Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
2jbMIxCFsK.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\Public\Libraries\Wisrysxl
|
data
|
dropped
|
||
C:\Users\Public\Libraries\Wisrysxl.PIF
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\Public\Libraries\lxsyrsiW.pif
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\Public\Wisrysxl.url
|
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Wisrysxl.PIF">), ASCII text, with CRLF line
terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\neworigin.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\server_BTC.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\Public\Libraries\PNO
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\Public\Libraries\lxsyrsiW.cmd
|
DOS batch file, Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
|
dropped
|
||
C:\Users\Public\alpha.pif
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\Public\xpha.pif
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TrojanAIbot.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\server_BTC.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fg4ivyor.q5h.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n2wmzfar.vow.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qgeewco4.ffv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rsdkekhz.lf5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmpBC1D.tmp.cmd
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\7270c52c6967b89b.bin
|
OpenPGP Secret Key
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrojanAIbot.exe.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon
number=0, Archive, ctime=Tue Nov 26 06:13:12 2024, mtime=Tue Nov 26 06:13:12 2024, atime=Tue Nov 26 06:13:09 2024, length=231936,
window=
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF, CR line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators, with overstriking
|
dropped
|
There are 15 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\2jbMIxCFsK.exe
|
"C:\Users\user\Desktop\2jbMIxCFsK.exe"
|
||
C:\Windows\SysWOW64\esentutl.exe
|
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
|
||
C:\Windows\SysWOW64\esentutl.exe
|
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o
|
||
C:\Windows\SysWOW64\esentutl.exe
|
C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\Desktop\2jbMIxCFsK.exe /d C:\\Users\\Public\\Libraries\\Wisrysxl.PIF
/o
|
||
C:\Users\Public\Libraries\lxsyrsiW.pif
|
C:\Users\Public\Libraries\lxsyrsiW.pif
|
||
C:\Users\user\AppData\Local\Temp\neworigin.exe
|
"C:\Users\user\AppData\Local\Temp\neworigin.exe"
|
||
C:\Users\user\AppData\Local\Temp\server_BTC.exe
|
"C:\Users\user\AppData\Local\Temp\server_BTC.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi'
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 02:18 /du 23:59 /sc daily
/ri 1 /f
|
||
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
|
"C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe"
|
||
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
|
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
|
||
C:\Windows\SysWOW64\timeout.exe
|
timeout 6
|
||
C:\Users\Public\Libraries\Wisrysxl.PIF
|
"C:\Users\Public\Libraries\Wisrysxl.PIF"
|
||
C:\Users\Public\Libraries\lxsyrsiW.pif
|
C:\Users\Public\Libraries\lxsyrsiW.pif
|
||
C:\Users\user\AppData\Local\Temp\neworigin.exe
|
"C:\Users\user\AppData\Local\Temp\neworigin.exe"
|
||
C:\Users\user\AppData\Local\Temp\server_BTC.exe
|
"C:\Users\user\AppData\Local\Temp\server_BTC.exe"
|
||
C:\Users\Public\Libraries\Wisrysxl.PIF
|
"C:\Users\Public\Libraries\Wisrysxl.PIF"
|
||
C:\Users\Public\Libraries\lxsyrsiW.pif
|
C:\Users\Public\Libraries\lxsyrsiW.pif
|
||
C:\Users\user\AppData\Local\Temp\neworigin.exe
|
"C:\Users\user\AppData\Local\Temp\neworigin.exe"
|
||
C:\Users\user\AppData\Local\Temp\server_BTC.exe
|
"C:\Users\user\AppData\Local\Temp\server_BTC.exe"
|
||
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
|
"C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\lxsyrsiW.cmd" "
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpBC1D.tmp.cmd""
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
There are 19 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://gxe0.com/yak/233_Wisrysx
|
unknown
|
||
https://gxe0.com/yak/233_Wisrysxlfss
|
198.252.105.91
|
||
https://gxe0.com/
|
unknown
|
||
https://api.ipify.org/
|
104.26.13.205
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://r11.o.lencr.org0#
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://r11.i.lencr.org/0
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
https://gxe0.com/yak/233_Wisrysxlfsse
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://s82.gocheapweb.com
|
unknown
|
||
https://gxe0.com/yak/233_Wisrysxlfssl
|
unknown
|
||
https://gxe0.com:443/yak/233_Wisrysxlfss
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.pmail.com
|
unknown
|
||
http://ocsp.sectigo.com0C
|
unknown
|
There are 26 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
gxe0.com
|
198.252.105.91
|
||
pywolwnvd.biz
|
54.244.188.177
|
||
api.ipify.org
|
104.26.13.205
|
||
s82.gocheapweb.com
|
51.195.88.199
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
198.252.105.91
|
gxe0.com
|
Canada
|
||
104.26.13.205
|
api.ipify.org
|
United States
|
||
51.195.88.199
|
s82.gocheapweb.com
|
France
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Wisrysxl
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
|
FileDirectory
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
290C000
|
trusted library allocation
|
page read and write
|
||
2421000
|
trusted library allocation
|
page read and write
|
||
26B1000
|
trusted library allocation
|
page read and write
|
||
7FC50000
|
direct allocation
|
page read and write
|
||
28E1000
|
trusted library allocation
|
page read and write
|
||
2914000
|
trusted library allocation
|
page read and write
|
||
244C000
|
trusted library allocation
|
page read and write
|
||
7F920000
|
direct allocation
|
page read and write
|
||
242000
|
unkown
|
page readonly
|
||
26E3000
|
trusted library allocation
|
page read and write
|
||
26D9000
|
trusted library allocation
|
page read and write
|
||
2454000
|
trusted library allocation
|
page read and write
|
||
2133F000
|
stack
|
page read and write
|
||
56BC000
|
trusted library allocation
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
4D2C000
|
stack
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
7FB3F000
|
direct allocation
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
6BDD000
|
trusted library allocation
|
page read and write
|
||
25DD000
|
trusted library allocation
|
page read and write
|
||
20D24000
|
direct allocation
|
page read and write
|
||
654E000
|
stack
|
page read and write
|
||
68C4000
|
trusted library allocation
|
page read and write
|
||
3181000
|
trusted library allocation
|
page read and write
|
||
47BE000
|
stack
|
page read and write
|
||
29B0000
|
trusted library allocation
|
page read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
6C19000
|
trusted library allocation
|
page read and write
|
||
742000
|
unkown
|
page readonly
|
||
4E6E000
|
stack
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
6A67000
|
trusted library allocation
|
page read and write
|
||
34D000
|
stack
|
page read and write
|
||
32B000
|
stack
|
page read and write
|
||
690E000
|
trusted library allocation
|
page read and write
|
||
2883000
|
heap
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
484000
|
unkown
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
7560000
|
heap
|
page execute and read and write
|
||
874000
|
trusted library allocation
|
page read and write
|
||
95B000
|
unkown
|
page read and write
|
||
69B8000
|
trusted library allocation
|
page read and write
|
||
6A38000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
57E000
|
heap
|
page read and write
|
||
4B4C000
|
heap
|
page read and write
|
||
6A09000
|
trusted library allocation
|
page read and write
|
||
6EAA000
|
trusted library allocation
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
4F63000
|
trusted library allocation
|
page read and write
|
||
26F5000
|
trusted library allocation
|
page read and write
|
||
C1E000
|
stack
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
6000000
|
trusted library allocation
|
page execute and read and write
|
||
6FD000
|
stack
|
page read and write
|
||
77AE000
|
stack
|
page read and write
|
||
25AF000
|
trusted library allocation
|
page read and write
|
||
6B06000
|
trusted library allocation
|
page read and write
|
||
6B1D000
|
trusted library allocation
|
page read and write
|
||
66D0000
|
trusted library allocation
|
page execute and read and write
|
||
2340000
|
direct allocation
|
page execute and read and write
|
||
6A54000
|
trusted library allocation
|
page read and write
|
||
6914000
|
trusted library allocation
|
page read and write
|
||
7024000
|
trusted library allocation
|
page read and write
|
||
4D9F000
|
stack
|
page read and write
|
||
531E000
|
stack
|
page read and write
|
||
6F46000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
158D000
|
trusted library allocation
|
page execute and read and write
|
||
2EE7000
|
direct allocation
|
page execute and read and write
|
||
6C2A000
|
trusted library allocation
|
page read and write
|
||
4D36000
|
trusted library allocation
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
69A8000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
6FC5000
|
trusted library allocation
|
page read and write
|
||
6AE3000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
4B65000
|
heap
|
page read and write
|
||
4D60000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
trusted library allocation
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
56F7000
|
trusted library allocation
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
6630000
|
trusted library allocation
|
page execute and read and write
|
||
9E0000
|
heap
|
page read and write
|
||
3637000
|
trusted library allocation
|
page read and write
|
||
6ADB000
|
trusted library allocation
|
page read and write
|
||
4645000
|
heap
|
page read and write
|
||
7FC20000
|
trusted library allocation
|
page execute and read and write
|
||
7F430000
|
trusted library allocation
|
page execute and read and write
|
||
7EE30000
|
direct allocation
|
page read and write
|
||
4F59000
|
trusted library allocation
|
page read and write
|
||
4F51000
|
trusted library allocation
|
page read and write
|
||
4620000
|
heap
|
page read and write
|
||
1346000
|
heap
|
page read and write
|
||
685000
|
heap
|
page read and write
|
||
1694000
|
trusted library allocation
|
page read and write
|
||
82D0000
|
trusted library allocation
|
page read and write
|
||
70E8000
|
trusted library allocation
|
page read and write
|
||
6EC6000
|
trusted library allocation
|
page read and write
|
||
7D870000
|
direct allocation
|
page read and write
|
||
21750000
|
remote allocation
|
page read and write
|
||
40D000
|
unkown
|
page write copy
|
||
64F000
|
heap
|
page read and write
|
||
740000
|
unkown
|
page readonly
|
||
2523000
|
heap
|
page read and write
|
||
4A97000
|
trusted library allocation
|
page read and write
|
||
626000
|
heap
|
page read and write
|
||
311C000
|
stack
|
page read and write
|
||
7EF0F000
|
direct allocation
|
page read and write
|
||
6A6D000
|
trusted library allocation
|
page read and write
|
||
E77000
|
heap
|
page read and write
|
||
6CA9000
|
trusted library allocation
|
page read and write
|
||
70C6000
|
trusted library allocation
|
page read and write
|
||
86A0000
|
trusted library allocation
|
page read and write
|
||
2832000
|
trusted library allocation
|
page read and write
|
||
900000
|
unkown
|
page execute and read and write
|
||
20D67000
|
direct allocation
|
page read and write
|
||
6AD7000
|
trusted library allocation
|
page read and write
|
||
2280000
|
heap
|
page read and write
|
||
608E000
|
stack
|
page read and write
|
||
5672000
|
trusted library allocation
|
page read and write
|
||
DD000
|
stack
|
page read and write
|
||
8CE000
|
stack
|
page read and write
|
||
89F9000
|
stack
|
page read and write
|
||
7EFAF000
|
direct allocation
|
page read and write
|
||
A44000
|
heap
|
page read and write
|
||
484000
|
unkown
|
page read and write
|
||
2A62000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
stack
|
page read and write
|
||
6AE9000
|
trusted library allocation
|
page read and write
|
||
6E6C000
|
trusted library allocation
|
page read and write
|
||
2109F000
|
stack
|
page read and write
|
||
4950000
|
trusted library allocation
|
page read and write
|
||
A43000
|
trusted library allocation
|
page execute and read and write
|
||
960000
|
heap
|
page read and write
|
||
22CA000
|
direct allocation
|
page read and write
|
||
700E000
|
trusted library allocation
|
page read and write
|
||
C5B000
|
trusted library allocation
|
page execute and read and write
|
||
280000
|
unkown
|
page readonly
|
||
B7D000
|
heap
|
page read and write
|
||
65CE000
|
stack
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
9BE000
|
unkown
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
6C86000
|
trusted library allocation
|
page read and write
|
||
43D8000
|
trusted library allocation
|
page read and write
|
||
5A5000
|
heap
|
page read and write
|
||
6BCA000
|
trusted library allocation
|
page read and write
|
||
83B0000
|
trusted library allocation
|
page execute and read and write
|
||
2320000
|
heap
|
page read and write
|
||
4B1E000
|
stack
|
page read and write
|
||
31CC000
|
trusted library allocation
|
page read and write
|
||
211DF000
|
stack
|
page read and write
|
||
2270000
|
heap
|
page execute and read and write
|
||
22AD000
|
direct allocation
|
page read and write
|
||
6945000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
6F4A000
|
trusted library allocation
|
page read and write
|
||
6922000
|
trusted library allocation
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
701C000
|
trusted library allocation
|
page read and write
|
||
754000
|
unkown
|
page readonly
|
||
6E66000
|
trusted library allocation
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
4B1D000
|
stack
|
page read and write
|
||
2300000
|
heap
|
page read and write
|
||
6977000
|
trusted library allocation
|
page read and write
|
||
4F9E000
|
stack
|
page read and write
|
||
6F20000
|
trusted library allocation
|
page read and write
|
||
2121E000
|
stack
|
page read and write
|
||
273D000
|
trusted library allocation
|
page read and write
|
||
4A7F000
|
stack
|
page read and write
|
||
71E9000
|
