Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\num[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001102001\3f779c1cca.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001103001\994a9a760e.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001104001\fb9fc5d370.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001105001\num.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\4ZEE72SJX7XOQDCN6UZ4LV1NK2QYF.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\70NN9S1HRAEX9LH3L5PDFQWX9ANZ6.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8Z5C764IBSHZ8A5U9SVRCREF.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\B7KMZCE66VGDP83M16.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\DBQJ2COS8NEE0DVFAHC8.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\HR483MUGWRQ77A8EZ5D.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\PR9MM82BT6H8ASEPAAV3FFFU6W4.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\QVVPAZNCIISWKSVDLM23B.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\QZRNZLINJW4FDHW89WOCWU0IJ.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\70NN9S1HRAEX9LH3L5PDFQWX9ANZ6.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\8Z5C764IBSHZ8A5U9SVRCREF.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41
|
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\ExperimentStoreData.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\ExperimentStoreData.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addonStartup.json.lz4 (copy)
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\addonStartup.json.lz4.tmp
|
Mozilla lz4 compressed data, originally 23432 bytes
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\compatibility.ini
|
Windows WIN.INI
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\content-prefs.sqlite
|
SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extension-preferences.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\extension-preferences.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\favicons.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\permissions.sqlite
|
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-shm
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqlite-wal
|
SQLite Write-Ahead Log, version 3007000
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs-1.js
|
ASCII text, with very long lines (1717), with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.js (copy)
|
ASCII text, with very long lines (1717), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\protections.sqlite
|
SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 4, database
pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 4
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\sessionCheckpoints.json.tmp
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\storage.sqlite
|
SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 5, database
pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 5
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\targeting.snapshot.json (copy)
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\targeting.snapshot.json.tmp
|
JSON data
|
dropped
|
||
C:\Windows\Tasks\skotes.job
|
data
|
dropped
|
There are 33 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\QZRNZLINJW4FDHW89WOCWU0IJ.exe
|
"C:\Users\user\AppData\Local\Temp\QZRNZLINJW4FDHW89WOCWU0IJ.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\B7KMZCE66VGDP83M16.exe
|
"C:\Users\user\AppData\Local\Temp\B7KMZCE66VGDP83M16.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001102001\3f779c1cca.exe
|
"C:\Users\user\AppData\Local\Temp\1001102001\3f779c1cca.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001103001\994a9a760e.exe
|
"C:\Users\user\AppData\Local\Temp\1001103001\994a9a760e.exe"
|
||
C:\Users\user\AppData\Local\Temp\8Z5C764IBSHZ8A5U9SVRCREF.exe
|
"C:\Users\user\AppData\Local\Temp\8Z5C764IBSHZ8A5U9SVRCREF.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001102001\3f779c1cca.exe
|
"C:\Users\user\AppData\Local\Temp\1001102001\3f779c1cca.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001104001\fb9fc5d370.exe
|
"C:\Users\user\AppData\Local\Temp\1001104001\fb9fc5d370.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001105001\num.exe
|
"C:\Users\user\AppData\Local\Temp\1001105001\num.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001103001\994a9a760e.exe
|
"C:\Users\user\AppData\Local\Temp\1001103001\994a9a760e.exe"
|
||
C:\Users\user\AppData\Local\Temp\DBQJ2COS8NEE0DVFAHC8.exe
|
"C:\Users\user\AppData\Local\Temp\DBQJ2COS8NEE0DVFAHC8.exe"
|
||
C:\Users\user\AppData\Local\Temp\4ZEE72SJX7XOQDCN6UZ4LV1NK2QYF.exe
|
"C:\Users\user\AppData\Local\Temp\4ZEE72SJX7XOQDCN6UZ4LV1NK2QYF.exe"
|
||
C:\Users\user\AppData\Local\Temp\70NN9S1HRAEX9LH3L5PDFQWX9ANZ6.exe
|
"C:\Users\user\AppData\Local\Temp\70NN9S1HRAEX9LH3L5PDFQWX9ANZ6.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001104001\fb9fc5d370.exe
|
"C:\Users\user\AppData\Local\Temp\1001104001\fb9fc5d370.exe"
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking --attempting-deelevation
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2308 -parentBuildID 20230927232528 -prefsHandle 2232
-prefMapHandle 2224 -prefsLen 25250 -prefMapSize 238690 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser"
- {c73eb302-b62d-4664-8c1e-f311557443d0} 5232 "\\.\pipe\gecko-crash-server-pipe.5232" 2ae78e6ef10 socket
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=912 -parentBuildID 20230927232528 -prefsHandle 2792
-prefMapHandle 3796 -prefsLen 26265 -prefMapSize 238690 -appDir "C:\Program Files\Mozilla Firefox\browser" - {900b7ccc-f93b-4c39-acf6-c4309c8be80c}
5232 "\\.\pipe\gecko-crash-server-pipe.5232" 2ae0b544510 rdd
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM firefox.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM chrome.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM msedge.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM opera.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
taskkill /F /IM brave.exe /T
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd"
--no-default-browser-check --disable-popup-blocking
|
||
C:\Program Files\Mozilla Firefox\firefox.exe
|
"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
--no-default-browser-check --disable-popup-blocking
|
There are 34 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.37/J
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpn
|
unknown
|
||
http://185.215.113.37/e2b1563c6670f193.phpm
|
unknown
|
||
studennotediw.store
|
|||
http://185.215.113.37/e2b1563c6670f193.phps
|
unknown
|
||
http://185.215.113.37/z
|
unknown
|
||
dissapoiznw.store
|
|||
https://steamcommunity.com/profiles/76561199724331900
|
104.102.49.254
|
||
eaglepawnoy.store
|
|||
http://185.215.113.37/
|
185.215.113.37
|
||
https://www.cloudflare.com/learning/access-management/phishing-attack/
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
|
unknown
|
||
https://bathdoomgaz.store:443/api
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=wJD9maDpDcV
|
unknown
|
||
https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
|
unknown
|
||
https://sergei-esenin.com/;TZ
|
unknown
|
||
https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
|
unknown
|
||
https://sergei-esenin.com/
|
unknown
|
||
https://firefox.settings.services.allizom.org/v1/buckets/main/collections/search-config/records
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggest
|
unknown
|
||
https://www.gstatic.cn/recaptcha/
|
unknown
|
||
https://youtube.commedia.gmp-gmpopenh264.visiblemedia.gmp-widevinecdm.enabledwebIsolated=https://you
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=UuGFpt56D9L4&l=
|
unknown
|
||
https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=engli
|
unknown
|
||
https://store.steampowered.com
|
unknown
|
||
http://www.valvesoftware.com/legal.htm
|
unknown
|
||
https://www.youtube.com
|
unknown
|
||
https://completion.amazon.com/search/complete?q=
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
|
unknown
|
||
https://monitor.firefox.com/breach-details/
|
unknown
|
||
https://sergei-esenin.com/CCAQIYAA==e
|
unknown
|
||
https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
|
unknown
|
||
https://www.amazon.com/exec/obidos/external-search/
|
unknown
|
||
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
|
unknown
|
||
https://sergei-esenin.com/cT
|
unknown
|
||
https://github.com/mozilla-services/screenshots
|
unknown
|
||
https://s.ytimg.com;
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/addon/
|
unknown
|
||
https://tracking-protection-issues.herokuapp.com/new
|
unknown
|
||
http://exslt.org/sets
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
|
unknown
|
||
http://src.chromium.org/viewvc/chrome/trunk/src/third_party/cld/languages/internal/languages.cc
|
unknown
|
||
https://www.cloudflare.com/learning/a
|
unknown
|
||
https://licendfilteo.site:443/api
|
unknown
|
||
https://youtube.com/account?=https://ac
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=W9BX
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw&
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
|
unknown
|
||
https://api.accounts.firefox.com/v1
|
unknown
|
||
http://exslt.org/common
|
unknown
|
||
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=eghn9DNyCY67&
|
unknown
|
||
https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
|
unknown
|
||
https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://exslt.org/dates-and-times
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/css/promo
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1&
|
unknown
|
||
https://sergei-esenin.com/o
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://lv.queniujq.cn
|
unknown
|
||
https://steamcommunity.com/profiles/76561199724331900/inventory/
|
unknown
|
||
https://www.youtube.com/
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
|
unknown
|
||
https://www.cloudflare.com/5xx-error-landing
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=qYlgdgWOD4Ng&
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
|
unknown
|
||
https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
|
unknown
|
||
http://127.0.0.1:
|
unknown
|
||
http://185.215.113.16/mine/random.exed
|
unknown
|
||
https://steamcommunity.com/?subsection=broadcaH
|
unknown
|
||
https://community.cloudflare.steamstatic.cV
|
unknown
|
||
https://mitmdetection.services.mozilla.com/
|
unknown
|
||
https://sergei-esenin.com/apier
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
|
unknown
|
||
https://www.google.com/recaptcha/
|
unknown
|
||
https://checkout.steampowered.com/
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png
|
unknown
|
||
http://185.215.113.16/off/def.exe
|
unknown
|
||
https://spocs.getpocket.com/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/abuse/report/addon/
|
unknown
|
||
https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
|
unknown
|
||
https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
|
unknown
|
||
https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=KkhJqW2NGKiM&l=engli
|
unknown
|
||
https://community.cloudflare.steamstatic.co
|
unknown
|
||
https://sergei-esenin.com/api4T
|
unknown
|
||
https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
|
unknown
|
||
https://monitor.firefox.com/user/breach-stats?includeResolved=true
|
unknown
|
||
https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
|
unknown
|
||
https://sergei-esenin.com/?
|
unknown
|
||
https://merino.services.mozilla.com/api/v1/suggestabout
|
unknown
|
||
https://steamcommunity.com/mx
|
unknown
|
||
https://help.steampowered.com/en/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
sergei-esenin.com
|
104.21.53.8
|
||
steamcommunity.com
|
104.102.49.254
|
||
spirittunek.store
|
unknown
|
||
licendfilteo.site
|
unknown
|
||
eaglepawnoy.store
|
unknown
|
||
bathdoomgaz.store
|
unknown
|
||
studennotediw.store
|
unknown
|
||
mobbipenju.store
|
unknown
|
||
clearancek.site
|
unknown
|
||
dissapoiznw.store
|
unknown
|
||
example.org
|
93.184.215.14
|
||
star-mini.c10r.facebook.com
|
157.240.251.35
|
||
prod.classify-client.prod.webservices.mozgcp.net
|
35.190.72.216
|
||
prod.balrog.prod.cloudops.mozgcp.net
|
35.244.181.201
|
||
twitter.com
|
104.244.42.129
|
||
prod.detectportal.prod.cloudops.mozgcp.net
|
34.107.221.82
|
||
dyna.wikimedia.org
|
185.15.59.224
|
||
prod.remote-settings.prod.webservices.mozgcp.net
|
34.149.100.209
|
||
contile.services.mozilla.com
|
34.117.188.166
|
||
youtube.com
|
142.250.186.46
|
||
prod.content-signature-chains.prod.webservices.mozgcp.net
|
34.160.144.191
|
||
youtube-ui.l.google.com
|
172.217.18.110
|
||
us-west1.prod.sumo.prod.webservices.mozgcp.net
|
34.149.128.2
|
||
reddit.map.fastly.net
|
151.101.129.140
|
||
ipv4only.arpa
|
192.0.0.170
|
||
prod.ads.prod.webservices.mozgcp.net
|
34.117.188.166
|
||
push.services.mozilla.com
|
34.107.243.93
|
||
telemetry-incoming.r53-2.services.mozilla.com
|
34.120.208.123
|
||
www.reddit.com
|
unknown
|
||
spocs.getpocket.com
|
unknown
|
||
content-signature-2.cdn.mozilla.net
|
unknown
|
||
support.mozilla.org
|
unknown
|
||
firefox.settings.services.mozilla.com
|
unknown
|
||
www.youtube.com
|
unknown
|
||
www.facebook.com
|
unknown
|
||
detectportal.firefox.com
|
unknown
|
||
shavar.services.mozilla.com
|
unknown
|
||
www.wikipedia.org
|
unknown
|
There are 28 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.53.8
|
sergei-esenin.com
|
United States
|
||
185.215.113.43
|
unknown
|
Portugal
|
||
185.215.113.37
|
unknown
|
Portugal
|
||
104.102.49.254
|
steamcommunity.com
|
United States
|
||
142.250.186.46
|
youtube.com
|
United States
|
||
34.149.100.209
|
prod.remote-settings.prod.webservices.mozgcp.net
|
United States
|
||
185.215.113.16
|
unknown
|
Portugal
|
||
34.107.243.93
|
push.services.mozilla.com
|
United States
|
||
34.107.221.82
|
prod.detectportal.prod.cloudops.mozgcp.net
|
United States
|
||
35.244.181.201
|
prod.balrog.prod.cloudops.mozgcp.net
|
United States
|
||
34.117.188.166
|
contile.services.mozilla.com
|
United States
|
||
35.190.72.216
|
prod.classify-client.prod.webservices.mozgcp.net
|
United States
|
||
34.160.144.191
|
prod.content-signature-chains.prod.webservices.mozgcp.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
34.120.208.123
|
telemetry-incoming.r53-2.services.mozilla.com
|
United States
|
There are 5 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
3f779c1cca.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
994a9a760e.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
fb9fc5d370.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
num.exe
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableIOAVProtection
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
|
DisableRealtimeMonitoring
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
|
DisableNotifications
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AUOptions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
AutoInstallMinorUpdates
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
NoAutoRebootWithLoggedOnUsers
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
|
UseWUServer
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
|
DoNotConnectToWindowsUpdateInternetLocations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
|
TamperProtection
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Launcher
|
C:\Program Files\Mozilla Firefox\firefox.exe|Browser
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\PreXULSkeletonUISettings
|
C:\Program Files\Mozilla Firefox\firefox.exe|Progress
|
||
HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\Default Browser Agent
|
C:\Program Files\Mozilla Firefox|AppLastRunTime
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4EE0000
|
direct allocation
|
page read and write
|
||
5350000
|
direct allocation
|
page read and write
|
||
B71000
|
unkown
|
page execute and read and write
|
||
5D1000
|
unkown
|
page execute and read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
109F000
|
heap
|
page read and write
|
||
4FA0000
|
direct allocation
|
page read and write
|
||
831000
|
unkown
|
page execute and read and write
|
||
4CE0000
|
direct allocation
|
page read and write
|
||
5200000
|
direct allocation
|
page read and write
|
||
5270000
|
direct allocation
|
page read and write
|
||
FD1000
|
unkown
|
page execute and write copy
|
||
5040000
|
direct allocation
|
page read and write
|
||
FD1000
|
unkown
|
page execute and write copy
|
||
831000
|
unkown
|
page execute and read and write
|
||
B71000
|
unkown
|
page execute and read and write
|
||
D2E000
|
heap
|
page read and write
|
||
127E000
|
heap
|
page read and write
|
||
14BF000
|
heap
|
page read and write
|
||
A61000
|
unkown
|
page execute and read and write
|
||
5370000
|
direct allocation
|
page read and write
|
||
B11000
|
unkown
|
page execute and read and write
|
||
157E000
|
heap
|
page read and write
|
||
6C8000
|
heap
|
page read and write
|
||
531000
|
unkown
|
page execute and read and write
|
||
13CE000
|
heap
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
437F000
|
stack
|
page read and write
|
||
1F810B6D000
|
trusted library allocation
|
page read and write
|
||
1550000
|
direct allocation
|
page read and write
|
||
65AC000
|
trusted library allocation
|
page read and write
|
||
494000
|
unkown
|
page readonly
|
||
B10000
|
unkown
|
page readonly
|
||
3BDF000
|
stack
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
2AE095F4000
|
trusted library allocation
|
page read and write
|
||
1F817FF7000
|
trusted library allocation
|
page read and write
|
||
22908EA0000
|
heap
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
526C000
|
trusted library allocation
|
page read and write
|
||
1CCFF000
|
stack
|
page read and write
|
||
59BC000
|
trusted library allocation
|
page read and write
|
||
70E000
|
heap
|
page read and write
|
||
1647000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
63F1000
|
trusted library allocation
|
page read and write
|
||
1A08D1BF000
|
heap
|
page read and write
|
||
1F810AD5000
|
trusted library allocation
|
page read and write
|
||
48C000
|
unkown
|
page read and write
|
||
524F000
|
trusted library allocation
|
page read and write
|
||
359F000
|
stack
|
page read and write
|
||
2AE091E9000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
5A0A000
|
trusted library allocation
|
page read and write
|
||
4740000
|
direct allocation
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
63F8000
|
trusted library allocation
|
page read and write
|
||
2AE0951D000
|
trusted library allocation
|
page read and write
|
||
3ABF000
|
stack
|
page read and write
|
||
2AE0511E000
|
trusted library allocation
|
page read and write
|
||
64D2000
|
trusted library allocation
|
page read and write
|
||
860000
|
direct allocation
|
page read and write
|
||
6059000
|
trusted library allocation
|
page read and write
|
||
5246000
|
trusted library allocation
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
435E000
|
stack
|
page read and write
|
||
1F80EEF6000
|
trusted library allocation
|
page read and write
|
||
1F3C5DD0000
|
heap
|
page read and write
|
||
A50000
|
direct allocation
|
page read and write
|
||
2AE0637A000
|
trusted library allocation
|
page read and write
|
||
1F87F39E000
|
trusted library allocation
|
page read and write
|
||
56B5000
|
trusted library allocation
|
page read and write
|
||
C41DD6E000
|
stack
|
page read and write
|
||
5A0D000
|
trusted library allocation
|
page read and write
|
||
BBA000
|
stack
|
page read and write
|
||
4ABE000
|
stack
|
page read and write
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
2F3E000
|
heap
|
page read and write
|
||
1F810B5E000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
59EC000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
1F80D56B000
|
trusted library allocation
|
page read and write
|
||
417F000
|
stack
|
page read and write
|
||
2AE0D27A000
|
trusted library allocation
|
page read and write
|
||
63F2000
|
trusted library allocation
|
page read and write
|
||
440F000
|
stack
|
page read and write
|
||
33CF000
|
stack
|
page read and write
|
||
136E000
|
heap
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
1341000
|
heap
|
page read and write
|
||
B73000
|
unkown
|
page execute and write copy
|
||
22908212000
|
trusted library allocation
|
page read and write
|
||
576E000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
2AE0B7D3000
|
trusted library allocation
|
page read and write
|
||
5F8D000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
16B9000
|
heap
|
page read and write
|
||
461E000
|
stack
|
page read and write
|
||
352E000
|
stack
|
page read and write
|
||
8DB000
|
stack
|
page read and write
|
||
1F80F045000
|
trusted library allocation
|
page read and write
|
||
14E7000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1623000
|
heap
|
page read and write
|
||
BDB000
|
unkown
|
page execute and read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
7A3000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5061000
|
heap
|
page read and write
|
||
5061000
|
heap
|
page read and write
|
||
1F810AC0000
|
trusted library allocation
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
547000
|
unkown
|
page execute and write copy
|
||
575E000
|
trusted library allocation
|
page read and write
|
||
5F2C000
|
trusted library allocation
|
page read and write
|
||
1CE6E000
|
stack
|
page read and write
|
||
63FC000
|
trusted library allocation
|
page read and write
|
||
831000
|
unkown
|
page execute and write copy
|
||
1F810BD6000
|
trusted library allocation
|
page read and write
|
||
6BEF000
|
stack
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
39C1000
|
heap
|
page read and write
|
||
467F000
|
stack
|
page read and write
|
||
4EE0000
|
direct allocation
|
page read and write
|
||
7A3000
|
heap
|
page read and write
|
||
77A000
|
unkown
|
page execute and read and write
|
||
5278000
|
trusted library allocation
|
page read and write
|
||
22908E8D000
|
heap
|
page read and write
|
||
59E7000
|
trusted library allocation
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
810000
|
direct allocation
|
page read and write
|
||
10A2000
|
heap
|
page read and write
|
||
516000
|
unkown
|
page execute and read and write
|
||
1D252000
|
heap
|
page read and write
|
||
5FD8000
|
trusted library allocation
|
page read and write
|
||
22908203000
|
trusted library allocation
|
page read and write
|
||
5A11000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
D3C000
|
unkown
|
page execute and read and write
|
||
1F80E9D8000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
471E000
|
stack
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
4FA0000
|
direct allocation
|
page read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
1F80F049000
|
trusted library allocation
|
page read and write
|
||
59BD000
|
trusted library allocation
|
page read and write
|
||
62E7000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1F810AFA000
|
trusted library allocation
|
page read and write
|
||
65E5000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
4FF000
|
unkown
|
page execute and write copy
|
||
4681000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
5350000
|
direct allocation
|
page read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
4F1000
|
unkown
|
page execute and write copy
|
||
15C0000
|
direct allocation
|
page read and write
|
||
1F815E00000
|
trusted library allocation
|
page read and write
|
||
1F87F3C9000
|
trusted library allocation
|
page read and write
|
||
5829000
|
trusted library allocation
|
page read and write
|
||
E52000
|
unkown
|
page execute and write copy
|
||
1334000
|
heap
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
1F816210000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
2AE08861000
|
trusted library allocation
|
page read and write
|
||
5AA7000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1F87F5D7000
|
trusted library allocation
|
page read and write
|
||
5AB6000
|
trusted library allocation
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5EED000
|
trusted library allocation
|
page read and write
|
||
60B4000
|
trusted library allocation
|
page read and write
|
||
D1F000
|
unkown
|
page execute and read and write
|
||
1F80E2DD000
|
trusted library allocation
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
13B0000
|
direct allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
12E1000
|
heap
|
page read and write
|
||
1F87FCA1000
|
trusted library allocation
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
355F000
|
stack
|
page read and write
|
||
22908A1C000
|
trusted library allocation
|
page read and write
|
||
C41DCAE000
|
unkown
|
page readonly
|
||
1124000
|
heap
|
page read and write
|
||
1F87FCA5000
|
trusted library allocation
|
page read and write
|
||
5F73000
|
trusted library allocation
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1F80D5ED000
|
trusted library allocation
|
page read and write
|
||
5F9A000
|
trusted library allocation
|
page read and write
|
||
2AE091E9000
|
trusted library allocation
|
page read and write
|
||
1F8160CB000
|
trusted library allocation
|
page read and write
|
||
39EF000
|
stack
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
22908FB8000
|
heap
|
page read and write
|
||
6051000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
2AE091EC000
|
trusted library allocation
|
page read and write
|
||
16AC000
|
heap
|
page read and write
|
||
2DB0000
|
direct allocation
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
6260000
|
trusted library allocation
|
page read and write
|
||
22908278000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
57FA000
|
trusted library allocation
|
page read and write
|
||
5F6A000
|
trusted library allocation
|
page read and write
|
||
27F672D4000
|
heap
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
2AE089FC000
|
trusted library allocation
|
page read and write
|
||
55ED000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
2AE0951B000
|
trusted library allocation
|
page read and write
|
||
2AE095ED000
|
trusted library allocation
|
page read and write
|
||
2AE091FD000
|
trusted library allocation
|
page read and write
|
||
64D0000
|
trusted library allocation
|
page read and write
|
||
5F98000
|
trusted library allocation
|
page read and write
|
||
1D0AE000
|
stack
|
page read and write
|
||
5FBE000
|
trusted library allocation
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
2AE7FEB3000
|
trusted library allocation
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
2AE0D1FA000
|
trusted library allocation
|
page read and write
|
||
1292000
|
heap
|
page read and write
|
||
AC9000
|
unkown
|
page write copy
|
||
E43000
|
unkown
|
