ECC85F000
|
stack
|
page read and write
|
||
137A0023000
|
trusted library allocation
|
page read and write
|
||
137A3028000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
10C6000
|
heap
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
1379E952000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
137A0086000
|
trusted library allocation
|
page read and write
|
||
137A1B1D000
|
trusted library allocation
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
2311E52F000
|
heap
|
page read and write
|
||
13795530000
|
heap
|
page read and write
|
||
137A0372000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
166E000
|
stack
|
page read and write
|
||
5570000
|
direct allocation
|
page execute and read and write
|
||
2311E49C000
|
heap
|
page read and write
|
||
12E8000
|
unkown
|
page execute and read and write
|
||
2311E441000
|
heap
|
page read and write
|
||
137A628C000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
4C60000
|
heap
|
page read and write
|
||
1379C30B000
|
trusted library allocation
|
page read and write
|
||
137A019F000
|
trusted library allocation
|
page read and write
|
||
1379E3C7000
|
trusted library allocation
|
page read and write
|
||
137A632D000
|
trusted library allocation
|
page read and write
|
||
1379FF4E000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
137A69C9000
|
trusted library allocation
|
page read and write
|
||
1379FF30000
|
trusted library allocation
|
page read and write
|
||
1379EA50000
|
trusted library allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
137A6091000
|
trusted library allocation
|
page read and write
|
||
135B000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1379B7C9000
|
trusted library allocation
|
page read and write
|
||
137A0058000
|
trusted library allocation
|
page read and write
|
||
8C2000
|
unkown
|
page execute and write copy
|
||
1A0BF615000
|
trusted library allocation
|
page read and write
|
||
13795533000
|
heap
|
page read and write
|
||
1A0BEC1F000
|
trusted library allocation
|
page read and write
|
||
137A01AD000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
137A9147000
|
trusted library allocation
|
page read and write
|
||
137A9169000
|
trusted library allocation
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
1A0BF99B000
|
trusted library allocation
|
page read and write
|
||
5320000
|
direct allocation
|
page execute and read and write
|
||
2A554600000
|
trusted library allocation
|
page read and write
|
||
45A0000
|
direct allocation
|
page read and write
|
||
1379F960000
|
unclassified section
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
3BEE000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A0F38000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
560D000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1AD5E000
|
stack
|
page read and write
|
||
10E2000
|
heap
|
page read and write
|
||
137A6343000
|
trusted library allocation
|
page read and write
|
||
137A92F1000
|
trusted library allocation
|
page read and write
|
||
137A88D2000
|
trusted library allocation
|
page read and write
|
||
662E000
|
stack
|
page read and write
|
||
137A0A00000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
314C000
|
stack
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
137A92EF000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
135E000
|
heap
|
page read and write
|
||
1A0BD700000
|
trusted library allocation
|
page read and write
|
||
137A8F3C000
|
trusted library allocation
|
page read and write
|
||
283E000
|
stack
|
page read and write
|
||
1A0BC243000
|
trusted library allocation
|
page read and write
|
||
1302000
|
unkown
|
page execute and write copy
|
||
6027000
|
trusted library allocation
|
page read and write
|
||
4DCF000
|
stack
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
59A7000
|
trusted library allocation
|
page read and write
|
||
137A029B000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
137A9071000
|
trusted library allocation
|
page read and write
|
||
1379C4DE000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
137A0700000
|
trusted library section
|
page readonly
|
||
1A0BC3C6000
|
trusted library allocation
|
page read and write
|
||
40CE000
|
stack
|
page read and write
|
||
379F000
|
stack
|
page read and write
|
||
1042000
|
unkown
|
page execute and read and write
|
||
4B71000
|
heap
|
page read and write
|
||
137A104E000
|
trusted library allocation
|
page read and write
|
||
139C000
|
heap
|
page read and write
|
||
2311D680000
|
unclassified section
|
page read and write
|
||
BC8000
|
heap
|
page read and write
|
||
137A0362000
|
trusted library allocation
|
page read and write
|
||
1A0BF6CB000
|
trusted library allocation
|
page read and write
|
||
137A1B68000
|
trusted library allocation
|
page read and write
|
||
1379556A000
|
heap
|
page read and write
|
||
C5F000
|
unkown
|
page execute and write copy
|
||
5E3E000
|
trusted library allocation
|
page read and write
|
||
12F3000
|
unkown
|
page execute and write copy
|
||
13795553000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
137A69AE000
|
trusted library allocation
|
page read and write
|
||
34FE000
|
stack
|
page read and write
|
||
5A5E000
|
trusted library allocation
|
page read and write
|
||
408F000
|
stack
|
page read and write
|
||
105C000
|
unkown
|
page execute and write copy
|
||
249FC20A000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
1379EABD000
|
trusted library allocation
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
2E5425B000
|
stack
|
page read and write
|
||
1A0B0AB0000
|
heap
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
137A0222000
|
trusted library allocation
|
page read and write
|
||
13799E81000
|
trusted library allocation
|
page read and write
|
||
1D20E000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
47C0000
|
trusted library allocation
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
13795536000
|
heap
|
page read and write
|
||
1A0BC3EC000
|
trusted library allocation
|
page read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
137A03BF000
|
trusted library allocation
|
page read and write
|
||
127C000
|
unkown
|
page execute and write copy
|
||
1640000
|
heap
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
137A8F3C000
|
trusted library allocation
|
page read and write
|
||
1379EB00000
|
trusted library allocation
|
page read and write
|
||
1379B5AB000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1804BF22000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
2311E529000
|
heap
|
page read and write
|
||
137A8F3C000
|
trusted library allocation
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
E20EBD8000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
1D836E63000
|
trusted library allocation
|
page read and write
|
||
137A69FC000
|
trusted library allocation
|
page read and write
|
||
85F3000
|
heap
|
page read and write
|
||
1049000
|
unkown
|
page write copy
|
||
13795562000
|
heap
|
page read and write
|
||
137A63D0000
|
trusted library allocation
|
page read and write
|
||
13795560000
|
heap
|
page read and write
|
||
13790432000
|
heap
|
page read and write
|
||
1379E703000
|
trusted library allocation
|
page read and write
|
||
54527EB000
|
stack
|
page read and write
|
||
1379ED13000
|
trusted library allocation
|
page read and write
|
||
1379ED8C000
|
trusted library allocation
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
1A0BECB5000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
1379E791000
|
trusted library allocation
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
1F7F000
|
stack
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
137A0633000
|
trusted library allocation
|
page read and write
|
||
1379557A000
|
heap
|
page read and write
|
||
1379A01F000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379C200000
|
trusted library allocation
|
page read and write
|
||
1379FED3000
|
trusted library allocation
|
page read and write
|
||
1A94F000
|
stack
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
1A0BD218000
|
trusted library allocation
|
page read and write
|
||
1379B403000
|
trusted library allocation
|
page read and write
|
||
1A0BECF8000
|
trusted library allocation
|
page read and write
|
||
13795520000
|
heap
|
page read and write
|
||
2311D550000
|
heap
|
page readonly
|
||
4C81000
|
heap
|
page read and write
|
||
45AF000
|
stack
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
5FDB000
|
trusted library allocation
|
page read and write
|
||
1A0BF6EB000
|
trusted library allocation
|
page read and write
|
||
1379E5FC000
|
trusted library allocation
|
page read and write
|
||
1379DFA7000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
direct allocation
|
page execute and read and write
|
||
1379EAD9000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
1202D8100000
|
trusted library allocation
|
page read and write
|
||
1379F962000
|
unclassified section
|
page read and write
|
||
47E1000
|
heap
|
page read and write
|
||
1804BF11000
|
trusted library allocation
|
page read and write
|
||
5D1F000
|
stack
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
137A6743000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
49D1000
|
heap
|
page read and write
|
||
1379B8D2000
|
heap
|
page read and write
|
||
137A61ED000
|
trusted library allocation
|
page read and write
|
||
5E37000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
7BA000
|
stack
|
page read and write
|
||
1379556A000
|
heap
|
page read and write
|
||
13795520000
|
heap
|
page read and write
|
||
3CEF000
|
stack
|
page read and write
|
||
59A3000
|
trusted library allocation
|
page read and write
|
||
2E5379E000
|
stack
|
page read and write
|
||
137A01B7000
|
trusted library allocation
|
page read and write
|
||
6D50000
|
heap
|
page execute and read and write
|
||
1379557B000
|
heap
|
page read and write
|
||
1379E600000
|
trusted library allocation
|
page read and write
|
||
5A2F000
|
trusted library allocation
|
page read and write
|
||
1A9BCFE000
|
stack
|
page read and write
|
||
D62000
|
unkown
|
page readonly
|
||
1379555D000
|
heap
|
page read and write
|
||
1804BE00000
|
trusted library allocation
|
page read and write
|
||
137A02F4000
|
trusted library allocation
|
page read and write
|
||
1CFED000
|
stack
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
5590000
|
direct allocation
|
page execute and read and write
|
||
13795560000
|
heap
|
page read and write
|
||
12DB000
|
unkown
|
page execute and write copy
|
||
4F31000
|
heap
|
page read and write
|
||
137A8F17000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1A0BECC6000
|
trusted library allocation
|
page read and write
|
||
466F000
|
stack
|
page read and write
|
||
13795529000
|
heap
|
page read and write
|
||
1D836E23000
|
trusted library allocation
|
page read and write
|
||
1A0BC8AD000
|
trusted library allocation
|
page read and write
|
||
137A3012000
|
trusted library allocation
|
page read and write
|
||
1379557A000
|
heap
|
page read and write
|
||
1A0BFC07000
|
trusted library allocation
|
page read and write
|
||
13795572000
|
heap
|
page read and write
|
||
1381000
|
heap
|
page read and write
|
||
1379EA85000
|
trusted library allocation
|
page read and write
