Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
adKGhCOOzg.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\01cb5ea0-7f93-4a93-908b-352473040093.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1aed32cf-2de1-4530-92b6-4347a499f45a.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5607663c-c622-426c-855c-ef5fb85dae90.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\826f54c5c35521aef4aae8ba444affffb02e2dfd.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8636c2ce-b0e0-4557-b01c-75132397eb84.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\91745221-1208-4818-9185-e92567cf8b4d.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9e72009f-739b-4ea4-b505-4e802e14614f.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\a838f51f-2608-4fa8-98f2-8c025efe4e1a.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\c1de1a4a-c903-48ef-a3ac-c4f3ffa7e9ae.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\c755c5ef-7934-4641-b1a5-88ef130986ad.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\d652d8e0-fd2b-4425-99bd-1792324a729f.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\edd106de-c4c6-4bbc-b780-ae6716fb30a7.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\f765102e-847e-4ba7-8e69-2cfb40b35d1c.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\suxlltqCa3.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\portcontainerRef\SurrogateContainerAgent.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\portcontainerRef\myQbMgAKm.vbe
|
data
|
dropped
|
||
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SurrogateContainerAgent.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\zTShuhFeOCWKXCInUCSTgJmE.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\K0Xr29C3HF
|
ASCII text, with no line terminators
|
dropped
|
||
C:\portcontainerRef\2a821a36bead33
|
ASCII text, with very long lines (645), with no line terminators
|
dropped
|
||
C:\portcontainerRef\J34SCTDenq2CEriZjkOuf.bat
|
ASCII text, with no line terminators
|
dropped
|
||
\Device\Null
|
ASCII text
|
dropped
|
There are 14 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\adKGhCOOzg.exe
|
"C:\Users\user\Desktop\adKGhCOOzg.exe"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\portcontainerRef\myQbMgAKm.vbe"
|
||
C:\portcontainerRef\SurrogateContainerAgent.exe
|
"C:\portcontainerRef\SurrogateContainerAgent.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "zTShuhFeOCWKXCInUCSTgJmEz" /sc MINUTE /mo 14 /tr "'C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "zTShuhFeOCWKXCInUCSTgJmE" /sc ONLOGON /tr "'C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe'" /rl
HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "zTShuhFeOCWKXCInUCSTgJmEz" /sc MINUTE /mo 11 /tr "'C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe'"
/rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "zTShuhFeOCWKXCInUCSTgJmEz" /sc MINUTE /mo 7 /tr "'C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe'"
/f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "zTShuhFeOCWKXCInUCSTgJmE" /sc ONLOGON /tr "'C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe'" /rl
HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "zTShuhFeOCWKXCInUCSTgJmEz" /sc MINUTE /mo 5 /tr "'C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe'"
/rl HIGHEST /f
|
||
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
|
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
|
||
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
|
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
|
||
C:\Windows\SysWOW64\reg.exe
|
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\d652d8e0-fd2b-4425-99bd-1792324a729f.vbs"
|
||
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
|
"C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\f765102e-847e-4ba7-8e69-2cfb40b35d1c.vbs"
|
||
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
|
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\a838f51f-2608-4fa8-98f2-8c025efe4e1a.vbs"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\edd106de-c4c6-4bbc-b780-ae6716fb30a7.vbs"
|
||
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
|
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\91745221-1208-4818-9185-e92567cf8b4d.vbs"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\5607663c-c622-426c-855c-ef5fb85dae90.vbs"
|
||
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
|
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\9e72009f-739b-4ea4-b505-4e802e14614f.vbs"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\8636c2ce-b0e0-4557-b01c-75132397eb84.vbs"
|
||
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
|
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\c1de1a4a-c903-48ef-a3ac-c4f3ffa7e9ae.vbs"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\1aed32cf-2de1-4530-92b6-4347a499f45a.vbs"
|
||
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
|
C:\portcontainerRef\zTShuhFeOCWKXCInUCSTgJmE.exe
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\01cb5ea0-7f93-4a93-908b-352473040093.vbs"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\c755c5ef-7934-4641-b1a5-88ef130986ad.vbs"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\portcontainerRef\J34SCTDenq2CEriZjkOuf.bat" "
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\suxlltqCa3.bat"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
There are 25 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://a1025223.xsph.ru/d2e9d328.php?UJm7tEakW4DhlWwkna0hC=XFOwV2Tzt0&2132410dd3c9d0ed40475469f1dad04b=a4985c72318361485c5567463b9f03e9&5f975759356989d1a1cbaf57a59bcab1=AMiJGN0MDN0cjYwMGNmV2Y3UWOzADMiFjMkBTY0MTOllDOzETYyMGO&UJm7tEakW4DhlWwkna0hC=XFOwV2Tzt0
|
141.8.194.149
|
||
http://a1025223.xsph.ru/d2e9d328.php?TIhQfugI6qD9EGxcg3vTGUCLj6Y4Mi=5F3FLPT&2132410dd3c9d0ed40475469f1dad04b=a4985c72318361485c5567463b9f03e9&5f975759356989d1a1cbaf57a59bcab1=AMiJGN0MDN0cjYwMGNmV2Y3UWOzADMiFjMkBTY0MTOllDOzETYyMGO&TIhQfugI6qD9EGxcg3vTGUCLj6Y4Mi=5F3FLPT
|
141.8.194.149
|
||
http://a1025223.xsph.ru/d2e9d328.php?YyNDR3TlOsqwkTKEyKWhRDLsjJJiW2r=BuUiy1r4iQfw1ZDtv1bvF&2132410dd3c9d0ed40475469f1dad04b=a4985c72318361485c5567463b9f03e9&5f975759356989d1a1cbaf57a59bcab1=AMiJGN0MDN0cjYwMGNmV2Y3UWOzADMiFjMkBTY0MTOllDOzETYyMGO&YyNDR3TlOsqwkTKEyKWhRDLsjJJiW2r=BuUiy1r4iQfw1ZDtv1bvF
|
141.8.194.149
|
||
http://a1025223.xsph.ru/d2e9d328.php?uqxA755t6aUOPvdhb47UTU5K8HjMT=5kNUaRG0xjgAsz&2132410dd3c9d0ed40475469f1dad04b=a4985c72318361485c5567463b9f03e9&5f975759356989d1a1cbaf57a59bcab1=AMiJGN0MDN0cjYwMGNmV2Y3UWOzADMiFjMkBTY0MTOllDOzETYyMGO&uqxA755t6aUOPvdhb47UTU5K8HjMT=5kNUaRG0xjgAsz
|
141.8.194.149
|
||
