Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Original Shipment_Document.PDF.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\tmp6DD1.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\run.dat
|
Non-ISO extended-ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\caspol.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\nsaB9E2.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsaB9E2.tmp\nsExec.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\subfolder1\windows.exe
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\catalog.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\settings.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\storage.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\task.dat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\timelrer\Tdlen\Integrationsprvens.Adg72
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\timelrer\Tdlen\format-text-bold-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\timelrer\Tdlen\location-services-disabled-symbolic.symbolic.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\timelrer\Tdlen\uforfrdetheden.Rid
|
data
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 6 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Original Shipment_Document.PDF.exe
|
"C:\Users\user\Desktop\Original Shipment_Document.PDF.exe"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x721C070B^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x7C156677^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x03631637^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x5C382120^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x7F303920^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x78713865^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x4B6D7569^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x19307575^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x41616575^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x09696575^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x0975752C^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x19697965^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x49796569^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x19307571^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x15793C65^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x09216D75^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x15793C65^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x09703C6B^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x4B6C7578^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x721C070B^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x7C156677^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x0363032C^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x4B2D2024^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x55183929^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x563A7D2C^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x09753C65^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x09216475^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x09696575^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x15793C65^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x09216675^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x09697965^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x5079653D^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x0D697C35^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x172B6478^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x721C070B^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x7C156677^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x03630620^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x4D1F3C29^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x5C093A2C^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x572D3037^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x11307537^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x0C75752C^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x19686375^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x09697569^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x19307575^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x15307575^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x10307B37^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x0A64721C^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x721C070B^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x7C156677^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x03630720^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x583D132C^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x553C7D2C^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x4B6C7965^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x50792774^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x15793C65^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x09216475^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x09696575^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x15733C65^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x0975752C^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x19697C2C^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x172B6678^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x4C2A3037^962155845"
|
||
C:\Windows\SysWOW64\cmd.eXe
|
cmd.eXe /c SeT /a "0x0A6B6F7F^962155845"
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
|
"C:\Users\user\Desktop\Original Shipment_Document.PDF.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
schtasks.exe" /create /f /tn "DSL Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp6DD1.tmp
|
||
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe 0
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 125 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://doc-14-70-docs.googleusercontent.com/
|
unknown
|
||
https://doc-14-70-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/bcmtj5ie
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://google.com
|
unknown
|
||
https://doc-14-70-docs.googleusercontent.com/%%doc-14-70-docs.googleusercontent.com
|
unknown
|
||
https://drive.google.com/
|
unknown
|
||
https://doc-14-70-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/bcmtj5ie1disn24fvm7mb2d8jibr4j1v/1659691950000/06422039211485589527/*/1RTjXzM3oLxMQRuQuQg9TR4kX_hPJtp2r?e=download&uuid=fa4270ed-3082-4e6e-8e77-e38f9ee0c1fd
|
142.250.181.225
|
||
https://drive.google.com/x~
|
unknown
|
||
https://csp.withgoogle.com/csp/report-to/DriveUntrustedContentHttp/external
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
drive.google.com
|
142.250.179.174
|
||
tuk.linkpc.net
|
188.127.230.176
|
||
googlehosted.l.googleusercontent.com
|
142.250.181.225
|
||
doc-14-70-docs.googleusercontent.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.181.225
|
googlehosted.l.googleusercontent.com
|
United States
|
||
188.127.230.176
|
tuk.linkpc.net
|
Russian Federation
|
||
142.250.179.174
|
drive.google.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
|
Startup key
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
E30000
|
remote allocation
|
page execute and read and write
|
||
3280000
|
direct allocation
|
page execute and read and write
|
||
12CF000
|
stack
|
page read and write
|
||
1C476000
|
heap
|
page read and write
|
||
1FA4F000
|
trusted library allocation
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
427000
|
unkown
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C421000
|
heap
|
page read and write
|
||
20BB5000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
1FA87000
|
