Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
CTIPUPiILj.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\System
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x5a2d7364, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\System.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_04mzi5c1.e2s.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ii0eyct.03j.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ip1nvfe.vhk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1xrj5cw2.vjy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2qmkzsdr.jpm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3bzyz3jz.teb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3wv5ne0j.jxt.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bngvm1dp.qnh.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cjwa5z33.qh5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ef2dv2v3.4gf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jcqn3pmw.n3u.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nmjmlvdq.wht.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pe1h2ycy.ynr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rubsvzex.ru3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sqsablrj.3xy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_suulfdin.mml.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Jul 26 18:19:51
2024, mtime=Fri Jul 26 18:19:51 2024, atime=Fri Jul 26 18:19:51 2024, length=42496, window=hide
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
There are 16 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\CTIPUPiILj.exe
|
"C:\Users\user\Desktop\CTIPUPiILj.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\CTIPUPiILj.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'CTIPUPiILj.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\System'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System" /tr "C:\Users\user\AppData\Roaming\System"
|
||
C:\Users\user\AppData\Roaming\System
|
C:\Users\user\AppData\Roaming\System
|
||
C:\Users\user\AppData\Roaming\System
|
C:\Users\user\AppData\Roaming\System
|
||
C:\Users\user\AppData\Roaming\System
|
C:\Users\user\AppData\Roaming\System
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe -Embedding
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe -Embedding
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
usually-carolina.gl.at.ply.gg
|
|||
https://g.live.com/odclientsettings/Prod/C:
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://crl.mic_
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://osoft.co
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2.C:
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 13 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
||
usually-carolina.gl.at.ply.gg
|
147.185.221.20
|
||
15.164.165.52.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
147.185.221.20
|
usually-carolina.gl.at.ply.gg
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\CTIPUPiILj_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
System
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\mspaint.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\mspaint.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
There are 24 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B82000
|
unkown
|
page readonly
|
||
2FB1000
|
trusted library allocation
|
page read and write
|
||
1F90D3F6000
|
heap
|
page read and write
|
||
20FAC22D000
|
trusted library allocation
|
page read and write
|
||
1F90D2E1000
|
heap
|
page read and write
|
||
2409F722000
|
trusted library allocation
|
page read and write
|
||
1D97235B000
|
heap
|
page read and write
|
||
7FF84915C000
|
trusted library allocation
|
page read and write
|
||
1D9F5560000
|
heap
|
page read and write
|
||
1D9743A5000
|
heap
|
page read and write
|
||
1D974219000
|
heap
|
page read and write
|
||
1F90B42E000
|
heap
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
1F90D32B000
|
heap
|
page read and write
|
||
7FF849008000
|
trusted library allocation
|
page read and write
|
||
F48D87B000
|
stack
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
1D974224000
|
heap
|
page read and write
|
||
1D972348000
|
heap
|
page read and write
|
||
20FABD46000
|
trusted library allocation
|
page read and write
|
||
1D974203000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
A0B000
|
heap
|
page read and write
|
||
238AC9C0000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
1D974221000
|
heap
|
page read and write
|
||
1D9F5815000
|
heap
|
page read and write
|
||
B0B2F7E000
|
stack
|
page read and write
|
||
1D974227000
|
heap
|
page read and write
|
||
1D9F55A5000
|
heap
|
page read and write
|
||
2409CAAC000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
1F90D2F0000
|
heap
|
page read and write
|
||
F48E3FB000
|
stack
|
page read and write
|
||
1F90D33B000
|
heap
|
page read and write
|
||
1F90D46E000
|
heap
|
page read and write
|
||
15576657000
|
heap
|
page read and write
|
||
1F90D305000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
7FF849123000
|
trusted library allocation
|
page read and write
|
||
1F90D46E000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
1F90D32B000
|
heap
|
page read and write
|
||
1D974356000
|
heap
|
page read and write
|
||
F48EFFE000
|
unkown
|
page readonly
|
||
1D974225000
|
heap
|
page read and write
|
||
1D9741E8000
|
heap
|
page read and write
|
||
1D9F77D9000
|
heap
|
page read and write
|
||
1555EF54000
|
trusted library allocation
|
page read and write
|
||
238A7E00000
|
heap
|
page read and write
|
||
1F90D3FA000
|
heap
|
page read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page execute and read and write
|
||
1D981E29000
|
trusted library allocation
|
page read and write
|
||
1D974210000
|
heap
|
page read and write
|
||
240B6E02000
|
heap
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
1F90D327000
|
heap
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
20FC2D40000
|
heap
|
page read and write
|
||
1D9F559F000
|
heap
|
page read and write
|
||
20FC2DE8000
|
heap
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
1D974219000
|
heap
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
238A7692000
|
heap
|
page read and write
|
||
1D9741D9000
|
heap
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
F64000
|
heap
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
1D9F5510000
|
trusted library section
|
page read and write
|
||
1F90D3F1000
|
heap
|
page read and write
|
||
1F90B486000
|
heap
|
page read and write
|
||
2409CABE000
|
heap
|
page read and write
|
||
238A7600000
|
heap
|
page read and write
|
||
42F3279000
|
stack
|
page read and write
|
||
2D70000
|
trusted library allocation
|
page read and write
|
||
1D9741C2000
|
heap
|
page read and write
|
||
1F90D312000
|
heap
|
page read and write
|
||
1D97420C000
|
heap
|
page read and write
|
||
1555C2C8000
|
heap
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
1D9F74A2000
|
heap
|
page read and write
|
||
1F90D4A9000
|
heap
|
page read and write
|
||
1F90D46E000
|
heap
|
page read and write
|
||
F48F27E000
|
unkown
|
page readonly
|
||
1D974351000
|
heap
|
page read and write
|
||
1D9741D3000
|
heap
|
page read and write
|
||
7DF452780000
|
trusted library allocation
|
page execute and read and write
|
||
1D9742EA000
|
heap
|
page read and write
|
||
238ACA60000
|
trusted library allocation
|
page read and write
|
||
1D9F6F20000
|
heap
|
page read and write
|
||
1F90B4AE000
|
heap
|
page read and write
|
||
1F90D32F000
|
heap
|
page read and write
|
||
1D98130F000
|
trusted library allocation
|
page read and write
|
||
F48E97E000
|
stack
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
288F000
|
trusted library allocation
|
page read and write
|
||
1F90D3E9000
|
heap
|
page read and write
|
||
1D974300000
|
heap
|
page read and write
|
||
1D974219000
|
heap
|
page read and write
|
||
1555C1C0000
|
heap
|
page read and write
|
||
1D9741CF000
|
heap
|
page read and write
|
||
1D980DB9000
|
trusted library allocation
|
page read and write
|
||
240A04F9000
|
trusted library allocation
|
page read and write
|
||
1F90D324000
|
heap
|
page read and write
|
||
1F90D32F000
|
heap
|
page read and write
|
||
1F90D32B000
|
heap
|
page read and write
|
||
1D9741F8000
|
heap
|
page read and write
|
||
1D9813C9000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
1D97421D000
|
heap
|
page read and write
|
||
1C38D000
|
stack
|
page read and write
|
||
1F90D307000
|
heap
|
page read and write
|
||
240AE760000
|
trusted library allocation
|
page read and write
|
||
7FF84916C000
|
trusted library allocation
|
page read and write
|
||
1F90D467000
|
heap
|
page read and write
|
||
7FF849008000
|
trusted library allocation
|
page read and write
|
||
F48ECFE000
|
unkown
|
page readonly
|
||
1F90D3E6000
|
heap
|
page read and write
|
||
240B6B50000
|
trusted library allocation
|
page read and write
|
||
1D974215000
|
heap
|
page read and write
|
||
1D976A10000
|
heap
|
page read and write
|
||
1555C301000
|
heap
|
page read and write
|
||
238A7F1A000
|
heap
|
page read and write
|
||
1D972280000
|
heap
|
page read and write
|
||
1D974215000
|
heap
|
page read and write
|
||
238ACC2C000
|
heap
|
page read and write
|
||
1D9F55E7000
|
heap
|
page read and write
|
||
7FF8491FC000
|
trusted library allocation
|
page read and write
|
||
1D9741FB000
|
heap
|
page read and write
|
||
F48F8FE000
|
unkown
|
page readonly
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
20FAAECD000
|
trusted library allocation
|
page read and write
|
||
1D9902EF000
|
trusted library allocation
|
page read and write
|
||
20FAB5F9000
|
trusted library allocation
|
page read and write
|
||
1D9F7060000
|
heap
|
page execute and read and write
|
||
1F90D3F1000
|
heap
|
page read and write
|
||
1555EC48000
|
trusted library allocation
|
page read and write
|
||
1F90D2E0000
|
heap
|
page read and write
|
||
1F90D326000
|
heap
|
page read and write
|
||
1D9F5540000
|
trusted library allocation
|
page read and write
|
||
1D9741E8000
|
heap
|
page read and write
|
||
240B6A30000
|
heap
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
1D973BD0000
|
heap
|
page read and write
|
||
1F90B45B000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
1D9743A5000
|
heap
|
page read and write
|
||
1D9F55BF000
|
heap
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
5C1000
|
stack
|
page read and write
|
||
7DF4615B0000
|
trusted library allocation
|
page execute and read and write
|
||
2409F788000
|
trusted library allocation
|
page read and write
|
||
238ACCCF000
|
heap
|
page read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
20FA8F55000
|
heap
|
page read and write
|
||
1D974221000
|
heap
|
page read and write
|
||
DCC7BCC000
|
stack
|
page read and write
|
||
1D9741F2000
|
heap
|
page read and write
|
||
1F90D307000
|
heap
|
page read and write
|
||
1D976A05000
|
heap
|
page read and write
|
||
1557668E000
|
heap
|
page read and write
|
||
1D9741F7000
|
heap
|
page read and write
|
||
1D97421E000
|
heap
|
page read and write
|
||
1D97422D000
|
heap
|
page read and write
|
||
42F2EFE000
|
stack
|
page read and write
|
||
1F90D32F000
|
heap
|
page read and write
|
||
20FABDCD000
|
trusted library allocation
|
page read and write
|
||
1D9742B0000
|
heap
|
page read and write
|
||
1D9741DB000
|
heap
|
page read and write
|
||
1D9741C0000
|
heap
|
page read and write
|
||
1F90D339000
|
heap
|
page read and write
|
||
AB7000