http://a1025223.xsph.ru/d2e9d328.php?jMy2l9ofssClq5c0mtSKS5eB=aT8&ypKouMyQik=1N3uV2MDdEMLW&bosx0LppM3C276sojEJ5=FCtpJNQfNme&2132410dd3c9d0ed40475469f1dad04b=a4985c72318361485c5567463b9f03e9&5f975759356989d1a1cbaf57a59bcab1=AMiJGN0MDN0cjYwMGNmV2Y3UWOzADMiFjMkBTY0MTOllDOzETYyMGO&jMy2l9ofssClq5c0mtSKS5eB=aT8&ypKouMyQik=1N3uV2MDdEMLW&bosx0LppM3C276sojEJ5=FCtpJNQfNme
|
141.8.194.149
|
||
http://a1025223.xsph.ru/d2e9d328.php?4acnMu3AiXjx7W4g=3wYdYqeqdVKTtaR4nW1a6PqTDmuH&XER5ENhWA=u76tZtrz6R2UADF6n&EZw5=aFR3YoMuimzGc&2132410dd3c9d0ed40475469f1dad04b=a4985c72318361485c5567463b9f03e9&5f975759356989d1a1cbaf57a59bcab1=AMiJGN0MDN0cjYwMGNmV2Y3UWOzADMiFjMkBTY0MTOllDOzETYyMGO&4acnMu3AiXjx7W4g=3wYdYqeqdVKTtaR4nW1a6PqTDmuH&XER5ENhWA=u76tZtrz6R2UADF6n&EZw5=aFR3YoMuimzGc
|
141.8.194.149
|
||
https://cp.sprinthost.ru
|
unknown
|
||
https://index.from.sh/pages/game.html
|
unknown
|
||
http://a1025223.xsph.ru/d2e9d328.php?4acnMu3AiXjx7W4g=3wYdYqeqdVKTtaR4nW1a6PqTDmuH&XER5ENhWA=u76tZtr
|
unknown
|
||
http://a1025223.xsph.ru/d2e9d328.php?UJm7tEakW4DhlWwkna0hC=XFOwV2Tzt0&2132410dd3c9d0ed40475469f1dad0
|
unknown
|
||
https://cp.sprinthost.ru/auth/login
|
unknown
|
||
http://a1025223.xsph.ru/
|
unknown
|
||
http://a1025223.xsph.ru/d2e9d328.php?YyNDR3TlOsqwkTKEyKWhRDLsjJJiW2r=BuUiy1r4iQfw1ZDtv1bvF&2132410dd
|
unknown
|
||
http://a1025223.xsph.ru
|
unknown
|
||
http://a1025223.xsph.ru/d2e9d328.php?uqxA755t6aUOPvdhb47UTU5K8HjMT=5kNUaRG0xjgAsz&2132410dd3c9d0ed40
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://a1025223.xsph.ru/d2e9d328.php?jMy2l9ofssClq5c0mtSKS5eB=aT8&ypKouMyQik=1N3uV2MDdEMLW&bosx0LppM
|
unknown
|
||
http://a1025223.xsph.ru/d2e9d328.php?TIhQfugI6qD9EGxcg3vTGUCLj6Y4Mi=5F3FLPT&2132410dd3c9d0ed40475469
|
unknown
|
There are 8 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
a1025223.xsph.ru
|
141.8.194.149
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
141.8.194.149
|
a1025223.xsph.ru
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
EnableLUA
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
PromptOnSecureDesktop
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
DisableTaskMgr
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\9bd8c94cb32b47b6f62d1f33c9e5fad2872c318d
|
4c3b5d21398a857e0a3a8f1e1bad462a06f3c5a6
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\zTShuhFeOCWKXCInUCSTgJmE_RASMANCS
|
FileDirectory
|
There are 14 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3401000
|
trusted library allocation
|
page read and write
|
||
279D000
|
trusted library allocation
|
page read and write
|
||
2761000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
2A51000
|
trusted library allocation
|
page read and write
|
||
3A28000
|
trusted library allocation
|
page read and write
|
||
2FF1000
|
trusted library allocation
|
page read and write
|
||
2AD1000
|
trusted library allocation
|
page read and write
|
||
2E91000
|
trusted library allocation
|
page read and write
|
||
3441000
|
trusted library allocation
|
page read and write
|
||
2AF0000
|
trusted library allocation
|
page read and write
|
||
1344D000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
1CE5D000
|
stack
|
page read and write
|
||
152C9000
|
trusted library allocation
|
page read and write
|
||
14F4B0E6000
|
heap
|
page read and write
|
||
7FF887B20000
|
trusted library allocation
|
page read and write
|
||
7FF887C2E000
|
trusted library allocation
|
page read and write
|
||
2311689B000
|
heap
|
page read and write
|
||
2296A8D0000
|
heap
|
page read and write
|
||
3235000
|
heap
|
page read and write
|
||
133C8000
|
trusted library allocation
|
page read and write
|
||
38B6000
|
trusted library allocation
|
page read and write
|
||
2311688C000
|
heap
|
page read and write
|
||
7FF887BC2000
|
trusted library allocation
|
page read and write
|
||
1350C000
|
trusted library allocation
|
page read and write
|
||
1938597B000
|
heap
|
page read and write
|
||
7FF887D20000
|
trusted library allocation
|
page read and write
|
||
2F48000
|
trusted library allocation
|
page read and write
|
||
12EDD000
|
trusted library allocation
|
page read and write
|
||
2FD8000
|
heap
|
page read and write
|
||
7FF887C60000
|
trusted library allocation
|
page read and write
|
||
14F4B116000
|
heap
|
page read and write
|
||
7FF887C80000
|
trusted library allocation
|
page read and write
|
||
17AF000
|
stack
|
page read and write
|
||
1BE4C000
|
heap
|
page read and write
|
||
7FF887BC0000
|
trusted library allocation
|
page read and write
|
||
19385987000
|
heap
|
page read and write
|
||
13CE1000
|
trusted library allocation
|
page read and write
|
||
BAB7AFE000
|
stack
|
page read and write
|
||
1B82E000
|
stack
|
page read and write
|
||
2C32000
|
trusted library allocation
|
page read and write
|
||
2AE1000
|
trusted library allocation
|
page read and write
|
||
23116830000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
2C7F000
|
trusted library allocation
|
page read and write
|
||
1C4A0000
|
trusted library section
|
page read and write
|
||
1BE50000
|
trusted library section
|
page read and write
|
||
22968BA2000
|
heap
|
page read and write
|
||
193859AA000
|
heap
|
page read and write
|
||
1BCE1000
|
stack
|
page read and write
|
||
225093B5000
|
heap
|
page read and write
|
||
7FF887CA2000
|
trusted library allocation
|
page read and write
|
||
7FF887A80000
|
trusted library allocation
|
page read and write
|
||
1C65C000
|
heap
|
page read and write
|
||
7FF887CD9000
|
trusted library allocation
|
page read and write
|
||
CAF000
|
stack
|
page read and write
|
||
23116847000
|
heap
|
page read and write
|
||
7FF887A98000
|
trusted library allocation
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
7FF887C92000
|
trusted library allocation
|
page read and write
|
||
26AB911D000
|
heap
|
page read and write
|
||
175D000
|
heap
|
page read and write
|
||
CBC000
|
heap
|
page read and write
|
||
23116895000
|
heap
|
page read and write
|
||
26AB9151000
|
heap
|
page read and write
|
||
18E734B5000
|
heap
|
page read and write
|
||
7FF887C80000
|
trusted library allocation
|
page read and write
|
||
26AB9167000
|
heap
|
page read and write
|
||
3447000
|
trusted library allocation
|
page read and write
|
||
590C000
|
stack
|
page read and write
|
||
18E734AB000
|
heap
|
page read and write
|
||
22968B80000
|
heap
|
page read and write
|
||
384C000
|
trusted library allocation
|
page read and write
|
||
7FF887DFF000
|
trusted library allocation
|
page read and write
|
||
7FF887B9B000
|
trusted library allocation
|
page read and write
|
||
7FF435420000
|
trusted library allocation
|
page execute and read and write
|
||
18E7347A000
|
heap
|
page read and write
|
||
15F78000
|
trusted library allocation
|
page read and write
|
||
1732000
|
heap
|
page read and write
|
||
1C654000
|
heap
|
page read and write
|
||
7FF887E00000
|
trusted library allocation
|
page read and write