|
||
1A0BCA12000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
13795562000
|
heap
|
page read and write
|
||
13795574000
|
heap
|
page read and write
|
||
12BC000
|
unkown
|
page execute and read and write
|
||
1A0BD2E2000
|
trusted library allocation
|
page read and write
|
||
1379556E000
|
heap
|
page read and write
|
||
2311E49C000
|
heap
|
page read and write
|
||
1379E74D000
|
trusted library allocation
|
page read and write
|
||
95D000
|
unkown
|
page execute and read and write
|
||
1A0B0650000
|
unclassified section
|
page readonly
|
||
33DF000
|
stack
|
page read and write
|
||
1A0B0A90000
|
trusted library section
|
page readonly
|
||
13BB000
|
heap
|
page read and write
|
||
5E34000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A1B1A000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
117B000
|
heap
|
page read and write
|
||
EDE000
|
heap
|
page read and write
|
||
59A3000
|
trusted library allocation
|
page read and write
|
||
297C000
|
stack
|
page read and write
|
||
137A0C8C000
|
trusted library allocation
|
page read and write
|
||
4754000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
13795574000
|
heap
|
page read and write
|
||
137A0EB4000
|
trusted library allocation
|
page read and write
|
||
137A031E000
|
trusted library allocation
|
page read and write
|
||
137A01B9000
|
trusted library allocation
|
page read and write
|
||
404E000
|
stack
|
page read and write
|
||
137A8F42000
|
trusted library allocation
|
page read and write
|
||
292F5761000
|
heap
|
page read and write
|
||
51A000
|
unkown
|
page execute and read and write
|
||
1379E99C000
|
trusted library allocation
|
page read and write
|
||
137A0F91000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
137A0C03000
|
trusted library allocation
|
page read and write
|
||
3C5E000
|
stack
|
page read and write
|
||
137A029B000
|
trusted library allocation
|
page read and write
|
||
1379556A000
|
heap
|
page read and write
|
||
69C000
|
stack
|
page read and write
|
||
1379FAFC000
|
trusted library allocation
|
page read and write
|
||
191F000
|
stack
|
page read and write
|
||
4A8F000
|
stack
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
1804BE5B000
|
trusted library allocation
|
page read and write
|
||
1A0BFC9F000
|
trusted library allocation
|
page read and write
|
||
2311E526000
|
heap
|
page read and write
|
||
2311E52F000
|
heap
|
page read and write
|
||
1379EAE9000
|
trusted library allocation
|
page read and write
|
||
137A03F7000
|
trusted library allocation
|
page read and write
|
||
1379E154000
|
trusted library allocation
|
page read and write
|
||
1A80F000
|
stack
|
page read and write
|
||
137A0DA2000
|
trusted library allocation
|
page read and write
|
||
13795566000
|
heap
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
1379E790000
|
trusted library allocation
|
page read and write
|
||
13795575000
|
heap
|
page read and write
|
||
97577FE000
|
stack
|
page read and write
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
5A5E000
|
trusted library allocation
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
137A613C000
|
trusted library allocation
|
page read and write
|
||
FF1000
|
unkown
|
page execute and read and write
|
||
4D4E000
|
stack
|
page read and write
|
||
1379FB0E000
|
trusted library allocation
|
page read and write
|
||
10E2000
|
heap
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
1379E163000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
2311E57B000
|
heap
|
page read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
1379EAFA000
|
trusted library allocation
|
page read and write
|
||
13795564000
|
heap
|
page read and write
|
||
59E2000
|
trusted library allocation
|
page read and write
|
||
137A8F92000
|
trusted library allocation
|
page read and write
|
||
13799F3A000
|
trusted library allocation
|
page read and write
|
||
1379DFBC000
|
trusted library allocation
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
5A5E000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
420E000
|
stack
|
page read and write
|
||
CA0000
|
unkown
|
page readonly
|
||
1379E765000
|
trusted library allocation
|
page read and write
|
||
1379E103000
|
trusted library allocation
|
page read and write
|
||
5F13000
|
trusted library allocation
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
1804BA00000
|
unclassified section
|
page readonly
|
||
1A0BC575000
|
trusted library allocation
|
page read and write
|
||
137A9700000
|
trusted library allocation
|
page read and write
|
||
1379E3A5000
|
trusted library allocation
|
page read and write
|
||
1379A566000
|
trusted library allocation
|
page read and write
|
||
1A0BC1DF000
|
trusted library allocation
|
page read and write
|
||
DE1000
|
unkown
|
page execute and write copy
|
||
1A0BF98A000
|
trusted library allocation
|
page read and write
|
||
1344000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
5F85000
|
trusted library allocation
|
page read and write
|
||
5D5000
|
unkown
|
page execute and read and write
|
||
137A1BFC000
|
trusted library allocation
|
page read and write
|
||
1379FF13000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
1A0BC51B000
|
trusted library allocation
|
page read and write
|
||
1A0BFC9F000
|
trusted library allocation
|
page read and write
|
||
1379E95D000
|
trusted library allocation
|
page read and write
|
||
172B000
|
heap
|
page read and write
|
||
418E000
|
stack
|
page read and write
|
||
1379F677000
|
trusted library allocation
|
page read and write
|
||
4DBD000
|
stack
|
page read and write
|
||
137A0362000
|
trusted library allocation
|
page read and write
|
||
1379FEE9000
|
trusted library allocation
|
page read and write
|
||
1379A8B2000
|
trusted library allocation
|
page read and write
|
||
137A02B7000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
5CAD000
|
stack
|
page read and write
|
||
1379556A000
|
heap
|
page read and write
|
||
389E000
|
stack
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
4C20000
|
remote allocation
|
page read and write
|
||
1379F040000
|
trusted library allocation
|
page read and write
|
||
1A0BC8BB000
|
trusted library allocation
|
page read and write
|
||
13795560000
|
heap
|
page read and write
|
||
1379E394000
|
trusted library allocation
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
1379FFAE000
|
trusted library allocation
|
page read and write
|
||
137A63B4000
|
trusted library allocation
|
page read and write
|
||
EB5000
|
heap
|
page read and write
|
||
137A91EF000
|
trusted library allocation
|
page read and write
|
||
39DE000
|
stack
|
page read and write
|
||
1A0BD400000
|
trusted library allocation
|
page read and write
|
||
13C2000
|
heap
|
page read and write
|
||
10D1000
|
heap
|
page read and write
|
||
5AAD000
|
stack
|
page read and write
|
||
1379DF4E000
|
trusted library allocation
|
page read and write
|
||
5D5000
|
unkown
|
page execute and write copy
|
||
1379F98F000
|
unclassified section
|
page read and write
|
||
1A0BFC00000
|
trusted library allocation
|
page read and write
|
||
1379552C000
|
heap
|
page read and write
|
||
59CF000
|
trusted library allocation
|
page read and write
|
||
C62000
|
unkown
|
page execute and read and write
|
||
137A0D2A000
|
trusted library allocation
|
page read and write
|
||
E49000
|
unkown
|
page write copy
|
||
1A0B243D000
|
heap
|
page read and write
|
||
1378E720000
|
trusted library allocation
|
page execute read
|
||
13795530000
|
heap
|
page read and write
|
||
1379FCAC000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1A0BFAF9000
|
trusted library allocation
|
page read and write
|
||
E0000
|
unkown
|
page read and write
|
||
1049000
|
unkown
|
page write copy
|
||
137A025D000
|
trusted library allocation
|
page read and write
|
||
137A113E000
|
trusted library allocation
|
page read and write
|
||
5A93000
|
trusted library allocation
|
page read and write
|
||
137A630B000
|
trusted library allocation
|
page read and write
|
||
1379FBA1000
|
trusted library allocation
|
page read and write
|
||
1379B7C3000
|
trusted library allocation
|
page read and write
|
||
2311E520000
|
heap
|
page read and write
|
||
1A0BF9B0000
|
trusted library allocation
|
page read and write
|
||
16CC000
|
heap
|
page read and write
|
||
60C6000
|
trusted library allocation
|
page read and write
|
||
1CC4F000
|
stack
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
1379556A000
|
heap
|
page read and write
|
||
1378E770000
|
trusted library section
|
page read and write
|
||
1379ED17000
|
trusted library allocation
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
4B72000
|
heap
|
page read and write
|
||
1379FEE9000
|
trusted library allocation
|
page read and write
|
||
5ECAF7D000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
3D5F000
|
stack
|
page read and write
|
||
5A97000
|
trusted library allocation
|
page read and write
|
||
10C9000
|
heap
|
page read and write
|
||
9757FFE000
|
stack
|
page read and write
|
||
1379EAFA000
|
trusted library allocation
|
page read and write
|
||
27FB000
|
heap
|
page read and write
|
||
1379550E000
|
heap
|
page read and write
|
||
BFF000
|
unkown
|
page execute and write copy
|
||
137A02F4000
|
trusted library allocation
|
page read and write
|
||
137A6600000
|
trusted library allocation
|
page read and write
|
||
1A0BF9F2000
|
trusted library allocation
|
page read and write
|
||
1379EFF2000
|
trusted library allocation
|
page read and write
|
||
E20E0AB000
|
stack
|
page read and write
|
||
1379B579000
|
trusted library allocation
|
page read and write
|
||
1A0BECFD000
|
trusted library allocation
|
page read and write
|
||
137A69E2000
|
trusted library allocation
|
page read and write
|
||
1379EACE000
|
trusted library allocation
|
page read and write
|
||
1804BE47000
|
trusted library allocation
|
page read and write
|
||
1A0BF4A4000
|
trusted library allocation
|
page read and write
|
||
137A92B1000
|
trusted library allocation
|
page read and write
|
||
1A0BFC9B000
|
trusted library allocation
|
page read and write
|
||
137A0103000
|
trusted library allocation
|
page read and write
|
||
1379F3CE000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1379ED22000
|
trusted library allocation
|
page read and write
|
||
1379557A000
|
heap
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
137A6207000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
137A6919000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
C23000
|
unkown
|
page execute and write copy
|
||
5E3B000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
5F06000
|
trusted library allocation
|
page read and write
|
||
13BB000
|
heap
|
page read and write
|
||
137A0250000
|
trusted library allocation
|
page read and write
|
||
1379A800000
|
trusted library allocation
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
5EC793E000
|
stack
|
page read and write
|
||
1A0BC17E000
|
trusted library allocation
|
page read and write
|
||
5EC45FE000
|
stack
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
137A8F42000
|
trusted library allocation
|
page read and write
|
||
137A63B2000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
1379EA85000
|
trusted library allocation
|
page read and write
|
||
137A6130000
|
trusted library allocation
