Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\freebl3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\mozglue.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\nss3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\softokn3.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\freebl3[1].dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\mozglue[1].dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\nss3[1].dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\num[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001066001\2ffb915ad7.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001068001\3cfbb3a6fb.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001069001\num.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\7X9P2VGBRHETX32KDN8MJ2HFVKS2ST.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\D9O67IRBWGRZW0D1WOATN0GX8KUC.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\DIKGVVY9JNEBJRBXL.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\KOVSL46NUOT22BPKOXPHV6NAC5.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RIHOEX26J337XMDAUSF1C246W.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\VU8MX8J5A37EO7MMQ3BQL.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\ProgramData\DAKFCGIJKJKFHIDHIIIEBGCBFB
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version
2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\ProgramData\EHJDGHJDBFIJKECAECAFBAKKEG
|
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version
2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
|
dropped
|
||
C:\ProgramData\FBGHIIJD
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie
0x21, schema 4, UTF-8, version-valid-for 3
|
dropped
|
||
C:\ProgramData\FCBFBGDB
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie
0x36, schema 4, UTF-8, version-valid-for 8
|
dropped
|
||
C:\ProgramData\FIJDGIJJKEGIEBGCGDHCFIDAAE
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8,
version-valid-for 7
|
dropped
|
||
C:\ProgramData\GCBKECAKFBGCAKECGIEH
|
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie
0xe, schema 4, UTF-8, version-valid-for 1
|
dropped
|
||
C:\ProgramData\JEBKKEGDBFIIEBFHIEHC
|
ASCII text, with very long lines (1743), with CRLF line terminators
|
dropped
|
||
C:\ProgramData\KJJKEBGHJKFIDGCAAFCAFCBAKF
|
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8,
version-valid-for 4
|
dropped
|
||
C:\ProgramData\msvcp140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\vcruntime140.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\D9O67IRBWGRZW0D1WOATN0GX8KUC.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DIKGVVY9JNEBJRBXL.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\msvcp140[1].dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcruntime140[1].dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs-1.js
|
ASCII text, with very long lines (1743), with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1743), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
|
dropped
|
||
C:\Windows\Tasks\skotes.job
|
data
|
dropped
|
There are 40 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\RIHOEX26J337XMDAUSF1C246W.exe
|
"C:\Users\user\AppData\Local\Temp\RIHOEX26J337XMDAUSF1C246W.exe"
|
||
C:\Users\user\AppData\Local\Temp\7X9P2VGBRHETX32KDN8MJ2HFVKS2ST.exe
|
"C:\Users\user\AppData\Local\Temp\7X9P2VGBRHETX32KDN8MJ2HFVKS2ST.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
|
||
C:\Users\user\AppData\Local\Temp\DIKGVVY9JNEBJRBXL.exe
|
"C:\Users\user\AppData\Local\Temp\DIKGVVY9JNEBJRBXL.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\1001066001\2ffb915ad7.exe
|
"C:\Users\user\AppData\Local\Temp\1001066001\2ffb915ad7.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001066001\2ffb915ad7.exe
|
"C:\Users\user\AppData\Local\Temp\1001066001\2ffb915ad7.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001068001\3cfbb3a6fb.exe
|
"C:\Users\user\AppData\Local\Temp\1001068001\3cfbb3a6fb.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001069001\num.exe
|
"C:\Users\user\AppData\Local\Temp\1001069001\num.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001066001\2ffb915ad7.exe
|
"C:\Users\user\AppData\Local\Temp\1001066001\2ffb915ad7.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001068001\3cfbb3a6fb.exe
|
"C:\Users\user\AppData\Local\Temp\1001068001\3cfbb3a6fb.exe"
|
||
C:\Users\user\AppData\Local\Temp\VU8MX8J5A37EO7MMQ3BQL.exe
|
"C:\Users\user\AppData\Local\Temp\VU8MX8J5A37EO7MMQ3BQL.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001069001\num.exe
|
"C:\Users\user\AppData\Local\Temp\1001069001\num.exe"
|
||
C:\Users\user\AppData\Local\Temp\KOVSL46NUOT22BPKOXPHV6NAC5.exe
|
"C:\Users\user\AppData\Local\Temp\KOVSL46NUOT22BPKOXPHV6NAC5.exe"
|
||
C:\Users\user\AppData\Local\Temp\D9O67IRBWGRZW0D1WOATN0GX8KUC.exe
|
"C:\Users\user\AppData\Local\Temp\D9O67IRBWGRZW0D1WOATN0GX8KUC.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2180 -parentBuildID 20230927232528 -prefsHandle 2072
-prefMapHandle 2068 -prefsLen 25308 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {0b4faddb-860d-4b71-a829-afd66ea2d4d8} 7308 "\\.\pipe\gecko-crash-server-pipe.7308" 1ee1ea6df10 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4224 -parentBuildID 20230927232528 -prefsHandle 3972
-prefMapHandle 4020 -prefsLen 26338 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c6cd9aed-375f-4196-afd9-d6d064195543}
7308 "\\.\pipe\gecko-crash-server-pipe.7308" 1ee31012010 rdd
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 24 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/0d60be0de163924d/nss3.dll
|
185.215.113.37
|
||
dissapoiznw.store
|
|||
https://steamcommunity.com/profiles/76561199724331900
|
104.102.49.254
|
||
https://www.cloudflare.com/learning/access-management/phishing-attack/
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
http://detectportal.firefox.com/
|
unknown
|
||
http://185.215.113.37/0d60be0de163924d/vcruntime140.dllmGI
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://sergei-esenin.com/
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://www.gstatic.cn/recaptcha/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=UuGFpt56D9L4&l=
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
|
unknown
|
||
https://spocs.getpocket.com/spocs
|
unknown
|
||
https://screenshots.firefox.com
|
unknown
|
||
https://ads.stickyadstv.com/firefox-etp
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://profiler.firefox.com/
|
unknown
|
||
https://sergei-esenin.com/api2a
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpfGb
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpRb2
|
unknown
|
||
https://developer.mozilla.org/docs/Web/API/Element/releasePointerCaptureRequest
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.php3cb
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://ok.ru/
|
unknown
|
||
https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windowsThe
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1&
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://lv.queniujq.cn
|
unknown
|
||
https://www.cloudflare.com/5xx-error-landing
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=qYlgdgWOD4Ng&
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
|
unknown
|
||
https://www.bbc.co.uk/
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
|
unknown
|
||
https://checkout.steampowered.com/
|
unknown
|
||
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
|
unknown
|
||
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://www.iqiyi.com/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=KkhJqW2NGKiM&l=engli
|
unknown
|
||
https://sergei-esenin.com/apiNT
|
unknown
|
||
https://sergei-esenin.com/.of
|
unknown
|
||
https://sergei-esenin.com/apiaNT
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
|
unknown
|
||
https://help.steampowered.com/en/
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
http://185.215.113.16/off/def.exeSerq
|
unknown
|
||
http://185.215.113.16/steam/random.exen
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v=
|
unknown
|
||
http://185.215.113.16/steam/random.exet
|
unknown
|
||
https://monitor.firefox.com/about
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=bOP7RorZq4_W&l=englis
|
unknown
|
||
https://broadcast.st.dl.eccdnx.com
|
unknown
|
||
https://developer.mozilla.org/docs/Web/API/Push_API/Using_the_Push_API#Encryptiondocument.requestSto
|
unknown
|
||
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v
|
unknown
|
||
https://www.zhihu.com/
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://185.215.113.37e2b1563c6670f193.phption:
|
unknown
|
||
https://duckduckgo.com/?t=ffab&q=
|
unknown
|
||
https://steamcommunity.com/workshop/
|
unknown
|
||
https://support.mozilla.org/products/firefoxgro.all
|
unknown
|
||
https://bathdoomgaz.store:443/api/a
|
unknown
|
||
https://spirittunek.store:443/apiJ
|
unknown
|
||
https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=gNE3gksLVEVa&l=en
|
unknown
|
||
https://www.google.com/complete/searchc1a6845f-015e-4e67-bc64-6e39a843643f9e73a342-4e27-4e9f-8a29-be
|
unknown
|
||
https://contile.services.mozilla.com/v1/tiles
|
unknown
|
||
https://www.amazon.co.uk/
|
unknown
|
||
https://monitor.firefox.com/user/preferences
|
unknown
|
||
https://screenshots.firefox.com/
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
|
unknown
|
||
http://mozilla.org/Q
|
unknown
|
||
https://www.wykop.pl/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/css/skin_1/fatalerror.css?v=wctRWaBvNt2z&l=e
|
unknown
|
||
https://vk.com/
|
unknown
|
||
https://steamcommunity.com
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=Ff_1prscqzeu&
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingTrying
|
unknown
|
||
https://mobbipenju.store:443/api
|
unknown
|
||
https://www.olx.pl/
|
unknown
|
||
http://185.215.113.16/steam/random.exe5
|
unknown
|
||
https://xhr.spec.whatwg.org/#sync-warningThe
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
steamcommunity.com
|
104.102.49.254
|
||
sergei-esenin.com
|
104.21.53.8
|
||
spirittunek.store
|
unknown
|
||
licendfilteo.site
|
unknown
|
||
eaglepawnoy.store
|
unknown
|
||
bathdoomgaz.store
|
unknown
|
||
studennotediw.store
|
unknown
|
||
mobbipenju.store
|
unknown
|
||
clearancek.site
|
unknown
|
||
dissapoiznw.store
|
unknown
|
||
example.org
|
93.184.215.14
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
ipv4only.arpa
|
192.0.0.171
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
142.250.181.238
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
There are 15 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.53.8
|
sergei-esenin.com
|
United States
|
||
185.215.113.43
|
unknown
|
Portugal
|
||
185.215.113.37
|
unknown
|
Portugal
|
||
104.102.49.254
|
steamcommunity.com
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
142.250.181.238
|
youtube.com
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
prod.ads.prod.webservices.mozgcp.net
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
2ffb915ad7.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
3cfbb3a6fb.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
num.exe
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
There are 10 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
251000
|
unkown
|
page execute and read and write
|
||
531000
|
unkown
|
page execute and read and write
|
||
5040000
|
direct allocation
|
page read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
251000
|
unkown
|
page execute and read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
CE1000
|
unkown
|
page execute and read and write
|
||
8B1000
|
unkown
|
page execute and write copy
|
||
145E000
|
heap
|
page read and write
|
||
1137000
|
heap
|
page read and write
|
||
8B1000
|
unkown
|
page execute and write copy
|
||
4EE0000
|
direct allocation
|
page read and write
|
||
531000
|
unkown
|
page execute and read and write
|
||
12CE000
|
heap
|
page read and write
|
||
8B1000
|
unkown
|
page execute and write copy
|
||
4A50000
|
direct allocation
|
page read and write
|
||
5070000
|
direct allocation
|
page read and write
|
||
8B1000
|
unkown
|
page execute and write copy
|
||
5020000
|
direct allocation
|
page read and write
|
||
4B40000
|
trusted library allocation
|
page read and write
|
||
1EE36C80000
|
trusted library allocation
|
page read and write
|
||
1EE25793000
|
heap
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
1EE2A143000
|
trusted library allocation
|
page read and write
|
||
1EE25793000
|
heap
|
page read and write
|
||
23AB0D0A000
|
trusted library allocation
|
page read and write
|
||
1EE30E00000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE3077F000
|
trusted library allocation
|
page read and write
|
||
347E000
|
stack
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
1D524000
|
heap
|
page read and write
|
||
1EE311A7000
|
trusted library allocation
|
page read and write
|
||
1EE310D2000
|
trusted library allocation
|
page read and write
|
||
1621000
|
heap
|
page read and write
|
||
11AB000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE369F8000
|
trusted library allocation
|
page read and write
|
||
93B000
|
unkown
|
page execute and write copy
|
||
1EE313C6000
|
trusted library allocation
|
page read and write
|
||
AF9E9FE000
|
stack
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
1EE30996000
|
trusted library allocation
|
page read and write
|
||
D37000
|
heap
|
page read and write
|
||
1EE309A4000
|
trusted library allocation
|
page read and write
|
||
1EE301AB000
|
trusted library allocation
|
page read and write
|
||
403F000
|
stack
|
page read and write
|
||
4451000
|
heap
|
page read and write
|
||
260AA423000
|
heap
|
page read and write
|
||
57C000
|
unkown
|
page execute and read and write
|
||
1EE36C8B000
|
trusted library allocation
|
page read and write
|
||
602000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
260A9CE0000
|
heap
|
page read and write
|
||
1EE30103000
|
trusted library allocation
|
page read and write
|
||
1EE30A9B000
|
trusted library allocation
|
page read and write
|
||
1EE2574F000
|
heap
|
page read and write
|
||
5EB8000
|
trusted library allocation
|
page read and write
|
||
1EE36B03000
|
trusted library allocation
|
page read and write
|
||
2B49AA31000
|
trusted library allocation
|
page execute read
|
||
260A93D0000
|
unclassified section
|
page readonly
|
||
45C1000
|
heap
|
page read and write
|
||
1EE30BD2000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
615000
|
heap
|
page read and write
|
||
599000
|
unkown
|
page write copy
|
||
1EE38C00000
|
trusted library allocation
|
page read and write
|
||
1EE313EE000
|
trusted library allocation
|
page read and write
|
||
528F000
|
trusted library allocation
|
page read and write
|
||
17F37C66000
|
trusted library allocation
|
page read and write
|
||
961000
|
unkown
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE2DC03000
|
trusted library allocation
|
page read and write
|
||
992000
|
unkown
|
page read and write
|
||
C2C000
|
unkown
|
page execute and write copy
|
||
5589000
|
trusted library allocation
|
page read and write
|
||
50A0000
|
direct allocation
|
page execute and read and write
|
||
5B3B000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1EE2EC57000
|
trusted library allocation
|
page read and write
|
||
1EE2E5CD000
|
trusted library allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
511140E000
|
stack
|
page read and write
|
||
5AF7000
|
trusted library allocation
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
379F000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1EE2DAB7000
|
trusted library allocation
|
page read and write
|
||
1EE25736000
|
heap
|
page read and write
|
||
3DBF000
|
stack
|
page read and write
|
||
1EE33608000
|
trusted library allocation
|
page read and write
|
||
5611000
|
trusted library allocation
|
page read and write
|
||
52B7000
|
trusted library allocation
|
page read and write
|
||
7B80000
|
heap
|
page read and write
|
||
1EE30AF0000
|
trusted library allocation
|
page read and write
|
||
1EE2DAB4000
|
trusted library allocation
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
29697000
|
heap
|
page read and write
|
||
1EE2BB37000
|
trusted library allocation
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
493E000
|
stack
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE300CB000
|
trusted library allocation
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
1EE3687C000
|
trusted library allocation
|
page read and write
|
||
1EE2BAB2000
|
trusted library allocation
|
page read and write
|
||
5615000
|
trusted library allocation
|
page read and write
|
||
1EE30144000
|
trusted library allocation
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
1EE302E4000
|
trusted library allocation
|
page read and write
|
||
1EE30BEC000
|
trusted library allocation
|
page read and write
|
||
1EE309A0000
|
trusted library allocation
|
page read and write
|
||
1EE30A20000
|
trusted library allocation
|
page read and write
|
||
5B46000
|
trusted library allocation
|
page read and write
|
||
23AB0B00000
|
trusted library allocation
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
1EE38C78000
|
trusted library allocation
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
3991000
|
heap
|
page read and write
|
||
1EE30BCF000
|
trusted library allocation
|
page read and write
|
||
1EE31285000
|
trusted library allocation
|
page read and write
|
||
17F37946000
|
heap
|
page read and write
|
||
1EE2579E000
|
heap
|
page read and write
|
||
271000
|
unkown
|
page execute and write copy
|
||
2B49A9C1000
|
trusted library allocation
|
page execute read
|
||
1134000
|
heap
|
page read and write
|
||
1EE3174C000
|
trusted library allocation
|
page read and write
|
||
1EE2578F000
|
heap
|
page read and write
|
||
452000
|
unkown
|
page execute and read and write
|
||
1D54C000
|
heap
|
page read and write
|
||
1EE36C7B000
|
trusted library allocation
|
page read and write
|
||
1EE305EB000
|
trusted library allocation
|
page read and write
|
||
1EE2F3F3000
|
trusted library allocation
|
page read and write
|
||
38EF000
|
stack
|
page read and write
|
||
6002000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
5283000
|
trusted library allocation
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
1EE305F6000
|
trusted library allocation
|
page read and write
|
||
1EE32110000
|
trusted library allocation
|
page read and write
|
||
1EE2F3B8000
|
trusted library allocation
|
page read and write
|
||
1EE306AF000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
52B1000
|
trusted library allocation
|
page read and write
|
||
1D524000
|
heap
|
page read and write
|
||
52C9000
|
trusted library allocation
|
page read and write
|
||
1EE310CC000
|
trusted library allocation
|
page read and write
|
||
5118A3F000
|
stack
|
page read and write
|
||
52BB000
|
trusted library allocation
|
page read and write
|
||
4F60000
|
direct allocation
|
page execute and read and write
|
||
1EE2FFB8000
|
trusted library allocation
|
page read and write
|
||
270000
|
unkown
|
page readonly
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
1EE2F614000
|
trusted library allocation
|
page read and write
|
||
52FA000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
56BB000
|
trusted library allocation
|
page read and write
|
||
4F67000
|
trusted library allocation
|
page execute and read and write
|
||
17F37794000
|
remote allocation
|
page execute read
|
||
260AA4A7000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE368E8000
|
trusted library allocation
|
page read and write
|
||
1EE3095F000
|
trusted library allocation
|
page read and write
|
||
1643000
|
heap
|
page read and write
|
||
1EE30BD2000
|
trusted library allocation
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
5587000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
101B000
|
heap
|
page read and write
|
||
1EE2DAF9000
|
trusted library allocation
|
page read and write
|
||
115C000
|
heap
|
page read and write
|
||
1EE203B0000
|
heap
|
page read and write
|
||
1EE257A6000
|
heap
|
page read and write
|
||
4C1000
|
unkown
|
page execute and read and write
|
||
1410000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
1EE30860000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
1EE2A71E000
|
trusted library allocation
|
page read and write
|
||
DB117FF000
|
stack
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE30C1F000
|
trusted library allocation
|
page read and write
|
||
5DE5000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
5693000
|
trusted library allocation
|
page read and write
|
||
1EE2F903000
|
trusted library allocation
|
page read and write
|
||
6F8DD000
|
unkown
|
page readonly
|
||
1B65D000
|
stack
|
page read and write
|
||
98E000
|
unkown
|
page execute and write copy
|
||
5BDE000
|
trusted library allocation
|
page read and write
|
||
5AD7000
|
trusted library allocation
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
260A9712000
|
trusted library allocation
|
page read and write
|
||
260AA498000
|
heap
|
page read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
1EE368B5000
|
trusted library allocation
|
page read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
1EE2F424000
|
trusted library allocation
|
page read and write
|
||
1D53E000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
52D1000
|
trusted library allocation
|
page read and write
|
||
548D000
|
stack
|
page read and write
|
||
5EBC000
|
trusted library allocation
|
page read and write
|
||
1EE2A7B9000
|
trusted library allocation
|
page read and write
|
||
1EE3688C000
|
trusted library allocation
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
52D3000
|
trusted library allocation
|
page read and write
|
||
1EE2A098000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
1EE2A003000
|
trusted library allocation
|
page read and write
|
||
1EE38B88000
|
trusted library allocation
|
page read and write
|
||
1EE2F403000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
646000
|
heap
|
page read and write
|
||
2D1E000
|
stack
|
page read and write
|
||
7AA000
|
unkown
|
page execute and write copy
|
||
1027000
|
heap
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
260A97C6000
|
trusted library allocation
|
page read and write
|
||
1EE309F0000
|
trusted library allocation
|
page read and write
|
||
260A9F00000
|
trusted library allocation
|
page read and write
|
||
1EE368E4000
|
trusted library allocation
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
1EE2E61F000
|
trusted library allocation
|
page read and write
|
||
5080000
|
direct allocation
|
page execute and read and write
|
||
4BF000
|
unkown
|
page execute and write copy
|
||
1EE2F3AA000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
direct allocation
|
page read and write
|
||
4E1000
|
unkown
|
page execute and write copy
|
||
260AA431000
|
heap
|
page read and write
|
||
529B000
|
trusted library allocation
|
page read and write
|
||
FCB000
|
heap
|
page read and write
|
||
1EE2F9DE000
|
trusted library allocation
|
page read and write
|
||
1EE3130F000
|
trusted library allocation
|
page read and write
|
||
1EE31228000
|
trusted library allocation
|
page read and write
|
||
1EE25741000
|
heap
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
3E44D5D000
|
stack
|
page read and write
|
||
1EE2DAE0000
|
trusted library allocation
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
1EE317D5000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1D502000
|
heap
|
page read and write
|
||
1EE3136C000
|
trusted library allocation
|
page read and write
|
||
EFD000
|
stack
|
page read and write
|
||
4FF0000
|
heap
|
page execute and read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
5AD7000
|
trusted library allocation
|
page read and write
|
||
1EE1EAF0000
|
trusted library allocation
|
page read and write
|
||
1EE3360A000
|
trusted library allocation
|
page read and write
|
||
5DB4000
|
trusted library allocation
|
page read and write
|
||
1EE36918000
|
trusted library allocation
|
page read and write
|
||
1EE25787000
|
heap
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE30CA7000
|
trusted library allocation
|
page read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
52AC000
|
trusted library allocation
|
page read and write
|
||
1BA3F000
|
stack
|
page read and write
|
||
1EE309FC000
|
trusted library allocation
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
573000
|
unkown
|
page execute and write copy
|
||
1EE30887000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE3098F000
|
trusted library allocation
|
page read and write
|
||
1EE321E6000
|
trusted library allocation
|
page read and write
|
||
6C800000
|
unkown
|
page read and write
|
||
1EE2F662000
|
trusted library allocation
|
page read and write
|
||
52D000
|
unkown
|
page execute and write copy
|
||
1EE38B64000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1EE30AAF000
|
trusted library allocation
|
page read and write
|
||
1EE25765000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
60FF000
|
trusted library allocation
|
page read and write
|
||
5EB3000
|
trusted library allocation
|
page read and write
|
||
260A9C70000
|
trusted library allocation
|
page read and write
|
||
6231000
|
trusted library allocation
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
1EE30733000
|
trusted library allocation
|
page read and write
|
||
853000
|
unkown
|
page execute and write copy
|
||
1EE30AA0000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
FA7000
|
heap
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
4EE3000
|
trusted library allocation
|
page execute and read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
1EE36C10000
|
trusted library allocation
|
page read and write
|
||
1EE31223000
|
trusted library allocation
|
page read and write
|
||
569B000
|
trusted library allocation
|
page read and write
|
||
1EE2F2F0000
|
trusted library allocation
|
page read and write
|
||
313F000
|
stack
|
page read and write
|
||
1099000
|
heap
|
page read and write
|
||
5381000
|
trusted library allocation
|
page read and write
|
||
1EE36878000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
1EE1EA5E000
|
trusted library allocation
|
page read and write
|
||
1D52B000
|
heap
|
page read and write
|
||
1EE30B6B000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
4EE0000
|
direct allocation
|
page read and write
|
||
38CF000
|
stack
|
page read and write
|
||
58F0000
|
trusted library allocation
|
page read and write
|
||
1EE2E6F9000
|
trusted library allocation
|
page read and write
|
||
1EE2BC04000
|
trusted library allocation
|
page read and write
|
||
1EE2ECE5000
|
trusted library allocation
|
page read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
1EE33604000
|
trusted library allocation
|
page read and write
|
||
53C9000
|
trusted library allocation
|
page read and write
|
||
1EE36976000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE30F97000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
5C7C000
|
trusted library allocation
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
1EE2E49C000
|
trusted library allocation
|
page read and write
|
||
1EE30B8B000
|
trusted library allocation
|
page read and write
|
||
1EE38BB0000
|
trusted library allocation
|
page read and write
|
||
1EE30AB5000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE36948000
|
trusted library allocation
|
page read and write
|
||
1EE36A08000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
5EB7000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
1EE2C408000
|
trusted library allocation
|
page read and write
|
||
1EE30BA5000
|
trusted library allocation
|
page read and write
|
||
1EE30BA7000
|
trusted library allocation
|
page read and write
|
||
1EE2A169000
|
trusted library allocation
|
page read and write
|
||
1EE30BCF000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
1B79E000
|
stack
|
page read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
1EE2E5A7000
|
trusted library allocation
|
page read and write
|
||
260AA431000
|
heap
|
page read and write
|
||
5693000
|
trusted library allocation
|
page read and write
|
||
1EE2E8A9000
|
trusted library allocation
|
page read and write
|
||
7EFF000
|
stack
|
page read and write
|
||
5B38000
|
trusted library allocation
|
page read and write
|
||
1EE36880000
|
trusted library allocation
|
page read and write
|
||
1EE2579D000
|
heap
|
page read and write
|
||
1EE2BBD6000
|
trusted library allocation
|
page read and write
|
||
1EE305E6000
|
trusted library allocation
|
page read and write
|
||
260AA484000
|
heap
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
1EE2578F000
|
heap
|
page read and write
|
||
1EE36ACD000
|
trusted library allocation
|
page read and write
|
||
1EE30A9E000
|
trusted library allocation
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
7CBC000
|
stack
|
page read and write
|
||
1EE30003000
|
trusted library allocation
|
page read and write
|
||
1EE30A97000
|
trusted library allocation
|
page read and write
|
||
62A4000
|
trusted library allocation
|
page read and write
|
||
1EE36A1C000
|
trusted library allocation
|
page read and write
|
||
1CD0000
|
trusted library allocation
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
1EE304BB000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE30162000
|
trusted library allocation
|
page read and write
|
||
2C77000
|
heap
|
page read and write
|
||
17F37C47000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
5B42000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1EE2B920000
|
trusted library section
|
page readonly
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
17F3798F000
|
unclassified section
|
page read and write
|
||
28B7000
|
heap
|
page read and write
|
||
1EE366EA000
|
trusted library allocation
|
page read and write
|
||
5BD7000
|
trusted library allocation
|
page read and write
|
||
1EE36C00000
|
trusted library allocation
|
page read and write
|
||
260AA3A4000
|
heap
|
page read and write
|
||
1EE304B1000
|
trusted library allocation
|
page read and write
|
||
260A9E90000
|
heap
|
page read and write
|
||
17F37780000
|
remote allocation
|
page read and write
|
||
17F37C00000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE30875000
|
trusted library allocation
|
page read and write
|
||
47DF000
|
stack
|
page read and write
|
||
1EE2A100000
|
trusted library allocation
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
11A2000
|
heap
|
page read and write
|
||
1EE309C8000
|
trusted library allocation
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
1EE36A83000
|
trusted library allocation
|
page read and write
|
||
478000
|
unkown
|
page execute and write copy
|
||
4441000
|
heap
|
page read and write
|
||
1EE30AF2000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
5EB3000
|
trusted library allocation
|
page read and write
|
||
1EE309BF000
|
trusted library allocation
|
page read and write
|
||
1EE257A5000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE2F9FD000
|
trusted library allocation
|
page read and write
|
||
1EE2F2C8000
|
trusted library allocation
|
page read and write
|
||
1D528000
|
heap
|
page read and write
|
||
1D53E000
|
heap
|
page read and write
|
||
1EE257AA000
|
heap
|
page read and write
|
||
260AA461000
|
heap
|
page read and write
|
||
5685000
|
trusted library allocation
|
page read and write
|
||
1EE2EC90000
|
trusted library allocation
|
page read and write
|
||
1EE3681F000
|
trusted library allocation
|
page read and write
|
||
A5F000
|
unkown
|
page execute and write copy
|
||
4441000
|
heap
|
page read and write
|
||
2FD0000
|
direct allocation
|
page read and write
|
||
5EBC000
|
trusted library allocation
|
page read and write
|
||
1EE367BF000
|
trusted library allocation
|
page read and write
|
||
3B5F000
|
stack
|
page read and write
|
||
5284000
|
trusted library allocation
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
1D525000
|
heap
|
page read and write
|
||
5EBE000
|
trusted library allocation
|
page read and write
|
||
1EE2E4A2000
|
trusted library allocation
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
1EE313D8000
|
trusted library allocation
|
page read and write
|
||
1EE32300000
|
trusted library allocation
|
page read and write
|
||
1EE2DA9C000
|
trusted library allocation
|
page read and write
|
||
250000
|
unkown
|
page readonly
|
||
569F000
|
trusted library allocation
|
page read and write
|
||
1EE3095F000
|
trusted library allocation
|
page read and write
|
||
17F379B0000
|
unclassified section
|
page readonly
|
||
1EE34C04000
|
trusted library allocation
|
page read and write
|
||
260A9CB3000
|
unkown
|
page execute read
|
||
479000
|
unkown
|
page execute and read and write
|
||
2CC0000
|
direct allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
2D0000
|
unkown
|
page execute and write copy
|
||
754000
|
heap
|
page read and write
|
||
4F50000
|
direct allocation
|
page execute and read and write
|
||
1134000
|
heap
|
page read and write
|
||
1EE2F200000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
1EE36AF1000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
1311000
|
heap
|
page read and write
|
||
1EE36C98000
|
trusted library allocation
|
page read and write
|
||
1EE309E0000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE2579C000
|
heap
|
page read and write
|
||
1EE36960000
|
trusted library allocation
|
page read and write
|
||
5B3F000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE32228000
|
trusted library allocation
|
page read and write
|
||
1D52C000
|
heap
|
page read and write
|
||
1EE2E41D000
|
trusted library allocation
|
page read and write
|
||
52D000
|
unkown
|
page execute and read and write
|
||
61ED3000
|
direct allocation
|
page read and write
|
||
1EE309C8000
|
trusted library allocation
|
page read and write
|
||
52FB000
|
trusted library allocation
|
page read and write
|
||
260AA3E1000
|
heap
|
page read and write
|
||
260AA46A000
|
heap
|
page read and write
|
||
260AA4A9000
|
heap
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
1EE320D6000
|
trusted library allocation
|
page read and write
|
||
260A9745000
|
trusted library allocation
|
page read and write
|
||
25786F304000
|
trusted library allocation
|
page read and write
|
||
136A000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
4F2000
|
unkown
|
page execute and write copy
|
||
1454000
|
heap
|
page read and write
|
||
1D530000
|
heap
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
B64000
|
unkown
|
page readonly
|
||
4A30000
|
direct allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
1EE36C7C000
|
trusted library allocation
|
page read and write
|
||
1EE36C4B000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE36CB6000
|
trusted library allocation
|
page read and write
|
||
383E000
|
stack
|
page read and write
|
||
1EE30A9B000
|
trusted library allocation
|
page read and write
|
||
492F000
|
stack
|
page read and write
|
||
1EE30BFA000
|
trusted library allocation
|
page read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
1EE31069000
|
trusted library allocation
|
page read and write
|
||
1EE309BF000
|
trusted library allocation
|
page read and write
|
||
1EE2E9C3000
|
trusted library allocation
|
page read and write
|
||
D3D000
|
heap
|
page read and write
|
||
52B3000
|
trusted library allocation
|
page read and write
|
||
1EE3666F000
|
trusted library allocation
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
52F9000
|
trusted library allocation
|
page read and write
|
||
1EE303F6000
|
trusted library allocation
|
page read and write
|
||
1EE25796000
|
heap
|
page read and write
|
||
466000
|
unkown
|
page execute and write copy
|
||
1EE2E4A2000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
17F378F0000
|
heap
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE2FF05000
|
trusted library allocation
|
page read and write
|
||
1EE30CDF000
|
trusted library allocation
|
page read and write
|
||
1D530000
|
heap
|
page read and write
|
||
52BB000
|
trusted library allocation
|
page read and write
|
||
8DB000
|
unkown
|
page write copy
|
||
5589000
|
trusted library allocation
|
page read and write
|
||
567A000
|
trusted library allocation
|
page read and write
|
||
1EE307C7000
|
trusted library allocation
|
page read and write
|
||
1EE38BFB000
|
trusted library allocation
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
1EE3222E000
|
trusted library allocation
|
page read and write
|
||
1EE309E0000
|
trusted library allocation
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
1EE30AE7000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
4920000
|
direct allocation
|
page execute and read and write
|
||
1EE2573B000
|
heap
|
page read and write
|
||
1193000
|
heap
|
page read and write
|
||
4790000
|
remote allocation
|
page read and write
|
||
4920000
|
direct allocation
|
page execute and read and write
|
||
5000000
|
trusted library allocation
|
page execute and read and write
|
||
1EE2EED0000
|
trusted library section
|
page read and write
|
||
1EE2E5AE000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
direct allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1EE30A38000
|
trusted library allocation
|
page read and write
|
||
102C000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
260A93CB000
|
remote allocation
|
page execute read