|
||
A8568FE000
|
stack
|
page read and write
|
||
2F0D000
|
trusted library allocation
|
page read and write
|
||
7FF8879D4000
|
trusted library allocation
|
page read and write
|
||
1C4C0000
|
trusted library section
|
page read and write
|
||
1BACD000
|
heap
|
page read and write
|
||
18E73645000
|
heap
|
page read and write
|
||
7FF887C50000
|
trusted library allocation
|
page read and write
|
||
7FF8879D3000
|
trusted library allocation
|
page read and write
|
||
2FE5000
|
heap
|
page read and write
|
||
7FF887DCA000
|
trusted library allocation
|
page read and write
|
||
1BE79000
|
heap
|
page read and write
|
||
3A1000
|
unkown
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
3076000
|
trusted library allocation
|
page read and write
|
||
12A51000
|
trusted library allocation
|
page read and write
|
||
1363C000
|
trusted library allocation
|
page read and write
|
||
7FF887B66000
|
trusted library allocation
|
page execute and read and write
|
||
1CEAE000
|
stack
|
page read and write
|
||
1AB10000
|
trusted library allocation
|
page read and write
|
||
3A4F000
|
trusted library allocation
|
page read and write
|
||
1BF8E000
|
stack
|
page read and write
|
||
1B807000
|
stack
|
page read and write
|
||
1C02D000
|
heap
|
page read and write
|
||
7FF887C40000
|
trusted library allocation
|
page read and write
|
||
2311683A000
|
heap
|
page read and write
|
||
1BCD7000
|
heap
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
1C8EE000
|
stack
|
page read and write
|
||
19D0000
|
heap
|
page read and write
|
||
7FF887E15000
|
trusted library allocation
|
page read and write
|
||
2F21000
|
trusted library allocation
|
page read and write
|
||
19BE000
|
stack
|
page read and write
|
||
7FF887BF9000
|
trusted library allocation
|
page read and write
|
||
18E7349B000
|
heap
|
page read and write
|
||
142E6000
|
trusted library allocation
|
page read and write
|
||
1BAD4000
|
heap
|
page read and write
|
||
7FF887AE0000
|
trusted library allocation
|
page execute and read and write
|
||
11DB000
|
heap
|
page read and write
|
||
18E7345D000
|
heap
|
page read and write
|
||
23436F90000
|
heap
|
page read and write
|
||
7FF887DA8000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
2F04000
|
trusted library allocation
|
page read and write
|
||
7FF887BA0000
|
trusted library allocation
|
page read and write
|
||
7FF8879E3000
|
trusted library allocation
|
page read and write
|
||
7FF887C50000
|
trusted library allocation
|
page read and write
|
||
1C087000
|
heap
|
page read and write
|
||
1CB58000
|
heap
|
page read and write
|
||
2FC5000
|
heap
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
26AB90B5000
|
heap
|
page read and write
|
||
13E23000
|
trusted library allocation
|
page read and write
|
||
391E000
|
trusted library allocation
|
page read and write
|
||
7FF887D0C000
|
trusted library allocation
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
19385AF0000
|
heap
|
page read and write
|
||
7FF887A86000
|
trusted library allocation
|
page execute and read and write
|
||
2CAE000
|
trusted library allocation
|
page read and write
|
||
1D29D000
|
stack
|
page read and write
|
||
7FF887C40000
|
trusted library allocation
|
page read and write
|
||
1BECE000
|
stack
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
2F03000
|
trusted library allocation
|
page read and write
|
||
34EA000
|
heap
|
page read and write
|
||
D96000
|
stack
|
page read and write
|
||
23116898000
|
heap
|
page read and write
|
||
74C94FA000
|
stack
|
page read and write
|
||
26AB9152000
|
heap
|
page read and write
|
||
7FF887E17000
|
trusted library allocation
|
page read and write
|
||
14F4B0C6000
|
heap
|
page read and write
|
||
22CAC968000
|
heap
|
page read and write
|
||
7FF887D44000
|
trusted library allocation
|
page read and write
|
||
26AB916D000
|
heap
|
page read and write
|
||
2E46000
|
trusted library allocation
|
page read and write
|
||
14F4CDB0000
|
heap
|
page read and write
|
||
7FF887D40000
|
trusted library allocation
|
page read and write
|
||
1D4DD000
|
stack
|
page read and write
|
||
7FF887A50000
|
trusted library allocation
|
page read and write
|
||
130BA000
|
trusted library allocation
|
page read and write
|
||
1C361000
|
heap
|
page read and write
|
||
7FF887B26000
|
trusted library allocation
|
page read and write
|
||
BC970FE000
|
stack
|
page read and write
|
||
1BDBF000
|
heap
|
page read and write
|
||
1BA1C000
|
heap
|
page read and write
|
||
1C355000
|
heap
|
page read and write
|
||
2C16000
|
trusted library allocation
|
page read and write
|
||
18E73449000
|
heap
|
page read and write
|
||
23116899000
|
heap
|
page read and write
|
||
3939000
|
trusted library allocation
|
page read and write
|
||
7FF887BB0000
|
trusted library allocation
|
page read and write
|
||
7FF887C09000
|
trusted library allocation
|
page read and write
|
||
7FF887C40000
|
trusted library allocation
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
18E7346C000
|
heap
|
page read and write
|
||
2C1B000
|
trusted library allocation
|
page read and write
|
||
22509220000
|
heap
|
page read and write
|
||
7FF887D1A000
|
trusted library allocation
|
page read and write
|
||
7FF8879CD000
|
trusted library allocation
|
page execute and read and write
|
||
2F80000
|
heap
|
page read and write
|
||
B1F000
|
heap
|
page read and write
|
||
26AB9151000
|
heap
|
page read and write
|
||
7FF8879C7000
|
trusted library allocation
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
C89000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
26AB9131000
|
heap
|
page read and write
|
||
38A9000
|
trusted library allocation
|
page read and write
|
||
7FF887DE0000
|
trusted library allocation
|
page read and write
|
||
2BEF000
|
trusted library allocation
|
page read and write
|
||
2FDB000
|
heap
|
page read and write
|
||
139BC000
|
trusted library allocation
|
page read and write
|
||
1BBFE000
|
stack
|
page read and write
|
||
2FD7000
|
heap
|
page read and write
|
||
7FF887CDB000
|
trusted library allocation
|
page read and write
|
||
13EA4000
|
trusted library allocation
|
page read and write
|
||
7FF887DFF000
|
trusted library allocation
|
page read and write
|
||
1A85000
|
heap
|
page read and write
|
||
18E73449000
|
heap
|
page read and write
|
||
1C5E0000
|
trusted library section
|
page read and write
|
||
1D6F8000
|
heap
|
page read and write
|
||
5A0C000
|
stack
|
page read and write
|
||
26AB915C000
|
heap
|
page read and write
|
||
14F4B0E0000
|
heap
|
page read and write
|
||
23116885000
|
heap
|
page read and write
|
||
7FF887DC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887C30000
|
trusted library allocation
|
page read and write
|
||
2311685E000
|
heap
|
page read and write
|
