Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\random[1].exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1008348001\843a4bb3a5.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\service123.exe
|
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\Tasks\skotes.job
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
|
||
C:\Users\user\AppData\Local\Temp\1008348001\843a4bb3a5.exe
|
"C:\Users\user\AppData\Local\Temp\1008348001\843a4bb3a5.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2420 --field-trial-handle=2348,i,10504154459402330811,16956138012118111025,262144
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://mail.google.com/mail/?usp=installed_webapp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.icoc_state
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
|
unknown
|
||
https://docs.google.com/document/J
|
unknown
|
||
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://issuetracker.google.com/284462263
|
unknown
|
||
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
|
unknown
|
||
https://crbug.com/368855.)
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://docs.google.com/document/:
|
unknown
|
||
https://photos.google.com/settings?referrer=CHROME_NTP
|
unknown
|
||
https://anglebug.com/7714
|
unknown
|
||
https://www.google.com/speech-api/v2/synthesize?
|
unknown
|
||
http://unisolated.invalid/
|
unknown
|
||
https://www.google.com/chrome/tips/
|
unknown
|
||
https://drive.google.com/?lfhs=2
|
unknown
|
||
http://anglebug.com/6248
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpcoded
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
http://anglebug.com/5281
|
unknown
|
||
https://www.youtube.com/?feature=ytca
|
unknown
|
||
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=by
|
unknown
|
||
https://issuetracker.google.com/255411748
|
unknown
|
||
https://docs.google.com/document/u/0/create?usp=chrome_actions
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://duckduckgo.com/?q=
|
unknown
|
||
https://chrome.google.com/webstore
|
unknown
|
||
http://anglebug.com/5906supportsExtendedDynamicState2
|
unknown
|
||
https://drive-daily-2.corp.google.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.ico
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
https://ace-snapper-privately.ngrok-free.app/test/testFailed
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://drive-daily-1.corp.google.com/
|
unknown
|
||
https://drive-daily-5.corp.google.com/
|
unknown
|
||
https://duckduckgo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
|
unknown
|
||
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php;UN
|
unknown
|
||
http://anglebug.com/3078
|
unknown
|
||
http://anglebug.com/7553
|
unknown
|
||
http://anglebug.com/5375
|
unknown
|
||
http://anglebug.com/5371
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
https://m.google.com/devicemanagement/data/api
|
unknown
|
||
http://developer.chrome.com/extensions/external_extensions.html)
|
unknown
|
||
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php2.
|
unknown
|
||
http://anglebug.com/7556
|
unknown
|
||
https://chromewebstore.google.com/
|
unknown
|
||
https://drive-preprod.corp.google.com/
|
unknown
|
||
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
|
34.116.198.130
|
||
https://clients4.google.com/chrome-sync
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://unisolated.invalid/a
|
unknown
|
||
http://anglebug.com/6692
|
unknown
|
||
https://issuetracker.google.com/258207403
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
https://docs.google.com/presentation/J
|
unknown
|
||
http://anglebug.com/5007
|
unknown
|
||
https://drive.google.com/drive/installwebapp?usp=chrome_default
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
https://chrome.google.com/webstoreLDDiscover
|
unknown
|
||
https://www.ecosia.org/search?q=&addon=opensearch
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpD
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
http://.css
|
unknown
|
||
https://ch.search.yahoo.com/favicon.ico
|
unknown
|
||
https://docs.google.com/presentation/:
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.phpR
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php5
|
unknown
|
||
http://anglebug.com/4384
|
unknown
|
||
http://anglebug.com/3970
|
unknown
|
||
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
|
unknown
|
||
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
|
unknown
|
||
https://policies.google.com/
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://google-ohttp-relay-query.fastly-edge.com/2P
|
unknown
|
||
http://185.215.113.43/Zu7JuNko/index.php0
|
unknown
|
||
https://anglebug.com/7604
|
unknown
|
||
https://google-ohttp-relay-join.fastly-edge.com/hj
|
unknown
|
||
http://anglebug.com/7761
|
unknown
|
||
http://anglebug.com/7760
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://anglebug.com/5901
|
unknown
|
||
http://anglebug.com/3965
|
unknown
|
||
http://anglebug.com/6439
|
unknown
|
||
http://anglebug.com/7406
|
unknown
|
||
https://anglebug.com/7161
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
home.fvtekk5pn.top
|
34.116.198.130
|
||
www.google.com
|
142.250.181.68
|
||
fvtekk5pn.top
|
34.116.198.130
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.43
|
unknown
|
Portugal
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
34.116.198.130
|
home.fvtekk5pn.top
|
United States
|
||
142.250.181.68
|
www.google.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
31.41.244.11
|
unknown
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
53E0000
|
direct allocation
|
page read and write
|
||
BF1000
|
unkown
|
page execute and read and write
|
||
D1000
|
unkown
|
page execute and read and write
|
||
BF1000
|
unkown
|
page execute and read and write
|
||
48C0000
|
direct allocation
|
page read and write
|
||
4B70000
|
direct allocation
|
page read and write
|
||
BF1000
|
unkown
|
page execute and read and write
|
||
4B50000
|
direct allocation
|
page read and write
|
||
4A40000
|
direct allocation
|
page execute and read and write
|
||
236C00220000
|
direct allocation
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
42A95FE000
|
unkown
|
page readonly
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
69E40035C000
|
trusted library allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
6AE0000
|
direct allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
1A050552000
|
heap
|
page read and write
|
||
79F402B54000
|
trusted library allocation
|
page read and write
|
||
79F402424000
|
trusted library allocation
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
42A45FE000
|
unkown
|
page readonly
|
||
B00000
|
direct allocation
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
69E4006F0000
|
trusted library allocation
|
page read and write
|
||
124C000
|
unkown
|
page execute and write copy
|
||
46D1000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
69E400230000
|
trusted library allocation
|
page read and write
|
||
79F402D3C000
|
trusted library allocation
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
79F4030DC000
|
trusted library allocation
|
page read and write
|
||
79F4024FC000
|
trusted library allocation
|
page read and write
|
||
6C3400288000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
705A000
|
heap
|
page read and write
|
||
458F000
|
stack
|
page read and write
|
||
32BF000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
69E40039C000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
236C0024C000
|
direct allocation
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
1A056B87000
|
unclassified section
|
page read and write
|
||
69E400654000
|
trusted library allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
69E4002E4000
|
trusted library allocation
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
72B4000
|
heap
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
42A65FE000
|
unkown
|
page readonly
|
||
42B65FE000
|
unkown
|
page readonly
|
||
79F4023C4000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
69E400668000
|
trusted library allocation
|
page read and write
|
||
1A05617E000
|
trusted library section
|
page read and write
|
||
79F402EA5000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
49FF000
|
stack
|
page read and write
|
||
79F402514000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
79F402B20000
|
trusted library allocation
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
69E4006D0000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
E1F000
|
heap
|
page read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
69E4006CC000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
69E400718000
|
trusted library allocation
|
page read and write
|
||
46F0000
|
heap
|
page read and write
|
||
79F4023D8000
|
trusted library allocation
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
79F4023F0000
|
trusted library allocation
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
7E42000
|
heap
|
page read and write
|
||
42A4DFA000
|
stack
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
236C00280000
|
direct allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
7227000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
69E4006B4000
|
trusted library allocation
|
page read and write
|
||
7419000
|
heap
|
page read and write
|
||
236C002AC000
|
direct allocation
|
page read and write
|
||
4F40000
|
direct allocation
|
page read and write
|
||
163E000
|
heap
|
page read and write
|
||
B37000
|
heap
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
41BF000
|
stack
|
page read and write
|
||
69E400614000
|
trusted library allocation
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
1A050011000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
79F403093000
|
trusted library allocation
|
page read and write
|
||
42B95FE000
|
unkown
|
page readonly
|
||
236C00234000
|
direct allocation
|
page read and write
|
||
6AA0000
|
trusted library allocation
|
page read and write
|
||
4F3F000
|
stack
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
79F40309C000
|
trusted library allocation
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
79F402D20000
|
trusted library allocation
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
14F0000
|
direct allocation
|
page execute and read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
2820000
|
direct allocation
|
page execute and read and write
|
||
443E000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
71E4000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
69E400784000
|
trusted library allocation
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
5E0000
|
direct allocation
|
page read and write
|
||
7118000
|
heap
|
page read and write
|
||
79F402A94000
|
trusted library allocation