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
2B49A931000
|
trusted library allocation
|
page execute read
|
||
2B49A971000
|
trusted library allocation
|
page execute read
|
||
45BF000
|
stack
|
page read and write
|
||
3CFF000
|
stack
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
8B0000
|
unkown
|
page readonly
|
||
1087000
|
heap
|
page read and write
|
||
931000
|
unkown
|
page execute and write copy
|
||
1EE306C0000
|
trusted library allocation
|
page read and write
|
||
1EE30519000
|
trusted library allocation
|
page read and write
|
||
1EE2BB30000
|
trusted library allocation
|
page read and write
|
||
5260000
|
direct allocation
|
page execute and read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
1EE2DB32000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE2E4A2000
|
trusted library allocation
|
page read and write
|
||
447E000
|
stack
|
page read and write
|
||
1EE2F31C000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
1EE2E47A000
|
trusted library allocation
|
page read and write
|
||
1EE2AA00000
|
trusted library allocation
|
page read and write
|
||
1EE2FC50000
|
trusted library section
|
page read and write
|
||
602000
|
heap
|
page read and write
|
||
56DF000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
AF9F27B000
|
stack
|
page read and write
|
||
E0E000
|
heap
|
page read and write
|
||
5E55000
|
trusted library allocation
|
page read and write
|
||
511180C000
|
stack
|
page read and write
|
||
1EE25762000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE36968000
|
trusted library allocation
|
page read and write
|
||
1EE31103000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
1EE1E910000
|
heap
|
page read and write
|
||
279F000
|
stack
|
page read and write
|
||
1EE30956000
|
trusted library allocation
|
page read and write
|
||
1EE2ECBC000
|
trusted library allocation
|
page read and write
|
||
260AA3AC000
|
heap
|
page read and write
|
||
1400000
|
direct allocation
|
page read and write
|
||
5588000
|
trusted library allocation
|
page read and write
|
||
1EE309A6000
|
trusted library allocation
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
1D62E000
|
heap
|
page read and write
|
||
1EE2E56F000
|
trusted library allocation
|
page read and write
|
||
102D000
|
heap
|
page read and write
|
||
1EE2578F000
|
heap
|
page read and write
|
||
4F8A000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
1EE25796000
|
heap
|
page read and write
|
||
5683000
|
trusted library allocation
|
page read and write
|
||
171F000
|
stack
|
page read and write
|
||
566000
|
unkown
|
page execute and write copy
|
||
529B000
|
trusted library allocation
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
5B3F000
|
trusted library allocation
|
page read and write
|
||
5584000
|
trusted library allocation
|
page read and write
|
||
1EE2FE96000
|
trusted library allocation
|
page read and write
|
||
1EE2E52A000
|
trusted library allocation
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
1EE2FF3F000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
1D54B000
|
heap
|
page read and write
|
||
1EE3687C000
|
trusted library allocation
|
page read and write
|
||
5284000
|
trusted library allocation
|
page read and write
|
||
1EE2C117000
|
trusted library allocation
|
page read and write
|
||
28FF000
|
stack
|
page read and write
|
||
4FC000
|
unkown
|
page execute and write copy
|
||
1EE2F37D000
|
trusted library allocation
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
1EE30C1F000
|
trusted library allocation
|
page read and write
|
||
5AFD000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
unkown
|
page execute and read and write
|
||
1EE30A9B000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
6145000
|
trusted library allocation
|
page read and write
|
||
56D000
|
unkown
|
page execute and write copy
|
||
1EE30887000
|
trusted library allocation
|
page read and write
|
||
1EE25755000
|
heap
|
page read and write
|
||
511AD7C000
|
stack
|
page read and write
|
||
29FF000
|
stack
|
page read and write
|
||
3CDE000
|
stack
|
page read and write
|
||
1B7FD000
|
stack
|
page read and write
|
||
1EE322BE000
|
trusted library allocation
|
page read and write
|
||
1EE2E5C7000
|
trusted library allocation
|
page read and write
|
||
529A000
|
trusted library allocation
|
page read and write
|
||
1D53E000
|
heap
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
1EE25757000
|
heap
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
5EBC000
|
trusted library allocation
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
1EE257A2000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
1EE302C9000
|
trusted library allocation
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
67EE000
|
heap
|
page read and write
|
||
1EE25754000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
6045000
|
trusted library allocation
|
page read and write
|
||
53ED000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
5B3F000
|
trusted library allocation
|
page read and write
|
||
511783D000
|
stack
|
page read and write
|
||
1D52F000
|
heap
|
page read and write
|
||
260AA4A7000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE310AC000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
1EE25793000
|
heap
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
1EE30F79000
|
trusted library allocation
|
page read and write
|
||
52CE000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
4F00000
|
direct allocation
|
page read and write
|
||
1E083BB8000
|
heap
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
1D52B000
|
heap
|
page read and write
|
||
260AA42C000
|
heap
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
1D527000
|
heap
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
1EE36703000
|
trusted library allocation
|
page read and write
|
||
1EE309BA000
|
trusted library allocation
|
page read and write
|
||
1EE3039C000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
1EE2B671000
|
trusted library allocation
|
page read and write
|
||
AD21504000
|
trusted library allocation
|
page read and write
|
||
61EB4000
|
direct allocation
|
page read and write
|
||
1EE25796000
|
heap
|
page read and write
|
||
782000
|
unkown
|
page execute and write copy
|
||
27E0000
|
direct allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
565E000
|
trusted library allocation
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
1EE30D23000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
7A0000
|
unkown
|
page read and write
|
||
1D514000
|
heap
|
page read and write
|
||
1EE306B5000
|
trusted library allocation
|
page read and write
|
||
1EE302C3000
|
trusted library allocation
|
page read and write
|
||
6F861000
|
unkown
|
page execute read
|
||
1EE30AE9000
|
trusted library allocation
|
page read and write
|
||
1EE36971000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
511563F000
|
stack
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
1EE309D2000
|
trusted library allocation
|
page read and write
|
||
58F6000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
47FE000
|
stack
|
page read and write
|
||
1EE2EC9C000
|
trusted library allocation
|
page read and write
|
||
1EE30CF7000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
5284000
|
trusted library allocation
|
page read and write
|
||
1EE309D7000
|
trusted library allocation
|
page read and write
|
||
1EE31481000
|
trusted library allocation
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
17F377A0000
|
unclassified section
|
page readonly
|
||
1EE30AA0000
|
trusted library allocation
|
page read and write
|
||
1EE304F4000
|
trusted library allocation
|
page read and write
|
||
1EE257AF000
|
heap
|
page read and write
|
||
5B44000
|
trusted library allocation
|
page read and write
|
||
56AC000
|
trusted library allocation
|
page read and write
|
||
1EE304A8000
|
trusted library allocation
|
page read and write
|
||
1B34D000
|
stack
|
page read and write
|
||
1EE36973000
|
trusted library allocation
|
page read and write
|
||
511AABE000
|
stack
|
page read and write
|
||
1EE30FC5000
|
trusted library allocation
|
page read and write
|
||
D17000
|
heap
|
page read and write
|
||
251000
|
unkown
|
page execute and write copy
|
||
1EE309B3000
|
trusted library allocation
|
page read and write
|
||
5587000
|
trusted library allocation
|
page read and write
|
||
1EE2578D000
|
heap
|
page read and write
|
||
1EE3023D000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE308E7000
|
trusted library allocation
|
page read and write
|
||
4EE4000
|
trusted library allocation
|
page read and write
|
||
1EE2EAB1000
|
trusted library allocation
|
page read and write
|
||
992000
|
unkown
|
page read and write
|
||
1EE30887000
|
trusted library allocation
|
page read and write
|
||
1EE203B4000
|
heap
|
page read and write
|
||
1EE2BBFB000
|
trusted library allocation
|
page read and write
|
||
4A3F000
|
stack
|
page read and write
|
||
1AF9E000
|
stack
|
page read and write
|
||
1400000
|
direct allocation
|
page read and write
|
||
1EE2A800000
|
trusted library allocation
|
page read and write
|
||
1EE309F0000
|
trusted library allocation
|
page read and write
|
||
99D000
|
unkown
|
page execute and write copy
|
||
6C4000
|
heap
|
page read and write
|
||
1EE2C303000
|
trusted library allocation
|
page read and write
|
||
3A1F000
|
stack
|
page read and write
|
||
525C000
|
trusted library allocation
|
page read and write
|
||
1EE30875000
|
trusted library allocation
|
page read and write
|
||
1EE2F3EE000
|
trusted library allocation
|
page read and write
|
||
1EE2FE06000
|
trusted library allocation
|
page read and write
|
||
1EE305EB000
|
trusted library allocation
|
page read and write
|
||
1EE2E5DE000
|
trusted library allocation
|
page read and write
|
||
2B49AA01000
|
trusted library allocation
|
page execute read
|
||
1EE36A2C000
|
trusted library allocation
|
page read and write
|
||
5AF3000
|
trusted library allocation
|
page read and write
|
||
4321000
|
heap
|
page read and write
|
||
1EE305FC000
|
trusted library allocation
|
page read and write
|
||
1EE2C20A000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
1EE30A26000
|
trusted library allocation
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
1EE2E600000
|
trusted library allocation
|
page read and write
|
||
1EE257AF000
|
heap
|
page read and write
|
||
55B000
|
unkown
|
page execute and read and write
|
||
1EE36C2D000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE3061A000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
1EE367FA000
|
trusted library allocation
|
page read and write
|
||
1EE25749000
|
heap
|
page read and write
|
||
4E3000
|
unkown
|
page execute and read and write
|
||
1EE2A775000
|
trusted library allocation
|
page read and write
|
||
1EE30763000
|
trusted library allocation
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
1EE30B93000
|
trusted library allocation
|
page read and write
|
||
260AA420000
|
heap
|
page read and write
|
||
FF4000
|
unkown
|
page execute and read and write
|
||
52AC000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
1EE3097A000
|
trusted library allocation
|
page read and write
|
||
56B9000
|
trusted library allocation
|
page read and write
|
||
397E000
|
stack
|
page read and write
|
||
1EE30166000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1D52F000
|
heap
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
4ED0000
|
trusted library allocation
|
page read and write
|
||
1EE2A5E0000
|
unclassified section
|
page read and write
|
||
1400000
|
direct allocation
|
page read and write
|
||
1EE30203000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE2A710000
|
trusted library allocation
|
page read and write
|
||
1EE2F82A000
|
trusted library allocation
|
page read and write
|
||
1D53E000
|
heap
|
page read and write
|
||
5EB4000
|
trusted library allocation
|
page read and write
|
||
1EE25755000
|
heap
|
page read and write
|
||
1D535000
|
heap
|
page read and write
|
||
1B2AE000
|
stack
|
page read and write
|
||
107D000
|
heap
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
1EE2F303000
|
trusted library allocation
|
page read and write
|
||
260A95BF000
|
unclassified section
|
page read and write
|
||
1EE302BB000
|
trusted library allocation
|
page read and write
|
||
1EE305FB000
|
trusted library allocation
|
page read and write
|
||
1EE30842000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
1EE2FF1A000
|
trusted library allocation
|
page read and write
|
||
1EE2EC7C000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
260AA429000
|
heap
|
page read and write
|
||
260AA484000
|
heap
|
page read and write
|
||
1EE2F0F9000
|
trusted library allocation
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
440F000
|
stack
|
page read and write
|
||
1EE30AA2000
|
trusted library allocation
|
page read and write
|
||
1EE30951000
|
trusted library allocation
|
page read and write
|
||
1EE2EC7C000
|
trusted library allocation
|
page read and write
|
||
11B2000
|
heap
|
page read and write
|
||
1EE2ABCD000
|
trusted library allocation
|
page read and write
|
||
1EE317DD000
|
trusted library allocation
|
page read and write
|
||
11A4000
|
unkown
|
page execute and read and write
|
||
5285000
|
trusted library allocation
|
page read and write
|
||
40BF000
|
stack
|
page read and write
|
||
1EE308CB000
|
trusted library allocation
|
page read and write
|
||
1EE2573A000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
1EE30A9B000
|
trusted library allocation
|
page read and write
|
||
260AA3E8000
|
heap
|
page read and write
|
||
5B34000
|
trusted library allocation
|
page read and write
|
||
1EE2A2A2000
|
trusted library allocation
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
1EE2574A000
|
heap
|
page read and write
|
||
4920000
|
direct allocation
|
page execute and read and write
|
||
1EE3688C000
|
trusted library allocation
|
page read and write
|
||
1EE25744000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE366A8000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
4441000
|
heap
|
page read and write
|
||
17F37C2E000
|
trusted library allocation
|
page read and write
|
||
1EE2EA8E000
|
trusted library allocation
|
page read and write
|
||
1D52F000
|
heap
|
page read and write
|
||
1EE25793000
|
heap
|
page read and write
|
||
570B000
|
trusted library allocation
|
page read and write
|
||
5584000
|
trusted library allocation
|
page read and write
|
||
5119B7E000
|
stack
|
page read and write
|
||
1EE38BF9000
|
trusted library allocation
|
page read and write
|
||
1EE367BC000
|
trusted library allocation
|
page read and write
|
||
52DE000
|
trusted library allocation
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
1EE3683D000
|
trusted library allocation
|
page read and write
|
||
1EE307A8000
|
trusted library allocation
|
page read and write
|
||
1EE30842000
|
trusted library allocation
|
page read and write
|
||
1EE30EA3000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
1EE2E4CB000
|
trusted library allocation
|
page read and write
|
||
1EE3687A000
|
trusted library allocation
|
page read and write
|
||
57C000
|
unkown
|
page execute and read and write
|
||
5B33000
|
trusted library allocation
|
page read and write
|
||
1EE2E5F1000
|
trusted library allocation
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
52CC000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
5EB4000
|
trusted library allocation
|
page read and write
|
||
5288000
|
trusted library allocation
|
page read and write
|
||
1EE2575D000
|
heap
|
page read and write
|
||
5881000
|
trusted library allocation
|
page read and write
|
||
1EE2C11A000
|
trusted library allocation
|
page read and write
|
||
567000
|
unkown
|
page execute and write copy
|
||
4441000
|
heap
|
page read and write
|
||
1EE2575F000
|
heap
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
1EE31209000
|
trusted library allocation
|
page read and write
|
||
7A2000
|
unkown
|
page execute and read and write
|
||
45C000
|
unkown
|
page execute and write copy
|
||
433E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5B34000
|
trusted library allocation
|
page read and write
|
||
1EE30AF2000
|
trusted library allocation
|
page read and write
|
||
260AA47B000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
5119DBB000
|
stack
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
49E000
|
unkown
|
page execute and read and write
|
||
1EE317FE000
|
trusted library allocation
|
page read and write
|
||
1EE2FFB2000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
1EE2EC03000
|
trusted library allocation
|
page read and write
|
||
260A97BC000
|
trusted library allocation
|
page read and write
|
||
11AB000
|
heap
|
page read and write
|
||
1EE30528000
|
trusted library allocation
|
page read and write
|
||
271000
|
unkown
|
page execute and write copy
|
||
550000
|
direct allocation
|
page read and write
|
||
1E0857A7000
|
heap
|
page read and write
|
||
AF9D9D8000
|
stack
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
1EE2579C000
|
heap
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
1EE310E3000
|
trusted library allocation
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
76BF000
|
stack
|
page read and write
|
||
1EE1E950000
|
heap
|
page readonly
|
||
1EE2A140000
|
trusted library allocation
|
page read and write
|
||
2F97000
|
heap
|
page read and write
|
||
2B2000
|
unkown
|
page execute and read and write
|
||
528F000
|
trusted library allocation
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
1EE2ECB0000
|
trusted library allocation
|
page read and write
|
||
260AA3A0000
|
heap
|
page read and write
|
||
1EE30703000
|
trusted library allocation
|
page read and write
|
||
1EE3697A000
|
trusted library allocation
|
page read and write
|
||
3D3E000
|
stack
|
page read and write
|
||
495E000
|
stack
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
33FE000
|
stack
|
page read and write
|
||
48F0000
|
direct allocation
|
page execute and read and write
|
||
1EE3097C000
|
trusted library allocation
|
page read and write
|
||
1629000
|
heap
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
1EE305CE000
|
trusted library allocation
|
page read and write
|
||
237DE8D04000
|
trusted library allocation
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
1EE30A9B000
|
trusted library allocation
|
page read and write
|
||
1EE38C83000
|
trusted library allocation
|
page read and write
|
||
1EE2E9E0000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
260A9781000
|
trusted library allocation
|
page read and write
|
||
1EE303E3000
|
trusted library allocation
|
page read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
8DB000
|
unkown
|
page write copy
|
||
11B1000
|
heap
|
page read and write
|
||
1D524000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
9E0000
|
unkown
|
page execute and read and write
|
||
1EE30B93000
|
trusted library allocation
|
page read and write
|
||
1EE2FCB0000
|
unclassified section
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1EE2F678000
|
trusted library allocation
|
page read and write
|
||
60CA000
|
trusted library allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
1EE305EB000
|
trusted library allocation
|
page read and write
|
||
1EE34714000
|
trusted library allocation
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
52BC000
|
trusted library allocation
|
page read and write
|
||
47BF000
|
stack
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
1EE36AF3000
|
trusted library allocation
|
page read and write
|
||
1EE3098F000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
1EE367AC000
|
trusted library allocation
|
page read and write
|
||
1EE2ABB0000
|
trusted library allocation
|
page read and write
|
||
1EE36AFA000
|
trusted library allocation
|
page read and write
|
||
1EE3660E000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
260AA499000
|
heap
|
page read and write
|
||
5119E3E000
|
stack
|
page read and write
|
||
3E4813E000
|
unkown
|
page readonly
|
||
531000
|
unkown
|
page execute and write copy
|
||
3C7F000
|
stack
|
page read and write
|
||
17F37CB2000
|
trusted library allocation
|
page read and write
|
||
5B3D000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1EE36A59000
|
trusted library allocation
|
page read and write
|
||
42BF000
|
stack
|
page read and write
|
||
1EE32194000
|
trusted library allocation
|
page read and write
|
||
1037000
|
heap
|
page read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
BDE000
|
stack
|
page read and write
|
||
1EE36D03000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE305E2000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
direct allocation
|
page read and write
|
||
5EBD000
|
trusted library allocation
|
page read and write
|
||
251000
|
unkown
|
page execute and write copy
|
||
260AA3A0000
|
heap
|
page read and write
|
||
2D0000
|
unkown
|
page execute and read and write
|
||
1EE32153000
|
trusted library allocation
|
page read and write
|
||
15EE000
|
heap
|
page read and write
|
||
1EE36833000
|
trusted library allocation
|
page read and write
|
||
1091000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
1EE2EE80000
|
trusted library section
|
page read and write
|
||
5FDB000
|
trusted library allocation
|
page read and write
|
||
1EE2C013000
|
trusted library allocation
|
page read and write
|
||
67E0000
|
heap
|
page read and write
|
||
1EE1E7B0000
|
trusted library allocation
|
page read and write
|
||
1EE36612000
|
trusted library allocation
|
page read and write
|
||
77FF000
|
stack
|
page read and write
|
||
1EE30BFE000
|
trusted library allocation
|
page read and write
|
||
32DE000
|
stack
|
page read and write
|
||
4BB0000
|
direct allocation
|
page execute and read and write
|
||
4441000
|
heap
|
page read and write
|
||
1D52F000
|
heap
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
11A9000
|
heap
|
page read and write
|
||
478000
|
unkown
|
page execute and write copy
|
||
51AF000
|
stack
|
page read and write
|
||
911000
|
unkown
|
page execute and write copy
|
||
1EE30977000
|
trusted library allocation
|
page read and write
|
||
D36000
|
heap
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
1EE2E5BE000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE303C3000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE31303000
|
trusted library allocation
|
page read and write
|
||
7A6000
|
unkown
|
page write copy
|
||
716000
|
unkown
|
page execute and write copy
|
||
38FF000
|
stack
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE30C37000
|
trusted library allocation
|
page read and write
|
||
1EE308E4000
|
trusted library allocation
|
page read and write
|
||
D1A000
|
heap
|
page read and write
|
||
1EE2A2E6000
|
trusted library allocation
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
1EE30860000
|
trusted library allocation
|
page read and write
|
||
270000
|
unkown
|
page readonly
|
||
1003000
|
unkown
|
page execute and write copy
|
||
1EE2BAC6000
|
trusted library allocation
|
page read and write
|
||
1EE30538000
|
trusted library allocation
|
page read and write
|
||
52AC000
|
trusted library allocation
|
page read and write
|
||
1EE31300000
|
trusted library allocation
|
page read and write
|
||
1EE3098A000
|
trusted library allocation
|
page read and write
|
||
1EE30BCF000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1EE2579D000
|
heap
|
page read and write
|
||
11B1000
|
heap
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
5301000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE306AE000
|
trusted library allocation
|
page read and write
|
||
C5E000
|
stack
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
1EE30996000
|
trusted library allocation
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
6C7FE000
|
unkown
|
page read and write
|
||
1359000
|
heap
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
123C000
|
stack
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
1EE368A8000
|
trusted library allocation
|
page read and write
|
||
1EE305E2000
|
trusted library allocation
|
page read and write
|
||
1EE36738000
|
trusted library allocation
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
391E000
|
stack
|
page read and write
|
||
4EE0000
|
direct allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
730C000
|
stack
|
page read and write
|
||
260AA3A0000
|
heap
|
page read and write
|
||
1EE25757000
|
heap
|
page read and write
|
||
5BB9000
|
trusted library allocation
|
page read and write
|
||
561C000
|
trusted library allocation
|
page read and write
|
||
260A93F0000
|
heap
|
page read and write
|
||
1EE3027D000
|
trusted library allocation
|
page read and write
|
||
1EE36874000
|
trusted library allocation
|
page read and write
|
||
5BCA000
|
trusted library allocation
|
page read and write
|
||
260AA420000
|
heap
|
page read and write
|
||
1EE202A0000
|
heap
|
page read and write
|
||
1EE2A703000
|
trusted library allocation
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
1EE257A6000
|
heap
|
page read and write
|
||
4440000
|
heap
|
page read and write
|
||
1EE321C3000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
direct allocation
|
page execute and read and write
|
||
1EE31400000
|
trusted library allocation
|
page read and write
|
||
1EE30B43000
|
trusted library allocation
|
page read and write
|
||
4790000
|
remote allocation
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
17F378B0000
|
heap
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
646000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE2DA00000
|
trusted library allocation
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
5FC4000
|
trusted library allocation
|
page read and write
|
||
47FE000
|
stack
|
page read and write
|
||
296EB000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5B8000
|
unkown
|
page execute and read and write
|
||
5EB5000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
trusted library allocation
|
page read and write
|
||
1EE3097A000
|
trusted library allocation
|
page read and write
|
||
5AFB000
|
trusted library allocation
|
page read and write
|
||
4E3000
|
unkown
|
page execute and read and write
|
||
1EE368BB000
|
trusted library allocation
|
page read and write
|
||
AF9F2BE000
|
unkown
|
page readonly
|
||
5E40000
|
heap
|
page read and write
|
||
5DB000
|
heap
|
page read and write
|
||
F59000
|
stack
|
page read and write
|
||
11AD000
|
heap
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE33602000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
FBD000
|
unkown
|
page execute and read and write
|
||
1EE2EA00000
|
trusted library allocation
|
page read and write
|
||
1EE30BFE000
|
trusted library allocation
|
page read and write
|
||
17F37D1A000
|
trusted library allocation
|
page read and write
|
||
513D000
|
trusted library allocation
|
page read and write
|
||
1B09F000
|
stack
|
page read and write
|
||
2D37000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE2A0DF000
|
trusted library allocation
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
1EE2F3BB000
|
trusted library allocation
|
page read and write
|
||
1EE2579C000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
260A9510000
|
heap
|
page read and write
|
||
1EE2F18C000
|
trusted library allocation
|
page read and write
|
||
5B33000
|
trusted library allocation
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
4A30000
|
direct allocation
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
3BBF000
|
stack
|
page read and write
|
||
1EE25753000
|
heap
|
page read and write
|
||
60DD000
|
trusted library allocation
|
page read and write
|
||
260AA340000
|
heap
|
page read and write
|
||
1EE38CDF000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE25789000
|
heap
|
page read and write
|
||
1EE36961000
|
trusted library allocation
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
1EE305FB000
|
trusted library allocation
|
page read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
1EE3686A000
|
trusted library allocation
|
page read and write
|
||
1EE32100000
|
trusted library allocation
|
page read and write
|
||
5FBE000
|
trusted library allocation
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
5387000
|
trusted library allocation
|
page read and write
|
||
260A9F07000
|
trusted library allocation
|
page read and write
|
||
58F3000
|
trusted library allocation
|
page read and write
|
||
1EE305E6000
|
trusted library allocation
|
page read and write
|
||
5AAF000
|
trusted library allocation
|
page read and write
|
||
1E083BC1000
|
heap
|
page read and write
|
||
BB4000
|
unkown
|
page execute and write copy
|
||
1EE257A1000
|
heap
|
page read and write
|
||
1E083BC3000
|
heap
|
page read and write
|
||
17F37C10000
|
trusted library allocation
|
page read and write
|
||
1EE25755000
|
heap
|
page read and write
|
||
11A2000
|
heap
|
page read and write
|
||
1075000
|
heap
|
page read and write
|
||
1EE2F8B2000
|
trusted library allocation
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
60DE000
|
trusted library allocation
|
page read and write
|
||
17F37C81000
|
trusted library allocation
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
1EE2BBA0000
|
trusted library allocation
|
page read and write
|
||
1EE2EC85000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
61ECD000
|
direct allocation
|
page readonly
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE2F803000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
11B2000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
1EE2ECBC000
|
trusted library allocation
|
page read and write
|
||
1EE309FD000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE38B0B000
|
trusted library allocation
|
page read and write
|
||
1EE2F991000
|
trusted library allocation
|
page read and write
|
||
1D52F000
|
heap
|
page read and write
|
||
1EE30AE7000
|
trusted library allocation
|
page read and write
|
||
501F000
|
stack
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
1EE31440000
|
trusted library allocation
|
page read and write
|
||
1EE313E3000
|
trusted library allocation
|
page read and write
|
||
1EE30C4F000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
52E2000
|
trusted library allocation
|
page read and write
|
||
1EE36CFE000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
260AA3BD000
|
heap
|
page read and write
|
||
969000
|
unkown
|
page execute and read and write
|
||
1EE2AAAD000
|
trusted library allocation
|
page read and write
|
||
1EE2F32F000
|
trusted library allocation
|
page read and write
|
||
17F37C61000
|
trusted library allocation
|
page read and write
|
||
1EE306CF000
|
trusted library allocation
|
page read and write
|
||
1EE309F0000
|
trusted library allocation
|
page read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
5FE2000
|
trusted library allocation
|
page read and write
|
||
1EE32209000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
direct allocation
|
page execute and read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
1EE2578B000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
4FD000
|
unkown
|
page execute and read and write
|
||
1EE36A03000
|
trusted library allocation
|
page read and write
|
||
94E000
|
unkown
|
page execute and write copy
|
||
1400000
|
direct allocation
|
page read and write
|
||
1EE2E8FC000
|
trusted library allocation
|
page read and write
|
||
1EE2D9B0000
|
trusted library section
|
page readonly
|
||
1EE25753000
|
heap
|
page read and write
|
||
1EE2F3B0000
|
trusted library allocation
|
page read and write
|
||
51107D8000
|
stack
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
1EE302F1000
|
trusted library allocation
|
page read and write
|
||
1EE30AE7000
|
trusted library allocation
|
page read and write
|
||
1EE30859000
|
trusted library allocation
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
||
1EE2574A000
|
heap
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
1EE2EC3B000
|
trusted library allocation
|
page read and write
|
||
B0C000
|
unkown
|
page readonly
|
||
250000
|
unkown
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
11B2000
|
heap
|
page read and write
|
||
1EE30AE0000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
2B49AA11000
|
trusted library allocation
|
page execute read
|
||
1EE3010A000
|
trusted library allocation
|
page read and write
|
||
5BB9000
|
trusted library allocation
|
page read and write
|
||
558E000
|
trusted library allocation
|
page read and write
|
||
1EE305C9000
|
trusted library allocation
|
page read and write
|
||
1EE25789000
|
heap
|
page read and write
|
||
4A70000
|
direct allocation
|
page execute and read and write
|
||
926000
|
unkown
|
page execute and read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1EE30AE9000
|
trusted library allocation
|
page read and write
|
||
1EE36AB8000
|
trusted library allocation
|
page read and write
|
||
1EE2F703000
|
trusted library allocation
|
page read and write
|
||
1EE30BEF000
|
trusted library allocation
|
page read and write
|
||
3E4707B000
|
stack
|
page read and write
|
||
D3D000
|
heap
|
page read and write
|
||
1D54C000
|
heap
|
page read and write
|
||
1EE2C200000
|
trusted library allocation
|
page read and write
|
||
F3F000
|
stack
|
page read and write
|
||
1EE30A2E000
|
trusted library allocation
|
page read and write
|
||
1EE25744000
|
heap
|
page read and write
|
||
5433000
|
trusted library allocation
|
page read and write
|
||
1EE306A4000
|
trusted library allocation
|
page read and write
|
||
1EE36716000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
direct allocation
|
page read and write
|
||
1EE2FFA8000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
57B9000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
11A2000
|
heap
|
page read and write
|
||
7BE000
|
stack
|
page read and write
|
||
1EE2E0A2000
|
heap
|
page read and write
|
||
D32000
|
heap
|
page read and write
|
||
1EE2F331000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
1EE36732000
|
trusted library allocation
|
page read and write
|
||
17F37C79000
|
trusted library allocation
|
page read and write
|
||
1EE30517000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE3174A000
|
trusted library allocation
|
page read and write
|
||
260AA3CA000
|
heap
|
page read and write
|
||
4C1000
|
unkown
|
page execute and read and write
|
||
511B1FE000
|
stack
|
page read and write
|
||
615000
|
heap
|
page read and write
|
||
1EE25753000
|
heap
|
page read and write
|
||
1EE257AA000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE36971000
|
trusted library allocation
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
FA4000
|
heap
|
page read and write
|
||
1EE30A82000
|
trusted library allocation
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
1EE2E5AE000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
B5C000
|
unkown
|
page write copy
|
||
4A51000
|
heap
|
page read and write
|
||
1EE25760000
|
heap
|
page read and write
|
||
1EE305CF000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE25796000
|
heap
|
page read and write
|
||
1EE2EA7F000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE2575A000
|
heap
|
page read and write
|
||
3E470FE000
|
unkown
|
page readonly
|
||
FFD000
|
heap
|
page read and write
|
||
3991000
|
heap
|
page read and write
|
||
1EE30AA4000
|
trusted library allocation
|
page read and write
|
||
1EE32222000
|
trusted library allocation
|
page read and write
|
||
4CBF000
|
stack
|
page read and write
|
||
1EE3094E000
|
trusted library allocation
|
page read and write
|
||
1EE369F8000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
trusted library allocation
|
page read and write
|
||
1EE308E7000
|
trusted library allocation
|
page read and write
|
||
1EE30BB7000
|
trusted library allocation
|
page read and write
|
||
B64000
|
unkown
|
page readonly
|
||
1EE368D8000
|
trusted library allocation
|
page read and write
|
||
1EE366C6000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1EE305E9000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1CE2F000
|
stack
|
page read and write
|
||
27DE000
|
stack
|
page read and write
|
||
1EE1E980000
|
trusted library allocation
|
page execute read
|
||
1EE2F73D000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
7410000
|
trusted library allocation
|
page read and write
|
||
1EE2FA1D000
|
trusted library allocation
|
page read and write
|
||
1EE2E572000
|
trusted library allocation
|
page read and write
|
||
529B000
|
trusted library allocation
|
page read and write
|
||
141E000
|
heap
|
page read and write
|
||
1EE2DD24000
|
trusted library allocation
|
page read and write
|
||
11A2000
|
heap
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
1072000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
43C000
|
unkown
|
page execute and read and write
|
||
33FE000
|
stack
|
page read and write
|
||
1EE30AFA000
|
trusted library allocation
|
page read and write
|
||
64B000
|
unkown
|
page execute and read and write
|
||
4321000
|
heap
|
page read and write
|
||
4BB0000
|
direct allocation
|
page execute and read and write
|
||
1EE2EC67000
|
trusted library allocation
|
page read and write
|
||
1D52F000
|
heap
|
page read and write
|
||
29685000
|
heap
|
page read and write
|
||
1EE2BAA8000
|
trusted library allocation
|
page read and write
|
||
1EE257A1000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
5675000
|
trusted library allocation
|
page read and write