||
7FF887AA4000
|
trusted library allocation
|
page read and write
|
||
3826000
|
trusted library allocation
|
page read and write
|
||
57AC000
|
heap
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
7FF887A90000
|
trusted library allocation
|
page read and write
|
||
135F5000
|
trusted library allocation
|
page read and write
|
||
7FF887E12000
|
trusted library allocation
|
page read and write
|
||
1C620000
|
heap
|
page read and write
|
||
1BE80000
|
heap
|
page read and write
|
||
1198000
|
heap
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
7FF8879C0000
|
trusted library allocation
|
page read and write
|
||
5499FF000
|
stack
|
page read and write
|
||
1C34D000
|
heap
|
page read and write
|
||
26AB9153000
|
heap
|
page read and write
|
||
1CBAD000
|
stack
|
page read and write
|
||
2FC2000
|
heap
|
page read and write
|
||
12EB8000
|
trusted library allocation
|
page read and write
|
||
3475000
|
heap
|
page read and write
|
||
15EE000
|
stack
|
page read and write
|
||
13A5D000
|
trusted library allocation
|
page read and write
|
||
2C37000
|
trusted library allocation
|
page read and write
|
||
231185E0000
|
heap
|
page read and write
|
||
2D3E000
|
trusted library allocation
|
page read and write
|
||
26CB35F0000
|
heap
|
page read and write
|
||
274E000
|
stack
|
page read and write
|
||
132A8000
|
trusted library allocation
|
page read and write
|
||
23116889000
|
heap
|
page read and write
|
||
22CA9BA000
|
stack
|
page read and write
|
||
14F4B0DB000
|
heap
|
page read and write
|
||
C15000
|
heap
|
page read and write
|
||
1C525000
|
heap
|
page read and write
|
||
288F000
|
stack
|
page read and write
|
||
30AE000
|
trusted library allocation
|
page read and write
|
||
1AB00000
|
trusted library allocation
|
page read and write
|
||
1354D000
|
trusted library allocation
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
23116847000
|
heap
|
page read and write
|
||
3878000
|
trusted library allocation
|
page read and write
|
||
1BA40000
|
heap
|
page execute and read and write
|
||
D56000
|
heap
|
page read and write
|
||
302E000
|
trusted library allocation
|
page read and write
|
||
7FF887C2C000
|
trusted library allocation
|
page read and write
|
||
18E7346E000
|
heap
|
page read and write
|
||
22968AD0000
|
heap
|
page read and write
|
||
18E73471000
|
heap
|
page read and write
|
||
7FF887DF8000
|
trusted library allocation
|
page read and write
|
||
12EA1000
|
trusted library allocation
|
page read and write
|
||
14F4B115000
|
heap
|
page read and write
|
||
7FF887A8D000
|
trusted library allocation
|
page execute and read and write
|
||
1238000
|
heap
|
page read and write
|
||
3A2000
|
unkown
|
page readonly
|
||
22968BA2000
|
heap
|
page read and write
|
||
1B870000
|
heap
|
page execute and read and write
|
||
7FF887DF8000
|
trusted library allocation
|
page read and write
|
||
1BC07000
|
stack
|
page read and write
|
||
33781FF000
|
stack
|
page read and write
|
||
7FF887C50000
|
trusted library allocation
|
page read and write
|
||
CDB000
|
heap
|
page read and write
|
||
149BD000
|
trusted library allocation
|
page read and write
|
||
26AB9138000
|
heap
|
page read and write
|
||
2EB8000
|
trusted library allocation
|
page read and write
|
||
7FF8879D3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887CEA000
|
trusted library allocation
|
page read and write
|
||
1D19D000
|
stack
|
page read and write
|
||
18E73457000
|
heap
|
page read and write
|
||
7FF887CC9000
|
trusted library allocation
|
page read and write
|
||
7FF887B30000
|
trusted library allocation
|
page read and write
|
||
134E9000
|
trusted library allocation
|
page read and write
|
||
13BF000
|
stack
|
page read and write
|
||
1A790000
|
trusted library allocation
|
page read and write
|
||
7FF887BC7000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887A8D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887B66000
|
trusted library allocation
|
page execute and read and write
|
||
18E73441000
|
heap
|
page read and write
|
||
1EA4AC20000
|
heap
|
page read and write
|
||
1CD4D000
|
stack
|
page read and write
|
||
1C8ED000
|
stack
|
page read and write
|
||
7FF887CFE000
|
trusted library allocation
|
page read and write
|
||
34B0000
|
heap
|
page read and write
|
||
3565000
|
trusted library allocation
|
page read and write
|
||
23116894000
|
heap
|
page read and write
|
||
13A11000
|
trusted library allocation
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
12C3A000
|
trusted library allocation
|
page read and write
|
||
34E2000
|
heap
|
page read and write
|
||
7FF887C4C000
|
trusted library allocation
|
page read and write
|
||
D2D000
|
heap
|
page read and write
|
||
2FE3000
|
heap
|
page read and write
|
||
5510000
|
heap
|
page read and write
|
||
19385980000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page execute and read and write
|
||
18E73491000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
1C191000
|
heap
|
page read and write
|
||
1CF2E000
|
stack
|
page read and write
|
||
7FF887C36000
|
trusted library allocation
|
page read and write
|
||
7FF887B66000
|
trusted library allocation
|
page execute and read and write
|
||
2ECE000
|
trusted library allocation
|
page read and write
|
||
1B30F000
|
stack
|
page read and write
|
||
1BD7D000
|
heap
|
page read and write
|
||
193859A6000
|
heap
|
page read and write
|
||
33DA000
|
trusted library allocation
|
page read and write
|
||
22CADFD000
|
stack
|
page read and write
|
||
7FF887E31000
|
trusted library allocation
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
7FF887B50000
|
trusted library allocation
|
page read and write
|
||
7FF887BA0000
|
trusted library allocation
|
page read and write
|
||
2EDB000
|
trusted library allocation
|
page read and write
|
||
7FF887B36000
|
trusted library allocation
|
page read and write
|
||
18E73380000
|
heap
|
page read and write
|
||
397E000
|
trusted library allocation
|
page read and write
|
||
1BEEB000
|
stack
|
page read and write
|
||
7FF887C77000
|
trusted library allocation
|
page read and write
|
||
341000
|
unkown
|
page execute read
|
||
356D000
|
trusted library allocation
|
page read and write
|
||
15F871F0000
|
heap
|
page read and write
|
||
22968B87000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
7FF887DBA000
|
trusted library allocation
|
page read and write
|
||
2311685E000
|
heap
|
page read and write
|
||
7FF887DC0000
|
trusted library allocation
|
page read and write
|
||
193859A6000
|
heap
|
page read and write
|
||
7FF887E52000
|
trusted library allocation
|
page read and write
|
||
7FF887B70000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
14F4B0C6000
|
heap
|
page read and write
|
||
337797A000
|
stack
|
page read and write
|