trusted library allocation
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
125F000
|
heap
|
page read and write
|
||
1C472000
|
heap
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
1EDF2000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1241000
|
heap
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
11D3000
|
heap
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1C450000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C43E000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
250CA079000
|
heap
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
109F000
|
stack
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
250CA929000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
123B000
|
heap
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
250CA913000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA62000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C46F000
|
heap
|
page read and write
|
||
1FA68000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
3410000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
126B000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
202C8000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1FA4E000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C46F000
|
heap
|
page read and write
|
||
1FA2D000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
250CA079000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
E20000
|
remote allocation
|
page read and write
|
||
1C452000
|
heap
|
page read and write
|
||
563000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1FA6E000
|
trusted library allocation
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
20B95000
|
trusted library allocation
|
page read and write
|
||
250CA970000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C446000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
20B51000
|
trusted library allocation
|
page read and write
|
||
1FC97000
|
trusted library allocation
|
page read and write
|
||
250CA976000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20400000
|
trusted library allocation
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
250CA102000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
294A000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C454000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FC60000
|
trusted library allocation
|
page read and write
|
||
578000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
250CA92F000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
123F000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C446000
|
heap
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1FA87000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
5250000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1D2FB251000
|
heap
|
page read and write
|
||
1FA3E000
|
trusted library allocation
|
page read and write
|
||
250CA09D000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C40C000
|
heap
|
page read and write
|
||
1C456000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
250CA94B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
250C9FC0000
|
unclassified section
|
page readonly
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B95000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1252000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
1FA87000
|
trusted library allocation
|
page read and write
|
||
1FA48000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20BB4000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C454000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
42D000
|
unkown
|
page read and write
|
||
56C000
|
heap
|
page read and write
|
||
22A0000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C433000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B51000
|
trusted library allocation
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1FC70000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C453000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C421000
|
heap
|
page read and write
|
||
1C454000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
250CA0AC000
|
heap
|
page read and write
|
||
20570000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
563000
|
heap
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C477000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA6E000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C4C6000
|
heap
|
page read and write
|
||
1C452000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C46C000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1FC50000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C471000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
20BB7000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
250CA07C000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1FA70000
|
trusted library allocation
|
page read and write
|
||
1C46C000
|
heap
|
page read and write
|
||
1FA73000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1FA87000
|
trusted library allocation
|
page read and write
|
||
1C446000
|
heap
|
page read and write
|
||
250C9FD0000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
250CA02A000
|
heap
|
page read and write
|
||
1FA8B000
|
trusted library allocation
|
page read and write
|
||
1D2FB26C000
|
heap
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
1C456000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
11E7000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1202000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1FC96000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
202C0000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
294B000
|
trusted library allocation
|
page read and write
|
||
20B97000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C458000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
125A000
|
heap
|
page read and write
|
||
1FA89000
|
trusted library allocation
|
page read and write
|
||
1C415000
|
heap
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C469000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
F4BF179000
|
stack
|
page read and write
|
||
1FAA8000
|
trusted library allocation
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
20B51000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
20B7E000
|
trusted library allocation
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1EDC5000
|
trusted library allocation
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C474000
|
heap
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
1C443000
|
heap
|
page read and write
|
||
20B86000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C43E000
|
heap
|
page read and write
|
||
250CA05D000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
20B5F000
|
trusted library allocation
|
page read and write
|
||
3C6C000
|
stack
|
page read and write
|
||
1D2FB286000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1D700000
|
trusted library allocation
|
page read and write
|
||
1ED49000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C455000
|
heap
|
page read and write
|
||
55A000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1267000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FCC0000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1208000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
1FA89000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1ED9D000
|
trusted library allocation
|
page read and write
|
||
1FA59000
|
trusted library allocation
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
20B62000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