|
||
1354000
|
heap
|
page read and write
|
||
1EE32038000
|
trusted library allocation
|
page read and write
|
||
1EE25754000
|
heap
|
page read and write
|
||
1EE2EEE0000
|
trusted library section
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE302EA000
|
trusted library allocation
|
page read and write
|
||
1EE2F8E6000
|
trusted library allocation
|
page read and write
|
||
1EE3060D000
|
trusted library allocation
|
page read and write
|
||
1EE2FE67000
|
trusted library allocation
|
page read and write
|
||
1EE2EC57000
|
trusted library allocation
|
page read and write
|
||
2CBF000
|
stack
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
162E000
|
heap
|
page read and write
|
||
1EE2EC5A000
|
trusted library allocation
|
page read and write
|
||
1EE30119000
|
trusted library allocation
|
page read and write
|
||
6FB000
|
unkown
|
page execute and read and write
|
||
1EE30E8A000
|
trusted library allocation
|
page read and write
|
||
1EE2F0C4000
|
trusted library allocation
|
page read and write
|
||
5D99000
|
trusted library allocation
|
page read and write
|
||
1EE2E569000
|
trusted library allocation
|
page read and write
|
||
1D540000
|
heap
|
page read and write
|
||
4DFF000
|
stack
|
page read and write
|
||
1EE2573A000
|
heap
|
page read and write
|
||
3A5E000
|
stack
|
page read and write
|
||
14BF000
|
stack
|
page read and write
|
||
1EE321C1000
|
trusted library allocation
|
page read and write
|
||
1EE36AC3000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE36C79000
|
trusted library allocation
|
page read and write
|
||
1EE2E01F000
|
heap
|
page read and write
|
||
49E000
|
unkown
|
page execute and read and write
|
||
47BF000
|
stack
|
page read and write
|
||
78E000
|
unkown
|
page execute and read and write
|
||
4441000
|
heap
|
page read and write
|
||
1D52A000
|
heap
|
page read and write
|
||
5ED000
|
unkown
|
page execute and read and write
|
||
911000
|
unkown
|
page execute and write copy
|
||
1EE367DD000
|
trusted library allocation
|
page read and write
|
||
1EE25740000
|
heap
|
page read and write
|
||
511763D000
|
stack
|
page read and write
|
||
1EE2F0A4000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE2BA79000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
1EE2F23B000
|
trusted library allocation
|
page read and write
|
||
1EE36A11000
|
trusted library allocation
|
page read and write
|
||
1EE2BA80000
|
trusted library allocation
|
page read and write
|
||
1EE2DAAF000
|
trusted library allocation
|
page read and write
|
||
1EE36900000
|
trusted library allocation
|
page read and write
|
||
56D9000
|
trusted library allocation
|
page read and write
|
||
1EE25766000
|
heap
|
page read and write
|
||
529B000
|
trusted library allocation
|
page read and write
|
||
1EE2578B000
|
heap
|
page read and write
|
||
5EB6000
|
trusted library allocation
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
1EE30BCC000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
5AAA000
|
trusted library allocation
|
page read and write
|
||
260AA42C000
|
heap
|
page read and write
|
||
1EE309DA000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1EE2C008000
|
trusted library allocation
|
page read and write
|
||
1EE25786000
|
heap
|
page read and write
|
||
1EE306AA000
|
trusted library allocation
|
page read and write
|
||
1EE3127F000
|
trusted library allocation
|
page read and write
|
||
5BD000
|
heap
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
4FD000
|
unkown
|
page execute and read and write
|
||
1EE3214A000
|
trusted library allocation
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1EE2EC7F000
|
trusted library allocation
|
page read and write
|
||
565C000
|
trusted library allocation
|
page read and write
|
||
1EE25744000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
423E000
|
stack
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE30BEC000
|
trusted library allocation
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
1EE303CE000
|
trusted library allocation
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
567000
|
unkown
|
page execute and write copy
|
||
63F000
|
heap
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
2B9000
|
unkown
|
page write copy
|
||
1EE30BCF000
|
trusted library allocation
|
page read and write
|
||
1354000
|
heap
|
page read and write
|
||
1EE2A1ED000
|
trusted library allocation
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
11AB000
|
heap
|
page read and write
|
||
1EE368D8000
|
trusted library allocation
|
page read and write
|
||
1D524000
|
heap
|
page read and write
|
||
1EE321D8000
|
trusted library allocation
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
52A8000
|
trusted library allocation
|
page read and write
|
||
4F4D000
|
stack
|
page read and write
|
||
2B7F000
|
stack
|
page read and write
|
||
1EE2E5A7000
|
trusted library allocation
|
page read and write
|
||
1EE2C003000
|
trusted library allocation
|
page read and write
|
||
5F6C000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
unkown
|
page readonly
|
||
B10000
|
heap
|
page read and write
|
||
296E8000
|
heap
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
1EE31270000
|
trusted library allocation
|
page read and write
|
||
AF9CF5D000
|
stack
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
1EE2A76D000
|
trusted library allocation
|
page read and write
|
||
9BF000
|
unkown
|
page execute and write copy
|
||
1EE2F3B8000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
1EE1EA11000
|
trusted library allocation
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
1EE30AE7000
|
trusted library allocation
|
page read and write
|
||
52A2000
|
trusted library allocation
|
page read and write
|
||
608F000
|
stack
|
page read and write
|
||
5ACE000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
490F000
|
stack
|
page read and write
|
||
1EE2A124000
|
trusted library allocation
|
page read and write
|
||
1EE2A10E000
|
trusted library allocation
|
page read and write
|
||
1EE30CA7000
|
trusted library allocation
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
1EE2EC5A000
|
trusted library allocation
|
page read and write
|
||
1EE36AFA000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
511178E000
|
stack
|
page read and write
|
||
2B49A9F1000
|
trusted library allocation
|
page execute read
|
||
4441000
|
heap
|
page read and write
|
||
DB10FFE000
|
stack
|
page read and write
|
||
1EE2AA61000
|
trusted library allocation
|
page read and write
|
||
D3D000
|
heap
|
page read and write
|
||
558E000
|
trusted library allocation
|
page read and write
|
||
47A0000
|
direct allocation
|
page read and write
|
||
5F4F000
|
stack
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
5B1000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE2DB1C000
|
trusted library allocation
|
page read and write
|
||
1EE257A0000
|
heap
|
page read and write
|
||
1EE367BC000
|
trusted library allocation
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
511383F000
|
stack
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
1EE30BA5000
|
trusted library allocation
|
page read and write
|
||
1EE2574F000
|
heap
|
page read and write
|
||
1EE30839000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
1EE2F933000
|
trusted library allocation
|
page read and write
|
||
5170000
|
direct allocation
|
page execute and read and write
|
||
1D530000
|
heap
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
43C000
|
unkown
|
page execute and read and write
|
||
557000
|
unkown
|
page execute and write copy
|
||
114D000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
11AD000
|
heap
|
page read and write
|
||
1EE3049F000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
1EE309D4000
|
trusted library allocation
|
page read and write
|
||
113A000
|
heap
|
page read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
1EE30AA9000
|
trusted library allocation
|
page read and write
|
||
1EE2EC2C000
|
trusted library allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1CFAE000
|
stack
|
page read and write
|
||
1EE36992000
|
trusted library allocation
|
page read and write
|
||
56C7000
|
trusted library allocation
|
page read and write
|
||
576C000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
141A000
|
heap
|
page read and write
|
||
1EE304DE000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
42BF000
|
stack
|
page read and write
|
||
1EE2A5D0000
|
trusted library section
|
page readonly
|
||
260AA498000
|
heap
|
page read and write
|
||
1EE301FE000
|
trusted library allocation
|
page read and write
|
||
4321000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
1EE322B3000
|
trusted library allocation
|
page read and write
|
||
53C7000
|
trusted library allocation
|
page read and write
|
||
1EE2E800000
|
trusted library allocation
|
page read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
1B55E000
|
stack
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
1EE2578D000
|
heap
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
1EE25796000
|
heap
|
page read and write
|
||
1EE2EC98000
|
trusted library allocation
|
page read and write
|
||
17F377C0000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE3107A000
|
trusted library allocation
|
page read and write
|
||
1D52F000
|
heap
|
page read and write
|
||
1EE3691E000
|
trusted library allocation
|
page read and write
|
||
1EE30600000
|
trusted library allocation
|
page read and write
|
||
1EE300E4000
|
trusted library allocation
|
page read and write
|
||
260AA46A000
|
heap
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE2BB0C000
|
trusted library allocation
|
page read and write
|
||
1EE2E5A5000
|
trusted library allocation
|
page read and write
|
||
1EE3027A000
|
trusted library allocation
|
page read and write
|
||
5EB2000
|
trusted library allocation
|
page read and write
|
||
260AA3A9000
|
heap
|
page read and write
|
||
56EF000
|
stack
|
page read and write
|
||
1EE2578F000
|
heap
|
page read and write
|
||
1EE322F3000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
remote allocation
|
page read and write
|
||
1EE32007000
|
trusted library allocation
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
46BE000
|
stack
|
page read and write
|
||
2CC0000
|
direct allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
1EE307C9000
|
trusted library allocation
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
1EE2E901000
|
trusted library allocation
|
page read and write
|
||
5EB5000
|
trusted library allocation
|
page read and write
|
||
1EE38B64000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
1EE2A1E5000
|
trusted library allocation
|
page read and write
|
||
A4C000
|
unkown
|
page execute and write copy
|
||
557000
|
unkown
|
page execute and write copy
|
||
9AB000
|
unkown
|
page execute and read and write
|
||
1EE257AA000
|
heap
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
260AA4A7000
|
heap
|
page read and write
|
||
1EE33600000
|
trusted library allocation
|
page read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
56C7000
|
trusted library allocation
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
5BE8000
|
trusted library allocation
|
page read and write
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
1EE25754000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1019000
|
heap
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
4C33000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
1EE2EB03000
|
trusted library allocation
|
page read and write
|
||
1EE2AAEE000
|
trusted library allocation
|
page read and write
|
||
1EE2578B000
|
heap
|
page read and write
|
||
1EE2DD7B000
|
trusted library allocation
|
page read and write
|
||
1EE368B5000
|
trusted library allocation
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
1EE309D3000
|
trusted library allocation
|
page read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
1EE303B3000
|
trusted library allocation
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
1EE2E5A5000
|
trusted library allocation
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
1EE2E5A5000
|
trusted library allocation
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
1EE36944000
|
trusted library allocation
|
page read and write
|
||
4442000
|
heap
|
page read and write
|
||
1EE2A2EF000
|
trusted library allocation
|
page read and write
|
||
1EE300C7000
|
trusted library allocation
|
page read and write
|
||
1EE30A1A000
|
trusted library allocation
|
page read and write
|
||
5B3D000
|
trusted library allocation
|
page read and write
|
||
1EE309B3000
|
trusted library allocation
|
page read and write
|
||
4B8F000
|
stack
|
page read and write
|
||
1EE32119000
|
trusted library allocation
|
page read and write
|
||
3E478FE000
|
stack
|
page read and write
|
||
1EE3049F000
|
trusted library allocation
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
1EE30B43000
|
trusted library allocation
|
page read and write
|
||
1EE2FF87000
|
trusted library allocation
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
11BB000
|
heap
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
1EE2E437000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
5EB5000
|
trusted library allocation
|
page read and write
|
||
1EE2DF70000
|
heap
|
page read and write
|
||
1EE317AC000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
1EE3686E000
|
trusted library allocation
|
page read and write
|
||
1EE368DC000
|
trusted library allocation
|
page read and write
|
||
52F7000
|
trusted library allocation
|
page read and write
|
||
11AB000
|
heap
|
page read and write
|
||
1EE32161000
|
trusted library allocation
|
page read and write
|
||
529C000
|
trusted library allocation
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
1EE3695B000
|
trusted library allocation
|
page read and write
|
||
1EE367D4000
|
trusted library allocation
|
page read and write
|
||
1EE2F378000
|
trusted library allocation
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
1EE2A775000
|
trusted library allocation
|
page read and write
|
||
1EE2AA9B000
|
trusted library allocation
|
page read and write
|
||
1EE2F635000
|
trusted library allocation
|
page read and write
|
||
5236000
|
trusted library allocation
|
page read and write
|
||
CD3000
|
heap
|
page read and write
|
||
1EE2578B000
|
heap
|
page read and write
|
||
5283000
|
trusted library allocation
|
page read and write
|
||
558E000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
48FF000
|
stack
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
F6F000
|
stack
|
page read and write
|
||
1EE36700000
|
trusted library allocation
|
page read and write
|
||
1EE2A200000
|
trusted library allocation
|
page read and write
|
||
806C000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
1EE313EA000
|
trusted library allocation
|
page read and write
|
||
565E000
|
trusted library allocation
|
page read and write
|
||
1B69D000
|
stack
|
page read and write
|
||
45C0000
|
heap
|
page read and write
|
||
4E00000
|
heap
|
page read and write
|
||
52D7000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
direct allocation
|
page read and write
|
||
1EE3028E000
|
trusted library allocation
|
page read and write
|
||
1EE3093A000
|
trusted library allocation
|
page read and write
|
||
1EE2E523000
|
trusted library allocation
|
page read and write
|
||
1EE322B0000
|
trusted library allocation
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
1EE30798000
|
trusted library allocation
|
page read and write
|
||
1EE2E4CB000
|
trusted library allocation
|
page read and write
|
||
1EE3688A000
|
trusted library allocation
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
56D000
|
unkown
|
page execute and write copy
|
||
443E000
|
stack
|
page read and write
|
||
1EE2E5E6000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
1EE25746000
|
heap
|
page read and write
|
||
4C5000
|
unkown
|
page execute and read and write
|
||
1EE2F501000
|
trusted library allocation
|
page read and write
|
||
732000
|
unkown
|
page execute and read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
1B8FC000
|
stack
|
page read and write
|
||
43E000
|
unkown
|
page execute and write copy
|
||
1EE3661A000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE30BCC000
|
trusted library allocation
|
page read and write
|
||
B64000
|
unkown
|
page readonly
|
||
1EE309E0000
|
trusted library allocation
|
page read and write
|
||
1EE2DABE000
|
trusted library allocation
|
page read and write
|
||
1EE2DAA3000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE3688A000
|
trusted library allocation
|
page read and write
|
||
1D52F000
|
heap
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
1EE36AE7000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
1EE25753000
|
heap
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
1EE305E9000
|
trusted library allocation
|
page read and write
|
||
1EE2F000000
|
trusted library allocation
|
page read and write
|
||
5FFD000
|
trusted library allocation
|
page read and write
|
||
17F378E6000
|
heap
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
E3C000
|
stack
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
1EE2F6AD000
|
trusted library allocation
|
page read and write
|
||
1EE2C300000
|
trusted library allocation
|
page read and write
|
||
1EE2EA8E000
|
trusted library allocation
|
page read and write
|
||
1EE36AFC000
|
trusted library allocation
|
page read and write
|
||
1EE2575F000
|
heap
|
page read and write
|
||
260AA43C000
|
heap
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1EE36833000
|
trusted library allocation
|
page read and write
|
||
C99000
|
heap
|
page read and write
|
||
1EE368F3000
|
trusted library allocation
|
page read and write
|
||
17F37CB7000
|
trusted library allocation
|
page read and write
|
||
1E083CD0000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1EE31374000
|
trusted library allocation
|
page read and write
|
||
260AA440000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
524E000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE3686C000
|
trusted library allocation
|
page read and write
|
||
511B43A000
|
stack
|
page read and write
|
||
260AA4A7000
|
heap
|
page read and write
|
||
1EE1EA03000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE2E703000
|
trusted library allocation
|
page read and write
|
||
1EE36890000
|
trusted library allocation
|
page read and write
|
||
1EE25754000
|
heap
|
page read and write
|
||
2FE0000
|
direct allocation
|
page execute and read and write
|
||
1C4E000
|
stack
|
page read and write
|
||
1EE30877000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1EE30E5E000
|
trusted library allocation
|
page read and write
|
||
1EE36ADB000
|
trusted library allocation
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
1091000
|
heap
|
page read and write
|
||
1656000
|
heap
|
page read and write
|
||
1EE3683F000
|
trusted library allocation
|
page read and write
|
||
1EE25746000
|
heap
|
page read and write
|
||
5ABF000
|
trusted library allocation
|
page read and write
|
||
1EE2AAD2000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
11A9000
|
heap
|
page read and write
|
||
67F0000
|
heap
|
page read and write
|
||
1EE305E6000
|
trusted library allocation
|
page read and write
|
||
1EE202B3000
|
heap
|
page read and write
|
||
2D0000
|
unkown
|
page execute and write copy
|
||
A74000
|
heap
|
page read and write
|
||
1EE2578F000
|
heap
|
page read and write
|
||
1EE36CE1000
|
trusted library allocation
|
page read and write
|
||
1EE25730000
|
heap
|
page read and write
|
||
5589000
|
trusted library allocation
|
page read and write
|
||
1EE322EF000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
1EE33612000
|
trusted library allocation
|
page read and write
|
||
1EE30BEF000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
56E000
|
heap
|
page read and write
|
||
5BA8000
|
trusted library allocation
|
page read and write
|
||
511A03E000
|
stack
|
page read and write
|
||
1EE2A034000
|
trusted library allocation
|
page read and write
|
||
1EE30837000
|
trusted library allocation
|
page read and write
|
||
1EE2F0B0000
|
trusted library allocation
|
page read and write
|
||
12FD000
|
stack
|
page read and write
|
||
601F000
|
trusted library allocation
|
page read and write
|
||
1EE2C10F000
|
trusted library allocation
|
page read and write
|
||
5308000
|
trusted library allocation
|
page read and write
|
||
1EE36957000
|
trusted library allocation
|
page read and write
|
||
5280000
|
direct allocation
|
page read and write
|
||
2CC0000
|
direct allocation
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
60AD000
|
trusted library allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
1EE2AAE0000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
direct allocation
|
page read and write
|
||
1EE3093F000
|
trusted library allocation
|
page read and write
|
||
1EE305CB000
|
trusted library allocation
|
page read and write
|
||
250000
|
unkown
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
56A7000
|
trusted library allocation
|
page read and write
|
||
1EE1EAD7000
|
trusted library allocation
|
page read and write
|
||
1EE25753000
|
heap
|
page read and write
|
||
9D3000
|
unkown
|
page execute and write copy
|
||
4E01000
|
heap
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
1EE2DAA1000
|
trusted library allocation
|
page read and write
|
||
5200000
|
direct allocation
|
page execute and read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE30654000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE36870000
|
trusted library allocation
|
page read and write
|
||
1EE303C4000
|
trusted library allocation
|
page read and write
|
||
1EE2F8BC000
|
trusted library allocation
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
1EE2E903000
|
trusted library allocation
|
page read and write
|
||
1EE30AE0000
|
trusted library allocation
|
page read and write
|
||
458E000
|
stack
|
page read and write
|
||
1EE368F6000
|
trusted library allocation
|
page read and write
|
||
A20000
|
unkown
|
page execute and write copy
|
||
4A50000
|
direct allocation
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
AFA000
|
unkown
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
5020000
|
direct allocation
|
page read and write
|
||
1EE36B05000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
1EE30AA4000
|
trusted library allocation
|
page read and write
|
||
1EE320E2000
|
trusted library allocation
|
page read and write
|
||
1EE314ED000
|
trusted library allocation
|
page read and write
|
||
5AC3000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE2E9D7000
|
trusted library allocation
|
page read and write
|
||
5B4A000
|
trusted library allocation
|
page read and write
|
||
1EE2F05F000
|
trusted library allocation
|
page read and write
|
||
5EBC000
|
trusted library allocation
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
1EE30100000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE2F362000
|
trusted library allocation
|
page read and write
|
||
1EE30CDF000
|
trusted library allocation
|
page read and write
|
||
18FF000
|
stack
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE2E43E000
|
trusted library allocation
|
page read and write
|
||
260A9700000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
54FB000
|
trusted library allocation
|
page read and write
|
||
646000
|
heap
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
1EE36AD6000
|
trusted library allocation
|
page read and write
|
||
511A27E000
|
stack
|
page read and write
|
||
1D543000
|
heap
|
page read and write
|
||
1EE2BAD5000
|
trusted library allocation
|
page read and write
|
||
4F80000
|
direct allocation
|
page execute and read and write
|
||
1EE2F989000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
1EE31773000
|
trusted library allocation
|
page read and write
|
||
1EE2DDEC000
|
trusted library allocation
|
page read and write
|
||
1EE305CE000
|
trusted library allocation
|
page read and write
|
||
1EE2FF0D000
|
trusted library allocation
|
page read and write
|
||
1316000
|
heap
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
DCC000
|
stack
|
page read and write
|
||
5EBB000
|
trusted library allocation
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
1EE2EC69000
|
trusted library allocation
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
17EE000
|
stack
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
1EE305C8000
|
trusted library allocation
|
page read and write
|
||
5AA4000
|
trusted library allocation
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
1EE2BAAB000
|
trusted library allocation
|
page read and write
|
||
4321000
|
heap
|
page read and write
|
||
17F37D21000
|
trusted library allocation
|
page read and write
|
||
1EE3681D000
|
trusted library allocation
|
page read and write
|
||
1EE2EC6A000
|
trusted library allocation
|
page read and write
|
||
19BB45504000
|
trusted library allocation
|
page read and write
|
||
56FC000
|
trusted library allocation
|
page read and write
|
||
1363000
|
heap
|
page read and write
|
||
1EE2F39B000
|
trusted library allocation
|
page read and write
|
||
4321000
|
heap
|
page read and write
|
||
1EE30BFE000
|
trusted library allocation
|
page read and write
|
||
1EE3051C000
|
trusted library allocation
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
1EE303D0000
|
trusted library allocation
|
page read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
602000
|
heap
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
592000
|
unkown
|
page execute and read and write
|
||
1EE25744000
|
heap
|
page read and write
|
||
511127E000
|
stack
|
page read and write
|
||
1EE2F924000
|
trusted library allocation
|
page read and write
|
||
17F4000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
1EE30400000
|
trusted library allocation
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
260AA4A7000
|
heap
|
page read and write
|
||
17F37C23000
|
trusted library allocation
|
page read and write
|
||
1D54C000
|
heap
|
page read and write
|
||
1EE3225A000
|
trusted library allocation
|
page read and write
|
||
1EE25757000
|
heap
|
page read and write
|
||
4B7F000
|
stack
|
page read and write
|
||
1EE30903000
|
trusted library allocation
|
page read and write
|
||
1EE36960000
|
trusted library allocation
|
page read and write
|
||
1D10000
|
heap
|
page read and write
|
||
52F000
|
unkown
|
page execute and read and write
|
||
1EE305C6000
|
trusted library allocation
|
page read and write
|
||
1EE2EC47000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
1EE2E64C000
|
trusted library allocation
|
page read and write
|
||
1EE38CD0000
|
trusted library allocation
|
page read and write
|
||
1EE30617000
|
trusted library allocation
|
page read and write
|
||
1EE2AAF6000
|
trusted library allocation
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
260A9D11000
|
heap
|
page read and write
|
||
1EE30700000
|
trusted library allocation
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
29640000
|
heap
|
page read and write
|
||
529B000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
1EE3669B000
|
trusted library allocation
|
page read and write
|
||
1EE30956000
|
trusted library allocation
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
1D52B000
|
heap
|
page read and write
|
||
1EE2EC4B000
|
trusted library allocation
|
page read and write
|
||
1EE36876000
|
trusted library allocation
|
page read and write
|
||
5583000
|
trusted library allocation
|
page read and write
|
||
52C5000
|
trusted library allocation
|
page read and write
|
||
1EE302F5000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
1EE302E2000
|
trusted library allocation
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
D42000
|
unkown
|
page execute and read and write
|
||
1EE30435000
|
trusted library allocation
|
page read and write
|
||
1EE3050E000
|
trusted library allocation
|
page read and write
|
||
3F6D000
|
stack
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
67B2000
|
trusted library allocation
|
page read and write
|
||
17F37C0D000
|
trusted library allocation
|
page read and write
|
||
419F000
|
stack
|
page read and write
|
||
59B000
|
unkown
|
page execute and read and write
|
||
5B41000
|
trusted library allocation
|
page read and write
|
||
1EE30AA0000
|
trusted library allocation
|
page read and write
|
||
1EE2E334000
|
trusted library allocation
|
page read and write
|
||
1EE30A9B000
|
trusted library allocation
|
page read and write
|
||
260AA498000
|
heap
|
page read and write
|
||
529B000
|
trusted library allocation
|
page read and write
|
||
1EE304E8000
|
trusted library allocation
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
1EE257B4000
|
heap
|
page read and write
|
||
4890000
|
heap
|
page read and write
|
||
1EE2EFA1000
|
trusted library allocation
|
page read and write
|
||
1400000
|
direct allocation
|
page read and write
|
||
4F3C000
|
stack
|
page read and write
|
||
5118B4F000
|
stack
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
1EE2030E000
|
heap
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
1EE2E337000
|
trusted library allocation
|
page read and write
|
||
5EB4000
|
trusted library allocation
|
page read and write
|
||
52DC000
|
trusted library allocation
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
9D6000
|
unkown
|
page execute and read and write
|
||
457F000
|
stack
|
page read and write
|
||
1EE32180000
|
trusted library allocation
|
page read and write
|
||
2FDF56B04000
|
trusted library allocation
|
page read and write
|
||
1EE30AFA000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
260A9CB5000
|
unkown
|
page execute read
|
||
CD3000
|
heap
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1EE36AC8000
|
trusted library allocation
|
page read and write
|
||
40FE000
|
stack
|
page read and write
|
||
5BDF000
|
trusted library allocation
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
11B7000
|
heap
|
page read and write
|
||
52A2000
|
trusted library allocation
|
page read and write
|
||
2BB000
|
unkown
|
page execute and read and write
|
||
1EE2575A000
|
heap
|
page read and write
|
||
1EE30A11000
|
trusted library allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
2DBB000
|
stack
|
page read and write
|
||
5BB9000
|
trusted library allocation
|
page read and write
|
||
F5D000
|
stack
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
1EE2A084000
|
trusted library allocation
|
page read and write
|
||
5638000
|
trusted library allocation
|
page read and write
|
||
1EE2E5DE000
|
trusted library allocation
|
page read and write
|
||
5B3D000
|
trusted library allocation
|
page read and write
|
||
1EE3696F000
|
trusted library allocation
|
page read and write
|
||
1EE30AE4000
|
trusted library allocation
|
page read and write
|
||
1EE2575A000
|
heap
|
page read and write
|
||
1EE2FC60000
|
trusted library section
|
page read and write
|
||
52D9000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
236DB000
|
heap
|
page read and write
|
||
1166000
|
heap
|
page read and write
|
||
1EE30875000
|
trusted library allocation
|
page read and write
|
||
1EE303F7000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
1EE308F0000
|
trusted library allocation
|
page read and write
|
||
1EE2E05D000
|
heap
|
page read and write
|
||
1EE30A3E000
|
trusted library allocation
|
page read and write
|
||
145A000
|
heap
|
page read and write
|
||
1EE2E47F000
|
trusted library allocation
|
page read and write
|
||
1EE2F3AE000
|
trusted library allocation
|
page read and write
|
||
5020000
|
direct allocation
|
page read and write
|
||
1EE368F6000
|
trusted library allocation
|
page read and write
|
||
1EE25742000
|
heap
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
1EE3088A000
|
trusted library allocation
|
page read and write
|
||
1EE2E475000
|
trusted library allocation
|
page read and write
|
||
1EE2E453000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
1EE30303000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
A36000
|
unkown
|
page execute and write copy
|
||
1EE2EC98000
|
trusted library allocation
|
page read and write
|
||
1EE2E8F6000
|
trusted library allocation
|
page read and write
|
||
96D000
|
unkown
|
page read and write
|
||
595D000
|
stack
|
page read and write
|
||
1EE2575F000
|
heap
|
page read and write
|
||
1EE3115F000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
B0C000
|
unkown
|
page execute and write copy
|
||
1EE308C1000
|
trusted library allocation
|
page read and write
|
||
1EE2ECF6000
|
trusted library allocation
|
page read and write
|
||
52C2000
|
trusted library allocation
|
page read and write
|
||
4C22000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
511B837000
|
stack
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
1EE2C60B000
|
trusted library allocation
|
page read and write
|
||
1EE30AFA000
|
trusted library allocation
|
page read and write
|
||
5F70000
|
trusted library allocation
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
5BED000
|
trusted library allocation
|
page read and write
|
||
260AA43C000
|
heap
|
page read and write
|
||
3ABE000
|
stack
|
page read and write
|
||
1EE3118A000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1400000
|
direct allocation
|
page read and write
|
||
9C1000
|
unkown
|
page execute and write copy
|
||
1EE38B03000
|
trusted library allocation
|
page read and write
|
||
1EE30421000
|
trusted library allocation
|
page read and write
|
||
1EE2E478000
|
trusted library allocation
|
page read and write
|
||
260AA428000
|
heap
|
page read and write
|
||
1EE30C1F000
|
trusted library allocation
|
page read and write
|
||
58FC000
|
trusted library allocation
|
page read and write
|
||
7DBC000
|
stack
|
page read and write
|
||
1EE3106F000
|
trusted library allocation
|
page read and write
|
||
564000
|
unkown
|
page execute and read and write
|
||
1EE302A0000
|
trusted library allocation
|
page read and write
|
||
52C4000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
52F0000
|
trusted library allocation
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
1E083BCA000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
5AB4000
|
trusted library allocation
|
page read and write
|
||
5682000
|
trusted library allocation
|
page read and write
|
||
1EE2A676000
|
trusted library allocation
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE2576E000
|
heap
|
page read and write
|
||
1EE30800000
|
trusted library allocation
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
52D3000
|
trusted library allocation
|
page read and write
|
||
5B34000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
4931000
|
heap
|
page read and write
|
||
1EE2EA6B000
|
trusted library allocation
|
page read and write
|
||
1EE2C00D000
|
trusted library allocation
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
1EE3097C000
|
trusted library allocation
|
page read and write
|
||
1EE30AE9000
|
trusted library allocation
|
page read and write
|
||
1EE36700000
|
trusted library allocation
|
page read and write
|
||
1EE3096D000
|
trusted library allocation
|
page read and write
|
||
52D2000
|
trusted library allocation
|
page read and write
|
||
893C1FC000
|
stack
|
page read and write
|
||
8DB000
|
unkown
|
page write copy
|
||
521E000
|
stack
|
page read and write
|
||
6F8F2000
|
unkown
|
page readonly
|
||
32FE000
|
stack
|
page read and write
|
||
146E000
|
stack
|
page read and write
|
||
67E1000
|
heap
|
page read and write
|
||
B5C000
|
unkown
|
page write copy
|
||
1EE2EC51000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
459E000
|
stack
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
1EE30993000
|
trusted library allocation
|
page read and write
|
||
1EE309D1000
|
trusted library allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
1400000
|
direct allocation
|
page read and write
|
||
1EE2579C000
|
heap
|
page read and write
|
||
1EE2FF18000
|
trusted library allocation
|
page read and write
|
||
7DFE000
|
stack
|
page read and write
|
||
5118B3E000
|
stack
|
page read and write
|
||
1EE2BB3A000
|
trusted library allocation
|
page read and write
|
||
1EE305BE000
|
trusted library allocation
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
1EE304C0000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1EE322B6000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
56EC000
|
trusted library allocation
|
page read and write
|
||
1EE30993000
|
trusted library allocation
|
page read and write
|
||
9DE000
|
unkown
|
page execute and write copy
|
||
1EE3683F000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
2F78B000
|
heap
|
page read and write
|
||
4AB1000
|
direct allocation
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
1EE2E525000
|
trusted library allocation
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
F74D977B000
|
trusted library allocation
|
page read and write
|
||
1EE25753000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE36A2F000
|
trusted library allocation
|
page read and write
|
||
4A9E000
|
stack
|
page read and write
|
||
1EE36C9C000
|
trusted library allocation
|
page read and write
|
||
1EE2FF76000
|
trusted library allocation
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
1117000
|
heap
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
1EE2E892000
|
trusted library allocation
|
page read and write
|
||
2B49A951000
|