page execute and write copy
|
||
59FD000
|
trusted library allocation
|
page read and write
|
||
522F000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
5AD1000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
5221000
|
trusted library allocation
|
page read and write
|
||
14CA000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
6250000
|
trusted library allocation
|
page read and write
|
||
5277000
|
trusted library allocation
|
page read and write
|
||
22908F3C000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
2AE089D9000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
58A9000
|
trusted library allocation
|
page read and write
|
||
1F8164FB000
|
trusted library allocation
|
page read and write
|
||
2AE7A7E1000
|
heap
|
page read and write
|
||
57C4000
|
trusted library allocation
|
page read and write
|
||
6071000
|
trusted library allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
525C000
|
trusted library allocation
|
page read and write
|
||
2AE7FCD0000
|
heap
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
2AE0916F000
|
trusted library allocation
|
page read and write
|
||
1F87F398000
|
trusted library allocation
|
page read and write
|
||
2AE05113000
|
trusted library allocation
|
page read and write
|
||
5410000
|
direct allocation
|
page execute and read and write
|
||
369F000
|
stack
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1F810AFA000
|
trusted library allocation
|
page read and write
|
||
5FAE000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
2AE095E6000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
direct allocation
|
page read and write
|
||
1F8110F6000
|
trusted library allocation
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
524E000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
1F810A6D000
|
trusted library allocation
|
page read and write
|
||
2AE091F0000
|
trusted library allocation
|
page read and write
|
||
8F4D7FD000
|
stack
|
page read and write
|
||
5020000
|
heap
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
9BC000
|
stack
|
page read and write
|
||
22908A00000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5FB3000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
501000
|
unkown
|
page execute and read and write
|
||
59B8000
|
trusted library allocation
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5FA4000
|
trusted library allocation
|
page read and write
|
||
1645000
|
heap
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
831000
|
unkown
|
page execute and write copy
|
||
76F0000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
62F4000
|
trusted library allocation
|
page read and write
|
||
1623000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
51C0000
|
trusted library allocation
|
page read and write
|
||
1F815E15000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
22907E50000
|
unclassified section
|
page readonly
|
||
55A0000
|
direct allocation
|
page execute and read and write
|
||
D73000
|
heap
|
page read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
D01000
|
unkown
|
page execute and read and write
|
||
22908070000
|
unclassified section
|
page read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
639C000
|
trusted library allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
64BD000
|
trusted library allocation
|
page read and write
|
||
F6C000
|
stack
|
page read and write
|
||
2DB0000
|
direct allocation
|
page read and write
|
||
918000
|
unkown
|
page execute and read and write
|
||
657F000
|
trusted library allocation
|
page read and write
|
||
63FE000
|
trusted library allocation
|
page read and write
|
||
610F000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
1F87F39A000
|
trusted library allocation
|
page read and write
|
||
2AE090F9000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
2DB0000
|
direct allocation
|
page read and write
|
||
5F7D000
|
trusted library allocation
|
page read and write
|
||
4C50000
|
heap
|
page read and write
|
||
27F66FF3000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
2AE7FCDC000
|
heap
|
page read and write
|
||
22908FAE000
|
heap
|
page read and write
|
||
1F810AB8000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
E7C000
|
unkown
|
page execute and read and write
|
||
22908F58000
|
heap
|
page read and write
|
||
303E000
|
stack
|
page read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
49F1000
|
heap
|
page read and write
|
||
63FE000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
63AD000
|
trusted library allocation
|
page read and write
|
||
E83000
|
heap
|
page read and write
|
||
132E000
|
heap
|
page read and write
|
||
3E5F000
|
stack
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
644000
|
heap
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
1F810ABA000
|
trusted library allocation
|
page read and write
|
||
67FF000
|
stack
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
5E4F000
|
trusted library allocation
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
FEF000
|
unkown
|
page execute and write copy
|
||
314F000
|
stack
|
page read and write
|
||
10F5000
|
stack
|
page read and write
|
||
860000
|
direct allocation
|
page read and write
|
||
5F52000
|
trusted library allocation
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
2DB0000
|
direct allocation
|
page read and write
|
||
1F80AEDB000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
157A000
|
heap
|
page read and write
|
||
2AE0889A000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
1F811032000
|
trusted library allocation
|
page read and write
|
||
6354000
|
trusted library allocation
|
page read and write
|
||
1F80E260000
|
trusted library allocation
|
page read and write
|
||
5275000
|
trusted library allocation
|
page read and write
|
||
56B5000
|
trusted library allocation
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
5AAB000
|
trusted library allocation
|
page read and write
|
||
12F5000
|
stack
|
page read and write
|
||
3F9F000
|
stack
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
3EFF000
|
stack
|
page read and write
|
||
1F3C5B90000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
5F7B000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
F2A000
|
unkown
|
page execute and write copy
|
||
22908E49000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
E93000
|
unkown
|
page execute and write copy
|
||
15C5000
|
heap
|
page read and write
|
||
5F8B000
|
trusted library allocation
|
page read and write
|
||
1F80D569000
|
trusted library allocation
|
page read and write
|
||
2AE11776000
|
trusted library allocation
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
648D000
|
trusted library allocation
|
page read and write
|
||
78E000
|
unkown
|
page execute and read and write
|
||
126E000
|
stack
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
2F2B000
|
stack
|
page read and write
|
||
1F8160CF000
|
trusted library allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
57EA000
|
trusted library allocation
|
page read and write
|
||
2AE091EC000
|
trusted library allocation
|
page read and write
|
||
313F000
|
stack
|
page read and write
|
||
1617000
|
heap
|
page read and write
|
||
1F87FE75000
|
trusted library allocation
|
page read and write
|
||
65D0000
|
trusted library allocation
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
63F7000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
6C6C000
|
trusted library allocation
|
page read and write
|
||
1F87F778000
|
trusted library allocation
|
page read and write
|
||
64A3000
|
trusted library allocation
|
page read and write
|
||
421E000
|
stack
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
59DD000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
8F4CFFF000
|
stack
|
page read and write
|
||
64AA000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
1F80F0C7000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
5200000
|
direct allocation
|
page execute and read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
62ED000
|
trusted library allocation
|
page read and write
|
||
1662000
|
heap
|
page read and write
|
||
5213000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
3E8F000
|
stack
|
page read and write
|
||
1F810A5D000
|
trusted library allocation
|
page read and write
|
||
2AE7FCD0000
|
heap
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
59BF000
|
trusted library allocation
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
5F92000
|
trusted library allocation
|
page read and write
|
||
1F8160FD000
|
trusted library allocation
|
page read and write
|
||
6258000
|
trusted library allocation
|
page read and write
|
||
1653000
|
heap
|
page read and write
|
||
1550000
|
direct allocation
|
page read and write
|
||
5FB4000
|
trusted library allocation
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
EDB000
|
unkown
|
page execute and read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
48C0000
|
direct allocation
|
page execute and read and write
|
||
12A1000
|
heap
|
page read and write
|
||
5313000
|
trusted library allocation
|
page read and write
|
||
A50000
|
direct allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
1CF9D000
|
stack
|
page read and write
|
||
56BB000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
6251000
|
trusted library allocation
|
page read and write
|
||
5227000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
2AE7FCDC000
|
heap
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
32AF000
|
stack
|
page read and write
|
||
C7B000
|
unkown
|
page execute and read and write
|
||
4A9F000
|
stack
|
page read and write
|
||
523A000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1F80F016000
|
trusted library allocation
|
page read and write
|
||
14D3000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
121E000
|
heap
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
487000
|
unkown
|
page execute and write copy
|
||
2AE0910C000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
1A08B7D5000
|
heap
|
page read and write
|
||
2AE095F8000
|
trusted library allocation
|
page read and write
|
||
2AE09116000
|
trusted library allocation
|
page read and write
|
||
C41DDAE000
|
unkown
|
page readonly
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
5328000
|
trusted library allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
2AE09131000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
59C5000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
5245000
|
trusted library allocation
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
1F810AAF000
|
trusted library allocation
|
page read and write
|
||
2AE0D2E4000
|
trusted library allocation
|
page read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
1F810BFC000
|
trusted library allocation
|
page read and write
|
||
1F810AC9000
|
trusted library allocation
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
2AE095D4000
|
trusted library allocation
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
6241000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
607A000
|
trusted library allocation
|
page read and write
|
||
1D13E000
|
stack
|
page read and write
|
||
871000
|
unkown
|
page execute and write copy
|
||
1F87F3C3000
|
trusted library allocation
|
page read and write
|
||
64E7000
|
trusted library allocation
|
page read and write
|
||
1F80E9FA000
|
trusted library allocation
|
page read and write
|
||
5F51000
|
trusted library allocation
|
page read and write
|
||
D61000
|
unkown
|
page execute and read and write
|
||
29DE000
|
stack
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
4FF0000
|
direct allocation
|
page execute and read and write
|
||
4B11000
|
heap
|
page read and write
|
||
2AE062F2000
|
trusted library allocation
|
page read and write
|
||
128E000
|
heap
|
page read and write
|
||
5225000
|
trusted library allocation
|
page read and write
|
||
22908F26000
|
heap
|
page read and write
|
||
8F4F7FF000
|
stack
|
page read and write
|
||
2AE1177B000
|
trusted library allocation
|
page read and write
|
||
810000
|
direct allocation
|
page read and write
|
||
1F810AD5000
|
trusted library allocation
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
1F80E2E3000
|
trusted library allocation
|
page read and write
|
||
169B000
|
heap
|
page read and write
|
||
522E000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
14D3000
|
heap
|
page read and write
|
||
63F6000
|
trusted library allocation
|
page read and write
|
||
585A000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
direct allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
612000
|
unkown
|
page execute and read and write
|
||
6251000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
5760000
|
trusted library allocation
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
587B000
|
trusted library allocation
|
page read and write
|
||
56B1000
|
trusted library allocation
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
5F8D000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2AE09157000
|
trusted library allocation
|
page read and write
|
||
12FA000
|
heap
|
page read and write
|
||
AAD2FEE000
|
unkown
|
page readonly
|
||
A50000
|
direct allocation
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
12BE000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
10FC000
|
unkown
|
page execute and write copy
|
||
59BF000
|
trusted library allocation
|
page read and write
|
||
2AE095A9000
|
trusted library allocation
|
page read and write
|
||
2AE09538000
|
trusted library allocation
|
page read and write
|
||
22908EA9000
|
heap
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
1F8160BE000
|
trusted library allocation
|
page read and write
|
||
5252000
|
trusted library allocation
|
page read and write
|
||
860000
|
direct allocation
|
page read and write
|
||
1F810ABA000
|
trusted library allocation
|
page read and write
|
||
1321000
|
heap
|
page read and write
|
||
5F78000
|
trusted library allocation
|
page read and write
|
||
4690000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
302000
|
unkown
|
page execute and write copy
|
||
5450000
|
direct allocation
|
page execute and read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5F86000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
FEE000
|
unkown
|
page readonly
|
||
4EF1000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
E6C000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
525C000
|
trusted library allocation
|
page read and write
|
||
2AE091B1000
|
trusted library allocation
|
page read and write
|
||
5252000
|
trusted library allocation
|
page read and write
|
||
1AC3E000
|
stack
|
page read and write
|
||
1F80E478000
|
trusted library allocation
|
page read and write
|
||
524B000
|
trusted library allocation
|
page read and write
|
||
10AA000
|
heap
|
page read and write
|
||
8D0000
|
unkown
|
page execute and write copy
|
||
1280000
|
heap
|
page read and write
|
||
2AE09075000
|
trusted library allocation
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
C41DCED000
|
stack
|
page read and write
|
||
1CBFE000
|
stack
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
2AE09AF0000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
43C0000
|
trusted library allocation
|
page read and write
|
||
1F80F652000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
56B9000
|
trusted library allocation
|
page read and write
|
||
1215000
|
heap
|
page read and write
|
||
530000
|
unkown
|
page readonly
|
||
1D250000
|
heap
|
page read and write
|
||
1F81788B000
|
trusted library allocation
|
page read and write
|
||
5CA6000
|
trusted library allocation
|
page read and write
|
||
33BF000
|
stack
|
page read and write
|
||
14DF000
|
heap
|
page read and write
|
||
2AE7FCD0000
|
heap
|
page read and write
|
||
59BA000
|
trusted library allocation
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
5F97000
|
trusted library allocation
|
page read and write
|
||
48B0000
|
direct allocation
|
page execute and read and write
|
||
1F810AC9000
|
trusted library allocation
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
1F810AAF000
|
trusted library allocation
|
page read and write
|
||
1F80D5C7000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
524E000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
22908FB8000
|
heap
|
page read and write
|
||
5F4E000
|
trusted library allocation
|
page read and write
|
||
458E000
|
stack
|
page read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
1F810ADB000
|
trusted library allocation
|
page read and write
|
||
495F000
|
stack
|
page read and write
|
||
1C9D000
|
stack
|
page read and write
|
||
655E000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
2AE095F8000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
4E80000
|
direct allocation
|
page read and write
|
||
522A000
|
trusted library allocation
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
354E000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
2AE091E9000
|
trusted library allocation
|
page read and write
|
||
1F811673000
|
trusted library allocation
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
E4C000
|
unkown
|
page execute and read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
5F65000
|
trusted library allocation
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
5FC6000
|
trusted library allocation
|
page read and write
|
||
499E000
|
stack
|
page read and write
|
||
1F80F088000
|
trusted library allocation
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
5265000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5F85000
|
trusted library allocation
|
page read and write
|
||
81A000
|
unkown
|
page execute and read and write
|
||
35CF000
|
stack
|
page read and write
|
||
56BE000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
5F7F000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
5FA4000
|
trusted library allocation
|
page read and write
|
||
1A08B907000
|
trusted library allocation
|
page read and write
|
||
2AE06263000
|
trusted library allocation
|
page read and write
|
||
64F0000
|
heap
|
page read and write
|
||
63F1000
|
trusted library allocation
|
page read and write
|
||
188E3FF000
|
stack
|
page read and write
|
||
169A000
|
heap
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
1F80F0B1000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
direct allocation
|
page read and write
|
||
27F66E70000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
4F8D000
|
trusted library allocation
|
page execute and read and write
|
||
50F0000
|
direct allocation
|
page execute and read and write
|
||
10A0000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
1F817887000
|
trusted library allocation
|
page read and write
|
||
1F81103D000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
6351000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
10A7000
|
heap
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
59BD000
|
trusted library allocation
|
page read and write
|
||
27F67310000
|
trusted library allocation
|
page read and write
|
||
A50000
|
direct allocation
|
page read and write
|
||
860000
|
direct allocation
|
page read and write
|
||
48CE000
|
stack
|
page read and write
|
||
1F8160BA000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
2AE09176000
|
trusted library allocation
|
page read and write
|
||
1F87F5DA000
|
trusted library allocation
|
page read and write
|
||
FCA000
|
heap
|
page read and write
|
||
BB0000
|
unkown
|
page readonly
|
||
27F6743D000
|
trusted library allocation
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
D84000
|
unkown
|
page execute and write copy
|
||
4BC1000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
5370000
|
direct allocation
|
page read and write
|
||
EDB000
|
unkown
|
page execute and read and write
|
||
564000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
6240000
|
trusted library allocation
|
page read and write
|
||
3F9E000
|
stack
|
page read and write
|
||
59EC000
|
trusted library allocation
|
page read and write
|
||
42EE000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
1F87F7BA000
|
trusted library allocation
|
page read and write
|
||
5F33000
|
trusted library allocation
|
page read and write
|
||
526D000
|
trusted library allocation
|
page read and write
|
||
B11000
|
unkown
|
page execute and write copy
|
||
8D0000
|
unkown
|
page execute and write copy
|
||
5FCE000
|
trusted library allocation
|
page read and write
|
||
2AE09AF8000
|
trusted library allocation
|
page read and write
|
||
2AE091D3000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
direct allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
2AE091F7000
|
trusted library allocation
|
page read and write
|
||
5F1A000
|
trusted library allocation
|
page read and write
|
||
59E7000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
39CE000
|
stack
|
page read and write
|
||
1645000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
1F87F766000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
6AEE000
|
stack
|
page read and write
|
||
3E8F000
|
stack
|
page read and write
|
||
6057000
|
trusted library allocation
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
5180000
|
heap
|
page read and write
|
||
5F64000
|
trusted library allocation
|
page read and write
|
||
1F87FBFD000
|
trusted library allocation
|
page read and write
|
||
59E7000
|
trusted library allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
1F80DAEF000
|
trusted library allocation
|
page read and write
|
||
5367000
|
trusted library allocation
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
1F81620A000
|
trusted library allocation
|
page read and write
|
||
1F87F381000
|
trusted library allocation
|
page read and write
|
||
748D000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
5F8E000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
63FA000
|
trusted library allocation
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
2AE091F0000
|
trusted library allocation
|
page read and write
|
||
522A000
|
trusted library allocation
|
page read and write
|
||
2AE09AFC000
|
trusted library allocation
|
page read and write
|
||
41DF000
|
stack
|
page read and write
|
||
384F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
AAD49FE000
|
stack
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
2AE091DB000
|
trusted library allocation
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
870000
|
unkown
|
page readonly
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
1F810BB1000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
5CA8000
|
trusted library allocation
|
page read and write
|
||
1F87FBFD000
|
trusted library allocation
|
page read and write
|
||
59C3000
|
trusted library allocation
|
page read and write
|
||
1F80D9EB000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
5F1F000
|
trusted library allocation
|
page read and write
|
||
534F000
|
stack
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
5265000
|
trusted library allocation
|
page read and write
|
||
860000
|
direct allocation
|
page read and write
|
||
22908F9A000
|
heap
|
page read and write
|
||
860000
|
direct allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
1F80E271000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
56B6000
|
trusted library allocation
|
page read and write
|
||
58EA000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
5CA2000
|
trusted library allocation
|
page read and write
|
||
1F80D565000
|
trusted library allocation
|
page read and write
|
||
A8E000
|
unkown
|
page execute and read and write
|
||
5FCC000
|
trusted library allocation
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
6069000
|
trusted library allocation
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
63FA000
|
trusted library allocation
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
4681000
|
heap
|
page read and write
|
||
63F7000
|
trusted library allocation
|
page read and write
|
||
1F80DEE0000
|
trusted library allocation
|
page read and write
|
||
4AB4000
|
trusted library allocation
|
page read and write
|
||
2AE0915A000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
122C000
|
unkown
|
page readonly
|
||
121B000
|
heap
|
page read and write
|
||
5061000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
31E0000
|
direct allocation
|
page execute and read and write
|
||
1F87F76A000
|
trusted library allocation
|
page read and write
|
||
5061000
|
heap
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
1F87FC77000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
5D71000
|
trusted library allocation
|
page read and write
|
||
1F87FBF8000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
4FF000
|
stack
|
page read and write
|
||
FD0000
|
unkown
|
page readonly
|
||
5050000
|
direct allocation
|
page read and write
|
||
6051000
|
trusted library allocation
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
FDF000
|
stack
|
page read and write
|
||
1F87FF96000
|
trusted library allocation
|
page read and write
|
||
1AFBF000
|
stack
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
1D2EE000
|
stack
|
page read and write
|
||
6052000
|
trusted library allocation
|
page read and write
|
||
3981000
|
heap
|
page read and write
|
||
384F000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
5F63000
|
trusted library allocation
|
page read and write
|
||
2AE7FEDF000
|
trusted library allocation
|
page read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
137B000
|
heap
|
page read and write
|
||
6490000
|
trusted library allocation
|
page read and write
|
||
1F810A6D000
|
trusted library allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
6575000
|
trusted library allocation
|
page read and write
|
||
5261000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
55F0000
|
trusted library allocation
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
E84000
|
unkown
|
page execute and read and write
|
||
27F673EB000
|
trusted library allocation
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
22908F2B000
|
heap
|
page read and write
|
||
1F87F46D000
|
trusted library allocation
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
6561000
|
trusted library allocation
|
page read and write
|
||
5F7F000
|
trusted library allocation
|
page read and write
|
||
5232000
|
trusted library allocation
|
page read and write
|
||
1F87F4DD000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
418F000
|
stack
|
page read and write
|
||
1D6BD000
|
stack
|
page read and write
|
||
2AE11716000
|
trusted library allocation
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
5FB9000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
29FC000
|
stack
|
page read and write
|
||
1CF6F000
|
stack
|
page read and write
|
||
624B000