123B000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
20410000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
250CA96B000
|
heap
|
page read and write
|
||
11DE000
|
heap
|
page read and write
|
||
20B57000
|
trusted library allocation
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C456000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
F9F000
|
stack
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1FA45000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
250CA07B000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
250CA040000
|
heap
|
page read and write
|
||
1C44D000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1FAA8000
|
trusted library allocation
|
page read and write
|
||
1FA70000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
718D1000
|
unkown
|
page execute read
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1239000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
20B85000
|
trusted library allocation
|
page read and write
|
||
11DE000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
12FB000
|
trusted library allocation
|
page execute and read and write
|
||
1C43E000
|
heap
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20405000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1208000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
B95000
|
trusted library allocation
|
page read and write
|
||
250CA900000
|
heap
|
page read and write
|
||
213A0000
|
unkown
|
page read and write
|
||
20B81000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B5A000
|
trusted library allocation
|
page read and write
|
||
20BB5000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1FA62000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
20BB5000
|
trusted library allocation
|
page read and write
|
||
202C0000
|
trusted library allocation
|
page read and write
|
||
56C000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
1C421000
|
heap
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
250CA12A000
|
heap
|
page read and write
|
||
56A000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
1C44D000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C420000
|
heap
|
page read and write
|
||
123E000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA8B000
|
trusted library allocation
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
3B6C000
|
stack
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1FAA8000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
D0E000
|
stack
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1FC96000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C472000
|
heap
|
page read and write
|
||
1FA6C000
|
trusted library allocation
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1FCA8000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1D1D0000
|
remote allocation
|
page read and write
|
||
1C446000
|
heap
|
page read and write
|
||
126E000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1D700000
|
trusted library allocation
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
8EF000
|
stack
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
250CA0A9000
|
heap
|
page read and write
|
||
125D000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1223000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1D1D0000
|
remote allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
250CA910000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C452000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43E000
|
heap
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C43E000
|
heap
|
page read and write
|
||
250CA084000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
56E000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C421000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20BB5000
|
trusted library allocation
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
123B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1228000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
250CA06E000
|
heap
|
page read and write
|
||
578000
|
heap
|
page read and write
|
||
1C46C000
|
heap
|
page read and write
|
||
1FA62000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA6D000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
250CA09F000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
56C000
|
heap
|
page read and write
|
||
B99000
|
trusted library allocation
|
page read and write
|
||
20B95000
|
trusted library allocation
|
page read and write
|
||
1FA89000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
250CA074000
|
heap
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
11EC000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
11E3000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C446000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1D2FAFA0000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
5150000
|
trusted library allocation
|
page execute and read and write
|
||
20B95000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1C472000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
20400000
|
trusted library allocation
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
235E000
|
stack
|
page read and write
|
||
1FA89000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
250CA0AC000
|
heap
|
page read and write
|
||
250CA902000
|
heap
|
page read and write
|
||
57E000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
5200000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C450000
|
heap
|
page read and write
|
||
1277000
|
heap
|
page read and write
|
||
1FA70000
|
trusted library allocation
|
page read and write
|
||
563000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C456000
|
heap
|
page read and write
|
||
1FC54000
|
trusted library allocation
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FC96000
|
trusted library allocation
|
page read and write
|
||
1C46F000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C47A000
|
heap
|
page read and write
|
||
1FA3C000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C421000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1FA6E000
|
trusted library allocation
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
250CA940000
|
heap
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
5220000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
2B10000
|
unkown
|
page readonly
|
||
1C436000
|
heap
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
11C4000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B51000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA55000
|
trusted library allocation
|
page read and write
|
||
3381000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
250CA974000
|
heap
|
page read and write
|
||
213A0000
|
trusted library allocation
|
page read and write
|
||
20B9B000
|
trusted library allocation
|
page read and write
|
||
3240000
|
trusted library allocation
|
page read and write
|
||
F4BF3FC000
|
stack
|
page read and write
|
||
1FA63000
|
trusted library allocation
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
1FCA0000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
55A000
|
heap
|
page read and write
|
||
1C4A0000
|
heap
|
page read and write
|
||
12F7000
|
trusted library allocation
|
page execute and read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
213A6000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
213A0000
|
unkown
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
250CA06D000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B79000
|
trusted library allocation
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
578000
|
heap
|
page read and write