|
heap
|
page read and write
|
||
1D9741D3000
|
heap
|
page read and write
|
||
FB6000
|
heap
|
page read and write
|
||
1D9741E4000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
1D974216000
|
heap
|
page read and write
|
||
42F337E000
|
stack
|
page read and write
|
||
238A767B000
|
heap
|
page read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
1B560000
|
heap
|
page execute and read and write
|
||
F48E6FE000
|
unkown
|
page readonly
|
||
1F90B45A000
|
heap
|
page read and write
|
||
1555C2FD000
|
heap
|
page read and write
|
||
3322F4E000
|
stack
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
20FA8F30000
|
trusted library allocation
|
page read and write
|
||
238A8001000
|
trusted library allocation
|
page read and write
|
||
1F90D480000
|
heap
|
page read and write
|
||
16CE000
|
stack
|
page read and write
|
||
1D97421D000
|
heap
|
page read and write
|
||
1F90D48F000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
1D9741FB000
|
heap
|
page read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
1F90D496000
|
heap
|
page read and write
|
||
1D9741EE000
|
heap
|
page read and write
|
||
2DDF000
|
heap
|
page read and write
|
||
1D974341000
|
heap
|
page read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
F61000
|
heap
|
page read and write
|
||
1D976A14000
|
heap
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
1F90D336000
|
heap
|
page read and write
|
||
F48EB7E000
|
stack
|
page read and write
|
||
1F911911000
|
heap
|
page read and write
|
||
1D9F751D000
|
heap
|
page read and write
|
||
1F90D2F9000
|
heap
|
page read and write
|
||
1F911913000
|
heap
|
page read and write
|
||
1F90D413000
|
heap
|
page read and write
|
||
1D9741EF000
|
heap
|
page read and write
|
||
1D980001000
|
trusted library allocation
|
page read and write
|
||
1D9741D3000
|
heap
|
page read and write
|
||
1D9742DD000
|
heap
|
page read and write
|
||
238ACA30000
|
trusted library allocation
|
page read and write
|
||
1D9741E8000
|
heap
|
page read and write
|
||
1D9741E9000
|
heap
|
page read and write
|
||
3322176000
|
stack
|
page read and write
|
||
1F90B453000
|
heap
|
page read and write
|
||
1F90D30E000
|
heap
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
1D9741C0000
|
heap
|
page read and write
|
||
DDA000
|
heap
|
page read and write
|
||
1F90D2E6000
|
heap
|
page read and write
|
||
1D974215000
|
heap
|
page read and write
|
||
1F90D2FE000
|
heap
|
page read and write
|
||
1F90D304000
|
heap
|
page read and write
|
||
238ACC1F000
|
heap
|
page read and write
|
||
1555C31D000
|
heap
|
page read and write
|
||
F26000
|
heap
|
page read and write
|
||
1F90D342000
|
heap
|
page read and write
|
||
20FC3127000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
2409CAA2000
|
heap
|
page read and write
|
||
1F90D3FC000
|
heap
|
page read and write
|
||
1F90D4A5000
|
heap
|
page read and write
|
||
1555E0BA000
|
trusted library allocation
|
page read and write
|
||
240B6E4B000
|
heap
|
page read and write
|
||
1D97421D000
|
heap
|
page read and write
|
||
F48EDFE000
|
stack
|
page read and write
|
||
7DF48B9B0000
|
trusted library allocation
|
page execute and read and write
|
||
1F90B437000
|
heap
|
page read and write
|
||
1D976C60000
|
heap
|
page read and write
|
||
1D974388000
|
heap
|
page read and write
|
||
33223FE000
|
stack
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
1D9741EE000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
1F90D30D000
|
heap
|
page read and write
|
||
238A769E000
|
heap
|
page read and write
|
||
1D97421A000
|
heap
|
page read and write
|
||
1D9741EF000
|
heap
|
page read and write
|
||
1D972364000
|
heap
|
page read and write
|
||
7FF849149000
|
trusted library allocation
|
page read and write
|
||
155762AB000
|
heap
|
page read and write
|
||
1D9741E8000
|
heap
|
page read and write
|
||
1D974202000
|
heap
|
page read and write
|
||
1555C3B6000
|
heap
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
1F90D42D000
|
heap
|
page read and write
|
||
20FABD13000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
1D974223000
|
heap
|
page read and write
|
||
1D9742D0000
|
heap
|
page read and write
|
||
1D9F5810000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
1D974202000
|
heap
|
page read and write
|
||
1F90D337000
|
heap
|
page read and write
|
||
1D974221000
|
heap
|
page read and write
|
||
7FF849162000
|
trusted library allocation
|
page read and write
|
||
1D9741DA000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
1D9742DB000
|
heap
|
page read and write
|
||
12E8000
|
heap
|
page read and write
|
||
1F90D322000
|
heap
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
1D9742EA000
|
heap
|
page read and write
|
||
42F40CC000
|
stack
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
1D974212000
|
heap
|
page read and write
|
||
238ACB90000
|
trusted library allocation
|
page read and write
|
||
20FAC82A000
|
trusted library allocation
|
page read and write
|
||
1BB4E000
|
stack
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
1F90D322000
|
heap
|
page read and write
|
||
1F90F520000
|
trusted library allocation
|
page read and write
|
||
1F90D32D000
|
heap
|
page read and write
|
||
12B43000
|
trusted library allocation
|
page read and write
|
||
20FA8FE0000
|
trusted library allocation
|
page read and write
|
||
1D974341000
|
heap
|
page read and write
|
||
1F90D460000
|
heap
|
page read and write
|
||
2409F816000
|
trusted library allocation
|
page read and write
|
||
20FAB970000
|
trusted library allocation
|
page read and write
|
||
20FAB77F000
|
trusted library allocation
|
page read and write
|
||
1F90D30D000
|
heap
|
page read and write
|
||
9F88DBE000
|
stack
|
page read and write
|
||
238A7671000
|
heap
|
page read and write
|
||
15576595000
|
heap
|
page read and write
|
||
1D9741D9000
|
heap
|
page read and write
|
||
1D97420C000
|
heap
|
page read and write
|
||
1F90D312000
|
heap
|
page read and write
|
||
1F90D413000
|
heap
|
page read and write
|
||
1555DC60000
|
trusted library allocation
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
238A8630000
|
trusted library section
|
page readonly
|
||
33220F9000
|
stack
|
page read and write
|
||
145E000
|
stack
|
page read and write
|
||
59DB59000
|
stack
|
page read and write
|
||
1D97235E000
|
heap
|
page read and write
|
||
1F90D308000
|
heap
|
page read and write
|
||
1D973BDE000
|
heap
|
page read and write
|
||
238A8620000
|
trusted library section
|
page readonly
|
||
1555C440000
|
trusted library allocation
|
page read and write
|
||
1D9743A3000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1F90D32B000
|
heap
|
page read and write
|
||
1D9F5550000
|
heap
|
page readonly
|
||
1D9741C8000
|
heap
|
page read and write
|
||
1D9741D4000
|
heap
|
page read and write
|
||
1D9741DF000
|
heap
|
page read and write
|
||
1F90D2E0000
|
heap
|
page read and write
|
||
1D9742FF000
|
heap
|
page read and write
|
||
1D974345000
|
heap
|
page read and write
|
||
1F90D46E000
|
heap
|
page read and write
|
||
1F90D48D000
|
heap
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page execute and read and write
|
||
1D9741D5000
|
heap
|
page read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
1D9742E1000
|
heap
|
page read and write
|
||
A2A000
|
heap
|
page read and write
|
||
155765F0000
|
heap
|
page read and write
|
||
240AE9DD000
|
trusted library allocation
|
page read and write
|
||
1D974219000
|
heap
|
page read and write
|
||
240AE711000
|
trusted library allocation
|
page read and write
|
||
B0B2DFF000
|
stack
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
1D9F5500000
|
trusted library section
|
page read and write
|
||
1D9742F0000
|
heap
|
page read and write
|
||
1D9741FB000
|
heap
|
page read and write
|
||
1F90D467000
|
heap
|
page read and write
|
||
DCC6AFE000
|
stack
|
page read and write
|
||
F48F2FE000
|
unkown
|
page readonly
|
||
1F90D31B000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
1F90D3FC000
|
heap
|
page read and write
|
||
1D9F76C0000
|
heap
|
page read and write
|
||
1D9741DB000
|
heap
|
page read and write
|
||
1C6EA000
|
stack
|
page read and write
|
||
1D974225000
|
heap
|
page read and write
|
||
1F90D3FE000
|
heap
|
page read and write
|
||
20FA8FB0000
|
trusted library allocation
|
page read and write
|
||
1F90CCD5000
|
heap
|
page read and write
|
||
1D9741CA000
|
heap
|
page read and write
|
||
1D974226000
|
heap
|
page read and write
|
||
1F90D407000
|
heap
|
page read and write
|
||
1F90D2F6000
|
heap
|
page read and write
|
||
1D9742D9000
|
heap
|
page read and write
|
||
DCC697E000
|
stack
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1F90D333000
|
heap
|
page read and write
|
||
3322279000
|
stack
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
7FF848FE4000
|
trusted library allocation
|
page read and write
|
||
238ACCCB000
|
heap
|
page read and write
|
||
1F90D3FA000
|
heap
|
page read and write
|
||
1556E186000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
20FA8C90000
|
heap
|
page read and write
|
||
1D974351000
|
heap
|
page read and write
|
||
1D972368000
|
heap
|
page read and write
|
||
1D990021000
|
trusted library allocation
|
page read and write
|
||
1D9742D7000
|
heap
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
1D974219000
|
heap
|
page read and write
|
||
1F90D480000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
FDF000
|
stack
|
page read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
1D9F7480000
|
heap
|
page read and write
|
||
1F90D46E000
|
heap
|
page read and write
|
||
F48F0FE000
|
stack
|
page read and write
|
||
1F90D327000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
1D9741C0000
|
heap
|
page read and write
|
||
20FA8E59000
|
heap
|
page read and write
|
||
20FC2DA9000
|
heap
|
page read and write
|
||
1D9741CB000
|
heap
|
page read and write
|
||
1555C2DE000
|
heap
|
page read and write
|
||
1555DC20000
|
heap
|
page readonly
|
||
1F90D30D000
|
heap
|
page read and write
|
||
1555F222000
|
trusted library allocation
|
page read and write
|
||
1D9741E4000
|
heap
|
page read and write
|
||
2409FF87000
|
trusted library allocation
|
page read and write
|
||
20FC2DD6000
|
heap
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
238A7DE1000
|
trusted library allocation
|
page read and write
|
||
1D974202000
|
heap
|
page read and write
|
||
1F90D311000
|
heap
|
page read and write
|
||
20FBACE9000
|
trusted library allocation
|
page read and write
|
||
1D976A10000
|
heap
|
page read and write
|
||
1F90CC50000
|
heap
|
page read and write
|
||
7FF849144000
|
trusted library allocation
|
page read and write
|
||
9F88B7D000
|
stack
|
page read and write
|
||
1F90D329000
|
heap
|
page read and write
|
||
F92000
|
heap
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
1F90CCDE000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
1F90D30D000
|
heap
|
page read and write
|
||
1D974221000
|
heap
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
1F90D2FA000
|
heap
|
page read and write
|
||
1D9F7466000
|
heap
|
page read and write
|
||
B0B31FC000
|
stack
|
page read and write
|
||
1F911F90000
|
heap
|
page readonly
|
||
DCC6DFE000
|
stack
|
page read and write
|
||
2409E76C000
|
trusted library allocation
|
page read and write
|
||
1D974390000
|
heap
|
page read and write
|
||
B80000
|
unkown
|
page readonly
|
||
1F90CCD0000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
240B6A89000
|
heap
|
page read and write
|
||
