Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
4ra1Fo2Zql.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Google\GrVEPTmsoNTbY.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Google\GrVEPTmsoNTbY.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\MSECache\OfficeKMS\csrss.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\MSECache\OfficeKMS\csrss.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Windows Media Player\GrVEPTmsoNTbY.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Windows Portable Devices\GrVEPTmsoNTbY.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\4ra1Fo2Zql.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\IZdub348jc.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\U9jP4iZUUm.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\q4lxag2s\q4lxag2s.cmdline
|
Unicode text, UTF-8 (with BOM) text, with no line terminators
|
dropped
|
||
C:\Users\user\Desktop\CAgBdTQY.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\MjzRNvWG.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\VLoPWCmN.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\VTXhBlNT.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\cPGganVc.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\fuHfGerv.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\gwaXxxDZ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\myawJPbK.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\sTRlxExW.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\xxMkqOtN.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\RuntimeBroker.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\RuntimeBroker.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\SecurityHealthSystray.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Google\b4601131bf8590
|
ASCII text, with very long lines (742), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\MSECache\OfficeKMS\886983d96e3d3e
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\CSCFABAA3A3EFF44E7388BEDB3353C25726.TMP
|
MSVC .res
|
dropped
|
||
C:\Program Files (x86)\Windows Media Player\GrVEPTmsoNTbY.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Windows Media Player\b4601131bf8590
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files\Windows Portable Devices\GrVEPTmsoNTbY.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Windows Portable Devices\b4601131bf8590
|
ASCII text, with very long lines (390), with no line terminators
|
dropped
|
||
C:\Users\user\9e8d7a4ca61bd9
|
ASCII text, with very long lines (943), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\GrVEPTmsoNTbY.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RuntimeBroker.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\csrss.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\00tp5zly\00tp5zly.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\00tp5zly\00tp5zly.cmdline
|
Unicode text, UTF-8 (with BOM) text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\00tp5zly\00tp5zly.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (331), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\QqKaK8MzOz
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES2144.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6d0, 10 symbols, created Thu Aug 29 22:39:12 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES22AB.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6ec, 10 symbols, created Thu Aug 29 22:39:12 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\dfacWBhiVN
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\q4lxag2s\q4lxag2s.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\q4lxag2s\q4lxag2s.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (346), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\Desktop\cfd09d23ba9398
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\System32\CSC1FF918B0E6FF4E65A25AACD427A2AFF8.TMP
|
MSVC .res
|
dropped
|
||
\Device\Null
|
ASCII text
|
dropped
|
There are 38 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\4ra1Fo2Zql.exe
|
"C:\Users\user\Desktop\4ra1Fo2Zql.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "GrVEPTmsoNTbYG" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\google\GrVEPTmsoNTbY.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "GrVEPTmsoNTbY" /sc ONLOGON /tr "'C:\Program Files (x86)\google\GrVEPTmsoNTbY.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "GrVEPTmsoNTbYG" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\google\GrVEPTmsoNTbY.exe'" /rl HIGHEST
/f
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\q4lxag2s\q4lxag2s.cmdline"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\00tp5zly\00tp5zly.cmdline"
|
||
C:\Program Files (x86)\Google\GrVEPTmsoNTbY.exe
|
"C:\Program Files (x86)\google\GrVEPTmsoNTbY.exe"
|
||
C:\Program Files (x86)\Google\GrVEPTmsoNTbY.exe
|
"C:\Program Files (x86)\google\GrVEPTmsoNTbY.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\msecache\OfficeKMS\csrss.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\msecache\OfficeKMS\csrss.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\msecache\OfficeKMS\csrss.exe'" /rl HIGHEST
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "GrVEPTmsoNTbYG" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\windows media player\GrVEPTmsoNTbY.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "GrVEPTmsoNTbY" /sc ONLOGON /tr "'C:\Program Files (x86)\windows media player\GrVEPTmsoNTbY.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "GrVEPTmsoNTbYG" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\windows media player\GrVEPTmsoNTbY.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Users\user\RuntimeBroker.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\user\RuntimeBroker.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Users\user\RuntimeBroker.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "GrVEPTmsoNTbYG" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Portable Devices\GrVEPTmsoNTbY.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "GrVEPTmsoNTbY" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\GrVEPTmsoNTbY.exe'" /rl
HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "GrVEPTmsoNTbYG" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Portable Devices\GrVEPTmsoNTbY.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "4ra1Fo2Zql4" /sc MINUTE /mo 6 /tr "'C:\Users\user\Desktop\4ra1Fo2Zql.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "4ra1Fo2Zql" /sc ONLOGON /tr "'C:\Users\user\Desktop\4ra1Fo2Zql.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "4ra1Fo2Zql4" /sc MINUTE /mo 13 /tr "'C:\Users\user\Desktop\4ra1Fo2Zql.exe'" /rl HIGHEST /f
|
||
C:\Users\user\Desktop\4ra1Fo2Zql.exe
|
C:\Users\user\Desktop\4ra1Fo2Zql.exe
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\IZdub348jc.bat"
|
||
C:\Users\user\Desktop\4ra1Fo2Zql.exe
|
C:\Users\user\Desktop\4ra1Fo2Zql.exe
|
||
C:\Program Files (x86)\MSECache\OfficeKMS\csrss.exe
|
"C:\Program Files (x86)\msecache\OfficeKMS\csrss.exe"
|
||
C:\Program Files (x86)\MSECache\OfficeKMS\csrss.exe
|
"C:\Program Files (x86)\msecache\OfficeKMS\csrss.exe"
|
||
C:\Users\user\RuntimeBroker.exe
|
C:\Users\user\RuntimeBroker.exe
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Users\user\RuntimeBroker.exe
|
C:\Users\user\RuntimeBroker.exe
|
||
C:\Program Files\Windows Portable Devices\GrVEPTmsoNTbY.exe
|
"C:\Program Files\Windows Portable Devices\GrVEPTmsoNTbY.exe"
|
||
C:\Program Files (x86)\MSECache\OfficeKMS\csrss.exe
|
"C:\Program Files (x86)\msecache\OfficeKMS\csrss.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\U9jP4iZUUm.bat"
|
||
C:\Program Files (x86)\MSECache\OfficeKMS\csrss.exe
|
"C:\Program Files (x86)\msecache\OfficeKMS\csrss.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES2144.tmp"
"c:\Program Files (x86)\Microsoft\Edge\Application\CSCFABAA3A3EFF44E7388BEDB3353C25726.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES22AB.tmp"
"c:\Windows\System32\CSC1FF918B0E6FF4E65A25AACD427A2AFF8.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
There are 34 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://621287cm.n9shteam2.top/
|
unknown
|
||
http://621287cm.n9shteam2.top/UpdatelinuxWindowsUniversal.php
|
80.211.144.156
|
||
http://621287cm.n9shteam2.top
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
621287cm.n9shteam2.top
|
80.211.144.156
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
80.211.144.156
|
621287cm.n9shteam2.top
|
Italy
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
GrVEPTmsoNTbY
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
csrss
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
RuntimeBroker
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
4ra1Fo2Zql
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
GrVEPTmsoNTbY
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
GrVEPTmsoNTbY
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_CURRENT_USER\SOFTWARE\f4637f49c96b8435fcc300bd6ef3dba616e748a9
|
0e64880caba3a31ccf6e220ccf7196ae295c38e1
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
GrVEPTmsoNTbY
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
csrss
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
RuntimeBroker
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
4ra1Fo2Zql
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
GrVEPTmsoNTbY
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
GrVEPTmsoNTbY
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GrVEPTmsoNTbY_RASMANCS
|
FileDirectory
|
There are 26 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
32000
|
unkown
|
page readonly
|
||
126E7000
|
trusted library allocation
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
132C4000
|
trusted library allocation
|
page read and write
|
||
7FF848D9C000
|
trusted library allocation
|
page execute and read and write
|
||
2A86A15D000
|
heap
|
page read and write
|
||
2A86BC40000
|
direct allocation
|
page read and write
|
||
1BDFE000
|
stack
|
page read and write
|
||
2EF2000
|
trusted library allocation
|
page read and write
|
||
7FF848D3D000
|
trusted library allocation
|
page execute and read and write
|
||
A74000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
1B08F000
|
stack
|
page read and write
|
||
9D0000
|
trusted library allocation
|
page read and write
|
||
5C784FC000
|
stack
|
page read and write
|
||
28AB000
|
trusted library allocation
|
page read and write
|
||
3146000
|
trusted library allocation
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page execute and read and write
|
||
2A86BC00000
|
direct allocation
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
1BBEF000
|
stack
|
page read and write
|
||
639000
|
heap
|
page read and write
|
||
2A86A16C000
|
heap
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
7FF848D8C000
|
trusted library allocation
|
page read and write
|
||
2814000
|
trusted library allocation
|
page read and write
|
||
7FF848F44000
|
trusted library allocation
|
page read and write
|
||
175DBE67000
|
heap
|
page read and write
|
||
7FF848F93000
|
trusted library allocation
|
page read and write
|
||
2EDF000
|
trusted library allocation
|
page read and write
|
||
2A86A353000
|
direct allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
1855000
|
heap
|
page read and write
|
||
349C000
|
trusted library allocation
|
page read and write
|
||
7FF848F5D000
|
trusted library allocation
|
page read and write
|
||
2E6A000
|
heap
|
page read and write
|
||
7FF848F23000
|
trusted library allocation
|
page read and write
|
||
1B28E000
|
stack
|
page read and write
|
||
1B616000
|
heap
|
page read and write
|
||
25C6000
|
trusted library allocation
|
page read and write
|
||
2B3F000
|
trusted library allocation
|
page read and write
|
||
3DE73CC000
|
stack
|
page read and write
|
||
19E80C90000
|
heap
|
page read and write
|
||
2AF7000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
2A86A390000
|
heap
|
page read and write
|
||
30CB000
|
trusted library allocation
|
page read and write
|
||
2A86A12F000
|
heap
|
page read and write
|
||
2805000
|
trusted library allocation
|
page read and write
|
||
1B608000
|
heap
|
page read and write
|
||
1633000
|
heap
|
page read and write
|
||
121F000
|
heap
|
page read and write
|
||
1BD8E000
|
stack
|
page read and write
|
||
E680AFE000
|
stack
|
page read and write
|
||
18D5000
|