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
4E7E000
|
stack
|
page read and write
|
||
407E000
|
stack
|
page read and write
|
||
71AD000
|
heap
|
page read and write
|
||
79F4030E8000
|
trusted library allocation
|
page read and write
|
||
6AB0000
|
heap
|
page read and write
|
||
71EB000
|
direct allocation
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
5050000
|
trusted library allocation
|
page read and write
|
||
79F40240C000
|
trusted library allocation
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
79F402401000
|
trusted library allocation
|
page read and write
|
||
48FF000
|
stack
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1A04FFE3000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
69E400730000
|
trusted library allocation
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
69E400330000
|
trusted library allocation
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
236C00250000
|
direct allocation
|
page read and write
|
||
79F402410000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
direct allocation
|
page execute and read and write
|
||
42AFDFE000
|
stack
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
69E400354000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
429CDFE000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
79F4029D1000
|
trusted library allocation
|
page read and write
|
||
C59000
|
unkown
|
page write copy
|
||
79F40221C000
|
trusted library allocation
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
69E400330000
|
trusted library allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
57F000
|
unkown
|
page execute and write copy
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
46E1000
|
heap
|
page read and write
|
||
42A05FE000
|
unkown
|
page readonly
|
||
6C3400264000
|
trusted library allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
46E1000
|
heap
|
page read and write
|
||
304F000
|
stack
|
page read and write
|
||
42B2DFB000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A050547000
|
heap
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
4B7F000
|
stack
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
6C3400294000
|
trusted library allocation
|
page read and write
|
||
42B4DFD000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4E54000
|
heap
|
page read and write
|
||
E5B000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
6C34002A0000
|
trusted library allocation
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
442F000
|
stack
|
page read and write
|
||
79F402EC8000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
1A05050D000
|
heap
|
page read and write
|
||
1A050011000
|
heap
|
page read and write
|
||
69E400390000
|
trusted library allocation
|
page read and write
|
||
79F402EDC000
|
trusted library allocation
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
79F402498000
|
trusted library allocation
|
page read and write
|
||
30F7000
|
heap
|
page read and write
|
||
79F402E30000
|
trusted library allocation
|
page read and write
|
||
DF4000
|
heap
|
page read and write
|
||
4A10000
|
direct allocation
|
page execute and read and write
|
||
79F402F78000
|
trusted library allocation
|
page read and write
|
||
79F402DDC000
|
trusted library allocation
|
page read and write
|
||
79F403090000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79F402968000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
direct allocation
|
page execute and read and write
|
||
79F40281C000
|
trusted library allocation
|
page read and write
|
||
C25000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
4CB0000
|
direct allocation
|
page execute and read and write
|
||
1A050538000
|
heap
|
page read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
1A0558D7000
|
unclassified section
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
F01000
|
unkown
|
page execute and read and write
|
||
69E400430000
|
trusted library allocation
|
page read and write
|
||
1A050557000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
551F000
|
stack
|
page read and write
|
||
7221000
|
heap
|
page read and write
|
||
69E400320000
|
trusted library allocation
|
page read and write
|
||
6C3400201000
|
trusted library allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
E56000
|
heap
|
page read and write
|
||
1A050011000
|
heap
|
page read and write
|
||
42A3DFE000
|
stack
|
page read and write
|
||
48FE000
|
stack
|
page read and write
|
||
79F4030F8000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
1A056890000
|
trusted library section
|
page read and write
|
||
37AF000
|
stack
|
page read and write
|
||
69E4002F4000
|
trusted library allocation
|
page read and write
|
||
79F402A9C000
|
trusted library allocation
|
page read and write
|
||
69E40035C000
|
trusted library allocation
|
page read and write
|
||
1A04FFDB000
|
heap
|
page read and write
|
||
79F402FA4000
|
trusted library allocation
|
page read and write
|
||
42C7DFE000
|
stack
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
79F40234C000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
55A0000
|
direct allocation
|
page execute and read and write
|
||
E20000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1A05648A000
|
heap
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
42BF5FE000
|
unkown
|
page readonly
|
||
1A050011000
|
heap
|
page read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
79F402720000
|
trusted library allocation
|
page read and write
|
||
79F40306C000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
unkown
|
page readonly
|
||
2A2C000
|
stack
|
page read and write
|
||
69E400788000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
1A05056E000
|
heap
|
page read and write
|
||
79F4028FC000
|
trusted library allocation
|
page read and write
|
||
79F402584000
|
trusted library allocation
|
page read and write
|
||
6480000
|
heap
|
page read and write
|
||
34FF000
|
stack
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
3B8F000
|
stack
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
79F4028D0000
|
trusted library allocation
|
page read and write
|
||
1A056D3D000
|
trusted library section
|
page read and write
|
||
3E1000
|
unkown
|
page execute and write copy
|
||
4D60000
|
direct allocation
|
page execute and read and write
|
||
46E1000
|
heap
|
page read and write
|
||
726A000
|
heap
|
page read and write
|
||
79F402DD4000
|
trusted library allocation
|
page read and write
|
||
3E2000
|
unkown
|
page execute and write copy
|
||
DEF000
|
heap
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1A050011000
|
heap
|
page read and write
|
||
1A050011000
|
heap
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
236C00294000
|
direct allocation
|
page read and write
|
||
429D5FE000
|
unkown
|
page readonly
|
||
55F0000
|
direct allocation
|
page execute and read and write
|
||
344E000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79F4031EC000
|
trusted library allocation
|
page read and write
|
||
738E000
|
heap
|
page read and write
|
||
1A04FFE3000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
79F4022A8000
|
trusted library allocation
|
page read and write
|
||
3B3F000
|
stack
|
page read and write
|
||
4BAE000
|
stack
|
page read and write
|
||
DDD000
|
unkown
|
page execute and read and write
|
||
E29000
|
heap
|
page read and write
|
||
7058000
|
heap
|
page read and write
|
||
69E4006E0000
|
trusted library allocation
|
page read and write
|
||
69E400754000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
79F402508000
|
trusted library allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
42C85FE000
|
unkown
|
page readonly
|
||
184000
|
heap
|
page read and write
|
||
79F4028E0000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
79F402FE0000
|
trusted library allocation
|
page read and write
|
||
3CC000
|
stack
|
page read and write
|
||
79F4023B4000
|
trusted library allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
79F4026FC000
|
trusted library allocation
|
page read and write
|
||
79F402E90000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
79F4026D4000
|
trusted library allocation
|
page read and write
|
||
6C3400270000
|
trusted library allocation
|
page read and write
|
||
1A04FFEB000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
9CA000
|
stack
|
page read and write
|
||
6C34002D8000
|
trusted library allocation
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
6C34002C0000
|
trusted library allocation
|
page read and write
|
||
38FF000
|
stack
|
page read and write
|
||
2A4F000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
69E400408000
|
trusted library allocation
|
page read and write
|
||
79F402C3C000
|
trusted library allocation
|
page read and write
|
||
7053000
|
heap
|
page read and write
|
||
1A052770000
|
trusted library allocation
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
69E4006EC000
|
trusted library allocation
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
79F402587000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
79F402C1C000
|
trusted library allocation
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
79F402201000
|
trusted library allocation
|
page read and write
|
||
1A056DBE000
|
trusted library section
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
79F403088000
|
trusted library allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
28A7000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
79F402548000
|
trusted library allocation
|
page read and write
|
||
79F402654000
|
trusted library allocation
|
page read and write
|
||
647F000
|
stack
|
page read and write
|
||
429EDFE000
|
stack
|
page read and write
|
||
184000
|
heap
|
page read and write
|
||
1A056D70000
|
trusted library section
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
41EE000
|
stack
|
page read and write
|
||
705E000
|
heap
|
page read and write
|
||
41AF000
|
stack
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
79F403088000
|
trusted library allocation
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
46F1000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
E43000
|
heap
|
page read and write
|
||
79F402C01000
|
trusted library allocation
|
page read and write
|
||
69E4006C4000
|
trusted library allocation
|
page read and write
|
||
7235000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79F4030A8000
|
trusted library allocation
|
page read and write
|
||
79F402B68000
|
trusted library allocation
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
79F4024A8000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
163A000
|
heap
|
page read and write
|
||
1A0561D3000
|
trusted library section
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
42C9DFE000
|
stack
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