trusted library allocation
|
page read and write
|
||
44AC000
|
stack
|
page read and write
|
||
2BE3000
|
trusted library allocation
|
page read and write
|
||
37F6000
|
trusted library allocation
|
page read and write
|
||
288C000
|
heap
|
page read and write
|
||
6350000
|
trusted library allocation
|
page execute and read and write
|
||
2189F000
|
stack
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
4CCE000
|
stack
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
7E280000
|
direct allocation
|
page read and write
|
||
6981000
|
trusted library allocation
|
page read and write
|
||
2B8D000
|
heap
|
page read and write
|
||
5F70000
|
trusted library allocation
|
page read and write
|
||
29EB000
|
heap
|
page read and write
|
||
8474000
|
heap
|
page read and write
|
||
2229C000
|
heap
|
page read and write
|
||
2F72000
|
trusted library allocation
|
page read and write
|
||
215D0000
|
trusted library allocation
|
page read and write
|
||
D7D000
|
heap
|
page read and write
|
||
2467000
|
trusted library allocation
|
page read and write
|
||
22CE000
|
stack
|
page read and write
|
||
7121000
|
trusted library allocation
|
page read and write
|
||
960000
|
trusted library allocation
|
page read and write
|
||
2F75000
|
trusted library allocation
|
page execute and read and write
|
||
731B000
|
stack
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
7860000
|
trusted library allocation
|
page read and write
|
||
A25000
|
heap
|
page read and write
|
||
2220F000
|
heap
|
page read and write
|
||
2630000
|
trusted library allocation
|
page read and write
|
||
29EA000
|
heap
|
page read and write
|
||
2F94000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
7EFAF000
|
direct allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
75DF000
|
heap
|
page read and write
|
||
2131F000
|
stack
|
page read and write
|
||
6F9A000
|
trusted library allocation
|
page read and write
|
||
22B4000
|
direct allocation
|
page read and write
|
||
C34000
|
trusted library allocation
|
page read and write
|
||
69D8000
|
trusted library allocation
|
page read and write
|
||
4D6E000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
C62000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
2B44000
|
trusted library allocation
|
page read and write
|
||
3AD7000
|
trusted library allocation
|
page read and write
|
||
7161000
|
trusted library allocation
|
page read and write
|
||
C67000
|
trusted library allocation
|
page execute and read and write
|
||
780000
|
heap
|
page read and write
|
||
6B3A000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
6EBC000
|
trusted library allocation
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
7D4D9000
|
direct allocation
|
page read and write
|
||
241D000
|
trusted library allocation
|
page read and write
|
||
215BF000
|
trusted library allocation
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
62DC000
|
unkown
|
page read and write
|
||
693D000
|
trusted library allocation
|
page read and write
|
||
C57000
|
trusted library allocation
|
page execute and read and write
|
||
29F2000
|
heap
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
69F7000
|
trusted library allocation
|
page read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
6F9C000
|
trusted library allocation
|
page read and write
|
||
7DB80000
|
direct allocation
|
page read and write
|
||
2DCE000
|
direct allocation
|
page read and write
|
||
4B6B000
|
heap
|
page read and write
|
||
6EE9000
|
trusted library allocation
|
page read and write
|
||
71B3000
|
trusted library allocation
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
7046000
|
trusted library allocation
|
page read and write
|
||
7D779000
|
direct allocation
|
page read and write
|
||
7061000
|
trusted library allocation
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
7E180000
|
direct allocation
|
page read and write
|
||
943000
|
trusted library allocation
|
page execute and read and write
|
||
269C000
|
trusted library allocation
|
page read and write
|
||
6ECE000
|
trusted library allocation
|
page read and write
|
||
2B17000
|
trusted library allocation
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
210FE000
|
stack
|
page read and write
|
||
BF8000
|
trusted library allocation
|
page read and write
|
||
2260000
|
trusted library allocation
|
page execute and read and write
|
||
AFD000
|
trusted library allocation
|
page execute and read and write
|
||
63E000
|
heap
|
page read and write
|
||
215B0000
|
trusted library allocation
|
page read and write
|
||
487000
|
unkown
|
page read and write
|
||
4F20000
|
heap
|
page execute and read and write
|
||
57A0000
|
heap
|
page read and write
|
||
6F3A000
|
trusted library allocation
|
page read and write
|
||
16E0000
|
trusted library allocation
|
page read and write
|
||
6B7A000
|
heap
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
4DA5000
|
trusted library allocation
|
page read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
6E41000
|
trusted library allocation
|
page read and write
|
||
706E000
|
stack
|
page read and write
|
||
2415000
|
trusted library allocation
|
page read and write
|
||
84B2000
|
heap
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
70AA000
|
stack
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
6C7A000
|
trusted library allocation
|
page read and write
|
||
7178000
|
trusted library allocation
|
page read and write
|
||
DAE000
|
unkown
|
page read and write
|
||
5681000
|
trusted library allocation
|
page read and write
|
||
3AD5000
|
trusted library allocation
|
page read and write
|
||
2937000
|
heap
|
page read and write
|
||
65E0000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
unkown
|
page execute and read and write
|
||
89BE000
|
stack
|
page read and write
|
||
2880000
|
trusted library allocation
|
page read and write
|
||
2814000
|
trusted library allocation
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
6BF8000
|
trusted library allocation
|
page read and write
|
||
3060000
|
trusted library allocation
|
page execute and read and write
|
||
6EA8000
|
trusted library allocation
|
page read and write
|
||
7DC60000
|
direct allocation
|
page read and write
|
||
4C10000
|
heap
|
page execute and read and write
|
||
71AF000
|
trusted library allocation
|
page read and write
|
||
7DD3F000
|
direct allocation
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
F7B000
|
stack
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
706B000
|
trusted library allocation
|
page read and write
|
||
20D44000
|
direct allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
5118000
|
trusted library allocation
|
page read and write
|
||
82DB000
|
trusted library allocation
|
page read and write
|
||
68D0000
|
heap
|
page read and write
|
||
69C4000
|
trusted library allocation
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
EAC000
|
stack
|
page read and write
|
||
966000
|
trusted library allocation
|
page execute and read and write
|
||
7DC50000
|
direct allocation
|
page read and write
|
||
2BC80000
|
direct allocation
|
page read and write
|
||
73DE000
|
stack
|
page read and write
|
||
21E5D000
|
heap
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
4590000
|
heap
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
6FD7000
|
trusted library allocation
|
page read and write
|
||
2250000
|
heap
|
page read and write
|
||
83CA000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
trusted library allocation
|
page read and write
|
||
7EF60000
|
direct allocation
|
page read and write
|
||
6F7C000
|
trusted library allocation
|
page read and write
|
||
5E4E000
|
stack
|
page read and write
|
||
3985000
|
trusted library allocation
|
page read and write
|
||
E1E000
|
stack
|
page read and write
|
||
47FF000
|
stack
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
6E74000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
trusted library allocation
|
page read and write
|
||
5FF0000
|
trusted library allocation
|
page read and write
|
||
649B000
|
stack
|
page read and write
|
||
51EE000
|
unkown
|
page read and write
|
||
2CA3000
|
heap
|
page read and write
|
||
35B7000
|
trusted library allocation
|
page read and write
|
||
7DB00000
|
direct allocation
|
page read and write
|
||
4B6B000
|
heap
|
page read and write
|
||
6B17000
|
trusted library allocation
|
page read and write
|
||
698F000
|
trusted library allocation
|
page read and write
|
||
69F3000
|
trusted library allocation
|
page read and write
|
||
6B38000
|
trusted library allocation
|
page read and write
|
||
2F42000
|
trusted library allocation
|
page read and write
|
||
479000
|
unkown
|
page execute and read and write
|
||
628E000
|
stack
|
page read and write
|
||
4D42000
|
trusted library allocation
|
page read and write
|
||
2E8E000
|
direct allocation
|
page read and write
|
||
4F3B000
|
trusted library allocation
|
page read and write
|
||
6B6F000
|
trusted library allocation
|
page read and write
|
||
2770000
|
trusted library allocation
|
page read and write
|
||
6A58000
|
trusted library allocation
|
page read and write
|
||
8672000
|
trusted library allocation
|
page read and write
|
||
6F1C000
|
trusted library allocation
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
7E30F000
|
direct allocation
|
page read and write
|
||
51AE000
|
stack
|
page read and write
|
||
5F78000
|
trusted library allocation
|
page read and write
|
||
4B6B000
|
heap
|
page read and write
|
||
11A000
|
stack
|
page read and write
|
||
48CC000
|
stack
|
page read and write
|
||
2A9D000
|
trusted library allocation
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
630E000
|
stack
|
page read and write
|
||
70B0000
|
heap
|
page read and write
|
||
70D7000
|
trusted library allocation
|
page read and write
|
||
6C82000
|
trusted library allocation
|
page read and write
|
||
6B70000
|
heap
|
page read and write
|
||
900000
|
unkown
|
page execute and read and write
|
||
516E000
|
stack
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
4922000
|
trusted library allocation
|
page read and write
|
||
2830000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
6C47000
|
trusted library allocation
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
6EB4000
|
trusted library allocation
|
page read and write
|
||
7D5EC000
|
direct allocation
|
page read and write
|
||
33A7000
|
heap
|
page read and write
|
||
5ABE000
|
stack
|
page read and write
|
||
86B0000
|
trusted library allocation
|
page read and write
|
||
3010000
|
heap
|
page execute and read and write
|
||
4F90000
|
trusted library allocation
|
page read and write
|
||
10063000
|
unkown
|
page execute and read and write
|
||
7C0000
|
trusted library allocation
|
page read and write
|
||
2824000
|
trusted library allocation
|
page read and write
|
||
28D1000
|
trusted library allocation
|
page read and write
|
||
22640000
|
trusted library allocation
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
2825000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
99C000
|
unkown
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
4BCD000
|
heap
|
page read and write
|
||
4FA0000
|
trusted library allocation
|
page read and write
|
||
645F000
|
stack
|
page read and write
|
||
416000
|
unkown
|
page readonly
|
||
6937000
|
trusted library allocation
|
page read and write
|
||
6C88000
|
trusted library allocation
|
page read and write
|
||
292F000
|
stack
|
page read and write
|
||
2AC7000
|
trusted library allocation
|
page read and write
|
||
6B36000
|
trusted library allocation
|
page read and write
|
||
1641000
|
heap
|
page read and write
|
||
7DCF0000
|
direct allocation
|
page read and write
|
||
2275E000
|
heap
|
page read and write
|
||
6E4B000
|
trusted library allocation
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
5523000
|
trusted library allocation
|
page read and write
|
||
6F7E000
|
trusted library allocation
|
page read and write
|
||
63ED000
|
stack
|
page read and write
|
||
8470000
|
heap
|
page read and write
|
||
63F0000
|
heap
|
page read and write
|
||
EE9000
|
trusted library allocation
|
page read and write
|
||
2308000
|
direct allocation
|
page read and write
|
||
2A0E000
|
heap
|
page read and write
|
||
6F4C000
|
trusted library allocation
|
page read and write
|
||
20DBF000
|
direct allocation
|
page read and write
|
||
5B8D000
|
stack
|
page read and write
|
||
5D2D000
|
stack
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
269F000
|
trusted library allocation
|
page read and write
|
||
477B000
|
stack
|
page read and write
|
||
5BA1000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
9DE000
|
stack
|
page read and write
|
||
7DD1F000
|
direct allocation
|
page read and write
|
||
5DBE000
|
heap
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
6E06000
|
trusted library allocation
|
page read and write
|
||
4BB5000
|
heap
|
page read and write
|
||
5B8F000
|
stack
|
page read and write
|
||
5BE000
|
unkown
|
page read and write
|
||
691A000
|
trusted library allocation
|
page read and write
|
||
516D000
|
stack
|
page read and write
|
||
28D9000
|
trusted library allocation
|
page read and write
|
||
6B2E000
|
trusted library allocation
|
page read and write
|
||
7DD2F000
|
direct allocation
|
page read and write
|
||
7F190000
|
direct allocation
|
page read and write
|
||
25DB000
|
unkown
|
page read and write
|
||
65A0000
|
trusted library allocation
|
page execute and read and write
|
||
70A0000
|
trusted library allocation
|
page read and write
|
||
3051000
|
trusted library allocation
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
B06000
|
trusted library allocation
|
page execute and read and write
|
||
6E76000
|
trusted library allocation
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
7FA30000
|
direct allocation
|
page read and write
|
||
6BF4000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
20CE1000
|
direct allocation
|
page read and write
|
||
21A74000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
6A60000
|
trusted library allocation
|
page read and write
|
||
860000
|
trusted library allocation
|
page read and write
|
||
26EE000
|
trusted library allocation
|
page read and write
|
||
759F000
|
heap
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
6E91000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
trusted library allocation
|
page read and write
|
||
735E000
|
stack
|
page read and write
|
||
20CA1000
|
direct allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
6997000
|
trusted library allocation
|
page read and write
|
||