heap
|
page read and write
|
||
1B6A3000
|
heap
|
page read and write
|
||
3630000
|
trusted library allocation
|
page read and write
|
||
7FF848D6B000
|
trusted library allocation
|
page execute and read and write
|
||
31EB000
|
trusted library allocation
|
page read and write
|
||
2A86BC83000
|
direct allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
3041000
|
trusted library allocation
|
page read and write
|
||
7FF848D4C000
|
trusted library allocation
|
page read and write
|
||
2A86A2B0000
|
heap
|
page read and write
|
||
124A000
|
heap
|
page read and write
|
||
7FF848F53000
|
trusted library allocation
|
page read and write
|
||
3133000
|
trusted library allocation
|
page read and write
|
||
7FF848F64000
|
trusted library allocation
|
page read and write
|
||
1530000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page execute and read and write
|
||
23A2000
|
unkown
|
page readonly
|
||
7FF848F80000
|
trusted library allocation
|
page execute and read and write
|
||
23076961000
|
heap
|
page read and write
|
||
1328000
|
heap
|
page read and write
|
||
7FF848F1C000
|
trusted library allocation
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
7FF848EEA000
|
trusted library allocation
|
page read and write
|
||
2F8F000
|
trusted library allocation
|
page read and write
|
||
9FF000
|
stack
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
33B5000
|
trusted library allocation
|
page read and write
|
||
CE3000
|
stack
|
page read and write
|
||
1B1AD000
|
heap
|
page read and write
|
||
34E1000
|
trusted library allocation
|
page read and write
|
||
2A86A11A000
|
heap
|
page read and write
|
||
23076972000
|
heap
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
7FF849332000
|
trusted library allocation
|
page read and write
|
||
175DBE20000
|
heap
|
page read and write
|
||
2A86A11A000
|
heap
|
page read and write
|
||
2ACB000
|
trusted library allocation
|
page read and write
|
||
26A7000
|
trusted library allocation
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
6DC000
|
heap
|
page read and write
|
||
7FF848D7C000
|
trusted library allocation
|
page read and write
|
||
1B792000
|
heap
|
page read and write
|
||
2A86A150000
|
heap
|
page read and write
|
||
1B708000
|
heap
|
page read and write
|
||
15C7000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
2AD18A25000
|
heap
|
page read and write
|
||
7FF848F57000
|
trusted library allocation
|
page read and write
|
||
E39000
|
heap
|
page read and write
|
||
2AD6000
|
trusted library allocation
|
page read and write
|
||
31B4000
|
trusted library allocation
|
page read and write
|
||
7FF848D8C000
|
trusted library allocation
|
page read and write
|
||
1C200000
|
heap
|
page read and write
|
||
1B940000
|
heap
|
page read and write
|
||
7FF848F8D000
|
trusted library allocation
|
page read and write
|
||
2E46000
|
trusted library allocation
|
page read and write
|
||
621000
|
heap
|
page read and write
|
||
2A86A136000
|
heap
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
2A86A12F000
|
heap
|
page read and write
|
||
19E80C9F000
|
heap
|
page read and write
|
||
7FF848DFC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F0C000
|
trusted library allocation
|
page read and write
|
||
130B1000
|
trusted library allocation
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
272F000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
19E80CA4000
|
heap
|
page read and write
|
||
31E5000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
2A86BD40000
|
heap
|
page read and write
|
||
26F2000
|
trusted library allocation
|
page read and write
|
||
1C32E000
|
stack
|
page read and write
|
||
3122000
|
trusted library allocation
|
page read and write
|
||
12836000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
1AF80000
|
heap
|
page execute and read and write
|
||
1B9CE000
|
stack
|
page read and write
|
||
129F7000
|
trusted library allocation
|
page read and write
|
||
2B09000
|
trusted library allocation
|
page read and write
|
||
317B000
|
trusted library allocation
|
page read and write
|
||
19E80DD0000
|
direct allocation
|
page read and write
|
||
1C15E000
|
stack
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
1B8E0000
|
heap
|
page execute and read and write
|
||
F00000
|
heap
|
page read and write
|
||
111F000
|
heap
|
page read and write
|
||
12F50000
|
trusted library allocation
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
7FF848EF8000
|
trusted library allocation
|
page read and write
|
||
7FF848EE9000
|
trusted library allocation
|
page read and write
|
||
3238000
|
trusted library allocation
|
page read and write
|
||
1A500000
|
trusted library allocation
|
page read and write
|
||
12950000
|
trusted library allocation
|
page read and write
|
||
1B7E1000
|
heap
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
7FF848D94000
|
trusted library allocation
|
page read and write
|
||
7FF848D88000
|
trusted library allocation
|
page read and write
|
||
26DF000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
1BC7B000
|
stack
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page execute and read and write
|
||
EDB000
|
heap
|
page read and write
|
||
7FF848FCA000
|
trusted library allocation
|
page read and write
|
||
1ADA0000
|
heap
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
7FF848F1C000
|
trusted library allocation
|
page read and write
|
||
2EDB000
|
trusted library allocation
|
page read and write
|
||
2A86A357000
|
direct allocation
|
page read and write
|
||
2591000
|
trusted library allocation
|
page read and write
|
||
2F93000
|
trusted library allocation
|
page read and write
|
||
19E80CEF000
|
heap
|
page read and write
|
||
1E602520000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
2832000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1C050000
|
heap
|
page read and write
|
||
2812000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
trusted library allocation
|
page read and write
|
||
19E80C7F000
|
heap
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
3114000
|
trusted library allocation
|
page read and write
|
||
163C000
|
heap
|
page read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
1C190000
|
heap
|
page execute and read and write
|
||
29FF000
|
trusted library allocation
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page read and write
|
||
27DF000
|
trusted library allocation
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
12E5000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page execute and read and write
|
||
3227000
|
trusted library allocation
|
page read and write
|
||
2A14000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
7FF848F6D000
|
trusted library allocation
|
page read and write
|
||
30F5000
|
trusted library allocation
|
page read and write
|
||
1BCB0000
|
heap
|
page execute and read and write
|
||
1C220000
|
heap
|
page execute and read and write
|
||
31C1000
|
trusted library allocation
|
page read and write
|
||
1AB6B000
|
heap
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D73000
|
trusted library allocation
|
page read and write
|
||
2A64000
|
trusted library allocation
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
2A7E000
|
trusted library allocation
|
page read and write
|
||
19E80AB0000
|
heap
|
page read and write
|
||
19E80C87000
|
heap
|
page read and write
|
||
25AF000
|
trusted library allocation
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page execute and read and write
|
||
2749000
|
trusted library allocation
|
page read and write
|
||
230768B0000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
12AB000
|
heap
|
page read and write
|
||
1AFC0000
|
unkown
|
page readonly
|
||
19E80C8C000
|
heap
|
page read and write
|
||
19E8261F000
|
direct allocation
|
page read and write
|
||
78B000
|
heap
|
page read and write
|
||
2E1F000
|
trusted library allocation
|
page read and write
|
||
31FB000
|
trusted library allocation
|
page read and write
|
||
30000
|
unkown
|
page readonly
|
||
2FD9000
|
trusted library allocation
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page read and write
|
||
2A86A11A000
|
heap
|
page read and write
|
||
2A86A12F000
|
heap
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page read and write
|
||
12600000
|
trusted library allocation
|
page read and write
|
||
28A7000
|
trusted library allocation
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
70D000
|
heap
|
page read and write
|
||
2AED000
|
trusted library allocation
|
page read and write
|
||
2FEB000
|
trusted library allocation
|
page read and write
|
||
7FF848E91000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D54000
|
trusted library allocation
|
page read and write
|
||
2A86A10C000
|
heap
|
page read and write
|
||
1C102000
|
heap
|
page execute and read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
2F18000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
7FF848D58000
|
trusted library allocation
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
2A86A0E8000
|
heap
|
page read and write
|
||
9D0000
|
trusted library allocation
|
page read and write
|
||
735000
|
heap
|
page read and write
|
||
2A86A11F000
|
heap
|
page read and write
|
||
18FF000
|
stack
|
page read and write
|
||
7FF848F0C000
|
trusted library allocation
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
2A86A119000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
7FF848F64000
|
trusted library allocation
|
page read and write
|
||
7FF848D7C000
|
trusted library allocation
|
page read and write
|
||
7FF849310000
|
trusted library allocation
|
page read and write
|
||
523000
|
stack
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F03000
|
trusted library allocation
|
page read and write
|
||
7FF848EE8000
|
trusted library allocation
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
E13000
|
heap
|
page read and write
|
||
23076961000
|
heap
|
page read and write
|
||
7FF848DFC000
|
trusted library allocation
|
page execute and read and write
|
||
1676000
|
heap
|
page read and write
|
||
23076930000
|
heap
|
page read and write
|
||
7FF848F0C000
|
trusted library allocation
|
page read and write
|
||
2A86A310000
|
direct allocation
|
page read and write
|
||
7FF848EF4000
|
trusted library allocation
|
page read and write
|
||
2807000
|
trusted library allocation
|
page read and write
|
||
2EFF000
|
trusted library allocation
|
page read and write
|
||
2A3F000
|
trusted library allocation
|
page read and write
|
||
1D256000
|
heap
|
page read and write
|
||
282B000
|
trusted library allocation
|
page read and write
|
||
7FF848D5C000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
2A86A175000
|
heap
|
page read and write
|
||
3656000
|
trusted library allocation
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
7FF848F83000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
1AD1D000
|
stack
|
page read and write
|
||
3194000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
7FF848D94000
|
trusted library allocation
|
page read and write
|
||
1213000
|
heap
|
page read and write
|
||
7FF848F5D000
|
trusted library allocation
|
page read and write
|
||
3725000
|
trusted library allocation
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
3183000
|
trusted library allocation
|
page read and write
|
||
1B6E8000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page execute and read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
1A855000
|
heap
|
page read and write
|
||
7FF848D78000
|
trusted library allocation
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
2AD18A48000
|
heap
|
page read and write
|
||
23A0000
|
unkown
|
page readonly
|
||
349E000
|
trusted library allocation
|
page read and write
|
||
2A86A3F0000
|
direct allocation
|
page read and write
|
||
26A0000
|
heap
|
page read and write
|
||
281F000
|
trusted library allocation
|
page read and write
|
||
2F1F000
|
trusted library allocation
|
page read and write
|
||
1B73E000
|
heap
|
page read and write
|
||
2A86A160000
|
heap
|
page read and write
|
||
25B8000
|
trusted library allocation
|
page read and write
|
||
25C0000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
2953000
|
trusted library allocation
|
page read and write
|
||
2380000
|
heap
|
page execute and read and write
|
||
2649000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