|
||
213A5000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1219000
|
heap
|
page read and write
|
||
718D6000
|
unkown
|
page readonly
|
||
1C440000
|
heap
|
page read and write
|
||
250CA958000
|
heap
|
page read and write
|
||
1FC50000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1FA43000
|
trusted library allocation
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
21120000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA89000
|
trusted library allocation
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
20B77000
|
trusted library allocation
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
20B57000
|
trusted library allocation
|
page read and write
|
||
20BB5000
|
trusted library allocation
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
250CA970000
|
heap
|
page read and write
|
||
1C46E000
|
heap
|
page read and write
|
||
1FA68000
|
trusted library allocation
|
page read and write
|
||
1C450000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
213A0000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
11DE000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
55A000
|
heap
|
page read and write
|
||
20B79000
|
trusted library allocation
|
page read and write
|
||
3FF1000
|
trusted library allocation
|
page read and write
|
||
1C443000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
1FC97000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
20A10000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
5219000
|
trusted library allocation
|
page read and write
|
||
B66000
|
stack
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C46C000
|
heap
|
page read and write
|
||
20BB5000
|
trusted library allocation
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
1C452000
|
heap
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
22B0000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20400000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C44E000
|
heap
|
page read and write
|
||
250CA097000
|
heap
|
page read and write
|
||
1D700000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA4B000
|
trusted library allocation
|
page read and write
|
||
1C452000
|
heap
|
page read and write
|
||
1C448000
|
heap
|
page read and write
|
||
20BB5000
|
trusted library allocation
|
page read and write
|
||
1FA87000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1C411000
|
heap
|
page read and write
|
||
718D4000
|
unkown
|
page readonly
|
||
125D000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C46F000
|
heap
|
page read and write
|
||
1252000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1FEC7000
|
trusted library allocation
|
page read and write
|
||
1C4B2000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1D2FB200000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1D2FB27D000
|
heap
|
page read and write
|
||
294C000
|
trusted library allocation
|
page read and write
|
||
11D2000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
DD7000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
202A0000
|
trusted library allocation
|
page read and write
|
||
1274000
|
heap
|
page read and write
|
||
56C000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
1C450000
|
heap
|
page read and write
|
||
1EE48000
|
trusted library allocation
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
2B40000
|
unclassified section
|
page readonly
|
||
1FAA8000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA3E000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1ED13000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
2E8B000
|
heap
|
page read and write
|
||
250CA12D000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
11E1000
|
heap
|
page read and write
|
||
250CA92C000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
3A70000
|
trusted library allocation
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
56A000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1D2FB23B000
|
heap
|
page read and write
|
||
1201000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
5260000
|
trusted library allocation
|
page read and write
|
||
1FAA8000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C480000
|
heap
|
page read and write
|
||
250CA093000
|
heap
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
1D700000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
11B2000
|
trusted library allocation
|
page execute and read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA70000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
20B62000
|
trusted library allocation
|
page read and write
|
||
20400000
|
trusted library allocation
|
page read and write
|
||
1FA55000
|
trusted library allocation
|
page read and write
|
||
125D000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
1FC96000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C453000
|
heap
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
250CA97C000
|
heap
|
page read and write
|
||
20B60000
|
trusted library allocation
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
20000
|
unclassified section
|
page readonly
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1EF48000
|
trusted library allocation
|
page read and write
|
||
250CA97C000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1D2FB170000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
1C438000
|
heap
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
1C4D2000
|
heap
|
page read and write
|
||
AE0000
|
unkown
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1277000
|
heap
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C420000
|
heap
|
page read and write
|
||
20B5A000
|
trusted library allocation
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C4A3000
|
heap
|
page read and write
|
||
250CA113000
|
heap
|
page read and write
|
||
126B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B81000
|
trusted library allocation
|
page read and write
|
||
1C47D000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
56C000
|
heap
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
20B58000
|
trusted library allocation
|
page read and write
|
||
1FA3E000
|
trusted library allocation
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
20A20000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
250C9E40000
|
heap
|
page read and write
|
||
20BB7000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA74000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
563000
|
heap
|
page read and write
|
||
202B0000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B81000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
250CA08B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1D7000
|
heap
|
page read and write
|
||
50E000
|
stack
|
page read and write
|
||
1FA4F000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1FE50000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
AE5000
|
trusted library allocation
|
page read and write
|
||
250CA075000
|
heap
|
page read and write
|
||
56A000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
11BC000
|
trusted library allocation
|
page execute and read and write
|
||
1D2FB100000
|
unclassified section
|
page readonly
|
||
1C43D000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
250CA974000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1D2FB28F000
|
heap
|
page read and write
|
||
1C459000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1100000
|
heap
|
page execute and read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
316707A000
|
stack
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1249000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1236000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