68B0000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
7E220000
|
direct allocation
|
page read and write
|
||
2121E000
|
stack
|
page read and write
|
||
29BF000
|
unkown
|
page read and write
|
||
7E9CF000
|
direct allocation
|
page read and write
|
||
22297000
|
heap
|
page read and write
|
||
5740000
|
heap
|
page read and write
|
||
75EC000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
E13000
|
trusted library allocation
|
page execute and read and write
|
||
A25000
|
heap
|
page read and write
|
||
7EFAF000
|
direct allocation
|
page read and write
|
||
3065000
|
trusted library allocation
|
page read and write
|
||
6EE7000
|
trusted library allocation
|
page read and write
|
||
2F47000
|
trusted library allocation
|
page execute and read and write
|
||
68D7000
|
trusted library allocation
|
page read and write
|
||
6E6A000
|
trusted library allocation
|
page read and write
|
||
2226F000
|
heap
|
page read and write
|
||
7890000
|
trusted library allocation
|
page read and write
|
||
21CF3000
|
heap
|
page read and write
|
||
697F000
|
trusted library allocation
|
page read and write
|
||
6BA6000
|
trusted library allocation
|
page read and write
|
||
7EC50000
|
direct allocation
|
page read and write
|
||
6600000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
6A8E000
|
trusted library allocation
|
page read and write
|
||
56C5000
|
trusted library allocation
|
page read and write
|
||
6912000
|
trusted library allocation
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
EC6000
|
trusted library allocation
|
page read and write
|
||
6FEE000
|
stack
|
page read and write
|
||
6EB0000
|
trusted library allocation
|
page read and write
|
||
139C000
|
heap
|
page read and write
|
||
975000
|
trusted library allocation
|
page execute and read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
7ECD0000
|
direct allocation
|
page read and write
|
||
4C80000
|
heap
|
page read and write
|
||
6A2D000
|
trusted library allocation
|
page read and write
|
||
3567000
|
trusted library allocation
|
page read and write
|
||
5BE000
|
heap
|
page read and write
|
||
A8A000
|
heap
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
6AC4000
|
trusted library allocation
|
page read and write
|
||
7442000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
6A90000
|
trusted library allocation
|
page read and write
|
||
6200000
|
trusted library allocation
|
page read and write
|
||
4BCB000
|
heap
|
page read and write
|
||
839E000
|
stack
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
4B6B000
|
heap
|
page read and write
|
||
6FAD000
|
trusted library allocation
|
page read and write
|
||
7004000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
66CF000
|
stack
|
page read and write
|
||
2254000
|
heap
|
page read and write
|
||
51EE000
|
stack
|
page read and write
|
||
3617000
|
trusted library allocation
|
page read and write
|
||
24BC000
|
stack
|
page read and write
|
||
78D0000
|
trusted library allocation
|
page read and write
|
||
20F3F000
|
stack
|
page read and write
|
||
7DC1F000
|
direct allocation
|
page read and write
|
||
8488000
|
heap
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
BEF000
|
stack
|
page read and write
|
||
D07000
|
heap
|
page read and write
|
||
6941000
|
trusted library allocation
|
page read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
2CCD000
|
heap
|
page read and write
|
||
2834000
|
trusted library allocation
|
page read and write
|
||
44D0000
|
heap
|
page read and write
|
||
6F7000
|
stack
|
page read and write
|
||
33F9000
|
trusted library allocation
|
page read and write
|
||
6AD9000
|
trusted library allocation
|
page read and write
|
||
7016000
|
trusted library allocation
|
page read and write
|
||
15BE000
|
heap
|
page read and write
|
||
7850000
|
trusted library allocation
|
page read and write
|
||
6F83000
|
trusted library allocation
|
page read and write
|
||
264E000
|
trusted library allocation
|
page read and write
|
||
1E5000
|
heap
|
page read and write
|
||
90A000
|
stack
|
page read and write
|
||
2AB5000
|
trusted library allocation
|
page read and write
|
||
4B65000
|
heap
|
page read and write
|
||
7E30F000
|
direct allocation
|
page read and write
|
||
2A0E000
|
heap
|
page read and write
|
||
2407000
|
trusted library allocation
|
page read and write
|
||
69F5000
|
trusted library allocation
|
page read and write
|
||
20DB8000
|
direct allocation
|
page read and write
|
||
4B00000
|
heap
|
page read and write
|
||
6B19000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
6EEF000
|
trusted library allocation
|
page read and write
|
||
7ED7A000
|
direct allocation
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
61E8000
|
trusted library allocation
|
page read and write
|
||
463D000
|
heap
|
page read and write
|
||
4F9000
|
stack
|
page read and write
|
||
26F7000
|
trusted library allocation
|
page read and write
|
||
6E7A000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
2F90000
|
trusted library allocation
|
page read and write
|
||
2240000
|
trusted library allocation
|
page read and write
|
||
A40000
|
trusted library allocation
|
page execute and read and write
|
||
280F000
|
stack
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
5F8E000
|
stack
|
page read and write
|
||
7F370000
|
direct allocation
|
page read and write
|
||
6F40000
|
trusted library allocation
|
page read and write
|
||
4BDC000
|
stack
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
558B000
|
stack
|
page read and write
|
||
35D7000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
698D000
|
trusted library allocation
|
page read and write
|
||
20E4E000
|
stack
|
page execute and read and write
|
||
6F81000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
7DFD0000
|
direct allocation
|
page read and write
|
||
2878000
|
heap
|
page read and write
|
||
AC9000
|
heap
|
page read and write
|
||
1334000
|
heap
|
page read and write
|
||
977000
|
trusted library allocation
|
page execute and read and write
|
||
30DC000
|
stack
|
page read and write
|
||
47F0000
|
heap
|
page read and write
|
||
CCA000
|
heap
|
page read and write
|
||
7C20000
|
heap
|
page read and write
|
||
7189000
|
trusted library allocation
|
page read and write
|
||
210BF000
|
stack
|
page read and write
|
||
AD7000
|
heap
|
page read and write
|
||
6E53000
|
trusted library allocation
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
6971000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
2123E000
|
stack
|
page read and write
|
||
C50000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
6F6B000
|
trusted library allocation
|
page read and write
|
||
54B0000
|
heap
|
page read and write
|
||
C10000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page read and write
|
||
6FD5000
|
trusted library allocation
|
page read and write
|
||
7E09F000
|
direct allocation
|
page read and write
|
||
20E3F000
|
stack
|
page read and write
|
||
465B000
|
heap
|
page read and write
|
||
20F8E000
|
stack
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
7EF4F000
|
direct allocation
|
page read and write
|
||
7ECA0000
|
direct allocation
|
page read and write
|
||
4BC6000
|
heap
|
page read and write
|
||
C90000
|
trusted library allocation
|
page execute and read and write
|
||
6390000
|
trusted library allocation
|
page read and write
|
||
566F000
|
stack
|
page read and write
|
||
2A0E000
|
heap
|
page read and write
|
||
54A0000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
69EF000
|
trusted library allocation
|
page read and write
|
||
7DD2F000
|
direct allocation
|
page read and write
|
||
245E000
|
trusted library allocation
|
page read and write
|
||
38AF000
|
trusted library allocation
|
page read and write
|
||
5F88000
|
trusted library allocation
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
5FE0000
|
heap
|
page read and write
|
||
7EF60000
|
direct allocation
|
page read and write
|
||
286D000
|
trusted library allocation
|
page read and write
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
5C2E000
|
stack
|
page read and write
|
||
745000
|
heap
|
page read and write
|
||
6ADD000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
7ED30000
|
direct allocation
|
page read and write
|
||
5FA000
|
stack
|
page read and write
|
||
23D1000
|
trusted library allocation
|
page read and write
|
||
4B4A000
|
heap
|
page read and write
|
||
6933000
|
trusted library allocation
|
page read and write
|
||
55AA000
|
trusted library allocation
|
page read and write
|
||
776E000
|
stack
|
page read and write
|
||
6F3E000
|
trusted library allocation
|
page read and write
|
||
4D2E000
|
trusted library allocation
|
page read and write
|
||
701E000
|
trusted library allocation
|
page read and write
|
||
4A85000
|
trusted library allocation
|
page read and write
|
||
6F87000
|
trusted library allocation
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
6C58000
|
trusted library allocation
|
page read and write
|
||
C33000
|
heap
|
page read and write
|
||
70FB000
|
trusted library allocation
|
page read and write
|
||
8F8000
|
stack
|
page read and write
|
||
6A17000
|
trusted library allocation
|
page read and write
|
||
7ED55000
|
direct allocation
|
page read and write
|
||
64F0000
|
trusted library allocation
|
page read and write
|
||
478000
|
unkown
|
page read and write
|
||
2837000
|
trusted library allocation
|
page read and write
|
||
69C6000
|
trusted library allocation
|
page read and write
|
||
7E30F000
|
direct allocation
|
page read and write
|
||
567E000
|
trusted library allocation
|
page read and write
|
||
4E7E000
|
trusted library allocation
|
page read and write
|
||
7F2F0000
|
direct allocation
|
page read and write
|
||
6AD5000
|
trusted library allocation
|
page read and write
|
||
2619000
|
trusted library allocation
|
page read and write
|
||
2827000
|
trusted library allocation
|
page read and write
|
||
2B08000
|
trusted library allocation
|
page read and write
|
||
4ADB000
|
stack
|
page read and write
|
||
7DD4F000
|
direct allocation
|
page read and write
|
||
4925000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
2CC9000
|
heap
|
page read and write
|
||
4645000
|
heap
|
page read and write
|
||
4D1E000
|
trusted library allocation
|
page read and write
|
||
4656000
|
heap
|
page read and write
|
||
70B5000
|
trusted library allocation
|
page read and write
|
||
2FF8000
|
trusted library allocation
|
page read and write
|
||
6918000
|
trusted library allocation
|
page read and write
|
||
7048000
|
trusted library allocation
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
71EE000
|
trusted library allocation
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
F09000
|
stack
|
page read and write
|
||
2223E000
|
heap
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
99C000
|
stack
|
page read and write
|
||
64AE000
|
stack
|
page read and write
|
||
2147F000
|
stack
|
page read and write
|
||
4D0F000
|
stack
|
page read and write
|
||
6AF5000
|
trusted library allocation
|
page read and write
|
||
7165000
|
trusted library allocation
|
page read and write
|
||
2E27000
|
direct allocation
|
page execute and read and write
|
||
27FB000
|
trusted library allocation
|
page read and write
|
||
D2E000
|
heap
|
page read and write
|
||
536E000
|
stack
|
page read and write
|
||
8529000
|
heap
|
page read and write
|
||
172E000
|
stack
|
page read and write
|
||
5F8D000
|
trusted library allocation
|
page read and write
|
||
715F000
|
trusted library allocation
|
page read and write
|
||
2A91000
|
trusted library allocation
|
page read and write
|
||
40D000
|
unkown
|
page write copy
|
||
214AE000
|
stack
|
page read and write
|
||
6B73000
|
trusted library allocation
|
page read and write
|
||
281D000
|
trusted library allocation
|
page execute and read and write
|
||
7E30F000
|
direct allocation
|
page read and write
|
||
702E000
|
stack
|
page read and write
|
||
20D16000
|
direct allocation
|
page read and write
|
||
7DD70000
|
direct allocation
|
page read and write
|
||
6A9A000
|
trusted library allocation
|
page read and write
|
||
71CC000
|
trusted library allocation
|
page read and write
|
||
64EC000
|
stack
|
page read and write
|
||
46FA000
|
stack
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
6EB2000
|
trusted library allocation
|
page read and write
|
||
7570000
|
heap
|
page read and write
|
||
6F54000
|
trusted library allocation
|
page read and write
|
||
2927000
|
trusted library allocation
|
page read and write
|
||
705D000
|
trusted library allocation
|
page read and write
|
||
3AD1000
|
trusted library allocation
|
page read and write
|
||
6F26000
|
trusted library allocation
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
219DE000
|
stack
|
page read and write
|
||
7035000
|
trusted library allocation
|
page read and write
|
||
211FF000
|
stack
|
page read and write
|
||
5930000
|
trusted library allocation
|
page read and write
|
||
5D0E000
|
stack
|
page read and write
|
||
5DA6000
|
heap
|
page read and write
|
||
25E0000
|
trusted library allocation
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page execute and read and write
|
||
5E4E000
|
stack
|
page read and write
|
||
2F70000
|
trusted library allocation
|
page read and write
|
||
159A000
|
heap
|
page read and write
|
||
94D000
|
trusted library allocation
|
page execute and read and write
|
||
52E2000
|
trusted library allocation
|
page read and write
|
||
20D1D000
|
direct allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
2F70000
|
trusted library allocation
|
page execute and read and write
|
||
78C0000
|
trusted library allocation
|
page read and write
|
||
4B6D000
|
heap
|
page read and write
|
||
5544000
|
trusted library allocation
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
4A94000
|
trusted library allocation
|
page read and write
|
||
7640000
|
heap
|
page read and write
|
||
6EB000
|
stack
|
page read and write
|
||
6F96000
|
trusted library allocation
|
page read and write
|
||
8CD000
|
stack
|
page read and write
|
||
284B000
|
trusted library allocation
|
page execute and read and write
|
||
5B1000
|
heap
|
page read and write
|
||
7ED80000
|
direct allocation
|
page read and write
|
||
4EAF000
|
stack
|
page read and write
|
||
20E4A000
|
stack
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
478000
|
unkown
|
page write copy
|
||
5D2C000
|
heap
|
page read and write
|
||
2419000
|
trusted library allocation
|
page read and write
|
||
6FB8000
|
trusted library allocation
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