2A86A165000
|
heap
|
page read and write
|
||
2A86A12B000
|
heap
|
page read and write
|
||
3351000
|
trusted library allocation
|
page read and write
|
||
7FF848D58000
|
trusted library allocation
|
page read and write
|
||
19E80CEC000
|
heap
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
3510000
|
trusted library allocation
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
27F4000
|
trusted library allocation
|
page read and write
|
||
134E1000
|
trusted library allocation
|
page read and write
|
||
2A86A144000
|
heap
|
page read and write
|
||
1C400000
|
heap
|
page read and write
|
||
722000
|
heap
|
page read and write
|
||
1602000
|
heap
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
261F000
|
trusted library allocation
|
page read and write
|
||
27DB000
|
trusted library allocation
|
page read and write
|
||
12A0D000
|
trusted library allocation
|
page read and write
|
||
7FF848F37000
|
trusted library allocation
|
page read and write
|
||
1228000
|
heap
|
page read and write
|
||
1D1DE000
|
stack
|
page read and write
|
||
1AFE0000
|
unkown
|
page readonly
|
||
6B6000
|
heap
|
page read and write
|
||
2AB9000
|
trusted library allocation
|
page read and write
|
||
2A1F000
|
trusted library allocation
|
page read and write
|
||
23C0000
|
heap
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
1B13000
|
heap
|
page read and write
|
||
1BE50000
|
heap
|
page execute and read and write
|
||
A44000
|
heap
|
page read and write
|
||
1C402000
|
heap
|
page read and write
|
||
29E1000
|
trusted library allocation
|
page read and write
|
||
19E80C7C000
|
heap
|
page read and write
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
7FF848F53000
|
trusted library allocation
|
page read and write
|
||
12990000
|
trusted library allocation
|
page read and write
|
||
19E82640000
|
direct allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page execute and read and write
|
||
30FB000
|
trusted library allocation
|
page read and write
|
||
7FF848D84000
|
trusted library allocation
|
page read and write
|
||
323F000
|
trusted library allocation
|
page read and write
|
||
1622000
|
heap
|
page read and write
|
||
74F000
|
heap
|
page read and write
|
||
1B68D000
|
heap
|
page read and write
|
||
2DD6BFE000
|
stack
|
page read and write
|
||
1BDEF000
|
stack
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page execute and read and write
|
||
1B947000
|
heap
|
page read and write
|
||
7FF848F83000
|
trusted library allocation
|
page read and write
|
||
7FF848D84000
|
trusted library allocation
|
page read and write
|
||
19E826A0000
|
direct allocation
|
page read and write
|
||
1BA02000
|
heap
|
page read and write
|
||
1B74A000
|
heap
|
page read and write
|
||
2AAF000
|
trusted library allocation
|
page read and write
|
||
19E80E10000
|
direct allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
125B1000
|
trusted library allocation
|
page read and write
|
||
310D000
|
trusted library allocation
|
page read and write
|
||
2F53000
|
trusted library allocation
|
page read and write
|
||
31B3000
|
trusted library allocation
|
page read and write
|
||
1C600000
|
heap
|
page read and write
|
||
13500000
|
trusted library allocation
|
page read and write
|
||
2E2C41E0000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
19E80CA4000
|
heap
|
page read and write
|
||
230767D0000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
15EF000
|
stack
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
19E80CB5000
|
heap
|
page read and write
|
||
3182000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
trusted library allocation
|
page read and write
|
||
E680BFF000
|
stack
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page execute and read and write
|
||
3DE77FF000
|
stack
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
269E000
|
stack
|
page read and write
|
||
26BB000
|
trusted library allocation
|
page read and write
|
||
7FF48A0C0000
|
trusted library allocation
|
page execute and read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
34C6000
|
trusted library allocation
|
page read and write
|
||
12461000
|
trusted library allocation
|
page read and write
|
||
7FF848F26000
|
trusted library allocation
|
page read and write
|
||
1326F000
|
trusted library allocation
|
page read and write
|
||
1B92E000
|
stack
|
page read and write
|
||
2A86A160000
|
heap
|
page read and write
|
||
12A5E000
|
trusted library allocation
|
page read and write
|
||
2E2C3E37000
|
heap
|
page read and write
|
||
2AAD000
|
trusted library allocation
|
page read and write
|
||
1313000
|
heap
|
page read and write
|
||
128A1000
|
trusted library allocation
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
1ADB8000
|
heap
|
page read and write
|
||
2A75000
|
trusted library allocation
|
page read and write
|
||
1BA11000
|
heap
|
page read and write
|
||
23076A30000
|
heap
|
page read and write
|
||
2A86A15E000
|
heap
|
page read and write
|
||
2C75000
|
trusted library allocation
|
page read and write
|
||
2280000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
7FF848D78000
|
trusted library allocation
|
page read and write
|
||
C02000
|
heap
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
2A60000
|
trusted library allocation
|
page read and write
|
||
163F000
|
heap
|
page read and write
|
||
1D5FE000
|
stack
|
page read and write
|
||
19E80CCF000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
1B76B000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
19E82660000
|
direct allocation
|
page read and write
|
||
2A86A36B000
|
direct allocation
|
page read and write
|
||
7FF848F34000
|
trusted library allocation
|
page read and write
|
||
810000
|
trusted library allocation
|
page read and write
|
||
25B0000
|
trusted library allocation
|
page read and write
|
||
132BE000
|
trusted library allocation
|
page read and write
|
||
1BEFF000
|
stack
|
page read and write
|
||
30C7000
|
trusted library allocation
|
page read and write
|
||
19E80CD2000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page readonly
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
1568000
|
heap
|
page read and write
|
||
3179000
|
trusted library allocation
|
page read and write
|
||
25B5000
|
trusted library allocation
|
page read and write
|
||
1293A000
|
trusted library allocation
|
page read and write
|
||
624000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
7FF848F77000
|
trusted library allocation
|
page read and write
|
||
2A07000
|
trusted library allocation
|
page read and write
|
||
7FF848F57000
|
trusted library allocation
|
page read and write
|
||
2708000
|
trusted library allocation
|
page read and write
|
||
2E2C3E30000
|
heap
|
page read and write
|
||
12781000
|
trusted library allocation
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
990000
|
heap
|
page read and write
|
||
12ACF000
|
trusted library allocation
|
page read and write
|
||
126B1000
|
trusted library allocation
|
page read and write
|
||
7FF848F63000
|
trusted library allocation
|
page read and write
|
||
1B759000
|
heap
|
page read and write
|
||
19E80CAA000
|
heap
|
page read and write
|
||
10E3000
|
stack
|
page read and write
|
||
27CB000
|
trusted library allocation
|
page read and write
|
||
7FF848E91000
|
trusted library allocation
|
page execute and read and write
|
||
3E0000
|
heap
|
page read and write
|
||
33A3000
|
trusted library allocation
|
page read and write
|
||
2DAB000
|
trusted library allocation
|
page read and write
|
||
62C000
|
heap
|
page read and write
|
||
1AE4B000
|
heap
|
page read and write
|
||
1288A000
|
trusted library allocation
|
page read and write
|
||
3149000
|
trusted library allocation
|
page read and write
|
||
652000
|
heap
|
page read and write
|
||
2718000
|
trusted library allocation
|
page read and write
|
||
2C82000
|
trusted library allocation
|
page read and write
|
||
7FF848F03000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
2DCD000
|
trusted library allocation
|
page read and write
|
||
2A57000
|
trusted library allocation
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
2A86A3B0000
|
direct allocation
|
page read and write
|
||
2A86A10C000
|
heap
|
page read and write
|
||
23076974000
|
heap
|
page read and write
|
||
28A9000
|
trusted library allocation
|
page read and write
|
||
2A86A13B000
|
heap
|
page read and write
|
||
26AB000
|
trusted library allocation
|
page read and write
|
||
19E80CEC000
|
heap
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
2AF5000
|
trusted library allocation
|
page read and write
|
||
7FF848F28000
|
trusted library allocation
|
page read and write
|
||
348D000
|
trusted library allocation
|
page read and write
|
||
175DBE00000
|
heap
|
page read and write
|
||
3169000
|
trusted library allocation
|
page read and write
|
||
1B0B0000
|
heap
|
page read and write
|
||
34C8000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
2AB7000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
258D000
|
trusted library allocation
|
page read and write
|
||
2909000
|
trusted library allocation
|
page read and write
|
||
2A86A177000
|
heap
|
page read and write
|
||
2A86A3D0000
|
direct allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
2DD69F5000
|
stack
|
page read and write
|
||
1B968000
|
heap
|
page read and write
|
||
7FF848F55000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F55000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
7FF848F8D000
|
trusted library allocation
|
page read and write
|
||
76000
|
unkown
|
page readonly
|
||
1AE9E000
|
heap
|
page read and write
|
||
7FF848F28000
|
trusted library allocation
|
page read and write
|
||
7FF848D7C000
|
trusted library allocation
|
page read and write
|
||
1AE10000
|
heap
|
page read and write
|
||
2AD18A40000
|
heap
|
page read and write
|
||
7FF848D53000
|
trusted library allocation
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
1B950000
|
heap
|
page execute and read and write
|
||
1ACEA081000
|
heap
|
page read and write
|
||
2F72000
|
trusted library allocation
|
page read and write
|
||
15C9000
|
heap
|
page read and write
|
||
A0C000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
33AE000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
258F000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
318C000
|
trusted library allocation
|
page read and write
|
||
23076971000
|
heap
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
1AF9F000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page execute and read and write
|
||
23076972000
|
heap
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
1B95D000
|
stack
|
page read and write
|
||
2610000
|
trusted library allocation
|
page read and write
|
||
2C08000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
2A86000
|
trusted library allocation
|
page read and write
|
||
7FF848D33000
|
trusted library allocation
|
page execute and read and write
|
||
31B8000
|
trusted library allocation
|
page read and write
|
||
3181000
|
trusted library allocation
|
page read and write
|
||
E41000
|
heap
|
page read and write
|
||
3135000
|
trusted library allocation
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
AAB000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
2A86A15C000
|
heap
|
page read and write
|
||
1641000
|
heap
|
page read and write
|
||
19E80C20000
|
heap
|
page read and write
|
||
2B5B000
|
trusted library allocation
|
page read and write
|
||
34A0000
|
trusted library allocation
|
page read and write
|
||
2EF4000
|
trusted library allocation
|
page read and write
|
||
7FF848F47000
|
trusted library allocation
|
page read and write
|
||
1B600000
|
heap
|
page read and write
|
||
7FF848D48000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
805000
|
heap
|
page read and write
|
||
7FF848D53000
|
trusted library allocation
|
page read and write
|
||
AD1000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
7FF848E2C000
|
trusted library allocation
|
page execute and read and write
|
||
2E2C3E10000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
2A6C000
|
trusted library allocation
|
page read and write
|
||
7FF848F4C000
|
trusted library allocation
|
page read and write
|
||
14BE000
|
stack
|
page read and write
|
||
1B00000
|
heap
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page read and write
|
||