188AC670000
|
heap
|
page read and write
|
||
1D9741EF000
|
heap
|
page read and write
|
||
1555F7E8000
|
trusted library allocation
|
page read and write
|
||
3321E7F000
|
stack
|
page read and write
|
||
1D9742E2000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
900000
|
unkown
|
page readonly
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
1D990307000
|
trusted library allocation
|
page read and write
|
||
9F88BF6000
|
stack
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
C0CEA7F000
|
stack
|
page read and write
|
||
1D974356000
|
heap
|
page read and write
|
||
1F90D407000
|
heap
|
page read and write
|
||
1F90D3D2000
|
heap
|
page read and write
|
||
1D9741F7000
|
heap
|
page read and write
|
||
1F90D300000
|
heap
|
page read and write
|
||
1D972398000
|
heap
|
page read and write
|
||
20FA8DD0000
|
heap
|
page read and write
|
||
1F90D2E7000
|
heap
|
page read and write
|
||
1F911F80000
|
trusted library allocation
|
page read and write
|
||
2409E6F1000
|
trusted library allocation
|
page read and write
|
||
1F90D312000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
20FABD8F000
|
trusted library allocation
|
page read and write
|
||
1F90D4BE000
|
heap
|
page read and write
|
||
1F911928000
|
heap
|
page read and write
|
||
1F90D497000
|
heap
|
page read and write
|
||
42F32F8000
|
stack
|
page read and write
|
||
1555EE30000
|
trusted library allocation
|
page read and write
|
||
1D9F5520000
|
trusted library allocation
|
page read and write
|
||
20FA8D90000
|
heap
|
page read and write
|
||
1BD3E000
|
heap
|
page read and write
|
||
238ACB80000
|
trusted library allocation
|
page read and write
|
||
1F90B466000
|
heap
|
page read and write
|
||
1D974228000
|
heap
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
2409F142000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
1D974388000
|
heap
|
page read and write
|
||
1D990031000
|
trusted library allocation
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
20FA8DF0000
|
trusted library section
|
page read and write
|
||
1D9741D5000
|
heap
|
page read and write
|
||
1F90D430000
|
heap
|
page read and write
|
||
1F90D2FE000
|
heap
|
page read and write
|
||
7FF849168000
|
trusted library allocation
|
page read and write
|
||
20FA9055000
|
heap
|
page read and write
|
||
238AE000000
|
heap
|
page read and write
|
||
1F90D2FD000
|
heap
|
page read and write
|
||
1555C400000
|
heap
|
page read and write
|
||
1555C34B000
|
heap
|
page read and write
|
||
1D9F76F4000
|
heap
|
page read and write
|
||
1555F0A6000
|
trusted library allocation
|
page read and write
|
||
20FC31CB000
|
heap
|
page read and write
|
||
1D9741FB000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
1F90D2F3000
|
heap
|
page read and write
|
||
1F90B42D000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
1F911D30000
|
heap
|
page read and write
|
||
238A76A4000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
1D9741E1000
|
heap
|
page read and write
|
||
238ACA84000
|
trusted library allocation
|
page read and write
|
||
1D974209000
|
heap
|
page read and write
|
||
20FAB611000
|
trusted library allocation
|
page read and write
|
||
F48EF7E000
|
stack
|
page read and write
|
||
1D9F6E60000
|
trusted library allocation
|
page read and write
|
||
1F90D341000
|
heap
|
page read and write
|
||
238ACA40000
|
trusted library allocation
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page read and write
|
||
1D9741C2000
|
heap
|
page read and write
|
||
155764DC000
|
heap
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
240AE9F7000
|
trusted library allocation
|
page read and write
|
||
238ACD00000
|
heap
|
page read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
15576529000
|
heap
|
page read and write
|
||
1F90D311000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
1D981095000
|
trusted library allocation
|
page read and write
|
||
BEE000
|
stack
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
20FAAA87000
|
trusted library allocation
|
page read and write
|
||
1F90D3F4000
|
heap
|
page read and write
|
||
2A30000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
9F89A8E000
|
stack
|
page read and write
|
||
F48DAFE000
|
unkown
|
page readonly
|
||
1D972348000
|
heap
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
42F3FCD000
|
stack
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
2409CAA6000
|
heap
|
page read and write
|
||
1F90D3E3000
|
heap
|
page read and write
|
||
1D974338000
|
heap
|
page read and write
|
||
1F90D3F4000
|
heap
|
page read and write
|
||
1D97420D000
|
heap
|
page read and write
|
||
F48E7FE000
|
unkown
|
page readonly
|
||
1B58C000
|
stack
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
1D972377000
|
heap
|
page read and write
|
||
20FA8D70000
|
heap
|
page read and write
|
||
1D0BA000
|
stack
|
page read and write
|
||
1F90D2F3000
|
heap
|
page read and write
|
||
9F88C3E000
|
stack
|
page read and write
|
||
1D9722B0000
|
heap
|
page read and write
|
||
1D974202000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
240AE9E7000
|
trusted library allocation
|
page read and write
|
||
1F90D44C000
|
heap
|
page read and write
|
||
C0CEE7B000
|
stack
|
page read and write
|
||
1555DD00000
|
heap
|
page read and write
|
||
1D981892000
|
trusted library allocation
|
page read and write
|
||
1F90D3F6000
|
heap
|
page read and write
|
||
240A0519000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
238A8670000
|
trusted library section
|
page readonly
|
||
7DF433060000
|
trusted library allocation
|
page execute and read and write
|
||
1F90D329000
|
heap
|
page read and write
|
||
F48E2FE000
|
unkown
|
page readonly
|
||
1BCCE000
|
heap
|
page read and write
|
||
238ACB70000
|
trusted library allocation
|
page read and write
|
||
238ACA80000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
15576512000
|
heap
|
page read and write
|
||
1F90D32B000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
1D974366000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1F90D2D0000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
1D9743AA000
|
heap
|
page read and write
|
||
20FAA9D0000
|
trusted library allocation
|
page read and write
|
||
3321BCF000
|
stack
|
page read and write
|
||
240B6AA5000
|
heap
|
page read and write
|
||
1555EA97000
|
trusted library allocation
|
page read and write
|
||
1D981786000
|
trusted library allocation
|
page read and write
|
||
9F885E3000
|
stack
|
page read and write
|
||
1F90D460000
|
heap
|
page read and write
|
||
1F90D32F000
|
heap
|
page read and write
|
||
1F90D323000
|
heap
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
1D9902F7000
|
trusted library allocation
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
2409CC75000
|
heap
|
page read and write
|
||
1D9741CB000
|
heap
|
page read and write
|
||
240B6B2E000
|
heap
|
page read and write
|
||
2409CC20000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
1D97437F000
|
heap
|
page read and write
|
||
1F90D333000
|
heap
|
page read and write
|
||
1D974390000
|
heap
|
page read and write
|
||
1F90D337000
|
heap
|
page read and write
|
||
1F90D322000
|
heap
|
page read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
1D9F7464000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1D98112A000
|
trusted library allocation
|
page read and write
|
||
238A7E02000
|
heap
|
page read and write
|
||
1D9741D5000
|
heap
|
page read and write
|
||
1D974221000
|
heap
|
page read and write
|
||
42F347D000
|
stack
|
page read and write
|
||
1F90D467000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
1F90D3F8000
|
heap
|
page read and write
|
||
155764D8000
|
heap
|
page read and write
|
||
20FA8E4F000
|
heap
|
page read and write
|
||
1D9741FB000
|
heap
|
page read and write
|
||
1555F21E000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
1D9741E4000
|
heap
|
page read and write
|
||
F94000
|
heap
|
page read and write
|
||
C0CE7FE000
|
stack
|
page read and write
|
||
1D981219000
|
trusted library allocation
|
page read and write
|
||
240A04D4000
|
trusted library allocation
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
1D9741EE000
|
heap
|
page read and write
|
||
DCC6873000
|
stack
|
page read and write
|
||
2409CA9D000
|
heap
|
page read and write
|
||
1D9741C2000
|
heap
|
page read and write
|
||
1D974210000
|
heap
|
page read and write
|
||
1D974226000
|
heap
|
page read and write
|
||
12881000
|
trusted library allocation
|
page read and write
|
||
1F90D330000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
2409FABD000
|
trusted library allocation
|
page read and write
|
||
1BCBB000
|
heap
|
page read and write
|
||
1BE4C000
|
stack
|
page read and write
|
||
9F88A7E000
|
stack
|
page read and write
|
||
1F90D335000
|
heap
|
page read and write
|
||
1D9F75B0000
|
heap
|
page execute and read and write
|
||
20FAA80C000
|
heap
|
page read and write
|
||
240B70C0000
|
heap
|
page read and write
|
||
332207D000
|
stack
|
page read and write
|
||
1F90B497000
|
heap
|
page read and write
|
||
1F90D450000
|
heap
|
page read and write
|
||
1F90D460000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
20FABCB1000
|
trusted library allocation
|
page read and write
|
||
238ACCF0000
|
heap
|
page read and write
|
||
20FAB979000
|
trusted library allocation
|
page read and write
|
||
1D9743A5000
|
heap
|
page read and write
|
||
1F90D322000
|
heap
|
page read and write
|
||
1F90D4A5000
|
heap
|
page read and write
|
||
240B6BD0000
|
heap
|
page execute and read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
1D972348000
|
heap
|
page read and write
|
||
10E0000
|
heap
|
page execute and read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
1D9F7472000
|
heap
|
page read and write
|
||
1D974338000
|
heap
|
page read and write
|
||
DCC6BFD000
|
stack
|
page read and write
|
||
F48DDFE000
|
stack
|
page read and write
|
||
1D976A10000
|
heap
|
page read and write
|
||
20FAB452000
|
trusted library allocation
|
page read and write
|
||
1D9741FB000
|
heap
|
page read and write
|
||
1D9902E8000
|
trusted library allocation
|
page read and write
|
||
DCC6EFD000
|
stack
|
page read and write
|
||
1D9F75E0000
|
heap
|
page read and write
|
||
A1F000
|
heap
|
page read and write
|
||
1D976A10000
|
heap
|
page read and write
|
||
1D974382000
|
heap
|
page read and write
|
||
2409CC50000
|
heap
|
page execute and read and write
|
||
1F90D31D000
|
heap
|
page read and write
|
||
2409FF60000
|
trusted library allocation
|
page read and write
|
||
1D9741FB000
|
heap
|
page read and write
|
||
1D9769E9000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
1D974386000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
20FBAA70000
|
trusted library allocation
|
page read and write
|
||
1D990010000
|
trusted library allocation
|
page read and write
|
||
1D9742E2000
|
heap
|
page read and write
|
||
1F90D2FE000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
1F90B49F000
|
heap
|
page read and write
|
||
1F90D2F3000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
1F90CCDD000
|
heap
|
page read and write
|
||
1D97234D000
|
heap
|
page read and write
|
||
1F90D2F0000
|
heap
|
page read and write
|
||
238ACC00000
|
heap
|
page read and write
|
||
1D974386000
|
heap
|
page read and write
|
||
1F90B444000
|
heap
|
page read and write
|
||
1D9F7771000
|
heap
|
page read and write
|
||
1F90D308000
|
heap
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
1D981440000
|
trusted library allocation