trusted library allocation
|
page execute read
|
||
1134000
|
heap
|
page read and write
|
||
2A3E000
|
stack
|
page read and write
|
||
1EE36746000
|
trusted library allocation
|
page read and write
|
||
1EE3088C000
|
trusted library allocation
|
page read and write
|
||
11B1000
|
heap
|
page read and write
|
||
1EE2A2F6000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
1EE2B960000
|
heap
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
1EE3044F000
|
trusted library allocation
|
page read and write
|
||
1EE301A3000
|
trusted library allocation
|
page read and write
|
||
A07000
|
unkown
|
page execute and read and write
|
||
45C1000
|
heap
|
page read and write
|
||
5EB6000
|
trusted library allocation
|
page read and write
|
||
278C000
|
stack
|
page read and write
|
||
1EE25756000
|
heap
|
page read and write
|
||
1EE30AD1000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1400000
|
direct allocation
|
page read and write
|
||
1EE30A13000
|
trusted library allocation
|
page read and write
|
||
1EE25752000
|
heap
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
3991000
|
heap
|
page read and write
|
||
1EE36803000
|
trusted library allocation
|
page read and write
|
||
1EE2A77D000
|
trusted library allocation
|
page read and write
|
||
1EE30AB5000
|
trusted library allocation
|
page read and write
|
||
5647000
|
trusted library allocation
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
1D546000
|
heap
|
page read and write
|
||
4BA0000
|
direct allocation
|
page execute and read and write
|
||
52A7000
|
trusted library allocation
|
page read and write
|
||
23AB08F0000
|
heap
|
page read and write
|
||
1EE25754000
|
heap
|
page read and write
|
||
5656000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
1B24E000
|
stack
|
page read and write
|
||
128E000
|
stack
|
page read and write
|
||
1EE2BA5F000
|
trusted library allocation
|
page read and write
|
||
1193000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
BD4000
|
heap
|
page read and write
|
||
5588000
|
trusted library allocation
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
8B0000
|
unkown
|
page readonly
|
||
5B45000
|
trusted library allocation
|
page read and write
|
||
1EE30A1E000
|
trusted library allocation
|
page read and write
|
||
1EE1E6A0000
|
heap
|
page read and write
|
||
1EE2E49C000
|
trusted library allocation
|
page read and write
|
||
1EE38832000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
4F40000
|
direct allocation
|
page execute and read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE3133B000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE3116B000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
1D54C000
|
heap
|
page read and write
|
||
931000
|
unkown
|
page execute and read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
260A9CC0000
|
unkown
|
page execute read
|
||
1D54C000
|
heap
|
page read and write
|
||
581E000
|
stack
|
page read and write
|
||
4930000
|
heap
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
569D000
|
stack
|
page read and write
|
||
1EE2EC5A000
|
trusted library allocation
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
1EE36C51000
|
trusted library allocation
|
page read and write
|
||
1EE368DC000
|
trusted library allocation
|
page read and write
|
||
1EE2FF39000
|
trusted library allocation
|
page read and write
|
||
573000
|
unkown
|
page execute and write copy
|
||
A74000
|
heap
|
page read and write
|
||
1EE2F900000
|
trusted library allocation
|
page read and write
|
||
1EE36CCD000
|
trusted library allocation
|
page read and write
|
||
2B4E0B404000
|
trusted library allocation
|
page read and write
|
||
1EE31709000
|
trusted library allocation
|
page read and write
|
||
53C3000
|
trusted library allocation
|
page read and write
|
||
260A97F5000
|
trusted library allocation
|
page read and write
|
||
5FD8000
|
trusted library allocation
|
page read and write
|
||
5B34000
|
trusted library allocation
|
page read and write
|
||
1EE36A8C000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
1EE2ECBC000
|
trusted library allocation
|
page read and write
|
||
1EE2BAA8000
|
trusted library allocation
|
page read and write
|
||
2F6E0000
|
trusted library allocation
|
page read and write
|
||
716000
|
unkown
|
page execute and write copy
|
||
1EE2575B000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
1EE2EC60000
|
trusted library allocation
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
1EE38B00000
|
trusted library allocation
|
page read and write
|
||
1123000
|
heap
|
page read and write
|
||
5E1000
|
unkown
|
page execute and read and write
|
||
DB0FFFE000
|
stack
|
page read and write
|
||
740D000
|
stack
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
1EE2579C000
|
heap
|
page read and write
|
||
1EE31287000
|
trusted library allocation
|
page read and write
|
||
1EE2FA03000
|
trusted library allocation
|
page read and write
|
||
5611000
|
trusted library allocation
|
page read and write
|
||
1EE30BFE000
|
trusted library allocation
|
page read and write
|
||
1EE309BF000
|
trusted library allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
1EE2F3C3000
|
trusted library allocation
|
page read and write
|
||
5119FFB000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4F40000
|
direct allocation
|
page execute and read and write
|
||
11A6000
|
unkown
|
page execute and write copy
|
||
260AA3F9000
|
heap
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
1EE36AFE000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE30BDD000
|
trusted library allocation
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
1EE2573B000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
1D530000
|
heap
|
page read and write
|
||
786000
|
unkown
|
page write copy
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
4BBE000
|
stack
|
page read and write
|
||
4A7E000
|
stack
|
page read and write
|
||
F74D970C000
|
trusted library allocation
|
page read and write
|
||
5E1E000
|
stack
|
page read and write
|
||
1EE36CD4000
|
trusted library allocation
|
page read and write
|
||
41DD000
|
stack
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
23AB0D00000
|
trusted library allocation
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
1EE30483000
|
trusted library allocation
|
page read and write
|
||
1EE2F2DB000
|
trusted library allocation
|
page read and write
|
||
5E2000
|
heap
|
page read and write
|
||
1D526000
|
heap
|
page read and write
|
||
5587000
|
trusted library allocation
|
page read and write
|
||
1E083BCA000
|
heap
|
page read and write
|
||
260A9786000
|
trusted library allocation
|
page read and write
|
||
27F7000
|
heap
|
page read and write
|
||
1EE36878000
|
trusted library allocation
|
page read and write
|
||
1EE36815000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
unkown
|
page readonly
|
||
1454000
|
heap
|
page read and write
|
||
1EE2BB7C000
|
trusted library allocation
|
page read and write
|
||
1EE2E628000
|
trusted library allocation
|
page read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
1EE2C708000
|
trusted library allocation
|
page read and write
|
||
1EE30BCF000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
1F02D970000
|
trusted library section
|
page readonly
|
||
511AAFE000
|
stack
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
1EE305A6000
|
trusted library allocation
|
page read and write
|
||
52D000
|
unkown
|
page execute and write copy
|
||
CDF000
|
stack
|
page read and write
|
||
45D000
|
unkown
|
page execute and read and write
|
||
1EE307AB000
|
trusted library allocation
|
page read and write
|
||
115F000
|
heap
|
page read and write
|
||
1EE2F78F000
|
trusted library allocation
|
page read and write
|
||
5E8D000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE2F400000
|
trusted library allocation
|
page read and write
|
||
260A9767000
|
trusted library allocation
|
page read and write
|
||
1EE257AA000
|
heap
|
page read and write
|
||
1EE30B6B000
|
trusted library allocation
|
page read and write
|
||
1EE2DAE0000
|
trusted library allocation
|
page read and write
|
||
1EE32103000
|
trusted library allocation
|
page read and write
|
||
B0C000
|
unkown
|
page readonly
|
||
1EE2F1A9000
|
trusted library allocation
|
page read and write
|
||
1400000
|
direct allocation
|
page read and write
|
||
1EE2A090000
|
trusted library allocation
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
1EE30AE4000
|
trusted library allocation
|
page read and write
|
||
1EE36909000
|
trusted library allocation
|
page read and write
|
||
23AB0C90000
|
heap
|
page read and write
|
||
5F79000
|
trusted library allocation
|
page read and write
|
||
1EE30AF8000
|
trusted library allocation
|
page read and write
|
||
1EE1EA6B000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1EE2EA99000
|
trusted library allocation
|
page read and write
|
||
441F000
|
stack
|
page read and write
|
||
1166000
|
heap
|
page read and write
|
||
5286000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
17F37D17000
|
trusted library allocation
|
page read and write
|
||
52F000
|
unkown
|
page execute and read and write
|
||
132F000
|
stack
|
page read and write
|
||
1D53E000
|
heap
|
page read and write
|
||
5294000
|
trusted library allocation
|
page read and write
|
||
2CAB000
|
stack
|
page read and write
|
||
1327000
|
heap
|
page read and write
|
||
1EE25794000
|
heap
|
page read and write
|
||
1D52F000
|
heap
|
page read and write
|
||
5344000
|
trusted library allocation
|
page read and write
|
||
1EE2ED00000
|
trusted library section
|
page readonly
|
||
61E00000
|
direct allocation
|
page execute and read and write
|
||
529B000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE3683D000
|
trusted library allocation
|
page read and write
|
||
1EE309FC000
|
trusted library allocation
|
page read and write
|
||
25786F317000
|
trusted library allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
1EE306FD000
|
trusted library allocation
|
page read and write
|
||
41FF000
|
stack
|
page read and write
|
||
5116E39000
|
stack
|
page read and write
|
||
1D524000
|
heap
|
page read and write
|
||
1EE25787000
|
heap
|
page read and write
|
||
1EE303E3000
|
trusted library allocation
|
page read and write
|
||
1EE2E5C9000
|
trusted library allocation
|
page read and write
|
||
1EE30BE0000
|
trusted library allocation
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
D0F000
|
heap
|
page read and write
|
||
1EE25760000
|
heap
|
page read and write
|
||
1D530000
|
heap
|
page read and write
|
||
1EE30419000
|
trusted library allocation
|
page read and write
|
||
1EE3103E000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE2DAA9000
|
trusted library allocation
|
page read and write
|
||
5410000
|
direct allocation
|
page execute and read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
1EE308E4000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
5AFE000
|
trusted library allocation
|
page read and write
|
||
5582000
|
trusted library allocation
|
page read and write
|
||
1EE30937000
|
trusted library allocation
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
4F40000
|
direct allocation
|
page execute and read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
5648000
|
trusted library allocation
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
1EE3687A000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5294000
|
trusted library allocation
|
page read and write
|
||
5BA3000
|
trusted library allocation
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
1EE38B36000
|
trusted library allocation
|
page read and write
|
||
1EE25787000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
41BF000
|
stack
|
page read and write
|
||
1EE2F799000
|
trusted library allocation
|
page read and write
|
||
1EE2AB03000
|
trusted library allocation
|
page read and write
|
||
23AB0A49000
|
heap
|
page read and write
|
||
1EE317E4000
|
trusted library allocation
|
page read and write
|
||
1EE30A3B000
|
trusted library allocation
|
page read and write
|
||
1EE2AAD0000
|
trusted library allocation
|
page read and write
|
||
5C01000
|
trusted library allocation
|
page read and write
|
||
1EE2F3AA000
|
trusted library allocation
|
page read and write
|
||
1EE2DAEE000
|
trusted library allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
1EE25749000
|
heap
|
page read and write
|
||
1EE30C1F000
|
trusted library allocation
|
page read and write
|
||
1EE2A203000
|
trusted library allocation
|
page read and write
|
||
1E083BB7000
|
heap
|
page read and write
|
||
1EE2E489000
|
trusted library allocation
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4FC000
|
unkown
|
page execute and write copy
|
||
1EE313F3000
|
trusted library allocation
|
page read and write
|
||
1E083BAD000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
1EE31325000
|
trusted library allocation
|
page read and write
|
||
1EE2AAB4000
|
trusted library allocation
|
page read and write
|
||
562B000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
260A9778000
|
trusted library allocation
|
page read and write
|
||
1EE2BB65000
|
trusted library allocation
|
page read and write
|
||
117C000
|
heap
|
page read and write
|
||
1EE2DA52000
|
trusted library allocation
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
142E000
|
stack
|
page read and write
|
||
1E083BCA000
|
heap
|
page read and write
|
||
3E44D9E000
|
unkown
|
page readonly
|
||
2F3F000
|
stack
|
page read and write
|
||
B60000
|
unkown
|
page write copy
|
||
5EBA000
|
trusted library allocation
|
page read and write
|
||
466000
|
unkown
|
page execute and write copy
|
||
1EE309C8000
|
trusted library allocation
|
page read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
1EE25753000
|
heap
|
page read and write
|
||
1EE30AA9000
|
trusted library allocation
|
page read and write
|
||
5EB4000
|
trusted library allocation
|
page read and write
|
||
1EE2DD29000
|
trusted library allocation
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
1D520000
|
heap
|
page read and write
|
||
1EE2DDBE000
|
trusted library allocation
|
page read and write
|
||
1EE2BB2B000
|
trusted library allocation
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
52D3000
|
trusted library allocation
|
page read and write
|
||
1EE2DD99000
|
trusted library allocation
|
page read and write
|
||
1EE2D97D000
|
unclassified section
|
page read and write
|
||
1B26F000
|
stack
|
page read and write
|
||
11BE000
|
heap
|
page read and write
|
||
1EE31274000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
11A9000
|
heap
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
5285000
|
trusted library allocation
|
page read and write
|
||
1EE304C3000
|
trusted library allocation
|
page read and write
|
||
56A1000
|
trusted library allocation
|
page read and write
|
||
1EE2DDE8000
|
trusted library allocation
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
5116A2E000
|
stack
|
page read and write
|
||
1EE30A00000
|
trusted library allocation
|
page read and write
|
||
1EE2579C000
|
heap
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
1EE2F352000
|
trusted library allocation
|
page read and write
|
||
1EE30B9C000
|
trusted library allocation
|
page read and write
|
||
2D9C000
|
stack
|
page read and write
|
||
1EE368C9000
|
trusted library allocation
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
260AA47B000
|
heap
|
page read and write
|
||
1EE2DAF4000
|
trusted library allocation
|
page read and write
|
||
1EE30A97000
|
trusted library allocation
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
1EE309DA000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
direct allocation
|
page execute and read and write
|
||
1EE34700000
|
trusted library allocation
|
page read and write
|
||
DB11FFE000
|
stack
|
page read and write
|
||
5583000
|
trusted library allocation
|
page read and write
|
||
511148E000
|
stack
|
page read and write
|
||
17F37A23000
|
heap
|
page read and write
|
||
1EE3221B000
|
trusted library allocation
|
page read and write
|
||
454F000
|
stack
|
page read and write
|
||
1EE2F0E1000
|
trusted library allocation
|
page read and write
|
||
D27000
|
heap
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
1EE2575A000
|
heap
|
page read and write
|
||
271000
|
unkown
|
page execute and read and write
|
||
1EE303DB000
|
trusted library allocation
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
1EE2EC00000
|
trusted library allocation
|
page read and write
|
||
1EE25799000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
1EE3093F000
|
trusted library allocation
|
page read and write
|
||
5EB8000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE2F8C7000
|
trusted library allocation
|
page read and write
|
||
1EE2EA7F000
|
trusted library allocation
|
page read and write
|
||
1EE2E569000
|
trusted library allocation
|
page read and write
|
||
1EE30283000
|
trusted library allocation
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
1EE305E9000
|
trusted library allocation
|
page read and write
|
||
260AA431000
|
heap
|
page read and write
|
||
17F37982000
|
unclassified section
|
page read and write
|
||
1EE36948000
|
trusted library allocation
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1EE2DB41000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
unkown
|
page readonly
|
||
1EE2F9F9000
|
trusted library allocation
|
page read and write
|
||
1EE2DDEA000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE36CC1000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
direct allocation
|
page read and write
|
||
5B3D000
|
trusted library allocation
|
page read and write
|
||
1EE2DD93000
|
trusted library allocation
|
page read and write
|
||
1EE3686E000
|
trusted library allocation
|
page read and write
|
||
8CE000
|
unkown
|
page readonly
|
||
1EE30851000
|
trusted library allocation
|
page read and write
|
||
1EE2EC81000
|
trusted library allocation
|
page read and write
|
||
5BB6000
|
trusted library allocation
|
page read and write
|
||
1EE25739000
|
heap
|
page read and write
|
||
1EE32284000
|
trusted library allocation
|
page read and write
|
||
1EE30C0B000
|
trusted library allocation
|
page read and write
|
||
4420000
|
trusted library allocation
|
page read and write
|
||
58F2000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
1EE1E790000
|
heap
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
1EE2E46D000
|
trusted library allocation
|
page read and write
|
||
529A000
|
trusted library allocation
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
53A000
|
unkown
|
page execute and read and write
|
||
1EE2E722000
|
trusted library allocation
|
page read and write
|
||
260AA38D000
|
heap
|
page read and write
|
||
1EE36CFE000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE3097F000
|
trusted library allocation
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
58A000
|
unkown
|
page execute and read and write
|
||
1E083F07000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE368F8000
|
trusted library allocation
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
47CF000
|
stack
|
page read and write
|
||
1EE2F3A6000
|
trusted library allocation
|
page read and write
|
||
11B2000
|
heap
|
page read and write
|
||
1081000
|
heap
|
page read and write
|
||
1EE305FC000
|
trusted library allocation
|
page read and write
|
||
1EE25796000
|
heap
|
page read and write
|
||
5BCF000
|
trusted library allocation
|
page read and write
|
||
1EE30AA4000
|
trusted library allocation
|
page read and write
|
||
1EE302F5000
|
trusted library allocation
|
page read and write
|
||
1EE2E865000
|
trusted library allocation
|
page read and write
|
||
450000
|
unkown
|
page execute and read and write
|
||
1450000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1B1EC000
|
stack
|
page read and write
|
||
5589000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
64E000
|
unkown
|
page execute and read and write
|
||
1EE30AA9000
|
trusted library allocation
|
page read and write
|
||
1EE2A726000
|
trusted library allocation
|
page read and write
|
||
149E000
|
stack
|
page read and write
|
||
A3B000
|
unkown
|
page execute and write copy
|
||
1EE300ED000
|
trusted library allocation
|
page read and write
|
||
1EE2EC4E000
|
trusted library allocation
|
page read and write
|
||
113A000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1EE310C2000
|
trusted library allocation
|
page read and write
|
||
1EE368A8000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE32000000
|
trusted library allocation
|
page read and write
|
||
1EE25744000
|
heap
|
page read and write
|
||
1D54C000
|
heap
|
page read and write
|
||
1EE2DD00000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1351000
|
heap
|
page read and write
|
||
1EE2DD70000
|
trusted library allocation
|
page read and write
|
||
1EE30958000
|
trusted library allocation
|
page read and write
|
||
1EE3085D000
|
trusted library allocation
|
page read and write
|
||
5624000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
1EE2DD3C000
|
trusted library allocation
|
page read and write
|
||
1EE30A9B000
|
trusted library allocation
|
page read and write
|
||
1EE30A1A000
|
trusted library allocation
|
page read and write
|
||
1EE3098A000
|
trusted library allocation
|
page read and write
|
||
1EE2FFAF000
|
trusted library allocation
|
page read and write
|
||
1EE2E4CB000
|
trusted library allocation
|
page read and write
|
||
1EE30AE7000
|
trusted library allocation
|
page read and write
|
||
558D000
|
stack
|
page read and write
|
||
4EB000
|
unkown
|
page execute and read and write
|
||
519000
|
unkown
|
page execute and write copy
|
||
519000
|
unkown
|
page execute and write copy
|
||
4921000
|
direct allocation
|
page read and write
|
||
2B9000
|
unkown
|
page write copy
|
||
5114A31000
|
unkown
|
page read and write
|
||
6C621000
|
unkown
|
page execute read
|
||
452000
|
unkown
|
page execute and read and write
|
||
5DAE000
|
trusted library allocation
|
page read and write
|
||
1EE36870000
|
trusted library allocation
|
page read and write
|
||
5E7D000
|
trusted library allocation
|
page read and write
|
||
6234000
|
trusted library allocation
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
75BE000
|
stack
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
41FD000
|
stack
|
page read and write
|
||
511133A000
|
stack
|
page read and write
|
||
1EE1EAEC000
|
trusted library allocation
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
5EB4000
|
trusted library allocation
|
page read and write
|
||
351F000
|
stack
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE305E2000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
1D522000
|
heap
|
page read and write
|
||
5AF7000
|
trusted library allocation
|
page read and write
|
||
AF9CEDB000
|
stack
|
page read and write
|
||
B2C000
|
unkown
|
page readonly
|
||
260A97EB000
|
trusted library allocation
|
page read and write
|
||
1EE36968000
|
trusted library allocation
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
260AA3CA000
|
heap
|
page read and write
|
||
4920000
|
direct allocation
|
page execute and read and write
|
||
1037000
|
heap
|
page read and write
|
||
528F000
|
trusted library allocation
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
2CDE000
|
stack
|
page read and write
|
||
1EE2F3B0000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1D53D000
|
heap
|
page read and write
|
||
1EE2EB00000
|
trusted library allocation
|
page read and write
|
||
EF5000
|
stack
|
page read and write
|
||
1EE2EC98000
|
trusted library allocation
|
page read and write
|
||
5AA6000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
6B0000
|
direct allocation
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
1EE368CF000
|
trusted library allocation
|
page read and write
|
||
5114E33000
|
unkown
|
page read and write
|
||
1EE36A9D000
|
trusted library allocation
|
page read and write
|
||
4E4000
|
unkown
|
page execute and write copy
|
||
17F37C12000
|
trusted library allocation
|
page read and write
|
||
5AC8000
|
trusted library allocation
|
page read and write
|
||
1EE25754000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
37EE000
|
stack
|
page read and write
|
||
1EE2DA03000
|
trusted library allocation
|
page read and write
|
||
5FA2000
|
trusted library allocation
|
page read and write
|
||
260A9765000
|
trusted library allocation
|
page read and write
|
||
1EE2E484000
|
trusted library allocation
|
page read and write
|
||
1EE2EF18000
|
trusted library allocation
|
page read and write
|
||
1EE2E316000
|
trusted library allocation
|
page read and write
|
||
1EE300CD000
|
trusted library allocation
|
page read and write
|
||
1177000
|
heap
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
5C4E000
|
trusted library allocation
|
page read and write
|
||
1EE3097F000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
1EE30C00000
|
trusted library allocation
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
5648000
|
trusted library allocation
|
page read and write
|
||
546B000
|
trusted library allocation
|
page read and write
|
||
1EE3121E000
|
trusted library allocation
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
52A8000
|
trusted library allocation
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
1EE305F2000
|
trusted library allocation
|
page read and write
|
||
567F000
|
trusted library allocation
|
page read and write
|
||
1EE3095B000
|
trusted library allocation
|
page read and write
|
||
1EE31100000
|
trusted library allocation
|
page read and write
|
||
1EE2A21D000
|
trusted library allocation
|
page read and write
|
||
564D000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE30E03000
|
trusted library allocation
|
page read and write
|
||
1EE30BE3000
|
trusted library allocation
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
528F000
|
trusted library allocation
|
page read and write
|
||
5F56000
|
trusted library allocation
|
page read and write
|
||
1EE2BB46000
|
trusted library allocation
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE2BB19000
|
trusted library allocation
|
page read and write
|
||
1EE25740000
|
heap
|
page read and write
|
||
1EE3140C000
|
trusted library allocation
|
page read and write
|
||
1CE6D000
|
stack
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
1EE32092000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
260A94E0000
|
heap
|
page read and write
|
||
43E000
|
unkown
|
page execute and write copy
|
||
1EE36ACD000
|
trusted library allocation
|
page read and write
|
||
1EE305FC000
|
trusted library allocation
|
page read and write
|
||
1EE2FF03000
|
trusted library allocation
|
page read and write
|
||
9D1000
|
unkown
|
page execute and read and write
|
||
1EE25753000
|
heap
|
page read and write
|
||
1EE2EBC6000
|
trusted library allocation
|
page read and write
|
||
1EE2AB25000
|
trusted library allocation
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
1EE30AA0000
|
trusted library allocation
|
page read and write
|
||
1EE30430000
|
trusted library allocation
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
260A9F1C000
|
trusted library allocation
|
page read and write
|
||
5285000
|
trusted library allocation
|
page read and write
|
||
1EE3680D000
|
trusted library allocation
|
page read and write
|
||
41BF000
|
stack
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
511403E000
|
stack
|
page read and write
|
||
51A000
|
unkown
|
page execute and read and write
|
||
1EE309F0000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
5BB9000
|
trusted library allocation
|
page read and write
|
||
B4C000
|
stack
|
page read and write
|
||
6F860000
|
unkown
|
page readonly
|
||
1234000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE257A3000
|
heap
|
page read and write
|
||
28B0000
|
heap
|
page read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
4C48000
|
trusted library allocation
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
17F37990000
|
heap
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
976000
|
unkown
|
page execute and write copy
|
||
2E4B000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
5B3B000
|
trusted library allocation
|
page read and write
|
||
1EE2FD00000
|
trusted library allocation
|
page read and write
|
||
450000
|
unkown
|
page execute and read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
1EE30A24000
|
trusted library allocation
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
1EE36890000
|
trusted library allocation
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
1EE2D972000
|
unclassified section
|
page read and write
|
||
58F7000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
2B9000
|
unkown
|
page write copy
|
||
1EE309D7000
|
trusted library allocation
|
page read and write
|
||
1EE3055E000
|
trusted library allocation
|
page read and write
|
||
5EB5000
|
trusted library allocation
|
page read and write
|
||
1D54C000
|
heap
|
page read and write
|
||
E5C000
|
stack
|
page read and write
|
||
C9B000
|
heap
|
page read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
1EE2E08B000
|
heap
|
page read and write
|
||
3E4817E000
|
stack
|
page read and write
|
||
5220000
|
heap
|
page read and write
|
||
1EE3686C000
|
trusted library allocation
|
page read and write
|
||
1EE302BD000
|
trusted library allocation
|
page read and write
|
||
1EE3097F000
|
trusted library allocation
|
page read and write
|
||
1EE38BB7000
|
trusted library allocation
|
page read and write
|
||
1EE3104F000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
5AF5000
|
trusted library allocation
|
page read and write
|
||
56B1000
|
trusted library allocation
|
page read and write
|
||
1EE30BCA000
|
trusted library allocation
|
page read and write
|
||
32FEDA403000
|
trusted library allocation
|
page read and write
|
||
3F1F000
|
stack
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
1EE368B5000
|
trusted library allocation
|
page read and write
|
||
1EE2C800000
|
trusted library allocation
|
page read and write
|
||
1EE2575F000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE36AFC000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
1EE30809000
|
trusted library allocation
|
page read and write
|
||
6C7FF000
|
unkown
|
page write copy
|
||
1EE3049F000
|
trusted library allocation
|
page read and write
|
||
9E7000
|
unkown
|
page execute and read and write
|
||
A91000
|
unkown
|
page execute read
|
||
1EE25753000
|
heap
|
page read and write
|
||
1EE2A726000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
1EE2B603000
|
trusted library allocation
|
page read and write
|
||
1EE305E2000
|
trusted library allocation
|
page read and write
|
||
1EE31370000
|
trusted library allocation
|
page read and write
|
||
1EE2F603000
|
trusted library allocation
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE25754000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
5FA7000
|
trusted library allocation
|
page read and write
|
||
A10000
|
unkown
|
page execute and read and write
|
||
5F8A000
|
trusted library allocation
|
page read and write
|
||
1EE2BB1C000
|
trusted library allocation
|
page read and write
|
||
52D3000
|
trusted library allocation
|
page read and write
|
||
1EE25753000
|
heap
|
page read and write
|
||
D17000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
3E3F000
|
stack
|
page read and write
|
||
1EE2E481000
|
trusted library allocation
|
page read and write
|
||
1EE2C015000
|
trusted library allocation
|
page read and write
|
||
1EE2A580000
|
trusted library section
|
page read and write
|
||
52AE000
|
trusted library allocation
|
page read and write
|
||
5ABA000
|
trusted library allocation
|
page read and write
|
||
1EE36200000
|
trusted library allocation
|
page read and write
|
||
260A975C000
|
trusted library allocation
|
page read and write
|
||
5622000
|
trusted library allocation
|
page read and write
|
||
1EE2574A000
|
heap
|
page read and write
|
||
1EE36850000
|
trusted library allocation
|
page read and write
|
||
260A9748000
|
trusted library allocation
|
page read and write
|
||
1EE305F9000
|
trusted library allocation
|
page read and write
|
||
1167000
|
heap
|
page read and write
|
||
1EE2F9DE000
|
trusted library allocation
|
page read and write
|
||
1EE30A09000
|
trusted library allocation
|
page read and write
|
||
1EE305FE000
|
trusted library allocation
|
page read and write
|
||
1EE36CC1000
|
trusted library allocation
|
page read and write
|
||
1EE2574A000
|
heap
|
page read and write
|
||
1EE25775000
|
heap
|
page read and write
|
||
1357000
|
heap
|
page read and write
|
||
4A7F000
|
stack
|
page read and write
|
||
260AA428000
|
heap
|
page read and write
|
||
1335000
|
stack
|
page read and write
|
||
1EE36AC3000
|
trusted library allocation
|
page read and write
|
||
62A000
|
heap
|
page read and write
|
||
52A9000
|
trusted library allocation
|
page read and write
|
||
1058000
|
heap
|
page read and write
|
||
515F000
|
stack
|
page read and write
|
||
1EE36CB6000
|
trusted library allocation
|
page read and write
|
||
67F0000
|
heap
|
page read and write
|
||
5AAB000
|
trusted library allocation
|
page read and write
|
||
5EBC000
|
trusted library allocation
|
page read and write
|
||
1619000
|
heap
|
page read and write
|
||
1EE30833000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
4C24000
|
trusted library allocation
|
page read and write
|
||
1EE3027D000
|
trusted library allocation
|
page read and write
|
||
260A95B0000
|
unclassified section
|
page read and write
|
||
5584000
|
trusted library allocation
|
page read and write
|
||
1EE309F0000
|
trusted library allocation
|
page read and write
|
||
1EE302F1000
|
trusted library allocation
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
1EE2FF0B000
|
trusted library allocation
|
page read and write
|
||
1EE31751000
|
trusted library allocation
|
page read and write
|
||
1EE33401000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1EE2E309000
|
trusted library allocation
|
page read and write
|
||
1EE321E0000
|
trusted library allocation
|
page read and write
|
||
1D49D000
|
stack
|
page read and write
|
||
1D516000
|
heap
|
page read and write
|
||
1EE2F300000
|
trusted library allocation
|
page read and write
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
1EE3142B000
|
trusted library allocation
|
page read and write
|
||
1EE36CD4000
|
trusted library allocation
|
page read and write
|
||
4F6B000
|
trusted library allocation
|
page execute and read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
B2C000
|
unkown
|
page readonly
|
||
1005000
|
heap
|
page read and write
|
||
1EE2E5B8000
|
trusted library allocation
|
page read and write
|
||
D4B000
|
unkown
|
page execute and read and write
|
||
1140000
|
heap
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
5F77000
|
trusted library allocation
|
page read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
1EE30AFA000
|
trusted library allocation
|
page read and write
|
||
1EE2576E000
|
heap
|
page read and write
|
||
AF9CF1E000
|
unkown
|
page readonly
|
||
5111338000
|
stack
|
page read and write
|
||
1EE304A8000
|
trusted library allocation
|
page read and write
|
||
52A9000
|
trusted library allocation
|
page read and write
|
||
1EE305E2000
|
trusted library allocation
|
page read and write
|
||
511283D000
|
stack
|
page read and write
|
||
56D8000
|
trusted library allocation
|
page read and write
|
||
3E46FFE000
|
unkown
|
page readonly
|
||
1454000
|
heap
|
page read and write
|
||
1EE2E5A0000
|
trusted library allocation
|
page read and write
|
||
D28000
|
heap
|
page read and write
|
||
1EE36AEC000
|
trusted library allocation
|
page read and write
|
||
1EE30BE0000
|
trusted library allocation
|
page read and write
|
||
1EE30A13000
|
trusted library allocation
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
48B000
|
unkown
|
page execute and write copy
|
||
45C1000
|
heap
|
page read and write
|
||
1EE36866000
|
trusted library allocation
|
page read and write
|
||
5285000
|
trusted library allocation
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
1EE30851000
|
trusted library allocation
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
45C000
|
unkown
|
page execute and write copy
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE309DA000
|
trusted library allocation
|
page read and write
|
||
1EE308CB000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
trusted library allocation
|
page read and write
|
||
1EE2F3E6000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
1EE2F103000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
260A97C0000
|
trusted library allocation
|
page read and write
|
||
8170000
|
heap
|
page read and write
|
||
4D80000
|
direct allocation
|
page read and write
|
||
7430000
|
heap
|
page execute and read and write
|
||
1EE322DF000
|
trusted library allocation
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
1EE304C0000
|
trusted library allocation
|
page read and write
|
||
1EE257B4000
|
heap
|
page read and write
|
||
1EE31700000
|
trusted library allocation
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
1EE30C0D000
|
trusted library allocation
|
page read and write
|
||
1EE2C10D000
|
trusted library allocation
|
page read and write
|
||
1EE1EAF4000
|
trusted library allocation
|
page read and write
|
||
5586000
|
trusted library allocation
|
page read and write
|
||
1EE36876000
|