7FF848F18000
|
trusted library allocation
|
page read and write
|
||
1E5E73DA000
|
heap
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
1ACE9FE0000
|
heap
|
page read and write
|
||
B02000
|
heap
|
page read and write
|
||
F13000
|
heap
|
page read and write
|
||
7FF848F77000
|
trusted library allocation
|
page read and write
|
||
7FF848D78000
|
trusted library allocation
|
page read and write
|
||
126A7000
|
trusted library allocation
|
page read and write
|
||
31B2000
|
trusted library allocation
|
page read and write
|
||
26ED000
|
trusted library allocation
|
page read and write
|
||
2A82000
|
trusted library allocation
|
page read and write
|
||
292A000
|
trusted library allocation
|
page read and write
|
||
182F000
|
stack
|
page read and write
|
||
1B605000
|
heap
|
page read and write
|
||
7FF848F85000
|
trusted library allocation
|
page read and write
|
||
1B4BD000
|
stack
|
page read and write
|
||
1AFC2000
|
unkown
|
page readonly
|
||
1600000
|
heap
|
page read and write
|
||
2A86A370000
|
direct allocation
|
page read and write
|
||
1131000
|
heap
|
page read and write
|
||
7FF848E56000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F4E000
|
trusted library allocation
|
page read and write
|
||
175DBD20000
|
heap
|
page read and write
|
||
282E000
|
trusted library allocation
|
page read and write
|
||
3203000
|
trusted library allocation
|
page read and write
|
||
19E82680000
|
direct allocation
|
page read and write
|
||
12AB8000
|
trusted library allocation
|
page read and write
|
||
7FF848DF6000
|
trusted library allocation
|
page read and write
|
||
E74000
|
heap
|
page read and write
|
||
3621000
|
trusted library allocation
|
page read and write
|
||
2816000
|
trusted library allocation
|
page read and write
|
||
3659000
|
trusted library allocation
|
page read and write
|
||
DCE000
|
stack
|
page read and write
|
||
3420000
|
trusted library allocation
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
1D4FE000
|
stack
|
page read and write
|
||
312F000
|
trusted library allocation
|
page read and write
|
||
1B390000
|
heap
|
page execute and read and write
|
||
D40000
|
heap
|
page read and write
|
||
2A4B000
|
trusted library allocation
|
page read and write
|
||
7FF848F77000
|
trusted library allocation
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
2A86A144000
|
heap
|
page read and write
|
||
33B2000
|
trusted library allocation
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
27AF000
|
stack
|
page read and write
|
||
1B765000
|
heap
|
page read and write
|
||
2A86A14A000
|
heap
|
page read and write
|
||
2F07000
|
trusted library allocation
|
page read and write
|
||
CCE000
|
stack
|
page read and write
|
||
1B790000
|
heap
|
page read and write
|
||
2A7B000
|
trusted library allocation
|
page read and write
|
||
2825000
|
trusted library allocation
|
page read and write
|
||
1BE4E000
|
stack
|
page read and write
|
||
12B05000
|
trusted library allocation
|
page read and write
|
||
D02000
|
heap
|
page read and write
|
||
7FF848F57000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
64A000
|
heap
|
page read and write
|
||
B0F000
|
stack
|
page read and write
|
||
2823000
|
trusted library allocation
|
page read and write
|
||
13431000
|
trusted library allocation
|
page read and write
|
||
1B6F0000
|
heap
|
page read and write
|
||
1C4FE000
|
stack
|
page read and write
|
||
73E000
|
stack
|
page read and write
|
||
19E80C9F000
|
heap
|
page read and write
|
||
1BE00000
|
heap
|
page read and write
|
||
2860000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
2A59000
|
trusted library allocation
|
page read and write
|
||
7FF848F64000
|
trusted library allocation
|
page read and write
|
||
7FF848D5C000
|
trusted library allocation
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
1ACEA081000
|
heap
|
page read and write
|
||
2A86A178000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
19E80DF0000
|
direct allocation
|
page read and write
|
||
7FF848F64000
|
trusted library allocation
|
page read and write
|
||
7FF848D54000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F08000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
D80000
|
heap
|
page read and write
|
||
3637000
|
trusted library allocation
|
page read and write
|
||
7FF848F63000
|
trusted library allocation
|
page read and write
|
||
7FF848F34000
|
trusted library allocation
|
page read and write
|
||
C4C63F5000
|
stack
|
page read and write
|
||
5C786FF000
|
stack
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
1713000
|
heap
|
page read and write
|
||
2A86BC20000
|
direct allocation
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D5C000
|
trusted library allocation
|
page read and write
|
||
3189000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
1ACEA082000
|
heap
|
page read and write
|
||
1357F000
|
trusted library allocation
|
page read and write
|
||
7FF848F63000
|
trusted library allocation
|
page read and write
|
||
1B72E000
|
heap
|
page read and write
|
||
7FF848D8C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F5C000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
7FF848EEC000
|
trusted library allocation
|
page read and write
|
||
7FF848D32000
|
trusted library allocation
|
page read and write
|
||
19E82760000
|
heap
|
page read and write
|
||
1699000
|
heap
|
page read and write
|
||
1B682000
|
heap
|
page read and write
|
||
25A2000
|
trusted library allocation
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
126A1000
|
trusted library allocation
|
page read and write
|
||
30D0000
|
trusted library allocation
|
page read and write
|
||
1C4CE000
|
stack
|
page read and write
|
||
12AAB000
|
trusted library allocation
|
page read and write
|
||
7FF848DCC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D53000
|
trusted library allocation
|
page read and write
|
||
2DD6DFF000
|
stack
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
25F4000
|
trusted library allocation
|
page read and write
|
||
19E80C8D000
|
heap
|
page read and write
|
||
2FAD000
|
trusted library allocation
|
page read and write
|
||
2835000
|
trusted library allocation
|
page read and write
|
||
334A000
|
heap
|
page read and write
|
||
2A51000
|
trusted library allocation
|
page read and write
|
||
285B000
|
trusted library allocation
|
page read and write
|
||
320C000
|
trusted library allocation
|
page read and write
|
||
629000
|
heap
|
page read and write
|
||
CFF000
|
stack
|
page read and write
|
||
1BF02000
|
heap
|
page execute and read and write
|
||
2A86A158000
|
heap
|
page read and write
|
||
175DC050000
|
heap
|
page read and write
|
||
157B000
|
heap
|
page read and write
|
||
1C623000
|
heap
|
page read and write
|
||
2A86BCA0000
|
direct allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
13180000
|
trusted library allocation
|
page read and write
|
||
2F12000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
302A000
|
trusted library allocation
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
12A50000
|
trusted library allocation
|
page read and write
|
||
1B77D000
|
heap
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
7FF848F3D000
|
trusted library allocation
|
page read and write
|
||
1AE2D000
|
heap
|
page read and write
|
||
361B000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
2A86A14C000
|
heap
|
page read and write
|
||
25A4000
|
trusted library allocation
|
page read and write
|
||
271F000
|
trusted library allocation
|
page read and write
|
||
7FF848F5E000
|
trusted library allocation
|
page read and write
|
||
7FF848F3C000
|
trusted library allocation
|
page read and write
|
||
1ACEA081000
|
heap
|
page read and write
|
||
128D8000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
12451000
|
trusted library allocation
|
page read and write
|
||
7FF848D84000
|
trusted library allocation
|
page read and write
|
||
1AA1D000
|
stack
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
1B69A000
|
stack
|
page read and write
|
||
23076910000
|
heap
|
page read and write
|
||
361D000
|
trusted library allocation
|
page read and write
|
||
287D000
|
trusted library allocation
|
page read and write
|
||
33A8000
|
trusted library allocation
|
page read and write
|
||
2D5E000
|
trusted library allocation
|
page read and write
|
||
16B6000
|
heap
|
page read and write
|
||
19E80C7C000
|
heap
|
page read and write
|
||
7FF848D9C000
|
trusted library allocation
|
page execute and read and write
|
||
1BCFF000
|
stack
|
page read and write
|
||
1B21D000
|
stack
|
page read and write
|
||
3024000
|
trusted library allocation
|
page read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
34B7000
|
trusted library allocation
|
page read and write
|
||
2646000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
259F000
|
stack
|
page read and write
|
||
1E5E74E0000
|
heap
|
page read and write
|
||
1C9FE000
|
stack
|
page read and write
|
||
289F000
|
stack
|
page read and write
|
||
3079000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
2F5B000
|
trusted library allocation
|
page read and write
|
||
1E602500000
|
heap
|
page read and write
|
||
2828000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
DA0000
|
trusted library allocation
|
page read and write
|
||
2E2C4000000
|
heap
|
page read and write
|
||
11EE000
|
heap
|
page read and write
|
||
34C0000
|
trusted library allocation
|
page read and write
|
||
19E80C7E000
|
heap
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page execute and read and write
|
||
19E80D97000
|
direct allocation
|
page read and write
|
||
38BB000
|
trusted library allocation
|
page read and write
|
||
3648000
|
trusted library allocation
|
page read and write
|
||
2C7B000
|
trusted library allocation
|
page read and write
|
||
1B13E000
|
stack
|
page read and write
|
||
2AD189B0000
|
heap
|
page read and write
|
||
A41000
|
heap
|
page read and write
|
||
258B000
|
trusted library allocation
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
3181000
|
trusted library allocation
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page execute and read and write
|
||
3234000
|
trusted library allocation
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
12FE1000
|
trusted library allocation
|
page read and write
|
||
19E80CF0000
|
heap
|
page read and write
|
||
7FF848FD5000
|
trusted library allocation
|
page read and write
|
||
3230000
|
trusted library allocation
|
page read and write
|
||
2AE1000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
2F4F000
|
trusted library allocation
|
page read and write
|
||
2AD9000
|
trusted library allocation
|
page read and write
|
||
23B0000
|
unkown
|
page readonly
|
||
1BB02000
|
heap
|
page execute and read and write
|
||
3126000
|
trusted library allocation
|
page read and write
|
||
2EE1000
|
trusted library allocation
|
page read and write
|
||
7FF848DF6000
|
trusted library allocation
|
page read and write
|
||
230768D0000
|
heap
|
page read and write
|
||
C5A867F000
|
stack
|
page read and write
|
||
2907000
|
trusted library allocation
|
page read and write
|
||
125C8000
|
trusted library allocation
|
page read and write
|
||
1AF5E000
|
stack
|
page read and write
|
||
7FF848D8C000
|
trusted library allocation
|
page execute and read and write
|
||
1BA00000
|
heap
|
page read and write
|
||
3241000
|
trusted library allocation
|
page read and write
|
||
2B1D000
|
trusted library allocation
|
page read and write
|
||
72000
|
unkown
|
page readonly
|
||
115F000
|
heap
|
page read and write
|
||
1B23F000
|
stack
|
page read and write
|
||
7FF848F63000
|
trusted library allocation
|
page read and write
|
||
26F4000
|
trusted library allocation
|
page read and write
|
||
2D48000
|
trusted library allocation
|
page read and write
|
||
7FF848EF3000
|
trusted library allocation
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page execute and read and write
|
||
136B000
|
heap
|
page read and write
|
||
678000
|
heap
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
97E000
|
stack
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page read and write
|
||
2A3F000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page execute and read and write
|
||
34A4000
|
trusted library allocation
|
page read and write
|
||
1B930000
|
heap
|
page read and write
|
||
2EE4000
|
trusted library allocation
|