202A0000
|
unkown
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
213B0000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FAA8000
|
trusted library allocation
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
512E000
|
stack
|
page read and write
|
||
1C461000
|
heap
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
250CA079000
|
heap
|
page read and write
|
||
1FA71000
|
trusted library allocation
|
page read and write
|
||
1FA87000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
250CA92C000
|
heap
|
page read and write
|
||
1C421000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1FA70000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
250CA013000
|
heap
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
1C452000
|
heap
|
page read and write
|
||
1C433000
|
heap
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
2ACD000
|
stack
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C421000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1FA62000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
2FF1000
|
trusted library allocation
|
page read and write
|
||
1C469000
|
heap
|
page read and write
|
||
250CA0BC000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
1C453000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
11C4000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
125F000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1D2FB000000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C454000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
202A0000
|
unkown
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
12E2000
|
trusted library allocation
|
page execute and read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1268000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C433000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
121D000
|
heap
|
page read and write
|
||
1C421000
|
heap
|
page read and write
|
||
1FC80000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
250CA0BF000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1EE9D000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
5190000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B51000
|
trusted library allocation
|
page read and write
|
||
1D2FB110000
|
unclassified section
|
page readonly
|
||
1C436000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1FA70000
|
trusted library allocation
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1E8F6000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
2B10000
|
unkown
|
page readonly
|
||
1C422000
|
heap
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
563000
|
heap
|
page read and write
|
||
1FA4B000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C482000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1226000
|
heap
|
page read and write
|
||
1FA89000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C461000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
213A0000
|
trusted library allocation
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1F9F3000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C471000
|
heap
|
page read and write
|
||
1FC96000
|
trusted library allocation
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C434000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
20B51000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C473000
|
heap
|
page read and write
|
||
1FC50000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA70000
|
trusted library allocation
|
page read and write
|
||
1FA62000
|
trusted library allocation
|
page read and write
|
||
1C46E000
|
heap
|
page read and write
|
||
250CA09C000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1FA89000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FCA0000
|
trusted library allocation
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
20B51000
|
trusted library allocation
|
page read and write
|
||
452000
|
unkown
|
page readonly
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
DDC000
|
heap
|
page read and write
|
||
2B20000
|
unkown
|
page readonly
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1258000
|
heap
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
1D2FB232000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C452000
|
heap
|
page read and write
|
||
502E000
|
stack
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
1268000
|
heap
|
page read and write
|
||
250CA09D000
|
heap
|
page read and write
|
||
11C6000
|
heap
|
page read and write
|
||
1FE50000
|
trusted library allocation
|
page read and write
|
||
1FA55000
|
trusted library allocation
|
page read and write
|
||
1C448000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1C472000
|
heap
|
page read and write
|
||
FE4000
|
heap
|
page read and write
|
||
213A0000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
250CA976000
|
heap
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
1FA89000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA89000
|
trusted library allocation
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
250CB002000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
20B51000
|
trusted library allocation
|
page read and write
|
||
250CA091000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
250CA815000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1FA4F000
|
trusted library allocation
|
page read and write
|
||
1249000
|
heap
|
page read and write
|
||
578000
|
heap
|
page read and write
|
||
122F000
|
heap
|
page read and write
|
||
1C456000
|
heap
|
page read and write
|
||
1258000
|
heap
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1D2FB120000
|
heap
|
page read and write
|
||
20A19000
|
trusted library allocation
|
page read and write
|
||
20580000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
250CA96D000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C452000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
2B30000
|
unkown
|
page read and write
|
||
250CA0A4000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
128A000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C433000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1C442000
|
heap
|
page read and write
|
||
1C472000
|
heap
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
250CA082000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C441000
|
heap
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
1FE55000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C458000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
250CA0A3000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
11AA000
|
trusted library allocation
|
page execute and read and write
|
||
133E000
|
stack
|
page read and write
|
||
1C416000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
11E3000
|
heap
|
page read and write
|
||
214F0000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1D5000
|
heap
|
page read and write
|
||
1FA59000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA62000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
250CA06B000
|
heap
|
page read and write
|
||
250CA0BE000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
57E000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
AE8000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1FA89000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C454000
|
heap
|
page read and write
|
||
1C427000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1C425000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA41000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