trusted library allocation
|
page read and write
|
||
17F37910000
|
heap
|
page read and write
|
||
511174D000
|
stack
|
page read and write
|
||
B2C000
|
unkown
|
page readonly
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
980000
|
unkown
|
page execute and write copy
|
||
1EE2EC7C000
|
trusted library allocation
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
1EE303C9000
|
trusted library allocation
|
page read and write
|
||
1EE2F65B000
|
trusted library allocation
|
page read and write
|
||
1EE309A6000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
1EE25742000
|
heap
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
17F37944000
|
heap
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
1EE2E9E9000
|
trusted library allocation
|
page read and write
|
||
4A4F000
|
stack
|
page read and write
|
||
1EE2574A000
|
heap
|
page read and write
|
||
1EE2F39B000
|
trusted library allocation
|
page read and write
|
||
5EB2000
|
trusted library allocation
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
1EE2EC81000
|
trusted library allocation
|
page read and write
|
||
5638000
|
trusted library allocation
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
511F000
|
stack
|
page read and write
|
||
B52000
|
unkown
|
page readonly
|
||
1EE2E5E2000
|
trusted library allocation
|
page read and write
|
||
747E000
|
stack
|
page read and write
|
||
1E083E15000
|
heap
|
page read and write
|
||
564A000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
1EE36821000
|
trusted library allocation
|
page read and write
|
||
5EBA000
|
trusted library allocation
|
page read and write
|
||
1D525000
|
heap
|
page read and write
|
||
1EE2DAE6000
|
trusted library allocation
|
page read and write
|
||
1EE31000000
|
trusted library allocation
|
page read and write
|
||
1EE3058C000
|
trusted library allocation
|
page read and write
|
||
1EE2ECB7000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE2578D000
|
heap
|
page read and write
|
||
1EE36A8A000
|
trusted library allocation
|
page read and write
|
||
1EE2F0B0000
|
trusted library allocation
|
page read and write
|
||
1EE25746000
|
heap
|
page read and write
|
||
260AA484000
|
heap
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
52C9000
|
trusted library allocation
|
page read and write
|
||
1EE25789000
|
heap
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1D52F000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE313FB000
|
trusted library allocation
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
EE2000
|
unkown
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
51113FE000
|
stack
|
page read and write
|
||
1EE25789000
|
heap
|
page read and write
|
||
1EE30B83000
|
trusted library allocation
|
page read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
1400000
|
direct allocation
|
page read and write
|
||
1EE306A0000
|
trusted library allocation
|
page read and write
|
||
529B000
|
trusted library allocation
|
page read and write
|
||
453F000
|
stack
|
page read and write
|
||
1EE30AF2000
|
trusted library allocation
|
page read and write
|
||
1EE2ECC7000
|
trusted library allocation
|
page read and write
|
||
5E46000
|
heap
|
page read and write
|
||
1EE2E6C0000
|
trusted library allocation
|
page read and write
|
||
1EE36833000
|
trusted library allocation
|
page read and write
|
||
1EE25796000
|
heap
|
page read and write
|
||
403F000
|
stack
|
page read and write
|
||
260AA431000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
1EE2F387000
|
trusted library allocation
|
page read and write
|
||
1EE2E5DE000
|
trusted library allocation
|
page read and write
|
||
529B000
|
trusted library allocation
|
page read and write
|
||
1EE36400000
|
trusted library allocation
|
page read and write
|
||
1E0857AA000
|
heap
|
page read and write
|
||
1EE309DA000
|
trusted library allocation
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
14A2000
|
heap
|
page read and write
|
||
1EE303DB000
|
trusted library allocation
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
5070000
|
direct allocation
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
1EE2E855000
|
trusted library allocation
|
page read and write
|
||
1EE2F8C9000
|
trusted library allocation
|
page read and write
|
||
5EBF000
|
trusted library allocation
|
page read and write
|
||
56CB000
|
trusted library allocation
|
page read and write
|
||
1EE30C0F000
|
trusted library allocation
|
page read and write
|
||
1EE30AE4000
|
trusted library allocation
|
page read and write
|
||
7AA000
|
unkown
|
page execute and read and write
|
||
1EE2A726000
|
trusted library allocation
|
page read and write
|
||
1EE30859000
|
trusted library allocation
|
page read and write
|
||
56BD000
|
trusted library allocation
|
page read and write
|
||
1EE2DAEE000
|
trusted library allocation
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
1EE25753000
|
heap
|
page read and write
|
||
FF3000
|
heap
|
page read and write
|
||
1EE2F3B0000
|
trusted library allocation
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
1EE2BAE2000
|
trusted library allocation
|
page read and write
|
||
329F000
|
stack
|
page read and write
|
||
4F50000
|
direct allocation
|
page read and write
|
||
1EE36A42000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1EE2EA99000
|
trusted library allocation
|
page read and write
|
||
1EE2F760000
|
trusted library allocation
|
page read and write
|
||
1EE2A098000
|
trusted library allocation
|
page read and write
|
||
1358000
|
heap
|
page read and write
|
||
1EE2DABE000
|
trusted library allocation
|
page read and write
|
||
1EE25747000
|
heap
|
page read and write
|
||
118C000
|
heap
|
page read and write
|
||
601F000
|
trusted library allocation
|
page read and write
|
||
1EE305E9000
|
trusted library allocation
|
page read and write
|
||
5FF6000
|
trusted library allocation
|
page read and write
|
||
13B000
|
stack
|
page read and write
|
||
55A0000
|
remote allocation
|
page read and write
|
||
1EE36944000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
51116CE000
|
stack
|
page read and write
|
||
1EE2ECCF000
|
trusted library allocation
|
page read and write
|
||
1EE302E6000
|
trusted library allocation
|
page read and write
|
||
5B3C000
|
trusted library allocation
|
page read and write
|
||
714000
|
unkown
|
page execute and read and write
|
||
1EE2F8F5000
|
trusted library allocation
|
page read and write
|
||
1EE36600000
|
trusted library allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
1EE25752000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE2E533000
|
trusted library allocation
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
FEA000
|
heap
|
page read and write
|
||
6255000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1EE301D0000
|
trusted library allocation
|
page read and write
|
||
1EE313CF000
|
trusted library allocation
|
page read and write
|
||
1EE2DD86000
|
trusted library allocation
|
page read and write
|
||
D37000
|
heap
|
page read and write
|
||
57D4000
|
trusted library allocation
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
36BF000
|
stack
|
page read and write
|
||
1EE2A6FE000
|
trusted library allocation
|
page read and write
|
||
5F76000
|
trusted library allocation
|
page read and write
|
||
1EE30BCC000
|
trusted library allocation
|
page read and write
|
||
5ADC000
|
trusted library allocation
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
260AA3A9000
|
heap
|
page read and write
|
||
1EE2FE61000
|
trusted library allocation
|
page read and write
|
||
1EE2BBB5000
|
trusted library allocation
|
page read and write
|
||
1EE303F7000
|
trusted library allocation
|
page read and write
|
||
1EE2C500000
|
trusted library allocation
|
page read and write
|
||
1EE36874000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
1EE30BFE000
|
trusted library allocation
|
page read and write
|
||
1EE2F2A9000
|
trusted library allocation
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
1EE2575A000
|
heap
|
page read and write
|
||
1EE2AA81000
|
trusted library allocation
|
page read and write
|
||
1EE31778000
|
trusted library allocation
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
1EE30ADA000
|
trusted library allocation
|
page read and write
|
||
260A972F000
|
trusted library allocation
|
page read and write
|
||
1EE36960000
|
trusted library allocation
|
page read and write
|
||
57821204000
|
trusted library allocation
|
page read and write
|
||
317B000
|
stack
|
page read and write
|
||
1EE38816000
|
trusted library allocation
|
page read and write
|
||
1EE2DDD4000
|
trusted library allocation
|
page read and write
|
||
1EE2E5E2000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
55EE000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
1EE25787000
|
heap
|
page read and write
|
||
1003000
|
unkown
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
29680000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1079000
|
heap
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
1EE2E963000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1EE3136A000
|
trusted library allocation
|
page read and write
|
||
1EE30383000
|
trusted library allocation
|
page read and write
|
||
4C3A000
|
trusted library allocation
|
page read and write
|
||
1EE2E5F0000
|
trusted library allocation
|
page read and write
|
||
1EE2BB13000
|
trusted library allocation
|
page read and write
|
||
1EE2F65D000
|
trusted library allocation
|
page read and write
|
||
1EE2C86A000
|
trusted library allocation
|
page read and write
|
||
1EE2F909000
|
trusted library allocation
|
page read and write
|
||
5AAF000
|
trusted library allocation
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
52AF000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
2CC0000
|
direct allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE30A1A000
|
trusted library allocation
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
96A000
|
unkown
|
page execute and write copy
|
||
50C0000
|
direct allocation
|
page execute and read and write
|
||
1EE2E5E6000
|
trusted library allocation
|
page read and write
|
||
1EE2DAE6000
|
trusted library allocation
|
page read and write
|
||
1EE2F8F1000
|
trusted library allocation
|
page read and write
|
||
1EE2C017000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE309D1000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
260AA39F000
|
heap
|
page read and write
|
||
5AF6000
|
trusted library allocation
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
250000
|
unkown
|
page readonly
|
||
5C2000
|
unkown
|
page execute and read and write
|
||
57C000
|
unkown
|
page execute and write copy
|
||
BD4000
|
heap
|
page read and write
|
||
1EE302AC000
|
trusted library allocation
|
page read and write
|
||
1EE30AD9000
|
trusted library allocation
|
page read and write
|
||
1EE2F100000
|
trusted library allocation
|
page read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
CB9000
|
heap
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
5F9B000
|
trusted library allocation
|
page read and write
|
||
17F378BA000
|
heap
|
page read and write
|
||
11A8000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
7A0000
|
unkown
|
page readonly
|
||
15FC4E1E000
|
trusted library allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
1D527000
|
heap
|
page read and write
|
||
1EE305E9000
|
trusted library allocation
|
page read and write
|
||
5119C3E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE30AF2000
|
trusted library allocation
|
page read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
29683000
|
heap
|
page read and write
|
||
1EE367AC000
|
trusted library allocation
|
page read and write
|
||
5F95000
|
trusted library allocation
|
page read and write
|
||
1EE305EB000
|
trusted library allocation
|
page read and write
|
||
1EE2ABDE000
|
trusted library allocation
|
page read and write
|
||
5119EFD000
|
stack
|
page read and write
|
||
260A979F000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE2BA03000
|
trusted library allocation
|
page read and write
|
||
5119C7A000
|
stack
|
page read and write
|
||
1EE308F0000
|
trusted library allocation
|
page read and write
|
||
1EE2ECCF000
|
trusted library allocation
|
page read and write
|
||
1EE2A6FB000
|
trusted library allocation
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
1167000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
1EE2E5B8000
|
trusted library allocation
|
page read and write
|
||
1EE2FCB2000
|
unclassified section
|
page read and write
|
||
1EE36CA9000
|
trusted library allocation
|
page read and write
|
||
1EE2F3B0000
|
trusted library allocation
|
page read and write
|
||
1EE2DA28000
|
trusted library allocation
|
page read and write
|
||
1EE36C80000
|
trusted library allocation
|
page read and write
|
||
52B3000
|
trusted library allocation
|
page read and write
|
||
1EE30B00000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
1EE2EA00000
|
trusted library allocation
|
page read and write
|
||
1EE30BEF000
|
trusted library allocation
|
page read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
1EE317EA000
|
trusted library allocation
|
page read and write
|
||
1EE367F6000
|
trusted library allocation
|
page read and write
|
||
1EE36850000
|
trusted library allocation
|
page read and write
|
||
296A0000
|
heap
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1152000
|
heap
|
page read and write
|
||
1EE36CCD000
|
trusted library allocation
|
page read and write
|
||
1EE32273000
|
trusted library allocation
|
page read and write
|
||
7A2000
|
unkown
|
page execute and write copy
|
||
1EE2037A000
|
heap
|
page read and write
|
||
1EE30222000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE2DF7A000
|
heap
|
page read and write
|
||
511B17B000
|
stack
|
page read and write
|
||
1EE30BCC000
|
trusted library allocation
|
page read and write
|
||
1EE2DAA7000
|
trusted library allocation
|
page read and write
|
||
1EE306D2000
|
trusted library allocation
|
page read and write
|
||
1EE2A0CC000
|
trusted library allocation
|
page read and write
|
||
61ECC000
|
direct allocation
|
page read and write
|
||
5B33000
|
trusted library allocation
|
page read and write
|
||
1EE2E400000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
1EE305C2000
|
trusted library allocation
|
page read and write
|
||
966000
|
unkown
|
page execute and write copy
|
||
F74D9797000
|
trusted library allocation
|
page read and write
|
||
2968E000
|
heap
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
558E000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
5B3E000
|
trusted library allocation
|
page read and write
|
||
52CF000
|
trusted library allocation
|
page read and write
|
||
5B46000
|
trusted library allocation
|
page read and write
|
||
1EE2F657000
|
trusted library allocation
|
page read and write
|
||
1EE311DE000
|
trusted library allocation
|
page read and write
|
||
260AA3AC000
|
heap
|
page read and write
|
||
260AA43C000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
A91000
|
unkown
|
page execute read
|
||
1EE2575B000
|
heap
|
page read and write
|
||
1EE31764000
|
trusted library allocation
|
page read and write
|
||
453F000
|
stack
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE257A6000
|
heap
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE31489000
|
trusted library allocation
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
260AA349000
|
heap
|
page read and write
|
||
1D52E000
|
heap
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
53D8000
|
trusted library allocation
|
page read and write
|
||
1EE3093A000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
37FF000
|
stack
|
page read and write
|
||
1EE30C0C000
|
trusted library allocation
|
page read and write
|
||
1EE30AE9000
|
trusted library allocation
|
page read and write
|
||
5285000
|
trusted library allocation
|
page read and write
|
||
1EE2F055000
|
trusted library allocation
|
page read and write
|
||
5B4C000
|
trusted library allocation
|
page read and write
|
||
260AA3BF000
|
heap
|
page read and write
|
||
38DF000
|
stack
|
page read and write
|
||
4A3F000
|
stack
|
page read and write
|
||
12CA000
|
heap
|
page read and write
|
||
1004000
|
unkown
|
page execute and write copy
|
||
1EE36717000
|
trusted library allocation
|
page read and write
|
||
1EE2DDA3000
|
trusted library allocation
|
page read and write
|
||
52BC000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1D52F000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
1EE33622000
|
trusted library allocation
|
page read and write
|
||
479000
|
unkown
|
page execute and read and write
|
||
1EE314E3000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
2969A000
|
heap
|
page read and write
|
||
1EE2A210000
|
trusted library allocation
|
page read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
1EE2E300000
|
trusted library allocation
|
page read and write
|
||
1EE30503000
|
trusted library allocation
|
page read and write
|
||
1EE32127000
|
trusted library allocation
|
page read and write
|
||
3E44DDE000
|
stack
|
page read and write
|
||
1EE2F3B6000
|
trusted library allocation
|
page read and write
|
||
1EE2E4A2000
|
trusted library allocation
|
page read and write
|
||
132F000
|
stack
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
1EE30D53000
|
trusted library allocation
|
page read and write
|
||
97C000
|
unkown
|
page execute and read and write
|
||
76FE000
|
stack
|
page read and write
|
||
1EE302CC000
|
trusted library allocation
|
page read and write
|
||
1EE2A713000
|
trusted library allocation
|
page read and write
|
||
A91000
|
unkown
|
page execute read
|
||
1EE30AF8000
|
trusted library allocation
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
4C2000
|
unkown
|
page execute and write copy
|
||
BAC000
|
stack
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
1EE2E5F1000
|
trusted library allocation
|
page read and write
|
||
101D000
|
heap
|
page read and write
|
||
5AC0000
|
trusted library allocation
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
1EE306B2000
|
trusted library allocation
|
page read and write
|
||
1EE30AE4000
|
trusted library allocation
|
page read and write
|
||
605000
|
heap
|
page read and write
|
||
1EE2F800000
|
trusted library allocation
|
page read and write
|
||
260A9550000
|
heap
|
page read and write
|
||
1EE2C700000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
F53000
|
stack
|
page read and write
|
||
5EB9000
|
trusted library allocation
|
page read and write
|
||
1EE25762000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
1EE3687C000
|
trusted library allocation
|
page read and write
|
||
555E000
|
stack
|
page read and write
|
||
5B34000
|
trusted library allocation
|
page read and write
|
||
559D000
|
stack
|
page read and write
|
||
5BA8000
|
trusted library allocation
|
page read and write
|
||
1EE1E680000
|
unclassified section
|
page readonly
|
||
1134000
|
heap
|
page read and write
|
||
1EE366E6000
|
trusted library allocation
|
page read and write
|
||
4BF000
|
unkown
|
page execute and write copy
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
642000
|
heap
|
page read and write
|
||
1EE2573A000
|
heap
|
page read and write
|
||
1EE2F75E000
|
trusted library allocation
|
page read and write
|
||
1EE30977000
|
trusted library allocation
|
page read and write
|
||
56C8000
|
trusted library allocation
|
page read and write
|
||
5EB9000
|
trusted library allocation
|
page read and write
|
||
1EE30AD1000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
1EE257A5000
|
heap
|
page read and write
|
||
1EE2A2FE000
|
trusted library allocation
|
page read and write
|
||
5119F7B000
|
stack
|
page read and write
|
||
F39000
|
stack
|
page read and write
|
||
1EE30BE3000
|
trusted library allocation
|
page read and write
|
||
260AA428000
|
heap
|
page read and write
|
||
5FE5000
|
trusted library allocation
|
page read and write
|
||
96D000
|
unkown
|
page read and write
|
||
1EE306B7000
|
trusted library allocation
|
page read and write
|
||
615000
|
heap
|
page read and write
|
||
57BC000
|
trusted library allocation
|
page read and write
|
||
1EE30141000
|
trusted library allocation
|
page read and write
|
||
511B1BE000
|
stack
|
page read and write
|
||
1EE30851000
|
trusted library allocation
|
page read and write
|
||
511303E000
|
stack
|
page read and write
|
||
1EE2F379000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
1EE2574A000
|
heap
|
page read and write
|
||
1EE30AAF000
|
trusted library allocation
|
page read and write
|
||
570000
|
unkown
|
page readonly
|
||
1EE30BCA000
|
trusted library allocation
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE38B62000
|
trusted library allocation
|
page read and write
|
||
1EE25746000
|
heap
|
page read and write
|
||
15EA000
|
heap
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
260AA429000
|
heap
|
page read and write
|
||
C85000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
58F6000
|
trusted library allocation
|
page read and write
|
||
1EE25753000
|
heap
|
page read and write
|
||
1EE2575A000
|
heap
|
page read and write
|
||
1EE2EA03000
|
trusted library allocation
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
6D5000
|
unkown
|
page execute and read and write
|
||
988000
|
unkown
|
page execute and write copy
|
||
1EE310DE000
|
trusted library allocation
|
page read and write
|
||
1EE2E4CB000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE2A27F000
|
trusted library allocation
|
page read and write
|
||
7B83000
|
heap
|
page read and write
|
||
5B4A000
|
trusted library allocation
|
page read and write
|
||
1EE30134000
|
trusted library allocation
|
page read and write
|
||
531000
|
unkown
|
page execute and write copy
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
5BB9000
|
trusted library allocation
|
page read and write
|
||
5646000
|
trusted library allocation
|
page read and write
|
||
1EE25786000
|
heap
|
page read and write
|
||
3640000
|
heap
|
page read and write
|
||
1EE317CB000
|
trusted library allocation
|
page read and write
|
||
4F5A000
|
trusted library allocation
|
page execute and read and write
|
||
6FA000
|
stack
|
page read and write
|
||
1D531000
|
heap
|
page read and write
|
||
1EE367F2000
|
trusted library allocation
|
page read and write
|
||
1400000
|
direct allocation
|
page read and write
|
||
1EE303DB000
|
trusted library allocation
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
1EE38800000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
5117A3D000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
1EE36866000
|
trusted library allocation
|
page read and write
|
||
5247000
|
trusted library allocation
|
page read and write
|
||
1EE30A2A000
|
trusted library allocation
|
page read and write
|
||
1EE36A49000
|
trusted library allocation
|
page read and write
|
||
B52000
|
unkown
|
page readonly
|
||
1EE305FA000
|
trusted library allocation
|
page read and write
|
||
37DE000
|
stack
|
page read and write
|
||
1EE30A9B000
|
trusted library allocation
|
page read and write
|
||
1EE2FD09000
|
trusted library allocation
|
page read and write
|
||
1EE36813000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
58F4000
|
trusted library allocation
|
page read and write
|
||
1EE30A37000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
5AE5000
|
trusted library allocation
|
page read and write
|
||
1EE322B9000
|
trusted library allocation
|
page read and write
|
||
4E1000
|
unkown
|
page execute and write copy
|
||
13E5000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
469F000
|
stack
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE2E09F000
|
heap
|
page read and write
|
||
52E3000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
4A40000
|
direct allocation
|
page execute and read and write
|
||
1EE301BC000
|
trusted library allocation
|
page read and write
|
||
1EE30AE9000
|
trusted library allocation
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
313F000
|
stack
|
page read and write
|
||
1EE25749000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
1EE2F616000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1EE3012C000
|
trusted library allocation
|
page read and write
|
||
7AC000
|
stack
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
17F37C68000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1EE2E5BE000
|
trusted library allocation
|
page read and write
|
||
1EE368F6000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
1EE30FF4000
|
trusted library allocation
|
page read and write
|
||
1D52B000
|
heap
|
page read and write
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
1EE2AAB1000
|
trusted library allocation
|
page read and write
|
||
6105000
|
trusted library allocation
|
page read and write
|
||
1EE305E9000
|
trusted library allocation
|
page read and write
|
||
1EE2F3B3000
|
trusted library allocation
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
260A975F000
|
trusted library allocation
|
page read and write
|
||
1EE2030B000
|
heap
|
page read and write
|
||
58F3000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
528F000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
1EE2574F000
|
heap
|
page read and write
|
||
1EE2C867000
|
trusted library allocation
|
page read and write
|
||
2D0000
|
unkown
|
page execute and write copy
|
||
57DF000
|
stack
|
page read and write
|
||
602000
|
heap
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
1EE2EC81000
|
trusted library allocation
|
page read and write
|
||
23593000
|
heap
|
page read and write
|
||
2CC0000
|
direct allocation
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
1EE30977000
|
trusted library allocation
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
975000
|
unkown
|
page execute and read and write
|
||
1EE3688E000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
1EE2F503000
|
trusted library allocation
|
page read and write
|
||
1EE30ADA000
|
trusted library allocation
|
page read and write
|
||
5344000
|
trusted library allocation
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
57C000
|
unkown
|
page execute and write copy
|
||
393F000
|
stack
|
page read and write
|
||
9CD000
|
unkown
|
page execute and write copy
|
||
BD4000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1EE305F6000
|
trusted library allocation
|
page read and write
|
||
1EE2A161000
|
trusted library allocation
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
447F000
|
stack
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1EE368D4000
|
trusted library allocation
|
page read and write
|
||
4A80000
|
direct allocation
|
page execute and read and write
|
||
1EE309BA000
|
trusted library allocation
|
page read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
17F37720000
|
unclassified section
|
page readonly
|
||
A74000
|
heap
|
page read and write
|
||
1EE2F0E7000
|
trusted library allocation
|
page read and write
|
||
1400000
|
direct allocation
|
page read and write
|
||
355E000
|
stack
|
page read and write
|
||
573000
|
unkown
|
page execute and write copy
|
||
6C4000
|
heap
|
page read and write
|
||
1EE2F366000
|
trusted library allocation
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
1EE2E533000
|
trusted library allocation
|
page read and write
|
||
1EE32260000
|
trusted library allocation
|
page read and write
|
||
5FAF000
|
trusted library allocation
|
page read and write
|
||
53BF000
|
stack
|
page read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
1EE25753000
|
heap
|
page read and write
|
||
260AA498000
|
heap
|
page read and write
|
||
260A9710000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
F76F4703000
|
trusted library allocation
|
page read and write
|
||
1EE36C77000
|
trusted library allocation
|
page read and write
|
||
1EE3223E000
|
trusted library allocation
|
page read and write
|
||
5BDF000
|
trusted library allocation
|
page read and write
|
||
1EE2F3B6000
|
trusted library allocation
|
page read and write
|
||
14BF000
|
stack
|
page read and write
|
||
1EE38B0D000
|
trusted library allocation
|
page read and write
|
||
17F37E00000
|
heap
|
page read and write
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE2FF78000
|
trusted library allocation
|
page read and write
|
||
1EE31703000
|
trusted library allocation
|
page read and write
|
||
260AA46A000
|
heap
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
1EE30AD5000
|
trusted library allocation
|
page read and write
|
||
1EE2E5BE000
|
trusted library allocation
|
page read and write
|
||
5FFF000
|
trusted library allocation
|
page read and write
|
||
AFA000
|
unkown
|
page read and write
|
||
1EE2BB1E000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
260AA484000
|
heap
|
page read and write
|
||
D3A000
|
heap
|
page read and write
|
||
5F5D000
|
trusted library allocation
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
5588000
|
trusted library allocation
|
page read and write
|
||
1EE2A0B3000
|
trusted library allocation
|
page read and write
|
||
528F000
|
trusted library allocation
|
page read and write
|
||
5381000
|
trusted library allocation
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
1EE2F91A000
|
trusted library allocation
|
page read and write
|
||
61E01000
|
direct allocation
|
page execute read
|
||
45C1000
|
heap
|
page read and write
|
||
1EE30958000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
714000
|
unkown
|
page execute and read and write
|
||
37AF000
|
stack
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
4F1B000
|
stack
|
page read and write
|
||
1EE30AD1000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BA1000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1027000
|
heap
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
3FBE000
|
stack
|
page read and write
|
||
1EE2A715000
|
trusted library allocation
|
page read and write
|
||
52BA000
|
trusted library allocation
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
1EE31283000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
1EE36AC8000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
D49000
|
unkown
|
page write copy
|
||
1199000
|
heap
|
page read and write
|
||
56D000
|
unkown
|
page execute and write copy
|
||
38BF000
|
stack
|
page read and write
|
||
1EE2AB73000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
1EE30CAF000
|
trusted library allocation
|
page read and write
|
||
1EE2FE03000
|
trusted library allocation
|
page read and write
|
||
1EE25753000
|
heap
|
page read and write
|
||
1EE2E5A7000
|
trusted library allocation
|
page read and write
|
||
1EE2D970000
|
unclassified section
|
page read and write
|
||
467F000
|
stack
|
page read and write
|
||
1EE3691E000
|
trusted library allocation
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
1EE2BA9A000
|
trusted library allocation
|
page read and write
|
||
911000
|
unkown
|
page execute and read and write
|
||
1EE2EC45000
|
trusted library allocation
|
page read and write
|
||
1EE25744000
|
heap
|
page read and write
|
||
FEF000
|
heap
|
page read and write
|
||
3E467FE000
|
stack
|
page read and write
|
||
1037000
|
heap
|
page read and write
|
||
1EE3016D000
|
trusted library allocation
|
page read and write
|
||
5588000
|
trusted library allocation
|
page read and write
|
||
1EE257A1000
|
heap
|
page read and write
|
||
7B6000
|
unkown
|
page execute and write copy
|
||
1EE321FA000
|
trusted library allocation
|
page read and write
|
||
DB0F7FA000
|
stack
|
page read and write
|
||
17F37A20000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5B3D000
|
trusted library allocation
|
page read and write
|
||
1EE309BA000
|
trusted library allocation
|
page read and write
|
||
5345000
|
trusted library allocation
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
1EE2E5A7000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE311D7000
|
trusted library allocation
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
493F000
|
stack
|
page read and write
|
||
260AA3BD000
|
heap
|
page read and write
|
||
1EE30A82000
|
trusted library allocation
|
page read and write
|
||
A0E000
|
unkown
|
page execute and read and write
|
||
1EE2ABA2000
|
trusted library allocation
|
page read and write
|
||
1EE2E6AE000
|
trusted library allocation
|
page read and write
|
||
5284000
|
trusted library allocation
|
page read and write
|
||
4321000
|
heap
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
1EE366D0000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
1EE309DD000
|
trusted library allocation
|
page read and write
|
||
990000
|
unkown
|
page execute and write copy
|
||
1EE30FBA000
|
trusted library allocation
|
page read and write
|
||
1EE308E5000
|
trusted library allocation
|
page read and write
|
||
1EE367F6000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
138F000
|
stack
|
page read and write
|
||
1EE36ABD000
|
trusted library allocation
|
page read and write
|
||
1EE3686C000
|
trusted library allocation
|
page read and write
|
||
5798000
|
trusted library allocation
|
page read and write
|
||
17F37D32000
|
trusted library allocation
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
1EE25744000
|
heap
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
1EE2573C000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
5B1E000
|
trusted library allocation
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
1EE2A782000
|
trusted library allocation
|
page read and write
|
||
1EE2F9F9000
|
trusted library allocation
|
page read and write
|
||
1EE2EC54000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
direct allocation
|
page execute and read and write
|
||
1EE30B93000
|
trusted library allocation
|
page read and write
|
||
5EBB000
|
trusted library allocation
|
page read and write
|
||
1EE36A25000
|
trusted library allocation
|
page read and write
|
||
29660000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1EE30BD2000
|
trusted library allocation
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
5BF000
|
unkown
|
page execute and read and write
|
||
1EE3141C000
|
trusted library allocation
|
page read and write
|
||
558C000
|
trusted library allocation
|
page read and write
|
||
C07000
|
unkown
|
page execute and write copy
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
260A95B2000
|
unclassified section
|
page read and write
|
||
1EE38BFB000
|
trusted library allocation
|
page read and write
|
||
52F4000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
260AA462000
|
heap
|
page read and write
|
||
1EE31439000
|
trusted library allocation
|
page read and write
|
||
2F77D000
|
heap
|
page read and write
|
||
1EE3078E000
|
trusted library allocation
|
page read and write
|
||
46BE000
|
stack
|
page read and write
|
||
1EE2ECCF000
|
trusted library allocation
|
page read and write
|
||
1EE2579A000
|
heap
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
5050000
|
direct allocation
|
page execute and read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
1E0857B5000
|
heap
|
page read and write
|
||
4AB0000
|
direct allocation
|
page execute and read and write
|
||
352F000
|
stack
|
page read and write
|
||
58FF000
|
trusted library allocation
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
1EE30A37000
|
trusted library allocation
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
260AA431000
|
heap
|
page read and write
|
||
1EE36A0B000
|
trusted library allocation
|
page read and write
|
||
5F7A000
|
trusted library allocation
|
page read and write
|
||
1EE3123C000
|
trusted library allocation
|
page read and write
|
||
5040000
|
direct allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
529F000
|
trusted library allocation
|
page read and write
|
||
1D530000
|
heap
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
1EE25740000
|
heap
|
page read and write
|
||
BB3000
|
unkown
|
page execute and read and write
|
||
1EE2574A000
|
heap
|
page read and write
|
||
1EE30AF8000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
1EE2A068000
|
trusted library allocation
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
116D000
|
heap
|
page read and write
|
||
113E000
|
heap
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
1EE25700000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
58F0000
|
trusted library allocation
|
page read and write
|
||
1EE36A43000
|
trusted library allocation
|
page read and write
|
||
7B5000
|
unkown
|
page execute and read and write
|
||
1EE30860000
|
trusted library allocation
|
page read and write
|
||
1EE3686A000
|
trusted library allocation
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
1EE2E403000
|
trusted library allocation
|
page read and write
|
||
1EE1E920000
|
heap
|
page read and write
|
||
5285000
|
trusted library allocation
|
page read and write
|
||
260AA426000
|
heap
|
page read and write
|
||
1658000
|
heap
|
page read and write
|
||
52B2000
|
trusted library allocation
|
page read and write
|
||
11A2000
|
heap
|
page read and write
|
||
1EE2F295000
|
trusted library allocation
|
page read and write
|
||
6C805000
|
unkown
|
page readonly
|
||
32BE000
|
stack
|
page read and write
|
||
1EE1E800000
|
trusted library allocation
|
page read and write
|
||
17F37C5D000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1EE2574A000
|
heap
|
page read and write
|
||
1EE30E70000
|
trusted library allocation
|
page read and write
|
||
1EE2AB00000
|
trusted library allocation