9FE000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
4A80000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
6AF1000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
576D000
|
stack
|
page read and write
|
||
5400000
|
trusted library allocation
|
page read and write
|
||
20DEA000
|
direct allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
709E000
|
trusted library allocation
|
page read and write
|
||
2C28000
|
heap
|
page read and write
|
||
2330000
|
heap
|
page read and write
|
||
9BB000
|
trusted library allocation
|
page execute and read and write
|
||
600000
|
heap
|
page read and write
|
||
739F000
|
stack
|
page read and write
|
||
EC4000
|
trusted library allocation
|
page read and write
|
||
7010000
|
trusted library allocation
|
page read and write
|
||
7E190000
|
direct allocation
|
page read and write
|
||
693F000
|
trusted library allocation
|
page read and write
|
||
6FC1000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
C24000
|
trusted library allocation
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
512E000
|
stack
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
5BC9000
|
trusted library allocation
|
page read and write
|
||
20D99000
|
direct allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
5D30000
|
heap
|
page read and write
|
||
269E000
|
stack
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
A2F000
|
heap
|
page read and write
|
||
7DF00000
|
direct allocation
|
page read and write
|
||
6939000
|
trusted library allocation
|
page read and write
|
||
8B4E000
|
stack
|
page read and write
|
||
22201000
|
heap
|
page read and write
|
||
23DC000
|
trusted library allocation
|
page read and write
|
||
15BA000
|
heap
|
page read and write
|
||
7F948000
|
direct allocation
|
page read and write
|
||
7EFB0000
|
direct allocation
|
page read and write
|
||
27E7000
|
trusted library allocation
|
page read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
26A9000
|
trusted library allocation
|
page read and write
|
||
4E81000
|
trusted library allocation
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
4F1E000
|
stack
|
page read and write
|
||
AB8000
|
heap
|
page read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
7578000
|
heap
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page read and write
|
||
7DCF0000
|
direct allocation
|
page read and write
|
||
6FB6000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
unkown
|
page execute and read and write
|
||
6916000
|
trusted library allocation
|
page read and write
|
||
6A11000
|
trusted library allocation
|
page read and write
|
||
57A000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
2F1C000
|
stack
|
page read and write
|
||
6A4D000
|
trusted library allocation
|
page read and write
|
||
6EE5000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
2E37000
|
direct allocation
|
page execute and read and write
|
||
A57000
|
heap
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
1770000
|
heap
|
page read and write
|
||
6FD1000
|
trusted library allocation
|
page read and write
|
||
A4D000
|
trusted library allocation
|
page execute and read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
278C000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
2804000
|
trusted library allocation
|
page read and write
|
||
4B55000
|
heap
|
page read and write
|
||
66AC000
|
stack
|
page read and write
|
||
B65000
|
heap
|
page read and write
|
||
598D000
|
stack
|
page read and write
|
||
7DE70000
|
direct allocation
|
page read and write
|
||
51DE000
|
stack
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
8690000
|
trusted library allocation
|
page execute and read and write
|
||
5660000
|
trusted library allocation
|
page read and write
|
||
3861000
|
trusted library allocation
|
page read and write
|
||
69B2000
|
trusted library allocation
|
page read and write
|
||
60F0000
|
trusted library allocation
|
page read and write
|
||
7E7000
|
stack
|
page read and write
|
||
6F09000
|
trusted library allocation
|
page read and write
|
||
2BD70000
|
direct allocation
|
page read and write
|
||
22D8000
|
direct allocation
|
page read and write
|
||
22D1000
|
direct allocation
|
page read and write
|
||
7EDF0000
|
direct allocation
|
page read and write
|
||
7DDBF000
|
direct allocation
|
page read and write
|
||
20CC0000
|
direct allocation
|
page read and write
|
||
847C000
|
heap
|
page read and write
|
||
7E30F000
|
direct allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
6A65000
|
trusted library allocation
|
page read and write
|
||
20D14000
|
direct allocation
|
page read and write
|
||
55F7000
|
trusted library allocation
|
page read and write
|
||
2A0A000
|
heap
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
6AE1000
|
trusted library allocation
|
page read and write
|
||
316B000
|
heap
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
3AB7000
|
trusted library allocation
|
page read and write
|
||
7F190000
|
direct allocation
|
page read and write
|
||
6CD8000
|
trusted library allocation
|
page read and write
|
||
AE4000
|
trusted library allocation
|
page read and write
|
||
5D45000
|
trusted library allocation
|
page read and write
|
||
1574000
|
trusted library allocation
|
page read and write
|
||
873000
|
trusted library allocation
|
page execute and read and write
|
||
7ECD0000
|
direct allocation
|
page read and write
|
||
7E8C7000
|
direct allocation
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
20DF8000
|
direct allocation
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
7880000
|
trusted library allocation
|
page read and write
|
||
7EE7F000
|
direct allocation
|
page read and write
|
||
6500000
|
trusted library allocation
|
page execute and read and write
|
||
6C8A000
|
trusted library allocation
|
page read and write
|
||
7EF7F000
|
direct allocation
|
page read and write
|
||
7F8D0000
|
direct allocation
|
page read and write
|
||
531E000
|
stack
|
page read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
2604000
|
trusted library allocation
|
page read and write
|
||
7E220000
|
direct allocation
|
page read and write
|
||
5680000
|
trusted library allocation
|
page read and write
|
||
2949000
|
trusted library allocation
|
page read and write
|
||
22EC000
|
direct allocation
|
page read and write
|
||
6F4E000
|
trusted library allocation
|
page read and write
|
||
6920000
|
trusted library allocation
|
page read and write
|
||
4DBC000
|
stack
|
page read and write
|
||
6B1B000
|
trusted library allocation
|
page read and write
|
||
20CDA000
|
direct allocation
|
page read and write
|
||
2136E000
|
stack
|
page read and write
|
||
5715000
|
trusted library allocation
|
page read and write
|
||
7F370000
|
direct allocation
|
page read and write
|
||
48F0000
|
trusted library allocation
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
65B0000
|
trusted library allocation
|
page execute and read and write
|
||
3577000
|
trusted library allocation
|
page read and write
|
||
6EF3000
|
trusted library allocation
|
page read and write
|
||
71AB000
|
trusted library allocation
|
page read and write
|
||
4D3D000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
trusted library allocation
|
page read and write
|
||
850000
|
direct allocation
|
page execute and read and write
|
||
772E000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
8820000
|
trusted library allocation
|
page read and write
|
||
7EF60000
|
direct allocation
|
page read and write
|
||
5D34000
|
trusted library allocation
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
7FAAF000
|
direct allocation
|
page read and write
|
||
305F000
|
trusted library allocation
|
page read and write
|
||
463A000
|
heap
|
page read and write
|
||
6B84000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
trusted library allocation
|
page read and write
|
||
496E000
|
trusted library allocation
|
page read and write
|
||
8A3E000
|
stack
|
page read and write
|
||
29E0000
|
heap
|
page read and write
|
||
7EF0F000
|
direct allocation
|
page read and write
|
||
7FCD0000
|
direct allocation
|
page read and write
|
||
6C0D000
|
trusted library allocation
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
2FDB000
|
direct allocation
|
page execute and read and write
|
||
944000
|
trusted library allocation
|
page read and write
|
||
6EC8000
|
trusted library allocation
|
page read and write
|
||
6947000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
20D0F000
|
direct allocation
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
7622000
|
heap
|
page read and write
|
||
4BCD000
|
heap
|
page read and write
|
||
6F5C000
|
trusted library allocation
|
page read and write
|
||
211CF000
|
stack
|
page read and write
|
||
6A15000
|
trusted library allocation
|
page read and write
|
||
82C0000
|
trusted library allocation
|
page execute and read and write
|
||
6EE3000
|
trusted library allocation
|
page read and write
|
||
729E000
|
stack
|
page read and write
|
||
6A4F000
|
trusted library allocation
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
7DFC0000
|
direct allocation
|
page read and write
|
||
588B000
|
stack
|
page read and write
|
||
7065000
|
trusted library allocation
|
page read and write
|
||
15C8000
|
heap
|
page read and write
|
||
21CF2000
|
heap
|
page read and write
|
||
3981000
|
trusted library allocation
|
page read and write
|
||
76AE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
6E72000
|
trusted library allocation
|
page read and write
|
||
65A0000
|
heap
|
page read and write
|
||
6F42000
|
trusted library allocation
|
page read and write
|
||
16A4000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
5F6E000
|
stack
|
page read and write
|
||
8515000
|
heap
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
6E6E000
|
trusted library allocation
|
page read and write
|
||
46BD000
|
stack
|
page read and write
|
||
5743000
|
heap
|
page read and write
|
||
A8F000
|
heap
|
page read and write
|
||
20E3E000
|
stack
|
page execute and read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
2E61000
|
direct allocation
|
page execute read
|
||
40D000
|
unkown
|
page write copy
|
||
7EF60000
|
direct allocation
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
E14000
|
trusted library allocation
|
page read and write
|
||
7FC20000
|
direct allocation
|
page read and write
|
||
2696000
|
trusted library allocation
|
page read and write
|
||
479000
|
unkown
|
page read and write
|
||
56D0000
|
trusted library allocation
|
page read and write
|
||
4779000
|
stack
|
page read and write
|
||
69C2000
|
trusted library allocation
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
65F0000
|
trusted library allocation
|
page execute and read and write
|
||
625000
|
heap
|
page read and write
|
||
4E0E000
|
stack
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
7D940000
|
direct allocation
|
page read and write
|
||
2813000
|
trusted library allocation
|
page execute and read and write
|
||
97B000
|
trusted library allocation
|
page execute and read and write
|
||
20DE3000
|
direct allocation
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
20E4F000
|
stack
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
484000
|
unkown
|
page read and write
|
||
2551000
|
trusted library allocation
|
page read and write
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
78B0000
|
trusted library allocation
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
7123000
|
trusted library allocation
|
page read and write
|
||
6EA4000
|
trusted library allocation
|
page read and write
|
||
2BC80000
|
direct allocation
|
page read and write
|
||
166F000
|
stack
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
52C0000
|
trusted library allocation
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
B02000
|
trusted library allocation
|
page read and write
|
||
65C0000
|
trusted library allocation
|
page read and write
|
||
4F56000
|
trusted library allocation
|
page read and write
|
||
215DF000
|
trusted library allocation
|
page read and write
|
||
4645000
|
heap
|
page read and write
|
||
2810000
|
trusted library allocation
|
page read and write
|
||
4BCB000
|
heap
|
page read and write
|
||
D3B000
|
heap
|
page read and write
|
||
8A7F000
|
stack
|
page read and write
|
||
699C000
|
trusted library allocation
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
59A000
|
heap
|
page read and write
|
||
3A57000
|
trusted library allocation
|
page read and write
|
||
4645000
|
heap
|
page read and write
|
||
2E05000
|
direct allocation
|
page read and write
|
||
6C84000
|
trusted library allocation
|
page read and write
|
||
B15000
|
heap
|
page read and write
|
||
2F80000
|
trusted library allocation
|
page read and write
|
||
22F3000
|
direct allocation
|
page read and write
|
||
6A56000
|
trusted library allocation
|
page read and write
|
||
6973000
|
trusted library allocation
|
page read and write
|
||
75A5000
|
heap
|
page read and write
|
||
4FCC000
|
stack
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
7E8A0000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
6398000
|
trusted library allocation
|
page read and write
|
||
8970000
|
trusted library allocation
|
page execute and read and write
|
||
6FCB000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
direct allocation
|
page read and write
|
||
6C32000
|
trusted library allocation
|
page read and write
|
||
2F6A000
|
trusted library allocation
|
page execute and read and write
|
||
2B70000
|
heap
|
page read and write
|
||
7014000
|
trusted library allocation
|
page read and write
|
||
3697000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
5664000
|
trusted library allocation
|
page read and write
|
||
4D6E000
|
stack
|
page read and write
|
||
2768000
|
trusted library allocation
|
page read and write
|
||
69ED000
|
trusted library allocation
|
page read and write
|
||
6E51000
|
trusted library allocation
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
9FF000
|
stack
|
page read and write
|
||
91E000
|
stack
|
page read and write
|
||
6A7E000
|
trusted library allocation
|
page read and write
|
||
4EDE000
|
stack
|
page read and write
|
||
4942000
|
trusted library allocation
|
page read and write
|
||
3098000
|
heap
|
page read and write
|
||
4BB5000
|
heap
|
page read and write
|
||
4B54000
|
heap
|
page read and write
|
||
7DC1F000
|
direct allocation
|
page read and write
|
||
5C09000
|
trusted library allocation
|
page read and write
|
||
4CCF000
|
stack
|
page read and write