250CA929000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FAA8000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
12EA000
|
trusted library allocation
|
page execute and read and write
|
||
B6A000
|
stack
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
20B75000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1FAA8000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
3411000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
44F000
|
unkown
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA89000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1267000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
55A000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
408000
|
unkown
|
page readonly
|
||
1C422000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FE50000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
250CA128000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
56E000
|
heap
|
page read and write
|
||
1C454000
|
heap
|
page read and write
|
||
1FA87000
|
trusted library allocation
|
page read and write
|
||
56A000
|
heap
|
page read and write
|
||
20B9B000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C452000
|
heap
|
page read and write
|
||
1FAA8000
|
trusted library allocation
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
213B8000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
20B65000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1FAA8000
|
trusted library allocation
|
page read and write
|
||
AE5000
|
unkown
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C47D000
|
heap
|
page read and write
|
||
1FAD0000
|
trusted library allocation
|
page read and write
|
||
294A000
|
trusted library allocation
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
23F4000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
2B20000
|
unkown
|
page readonly
|
||
1C47A000
|
heap
|
page read and write
|
||
213A0000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C489000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
4CE000
|
stack
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1FC95000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
124F000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
250CA000000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
250CA087000
|
heap
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
294C000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1FA8B000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C477000
|
heap
|
page read and write
|
||
1FA58000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1FA8B000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
56E000
|
heap
|
page read and write
|
||
20B51000
|
trusted library allocation
|
page read and write
|
||
1FA3E000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
AE8000
|
trusted library allocation
|
page read and write
|
||
1C474000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C456000
|
heap
|
page read and write
|
||
293F000
|
stack
|
page read and write
|
||
1FA49000
|
trusted library allocation
|
page read and write
|
||
20B9B000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1FA62000
|
trusted library allocation
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1FA89000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA8B000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1FC96000
|
trusted library allocation
|
page read and write
|
||
1C472000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1FCA0000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1D2FB243000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
3166F7E000
|
stack
|
page read and write
|
||
1C470000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FE55000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1FAA8000
|
trusted library allocation
|
page read and write
|
||
250C9FB0000
|
unclassified section
|
page readonly
|
||
1FA66000
|
trusted library allocation
|
page read and write
|
||
AE6000
|
trusted library allocation
|
page read and write
|
||
250CA92C000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C452000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1D2FB240000
|
heap
|
page read and write
|
||
1FC9C000
|
trusted library allocation
|
page read and write
|
||
1241000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C446000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1FA70000
|
trusted library allocation
|
page read and write
|
||
11CD000
|
heap
|
page read and write
|
||
1C452000
|
heap
|
page read and write
|
||
1FA4E000
|
trusted library allocation
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
3AB0000
|
trusted library allocation
|
page read and write
|
||
1FA4E000
|
trusted library allocation
|
page read and write
|
||
214F0000
|
unkown
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
F4BECEB000
|
stack
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA54000
|
trusted library allocation
|
page read and write
|
||
DA7000
|
heap
|
page read and write
|
||
1FC95000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
20B8B000
|
trusted library allocation
|
page read and write
|
||
20B9B000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
56E000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1D2FB270000
|
heap
|
page read and write
|
||
11EC000
|
heap
|
page read and write
|
||
2B30000
|
unkown
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
588000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
55A000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
20B51000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
20B95000
|
trusted library allocation
|
page read and write
|
||
1C421000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
124B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
213A0000
|
trusted library allocation
|
page read and write
|
||
250CA976000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C452000
|
heap
|
page read and write
|
||
20B95000
|
trusted library allocation
|
page read and write
|
||
250CA0AE000
|
heap
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
1C46E000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
20B9B000
|
trusted library allocation
|
page read and write
|
||
11A2000
|
trusted library allocation
|
page execute and read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B85000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
250CA093000
|
heap
|
page read and write
|
||
1C446000
|
heap
|
page read and write
|
||
229E000
|
stack
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
126B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
202D0000
|
trusted library allocation
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
11D2000
|
heap
|
page read and write
|
||
56A000
|
heap
|
page read and write
|
||
5240000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C456000
|
heap
|
page read and write
|
||
250CA7C0000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
1C433000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C445000
|
heap
|
page read and write
|
||
1C446000
|
heap
|
page read and write
|
||
1C472000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
250CA90E000
|
heap
|
page read and write
|
||
54E000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
250CA93B000
|
heap
|
page read and write
|
||
1FA4B000
|
trusted library allocation
|
page read and write
|
||
20B7B000
|
trusted library allocation
|
page read and write
|
||
1259000
|
heap
|
page read and write
|
||
1FA4B000
|
trusted library allocation
|
page read and write
|
||
31668DB000
|
stack
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
124F000
|
heap