page read and write
|
||
19E80CE5000
|
heap
|
page read and write
|
||
3192000
|
trusted library allocation
|
page read and write
|
||
29F6000
|
trusted library allocation
|
page read and write
|
||
1C502000
|
heap
|
page execute and read and write
|
||
1B75F000
|
heap
|
page read and write
|
||
1B02000
|
heap
|
page read and write
|
||
1510000
|
trusted library allocation
|
page read and write
|
||
34A6000
|
trusted library allocation
|
page read and write
|
||
7FF848F18000
|
trusted library allocation
|
page read and write
|
||
1BF5E000
|
stack
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
1B18E000
|
stack
|
page read and write
|
||
34A0000
|
trusted library allocation
|
page read and write
|
||
7FF849062000
|
trusted library allocation
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
2A12000
|
trusted library allocation
|
page read and write
|
||
B13000
|
heap
|
page read and write
|
||
12B48000
|
trusted library allocation
|
page read and write
|
||
2A86A450000
|
heap
|
page read and write
|
||
26DD000
|
trusted library allocation
|
page read and write
|
||
1B59E000
|
stack
|
page read and write
|
||
3175000
|
trusted library allocation
|
page read and write
|
||
1BDBE000
|
stack
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
34A4000
|
trusted library allocation
|
page read and write
|
||
3B2000
|
stack
|
page read and write
|
||
38BE000
|
trusted library allocation
|
page read and write
|
||
13270000
|
trusted library allocation
|
page read and write
|
||
7D6000
|
heap
|
page read and write
|
||
B02000
|
heap
|
page read and write
|
||
C4C65FE000
|
stack
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
10F0000
|
heap
|
page read and write
|
||
2A86A410000
|
direct allocation
|
page read and write
|
||
3491000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page execute and read and write
|
||
30C1000
|
trusted library allocation
|
page read and write
|
||
1B73C000
|
heap
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page execute and read and write
|
||
1646000
|
heap
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
3283000
|
trusted library allocation
|
page read and write
|
||
319D000
|
trusted library allocation
|
page read and write
|
||
7FF848D8B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F74000
|
trusted library allocation
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
2A86A10A000
|
heap
|
page read and write
|
||
2721000
|
trusted library allocation
|
page read and write
|
||
5C785FE000
|
unkown
|
page read and write
|
||
1BA56000
|
heap
|
page read and write
|
||
1ACEA2D0000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
2B0D000
|
trusted library allocation
|
page read and write
|
||
1B90C000
|
stack
|
page read and write
|
||
2A86A175000
|
heap
|
page read and write
|
||
125A1000
|
trusted library allocation
|
page read and write
|
||
2851000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
7FF848F7E000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
trusted library allocation
|
page read and write
|
||
19E80CB5000
|
heap
|
page read and write
|
||
2E20000
|
heap
|
page execute and read and write
|
||
19E80E30000
|
direct allocation
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
2A86A126000
|
heap
|
page read and write
|
||
2B4C000
|
trusted library allocation
|
page read and write
|
||
2F14000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page execute and read and write
|
||
2853000
|
trusted library allocation
|
page read and write
|
||
7FF848F1A000
|
trusted library allocation
|
page read and write
|
||
7FF848F6C000
|
trusted library allocation
|
page read and write
|
||
19E80C9F000
|
heap
|
page read and write
|
||
1AFA2000
|
unkown
|
page readonly
|
||
26AA000
|
heap
|
page read and write
|
||
2AD18A4A000
|
heap
|
page read and write
|
||
2E2C3E00000
|
heap
|
page read and write
|
||
7FF848F75000
|
trusted library allocation
|
page read and write
|
||
317F000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
26A1000
|
trusted library allocation
|
page read and write
|
||
131FF000
|
trusted library allocation
|
page read and write
|
||
1B49E000
|
stack
|
page read and write
|
||
124D1000
|
trusted library allocation
|
page read and write
|
||
E24000
|
heap
|
page read and write
|
||
7FF848D72000
|
trusted library allocation
|
page read and write
|
||
1AE6C000
|
heap
|
page read and write
|
||
26E3000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
trusted library allocation
|
page read and write
|
||
13357000
|
trusted library allocation
|
page read and write
|
||
130C1000
|
trusted library allocation
|
page read and write
|
||
65000
|
unkown
|
page readonly
|
||
26E5000
|
trusted library allocation
|
page read and write
|
||
2A86A12F000
|
heap
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
2880000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
3140000
|
trusted library allocation
|
page read and write
|
||
2A79000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
318E000
|
trusted library allocation
|
page read and write
|
||
23076972000
|
heap
|
page read and write
|
||
31AD000
|
trusted library allocation
|
page read and write
|
||
1B2AF000
|
stack
|
page read and write
|
||
7FF848F3C000
|
trusted library allocation
|
page read and write
|
||
2A86A0E0000
|
heap
|
page read and write
|
||
7FF848EF8000
|
trusted library allocation
|
page read and write
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
7FF848F23000
|
trusted library allocation
|
page read and write
|
||
7FF848F2C000
|
trusted library allocation
|
page read and write
|
||
12FD000
|
heap
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
1AE39000
|
heap
|
page read and write
|
||
ADB000
|
heap
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
1C3AB000
|
stack
|
page read and write
|
||
2FA2000
|
trusted library allocation
|
page read and write
|
||
19E80C7C000
|
heap
|
page read and write
|
||
19E80CD9000
|
heap
|
page read and write
|
||
3131000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
2F05000
|
trusted library allocation
|
page read and write
|
||
1AFA0000
|
unkown
|
page readonly
|
||
7FF848D9C000
|
trusted library allocation
|
page execute and read and write
|
||
26B0000
|
trusted library allocation
|
page read and write
|
||
F02000
|
heap
|
page read and write
|
||
2AC1000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
1D0D0000
|
heap
|
page execute and read and write
|
||
A3F000
|
heap
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F3D000
|
trusted library allocation
|
page read and write
|
||
363F000
|
trusted library allocation
|
page read and write
|
||
1AFD8000
|
unkown
|
page readonly
|
||
7FF848F27000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
1ACE9FC0000
|
heap
|
page read and write
|
||
1C444000
|
heap
|
page read and write
|
||
7FF8491ED000
|
trusted library allocation
|
page read and write
|
||
ED1000
|
heap
|
page read and write
|
||
1AF02000
|
heap
|
page execute and read and write
|
||
7FF848D3D000
|
trusted library allocation
|
page execute and read and write
|
||
3120000
|
trusted library allocation
|
page read and write
|
||
2B01000
|
trusted library allocation
|
page read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
950000
|
heap
|
page read and write
|
||
7FF848D9B000
|
trusted library allocation
|
page execute and read and write
|
||
1ACEA084000
|
heap
|
page read and write
|
||
1E5E75C0000
|
heap
|
page read and write
|
||
2E2F000
|
trusted library allocation
|
page read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
7FF848EF8000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page execute and read and write
|
||
16D0000
|
heap
|
page read and write
|
||
3204000
|
trusted library allocation
|
page read and write
|
||
19E80C96000
|
heap
|
page read and write
|
||
1B65A000
|
heap
|
page read and write
|
||
12750000
|
trusted library allocation
|
page read and write
|
||
16CE000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
1E602608000
|
heap
|
page read and write
|
||
12DA7000
|
trusted library allocation
|
page read and write
|
||
32000
|
unkown
|
page readonly
|
||
269E000
|
stack
|
page read and write
|
||
1850000
|
heap
|
page read and write
|
||
7FF8492D0000
|
trusted library allocation
|
page read and write
|
||
2A86BC60000
|
direct allocation
|
page read and write
|
||
1AE67000
|
heap
|
page read and write
|
||
641000
|
heap
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
7FF848F16000
|
trusted library allocation
|
page read and write
|
||
D9E3DFE000
|
stack
|
page read and write
|
||
128A7000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
1AE09000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
33AB000
|
trusted library allocation
|
page read and write
|
||
7FF848EE8000
|
trusted library allocation
|
page read and write
|
||
19E80CEC000
|
heap
|
page read and write
|
||
7FF848EB1000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
234A000
|
heap
|
page read and write
|
||
7FF848DCC000
|
trusted library allocation
|
page execute and read and write
|
||
830000
|
trusted library allocation
|
page read and write
|
||
1BF4D000
|
stack
|
page read and write
|
||
2A86A175000
|
heap
|
page read and write
|
||
2FD1000
|
trusted library allocation
|
page read and write
|
||
2EC5000
|
trusted library allocation
|
page read and write
|
||
19E80CD0000
|
heap
|
page read and write
|
||
D9E3CFC000
|
stack
|
page read and write
|
||
19E8260D000
|
direct allocation
|
page read and write
|
||
31B6000
|
trusted library allocation
|
page read and write
|
||
129A000
|
heap
|
page read and write
|
||
7FF848D78000
|
trusted library allocation
|
page read and write
|
||
26FF000
|
trusted library allocation
|
page read and write
|
||
19E80CEC000
|
heap
|
page read and write
|
||
1B6FA000
|
heap
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
23076972000
|
heap
|
page read and write
|
||
A11000
|
heap
|
page read and write
|
||
1B38B000
|
stack
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page execute and read and write
|
||
290F000
|
trusted library allocation
|
page read and write
|
||
2F7D000
|
trusted library allocation
|
page read and write
|
||
A98000
|
heap
|
page read and write
|
||
7FF848DE6000
|
trusted library allocation
|
page read and write
|
||
23B2000
|
unkown
|
page readonly
|
||
67000
|
unkown
|
page readonly
|
||
16D5000
|
heap
|
page read and write
|
||
684000
|
heap
|
page read and write
|
||
1ACEA040000
|
heap
|
page read and write
|
||
32AF7FE000
|
stack
|
page read and write
|
||
14E3000
|
stack
|
page read and write
|
||
10E3000
|
stack
|
page read and write
|
||
317E000
|
trusted library allocation
|
page read and write
|
||
123E000
|
heap
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
1B880000
|
heap
|
page read and write
|
||
1B798000
|
heap
|
page read and write
|
||
2A86A13B000
|
heap
|
page read and write
|
||
1C6FE000
|
stack
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
3142000
|
trusted library allocation
|
page read and write
|
||
7FF848F38000
|
trusted library allocation
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
2D77000
|
trusted library allocation
|
page read and write
|
||
7FF848F44000
|
trusted library allocation
|
page read and write
|
||
23076972000
|
heap
|
page read and write
|
||
1B654000
|
heap
|
page read and write
|
||
7FF848F64000
|
trusted library allocation
|
page read and write
|
||
361F000
|
trusted library allocation
|
page read and write
|
||
2330000
|
heap
|
page read and write
|
||
2AFF000
|
trusted library allocation
|
page read and write
|
||
33A5000
|
trusted library allocation
|
page read and write
|
||
19E80CEF000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
7FF848D58000
|
trusted library allocation
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page read and write
|
||
7FF848F74000
|
trusted library allocation
|
page read and write
|
||
1133000
|
heap
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
11CF000
|
stack
|
page read and write
|
||
2A86BC0D000
|
direct allocation
|
page read and write
|
||
7FF848D8B000
|
trusted library allocation
|
page execute and read and write
|
||
11D0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
7FF848EC1000
|
trusted library allocation
|
page execute and read and write
|
||
34C4000
|
trusted library allocation
|
page read and write
|
||
19E80D79000
|
direct allocation