|
page read and write
|
||
1F90D333000
|
heap
|
page read and write
|
||
1D9F7708000
|
heap
|
page read and write
|
||
1F90D31F000
|
heap
|
page read and write
|
||
1F90D480000
|
heap
|
page read and write
|
||
1D9743A5000
|
heap
|
page read and write
|
||
1F90B47D000
|
heap
|
page read and write
|
||
2409CB60000
|
heap
|
page read and write
|
||
1F90D312000
|
heap
|
page read and write
|
||
1D9742F4000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
15576539000
|
heap
|
page read and write
|
||
1D978AF2000
|
trusted library allocation
|
page read and write
|
||
332314E000
|
stack
|
page read and write
|
||
1D974215000
|
heap
|
page read and write
|
||
155762A1000
|
heap
|
page read and write
|
||
1F90B4AE000
|
heap
|
page read and write
|
||
7FF848FA2000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1D976A05000
|
heap
|
page read and write
|
||
1F90D4BE000
|
heap
|
page read and write
|
||
DCC7A4D000
|
stack
|
page read and write
|
||
1F90B470000
|
heap
|
page read and write
|
||
1F90D33E000
|
heap
|
page read and write
|
||
33230CC000
|
stack
|
page read and write
|
||
1F90D32B000
|
heap
|
page read and write
|
||
238A7460000
|
heap
|
page read and write
|
||
1D97234D000
|
heap
|
page read and write
|
||
7FF849188000
|
trusted library allocation
|
page read and write
|
||
238A8340000
|
trusted library allocation
|
page read and write
|
||
1D97420C000
|
heap
|
page read and write
|
||
1F90D460000
|
heap
|
page read and write
|
||
238A76B1000
|
heap
|
page read and write
|
||
188AC930000
|
heap
|
page read and write
|
||
20FA8E00000
|
trusted library section
|
page read and write
|
||
238ACBE0000
|
remote allocation
|
page read and write
|
||
7DF443221000
|
trusted library allocation
|
page execute read
|
||
238ACBA0000
|
trusted library allocation
|
page read and write
|
||
1F90B467000
|
heap
|
page read and write
|
||
1F90D2ED000
|
heap
|
page read and write
|
||
D7D000
|
heap
|
page read and write
|
||
1D974202000
|
heap
|
page read and write
|
||
238A7F1A000
|
heap
|
page read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
1F90D3F6000
|
heap
|
page read and write
|
||
42F31F7000
|
stack
|
page read and write
|
||
C0CE6F7000
|
stack
|
page read and write
|
||
1D97436F000
|
heap
|
page read and write
|
||
1D9F75B6000
|
heap
|
page execute and read and write
|
||
238ACA70000
|
trusted library allocation
|
page read and write
|
||
1D9741E8000
|
heap
|
page read and write
|
||
DCC6E7E000
|
stack
|
page read and write
|
||
1D9741DF000
|
heap
|
page read and write
|
||
238ACA20000
|
trusted library allocation
|
page read and write
|
||
D55000
|
heap
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
1D9F785E000
|
heap
|
page read and write
|
||
1F90B43C000
|
heap
|
page read and write
|
||
7FF849290000
|
trusted library allocation
|
page read and write
|
||
1F90D322000
|
heap
|
page read and write
|
||
20FAB968000
|
trusted library allocation
|
page read and write
|
||
DCC7C4E000
|
stack
|
page read and write
|
||
1BD07000
|
heap
|
page read and write
|
||
2409F6F6000
|
trusted library allocation
|
page read and write
|
||
1D9741FB000
|
heap
|
page read and write
|
||
7FF849185000
|
trusted library allocation
|
page read and write
|
||
1D974215000
|
heap
|
page read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
DCC7ACE000
|
stack
|
page read and write
|
||
1F90D40F000
|
heap
|
page read and write
|
||
1F90B280000
|
heap
|
page read and write
|
||
1F90B48C000
|
heap
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
2409CBE0000
|
trusted library section
|
page read and write
|
||
F48E8FE000
|
unkown
|
page readonly
|
||
1D9741F3000
|
heap
|
page read and write
|
||
1D980C04000
|
trusted library allocation
|
page read and write
|
||
1F90D480000
|
heap
|
page read and write
|
||
1D9741FB000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
1F90D304000
|
heap
|
page read and write
|
||
238ACB90000
|
trusted library allocation
|
page read and write
|
||
DCC65EE000
|
stack
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
1555F61B000
|
trusted library allocation
|
page read and write
|
||
15576260000
|
heap
|
page read and write
|
||
240B6D86000
|
heap
|
page read and write
|
||
F2C000
|
heap
|
page read and write
|
||
1F90D2FD000
|
heap
|
page read and write
|
||
7FF849153000
|
trusted library allocation
|
page read and write
|
||
9F8998E000
|
stack
|
page read and write
|
||
1F90D407000
|
heap
|
page read and write
|
||
980000
|
trusted library allocation
|
page read and write
|
||
DD6000
|
heap
|
page read and write
|
||
1D974221000
|
heap
|
page read and write
|
||
1555C450000
|
heap
|
page read and write
|
||
1F90D316000
|
heap
|
page read and write
|
||
15576569000
|
heap
|
page read and write
|
||
7DF4527A0000
|
trusted library allocation
|
page execute and read and write
|
||
F48FCFE000
|
unkown
|
page readonly
|
||
7FF848E3B000
|
trusted library allocation
|
page read and write
|
||
12883000
|
trusted library allocation
|
page read and write
|
||
3321FF9000
|
stack
|
page read and write
|
||
1F90D2F4000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
1D9741F7000
|
heap
|
page read and write
|
||
1F90B46A000
|
heap
|
page read and write
|
||
1F90D322000
|
heap
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
42F2FFF000
|
stack
|
page read and write
|
||
42F3079000
|
stack
|
page read and write
|
||
1D972390000
|
heap
|
page read and write
|
||
1F90D30D000
|
heap
|
page read and write
|
||
1F90D316000
|
heap
|
page read and write
|
||
1F90D2F9000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
EF1000
|
stack
|
page read and write
|
||
7DF452790000
|
trusted library allocation
|
page execute and read and write
|
||
288C000
|
trusted library allocation
|
page read and write
|
||
20FA8F40000
|
heap
|
page readonly
|
||
131D000
|
heap
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849256000
|
trusted library allocation
|
page read and write
|
||
1F90D2FD000
|
heap
|
page read and write
|
||
1555F726000
|
trusted library allocation
|
page read and write
|
||
1555E8E3000
|
trusted library allocation
|
page read and write
|
||
1F90B471000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
7FF849002000
|
trusted library allocation
|
page read and write
|
||
1F90D312000
|
heap
|
page read and write
|
||
2B41000
|
trusted library allocation
|
page read and write
|
||
1D990363000
|
trusted library allocation
|
page read and write
|
||
1D981953000
|
trusted library allocation
|
page read and write
|
||
2409E91A000
|
trusted library allocation
|
page read and write
|
||
1D9F7788000
|
heap
|
page read and write
|
||
7FF848FBA000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
135B000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
1D97235B000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
238ACC40000
|
heap
|
page read and write
|
||
9F89B09000
|
stack
|
page read and write
|
||
1D974341000
|
heap
|
page read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
238ACBE0000
|
remote allocation
|
page read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
1D974366000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
42F33FE000
|
stack
|
page read and write
|
||
1555F19C000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
heap
|
page execute and read and write
|
||
1D97234F000
|
heap
|
page read and write
|
||
188AC699000
|
heap
|
page read and write
|
||
238A7713000
|
heap
|
page read and write
|
||
1D974356000
|
heap
|
page read and write
|
||
1D974225000
|
heap
|
page read and write
|
||
DCC6FFB000
|
stack
|
page read and write
|
||
1D9741FC000
|
heap
|
page read and write
|
||
1F90D330000
|
heap
|
page read and write
|
||
1D9741F2000
|
heap
|
page read and write
|
||
7FF84922E000
|
trusted library allocation
|
page read and write
|
||
238ACC61000
|
heap
|
page read and write
|
||
1D9F55A9000
|
heap
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
1555C3C0000
|
heap
|
page read and write
|
||
F48F6FE000
|
unkown
|
page readonly
|
||
238ACA80000
|
trusted library allocation
|
page read and write
|
||
1D981004000
|
trusted library allocation
|
page read and write
|
||
20FA8E51000
|
heap
|
page read and write
|
||
1D974210000
|
heap
|
page read and write
|
||
7FF848FD8000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page execute and read and write
|
||
1F90B44D000
|
heap
|
page read and write
|
||
1D97435F000
|
heap
|
page read and write
|
||
1D974351000
|
heap
|
page read and write
|
||
1556E17C000
|
trusted library allocation
|
page read and write
|
||
9F889F9000
|
stack
|
page read and write
|
||
1F90D491000
|
heap
|
page read and write
|
||
1D974221000
|
heap
|
page read and write
|
||
9F88D39000
|
stack
|
page read and write
|
||
1556E21D000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
20FAA9F0000
|
heap
|
page execute and read and write
|
||
1D9741DF000
|
heap
|
page read and write
|
||
238ACBE0000
|
remote allocation
|
page read and write
|
||
238A7480000
|
heap
|
page read and write
|
||
1F90B4AE000
|
heap
|
page read and write
|
||
1D9741E8000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
2409F7B3000
|
trusted library allocation
|
page read and write
|
||
DE3000
|
heap
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
9F88E3F000
|
stack
|
page read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
F48E9FE000
|
unkown
|
page readonly
|
||
238A765A000
|
heap
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
1B33E000
|
stack
|
page read and write
|
||
2409FA7D000
|
trusted library allocation
|
page read and write
|
||
1D9F7470000
|
heap
|
page read and write
|
||
DCC6F7E000
|
stack
|
page read and write
|
||
1555F25E000
|
trusted library allocation
|
page read and write
|
||
1D974215000
|
heap
|
page read and write
|
||
1F90B479000
|
heap
|
page read and write
|
||
1F90D30D000
|
heap
|
page read and write
|
||
13005000
|
trusted library allocation
|
page read and write
|
||
238A765C000
|
heap
|
page read and write
|
||
1D97437F000
|
heap
|
page read and write
|
||
1557669A000
|
heap
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
1F90D4C8000
|
heap
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
1D990001000
|
trusted library allocation
|
page read and write
|
||
20FAB97D000
|
trusted library allocation
|
page read and write
|
||
1F90D30D000
|
heap
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
1F90D46E000
|
heap
|
page read and write
|
||
1F90D4CC000
|
heap
|
page read and write
|
||
1556DE91000
|
trusted library allocation
|
page read and write
|
||
12FB1000
|
trusted library allocation
|
page read and write
|
||
B0B2FFB000
|
stack
|
page read and write
|
||
1F90D2FD000
|
heap
|
page read and write
|
||
F48DCFE000
|
unkown
|
page readonly
|
||
1F90D3FE000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
238A7702000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
240B6AEE000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
1F90D337000
|
heap
|
page read and write
|
||
1D9743A3000
|
heap
|
page read and write
|
||
1F90D3FE000
|
heap
|
page read and write
|
||
7FF84918C000
|
trusted library allocation
|
page read and write
|
||
1F90D467000
|
heap
|
page read and write
|
||
1F90D4BE000
|
heap
|
page read and write
|
||
1F90D305000
|
heap
|
page read and write
|
||
7FF848F92000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
1D9741F7000
|
heap
|
page read and write
|
||
1D97420C000
|
heap
|
page read and write
|
||
DD1000
|
heap
|
page read and write
|
||
1C8F0000
|
heap