|
page read and write
|
||
1FAA8000
|
trusted library allocation
|
page read and write
|
||
1FA3D000
|
trusted library allocation
|
page read and write
|
||
1FA66000
|
trusted library allocation
|
page read and write
|
||
1FA5A000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B51000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
20407000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA58000
|
trusted library allocation
|
page read and write
|
||
250CA116000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
213B0000
|
trusted library allocation
|
page read and write
|
||
213A0000
|
trusted library allocation
|
page read and write
|
||
1FA63000
|
trusted library allocation
|
page read and write
|
||
1C460000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
121C000
|
heap
|
page read and write
|
||
250CA12D000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C446000
|
heap
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
250CA800000
|
heap
|
page read and write
|
||
213A0000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1FA6E000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C464000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C41D000
|
heap
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA87000
|
trusted library allocation
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
1C432000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1D2FB24B000
|
heap
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
1C420000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C454000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1FA8B000
|
trusted library allocation
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
250CA937000
|
heap
|
page read and write
|
||
1FC50000
|
trusted library allocation
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
581000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C4A6000
|
heap
|
page read and write
|
||
1FA89000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C472000
|
heap
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1FA73000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
250C9EB0000
|
heap
|
page read and write
|
||
578000
|
heap
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
250CA12A000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1D2FBA02000
|
trusted library allocation
|
page read and write
|
||
1C413000
|
heap
|
page read and write
|
||
250CA92B000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
1C472000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C469000
|
heap
|
page read and write
|
||
1FA4B000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C460000
|
heap
|
page read and write
|
||
578000
|
heap
|
page read and write
|
||
1C452000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1E0000
|
unclassified section
|
page readonly
|
||
1C43D000
|
heap
|
page read and write
|
||
1D700000
|
trusted library allocation
|
page read and write
|
||
20B95000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
56E000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
1C454000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1235000
|
heap
|
page read and write
|
||
20406000
|
trusted library allocation
|
page read and write
|
||
213A0000
|
unkown
|
page read and write
|
||
250CA12A000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
121B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B57000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
250CA0BD000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA4F000
|
trusted library allocation
|
page read and write
|
||
55F000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
124F000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B67000
|
trusted library allocation
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
2CAF000
|
stack
|
page read and write
|
||
20400000
|
trusted library allocation
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
1D2FB302000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C411000
|
heap
|
page read and write
|
||
563000
|
heap
|
page read and write
|
||
213C2000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1FA70000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
214F9000
|
unkown
|
page read and write
|
||
20B95000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
1FA4B000
|
trusted library allocation
|
page read and write
|
||
213A0000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
213A8000
|
trusted library allocation
|
page read and write
|
||
1FED0000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
213A0000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
283F000
|
stack
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1C46F000
|
heap
|
page read and write
|
||
F4BF1FF000
|
stack
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1238000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C4A2000
|
heap
|
page read and write
|
||
250CA097000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
11F3000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
124F000
|
heap
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
20B51000
|
trusted library allocation
|
page read and write
|
||
20B5F000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C4A8000
|
heap
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
20B85000
|
trusted library allocation
|
page read and write
|
||
1C47A000
|
heap
|
page read and write
|
||
1D700000
|
trusted library allocation
|
page read and write
|
||
1D2FB213000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA44000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1221000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
250CA92D000
|
heap
|
page read and write
|
||
452000
|
unkown
|
page readonly
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA68000
|
trusted library allocation
|
page read and write
|
||
1C480000
|
heap
|
page read and write
|
||
122A000
|
heap
|
page read and write
|
||
D4E000
|
stack
|
page read and write
|
||
1C453000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
120D000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1212000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
11C4000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
1FA74000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C434000
|
heap
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1E8C1000
|
trusted library allocation
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C446000
|
heap
|
page read and write
|
||
250CA802000
|
heap
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
11F3000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1D2FB246000
|
heap
|
page read and write
|
||
1FA4B000
|
trusted library allocation
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1FA6D000
|
trusted library allocation
|
page read and write
|
||
1FA8B000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
202B0000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
AC0000
|
trusted library allocation
|
page read and write
|
||
55A000
|
heap
|
page read and write
|
||
250CA956000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
11B0000
|
trusted library allocation
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
250CA100000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
127F000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
122B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
11E1000
|
heap
|
page read and write
|
||
1261000
|
heap
|
page read and write
|
||
1C43E000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
20B79000
|
trusted library allocation
|
page read and write
|
||
250CA95B000