|
page read and write
|
||
2A86A0B0000
|
heap
|
page read and write
|
||
12457000
|
trusted library allocation
|
page read and write
|
||
7FF849320000
|
trusted library allocation
|
page execute and read and write
|
||
3236000
|
trusted library allocation
|
page read and write
|
||
7FF848E56000
|
trusted library allocation
|
page execute and read and write
|
||
A00000
|
heap
|
page read and write
|
||
7FF848E1C000
|
trusted library allocation
|
page execute and read and write
|
||
1AE8C000
|
heap
|
page read and write
|
||
33B0000
|
trusted library allocation
|
page read and write
|
||
31A2000
|
trusted library allocation
|
page read and write
|
||
25C4000
|
trusted library allocation
|
page read and write
|
||
7FF849330000
|
trusted library allocation
|
page read and write
|
||
132C7000
|
trusted library allocation
|
page read and write
|
||
19E80C98000
|
heap
|
page read and write
|
||
7FF848D33000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page read and write
|
||
348F000
|
trusted library allocation
|
page read and write
|
||
1B624000
|
heap
|
page read and write
|
||
3201000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
310F000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
297D000
|
trusted library allocation
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
19E80C89000
|
heap
|
page read and write
|
||
313F000
|
trusted library allocation
|
page read and write
|
||
160B000
|
heap
|
page read and write
|
||
7FF848F3C000
|
trusted library allocation
|
page read and write
|
||
33D0000
|
heap
|
page execute and read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
2AD18990000
|
heap
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
10FC000
|
heap
|
page read and write
|
||
128B1000
|
trusted library allocation
|
page read and write
|
||
2763000
|
trusted library allocation
|
page read and write
|
||
2A86A10E000
|
heap
|
page read and write
|
||
1B53D000
|
stack
|
page read and write
|
||
1D0FE000
|
stack
|
page read and write
|
||
1AE99000
|
heap
|
page read and write
|
||
12A92000
|
trusted library allocation
|
page read and write
|
||
317B000
|
trusted library allocation
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
3166000
|
trusted library allocation
|
page read and write
|
||
7FF849217000
|
trusted library allocation
|
page read and write
|
||
19E82685000
|
direct allocation
|
page read and write
|
||
7FF848DE6000
|
trusted library allocation
|
page read and write
|
||
7FF848EB1000
|
trusted library allocation
|
page execute and read and write
|
||
1E602420000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
3183000
|
trusted library allocation
|
page read and write
|
||
2716000
|
trusted library allocation
|
page read and write
|
||
30BF000
|
stack
|
page read and write
|
||
305F000
|
trusted library allocation
|
page read and write
|
||
19E80CA4000
|
heap
|
page read and write
|
||
2818000
|
trusted library allocation
|
page read and write
|
||
7FF848F3C000
|
trusted library allocation
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
7FF848D9C000
|
trusted library allocation
|
page execute and read and write
|
||
1D200000
|
heap
|
page read and write
|
||
1AFE2000
|
unkown
|
page readonly
|
||
1AE20000
|
heap
|
page read and write
|
||
7FF848D83000
|
trusted library allocation
|
page read and write
|
||
1AE36000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
1B68F000
|
heap
|
page read and write
|
||
7FF848F16000
|
trusted library allocation
|
page read and write
|
||
7FF848EF8000
|
trusted library allocation
|
page read and write
|
||
1AE7E000
|
heap
|
page read and write
|
||
1BB7E000
|
stack
|
page read and write
|
||
2A86A13B000
|
heap
|
page read and write
|
||
1B17E000
|
heap
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
2A86A10C000
|
heap
|
page read and write
|
||
2A86A0A0000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page execute and read and write
|
||
7FF849300000
|
trusted library allocation
|
page read and write
|
||
2A86A164000
|
heap
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
7FF848F26000
|
trusted library allocation
|
page read and write
|
||
E32000
|
heap
|
page read and write
|
||
12DA1000
|
trusted library allocation
|
page read and write
|
||
1B638000
|
heap
|
page read and write
|
||
1B910000
|
heap
|
page read and write
|
||
7FF848F55000
|
trusted library allocation
|
page read and write
|
||
1BA44000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
699000
|
heap
|
page read and write
|
||
2C79000
|
trusted library allocation
|
page read and write
|
||
7FF848F23000
|
trusted library allocation
|
page read and write
|
||
64F000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
1B633000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
E6807BC000
|
stack
|
page read and write
|
||
135C1000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
3634000
|
trusted library allocation
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
2AD18980000
|
heap
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page execute and read and write
|
||
34C2000
|
trusted library allocation
|
page read and write
|
||
1BA52000
|
heap
|
page read and write
|
||
3652000
|
trusted library allocation
|
page read and write
|
||
2A4B000
|
trusted library allocation
|
page read and write
|
||
2A86A160000
|
heap
|
page read and write
|
||
7FF848F6D000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
7FF848F45000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
7FF848F5D000
|
trusted library allocation
|
page read and write
|
||
2A28000
|
trusted library allocation
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
7FF848F83000
|
trusted library allocation
|
page read and write
|
||
2A14000
|
trusted library allocation
|
page read and write
|
||
2A18000
|
trusted library allocation
|
page read and write
|
||
19E80CA4000
|
heap
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page read and write
|
||
12FCF000
|
trusted library allocation
|
page read and write
|
||
12DD000
|
heap
|
page read and write
|
||
28B0000
|
trusted library allocation
|
page read and write
|
||
1B983000
|
heap
|
page read and write
|
||
26F7000
|
trusted library allocation
|
page read and write
|
||
1B6B9000
|
heap
|
page read and write
|
||
115C000
|
heap
|
page read and write
|
||
AB6000
|
heap
|
page read and write
|
||
128CF000
|
trusted library allocation
|
page read and write
|
||
134F1000
|
trusted library allocation
|
page read and write
|
||
23076971000
|
heap
|
page read and write
|
||
2793000
|
trusted library allocation
|
page read and write
|
||
284F000
|
trusted library allocation
|
page read and write
|
||
2310000
|
heap
|
page execute and read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
7FF848D62000
|
trusted library allocation
|
page read and write
|
||
7FF848D4C000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D88000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
1B9F0000
|
heap
|
page read and write
|
||
7FF848F2D000
|
trusted library allocation
|
page read and write
|
||
1AF5E000
|
stack
|
page read and write
|
||
7FF848F5D000
|
trusted library allocation
|
page read and write
|
||
2A16000
|
trusted library allocation
|
page read and write
|
||
1AB1D000
|
stack
|
page read and write
|
||
325A000
|
trusted library allocation
|
page read and write
|
||
1B79B000
|
stack
|
page read and write
|
||
26DB000
|
trusted library allocation
|
page read and write
|
||
319F000
|
trusted library allocation
|
page read and write
|
||
1AD60000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
19E80CE7000
|
heap
|
page read and write
|
||
2D9F000
|
trusted library allocation
|
page read and write
|
||
1ACEA081000
|
heap
|
page read and write
|
||
27F2000
|
trusted library allocation
|
page read and write
|
||
1B640000
|
heap
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
658000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page execute and read and write
|
||
18D0000
|
heap
|
page read and write
|
||
26F4000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page execute and read and write
|
||
25AB000
|
trusted library allocation
|
page read and write
|
||
128F1000
|
trusted library allocation
|
page read and write
|
||
6B4000
|
heap
|
page read and write
|
||
1B675000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
7FF848F9D000
|
trusted library allocation
|
page read and write
|
||
1B952000
|
heap
|
page read and write
|
||
14EE000
|
stack
|
page read and write
|
||
2F16000
|
trusted library allocation
|
page read and write
|
||
19E80BB0000
|
heap
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
12A0F000
|
trusted library allocation
|
page read and write
|
||
26E1000
|
trusted library allocation
|
page read and write
|
||
2A86A350000
|
direct allocation
|
page read and write
|
||
7FF848D58000
|
trusted library allocation
|
page read and write
|
||
7FF848F7E000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
12FD7000
|
trusted library allocation
|
page read and write
|
||
7FF849212000
|
trusted library allocation
|
page read and write
|
||
1E5E73D7000
|
heap
|
page read and write
|
||
2A86A11A000
|
heap
|
page read and write
|
||
19E82600000
|
direct allocation
|
page read and write
|
||
1ACEA04B000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
122D000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page execute and read and write
|
||
2859000
|
trusted library allocation
|
page read and write
|
||
7FF848F5E000
|
trusted library allocation
|
page read and write
|
||
1B0E6000
|
heap
|
page read and write
|
||
30C3000
|
trusted library allocation
|
page read and write
|
||
26A9000
|
trusted library allocation
|
page read and write
|
||
348B000
|
trusted library allocation
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page execute and read and write
|
||
3632000
|
trusted library allocation
|
page read and write
|
||
1B960000
|
heap
|
page read and write
|
||
C5A831C000
|
stack
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
1A02000
|
heap
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F28000
|
trusted library allocation
|
page read and write
|
||
1E6025F0000
|
heap
|
page read and write
|
||
7FF848F1A000
|
trusted library allocation
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
1C635000
|
heap
|
page read and write
|
||
2ACF000
|
trusted library allocation
|
page read and write
|
||
1585000
|
heap
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page execute and read and write
|
||
31A1000
|
trusted library allocation
|
page read and write
|
||
27F6000
|
trusted library allocation
|
page read and write
|
||
12981000
|
trusted library allocation
|
page read and write
|
||
32B0000
|
heap
|
page execute and read and write
|
||
2B41000
|
trusted library allocation
|
page read and write
|
||
7FF848F2A000
|
trusted library allocation
|
page read and write
|
||
13690000
|
trusted library allocation
|
page read and write
|
||
C5A839F000
|
stack
|
page read and write
|
||
1BE44000
|
heap
|
page read and write
|
||
E46000
|
heap
|
page read and write
|
||
2451000
|
trusted library allocation
|
page read and write
|
||
12A5000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
1ACE9FB0000
|
heap
|
page read and write
|
||
19E80CBE000
|
heap
|
page read and write
|
||
19E80D50000
|
direct allocation
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
923000
|
stack
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
7FF848EFA000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page execute and read and write
|
||
7FF848F6D000
|
trusted library allocation
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
7FF848F6D000
|
trusted library allocation
|
page read and write
|
||
7FF848D53000
|
trusted library allocation
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
7FF848F75000
|
trusted library allocation
|
page read and write
|
||
3625000
|
trusted library allocation
|
page read and write
|
||
19E80C9F000
|
heap
|
page read and write
|
||
7FF848EB1000
|
trusted library allocation
|
page execute and read and write
|
||
2A86A167000
|
heap
|
page read and write
|
||
1BCEE000
|
stack
|
page read and write
|
||
2746000
|
trusted library allocation
|
page read and write
|
||
7FF848F2C000
|
trusted library allocation
|
page read and write
|
||
A6B000
|
heap
|
page read and write
|
||
131F0000
|
trusted library allocation
|