|
page read and write
|
||
59DE7F000
|
stack
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
DCC6C79000
|
stack
|
page read and write
|
||
20FAB641000
|
trusted library allocation
|
page read and write
|
||
1F90D341000
|
heap
|
page read and write
|
||
1D9741DF000
|
heap
|
page read and write
|
||
1D974210000
|
heap
|
page read and write
|
||
240B6D72000
|
heap
|
page read and write
|
||
1D973BD5000
|
heap
|
page read and write
|
||
1F90D322000
|
heap
|
page read and write
|
||
1D974221000
|
heap
|
page read and write
|
||
1D976A03000
|
heap
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
7FF849159000
|
trusted library allocation
|
page read and write
|
||
238ACB20000
|
trusted library allocation
|
page read and write
|
||
2730000
|
heap
|
page read and write
|
||
2409FA00000
|
trusted library allocation
|
page read and write
|
||
1B950000
|
heap
|
page execute and read and write
|
||
B0B2CFE000
|
stack
|
page read and write
|
||
2409CAA8000
|
heap
|
page read and write
|
||
1D974382000
|
heap
|
page read and write
|
||
20FAC354000
|
trusted library allocation
|
page read and write
|
||
1F90D2E4000
|
heap
|
page read and write
|
||
1F90D407000
|
heap
|
page read and write
|
||
1F90B46E000
|
heap
|
page read and write
|
||
20FAC7E0000
|
trusted library allocation
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
heap
|
page read and write
|
||
1D974226000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
1D9810C1000
|
trusted library allocation
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
9F888FE000
|
stack
|
page read and write
|
||
1C28D000
|
stack
|
page read and write
|
||
1D974212000
|
heap
|
page read and write
|
||
FB4000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
1F90D316000
|
heap
|
page read and write
|
||
1D9769EA000
|
heap
|
page read and write
|
||
20FC3094000
|
heap
|
page read and write
|
||
2870000
|
heap
|
page execute and read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
1F90B472000
|
heap
|
page read and write
|
||
20FBAE02000
|
trusted library allocation
|
page read and write
|
||
1D972326000
|
heap
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
1D9741E8000
|
heap
|
page read and write
|
||
1D9F57F0000
|
trusted library allocation
|
page read and write
|
||
1D97236B000
|
heap
|
page read and write
|
||
1D9769FE000
|
heap
|
page read and write
|
||
42F2E7E000
|
stack
|
page read and write
|
||
3322E4E000
|
stack
|
page read and write
|
||
1F90D337000
|
heap
|
page read and write
|
||
1F90FB90000
|
heap
|
page read and write
|
||
1F90D4A5000
|
heap
|
page read and write
|
||
1F90D30D000
|
heap
|
page read and write
|
||
42F4047000
|
stack
|
page read and write
|
||
1F90B45B000
|
heap
|
page read and write
|
||
1F911900000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
1F90D4A9000
|
heap
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
1B50E000
|
stack
|
page read and write
|
||
12FB8000
|
trusted library allocation
|
page read and write
|
||
7FF848FDA000
|
trusted library allocation
|
page read and write
|
||
1D974210000
|
heap
|
page read and write
|
||
20FABAC5000
|
trusted library allocation
|
page read and write
|
||
20FC2E13000
|
heap
|
page read and write
|
||
155764D4000
|
heap
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849004000
|
trusted library allocation
|
page read and write
|
||
1D972398000
|
heap
|
page read and write
|
||
42F2F79000
|
stack
|
page read and write
|
||
1F90D30D000
|
heap
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page read and write
|
||
FAC000
|
heap
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
12B48000
|
trusted library allocation
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
1555F85C000
|
trusted library allocation
|
page read and write
|
||
1F90D30D000
|
heap
|
page read and write
|
||
238A76FE000
|
heap
|
page read and write
|
||
1D974388000
|
heap
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
1D97235B000
|
heap
|
page read and write
|
||
238A7622000
|
heap
|
page read and write
|
||
1F90B4AE000
|
heap
|
page read and write
|
||
1D9741CB000
|
heap
|
page read and write
|
||
2409EBBD000
|
trusted library allocation
|
page read and write
|
||
1D97421D000
|
heap
|
page read and write
|
||
155764E0000
|
heap
|
page read and write
|
||
1F90D33B000
|
heap
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
2881000
|
trusted library allocation
|
page read and write
|
||
238A76BC000
|
heap
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
1F90D467000
|
heap
|
page read and write
|
||
AB5000
|
heap
|
page read and write
|
||
20FA8E6D000
|
heap
|
page read and write
|
||
1F90D40E000
|
heap
|
page read and write
|
||
1D9741FB000
|
heap
|
page read and write
|
||
15576240000
|
trusted library allocation
|
page read and write
|
||
155762E6000
|
heap
|
page read and write
|
||
1D974221000
|
heap
|
page read and write
|
||
188AC590000
|
heap
|
page read and write
|
||
240B6BD6000
|
heap
|
page execute and read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
1F90B443000
|
heap
|
page read and write
|
||
1F90D2E2000
|
heap
|
page read and write
|
||
1D974216000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
1555C2E4000
|
heap
|
page read and write
|
||
1D9741CC000
|
heap
|
page read and write
|
||
1F90D327000
|
heap
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
1D9741E8000
|
heap
|
page read and write
|
||
1D97421A000
|
heap
|
page read and write
|
||
1D974344000
|
heap
|
page read and write
|
||
1D972360000
|
heap
|
page read and write
|
||
1F90D341000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
1F90B460000
|
heap
|
page read and write
|
||
1B76E000
|
stack
|
page read and write
|
||
1D9741D5000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
1D97234D000
|
heap
|
page read and write
|
||
1F90B45B000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
1D972378000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
1F90B44E000
|
heap
|
page read and write
|
||
1D972395000
|
heap
|
page read and write
|
||
7FF848FE8000
|
trusted library allocation
|
page read and write
|
||
1557651E000
|
heap
|
page read and write
|
||
20FBAA21000
|
trusted library allocation
|
page read and write
|
||
1D9741F7000
|
heap
|
page read and write
|
||
2409FE7B000
|
trusted library allocation
|
page read and write
|
||
F48EBFE000
|
unkown
|
page readonly
|
||
1D9742F8000
|
heap
|
page read and write
|
||
155764D0000
|
heap
|
page read and write
|
||
1F90D467000
|
heap
|
page read and write
|
||
1D974219000
|
heap
|
page read and write
|
||
1F90D307000
|
heap
|
page read and write
|
||
1D9F6F3D000
|
heap
|
page read and write
|
||
20FAB603000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
1F90B43C000
|
heap
|
page read and write
|
||
F48EA7E000
|
stack
|
page read and write
|
||
1F90B44D000
|
heap
|
page read and write
|
||
1F90B47C000
|
heap
|
page read and write
|
||
20FAB981000
|
trusted library allocation
|
page read and write
|
||
1F90D311000
|
heap
|
page read and write
|
||
20FAC825000
|
trusted library allocation
|
page read and write
|
||
1D972360000
|
heap
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
1F90B46B000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
F48EAFE000
|
unkown
|
page readonly
|
||
1D97435F000
|
heap
|
page read and write
|
||
1D97436F000
|
heap
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF849004000
|
trusted library allocation
|
page read and write
|
||
1D972160000
|
heap
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
1D9F77DC000
|
heap
|
page read and write
|
||
1D974210000
|
heap
|
page read and write
|
||
1D974221000
|
heap
|
page read and write
|
||
1F90D335000
|
heap
|
page read and write
|
||
238A7F5A000
|
heap
|
page read and write
|
||
F48DA7D000
|
stack
|
page read and write
|
||
1556DEA0000
|
trusted library allocation
|
page read and write
|
||
1F90D496000
|
heap
|
page read and write
|
||
1F90D467000
|
heap
|
page read and write
|
||
1D972359000
|
heap
|
page read and write
|
||
1F90D460000
|
heap
|
page read and write
|
||
1D97432E000
|
heap
|
page read and write
|
||
1D9F750A000
|
heap
|
page read and write
|
||
1D9F7430000
|
heap
|
page read and write
|
||
1AFE0000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
238A76AD000
|
heap
|
page read and write
|
||
238ACB10000
|
trusted library allocation
|
page read and write
|
||
1F90D312000
|
heap
|
page read and write
|
||
1D9742D5000
|
heap
|
page read and write
|
||
7FF848DF2000
|
trusted library allocation
|
page read and write
|
||
1F90D322000
|
heap
|
page read and write
|
||
1F90D328000
|
heap
|
page read and write
|
||
D6F000
|
stack
|
page read and write
|
||
1CFBB000
|
stack
|
page read and write
|
||
1F90D496000
|
heap
|
page read and write
|
||
238A7F02000
|
heap
|
page read and write
|
||
188AC935000
|
heap
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
1D9722B9000
|
heap
|
page read and write
|
||
1F911B00000
|
heap
|
page read and write
|
||
F48D97E000
|
stack
|
page read and write
|
||
1D9742F8000
|
heap
|
page read and write
|
||
1D9F70D0000
|
trusted library allocation
|
page read and write
|
||
42F3F4E000
|
stack
|
page read and write
|
||
1D9742C1000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
1F90B4A3000
|
heap
|
page read and write
|
||
1F90D33B000
|
heap
|
page read and write
|
||
155765F8000
|
heap
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
7DF433050000
|
trusted library allocation
|
page execute and read and write
|
||
1B940000
|
heap
|
page execute and read and write
|
||
1F90D460000
|
heap
|
page read and write
|
||
1555DCA0000
|
trusted library allocation
|
page read and write
|
||
1D974202000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
DCC69FE000
|
stack
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
20FBACED000
|
trusted library allocation
|
page read and write
|
||
1F90D33B000
|
heap
|
page read and write
|
||
1D9769E0000
|
heap
|
page read and write
|
||
1D974202000
|
heap
|
page read and write
|
||
1557667F000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
1555DD45000
|
heap
|
page read and write
|
||
1F90D304000
|
heap
|
page read and write
|
||
1D976400000
|
trusted library allocation
|
page read and write
|
||
1F90D322000
|
heap
|
page read and write
|
||
9F8887D000
|
stack
|
page read and write
|
||
F48F5FD000
|
stack
|
page read and write
|
||
B0B2EFE000
|
stack
|
page read and write
|
||
1F911925000
|
heap
|
page read and write
|
||
1D9741EF000
|
heap
|
page read and write
|
||
1B42C000
|
stack
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
1F90D4B1000
|
heap
|
page read and write
|
||
1D9769FE000
|
heap
|
page read and write
|
||
20FA8E57000
|
heap
|
page read and write
|
||
1F90D33B000
|
heap
|
page read and write
|
||
1D974366000
|
heap
|
page read and write
|
||
3322ECC000
|
stack
|
page read and write
|
||
1555EC3A000
|
trusted library allocation
|
page read and write
|
||
1D974382000
|
heap
|
page read and write
|
||
1F90D322000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
155762C4000
|
heap
|
page read and write
|
||
1D9742DF000
|
heap
|
page read and write
|
||
1D9742C9000
|
heap
|
page read and write
|
||
1F90D327000
|
heap
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
1D974202000
|
heap
|
page read and write
|
||
C0CEDFC000
|
stack
|
page read and write
|
||
20FAAC28000
|
trusted library allocation
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
238A89C0000
|
trusted library allocation
|
page read and write
|
||