|
page read and write
|
||
137A61E7000
|
trusted library allocation
|
page read and write
|
||
2311E598000
|
heap
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
559E000
|
stack
|
page read and write
|
||
13799DF0000
|
heap
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
1A0BFC91000
|
trusted library allocation
|
page read and write
|
||
137A0322000
|
trusted library allocation
|
page read and write
|
||
1379FC03000
|
trusted library allocation
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
1A0BC38F000
|
trusted library allocation
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
13795547000
|
heap
|
page read and write
|
||
1D836B84000
|
heap
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
10D6000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
137A00F5000
|
trusted library allocation
|
page read and write
|
||
1379EAEF000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
326F000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
2E52EFC000
|
stack
|
page read and write
|
||
2311E449000
|
heap
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
13795575000
|
heap
|
page read and write
|
||
2311E561000
|
heap
|
page read and write
|
||
13795588000
|
heap
|
page read and write
|
||
1A0BC89F000
|
trusted library allocation
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
137A040A000
|
trusted library allocation
|
page read and write
|
||
137A112B000
|
trusted library allocation
|
page read and write
|
||
137A0250000
|
trusted library allocation
|
page read and write
|
||
137A10A8000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
56AF000
|
stack
|
page read and write
|
||
5EC613F000
|
stack
|
page read and write
|
||
137A8F8F000
|
trusted library allocation
|
page read and write
|
||
1379F03D000
|
trusted library allocation
|
page read and write
|
||
1A0B0BCC000
|
trusted library allocation
|
page read and write
|
||
1379DB90000
|
trusted library section
|
page read and write
|
||
1379DF3B000
|
trusted library allocation
|
page read and write
|
||
46B0000
|
trusted library allocation
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
53C0000
|
direct allocation
|
page read and write
|
||
10E2000
|
heap
|
page read and write
|
||
137A92EA000
|
trusted library allocation
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
1CBFE000
|
stack
|
page read and write
|
||
1A0BD30A000
|
trusted library allocation
|
page read and write
|
||
193E000
|
stack
|
page read and write
|
||
5C9C000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
unkown
|
page execute and read and write
|
||
137A018E000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
137A906D000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
1D836BB2000
|
unclassified section
|
page read and write
|
||
137A0388000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
2311E584000
|
heap
|
page read and write
|
||
137A1B98000
|
trusted library allocation
|
page read and write
|
||
2E5419F000
|
stack
|
page read and write
|
||
1378E7D5000
|
heap
|
page read and write
|
||
FF1000
|
unkown
|
page execute and read and write
|
||
137A0200000
|
trusted library allocation
|
page read and write
|
||
469F000
|
stack
|
page read and write
|
||
1804BE6E000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
2311E4BD000
|
heap
|
page read and write
|
||
C28000
|
unkown
|
page execute and read and write
|
||
137A0383000
|
trusted library allocation
|
page read and write
|
||
13795547000
|
heap
|
page read and write
|
||
1A0BC544000
|
trusted library allocation
|
page read and write
|
||
137A5E00000
|
trusted library allocation
|
page read and write
|
||
12DB000
|
unkown
|
page execute and write copy
|
||
137A002B000
|
trusted library allocation
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379E131000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379F509000
|
trusted library allocation
|
page read and write
|
||
339E000
|
stack
|
page read and write
|
||
1A0BF494000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
137A6659000
|
trusted library allocation
|
page read and write
|
||
137A8F7D000
|
trusted library allocation
|
page read and write
|
||
137A0258000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1378E803000
|
trusted library allocation
|
page read and write
|
||
1049000
|
unkown
|
page write copy
|
||
E0000
|
unkown
|
page read and write
|
||
137A61AC000
|
trusted library allocation
|
page read and write
|
||
1379F6C5000
|
trusted library allocation
|
page read and write
|
||
137A6979000
|
trusted library allocation
|
page read and write
|
||
1A0BC566000
|
trusted library allocation
|
page read and write
|
||
1379E3E6000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
unkown
|
page readonly
|
||
1A0BF778000
|
trusted library allocation
|
page read and write
|
||
5E3D000
|
trusted library allocation
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
576E000
|
stack
|
page read and write
|
||
470E000
|
stack
|
page read and write
|
||
1A0B0B03000
|
trusted library allocation
|
page read and write
|
||
137A01B0000
|
trusted library allocation
|
page read and write
|
||
16B9000
|
heap
|
page read and write
|
||
137A6212000
|
trusted library allocation
|
page read and write
|
||
1379BE18000
|
trusted library allocation
|
page read and write
|
||
1D8369B0000
|
remote allocation
|
page read and write
|
||
1A0BC379000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
1379B956000
|
heap
|
page read and write
|
||
1A9B3FE000
|
unkown
|
page readonly
|
||
1D836E72000
|
trusted library allocation
|
page read and write
|
||
C42000
|
unkown
|
page execute and read and write
|
||
5A43000
|
trusted library allocation
|
page read and write
|
||
5D7D000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
1379FFE5000
|
trusted library allocation
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
137A03F7000
|
trusted library allocation
|
page read and write
|
||
137A6996000
|
trusted library allocation
|
page read and write
|
||
EDF000
|
heap
|
page read and write
|
||
1379555E000
|
heap
|
page read and write
|
||
137A030F000
|
trusted library allocation
|
page read and write
|
||
580E000
|
stack
|
page read and write
|
||
137A0120000
|
trusted library allocation
|
page read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
D54000
|
heap
|
page read and write
|
||
1A0BC14A000
|
trusted library allocation
|
page read and write
|
||
1D8369FA000
|
heap
|
page read and write
|
||
137A60FE000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
C8F000
|
unkown
|
page execute and read and write
|
||
3EA1000
|
heap
|
page read and write
|
||
137A026C000
|
trusted library allocation
|
page read and write
|
||
1379E96F000
|
trusted library allocation
|
page read and write
|
||
137A8F47000
|
trusted library allocation
|
page read and write
|
||
13795534000
|
heap
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
1379F3F0000
|
trusted library allocation
|
page read and write
|
||
173D000
|
heap
|
page read and write
|
||
1379F204000
|
trusted library allocation
|
page read and write
|
||
1379B8E5000
|
heap
|
page read and write
|
||
5EC5FFE000
|
stack
|
page read and write
|
||
13795525000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
137A8F3E000
|
trusted library allocation
|
page read and write
|
||
137A6999000
|
trusted library allocation
|
page read and write
|
||
137A01A8000
|
trusted library allocation
|
page read and write
|
||
1A0BC2D3000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
1A0BC5A4000
|
trusted library allocation
|
page read and write
|
||
20A39DB03000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
19D000
|
unkown
|
page execute and read and write
|
||
1804BE5D000
|
trusted library allocation
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
13795540000
|
heap
|
page read and write
|
||
137A8F73000
|
trusted library allocation
|
page read and write
|
||
EE9000
|
heap
|
page read and write
|
||
1379FDE1000
|
trusted library allocation
|
page read and write
|
||
1A0BF990000
|
trusted library allocation
|
page read and write
|
||
292F5907000
|
trusted library allocation
|
page read and write
|
||
9B7000
|
heap
|
page read and write
|
||
2E4AB2E000
|
stack
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
137A0143000
|
trusted library allocation
|
page read and write
|
||
1379DF70000
|
trusted library allocation
|
page read and write
|
||
104B000
|
unkown
|
page execute and read and write
|
||
1A0BF514000
|
trusted library allocation
|
page read and write
|
||
1379B57C000
|
trusted library allocation
|
page read and write
|
||
A97B4D04000
|
trusted library allocation
|
page read and write
|
||
1379C4AB000
|
trusted library allocation
|
page read and write
|
||
298DB9204000
|
trusted library allocation
|
page read and write
|
||
1379BF00000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
137A0096000
|
trusted library allocation
|
page read and write
|
||
1379F030000
|
trusted library allocation
|
page read and write
|
||
137A02B0000
|
trusted library allocation
|
page read and write
|
||
1A0BC94B000
|
trusted library allocation
|
page read and write
|
||
1379EF84000
|
trusted library allocation
|
page read and write
|
||
1379EA5B000
|
trusted library allocation
|
page read and write
|
||
2E5491C000
|
stack
|
page read and write
|
||
137A1B23000
|
trusted library allocation
|
page read and write
|
||
271E000
|
stack
|
page read and write
|
||
1D836EE7000
|
trusted library allocation
|
page read and write
|
||
475F000
|
stack
|
page read and write
|
||
2311E4A3000
|
heap
|
page read and write
|
||
1379DB50000
|
unclassified section
|
page read and write
|
||
444F000
|
stack
|
page read and write
|
||
137A01A5000
|
trusted library allocation
|
page read and write
|
||
137A69BA000
|
trusted library allocation
|
page read and write
|
||
EB5000
|
heap
|
page read and write
|
||
1D836E0D000
|
trusted library allocation
|
page read and write
|
||
5996000
|
trusted library allocation
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
1A0BC22A000
|
trusted library allocation
|
page read and write
|
||
137A0690000
|
trusted library allocation
|
page read and write
|
||
137A623D000
|
trusted library allocation
|
page read and write
|
||
6CA000
|
unkown
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
4DE0000
|
direct allocation
|
page execute and read and write
|
||
137A1BCF000
|
trusted library allocation
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
33F0000
|
heap
|
page read and write
|
||
137A6ADC000
|
trusted library allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
1A0BC8C3000
|
trusted library allocation
|
page read and write
|
||
105C000
|
unkown
|
page execute and write copy
|
||
1A0BD200000
|
trusted library allocation
|
page read and write
|
||
59CC000
|
trusted library allocation
|
page read and write
|
||
4A3E000
|
stack
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
459E000
|
stack
|
page read and write
|
||
2311E4A9000
|
heap
|
page read and write
|
||
13795560000
|
heap
|
page read and write
|
||
137A1B62000
|
trusted library allocation
|
page read and write
|
||
1A0BF92D000
|
trusted library allocation
|
page read and write
|
||
1050000
|
unkown
|
page execute and write copy
|
||
5E36000
|
trusted library allocation
|
page read and write