||
7FF887B50000
|
trusted library allocation
|
page read and write
|
||
2311687E000
|
heap
|
page read and write
|
||
23116883000
|
heap
|
page read and write
|
||
7FF8879C0000
|
trusted library allocation
|
page read and write
|
||
7FF887CE0000
|
trusted library allocation
|
page read and write
|
||
7FF887BFB000
|
trusted library allocation
|
page read and write
|
||
3057000
|
trusted library allocation
|
page read and write
|
||
7FF8879DD000
|
trusted library allocation
|
page execute and read and write
|
||
1B78B000
|
heap
|
page read and write
|
||
2311684D000
|
heap
|
page read and write
|
||
18E7343C000
|
heap
|
page read and write
|
||
C78C67C000
|
stack
|
page read and write
|
||
7FF887C4B000
|
trusted library allocation
|
page read and write
|
||
1B72F000
|
stack
|
page read and write
|
||
14F4B0DD000
|
heap
|
page read and write
|
||
3542000
|
trusted library allocation
|
page read and write
|
||
7FF887DB0000
|
trusted library allocation
|
page read and write
|
||
22509240000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
1938594C000
|
heap
|
page read and write
|
||
139F3000
|
trusted library allocation
|
page read and write
|
||
E9A000
|
heap
|
page read and write
|
||
D36000
|
heap
|
page read and write
|
||
3459000
|
heap
|
page read and write
|
||
522F000
|
stack
|
page read and write
|
||
9A304FE000
|
stack
|
page read and write
|
||
26AB917D000
|
heap
|
page read and write
|
||
7FF887BE0000
|
trusted library allocation
|
page read and write
|
||
1C410000
|
heap
|
page read and write
|
||
7FF887CDE000
|
trusted library allocation
|
page read and write
|
||
11E3000
|
heap
|
page read and write
|
||
7FF887C40000
|
trusted library allocation
|
page read and write
|
||
7FF887A9C000
|
trusted library allocation
|
page read and write
|
||
319D000
|
trusted library allocation
|
page read and write
|
||
1D18D000
|
stack
|
page read and write
|
||
7FF887A66000
|
trusted library allocation
|
page read and write
|
||
26AB9101000
|
heap
|
page read and write
|
||
19385980000
|
heap
|
page read and write
|
||
12955000
|
trusted library allocation
|
page read and write
|
||
14F4B0D9000
|
heap
|
page read and write
|
||
7FF887A7C000
|
trusted library allocation
|
page execute and read and write
|
||
26AB9165000
|
heap
|
page read and write
|
||
9A307FF000
|
stack
|
page read and write
|
||
7FF887D14000
|
trusted library allocation
|
page read and write
|
||
7FF887B56000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887C3C000
|
trusted library allocation
|
page read and write
|
||
7FF887CD5000
|
trusted library allocation
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
14F4B108000
|
heap
|
page read and write
|
||
14F4B11E000
|
heap
|
page read and write
|
||
A856DFF000
|
stack
|
page read and write
|
||
3182000
|
trusted library allocation
|
page read and write
|
||
22CAE400000
|
heap
|
page read and write
|
||
7FF887CF0000
|
trusted library allocation
|
page read and write
|
||
7FF887D1C000
|
trusted library allocation
|
page read and write
|
||
7FF887BB8000
|
trusted library allocation
|
page read and write
|
||
2311685E000
|
heap
|
page read and write
|
||
3766000
|
trusted library allocation
|
page read and write
|
||
1BDEE000
|
stack
|
page read and write
|
||
3490000
|
trusted library allocation
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
14F4B115000
|
heap
|
page read and write
|
||
18E73495000
|
heap
|
page read and write
|
||
18E7349A000
|
heap
|
page read and write
|
||
D06000
|
heap
|
page read and write
|
||
193859AE000
|
heap
|
page read and write
|
||
1BDC7000
|
heap
|
page read and write
|
||
7FF887CD2000
|
trusted library allocation
|
page read and write
|
||
551E000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
54C0000
|
heap
|
page read and write
|
||
131DA000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
22968B6C000
|
heap
|
page read and write
|
||
26AB9151000
|
heap
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
7FF887B2C000
|
trusted library allocation
|
page execute and read and write
|
||
15F85850000
|
heap
|
page read and write
|
||
120D000
|
heap
|
page read and write
|
||
18E73490000
|
heap
|
page read and write
|
||
12CBA000
|
trusted library allocation
|
page read and write
|
||
1EA4ABF0000
|
heap
|
page read and write
|
||
2311685E000
|
heap
|
page read and write
|
||
3472000
|
heap
|
page read and write
|
||
7FF8879CC000
|
trusted library allocation
|
page read and write
|
||
7FF887AFA000
|
trusted library allocation
|
page execute and read and write
|
||
38B7000
|
heap
|
page read and write
|
||
12CC5000
|
trusted library allocation
|
page read and write
|
||
13A27000
|
trusted library allocation
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
16066000
|
trusted library allocation
|
page read and write
|
||
EC2000
|
unkown
|
page readonly
|
||
3A49000
|
trusted library allocation
|
page read and write
|
||
1B904000
|
stack
|
page read and write
|
||
2FEE000
|
heap
|
page read and write
|
||
7FF8879D3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887A83000
|
trusted library allocation
|
page execute and read and write
|
||
1C36B000
|
heap
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
7FF8879B4000
|
trusted library allocation
|
page read and write
|
||
1135000
|
heap
|
page read and write
|
||
13778000
|
trusted library allocation
|
page read and write
|
||
1C676000
|
heap
|
page read and write
|
||
13974000
|
trusted library allocation
|
page read and write
|
||
3410000
|
trusted library section
|
page read and write
|
||
D21000
|
heap
|
page read and write
|
||
7FF887E40000
|
trusted library allocation
|
page execute and read and write
|
||
23116894000
|
heap
|
page read and write
|
||
7FF887D12000
|
trusted library allocation
|
page read and write
|
||
13630000
|
trusted library allocation
|
page read and write
|
||
3200000
|
heap
|
page readonly
|
||
7FF887B36000
|
trusted library allocation
|
page read and write
|
||
345F000
|
trusted library allocation
|
page read and write
|
||
1C70F000
|
stack
|
page read and write
|
||
33782FF000
|
stack
|
page read and write
|
||
1C64A000
|
heap
|
page read and write
|
||
7FF887D70000
|
trusted library allocation
|
page read and write
|
||
14F4B115000
|
heap
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
7FF887D60000
|
trusted library allocation
|
page execute and read and write
|
||
137F8000
|
trusted library allocation
|
page read and write
|
||
1C9EC000
|
stack
|
page read and write
|
||
26AB9166000
|
heap
|
page read and write
|
||
34E2000
|
heap
|
page read and write
|
||
22968BBB000
|
heap
|
page read and write
|
||
3970000
|
trusted library allocation
|
page read and write
|
||
193859A6000
|
heap
|
page read and write
|
||
26CB1CF5000
|
heap