|
||
6A3A000
|
trusted library allocation
|
page read and write
|
||
20DF1000
|
direct allocation
|
page read and write
|
||
694D000
|
trusted library allocation
|
page read and write
|
||
6F5E000
|
trusted library allocation
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
20D38000
|
direct allocation
|
page read and write
|
||
2264F000
|
trusted library allocation
|
page read and write
|
||
B37000
|
stack
|
page read and write
|
||
16C7000
|
trusted library allocation
|
page execute and read and write
|
||
EAE000
|
stack
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
6FAB000
|
stack
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
61D1000
|
heap
|
page read and write
|
||
7840000
|
trusted library allocation
|
page read and write
|
||
84F000
|
stack
|
page read and write
|
||
28B0000
|
trusted library allocation
|
page execute and read and write
|
||
6FBF000
|
trusted library allocation
|
page read and write
|
||
7830000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
4055000
|
trusted library allocation
|
page read and write
|
||
2264F000
|
heap
|
page read and write
|
||
B58000
|
heap
|
page read and write
|
||
2DB1000
|
direct allocation
|
page execute read
|
||
20D31000
|
direct allocation
|
page read and write
|
||
596E000
|
stack
|
page read and write
|
||
2330000
|
direct allocation
|
page execute and read and write
|
||
3891000
|
trusted library allocation
|
page read and write
|
||
20E7E000
|
stack
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
7EE00000
|
direct allocation
|
page read and write
|
||
41F0000
|
heap
|
page read and write
|
||
6E1D000
|
trusted library allocation
|
page read and write
|
||
6E49000
|
trusted library allocation
|
page read and write
|
||
6A27000
|
trusted library allocation
|
page read and write
|
||
2AA1000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
48D000
|
unkown
|
page readonly
|
||
7DA9F000
|
direct allocation
|
page read and write
|
||
7ED90000
|
direct allocation
|
page read and write
|
||
6EC3000
|
trusted library allocation
|
page read and write
|
||
20DCD000
|
direct allocation
|
page read and write
|
||
7D460000
|
direct allocation
|
page read and write
|
||
720000
|
unkown
|
page execute and read and write
|
||
60CE000
|
stack
|
page read and write
|
||
6A1F000
|
trusted library allocation
|
page read and write
|
||
6A85000
|
trusted library allocation
|
page read and write
|
||
6FC9000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
6400000
|
trusted library allocation
|
page execute and read and write
|
||
217C000
|
stack
|
page read and write
|
||
69BA000
|
trusted library allocation
|
page read and write
|
||
8810000
|
trusted library allocation
|
page read and write
|
||
6600000
|
heap
|
page read and write
|
||
2108F000
|
stack
|
page read and write
|
||
715B000
|
trusted library allocation
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
23F3000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
4770000
|
heap
|
page read and write
|
||
4E74000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
700A000
|
trusted library allocation
|
page read and write
|
||
2BEA0000
|
direct allocation
|
page read and write
|
||
A73000
|
heap
|
page read and write
|
||
6ECA000
|
trusted library allocation
|
page read and write
|
||
7FD90000
|
direct allocation
|
page read and write
|
||
2C8E000
|
heap
|
page read and write
|
||
16C0000
|
trusted library allocation
|
page read and write
|
||
2B80000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
492E000
|
trusted library allocation
|
page read and write
|
||
22293000
|
heap
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
4E66000
|
trusted library allocation
|
page read and write
|
||
15D4000
|
heap
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
2B67000
|
heap
|
page read and write
|
||
2825000
|
trusted library allocation
|
page read and write
|
||
4D22000
|
trusted library allocation
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
2BCE0000
|
direct allocation
|
page read and write
|
||
6E64000
|
trusted library allocation
|
page read and write
|
||
D05000
|
heap
|
page read and write
|
||
4CF5000
|
trusted library allocation
|
page read and write
|
||
2860000
|
trusted library allocation
|
page read and write
|
||
3A77000
|
trusted library allocation
|
page read and write
|
||
6239000
|
heap
|
page read and write
|
||
4656000
|
heap
|
page read and write
|
||
73E000
|
unkown
|
page read and write
|
||
54DC000
|
trusted library allocation
|
page read and write
|
||
27EE000
|
stack
|
page read and write
|
||
4B6D000
|
heap
|
page read and write
|
||
22B4000
|
direct allocation
|
page read and write
|
||
7E130000
|
direct allocation
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
2BD70000
|
direct allocation
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
6A1D000
|
trusted library allocation
|
page read and write
|
||
7008000
|
trusted library allocation
|
page read and write
|
||
2F2B000
|
direct allocation
|
page execute and read and write
|
||
5A6000
|
heap
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
5B6E000
|
stack
|
page read and write
|
||
2AAE000
|
heap
|
page read and write
|
||
697B000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
trusted library allocation
|
page execute and read and write
|
||
6EF1000
|
trusted library allocation
|
page read and write
|
||
4C7E000
|
stack
|
page read and write
|
||
51AD000
|
stack
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
7EF0F000
|
direct allocation
|
page read and write
|
||
7125000
|
trusted library allocation
|
page read and write
|
||
13F5000
|
heap
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
693B000
|
trusted library allocation
|
page read and write
|
||
7F2A0000
|
trusted library allocation
|
page execute and read and write
|
||
156E000
|
stack
|
page read and write
|
||
7D6E0000
|
direct allocation
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
7D1F0000
|
direct allocation
|
page read and write
|
||
6ADF000
|
trusted library allocation
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
486000
|
unkown
|
page read and write
|
||
5E8000
|
heap
|
page read and write
|
||
7F8D0000
|
direct allocation
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
66E000
|
stack
|
page read and write
|
||
493D000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
5BA000
|
heap
|
page read and write
|
||
8478000
|
heap
|
page read and write
|
||
176E000
|
stack
|
page read and write
|
||
725E000
|
stack
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
A30000
|
trusted library allocation
|
page read and write
|
||
7DCA0000
|
direct allocation
|
page read and write
|
||
31D6000
|
trusted library allocation
|
page read and write
|
||
7DA00000
|
direct allocation
|
page read and write
|
||
16CB000
|
trusted library allocation
|
page execute and read and write
|
||
641E000
|
stack
|
page read and write
|
||
2794000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
880000
|
trusted library allocation
|
page read and write
|
||
6B34000
|
trusted library allocation
|
page read and write
|
||
4BA1000
|
trusted library allocation
|
page read and write
|
||
3020000
|
heap
|
page execute and read and write
|
||
8538000
|
heap
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
7DF9F000
|
direct allocation
|
page read and write
|
||
7EFB0000
|
direct allocation
|
page read and write
|
||
4ABC000
|
stack
|
page read and write
|
||
69B0000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
22D1000
|
direct allocation
|
page read and write
|
||
4C20000
|
heap
|
page read and write
|
||
21750000
|
remote allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
7820000
|
trusted library allocation
|
page read and write
|
||
6EBE000
|
trusted library allocation
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
6AEF000
|
trusted library allocation
|
page read and write
|
||
7870000
|
trusted library allocation
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
6F3C000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4F89000
|
trusted library allocation
|
page read and write
|
||
7810000
|
trusted library allocation
|
page read and write
|
||
4A1E000
|
stack
|
page read and write
|
||
6EDB000
|
trusted library allocation
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
9A0000
|
trusted library allocation
|
page read and write
|
||
43D000
|
stack
|
page read and write
|
||
6A89000
|
trusted library allocation
|
page read and write
|
||
5D48000
|
trusted library allocation
|
page read and write
|
||
22CA000
|
direct allocation
|
page read and write
|
||
3667000
|
trusted library allocation
|
page read and write
|
||
75F4000
|
heap
|
page read and write
|
||
20CC3000
|
direct allocation
|
page read and write
|
||
7DB00000
|
direct allocation
|
page read and write
|
||
25EE000
|
stack
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
6F48000
|
trusted library allocation
|
page read and write
|
||
590000
|
unkown
|
page execute and read and write
|
||
7FAD0000
|
direct allocation
|
page read and write
|
||
6194000
|
heap
|
page read and write
|
||
2440000
|
heap
|
page read and write
|
||
6C09000
|
trusted library allocation
|
page read and write
|
||
6A5C000
|
trusted library allocation
|
page read and write
|
||
7DDC0000
|
direct allocation
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
2B6F000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
8E0000
|
unkown
|
page execute and read and write
|
||
5F97000
|
trusted library allocation
|
page read and write
|
||
5710000
|
trusted library allocation
|
page read and write
|
||
2981000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
2BCE0000
|
direct allocation
|
page read and write
|
||
6A25000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
trusted library allocation
|
page execute and read and write
|
||
7EF37000
|
direct allocation
|
page read and write
|
||
6EAE000
|
trusted library allocation
|
page read and write
|
||
4D54000
|
trusted library allocation
|
page read and write
|
||
6E78000
|
trusted library allocation
|
page read and write
|
||
54AE000
|
stack
|
page read and write
|
||
4BAA000
|
heap
|
page read and write
|
||
5D4C000
|
trusted library allocation
|
page read and write
|
||
75DB000
|
heap
|
page read and write
|
||
54D8000
|
trusted library allocation
|
page read and write
|
||
2BEA0000
|
direct allocation
|
page read and write
|
||
EA0000
|
trusted library section
|
page read and write
|
||
10063000
|
unkown
|
page execute and read and write
|
||
5A0000
|
heap
|
page read and write
|
||
7DCD7000
|
direct allocation
|
page read and write
|
||
22264000
|
heap
|
page read and write
|
||
20D2A000
|
direct allocation
|
page read and write
|
||
6F6D000
|
stack
|
page read and write
|
||
7580000
|
heap
|
page read and write
|
||
2850000
|
heap
|
page execute and read and write
|
||
479000
|
unkown
|
page execute and read and write
|
||
6C69000
|
trusted library allocation
|
page read and write
|
||
7EEA0000
|
direct allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
7127000
|
trusted library allocation
|
page read and write
|
||
2650000
|
heap
|
page execute and read and write
|
||
215CF000
|
stack
|
page read and write
|
||
4BCE000
|
stack
|
page read and write
|
||
B67000
|
unkown
|
page execute and read and write
|
||
2160E000
|
stack
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
6E45000
|
trusted library allocation
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
4936000
|
trusted library allocation
|
page read and write
|
||
69AC000
|
trusted library allocation
|
page read and write
|
||
720000
|
unkown
|
page execute and read and write
|
||
610000
|
heap
|
page read and write
|
||
565000
|
heap
|
page read and write
|
||
28C0000
|
heap
|
page execute and read and write
|
||
63E000
|
heap
|
page read and write
|
||
6F67000
|
trusted library allocation
|
page read and write
|
||
6910000
|
trusted library allocation
|
page read and write
|
||
2BD70000
|
direct allocation
|
page read and write
|
||
691E000
|
trusted library allocation
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
20F9E000
|
stack
|
page read and write
|
||
2DA1000
|
direct allocation
|
page execute read
|
||
7EF40000
|
direct allocation
|
page read and write
|
||
27F4000
|
trusted library allocation
|
page read and write
|
||
3551000
|
trusted library allocation
|
page read and write
|
||
225FF000
|
direct allocation
|
page read and write
|
||
568D000
|
trusted library allocation
|
page read and write
|
||
4645000
|
heap
|
page read and write
|
||
83C0000
|
trusted library allocation
|
page read and write
|
||
68FD000
|
trusted library allocation
|
page read and write
|
||
465B000
|
heap
|
page read and write
|
||
2148E000
|
stack
|
page read and write
|
||
83C7000
|
trusted library allocation
|
page read and write
|
||
6E4F000
|
trusted library allocation
|
page read and write
|
||
2836000
|
trusted library allocation
|
page execute and read and write
|
||
25F4000
|
trusted library allocation
|
page read and write
|
||
CAF000
|
stack
|
page read and write
|
||
6949000
|
trusted library allocation
|
page read and write
|
||
2AD0000
|
trusted library allocation
|
page read and write
|
||
713E000
|
trusted library allocation
|
page read and write
|
||
69B4000
|
trusted library allocation
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
6C9B000
|
trusted library allocation
|
page read and write
|
||
2131F000
|
stack
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
15D2000
|
heap
|
page read and write
|
||
2BC80000
|
direct allocation
|
page read and write
|
||
2ABA000
|
trusted library allocation
|
page read and write
|
||
283A000
|
trusted library allocation
|
page execute and read and write
|
||
614E000
|
stack
|
page read and write
|
||
608000
|
heap
|
page read and write
|
||
2873000
|
heap
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page execute and read and write
|
||
1520000
|
heap
|
page read and write
|
||
1318000
|
heap
|
page read and write
|
||
7207000
|
trusted library allocation
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
7E060000
|
direct allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
4BCB000
|
heap
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
3A27000
|
trusted library allocation
|
page read and write
|
||
2CC5000
|
heap
|
page read and write
|
||
6A0F000
|
trusted library allocation
|
page read and write
|
||
35F7000
|
trusted library allocation
|
page read and write
|
||
765C000
|
heap
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
71E6000
|
trusted library allocation