E56000
|
heap
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
B3B000
|
heap
|
page read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
E43000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
E7F000
|
heap
|
page read and write
|
||
79F402494000
|
trusted library allocation
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4921000
|
direct allocation
|
page read and write
|
||
EEB000
|
unkown
|
page execute and read and write
|
||
236C002D0000
|
direct allocation
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
BF0000
|
unkown
|
page readonly
|
||
6C34002B0000
|
trusted library allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
715A000
|
heap
|
page read and write
|
||
715D000
|
heap
|
page read and write
|
||
DDD000
|
unkown
|
page execute and read and write
|
||
340F000
|
stack
|
page read and write
|
||
69E400698000
|
trusted library allocation
|
page read and write
|
||
7056000
|
heap
|
page read and write
|
||
7148000
|
heap
|
page read and write
|
||
69E40075C000
|
trusted library allocation
|
page read and write
|
||
79F4026E0000
|
trusted library allocation
|
page read and write
|
||
1A050000000
|
heap
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
705D000
|
heap
|
page read and write
|
||
70EC000
|
heap
|
page read and write
|
||
42AD5FE000
|
unkown
|
page readonly
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
13B000
|
unkown
|
page execute and read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
79F40240C000
|
trusted library allocation
|
page read and write
|
||
7059000
|
heap
|
page read and write
|
||
5E0000
|
direct allocation
|
page read and write
|
||
79F402DA8000
|
trusted library allocation
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
79F40237C000
|
trusted library allocation
|
page read and write
|
||
69E4002DC000
|
trusted library allocation
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
73C9000
|
heap
|
page read and write
|
||
79F402EF8000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
direct allocation
|
page read and write
|
||
79F402ED8000
|
trusted library allocation
|
page read and write
|
||
79F402B88000
|
trusted library allocation
|
page read and write
|
||
79F402E0C000
|
trusted library allocation
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
4F51000
|
heap
|
page read and write
|
||
280E000
|
stack
|
page read and write
|
||
79F40296A000
|
trusted library allocation
|
page read and write
|
||
4BBE000
|
stack
|
page read and write
|
||
79F402550000
|
trusted library allocation
|
page read and write
|
||
F01000
|
unkown
|
page execute and write copy
|
||
79F402490000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
42FF000
|
stack
|
page read and write
|
||
79F402418000
|
trusted library allocation
|
page read and write
|
||
3CB000
|
unkown
|
page execute and read and write
|
||
720C000
|
heap
|
page read and write
|
||
31FF000
|
stack
|
page read and write
|
||
42B75FE000
|
unkown
|
page readonly
|
||
42B35FE000
|
unkown
|
page readonly
|
||
69E4007C8000
|
trusted library allocation
|
page read and write
|
||
69E400688000
|
trusted library allocation
|
page read and write
|
||
1A050516000
|
heap
|
page read and write
|
||
1A056DB0000
|
trusted library section
|
page read and write
|
||
79F400A01000
|
trusted library allocation
|
page read and write
|
||
79F402E90000
|
trusted library allocation
|
page read and write
|
||
7055000
|
heap
|
page read and write
|
||
BBF000
|
stack
|
page read and write
|
||
79F40260C000
|
trusted library allocation
|
page read and write
|
||
69E400238000
|
trusted library allocation
|
page read and write
|
||
393E000
|
stack
|
page read and write
|
||
E56000
|
heap
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
40BE000
|
stack
|
page read and write
|
||
79F402A48000
|
trusted library allocation
|
page read and write
|
||
5590000
|
direct allocation
|
page execute and read and write
|
||
79F402F3C000
|
trusted library allocation
|
page read and write
|
||
5990000
|
heap
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
6C340020C000
|
trusted library allocation
|
page read and write
|
||
E1E000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
79F4022D0000
|
trusted library allocation
|
page read and write
|
||
79F402EB0000
|
trusted library allocation
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
3A3E000
|
stack
|
page read and write
|
||
1A056C73000
|
trusted library section
|
page read and write
|
||
69E400368000
|
trusted library allocation
|
page read and write
|
||
42C65FE000
|
unkown
|
page readonly
|
||
79F4031A0000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
79F402F3C000
|
trusted library allocation
|
page read and write
|
||
42A0DFD000
|
stack
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
1A04FFDD000
|
heap
|
page read and write
|
||
184000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
69E400348000
|
trusted library allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
E5D000
|
heap
|
page read and write
|
||
274F000
|
stack
|
page read and write
|
||
1A056C0E000
|
trusted library section
|
page read and write
|
||
B3D000
|
heap
|
page read and write
|
||
79F402494000
|
trusted library allocation
|
page read and write
|
||
69E400700000
|
trusted library allocation
|
page read and write
|
||
705A000
|
heap
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
302F000
|
stack
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
4BB1000
|
direct allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
69E400310000
|
trusted library allocation
|
page read and write
|
||
69E40020C000
|
trusted library allocation
|
page read and write
|
||
79F402965000
|
trusted library allocation
|
page read and write
|
||
42A55FE000
|
unkown
|
page readonly
|
||
46D1000
|
heap
|
page read and write
|
||
41FE000
|
stack
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
EEB000
|
unkown
|
page execute and read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
14E0000
|
direct allocation
|
page read and write
|
||
4E3B000
|
stack
|
page read and write
|
||
4BD1000
|
direct allocation
|
page read and write
|
||
69E400248000
|
trusted library allocation
|
page read and write
|
||
236C00303000
|
direct allocation
|
page read and write
|
||
69E4003EC000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
DDD000
|
unkown
|
page execute and read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
4F51000
|
heap
|
page read and write
|
||
7055000
|
heap
|
page read and write
|
||
46BE000
|
stack
|
page read and write
|
||
42C35FE000
|
stack
|
page read and write
|
||
2B4F000
|
stack
|
page read and write
|
||
236C00290000
|
direct allocation
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
79F40225F000
|
trusted library allocation
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
42BDDFB000
|
stack
|
page read and write
|
||
53E0000
|
direct allocation
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
3C7F000
|
stack
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
841000
|
heap
|
page read and write
|
||
3F3E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
42AB5FE000
|
unkown
|
page readonly
|
||
5570000
|
direct allocation
|
page execute and read and write
|
||
300E000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
69E400760000
|
trusted library allocation
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
1A04FFFB000
|
heap
|
page read and write
|
||
41BE000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79F40228C000
|
trusted library allocation
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
594000
|
heap
|
page read and write
|
||
1A04FFDD000
|
heap
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
79F40247C000
|
trusted library allocation
|
page read and write
|
||
38EF000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
4F40000
|
direct allocation
|
page read and write
|
||
79F4027CC000
|
trusted library allocation
|
page read and write
|
||
42C3DFE000
|
unkown
|
page readonly
|
||
42BB5FE000
|
unkown
|
page readonly
|
||
8A4000
|
heap
|
page read and write
|
||
1A056C40000
|
trusted library section
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
79F402FB4000
|
trusted library allocation
|
page read and write
|
||
79F4024B4000
|
trusted library allocation
|
page read and write
|
||
79F402D5C000
|
trusted library allocation
|
page read and write
|
||
743C000
|
heap
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
79F40220C000
|
trusted library allocation
|
page read and write
|
||
79F40300C000
|
trusted library allocation
|
page read and write
|
||
4F51000
|
heap
|
page read and write
|
||
6C34002C0000
|
trusted library allocation
|
page read and write
|
||
DF5000
|
heap
|
page read and write
|
||
79F4024B4000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
8CB000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
79F40296C000
|
trusted library allocation
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04CB67000
|
heap
|
page read and write
|
||
42BADFD000
|
stack
|
page read and write
|
||
79F4024FC000
|
trusted library allocation
|
page read and write
|
||
2C7F000
|
stack
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
54FD000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
79F40241C000
|
trusted library allocation
|
page read and write
|
||
6C3400230000
|
trusted library allocation
|
page read and write
|
||
1A056160000
|
trusted library section
|
page read and write
|
||
42C0DFD000
|
stack
|
page read and write
|
||
1A050000000
|
heap
|
page read and write
|
||
36BE000
|
stack
|
page read and write
|
||
7051000
|
heap
|
page read and write
|
||
184000
|
heap
|
page read and write
|
||
79F403104000
|
trusted library allocation
|
page read and write
|
||
D1000
|
unkown
|
page execute and write copy
|
||
60F5000
|
heap
|
page read and write
|
||
46CF000
|
stack
|
page read and write
|
||
7F7B000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
79F40236C000
|
trusted library allocation
|
page read and write
|
||
236C002E4000
|
direct allocation
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
429ADEF000
|
stack
|
page read and write
|
||
6C34002A0000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
direct allocation
|
page read and write
|
||
7D6000
|
heap
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
79F40320C000
|
trusted library allocation
|
page read and write
|
||
79F403168000
|
trusted library allocation
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
E71000
|
heap
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
4F51000
|
heap
|
page read and write
|
||
493E000
|
stack
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
42B25FE000
|
unkown
|
page readonly
|
||
69E400620000
|
trusted library allocation
|
page read and write
|
||
42B05FE000
|
unkown
|
page readonly
|
||
46D1000
|
heap