|
trusted library allocation
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
2AE09176000
|
trusted library allocation
|
page read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
527E000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
2AE7FECA000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
5AD7000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1F87F465000
|
trusted library allocation
|
page read and write
|
||
22908F6B000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
64CE000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
direct allocation
|
page read and write
|
||
5420000
|
direct allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
22908E85000
|
heap
|
page read and write
|
||
134D000
|
heap
|
page read and write
|
||
5CA5000
|
trusted library allocation
|
page read and write
|
||
1F87FFAE000
|
trusted library allocation
|
page read and write
|
||
5FBD000
|
trusted library allocation
|
page read and write
|
||
2AE09AF4000
|
trusted library allocation
|
page read and write
|
||
478E000
|
stack
|
page read and write
|
||
526F000
|
trusted library allocation
|
page read and write
|
||
5353000
|
trusted library allocation
|
page read and write
|
||
1F816214000
|
trusted library allocation
|
page read and write
|
||
14DF000
|
heap
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
58B6000
|
trusted library allocation
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
605D000
|
trusted library allocation
|
page read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
2AE7FEC0000
|
trusted library allocation
|
page read and write
|
||
523E000
|
stack
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
32DF000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5FA9000
|
trusted library allocation
|
page read and write
|
||
492E000
|
stack
|
page read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
27F66FF0000
|
heap
|
page read and write
|
||
2AE7FE98000
|
trusted library allocation
|
page read and write
|
||
1F80E9FD000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
188EBFF000
|
stack
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
2AE0915A000
|
trusted library allocation
|
page read and write
|
||
1F810ADB000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
32CE000
|
stack
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
58DF000
|
trusted library allocation
|
page read and write
|
||
1F80AEA4000
|
trusted library allocation
|
page read and write
|
||
160B000
|
heap
|
page read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
A37000
|
unkown
|
page execute and write copy
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
8ED000
|
unkown
|
page execute and read and write
|
||
57FB000
|
trusted library allocation
|
page read and write
|
||
1F816094000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
2AE7FCCF000
|
heap
|
page read and write
|
||
5AD7000
|
trusted library allocation
|
page read and write
|
||
5F92000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
1F8160C9000
|
trusted library allocation
|
page read and write
|
||
8F4FFFF000
|
stack
|
page read and write
|
||
5FBB000
|
trusted library allocation
|
page read and write
|
||
4DA000
|
unkown
|
page execute and write copy
|
||
46A0000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
2AE09172000
|
trusted library allocation
|
page read and write
|
||
4D80000
|
heap
|
page read and write
|
||
65D7000
|
trusted library allocation
|
page read and write
|
||
31F7000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
121E000
|
heap
|
page read and write
|
||
120E000
|
stack
|
page read and write
|
||
64EF000
|
trusted library allocation
|
page read and write
|
||
27F67360000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
direct allocation
|
page execute and read and write
|
||
653D000
|
trusted library allocation
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
3981000
|
heap
|
page read and write
|
||
1F87F782000
|
trusted library allocation
|
page read and write
|
||
2290825F000
|
trusted library allocation
|
page read and write
|
||
2AE0D2F9000
|
trusted library allocation
|
page read and write
|
||
520000
|
unkown
|
page execute and read and write
|
||
1124000
|
heap
|
page read and write
|
||
56B2000
|
trusted library allocation
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
77E000
|
heap
|
page read and write
|
||
53D1000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
5FB6000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
12F5000
|
heap
|
page read and write
|
||
1F8160FD000
|
trusted library allocation
|
page read and write
|
||
22908F28000
|
heap
|
page read and write
|
||
1D4A0000
|
heap
|
page read and write
|
||
2AE08F6D000
|
trusted library allocation
|
page read and write
|
||
1698000
|
heap
|
page read and write
|
||
1F87F7B6000
|
trusted library allocation
|
page read and write
|
||
5771000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
5791000
|
trusted library allocation
|
page read and write
|
||
3180000
|
direct allocation
|
page read and write
|
||
31A7000
|
heap
|
page read and write
|
||
27F66C00000
|
unclassified section
|
page readonly
|
||
3280000
|
direct allocation
|
page read and write
|
||
6257000
|
trusted library allocation
|
page read and write
|
||
5F6F000
|
trusted library allocation
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
5292000
|
trusted library allocation
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
457F000
|
stack
|
page read and write
|
||
5223000
|
trusted library allocation
|
page read and write
|
||
2E5F000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
63FE000
|
trusted library allocation
|
page read and write
|
||
5A4000
|
unkown
|
page execute and write copy
|
||
59B1000
|
trusted library allocation
|
page read and write
|
||
3981000
|
heap
|
page read and write
|
||
14D2000
|
heap
|
page read and write
|
||
3ACF000
|
stack
|
page read and write
|
||
5E47000
|
trusted library allocation
|
page read and write
|
||
57E6000
|
trusted library allocation
|
page read and write
|
||
1F87FCBD000
|
trusted library allocation
|
page read and write
|
||
DEF000
|
stack
|
page read and write
|
||
76F8000
|
heap
|
page read and write
|
||
2AE063E5000
|
trusted library allocation
|
page read and write
|
||
2AE0885F000
|
trusted library allocation
|
page read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
1F87E8EF000
|
trusted library allocation
|
page read and write
|
||
5245000
|
trusted library allocation
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
146F000
|
stack
|
page read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
2AE091B1000
|
trusted library allocation
|
page read and write
|
||
D1F000
|
unkown
|
page execute and read and write
|
||
5318000
|
trusted library allocation
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
B70000
|
unkown
|
page read and write
|
||
27F67396000
|
trusted library allocation
|
page read and write
|
||
64BF000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
5F98000
|
trusted library allocation
|
page read and write
|
||
ABF000
|
unkown
|
page execute and read and write
|
||
11AE000
|
stack
|
page read and write
|
||
1F8164F3000
|
trusted library allocation
|
page read and write
|
||
1F810B91000
|
trusted library allocation
|
page read and write
|
||
59A5000
|
trusted library allocation
|
page read and write
|
||
4F3000
|
unkown
|
page execute and write copy
|
||
6301000
|
trusted library allocation
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
4FA0000
|
direct allocation
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
1F87F45F000
|
trusted library allocation
|
page read and write
|
||
27F67419000
|
trusted library allocation
|
page read and write
|
||
409F000
|
stack
|
page read and write
|
||
63FA000
|
trusted library allocation
|
page read and write
|
||
59A2000
|
trusted library allocation
|
page read and write
|
||
5232000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
44BF000
|
stack
|
page read and write
|
||
27F66C70000
|
remote allocation
|
page read and write
|
||
11DB000
|
stack
|
page read and write
|
||
1357000
|
heap
|
page read and write
|
||
3C1E000
|
stack
|
page read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
2AE095F6000
|
trusted library allocation
|
page read and write
|
||
522E000
|
trusted library allocation
|
page read and write
|
||
E93000
|
unkown
|
page execute and read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
5AA7000
|
trusted library allocation
|
page read and write
|
||
A36000
|
unkown
|
page execute and write copy
|
||
5EF6000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
5FA5000
|
trusted library allocation
|
page read and write
|
||
10CC000
|
stack
|
page read and write
|
||
3190000
|
direct allocation
|
page execute and read and write
|
||
16A4000
|
heap
|
page read and write
|
||
2AE7FCD0000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
1F810AB6000
|
trusted library allocation
|
page read and write
|
||
1F810ADB000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
521000
|
unkown
|
page execute and write copy
|
||
15AE000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
6047000
|
trusted library allocation
|
page read and write
|
||
1F816099000
|
trusted library allocation
|
page read and write
|
||
3B2F000
|
stack
|
page read and write
|
||
28BE000
|
stack
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
E33000
|
unkown
|
page execute and write copy
|
||
3FFE000
|
stack
|
page read and write
|
||
A50000
|
direct allocation
|
page read and write
|
||
2AE0D2E4000
|
trusted library allocation
|
page read and write
|
||
5F1B000
|
trusted library allocation
|
page read and write
|
||
1F80E96C000
|
trusted library allocation
|
page read and write
|
||
22908F31000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
1A08B63D000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
1443000
|
heap
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
1F80F083000
|
trusted library allocation
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
2AE0915F000
|
trusted library allocation
|
page read and write
|
||
56BD000
|
trusted library allocation
|
page read and write
|
||
463E000
|
stack
|
page read and write
|
||
2B3E000
|
stack
|
page read and write
|
||
810000
|
direct allocation
|
page read and write
|
||
22907EF0000
|
heap
|
page read and write
|
||
4F2000
|
unkown
|
page execute and read and write
|
||
3090000
|
heap
|
page read and write
|
||
27F66C10000
|
unclassified section
|
page readonly
|
||
A14000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
1D38E000
|
stack
|
page read and write
|
||
1F87F753000
|
trusted library allocation
|
page read and write
|
||
2AE091FD000
|
trusted library allocation
|
page read and write
|
||
5290000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
442D000
|
stack
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
D61000
|
unkown
|
page execute and read and write
|
||
1F8160FB000
|
trusted library allocation
|
page read and write
|
||
5750000
|
trusted library allocation
|
page read and write
|
||
27F66C86000
|
remote allocation
|
page execute read
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
494000
|
unkown
|
page readonly
|
||
460E000
|
stack
|
page read and write
|
||
1F810BD2000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
2AE08963000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
475E000
|
stack
|
page read and write
|
||
5550000
|
direct allocation
|
page execute and read and write
|
||
644000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5FAA000
|
trusted library allocation
|
page read and write
|
||
1F87F46F000
|
trusted library allocation
|
page read and write
|
||
5354000
|
trusted library allocation
|
page read and write
|
||
22908F2B000
|
heap
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
548F000
|
stack
|
page read and write
|
||
402F000
|
stack
|
page read and write
|
||
5263000
|
trusted library allocation
|
page read and write
|
||
5252000
|
trusted library allocation
|
page read and write
|
||
1550000
|
direct allocation
|
page read and write
|
||
3C1000
|
unkown
|
page execute read
|
||
1F810BF1000
|
trusted library allocation
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
630E000
|
trusted library allocation
|
page read and write
|
||
527D000
|
trusted library allocation
|
page read and write
|
||
2AE091FD000
|
trusted library allocation
|
page read and write
|
||
1F87F4D1000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
1F80E9CE000
|
trusted library allocation
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
2AE0910A000
|
trusted library allocation
|
page read and write
|
||
1F80F0AD000
|
trusted library allocation
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
7A7000
|
heap
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
5352000
|
trusted library allocation
|
page read and write
|
||
2AE7FCD0000
|
heap
|
page read and write
|
||
1B11F000
|
stack
|
page read and write
|
||
1550000
|
direct allocation
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
1F80E4C7000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
5F97000
|
trusted library allocation
|
page read and write
|
||
78D000
|
heap
|
page read and write
|
||
59C3000
|
trusted library allocation
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
5F38000
|
trusted library allocation
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
5F5B000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
3584000
|
heap
|
page read and write
|
||
2AE0915E000
|
trusted library allocation
|
page read and write
|
||
522E000
|
trusted library allocation
|
page read and write
|
||
5A2000
|
unkown
|
page execute and write copy
|
||
4EF1000
|
heap
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
5EE2000
|
trusted library allocation
|
page read and write
|
||
1F8160BE000
|
trusted library allocation
|
page read and write
|
||
1A08B5A0000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
5A16000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
5FBB000
|
trusted library allocation
|
page read and write
|
||
27F67365000
|
trusted library allocation
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
4681000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
E24000
|
unkown
|
page execute and read and write
|
||
64DE000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
2AE091E1000
|
trusted library allocation
|
page read and write
|
||
A4F000
|
unkown
|
page execute and write copy
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
2AE7FEA6000
|
trusted library allocation
|
page read and write
|
||
1F8178BD000
|
trusted library allocation
|
page read and write
|
||
5279000
|
trusted library allocation
|
page read and write
|
||
E93000
|
unkown
|
page execute and write copy
|
||
30A0000
|
direct allocation
|
page read and write
|
||
1F810B8D000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
6AAC000
|
stack
|
page read and write
|
||
41AE000
|
stack
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
1F811673000
|
trusted library allocation
|
page read and write
|
||
6253000
|
trusted library allocation
|
page read and write
|
||
2AE7FEB3000
|
trusted library allocation
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
549000
|
unkown
|
page execute and read and write
|
||
787000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
2290807F000
|
unclassified section
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
350F000
|
stack
|
page read and write
|
||
A50000
|
direct allocation
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
5FCF000
|
trusted library allocation
|
page read and write
|
||
6564000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1F815E71000
|
trusted library allocation
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
64CA000
|
trusted library allocation
|
page read and write
|
||
1F87FBEB000
|
trusted library allocation
|
page read and write
|
||
59A4000
|
trusted library allocation
|
page read and write
|
||
137B000
|
heap
|
page read and write
|
||
27F6736E000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
D74000
|
unkown
|
page execute and read and write
|
||
1A08B627000
|
heap
|
page read and write
|
||
55A0000
|
direct allocation
|
page execute and read and write
|
||
5F99000
|
trusted library allocation
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
27F673C8000
|
trusted library allocation
|
page read and write
|
||
5349000
|
trusted library allocation
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
5400000
|
direct allocation
|
page execute and read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
31FB000
|
heap
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
10F0000
|
unkown
|
page execute and write copy
|
||
4B11000
|
heap
|
page read and write
|
||
7B2000
|
heap
|
page read and write
|
||
13B0000
|
direct allocation
|
page read and write
|
||
2DB0000
|
direct allocation
|
page read and write
|
||
5A17000
|
trusted library allocation
|
page read and write
|
||
8FD000
|
stack
|
page read and write
|
||
54B0000
|
direct allocation
|
page execute and read and write
|
||
53AF000
|
stack
|
page read and write
|
||
3B6E000
|
stack
|
page read and write
|
||
1DCD7BE0000
|
heap
|
page read and write
|
||
2AE0917B000
|
trusted library allocation
|
page read and write
|
||
B10000
|
unkown
|
page read and write
|
||
1F80E9A6000
|
trusted library allocation
|
page read and write
|
||
1D254000
|
heap
|
page read and write
|
||
11FE000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
229082C2000
|
trusted library allocation
|
page read and write
|
||
F28000
|
unkown
|
page execute and read and write
|
||
7A7000
|
heap
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
direct allocation
|
page read and write
|
||
5A2F000
|
trusted library allocation
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
59CE000
|
trusted library allocation
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
59C9000
|
trusted library allocation
|
page read and write
|
||
494000
|
unkown
|
page readonly
|
||
1F80E957000
|
trusted library allocation
|
page read and write
|
||
59C3000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
2AE089DC000
|
trusted library allocation
|
page read and write
|
||
1F87E8E6000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
1F87FBF5000
|
trusted library allocation
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
487F000
|
stack
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
63F4000
|
trusted library allocation
|
page read and write
|
||
445F000
|
stack
|
page read and write
|
||
5500000
|
direct allocation
|
page execute and read and write
|
||
42BF000
|
stack
|
page read and write
|
||
54E0000
|
direct allocation
|
page execute and read and write
|
||
5F3C000
|
trusted library allocation
|
page read and write
|
||
1CE4F000
|
stack
|
page read and write
|
||
5AE9000
|
trusted library allocation
|
page read and write
|
||
45BE000
|
stack
|
page read and write
|
||
5130000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
2AE091B1000
|
trusted library allocation
|
page read and write
|
||
522A000
|
trusted library allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
229088F0000
|
heap
|
page read and write
|
||
A50000
|
direct allocation
|
page read and write
|
||
151E000
|
stack
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
22908FB9000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
16AD000
|
heap
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
1CE9E000
|
stack
|
page read and write
|
||
4B9000
|
unkown
|
page execute and write copy
|
||
2AE09AF4000
|
trusted library allocation
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
22908F85000
|
heap
|
page read and write
|
||
4BA000
|
unkown
|
page execute and read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
624A000
|
trusted library allocation
|
page read and write
|
||
1F80EE7E000
|
trusted library allocation
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
39BE000
|
stack
|
page read and write
|
||
2AE7FCD0000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
1F80D58D000
|
trusted library allocation
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
59CE000
|
trusted library allocation
|
page read and write
|
||
2AE091AD000
|
trusted library allocation
|
page read and write
|
||
1A08B658000
|
heap
|
page read and write
|
||
5F9C000
|
trusted library allocation
|
page read and write
|
||
5590000
|
direct allocation
|
page execute and read and write
|
||
1D42E000
|
stack
|
page read and write
|
||
1F810ABE000
|
trusted library allocation
|
page read and write
|
||
1321000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
8F4CFFA000
|
stack
|
page read and write
|
||
5F9C000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
59CD000
|
trusted library allocation
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
721000
|
heap
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
27F6735B000
|
trusted library allocation
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4DEF000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
524D000
|
trusted library allocation
|
page read and write
|
||
5AA6000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
593000
|
unkown
|
page execute and write copy
|
||
5351000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
2AE091A2000
|
trusted library allocation
|
page read and write
|
||
35DE000
|
stack
|
page read and write
|
||
50A1000
|
direct allocation
|
page read and write
|
||
1A08B800000
|
trusted library allocation
|
page read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
3A2E000
|
stack
|
page read and write
|
||
5F78000
|
trusted library allocation
|
page read and write
|
||
403F000
|
stack
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
2AE7FCD0000
|
heap
|
page read and write
|
||
AAD623E000
|
stack
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
830000
|
unkown
|
page read and write
|
||
1CFAE000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
64BB000
|
trusted library allocation
|
page read and write
|
||
22908F40000
|
heap
|
page read and write
|
||
D83000
|
unkown
|
page execute and write copy
|
||
A60000
|
unkown
|
page read and write
|
||
6EF0000
|
trusted library allocation
|
page read and write
|
||
D83000
|
unkown
|
page execute and read and write
|
||
564000
|
heap
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
1F81623F000
|
trusted library allocation
|
page read and write
|
||
3E5E000
|
stack
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
49F1000
|
heap
|
page read and write
|
||
2AE7FCD0000
|
heap
|
page read and write
|
||
6311000
|
trusted library allocation
|
page read and write
|
||
121E000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
22908268000
|
trusted library allocation
|
page read and write
|
||
64DE000
|
stack
|
page read and write
|
||
1A08B7D0000
|
heap
|
page read and write
|
||
5262000
|
trusted library allocation
|
page read and write
|
||
B50000
|
unkown
|
page execute and write copy
|
||
4BC1000
|
heap
|
page read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
5311000
|
trusted library allocation
|
page read and write
|
||
5894000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
5460000
|
direct allocation
|
page execute and read and write
|
||
522C000
|
trusted library allocation
|
page read and write
|
||
2AE0B7E7000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
2AE062AB000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
16AA000
|
heap
|
page read and write
|
||
340E000
|
stack
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
5223000
|
trusted library allocation
|
page read and write
|
||
1D35C000
|
stack
|
page read and write
|
||
4E1F000
|
stack
|
page read and write
|
||
1F87F717000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
1F810BD7000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
229082BB000
|
trusted library allocation
|
page read and write
|
||
59FD000
|
trusted library allocation
|
page read and write
|
||
43BD000
|
stack
|
page read and write
|
||
1F87F7D7000
|
trusted library allocation
|
page read and write
|
||
59A7000
|
trusted library allocation
|
page read and write
|
||
59CD000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
624A000
|
trusted library allocation
|
page read and write
|
||
63F1000
|
trusted library allocation
|
page read and write
|
||
1F80AE33000
|
trusted library allocation
|
page read and write
|
||
139C000
|
stack
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
1211000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
5F66000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
810000
|
direct allocation
|
page read and write
|
||
1F80E6ED000
|
trusted library allocation
|
page read and write
|
||
1F3C5E00000
|
trusted library allocation
|
page read and write
|
||
113D000
|
stack
|
page read and write
|
||
188F3FF000
|
stack
|
page read and write
|
||
59A7000
|
trusted library allocation
|
page read and write
|
||
2AE0909A000
|
trusted library allocation
|
page read and write
|
||
1F87FFB2000
|
trusted library allocation
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
16B9000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
4740000
|
direct allocation
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
2AE09163000
|
trusted library allocation
|
page read and write
|
||
1F80E9E0000
|
trusted library allocation
|
page read and write
|
||
53B0000
|
direct allocation
|
page execute and read and write
|
||
1F87F5B5000
|
trusted library allocation
|
page read and write
|
||
5061000
|
heap
|
page read and write
|
||
2AE095E6000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
13B0000
|
direct allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1F87FCD5000
|
trusted library allocation
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
5AD7000
|
trusted library allocation
|
page read and write
|
||
5793000
|
trusted library allocation
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
127A000
|
heap
|
page read and write
|
||
5264000
|
trusted library allocation
|
page read and write
|
||
64FD000
|
trusted library allocation
|
page read and write
|
||
72B000
|
heap
|
page read and write
|
||
49F1000
|
heap
|
page read and write
|
||
64D9000
|
trusted library allocation
|
page read and write
|
||
59B8000
|
trusted library allocation
|
page read and write
|
||
1347000
|
heap
|
page read and write
|
||
2AE09133000
|
trusted library allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
4EE0000
|
direct allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
6071000
|
trusted library allocation
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
5F7C000
|
trusted library allocation
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
5227000
|
trusted library allocation
|
page read and write
|
||