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
1EE2EC81000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
568D000
|
trusted library allocation
|
page read and write
|
||
1EE2A77E000
|
trusted library allocation
|
page read and write
|
||
D17000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1EE322FE000
|
trusted library allocation
|
page read and write
|
||
1EE36AAE000
|
trusted library allocation
|
page read and write
|
||
1EE25762000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE257AA000
|
heap
|
page read and write
|
||
1EE30AF2000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
direct allocation
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE322E7000
|
trusted library allocation
|
page read and write
|
||
1EE2E9FB000
|
trusted library allocation
|
page read and write
|
||
1EE2A600000
|
trusted library allocation
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
1EE2A7C4000
|
trusted library allocation
|
page read and write
|
||
1EE2F3F0000
|
trusted library allocation
|
page read and write
|
||
1EE2A08A000
|
trusted library allocation
|
page read and write
|
||
1EE2E460000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
C05000
|
unkown
|
page execute and write copy
|
||
1EE25750000
|
heap
|
page read and write
|
||
1EE30993000
|
trusted library allocation
|
page read and write
|
||
511103E000
|
stack
|
page read and write
|
||
1EE25752000
|
heap
|
page read and write
|
||
558A000
|
trusted library allocation
|
page read and write
|
||
1EE257B4000
|
heap
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
1EE2F3BB000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
1EE2F42A000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE2E4CB000
|
trusted library allocation
|
page read and write
|
||
5285000
|
trusted library allocation
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
5B49000
|
trusted library allocation
|
page read and write
|
||
1EE2BB00000
|
trusted library allocation
|
page read and write
|
||
5119CFD000
|
stack
|
page read and write
|
||
CE1000
|
unkown
|
page execute and write copy
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE38B20000
|
trusted library allocation
|
page read and write
|
||
1D500000
|
heap
|
page read and write
|
||
1EE30F51000
|
trusted library allocation
|
page read and write
|
||
1EE257A2000
|
heap
|
page read and write
|
||
1EE2EC91000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
29688000
|
heap
|
page read and write
|
||
5B3F000
|
trusted library allocation
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
1EE313BA000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1D536000
|
heap
|
page read and write
|
||
1EE302E6000
|
trusted library allocation
|
page read and write
|
||
1E0857A0000
|
heap
|
page read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
3E7E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE30AE4000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE36A3F000
|
trusted library allocation
|
page read and write
|
||
5BED000
|
trusted library allocation
|
page read and write
|
||
1EE2E392000
|
trusted library allocation
|
page read and write
|
||
511723A000
|
stack
|
page read and write
|
||
1EE2E9E0000
|
trusted library allocation
|
page read and write
|
||
3A7F000
|
stack
|
page read and write
|
||
1EE3050A000
|
trusted library allocation
|
page read and write
|
||
1EE30AE3000
|
trusted library allocation
|
page read and write
|
||
1EE2A700000
|
trusted library allocation
|
page read and write
|
||
5F66000
|
trusted library allocation
|
page read and write
|
||
1EE3011B000
|
trusted library allocation
|
page read and write
|
||
5284000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
1EE25753000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE2578A000
|
heap
|
page read and write
|
||
FEF000
|
heap
|
page read and write
|
||
5AD7000
|
trusted library allocation
|
page read and write
|
||
511ADFE000
|
stack
|
page read and write
|
||
1EE311A1000
|
trusted library allocation
|
page read and write
|
||
1EE305EB000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
577E000
|
trusted library allocation
|
page read and write
|
||
1EE304B1000
|
trusted library allocation
|
page read and write
|
||
1EE38CCD000
|
trusted library allocation
|
page read and write
|
||
1EE313C0000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
110E000
|
heap
|
page read and write
|
||
511182E000
|
stack
|
page read and write
|
||
1EE3117F000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1EE30509000
|
trusted library allocation
|
page read and write
|
||
433F000
|
stack
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
392E000
|
stack
|
page read and write
|
||
1EE30471000
|
trusted library allocation
|
page read and write
|
||
12AE000
|
stack
|
page read and write
|
||
1EE3883C000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
1EE309D3000
|
trusted library allocation
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
48FF000
|
stack
|
page read and write
|
||
1EE3683F000
|
trusted library allocation
|
page read and write
|
||
1EE30FE5000
|
trusted library allocation
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
2DC000
|
unkown
|
page execute and write copy
|
||
1EE2AAD8000
|
trusted library allocation
|
page read and write
|
||
1EE30A03000
|
trusted library allocation
|
page read and write
|
||
1EE25755000
|
heap
|
page read and write
|
||
5F97000
|
trusted library allocation
|
page read and write
|
||
1EE36663000
|
trusted library allocation
|
page read and write
|
||
1EE2BB04000
|
trusted library allocation
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
CE0000
|
unkown
|
page read and write
|
||
1EE30F47000
|
trusted library allocation
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
1EE302EF000
|
trusted library allocation
|
page read and write
|
||
3EFF000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
3E480FE000
|
unkown
|
page readonly
|
||
1EE3170D000
|
trusted library allocation
|
page read and write
|
||
1EE367F6000
|
trusted library allocation
|
page read and write
|
||
5260000
|
remote allocation
|
page read and write
|
||
1EE2F040000
|
trusted library allocation
|
page read and write
|
||
6C620000
|
unkown
|
page readonly
|
||
1EE36948000
|
trusted library allocation
|
page read and write
|
||
1EE30A20000
|
trusted library allocation
|
page read and write
|
||
511AA7E000
|
stack
|
page read and write
|
||
10ED000
|
stack
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
107A000
|
heap
|
page read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
1EE2FC70000
|
trusted library section
|
page read and write
|
||
5289000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
1EE31009000
|
trusted library allocation
|
page read and write
|
||
573000
|
unkown
|
page execute and read and write
|
||
33DF000
|
stack
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
1EE2E5CD000
|
trusted library allocation
|
page read and write
|
||
1E083F0A000
|
trusted library allocation
|
page read and write
|
||
5F8E000
|
stack
|
page read and write
|
||
1EE3125F000
|
trusted library allocation
|
page read and write
|
||
1EE2EA87000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
1EE36CFE000
|
trusted library allocation
|
page read and write
|
||
5AD2000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
1EE2C213000
|
trusted library allocation
|
page read and write
|
||
1EE308C1000
|
trusted library allocation
|
page read and write
|
||
1EE1E915000
|
heap
|
page read and write
|
||
4BC0000
|
direct allocation
|
page execute and read and write
|
||
1EE2A1DE000
|
trusted library allocation
|
page read and write
|
||
1EE3085D000
|
trusted library allocation
|
page read and write
|
||
1EE368FC000
|
trusted library allocation
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE309A0000
|
trusted library allocation
|
page read and write
|
||
1EE257A6000
|
heap
|
page read and write
|
||
1EE2EC9E000
|
trusted library allocation
|
page read and write
|
||
1EE320A6000
|
trusted library allocation
|
page read and write
|
||
1EE322FC000
|
trusted library allocation
|
page read and write
|
||
1005000
|
heap
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
1EE30A82000
|
trusted library allocation
|
page read and write
|
||
260A9CA0000
|
trusted library allocation
|
page read and write
|
||
5ADC000
|
trusted library allocation
|
page read and write
|
||
1EE2F0E7000
|
trusted library allocation
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
16A3000
|
heap
|
page read and write
|
||
1EE30BE0000
|
trusted library allocation
|
page read and write
|
||
1EE2E5AE000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1EE2E4CB000
|
trusted library allocation
|
page read and write
|
||
1EE30BA7000
|
trusted library allocation
|
page read and write
|
||
563B000
|
trusted library allocation
|
page read and write
|
||
1B4CF000
|
stack
|
page read and write
|
||
5B5000
|
unkown
|
page execute and read and write
|
||
1EE309D4000
|
trusted library allocation
|
page read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1EE30258000
|
trusted library allocation
|
page read and write
|
||
260AA3F2000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE302E8000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
A3B000
|
unkown
|
page execute and write copy
|
||
5FAB000
|
trusted library allocation
|
page read and write
|
||
1EE30A97000
|
trusted library allocation
|
page read and write
|
||
1EE2DA0D000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE2F9FD000
|
trusted library allocation
|
page read and write
|
||
57D000
|
unkown
|
page execute and write copy
|
||
754000
|
heap
|
page read and write
|
||
260A9789000
|
trusted library allocation
|
page read and write
|
||
1EE30AE7000
|
trusted library allocation
|
page read and write
|
||
1EE2EBF7000
|
trusted library allocation
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
1EE3177C000
|
trusted library allocation
|
page read and write
|
||
600A000
|
trusted library allocation
|
page read and write
|
||
1EE2C100000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
11B3000
|
heap
|
page read and write
|
||
1EE3094E000
|
trusted library allocation
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE25742000
|
heap
|
page read and write
|
||
5582000
|
trusted library allocation
|
page read and write
|
||
574F000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
1EE30CAF000
|
trusted library allocation
|
page read and write
|
||
4880000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE36A81000
|
trusted library allocation
|
page read and write
|
||
1EE36968000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
5ABA000
|
trusted library allocation
|
page read and write
|
||
5BDF000
|
trusted library allocation
|
page read and write
|
||
566000
|
unkown
|
page execute and read and write
|
||
5116C39000
|
stack
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
58F9000
|
trusted library allocation
|
page read and write
|
||
1EE25743000
|
heap
|
page read and write
|
||
1EE2E569000
|
trusted library allocation
|
page read and write
|
||
A2C000
|
unkown
|
page execute and write copy
|
||
1EE30206000
|
trusted library allocation
|
page read and write
|
||
1EE302C1000
|
trusted library allocation
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
5283000
|
trusted library allocation
|
page read and write
|
||
1EE2EBE6000
|
trusted library allocation
|
page read and write
|
||
F74D9705000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
1EE2F8A2000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
CBD000
|
heap
|
page read and write
|
||
1EE3087B000
|
trusted library allocation
|
page read and write
|
||
11AD000
|
heap
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
993000
|
unkown
|
page execute and read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE2575E000
|
heap
|
page read and write
|
||
1EE2E9E0000
|
trusted library allocation
|
page read and write
|
||
1B93E000
|
stack
|
page read and write
|
||
4790000
|
remote allocation
|
page read and write
|
||
1EE2C309000
|
trusted library allocation
|
page read and write
|
||
3B9E000
|
stack
|
page read and write
|
||
616000
|
heap
|
page read and write
|
||
52A1000
|
trusted library allocation
|
page read and write
|
||
1ADEF000
|
stack
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
1EE305F4000
|
trusted library allocation
|
page read and write
|
||
260AA46D000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
52EB000
|
trusted library allocation
|
page read and write
|
||
1EE36CE1000
|
trusted library allocation
|
page read and write
|
||
1EE2EBB5000
|
trusted library allocation
|
page read and write
|
||
260AA3F9000
|
heap
|
page read and write
|
||
4AA0000
|
direct allocation
|
page execute and read and write
|
||
11E0000
|
heap
|
page read and write
|
||
1EE30448000
|
trusted library allocation
|
page read and write
|
||
1EE2EF03000
|
trusted library allocation
|
page read and write
|
||
10FD000
|
stack
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
4C5000
|
unkown
|
page execute and read and write
|
||
1EE38B31000
|
trusted library allocation
|
page read and write
|
||
1EE2E453000
|
trusted library allocation
|
page read and write
|
||
405F000
|
stack
|
page read and write
|
||
52B3000
|
trusted library allocation
|
page read and write
|
||
1EE257A1000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
260A9703000
|
trusted library allocation
|
page read and write
|
||
1EE30AA4000
|
trusted library allocation
|
page read and write
|
||
1EE3686E000
|
trusted library allocation
|
page read and write
|
||
528F000
|
trusted library allocation
|
page read and write
|
||
1EE2ABE2000
|
trusted library allocation
|
page read and write
|
||
5EB2000
|
trusted library allocation
|
page read and write
|
||
11B3000
|
heap
|
page read and write
|
||
1EE2C203000
|
trusted library allocation
|
page read and write
|
||
1EE3075F000
|
trusted library allocation
|
page read and write
|
||
566000
|
unkown
|
page execute and write copy
|
||
D00000
|
heap
|
page read and write
|
||
511937B000
|
stack
|
page read and write
|
||
1EE2F67C000
|
trusted library allocation
|
page read and write
|
||
1EE30ED4000
|
trusted library allocation
|
page read and write
|
||
5589000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
1EE305EB000
|
trusted library allocation
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
B5C000
|
unkown
|
page read and write
|
||
1EE2EC7D000
|
trusted library allocation
|
page read and write
|
||
1EE30993000
|
trusted library allocation
|
page read and write
|
||
1EE306B4000
|
trusted library allocation
|
page read and write
|
||
260AA39C000
|
heap
|
page read and write
|
||
605E000
|
trusted library allocation
|
page read and write
|
||
AFD000
|
stack
|
page read and write
|
||
1EE302C6000
|
trusted library allocation
|
page read and write
|
||
1EE2E5C9000
|
trusted library allocation
|
page read and write
|
||
1EE313EC000
|
trusted library allocation
|
page read and write
|
||
1EE38BB5000
|
trusted library allocation
|
page read and write
|
||
1EE257A1000
|
heap
|
page read and write
|
||
1EE25754000
|
heap
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
1EE30197000
|
trusted library allocation
|
page read and write
|
||
1EE36C98000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
5B41000
|
trusted library allocation
|
page read and write
|
||
D3D000
|
heap
|
page read and write
|
||
D49000
|
unkown
|
page write copy
|
||
1037000
|
heap
|
page read and write
|
||
1EE2F836000
|
trusted library allocation
|
page read and write
|
||
1EE3048D000
|
trusted library allocation
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
431E000
|
stack
|
page read and write
|
||
2F786000
|
heap
|
page read and write
|
||
1EE38C03000
|
trusted library allocation
|
page read and write
|
||
5119D3C000
|
stack
|
page read and write
|
||
1EE30BE3000
|
trusted library allocation
|
page read and write
|
||
1EE2ECC7000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE2E37E000
|
trusted library allocation
|
page read and write
|
||
1EE36ADE000
|
trusted library allocation
|
page read and write
|
||
5584000
|
trusted library allocation
|
page read and write
|
||
1EE2E4A2000
|
trusted library allocation
|
page read and write
|
||
1EE257A6000
|
heap
|
page read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
1EE368F8000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
260A97BA000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
119C000
|
heap
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
260A9590000
|
heap
|
page readonly
|
||
302F000
|
stack
|
page read and write
|
||
893C9FD000
|
stack
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
1EE2EC54000
|
trusted library allocation
|
page read and write
|
||
1EE307AE000
|
trusted library allocation
|
page read and write
|
||
1EE2DFBA000
|
heap
|
page read and write
|
||
9A2000
|
unkown
|
page execute and write copy
|
||
1B3AF000
|
stack
|
page read and write
|
||
1EE2AAFD000
|
trusted library allocation
|
page read and write
|
||
9C4000
|
unkown
|
page execute and read and write
|
||
52D3000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
51117CB000
|
stack
|
page read and write
|
||
2B49A911000
|
trusted library allocation
|
page execute read
|
||
2C4E000
|
stack
|
page read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
467000
|
unkown
|
page execute and read and write
|
||
1EE1EA94000
|
trusted library allocation
|
page read and write
|
||
1D532000
|
heap
|
page read and write
|
||
1EE30839000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
1EE3683D000
|
trusted library allocation
|
page read and write
|
||
1EE303DB000
|
trusted library allocation
|
page read and write
|
||
1EE2EC90000
|
trusted library allocation
|
page read and write
|
||
1EE2EC9C000
|
trusted library allocation
|
page read and write
|
||
1EE36866000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE312C4000
|
trusted library allocation
|
page read and write
|
||
1EE368F8000
|
trusted library allocation
|
page read and write
|
||
1EE2E49C000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
1EE30BCC000
|
trusted library allocation
|
page read and write
|
||
535C000
|
trusted library allocation
|
page read and write
|
||
126E000
|
stack
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
direct allocation
|
page read and write
|
||
1EE305E6000
|
trusted library allocation
|
page read and write
|
||
1EE30AB5000
|
trusted library allocation
|
page read and write
|
||
1EE2ABAB000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
13B3000
|
heap
|
page read and write
|
||
1EE2B600000
|
trusted library allocation
|
page read and write
|
||
D1D000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE25775000
|
heap
|
page read and write
|
||
1EE30AE9000
|
trusted library allocation
|
page read and write
|
||
D3C000
|
heap
|
page read and write
|
||
1EE30C87000
|
trusted library allocation
|
page read and write
|
||
1EE2A186000
|
trusted library allocation
|
page read and write
|
||
1EE2ECBC000
|
trusted library allocation
|
page read and write
|
||
1EE31274000
|
trusted library allocation
|
page read and write
|
||
3644000
|
heap
|
page read and write
|
||
90F000
|
unkown
|
page execute and read and write
|
||
13AC000
|
heap
|
page read and write
|
||
5C1000
|
heap
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
260AA426000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE32200000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
1EE314DE000
|
trusted library allocation
|
page read and write
|
||
42DF000
|
stack
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1AE2E000
|
stack
|
page read and write
|
||
52D000
|
unkown
|
page execute and read and write
|
||
4CE000
|
unkown
|
page execute and read and write
|
||
1EE30945000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
1EE30BCA000
|
trusted library allocation
|
page read and write
|
||
1EE302E4000
|
trusted library allocation
|
page read and write
|
||
1EE3085D000
|
trusted library allocation
|
page read and write
|
||
1193000
|
heap
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
1400000
|
direct allocation
|
page read and write
|
||
1EE3075D000
|
trusted library allocation
|
page read and write
|
||
757F000
|
stack
|
page read and write
|
||
C7F000
|
heap
|
page read and write
|
||
260A9CBD000
|
unkown
|
page execute read
|
||
1EE2ECA1000
|
trusted library allocation
|
page read and write
|
||
1EE202C1000
|
heap
|
page read and write
|
||
B0C000
|
unkown
|
page readonly
|
||
1027000
|
heap
|
page read and write
|
||
531B000
|
trusted library allocation
|
page read and write
|
||
1EE2AAA9000
|
trusted library allocation
|
page read and write
|
||
23AB0A40000
|
heap
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
1EE30AD1000
|
trusted library allocation
|
page read and write
|
||
1EE30D33000
|
trusted library allocation
|
page read and write
|
||
1EE257B2000
|
heap
|
page read and write
|
||
1EE36918000
|
trusted library allocation
|
page read and write
|
||
5288000
|
trusted library allocation
|
page read and write
|
||
5EBA000
|
trusted library allocation
|
page read and write
|
||
2D7F000
|
stack
|
page read and write
|
||
1D53E000
|
heap
|
page read and write
|
||
5625000
|
trusted library allocation
|
page read and write
|
||
250000
|
unkown
|
page readonly
|
||
1EE2F3C3000
|
trusted library allocation
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
135E000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
511703B000
|
stack
|
page read and write
|
||
1EE2A1AD000
|
trusted library allocation
|
page read and write
|
||
58FF000
|
trusted library allocation
|
page read and write
|
||
1EE30859000
|
trusted library allocation
|
page read and write
|
||
5F1D000
|
trusted library allocation
|
page read and write
|
||
1EE2C000000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
1EE30A82000
|
trusted library allocation
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
260A98D6000
|
heap
|
page read and write
|
||
1EE2ECC0000
|
trusted library allocation
|
page read and write
|
||
511123E000
|
stack
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
555000
|
unkown
|
page execute and write copy
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
17F37D0E000
|
trusted library allocation
|
page read and write
|
||
1EE368F9000
|
trusted library allocation
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
1EE30B00000
|
trusted library allocation
|
page read and write
|
||
52D3000
|
trusted library allocation
|
page read and write
|
||
1EE368D8000
|
trusted library allocation
|
page read and write
|
||
1EE303FB000
|
trusted library allocation
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
120A000
|
heap
|
page read and write
|
||
4AB1000
|
direct allocation
|
page read and write
|
||
1EE2E5C9000
|
trusted library allocation
|
page read and write
|
||
1EE3360E000
|
trusted library allocation
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
1EE2BB8A000
|
trusted library allocation
|
page read and write
|
||
1EE2E85F000
|
trusted library allocation
|
page read and write
|
||
1EE257A2000
|
heap
|
page read and write
|
||
1D25D000
|
stack
|
page read and write
|
||
1EE257AC000
|
heap
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
1D527000
|
heap
|
page read and write
|
||
5B33000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE3088C000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
816C000
|
stack
|
page read and write
|
||
5260000
|
remote allocation
|
page read and write
|
||
1EE30511000
|
trusted library allocation
|
page read and write
|
||
260A98D4000
|
heap
|
page read and write
|
||
1EE368E6000
|
trusted library allocation
|
page read and write
|
||
1EE366BE000
|
trusted library allocation
|
page read and write
|
||
58F6000
|
trusted library allocation
|
page read and write
|
||
578E000
|
trusted library allocation
|
page read and write
|
||
D1D000
|
heap
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
1EE30869000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
1EE2F98D000
|
trusted library allocation
|
page read and write
|
||
1EE36C7E000
|
trusted library allocation
|
page read and write
|
||
1EE31486000
|
trusted library allocation
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
260AA420000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
5F65000
|
trusted library allocation
|
page read and write
|
||
529A000
|
trusted library allocation
|
page read and write
|
||
1EE2F378000
|
trusted library allocation
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
602E000
|
trusted library allocation
|
page read and write
|
||
1EE30B6B000
|
trusted library allocation
|
page read and write
|
||
1EE2DA0F000
|
trusted library allocation
|
page read and write
|
||
4EFF000
|
stack
|
page read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
1EE314DB000
|
trusted library allocation
|
page read and write
|
||
1EE25745000
|
heap
|
page read and write
|
||
1EE305E6000
|
trusted library allocation
|
page read and write
|
||
1EE38CDD000
|
trusted library allocation
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
56D000
|
unkown
|
page execute and write copy
|
||
1EE38EA3000
|
trusted library allocation
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
1EE309FD000
|
trusted library allocation
|
page read and write
|
||
1EE36C9C000
|
trusted library allocation
|
page read and write
|
||
3E457D8000
|
stack
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
1EE36880000
|
trusted library allocation
|
page read and write
|
||
1EE2DA64000
|
trusted library allocation
|
page read and write
|
||
1EE31200000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE300FC000
|
trusted library allocation
|
page read and write
|
||
1EE2A000000
|
trusted library allocation
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
1EE2EA63000
|
trusted library allocation
|
page read and write
|
||
1EE3124B000
|
trusted library allocation
|
page read and write
|
||
4C2000
|
unkown
|
page execute and write copy
|
||
3F2F000
|
stack
|
page read and write
|
||
5392000
|
trusted library allocation
|
page read and write
|
||
5EB3000
|
trusted library allocation
|
page read and write
|
||
1EE2575E000
|
heap
|
page read and write
|
||
4F4000
|
unkown
|
page execute and read and write
|
||
1EE309C8000
|
trusted library allocation
|
page read and write
|
||
1EE2578D000
|
heap
|
page read and write
|
||
1EE2A12D000
|
trusted library allocation
|
page read and write
|
||
1D525000
|
heap
|
page read and write
|
||
1624000
|
heap
|
page read and write
|
||
1EE30533000
|
trusted library allocation
|
page read and write
|
||
1EE310F5000
|
trusted library allocation
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
1EE3050F000
|
trusted library allocation
|
page read and write
|
||
1EE309DA000
|
trusted library allocation
|
page read and write
|
||
1EE2A081000
|
trusted library allocation
|
page read and write
|
||
1EE2FCBF000
|
unclassified section
|
page read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
D86FE904000
|
trusted library allocation
|
page read and write
|
||
3E47078000
|
stack
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
4321000
|
heap
|
page read and write
|
||
1EE2DAF9000
|
trusted library allocation
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
1EE305F2000
|
trusted library allocation
|
page read and write
|
||
56D6000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
direct allocation
|
page read and write
|
||
4EED000
|
trusted library allocation
|
page execute and read and write
|
||
1EE30AB0000
|
trusted library allocation
|
page read and write
|
||
1EE2E5B8000
|
trusted library allocation
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
D3B000
|
heap
|
page read and write
|
||
A4A000
|
unkown
|
page execute and read and write
|
||
1EE2575D000
|
heap
|
page read and write
|
||
1EE322A9000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
17F37C03000
|
trusted library allocation
|
page read and write
|
||
1EE2F6B2000
|
trusted library allocation
|
page read and write
|
||
1EE367FE000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
3DDF000
|
stack
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
893D1FE000
|
stack
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
5111681000
|
stack
|
page read and write
|
||
1EE2FF00000
|
trusted library allocation
|
page read and write
|
||
4321000
|
heap
|
page read and write
|
||
1EE3073A000
|
trusted library allocation
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
DB107FE000
|
stack
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1EE30F00000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
57C000
|
unkown
|
page execute and write copy
|
||
52DA000
|
trusted library allocation
|
page read and write
|
||
1EE2E5CD000
|
trusted library allocation
|
page read and write
|
||
A1B000
|
unkown
|
page execute and write copy
|
||
2A7E000
|
stack
|
page read and write
|
||
445E000
|
stack
|
page read and write
|
||
1EE3029B000
|
trusted library allocation
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE2E5C7000
|
trusted library allocation
|
page read and write
|
||
1B40E000
|
stack
|
page read and write
|
||
4321000
|
heap
|
page read and write
|
||
1EE2C113000
|
trusted library allocation
|
page read and write
|
||
F5B000
|
stack
|
page read and write
|
||
1EE30BE0000
|
trusted library allocation
|
page read and write
|
||
58FD000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4920000
|
direct allocation
|
page execute and read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
260AA3A0000
|
heap
|
page read and write
|
||
1EE2E500000
|
trusted library allocation
|
page read and write
|
||
5118ABC000
|
stack
|
page read and write
|
||
1EE36ADC000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
direct allocation
|
page execute and read and write
|
||
1EE31372000
|
trusted library allocation
|
page read and write
|
||
A4A000
|
unkown
|
page execute and write copy
|
||
1134000
|
heap
|
page read and write
|
||
270000
|
unkown
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
1EE301CC000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
1EE2DDD2000
|
trusted library allocation
|
page read and write
|
||
1D51B000
|
heap
|
page read and write
|
||
545D000
|
stack
|
page read and write
|
||
1EE367BC000
|
trusted library allocation
|
page read and write
|
||
574000
|
unkown
|
page execute and write copy
|
||
1EE30D96000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
1EE30993000
|
trusted library allocation
|
page read and write
|
||
1E083BB2000
|
heap
|
page read and write
|
||
260A95C0000
|
trusted library section
|
page readonly
|
||
1EE303E3000
|
trusted library allocation
|
page read and write
|
||
1EE30AAF000
|
trusted library allocation
|
page read and write
|
||
260A9715000
|
trusted library allocation
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
1EE2E870000
|
trusted library allocation
|
page read and write
|
||
1EE30B9C000
|
trusted library allocation
|
page read and write
|
||
1EE36CE1000
|
trusted library allocation
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
1EE30869000
|
trusted library allocation
|
page read and write
|
||
1EE3688E000
|
trusted library allocation
|
page read and write
|
||
4CE000
|
unkown
|
page execute and read and write
|
||
574000
|
unkown
|
page execute and write copy
|
||
1EE308C1000
|
trusted library allocation
|
page read and write
|
||
2890000
|
direct allocation
|
page execute and read and write
|
||
1EE36821000
|
trusted library allocation
|
page read and write
|
||
260A9600000
|
trusted library allocation
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
1EE25752000
|
heap
|
page read and write
|
||
1EE25746000
|
heap
|
page read and write
|
||
1EE2EC60000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE30AA1000
|
trusted library allocation
|
page read and write
|
||
1EE2B66C000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
52B3000
|
trusted library allocation
|
page read and write
|
||
1EE2E562000
|
trusted library allocation
|
page read and write
|
||
1EE1E7C9000
|
heap
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
1EE34718000
|
trusted library allocation
|
page read and write
|
||
1EE2FFBA000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
5EB8000
|
trusted library allocation
|
page read and write
|
||
159F000
|
stack
|
page read and write
|
||
1EE304C0000
|
trusted library allocation
|
page read and write
|
||
1EE2E5C9000
|
trusted library allocation
|
page read and write
|
||
4976000
|
trusted library allocation
|
page read and write
|
||
566B000
|
trusted library allocation
|
page read and write
|
||
1EE367F2000
|
trusted library allocation
|
page read and write
|
||
5285000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
trusted library allocation
|
page read and write
|
||
1ACEF000
|
stack
|
page read and write
|
||
4B9F000
|
stack
|
page read and write
|
||
921000
|
unkown
|
page execute and write copy
|
||
1EE30200000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1EE25755000
|
heap
|
page read and write
|
||
1EE2E88B000
|
trusted library allocation
|
page read and write
|
||
1EE3362A000
|
trusted library allocation
|
page read and write
|
||
2B2000
|
unkown
|
page execute and read and write
|
||
1EE309FC000
|
trusted library allocation
|
page read and write
|
||
1EE2DAAB000
|
trusted library allocation
|
page read and write
|
||
1EE25742000
|
heap
|
page read and write
|
||
260A9774000
|
trusted library allocation
|
page read and write
|
||
D6F000
|
stack
|
page read and write
|
||
1EE30C37000
|
trusted library allocation
|
page read and write
|
||
1EE2579C000
|
heap
|
page read and write
|
||
1EE2C509000
|
trusted library allocation
|
page read and write
|
||
1D522000
|
heap
|
page read and write
|
||
1EE36976000
|
trusted library allocation
|
page read and write
|
||
52AF000
|
trusted library allocation
|
page read and write
|
||
1EE308F0000
|
trusted library allocation
|
page read and write
|
||
1EE30BDD000
|
trusted library allocation
|
page read and write
|
||
1EE30BEC000
|
trusted library allocation
|
page read and write
|
||
5E8000
|
heap
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
780000
|
unkown
|
page readonly
|
||
1EE25743000
|
heap
|
page read and write
|
||
1EE38CBD000
|
trusted library allocation
|
page read and write
|
||
1EE302EA000
|
trusted library allocation
|
page read and write
|
||
5631000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
493E000
|
stack
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
1EE30BE0000
|
trusted library allocation
|
page read and write
|
||
260AA3EA000
|
heap
|
page read and write
|
||
1EE2E803000
|
trusted library allocation
|
page read and write
|
||
1EE2FE0B000
|
trusted library allocation
|
page read and write
|
||
562D000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
93C000
|
unkown
|
page execute and read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
1EE2B910000
|
heap
|
page read and write
|
||
1EE309BA000
|
trusted library allocation
|
page read and write
|
||
53DF000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
11AF000
|
heap
|
page read and write
|
||
1EE2F2D3000
|
trusted library allocation
|
page read and write
|
||
1EE2FF47000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
1EE3072D000
|
trusted library allocation
|
page read and write
|
||
52A4000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
251000
|
unkown
|
page execute and write copy
|
||
46AF000
|
stack
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
51112BB000
|
stack
|
page read and write
|
||
1EE30E99000
|
trusted library allocation
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
1EE30BD2000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
17F37D12000
|
trusted library allocation
|
page read and write
|
||
1EE3687A000
|
trusted library allocation
|
page read and write
|
||
1EE2E49C000
|
trusted library allocation
|
page read and write
|
||
1EE36A00000
|
trusted library allocation
|
page read and write
|
||
1D53E000
|
heap
|
page read and write
|
||
1EE367AC000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
133F000
|
stack
|
page read and write
|
||
621000
|
heap
|
page read and write
|
||
1EE31745000
|
trusted library allocation
|
page read and write
|
||
1EE2E89F000
|
trusted library allocation
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
260AA432000
|
heap
|
page read and write
|
||
5BA7000
|
trusted library allocation
|
page read and write
|
||
3BFD000
|
stack
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
5ACF000
|
trusted library allocation
|
page read and write
|
||
1EE2DD5A000
|
trusted library allocation
|
page read and write
|
||
1EE2DD11000
|
trusted library allocation
|
page read and write
|
||
1EE314E7000
|
trusted library allocation
|
page read and write
|
||
1EE30A27000
|
trusted library allocation
|
page read and write
|
||
17F37CA4000
|
trusted library allocation
|
page read and write
|
||
56BE000
|
trusted library allocation
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
1EE3098E000
|
trusted library allocation
|
page read and write
|
||
5119BBB000
|
stack
|
page read and write
|
||
1EE33626000
|
trusted library allocation
|
page read and write
|
||
11A6000
|
heap
|
page read and write
|
||
1EE2EC3B000
|
trusted library allocation
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
F74D9721000
|
trusted library allocation
|
page read and write
|
||
52BE000
|