|
||
3741000
|
heap
|
page read and write
|
||
1379ED6E000
|
trusted library allocation
|
page read and write
|
||
137A92EA000
|
trusted library allocation
|
page read and write
|
||
137A6A05000
|
trusted library allocation
|
page read and write
|
||
2E546DB000
|
stack
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
324F000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A0353000
|
trusted library allocation
|
page read and write
|
||
137A91D3000
|
trusted library allocation
|
page read and write
|
||
2E51FFD000
|
stack
|
page read and write
|
||
1379550F000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A699B000
|
trusted library allocation
|
page read and write
|
||
137A02B0000
|
trusted library allocation
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
137A0383000
|
trusted library allocation
|
page read and write
|
||
1379DF5F000
|
trusted library allocation
|
page read and write
|
||
1379C108000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
F48000
|
heap
|
page read and write
|
||
2311E440000
|
heap
|
page read and write
|
||
1379F4D2000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
1A0BC28A000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
11FE000
|
unkown
|
page execute and write copy
|
||
4E50000
|
remote allocation
|
page read and write
|
||
1A0BC843000
|
trusted library allocation
|
page read and write
|
||
4AB1000
|
heap
|
page read and write
|
||
1379E14B000
|
trusted library allocation
|
page read and write
|
||
1379550E000
|
heap
|
page read and write
|
||
1D836B20000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A8F4F000
|
trusted library allocation
|
page read and write
|
||
2311D812000
|
trusted library allocation
|
page read and write
|
||
137A8F47000
|
trusted library allocation
|
page read and write
|
||
1379DF87000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
5A37000
|
trusted library allocation
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1A0BC526000
|
trusted library allocation
|
page read and write
|
||
5A2F000
|
trusted library allocation
|
page read and write
|
||
2E544DC000
|
stack
|
page read and write
|
||
5D6000
|
unkown
|
page execute and write copy
|
||
4700000
|
direct allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
1A0BEC03000
|
trusted library allocation
|
page read and write
|
||
D74000
|
unkown
|
page readonly
|
||
137A63BF000
|
trusted library allocation
|
page read and write
|
||
1379F6B8000
|
trusted library allocation
|
page read and write
|
||
13799F2D000
|
trusted library allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
2311D92D000
|
unkown
|
page execute read
|
||
1379EAE3000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
E0E000
|
heap
|
page read and write
|
||
1CC000
|
stack
|
page read and write
|
||
5F40000
|
trusted library allocation
|
page read and write
|
||
2311D80A000
|
trusted library allocation
|
page read and write
|
||
12EB000
|
unkown
|
page execute and write copy
|
||
137A0DCF000
|
trusted library allocation
|
page read and write
|
||
1A0BEC8A000
|
trusted library allocation
|
page read and write
|
||
1A0BC518000
|
trusted library allocation
|
page read and write
|
||
137A91E3000
|
trusted library allocation
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A62B2000
|
trusted library allocation
|
page read and write
|
||
137A64F6000
|
trusted library allocation
|
page read and write
|
||
4AB1000
|
heap
|
page read and write
|
||
1379C500000
|
trusted library section
|
page read and write
|
||
1D837000000
|
heap
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
531000
|
unkown
|
page read and write
|
||
429D000
|
stack
|
page read and write
|
||
292F56A5000
|
heap
|
page read and write
|
||
10CB000
|
heap
|
page read and write
|
||
1379E3C9000
|
trusted library allocation
|
page read and write
|
||
33F4000
|
heap
|
page read and write
|
||
D3C000
|
unkown
|
page readonly
|
||
137A0255000
|
trusted library allocation
|
page read and write
|
||
137A69E4000
|
trusted library allocation
|
page read and write
|
||
1379F4D2000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
137A037D000
|
trusted library allocation
|
page read and write
|
||
1379EA3B000
|
trusted library allocation
|
page read and write
|
||
137A0B9B000
|
trusted library allocation
|
page read and write
|
||
137A01E3000
|
trusted library allocation
|
page read and write
|
||
4C9000
|
stack
|
page read and write
|
||
13795560000
|
heap
|
page read and write
|
||
1A0BC8F5000
|
trusted library allocation
|
page read and write
|
||
1379ED4F000
|
trusted library allocation
|
page read and write
|
||
1379FAC3000
|
trusted library allocation
|
page read and write
|
||
137A6212000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
10E2000
|
heap
|
page read and write
|
||
1379E06F000
|
trusted library allocation
|
page read and write
|
||
137A1B65000
|
trusted library allocation
|
page read and write
|
||
12E8000
|
unkown
|
page execute and read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
1A0BD226000
|
trusted library allocation
|
page read and write
|
||
49E000
|
unkown
|
page readonly
|
||
1379556F000
|
heap
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
13795566000
|
heap
|
page read and write
|
||
D62000
|
unkown
|
page readonly
|
||
13795553000
|
heap
|
page read and write
|
||
1379F603000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1379FD00000
|
trusted library allocation
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
10C4000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A025D000
|
trusted library allocation
|
page read and write
|
||
137A02A4000
|
trusted library allocation
|
page read and write
|
||
1379EA2C000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
537E000
|
stack
|
page read and write
|
||
47E0000
|
heap
|
page read and write
|
||
137A6481000
|
trusted library allocation
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
1379F500000
|
trusted library allocation
|
page read and write
|
||
137A02F4000
|
trusted library allocation
|
page read and write
|
||
1CCCE000
|
stack
|
page read and write
|
||
59C000
|
unkown
|
page execute and read and write
|
||
FAA4571000
|
trusted library allocation
|
page execute read
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
1A0BCAE8000
|
trusted library allocation
|
page read and write
|
||
1379F694000
|
trusted library allocation
|
page read and write
|
||
5F2F000
|
trusted library allocation
|
page read and write
|
||
87F0000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
137A0300000
|
trusted library allocation
|
page read and write
|
||
1379B800000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
108F000
|
stack
|
page read and write
|
||
137A0387000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
4602000
|
heap
|
page read and write
|
||
137A8F45000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1379558D000
|
heap
|
page read and write
|
||
1A0BD264000
|
trusted library allocation
|
page read and write
|
||
137A6900000
|
trusted library allocation
|
page read and write
|
||
2E4C13E000
|
stack
|
page read and write
|
||
EE9000
|
heap
|
page read and write
|
||
137A0056000
|
trusted library allocation
|
page read and write
|
||
1A0BD2AC000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A0710000
|
trusted library section
|
page readonly
|
||
137A6AEE000
|
trusted library allocation
|
page read and write
|
||
137A0353000
|
trusted library allocation
|
page read and write
|
||
35FE000
|
stack
|
page read and write
|
||
137A0B7D000
|
trusted library allocation
|
page read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
137A06BE000
|
trusted library allocation
|
page read and write
|
||
2D1000
|
unkown
|
page execute and write copy
|
||
5D5000
|
unkown
|
page execute and read and write
|
||
137A1178000
|
trusted library allocation
|
page read and write
|
||
1A0BC25F000
|
trusted library allocation
|
page read and write
|
||
1A0BF503000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
349F000
|
stack
|
page read and write
|
||
2E5377E000
|
stack
|
page read and write
|
||
1A0BC582000
|
trusted library allocation
|
page read and write
|
||
1379A8B7000
|
trusted library allocation
|
page read and write
|
||
1AADF000
|
stack
|
page read and write
|
||
1A0BEC0B000
|
trusted library allocation
|
page read and write
|
||
13795549000
|
heap
|
page read and write
|
||
687F000
|
stack
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
137A8F3C000
|
trusted library allocation
|
page read and write
|
||
1A0BF536000
|
trusted library allocation
|
page read and write
|
||
137A6100000
|
trusted library allocation
|
page read and write
|
||
1A0BD222000
|
trusted library allocation
|
page read and write
|
||
137A63E8000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
E6B51FF000
|
stack
|
page read and write
|
||
FF1000
|
unkown
|
page execute and write copy
|
||
40EE000
|
stack
|
page read and write
|
||
1379E76A000
|
trusted library allocation
|
page read and write
|
||
1379DD5B000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
1379E3E6000
|
trusted library allocation
|
page read and write
|
||
137A11AE000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
stack
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
1A0BC393000
|
trusted library allocation
|
page read and write
|
||
137A8F33000
|
trusted library allocation
|
page read and write
|
||
1379F4E2000
|
trusted library allocation
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
5B82000
|
trusted library allocation
|
page read and write
|
||
13795574000
|
heap
|
page read and write
|
||
13CF000
|
heap
|
page read and write
|
||
1A0BF80F000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
1A0BC889000
|
trusted library allocation
|
page read and write
|
||
5F1F000
|
trusted library allocation
|
page read and write
|
||
1379E962000
|
trusted library allocation
|
page read and write
|
||
137A3000000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
49FF000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1379E3B1000
|
trusted library allocation
|
page read and write
|
||
60AB000
|
trusted library allocation
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
4C6B000
|
stack
|
page read and write
|
||
13795560000
|
heap
|
page read and write
|
||
50A6000
|
trusted library allocation
|
page read and write
|
||
53FE000
|
stack
|
page read and write
|
||
10D1000
|
heap
|
page read and write
|
||
2E515FB000
|
stack
|
page read and write
|
||
137A606B000
|
trusted library allocation
|
page read and write
|
||
12EB000
|
unkown
|
page execute and write copy
|
||
1F4000
|
heap
|
page read and write
|
||
137A69B0000
|
trusted library allocation
|
page read and write
|
||
1D836B86000
|
heap
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
1CE0000
|
heap
|
page read and write
|
||
137A669A000
|
trusted library allocation
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
137A1B62000
|
trusted library allocation
|
page read and write
|
||
237E000
|
stack
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
1A0BC8E9000
|
trusted library allocation
|
page read and write
|
||
137A8FF5000
|
trusted library allocation
|
page read and write
|
||
1379A575000
|
trusted library allocation
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