|
page read and write
|
||
2960000
|
trusted library allocation
|
page read and write
|
||
7163000
|
trusted library allocation
|
page read and write
|
||
83A0000
|
heap
|
page read and write
|
||
6A2B000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
686C000
|
stack
|
page read and write
|
||
7EE50000
|
direct allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
2607000
|
trusted library allocation
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
701A000
|
trusted library allocation
|
page read and write
|
||
2448000
|
trusted library allocation
|
page read and write
|
||
2625000
|
trusted library allocation
|
page read and write
|
||
69D4000
|
trusted library allocation
|
page read and write
|
||
20D0D000
|
direct allocation
|
page read and write
|
||
69D6000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
6999000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
6BC8000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
2F1B000
|
direct allocation
|
page execute and read and write
|
||
2906000
|
trusted library allocation
|
page read and write
|
||
502C000
|
stack
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
BAE000
|
stack
|
page read and write
|
||
8A9000
|
unkown
|
page execute and read and write
|
||
509F000
|
stack
|
page read and write
|
||
20CD1000
|
direct allocation
|
page read and write
|
||
41E0000
|
heap
|
page read and write
|
||
4F65000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
7EF10000
|
direct allocation
|
page read and write
|
||
6C00000
|
heap
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
2970000
|
heap
|
page execute and read and write
|
||
4AF0000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
6F98000
|
trusted library allocation
|
page read and write
|
||
6EDD000
|
trusted library allocation
|
page read and write
|
||
2F5C000
|
stack
|
page read and write
|
||
2BEA0000
|
direct allocation
|
page read and write
|
||
815000
|
heap
|
page read and write
|
||
72DE000
|
stack
|
page read and write
|
||
A72000
|
trusted library allocation
|
page read and write
|
||
5208000
|
trusted library allocation
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
A75000
|
trusted library allocation
|
page execute and read and write
|
||
4BC7000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page execute and read and write
|
||
E24000
|
trusted library allocation
|
page read and write
|
||
A6E000
|
heap
|
page read and write
|
||
6F8B000
|
trusted library allocation
|
page read and write
|
||
2F7A000
|
heap
|
page read and write
|
||
3865000
|
trusted library allocation
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
4F5E000
|
stack
|
page read and write
|
||
3A97000
|
trusted library allocation
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
4760000
|
heap
|
page read and write
|
||
475E000
|
stack
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
7800000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
4F77000
|
trusted library allocation
|
page read and write
|
||
852C000
|
heap
|
page read and write
|
||
137D000
|
heap
|
page read and write
|
||
868000
|
heap
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
6F8D000
|
trusted library allocation
|
page read and write
|
||
283F000
|
trusted library allocation
|
page read and write
|
||
6250000
|
heap
|
page read and write
|
||
20D3A000
|
direct allocation
|
page read and write
|
||
2190000
|
heap
|
page read and write
|
||
7ECD0000
|
direct allocation
|
page read and write
|
||
6DF5000
|
trusted library allocation
|
page read and write
|
||
4F40000
|
trusted library allocation
|
page read and write
|
||
DB5000
|
heap
|
page read and write
|
||
6F89000
|
trusted library allocation
|
page read and write
|
||
29BF000
|
unkown
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
52C2000
|
trusted library allocation
|
page read and write
|
||
63DC000
|
stack
|
page read and write
|
||
835D000
|
stack
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
576E000
|
stack
|
page read and write
|
||
20D06000
|
direct allocation
|
page read and write
|
||
A28000
|
heap
|
page read and write
|
||
6620000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
3439000
|
trusted library allocation
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
1EA000
|
stack
|
page read and write
|
||
3597000
|
trusted library allocation
|
page read and write
|
||
7006000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
trusted library allocation
|
page read and write
|
||
694F000
|
trusted library allocation
|
page read and write
|
||
2CC9000
|
heap
|
page read and write
|
||
5DB6000
|
heap
|
page read and write
|
||
AE0000
|
unkown
|
page execute and read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
6E7C000
|
trusted library allocation
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
6F44000
|
trusted library allocation
|
page read and write
|
||
5C0E000
|
stack
|
page read and write
|
||
27AE000
|
stack
|
page read and write
|
||
6A0D000
|
trusted library allocation
|
page read and write
|
||
6FE2000
|
trusted library allocation
|
page read and write
|
||
20D1C000
|
direct allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
DEF000
|
stack
|
page read and write
|
||
3080000
|
heap
|
page execute and read and write
|
||
305C000
|
trusted library allocation
|
page read and write
|
||
6F52000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
25FF000
|
trusted library allocation
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page read and write
|
||
8310000
|
heap
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
5A4000
|
heap
|
page read and write
|
||
3085000
|
heap
|
page execute and read and write
|
||
6AA0000
|
trusted library allocation
|
page read and write
|
||
71B5000
|
trusted library allocation
|
page read and write
|
||
2829000
|
trusted library allocation
|
page read and write
|
||
68B3000
|
trusted library allocation
|
page read and write
|
||
259C000
|
unkown
|
page read and write
|
||
6DE4000
|
trusted library allocation
|
page read and write
|
||
71B9000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
6EAC000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
F47000
|
heap
|
page read and write
|
||
624D000
|
stack
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
4B38000
|
heap
|
page read and write
|
||
6EA2000
|
trusted library allocation
|
page read and write
|
||
22BC000
|
direct allocation
|
page read and write
|
||
2B82000
|
heap
|
page read and write
|
||
6E3F000
|
trusted library allocation
|
page read and write
|
||
20DC6000
|
direct allocation
|
page read and write
|
||
7EE50000
|
direct allocation
|
page read and write
|
||
705F000
|
trusted library allocation
|
page read and write
|
||
5DB3000
|
heap
|
page read and write
|
||
69F1000
|
trusted library allocation
|
page read and write
|
||
488000
|
unkown
|
page write copy
|
||
4B00000
|
heap
|
page execute and read and write
|
||
FB0000
|
heap
|
page read and write
|
||
5C7000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
4E6B000
|
trusted library allocation
|
page read and write
|
||
6150000
|
heap
|
page read and write
|
||
5940000
|
heap
|
page execute and read and write
|
||
6935000
|
trusted library allocation
|
page read and write
|
||
20FBE000
|
stack
|
page read and write
|
||
4051000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
C6B000
|
trusted library allocation
|
page execute and read and write
|
||
3070000
|
trusted library allocation
|
page read and write
|
||
4B4A000
|
heap
|
page read and write
|
||
6983000
|
trusted library allocation
|
page read and write
|
||
6207000
|
trusted library allocation
|
page read and write
|
||
28C7000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
6270000
|
trusted library allocation
|
page execute and read and write
|
||
5686000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
7EEA0000
|
direct allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
3177000
|
heap
|
page read and write
|
||
4E80000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
20DD4000
|
direct allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
639D000
|
trusted library allocation
|
page read and write
|
||
676B000
|
stack
|
page read and write
|
||
20C91000
|
direct allocation
|
page read and write
|
||
6E0A000
|
trusted library allocation
|
page read and write
|
||
491E000
|
trusted library allocation
|
page read and write
|
||
22300000
|
heap
|
page read and write
|
||
6FBD000
|
trusted library allocation
|
page read and write
|
||
88F000
|
stack
|
page read and write
|
||
990000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
7E190000
|
direct allocation
|
page read and write
|
||
4657000
|
heap
|
page read and write
|
||
2E32000
|
direct allocation
|
page read and write
|
||
10063000
|
unkown
|
page execute and read and write
|
||
6AEB000
|
trusted library allocation
|
page read and write
|
||
AE3000
|
trusted library allocation
|
page execute and read and write
|
||
6F69000
|
trusted library allocation
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
A73000
|
heap
|
page read and write
|
||
3A37000
|
trusted library allocation
|
page read and write
|
||
291E000
|
trusted library allocation
|
page read and write
|
||
975000
|
heap
|
page read and write
|
||
69A6000
|
trusted library allocation
|
page read and write
|
||
6F5A000
|
trusted library allocation
|
page read and write
|
||
6EF5000
|
trusted library allocation
|
page read and write
|
||
7F370000
|
direct allocation
|
page read and write
|
||
69DA000
|
trusted library allocation
|
page read and write
|
||
7DBE0000
|
direct allocation
|
page read and write
|
||
4A20000
|
direct allocation
|
page read and write
|
||
D65000
|
heap
|
page read and write
|
||
508D000
|
stack
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
5E6E000
|
stack
|
page read and write
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
7DC0F000
|
direct allocation
|
page read and write
|
||
6A87000
|
trusted library allocation
|
page read and write
|
||
7F8D0000
|
direct allocation
|
page read and write
|
||
56E5000
|
trusted library allocation
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
2B38000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
4D1E000
|
stack
|
page read and write
|
||
6ED7000
|
trusted library allocation
|
page read and write
|
||
4D4C000
|
stack
|
page read and write
|
||
2179E000
|
stack
|
page read and write
|
||
20D33000
|
direct allocation
|
page read and write
|
||
6943000
|
trusted library allocation
|
page read and write
|
||
608E000
|
stack
|
page read and write
|
||
6A6B000
|
trusted library allocation
|
page read and write
|
||
2290000
|
direct allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
A77000
|
trusted library allocation
|
page execute and read and write
|
||
6A49000
|
trusted library allocation
|
page read and write
|
||
6B5C000
|
trusted library allocation
|
page read and write
|
||
E4B000
|
trusted library allocation
|
page execute and read and write
|
||
6BDF000
|
trusted library allocation
|
page read and write
|
||
7EA70000
|
direct allocation
|
page read and write
|
||
7FC40000
|
direct allocation
|
page read and write
|
||
C80000
|
trusted library allocation
|
page read and write
|
||
6975000
|
trusted library allocation
|
page read and write
|
||
68C000
|
heap
|
page read and write
|
||
6FF3000
|
trusted library allocation
|
page read and write
|
||
4931000
|
trusted library allocation
|
page read and write
|
||
6F85000
|
trusted library allocation
|
page read and write
|
||
8420000
|
trusted library allocation
|
page read and write
|
||
4B6D000
|
heap
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
CCE000
|
stack
|
page read and write
|
||
D15000
|
heap
|
page read and write
|
||
7C10000
|
heap
|
page read and write
|
||
71B7000
|
trusted library allocation
|
page read and write
|
||
25A2000
|
trusted library allocation
|
page read and write
|
||
967000
|
unkown
|
page execute and read and write
|
||
7E07F000
|
direct allocation
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
4E64000
|
trusted library allocation
|
page read and write
|
||
4B5E000
|
stack
|
page read and write
|
||
7209000
|
trusted library allocation
|
page read and write
|
||
473D000
|
stack
|
page read and write
|
||
210DE000
|
stack
|
page read and write
|
||
987000
|
unkown
|
page execute and read and write
|
||
5188000
|
trusted library allocation
|
page read and write
|
||
50DE000
|
stack
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
5D4E000
|
stack
|
page read and write
|
||
20D48000
|
direct allocation
|
page read and write
|
||
A3B000
|
stack
|
page read and write
|
||
719000
|
unkown
|
page execute and read and write
|
||
CD7000
|
heap
|
page read and write
|
||
2229D000
|
heap
|
page read and write
|
||
6B32000
|
trusted library allocation
|
page read and write
|
||
2228F000
|
heap
|
page read and write
|
||
7E280000
|
direct allocation
|
page read and write
|
||
6A19000
|
trusted library allocation
|
page read and write
|
||
2BD70000
|
direct allocation
|
page read and write
|
||
22AD000
|
direct allocation
|
page read and write
|
||
6A5E000
|
trusted library allocation
|
page read and write
|
||
6AB3000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
70A4000
|
trusted library allocation
|
page read and write
|
||
546D000
|
stack
|
page read and write
|
||
21750000
|
remote allocation
|
page read and write
|
||
33D1000
|
trusted library allocation
|
page read and write
|
||
719000
|
unkown
|
page execute and read and write
|
||
65B0000
|
trusted library allocation
|
page read and write
|
||
7DFA0000
|
direct allocation
|
page read and write
|
||
6F32000
|
trusted library allocation
|
page read and write
|
||
6EDF000
|
trusted library allocation
|
page read and write
|
||
8AE0000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2600000
|
trusted library allocation
|
page read and write
|
||
715D000
|
trusted library allocation
|
page read and write
|
||
5D72000
|
heap
|
page read and write
|
||
3070000
|
heap
|
page execute and read and write
|
||
70F9000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
heap
|
page read and write
|
||
4F8D000
|
stack
|
page read and write
|
||
694B000
|
trusted library allocation
|
page read and write
|
||
22C3000
|
direct allocation
|
page read and write
|
||
7D5F0000
|
direct allocation
|
page read and write
|
||
2847000
|
trusted library allocation
|
page execute and read and write
|
||
451E000
|
stack
|
page read and write
|
||
4A9D000
|
stack
|
page read and write
|
||
215CD000
|
stack
|
page read and write
|
||
214CE000