|
page read and write
|
||
79F402434000
|
trusted library allocation
|
page read and write
|
||
6C34002C0000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
6C34002F0000
|
trusted library allocation
|
page read and write
|
||
1A04FFF9000
|
heap
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
3DFE000
|
stack
|
page read and write
|
||
4A70000
|
direct allocation
|
page execute and read and write
|
||
1A04CA60000
|
trusted library allocation
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
236C00201000
|
direct allocation
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
79F402F60000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
31AE000
|
stack
|
page read and write
|
||
56BD000
|
stack
|
page read and write
|
||
819000
|
heap
|
page read and write
|
||
79F4031EC000
|
trusted library allocation
|
page read and write
|
||
7219000
|
heap
|
page read and write
|
||
79F4022A0000
|
trusted library allocation
|
page read and write
|
||
7181000
|
heap
|
page read and write
|
||
69E400601000
|
trusted library allocation
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
C52000
|
unkown
|
page execute and read and write
|
||
4F51000
|
heap
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79F4025B0000
|
trusted library allocation
|
page read and write
|
||
7237000
|
heap
|
page read and write
|
||
2F0F000
|
stack
|
page read and write
|
||
4B8C000
|
stack
|
page read and write
|
||
79F4023AC000
|
trusted library allocation
|
page read and write
|
||
3B7E000
|
stack
|
page read and write
|
||
443F000
|
stack
|
page read and write
|
||
79F4023AC000
|
trusted library allocation
|
page read and write
|
||
79F40235C000
|
trusted library allocation
|
page read and write
|
||
4D30000
|
direct allocation
|
page execute and read and write
|
||
46E1000
|
heap
|
page read and write
|
||
5E0000
|
direct allocation
|
page read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
420E000
|
stack
|
page read and write
|
||
79F402F88000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
184000
|
heap
|
page read and write
|
||
79F4029D3000
|
trusted library allocation
|
page read and write
|
||
184000
|
heap
|
page read and write
|
||
4F40000
|
direct allocation
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
81BE000
|
stack
|
page read and write
|
||
79F403160000
|
trusted library allocation
|
page read and write
|
||
79F402E38000
|
trusted library allocation
|
page read and write
|
||
1A04FFDB000
|
heap
|
page read and write
|
||
1A05052A000
|
heap
|
page read and write
|
||
42ADDFE000
|
stack
|
page read and write
|
||
79F40312C000
|
trusted library allocation
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
79F402E54000
|
trusted library allocation
|
page read and write
|
||
1A04FFE8000
|
heap
|
page read and write
|
||
7056000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
4FD000
|
stack
|
page read and write
|
||
F02000
|
unkown
|
page execute and write copy
|
||
3BCE000
|
stack
|
page read and write
|
||
42A25FE000
|
unkown
|
page readonly
|
||
1A055E77000
|
unclassified section
|
page read and write
|
||
EEB000
|
unkown
|
page execute and read and write
|
||
46E1000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
6AAE000
|
heap
|
page read and write
|
||
467E000
|
stack
|
page read and write
|
||
E71000
|
heap
|
page read and write
|
||
69E4006D4000
|
trusted library allocation
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
37BF000
|
stack
|
page read and write
|
||
E01000
|
heap
|
page read and write
|
||
79F402A6C000
|
trusted library allocation
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
429DDFE000
|
stack
|
page read and write
|
||
79F402801000
|
trusted library allocation
|
page read and write
|
||
236C00284000
|
direct allocation
|
page read and write
|
||
4DFF000
|
stack
|
page read and write
|
||
71B2000
|
heap
|
page read and write
|
||
6C34002C0000
|
trusted library allocation
|
page read and write
|
||
1A056D16000
|
trusted library section
|
page read and write
|
||
4F7F000
|
stack
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
71C3000
|
heap
|
page read and write
|
||
4F40000
|
direct allocation
|
page read and write
|
||
37CF000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
444F000
|
stack
|
page read and write
|
||
79F403050000
|
trusted library allocation
|
page read and write
|
||
69E400210000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
79F402494000
|
trusted library allocation
|
page read and write
|
||
79F402864000
|
trusted library allocation
|
page read and write
|
||
79F402710000
|
trusted library allocation
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
705F000
|
heap
|
page read and write
|
||
79F402A0C000
|
trusted library allocation
|
page read and write
|
||
79F4023B4000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
direct allocation
|
page read and write
|
||
E81000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
1A054194000
|
trusted library allocation
|
page read and write
|
||
236C0020C000
|
direct allocation
|
page read and write
|
||
727C000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
6C3400248000
|
trusted library allocation
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
79F402DBC000
|
trusted library allocation
|
page read and write
|
||
79F402254000
|
trusted library allocation
|
page read and write
|
||
72D5000
|
heap
|
page read and write
|
||
79F40258F000
|
trusted library allocation
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
61FF000
|
stack
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
79F402BA4000
|
trusted library allocation
|
page read and write
|
||
4A3F000
|
stack
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
8430000
|
heap
|
page read and write
|
||
429BDFE000
|
unkown
|
page read and write
|
||
79F40256C000
|
trusted library allocation
|
page read and write
|
||
79F402FD4000
|
trusted library allocation
|
page read and write
|
||
1A050530000
|
heap
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1A056053000
|
heap
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
42B85FE000
|
unkown
|
page readonly
|
||
69E40060C000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
6661000
|
heap
|
page read and write
|
||
353F000
|
stack
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
69E400744000
|
trusted library allocation
|
page read and write
|
||
79F4024E0000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
47BF000
|
stack
|
page read and write
|
||
1A050011000
|
heap
|
page read and write
|
||
42C25FE000
|
stack
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
79F402654000
|
trusted library allocation
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
42B0DFB000
|
stack
|
page read and write
|
||
4F40000
|
direct allocation
|
page read and write
|
||
79F402334000
|
trusted library allocation
|
page read and write
|
||
278E000
|
stack
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
3F7E000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79F40249E000
|
trusted library allocation
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
6C3400260000
|
trusted library allocation
|
page read and write
|
||
236C00230000
|
direct allocation
|
page read and write
|
||
79F402A20000
|
trusted library allocation
|
page read and write
|
||
69E4006B8000
|
trusted library allocation
|
page read and write
|
||
69E400678000
|
trusted library allocation
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
E01000
|
heap
|
page read and write
|
||
430F000
|
stack
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
7196000
|
heap
|
page read and write
|
||
69E400714000
|
trusted library allocation
|
page read and write
|
||
3A4F000
|
stack
|
page read and write
|
||
5DE000
|
stack
|
page read and write
|
||
1A04CD55000
|
heap
|
page read and write
|
||
7B0000
|
unkown
|
page readonly
|
||
4CD0000
|
direct allocation
|
page execute and read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
731D000
|
heap
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
1A056460000
|
heap
|
page read and write
|
||
1A0541B2000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
79F402D68000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
73EF000
|
heap
|
page read and write
|
||
79F4028C0000
|
trusted library allocation
|
page read and write
|
||
1A04CAE8000
|
heap
|
page read and write
|
||
79F4023C8000
|
trusted library allocation
|
page read and write
|
||
717B000
|
heap
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
69E400330000
|
trusted library allocation
|
page read and write
|
||
69E400201000
|
trusted library allocation
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
4CE0000
|
direct allocation
|
page execute and read and write
|
||
46E1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
7EE000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
236C00215000
|
direct allocation
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
705B000
|
heap
|
page read and write
|
||
69E400644000
|
trusted library allocation
|
page read and write
|
||
13C000
|
stack
|
page read and write
|
||
1A04FFEB000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
79F40253C000
|
trusted library allocation
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
1A04CB9B000
|
heap
|
page read and write
|
||
717D000
|
heap
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
BE0000
|
direct allocation
|
page execute and read and write
|
||
7242000
|
heap
|
page read and write
|
||
79F4028CA000
|
trusted library allocation
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
40CE000
|
stack
|
page read and write
|
||
79F4024F0000
|
trusted library allocation
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
38FE000
|
stack
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
2B2F000
|
stack
|
page read and write
|
||
4F40000
|
direct allocation
|
page read and write
|
||
7329000
|
heap
|
page read and write
|
||
69E400724000
|
trusted library allocation
|
page read and write
|
||
1A050011000
|
heap
|
page read and write
|
||
69E400248000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
unkown
|
page read and write
|
||
55C0000
|
direct allocation
|
page execute and read and write
|
||
79F4030B4000
|
trusted library allocation
|
page read and write
|
||
42C15FE000
|
unkown
|
page readonly
|
||
184000
|
heap
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
69E4002FC000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
6C3400278000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
direct allocation
|
page read and write
|
||
71E5000
|
heap
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
42BC5FE000
|
unkown
|
page readonly
|
||
6C3400220000
|
trusted library allocation
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
79F4031F4000
|
trusted library allocation
|
page read and write