1379F6FB000
|
trusted library allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
1A0BC89D000
|
trusted library allocation
|
page read and write
|
||
137A61C3000
|
trusted library allocation
|
page read and write
|
||
41CF000
|
stack
|
page read and write
|
||
1804BC7F000
|
unclassified section
|
page read and write
|
||
13F0000
|
direct allocation
|
page execute and read and write
|
||
1D836950000
|
unclassified section
|
page readonly
|
||
1A0BC1C9000
|
trusted library allocation
|
page read and write
|
||
137A6190000
|
trusted library allocation
|
page read and write
|
||
11B5000
|
unkown
|
page execute and read and write
|
||
4BB000
|
unkown
|
page execute and read and write
|
||
1379556A000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
13795546000
|
heap
|
page read and write
|
||
1379E3A7000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
direct allocation
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
BC7000
|
unkown
|
page execute and read and write
|
||
137A6308000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
F92B5563000
|
trusted library allocation
|
page read and write
|
||
1379E785000
|
trusted library allocation
|
page read and write
|
||
1804BBB3000
|
heap
|
page read and write
|
||
1379C489000
|
trusted library allocation
|
page read and write
|
||
5F60000
|
heap
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
137A69C7000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
5EF5000
|
trusted library allocation
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1B17D000
|
stack
|
page read and write
|
||
3B5F000
|
stack
|
page read and write
|
||
2311D803000
|
trusted library allocation
|
page read and write
|
||
2311D86F000
|
trusted library allocation
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
137A6089000
|
trusted library allocation
|
page read and write
|
||
137A69DC000
|
trusted library allocation
|
page read and write
|
||
16C000
|
stack
|
page read and write
|
||
E1000
|
unkown
|
page execute and write copy
|
||
1379E3BE000
|
trusted library allocation
|
page read and write
|
||
16FD000
|
heap
|
page read and write
|
||
1379E36F000
|
trusted library allocation
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
5A2E000
|
trusted library allocation
|
page read and write
|
||
137A99A8000
|
trusted library allocation
|
page read and write
|
||
137A11CA000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1A0BECCA000
|
trusted library allocation
|
page read and write
|
||
3F4F000
|
stack
|
page read and write
|
||
1379EA00000
|
trusted library allocation
|
page read and write
|
||
1A0BC1B3000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
312F000
|
stack
|
page read and write
|
||
127C000
|
unkown
|
page execute and write copy
|
||
137A63E5000
|
trusted library allocation
|
page read and write
|
||
38BE000
|
stack
|
page read and write
|
||
F92B5547000
|
trusted library allocation
|
page read and write
|
||
1379E9A2000
|
trusted library allocation
|
page read and write
|
||
1379ED41000
|
trusted library allocation
|
page read and write
|
||
13795588000
|
heap
|
page read and write
|
||
137A0C00000
|
trusted library allocation
|
page read and write
|
||
47DF000
|
stack
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
1A0BD2B0000
|
trusted library allocation
|
page read and write
|
||
13AB000
|
heap
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
E20E1EE000
|
unkown
|
page readonly
|
||
1A0BC16B000
|
trusted library allocation
|
page read and write
|
||
1379A515000
|
trusted library allocation
|
page read and write
|
||
292F5900000
|
trusted library allocation
|
page read and write
|
||
10F5000
|
stack
|
page read and write
|
||
137A91AC000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
12F3000
|
unkown
|
page execute and write copy
|
||
4B71000
|
heap
|
page read and write
|
||
137A1C0C000
|
trusted library allocation
|
page read and write
|
||
5EC71BE000
|
stack
|
page read and write
|
||
137A0374000
|
trusted library allocation
|
page read and write
|
||
1A0BF703000
|
trusted library allocation
|
page read and write
|
||
1A0BC190000
|
trusted library allocation
|
page read and write
|
||
137A91AE000
|
trusted library allocation
|
page read and write
|
||
1379FFFE000
|
trusted library allocation
|
page read and write
|
||
1A0BD262000
|
trusted library allocation
|
page read and write
|
||
2311E53D000
|
heap
|
page read and write
|
||
137A1B11000
|
trusted library allocation
|
page read and write
|
||
1379E3A7000
|
trusted library allocation
|
page read and write
|
||
137A001B000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
47B0000
|
trusted library allocation
|
page execute and read and write
|
||
5ECB37D000
|
stack
|
page read and write
|
||
10FF000
|
unkown
|
page execute and write copy
|
||
1804BC72000
|
unclassified section
|
page read and write
|
||
1804BA80000
|
unclassified section
|
page readonly
|
||
C6E000
|
unkown
|
page execute and write copy
|
||
D54000
|
heap
|
page read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
1379DF57000
|
trusted library allocation
|
page read and write
|
||
1379F9B0000
|
trusted library section
|
page readonly
|
||
EAB000
|
heap
|
page read and write
|
||
137A90A1000
|
trusted library allocation
|
page read and write
|
||
2311D491000
|
remote allocation
|
page execute read
|
||
1804BD00000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
13B8000
|
heap
|
page read and write
|
||
5ECAB7D000
|
stack
|
page read and write
|
||
137A64EA000
|
trusted library allocation
|
page read and write
|
||
1379E8A0000
|
trusted library section
|
page read and write
|
||
45A0000
|
direct allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
137A61D5000
|
trusted library allocation
|
page read and write
|
||
137A0641000
|
trusted library allocation
|
page read and write
|
||
13795572000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
59A8000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
13795510000
|
heap
|
page read and write
|
||
137A6244000
|
trusted library allocation
|
page read and write
|
||
1379BC00000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
stack
|
page read and write
|
||
137A697C000
|
trusted library allocation
|
page read and write
|
||
2311D867000
|
trusted library allocation
|
page read and write
|
||
1379DFD1000
|
trusted library allocation
|
page read and write
|
||
118F000
|
stack
|
page read and write
|
||
1A0BC510000
|
trusted library allocation
|
page read and write
|
||
1379551E000
|
heap
|
page read and write
|
||
5A2F000
|
trusted library allocation
|
page read and write
|
||
12F3000
|
unkown
|
page execute and write copy
|
||
137A1C82000
|
trusted library allocation
|
page read and write
|
||
1379FBAD000
|
trusted library allocation
|
page read and write
|
||
5A2F000
|
trusted library allocation
|
page read and write
|
||
1379C4A9000
|
trusted library allocation
|
page read and write
|
||
1A0BF396000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379FEB8000
|
trusted library allocation
|
page read and write
|
||
137A0013000
|
trusted library allocation
|
page read and write
|
||
137A053E000
|
trusted library allocation
|
page read and write
|
||
1202D8104000
|
trusted library allocation
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
137A6006000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
292F5580000
|
heap
|
page read and write
|
||
1379A500000
|
trusted library allocation
|
page read and write
|
||
13795516000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
5A2E000
|
trusted library allocation
|
page read and write
|
||
137A02D1000
|
trusted library allocation
|
page read and write
|
||
137A02F4000
|
trusted library allocation
|
page read and write
|
||
2E7E000
|
stack
|
page read and write
|
||
137A61AC000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
137A9147000
|
trusted library allocation
|
page read and write
|
||
2311E598000
|
heap
|
page read and write
|
||
137A906F000
|
trusted library allocation
|
page read and write
|
||
137A6400000
|
trusted library allocation
|
page read and write
|
||
1A0BCF08000
|
trusted library allocation
|
page read and write
|
||
137A6203000
|
trusted library allocation
|
page read and write
|
||
1379EABD000
|
trusted library allocation
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
1379E0A3000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
2E5459D000
|
stack
|
page read and write
|
||
2FE0000
|
direct allocation
|
page execute and read and write
|
||
137A01B7000
|
trusted library allocation
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
1238000
|
unkown
|
page execute and write copy
|
||
10D5000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
59E8000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
direct allocation
|
page execute and read and write
|
||
D24000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1A0BC575000
|
trusted library allocation
|
page read and write
|
||
1379EAFA000
|
trusted library allocation
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
1A0BFA7F000
|
trusted library allocation
|
page read and write
|
||
D2DABFC000
|
stack
|
page read and write
|
||
13795573000
|
heap
|
page read and write
|
||
1211000
|
unkown
|
page execute and read and write
|
||
DD4000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
45FF000
|
stack
|
page read and write
|
||
1379FFE3000
|
trusted library allocation
|
page read and write
|
||
1A0BC903000
|
trusted library allocation
|
page read and write
|
||
50CA000
|
trusted library allocation
|
page read and write
|
||
137A0383000
|
trusted library allocation
|
page read and write
|
||
13799F2A000
|
trusted library allocation
|
page read and write
|
||
2311E528000
|
heap
|
page read and write
|
||
4F20000
|
remote allocation
|
page read and write
|
||
137A11EB000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
137A6505000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
1804C340000
|
heap
|
page read and write
|
||
120F000
|
unkown
|
page execute and write copy
|
||
137A01D5000
|
trusted library allocation
|
page read and write
|
||
1A0BC2DF000
|
trusted library allocation
|
page read and write
|
||
30D7000
|
heap
|
page read and write
|
||
480000
|
unkown
|
page readonly
|
||
1379EE87000
|
trusted library allocation
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
1379C5C4000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A1BF8000
|
trusted library allocation
|
page read and write
|
||
137A0E3C000
|
trusted library allocation
|
page read and write
|
||
2E51BF9000
|
stack
|
page read and write
|
||
1D836E10000
|
trusted library allocation
|
page read and write
|
||
1804BE96000
|
trusted library allocation
|
page read and write
|
||
2E52DFE000
|
stack
|
page read and write
|
||
1379BE14000
|
trusted library allocation
|
page read and write
|
||
137A110F000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
1379E150000
|
trusted library allocation
|
page read and write
|
||
13795560000
|
heap
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
1A0BC233000
|
trusted library allocation
|
page read and write
|
||
137A1BFC000
|
trusted library allocation
|
page read and write
|
||
5F11000
|
trusted library allocation
|
page read and write
|
||
1D836F21000