trusted library allocation
|
page read and write
|
||
1EE2EA0E000
|
trusted library allocation
|
page read and write
|
||
628000
|
heap
|
page read and write
|
||
17F37940000
|
heap
|
page read and write
|
||
1EE3212B000
|
trusted library allocation
|
page read and write
|
||
1EE3051C000
|
trusted library allocation
|
page read and write
|
||
5EB3000
|
trusted library allocation
|
page read and write
|
||
1EE2E8F4000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE30427000
|
trusted library allocation
|
page read and write
|
||
1EE2F676000
|
trusted library allocation
|
page read and write
|
||
5EB1000
|
trusted library allocation
|
page read and write
|
||
1EE31398000
|
trusted library allocation
|
page read and write
|
||
1EE2579C000
|
heap
|
page read and write
|
||
1EE2DB6E000
|
trusted library allocation
|
page read and write
|
||
260A9723000
|
trusted library allocation
|
page read and write
|
||
13FE000
|
stack
|
page read and write
|
||
260AA42C000
|
heap
|
page read and write
|
||
3DBF000
|
stack
|
page read and write
|
||
511B000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
1EE2AAB7000
|
trusted library allocation
|
page read and write
|
||
1EE32122000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1EE32003000
|
trusted library allocation
|
page read and write
|
||
1EE31075000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE321EB000
|
trusted library allocation
|
page read and write
|
||
1EE30F03000
|
trusted library allocation
|
page read and write
|
||
1EE30300000
|
trusted library allocation
|
page read and write
|
||
1EE30ADA000
|
trusted library allocation
|
page read and write
|
||
1EE2F3C3000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE30970000
|
trusted library allocation
|
page read and write
|
||
1EE257A5000
|
heap
|
page read and write
|
||
CBD000
|
heap
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
1EE309D2000
|
trusted library allocation
|
page read and write
|
||
B0C000
|
unkown
|
page readonly
|
||
4441000
|
heap
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
5284000
|
trusted library allocation
|
page read and write
|
||
52C9000
|
trusted library allocation
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
1EE302E6000
|
trusted library allocation
|
page read and write
|
||
5AC4000
|
trusted library allocation
|
page read and write
|
||
1019000
|
heap
|
page read and write
|
||
11FB000
|
heap
|
page read and write
|
||
1EE30A3B000
|
trusted library allocation
|
page read and write
|
||
1EE30A42000
|
trusted library allocation
|
page read and write
|
||
1EE301AF000
|
trusted library allocation
|
page read and write
|
||
5B38000
|
trusted library allocation
|
page read and write
|
||
3F7F000
|
stack
|
page read and write
|
||
1EE33606000
|
trusted library allocation
|
page read and write
|
||
A1F000
|
unkown
|
page execute and write copy
|
||
1EE2A2FA000
|
trusted library allocation
|
page read and write
|
||
5F89000
|
trusted library allocation
|
page read and write
|
||
1EE2F61D000
|
trusted library allocation
|
page read and write
|
||
1EE2A16D000
|
trusted library allocation
|
page read and write
|
||
1D525000
|
heap
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
1EE32203000
|
trusted library allocation
|
page read and write
|
||
1D530000
|
heap
|
page read and write
|
||
15FC4E24000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
1EE2C600000
|
trusted library allocation
|
page read and write
|
||
1EE3098A000
|
trusted library allocation
|
page read and write
|
||
1EE3686A000
|
trusted library allocation
|
page read and write
|
||
1EE2F921000
|
trusted library allocation
|
page read and write
|
||
49FF000
|
stack
|
page read and write
|
||
94F000
|
unkown
|
page execute and read and write
|
||
52A2000
|
trusted library allocation
|
page read and write
|
||
1EE30BFA000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
31BF000
|
stack
|
page read and write
|
||
5B3B000
|
trusted library allocation
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
467F000
|
stack
|
page read and write
|
||
56D5000
|
trusted library allocation
|
page read and write
|
||
558F000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE30BEF000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
direct allocation
|
page read and write
|
||
1EE2EC69000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
1EE2F6BF000
|
trusted library allocation
|
page read and write
|
||
1EE2FF93000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
F65000
|
heap
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
136F000
|
heap
|
page read and write
|
||
1EE368A8000
|
trusted library allocation
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
1EE30BFA000
|
trusted library allocation
|
page read and write
|
||
1EE30C37000
|
trusted library allocation
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
1EE2574A000
|
heap
|
page read and write
|
||
1EE2AB54000
|
trusted library allocation
|
page read and write
|
||
571000
|
unkown
|
page execute and write copy
|
||
1EE30522000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
58F6000
|
trusted library allocation
|
page read and write
|
||
1EE2C910000
|
trusted library section
|
page readonly
|
||
4AC1000
|
heap
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
1EE3695D000
|
trusted library allocation
|
page read and write
|
||
1EE257A1000
|
heap
|
page read and write
|
||
56CF000
|
trusted library allocation
|
page read and write
|
||
1EE3095B000
|
trusted library allocation
|
page read and write
|
||
1EE3088A000
|
trusted library allocation
|
page read and write
|
||
1EE2A09E000
|
trusted library allocation
|
page read and write
|
||
1D10E000
|
stack
|
page read and write
|
||
511AB3E000
|
stack
|
page read and write
|
||
1EE32142000
|
trusted library allocation
|
page read and write
|
||
1EE311C0000
|
trusted library allocation
|
page read and write
|
||
1EE36673000
|
trusted library allocation
|
page read and write
|
||
1EE2FFA2000
|
trusted library allocation
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
1EE30224000
|
trusted library allocation
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
511A07B000
|
stack
|
page read and write
|
||
615000
|
heap
|
page read and write
|
||
260AA43C000
|
heap
|
page read and write
|
||
1EE25762000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE30A1E000
|
trusted library allocation
|
page read and write
|
||
1EE30BDD000
|
trusted library allocation
|
page read and write
|
||
1EE2F352000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE30AA1000
|
trusted library allocation
|
page read and write
|
||
1E0857B9000
|
heap
|
page read and write
|
||
5C21000
|
trusted library allocation
|
page read and write
|
||
260A98D0000
|
heap
|
page read and write
|
||
17F37CE7000
|
trusted library allocation
|
page read and write
|
||
1EE30511000
|
trusted library allocation
|
page read and write
|
||
41AF000
|
stack
|
page read and write
|
||
1EE305E3000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
52DA000
|
trusted library allocation
|
page read and write
|
||
1EE30CDF000
|
trusted library allocation
|
page read and write
|
||
1EE25775000
|
heap
|
page read and write
|
||
1EE36A85000
|
trusted library allocation
|
page read and write
|
||
1EE30BCA000
|
trusted library allocation
|
page read and write
|
||
5313000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
4BF0000
|
direct allocation
|
page execute and read and write
|
||
1474000
|
heap
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
260A970C000
|
trusted library allocation
|
page read and write
|
||
54BF000
|
trusted library allocation
|
page read and write
|
||
1EE1EA00000
|
trusted library allocation
|
page read and write
|
||
1EE2FCC0000
|
trusted library section
|
page read and write
|
||
1EE2E5A5000
|
trusted library allocation
|
page read and write
|
||
1EE38E03000
|
trusted library allocation
|
page read and write
|
||
5B34000
|
trusted library allocation
|
page read and write
|
||
6F5000
|
unkown
|
page execute and read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1EE2E5C7000
|
trusted library allocation
|
page read and write
|
||
920000
|
unkown
|
page readonly
|
||
1EE2A0C1000
|
trusted library allocation
|
page read and write
|
||
1E083B90000
|
heap
|
page read and write
|
||
407E000
|
stack
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
1EE2A718000
|
trusted library allocation
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
2CD15EB00000
|
trusted library allocation
|
page read and write
|
||
1EE2DAB9000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
2DC000
|
unkown
|
page execute and write copy
|
||
58F1000
|
trusted library allocation
|
page read and write
|
||
1EE308CB000
|
trusted library allocation
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
1EE30BEF000
|
trusted library allocation
|
page read and write
|
||
1EE2EAB1000
|
trusted library allocation
|
page read and write
|
||
1EE2C400000
|
trusted library allocation
|
page read and write
|
||
1EE33610000
|
trusted library allocation
|
page read and write
|
||
1EE30996000
|
trusted library allocation
|
page read and write
|
||
4EF4000
|
trusted library allocation
|
page read and write
|
||
1EE304BD000
|
trusted library allocation
|
page read and write
|
||
260A9CD0000
|
trusted library allocation
|
page read and write
|
||
52B6000
|
trusted library allocation
|
page read and write
|
||
529A000
|
trusted library allocation
|
page read and write
|
||
5119EBC000
|
stack
|
page read and write
|
||
1EE30BE3000
|
trusted library allocation
|
page read and write
|
||
1EE3054D000
|
trusted library allocation
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
1EE36800000
|
trusted library allocation
|
page read and write
|
||
5EB7000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
511743D000
|
stack
|
page read and write
|
||
1EE2F331000
|
trusted library allocation
|
page read and write
|
||
5FBC000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
5589000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE3676A000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
1EE302EF000
|
trusted library allocation
|
page read and write
|
||
1EE257AC000
|
heap
|
page read and write
|
||
1EE30A97000
|
trusted library allocation
|
page read and write
|
||
53E3000
|
trusted library allocation
|
page read and write
|
||
1EE30AF0000
|
trusted library allocation
|
page read and write
|
||
581C000
|
trusted library allocation
|
page read and write
|
||
1EE31042000
|
trusted library allocation
|
page read and write
|
||
1EE2A20A000
|
trusted library allocation
|
page read and write
|
||
1EE30BFA000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
4F00000
|
direct allocation
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
1EE367F2000
|
trusted library allocation
|
page read and write
|
||
1EE2FF25000
|
trusted library allocation
|
page read and write
|
||
1EE2EC57000
|
trusted library allocation
|
page read and write
|
||
1EE2C30D000
|
trusted library allocation
|
page read and write
|
||
142E000
|
stack
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
1EE2EC55000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
1EE30BE0000
|
trusted library allocation
|
page read and write
|
||
296C3000
|
heap
|
page read and write
|
||
442F000
|
stack
|
page read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
1EE2E9E3000
|
trusted library allocation
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
1EE368FA000
|
trusted library allocation
|
page read and write
|
||
1EE30B9C000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE32302000
|
trusted library allocation
|
page read and write
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
5AFC000
|
trusted library allocation
|
page read and write
|
||
1EE3688E000
|
trusted library allocation
|
page read and write
|
||
566000
|
unkown
|
page execute and read and write
|
||
1EE2ECAC000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
remote allocation
|
page read and write
|
||
5BA8000
|
trusted library allocation
|
page read and write
|
||
1EE30AF2000
|
trusted library allocation
|
page read and write
|
||
1EE2E0B0000
|
heap
|
page read and write
|
||
46BF000
|
stack
|
page read and write
|
||
1EE30477000
|
trusted library allocation
|
page read and write
|
||
1EE304B1000
|
trusted library allocation
|
page read and write
|
||
1EE30474000
|
trusted library allocation
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1EE2A15D000
|
trusted library allocation
|
page read and write
|
||
1EE25746000
|
heap
|
page read and write
|
||
1EE2BA7C000
|
trusted library allocation
|
page read and write
|
||
1EE36606000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
1EE2F24A000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
7B4000
|
unkown
|
page execute and write copy
|
||
52CA000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE2F67A000
|
trusted library allocation
|
page read and write
|
||
1EE303DB000
|
trusted library allocation
|
page read and write
|
||
1EE30BEF000
|
trusted library allocation
|
page read and write
|
||
FF3000
|
heap
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
1EE368E2000
|
trusted library allocation
|
page read and write
|
||
1EE2A603000
|
trusted library allocation
|
page read and write
|
||
1EE2E6D7000
|
trusted library allocation
|
page read and write
|
||
573D000
|
trusted library allocation
|
page read and write
|
||
1EE25740000
|
heap
|
page read and write
|
||
5AEB000
|
trusted library allocation
|
page read and write
|
||
3C9F000
|
stack
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
51BD000
|
stack
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
1EE2E609000
|
trusted library allocation
|
page read and write
|
||
5119F3C000
|
stack
|
page read and write
|
||
1EE302E4000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
4941000
|
heap
|
page read and write
|
||
1EE305E6000
|
trusted library allocation
|
page read and write
|
||
1EE2F274000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
853000
|
unkown
|
page execute and read and write
|
||
1EE30970000
|
trusted library allocation
|
page read and write
|
||
1EE2E5AE000
|
trusted library allocation
|
page read and write
|
||
5EB5000
|
trusted library allocation
|
page read and write
|
||
1EE1E610000
|
unclassified section
|
page readonly
|
||
1EE30BDD000
|
trusted library allocation
|
page read and write
|
||
1EE30ADD000
|
trusted library allocation
|
page read and write
|
||
1EE2F0BF000
|
trusted library allocation
|
page read and write
|
||
1EE36850000
|
trusted library allocation
|
page read and write
|
||
2E4E000
|
heap
|
page read and write
|
||
1EE2EC72000
|
trusted library allocation
|
page read and write
|
||
1EE33620000
|
trusted library allocation
|
page read and write
|
||
61D000
|
heap
|
page read and write
|
||
1EE31203000
|
trusted library allocation
|
page read and write
|
||
1EE30869000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
5634000
|
trusted library allocation
|
page read and write
|
||
1D50B000
|
heap
|
page read and write
|
||
418F000
|
stack
|
page read and write
|
||
2B9000
|
unkown
|
page write copy
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
52A2000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1D54C000
|
heap
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
2363A000
|
heap
|
page read and write
|
||
260A9CBB000
|
unkown
|
page execute read
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
1194000
|
heap
|
page read and write
|
||
1EE36750000
|
trusted library allocation
|
page read and write
|
||
1EE2F003000
|
trusted library allocation
|
page read and write
|
||
1EE367FE000
|
trusted library allocation
|
page read and write
|
||
1D0AE000
|
stack
|
page read and write
|
||
1EE2A04A000
|
trusted library allocation
|
page read and write
|
||
607B000
|
trusted library allocation
|
page read and write
|
||
1EE2F0E1000
|
trusted library allocation
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
1EE302AE000
|
trusted library allocation
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE30AA4000
|
trusted library allocation
|
page read and write
|
||
288F000
|
stack
|
page read and write
|
||
1EE2EFD4000
|
trusted library allocation
|
page read and write
|
||
52A3000
|
trusted library allocation
|
page read and write
|
||
D32000
|
heap
|
page read and write
|
||
1EE3219D000
|
trusted library allocation
|
page read and write
|
||
1EE2DAFC000
|
trusted library allocation
|
page read and write
|
||
52A4000
|
trusted library allocation
|
page read and write
|
||
1EE36CA9000
|
trusted library allocation
|
page read and write
|
||
99F000
|
stack
|
page read and write
|
||
1EE2E4A2000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
5BD000
|
heap
|
page read and write
|
||
558F000
|
trusted library allocation
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
1EE30517000
|
trusted library allocation
|
page read and write
|
||
1EE25740000
|
heap
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
1EE36C98000
|
trusted library allocation
|
page read and write
|
||
1EE304BB000
|
trusted library allocation
|
page read and write
|
||
260A951A000
|
heap
|
page read and write
|
||
5284000
|
trusted library allocation
|
page read and write
|
||
1EE3012A000
|
trusted library allocation
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
162E000
|
heap
|
page read and write
|
||
1EE36874000
|
trusted library allocation
|
page read and write
|
||
52B3000
|
trusted library allocation
|
page read and write
|
||
1EE36A55000
|
trusted library allocation
|
page read and write
|
||
1EE322EB000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
260A9762000
|
trusted library allocation
|
page read and write
|
||
1D535000
|
heap
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
482E000
|
stack
|
page read and write
|
||
1EE36712000
|
trusted library allocation
|
page read and write
|
||
1EE30753000
|
trusted library allocation
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
5115E3E000
|
stack
|
page read and write
|
||
1EE306C3000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
51113BB000
|
stack
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
1EE30AA4000
|
trusted library allocation
|
page read and write
|
||
1EE2AA03000
|
trusted library allocation
|
page read and write
|
||
2FBF000
|
stack
|
page read and write
|
||
8CE000
|
unkown
|
page readonly
|
||
3CBF000
|
stack
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
571B000
|
trusted library allocation
|
page read and write
|
||
5E30000
|
heap
|
page read and write
|
||
1EE30679000
|
trusted library allocation
|
page read and write
|
||
5240000
|
heap
|
page read and write
|
||
5110FFE000
|
stack
|
page read and write
|
||
55A0000
|
remote allocation
|
page read and write
|
||
1EE2573B000
|
heap
|
page read and write
|
||
5582000
|
trusted library allocation
|
page read and write
|
||
1EE30AD6000
|
trusted library allocation
|
page read and write
|
||
1EE30842000
|
trusted library allocation
|
page read and write
|
||
1EE2F3A6000
|
trusted library allocation
|
page read and write
|
||
1EE2F03B000
|
trusted library allocation
|
page read and write
|
||
558D000
|
trusted library allocation
|
page read and write
|
||
1EE36ACD000
|
trusted library allocation
|
page read and write
|
||
2EAF000
|
stack
|
page read and write
|
||
1EE302F1000
|
trusted library allocation
|
page read and write
|
||
1EE306A8000
|
trusted library allocation
|
page read and write
|
||
45B0000
|
direct allocation
|
page read and write
|
||
D1A000
|
heap
|
page read and write
|
||
5010000
|
heap
|
page read and write
|
||
1EE33628000
|
trusted library allocation
|
page read and write
|
||
1EE302EF000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1EE2F387000
|
trusted library allocation
|
page read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
1EE38BB0000
|
trusted library allocation
|
page read and write
|
||
1EE2DB03000
|
trusted library allocation
|
page read and write
|
||
854000
|
unkown
|
page execute and write copy
|
||
1EE2EC77000
|
trusted library allocation
|
page read and write
|
||
1EE307B5000
|
trusted library allocation
|
page read and write
|
||
1EE30713000
|
trusted library allocation
|
page read and write
|
||
1E083BE0000
|
heap
|
page read and write
|
||
1EE2BB16000
|
trusted library allocation
|
page read and write
|
||
1EE2FC30000
|
trusted library section
|
page read and write
|
||
1EE30AD1000
|
trusted library allocation
|
page read and write
|
||
1EE304A8000
|
trusted library allocation
|
page read and write
|
||
1EE2F8E0000
|
trusted library allocation
|
page read and write
|
||
1EE32156000
|
trusted library allocation
|
page read and write
|
||
1EE2F03E000
|
trusted library allocation
|
page read and write
|
||
1EE2EC60000
|
trusted library allocation
|
page read and write
|
||
468F000
|
stack
|
page read and write
|
||
1EE36AC7000
|
trusted library allocation
|
page read and write
|
||
1EE3213B000
|
trusted library allocation
|
page read and write
|
||
1EE36CCD000
|
trusted library allocation
|
page read and write
|
||
1EE30E1F000
|
trusted library allocation
|
page read and write
|
||
1EE3665B000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
17F37CBA000
|
trusted library allocation
|
page read and write
|
||
1EE30AA4000
|
trusted library allocation
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
1EE2EE90000
|
trusted library section
|
page read and write
|
||
1EE36A32000
|
trusted library allocation
|
page read and write
|
||
1D516000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
1091000
|
heap
|
page read and write
|
||
4900000
|
direct allocation
|
page execute and read and write
|
||
6C4000
|
heap
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
542E000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
direct allocation
|
page execute and read and write
|
||
52C4000
|
trusted library allocation
|
page read and write
|
||
1EE36A37000
|
trusted library allocation
|
page read and write
|
||
5420000
|
trusted library allocation
|
page read and write
|
||
1EE2BBD2000
|
trusted library allocation
|
page read and write
|
||
1034000
|
heap
|
page read and write
|
||
1EE30446000
|
trusted library allocation
|
page read and write
|
||
1EE3092E000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
56CC000
|
trusted library allocation
|
page read and write
|
||
5283000
|
trusted library allocation
|
page read and write
|
||
1EE30C37000
|
trusted library allocation
|
page read and write
|
||
9A1000
|
unkown
|
page execute and read and write
|
||
564000
|
unkown
|
page execute and read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
1EE2E49C000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
62A000
|
heap
|
page read and write
|
||
5AE3000
|
trusted library allocation
|
page read and write
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
1D515000
|
heap
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
1EE30BCA000
|
trusted library allocation
|
page read and write
|
||
17F37D1F000
|
trusted library allocation
|
page read and write
|
||
5FF3000
|
trusted library allocation
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
2B49AA51000
|
trusted library allocation
|
page execute read
|
||
599000
|
unkown
|
page write copy
|
||
AF9F1FE000
|
unkown
|
page readonly
|
||
13A8000
|
heap
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
5FC0000
|
trusted library allocation
|
page read and write
|
||
1EE36C7C000
|
trusted library allocation
|
page read and write
|
||
1EE3136E000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
remote allocation
|
page read and write
|
||
5BD9000
|
trusted library allocation
|
page read and write
|
||
2B49AA11000
|
trusted library allocation
|
page execute read
|
||
1EE3041D000
|
trusted library allocation
|
page read and write
|
||
61EB7000
|
direct allocation
|
page readonly
|
||
80D000
|
unkown
|
page execute and read and write
|
||
1EE30BEC000
|
trusted library allocation
|
page read and write
|
||
1EE2F2B5000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE30EC9000
|
trusted library allocation
|
page read and write
|
||
52A9000
|
trusted library allocation
|
page read and write
|
||
1EE30A1E000
|
trusted library allocation
|
page read and write
|
||
1EE305E2000
|
trusted library allocation
|
page read and write
|
||
646000
|
heap
|
page read and write
|
||
1EE30AA4000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
417F000
|
stack
|
page read and write
|
||
1EE2BC22000
|
trusted library allocation
|
page read and write
|
||
1EE30AF8000
|
trusted library allocation
|
page read and write
|
||
270000
|
unkown
|
page readonly
|
||
4441000
|
heap
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
17F37B00000
|
trusted library allocation
|
page read and write
|
||
1EE36903000
|
trusted library allocation
|
page read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
1EE20351000
|
heap
|
page read and write
|
||
5284000
|
trusted library allocation
|
page read and write
|
||
52BB000
|
trusted library allocation
|
page read and write
|
||
2F785000
|
heap
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
3F5E000
|
stack
|
page read and write
|
||
1EE309F0000
|
trusted library allocation
|
page read and write
|
||
1EE30C6F000
|
trusted library allocation
|
page read and write
|
||
558F000
|
trusted library allocation
|
page read and write
|
||
A0D000
|
unkown
|
page execute and write copy
|
||
1EE2A16F000
|
trusted library allocation
|
page read and write
|
||
52BD000
|
trusted library allocation
|
page read and write
|
||
9F4000
|
unkown
|
page execute and read and write
|
||
5285000
|
trusted library allocation
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
1EE36C8B000
|
trusted library allocation
|
page read and write
|
||
1EE303FB000
|
trusted library allocation
|
page read and write
|
||
1EE2FFD8000
|
trusted library allocation
|
page read and write
|
||
17F37C6E000
|
trusted library allocation
|
page read and write
|
||
1EE257AF000
|
heap
|
page read and write
|
||
1EE30BA7000
|
trusted library allocation
|
page read and write
|
||
491F000
|
stack
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
1EE3362C000
|
trusted library allocation
|
page read and write
|
||
C99000
|
heap
|
page read and write
|
||
17F37CC7000
|
trusted library allocation
|
page read and write
|
||
4321000
|
heap
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
511B63E000
|
stack
|
page read and write
|
||
5118AFC000
|
stack
|
page read and write
|
||
1EE2F32C000
|
trusted library allocation
|
page read and write
|
||
1EE30609000
|
trusted library allocation
|
page read and write
|
||
5ADC000
|
trusted library allocation
|
page read and write
|
||
260AA3A0000
|
heap
|
page read and write
|
||
1EE25753000
|
heap
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
1EE3098A000
|
trusted library allocation
|
page read and write
|
||
5303000
|
trusted library allocation
|
page read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
612000
|
unkown
|
page execute and read and write
|
||
17F37C7B000
|
trusted library allocation
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
57F4000
|
trusted library allocation
|
page read and write
|
||
1EE31738000
|
trusted library allocation
|
page read and write
|
||
23AB0A00000
|
heap
|
page read and write
|
||
1EE30AD1000
|
trusted library allocation
|
page read and write
|
||
1EE32013000
|
trusted library allocation
|
page read and write
|
||
566000
|
unkown
|
page execute and write copy
|
||
1EE2EA6B000
|
trusted library allocation
|
page read and write
|
||
98F000
|
unkown
|
page execute and read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1EE2E562000
|
trusted library allocation
|
page read and write
|
||
1EE30805000
|
trusted library allocation
|
page read and write
|
||
260A9360000
|
unclassified section
|
page readonly
|
||
511B23F000
|
stack
|
page read and write
|
||
5C19000
|
trusted library allocation
|
page read and write
|
||
1EE2EC85000
|
trusted library allocation
|
page read and write
|
||
1EE2E56F000
|
trusted library allocation
|
page read and write
|
||
5B05000
|
trusted library allocation
|
page read and write
|
||
528F000
|
trusted library allocation
|
page read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
1EE2E5E6000
|
trusted library allocation
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
1EE2579D000
|
heap
|
page read and write
|
||
1EE2ECF9000
|
trusted library allocation
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
1EE30001000
|
trusted library allocation
|
page read and write
|
||
1EE3088C000
|
trusted library allocation
|
page read and write
|
||
1EE257AF000
|
heap
|
page read and write
|
||
1EE257AF000
|
heap
|
page read and write
|
||
1EE2A62F000
|
trusted library allocation
|
page read and write
|
||
1EE30A20000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
591E000
|
stack
|
page read and write
|
||
F3E000
|
stack
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
4F40000
|
direct allocation
|
page execute and read and write
|
||
C54000
|
heap
|
page read and write
|
||
1EE32040000
|
trusted library allocation
|
page read and write
|
||
17F37D03000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
5BB0000
|
trusted library allocation
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
1EE309B0000
|
trusted library allocation
|
page read and write
|
||
1EE30500000
|
trusted library allocation
|
page read and write
|
||
1EE2C20D000
|
trusted library allocation
|
page read and write
|
||
137F000
|
stack
|
page read and write
|
||
1EE2DACA000
|
trusted library allocation
|
page read and write
|
||
1D52F000
|
heap
|
page read and write
|
||
1EE30ADA000
|
trusted library allocation
|
page read and write
|
||
5288000
|
trusted library allocation
|
page read and write
|
||
4BB4000
|
heap
|
page read and write
|
||
5FEF000
|
trusted library allocation
|
page read and write
|
||
260AA47B000
|
heap
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
260AA461000
|
heap
|
page read and write
|
||
5BAE000
|
trusted library allocation
|
page read and write
|
||
56E7000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
5616000
|
trusted library allocation
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
455F000
|
stack
|
page read and write
|
||
1EE257A1000
|
heap
|
page read and write
|
||
1EE30996000
|
trusted library allocation
|
page read and write
|
||
260AA42C000
|
heap
|
page read and write
|
||
69E000
|
stack
|
page read and write
|
||
1EE2E6D3000
|
trusted library allocation
|
page read and write
|
||
55B000
|
unkown
|
page execute and read and write
|
||
17F37C72000
|
trusted library allocation
|
page read and write
|
||
1E083F00000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
1EE30A42000
|
trusted library allocation
|
page read and write
|
||
1EE2F0F2000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
direct allocation
|
page execute and read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
5ADA000
|
trusted library allocation
|
page read and write
|
||
1EE2575A000
|
heap
|
page read and write
|
||
5AAB000
|
trusted library allocation
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
58F7000
|
trusted library allocation
|
page read and write
|
||
1EE38C47000
|
trusted library allocation
|
page read and write
|
||
17F37980000
|
unclassified section
|
page read and write
|
||
1EE2EEF0000
|
trusted library section
|
page read and write
|
||
1EE309D6000
|
trusted library allocation
|
page read and write
|
||
1EE31248000
|
trusted library allocation
|
page read and write
|
||
38FF000
|
stack
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1EE257A1000
|
heap
|
page read and write
|
||
1EE2E51E000
|
trusted library allocation
|
page read and write
|
||
52B6000
|
trusted library allocation
|
page read and write
|
||
1EE303B8000
|
trusted library allocation
|
page read and write
|
||
1EE36870000
|
trusted library allocation
|
page read and write
|
||
A1F000
|
unkown
|
page execute and read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
1EE2E0C4000
|
heap
|
page read and write
|
||
5BA8000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE2BB61000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
1EE2DB00000
|
trusted library allocation
|
page read and write
|
||
11B5000
|
heap
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
D3D000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
D07000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE36AC8000
|
trusted library allocation
|
page read and write
|
||
160F000
|
stack
|
page read and write
|
||
1EE30530000
|
trusted library allocation
|
page read and write
|
||
1B16F000
|
stack
|
page read and write
|
||
1EE306AF000
|
trusted library allocation
|
page read and write
|
||
5B1C000
|
trusted library allocation
|
page read and write
|
||
1EE2E5E2000
|
trusted library allocation
|
page read and write
|
||
5BDF000
|
trusted library allocation
|
page read and write
|
||
9F6000
|
unkown
|
page execute and write copy
|
||
1EE3048D000
|
trusted library allocation
|
page read and write
|
||
A4C000
|
unkown
|
page execute and write copy
|
||
5EB7000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1627000
|
heap
|
page read and write
|
||
5B40000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
1EE2C103000
|
trusted library allocation
|
page read and write
|
||
5FDC000
|
trusted library allocation
|
page read and write
|
||
1EE30A6A000
|
trusted library allocation
|
page read and write
|
||
5AAF000
|
trusted library allocation
|
page read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
260AA3A9000
|
heap
|
page read and write
|
||
1EE2A18A000
|
trusted library allocation
|
page read and write
|
||
5AE7000
|
trusted library allocation
|
page read and write
|
||
1EE310A6000
|
trusted library allocation
|
page read and write
|
||
1EE257A5000
|
heap
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
4F4000
|
unkown
|
page execute and read and write
|
||
1B3CE000
|
stack
|
page read and write
|
||
1EE25746000
|
heap
|
page read and write
|
||
1EE2C313000
|
trusted library allocation
|
page read and write
|
||
1EE2AB64000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
5AB4000
|
trusted library allocation
|
page read and write
|
||
369E000
|
stack
|
page read and write
|
||
5EBC000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
365F000
|
stack
|
page read and write
|
||
4E4000
|
unkown
|
page execute and write copy
|
||
45D000
|
unkown
|
page execute and read and write
|
||
3E1E000
|
stack
|
page read and write
|
||
1EE2E9E9000
|
trusted library allocation
|
page read and write
|
||
1EE30FFA000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
1EE30996000
|
trusted library allocation
|
page read and write
|
||
1EE30C27000
|
trusted library allocation
|
page read and write
|
||
1EE36909000
|
trusted library allocation
|
page read and write
|
||
1EE1E7C0000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
26F0000
|
direct allocation
|
page read and write
|
||
260AA421000
|
heap
|
page read and write
|
||
1EE25755000
|
heap
|
page read and write
|
||
1EE31148000
|
trusted library allocation
|
page read and write
|
||
1EE313E1000
|
trusted library allocation
|
page read and write
|
||
1EE306C6000
|
trusted library allocation
|
page read and write
|
||
1EE2574A000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
1EE30FFA000
|
trusted library allocation
|
page read and write
|
||
1EE2A7E3000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
4EB000
|
unkown
|
page execute and read and write
|
||
1EE2F2BB000
|
trusted library allocation
|
page read and write
|
||
5081000
|
direct allocation
|
page read and write
|
||
1EE2F66A000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
409E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE30AA4000
|
trusted library allocation
|
page read and write
|
||
63F000
|
unkown
|
page execute and read and write
|
||
1EE2E5E2000
|
trusted library allocation
|
page read and write
|
||
5651000
|
trusted library allocation
|
page read and write
|
||
45C000
|
unkown
|
page execute and write copy
|
||
5114C30000
|
unkown
|
page read and write
|
||
9A6000
|
unkown
|
page execute and read and write
|
||
1EE31484000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
1EE2ABA5000
|
trusted library allocation
|
page read and write
|
||
1EE25796000
|
heap
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
1EE36CB6000
|
trusted library allocation
|
page read and write
|
||
844000
|
unkown
|
page execute and read and write
|
||
1D54C000
|
heap
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
1EE30484000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
1EE2FC40000
|
trusted library section
|
page read and write
|
||
1EE2A061000
|
trusted library allocation
|
page read and write
|
||
558A000
|
trusted library allocation
|
page read and write
|
||
1EE2A0C5000
|
trusted library allocation
|
page read and write
|
||
D37000
|
heap
|
page read and write
|
||
1EE2A139000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
5B33000
|
trusted library allocation
|
page read and write
|
||
1D543000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
1EE2FA0D000
|
trusted library allocation
|
page read and write
|
||
1D515000
|
heap
|
page read and write
|
||
48B000
|
unkown
|
page execute and write copy
|
||
11B9000
|
heap
|
page read and write
|
||
555000
|
unkown
|
page execute and write copy
|
||
1EE30BA7000
|
trusted library allocation