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
7FF887D00000
|
trusted library allocation
|
page read and write
|
||
7FF887D24000
|
trusted library allocation
|
page read and write
|
||
12763000
|
trusted library allocation
|
page read and write
|
||
1C56E000
|
heap
|
page read and write
|
||
2C14000
|
trusted library allocation
|
page read and write
|
||
2ED4000
|
trusted library allocation
|
page read and write
|
||
B22000
|
heap
|
page read and write
|
||
17B0000
|
heap
|
page read and write
|
||
23116847000
|
heap
|
page read and write
|
||
7FF887CD2000
|
trusted library allocation
|
page read and write
|
||
7FF887E00000
|
trusted library allocation
|
page read and write
|
||
2311688C000
|
heap
|
page read and write
|
||
7FF887E50000
|
trusted library allocation
|
page execute and read and write
|
||
1D2D0000
|
heap
|
page read and write
|
||
23116A35000
|
heap
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
1714000
|
heap
|
page read and write
|
||
7FF887A87000
|
trusted library allocation
|
page read and write
|
||
7FF4F3DF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887A5C000
|
trusted library allocation
|
page execute and read and write
|
||
26AB9154000
|
heap
|
page read and write
|
||
14F4B0AB000
|
heap
|
page read and write
|
||
14F4B115000
|
heap
|
page read and write
|
||
26AB90E0000
|
heap
|
page read and write
|
||
26AB916D000
|
heap
|
page read and write
|
||
7FF887E40000
|
trusted library allocation
|
page read and write
|
||
3166000
|
stack
|
page read and write
|
||
1D3DE000
|
stack
|
page read and write
|
||
7FF887B90000
|
trusted library allocation
|
page read and write
|
||
2BC6000
|
trusted library allocation
|
page read and write
|
||
14F4B113000
|
heap
|
page read and write
|
||
7FF887C44000
|
trusted library allocation
|
page read and write
|
||
1D3DB000
|
stack
|
page read and write
|
||
A8569FE000
|
stack
|
page read and write
|
||
12E91000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
1C5D0000
|
trusted library section
|
page read and write
|
||
15F85510000
|
heap
|
page read and write
|
||
7FF887AAD000
|
trusted library allocation
|
page execute and read and write
|
||
22968BB9000
|
heap
|
page read and write
|
||
134E1000
|
trusted library allocation
|
page read and write
|
||
1B32E000
|
stack
|
page read and write
|
||
7FF887A8C000
|
trusted library allocation
|
page execute and read and write
|
||
2CD6000
|
trusted library allocation
|
page read and write
|
||
57AE000
|
heap
|
page read and write
|
||
14F4B090000
|
heap
|
page read and write
|
||
26AB912E000
|
heap
|
page read and write
|
||
7FF887C70000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
1B460000
|
heap
|
page execute and read and write
|
||
26AB9130000
|
heap
|
page read and write
|
||
7FF8879D6000
|
trusted library allocation
|
page read and write
|
||
1B861000
|
stack
|
page read and write
|
||
15F0000
|
heap
|
page execute and read and write
|
||
7FF887C2B000
|
trusted library allocation
|
page read and write
|
||
2D3B000
|
stack
|
page read and write
|
||
14F4B117000
|
heap
|
page read and write
|
||
D85000
|
heap
|
page read and write
|
||
1C3A0000
|
heap
|
page read and write
|
||
7FF887D1F000
|
trusted library allocation
|
page read and write
|
||
7FF887B7B000
|
trusted library allocation
|
page read and write
|
||
139EC000
|
trusted library allocation
|
page read and write
|
||
19385953000
|
heap
|
page read and write
|
||
7FF887D14000
|
trusted library allocation
|
page read and write
|
||
3103000
|
trusted library allocation
|
page read and write
|
||
7FF887CB7000
|
trusted library allocation
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
34EA000
|
heap
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
14F4AEB0000
|
heap
|
page read and write
|
||
361F000
|
stack
|
page read and write
|
||
7FF887B8B000
|
trusted library allocation
|
page read and write
|
||
1BE70000
|
heap
|
page execute and read and write
|
||
1C392000
|
heap
|
page read and write
|
||
7FF887AD0000
|
trusted library allocation
|
page execute and read and write
|
||
22968BA8000
|
heap
|
page read and write
|
||
23116891000
|
heap
|
page read and write
|
||
2CBA000
|
trusted library allocation
|
page read and write
|
||
1CC2D000
|
stack
|
page read and write
|
||
526A000
|
trusted library allocation
|
page read and write
|
||
18E733A0000
|
heap
|
page read and write
|
||
7FF887E60000
|
trusted library allocation
|
page execute and read and write
|
||
1435E000
|
trusted library allocation
|
page read and write
|
||
2311688F000
|
heap
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
2FDD000
|
heap
|
page read and write
|
||
23116830000
|
heap
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
2C84000
|
trusted library allocation
|
page read and write
|
||
12E93000
|
trusted library allocation
|
page read and write
|
||
26CB1920000
|
heap
|
page read and write
|
||
2DD9000
|
trusted library allocation
|
page read and write
|
||
37E9000
|
trusted library allocation
|
page read and write
|
||
380E000
|
trusted library allocation
|
page read and write
|
||
14F4B107000
|
heap
|
page read and write
|
||
7FF887A9B000
|
trusted library allocation
|
page execute and read and write
|
||
1C07C000
|
heap
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
7FF887AAB000
|
trusted library allocation
|
page execute and read and write
|
||
455CBFA000
|
stack
|
page read and write
|
||
139C3000
|
trusted library allocation
|
page read and write
|
||
22968B7D000
|
heap
|
page read and write
|
||
1C3CC000
|
heap
|
page read and write
|
||
57A0000
|
heap
|
page read and write
|
||
1D728000
|
heap
|
page read and write
|
||
7FF887D70000
|
trusted library allocation
|
page read and write
|
||
7FF887BB0000
|
trusted library allocation
|
page read and write
|
||
1CAF0000
|
heap
|
page read and write
|
||
1BFEE000
|
stack
|
page read and write
|
||
313D000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
7FF8879A3000
|
trusted library allocation
|
page execute and read and write
|
||
17F0000
|
heap
|
page read and write
|
||
1BB0E000
|
stack
|
page read and write
|
||
120B000
|
heap
|
page read and write
|
||
18E734A9000
|
heap
|
page read and write
|
||
7FF887C00000
|
trusted library allocation
|
page read and write
|
||
1C4D6000
|
heap
|
page read and write
|
||
7FF8879B0000
|
trusted library allocation
|
page read and write
|
||
7FF887A56000
|
trusted library allocation
|
page read and write
|
||
1C490000
|
trusted library section
|
page read and write
|
||
7FF887AF0000
|
trusted library allocation
|
page execute and read and write
|
||
966000
|
stack
|
page read and write
|
||
3067000
|
trusted library allocation
|
page read and write
|
||
1C351000
|
heap
|
page read and write
|
||
A9B72FA000
|
stack
|
page read and write