page read and write
|
||
1C253000
|
heap
|
page read and write
|
||
7FF848F44000
|
trusted library allocation
|
page read and write
|
||
2DAB000
|
trusted library allocation
|
page read and write
|
||
2FDB000
|
trusted library allocation
|
page read and write
|
||
7FF848D34000
|
trusted library allocation
|
page read and write
|
||
29F2000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
EB1000
|
heap
|
page read and write
|
||
A06000
|
heap
|
page read and write
|
||
12E81000
|
trusted library allocation
|
page read and write
|
||
A33000
|
heap
|
page read and write
|
||
19E80C8A000
|
heap
|
page read and write
|
||
5E0000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
2987000
|
trusted library allocation
|
page read and write
|
||
7FF848F34000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
2B29000
|
trusted library allocation
|
page read and write
|
||
31FF000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
3DE76FF000
|
unkown
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
7FF848F18000
|
trusted library allocation
|
page read and write
|
||
2DA7000
|
trusted library allocation
|
page read and write
|
||
2460000
|
trusted library allocation
|
page read and write
|
||
A7F000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
26C5000
|
trusted library allocation
|
page read and write
|
||
2B37000
|
trusted library allocation
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E91000
|
trusted library allocation
|
page execute and read and write
|
||
2EF6000
|
trusted library allocation
|
page read and write
|
||
23076972000
|
heap
|
page read and write
|
||
1283D000
|
trusted library allocation
|
page read and write
|
||
2DA3000
|
trusted library allocation
|
page read and write
|
||
1B70E000
|
heap
|
page read and write
|
||
175DBE50000
|
heap
|
page read and write
|
||
3360000
|
trusted library allocation
|
page read and write
|
||
7FF848D34000
|
trusted library allocation
|
page read and write
|
||
19E80CD2000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
162D000
|
heap
|
page read and write
|
||
702000
|
heap
|
page read and write
|
||
7AB000
|
heap
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
1B6E1000
|
heap
|
page read and write
|
||
1B62C000
|
heap
|
page read and write
|
||
1B9A2000
|
heap
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page read and write
|
||
3645000
|
trusted library allocation
|
page read and write
|
||
1A810000
|
trusted library allocation
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
314B000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
875000
|
heap
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
11A0000
|
heap
|
page read and write
|
||
317D000
|
trusted library allocation
|
page read and write
|
||
337B000
|
trusted library allocation
|
page read and write
|
||
1A4D0000
|
trusted library allocation
|
page read and write
|
||
7FF848D62000
|
trusted library allocation
|
page read and write
|
||
7FF848F34000
|
trusted library allocation
|
page read and write
|
||
E02000
|
heap
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
2ADF000
|
trusted library allocation
|
page read and write
|
||
3D540FE000
|
stack
|
page read and write
|
||
2A86A144000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
1BCA0000
|
heap
|
page read and write
|
||
3654000
|
trusted library allocation
|
page read and write
|
||
1ACEA081000
|
heap
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
D63000
|
stack
|
page read and write
|
||
7FF848D7C000
|
trusted library allocation
|
page read and write
|
||
1C05E000
|
stack
|
page read and write
|
||
7FF848F83000
|
trusted library allocation
|
page read and write
|
||
1588000
|
heap
|
page read and write
|
||
12FF000
|
heap
|
page read and write
|
||
1E5E73D0000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
31BF000
|
trusted library allocation
|
page read and write
|
||
19E80C9A000
|
heap
|
page read and write
|
||
1AA5B000
|
stack
|
page read and write
|
||
1B61E000
|
heap
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
34B5000
|
trusted library allocation
|
page read and write
|
||
2A86A110000
|
heap
|
page read and write
|
||
6E6000
|
heap
|
page read and write
|
||
19E80CDF000
|
heap
|
page read and write
|
||
2E93000
|
trusted library allocation
|
page read and write
|
||
15FE000
|
stack
|
page read and write
|
||
2DB5000
|
trusted library allocation
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
13047000
|
trusted library allocation
|
page read and write
|
||
1279000
|
heap
|
page read and write
|
||
7FF84923F000
|
trusted library allocation
|
page read and write
|
||
7FF848F03000
|
trusted library allocation
|
page read and write
|
||
318B000
|
trusted library allocation
|
page read and write
|
||
2FD7000
|
trusted library allocation
|
page read and write
|
||
3D5407E000
|
stack
|
page read and write
|
||
29DF000
|
trusted library allocation
|
page read and write
|
||
2B21000
|
trusted library allocation
|
page read and write
|
||
2A86A144000
|
heap
|
page read and write
|
||
70B000
|
heap
|
page read and write
|
||
3494000
|
trusted library allocation
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
14E3000
|
stack
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
1BCC0000
|
heap
|
page read and write
|
||
310B000
|
trusted library allocation
|
page read and write
|
||
1220000
|
trusted library allocation
|
page read and write
|
||
1B033000
|
heap
|
page execute and read and write
|
||
19E80CC7000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page execute and read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
1E5E75E0000
|
heap
|
page read and write
|
||
7FF848F44000
|
trusted library allocation
|
page read and write
|
||
158C000
|
heap
|
page read and write
|
||
12D6000
|
heap
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
1C256000
|
heap
|
page read and write
|
||
38B5000
|
trusted library allocation
|
page read and write
|
||
A02000
|
heap
|
page read and write
|
||
19E80CE8000
|
heap
|
page read and write
|
||
32AFA7E000
|
stack
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
2978000
|
trusted library allocation
|
page read and write
|
||
7FF848D84000
|
trusted library allocation
|
page read and write
|
||
1C6FE000
|
stack
|
page read and write
|
||
654000
|
heap
|
page read and write
|
||
1302000
|
heap
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
32AF77B000
|
stack
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
7FF848D83000
|
trusted library allocation
|
page read and write
|
||
2693000
|
trusted library allocation
|
page read and write
|
||
26EE000
|
trusted library allocation
|
page read and write
|
||
19E82683000
|
direct allocation
|
page read and write
|
||
12DB1000
|
trusted library allocation
|
page read and write
|
||
19E80E50000
|
heap
|
page read and write
|
||
1B718000
|
heap
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F16000
|
trusted library allocation
|
page read and write
|
||
24D1000
|
trusted library allocation
|
page read and write
|
||
2C7E000
|
trusted library allocation
|
page read and write
|
||
19E82620000
|
direct allocation
|
page read and write
|
||
7FF848D5B000
|
trusted library allocation
|
page execute and read and write
|
||
2A86A12A000
|
heap
|
page read and write
|
||
38C5000
|
trusted library allocation
|
page read and write
|
||
7FF848D9D000
|
trusted library allocation
|
page execute and read and write
|
||
7A5000
|
heap
|
page read and write
|
||
244E000
|
stack
|
page read and write
|
||
2E49000
|
trusted library allocation
|
page read and write
|
||
2A86A11C000
|
heap
|
page read and write
|
||
130D1000
|
trusted library allocation
|
page read and write
|
||
159B000
|
heap
|
page read and write
|
||
29E4000
|
trusted library allocation
|
page read and write
|
||
1BD4E000
|
stack
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
1B775000
|
heap
|
page read and write
|
||
1B952000
|
heap
|
page read and write
|
||
7FF848F1C000
|
trusted library allocation
|
page read and write
|
||
3212000
|
trusted library allocation
|
page read and write
|
||
7FF848F54000
|
trusted library allocation
|
page read and write
|
||
1860000
|
heap
|
page read and write
|
||
1B5FC000
|
stack
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E00000
|
trusted library allocation
|
page execute and read and write
|
||
1C62D000
|
heap
|
page read and write
|
||
632000
|
heap
|
page read and write
|
||
12A11000
|
trusted library allocation
|
page read and write
|
||
2340000
|
heap
|
page read and write
|
||
1BDEE000
|
stack
|
page read and write
|
||
12923000
|
trusted library allocation
|
page read and write
|
||
3111000
|
trusted library allocation
|
page read and write
|
||
2DBB000
|
trusted library allocation
|
page read and write
|
||
1ADFE000
|
heap
|
page read and write
|
||
D9E3EFF000
|
stack
|
page read and write
|
||
1ADF8000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
3144000
|
trusted library allocation
|
page read and write
|
||
25BB000
|
trusted library allocation
|
page read and write
|
||
125A7000
|
trusted library allocation
|
page read and write
|
||
7FF848F75000
|
trusted library allocation
|
page read and write
|
||
12966000
|
trusted library allocation
|
page read and write
|
||
19E80CD2000
|
heap
|
page read and write
|
||
7FF848DF6000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
19E80C50000
|
heap
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
19E80CBC000
|
heap
|
page read and write
|
||
7FF848E1C000
|
trusted library allocation
|
page execute and read and write
|
||
2A86A167000
|
heap
|
page read and write
|
||
1B6D5000
|
heap
|
page read and write
|
||
2AC3000
|
trusted library allocation
|
page read and write
|
||
2B2D000
|
trusted library allocation
|
page read and write
|
||
1AD6B000
|
stack
|
page read and write
|
||
724000
|
heap
|
page read and write
|
||
1D244000
|
heap
|
page read and write
|
||
2C86000
|
trusted library allocation
|
page read and write
|
||
25A7000
|
trusted library allocation
|
page read and write
|
||
19E80C8B000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
3400000
|
trusted library allocation
|
page read and write
|
||
19E80CA5000
|
heap
|
page read and write
|
||
27F0000
|
trusted library allocation
|
page read and write
|
||
19E80DB0000
|
direct allocation
|
page read and write
|
||
7FF848D5C000
|
trusted library allocation
|
page read and write
|
||
7FF848DF6000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
1AE02000
|
heap
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
262F000
|
trusted library allocation
|
page read and write
|
||
1B924000
|
heap
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
2DA9000
|
trusted library allocation
|
page read and write
|
||
6E2000
|
heap
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
1C380000
|
heap
|
page execute and read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
7FF848D42000
|
trusted library allocation
|
page read and write
|
||
7FF848EF7000
|
trusted library allocation
|
page read and write
|
||
627000
|
heap
|
page read and write
|
||
2A86BC1F000
|
direct allocation
|
page read and write
|
||
19E80CE7000
|
heap
|
page read and write
|
||
291A000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
trusted library allocation
|
page read and write
|
||
7FF848F87000
|
trusted library allocation
|
page read and write
|
||
2A05000
|
trusted library allocation
|
page read and write
|
||
29EC000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
159D000
|
heap
|
page read and write
|
||
7FF848F2C000
|
trusted library allocation
|
page read and write
|
||
19E80C79000
|
heap
|
page read and write
|
||
393000
|
stack
|
page read and write
|
||
7FF848F3D000
|
trusted library allocation
|
page read and write
|
||
1ACEA071000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
19E80D90000
|
direct allocation
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
1B55C000
|
stack
|
page read and write
|
||
19E80CAA000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page execute and read and write
|
||
7FF8492F0000
|
trusted library allocation
|
page read and write
|
||
13361000
|
trusted library allocation
|
page read and write
|
||
19E80C9B000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
C4C67FF000
|
stack
|
page read and write
|
||
131A1000
|
trusted library allocation
|
page read and write
|
||