|
stack
|
page read and write
|
||
6ED1000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
4DC4000
|
heap
|
page read and write
|
||
5D61000
|
heap
|
page read and write
|
||
23DF000
|
stack
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page execute and read and write
|
||
7D5A0000
|
direct allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
159E000
|
heap
|
page read and write
|
||
465B000
|
heap
|
page read and write
|
||
7140000
|
trusted library allocation
|
page read and write
|
||
2811000
|
trusted library allocation
|
page read and write
|
||
69C0000
|
trusted library allocation
|
page read and write
|
||
2146E000
|
stack
|
page read and write
|
||
6AF3000
|
trusted library allocation
|
page read and write
|
||
77ED000
|
stack
|
page read and write
|
||
2933000
|
heap
|
page read and write
|
||
6F1E000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
25F0000
|
trusted library allocation
|
page read and write
|
||
5F4E000
|
stack
|
page read and write
|
||
2A0E000
|
heap
|
page read and write
|
||
650E000
|
stack
|
page read and write
|
||
25E1000
|
trusted library allocation
|
page read and write
|
||
2B64000
|
heap
|
page read and write
|
||
1E5000
|
heap
|
page read and write
|
||
6BF0000
|
trusted library allocation
|
page read and write
|
||
C20000
|
trusted library allocation
|
page read and write
|
||
20E3C000
|
stack
|
page read and write
|
||
6C34000
|
trusted library allocation
|
page read and write
|
||
5070000
|
heap
|
page read and write
|
||
6AED000
|
trusted library allocation
|
page read and write
|
||
52DE000
|
trusted library allocation
|
page read and write
|
||
6A5A000
|
trusted library allocation
|
page read and write
|
||
5C1D000
|
stack
|
page read and write
|
||
4AB5000
|
trusted library allocation
|
page read and write
|
||
6D0E000
|
stack
|
page read and write
|
||
244A000
|
trusted library allocation
|
page read and write
|
||
2BF10000
|
direct allocation
|
page read and write
|
||
5F4C000
|
stack
|
page read and write
|
||
2860000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
60DF000
|
stack
|
page read and write
|
||
8410000
|
trusted library allocation
|
page read and write
|
||
6A1B000
|
trusted library allocation
|
page read and write
|
||
5700000
|
trusted library allocation
|
page read and write
|
||
D0F000
|
heap
|
page read and write
|
||
2C2C000
|
heap
|
page read and write
|
||
22200000
|
heap
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
7DC60000
|
direct allocation
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
8B0D000
|
stack
|
page read and write
|
||
38F9000
|
trusted library allocation
|
page read and write
|
||
2B36000
|
trusted library allocation
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
7067000
|
trusted library allocation
|
page read and write
|
||
61C000
|
heap
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
6880000
|
trusted library allocation
|
page read and write
|
||
289C000
|
trusted library allocation
|
page read and write
|
||
7020000
|
trusted library allocation
|
page read and write
|
||
6F03000
|
trusted library allocation
|
page read and write
|
||
157D000
|
trusted library allocation
|
page execute and read and write
|
||
D87000
|
heap
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
4F34000
|
trusted library allocation
|
page read and write
|
||
6A23000
|
trusted library allocation
|
page read and write
|
||
6D10000
|
trusted library allocation
|
page read and write
|
||
31B000
|
stack
|
page read and write
|
||
2C4F000
|
stack
|
page read and write
|
||
4F95000
|
trusted library allocation
|
page read and write
|
||
416000
|
unkown
|
page readonly
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
C23000
|
trusted library allocation
|
page execute and read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
A5D000
|
trusted library allocation
|
page execute and read and write
|
||
7167000
|
trusted library allocation
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
7DC50000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
210CE000
|
stack
|
page read and write
|
||
416000
|
unkown
|
page readonly
|
||
2275000
|
direct allocation
|
page read and write
|
||
22C3000
|
direct allocation
|
page read and write
|
||
59C000
|
heap
|
page read and write
|
||
5970000
|
heap
|
page read and write
|
||
463A000
|
heap
|
page read and write
|
||
8A9000
|
unkown
|
page execute and read and write
|
||
4189000
|
trusted library allocation
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
4BC6000
|
heap
|
page read and write
|
||
6F22000
|
trusted library allocation
|
page read and write
|
||
6994000
|
trusted library allocation
|
page read and write
|
||
61CF000
|
stack
|
page read and write
|
||
3DD000
|
stack
|
page read and write
|
||
4D31000
|
trusted library allocation
|
page read and write
|
||
6BCC000
|
trusted library allocation
|
page read and write
|
||
2170E000
|
stack
|
page read and write
|
||
594F000
|
stack
|
page read and write
|
||
5F83000
|
trusted library allocation
|
page read and write
|
||
45AE000
|
stack
|
page read and write
|
||
2380000
|
heap
|
page read and write
|
||
84F6000
|
heap
|
page read and write
|
||
26A8000
|
trusted library allocation
|
page read and write
|
||
22E4000
|
direct allocation
|
page read and write
|
||
7DEFA000
|
direct allocation
|
page read and write
|
||
6393000
|
trusted library allocation
|
page read and write
|
||
455F000
|
stack
|
page read and write
|
||
691C000
|
trusted library allocation
|
page read and write
|
||
A79000
|
heap
|
page read and write
|
||
7D909000
|
direct allocation
|
page read and write
|
||
5980000
|
heap
|
page read and write
|
||
658E000
|
stack
|
page read and write
|
||
659C000
|
stack
|
page read and write
|
||
71AD000
|
trusted library allocation
|
page read and write
|
||
699F000
|
trusted library allocation
|
page read and write
|
||
884000
|
trusted library allocation
|
page read and write
|
||
2BCE0000
|
direct allocation
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
4181000
|
trusted library allocation
|
page read and write
|
||
164E000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
D6E000
|
unkown
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
4B54000
|
heap
|
page read and write
|
||
65C3000
|
trusted library allocation
|
page read and write
|
||
5C4E000
|
stack
|
page read and write
|
||
8521000
|
heap
|
page read and write
|
||
AC5000
|
heap
|
page read and write
|
||
B5E000
|
heap
|
page read and write
|
||
2B26000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
4A3E000
|
stack
|
page read and write
|
||
2BCE0000
|
direct allocation
|
page read and write
|
||
23CE000
|
stack
|
page read and write
|
||
848C000
|
heap
|
page read and write
|
||
2871000
|
trusted library allocation
|
page read and write
|
||
9FF000
|
unkown
|
page read and write
|
||
4B54000
|
heap
|
page read and write
|
||
4F36000
|
trusted library allocation
|
page read and write
|
||
5670000
|
trusted library allocation
|
page execute and read and write
|
||
88AF000
|
stack
|
page read and write
|
||
1693000
|
trusted library allocation
|
page execute and read and write
|
||
2661000
|
trusted library allocation
|
page read and write
|
||
E47000
|
trusted library allocation
|
page execute and read and write
|
||
B93000
|
heap
|
page read and write
|
||
2AE6000
|
trusted library allocation
|
page read and write
|
||
7DC10000
|
direct allocation
|
page read and write
|
||
6A36000
|
trusted library allocation
|
page read and write
|
||
4956000
|
trusted library allocation
|
page read and write
|
||
638E000
|
stack
|
page read and write
|
||
7ECD0000
|
direct allocation
|
page read and write
|
||
240000
|
unkown
|
page readonly
|
||
625000
|
heap
|
page read and write
|
||
58C000
|
unkown
|
page execute and read and write
|
||
31EA000
|
trusted library allocation
|
page read and write
|
||
495D000
|
stack
|
page read and write
|
||
75D6000
|
heap
|
page read and write
|
||
5692000
|
trusted library allocation
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
6E7E000
|
trusted library allocation
|
page read and write
|
||
7EEF0000
|
direct allocation
|
page read and write
|
||
6870000
|
trusted library allocation
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
6AB1000
|
trusted library allocation
|
page read and write
|
||
6F50000
|
trusted library allocation
|
page read and write
|
||
7DBE0000
|
direct allocation
|
page read and write
|
||
6979000
|
trusted library allocation
|
page read and write
|
||
7D6E0000
|
direct allocation
|
page read and write
|
||
6C2C000
|
trusted library allocation
|
page read and write
|
||
9D8000
|
stack
|
page read and write
|
||
7EEC0000
|
direct allocation
|
page read and write
|
||
58E000
|
heap
|
page read and write
|
||
6A92000
|
trusted library allocation
|
page read and write
|
||
4A5E000
|
stack
|
page read and write
|
||
68DB000
|
trusted library allocation
|
page read and write
|
||
578000
|
heap
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
2DF5000
|
direct allocation
|
page read and write
|
||
2137E000
|
stack
|
page read and write
|
||
20DDC000
|
direct allocation
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page execute and read and write
|
||
882000
|
heap
|
page read and write
|
||
3689000
|
trusted library allocation
|
page read and write
|
||
4B6D000
|
heap
|
page read and write
|
||
2138E000
|
stack
|
page read and write
|
||
4960000
|
trusted library allocation
|
page read and write
|
||
3657000
|
trusted library allocation
|
page read and write
|
||
56F4000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
6C80000
|
trusted library allocation
|
page read and write
|
||
7E047000
|
direct allocation
|
page read and write
|
||
7E30F000
|
direct allocation
|
page read and write
|
||
6A52000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
4FAF000
|
stack
|
page read and write
|
||
6A96000
|
trusted library allocation
|
page read and write
|
||
704C000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
8400000
|
trusted library allocation
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
4E1F000
|
stack
|
page read and write
|
||
76EE000
|
stack
|
page read and write
|
||
5F6000
|
heap
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
609E000
|
stack
|
page read and write
|
||
6F8000
|
stack
|
page read and write
|
||
5F8E000
|
stack
|
page read and write
|
||
20E3A000
|
stack
|
page read and write
|
||
20F3E000
|
stack
|
page execute and read and write
|
||
E70000
|
heap
|
page read and write
|
||
2830000
|
trusted library allocation
|
page read and write
|
||
29AC000
|
stack
|
page read and write
|
||
7069000
|
trusted library allocation
|
page read and write
|
||
285C000
|
trusted library allocation
|
page read and write
|
||
6E08000
|
trusted library allocation
|
page read and write
|
||
20F7F000
|
stack
|
page read and write
|
||
60F000
|
heap
|
page read and write
|
||
8B8F000
|
stack
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
69AE000
|
trusted library allocation
|
page read and write
|
||
7D870000
|
direct allocation
|
page read and write
|
||
26ED000
|
trusted library allocation
|
page read and write
|
||
6BF6000
|
trusted library allocation
|
page read and write
|
||
2223D000
|
heap
|
page read and write
|
||
82B0000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
337F000
|
stack
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
6AE7000
|
trusted library allocation
|
page read and write
|
||
21B29000
|
heap
|
page read and write
|
||
6AA4000
|
trusted library allocation
|
page read and write
|
||
6F8F000
|
trusted library allocation
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
82E0000
|
trusted library allocation
|
page read and write
|
||
22B2000
|
direct allocation
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
A62000
|
trusted library allocation
|
page read and write
|
||
86C0000
|
trusted library allocation
|
page read and write
|
||
7018000
|
trusted library allocation
|
page read and write
|
||
707C000
|
trusted library allocation
|
page read and write
|
||
7D457000
|
direct allocation
|
page read and write
|
||
7E840000
|
direct allocation
|
page read and write
|
||
704A000
|
trusted library allocation
|
page read and write
|
||
566B000
|
trusted library allocation
|
page read and write
|
||
7148000
|
trusted library allocation
|
page read and write
|
||
6F58000
|
trusted library allocation
|
page read and write
|
||
26C0000
|
heap
|
page read and write
|
||
6B4B000
|
trusted library allocation
|
page read and write
|
||
4BAA000
|
heap
|
page read and write
|
||
68D5000
|
trusted library allocation
|
page read and write
|
||
6C21000
|
trusted library allocation
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
20D2C000
|
direct allocation
|
page read and write
|
||
8A7D000
|
stack
|
page read and write
|
||
9B7000
|
trusted library allocation
|
page execute and read and write
|
||
7EDD0000
|
direct allocation
|
page read and write
|
||
50EE000
|
stack
|
page read and write
|
||
38B9000
|
trusted library allocation
|
page read and write
|
||
4F32000
|
trusted library allocation
|
page read and write
|
||
3DE000
|
stack
|
page read and write
|
||
20D60000
|
direct allocation
|
page read and write
|
||
2891000
|
trusted library allocation
|
page read and write
|
||
629C000
|
stack
|
page read and write
|
||
278E000
|
trusted library allocation
|
page read and write
|
||
6A4B000
|
trusted library allocation
|
page read and write
|
||
6C16000
|
trusted library allocation
|
page read and write
|
||
B67000
|
unkown
|
page execute and read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
A66000
|
trusted library allocation
|
page execute and read and write
|
||
70FD000
|
trusted library allocation
|
page read and write
|
||
4BCD000
|
heap
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
2831000
|
trusted library allocation
|
page read and write
|
||
4B99000
|
heap
|
page read and write
|
||
720000
|
unkown
|
page execute and read and write
|
||
7FC60000
|
direct allocation
|
page read and write
|
||
6AA6000
|
trusted library allocation
|
page read and write
|
||
61C6000
|
heap
|
page read and write
|
||
2861000
|
trusted library allocation
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
75F7000
|
heap
|
page read and write
|
||
C65000
|
trusted library allocation
|
page execute and read and write
|
||
7E280000
|
direct allocation
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
7FB80000
|
trusted library allocation
|
page execute and read and write
|
||
719000
|
unkown
|
page execute and read and write
|
||