|
||
3863000
|
trusted library allocation
|
page read and write
|
||
1CAEE000
|
stack
|
page read and write
|
||
1BD10000
|
heap
|
page read and write
|
||
1C630000
|
heap
|
page read and write
|
||
22CAC920000
|
heap
|
page read and write
|
||
12A5D000
|
trusted library allocation
|
page read and write
|
||
1CB32000
|
heap
|
page read and write
|
||
26AB9167000
|
heap
|
page read and write
|
||
269BDEDB000
|
heap
|
page read and write
|
||
1BD16000
|
heap
|
page read and write
|
||
7FF887CA7000
|
trusted library allocation
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
18E73496000
|
heap
|
page read and write
|
||
7FF887C80000
|
trusted library allocation
|
page read and write
|
||
7FF8879DB000
|
trusted library allocation
|
page execute and read and write
|
||
14F4B0DD000
|
heap
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
18E73496000
|
heap
|
page read and write
|
||
22968BC9000
|
heap
|
page read and write
|
||
1AF00000
|
trusted library allocation
|
page read and write
|
||
269BDC98000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
1C1BD000
|
stack
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
787A1FF000
|
stack
|
page read and write
|
||
3156000
|
stack
|
page read and write
|
||
7FF887AA6000
|
trusted library allocation
|
page execute and read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
7FF8879FB000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887E17000
|
trusted library allocation
|
page read and write
|
||
7FF8879D7000
|
trusted library allocation
|
page read and write
|
||
12771000
|
trusted library allocation
|
page read and write
|
||
14F4B0B8000
|
heap
|
page read and write
|
||
2311687F000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
1BE4A000
|
heap
|
page read and write
|
||
BAB78FF000
|
stack
|
page read and write
|
||
38BB000
|
heap
|
page read and write
|
||
2EEE000
|
trusted library allocation
|
page read and write
|
||
7FF887CD8000
|
trusted library allocation
|
page read and write
|
||
1C30F000
|
stack
|
page read and write
|
||
193859BC000
|
heap
|
page read and write
|
||
FC0000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
2311684C000
|
heap
|
page read and write
|
||
22968B95000
|
heap
|
page read and write
|
||
7FF887C73000
|
trusted library allocation
|
page read and write
|
||
1BAEE000
|
stack
|
page read and write
|
||
1BC0D000
|
stack
|
page read and write
|
||
161B000
|
heap
|
page read and write
|
||
22968B30000
|
heap
|
page read and write
|
||
7FF887CD2000
|
trusted library allocation
|
page read and write
|
||
1340D000
|
trusted library allocation
|
page read and write
|
||
7FF887CFE000
|
trusted library allocation
|
page read and write
|
||
3455000
|
heap
|
page read and write
|
||
7FF887BB0000
|
trusted library allocation
|
page execute and read and write
|
||
E30000
|
heap
|
page read and write
|
||
7FF887CE0000
|
trusted library allocation
|
page read and write
|
||
E5D000
|
heap
|
page read and write
|
||
7FF887E60000
|
trusted library allocation
|
page execute and read and write
|
||
1BC70000
|
heap
|
page read and write
|
||
7FF887BA0000
|
trusted library allocation
|
page read and write
|
||
7FF887C71000
|
trusted library allocation
|
page read and write
|
||
14F6000
|
stack
|
page read and write
|
||
1B470000
|
trusted library allocation
|
page read and write
|
||
26AB917C000
|
heap
|
page read and write
|
||
1BD2A000
|
heap
|
page read and write
|
||
7FF887C34000
|
trusted library allocation
|
page read and write
|
||
CCD000
|
stack
|
page read and write
|
||
2E80000
|
heap
|
page execute and read and write
|
||
52B4000
|
heap
|
page read and write
|
||
26AB9167000
|
heap
|
page read and write
|
||
7FF887A74000
|
trusted library allocation
|
page read and write
|
||
149B0000
|
trusted library allocation
|
page read and write
|
||
7FF887B73000
|
trusted library allocation
|
page read and write
|
||
7FF887CE0000
|
trusted library allocation
|
page read and write
|
||
7FF8879E7000
|
trusted library allocation
|
page read and write
|
||
19385B50000
|
heap
|
page read and write
|
||
373000
|
unkown
|
page readonly
|
||
7FF887B60000
|
trusted library allocation
|
page read and write
|
||
7FF887A83000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887A90000
|
trusted library allocation
|
page execute and read and write
|
||
512E000
|
stack
|
page read and write
|
||
143E000
|
stack
|
page read and write
|
||
14178000
|
trusted library allocation
|
page read and write
|
||
301B000
|
heap
|
page read and write
|
||
135EA000
|
trusted library allocation
|
page read and write
|
||
134F4000
|
trusted library allocation
|
page read and write
|
||
14F4B0B8000
|
heap
|
page read and write
|
||
7FF887AA0000
|
trusted library allocation
|
page read and write
|
||
15578000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
1554E000
|
trusted library allocation
|
page read and write
|
||
26CB1A20000
|
heap
|
page read and write
|
||
22509140000
|
heap
|
page read and write
|
||
14F4B115000
|
heap
|
page read and write
|
||
7FF887B90000
|
trusted library allocation
|
page read and write
|
||
13E7C000
|
trusted library allocation
|
page read and write
|
||
F95000
|
heap
|
page read and write
|
||
1035000
|
heap
|
page read and write
|
||
193859A1000
|
heap
|
page read and write
|
||
23116868000
|
heap
|
page read and write
|
||
C78C77E000
|
stack
|
page read and write
|
||
7FF887D70000
|
trusted library allocation
|
page read and write
|
||
2FDA000
|
heap
|
page read and write
|
||
14F4B100000
|
heap
|
page read and write
|
||
7FF887DB8000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
trusted library allocation
|
page read and write
|
||
14815000
|
trusted library allocation
|
page read and write
|
||
52B0000
|
heap
|
page read and write
|
||
2C8F000
|
trusted library allocation
|
page read and write
|
||
380C000
|
trusted library allocation
|
page read and write
|
||
3173000
|
stack
|
page read and write
|
||
2311685A000
|
heap
|
page read and write
|
||
22CAC820000
|
heap
|
page read and write
|
||
3472000
|
heap
|
page read and write
|
||
7FF887B80000
|
trusted library allocation
|
page read and write
|
||
1D2D3000
|
heap
|
page read and write
|
||
13A94000
|
trusted library allocation
|
page read and write
|
||
18E734A0000
|
heap
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
7FF887B70000
|
trusted library allocation
|
page read and write
|
||
1C375000
|
heap
|
page read and write
|
||
7FF887E50000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
heap
|
page read and write
|
||
13085000
|
trusted library allocation
|
page read and write
|
||
7FF887E42000
|
trusted library allocation
|
page read and write
|
||
1348C000
|
trusted library allocation
|
page read and write
|
||
7FF887A84000
|