27F6741C000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
55A0000
|
direct allocation
|
page execute and read and write
|
||
1F8117DB000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1F87E8DD000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
522A000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
2AE095D2000
|
trusted library allocation
|
page read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
A50000
|
direct allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
2AE0D255000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
direct allocation
|
page read and write
|
||
E70000
|
unkown
|
page execute and write copy
|
||
464E000
|
stack
|
page read and write
|
||
62EE000
|
trusted library allocation
|
page read and write
|
||
810000
|
direct allocation
|
page read and write
|
||
55A0000
|
direct allocation
|
page execute and read and write
|
||
13A4000
|
heap
|
page read and write
|
||
1307000
|
heap
|
page read and write
|
||
705000
|
heap
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
59BF000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
6242000
|
trusted library allocation
|
page read and write
|
||
61AC000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1222000
|
heap
|
page read and write
|
||
C41DDEB000
|
stack
|
page read and write
|
||
1A08D1A0000
|
heap
|
page read and write
|
||
22908000000
|
heap
|
page read and write
|
||
1F87FC89000
|
trusted library allocation
|
page read and write
|
||
10B7000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
4FFA000
|
trusted library allocation
|
page execute and read and write
|
||
7BB000
|
heap
|
page read and write
|
||
1F80E995000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
229087B5000
|
unkown
|
page execute read
|
||
4681000
|
heap
|
page read and write
|
||
229087B1000
|
unkown
|
page execute read
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
22907E60000
|
unclassified section
|
page readonly
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
59BE000
|
trusted library allocation
|
page read and write
|
||
1F80E931000
|
trusted library allocation
|
page read and write
|
||
306000
|
unkown
|
page write copy
|
||
4681000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
1F815E76000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
2AE0916F000
|
trusted library allocation
|
page read and write
|
||
64B4000
|
trusted library allocation
|
page read and write
|
||
525E000
|
trusted library allocation
|
page read and write
|
||
1F810B8D000
|
trusted library allocation
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
1F80AEE6000
|
trusted library allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
435F000
|
stack
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
2AE062FD000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
1F80E6CC000
|
trusted library allocation
|
page read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
A27000
|
unkown
|
page execute and read and write
|
||
1F80D64E000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
E94000
|
unkown
|
page execute and write copy
|
||
564000
|
heap
|
page read and write
|
||
2AE091F7000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
1F3C5BC9000
|
heap
|
page read and write
|
||
46BF000
|
stack
|
page read and write
|
||
5F79000
|
trusted library allocation
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
2AE091E1000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
27F67400000
|
trusted library allocation
|
page read and write
|
||
5050000
|
direct allocation
|
page execute and read and write
|
||
454F000
|
stack
|
page read and write
|
||
5263000
|
trusted library allocation
|
page read and write
|
||
1F87F424000
|
trusted library allocation
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4D1E000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
5F8C000
|
trusted library allocation
|
page read and write
|
||
CBC000
|
stack
|
page read and write
|
||
64E4000
|
trusted library allocation
|
page read and write
|
||
5160000
|
trusted library allocation
|
page read and write
|
||
438F000
|
stack
|
page read and write
|
||
5771000
|
trusted library allocation
|
page read and write
|
||
59A1000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
1F87F76A000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
40DF000
|
stack
|
page read and write
|
||
2AE7FE9E000
|
trusted library allocation
|
page read and write
|
||
2AE063AC000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
16AC000
|
heap
|
page read and write
|
||
1F87F71A000
|
trusted library allocation
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
1F80E269000
|
trusted library allocation
|
page read and write
|
||
1F87FFA4000
|
trusted library allocation
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
423F000
|
stack
|
page read and write
|
||
1282000
|
heap
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
C41F7FE000
|
stack
|
page read and write
|
||
57D5000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
2AE0915A000
|
trusted library allocation
|
page read and write
|
||
1F87F5FD000
|
trusted library allocation
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
59A3000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
trusted library allocation
|
page read and write
|
||
5F14000
|
trusted library allocation
|
page read and write
|
||
2AE095EE000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
360E000
|
stack
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
5CA4000
|
trusted library allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
122B000
|
heap
|
page read and write
|
||
2AE0D29A000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
13B0000
|
direct allocation
|
page read and write
|
||
2AE0882B000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2AE091E1000
|
trusted library allocation
|
page read and write
|
||
BDB000
|
unkown
|
page execute and read and write
|
||
63F8000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1F80F05E000
|
trusted library allocation
|
page read and write
|
||
494000
|
unkown
|
page readonly
|
||
731000
|
heap
|
page read and write
|
||
5F19000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
659D000
|
trusted library allocation
|
page read and write
|
||
4A6000
|
unkown
|
page execute and read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
5FC8000
|
trusted library allocation
|
page read and write
|
||
63F1000
|
trusted library allocation
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
2AE091FD000
|
trusted library allocation
|
page read and write
|
||
B70000
|
unkown
|
page read and write
|
||
2AE095CA000
|
trusted library allocation
|
page read and write
|
||
5223000
|
trusted library allocation
|
page read and write
|
||
1550000
|
direct allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4BB5000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
1D10E000
|
stack
|
page read and write
|
||
527D000
|
trusted library allocation
|
page read and write
|
||
3D8E000
|
stack
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
3C3E000
|
stack
|
page read and write
|
||
2AE095E6000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
229087E0000
|
trusted library section
|
page read and write
|
||
5A0C000
|
trusted library allocation
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
1697000
|
heap
|
page read and write
|
||
1F80AE9E000
|
trusted library allocation
|
page read and write
|
||
63F5000
|
trusted library allocation
|
page read and write
|
||
5225000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
521B000
|
trusted library allocation
|
page read and write
|
||
5A4F000
|
trusted library allocation
|
page read and write
|
||
2AE7FEDF000
|
trusted library allocation
|
page read and write
|
||
9DA000
|
stack
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
6250000
|
trusted library allocation
|
page read and write
|
||
388E000
|
stack
|
page read and write
|
||
22908A03000
|
trusted library allocation
|
page read and write
|
||
1F80D7B9000
|
trusted library allocation
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
49BF000
|
stack
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
5FA5000
|
trusted library allocation
|
page read and write
|
||
527D000
|
trusted library allocation
|
page read and write
|
||
BD9000
|
unkown
|
page write copy
|
||
397F000
|
stack
|
page read and write
|
||
229087D6000
|
unkown
|
page execute read
|
||
53E0000
|
direct allocation
|
page execute and read and write
|
||
1F87FFE2000
|
trusted library allocation
|
page read and write
|
||
D27000
|
unkown
|
page execute and read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
103A000
|
unkown
|
page execute and write copy
|
||
5F31000
|
trusted library allocation
|
page read and write
|
||
63F1000
|
trusted library allocation
|
page read and write
|
||
58C000
|
unkown
|
page execute and write copy
|
||
5240000
|
heap
|
page execute and read and write
|
||
1550000
|
direct allocation
|
page read and write
|
||
43EF000
|
stack
|
page read and write
|
||
48C0000
|
direct allocation
|
page execute and read and write
|
||
1DCD7C49000
|
heap
|
page read and write
|
||
606F000
|
trusted library allocation
|
page read and write
|
||
5570000
|
direct allocation
|
page execute and read and write
|
||
6375000
|
trusted library allocation
|
page read and write
|
||
2AE091F7000
|
trusted library allocation
|
page read and write
|
||
63F1000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
521B000
|
trusted library allocation
|
page read and write
|
||
63F5000
|
trusted library allocation
|
page read and write
|
||
1125000
|
heap
|
page read and write
|
||
164F000
|
stack
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
1F80AE84000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
6077000
|
trusted library allocation
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
1F8160CF000
|
trusted library allocation
|
page read and write
|
||
1F80E9E0000
|
trusted library allocation
|
page read and write
|
||
5245000
|
trusted library allocation
|
page read and write
|
||
63F2000
|
trusted library allocation
|
page read and write
|
||
229082E9000
|
trusted library allocation
|
page read and write
|
||
1F87E8F1000
|
trusted library allocation
|
page read and write
|
||
1F8160C9000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
3D1E000
|
stack
|
page read and write
|
||
13B0000
|
direct allocation
|
page read and write
|
||
22908286000
|
trusted library allocation
|
page read and write
|
||
1F87F758000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
27F6732E000
|
trusted library allocation
|
page read and write
|
||
5F85000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
1A08B620000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
186E000
|
stack
|
page read and write
|
||
830000
|
unkown
|
page readonly
|
||
6242000
|
trusted library allocation
|
page read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
27F6730D000
|
trusted library allocation
|
page read and write
|
||
522C000
|
trusted library allocation
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
69AC000
|
stack
|
page read and write
|
||
6249000
|
trusted library allocation
|
page read and write
|
||
38FF000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1A08D1AF000
|
heap
|
page read and write
|
||
2AE0915A000
|
trusted library allocation
|
page read and write
|
||
6071000
|
trusted library allocation
|
page read and write
|
||
5261000
|
trusted library allocation
|
page read and write
|
||
5792000
|
trusted library allocation
|
page read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
5211000
|
trusted library allocation
|
page read and write
|
||
2AE0AA00000
|
trusted library allocation
|
page read and write
|
||
2AE0C8CD000
|
trusted library allocation
|
page read and write
|
||
1F810BD1000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
22908E40000
|
heap
|
page read and write
|
||
1F80D5F2000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
2AE09520000
|
trusted library allocation
|
page read and write
|
||
321E000
|
stack
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
2AE091F0000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
56BF000
|
trusted library allocation
|
page read and write
|
||
55B8000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
5FB1000
|
trusted library allocation
|
page read and write
|
||
1694000
|
heap
|
page read and write
|
||
1F87E8FD000
|
trusted library allocation
|
page read and write
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
316000
|
unkown
|
page execute and write copy
|
||
5EE1000
|
trusted library allocation
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
45FF000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
22907FE0000
|
heap
|
page read and write
|
||
5F7D000
|
trusted library allocation
|
page read and write
|
||
5FCD000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
59A7000
|
trusted library allocation
|
page read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
5F6F000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
2AE0909A000
|
trusted library allocation
|
page read and write
|
||
1F816093000
|
trusted library allocation
|
page read and write
|
||
15B9000
|
heap
|
page read and write
|
||
A50000
|
direct allocation
|
page read and write
|
||
408D000
|
stack
|
page read and write
|
||
4680000
|
heap
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
1B3AC000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
DDE000
|
stack
|
page read and write
|
||
524A000
|
trusted library allocation
|
page read and write
|
||
2AE05175000
|
trusted library allocation
|
page read and write
|
||
1F87F7CE000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
6071000
|
trusted library allocation
|
page read and write
|
||
5080000
|
direct allocation
|
page execute and read and write
|
||
48C000
|
unkown
|
page write copy
|
||
4EF1000
|
heap
|
page read and write
|
||
2AE095D4000
|
trusted library allocation
|
page read and write
|
||
59C0000
|
trusted library allocation
|
page read and write
|
||
2290829E000
|
trusted library allocation
|
page read and write
|
||
302000
|
unkown
|
page execute and read and write
|
||
4F91000
|
heap
|
page read and write
|
||
6ED69FF000
|
stack
|
page read and write
|
||
122E000
|
stack
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
CFA000
|
unkown
|
page execute and read and write
|
||
4681000
|
heap
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
5261000
|
trusted library allocation
|
page read and write
|
||
4730000
|
remote allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
2AE0900F000
|
trusted library allocation
|
page read and write
|
||
1F80B1E4000
|
trusted library allocation
|
page read and write
|
||
310E000
|
stack
|
page read and write
|
||
22908FAE000
|
heap
|
page read and write
|
||
517F000
|
stack
|
page read and write
|
||
5F95000
|
trusted library allocation
|
page read and write
|
||
1F810B8B000
|
trusted library allocation
|
page read and write
|
||
2190000
|
trusted library allocation
|
page read and write
|
||
B65000
|
unkown
|
page execute and write copy
|
||
4D81000
|
heap
|
page read and write
|
||
1F810B6A000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
912000
|
unkown
|
page execute and read and write
|
||
2AE095F4000
|
trusted library allocation
|
page read and write
|
||
764E000
|
stack
|
page read and write
|
||
5F97000
|
trusted library allocation
|
page read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
1F810B9D000
|
trusted library allocation
|
page read and write
|
||
63F2000
|
trusted library allocation
|
page read and write
|
||
C18000
|
unkown
|
page execute and read and write
|
||
58A000
|
unkown
|
page execute and write copy
|
||
B00000
|
direct allocation
|
page read and write
|
||
654E000
|
trusted library allocation
|
page read and write
|
||
1F80E6E3000
|
trusted library allocation
|
page read and write
|
||
2AE09AFA000
|
trusted library allocation
|
page read and write
|
||
471F000
|
stack
|
page read and write
|
||
5A0A000
|
trusted library allocation
|
page read and write
|
||
1F80AEDE000
|
trusted library allocation
|
page read and write
|
||
2AE7FEC1000
|
trusted library allocation
|
page read and write
|
||
3D8E000
|
stack
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
3A9E000
|
stack
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
16B4000
|
heap
|
page read and write
|
||
5FA7000
|
trusted library allocation
|
page read and write
|
||
5FE4000
|
trusted library allocation
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
5319000
|
trusted library allocation
|
page read and write
|
||
1F816090000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
7890000
|
heap
|
page read and write
|
||
1F80E4B2000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
59E7000
|
trusted library allocation
|
page read and write
|
||
63F6000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
2AE7FE90000
|
trusted library allocation
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
2AE7FCD0000
|
heap
|
page read and write
|
||
EDC000
|
unkown
|
page execute and write copy
|
||
4EF1000
|
heap
|
page read and write
|
||
5D49000
|
trusted library allocation
|
page read and write
|
||
64B2000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
523A000
|
trusted library allocation
|
page read and write
|
||
799000
|
stack
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
5211000
|
trusted library allocation
|
page read and write
|
||
229088E0000
|
heap
|
page read and write
|
||
59BC000
|
trusted library allocation
|
page read and write
|
||
5D1000
|
unkown
|
page execute and write copy
|
||
5359000
|
trusted library allocation
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
63FC000
|
trusted library allocation
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
229083D6000
|
heap
|
page read and write
|
||
52EA000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
4E60000
|
direct allocation
|
page execute and read and write
|
||
1F810AAF000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
1F81104D000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
1F80D9EB000
|
trusted library allocation
|
page read and write
|
||
FE8000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
3CAE000
|
stack
|
page read and write
|
||
5A07000
|
trusted library allocation
|
page read and write
|
||
2AE095F8000
|
trusted library allocation
|
page read and write
|
||
1F80E959000
|
trusted library allocation
|
page read and write
|
||
FFB000
|
unkown
|
page write copy
|
||
1F80E259000
|
trusted library allocation
|
page read and write
|
||
63F5000
|
trusted library allocation
|
page read and write
|
||
B79000
|
unkown
|
page write copy
|
||
6D7B000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
2190000
|
trusted library allocation
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
6503000
|
trusted library allocation
|
page read and write
|
||
1D7BE000
|
stack
|
page read and write
|
||
5F6A000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
7A7000
|
heap
|
page read and write
|
||
2AE05117000
|
trusted library allocation
|
page read and write
|
||
10AE000
|
heap
|
page read and write
|
||
1A08D1BE000
|
heap
|
page read and write
|
||
62EF000
|
trusted library allocation
|
page read and write
|
||
13CA000
|
heap
|
page read and write
|
||
4BCA000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
11FD000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
1038000
|
unkown
|
page execute and read and write
|
||
4B11000
|
heap
|
page read and write
|
||
27F66E62000
|
unclassified section
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4730000
|
remote allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
1F80E9CE000
|
trusted library allocation
|
page read and write
|
||
527A000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
BDC000
|
unkown
|
page execute and write copy
|
||
493000
|
unkown
|
page execute and read and write
|
||
5252000
|
trusted library allocation
|
page read and write
|
||
3F2E000
|
stack
|
page read and write
|
||
410F000
|
stack
|
page read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
5AB8000
|
trusted library allocation
|
page read and write
|
||
5F8B000
|
trusted library allocation
|
page read and write
|
||
5EF8000
|
trusted library allocation
|
page read and write
|
||
607F000
|
trusted library allocation
|
page read and write
|
||
524D000
|
trusted library allocation
|
page read and write
|
||
AAD2EAC000
|
stack
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
2DDF000
|
stack
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
3E1F000
|
stack
|
page read and write
|
||
59C2000
|
trusted library allocation
|
page read and write
|
||
4F5000
|
stack
|
page read and write
|
||
525E000
|
trusted library allocation
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
D9E000
|
heap
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
5CA6000
|
trusted library allocation
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
7B1000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
59E7000
|
trusted library allocation
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
1F8160DB000
|
trusted library allocation
|
page read and write
|
||
5245000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
2AE09137000
|
trusted library allocation
|
page read and write
|
||
521B000
|
trusted library allocation
|
page read and write
|
||
2AE08F79000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
6960000
|
heap
|
page read and write
|
||
5420000
|
direct allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
490E000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
4ED1000
|
heap
|
page read and write
|
||
736000
|
heap
|
page read and write
|
||
1F80DAF4000
|
trusted library allocation
|
page read and write
|
||
1F810BE9000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
29BF000
|
stack
|
page read and write
|
||
1F810BD6000
|
trusted library allocation
|
page read and write
|
||
5F97000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
2AE09133000
|
trusted library allocation
|
page read and write
|
||
5030000
|
direct allocation
|
page execute and read and write
|
||
4681000
|
heap
|
page read and write
|
||
27F66DA0000
|
heap
|
page read and write
|
||
3E7F000
|
stack
|
page read and write
|
||
5F6F000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
810000
|
direct allocation
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
5FAA000
|
trusted library allocation
|
page read and write
|
||
4A7F000
|
stack
|
page read and write
|
||
1F816235000
|
trusted library allocation
|
page read and write
|
||
56B9000
|
trusted library allocation
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
57A8000
|
trusted library allocation
|
page read and write
|
||
2AE095E6000
|
trusted library allocation
|
page read and write
|
||
587E000
|
trusted library allocation
|
page read and write
|
||
1F80F0BB000
|
trusted library allocation
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
860000
|
direct allocation
|
page read and write
|
||
2F37000
|
heap
|
page read and write
|
||
38EE000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
1B16D000
|
stack
|
page read and write
|
||
512000
|
unkown
|
page execute and read and write
|
||
2AE08F63000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
2AE091D6000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
heap
|
page read and write
|
||
14C3000
|
heap
|
page read and write
|
||
533C000
|
trusted library allocation
|
page read and write
|
||
5339000
|
trusted library allocation
|
page read and write
|
||
1357000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
59D4000
|
trusted library allocation
|
page read and write
|
||
6ED61FF000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
63F9000
|
trusted library allocation
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
22908F20000
|
heap
|
page read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
508000
|
unkown
|
page execute and read and write
|
||
381E000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1F3C5BC0000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
5282000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
2AE0D249000
|
trusted library allocation
|
page read and write
|
||
AAD59FE000
|
stack
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
58B000
|
unkown
|
page execute and read and write
|
||
16D4000
|
heap
|
page read and write
|
||
4B3B000
|
stack
|
page read and write
|
||
42C1000
|
heap
|
page read and write
|
||
63F5000
|
trusted library allocation
|
page read and write
|
||
10B3000
|
heap
|
page read and write
|
||
3D7E000
|
stack
|
page read and write
|
||
522D000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
1F87F778000
|
trusted library allocation
|
page read and write
|
||
3ECE000
|
stack
|
page read and write
|
||
736000
|
heap
|
page read and write
|
||
16AB000
|
heap
|
page read and write
|
||
2AE091D6000
|
trusted library allocation
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
649E000
|
stack
|
page read and write
|
||
1F810BC4000
|
trusted library allocation
|
page read and write
|
||
2AE0889D000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1F817FFA000
|
trusted library allocation
|
page read and write
|
||
530000
|
unkown
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
229087C0000
|
trusted library allocation
|
page read and write
|
||
5221000
|
trusted library allocation
|
page read and write
|
||
5FC3000
|
trusted library allocation
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
10BE000
|
heap
|
page read and write
|
||
1375000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
FF0000
|
direct allocation
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
5255000
|
trusted library allocation
|
page read and write
|
||
2AE7FCCF000
|
heap
|
page read and write
|
||
5282000
|
trusted library allocation
|
page read and write
|
||
E7C000
|
unkown
|
page execute and read and write
|
||
1A08D1BC000
|
heap
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
531A000
|
trusted library allocation
|
page read and write
|
||
1DC000
|
stack
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
59A7000
|
trusted library allocation
|
page read and write
|
||
2DCB000
|
heap
|
page read and write
|
||
774F000
|
stack
|
page read and write
|
||
2AE09535000
|
trusted library allocation
|
page read and write
|
||
1F87FFF8000
|
trusted library allocation
|
page read and write
|
||
42C1000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
2DC7000
|
heap
|
page read and write
|
||
533F000
|
trusted library allocation
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
5753000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
1F80F086000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
362F000
|
stack
|
page read and write
|
||
738C000
|
stack
|