|
trusted library allocation
|
page read and write
|
||
CFD000
|
stack
|
page read and write
|
||
1379FF89000
|
trusted library allocation
|
page read and write
|
||
1A0BF4B6000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
127D000
|
unkown
|
page execute and read and write
|
||
137A6239000
|
trusted library allocation
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
1379F2BE000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
59BA000
|
trusted library allocation
|
page read and write
|
||
1379F4F1000
|
trusted library allocation
|
page read and write
|
||
137A678F000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
137A1BEC000
|
trusted library allocation
|
page read and write
|
||
1379E3A7000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1B01D000
|
stack
|
page read and write
|
||
1378E3D0000
|
unclassified section
|
page readonly
|
||
12EB000
|
unkown
|
page execute and write copy
|
||
25020A804000
|
trusted library allocation
|
page read and write
|
||
137A9500000
|
trusted library allocation
|
page read and write
|
||
137A0263000
|
trusted library allocation
|
page read and write
|
||
F7F000
|
heap
|
page read and write
|
||
E57000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
137A02DB000
|
trusted library allocation
|
page read and write
|
||
1379552D000
|
heap
|
page read and write
|
||
1379B5C6000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
292F5757000
|
heap
|
page read and write
|
||
1379EE03000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
2311E4AC000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page write copy
|
||
137A02B0000
|
trusted library allocation
|
page read and write
|
||
137A69A6000
|
trusted library allocation
|
page read and write
|
||
137A0B27000
|
trusted library allocation
|
page read and write
|
||
1A0BD2FC000
|
trusted library allocation
|
page read and write
|
||
137A1103000
|
trusted library allocation
|
page read and write
|
||
452F000
|
stack
|
page read and write
|
||
1A0BC4FE000
|
trusted library allocation
|
page read and write
|
||
137A01A8000
|
trusted library allocation
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A0B6C000
|
trusted library allocation
|
page read and write
|
||
CA1000
|
unkown
|
page execute read
|
||
FF0000
|
unkown
|
page readonly
|
||
1379FF6F000
|
trusted library allocation
|
page read and write
|
||
1379E59C000
|
trusted library allocation
|
page read and write
|
||
1A0BC8CB000
|
trusted library allocation
|
page read and write
|
||
1379ED00000
|
trusted library allocation
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
13799F86000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
49D1000
|
heap
|
page read and write
|
||
1379FE7D000
|
trusted library allocation
|
page read and write
|
||
16E9000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
137A8F27000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1D836EA3000
|
trusted library allocation
|
page read and write
|
||
1379A8F5000
|
trusted library allocation
|
page read and write
|
||
167B000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A0500000
|
trusted library allocation
|
page read and write
|
||
ECD000
|
heap
|
page read and write
|
||
5892000
|
trusted library allocation
|
page read and write
|
||
5BF000
|
unkown
|
page execute and read and write
|
||
4C81000
|
heap
|
page read and write
|
||
3F0E000
|
stack
|
page read and write
|
||
2A554410000
|
heap
|
page read and write
|
||
137A903B000
|
trusted library allocation
|
page read and write
|
||
1379FF83000
|
trusted library allocation
|
page read and write
|
||
292F5774000
|
heap
|
page read and write
|
||
FAA4481000
|
trusted library allocation
|
page execute read
|
||
12FF000
|
unkown
|
page execute and read and write
|
||
1A0BC181000
|
trusted library allocation
|
page read and write
|
||
1A0BCAFD000
|
trusted library allocation
|
page read and write
|
||
137A001B000
|
trusted library allocation
|
page read and write
|
||
53B3000
|
trusted library allocation
|
page read and write
|
||
1A0BF963000
|
trusted library allocation
|
page read and write
|
||
1A0BC3C1000
|
trusted library allocation
|
page read and write
|
||
1379E790000
|
trusted library allocation
|
page read and write
|
||
4C7F000
|
stack
|
page read and write
|
||
5A43000
|
trusted library allocation
|
page read and write
|
||
5BCD000
|
trusted library allocation
|
page read and write
|
||
59CB000
|
trusted library allocation
|
page read and write
|
||
137A0F67000
|
trusted library allocation
|
page read and write
|
||
137A00C7000
|
trusted library allocation
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
137A1050000
|
trusted library allocation
|
page read and write
|
||
46DE000
|
stack
|
page read and write
|
||
1A0BF73C000
|
trusted library allocation
|
page read and write
|
||
1A0BF9DA000
|
trusted library allocation
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
137A10F6000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
10CD000
|
heap
|
page read and write
|
||
49E000
|
unkown
|
page readonly
|
||
1379E15D000
|
trusted library allocation
|
page read and write
|
||
EF4000
|
heap
|
page read and write
|
||
292F725F000
|
heap
|
page read and write
|
||
1A0BFC7C000
|
trusted library allocation
|
page read and write
|
||
192DA0C00000
|
trusted library allocation
|
page read and write
|
||
2E5389E000
|
stack
|
page read and write
|
||
137A600E000
|
trusted library allocation
|
page read and write
|
||
137A0D00000
|
trusted library allocation
|
page read and write
|
||
1379F3D4000
|
trusted library allocation
|
page read and write
|
||
137A8F45000
|
trusted library allocation
|
page read and write
|
||
1379FE1F000
|
trusted library allocation
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A6183000
|
trusted library allocation
|
page read and write
|
||
5C91000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
1A0BC103000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
13795566000
|
heap
|
page read and write
|
||
137A02C1000
|
trusted library allocation
|
page read and write
|
||
1A0BFABF000
|
trusted library allocation
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
137A8852000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
5A91000
|
trusted library allocation
|
page read and write
|
||
38D000
|
unkown
|
page execute and read and write
|
||
1378E490000
|
heap
|
page read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
1180000
|
direct allocation
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
13795522000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
11DC000
|
unkown
|
page execute and write copy
|
||
137A01A1000
|
trusted library allocation
|
page read and write
|
||
1379DC2E000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1379E3F1000
|
trusted library allocation
|
page read and write
|
||
5AED000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1379556E000
|
heap
|
page read and write
|
||
137A9053000
|
trusted library allocation
|
page read and write
|
||
1A0BCAE8000
|
trusted library allocation
|
page read and write
|
||
12ED000
|
unkown
|
page execute and read and write
|
||
530000
|
heap
|
page read and write
|
||
D9B000
|
heap
|
page read and write
|
||
5E36000
|
trusted library allocation
|
page read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
CD4000
|
heap
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
137A69E4000
|
trusted library allocation
|
page read and write
|
||
54562FE000
|
stack
|
page read and write
|
||
1379B580000
|
trusted library allocation
|
page read and write
|
||
1379E3AE000
|
trusted library allocation
|
page read and write
|
||
3D7F000
|
stack
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
137A02B4000
|
trusted library allocation
|
page read and write
|
||
13795568000
|
heap
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
137A91B1000
|
trusted library allocation
|
page read and write
|
||
137A8F5B000
|
trusted library allocation
|
page read and write
|
||
1379557A000
|
heap
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
1379ED13000
|
trusted library allocation
|
page read and write
|
||
5455ABE000
|
stack
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
137A60BC000
|
trusted library allocation
|
page read and write
|
||
1A0BCA9A000
|
trusted library allocation
|
page read and write
|
||
137A02A4000
|
trusted library allocation
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
1379EAFC000
|
trusted library allocation
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
137A61F7000
|
trusted library allocation
|
page read and write
|
||
1379A57E000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
unkown
|
page execute and write copy
|
||
2311E598000
|
heap
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
137A027B000
|
trusted library allocation
|
page read and write
|
||
1A0BFC9B000
|
trusted library allocation
|
page read and write
|
||
1378E430000
|
unclassified section
|
page readonly
|
||
137A1171000
|
trusted library allocation
|
page read and write
|
||
1379A513000
|
trusted library allocation
|
page read and write
|
||
137A60F6000
|
trusted library allocation
|
page read and write
|
||
403E000
|
stack
|
page read and write
|
||
137903E0000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1379F300000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
F92B5504000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
5F75000
|
trusted library allocation
|
page read and write
|
||
137A6AD7000
|
trusted library allocation
|
page read and write
|
||
1379FF5B000
|
trusted library allocation
|
page read and write
|
||
50E0000
|
direct allocation
|
page execute and read and write
|
||
1A0BFC4F000
|
trusted library allocation
|
page read and write
|
||
5EC697E000
|
stack
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
5EC60FC000
|
stack
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
11FE000
|
unkown
|
page execute and write copy
|
||
364E000
|
stack
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
5A9A000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
direct allocation
|
page read and write
|
||
137A61FE000
|
trusted library allocation
|
page read and write
|
||
5AA9000
|
trusted library allocation
|
page read and write
|
||
16D3000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
DFA000
|
heap
|
page read and write
|
||
B9A000
|
stack
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
137A0311000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
direct allocation
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
137A9005000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
5300000
|
direct allocation
|
page execute and read and write
|
||
1A9DE000
|
stack
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
47BE000
|
stack
|
page read and write
|
||
1379555D000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
4F30000
|
direct allocation
|
page read and write
|
||
137A0110000
|
trusted library allocation
|
page read and write
|
||
3B8F000
|
stack
|
page read and write
|
||
11F9000
|
unkown
|
page execute and write copy
|
||
137A91C1000
|
trusted library allocation
|
page read and write
|
||
1379A526000
|
trusted library allocation
|
page read and write
|
||
45B1000
|
heap
|
page read and write
|
||
137A666B000
|