7FF849213000
|
trusted library allocation
|
page read and write
|
||
1555F700000
|
trusted library allocation
|
page read and write
|
||
7FF84925D000
|
trusted library allocation
|
page read and write
|
||
1F90D4A5000
|
heap
|
page read and write
|
||
A2C000
|
heap
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
1D9741DF000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
1F90B482000
|
heap
|
page read and write
|
||
3321EF9000
|
stack
|
page read and write
|
||
1F90B43F000
|
heap
|
page read and write
|
||
20FC30C9000
|
heap
|
page read and write
|
||
1F90D467000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1F90CD60000
|
heap
|
page read and write
|
||
1D97236D000
|
heap
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
1D972357000
|
heap
|
page read and write
|
||
1556DEB1000
|
trusted library allocation
|
page read and write
|
||
1F90D460000
|
heap
|
page read and write
|
||
1D9742EA000
|
heap
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
1F90D3F4000
|
heap
|
page read and write
|
||
2409E450000
|
trusted library allocation
|
page read and write
|
||
1D974382000
|
heap
|
page read and write
|
||
42F30FD000
|
stack
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
1555EEC3000
|
trusted library allocation
|
page read and write
|
||
1F90D330000
|
heap
|
page read and write
|
||
240B6CE0000
|
heap
|
page read and write
|
||
1F90D324000
|
heap
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
1555EBFF000
|
trusted library allocation
|
page read and write
|
||
7FF848FA1000
|
trusted library allocation
|
page read and write
|
||
1B66F000
|
stack
|
page read and write
|
||
1F90D2F9000
|
heap
|
page read and write
|
||
1D98102F000
|
trusted library allocation
|
page read and write
|
||
1F90D327000
|
heap
|
page read and write
|
||
20FAC187000
|
trusted library allocation
|
page read and write
|
||
1D974208000
|
heap
|
page read and write
|
||
1D981E24000
|
trusted library allocation
|
page read and write
|
||
1555C2C0000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF849179000
|
trusted library allocation
|
page read and write
|
||
1D9742F8000
|
heap
|
page read and write
|
||
1D9741D2000
|
heap
|
page read and write
|
||
7FF849290000
|
trusted library allocation
|
page read and write
|
||
1D980072000
|
trusted library allocation
|
page read and write
|
||
20FAAA01000
|
trusted library allocation
|
page read and write
|
||
1F90D480000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
1D974210000
|
heap
|
page read and write
|
||
1F90D32B000
|
heap
|
page read and write
|
||
1555E35E000
|
trusted library allocation
|
page read and write
|
||
1F90D46E000
|
heap
|
page read and write
|
||
1D973BDD000
|
heap
|
page read and write
|
||
42F2BBE000
|
stack
|
page read and write
|
||
1D9F79C0000
|
heap
|
page read and write
|
||
9F88CB9000
|
stack
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
F48FC7E000
|
stack
|
page read and write
|
||
20FA8F60000
|
trusted library allocation
|
page read and write
|
||
2409CC70000
|
heap
|
page read and write
|
||
7FF84920C000
|
trusted library allocation
|
page read and write
|
||
F48F17E000
|
stack
|
page read and write
|
||
1F90D413000
|
heap
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
1D972240000
|
heap
|
page read and write
|
||
1D97437F000
|
heap
|
page read and write
|
||
238A768C000
|
heap
|
page read and write
|
||
1D9F7700000
|
heap
|
page read and write
|
||
9A0000
|
trusted library allocation
|
page read and write
|
||
1D9741FB000
|
heap
|
page read and write
|
||
1D9F55AB000
|
heap
|
page read and write
|
||
7FF84927D000
|
trusted library allocation
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
1F90D322000
|
heap
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
FAE000
|
heap
|
page read and write
|
||
1D9741F7000
|
heap
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
B0B2E7E000
|
stack
|
page read and write
|
||
1556DEC1000
|
trusted library allocation
|
page read and write
|
||
1D9F53A0000
|
heap
|
page read and write
|
||
1F90D4BF000
|
heap
|
page read and write
|
||
1D9F772E000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page execute and read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
20FC2D43000
|
heap
|
page read and write
|
||
238ACCE6000
|
heap
|
page read and write
|
||
7FF849158000
|
trusted library allocation
|
page read and write
|
||
1D974215000
|
heap
|
page read and write
|
||
1556E178000
|
trusted library allocation
|
page read and write
|
||
1F90D4BE000
|
heap
|
page read and write
|
||
238A8640000
|
trusted library section
|
page readonly
|
||
9F88FBC000
|
stack
|
page read and write
|
||
240AE700000
|
trusted library allocation
|
page read and write
|
||
2409E504000
|
heap
|
page read and write
|
||
1F90D460000
|
heap
|
page read and write
|
||
20FC3080000
|
heap
|
page read and write
|
||
1D980A52000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849152000
|
trusted library allocation
|
page read and write
|
||
F48F4FE000
|
unkown
|
page readonly
|
||
F48DBF7000
|
stack
|
page read and write
|
||
7FF849276000
|
trusted library allocation
|
page read and write
|
||
1D974366000
|
heap
|
page read and write
|
||
238A7676000
|
heap
|
page read and write
|
||
1F90D3DB000
|
heap
|
page read and write
|
||
1F90D316000
|
heap
|
page read and write
|
||
1F90D4A9000
|
heap
|
page read and write
|
||
1B23F000
|
stack
|
page read and write
|
||
1F90D2FF000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
1F90D32D000
|
heap
|
page read and write
|
||
20FC2E1E000
|
heap
|
page read and write
|
||
188AC790000
|
heap
|
page read and write
|
||
7FF849174000
|
trusted library allocation
|
page read and write
|
||
1D97437F000
|
heap
|
page read and write
|
||
188AC690000
|
heap
|
page read and write
|
||
1F90D413000
|
heap
|
page read and write
|
||
1F90D4A9000
|
heap
|
page read and write
|
||
1F90D3FA000
|
heap
|
page read and write
|
||
1D9F54E0000
|
heap
|
page read and write
|
||
1CDBF000
|
stack
|
page read and write
|
||
1D9741CC000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
238A75A0000
|
trusted library section
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
F48EC7E000
|
stack
|
page read and write
|
||
2F6E000
|
stack
|
page read and write
|
||
1D97421D000
|
heap
|
page read and write
|
||
1D9741CC000
|
heap
|
page read and write
|
||
1BD09000
|
heap
|
page read and write
|
||
7FF848FD1000
|
trusted library allocation
|
page read and write
|
||
15576636000
|
heap
|
page read and write
|
||
1D9741EB000
|
heap
|
page read and write
|
||
1D9743A3000
|
heap
|
page read and write
|
||
1F90D33B000
|
heap
|
page read and write
|
||
1D9741C2000
|
heap
|
page read and write
|
||
1D972360000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
1F90D308000
|
heap
|
page read and write
|
||
1D9741D7000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
1D9742B4000
|
heap
|
page read and write
|
||
1D99006F000
|
trusted library allocation
|
page read and write
|
||
20FC2ED0000
|
heap
|
page read and write
|
||
1555F21C000
|
trusted library allocation
|
page read and write
|
||
1D974219000
|
heap
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
1556E17E000
|
trusted library allocation
|
page read and write
|
||
1F90D33D000
|
heap
|
page read and write
|
||
1557661F000
|
heap
|
page read and write
|
||
2409CC40000
|
trusted library allocation
|
page read and write
|
||
1555C346000
|
heap
|
page read and write
|
||
20FAB964000
|
trusted library allocation
|
page read and write
|
||
1B86B000
|
stack
|
page read and write
|
||
2409CC00000
|
trusted library allocation
|
page read and write
|
||
59DBDE000
|
unkown
|
page read and write
|
||
1555F139000
|
trusted library allocation
|
page read and write
|
||
1D97421D000
|
heap
|
page read and write
|
||
7FF414FA0000
|
trusted library allocation
|
page execute and read and write
|
||
1F90D3F8000
|
heap
|
page read and write
|
||
1D974225000
|
heap
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
9F89A0C000
|
stack
|
page read and write
|
||
1D9741B0000
|
heap
|
page read and write
|
||
1B0CD000
|
stack
|
page read and write
|
||
12B41000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
2409E4F0000
|
heap
|
page read and write
|
||
20FABBE3000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
240B6E40000
|
heap
|
page read and write
|
||
1555FC99000
|
trusted library allocation
|
page read and write
|
||
1555FC74000
|
trusted library allocation
|
page read and write
|
||
1F90D32D000
|
heap
|
page read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
1F90D312000
|
heap
|
page read and write
|
||
1D9F5480000
|
heap
|
page read and write
|
||
1D9741FB000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
1F90D322000
|
heap
|
page read and write
|
||
42F414E000
|
stack
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
1F911921000
|
heap
|
page read and write
|
||
1F90B4AE000
|
heap
|
page read and write
|
||
1F90D322000
|
heap
|
page read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
3321A83000
|
stack
|
page read and write
|
||
1F90B360000
|
heap
|
page read and write
|
||
2409CBC0000
|
heap
|
page read and write
|
||
20FA8E4D000
|
heap
|
page read and write
|
||
1F90D316000
|
heap
|
page read and write
|
||
1CA48000
|
heap
|
page read and write
|
||
3321F7E000
|
stack
|
page read and write
|
||
42F2BFE000
|
stack
|
page read and write
|
||
1F90D413000
|
heap
|
page read and write
|
||
1557655E000
|
heap
|
page read and write
|
||
1D9741DF000
|
heap
|
page read and write
|
||
238ACCE2000
|
heap
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
20FABA38000
|
trusted library allocation
|
page read and write
|
||
1D974388000
|
heap
|
page read and write
|
||
20FA8E9A000
|
heap
|
page read and write
|
||
20FA8F50000
|
heap
|
page read and write
|
||
1F90D322000
|
heap
|
page read and write
|
||
1BA5F000
|
stack
|
page read and write
|
||
DCC68FE000
|
stack
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
1F90D4B7000
|
heap
|
page read and write
|
||
C0CEAFE000
|
stack
|
page read and write
|
||
238A7F00000
|
heap
|
page read and write
|
||
2409F8CE000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
1F90D4A9000
|
heap
|
page read and write
|
||
7FF849133000
|
trusted library allocation
|
page read and write
|
||
1D9741F2000
|
heap
|
page read and write
|
||
1F90D309000
|
heap
|
page read and write
|
||
1BA4E000
|
stack
|
page read and write
|
||
240B6A86000
|
heap
|
page read and write
|
||
20FBAA31000
|
trusted library allocation
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
7FF849182000
|
trusted library allocation
|
page read and write
|
||
1F90D480000
|
heap
|
page read and write
|
||
1D9742CD000
|
heap
|
page read and write
|
||
238A768E000
|
heap
|
page read and write
|
||
1D974221000
|
heap
|
page read and write
|
||
F48DFFC000
|
stack
|
page read and write
|
||
1D974202000
|
heap
|
page read and write
|
||
1F90B47F000
|
heap
|
page read and write
|
||
238A8660000
|
trusted library section
|
page readonly
|
||
1D972360000
|
heap
|
page read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
1F90D341000
|
heap
|
page read and write
|
||
240AE9D9000
|
trusted library allocation
|
page read and write
|
||
20FAC26C000
|
trusted library allocation
|
page read and write
|
||
20FA8E10000
|
heap
|
page read and write
|
||
2409C980000
|
heap
|
page read and write
|
||
1D9741C1000
|
heap
|
page read and write
|
||
1F90B424000
|
heap
|
page read and write
|
||
1555DF16000
|