page read and write
|
||
2AE08F7F000
|
trusted library allocation
|
page read and write
|
||
103A000
|
unkown
|
page execute and write copy
|
||
5390000
|
direct allocation
|
page execute and read and write
|
||
56BD000
|
trusted library allocation
|
page read and write
|
||
1F87E8EB000
|
trusted library allocation
|
page read and write
|
||
2AE091D3000
|
trusted library allocation
|
page read and write
|
||
2AE09AF0000
|
trusted library allocation
|
page read and write
|
||
5F95000
|
trusted library allocation
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
E1C000
|
unkown
|
page execute and read and write
|
||
729000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
1F87FBEA000
|
trusted library allocation
|
page read and write
|
||
320F000
|
stack
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
1F815E73000
|
trusted library allocation
|
page read and write
|
||
22908EAC000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
1F80F6FE000
|
trusted library allocation
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
6528000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
11FA000
|
heap
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
E93000
|
unkown
|
page execute and read and write
|
||
2AE091DB000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
1F87F74D000
|
trusted library allocation
|
page read and write
|
||
5FA9000
|
trusted library allocation
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
860000
|
direct allocation
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
5CA7000
|
trusted library allocation
|
page read and write
|
||
A50000
|
direct allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
E11000
|
unkown
|
page execute and write copy
|
||
5265000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
1F80DA8C000
|
trusted library allocation
|
page read and write
|
||
1F810BF1000
|
trusted library allocation
|
page read and write
|
||
522D000
|
trusted library allocation
|
page read and write
|
||
22908200000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1F80D65A000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
6069000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
38AF000
|
stack
|
page read and write
|
||
2AE090F9000
|
trusted library allocation
|
page read and write
|
||
488F000
|
stack
|
page read and write
|
||
2AE7FCDC000
|
heap
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
1357000
|
heap
|
page read and write
|
||
693F000
|
stack
|
page read and write
|
||
6495000
|
trusted library allocation
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
59B7000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
2290822F000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
1F80E4AC000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1AD7E000
|
stack
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
D36000
|
unkown
|
page execute and read and write
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
1F816214000
|
trusted library allocation
|
page read and write
|
||
3EEF000
|
stack
|
page read and write
|
||
42C1000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
521F000
|
trusted library allocation
|
page read and write
|
||
39C1000
|
heap
|
page read and write
|
||
3CDF000
|
stack
|
page read and write
|
||
59D5000
|
trusted library allocation
|
page read and write
|
||
42C1000
|
heap
|
page read and write
|
||
45DF000
|
stack
|
page read and write
|
||
1F810A5D000
|
trusted library allocation
|
page read and write
|
||
1550000
|
direct allocation
|
page read and write
|
||
376F000
|
stack
|
page read and write
|
||
5FB3000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
16AB000
|
heap
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
1D06E000
|
stack
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
5F7F000
|
trusted library allocation
|
page read and write
|
||
137B000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1F87F3F8000
|
trusted library allocation
|
page read and write
|
||
6491000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
11F7000
|
heap
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
2290825C000
|
trusted library allocation
|
page read and write
|
||
1F817876000
|
trusted library allocation
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
63F5000
|
trusted library allocation
|
page read and write
|
||
485E000
|
stack
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
1222000
|
heap
|
page read and write
|
||
49F1000
|
heap
|
page read and write
|
||
27F67416000
|
trusted library allocation
|
page read and write
|
||
5340000
|
heap
|
page read and write
|
||
1F815E7B000
|
trusted library allocation
|
page read and write
|
||
7A7000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
122C000
|
heap
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
5AC8000
|
trusted library allocation
|
page read and write
|
||
B79000
|
unkown
|
page write copy
|
||
1124000
|
heap
|
page read and write
|
||
2AE089FC000
|
trusted library allocation
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
A50000
|
direct allocation
|
page read and write
|
||
63F6000
|
trusted library allocation
|
page read and write
|
||
427E000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
1F87E8E4000
|
trusted library allocation
|
page read and write
|
||
1D52F000
|
stack
|
page read and write
|
||
2AE09137000
|
trusted library allocation
|
page read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
2AE7FCDC000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
2AE091B1000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
direct allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
5F8D000
|
trusted library allocation
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
16AF000
|
heap
|
page read and write
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
140F000
|
heap
|
page read and write
|
||
2AE05126000
|
trusted library allocation
|
page read and write
|
||
860000
|
direct allocation
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
6051000
|
trusted library allocation
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
10B2000
|
unkown
|
page read and write
|
||
B5C000
|
unkown
|
page execute and write copy
|
||
1F87F3B3000
|
trusted library allocation
|
page read and write
|
||
912000
|
unkown
|
page execute and read and write
|
||
1F80DA85000
|
trusted library allocation
|
page read and write
|
||
2AE09166000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
3DEE000
|
stack
|
page read and write
|
||
1F810B9D000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
27F67000000
|
trusted library allocation
|
page read and write
|
||
5AB1000
|
trusted library allocation
|
page read and write
|
||
1F87FE6E000
|
trusted library allocation
|
page read and write
|
||
2AE09AFA000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
2A40000
|
direct allocation
|
page execute and read and write
|
||
1F80D7C3000
|
trusted library allocation
|
page read and write
|
||
63FA000
|
trusted library allocation
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
63F0000
|
trusted library allocation
|
page read and write
|
||
63F7000
|
trusted library allocation
|
page read and write
|
||
1F87F3DF000
|
trusted library allocation
|
page read and write
|
||
2AE7FCDC000
|
heap
|
page read and write
|
||
300000
|
unkown
|
page readonly
|
||
1F87F7E2000
|
trusted library allocation
|
page read and write
|
||
1D48F000
|
stack
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1F80E959000
|
trusted library allocation
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
7890000
|
heap
|
page read and write
|
||
AAD62FE000
|
unkown
|
page readonly
|
||
2AE091E9000
|
trusted library allocation
|
page read and write
|
||
2AE0517E000
|
trusted library allocation
|
page read and write
|
||
1F80E9D0000
|
trusted library allocation
|
page read and write
|
||
1415000
|
heap
|
page read and write
|
||
5245000
|
trusted library allocation
|
page read and write
|
||
30C7000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
5110000
|
direct allocation
|
page execute and read and write
|
||
4681000
|
heap
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
1D23E000
|
stack
|
page read and write
|
||
1F87F3A8000
|
trusted library allocation
|
page read and write
|
||
BBA000
|
unkown
|
page execute and write copy
|
||
7490000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
5FCA000
|
trusted library allocation
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
652C000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
5440000
|
direct allocation
|
page execute and read and write
|
||
2AE0916F000
|
trusted library allocation
|
page read and write
|
||
63FA000
|
trusted library allocation
|
page read and write
|
||
1354000
|
heap
|
page read and write
|
||
22907ED0000
|
unclassified section
|
page readonly
|
||
120E000
|
heap
|
page read and write
|
||
522A000
|
trusted library allocation
|
page read and write
|
||
1D20F000
|
stack
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
2AE0D283000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
59C9000
|
trusted library allocation
|
page read and write
|
||
63F4000
|
trusted library allocation
|
page read and write
|
||
2AE09185000
|
trusted library allocation
|
page read and write
|
||
1F87F676000
|
trusted library allocation
|
page read and write
|
||
2AE0915A000
|
trusted library allocation
|
page read and write
|
||
121C000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
794000
|
heap
|
page read and write
|
||
1F80AEF7000
|
trusted library allocation
|
page read and write
|
||
522E000
|
trusted library allocation
|
page read and write
|
||
5321000
|
trusted library allocation
|
page read and write
|
||
1F810A5D000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
5F8B000
|
trusted library allocation
|
page read and write
|
||
45C000
|
unkown
|
page readonly
|
||
2AE0B7FD000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
4C4F000
|
stack
|
page read and write
|
||
5420000
|
direct allocation
|
page execute and read and write
|
||
59CD000
|
trusted library allocation
|
page read and write
|
||
1F87F398000
|
trusted library allocation
|
page read and write
|
||
59A6000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
4FE0000
|
direct allocation
|
page execute and read and write
|
||
22908275000
|
trusted library allocation
|
page read and write
|
||
810000
|
direct allocation
|
page read and write
|
||
5410000
|
remote allocation
|
page read and write
|
||
3180000
|
direct allocation
|
page read and write
|
||
2AE7FEA7000
|
trusted library allocation
|
page read and write
|
||
42C1000
|
heap
|
page read and write
|
||
1F87F7A4000
|
trusted library allocation
|
page read and write
|
||
AFC000
|
stack
|
page read and write
|
||
2AE062EE000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
5F97000
|
trusted library allocation
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
2AE0B7C5000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
428E000
|
stack
|
page read and write
|
||
59C3000
|
trusted library allocation
|
page read and write
|
||
2AE091D6000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
6B2000
|
unkown
|
page execute and read and write
|
||
2AE08833000
|
trusted library allocation
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
8D20000
|
heap
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
E4C000
|
unkown
|
page execute and read and write
|
||
5517000
|
trusted library allocation
|
page read and write
|
||
3C1000
|
unkown
|
page execute read
|
||
319F000
|
stack
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
1F80AEE8000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
1F8160C0000
|
trusted library allocation
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
direct allocation
|
page execute and read and write
|
||
41FE000
|
stack
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
609B000
|
trusted library allocation
|
page read and write
|
||
1038000
|
unkown
|
page execute and read and write
|
||
443E000
|
stack
|
page read and write
|
||
421F000
|
stack
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
1F80E9A7000
|
trusted library allocation
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
128A000
|
heap
|
page read and write
|
||
57B4000
|
trusted library allocation
|
page read and write
|
||
59C3000
|
trusted library allocation
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
2AE0D2F9000
|
trusted library allocation
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
6051000
|
trusted library allocation
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
A61000
|
unkown
|
page execute and write copy
|
||
2A20000
|
direct allocation
|
page read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
630B000
|
trusted library allocation
|
page read and write
|
||
5AE0000
|
trusted library allocation
|
page read and write
|
||
1F80E967000
|
trusted library allocation
|
page read and write
|
||
D37000
|
unkown
|
page execute and write copy
|
||
4EF1000
|
heap
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
2AE091F0000
|
trusted library allocation
|
page read and write
|
||
5F78000
|
trusted library allocation
|
page read and write
|
||
1F87F390000
|
trusted library allocation
|
page read and write
|
||
2DBE000
|
stack
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
63F5000
|
trusted library allocation
|
page read and write
|
||
63BD000
|
trusted library allocation
|
page read and write
|
||
1653000
|
heap
|
page read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
27F67381000
|
trusted library allocation
|
page read and write
|
||
78F000
|
heap
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
5344000
|
trusted library allocation
|
page read and write
|
||
57EB000
|
trusted library allocation
|
page read and write
|
||
5ACB000
|
trusted library allocation
|
page read and write
|
||
2AE0887A000
|
trusted library allocation
|
page read and write
|
||
4D8F000
|
stack
|
page read and write
|
||
11FE000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
1218000
|
heap
|
page read and write
|
||
16AD000
|
heap
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
BD9000
|
unkown
|
page write copy
|
||
64D3000
|
trusted library allocation
|
page read and write
|
||
5E11000
|
trusted library allocation
|
page read and write
|
||
160F000
|
heap
|
page read and write
|
||
5FBD000
|
trusted library allocation
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
1F80E9A6000
|
trusted library allocation
|
page read and write
|
||
6279000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1F80E6F6000
|
trusted library allocation
|
page read and write
|
||
5511000
|
trusted library allocation
|
page read and write
|
||
64AC000
|
trusted library allocation
|
page read and write
|
||
1F80D763000
|
trusted library allocation
|
page read and write
|
||
5F6F000
|
trusted library allocation
|
page read and write
|
||
22908210000
|
trusted library allocation
|
page read and write
|
||
1550000
|
direct allocation
|
page read and write
|
||
5000000
|
heap
|
page read and write
|
||
1F80F0A0000
|
trusted library allocation
|
page read and write
|
||
1CE2F000
|
stack
|
page read and write
|
||
810000
|
direct allocation
|
page read and write
|
||
187F000
|
stack
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
3B64000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
59A5000
|
trusted library allocation
|
page read and write
|
||
C41E7D8000
|
stack
|
page read and write
|
||
5F6B000
|
trusted library allocation
|
page read and write
|
||
51E9000
|
trusted library allocation
|
page read and write
|
||
1F3C5A80000
|
heap
|
page read and write
|
||
1F87F4A3000
|
trusted library allocation
|
page read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
5FCF000
|
trusted library allocation
|
page read and write
|
||
1218000
|
heap
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
59BF000
|
trusted library allocation
|
page read and write
|
||
5F43000
|
trusted library allocation
|
page read and write
|
||
AAD39D8000
|
stack
|
page read and write
|
||
1F810B96000
|
trusted library allocation
|
page read and write
|
||
27F67410000
|
trusted library allocation
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
2AE0D2F7000
|
trusted library allocation
|
page read and write
|
||
788E000
|
heap
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
1124000
|
heap
|
page read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
1F87E8F4000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
59A4000
|
trusted library allocation
|
page read and write
|
||
1088000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
39C0000
|
heap
|
page read and write
|
||
27F66DC0000
|
heap
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
5F79000
|
trusted library allocation
|
page read and write
|
||
D36000
|
unkown
|
page execute and write copy
|
||
64AF000
|
trusted library allocation
|
page read and write
|
||
521B000
|
trusted library allocation
|
page read and write
|
||
4DB000
|
unkown
|
page execute and read and write
|
||
64DA000
|
trusted library allocation
|
page read and write
|
||
1F8160C6000
|
trusted library allocation
|
page read and write
|
||
22908E6E000
|
heap
|
page read and write
|
||
CFE000
|
stack
|
page read and write
|
||
1DCD7F0A000
|
trusted library allocation
|
page read and write
|
||
468F000
|
stack
|
page read and write
|
||
14C3000
|
heap
|
page read and write
|
||
1F80F09B000
|
trusted library allocation
|
page read and write
|
||
39CE000
|
stack
|
page read and write
|
||
4A0E000
|
stack
|
page read and write
|
||
5F5F000
|
trusted library allocation
|
page read and write
|
||
27F6740C000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
5110000
|
trusted library allocation
|
page read and write
|
||
1F87F77D000
|
trusted library allocation
|
page read and write
|
||
5328000
|
trusted library allocation
|
page read and write
|
||
2AE0B7EB000
|
trusted library allocation
|
page read and write
|
||
7B1000
|
heap
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
4E70000
|
remote allocation
|
page read and write
|
||
14BE000
|
stack
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
5275000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
474F000
|
stack
|
page read and write
|
||
1F87F5B7000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
30A000
|
unkown
|
page execute and read and write
|
||
5350000
|
direct allocation
|
page read and write
|
||
16AA000
|
heap
|
page read and write
|
||
1F810BF3000
|
trusted library allocation
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
6FB000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
B65000
|
unkown
|
page execute and write copy
|
||
F54000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
502000
|
unkown
|
page execute and write copy
|
||
466F000
|
stack
|
page read and write
|
||
593000
|
unkown
|
page execute and write copy
|
||
3F7E000
|
stack
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
5F74000
|
trusted library allocation
|
page read and write
|
||
59B7000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
2AE091E1000
|
trusted library allocation
|
page read and write
|
||
2AE091F7000
|
trusted library allocation
|
page read and write
|
||
480E000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
5AEA000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
7AB000
|
heap
|
page read and write
|
||
370F000
|
stack
|
page read and write
|
||
7880000
|
heap
|
page read and write
|
||
1F8116FD000
|
trusted library allocation
|
page read and write
|
||
1D16F000
|
stack
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
487000
|
unkown
|
page execute and read and write
|
||
16D4000
|
heap
|
page read and write
|
||
27F672D6000
|
heap
|
page read and write
|
||
59CD000
|
trusted library allocation
|
page read and write
|
||
5272000
|
trusted library allocation
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
63F4000
|
trusted library allocation
|
page read and write
|
||
5275000
|
trusted library allocation
|
page read and write
|
||
1F87F411000
|
trusted library allocation
|
page read and write
|
||
22908080000
|
trusted library allocation
|
page read and write
|
||
1F80D652000
|
trusted library allocation
|
page read and write
|
||
1F80E986000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
C42003E000
|
unkown
|
page readonly
|
||
FEE000
|
unkown
|
page readonly
|
||
526D000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
1F810BC6000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
7B7000
|
heap
|
page read and write
|
||
27F66E20000
|
heap
|
page read and write
|
||
1F815E80000
|
trusted library allocation
|
page read and write
|
||
CFA000
|
unkown
|
page execute and read and write
|
||
4AFF000
|
stack
|
page read and write
|
||
2AE7FCCF000
|
heap
|
page read and write
|
||
1F87F4DA000
|
trusted library allocation
|
page read and write
|
||
59CF000
|
trusted library allocation
|
page read and write
|
||
1F87FBF0000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
136C000
|
heap
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
15C0000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
10AC000
|
heap
|
page read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
64C7000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
49F1000
|
heap
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
1222000
|
heap
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
64E2000
|
trusted library allocation
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
7B8000
|
heap
|
page read and write
|
||
1F810AB6000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
12C4000
|
heap
|
page read and write
|
||
56B5000
|
trusted library allocation
|
page read and write
|
||
5783000
|
trusted library allocation
|
page read and write
|
||
5791000
|
trusted library allocation
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
449E000
|
stack
|
page read and write
|
||
188E3FC000
|
stack
|
page read and write
|
||
2AE09AF8000
|
trusted library allocation
|
page read and write
|
||
5E47000
|
trusted library allocation
|
page read and write
|
||
22908F31000
|
heap
|
page read and write
|
||
65DA000
|
trusted library allocation
|
page read and write
|
||
11CD000
|
stack
|
page read and write
|
||
1A08B5D0000
|
heap
|
page read and write
|
||
1B26E000
|
stack
|
page read and write
|
||
5330000
|
direct allocation
|
page execute and read and write
|
||
1F87F4D7000
|
trusted library allocation
|
page read and write
|
||
34EF000
|
stack
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2AE091F7000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
2AE7FCD0000
|
heap
|
page read and write
|
||
810000
|
direct allocation
|
page read and write
|
||
5F2A000
|
trusted library allocation
|
page read and write
|
||
385E000
|
stack
|
page read and write
|
||
5364000
|
trusted library allocation
|
page read and write
|
||
120A000
|
heap
|
page read and write
|
||
2AE0B7F3000
|
trusted library allocation
|
page read and write
|
||
27F67312000
|
trusted library allocation
|
page read and write
|
||
229083D0000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
FE6000
|
heap
|
page read and write
|
||
1F80E4B5000
|
trusted library allocation
|
page read and write
|
||
5180000
|
trusted library allocation
|
page execute and read and write
|
||
16AD000
|
heap
|
page read and write
|
||
57AD000
|
trusted library allocation
|
page read and write
|
||
1A08B900000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
22908F26000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
2AE08833000
|
trusted library allocation
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
27F673B8000
|
trusted library allocation
|
page read and write
|
||
490F000
|
stack
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
5252000
|
trusted library allocation
|
page read and write
|
||
788E000
|
stack
|
page read and write
|
||
5785000
|
trusted library allocation
|
page read and write
|
||
AC2000
|
unkown
|
page execute and read and write
|
||
4B11000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
2AE09137000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
1F87FCF4000
|
trusted library allocation
|
page read and write
|
||
5FA7000
|
trusted library allocation
|
page read and write
|
||
2AE095F8000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
5225000
|
trusted library allocation
|
page read and write
|
||
5A02000
|
trusted library allocation
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
22908F62000
|
heap
|
page read and write
|
||
1F80D9C8000
|
trusted library allocation
|
page read and write
|
||
229082C7000
|
trusted library allocation
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
4E20000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page execute and read and write
|
||
3DBE000
|
stack
|
page read and write
|
||
6C4000
|
heap
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
F54000
|
heap
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
5FA1000
|
trusted library allocation
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
5318000
|
trusted library allocation
|
page read and write
|
||
10B6000
|
heap
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
56BE000
|
trusted library allocation
|
page read and write
|
||
5120000
|
direct allocation
|
page execute and read and write
|
||
1F810BC8000
|
trusted library allocation
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
155E000
|
stack
|
page read and write
|
||
1A08D1B7000
|
heap
|
page read and write
|
||
2AE090F9000
|
trusted library allocation
|
page read and write
|
||
1F87F3C8000
|
trusted library allocation
|
page read and write
|
||
59E7000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
58B5000
|
trusted library allocation
|
page read and write
|
||
2AE089D2000
|
trusted library allocation
|
page read and write
|
||
7B1000
|
heap
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
5F6F000
|
trusted library allocation
|
page read and write
|
||
1F817897000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
2AE7FEA2000
|
trusted library allocation
|
page read and write
|
||
22908072000
|
unclassified section
|
page read and write
|
||
5F92000
|
trusted library allocation
|
page read and write
|
||
2AE09176000
|
trusted library allocation
|
page read and write
|
||
74A0000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
27F673A3000
|
trusted library allocation
|
page read and write
|
||
1F87FC99000
|
trusted library allocation
|
page read and write
|
||
7AB000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
592E000
|
trusted library allocation
|
page read and write
|
||
49F1000
|
heap
|
page read and write
|
||
524D000
|
trusted library allocation
|
page read and write
|
||
1222000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
1550000
|
direct allocation