634E000
|
stack
|
page read and write
|
||
2443000
|
heap
|
page read and write
|
||
6A0B000
|
trusted library allocation
|
page read and write
|
||
ED4000
|
trusted library allocation
|
page read and write
|
||
940000
|
trusted library allocation
|
page read and write
|
||
8ACE000
|
stack
|
page read and write
|
||
4900000
|
trusted library allocation
|
page read and write
|
||
6E43000
|
trusted library allocation
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
478000
|
unkown
|
page read and write
|
||
4656000
|
heap
|
page read and write
|
||
25F5000
|
trusted library allocation
|
page read and write
|
||
2610000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
28DD000
|
trusted library allocation
|
page read and write
|
||
7FB60000
|
direct allocation
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
63AC000
|
stack
|
page read and write
|
||
7EE7F000
|
direct allocation
|
page read and write
|
||
C4F000
|
stack
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
714A000
|
trusted library allocation
|
page read and write
|
||
950000
|
trusted library allocation
|
page read and write
|
||
962000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
6E47000
|
trusted library allocation
|
page read and write
|
||
2AF3000
|
trusted library allocation
|
page read and write
|
||
2120000
|
heap
|
page read and write
|
||
604E000
|
stack
|
page read and write
|
||
83D0000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
58C000
|
unkown
|
page execute and read and write
|
||
6C7C000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
direct allocation
|
page readonly
|
||
A7B000
|
trusted library allocation
|
page execute and read and write
|
||
EB0000
|
heap
|
page read and write
|
||
22DD000
|
direct allocation
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
E3F000
|
stack
|
page read and write
|
||
F6F000
|
stack
|
page read and write
|
||
4D1B000
|
trusted library allocation
|
page read and write
|
||
719A000
|
trusted library allocation
|
page read and write
|
||
6F91000
|
trusted library allocation
|
page read and write
|
||
6A21000
|
trusted library allocation
|
page read and write
|
||
83B000
|
stack
|
page read and write
|
||
6E0C000
|
trusted library allocation
|
page read and write
|
||
25D1000
|
trusted library allocation
|
page read and write
|
||
6C7E000
|
trusted library allocation
|
page read and write
|
||
491B000
|
trusted library allocation
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
5588000
|
trusted library allocation
|
page read and write
|
||
2DDE000
|
direct allocation
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
68D9000
|
trusted library allocation
|
page read and write
|
||
7D780000
|
direct allocation
|
page read and write
|
||
2690000
|
trusted library allocation
|
page read and write
|
||
47E0000
|
heap
|
page read and write
|
||
2E22000
|
direct allocation
|
page read and write
|
||
96A000
|
trusted library allocation
|
page execute and read and write
|
||
71B1000
|
trusted library allocation
|
page read and write
|
||
4BB5000
|
heap
|
page read and write
|
||
51D0000
|
heap
|
page read and write
|
||
3661000
|
trusted library allocation
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
61FD000
|
trusted library allocation
|
page read and write
|
||
6C0F000
|
trusted library allocation
|
page read and write
|
||
26AD000
|
trusted library allocation
|
page read and write
|
||
EDD000
|
trusted library allocation
|
page execute and read and write
|
||
288F000
|
stack
|
page read and write
|
||
4BCD000
|
heap
|
page read and write
|
||
C19000
|
heap
|
page read and write
|
||
7BE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
4954000
|
trusted library allocation
|
page read and write
|
||
71BB000
|
trusted library allocation
|
page read and write
|
||
6B5E000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
unkown
|
page execute and read and write
|
||
7159000
|
trusted library allocation
|
page read and write
|
||
7022000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
33EF000
|
trusted library allocation
|
page read and write
|
||
68EC000
|
trusted library allocation
|
page read and write
|
||
A31000
|
heap
|
page read and write
|
||
930000
|
trusted library allocation
|
page read and write
|
||
ED3000
|
trusted library allocation
|
page execute and read and write
|
||
6BB7000
|
trusted library allocation
|
page read and write
|
||
6985000
|
trusted library allocation
|
page read and write
|
||
36C8000
|
trusted library allocation
|
page read and write
|
||
4E95000
|
trusted library allocation
|
page read and write
|
||
7012000
|
trusted library allocation
|
page read and write
|
||
2813000
|
trusted library allocation
|
page read and write
|
||
708D000
|
trusted library allocation
|
page read and write
|
||
28D5000
|
trusted library allocation
|
page read and write
|
||
6F0B000
|
trusted library allocation
|
page read and write
|
||
5D55000
|
trusted library allocation
|
page read and write
|
||
2740000
|
heap
|
page execute and read and write
|
||
2F3A000
|
trusted library allocation
|
page execute and read and write
|
||
4B4C000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
6E68000
|
trusted library allocation
|
page read and write
|
||
817000
|
heap
|
page read and write
|
||
214CE000
|
stack
|
page read and write
|
||
B87000
|
heap
|
page read and write
|
||
82DD000
|
trusted library allocation
|
page read and write
|
||
2301000
|
direct allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
6E2E000
|
trusted library allocation
|
page read and write
|
||
2A6F000
|
trusted library allocation
|
page read and write
|
||
700C000
|
trusted library allocation
|
page read and write
|
||
20F3A000
|
stack
|
page read and write
|
||
465B000
|
heap
|
page read and write
|
||
2236B000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
741E000
|
stack
|
page read and write
|
||
4BCB000
|
heap
|
page read and write
|
||
7DB80000
|
direct allocation
|
page read and write
|
||
CD7000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
713C000
|
trusted library allocation
|
page read and write
|
||
6B71000
|
trusted library allocation
|
page read and write
|
||
3148000
|
heap
|
page read and write
|
||
2BC80000
|
direct allocation
|
page read and write
|
||
3677000
|
trusted library allocation
|
page read and write
|
||
A44000
|
trusted library allocation
|
page read and write
|
||
6B95000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
trusted library section
|
page read and write
|
||
2ABF000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
heap
|
page read and write
|
||
6F05000
|
trusted library allocation
|
page read and write
|
||
6EA6000
|
trusted library allocation
|
page read and write
|
||
1573000
|
trusted library allocation
|
page execute and read and write
|
||
7E30F000
|
direct allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
5E2000
|
heap
|
page read and write
|
||
6410000
|
trusted library allocation
|
page execute and read and write
|
||
69DC000
|
trusted library allocation
|
page read and write
|
||
7FC38000
|
trusted library allocation
|
page execute and read and write
|
||
2D4E000
|
heap
|
page read and write
|
||
710E000
|
trusted library allocation
|
page read and write
|
||
6A01000
|
trusted library allocation
|
page read and write
|
||
7138000
|
trusted library allocation
|
page read and write
|
||
6C36000
|
trusted library allocation
|
page read and write
|
||
302C000
|
stack
|
page read and write
|
||
2FDE000
|
direct allocation
|
page execute and read and write
|
||
990000
|
heap
|
page read and write
|
||
5DCF000
|
stack
|
page read and write
|
||
6C30000
|
trusted library allocation
|
page read and write
|
||
2955000
|
trusted library allocation
|
page read and write
|
||
215AF000
|
stack
|
page read and write
|
||
E5E000
|
stack
|
page read and write
|
||
7DF20000
|
direct allocation
|
page read and write
|
||
77F0000
|
trusted library allocation
|
page read and write
|
||
8B0F000
|
stack
|
page read and write
|
||
6C2E000
|
trusted library allocation
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
242E000
|
stack
|
page read and write
|
||
5D10000
|
heap
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
3555000
|
trusted library allocation
|
page read and write
|
||
254E000
|
stack
|
page read and write
|
||
8823000
|
trusted library allocation
|
page read and write
|
||
479000
|
unkown
|
page execute and read and write
|
||
22201000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page execute and read and write
|
||
268E000
|
stack
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
6F28000
|
trusted library allocation
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
5A4F000
|
stack
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
2FE0000
|
heap
|
page readonly
|
||
6AE5000
|
trusted library allocation
|
page read and write
|
||
4F4E000
|
trusted library allocation
|
page read and write
|
||
7EEA0000
|
direct allocation
|
page read and write
|
||
7EF0F000
|
direct allocation
|
page read and write
|
||
6A69000
|
trusted library allocation
|
page read and write
|
||
535E000
|
stack
|
page read and write
|
||
4BC6000
|
heap
|
page read and write
|
||
4EAE000
|
stack
|
page read and write
|
||
D25000
|
heap
|
page read and write
|
||
2AD1000
|
trusted library allocation
|
page read and write
|
||
7DAB0000
|
direct allocation
|
page read and write
|
||
523E000
|
stack
|
page read and write
|
||
6F56000
|
trusted library allocation
|
page read and write
|
||
CBE000
|
heap
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
5050000
|
direct allocation
|
page read and write
|
||
53D000
|
stack
|
page read and write
|
||
4FB0000
|
direct allocation
|
page read and write
|
||
7DC90000
|
direct allocation
|
page read and write
|
||
7DCCF000
|
direct allocation
|
page read and write
|
||
4B65000
|
heap
|
page read and write
|
||
58C000
|
unkown
|
page execute and read and write
|
||
B0A000
|
trusted library allocation
|
page execute and read and write
|
||
70A2000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
7EE50000
|
direct allocation
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
7DF87000
|
direct allocation
|
page read and write
|
||
57AA000
|
heap
|
page read and write
|
||
69A2000
|
trusted library allocation
|
page read and write
|
||
2840000
|
trusted library allocation
|
page read and write
|
||
78A0000
|
trusted library allocation
|
page read and write
|
||
27DD000
|
stack
|
page read and write
|
||
22C0000
|
direct allocation
|
page read and write
|
||
972000
|
trusted library allocation
|
page read and write
|
||
6A29000
|
trusted library allocation
|
page read and write
|
||
2BD60000
|
direct allocation
|
page read and write
|
||
6ED5000
|
trusted library allocation
|
page read and write
|
||
937000
|
stack
|
page read and write
|
||
290A000
|
trusted library allocation
|
page read and write
|
||
2A0E000
|
heap
|
page read and write
|
||
6FAF000
|
trusted library allocation
|
page read and write
|
||
20D41000
|
direct allocation
|
page read and write
|
||
56D3000
|
trusted library allocation
|
page read and write
|
||
69B6000
|
trusted library allocation
|
page read and write
|
||
6F07000
|
trusted library allocation
|
page read and write
|
||
7E220000
|
direct allocation
|
page read and write
|
||
4FA8000
|
trusted library allocation
|
page read and write
|
||
5BCF000
|
stack
|
page read and write
|
||
7E30F000
|
direct allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
762C000
|
heap
|
page read and write
|
||
697D000
|
trusted library allocation
|
page read and write
|
||
2F4B000
|
trusted library allocation
|
page execute and read and write
|
||
7EF60000
|
direct allocation
|
page read and write
|
||
22FA000
|
direct allocation
|
page read and write
|
||
7EA20000
|
direct allocation
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
23CE000
|
stack
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
4628000
|
heap
|
page read and write
|
||
61F0000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
6991000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
trusted library allocation
|
page execute and read and write
|
||
987000
|
unkown
|
page execute and read and write
|
||
6BF2000
|
trusted library allocation
|
page read and write
|
||
6E4D000
|
trusted library allocation
|
page read and write
|
||
7644000
|
heap
|
page read and write
|
||
4910000
|
trusted library allocation
|
page read and write
|
||
A2E000
|
stack
|
page read and write
|
||
6F24000
|
trusted library allocation
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
6EE1000
|
trusted library allocation
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
22A03000
|
heap
|
page read and write
|
||
7EEB0000
|
direct allocation
|
page read and write
|
||
31B1000
|
heap
|
page read and write
|
||
20F4F000
|
stack
|
page read and write
|
||
6F7A000
|
trusted library allocation
|
page read and write
|
||
8484000
|
heap
|
page read and write
|
||
7EE60000
|
direct allocation
|
page read and write
|
||
25FA000
|
trusted library allocation
|
page read and write
|
||
2F36000
|
trusted library allocation
|
page execute and read and write
|
||
7D3D0000
|
direct allocation
|
page read and write
|
||
A6A000
|
trusted library allocation
|
page execute and read and write
|
||
7E190000
|
direct allocation
|
page read and write
|
||
28AE000
|
stack
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
7063000
|
trusted library allocation
|
page read and write
|
||
6960000
|
trusted library allocation
|
page read and write
|
||
68C0000
|
trusted library allocation
|
page execute and read and write
|
||
625000
|
heap
|
page read and write
|
||
626000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
711F000
|
trusted library allocation
|
page read and write
|
||
4F44000
|
trusted library allocation
|
page read and write
|
||
886E000
|
stack
|
page read and write
|
||
2226000
|
direct allocation
|
page read and write
|
||
20D23000
|
direct allocation
|
page read and write
|
||
63A7000
|
trusted library allocation
|
page read and write
|
||
6A13000
|
trusted library allocation
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
218DE000
|
stack
|
page read and write
|
||
7EEF0000
|
direct allocation
|
page read and write
|
||
8AC000
|
heap
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
AED000
|
trusted library allocation
|
page execute and read and write
|
||
2BB7000
|
trusted library allocation
|
page read and write
|
||
8A9000
|
unkown
|
page execute and read and write
|
There are 2256 hidden memdumps, click here to show them.