|
heap
|
page read and write
|
||
5160000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1D1D0000
|
remote allocation
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
20B81000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA3C000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C46F000
|
heap
|
page read and write
|
||
1C450000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA62000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C45A000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
20B9B000
|
trusted library allocation
|
page read and write
|
||
1C44F000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C472000
|
heap
|
page read and write
|
||
250CA90E000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
8F0000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20BA4000
|
trusted library allocation
|
page read and write
|
||
1C452000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
250CA974000
|
heap
|
page read and write
|
||
1FEC0000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
2A50000
|
unclassified section
|
page readonly
|
||
1C436000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
20B51000
|
trusted library allocation
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C475000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20A10000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
4F19000
|
trusted library allocation
|
page read and write
|
||
250CA0CD000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1D705000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
11C4000
|
heap
|
page read and write
|
||
123B000
|
heap
|
page read and write
|
||
1FA44000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
56A000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
250CA093000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1FA89000
|
trusted library allocation
|
page read and write
|
||
1C452000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
AE0000
|
unkown
|
page read and write
|
||
1D2FB22A000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C432000
|
heap
|
page read and write
|
||
2B10000
|
unkown
|
page readonly
|
||
1C43D000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
121E000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
F4BF4FF000
|
stack
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
3166E7E000
|
stack
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B95000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
128A000
|
heap
|
page read and write
|
||
250CA027000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
202B8000
|
trusted library allocation
|
page read and write
|
||
1EEF2000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
213A0000
|
trusted library allocation
|
page read and write
|
||
1F9D5000
|
trusted library allocation
|
page read and write
|
||
51FC000
|
trusted library allocation
|
page read and write
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
11FD000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C459000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
2B30000
|
unkown
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
11DE000
|
heap
|
page read and write
|
||
1FA8B000
|
trusted library allocation
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
11E7000
|
heap
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
A6C000
|
stack
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
20BB5000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1236000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20408000
|
trusted library allocation
|
page read and write
|
||
1C451000
|
heap
|
page read and write
|
||
56E000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1218000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C454000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1FA6E000
|
trusted library allocation
|
page read and write
|
||
1FA8B000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B95000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
20B95000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1252000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
127B000
|
heap
|
page read and write
|
||
20B95000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FAA8000
|
trusted library allocation
|
page read and write
|
||
51F0000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1FAA8000
|
trusted library allocation
|
page read and write
|
||
20B95000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
1190000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
1C421000
|
heap
|
page read and write
|
||
1C462000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C446000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
250CA12A000
|
heap
|
page read and write
|
||
20B83000
|
trusted library allocation
|
page read and write
|
||
202B0000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1FA48000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
2B20000
|
unkown
|
page readonly
|
||
1C43B000
|
heap
|
page read and write
|
||
1FA59000
|
trusted library allocation
|
page read and write
|
||
2B0A000
|
stack
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C44B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C43E000
|
heap
|
page read and write
|
||
1C447000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FA62000
|
trusted library allocation
|
page read and write
|
||
2941000
|
trusted library allocation
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C442000
|
heap
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
718D0000
|
unkown
|
page readonly
|
||
1C401000
|
heap
|
page read and write
|
||
1FA89000
|
trusted library allocation
|
page read and write
|
||
11E5000
|
heap
|
page read and write
|
||
1C44B000
|
heap
|
page read and write
|
||
96E000
|
stack
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C424000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
1FA70000
|
trusted library allocation
|
page read and write
|
||
20B84000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1C43B000
|
heap
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
20B99000
|
trusted library allocation
|
page read and write
|
||
1C42B000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
127F000
|
heap
|
page read and write
|
||
1C436000
|
heap
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1FA4B000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1FA70000
|
trusted library allocation
|
page read and write
|
||
213C0000
|
trusted library allocation
|
page read and write
|
||
1FA76000
|
trusted library allocation
|
page read and write
|
||
1FA41000
|
trusted library allocation
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
1FC90000
|
trusted library allocation
|
page read and write
|
||
1C43D000
|
heap
|
page read and write
|
||
1C401000
|
heap
|
page read and write
|
||
1C425000
|
heap
|
page read and write
|
||
1C438000
|
heap
|
page read and write
|
||
1C440000
|
heap
|
page read and write
|
||
20B75000
|
trusted library allocation
|
page read and write
|
||
20B9B000
|
trusted library allocation
|
page read and write
|
||
125D000
|
heap
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
1C44C000
|
heap
|
page read and write
|
||
250CA92F000
|
heap
|
page read and write
|
||
1FA70000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
||
1FC56000
|
trusted library allocation
|
page read and write
|
||
1FAA8000
|
trusted library allocation
|
page read and write
|
||
20BB5000
|
trusted library allocation
|
page read and write
|
||
1C422000
|
heap
|
page read and write
|
There are 2253 hidden memdumps, click here to show them.