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
E93000
|
unkown
|
page execute and write copy
|
||
2AE08F73000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
493F000
|
stack
|
page read and write
|
||
399E000
|
stack
|
page read and write
|
||
683E000
|
stack
|
page read and write
|
||
A60000
|
unkown
|
page readonly
|
||
1F80F0AA000
|
trusted library allocation
|
page read and write
|
||
522A000
|
trusted library allocation
|
page read and write
|
||
5276000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
direct allocation
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
2AE7FCD0000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
B71000
|
unkown
|
page execute and write copy
|
||
30A0000
|
direct allocation
|
page read and write
|
||
2AE0918E000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
2AE09138000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
direct allocation
|
page read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5AA5000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
407E000
|
stack
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
78F000
|
heap
|
page read and write
|
||
2AE08818000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
1AEBE000
|
stack
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
ACB000
|
unkown
|
page execute and read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
453F000
|
stack
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
2AE09075000
|
trusted library allocation
|
page read and write
|
||
2AE09075000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4A4F000
|
stack
|
page read and write
|
||
27F6737A000
|
trusted library allocation
|
page read and write
|
||
16A2000
|
heap
|
page read and write
|
||
59AD000
|
trusted library allocation
|
page read and write
|
||
49CF000
|
stack
|
page read and write
|
||
5F74000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
4D81000
|
heap
|
page read and write
|
||
14C7000
|
heap
|
page read and write
|
||
468000
|
unkown
|
page execute and write copy
|
||
13B0000
|
direct allocation
|
page read and write
|
||
2AE08FA8000
|
trusted library allocation
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
6301000
|
trusted library allocation
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
4ED1000
|
heap
|
page read and write
|
||
5D0000
|
unkown
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
4EA000
|
unkown
|
page execute and read and write
|
||
65B8000
|
trusted library allocation
|
page read and write
|
||
5E44000
|
trusted library allocation
|
page read and write
|
||
590F000
|
trusted library allocation
|
page read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
1550000
|
direct allocation
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
5130000
|
direct allocation
|
page execute and read and write
|
||
17DF000
|
stack
|
page read and write
|
||
48C0000
|
direct allocation
|
page execute and read and write
|
||
22908F99000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
AAD51FE000
|
unkown
|
page readonly
|
||
44CF000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
AAD2F6B000
|
stack
|
page read and write
|
||
124E000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
300000
|
unkown
|
page read and write
|
||
15EE000
|
heap
|
page read and write
|
||
11FE000
|
heap
|
page read and write
|
||
27F66ED0000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
5F9C000
|
trusted library allocation
|
page read and write
|
||
D36000
|
unkown
|
page execute and write copy
|
||
522A000
|
trusted library allocation
|
page read and write
|
||
55E8000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
2AE0511A000
|
trusted library allocation
|
page read and write
|
||
2CDF000
|
stack
|
page read and write
|
||
30CF000
|
stack
|
page read and write
|
||
1081000
|
unkown
|
page read and write
|
||
5EED000
|
trusted library allocation
|
page read and write
|
||
52FF000
|
trusted library allocation
|
page read and write
|
||
5246000
|
trusted library allocation
|
page read and write
|
||
4A5000
|
unkown
|
page execute and write copy
|
||
5F76000
|
trusted library allocation
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
5EE8000
|
trusted library allocation
|
page read and write
|
||
1D57D000
|
stack
|
page read and write
|
||
1D3EE000
|
stack
|
page read and write
|
||
13B0000
|
direct allocation
|
page read and write
|
||
57CA000
|
trusted library allocation
|
page read and write
|
||
660D000
|
trusted library allocation
|
page read and write
|
||
395E000
|
stack
|
page read and write
|
||
51B0000
|
direct allocation
|
page read and write
|
||
36DF000
|
stack
|
page read and write
|
||
22908810000
|
trusted library section
|
page read and write
|
||
14CD000
|
heap
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
7AB000
|
heap
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
4C3000
|
unkown
|
page execute and write copy
|
||
452F000
|
stack
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
14C8000
|
heap
|
page read and write
|
||
807000
|
heap
|
page read and write
|
||
1227000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
1F810AC0000
|
trusted library allocation
|
page read and write
|
||
6291000
|
trusted library allocation
|
page read and write
|
||
5510000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
57BD000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
6057000
|
trusted library allocation
|
page read and write
|
||
4860000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
163C000
|
heap
|
page read and write
|
||
55A0000
|
direct allocation
|
page execute and read and write
|
||
2AE7FCD0000
|
heap
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
1F80F041000
|
trusted library allocation
|
page read and write
|
||
5FC3000
|
trusted library allocation
|
page read and write
|
||
1A08B658000
|
heap
|
page read and write
|
||
5FA1000
|
trusted library allocation
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
5ACD000
|
trusted library allocation
|
page read and write
|
||
5F92000
|
trusted library allocation
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
1DCD7C4F000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
5420000
|
direct allocation
|
page read and write
|
||
1F810AFA000
|
trusted library allocation
|
page read and write
|
||
1F80AEA6000
|
trusted library allocation
|
page read and write
|
||
2AE09052000
|
trusted library allocation
|
page read and write
|
||
1F8110F3000
|
trusted library allocation
|
page read and write
|
||
22908E44000
|
heap
|
page read and write
|
||
2AE7FEC7000
|
trusted library allocation
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
6081000
|
trusted library allocation
|
page read and write
|
||
5253000
|
trusted library allocation
|
page read and write
|
||
14DF000
|
heap
|
page read and write
|
||
5E48000
|
trusted library allocation
|
page read and write
|
||
3B60000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
1F815E1C000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
22908FB8000
|
heap
|
page read and write
|
||
2D9B000
|
stack
|
page read and write
|
||
5FA5000
|
trusted library allocation
|
page read and write
|
||
14DF000
|
heap
|
page read and write
|
||
5F99000
|
trusted library allocation
|
page read and write
|
||
62E9000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
direct allocation
|
page read and write
|
||
108D000
|
unkown
|
page read and write
|
||
578B000
|
trusted library allocation
|
page read and write
|
||
BB6000
|
unkown
|
page write copy
|
||
2DB0000
|
direct allocation
|
page read and write
|
||
522F000
|
trusted library allocation
|
page read and write
|
||
524D000
|
trusted library allocation
|
page read and write
|
||
830000
|
unkown
|
page read and write
|
||
860000
|
direct allocation
|
page read and write
|
||
5339000
|
trusted library allocation
|
page read and write
|
||
1F80D9C2000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
406E000
|
stack
|
page read and write
|
||
1617000
|
heap
|
page read and write
|
||
55C000
|
stack
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
38CF000
|
stack
|
page read and write
|
||
1F80B1AE000
|
trusted library allocation
|
page read and write
|
||
27F67372000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
229080A0000
|
heap
|
page read and write
|
||
B71000
|
unkown
|
page execute and write copy
|
||
27F67403000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
D37000
|
unkown
|
page execute and write copy
|
||
63F4000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
2AE091FD000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
466000
|
unkown
|
page execute and read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
5A4000
|
unkown
|
page execute and write copy
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
82E000
|
unkown
|
page execute and read and write
|
||
2AE089CF000
|
trusted library allocation
|
page read and write
|
||
4B0F000
|
stack
|
page read and write
|
||
4ECF000
|
stack
|
page read and write
|
||
5CD9000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
B5C000
|
unkown
|
page execute and write copy
|
||
22908E9C000
|
heap
|
page read and write
|
||
648F000
|
trusted library allocation
|
page read and write
|
||
5AA7000
|
trusted library allocation
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
6ED59FF000
|
stack
|
page read and write
|
||
C4230BD000
|
stack
|
page read and write
|
||
1DCD7BC0000
|
heap
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
2DC7000
|
heap
|
page read and write
|
||
2AE11780000
|
trusted library allocation
|
page read and write
|
||
27F66E2A000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
59A7000
|
trusted library allocation
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
5E46000
|
trusted library allocation
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
649A000
|
trusted library allocation
|
page read and write
|
||
53C0000
|
direct allocation
|
page execute and read and write
|
||
1F80E6E8000
|
trusted library allocation
|
page read and write
|
||
2AE08F75000
|
trusted library allocation
|
page read and write
|
||
A50000
|
direct allocation
|
page read and write
|
||
5070000
|
direct allocation
|
page execute and read and write
|
||
7AB000
|
heap
|
page read and write
|
||
506000
|
unkown
|
page execute and write copy
|
||
44DE000
|
stack
|
page read and write
|
||
59CB000
|
trusted library allocation
|
page read and write
|
||
2AE09131000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
5510000
|
direct allocation
|
page execute and read and write
|
||
57B9000
|
trusted library allocation
|
page read and write
|
||
2AE0C8CD000
|
trusted library allocation
|
page read and write
|
||
7B1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
11FE000
|
heap
|
page read and write
|
||
1F811047000
|
trusted library allocation
|
page read and write
|
||
8ED000
|
unkown
|
page execute and read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5F8E000
|
trusted library allocation
|
page read and write
|
||
860000
|
direct allocation
|
page read and write
|
||
B71000
|
unkown
|
page execute and write copy
|
||
6058000
|
trusted library allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
1218000
|
heap
|
page read and write
|
||
1F87E8F6000
|
trusted library allocation
|
page read and write
|
||
137B000
|
heap
|
page read and write
|
||
810000
|
direct allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
2AE089EA000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1CA7F000
|
stack
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
2AE0C8D3000
|
trusted library allocation
|
page read and write
|
||
624E000
|
trusted library allocation
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
49F1000
|
heap
|
page read and write
|
||
513000
|
unkown
|
page execute and write copy
|
||
5FC5000
|
trusted library allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
27F67300000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
59BF000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
B73000
|
unkown
|
page execute and write copy
|
||
1F87E8DB000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
DEC000
|
unkown
|
page execute and read and write
|
||
449F000
|
stack
|
page read and write
|
||
122C000
|
unkown
|
page readonly
|
||
F54000
|
heap
|
page read and write
|
||
5273000
|
trusted library allocation
|
page read and write
|
||
1647000
|
heap
|
page read and write
|
||
4FDC000
|
stack
|
page read and write
|
||
1F80D63E000
|
trusted library allocation
|
page read and write
|
||
1F80E9D8000
|
trusted library allocation
|
page read and write
|
||
2AE05166000
|
trusted library allocation
|
page read and write
|
||
59CA000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
3A5F000
|
stack
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
625A000
|
trusted library allocation
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
124A000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
16B2000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
2AE09177000
|
trusted library allocation
|
page read and write
|
||
5580000
|
direct allocation
|
page execute and read and write
|
||
142D000
|
heap
|
page read and write
|
||
653F000
|
trusted library allocation
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
373E000
|
stack
|
page read and write
|
||
1219000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
5CC1000
|
trusted library allocation
|
page read and write
|
||
5000000
|
direct allocation
|
page execute and read and write
|
||
1F87FFCE000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
22908EA9000
|
heap
|
page read and write
|
||
27F67432000
|
trusted library allocation
|
page read and write
|
||
22908E83000
|
heap
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
5D79000
|
trusted library allocation
|
page read and write
|
||
1F80DA89000
|
trusted library allocation
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
349E000
|
stack
|
page read and write
|
||
BD9000
|
unkown
|
page write copy
|
||
63FC000
|
trusted library allocation
|
page read and write
|
||
48C000
|
unkown
|
page read and write
|
||
2C7E000
|
stack
|
page read and write
|
||
F65000
|
stack
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
1F815E32000
|
trusted library allocation
|
page read and write
|
||
63F4000
|
trusted library allocation
|
page read and write
|
||
1F810ABE000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
trusted library allocation
|
page read and write
|
||
606A000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
2AE0D2F1000
|
trusted library allocation
|
page read and write
|
||
5F29000
|
trusted library allocation
|
page read and write
|
||
5F98000
|
trusted library allocation
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
5AD7000
|
trusted library allocation
|
page read and write
|
||
1369000
|
heap
|
page read and write
|
||
4E80000
|
direct allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
63F6000
|
trusted library allocation
|
page read and write
|
||
524A000
|
trusted library allocation
|
page read and write
|
||
524F000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
59BA000
|
trusted library allocation
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
5255000
|
trusted library allocation
|
page read and write
|
||
5A16000
|
trusted library allocation
|
page read and write
|
||
2AE09170000
|
trusted library allocation
|
page read and write
|
||
1F810B6B000
|
trusted library allocation
|
page read and write
|
||
1209000
|
heap
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
603F000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
2DB0000
|
direct allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
2AE09158000
|
trusted library allocation
|
page read and write
|
||
1F87F381000
|
trusted library allocation
|
page read and write
|
||
657B000
|
trusted library allocation
|
page read and write
|
||
5EEA000
|
trusted library allocation
|
page read and write
|
||
431F000
|
stack
|
page read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
B70000
|
unkown
|
page readonly
|
||
AAD627E000
|
unkown
|
page readonly
|
||
4EF1000
|
heap
|
page read and write
|
||
1F810AB8000
|
trusted library allocation
|
page read and write
|
||
42C1000
|
heap
|
page read and write
|
||
1F8110FE000
|
trusted library allocation
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
1F816210000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
1DCD7F00000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
1F810AC0000
|
trusted library allocation
|
page read and write
|
||
2AE09133000
|
trusted library allocation
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
1F80AEBB000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5FC5000
|
trusted library allocation
|
page read and write
|
||
AAD61FE000
|
unkown
|
page readonly
|
||
5AD8000
|
trusted library allocation
|
page read and write
|
||
3C4E000
|
stack
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
2AE7FCD0000
|
heap
|
page read and write
|
||
1F87F5EC000
|
trusted library allocation
|
page read and write
|
||
5F85000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
5F97000
|
trusted library allocation
|
page read and write
|
||
447E000
|
stack
|
page read and write
|
||
49F1000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
22908223000
|
trusted library allocation
|
page read and write
|
||
5E4C000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
16A6000
|
heap
|
page read and write
|
||
2AE08F67000
|
trusted library allocation
|
page read and write
|
||
5219000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
810000
|
direct allocation
|
page read and write
|
||
5340000
|
direct allocation
|
page execute and read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
5262000
|
trusted library allocation
|
page read and write
|
||
63F1000
|
trusted library allocation
|
page read and write
|
||
1A08B90A000
|
trusted library allocation
|
page read and write
|
||
4E20000
|
direct allocation
|
page execute and read and write
|
||
1F80E9FA000
|
trusted library allocation
|
page read and write
|
||
64B0000
|
trusted library allocation
|
page read and write
|
||
5F3E000
|
trusted library allocation
|
page read and write
|
||
3580000
|
heap
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
4890000
|
direct allocation
|
page execute and read and write
|
||
D70000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
63FF000
|
trusted library allocation
|
page read and write
|
||
27F66E6F000
|
unclassified section
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
48C000
|
unkown
|
page write copy
|
||
4B11000
|
heap
|
page read and write
|
||
5FB0000
|
trusted library allocation
|
page read and write
|
||
AD7000
|
unkown
|
page execute and write copy
|
||
5A2000
|
unkown
|
page execute and read and write
|
||
578F000
|
trusted library allocation
|
page read and write
|
||
334F000
|
stack
|
page read and write
|
||
3280000
|
direct allocation
|
page read and write
|
||
1D1AE000
|
stack
|
page read and write
|
||
57DE000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
527E000
|
trusted library allocation
|
page read and write
|
||
400E000
|
stack
|
page read and write
|
||
5A0C000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
1F87F5AC000
|
trusted library allocation
|
page read and write
|
||
C41FFFE000
|
unkown
|
page readonly
|
||
1A08B653000
|
heap
|
page read and write
|
||
1F80F0A1000
|
trusted library allocation
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
1F80F0B2000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1354000
|
heap
|
page read and write
|
||
EDC000
|
unkown
|
page execute and write copy
|
||
411E000
|
stack
|
page read and write
|
||
63F6000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
5360000
|
direct allocation
|
page execute and read and write
|
||
1F810BB1000
|
trusted library allocation
|
page read and write
|
||
64E6000
|
trusted library allocation
|
page read and write
|
||
27F66E60000
|
unclassified section
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
63F9000
|
trusted library allocation
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
299E000
|
stack
|
page read and write
|
||
229080F0000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
F2E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
AD6000
|
unkown
|
page execute and write copy
|
||
12E1000
|
heap
|
page read and write
|
||
56B6000
|
trusted library allocation
|
page read and write
|
||
1F8160C0000
|
trusted library allocation
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
1609000
|
heap
|
page read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
64A2000
|
trusted library allocation
|
page read and write
|
||
522E000
|
trusted library allocation
|
page read and write
|
||
2AE091FD000
|
trusted library allocation
|
page read and write
|
||
22908262000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
4CAF000
|
stack
|
page read and write
|
||
649F000
|
trusted library allocation
|
page read and write
|
||
1F80E6D9000
|
trusted library allocation
|
page read and write
|
||
7A3000
|
heap
|
page read and write
|
||
64A6000
|
trusted library allocation
|
page read and write
|
||
2AE088FD000
|
trusted library allocation
|
page read and write
|
||
1DCD7E00000
|
trusted library allocation
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
DDB000
|
stack
|
page read and write
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
4E00000
|
direct allocation
|
page read and write
|
||
2AE09137000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
1F87F41F000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
59C1000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
66FF000
|
stack
|
page read and write
|
||
1F810AD5000
|
trusted library allocation
|
page read and write
|
||
1F80F0BF000
|
trusted library allocation
|
page read and write
|
||
1F810A22000
|
trusted library allocation
|
page read and write
|
||
64AD000
|
trusted library allocation
|
page read and write
|
||
5F77000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5F98000
|
trusted library allocation
|
page read and write
|
||
1F80F082000
|
trusted library allocation
|
page read and write
|
||
62E6000
|
trusted library allocation
|
page read and write
|
||
1F80F658000
|
trusted library allocation
|
page read and write
|
||
1F87F5E5000
|
trusted library allocation
|
page read and write
|
||
5311000
|
trusted library allocation
|
page read and write
|
||
1F80F65D000
|
trusted library allocation
|
page read and write
|
||
5AED000
|
trusted library allocation
|
page read and write
|
||
2AE0D2FE000
|
trusted library allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
5514000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
27F66CB0000
|
heap
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
63F8000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
remote allocation
|
page read and write
|
||
348F000
|
stack
|
page read and write
|
||
16B7000
|
heap
|
page read and write
|
||
1F87F4AD000
|
trusted library allocation
|
page read and write
|
||
22908800000
|
heap
|
page read and write
|
||
5F92000
|
trusted library allocation
|
page read and write
|
||
1550000
|
direct allocation
|
page read and write
|
||
71D000
|
heap
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
176F000
|
stack
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
530C000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
C42323E000
|
unkown
|
page readonly
|
||
6243000
|
trusted library allocation
|
page read and write
|
||
C4231BD000
|
stack
|
page read and write
|
||
14FC000
|
stack
|
page read and write
|
||
6071000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
12D8000
|
heap
|
page read and write
|
||
5838000
|
trusted library allocation
|
page read and write
|
||
5F6A000
|
trusted library allocation
|
page read and write
|
||
4D8000
|
unkown
|
page execute and read and write
|
||
3FCF000
|
stack
|
page read and write
|
||
AAD62BE000
|
stack
|
page read and write
|
||
42C1000
|
heap
|
page read and write
|
||
1D2AF000
|
stack
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
2AE088FD000
|
trusted library allocation
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
1F80F0C9000
|
trusted library allocation
|
page read and write
|
||
5F9F000
|
trusted library allocation
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
522A000
|
trusted library allocation
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
1F87F472000
|
trusted library allocation
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
6567000
|
trusted library allocation
|
page read and write
|
||
1105000
|
unkown
|
page execute and write copy
|
||
64AC000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
11FD000
|
heap
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
27F66C90000
|
unclassified section
|
page readonly
|
||
8E1000
|
unkown
|
page execute and read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
1F80AEB3000
|
trusted library allocation
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
unkown
|
page readonly
|
||
18DF000
|
stack
|
page read and write
|
||
5EE9000
|
trusted library allocation
|
page read and write
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
5E41000
|
trusted library allocation
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
48C0000
|
direct allocation
|
page execute and read and write
|
||
B60000
|
heap
|
page read and write
|
||
64AE000
|
trusted library allocation
|
page read and write
|
||
6089000
|
trusted library allocation
|
page read and write
|
||
4ED1000
|
heap
|
page read and write
|
||
2AE091B1000
|
trusted library allocation
|
page read and write
|
||
C18000
|
unkown
|
page execute and read and write
|
||
2AE7FCD0000
|
heap
|
page read and write
|
||
3EBE000
|
stack
|
page read and write
|
||
1F8160D2000
|
trusted library allocation
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
5261000
|
trusted library allocation
|
page read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
525E000
|
trusted library allocation
|
page read and write
|
||
3ADE000
|
stack
|
page read and write
|
||
1F87FEDA000
|
trusted library allocation
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
532A000
|
trusted library allocation
|
page read and write
|
||
2AE1181E000
|
trusted library allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
59CD000
|
trusted library allocation
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
2AE095EA000
|
trusted library allocation
|
page read and write
|
||
1F80E9D6000
|
trusted library allocation
|
page read and write
|
||
2AE0911E000
|
trusted library allocation
|
page read and write
|
||
2AE0D2E4000
|
trusted library allocation
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
1F87F71E000
|
trusted library allocation
|
page read and write
|
||
63F9000
|
trusted library allocation