|
page read and write
|
||
511483F000
|
stack
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
17F37D0C000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1EE38C1B000
|
trusted library allocation
|
page read and write
|
||
1EE3105A000
|
trusted library allocation
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
5AB7000
|
trusted library allocation
|
page read and write
|
||
1B0ED000
|
stack
|
page read and write
|
||
1EE30BEC000
|
trusted library allocation
|
page read and write
|
||
1EE36758000
|
trusted library allocation
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
1EE368F6000
|
trusted library allocation
|
page read and write
|
||
1EE3096E000
|
trusted library allocation
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
271000
|
unkown
|
page execute and read and write
|
||
5C74000
|
trusted library allocation
|
page read and write
|
||
1EE30A42000
|
trusted library allocation
|
page read and write
|
||
555000
|
unkown
|
page execute and write copy
|
||
1EE31262000
|
trusted library allocation
|
page read and write
|
||
61ED4000
|
direct allocation
|
page readonly
|
||
4441000
|
heap
|
page read and write
|
||
1EE313CC000
|
trusted library allocation
|
page read and write
|
||
1EE3676A000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
direct allocation
|
page read and write
|
||
1EE38B88000
|
trusted library allocation
|
page read and write
|
||
260AA423000
|
heap
|
page read and write
|
||
1EE36CC1000
|
trusted library allocation
|
page read and write
|
||
1EE2E49C000
|
trusted library allocation
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE36C7E000
|
trusted library allocation
|
page read and write
|
||
1EE303D0000
|
trusted library allocation
|
page read and write
|
||
1EE30BCF000
|
trusted library allocation
|
page read and write
|
||
D0F000
|
heap
|
page read and write
|
||
1EE2E389000
|
trusted library allocation
|
page read and write
|
||
1EE2F9F1000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1EE20349000
|
heap
|
page read and write
|
||
1EE2EC72000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1EE36992000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1EE32217000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
direct allocation
|
page execute and read and write
|
||
D37000
|
heap
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
1EE36CA9000
|
trusted library allocation
|
page read and write
|
||
5355000
|
trusted library allocation
|
page read and write
|
||
648000
|
heap
|
page read and write
|
||
260A9CF0000
|
heap
|
page read and write
|
||
1EE36992000
|
trusted library allocation
|
page read and write
|
||
1EE312DB000
|
trusted library allocation
|
page read and write
|
||
61ED0000
|
direct allocation
|
page read and write
|
||
C7F000
|
heap
|
page read and write
|
||
4920000
|
direct allocation
|
page execute and read and write
|
||
1EE25750000
|
heap
|
page read and write
|
||
2EBF000
|
stack
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
1EE36876000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
5E85000
|
trusted library allocation
|
page read and write
|
||
1EE2E49C000
|
trusted library allocation
|
page read and write
|
||
FEC000
|
stack
|
page read and write
|
||
1EE30A97000
|
trusted library allocation
|
page read and write
|
||
1EE3098F000
|
trusted library allocation
|
page read and write
|
||
5BF0000
|
trusted library allocation
|
page read and write
|
||
1EE2A148000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
52DC000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
5674000
|
trusted library allocation
|
page read and write
|
||
5654000
|
trusted library allocation
|
page read and write
|
||
615000
|
heap
|
page read and write
|
||
184E000
|
stack
|
page read and write
|
||
260AA42C000
|
heap
|
page read and write
|
||
5119CBA000
|
stack
|
page read and write
|
||
1EE38C61000
|
trusted library allocation
|
page read and write
|
||
4A5F000
|
stack
|
page read and write
|
||
1E083E10000
|
heap
|
page read and write
|
||
1EE30EB6000
|
trusted library allocation
|
page read and write
|
||
116F000
|
heap
|
page read and write
|
||
1EE36992000
|
trusted library allocation
|
page read and write
|
||
5582000
|
trusted library allocation
|
page read and write
|
||
1D620000
|
trusted library allocation
|
page read and write
|
||
2FF7000
|
heap
|
page read and write
|
||
1EE32245000
|
trusted library allocation
|
page read and write
|
||
4E01000
|
heap
|
page read and write
|
||
511663B000
|
stack
|
page read and write
|
||
1EE2E9E9000
|
trusted library allocation
|
page read and write
|
||
1EE2DDA7000
|
trusted library allocation
|
page read and write
|
||
1EE30A9D000
|
trusted library allocation
|
page read and write
|
||
1EE38B61000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
1EE30AF8000
|
trusted library allocation
|
page read and write
|
||
1EE3218F000
|
trusted library allocation
|
page read and write
|
||
1EE2C831000
|
trusted library allocation
|
page read and write
|
||
1EE257A1000
|
heap
|
page read and write
|
||
1EE309DA000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
45C1000
|
heap
|
page read and write
|
||
5EB2000
|
trusted library allocation
|
page read and write
|
||
1EE2A5F0000
|
trusted library section
|
page readonly
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
1EE2ECCB000
|
trusted library allocation
|
page read and write
|
||
52AF000
|
trusted library allocation
|
page read and write
|
||
1EE2F2E2000
|
trusted library allocation
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
1EE320C8000
|
trusted library allocation
|
page read and write
|
||
1EE30BCA000
|
trusted library allocation
|
page read and write
|
||
5ABC000
|
trusted library allocation
|
page read and write
|
||
52AA000
|
trusted library allocation
|
page read and write
|
||
55DD000
|
trusted library allocation
|
page read and write
|
||
D3C000
|
heap
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
1EE3014F000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
direct allocation
|
page execute and read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
1EE2F08C000
|
trusted library allocation
|
page read and write
|
||
1EE36AFE000
|
trusted library allocation
|
page read and write
|
||
17A900104000
|
trusted library allocation
|
page read and write
|
||
582F000
|
trusted library allocation
|
page read and write
|
||
4A50000
|
direct allocation
|
page read and write
|
||
1EE309BF000
|
trusted library allocation
|
page read and write
|
||
557000
|
unkown
|
page execute and write copy
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
511144B000
|
stack
|
page read and write
|
||
4A50000
|
heap
|
page read and write
|
||
52D3000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE2574F000
|
heap
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
4931000
|
heap
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
1EE1E900000
|
trusted library allocation
|
page read and write
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
1EE2E5C7000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
52DF000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
53AB000
|
trusted library allocation
|
page read and write
|
||
1EE30AFA000
|
trusted library allocation
|
page read and write
|
||
1EE30527000
|
trusted library allocation
|
page read and write
|
||
511137C000
|
stack
|
page read and write
|
||
1EE2EA87000
|
trusted library allocation
|
page read and write
|
||
1EE2574A000
|
heap
|
page read and write
|
||
1EE30945000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
1EE36A98000
|
trusted library allocation
|
page read and write
|
||
1EE2DADB000
|
trusted library allocation
|
page read and write
|
||
1EE36968000
|
trusted library allocation
|
page read and write
|
||
1EE30523000
|
trusted library allocation
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
1EE3204E000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
direct allocation
|
page execute and read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
1EE2E074000
|
heap
|
page read and write
|
||
61CF000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE367F6000
|
trusted library allocation
|
page read and write
|
||
407D000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
260A9350000
|
unclassified section
|
page readonly
|
||
1EE2EBB3000
|
trusted library allocation
|
page read and write
|
||
5040000
|
direct allocation
|
page read and write
|
||
1EE305E6000
|
trusted library allocation
|
page read and write
|
||
5586000
|
trusted library allocation
|
page read and write
|
||
1643000
|
heap
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1EE36AD6000
|
trusted library allocation
|
page read and write
|
||
1CF6F000
|
stack
|
page read and write
|
||
5B43000
|
trusted library allocation
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
57D000
|
unkown
|
page execute and write copy
|
||
1EE31270000
|
trusted library allocation
|
page read and write
|
||
1091000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5BAA000
|
trusted library allocation
|
page read and write
|
||
17AE000
|
stack
|
page read and write
|
||
17F37D00000
|
trusted library allocation
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
CBD000
|
heap
|
page read and write
|
||
1EE2EC77000
|
trusted library allocation
|
page read and write
|
||
2B9000
|
unkown
|
page write copy
|
||
F60000
|
heap
|
page read and write
|
||
5119E7E000
|
stack
|
page read and write
|
||
1EE2DD42000
|
trusted library allocation
|
page read and write
|
||
50D1000
|
direct allocation
|
page read and write
|
||
1EE305EB000
|
trusted library allocation
|
page read and write
|
||
1EE2F6C7000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
5EBD000
|
trusted library allocation
|
page read and write
|
||
1EE30724000
|
trusted library allocation
|
page read and write
|
||
1EE30BFA000
|
trusted library allocation
|
page read and write
|
||
260AA3A0000
|
heap
|
page read and write
|
||
480E000
|
stack
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
17F37970000
|
heap
|
page readonly
|
||
1EE310DB000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
1EE2573B000
|
heap
|
page read and write
|
||
1EE36C9C000
|
trusted library allocation
|
page read and write
|
||
1EE30F6C000
|
trusted library allocation
|
page read and write
|
||
5EB8000
|
trusted library allocation
|
page read and write
|
||
1EE25752000
|
heap
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
1EE320CB000
|
trusted library allocation
|
page read and write
|
||
5584000
|
trusted library allocation
|
page read and write
|
||
1EE3688C000
|
trusted library allocation
|
page read and write
|
||
1EE25789000
|
heap
|
page read and write
|
||
6C7BF000
|
unkown
|
page readonly
|
||
1EE3667B000
|
trusted library allocation
|
page read and write
|
||
FEB000
|
unkown
|
page execute and read and write
|
||
1EE30AF8000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4C6000
|
unkown
|
page execute and write copy
|
||
1EE30877000
|
trusted library allocation
|
page read and write
|
||
1EE36ADF000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
direct allocation
|
page read and write
|
||
1EE30BDD000
|
trusted library allocation
|
page read and write
|
||
1EE304BB000
|
trusted library allocation
|
page read and write
|
||
5119D7C000
|
stack
|
page read and write
|
||
1EE2EC39000
|
trusted library allocation
|
page read and write
|
||
3990000
|
heap
|
page read and write
|
||
3EFF000
|
stack
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
52EB000
|
trusted library allocation
|
page read and write
|
||
1EE30AB5000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
1EE2575D000
|
heap
|
page read and write
|
||
46FE000
|
stack
|
page read and write
|
||
5E45000
|
heap
|
page read and write
|
||
1EE257A1000
|
heap
|
page read and write
|
||
1E083E80000
|
heap
|
page read and write
|
||
1EE2A0F9000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
remote allocation
|
page read and write
|
||
8DB000
|
unkown
|
page write copy
|
||
1EE2F29C000
|
trusted library allocation
|
page read and write
|
||
5463000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1EE30236000
|
trusted library allocation
|
page read and write
|
||
5B3D000
|
trusted library allocation
|
page read and write
|
||
1EE2F700000
|
trusted library allocation
|
page read and write
|
||
1EE2BB6E000
|
trusted library allocation
|
page read and write
|
||
260AA4A7000
|
heap
|
page read and write
|
||
C1D000
|
unkown
|
page execute and write copy
|
||
1EE2E562000
|
trusted library allocation
|
page read and write
|
||
5B3D000
|
trusted library allocation
|
page read and write
|
||
1EE303E3000
|
trusted library allocation
|
page read and write
|
||
1EE38CDF000
|
trusted library allocation
|
page read and write
|
||
260AA431000
|
heap
|
page read and write
|
||
1D20F000
|
stack
|
page read and write
|
||
1D35C000
|
stack
|
page read and write
|
||
6F8EE000
|
unkown
|
page read and write
|
||
1EE309DD000
|
trusted library allocation
|
page read and write
|
||
1EE2DADA000
|
trusted library allocation
|
page read and write
|
||
1EE2E513000
|
trusted library allocation
|
page read and write
|
||
1EE2A71A000
|
trusted library allocation
|
page read and write
|
||
1EE30CA7000
|
trusted library allocation
|
page read and write
|
||
1EE30C0F000
|
trusted library allocation
|
page read and write
|
||
1EE30AE4000
|
trusted library allocation
|
page read and write
|
||
1EE36890000
|
trusted library allocation
|
page read and write
|
||
98C000
|
unkown
|
page execute and read and write
|
||
1EE2E5B8000
|
trusted library allocation
|
page read and write
|
||
5FB3000
|
trusted library allocation
|
page read and write
|
||
5B54000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
1EE30BEC000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
direct allocation
|
page execute and read and write
|
||
8CE000
|
unkown
|
page readonly
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
1EE36C80000
|
trusted library allocation
|
page read and write
|
||
11B1000
|
heap
|
page read and write
|
||
1EE309D3000
|
trusted library allocation
|
page read and write
|
||
1D52A000
|
heap
|
page read and write
|
||
1EE30A42000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
542A000
|
trusted library allocation
|
page read and write
|
||
56EE000
|
trusted library allocation
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
5FAF000
|
trusted library allocation
|
page read and write
|
||
1EE38CDF000
|
trusted library allocation
|
page read and write
|
||
1EE2F095000
|
trusted library allocation
|
page read and write
|
||
1EE2E5E6000
|
trusted library allocation
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1EE31368000
|
trusted library allocation
|
page read and write
|
||
1EE2E700000
|
trusted library allocation
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
1EE3225C000
|
trusted library allocation
|
page read and write
|
||
1EE2DD6B000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
52DA000
|
trusted library allocation
|
page read and write
|
||
893C1FF000
|
stack
|
page read and write
|
||
11AB000
|
heap
|
page read and write
|
||
4B50000
|
trusted library allocation
|
page read and write
|
||
1EE3048C000
|
trusted library allocation
|
page read and write
|
||
1EE2F27A000
|
trusted library allocation
|
page read and write
|
||
1EE38CDD000
|
trusted library allocation
|
page read and write
|
||
1EE368FA000
|
trusted library allocation
|
page read and write
|
||
60CE000
|
stack
|
page read and write
|
||
1EE2BA00000
|
trusted library allocation
|
page read and write
|
||
5E3000
|
heap
|
page read and write
|
||
5EB6000
|
trusted library allocation
|
page read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
5A6000
|
heap
|
page read and write
|
||
1EE30A42000
|
trusted library allocation
|
page read and write
|
||
1D522000
|
heap
|
page read and write
|
||
5AC7000
|
trusted library allocation
|
page read and write
|
||
511203F000
|
stack
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
4BC2000
|
heap
|
page read and write
|
||
AF9F23E000
|
unkown
|
page readonly
|
||
1EE30BE3000
|
trusted library allocation
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
1EE2F3E6000
|
trusted library allocation
|
page read and write
|
||
1EE3688A000
|
trusted library allocation
|
page read and write
|
||
1EE2DAF4000
|
trusted library allocation
|
page read and write
|
||
1EE30A97000
|
trusted library allocation
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
1EE2F96A000
|
trusted library allocation
|
page read and write
|
||
1EE2E47F000
|
trusted library allocation
|
page read and write
|
||
1EE257A1000
|
heap
|
page read and write
|
||
1EE30471000
|
trusted library allocation
|
page read and write
|
||
1EE2C109000
|
trusted library allocation
|
page read and write
|
||
F4F000
|
stack
|
page read and write
|
||
1CD0000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
17F37710000
|
unclassified section
|
page readonly
|
||
538C000
|
trusted library allocation
|
page read and write
|
||
1EE366D3000
|
trusted library allocation
|
page read and write
|
||
529A000
|
trusted library allocation
|
page read and write
|
||
1EE31400000
|
trusted library allocation
|
page read and write
|
||
1EE309D7000
|
trusted library allocation
|
page read and write
|
||
6001000
|
trusted library allocation
|
page read and write
|
||
1EE2AA0B000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
1EE2A111000
|
trusted library allocation
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
1EE30A82000
|
trusted library allocation
|
page read and write
|
||
1EE2DD67000
|
trusted library allocation
|
page read and write
|
||
1EE31272000
|
trusted library allocation
|
page read and write
|
||
1E083D00000
|
trusted library allocation
|
page read and write
|
||
1920000
|
trusted library allocation
|
page read and write
|
||
51A000
|
unkown
|
page execute and read and write
|
||
2E3F000
|
stack
|
page read and write
|
||
4910000
|
direct allocation
|
page execute and read and write
|
||
1134000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
5288000
|
trusted library allocation
|
page read and write
|
||
1086000
|
heap
|
page read and write
|
||
1EE30ABB000
|
trusted library allocation
|
page read and write
|
||
5ACC000
|
trusted library allocation
|
page read and write
|
||
1EE30C0D000
|
trusted library allocation
|
page read and write
|
||
1EE2A165000
|
trusted library allocation
|
page read and write
|
||
1EE31295000
|
trusted library allocation
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
1EE36616000
|
trusted library allocation
|
page read and write
|
||
5231000
|
trusted library allocation
|
page read and write
|
||
1EE30A62000
|
trusted library allocation
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
260AA39C000
|
heap
|
page read and write
|
||
2F78E000
|
heap
|
page read and write
|
||
1EE2E861000
|
trusted library allocation
|
page read and write
|
||
1EE31403000
|
trusted library allocation
|
page read and write
|
||
1EE30A9B000
|
trusted library allocation
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1EE30BDD000
|
trusted library allocation
|
page read and write
|
||
1EE2DD03000
|
trusted library allocation
|
page read and write
|
||
56A000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
53A000
|
unkown
|
page execute and read and write
|
||
1EE25746000
|
heap
|
page read and write
|
||
5B4A000
|
trusted library allocation
|
page read and write
|
||
5BEE000
|
trusted library allocation
|
page read and write
|
||
1EE308E4000
|
trusted library allocation
|
page read and write
|
||
1EE3041B000
|
trusted library allocation
|
page read and write
|
||
1EE2575F000
|
heap
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
1EE2A220000
|
trusted library allocation
|
page read and write
|
||
1EE2F3B3000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE2E38D000
|
trusted library allocation
|
page read and write
|
||
135D000
|
heap
|
page read and write
|
||
5A5D000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
45C1000
|
heap
|
page read and write
|
||
22F09F800000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE30515000
|
trusted library allocation
|
page read and write
|
||
4E11000
|
heap
|
page read and write
|
||
1EE257A0000
|
heap
|
page read and write
|
||
1EE2E56F000
|
trusted library allocation
|
page read and write
|
||
1EE367BC000
|
trusted library allocation
|
page read and write
|
||
237DE8D00000
|
trusted library allocation
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
260AA3AC000
|
heap
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
1EE2EC77000
|
trusted library allocation
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
1EE309D1000
|
trusted library allocation
|
page read and write
|
||
1EE2C844000
|
trusted library allocation
|
page read and write
|
||
1EE2ECD7000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1EE2A154000
|
trusted library allocation
|
page read and write
|
||
2BB000
|
unkown
|
page execute and read and write
|
||
1EE2F051000
|
trusted library allocation
|
page read and write
|
||
A2A000
|
unkown
|
page execute and write copy
|
||
50AE000
|
stack
|
page read and write
|
||
1EE36C8B000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
1EE308E7000
|
trusted library allocation
|
page read and write
|
||
271000
|
unkown
|
page execute and write copy
|
||
5118A7E000
|
stack
|
page read and write
|
||
1EE30BCC000
|
trusted library allocation
|
page read and write
|
||
DB0F7FF000
|
stack
|
page read and write
|
||
1EE30877000
|
trusted library allocation
|
page read and write
|
||
1EE2DB6A000
|
trusted library allocation
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
1EE1E620000
|
unclassified section
|
page readonly
|
||
23AB0D07000
|
trusted library allocation
|
page read and write
|
||
D26000
|
heap
|
page read and write
|
||
52BB000
|
trusted library allocation
|
page read and write
|
||
1EE3039C000
|
trusted library allocation
|
page read and write
|
||
573000
|
unkown
|
page execute and read and write
|
||
1EE314F8000
|
trusted library allocation
|
page read and write
|
||
1EE304C6000
|
trusted library allocation
|
page read and write
|
||
52A2000
|
trusted library allocation
|
page read and write
|
||
1EE25740000
|
heap
|
page read and write
|
||
17F37C92000
|
trusted library allocation
|
page read and write
|
||
1EE2C803000
|
trusted library allocation
|
page read and write
|
||
52A3000
|
trusted library allocation
|
page read and write
|
||
543F000
|
stack
|
page read and write
|
||
1EE2FE17000
|
trusted library allocation
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
1EE30AE9000
|
trusted library allocation
|
page read and write
|
||
11BB000
|
heap
|
page read and write
|
||
1D39E000
|
stack
|
page read and write
|
||
1EE30519000
|
trusted library allocation
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
1EE36C7E000
|
trusted library allocation
|
page read and write
|
||
1D53E000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
78A000
|
unkown
|
page execute and write copy
|
||
2CC0000
|
direct allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
17F37C5B000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
4B90000
|
direct allocation
|
page read and write
|
||
3551000
|
heap
|
page read and write
|
||
1B50F000
|
stack
|
page read and write
|
||
58FC000
|
trusted library allocation
|
page read and write
|
||
260AA428000
|
heap
|
page read and write
|
||
1EE2F8F3000
|
trusted library allocation
|
page read and write
|
||
52A3000
|
trusted library allocation
|
page read and write
|
||
1EE30C0F000
|
trusted library allocation
|
page read and write
|
||
1E083B9A000
|
heap
|
page read and write
|
||
1EE305CB000
|
trusted library allocation
|
page read and write
|
||
1EE1EAE8000
|
trusted library allocation
|
page read and write
|
||
3DCF000
|
stack
|
page read and write
|
||
5345000
|
trusted library allocation
|
page read and write
|
||
1EE31366000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
direct allocation
|
page execute and read and write
|
||
1EE30AE7000
|
trusted library allocation
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
1EE309FC000
|
trusted library allocation
|
page read and write
|
||
1EE30AB5000
|
trusted library allocation
|
page read and write
|
||
10FD000
|
stack
|
page read and write
|
||
1EE2E5F1000
|
trusted library allocation
|
page read and write
|
||
1EE30CAF000
|
trusted library allocation
|
page read and write
|
||
1EE30AB9000
|
trusted library allocation
|
page read and write
|
||
1EE302EA000
|
trusted library allocation
|
page read and write
|
||
1EE2E01A000
|
heap
|
page read and write
|
||
1EE30900000
|
trusted library allocation
|
page read and write
|
||
1EE313BE000
|
trusted library allocation
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
1D54C000
|
heap
|
page read and write
|
||
1EE313DE000
|
trusted library allocation
|
page read and write
|
||
5345000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
direct allocation
|
page read and write
|
||
1EE1EA47000
|
trusted library allocation
|
page read and write
|
||
AF9CFDE000
|
stack
|
page read and write
|
||
1EE30AFA000
|
trusted library allocation
|
page read and write
|
||
1EE30B8B000
|
trusted library allocation
|
page read and write
|
||
1EE369FB000
|
trusted library allocation
|
page read and write
|
||
260AA498000
|
heap
|
page read and write
|
||
1EE25710000
|
heap
|
page read and write
|
||
5284000
|
trusted library allocation
|
page read and write
|
||
1EE2EC72000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
1EE30BD2000
|
trusted library allocation
|
page read and write
|
||
1EE2ECFA000
|
trusted library allocation
|
page read and write
|
||
5070000
|
direct allocation
|
page read and write
|
||
FFB000
|
heap
|
page read and write
|
||
1EE3088A000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE2573F000
|
heap
|
page read and write
|
||
1EE305F6000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
trusted library allocation
|
page read and write
|
||
1EE303B2000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
1EE2DB0D000
|
trusted library allocation
|
page read and write
|
||
1EE302E2000
|
trusted library allocation
|
page read and write
|
||
1EE2AAE7000
|
trusted library allocation
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
D1A000
|
heap
|
page read and write
|
||
1EE38B09000
|
trusted library allocation
|
page read and write
|
||
52C5000
|
trusted library allocation
|
page read and write
|
||
2DFF000
|
stack
|
page read and write
|
||
1EE30425000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
5E05000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE2574F000
|
heap
|
page read and write
|
||
46DE000
|
stack
|
page read and write
|
||
260AA43C000
|
heap
|
page read and write
|
||
1EE25749000
|
heap
|
page read and write
|
||
52DA000
|
trusted library allocation
|
page read and write
|
||
AF9CF9E000
|
unkown
|
page readonly
|
||
5294000
|
trusted library allocation
|
page read and write
|
||
1EE2FE10000
|
trusted library allocation
|
page read and write
|
||
1EE2573F000
|
heap
|
page read and write
|
||
1EE2A5E2000
|
unclassified section
|
page read and write
|
||
1EE313E8000
|
trusted library allocation
|
page read and write
|
||
1D53E000
|
heap
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
1EE3100F000
|
trusted library allocation
|
page read and write
|
||
562E000
|
trusted library allocation
|
page read and write
|
||
1EE30668000
|
trusted library allocation
|
page read and write
|
||
FFD000
|
heap
|
page read and write
|
||
8CE000
|
unkown
|
page readonly
|
||
1EE2E5BE000
|
trusted library allocation
|
page read and write
|
||
646000
|
heap
|
page read and write
|
||
1EE2FE7A000
|
trusted library allocation
|
page read and write
|
||
1EE36763000
|
trusted library allocation
|
page read and write
|
||
260AA3A3000
|
heap
|
page read and write
|
||
FFB000
|
heap
|
page read and write
|
||
1EE3056A000
|
trusted library allocation
|
page read and write
|
||
B60000
|
unkown
|
page write copy
|
||
61F000
|
unkown
|
page execute and read and write
|
||
1EE38BF9000
|
trusted library allocation
|
page read and write
|
||
5FB5000
|
trusted library allocation
|
page read and write
|
||
1EE2F0E1000
|
trusted library allocation
|
page read and write
|
||
D1B000
|
heap
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
467000
|
unkown
|
page execute and read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
1EE2E52A000
|
trusted library allocation
|
page read and write
|
||
260AA39C000
|
heap
|
page read and write
|
||
52A5000
|
trusted library allocation
|
page read and write
|
||
1EE36653000
|
trusted library allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
1EE2E865000
|
trusted library allocation
|
page read and write
|
||
56D000
|
unkown
|
page execute and write copy
|
||
5283000
|
trusted library allocation
|
page read and write
|
||
112E000
|
stack
|
page read and write
|
||
1EE20375000
|
heap
|
page read and write
|
||
1EE1EA30000
|
trusted library allocation
|
page read and write
|
||
1EE368FA000
|
trusted library allocation
|
page read and write
|
||
1EE305E9000
|
trusted library allocation
|
page read and write
|
||
17F37D3C000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
direct allocation
|
page read and write
|
||
260A976F000
|
trusted library allocation
|
page read and write
|
||
545B000
|
trusted library allocation
|
page read and write
|
||
1EE30668000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
260AA3A9000
|
heap
|
page read and write
|
||
1EE2FE00000
|
trusted library allocation
|
page read and write
|
||
4B29000
|
trusted library allocation
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
1EE257A5000
|
heap
|
page read and write
|
||
1EE309DE000
|
trusted library allocation
|
page read and write
|
||
1EE30951000
|
trusted library allocation
|
page read and write
|
||
5365000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
1400000
|
direct allocation
|
page read and write
|
||
4AC1000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1EE2B840000
|
trusted library section
|
page read and write
|
||
260AA498000
|
heap
|
page read and write
|
||
1EE367ED000
|
trusted library allocation
|
page read and write
|
||
1EE2578F000
|
heap
|
page read and write
|
||
1EE31096000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
FA4000
|
heap
|
page read and write
|
||
1AF2F000
|
stack
|
page read and write
|
||
1EE2F0FE000
|
trusted library allocation
|
page read and write
|
||
1EE2E4A2000
|
trusted library allocation
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
550000
|
direct allocation
|
page read and write
|
||
417F000
|
stack
|
page read and write
|
||
C85000
|
heap
|
page read and write
|
||
1E083E20000
|
heap
|
page read and write
|
||
52FF000
|
trusted library allocation
|
page read and write
|
||
5B9F000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1EE2E4CB000
|
trusted library allocation
|
page read and write
|
||
5119DFB000
|
stack
|
page read and write
|
||
1EE2A5EF000
|
unclassified section
|
page read and write
|
||
1EE2F387000
|
trusted library allocation
|
page read and write
|
||
961000
|
unkown
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
260AA42C000
|
heap
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
1EE36880000
|
trusted library allocation
|
page read and write
|
||
1EE368DC000
|
trusted library allocation
|
page read and write
|
||
4BD0000
|
direct allocation
|
page execute and read and write
|
||
1EE3043E000
|
trusted library allocation
|
page read and write
|
||
5260000
|
remote allocation
|
page read and write
|
||
1EE31003000
|
trusted library allocation
|
page read and write
|
||
111E000
|
stack
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
9A7000
|
unkown
|
page execute and write copy
|
||
5DCD000
|
trusted library allocation
|
page read and write
|
||
1EE2F600000
|
trusted library allocation
|
page read and write
|
||
B44000
|
heap
|
page read and write
|
||
17F37C94000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
direct allocation
|
page read and write
|
||
2E47000
|
heap
|
page read and write
|
||
1EE31459000
|
trusted library allocation
|
page read and write
|
||
1EE2575B000
|
heap
|
page read and write
|
||
1EE30283000
|
trusted library allocation
|
page read and write
|
||
5119BFE000
|
stack
|
page read and write
|
||
1EE25794000
|
heap
|
page read and write
|
||
1EE36C03000
|
trusted library allocation
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
83B000
|
unkown
|
page execute and read and write
|
||
1EE2ABA0000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1EE311B3000
|
trusted library allocation
|
page read and write
|
||
3E481BE000
|
unkown
|
page readonly
|
||
1EE30FF4000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
481E000
|
stack
|
page read and write
|
||
6119000
|
trusted library allocation
|
page read and write
|
||
1EE31016000
|
trusted library allocation
|
page read and write
|
||
1EE2FF07000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
1EE2A215000
|
trusted library allocation
|
page read and write
|
||
1EE2B610000
|
trusted library allocation
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
17F37C63000
|
trusted library allocation
|
page read and write
|
||
1EE2FA00000
|
trusted library allocation
|
page read and write
|
||
11B1000
|
heap
|
page read and write
|
||
1EE309D4000
|
trusted library allocation
|
page read and write
|
||
4A30000
|
direct allocation
|
page read and write
|
||
1EE2E503000
|
trusted library allocation
|
page read and write
|
||
2D0000
|
unkown
|
page execute and read and write
|
||
1EE2FF35000
|
trusted library allocation
|
page read and write
|
||
4C10000
|
direct allocation
|
page execute and read and write
|
||
4C6000
|
unkown
|
page execute and write copy
|
||
2CC0000
|
direct allocation
|
page read and write
|
||
1EE33624000
|
trusted library allocation
|
page read and write
|
||
11A9000
|
heap
|
page read and write
|
||
C16000
|
unkown
|
page execute and write copy
|
||
36BE000
|
stack
|
page read and write
|
||
BD4000
|
heap
|
page read and write
|
||
1EE305BE000
|
trusted library allocation
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
646000
|
heap
|
page read and write
|
||
1EE2E090000
|
heap
|
page read and write
|
||
1EE30AD1000
|
trusted library allocation
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
505E000
|
stack
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
5345000
|
trusted library allocation
|
page read and write
|
||
5EB2000
|
trusted library allocation
|
page read and write
|
||
1EE36944000
|
trusted library allocation
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
4A41000
|
heap
|
page read and write
|
||
1EE3360C000
|
trusted library allocation
|
page read and write
|
||
1EE30403000
|
trusted library allocation
|
page read and write
|
||
1EE2E9E9000
|
trusted library allocation
|
page read and write
|
||
1EE2EF00000
|
trusted library allocation
|
page read and write
|
||
1EE3695F000
|
trusted library allocation
|
page read and write
|
||
D9C000
|
stack
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
1EE30BD2000
|
trusted library allocation
|
page read and write
|
||
511823E000
|
stack
|
page read and write
|
||
1EE32131000
|
trusted library allocation
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
B52000
|
unkown
|
page readonly
|
||
6C4000
|
heap
|
page read and write
|
||
1EE38ED7000
|
trusted library allocation
|
page read and write
|
||
1EE38C7D000
|
trusted library allocation
|
page read and write
|
||
7A6000
|
unkown
|
page write copy
|
||
47EF000
|
stack
|
page read and write
|
||
1EE30A30000
|
trusted library allocation
|
page read and write
|
||
1EE2FA18000
|
trusted library allocation
|
page read and write
|
||
5BC1000
|
trusted library allocation
|
page read and write
|
||
1EE305CE000
|
trusted library allocation
|
page read and write
|
||
1EE2A766000
|
trusted library allocation
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
23AB09E0000
|
heap
|
page read and write
|
||
1EE36878000
|
trusted library allocation
|
page read and write
|
||
1150000
|
direct allocation
|
page read and write
|
||
4FA000
|
stack
|
page read and write
|
||
1EE30603000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
1EE30483000
|
trusted library allocation
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
52F4000
|
trusted library allocation
|
page read and write
|
||
5ACB000
|
trusted library allocation
|
page read and write
|
||
1EE2F0C1000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
15D0000
|
direct allocation
|
page read and write
|
||
1EE2F203000
|
trusted library allocation
|
page read and write
|
||
1EE2F674000
|
trusted library allocation
|
page read and write
|
||
5200000
|
direct allocation
|
page execute and read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
1D524000
|
heap
|
page read and write
|
||
1F10003F000
|
trusted library allocation
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
1EE38E01000
|
trusted library allocation
|
page read and write
|
||
4F2000
|
unkown
|
page execute and write copy
|
||
4441000
|
heap
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1EE30BE3000
|
trusted library allocation
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
4F00000
|
direct allocation
|
page read and write
|
||
5BA7000
|
trusted library allocation
|
page read and write
|
There are 6025 hidden memdumps, click here to show them.