trusted library allocation
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
7FF84918A000
|
trusted library allocation
|
page read and write
|
||
240B6AFC000
|
heap
|
page read and write
|
||
B0B2C77000
|
stack
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
DCC6D78000
|
stack
|
page read and write
|
||
2D83000
|
heap
|
page read and write
|
||
155764EC000
|
heap
|
page read and write
|
||
C0CEBFB000
|
stack
|
page read and write
|
||
20FA9050000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
13003000
|
trusted library allocation
|
page read and write
|
||
1F90D316000
|
heap
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
2409F99D000
|
trusted library allocation
|
page read and write
|
||
1D9F70A0000
|
heap
|
page execute and read and write
|
||
20FAA980000
|
heap
|
page execute and read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1D974209000
|
heap
|
page read and write
|
||
1F90B448000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
1F90D337000
|
heap
|
page read and write
|
||
238ACB10000
|
trusted library allocation
|
page read and write
|
||
1F90D491000
|
heap
|
page read and write
|
||
1BC50000
|
heap
|
page read and write
|
||
155764E8000
|
heap
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
1D97436F000
|
heap
|
page read and write
|
||
1D9812AE000
|
trusted library allocation
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
7FF848FD1000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
2409CA68000
|
heap
|
page read and write
|
||
1F90D32B000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
1D972366000
|
heap
|
page read and write
|
||
2409E4F5000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page execute and read and write
|
||
7FF848FB1000
|
trusted library allocation
|
page read and write
|
||
1F90CCDE000
|
heap
|
page read and write
|
||
1F90D413000
|
heap
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
1D9F7777000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
7FF848FDA000
|
trusted library allocation
|
page read and write
|
||
1D97421A000
|
heap
|
page read and write
|
||
1D974215000
|
heap
|
page read and write
|
||
7DF48B9A0000
|
trusted library allocation
|
page execute and read and write
|
||
1D974210000
|
heap
|
page read and write
|
||
1D97235B000
|
heap
|
page read and write
|
||
12C3000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
1F90D46E000
|
heap
|
page read and write
|
||
1555C455000
|
heap
|
page read and write
|
||
1D97234A000
|
heap
|
page read and write
|
||
DCC6A7A000
|
stack
|
page read and write
|
||
1D974225000
|
heap
|
page read and write
|
||
1D98186B000
|
trusted library allocation
|
page read and write
|
||
1F90B443000
|
heap
|
page read and write
|
||
A57000
|
heap
|
page read and write
|
||
1555DE91000
|
trusted library allocation
|
page read and write
|
||
1555F06D000
|
trusted library allocation
|
page read and write
|
||
7FF848FE2000
|
trusted library allocation
|
page read and write
|
||
D3C000
|
heap
|
page read and write
|
||
1D980228000
|
trusted library allocation
|
page read and write
|
||
1D9F7704000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
1F90D480000
|
heap
|
page read and write
|
||
9F88EBE000
|
stack
|
page read and write
|
||
1F90D40E000
|
heap
|
page read and write
|
||
1D9741C5000
|
heap
|
page read and write
|
||
1F90CD63000
|
heap
|
page read and write
|
||
42F34FE000
|
stack
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
2409F9CE000
|
trusted library allocation
|
page read and write
|
||
1F90D2F4000
|
heap
|
page read and write
|
||
3001000
|
trusted library allocation
|
page read and write
|
||
1D9F70E0000
|
heap
|
page read and write
|
||
1F90D3F8000
|
heap
|
page read and write
|
||
1D974212000
|
heap
|
page read and write
|
||
1F90D3FC000
|
heap
|
page read and write
|
||
240B6AD3000
|
heap
|
page read and write
|
||
1555EF28000
|
trusted library allocation
|
page read and write
|
||
1F90D467000
|
heap
|
page read and write
|
||
20FC31F1000
|
heap
|
page read and write
|
||
1135000
|
heap
|
page read and write
|
||
1D974392000
|
heap
|
page read and write
|
||
1D9F74F9000
|
heap
|
page read and write
|
||
1D9804CD000
|
trusted library allocation
|
page read and write
|
||
F48E77E000
|
stack
|
page read and write
|
||
238A7560000
|
heap
|
page read and write
|
||
F48E87E000
|
stack
|
page read and write
|
||
1F90D3FF000
|
heap
|
page read and write
|
||
1F90D484000
|
heap
|
page read and write
|
||
238A7613000
|
heap
|
page read and write
|
||
238A7590000
|
trusted library allocation
|
page read and write
|
||
20FC31A8000
|
heap
|
page read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
1ACFD000
|
stack
|
page read and write
|
||
1F90D496000
|
heap
|
page read and write
|
||
1D974210000
|
heap
|
page read and write
|
||
1556E196000
|
trusted library allocation
|
page read and write
|
||
1D9F76FC000
|
heap
|
page read and write
|
||
1D972360000
|
heap
|
page read and write
|
||
1F90D4BE000
|
heap
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
155763F0000
|
heap
|
page read and write
|
||
9D5000
|
heap
|
page read and write
|
||
1F90D322000
|
heap
|
page read and write
|
||
1D9741F7000
|
heap
|
page read and write
|
||
D1C000
|
heap
|
page read and write
|
||
1F90B466000
|
heap
|
page read and write
|
||
9F88F3E000
|
stack
|
page read and write
|
||
1D974221000
|
heap
|
page read and write
|
||
1555DD40000
|
heap
|
page read and write
|
||
1D974227000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
B0B2D7E000
|
stack
|
page read and write
|
||
7FF8492A0000
|
trusted library allocation
|
page read and write
|
||
238A7E15000
|
heap
|
page read and write
|
||
1F90D3E3000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
20FC3090000
|
heap
|
page read and write
|
||
1D974219000
|
heap
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
1D974202000
|
heap
|
page read and write
|
||
3321B0E000
|
stack
|
page read and write
|
||
238ACAB3000
|
trusted library allocation
|
page read and write
|
||
42F31FE000
|
stack
|
page read and write
|
||
240B6AF3000
|
heap
|
page read and write
|
||
1D9743A5000
|
heap
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
D39000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
2409CC30000
|
heap
|
page readonly
|
||
238ACA40000
|
trusted library allocation
|
page read and write
|
||
1D9741F7000
|
heap
|
page read and write
|
||
1D973BDE000
|
heap
|
page read and write
|
||
10F1000
|
stack
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
1F90B3B0000
|
heap
|
page read and write
|
||
F48F7FD000
|
stack
|
page read and write
|
||
1555EE97000
|
trusted library allocation
|
page read and write
|
||
238A8450000
|
trusted library allocation
|
page read and write
|
||
7FF849154000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
1D972365000
|
heap
|
page read and write
|
||
2409CBF0000
|
trusted library section
|
page read and write
|
||
1F90D2FE000
|
heap
|
page read and write
|
||
1D9F6F25000
|
heap
|
page read and write
|
||
1F90D491000
|
heap
|
page read and write
|
||
1D972360000
|
heap
|
page read and write
|
||
20FABB2A000
|
trusted library allocation
|
page read and write
|
||
12FB000
|
heap
|
page read and write
|
||
1F90D40F000
|
heap
|
page read and write
|
||
F48E5FB000
|
stack
|
page read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
1D9742F0000
|
heap
|
page read and write
|
||
1F90D311000
|
heap
|
page read and write
|
||
42F357B000
|
stack
|
page read and write
|
||
1F90D330000
|
heap
|
page read and write
|
||
1D974226000
|
heap
|
page read and write
|
||
1D9F77C1000
|
heap
|
page read and write
|
||
1D9F76F8000
|
heap
|
page read and write
|
||
238A8650000
|
trusted library section
|
page readonly
|
||
1D972348000
|
heap
|
page read and write
|
||
1F90B44E000
|
heap
|
page read and write
|
||
7FF848FAA000
|
trusted library allocation
|
page read and write
|
||
1C7E8000
|
stack
|
page read and write
|
||
1C18E000
|
stack
|
page read and write
|
||
1D972381000
|
heap
|
page read and write
|
||
20FAB5FB000
|
trusted library allocation
|
page read and write
|
||
1D980D7C000
|
trusted library allocation
|
page read and write
|
||
20FA8E96000
|
heap
|
page read and write
|
||
15576870000
|
heap
|
page read and write
|
||
1D9742EA000
|
heap
|
page read and write
|
||
20FAA987000
|
heap
|
page execute and read and write
|
||
1D9741EF000
|
heap
|
page read and write
|
||
1D9741DF000
|
heap
|
page read and write
|
||
1D974215000
|
heap
|
page read and write
|
||
332247C000
|
stack
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
1BC4E000
|
stack
|
page read and write
|
||
1F90D333000
|
heap
|
page read and write
|
||
1F90D3D0000
|
heap
|
page read and write
|
||
1F90D460000
|
heap
|
page read and write
|
||
1F90D3E3000
|
heap
|
page read and write
|
||
131A000
|
heap
|
page read and write
|
||
1F90D480000
|
heap
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
1D9F7833000
|
heap
|
page read and write
|
||
33222FE000
|
stack
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
240B6C00000
|
heap
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
7FF84924D000
|
trusted library allocation
|
page read and write
|
||
1F90D40F000
|
heap
|
page read and write
|
||
1D972359000
|
heap
|
page read and write
|
||
12FC1000
|
trusted library allocation
|
page read and write
|
||
1F90B449000
|
heap
|
page read and write
|
||
1F90D2E8000
|
heap
|
page read and write
|
||
1F90B470000
|
heap
|
page read and write
|
||
1D974215000
|
heap
|
page read and write
|
||
1D9743A9000
|
heap
|
page read and write
|
||
2409CAEA000
|
heap
|
page read and write
|
||
1D974202000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
DCC6B77000
|
stack
|
page read and write
|
||
238ACC95000
|
heap
|
page read and write
|
||
238A8540000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
F48EEFE000
|
unkown
|
page readonly
|
||
B0B327B000
|
stack
|
page read and write
|
||
1557656E000
|
heap
|
page read and write
|
||
1555DD53000
|
heap
|
page read and write
|
||
1D9810F7000
|
trusted library allocation
|
page read and write
|
||
F48F3F9000
|
stack
|
page read and write
|
||
20FAC806000
|
trusted library allocation
|
page read and write
|
||
1555EFB7000
|
trusted library allocation
|
page read and write
|
||
240A051E000
|
trusted library allocation
|
page read and write
|
||
1F911920000
|
heap
|
page read and write
|
||
F48D9FE000
|
unkown
|
page readonly
|
||
1D9742C0000
|
heap
|
page read and write
|
||
1555FCB9000
|
trusted library allocation
|
page read and write
|
||
1D974386000
|
heap
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page execute and read and write
|
||
15576524000
|
heap
|
page read and write
|
||
20FA8E22000
|
heap
|
page read and write
|
||
1CD7E000
|
stack
|
page read and write
|
||
13001000
|
trusted library allocation
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
1135000
|
heap
|
page read and write
|
||
F48DEFE000
|
unkown
|
page readonly
|
||
1D980FA1000
|
trusted library allocation
|
page read and write
|
||
1F90D339000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
7FF849179000
|
trusted library allocation
|
page read and write
|
||
1D97235F000
|
heap
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
1D974227000
|
heap
|
page read and write
|
||
332237E000
|
stack
|
page read and write
|
||
240AE9DF000
|
trusted library allocation
|
page read and write
|
||
1F911902000
|
heap
|
page read and write
|
||
155762A3000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
1D97421A000