|
page read and write
|
||
48EF000
|
stack
|
page read and write
|
||
59BF000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
6017000
|
trusted library allocation
|
page read and write
|
||
1F815E16000
|
trusted library allocation
|
page read and write
|
||
1F87E8E8000
|
trusted library allocation
|
page read and write
|
||
5A47000
|
trusted library allocation
|
page read and write
|
||
FFB000
|
unkown
|
page write copy
|
||
4D81000
|
heap
|
page read and write
|
||
7AB000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
5F72000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
1F80E9E0000
|
trusted library allocation
|
page read and write
|
||
16AD000
|
heap
|
page read and write
|
||
27F673A8000
|
trusted library allocation
|
page read and write
|
||
1F810AC9000
|
trusted library allocation
|
page read and write
|
||
3E9E000
|
stack
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
345E000
|
stack
|
page read and write
|
||
2AE11700000
|
trusted library allocation
|
page read and write
|
||
5FA7000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1662000
|
heap
|
page read and write
|
||
2AE09AF4000
|
trusted library allocation
|
page read and write
|
||
1F87FE7F000
|
trusted library allocation
|
page read and write
|
||
BB2000
|
unkown
|
page execute and write copy
|
||
5A1E000
|
trusted library allocation
|
page read and write
|
||
5222000
|
trusted library allocation
|
page read and write
|
||
D37000
|
unkown
|
page execute and write copy
|
||
7A7000
|
heap
|
page read and write
|
||
2AE7FCD0000
|
heap
|
page read and write
|
||
5F5F000
|
trusted library allocation
|
page read and write
|
||
27F672D0000
|
heap
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
830000
|
unkown
|
page readonly
|
||
4EF1000
|
heap
|
page read and write
|
||
C51000
|
unkown
|
page execute and read and write
|
||
22908FAE000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
1F817891000
|
trusted library allocation
|
page read and write
|
||
5F7B000
|
trusted library allocation
|
page read and write
|
||
510000
|
unkown
|
page execute and write copy
|
||
1222000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
2AE09176000
|
trusted library allocation
|
page read and write
|
||
1F80F0B7000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
528B000
|
trusted library allocation
|
page read and write
|
||
A1F000
|
unkown
|
page execute and read and write
|
||
5043000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
heap
|
page read and write
|
||
A9A000
|
unkown
|
page execute and read and write
|
||
63FC000
|
trusted library allocation
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
1D39D000
|
stack
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
5117000
|
trusted library allocation
|
page execute and read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
1A08B590000
|
heap
|
page read and write
|
||
8D1C000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
5928000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
4ED1000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page execute and read and write
|
||
4A6E000
|
stack
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
5228000
|
trusted library allocation
|
page read and write
|
||
341F000
|
stack
|
page read and write
|
||
22908F20000
|
heap
|
page read and write
|
||
122B000
|
heap
|
page read and write
|
||
5E49000
|
trusted library allocation
|
page read and write
|
||
1F810ABA000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4CB000
|
unkown
|
page execute and read and write
|
||
13C0000
|
heap
|
page read and write
|
||
1F815E3C000
|
trusted library allocation
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
575F000
|
trusted library allocation
|
page read and write
|
||
5E4A000
|
trusted library allocation
|
page read and write
|
||
57EE000
|
trusted library allocation
|
page read and write
|
||
63F2000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
121C000
|
heap
|
page read and write
|
||
1F80EEDE000
|
trusted library allocation
|
page read and write
|
||
59BE000
|
trusted library allocation
|
page read and write
|
||
5311000
|
trusted library allocation
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
2AE0906D000
|
trusted library allocation
|
page read and write
|
||
1F80F0C9000
|
trusted library allocation
|
page read and write
|
||
27F67383000
|
trusted library allocation
|
page read and write
|
||
64E7000
|
trusted library allocation
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
59C2000
|
trusted library allocation
|
page read and write
|
||
2290826F000
|
trusted library allocation
|
page read and write
|
||
2EBF000
|
stack
|
page read and write
|
||
5258000
|
trusted library allocation
|
page read and write
|
||
FDF000
|
heap
|
page read and write
|
||
624E000
|
trusted library allocation
|
page read and write
|
||
53B1000
|
direct allocation
|
page read and write
|
||
1F87F6FE000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
656A000
|
trusted library allocation
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1F816099000
|
trusted library allocation
|
page read and write
|
||
1F87F77E000
|
trusted library allocation
|
page read and write
|
||
1F80AED8000
|
trusted library allocation
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
2A30000
|
direct allocation
|
page execute and read and write
|
||
501F000
|
stack
|
page read and write
|
||
5245000
|
trusted library allocation
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
2AE7FEC5000
|
trusted library allocation
|
page read and write
|
||
D27000
|
unkown
|
page execute and read and write
|
||
1F810A6D000
|
trusted library allocation
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
63F8000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
15EA000
|
heap
|
page read and write
|
||
1F810B89000
|
trusted library allocation
|
page read and write
|
||
A7A000
|
unkown
|
page execute and read and write
|
||
6254000
|
trusted library allocation
|
page read and write
|
||
4E9000
|
unkown
|
page execute and write copy
|
||
1F80F062000
|
trusted library allocation
|
page read and write
|
||
56BA000
|
trusted library allocation
|
page read and write
|
||
538E000
|
stack
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
644000
|
heap
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
1F87F390000
|
trusted library allocation
|
page read and write
|
||
2AE09180000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
5FBC000
|
trusted library allocation
|
page read and write
|
||
1369000
|
heap
|
page read and write
|
||
2AE0916F000
|
trusted library allocation
|
page read and write
|
||
2AE09511000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
229087B7000
|
unkown
|
page execute read
|
||
4861000
|
heap
|
page read and write
|
||
FD8000
|
unkown
|
page execute and read and write
|
||
5AAC000
|
trusted library allocation
|
page read and write
|
||
AC9000
|
unkown
|
page write copy
|
||
6254000
|
trusted library allocation
|
page read and write
|
||
68D000
|
unkown
|
page execute and read and write
|
||
5FCF000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
439E000
|
stack
|
page read and write
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
direct allocation
|
page execute and read and write
|
||
798000
|
heap
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
11FD000
|
heap
|
page read and write
|
||
2AE09AF0000
|
trusted library allocation
|
page read and write
|
||
2AE1173C000
|
trusted library allocation
|
page read and write
|
||
5AE8000
|
trusted library allocation
|
page read and write
|
||
1AD3F000
|
stack
|
page read and write
|
||
2AE089DE000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
1307000
|
heap
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
22907EC6000
|
remote allocation
|
page execute read
|
||
5470000
|
direct allocation
|
page execute and read and write
|
||
2AE0885F000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
48BE000
|
stack
|
page read and write
|
||
4F91000
|
heap
|
page read and write
|
||
3BDE000
|
stack
|
page read and write
|
||
1CFDD000
|
stack
|
page read and write
|
||
3FDE000
|
stack
|
page read and write
|
||
59FC000
|
trusted library allocation
|
page read and write
|
||
2AE0D2EB000
|
trusted library allocation
|
page read and write
|
||
1F8160FB000
|
trusted library allocation
|
page read and write
|
||
5254000
|
trusted library allocation
|
page read and write
|
||
1F3C5BCF000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
1F87E8FB000
|
trusted library allocation
|
page read and write
|
||
6331000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
7A3000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
2F5F000
|
stack
|
page read and write
|
||
131F000
|
stack
|
page read and write
|
||
63F9000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
1357000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
6051000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
2AE7FEF8000
|
trusted library allocation
|
page read and write
|
||
3F5F000
|
stack
|
page read and write
|
||
5ED000
|
unkown
|
page execute and read and write
|
||
1540000
|
heap
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
1F87FF84000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
BDB000
|
unkown
|
page execute and read and write
|
||
482000
|
unkown
|
page readonly
|
||
4BC1000
|
heap
|
page read and write
|
||
1AE7F000
|
stack
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
1550000
|
direct allocation
|
page read and write
|
||
387E000
|
stack
|
page read and write
|
||
2C3F000
|
stack
|
page read and write
|
||
1F80E48F000
|
trusted library allocation
|
page read and write
|
||
5F25000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
2AE0C8D3000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1F87FFD1000
|
trusted library allocation
|
page read and write
|
||
10AF000
|
heap
|
page read and write
|
||
59CF000
|
trusted library allocation
|
page read and write
|
||
606D000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
5430000
|
direct allocation
|
page execute and read and write
|
||
64C7000
|
trusted library allocation
|
page read and write
|
||
2E1C000
|
stack
|
page read and write
|
||
59EC000
|
trusted library allocation
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
2AE091DB000
|
trusted library allocation
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
5F6F000
|
trusted library allocation
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
2A57000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
1F87FFF0000
|
trusted library allocation
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
5F7D000
|
trusted library allocation
|
page read and write
|
||
1F8117EB000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
56BB000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
1F810BCB000
|
trusted library allocation
|
page read and write
|
||
1F81620A000
|
trusted library allocation
|
page read and write
|
||
5F6F000
|
trusted library allocation
|
page read and write
|
||
4861000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
1113000
|
unkown
|
page execute and write copy
|
||
22908F23000
|
heap
|
page read and write
|
||
2AE088DC000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
8F4DFFE000
|
stack
|
page read and write
|
||
7B1000
|
heap
|
page read and write
|
||
5221000
|
trusted library allocation
|
page read and write
|
||
27F67303000
|
trusted library allocation
|
page read and write
|
||
2AE7FE81000
|
trusted library allocation
|
page read and write
|
||
1F87F5CD000
|
trusted library allocation
|
page read and write
|
||
64AA000
|
trusted library allocation
|
page read and write
|
||
810000
|
direct allocation
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
3C1000
|
unkown
|
page execute read
|
||
63F8000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
7881000
|
heap
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
63F4000
|
trusted library allocation
|
page read and write
|
||
525C000
|
trusted library allocation
|
page read and write
|
||
66B3000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
5100000
|
direct allocation
|
page execute and read and write
|
||
1F80F074000
|
trusted library allocation
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
1F815E6C000
|
trusted library allocation
|
page read and write
|
||
5513000
|
trusted library allocation
|
page read and write
|
||
5223000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
5270000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
2AE095F4000
|
trusted library allocation
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
5530000
|
direct allocation
|
page execute and read and write
|
||
5AD0000
|
trusted library allocation
|
page read and write
|
||
1F87F5D5000
|
trusted library allocation
|
page read and write
|
||
425E000
|
stack
|
page read and write
|
||
4E30000
|
direct allocation
|
page execute and read and write
|
||
47C000
|
unkown
|
page execute and read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
505000
|
unkown
|
page execute and read and write
|
||
360E000
|
stack
|
page read and write
|
||
4C3F000
|
stack
|
page read and write
|
||
B72000
|
unkown
|
page execute and read and write
|
||
564000
|
heap
|
page read and write
|
||
5FA5000
|
trusted library allocation
|
page read and write
|
||
40DE000
|
stack
|
page read and write
|
||
37DF000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4E70000
|
remote allocation
|
page read and write
|
||
13B0000
|
direct allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
6071000
|
trusted library allocation
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
149E000
|
stack
|
page read and write
|
||
1B50E000
|
stack
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
22908EA4000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
2AE089F9000
|
trusted library allocation
|
page read and write
|
||
2AE7FCD0000
|
heap
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
5E42000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
5225000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
1F8160D2000
|
trusted library allocation
|
page read and write
|
||
10BE000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
4D6000
|
unkown
|
page execute and write copy
|
||
1124000
|
heap
|
page read and write
|
||
2AE0906D000
|
trusted library allocation
|
page read and write
|
||
56B0000
|
trusted library allocation
|
page read and write
|
||
1F87F782000
|
trusted library allocation
|
page read and write
|
||
E94000
|
unkown
|
page execute and write copy
|
||
1F80F0CD000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
2F1F000
|
stack
|
page read and write
|
||
743000
|
heap
|
page read and write
|
||
2AE095E6000
|
trusted library allocation
|
page read and write
|
||
649A000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
DFD000
|
stack
|
page read and write
|
||
5245000
|
trusted library allocation
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
59D8000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
1F8160C0000
|
trusted library allocation
|
page read and write
|
||
5259000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
direct allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
778E000
|
stack
|
page read and write
|
||
5280000
|
trusted library allocation
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
1D25E000
|
stack
|
page read and write
|
||
1D49E000
|
stack
|
page read and write
|
||
5F85000
|
trusted library allocation
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
5F78000
|
trusted library allocation
|
page read and write
|
||
5797000
|
trusted library allocation
|
page read and write
|
||
AFE000
|
stack
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
2AE091B1000
|
trusted library allocation
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
13A4000
|
heap
|
page read and write
|
||
5548000
|
trusted library allocation
|
page read and write
|
||
22908F6B000
|
heap
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
48A0000
|
direct allocation
|
page execute and read and write
|
||
1F80DA8F000
|
trusted library allocation
|
page read and write
|
||
47EE000
|
stack
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
2AE7FCD0000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
5245000
|
trusted library allocation
|
page read and write
|
||
74DE000
|
stack
|
page read and write
|
||
8F4EFFE000
|
stack
|
page read and write
|
||
7B1000
|
heap
|
page read and write
|
||
2AE05126000
|
trusted library allocation
|
page read and write
|
||
22908F7C000
|
heap
|
page read and write
|
||
1F80E4BC000
|
trusted library allocation
|
page read and write
|
||
485F000
|
stack
|
page read and write
|
||
5A0D000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
5FC4000
|
trusted library allocation
|
page read and write
|
||
4740000
|
direct allocation
|
page read and write
|
||
2AE091F0000
|
trusted library allocation
|
page read and write
|
||
1F80AE49000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
56B5000
|
trusted library allocation
|
page read and write
|
||
5289000
|
trusted library allocation
|
page read and write
|
||
2AE7FCDC000
|
heap
|
page read and write
|
||
3BFF000
|
stack
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
11FF000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
398F000
|
stack
|
page read and write
|
||
1F80B195000
|
trusted library allocation
|
page read and write
|
||
5F8D000
|
trusted library allocation
|
page read and write
|
||
64F5000
|
heap
|
page read and write
|
||
860000
|
direct allocation
|
page read and write
|
||
524F000
|
trusted library allocation
|
page read and write
|
||
5EE8000
|
trusted library allocation
|
page read and write
|
||
2AE09531000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
64C3000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
2AE7FE9A000
|
trusted library allocation
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
5F7E000
|
trusted library allocation
|
page read and write
|
||
7A3000
|
heap
|
page read and write
|
||
675C000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
59DB000
|
trusted library allocation
|
page read and write
|
||
736000
|
heap
|
page read and write
|
||
B7B000
|
unkown
|
page execute and read and write
|
||
1223000
|
heap
|
page read and write
|
||
1A08B658000
|
heap
|
page read and write
|
||
391F000
|
stack
|
page read and write
|
||
2DB0000
|
direct allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5F03000
|
trusted library allocation
|
page read and write
|
||
1F80F64C000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
576F000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
63FC000
|
trusted library allocation
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
1F80E9F1000
|
trusted library allocation
|
page read and write
|
||
5222000
|
trusted library allocation
|
page read and write
|
||
40FF000
|
stack
|
page read and write
|
||
1F87F4E3000
|
trusted library allocation
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
59B1000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
7540000
|
heap
|
page execute and read and write
|
||
4730000
|
remote allocation
|
page read and write
|
||
5FB0000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
1F3C5C00000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
132F000
|
heap
|
page read and write
|
||
5FAE000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
526B000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
22908100000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
5AC1000
|
trusted library allocation
|
page read and write
|
||
1F87F3B3000
|
trusted library allocation
|
page read and write
|
||
1F80D56E000
|
trusted library allocation
|
page read and write
|
||
6FF000
|
heap
|
page read and write
|
||
523A000
|
trusted library allocation
|
page read and write
|
||
11FE000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
27F67323000
|
trusted library allocation
|
page read and write
|
||
1F80E6C0000
|
trusted library allocation
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
5024000
|
heap
|
page read and write
|
||
5AB9000
|
trusted library allocation
|
page read and write
|
||
6240000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
2AE09024000
|
trusted library allocation
|
page read and write
|
||
5F9C000
|
trusted library allocation
|
page read and write
|
||
2AE7FEAA000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
1F80E9F1000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
8E1000
|
unkown
|
page execute and read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
810000
|
direct allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
2AE09AF8000
|
trusted library allocation
|
page read and write
|
||
1F80D57C000
|
trusted library allocation
|
page read and write
|
||
1F87F75C000
|
trusted library allocation
|
page read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
6254000
|
trusted library allocation
|
page read and write
|
||
1F80E952000
|
trusted library allocation
|
page read and write
|
||
64EB000
|
trusted library allocation
|
page read and write
|
||
6071000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
4AC0000
|
trusted library allocation
|
page read and write
|
||
5FAE000
|
trusted library allocation
|
page read and write
|
||
47AF000
|
stack
|
page read and write
|
||
459F000
|
stack
|
page read and write
|
||
48C0000
|
direct allocation
|
page execute and read and write
|
||
1F81788F000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
2A20000
|
direct allocation
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
64F7000
|
trusted library allocation
|
page read and write
|
||
5EF2000
|
trusted library allocation
|
page read and write
|
||
A7A000
|
unkown
|
page execute and read and write
|
||
14DF000
|
heap
|
page read and write
|
||
64AF000
|
trusted library allocation
|
page read and write
|
||
22908770000
|
trusted library section
|
page readonly
|
||
9B8000
|
unkown
|
page execute and read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
564000
|
heap
|
page read and write
|
||
22908F62000
|
heap
|
page read and write
|
||
209E000
|
stack
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
2AE09167000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
22908F99000
|
heap
|
page read and write
|
||
521A000
|
trusted library allocation
|
page read and write
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
649D000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
direct allocation
|
page read and write
|
||
B70000
|
unkown
|
page readonly
|
||
2DB0000
|
direct allocation
|
page read and write
|
||
167F000
|
stack
|
page read and write
|
||
57B3000
|
trusted library allocation
|
page read and write
|
||
31D0000
|
direct allocation
|
page read and write
|
||
511B000
|
trusted library allocation
|
page execute and read and write
|
||
1F810B67000
|
trusted library allocation
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
2AE089C3000
|
trusted library allocation
|
page read and write
|
||
1F816231000
|
trusted library allocation
|
page read and write
|
||
5278000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
B70000
|
unkown
|
page readonly
|
||
1F80D561000
|
trusted library allocation
|
page read and write
|
||
22908F7C000
|
heap
|
page read and write
|
||
517E000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
5339000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4ED0000
|
direct allocation
|
page execute and read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1F87F487000
|
trusted library allocation
|
page read and write
|
||
5339000
|
trusted library allocation
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
1C97E000
|
stack
|
page read and write
|
||
59C9000
|
trusted library allocation
|
page read and write
|
||
EC5000
|
heap
|
page read and write
|
||
3ACF000
|
stack
|
page read and write
|
||
E84000
|
unkown
|
page execute and read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
14CF000
|
heap
|
page read and write
|
||
3FBF000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
1F87F46A000
|
trusted library allocation
|
page read and write
|
||
64AE000
|
trusted library allocation
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
1F810BF5000
|
trusted library allocation
|
page read and write
|
||
4F84000
|
trusted library allocation
|
page read and write
|
||
5AA8000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
direct allocation
|
page execute and read and write
|
||
3980000
|
heap
|
page read and write
|
||
1DCD7BA0000
|
heap
|
page read and write
|
||
16B5000
|
heap
|
page read and write
|
||
1289000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
27F6735D000
|
trusted library allocation
|
page read and write
|
||
1F3C5B70000
|
heap
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
2AE063DC000
|
trusted library allocation
|
page read and write
|
||
2AE11773000
|
trusted library allocation
|
page read and write
|
||
5410000
|
remote allocation
|
page read and write
|
||
B50000
|
unkown
|
page execute and write copy
|
||
2AE0B7F8000
|
trusted library allocation
|
page read and write
|
||
1F87F462000
|
trusted library allocation
|
page read and write
|
||
2AE088FD000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
1124000
|
heap
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
2AE095EE000
|
trusted library allocation
|
page read and write
|
||
52D1000
|
direct allocation
|
page read and write
|
||
5E46000
|
trusted library allocation
|
page read and write
|
||
306000
|
unkown
|
page write copy
|
||
5370000
|
direct allocation
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4D7F000
|
stack
|
page read and write
|
||
10A6000
|
heap
|
page read and write
|
||
BD9000
|
unkown
|
page write copy
|
||
5285000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
59C4000
|
trusted library allocation
|
page read and write
|
||
5AC9000
|
trusted library allocation
|
page read and write
|
||
48C0000
|
direct allocation
|
page execute and read and write
|
||
27F67412000
|
trusted library allocation
|
page read and write
|
||
15F4000
|
heap
|
page read and write
|
||
649F000
|
trusted library allocation
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
5ACF000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
22908F3C000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
6071000
|
trusted library allocation
|
page read and write
|
||
860000
|
direct allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
5F77000
|
trusted library allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
11BF000
|
stack
|
page read and write
|
||
2AE7FEFD000
|
trusted library allocation
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
5570000
|
direct allocation
|
page execute and read and write
|
||
1F87F443000
|
trusted library allocation
|
page read and write