|
||
6C3400238000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
direct allocation
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
E5F000
|
heap
|
page read and write
|
||
6C34002A0000
|
trusted library allocation
|
page read and write
|
||
720A000
|
heap
|
page read and write
|
||
457E000
|
stack
|
page read and write
|
||
7058000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
4D40000
|
direct allocation
|
page execute and read and write
|
||
368F000
|
stack
|
page read and write
|
||
79F402C44000
|
trusted library allocation
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
69E400294000
|
trusted library allocation
|
page read and write
|
||
79F402428000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
3CCF000
|
stack
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
79F402DEC000
|
trusted library allocation
|
page read and write
|
||
72A6000
|
heap
|
page read and write
|
||
6C34002BC000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
79F402494000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
EF4000
|
unkown
|
page execute and read and write
|
||
1A050587000
|
heap
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
79F40255C000
|
trusted library allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
79F4028F0000
|
trusted library allocation
|
page read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
8A4000
|
heap
|
page read and write
|
||
79F4026D8000
|
trusted library allocation
|
page read and write
|
||
79F402910000
|
trusted library allocation
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
6661000
|
heap
|
page read and write
|
||
72FB000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
42C45FE000
|
stack
|
page read and write
|
||
79F402498000
|
trusted library allocation
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
705F000
|
heap
|
page read and write
|
||
79F402594000
|
trusted library allocation
|
page read and write
|
||
7D9000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
BF1000
|
unkown
|
page execute and write copy
|
||
6AA1000
|
heap
|
page read and write
|
||
BD0000
|
direct allocation
|
page read and write
|
||
69E4007CC000
|
trusted library allocation
|
page read and write
|
||
79F402980000
|
trusted library allocation
|
page read and write
|
||
79F402744000
|
trusted library allocation
|
page read and write
|
||
69E40080C000
|
trusted library allocation
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
1A056D32000
|
trusted library section
|
page read and write
|
||
E62000
|
heap
|
page read and write
|
||
69E40078C000
|
trusted library allocation
|
page read and write
|
||
408F000
|
stack
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
69E400380000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79F402BDC000
|
trusted library allocation
|
page read and write
|
||
79F402F28000
|
trusted library allocation
|
page read and write
|
||
79F4031A0000
|
trusted library allocation
|
page read and write
|
||
69E400298000
|
trusted library allocation
|
page read and write
|
||
79F402324000
|
trusted library allocation
|
page read and write
|
||
79F40251C000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
79F4029E8000
|
trusted library allocation
|
page read and write
|
||
4CC0000
|
direct allocation
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
79F402970000
|
trusted library allocation
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
4C8F000
|
stack
|
page read and write
|
||
79F402854000
|
trusted library allocation
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
4D50000
|
direct allocation
|
page execute and read and write
|
||
79F4031AC000
|
trusted library allocation
|
page read and write
|
||
42B7DFC000
|
stack
|
page read and write
|
||
E5F000
|
heap
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
79F402950000
|
trusted library allocation
|
page read and write
|
||
705B000
|
heap
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
1A05623D000
|
trusted library section
|
page read and write
|
||
42BCDFC000
|
stack
|
page read and write
|
||
1A056BF0000
|
trusted library section
|
page read and write
|
||
1A04CB95000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
DAA000
|
heap
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
453F000
|
stack
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
69E400664000
|
trusted library allocation
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
1A050557000
|
heap
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
79F4022EC000
|
trusted library allocation
|
page read and write
|
||
D0000
|
unkown
|
page read and write
|
||
71AC000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
1A04FFF5000
|
heap
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
5540000
|
direct allocation
|
page execute and read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
46E1000
|
heap
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
42BBDFE000
|
stack
|
page read and write
|
||
1A056474000
|
heap
|
page read and write
|
||
4F40000
|
direct allocation
|
page read and write
|
||
42BEDFC000
|
stack
|
page read and write
|
||
1A04CB6B000
|
heap
|
page read and write
|
||
184000
|
heap
|
page read and write
|
||
79F402EFC000
|
trusted library allocation
|
page read and write
|
||
79F4024C0000
|
trusted library allocation
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
7367000
|
heap
|
page read and write
|
||
1A050011000
|
heap
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
69E40033C000
|
trusted library allocation
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
42B9DFB000
|
stack
|
page read and write
|
||
EF4000
|
unkown
|
page execute and read and write
|
||
79F402530000
|
trusted library allocation
|
page read and write
|
||
1A050526000
|
heap
|
page read and write
|
||
712E000
|
heap
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
79F403001000
|
trusted library allocation
|
page read and write
|
||
79F4023DC000
|
trusted library allocation
|
page read and write
|
||
42BE5FE000
|
unkown
|
page readonly
|
||
E69000
|
heap
|
page read and write
|
||
46E5000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
79F402FC8000
|
trusted library allocation
|
page read and write
|
||
429E5FE000
|
unkown
|
page readonly
|
||
79F400801000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
4540000
|
trusted library allocation
|
page read and write
|
||
6C34002C0000
|
trusted library allocation
|
page read and write
|
||
79F402CC4000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
47E0000
|
trusted library allocation
|
page read and write
|
||
79F4023F4000
|
trusted library allocation
|
page read and write
|
||
7BF000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
69E40033C000
|
trusted library allocation
|
page read and write
|
||
42A5DFB000
|
stack
|
page read and write
|
||
42A75FE000
|
unkown
|
page readonly
|
||
8BF000
|
stack
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
79F40256C000
|
trusted library allocation
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
6C34002F4000
|
trusted library allocation
|
page read and write
|
||
60C000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
71EA000
|
heap
|
page read and write
|
||
1A04FFF9000
|
heap
|
page read and write
|
||
7059000
|
heap
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
60BE000
|
stack
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
456F000
|
stack
|
page read and write
|
||
7142000
|
heap
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
79F403140000
|
trusted library allocation
|
page read and write
|
||
69E400750000
|
trusted library allocation
|
page read and write
|
||
79F40280C000
|
trusted library allocation
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
79F402EEC000
|
trusted library allocation
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
79F402E48000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
79F402FBC000
|
trusted library allocation
|
page read and write
|
||
79F40275C000
|
trusted library allocation
|
page read and write
|
||
79F403038000
|
trusted library allocation
|
page read and write
|
||
3E0F000
|
stack
|
page read and write
|
||
1A04FFB0000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
380E000
|
stack
|
page read and write
|
||
79F4030DA000
|
trusted library allocation
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
69E400260000
|
trusted library allocation
|
page read and write
|
||
54BD000
|
stack
|
page read and write
|
||
79F4031BC000
|
trusted library allocation
|
page read and write
|
||
71FF000
|
heap
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
F9E000
|
stack
|
page read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
46E1000
|
heap
|
page read and write
|
||
69E400734000
|
trusted library allocation
|
page read and write
|
||
80BE000
|
stack
|
page read and write
|
||
7E40000
|
heap
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
69E400418000
|
trusted library allocation
|
page read and write
|
||
69E400220000
|
trusted library allocation
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
7188000
|
heap
|
page read and write
|
||
70FF000
|
heap
|
page read and write
|
||
79F40242C000
|
trusted library allocation
|
page read and write
|
||
184000
|
heap
|
page read and write
|
||
42C5DFA000
|
stack
|
page read and write
|
||
BF0000
|
unkown
|
page readonly
|
||
46E1000
|
heap
|
page read and write
|
||
79F4023E8000
|
trusted library allocation
|
page read and write
|
||
47D0000
|
trusted library allocation
|
page read and write
|
||
79F400C01000
|
trusted library allocation
|
page read and write
|
||
84B000
|
heap
|
page read and write
|
||
79F4028F0000
|
trusted library allocation
|
page read and write
|
||
390F000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
79F402494000
|
trusted library allocation
|
page read and write
|
||
79F402CF0000
|
trusted library allocation
|
page read and write
|
||
1A056172000
|
trusted library section
|
page read and write
|
||
6AA0000
|
heap
|
page read and write
|
||
236C00274000
|
direct allocation
|
page read and write
|
||
1A04FFE3000
|
heap
|
page read and write
|
||
1A0504FE000
|
heap
|
page read and write
|
||
236C00260000
|
direct allocation
|
page read and write
|
||
3CBE000
|
stack
|
page read and write
|
||
79F402D00000
|
trusted library allocation
|
page read and write
|
||
79F402834000
|
trusted library allocation
|
page read and write
|
||
236C002DC000
|
direct allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
6C34002B0000
|
trusted library allocation
|
page read and write
|
||
3BBE000
|
stack
|
page read and write
|
||
1A050547000
|
heap
|
page read and write
|
||
42C1DFE000
|
stack
|
page read and write
|
||
3E1000
|
unkown
|
page execute and read and write
|
||
7051000
|
heap
|
page read and write
|
||
705C000
|
heap
|
page read and write