|
heap
|
page read and write
|
||
2D73000
|
trusted library allocation
|
page read and write
|
||
1F90D312000
|
heap
|
page read and write
|
||
1F90D3F1000
|
heap
|
page read and write
|
||
1F90D2FE000
|
heap
|
page read and write
|
||
1F90D33D000
|
heap
|
page read and write
|
||
1D9741FB000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
2B4C000
|
trusted library allocation
|
page read and write
|
||
12FBE000
|
trusted library allocation
|
page read and write
|
||
1D9811E0000
|
trusted library allocation
|
page read and write
|
||
D7B000
|
heap
|
page read and write
|
||
1F90D2FA000
|
heap
|
page read and write
|
||
12888000
|
trusted library allocation
|
page read and write
|
||
1F90D30D000
|
heap
|
page read and write
|
||
1D97235A000
|
heap
|
page read and write
|
||
1C5E5000
|
stack
|
page read and write
|
||
20FAA990000
|
heap
|
page execute and read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
1F90D413000
|
heap
|
page read and write
|
||
1555C2A0000
|
heap
|
page read and write
|
||
7FF848FD4000
|
trusted library allocation
|
page read and write
|
||
9F8897E000
|
stack
|
page read and write
|
||
1F90D3D1000
|
heap
|
page read and write
|
||
CF1000
|
stack
|
page read and write
|
||
20FAB96C000
|
trusted library allocation
|
page read and write
|
||
1D973CA0000
|
heap
|
page read and write
|
||
1D974210000
|
heap
|
page read and write
|
||
15576696000
|
heap
|
page read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
15C5000
|
heap
|
page read and write
|
||
D52000
|
heap
|
page read and write
|
||
1F90D312000
|
heap
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
20FBAD07000
|
trusted library allocation
|
page read and write
|
||
1555DE80000
|
heap
|
page execute and read and write
|
||
1D981DDF000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
1D972359000
|
heap
|
page read and write
|
||
1F90D330000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
1F90D333000
|
heap
|
page read and write
|
||
332304C000
|
stack
|
page read and write
|
||
1D9769E1000
|
heap
|
page read and write
|
||
1D974202000
|
heap
|
page read and write
|
||
1D974351000
|
heap
|
page read and write
|
||
20FABA99000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page execute and read and write
|
||
15576250000
|
heap
|
page execute and read and write
|
||
9F9000
|
heap
|
page read and write
|
||
2409F944000
|
trusted library allocation
|
page read and write
|
||
1D9741D8000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
15576675000
|
heap
|
page read and write
|
||
1F90D4B2000
|
heap
|
page read and write
|
||
1F90D322000
|
heap
|
page read and write
|
||
1D972371000
|
heap
|
page read and write
|
||
1B86E000
|
stack
|
page read and write
|
||
240AE9E5000
|
trusted library allocation
|
page read and write
|
||
C0CEB7E000
|
stack
|
page read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
1B43E000
|
stack
|
page read and write
|
||
1D974356000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
1F90D2EF000
|
heap
|
page read and write
|
||
20FA8FA0000
|
heap
|
page read and write
|
||
155764E4000
|
heap
|
page read and write
|
||
20FAB975000
|
trusted library allocation
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
20FBAA01000
|
trusted library allocation
|
page read and write
|
||
1555C30B000
|
heap
|
page read and write
|
||
238ACA70000
|
trusted library allocation
|
page read and write
|
||
1F90D304000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849188000
|
trusted library allocation
|
page read and write
|
||
20FAC293000
|
trusted library allocation
|
page read and write
|
||
1D97233E000
|
heap
|
page read and write
|
||
2409CAE7000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
1D9F7810000
|
heap
|
page read and write
|
||
1F90D4A5000
|
heap
|
page read and write
|
||
33221F8000
|
stack
|
page read and write
|
||
1D97420C000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
1D97421A000
|
heap
|
page read and write
|
||
2891000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
1D9743A3000
|
heap
|
page read and write
|
||
7FF849246000
|
trusted library allocation
|
page read and write
|
||
1D974212000
|
heap
|
page read and write
|
||
1CA40000
|
heap
|
page read and write
|
||
1D97235B000
|
heap
|
page read and write
|
||
1D97421A000
|
heap
|
page read and write
|
||
238ACCFB000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
1F90B449000
|
heap
|
page read and write
|
||
C0CE77E000
|
stack
|
page read and write
|
||
1D9F55EB000
|
heap
|
page read and write
|
||
1F90D329000
|
heap
|
page read and write
|
||
9F89C0E000
|
stack
|
page read and write
|
||
238ACC92000
|
heap
|
page read and write
|
||
DCC6CF7000
|
stack
|
page read and write
|
||
238A7640000
|
heap
|
page read and write
|
||
1F90D305000
|
heap
|
page read and write
|
||
1F90D347000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
1F90D480000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
1F90D327000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
2409CA60000
|
heap
|
page read and write
|
||
1F90D46E000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
1D974210000
|
heap
|
page read and write
|
||
1D974338000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
D80000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
1D97435F000
|
heap
|
page read and write
|
||
240B6E3A000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
1557667A000
|
heap
|
page read and write
|
||
F4C000
|
heap
|
page read and write
|
||
240B6B60000
|
heap
|
page execute and read and write
|
||
1D972359000
|
heap
|
page read and write
|
||
1D974390000
|
heap
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
1D97436F000
|
heap
|
page read and write
|
||
1D97236C000
|
heap
|
page read and write
|
||
1D974210000
|
heap
|
page read and write
|
||
1F90D31B000
|
heap
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
7FF849174000
|
trusted library allocation
|
page read and write
|
||
20FBACF7000
|
trusted library allocation
|
page read and write
|
||
1555C348000
|
heap
|
page read and write
|
||
15576256000
|
heap
|
page execute and read and write
|
||
240B6A4C000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
1D9F7461000
|
heap
|
page read and write
|
||
1B13F000
|
stack
|
page read and write
|
||
134B000
|
heap
|
page read and write
|
||
238ACC4D000
|
heap
|
page read and write
|
||
F9C000
|
heap
|
page read and write
|
||
1F90D316000
|
heap
|
page read and write
|
||
1F90D40F000
|
heap
|
page read and write
|
||
1F90D335000
|
heap
|
page read and write
|
||
42F3179000
|
stack
|
page read and write
|
||
1F90D3F1000
|
heap
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
F96000
|
heap
|
page read and write
|
||
1555EA8D000
|
trusted library allocation
|
page read and write
|
||
1D981E04000
|
trusted library allocation
|
page read and write
|
||
1D9902ED000
|
trusted library allocation
|
page read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
1555DC10000
|
trusted library allocation
|
page read and write
|
||
240B6B10000
|
heap
|
page read and write
|
||
7FF849002000
|
trusted library allocation
|
page read and write
|
||
15576629000
|
heap
|
page read and write
|
||
7DF4615C0000
|
trusted library allocation
|
page execute and read and write
|
||
1D9741EF000
|
heap
|
page read and write
|
||
1D97234B000
|
heap
|
page read and write
|
||
1D97435F000
|
heap
|
page read and write
|
||
238A7F13000
|
heap
|
page read and write
|
||
238ACCC0000
|
heap
|
page read and write
|
||
DCC79CE000
|
stack
|
page read and write
|
||
1F90D32E000
|
heap
|
page read and write
|
||
1D974392000
|
heap
|
page read and write
|
||
2409E6E0000
|
heap
|
page read and write
|
||
155765B7000
|
heap
|
page read and write
|
||
240AE6F1000
|
trusted library allocation
|
page read and write
|
||
240AE721000
|
trusted library allocation
|
page read and write
|
||
20FC309D000
|
heap
|
page read and write
|
||
3322FC7000
|
stack
|
page read and write
|
||
238ACAB0000
|
trusted library allocation
|
page read and write
|
||
240B6E24000
|
heap
|
page read and write
|
||
F48E4FE000
|
unkown
|
page readonly
|
||
238ACA41000
|
trusted library allocation
|
page read and write
|
||
238ACD02000
|
heap
|
page read and write
|
||
2409CB80000
|
heap
|
page read and write
|
||
1D974386000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
1D974338000
|
heap
|
page read and write
|
||
1556DEFE000
|
trusted library allocation
|
page read and write
|
||
9F89B8D000
|
stack
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1F90D312000
|
heap
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
2DC0000
|
heap
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
238A762B000
|
heap
|
page read and write
|
||
42F2B33000
|
stack
|
page read and write
|
||
238ACC54000
|
heap
|
page read and write
|
||
1C08E000
|
stack
|
page read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
1D9741D0000
|
heap
|
page read and write
|
||
1F90B4AE000
|
heap
|
page read and write
|
||
7FF849153000
|
trusted library allocation
|
page read and write
|
||
1555DE60000
|
heap
|
page execute and read and write
|
||
1D9F54A0000
|
heap
|
page read and write
|
||
1D97432B000
|
heap
|
page read and write
|
||
240B6A7B000
|
heap
|
page read and write
|
||
1F90B477000
|
heap
|
page read and write
|
||
20FA8F10000
|
trusted library allocation
|
page read and write
|
||
1D974391000
|
heap
|
page read and write
|
||
1D9741FB000
|
heap
|
page read and write
|
||
1D97420C000
|
heap
|
page read and write
|
||
1D974390000
|
heap
|
page read and write
|
||
1D9741EF000
|
heap
|
page read and write
|
||
1D974389000
|
heap
|
page read and write
|
||
3321B8E000
|
stack
|
page read and write
|
||
300C000
|
trusted library allocation
|
page read and write
|
||
1D974202000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
9F88AF7000
|
stack
|
page read and write
|
||
1F90B457000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1D9742B5000
|
heap
|
page read and write
|
||
1F90D407000
|
heap
|
page read and write
|
||
1D9741FB000
|
heap
|
page read and write
|
||
15576693000
|
heap
|
page read and write
|
||
14A5000
|
heap
|
page read and write
|
||
DCC7B49000
|
stack
|
page read and write
|
||
20FC30AA000
|
heap
|
page read and write
|
||
238ACCF9000
|
heap
|
page read and write
|
||
1F90D316000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
F48E0FE000
|
unkown
|
page readonly
|
||
F48E1FC000
|
stack
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
7FF84918C000
|
trusted library allocation
|
page read and write
|
||
238A7678000
|
heap
|
page read and write
|
||
1D974225000
|
heap
|
page read and write
|
||
1F90D491000
|
heap
|
page read and write
|
||
1C930000
|
heap
|
page read and write
|
||
1F911902000
|
heap
|
page read and write
|
||
20FC31C6000
|
heap
|
page read and write
|
||
1D9743A3000
|
heap
|
page read and write
|
||
1D980D73000
|
trusted library allocation
|
page read and write
|
||
1D9769EA000
|
heap
|
page read and write
|
||
1F90D312000
|
heap
|
page read and write
|
||
240A0048000
|
trusted library allocation
|
page read and write
|
||
1D974206000
|
heap
|
page read and write
|
||
1D9741DF000
|
heap
|
page read and write
|
||
1F90D483000
|
heap
|
page read and write
|
||
29DE000
|
stack
|
page read and write
|
||
1F90B43C000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
1D974341000
|
heap
|
page read and write
|
||
1555FCBE000
|
trusted library allocation
|
page read and write
|
There are 1961 hidden memdumps, click here to show them.