23CA000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
19FF000
|
stack
|
page read and write
|
||
1C0FE000
|
stack
|
page read and write
|
||
7FF849082000
|
trusted library allocation
|
page read and write
|
||
1267F000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
1AE0F000
|
heap
|
page read and write
|
||
1BCB0000
|
heap
|
page read and write
|
||
795000
|
heap
|
page read and write
|
||
1B725000
|
heap
|
page read and write
|
||
2714000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
1B68B000
|
heap
|
page read and write
|
||
2B33000
|
trusted library allocation
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
7FF848DEC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F2C000
|
trusted library allocation
|
page read and write
|
||
19E80CEF000
|
heap
|
page read and write
|
||
2B17000
|
trusted library allocation
|
page read and write
|
||
3216000
|
trusted library allocation
|
page read and write
|
||
1AFF4000
|
unkown
|
page readonly
|
||
6E4000
|
heap
|
page read and write
|
||
2607000
|
trusted library allocation
|
page read and write
|
||
1B0F7000
|
heap
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
2EEC000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
3076000
|
trusted library allocation
|
page read and write
|
||
7FF848F5E000
|
trusted library allocation
|
page read and write
|
||
25A0000
|
trusted library allocation
|
page read and write
|
||
12E7000
|
heap
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
63B000
|
heap
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
130C7000
|
trusted library allocation
|
page read and write
|
||
2A86A339000
|
direct allocation
|
page read and write
|
||
3214000
|
trusted library allocation
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page read and write
|
||
1C002000
|
heap
|
page read and write
|
||
314F000
|
trusted library allocation
|
page read and write
|
||
7FF848F15000
|
trusted library allocation
|
page read and write
|
||
27E9000
|
trusted library allocation
|
page read and write
|
||
25C2000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page execute and read and write
|
||
19E80CEF000
|
heap
|
page read and write
|
||
1302000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page execute and read and write
|
||
3623000
|
trusted library allocation
|
page read and write
|
||
28BB000
|
trusted library allocation
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
36A0000
|
trusted library allocation
|
page read and write
|
||
7FF848F24000
|
trusted library allocation
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
1E5E76E5000
|
heap
|
page read and write
|
||
12531000
|
trusted library allocation
|
page read and write
|
||
34AF000
|
trusted library allocation
|
page read and write
|
||
1702000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
1ACEA2C0000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
2A86A173000
|
heap
|
page read and write
|
||
12B85000
|
trusted library allocation
|
page read and write
|
||
2ECB000
|
trusted library allocation
|
page read and write
|
||
7FF848F8D000
|
trusted library allocation
|
page read and write
|
||
1C7FE000
|
stack
|
page read and write
|
||
34CF000
|
trusted library allocation
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
1E5E76E0000
|
heap
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page execute and read and write
|
||
7AD000
|
heap
|
page read and write
|
||
14FE000
|
stack
|
page read and write
|
||
19E8260B000
|
direct allocation
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
3221000
|
trusted library allocation
|
page read and write
|
||
13051000
|
trusted library allocation
|
page read and write
|
||
2307693B000
|
heap
|
page read and write
|
||
2AEB000
|
trusted library allocation
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
1E602600000
|
heap
|
page read and write
|
||
1613000
|
heap
|
page read and write
|
||
27E4000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
2EDD000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
290D000
|
trusted library allocation
|
page read and write
|
||
30DB000
|
trusted library allocation
|
page read and write
|
||
27DD000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
25C9000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
trusted library allocation
|
page read and write
|
||
2A86BC80000
|
direct allocation
|
page read and write
|
||
7FF848F7E000
|
trusted library allocation
|
page read and write
|
||
1B7A6000
|
heap
|
page read and write
|
||
2ECA000
|
heap
|
page read and write
|
||
38AF000
|
trusted library allocation
|
page read and write
|
||
2A86BC85000
|
direct allocation
|
page read and write
|
||
304F000
|
trusted library allocation
|
page read and write
|
||
2A86BC0B000
|
direct allocation
|
page read and write
|
||
2A86A128000
|
heap
|
page read and write
|
||
34A2000
|
trusted library allocation
|
page read and write
|
||
1C5FE000
|
stack
|
page read and write
|
||
33E000
|
stack
|
page read and write
|
||
1B030000
|
heap
|
page execute and read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
12B70000
|
trusted library allocation
|
page read and write
|
||
127E1000
|
trusted library allocation
|
page read and write
|
||
3113000
|
trusted library allocation
|
page read and write
|
||
31FD000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
1643000
|
heap
|
page read and write
|
||
2C1E000
|
trusted library allocation
|
page read and write
|
||
13351000
|
trusted library allocation
|
page read and write
|
||
2701000
|
trusted library allocation
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
1162000
|
heap
|
page read and write
|
||
7FF848EFC000
|
trusted library allocation
|
page read and write
|
||
1B62E000
|
heap
|
page read and write
|
||
7FF848F0C000
|
trusted library allocation
|
page read and write
|
||
19DF000
|
stack
|
page read and write
|
||
62E000
|
heap
|
page read and write
|
||
12A6B000
|
trusted library allocation
|
page read and write
|
||
19E80DAB000
|
direct allocation
|
page read and write
|
||
7FF848F33000
|
trusted library allocation
|
page read and write
|
||
1B647000
|
heap
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
19E80C73000
|
heap
|
page read and write
|
||
1C04D000
|
stack
|
page read and write
|
||
19E80B90000
|
heap
|
page read and write
|
||
7FF848E81000
|
trusted library allocation
|
page execute and read and write
|
||
1245000
|
heap
|
page read and write
|
||
2593000
|
trusted library allocation
|
page read and write
|
||
6FE000
|
heap
|
page read and write
|
||
2DA1000
|
trusted library allocation
|
page read and write
|
||
25A6000
|
trusted library allocation
|
page read and write
|
||
129CF000
|
trusted library allocation
|
page read and write
|
||
29DD000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
29F4000
|
trusted library allocation
|
page read and write
|
||
290B000
|
trusted library allocation
|
page read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
7FF848F28000
|
trusted library allocation
|
page read and write
|
||
27EC000
|
trusted library allocation
|
page read and write
|
||
1702000
|
heap
|
page read and write
|
||
28A1000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page execute and read and write
|
||
2F59000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
132EF000
|
trusted library allocation
|
page read and write
|
||
7FF849237000
|
trusted library allocation
|
page read and write
|
||
7FF848F08000
|
trusted library allocation
|
page read and write
|
||
7FF848F54000
|
trusted library allocation
|
page read and write
|
||
30C9000
|
trusted library allocation
|
page read and write
|
||
7FF848F0C000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
12681000
|
trusted library allocation
|
page read and write
|
||
1251000
|
heap
|
page read and write
|
||
7FF8492E0000
|
trusted library allocation
|
page read and write
|
||
1ACEA081000
|
heap
|
page read and write
|
||
1370F000
|
trusted library allocation
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page execute and read and write
|
||
34DE000
|
stack
|
page read and write
|
||
3412000
|
trusted library allocation
|
page read and write
|
||
1A9DD000
|
stack
|
page read and write
|
||
7FF848D6B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
1BC3E000
|
stack
|
page read and write
|
||
3186000
|
trusted library allocation
|
page read and write
|
||
1BB3E000
|
stack
|
page read and write
|
||
1202000
|
heap
|
page read and write
|
||
DF5000
|
heap
|
page read and write
|
||
1B78C000
|
heap
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
1B8FE000
|
stack
|
page read and write
|
||
1B63C000
|
heap
|
page read and write
|
||
2A86A104000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
A3C000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
1290A000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
27C5000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
127CF000
|
trusted library allocation
|
page read and write
|
||
1C8FE000
|
stack
|
page read and write
|
||
24CF000
|
stack
|
page read and write
|
||
19E80CB5000
|
heap
|
page read and write
|
||
1B0DD000
|
heap
|
page read and write
|
||
E4F000
|
heap
|
page read and write
|
||
F02000
|
heap
|
page read and write
|
||
12C8000
|
heap
|
page read and write
|
||
13041000
|
trusted library allocation
|
page read and write
|
||
1B8ED000
|
stack
|
page read and write
|
||
25A1000
|
trusted library allocation
|
page read and write
|
||
1BE02000
|
heap
|
page read and write
|
||
1ACEA081000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
19E80D93000
|
direct allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
321F000
|
trusted library allocation
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page execute and read and write
|
||
1B393000
|
heap
|
page execute and read and write
|
||
7FF848EFA000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page execute and read and write
|
||
3D53DDC000
|
stack
|
page read and write
|
||
12A64000
|
trusted library allocation
|
page read and write
|
||
1B9E0000
|
heap
|
page execute and read and write
|
||
2AD5000
|
trusted library allocation
|
page read and write
|
||
7FF848D48000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
12FD1000
|
trusted library allocation
|
page read and write
|
||
7FF848F93000
|
trusted library allocation
|
page read and write
|
||
1BD3E000
|
stack
|
page read and write
|
||
2AD18A20000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
2872000
|
trusted library allocation
|
page read and write
|
||
1B702000
|
heap
|
page execute and read and write
|
||
7FF848E50000
|
trusted library allocation
|
page execute and read and write
|
||
25A9000
|
trusted library allocation
|
page read and write
|
||
24D9000
|
trusted library allocation
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
317F000
|
trusted library allocation
|
page read and write
|
||
1C24F000
|
heap
|
page read and write
|
||
1285E000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F8E000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
A00000
|
heap
|
page read and write
|
||
1BE3E000
|
stack
|
page read and write
|
||
1B66B000
|
heap
|
page read and write
|
||
1B602000
|
heap
|
page read and write
|
||
1AE1F000
|
stack
|
page read and write
|
||
A22000
|
heap
|
page read and write
|
||
2B13000
|
trusted library allocation
|
page read and write
|
||
2DB1000
|
trusted library allocation
|
page read and write
|
||
3138000
|
trusted library allocation
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page read and write
|
||
34F0000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
12850000
|
trusted library allocation
|
page read and write
|
||
16D8000
|
heap
|
page read and write
|
||
134E7000
|
trusted library allocation
|
page read and write
|
||
27FF000
|
trusted library allocation
|
page read and write
|
||
E3B000
|
heap
|
page read and write
|
||
7FF848F08000
|
trusted library allocation
|
page read and write
|
||
29DB000
|
trusted library allocation
|
page read and write
|
||
1C244000
|
heap
|
page read and write
|
||
1B7B0000
|
heap
|
page read and write
|
||
320E000
|
trusted library allocation
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
175DBE59000
|
heap
|
page read and write
|
||
1ACEA071000
|
heap
|
page read and write
|
||
1B48A000
|
stack
|
page read and write
|
There are 1853 hidden memdumps, click here to show them.