|
||
E56000
|
heap
|
page read and write
|
||
70F4000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
79F403178000
|
trusted library allocation
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
3D4000
|
unkown
|
page execute and read and write
|
||
EBB000
|
unkown
|
page execute and read and write
|
||
BBB000
|
stack
|
page read and write
|
||
79F4023D4000
|
trusted library allocation
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
79F4023B4000
|
trusted library allocation
|
page read and write
|
||
2CCE000
|
stack
|
page read and write
|
||
14FD000
|
stack
|
page read and write
|
||
79F402268000
|
trusted library allocation
|
page read and write
|
||
79F403084000
|
trusted library allocation
|
page read and write
|
||
7B1000
|
unkown
|
page execute and write copy
|
||
4440000
|
heap
|
page read and write
|
||
73F5000
|
heap
|
page read and write
|
||
7051000
|
heap
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
C52000
|
unkown
|
page execute and read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
42B45FE000
|
unkown
|
page readonly
|
||
429FDFE000
|
stack
|
page read and write
|
||
79F402508000
|
trusted library allocation
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
79F4028F0000
|
trusted library allocation
|
page read and write
|
||
79F402AE0000
|
trusted library allocation
|
page read and write
|
||
79F400201000
|
trusted library allocation
|
page read and write
|
||
79F402BC4000
|
trusted library allocation
|
page read and write
|
||
1A056BE1000
|
trusted library section
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
69E400320000
|
trusted library allocation
|
page read and write
|
||
79F402934000
|
trusted library allocation
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
407F000
|
stack
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
1A04CA70000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
7106000
|
heap
|
page read and write
|
||
42ACDFE000
|
stack
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
F02000
|
unkown
|
page execute and write copy
|
||
F01000
|
unkown
|
page execute and read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
BD0000
|
direct allocation
|
page execute and read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
317F000
|
stack
|
page read and write
|
||
1A04CD23000
|
heap
|
page read and write
|
||
1A050538000
|
heap
|
page read and write
|
||
1A050540000
|
heap
|
page read and write
|
||
6C3400274000
|
trusted library allocation
|
page read and write
|
||
79F402F80000
|
trusted library allocation
|
page read and write
|
||
53E0000
|
direct allocation
|
page read and write
|
||
1A04CA40000
|
heap
|
page read and write
|
||
42B15FE000
|
unkown
|
page readonly
|
||
79F400E01000
|
trusted library allocation
|
page read and write
|
||
4B4C000
|
stack
|
page read and write
|
||
69E400320000
|
trusted library allocation
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
79F402A01000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
4F40000
|
direct allocation
|
page read and write
|
||
F02000
|
unkown
|
page execute and write copy
|
||
E65000
|
heap
|
page read and write
|
||
41CF000
|
stack
|
page read and write
|
||
42BFDFE000
|
stack
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
714E000
|
heap
|
page read and write
|
||
42BD5FE000
|
unkown
|
page readonly
|
||
1A050450000
|
trusted library section
|
page read and write
|
||
541E000
|
stack
|
page read and write
|
||
6C34002BC000
|
trusted library allocation
|
page read and write
|
||
1A04CB83000
|
heap
|
page read and write
|
||
79F4023E0000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
direct allocation
|
page read and write
|
||
5FB000
|
heap
|
page read and write
|
||
69E400624000
|
trusted library allocation
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
79F4025A4000
|
trusted library allocation
|
page read and write
|
||
79F402C94000
|
trusted library allocation
|
page read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
BF1000
|
unkown
|
page execute and write copy
|
||
5580000
|
direct allocation
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1A04CCF0000
|
heap
|
page read and write
|
||
1A04FFC0000
|
heap
|
page read and write
|
||
79F403114000
|
trusted library allocation
|
page read and write
|
||
42CA5FE000
|
unkown
|
page readonly
|
||
6661000
|
heap
|
page read and write
|
||
79F403108000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
236C002A8000
|
direct allocation
|
page read and write
|
||
79F402BD0000
|
trusted library allocation
|
page read and write
|
||
807C000
|
stack
|
page read and write
|
||
69E4007B4000
|
trusted library allocation
|
page read and write
|
||
79F40321C000
|
trusted library allocation
|
page read and write
|
||
303F000
|
stack
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
429F5FE000
|
unkown
|
page readonly
|
||
236C002EC000
|
direct allocation
|
page read and write
|
||
79F402F6C000
|
trusted library allocation
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
7058000
|
heap
|
page read and write
|
||
C5B000
|
unkown
|
page execute and read and write
|
||
79F40249E000
|
trusted library allocation
|
page read and write
|
||
308E000
|
stack
|
page read and write
|
||
79F402B34000
|
trusted library allocation
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
7055000
|
heap
|
page read and write
|
||
60F6000
|
heap
|
page read and write
|
||
79F4022FC000
|
trusted library allocation
|
page read and write
|
||
3EFF000
|
stack
|
page read and write
|
||
1A050011000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
79F4022E0000
|
trusted library allocation
|
page read and write
|
||
1A056C50000
|
trusted library section
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79F402528000
|
trusted library allocation
|
page read and write
|
||
46B0000
|
heap
|
page read and write
|
||
79F4023EC000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
69E400694000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
1A04FFE7000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
79F402CA0000
|
trusted library allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
EF4000
|
unkown
|
page execute and read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
5E0000
|
direct allocation
|
page read and write
|
||
637E000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
705C000
|
heap
|
page read and write
|
||
46D0000
|
heap
|
page read and write
|
||
307E000
|
stack
|
page read and write
|
||
79F402940000
|
trusted library allocation
|
page read and write
|
||
79F4023E4000
|
trusted library allocation
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
3D0D000
|
stack
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
79F402730000
|
trusted library allocation
|
page read and write
|
||
31CE000
|
stack
|
page read and write
|
||
69E400320000
|
trusted library allocation
|
page read and write
|
||
1A050000000
|
heap
|
page read and write
|
||
842C000
|
stack
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
79F400001000
|
trusted library allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
69E400610000
|
trusted library allocation
|
page read and write
|
||
1A055E47000
|
unclassified section
|
page read and write
|
||
69E400684000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
55D0000
|
direct allocation
|
page execute and read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
7050000
|
heap
|
page read and write
|
||
2CAE000
|
stack
|
page read and write
|
||
1A04FFD9000
|
heap
|
page read and write
|
||
DF2000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79F4031C8000
|
trusted library allocation
|
page read and write
|
||
69E400354000
|
trusted library allocation
|
page read and write
|
||
429C5FE000
|
unkown
|
page readonly
|
||
5E0000
|
direct allocation
|
page read and write
|
||
4D00000
|
direct allocation
|
page execute and read and write
|
||
4CAF000
|
stack
|
page read and write
|
||
42AE5FE000
|
unkown
|
page readonly
|
||
46D0000
|
direct allocation
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
69E4006B0000
|
trusted library allocation
|
page read and write
|
||
79F402D04000
|
trusted library allocation
|
page read and write
|
||
132000
|
unkown
|
page execute and read and write
|
||
79F402D6C000
|
trusted library allocation
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
BF0000
|
unkown
|
page read and write
|
||
79F402F0C000
|
trusted library allocation
|
page read and write
|
||
6C34002A0000
|
trusted library allocation
|
page read and write
|
||
7054000
|
heap
|
page read and write
|
||
1A05052A000
|
heap
|
page read and write
|
||
5530000
|
direct allocation
|
page execute and read and write
|
||
BE0000
|
direct allocation
|
page execute and read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79F403078000
|
trusted library allocation
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
3CBF000
|
stack
|
page read and write
|
||
42EF000
|
stack
|
page read and write
|
||
79F402EA5000
|
trusted library allocation
|
page read and write
|
||
79F402F0C000
|
trusted library allocation
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
1A056690000
|
trusted library section
|
page read and write
|
||
109F000
|
unkown
|
page execute and write copy
|
||
79F402528000
|
trusted library allocation
|
page read and write
|
||
E6D000
|
heap
|
page read and write
|
||
4E3E000
|
stack
|
page read and write
|
||
42ABDFA000
|
stack
|
page read and write
|
||
4D20000
|
direct allocation
|
page execute and read and write
|
||
46E1000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
E56000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1A04CD20000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
109D000
|
unkown
|
page execute and read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
1A0570EE000
|
trusted library section
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
377F000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
6C3400250000
|
trusted library allocation
|
page read and write
|
||
79F402ABC000
|
trusted library allocation
|
page read and write
|
||
6AB0000
|
heap
|
page read and write
|
||
E71000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
1A0504D0000
|
heap
|
page read and write
|
||
69E40040C000
|
trusted library allocation
|
page read and write
|
||
7058000
|
heap
|
page read and write
|
||
47FE000
|
stack
|
page read and write
|
||
1A04FFEB000
|
heap
|
page read and write
|
||
4CA0000
|
direct allocation
|
page execute and read and write
|
||
B20000
|
direct allocation
|
page read and write
|
||
69E4002ED000
|
trusted library allocation
|
page read and write
|
||
E1C000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
69E400250000
|
trusted library allocation
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
33FF000
|
stack
|
page read and write