trusted library allocation
|
page read and write
|
||
5A5D000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
FD0000
|
direct allocation
|
page read and write
|
||
7260000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1804BF0F000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
1379C47E000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
137A91ED000
|
trusted library allocation
|
page read and write
|
||
1379EAE9000
|
trusted library allocation
|
page read and write
|
||
1A0BC8E5000
|
trusted library allocation
|
page read and write
|
||
10E2000
|
heap
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
13795589000
|
heap
|
page read and write
|
||
1379FED3000
|
trusted library allocation
|
page read and write
|
||
4AB1000
|
heap
|
page read and write
|
||
1379E8D0000
|
trusted library section
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
13799E6D000
|
trusted library allocation
|
page read and write
|
||
1A9B4BE000
|
stack
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
1F208FE00000
|
trusted library allocation
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
13AA000
|
heap
|
page read and write
|
||
13A0003F000
|
trusted library allocation
|
page read and write
|
||
1379E7F6000
|
trusted library allocation
|
page read and write
|
||
12DD000
|
unkown
|
page execute and write copy
|
||
137A0378000
|
trusted library allocation
|
page read and write
|
||
137A0258000
|
trusted library allocation
|
page read and write
|
||
137A90AD000
|
trusted library allocation
|
page read and write
|
||
137A6A22000
|
trusted library allocation
|
page read and write
|
||
137A63F9000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
137A0600000
|
trusted library allocation
|
page read and write
|
||
2311E4DC000
|
heap
|
page read and write
|
||
5260000
|
direct allocation
|
page execute and read and write
|
||
C70000
|
unkown
|
page execute and read and write
|
||
E04000
|
heap
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
137A1CB5000
|
trusted library allocation
|
page read and write
|
||
1379A9E1000
|
trusted library allocation
|
page read and write
|
||
137A6313000
|
trusted library allocation
|
page read and write
|
||
4B1F000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
11B5000
|
unkown
|
page execute and read and write
|
||
137A6AF5000
|
trusted library allocation
|
page read and write
|
||
137A302A000
|
trusted library allocation
|
page read and write
|
||
137A009C000
|
trusted library allocation
|
page read and write
|
||
137A1B47000
|
trusted library allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
137A8803000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
2311DDB0000
|
heap
|
page read and write
|
||
464F000
|
stack
|
page read and write
|
||
1379E09A000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
137A0256000
|
trusted library allocation
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
13795566000
|
heap
|
page read and write
|
||
52ED000
|
trusted library allocation
|
page read and write
|
||
5F2F000
|
trusted library allocation
|
page read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
CD4000
|
heap
|
page read and write
|
||
115F000
|
stack
|
page read and write
|
||
137A9000000
|
trusted library allocation
|
page read and write
|
||
137A02D3000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A62C9000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
direct allocation
|
page execute and read and write
|
||
137A6116000
|
trusted library allocation
|
page read and write
|
||
2E54BDE000
|
stack
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
1A9C4FE000
|
unkown
|
page readonly
|
||
4601000
|
heap
|
page read and write
|
||
1379E3A0000
|
trusted library allocation
|
page read and write
|
||
137A02AE000
|
trusted library allocation
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
1A0B07F0000
|
heap
|
page read and write
|
||
137A92D5000
|
trusted library allocation
|
page read and write
|
||
13795566000
|
heap
|
page read and write
|
||
5A51000
|
trusted library allocation
|
page read and write
|
||
34CF000
|
stack
|
page read and write
|
||
E54000
|
heap
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
137A9191000
|
trusted library allocation
|
page read and write
|
||
137A0E4E000
|
trusted library allocation
|
page read and write
|
||
108F000
|
heap
|
page read and write
|
||
137954F0000
|
heap
|
page read and write
|
||
1379DF09000
|
trusted library allocation
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
137A0053000
|
trusted library allocation
|
page read and write
|
||
128F000
|
unkown
|
page execute and read and write
|
||
2311D910000
|
trusted library allocation
|
page read and write
|
||
4F31000
|
heap
|
page read and write
|
||
10EF000
|
unkown
|
page execute and read and write
|
||
137A1BA8000
|
trusted library allocation
|
page read and write
|
||
1379BD21000
|
trusted library allocation
|
page read and write
|
||
1379EA96000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
1238000
|
unkown
|
page execute and write copy
|
||
1379E3CE000
|
trusted library allocation
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
1D836E81000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
E20E1AE000
|
stack
|
page read and write
|
||
1379DF4C000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
1378E470000
|
heap
|
page read and write
|
||
2CFF000
|
stack
|
page read and write
|
||
1A0B2462000
|
heap
|
page read and write
|
||
137A02EC000
|
trusted library allocation
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
5A39000
|
trusted library allocation
|
page read and write
|
||
5D5000
|
unkown
|
page execute and write copy
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
1379E3CD000
|
trusted library allocation
|
page read and write
|
||
137A0503000
|
trusted library allocation
|
page read and write
|
||
1379F4D6000
|
trusted library allocation
|
page read and write
|
||
1378E450000
|
heap
|
page read and write
|
||
1A0BC1B3000
|
trusted library allocation
|
page read and write
|
||
1379E9A2000
|
trusted library allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
11D1000
|
unkown
|
page execute and read and write
|
||
1A0BC1C7000
|
trusted library allocation
|
page read and write
|
||
1379DB60000
|
trusted library section
|
page read and write
|
||
1379E380000
|
trusted library allocation
|
page read and write
|
||
13C1000
|
heap
|
page read and write
|
||
1804BC60000
|
heap
|
page read and write
|
||
49D1000
|
heap
|
page read and write
|
||
D3C000
|
unkown
|
page readonly
|
||
CD4000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1CF5D000
|
stack
|
page read and write
|
||
137A0100000
|
trusted library allocation
|
page read and write
|
||
59C4000
|
trusted library allocation
|
page read and write
|
||
1379FFEB000
|
trusted library allocation
|
page read and write
|
||
1A0B0AC0000
|
trusted library section
|
page read and write
|
||
1379DF92000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
2311E4CA000
|
heap
|
page read and write
|
||
137A0561000
|
trusted library allocation
|
page read and write
|
||
13795569000
|
heap
|
page read and write
|
||
1A0BCE00000
|
trusted library allocation
|
page read and write
|
||
1A0BC947000
|
trusted library allocation
|
page read and write
|
||
137A00FC000
|
trusted library allocation
|
page read and write
|
||
1379BF17000
|
trusted library allocation
|
page read and write
|
||
47AF000
|
stack
|
page read and write
|
||
137A916A000
|
trusted library allocation
|
page read and write
|
||
E20FBFE000
|
stack
|
page read and write
|
||
86E000
|
stack
|
page read and write
|
||
137A637B000
|
trusted library allocation
|
page read and write
|
||
1379E7FB000
|
trusted library allocation
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
6AB000
|
unkown
|
page execute and read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
B8D000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
1379E9A2000
|
trusted library allocation
|
page read and write
|
||
2A554707000
|
trusted library allocation
|
page read and write
|
||
A30000
|
unkown
|
page readonly
|
||
7C6000
|
unkown
|
page execute and write copy
|
||
1379EAA3000
|
trusted library allocation
|
page read and write
|
||
1A0BC8ED000
|
trusted library allocation
|
page read and write
|
||
2E4F5FE000
|
stack
|
page read and write
|
||
1379FB00000
|
trusted library allocation
|
page read and write
|
||
16A8000
|
heap
|
page read and write
|
||
3A80000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
13C1000
|
heap
|
page read and write
|
||
F6A000
|
heap
|
page read and write
|
||
1D836E0B000
|
trusted library allocation
|
page read and write
|
||
5EC3DD8000
|
stack
|
page read and write
|
||
1379E962000
|
trusted library allocation
|
page read and write
|
||
33E000
|
unkown
|
page execute and read and write
|
||
4F31000
|
heap
|
page read and write
|
||
1379556F000
|
heap
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
3E2F000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
2311E56D000
|
heap
|
page read and write
|
||
1379B701000
|
trusted library allocation
|
page read and write
|
||
1049000
|
unkown
|
page write copy
|
||
1379F6EF000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
direct allocation
|
page read and write
|
||
292F725E000
|
heap
|
page read and write
|
||
13795574000
|
heap
|
page read and write
|
||
3F6F000
|
stack
|
page read and write
|
||
137A6193000
|
trusted library allocation
|
page read and write
|
||
1379E003000
|
trusted library allocation
|
page read and write
|
||
13795547000
|
heap
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
1804BF1C000
|
trusted library allocation
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
137A8F4F000
|
trusted library allocation
|
page read and write
|
||
2311D6D0000
|
heap
|
page read and write
|
||
1379B7FC000
|
trusted library allocation
|
page read and write
|
||
95E000
|
unkown
|
page execute and write copy
|
||
45A0000
|
direct allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
1379EAA3000
|
trusted library allocation
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
13795567000
|
heap
|
page read and write
|
||
44FF000
|
stack
|
page read and write
|
||
1379042A000
|
heap
|
page read and write
|
||
140F000
|
stack
|
page read and write
|
||
31AF000
|
stack
|
page read and write
|
||
13795537000
|
heap
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
1ADCE000
|
stack
|
page read and write
|
||
1A0BC8D3000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
137A1BB1000
|
trusted library allocation
|
page read and write
|
||
45A0000
|
direct allocation
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
1A0BFCB2000
|
trusted library allocation
|
page read and write
|
||
1D836B80000
|
heap
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
137A6280000
|
trusted library allocation
|
page read and write
|
||
5AA0000
|
trusted library allocation
|
page read and write
|
||
4DF0000
|
direct allocation
|
page execute and read and write
|
||
5570000
|
direct allocation
|
page execute and read and write
|
||
137954E0000
|
heap
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
1379EAB9000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
137A88D5000
|
trusted library allocation
|
page read and write