|
||
521C000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
direct allocation
|
page read and write
|
||
41BF000
|
stack
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
8D21000
|
heap
|
page read and write
|
||
1F87F726000
|
trusted library allocation
|
page read and write
|
||
1F87F6FB000
|
trusted library allocation
|
page read and write
|
||
16A4000
|
heap
|
page read and write
|
||
1A08B642000
|
heap
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
AAD2F67000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
2AE7FE9E000
|
trusted library allocation
|
page read and write
|
||
522A000
|
trusted library allocation
|
page read and write
|
||
16B5000
|
heap
|
page read and write
|
||
1F80AEEC000
|
trusted library allocation
|
page read and write
|
||
1F8160BA000
|
trusted library allocation
|
page read and write
|
||
2AE05182000
|
trusted library allocation
|
page read and write
|
||
59EC000
|
trusted library allocation
|
page read and write
|
||
BD2000
|
unkown
|
page execute and read and write
|
||
5269000
|
trusted library allocation
|
page read and write
|
||
416F000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
1647000
|
heap
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
534000
|
unkown
|
page execute and read and write
|
||
59D6000
|
trusted library allocation
|
page read and write
|
||
1F816099000
|
trusted library allocation
|
page read and write
|
||
577E000
|
trusted library allocation
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
1F80E9FD000
|
trusted library allocation
|
page read and write
|
||
56B6000
|
trusted library allocation
|
page read and write
|
||
1F80AEF9000
|
trusted library allocation
|
page read and write
|
||
1F87F48A000
|
trusted library allocation
|
page read and write
|
||
1F80E9E0000
|
trusted library allocation
|
page read and write
|
||
27F66E90000
|
unclassified section
|
page readonly
|
||
2D7F000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
5F7E000
|
trusted library allocation
|
page read and write
|
||
1F80E960000
|
trusted library allocation
|
page read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
63FD000
|
trusted library allocation
|
page read and write
|
||
A36000
|
unkown
|
page execute and read and write
|
||
C42313E000
|
unkown
|
page readonly
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
44FE000
|
stack
|
page read and write
|
||
6ED59FC000
|
stack
|
page read and write
|
||
2AE7FCD6000
|
heap
|
page read and write
|
||
4F94000
|
trusted library allocation
|
page read and write
|
||
1662000
|
heap
|
page read and write
|
||
2AE7FCDC000
|
heap
|
page read and write
|
||
5060000
|
direct allocation
|
page execute and read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
1F816239000
|
trusted library allocation
|
page read and write
|
||
6329000
|
trusted library allocation
|
page read and write
|
||
229082EF000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
2AE0D1DE000
|
trusted library allocation
|
page read and write
|
||
4E80000
|
direct allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
5350000
|
direct allocation
|
page execute and read and write
|
||
1F80F078000
|
trusted library allocation
|
page read and write
|
||
2AE09131000
|
trusted library allocation
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
137B000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
13B0000
|
direct allocation
|
page read and write
|
||
22908050000
|
heap
|
page readonly
|
||
5CA8000
|
trusted library allocation
|
page read and write
|
||
229083D4000
|
heap
|
page read and write
|
||
63F1000
|
trusted library allocation
|
page read and write
|
||
59B1000
|
trusted library allocation
|
page read and write
|
||
59BC000
|
trusted library allocation
|
page read and write
|
||
5E1000
|
unkown
|
page execute and read and write
|
||
127E000
|
stack
|
page read and write
|
||
2AE0915E000
|
trusted library allocation
|
page read and write
|
||
5F9F000
|
trusted library allocation
|
page read and write
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
2AE091AD000
|
trusted library allocation
|
page read and write
|
||
1F80F096000
|
trusted library allocation
|
page read and write
|
||
1F87F726000
|
trusted library allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
1F810AB6000
|
trusted library allocation
|
page read and write
|
||
64AC000
|
trusted library allocation
|
page read and write
|
||
59BC000
|
trusted library allocation
|
page read and write
|
||
3C1000
|
unkown
|
page execute read
|
||
D0C000
|
stack
|
page read and write
|
||
5D0000
|
unkown
|
page readonly
|
||
1F80F097000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
63F7000
|
trusted library allocation
|
page read and write
|
||
E33000
|
unkown
|
page execute and read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
1F80D5F6000
|
trusted library allocation
|
page read and write
|
||
5190000
|
heap
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
5A0C000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
521B000
|
trusted library allocation
|
page read and write
|
||
481F000
|
stack
|
page read and write
|
||
1F810BB3000
|
trusted library allocation
|
page read and write
|
||
5F9E000
|
trusted library allocation
|
page read and write
|
||
78F000
|
heap
|
page read and write
|
||
4DF0000
|
heap
|
page read and write
|
||
1F87FF73000
|
trusted library allocation
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
5F7D000
|
trusted library allocation
|
page read and write
|
||
57E8000
|
trusted library allocation
|
page read and write
|
||
2ECF000
|
stack
|
page read and write
|
||
5225000
|
trusted library allocation
|
page read and write
|
||
5AD6000
|
trusted library allocation
|
page read and write
|
||
5040000
|
direct allocation
|
page execute and read and write
|
||
1F80F077000
|
trusted library allocation
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
4A51000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
522C000
|
trusted library allocation
|
page read and write
|
||
1A08D1AE000
|
heap
|
page read and write
|
||
1B01E000
|
stack
|
page read and write
|
||
5F8A000
|
trusted library allocation
|
page read and write
|
||
2AE0909A000
|
trusted library allocation
|
page read and write
|
||
54C0000
|
direct allocation
|
page execute and read and write
|
||
1F810A59000
|
trusted library allocation
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
A8E000
|
unkown
|
page execute and read and write
|
||
5FAA000
|
trusted library allocation
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
49FE000
|
stack
|
page read and write
|
||
524C000
|
trusted library allocation
|
page read and write
|
||
4DCE000
|
stack
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
5E4F000
|
trusted library allocation
|
page read and write
|
||
5252000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
22908F85000
|
heap
|
page read and write
|
||
63F0000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
551C000
|
trusted library allocation
|
page read and write
|
||
5AD5000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
2AE08F7D000
|
trusted library allocation
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
810000
|
direct allocation
|
page read and write
|
||
59B4000
|
trusted library allocation
|
page read and write
|
||
1550000
|
direct allocation
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
22908281000
|
trusted library allocation
|
page read and write
|
||
5F58000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
751E000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
E54000
|
unkown
|
page execute and write copy
|
||
47CF000
|
stack
|
page read and write
|
||
1CBBF000
|
stack
|
page read and write
|
||
D6C000
|
unkown
|
page execute and read and write
|
||
2AE095F4000
|
trusted library allocation
|
page read and write
|
||
1F810BCF000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
4681000
|
heap
|
page read and write
|
||
5ACA000
|
trusted library allocation
|
page read and write
|
||
4E90000
|
direct allocation
|
page execute and read and write
|
||
1F81649A000
|
trusted library allocation
|
page read and write
|
||
5AD4000
|
trusted library allocation
|
page read and write
|
||
1F87FBE6000
|
trusted library allocation
|
page read and write
|
||
1F80F0CD000
|
trusted library allocation
|
page read and write
|
||
59CA000
|
trusted library allocation
|
page read and write
|
||
59BC000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
AD6000
|
unkown
|
page execute and read and write
|
||
62F0000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
C7C000
|
unkown
|
page execute and write copy
|
||
3DCF000
|
stack
|
page read and write
|
||
1A08B651000
|
heap
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
1F8160BA000
|
trusted library allocation
|
page read and write
|
||
414E000
|
stack
|
page read and write
|
||
4E51000
|
heap
|
page read and write
|
||
4EA0000
|
direct allocation
|
page execute and read and write
|
||
16AC000
|
heap
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
1DCD7C40000
|
heap
|
page read and write
|
||
8F4E7FE000
|
stack
|
page read and write
|
||
530000
|
unkown
|
page execute and write copy
|
||
1F815E13000
|
trusted library allocation
|
page read and write
|
||
EE4000
|
heap
|
page read and write
|
||
DB9000
|
stack
|
page read and write
|
||
2AE0C8D6000
|
trusted library allocation
|
page read and write
|
||
5329000
|
trusted library allocation
|
page read and write
|
||
5AC2000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
395F000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
27F66E10000
|
heap
|
page readonly
|
||
4E40000
|
direct allocation
|
page read and write
|
||
1F87F775000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
59CD000
|
trusted library allocation
|
page read and write
|
||
1B40E000
|
stack
|
page read and write
|
||
473F000
|
stack
|
page read and write
|
||
602C000
|
trusted library allocation
|
page read and write
|
||
9FA000
|
unkown
|
page execute and read and write
|
||
644000
|
heap
|
page read and write
|
||
1F80F0BF000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
1CABE000
|
stack
|
page read and write
|
||
16B8000
|
heap
|
page read and write
|
||
4E50000
|
direct allocation
|
page execute and read and write
|
||
122B000
|
heap
|
page read and write
|
||
2AE091F7000
|
trusted library allocation
|
page read and write
|
||
14CB000
|
heap
|
page read and write
|
||
12C4000
|
heap
|
page read and write
|
||
2AE0885F000
|
trusted library allocation
|
page read and write
|
||
5F7A000
|
trusted library allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
2AE0882D000
|
trusted library allocation
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
1B2AE000
|
stack
|
page read and write
|
||
64CD000
|
trusted library allocation
|
page read and write
|
||
22908EAC000
|
heap
|
page read and write
|
||
5F5D000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
160F000
|
heap
|
page read and write
|
||
59BF000
|
trusted library allocation
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
5F7B000
|
trusted library allocation
|
page read and write
|
||
55A0000
|
direct allocation
|
page execute and read and write
|
||
51F000
|
unkown
|
page execute and write copy
|
||
1F87E8F8000
|
trusted library allocation
|
page read and write
|
||
5F9D000
|
trusted library allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
4681000
|
heap
|
page read and write
|
||
2AE088FD000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
5520000
|
direct allocation
|
page execute and read and write
|
||
1F8178B3000
|
trusted library allocation
|
page read and write
|
||
22908F23000
|
heap
|
page read and write
|
||
63FF000
|
trusted library allocation
|
page read and write
|
||
121A000
|
unkown
|
page read and write
|
||
63F4000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
5F76000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
5AA1000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
6052000
|
trusted library allocation
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
42C1000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
1F80E6FD000
|
trusted library allocation
|
page read and write
|
||
2AE091D3000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
76FA000
|
heap
|
page read and write
|
||
5245000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
22908F28000
|
heap
|
page read and write
|
||
345F000
|
stack
|
page read and write
|
||
1F80AE8E000
|
trusted library allocation
|
page read and write
|
||
1F3C5E0A000
|
trusted library allocation
|
page read and write
|
||
52AB000
|
trusted library allocation
|
page read and write
|
||
1321000
|
heap
|
page read and write
|
||
FF0000
|
direct allocation
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
46DF000
|
stack
|
page read and write
|
||
C41DD2E000
|
unkown
|
page readonly
|
||
589E000
|
trusted library allocation
|
page read and write
|
||
522D000
|
trusted library allocation
|
page read and write
|
||
63C9000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
3D3F000
|
stack
|
page read and write
|
||
6087000
|
trusted library allocation
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1653000
|
heap
|
page read and write
|
||
1F80D572000
|
trusted library allocation
|
page read and write
|
||
2AE08833000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
624D000
|
trusted library allocation
|
page read and write
|
||
11FE000
|
stack
|
page read and write
|
||
63FA000
|
trusted library allocation
|
page read and write
|
||
D36000
|
unkown
|
page execute and read and write
|
||
5E4D000
|
trusted library allocation
|
page read and write
|
||
6339000
|
trusted library allocation
|
page read and write
|
||
5370000
|
direct allocation
|
page read and write
|
||
49E0000
|
direct allocation
|
page read and write
|
||
16AD000
|
heap
|
page read and write
|
||
3AFE000
|
stack
|
page read and write
|
||
5260000
|
trusted library allocation
|
page read and write
|
||
5F84000
|
trusted library allocation
|
page read and write
|
||
10BE000
|
heap
|
page read and write
|
||
5380000
|
direct allocation
|
page execute and read and write
|
||
6060000
|
trusted library allocation
|
page read and write
|
||
2D5F000
|
stack
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
D7B000
|
heap
|
page read and write
|
||
2AE091FB000
|
trusted library allocation
|
page read and write
|
||
46FE000
|
stack
|
page read and write
|
||
522C000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
4CC0000
|
trusted library allocation
|
page read and write
|
||
1F80AE96000
|
trusted library allocation
|
page read and write
|
||
229087B9000
|
unkown
|
page execute read
|
||
2AE0915E000
|
trusted library allocation
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
4C3F000
|
stack
|
page read and write
|
||
1F810B6D000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
4E40000
|
direct allocation
|
page execute and read and write
|
||
1D0DC000
|
stack
|
page read and write
|
||
1F810ABE000
|
trusted library allocation
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5FA9000
|
trusted library allocation
|
page read and write
|
||
5AEA000
|
trusted library allocation
|
page read and write
|
||
1F810BE9000
|
trusted library allocation
|
page read and write
|
||
1F87F3A4000
|
trusted library allocation
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
492000
|
unkown
|
page execute and write copy
|
||
1223000
|
heap
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
5F59000
|
trusted library allocation
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
1F817FF3000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
direct allocation
|
page read and write
|
||
6BB000
|
heap
|
page read and write
|
||
AAD2EEE000
|
unkown
|
page readonly
|
||
4D81000
|
heap
|
page read and write
|
||
4F80000
|
direct allocation
|
page read and write
|
||
5ABE000
|
trusted library allocation
|
page read and write
|
||
1F80D5EF000
|
trusted library allocation
|
page read and write
|
||
30A000
|
unkown
|
page execute and write copy
|
||
1F87F713000
|
trusted library allocation
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
1F81608C000
|
trusted library allocation
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
1F87E8ED000
|
trusted library allocation
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
5410000
|
remote allocation
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
16AF000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
1645000
|
heap
|
page read and write
|
||
5FA4000
|
trusted library allocation
|
page read and write
|
||
1F810A41000
|
trusted library allocation
|
page read and write
|
||
5F78000
|
trusted library allocation
|
page read and write
|
||
4F83000
|
trusted library allocation
|
page execute and read and write
|
||
1F80E96C000
|
trusted library allocation
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
1CD4E000
|
stack
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
531000
|
unkown
|
page execute and write copy
|
||
2AE09172000
|
trusted library allocation
|
page read and write
|
||
2AE0915F000
|
trusted library allocation
|
page read and write
|
||
1F3C5E07000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
143F000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
51B0000
|
direct allocation
|
page read and write
|
||
1DCD8060000
|
heap
|
page read and write
|
||
68E000
|
stack
|
page read and write
|
||
5A07000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
5352000
|
trusted library allocation
|
page read and write
|
||
4B6F000
|
stack
|
page read and write
|
||
341F000
|
stack
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
2AE0914D000
|
trusted library allocation
|
page read and write
|
||
575A000
|
trusted library allocation
|
page read and write
|
||
FDA000
|
unkown
|
page execute and write copy
|
||
22908215000
|
trusted library allocation
|
page read and write
|
||
860000
|
direct allocation
|
page read and write
|
||
3A9F000
|
stack
|
page read and write
|
||
870000
|
unkown
|
page readonly
|
||
1564000
|
heap
|
page read and write
|
||
11EF000
|
stack
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
14CE000
|
heap
|
page read and write
|
||
4F8000
|
unkown
|
page execute and read and write
|
||
59BA000
|
trusted library allocation
|
page read and write
|
||
533F000
|
stack
|
page read and write
|
||
AB4000
|
heap
|
page read and write
|
||
3D1F000
|
stack
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
52F6000
|
trusted library allocation
|
page read and write
|
||
CF5000
|
stack
|
page read and write
|
||
BD9000
|
unkown
|
page write copy
|
||
13A4000
|
heap
|
page read and write
|
||
3DAF000
|
stack
|
page read and write
|
||
1F87FCF4000
|
trusted library allocation
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
3D5E000
|
stack
|
page read and write
|
||
307F000
|
stack
|
page read and write
|
||
2AE11732000
|
trusted library allocation
|
page read and write
|
||
5E4B000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
681000
|
unkown
|
page execute and read and write
|
||
1F80D9F8000
|
trusted library allocation
|
page read and write
|
||
39C1000
|
heap
|
page read and write
|
||
22908265000
|
trusted library allocation
|
page read and write
|
||
AC7000
|
unkown
|
page execute and read and write
|
||
2AE09AFC000
|
trusted library allocation
|
page read and write
|
||
22908248000
|
trusted library allocation
|
page read and write
|
||
229080AA000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
2AE091F0000
|
trusted library allocation
|
page read and write
|
||
526D000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
||
A4F000
|
unkown
|
page execute and write copy
|
||
1DCD7F07000
|
trusted library allocation
|
page read and write
|
||
63F9000
|
trusted library allocation
|
page read and write
|
||
43CE000
|
stack
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
7ED000
|
stack
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
63FE000
|
trusted library allocation
|
page read and write
|
||
1F80E97A000
|
trusted library allocation
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
2AE09120000
|
trusted library allocation
|
page read and write
|
||
5263000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
C41DC6B000
|
stack
|
page read and write
|
||
5FBE000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
direct allocation
|
page execute and read and write
|
||
A50000
|
direct allocation
|
page read and write
|
||
5F9E000
|
trusted library allocation
|
page read and write
|
||
64A2000
|
trusted library allocation
|
page read and write
|
||
63FB000
|
trusted library allocation
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
2AE0906D000
|
trusted library allocation
|
page read and write
|
||
335E000
|
stack
|
page read and write
|
||
5AD9000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4681000
|
heap
|
page read and write
|
||
42C1000
|
heap
|
page read and write
|
||
1F810AB8000
|
trusted library allocation
|
page read and write
|
||
1F80F031000
|
trusted library allocation
|
page read and write
|
||
12FC000
|
heap
|
page read and write
|
||
5FB8000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
4EF1000
|
heap
|
page read and write
|
||
15D8000
|
heap
|
page read and write
|
||
2AE09AF4000
|
trusted library allocation
|
page read and write
|
||
12FE000
|
stack
|
page read and write
|
||
121C000
|
heap
|
page read and write
|
||
1F87F39E000
|
trusted library allocation
|
page read and write
|
||
D5E000
|
heap
|
page read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
2AE091A2000
|
trusted library allocation
|
page read and write
|
||
529000
|
unkown
|
page execute and read and write
|
||
54A0000
|
direct allocation
|
page execute and read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
64B7000
|
trusted library allocation
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
5F86000
|
trusted library allocation
|
page read and write
|
||
5F6A000
|
trusted library allocation
|
page read and write
|
||
59D5000
|
trusted library allocation
|
page read and write
|
||
54F0000
|
direct allocation
|
page execute and read and write
|
||
120E000
|
heap
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
14DF000
|
heap
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
1550000
|
direct allocation
|
page read and write
|
||
1F80F057000
|
trusted library allocation
|
page read and write
|
||
2AE09AF0000
|
trusted library allocation
|
page read and write
|
||
1227000
|
heap
|
page read and write
|
||
424F000
|
stack
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
1F87F3DF000
|
trusted library allocation
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
55E0000
|
trusted library allocation
|
page read and write
|
||
1A08B7B0000
|
heap
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
E34000
|
unkown
|
page execute and write copy
|
||
4F80000
|
direct allocation
|
page read and write
|
||
1F810BF5000
|
trusted library allocation
|
page read and write
|
||
10C8000
|
heap
|
page read and write
|
||
49F1000
|
heap
|
page read and write
|
||
871000
|
unkown
|
page execute and write copy
|
||
644000
|
heap
|
page read and write
|
||
5D81000
|
trusted library allocation
|
page read and write
|
||
64C8000
|
trusted library allocation
|
page read and write
|
||
64F6000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page read and write
|
||
1F80E4B9000
|
trusted library allocation
|
page read and write
|
||
60B9000
|
trusted library allocation
|
page read and write
|
||
2AE08E00000
|
trusted library allocation
|
page read and write
|
||
27F67347000
|
trusted library allocation
|
page read and write
|
||
8D39000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
1325000
|
heap
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
FCE000
|
heap
|
page read and write
|
||
53D0000
|
direct allocation
|
page execute and read and write
|
||
2AE09031000
|
trusted library allocation
|
page read and write
|
||
13A4000
|
heap
|
page read and write
|
||
1227000
|
heap
|
page read and write
|
||
4BD7000
|
trusted library allocation
|
page read and write
|
||
57CC000
|
trusted library allocation
|
page read and write
|
||
64FF000
|
trusted library allocation
|
page read and write
|
||
16D4000
|
heap
|
page read and write
|
||
1F80B1DF000
|
trusted library allocation
|
page read and write
|
||
564000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5AAD000
|
trusted library allocation
|
page read and write
|
||
5AB0000
|
trusted library allocation
|
page read and write
|
||
523A000
|
trusted library allocation
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
5238000
|
trusted library allocation
|
page read and write
|
||
1D67C000
|
stack
|
page read and write
|
||
4D81000
|
heap
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
121F000
|
heap
|
page read and write
|
||
5300000
|
direct allocation
|
page execute and read and write
|
||
5FFC000
|
trusted library allocation
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
2B5F000
|
stack
|
page read and write
|
||
1F8160DB000
|
trusted library allocation
|
page read and write
|
||
5E43000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
trusted library allocation
|
page read and write
|
||
5272000
|
trusted library allocation
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
BD2000
|
unkown
|
page execute and read and write
|
||
398F000
|
stack
|
page read and write
|
||
A50000
|
direct allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
1F87F426000
|
trusted library allocation
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
4D41000
|
direct allocation
|
page read and write
|
||
1699000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
381F000
|
stack
|
page read and write
|
||
56B7000
|
trusted library allocation
|
page read and write
|
||
2AE091AB000
|
trusted library allocation
|
page read and write
|
||
2AE091D3000
|
trusted library allocation
|
page read and write
|
||
4A2F000
|
stack
|
page read and write
|
||
2AE0882D000
|
trusted library allocation
|
page read and write
|
||
1124000
|
heap
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
6242000
|
trusted library allocation
|
page read and write
|
||
5F95000
|
trusted library allocation
|
page read and write
|
||
4B11000
|
heap
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
533A000
|
trusted library allocation
|
page read and write
|
||
649C000
|
trusted library allocation
|
page read and write
|
||
1F811030000
|
trusted library allocation
|
page read and write
|
||
2AE0511E000
|
trusted library allocation
|
page read and write
|
||
63FF000
|
trusted library allocation
|
page read and write
|
||
2AE0D28A000
|
trusted library allocation
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
15C0000
|
direct allocation
|
page read and write
|
There are 4752 hidden memdumps, click here to show them.