|
||
C59000
|
unkown
|
page write copy
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
6D30000
|
direct allocation
|
page execute and read and write
|
||
1A04CA00000
|
heap
|
page readonly
|
||
46D1000
|
heap
|
page read and write
|
||
7058000
|
heap
|
page read and write
|
||
1A04C920000
|
heap
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
55E0000
|
direct allocation
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
BD0000
|
direct allocation
|
page read and write
|
||
79F4023B4000
|
trusted library allocation
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
3F4F000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79B000
|
heap
|
page read and write
|
||
79F4028B4000
|
trusted library allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
79F402F2C000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
direct allocation
|
page read and write
|
||
C5B000
|
unkown
|
page execute and read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
32CF000
|
stack
|
page read and write
|
||
79F402580000
|
trusted library allocation
|
page read and write
|
||
2C6F000
|
stack
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
F01000
|
unkown
|
page execute and write copy
|
||
42C8DFE000
|
stack
|
page read and write
|
||
E69000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
DFF000
|
heap
|
page read and write
|
||
109D000
|
unkown
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
79F4027BC000
|
trusted library allocation
|
page read and write
|
||
79F402528000
|
trusted library allocation
|
page read and write
|
||
42C4DFE000
|
unkown
|
page readonly
|
||
46D1000
|
heap
|
page read and write
|
||
79F402E5C000
|
trusted library allocation
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
7052000
|
heap
|
page read and write
|
||
4F40000
|
direct allocation
|
page read and write
|
||
417F000
|
stack
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
4F50000
|
heap
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
42A15FE000
|
unkown
|
page readonly
|
||
6FD000
|
stack
|
page read and write
|
||
79F400601000
|
trusted library allocation
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
5E0000
|
direct allocation
|
page read and write
|
||
5600000
|
direct allocation
|
page execute and read and write
|
||
526E000
|
stack
|
page read and write
|
||
6C3400235000
|
trusted library allocation
|
page read and write
|
||
79F402654000
|
trusted library allocation
|
page read and write
|
||
7118000
|
heap
|
page read and write
|
||
5550000
|
direct allocation
|
page execute and read and write
|
||
8A4000
|
heap
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
594000
|
heap
|
page read and write
|
||
79F402F3C000
|
trusted library allocation
|
page read and write
|
||
1A050519000
|
heap
|
page read and write
|
||
623E000
|
stack
|
page read and write
|
||
46E0000
|
heap
|
page read and write
|
||
79F4024BA000
|
trusted library allocation
|
page read and write
|
||
39B000
|
unkown
|
page execute and read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
2837000
|
heap
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
69E4007D0000
|
trusted library allocation
|
page read and write
|
||
8431000
|
heap
|
page read and write
|
||
E43000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
BF0000
|
unkown
|
page read and write
|
||
60F0000
|
heap
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
79F4031AC000
|
trusted library allocation
|
page read and write
|
||
C59000
|
unkown
|
page write copy
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
F01000
|
unkown
|
page execute and write copy
|
||
4F40000
|
direct allocation
|
page read and write
|
||
184000
|
heap
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
718A000
|
heap
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
42B3DFD000
|
stack
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
79F4027DC000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
6C34002BC000
|
trusted library allocation
|
page read and write
|
||
1A050540000
|
heap
|
page read and write
|
||
79F402AEC000
|
trusted library allocation
|
page read and write
|
||
C59000
|
unkown
|
page write copy
|
||
5E0000
|
direct allocation
|
page read and write
|
||
31BE000
|
stack
|
page read and write
|
||
2810000
|
direct allocation
|
page execute and read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79F4030C0000
|
trusted library allocation
|
page read and write
|
||
1A04CA10000
|
heap
|
page read and write
|
||
79F40238C000
|
trusted library allocation
|
page read and write
|
||
C59000
|
unkown
|
page write copy
|
||
6661000
|
heap
|
page read and write
|
||
3F3F000
|
stack
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
79F4024F0000
|
trusted library allocation
|
page read and write
|
||
6C34002E4000
|
trusted library allocation
|
page read and write
|
||
79F402B08000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
14E0000
|
direct allocation
|
page read and write
|
||
139000
|
unkown
|
page write copy
|
||
6661000
|
heap
|
page read and write
|
||
79F401001000
|
trusted library allocation
|
page read and write
|
||
79F402924000
|
trusted library allocation
|
page read and write
|
||
1A04F280000
|
unkown
|
page read and write
|
||
28EE000
|
stack
|
page read and write
|
||
79F402DA8000
|
trusted library allocation
|
page read and write
|
||
4A00000
|
direct allocation
|
page execute and read and write
|
||
8A4000
|
heap
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
6C34002BC000
|
trusted library allocation
|
page read and write
|
||
7209000
|
heap
|
page read and write
|
||
79F4027F0000
|
trusted library allocation
|
page read and write
|
||
79F4024F0000
|
trusted library allocation
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
69E400401000
|
trusted library allocation
|
page read and write
|
||
42B8DFD000
|
stack
|
page read and write
|
||
4B70000
|
direct allocation
|
page read and write
|
||
1A04FFF5000
|
heap
|
page read and write
|
||
6C34002B0000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
1A04FFF8000
|
heap
|
page read and write
|
||
42C75FE000
|
unkown
|
page readonly
|
||
7052000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04CAE0000
|
heap
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
6C34002BC000
|
trusted library allocation
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
79F402E88000
|
trusted library allocation
|
page read and write
|
||
79F40302C000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
536F000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79F402398000
|
trusted library allocation
|
page read and write
|
||
79F403040000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
C5B000
|
unkown
|
page execute and read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
4CBF000
|
stack
|
page read and write
|
||
184000
|
heap
|
page read and write
|
||
3E4E000
|
stack
|
page read and write
|
||
1A050574000
|
heap
|
page read and write
|
||
42AADFD000
|
stack
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
BF1000
|
unkown
|
page execute and write copy
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
7052000
|
heap
|
page read and write
|
||
73AB000
|
heap
|
page read and write
|
||
79F402498000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
79F4024A4000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
1A0000
|
heap
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
71DE000
|
heap
|
page read and write
|
||
4F51000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
69E4006C8000
|
trusted library allocation
|
page read and write
|
||
69E4006E8000
|
trusted library allocation
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
79F402530000
|
trusted library allocation
|
page read and write
|
||
79F4029DC000
|
trusted library allocation
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
109D000
|
unkown
|
page execute and read and write
|
||
46D1000
|
heap
|
page read and write
|
||
109F000
|
unkown
|
page execute and write copy
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
109F000
|
unkown
|
page execute and write copy
|
||
6D20000
|
direct allocation
|
page execute and read and write
|
||
42B5DFB000
|
stack
|
page read and write
|
||
69E400758000
|
trusted library allocation
|
page read and write
|
||
79F4030CC000
|
trusted library allocation
|
page read and write
|
||
42C55FE000
|
unkown
|
page readonly
|
||
E25000
|
heap
|
page read and write
|
||
1A056216000
|
trusted library section
|
page read and write
|
||
79F402C64000
|
trusted library allocation
|
page read and write
|
||
7053000
|
heap
|
page read and write
|
||
7056000
|
heap
|
page read and write
|
||
3F2F000
|
stack
|
page read and write
|
||
4A50000
|
direct allocation
|
page execute and read and write
|
||
79F4029BC000
|
trusted library allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
79F4023A0000
|
trusted library allocation
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
36CE000
|
stack
|
page read and write
|
||
1A04FFF6000
|
heap
|
page read and write
|
||
79F402658000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
direct allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
69E400280000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
70F7000
|
heap
|
page read and write
|
||
69E400424000
|
trusted library allocation
|
page read and write
|
||
69E4006FC000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
79F402E01000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
433E000
|
stack
|
page read and write
|
||
79F402938000
|
trusted library allocation
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
1A055F10000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
1A056BD0000
|
trusted library section
|
page read and write
|
||
7053000
|
heap
|
page read and write
|
||
79F4024B4000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79F40255C000
|
trusted library allocation
|
page read and write
|
||
79F402601000
|
trusted library allocation
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
79F402F54000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
69E400704000
|
trusted library allocation
|
page read and write
|
||
79F40271B000
|
trusted library allocation
|
page read and write
|
||
236C00270000
|
direct allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFF8000
|
heap
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
1A04FFE2000
|
heap
|
page read and write
|
||
1A05647D000
|
heap
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
69E400630000
|
trusted library allocation
|
page read and write
|
||
42AF5FE000
|
unkown
|
page readonly
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
E71000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
DAE000
|
heap
|
page read and write
|
||
79F402F44000
|
trusted library allocation
|
page read and write
|
||