|
||
39BF000
|
stack
|
page read and write
|
||
137A0362000
|
trusted library allocation
|
page read and write
|
||
CF5000
|
stack
|
page read and write
|
||
1A0BD213000
|
trusted library allocation
|
page read and write
|
||
137A0E5E000
|
trusted library allocation
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379FDE1000
|
trusted library allocation
|
page read and write
|
||
76D000
|
unkown
|
page execute and read and write
|
||
137A0570000
|
trusted library allocation
|
page read and write
|
||
1A0BC4FB000
|
trusted library allocation
|
page read and write
|
||
1379C5E2000
|
trusted library allocation
|
page read and write
|
||
1379E9CB000
|
trusted library allocation
|
page read and write
|
||
1379FF6D000
|
trusted library allocation
|
page read and write
|
||
13795553000
|
heap
|
page read and write
|
||
1CB4E000
|
stack
|
page read and write
|
||
1379DD73000
|
trusted library allocation
|
page read and write
|
||
5D75000
|
trusted library allocation
|
page read and write
|
||
13799E42000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
D24000
|
heap
|
page read and write
|
||
1379EAB0000
|
trusted library allocation
|
page read and write
|
||
13799FEF000
|
trusted library allocation
|
page read and write
|
||
1379F10E000
|
trusted library allocation
|
page read and write
|
||
1379C4D7000
|
trusted library allocation
|
page read and write
|
||
137A8F47000
|
trusted library allocation
|
page read and write
|
||
13799FE3000
|
trusted library allocation
|
page read and write
|
||
137A00A5000
|
trusted library allocation
|
page read and write
|
||
6CDE000
|
stack
|
page read and write
|
||
391E000
|
stack
|
page read and write
|
||
1379F6C1000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
52C0000
|
direct allocation
|
page execute and read and write
|
||
1379FF7C000
|
trusted library allocation
|
page read and write
|
||
B35000
|
stack
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
16BB000
|
heap
|
page read and write
|
||
1A0BF928000
|
trusted library allocation
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
137A01A1000
|
trusted library allocation
|
page read and write
|
||
2311E53D000
|
heap
|
page read and write
|
||
137A01B0000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1804BE10000
|
trusted library allocation
|
page read and write
|
||
1A0B07D0000
|
heap
|
page read and write
|
||
137A8813000
|
trusted library allocation
|
page read and write
|
||
1A0BD27E000
|
trusted library allocation
|
page read and write
|
||
5A4F000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
5E3C000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
5A53000
|
trusted library allocation
|
page read and write
|
||
2311E531000
|
heap
|
page read and write
|
||
87EC000
|
stack
|
page read and write
|
||
2E553DF000
|
stack
|
page read and write
|
||
137A11A7000
|
trusted library allocation
|
page read and write
|
||
1379EA4C000
|
trusted library allocation
|
page read and write
|
||
137A06CE000
|
trusted library allocation
|
page read and write
|
||
137A6603000
|
trusted library allocation
|
page read and write
|
||
1A0BC403000
|
trusted library allocation
|
page read and write
|
||
2E51DFA000
|
stack
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
484E000
|
stack
|
page read and write
|
||
1379C43C000
|
trusted library allocation
|
page read and write
|
||
1209F4C04000
|
trusted library allocation
|
page read and write
|
||
1379FE53000
|
trusted library allocation
|
page read and write
|
||
1379FFC9000
|
trusted library allocation
|
page read and write
|
||
5456AFE000
|
unkown
|
page readonly
|
||
137A66A4000
|
trusted library allocation
|
page read and write
|
||
10D8000
|
heap
|
page read and write
|
||
137A0E00000
|
trusted library allocation
|
page read and write
|
||
1379FAC3000
|
trusted library allocation
|
page read and write
|
||
1379C474000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
unkown
|
page execute and read and write
|
||
129D000
|
unkown
|
page execute and write copy
|
||
137A6403000
|
trusted library allocation
|
page read and write
|
||
137A0388000
|
trusted library allocation
|
page read and write
|
||
5A48000
|
trusted library allocation
|
page read and write
|
||
39CF000
|
stack
|
page read and write
|
||
1379E974000
|
trusted library allocation
|
page read and write
|
||
1379F3D2000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
59BB000
|
trusted library allocation
|
page read and write
|
||
1A0BC5D7000
|
trusted library allocation
|
page read and write
|
||
137A003B000
|
trusted library allocation
|
page read and write
|
||
5EC817E000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
2311E528000
|
heap
|
page read and write
|
||
1367000
|
heap
|
page read and write
|
||
1A0BC39F000
|
trusted library allocation
|
page read and write
|
||
1D0EE000
|
stack
|
page read and write
|
||
5ECC89E000
|
stack
|
page read and write
|
||
1066000
|
heap
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
DD4000
|
heap
|
page read and write
|
||
13799EC7000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
1A0BC5C9000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
40AF000
|
stack
|
page read and write
|
||
137A0187000
|
trusted library allocation
|
page read and write
|
||
1379551C000
|
heap
|
page read and write
|
||
D70000
|
unkown
|
page write copy
|
||
1379EA8F000
|
trusted library allocation
|
page read and write
|
||
5A97000
|
trusted library allocation
|
page read and write
|
||
1379FAFC000
|
trusted library allocation
|
page read and write
|
||
13795530000
|
heap
|
page read and write
|
||
4C81000
|
heap
|
page read and write
|
||
10D6000
|
heap
|
page read and write
|
||
137A62C5000
|
trusted library allocation
|
page read and write
|
||
137A9260000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
direct allocation
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
137A6240000
|
trusted library allocation
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
10E8000
|
unkown
|
page execute and read and write
|
||
1379552E000
|
heap
|
page read and write
|
||
5E39000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
5B11000
|
trusted library allocation
|
page read and write
|
||
137A9188000
|
trusted library allocation
|
page read and write
|
||
52E000
|
heap
|
page read and write
|
||
1379557A000
|
heap
|
page read and write
|
||
1379EA85000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1379FDCD000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
137A0193000
|
trusted library allocation
|
page read and write
|
||
388F000
|
stack
|
page read and write
|
||
13795560000
|
heap
|
page read and write
|
||
E20E12D000
|
stack
|
page read and write
|
||
3BAF000
|
stack
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
1379557D000
|
heap
|
page read and write
|
||
1A0BF815000
|
trusted library allocation
|
page read and write
|
||
137A8F5B000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
4C70000
|
direct allocation
|
page read and write
|
||
1A0BF675000
|
trusted library allocation
|
page read and write
|
||
59D0000
|
trusted library allocation
|
page read and write
|
||
E4B000
|
heap
|
page read and write
|
||
38864341E000
|
trusted library allocation
|
page read and write
|
||
BDB000
|
stack
|
page read and write
|
||
12A6000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
5B33000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
direct allocation
|
page read and write
|
||
137A6239000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
direct allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1379DBB0000
|
trusted library section
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
1379F982000
|
unclassified section
|
page read and write
|
||
528C000
|
stack
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
1379BD03000
|
trusted library allocation
|
page read and write
|
||
C6A000
|
unkown
|
page execute and write copy
|
||
137A62B5000
|
trusted library allocation
|
page read and write
|
||
E2D000
|
heap
|
page read and write
|
||
1A0BF500000
|
trusted library allocation
|
page read and write
|
||
13795569000
|
heap
|
page read and write
|
||
1379EAA8000
|
trusted library allocation
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
137A1B98000
|
trusted library allocation
|
page read and write
|
||
2311E52F000
|
heap
|
page read and write
|
||
1379E10E000
|
trusted library allocation
|
page read and write
|
||
59C3000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
direct allocation
|
page read and write
|
||
409E000
|
stack
|
page read and write
|
||
2311E4F9000
|
heap
|
page read and write
|
||
E4B000
|
unkown
|
page execute and read and write
|
||
725E000
|
heap
|
page read and write
|
||
1D836B40000
|
heap
|
page read and write
|
||
13795583000
|
heap
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
1A0BEC26000
|
trusted library allocation
|
page read and write
|
||
137A9194000
|
trusted library allocation
|
page read and write
|
||
554F000
|
stack
|
page read and write
|
||
137A02B4000
|
trusted library allocation
|
page read and write
|
||
137A6A46000
|
trusted library allocation
|
page read and write
|
||
4B71000
|
heap
|
page read and write
|
||
E20E16E000
|
unkown
|
page readonly
|
||
5E36000
|
trusted library allocation
|
page read and write
|
||
7C5000
|
unkown
|
page execute and write copy
|
||
1348000
|
heap
|
page read and write
|
||
1379FCD9000
|
trusted library allocation
|
page read and write
|
||
E04000
|
heap
|
page read and write
|
||
2311E532000
|
heap
|
page read and write
|
||
400F000
|
stack
|
page read and write
|
||
10D1000
|
heap
|
page read and write
|
||
137A6197000
|
trusted library allocation
|
page read and write
|
||
1379F2B8000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
137A1100000
|
trusted library allocation
|
page read and write
|
||
2311DDD1000
|
heap
|
page read and write
|
||
13795574000
|
heap
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
137A61ED000
|
trusted library allocation
|
page read and write
|
||
137A69B0000
|
trusted library allocation
|
page read and write
|
||
1A0BCAA4000
|
trusted library allocation
|
page read and write
|
||
3FFE000
|
stack
|
page read and write
|
||
1379E36F000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
1379F401000
|
trusted library allocation
|
page read and write
|
||
137A1095000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
unkown
|
page execute and write copy
|
||
1804BE12000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
heap
|
page read and write
|
||
1379B7C9000
|
trusted library allocation
|
page read and write
|
||
43CF000
|
stack
|
page read and write
|
||
CD4000
|
heap
|
page read and write
|
||
137A0F5C000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
heap
|
page read and write
|
||
5A40000
|
trusted library allocation
|
page read and write
|
||
1379A42F000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4B6F000
|
stack
|
page read and write
|
||
4601000
|
heap
|
page read and write
|
||
16D3000
|
heap
|
page read and write
|
||
137A61D5000
|
trusted library allocation
|
page read and write
|
||
1A0BC1C2000
|
trusted library allocation
|
page read and write
|
||
BEF000
|
stack
|
page read and write
|
There are 6901 hidden memdumps, click here to show them.