69E4002C0000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
42BF000
|
stack
|
page read and write
|
||
633F000
|
stack
|
page read and write
|
||
79F402280000
|
trusted library allocation
|
page read and write
|
||
79F4023AC000
|
trusted library allocation
|
page read and write
|
||
7092000
|
direct allocation
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
1A056232000
|
trusted library section
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
79F402750000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79F402420000
|
trusted library allocation
|
page read and write
|
||
1A04CAA0000
|
trusted library section
|
page readonly
|
||
79F40253C000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
318F000
|
stack
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
79F40251C000
|
trusted library allocation
|
page read and write
|
||
69E400770000
|
trusted library allocation
|
page read and write
|
||
6C34002C8000
|
trusted library allocation
|
page read and write
|
||
79F402DB4000
|
trusted library allocation
|
page read and write
|
||
3CFE000
|
stack
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A0505D0000
|
trusted library section
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
3DFF000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
42A6DFC000
|
stack
|
page read and write
|
||
6C34002F8000
|
trusted library allocation
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
79F402430000
|
trusted library allocation
|
page read and write
|
||
69E4002C8000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
4CF0000
|
direct allocation
|
page execute and read and write
|
||
4F40000
|
direct allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
42AC5FE000
|
unkown
|
page readonly
|
||
46D1000
|
heap
|
page read and write
|
||
1A050550000
|
heap
|
page read and write
|
||
4D10000
|
direct allocation
|
page execute and read and write
|
||
46E1000
|
heap
|
page read and write
|
||
2EEF000
|
stack
|
page read and write
|
||
69E400310000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
E7F000
|
heap
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
42A35FE000
|
unkown
|
page readonly
|
||
7055000
|
heap
|
page read and write
|
||
50BE000
|
stack
|
page read and write
|
||
4B70000
|
direct allocation
|
page read and write
|
||
69E400404000
|
trusted library allocation
|
page read and write
|
||
1A04FFD8000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
3DBF000
|
stack
|
page read and write
|
||
42BA5FE000
|
unkown
|
page readonly
|
||
6661000
|
heap
|
page read and write
|
||
69E400658000
|
trusted library allocation
|
page read and write
|
||
71B8000
|
heap
|
page read and write
|
||
E7F000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFFD000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
69E400640000
|
trusted library allocation
|
page read and write
|
||
79F402274000
|
trusted library allocation
|
page read and write
|
||
1A04CD50000
|
heap
|
page read and write
|
||
D0000
|
unkown
|
page readonly
|
||
705A000
|
heap
|
page read and write
|
||
4A30000
|
direct allocation
|
page execute and read and write
|
||
46AF000
|
stack
|
page read and write
|
||
42C6DFC000
|
stack
|
page read and write
|
||
C59000
|
unkown
|
page write copy
|
||
79F403150000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79F4024A8000
|
trusted library allocation
|
page read and write
|
||
B00000
|
direct allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79F402E8C000
|
trusted library allocation
|
page read and write
|
||
357E000
|
stack
|
page read and write
|
||
716C000
|
heap
|
page read and write
|
||
E1F000
|
heap
|
page read and write
|
||
7053000
|
heap
|
page read and write
|
||
69E40069C000
|
trusted library allocation
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
79F402884000
|
trusted library allocation
|
page read and write
|
||
352F000
|
stack
|
page read and write
|
||
1A04FFF4000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
42B6DFD000
|
stack
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
69E400801000
|
trusted library allocation
|
page read and write
|
||
30CE000
|
stack
|
page read and write
|
||
184000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
79F402414000
|
trusted library allocation
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
79F402D48000
|
trusted library allocation
|
page read and write
|
||
79F400401000
|
trusted library allocation
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
5441000
|
direct allocation
|
page read and write
|
||
6C34002BC000
|
trusted library allocation
|
page read and write
|
||
42A8DFE000
|
stack
|
page read and write
|
||
57D000
|
unkown
|
page execute and read and write
|
||
71DB000
|
heap
|
page read and write
|
||
392E000
|
stack
|
page read and write
|
||
DE6000
|
heap
|
page read and write
|
||
69E4006AC000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
809000
|
heap
|
page read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
46E1000
|
heap
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
42A2DFB000
|
stack
|
page read and write
|
||
EBB000
|
unkown
|
page execute and read and write
|
||
79F4028C5000
|
trusted library allocation
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
79F402CE0000
|
trusted library allocation
|
page read and write
|
||
3A7E000
|
stack
|
page read and write
|
||
79F403060000
|
trusted library allocation
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
113C000
|
stack
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
F01000
|
unkown
|
page execute and read and write
|
||
E71000
|
heap
|
page read and write
|
||
1A04FFEF000
|
heap
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
236C0023C000
|
direct allocation
|
page read and write
|
||
42A85FE000
|
unkown
|
page readonly
|
||
69E400374000
|
trusted library allocation
|
page read and write
|
||
3B7F000
|
stack
|
page read and write
|
||
42A7DFE000
|
stack
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
79F402F70000
|
trusted library allocation
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
3E3E000
|
stack
|
page read and write
|
||
1A04FFEF000
|
heap
|
page read and write
|
||
38BF000
|
stack
|
page read and write
|
||
139000
|
unkown
|
page write copy
|
||
69E400364000
|
trusted library allocation
|
page read and write
|
||
4A80000
|
direct allocation
|
page execute and read and write
|
||
46E1000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
1A056C02000
|
trusted library section
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
7336000
|
heap
|
page read and write
|
||
C52000
|
unkown
|
page execute and read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
79F4026C8000
|
trusted library allocation
|
page read and write
|
||
42AA5FE000
|
unkown
|
page readonly
|
||
1A05056E000
|
heap
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
4F40000
|
direct allocation
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A0570E0000
|
trusted library section
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
37EE000
|
stack
|
page read and write
|
||
7218000
|
heap
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
5560000
|
direct allocation
|
page execute and read and write
|
||
832C000
|
stack
|
page read and write
|
||
1A055840000
|
trusted library section
|
page read and write
|
||
42C05FE000
|
unkown
|
page readonly
|
||
6661000
|
heap
|
page read and write
|
||
42A9DFE000
|
stack
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
1A056477000
|
heap
|
page read and write
|
||
71E9000
|
direct allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
1A04FFDE000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
1A056050000
|
heap
|
page read and write
|
||
1A0505AF000
|
heap
|
page read and write
|
||
236C00217000
|
direct allocation
|
page read and write
|
||
1A04FFF2000
|
heap
|
page read and write
|
||
79F402DE4000
|
trusted library allocation
|
page read and write
|
||
55FC000
|
stack
|
page read and write
|
||
79F402668000
|
trusted library allocation
|
page read and write
|
||
182F000
|
stack
|
page read and write
|
||
403F000
|
stack
|
page read and write
|
||
79F40256C000
|
trusted library allocation
|
page read and write
|
||
1A056C61000
|
trusted library section
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
5E0000
|
direct allocation
|
page read and write
|
||
2DAF000
|
stack
|
page read and write
|
||
57BE000
|
stack
|
page read and write
|
||
79F402DF4000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
direct allocation
|
page read and write
|
||
79F4023F8000
|
trusted library allocation
|
page read and write
|
||
69E4006E4000
|
trusted library allocation
|
page read and write
|
||
79F402F9C000
|
trusted library allocation
|
page read and write
|
||
79F40295C000
|
trusted library allocation
|
page read and write
|
||
4C90000
|
direct allocation
|
page execute and read and write
|
||
6D40000
|
direct allocation
|
page execute and read and write
|
||
42B55FE000
|
unkown
|
page readonly
|
||
71B9000
|
heap
|
page read and write
|
||
79F402B48000
|
trusted library allocation
|
page read and write
|
||
42AEDFE000
|
stack
|
page read and write
|
||
42B1DFD000
|
stack
|
page read and write
|
||
55B0000
|
direct allocation
|
page execute and read and write
|
||
EBB000
|
unkown
|
page execute and read and write
|
||
1A04FFE4000
|
heap
|
page read and write
|
||
42C95FE000
|
unkown
|
page readonly
|
||
1A050530000
|
heap
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
E46000
|
heap
|
page read and write
|
||
79F402A30000
|
trusted library allocation
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
79F402D10000
|
trusted library allocation
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
717F000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
1A04FFF0000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
594000
|
heap
|
page read and write
|
||
E5F000
|
heap
|
page read and write
|
||
236C00210000
|
direct allocation
|
page read and write
|
||
27CE000
|
stack
|
page read and write
|
||
4A7E000
|
stack
|
page read and write
|
||
71DA000
|
heap
|
page read and write
|
||
42A1DFB000
|
stack
|
page read and write
|
||
4441000
|
heap
|
page read and write
|
||
6C34002BC000
|
trusted library allocation
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1567000
|
heap
|
page read and write
|
||
46E1000
|
heap
|
page read and write
|
||
2BD000
|
unkown
|
page execute and read and write
|
||
1A050526000
|
heap
|
page read and write
|
||
6661000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
46D1000
|
heap
|
page read and write
|
||
1A04FFEA000
|
heap
|
page read and write
|
||
51FF000
|
stack
|
page read and write
|
||
42C2DFE000
|
unkown
|
page readonly
|
||
79F40311C000
|
trusted library allocation
|
page read and write
|
There are 1974 hidden memdumps, click here to show them.