trusted library allocation
|
page read and write
|
||
74C9AFE000
|
stack
|
page read and write
|
||
3511000
|
trusted library allocation
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
561E000
|
stack
|
page read and write
|
||
2CC8000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
1B98D000
|
stack
|
page read and write
|
||
1BA30000
|
heap
|
page read and write
|
||
3818000
|
trusted library allocation
|
page read and write
|
||
1C31E000
|
stack
|
page read and write
|
||
269BDC20000
|
heap
|
page read and write
|
||
1C6CE000
|
stack
|
page read and write
|
||
7FF887D2E000
|
trusted library allocation
|
page read and write
|
||
7FF887D2E000
|
trusted library allocation
|
page read and write
|
||
7FF887C3B000
|
trusted library allocation
|
page read and write
|
||
2C8B000
|
trusted library allocation
|
page read and write
|
||
22968B51000
|
heap
|
page read and write
|
||
326F000
|
trusted library allocation
|
page read and write
|
||
BC96FFD000
|
stack
|
page read and write
|
||
7FF887A80000
|
trusted library allocation
|
page execute and read and write
|
||
2FCF000
|
heap
|
page read and write
|
||
1B64F000
|
stack
|
page read and write
|
||
A8565EA000
|
stack
|
page read and write
|
||
30E5000
|
trusted library allocation
|
page read and write
|
||
2F2D000
|
trusted library allocation
|
page read and write
|
||
1C580000
|
trusted library section
|
page read and write
|
||
3573000
|
trusted library allocation
|
page read and write
|
||
22CB2FF000
|
stack
|
page read and write
|
||
1C0C2000
|
stack
|
page read and write
|
||
2FE8000
|
heap
|
page read and write
|
||
1AE5C000
|
heap
|
page read and write
|
||
1C320000
|
heap
|
page read and write
|
||
7FF887B80000
|
trusted library allocation
|
page read and write
|
||
1B52A000
|
stack
|
page read and write
|
||
7FF887CC7000
|
trusted library allocation
|
page read and write
|
||
7FF887CA0000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
7FF887DE4000
|
trusted library allocation
|
page read and write
|
||
1C97E000
|
stack
|
page read and write
|
||
7FF887DB8000
|
trusted library allocation
|
page read and write
|
||
22968B89000
|
heap
|
page read and write
|
||
301E000
|
trusted library allocation
|
page read and write
|
||
1938596B000
|
heap
|
page read and write
|
||
1B80E000
|
stack
|
page read and write
|
||
22CAC930000
|
heap
|
page read and write
|
||
7FF887AC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8879F0000
|
trusted library allocation
|
page read and write
|
||
3883000
|
trusted library allocation
|
page read and write
|
||
7FF887BA8000
|
trusted library allocation
|
page execute and read and write
|
||
F90000
|
heap
|
page read and write
|
||
7FF887D30000
|
trusted library allocation
|
page read and write
|
||
3074000
|
trusted library allocation
|
page read and write
|
||
7FF887C90000
|
trusted library allocation
|
page read and write
|
||
EEF000
|
heap
|
page read and write
|
||
1B9CD000
|
stack
|
page read and write
|
||
12E98000
|
trusted library allocation
|
page read and write
|
||
56A0000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
2C1D000
|
trusted library allocation
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
2E1D000
|
stack
|
page read and write
|
||
1B90E000
|
stack
|
page read and write
|
||
2311682B000
|
heap
|
page read and write
|
||
7FF887B93000
|
trusted library allocation
|
page read and write
|
||
26ABAB80000
|
heap
|
page read and write
|
||
1C35D000
|
heap
|
page read and write
|
||
1AE4000
|
heap
|
page read and write
|
||
7FF887C20000
|
trusted library allocation
|
page read and write
|
||
7FF887C43000
|
trusted library allocation
|
page read and write
|
||
26AB9160000
|
heap
|
page read and write
|
||
2FCE000
|
trusted library allocation
|
page read and write
|
||
13C85000
|
trusted library allocation
|
page read and write
|
||
26AB912A000
|
heap
|
page read and write
|
||
3428000
|
heap
|
page read and write
|
||
139FD000
|
trusted library allocation
|
page read and write
|
||
7FF887D40000
|
trusted library allocation
|
page read and write
|
||
18E73484000
|
heap
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
7FF887C90000
|
trusted library allocation
|
page execute and read and write
|
||
EEE000
|
stack
|
page read and write
|
||
1BDB7000
|
heap
|
page read and write
|
||
371E000
|
stack
|
page read and write
|
||
7FF8879AD000
|
trusted library allocation
|
page execute and read and write
|
||
1625000
|
heap
|
page read and write
|
||
7FF887CFA000
|
trusted library allocation
|
page read and write
|
||
7FF887B80000
|
trusted library allocation
|
page read and write
|
||
22968B80000
|
heap
|
page read and write
|
||
33AD000
|
trusted library allocation
|
page read and write
|
||
26AB9173000
|
heap
|
page read and write
|
||
384000
|
unkown
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
19A0000
|
trusted library allocation
|
page read and write
|
||
7FF887CCD000
|
trusted library allocation
|
page read and write
|
||
2F37000
|
trusted library allocation
|
page read and write
|
||
7FF887A70000
|
trusted library allocation
|
page read and write
|
||
7FF887A94000
|
trusted library allocation
|
page read and write
|
||
1B6C0000
|
heap
|
page execute and read and write
|
||
1C7EE000
|
stack
|
page read and write
|
||
19385986000
|
heap
|
page read and write
|
||
2311688C000
|
heap
|
page read and write
|
||
14C5000
|
heap
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
E8F000
|
stack
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
22968BA2000
|
heap
|
page read and write
|
||
37C0000
|
trusted library allocation
|
page read and write
|
||
7FF887C22000
|
trusted library allocation
|
page read and write
|
||
7FF8879EC000
|
trusted library allocation
|
page read and write
|
||
1B9BE000
|
stack
|
page read and write
|
||
193859B6000
|
heap
|
page read and write
|
||
12ED1000
|
trusted library allocation
|
page read and write
|
||
1C390000
|
heap
|
page read and write
|
||
7FF887B83000
|
trusted library allocation
|
page read and write
|
||
18E73490000
|
heap
|
page read and write
|
||
1B500000
|
heap
|
page read and write
|
||
3026000
|
trusted library allocation
|
page read and write
|
||
1BD87000
|
heap
|
page read and write
|
||
C46EFE000
|
stack
|
page read and write
|
||
3486000
|
trusted library allocation
|
page read and write
|
||
7FF887D43000
|
trusted library allocation
|
page read and write
|
||
1B400000
|
heap
|
page read and write
|
||
2FCB000
|
heap
|
page read and write
|
||
1C143000
|
heap
|
page read and write
|
||
14F4B110000
|
heap
|
page read and write
|
||
7FF8879D0000
|
trusted library allocation
|
page read and write
|
||
AF1000
|
heap
|
page read and write
|
||
7FF887E12000
|
trusted library allocation
|
page read and write
|
||
1B76E000
|
stack
|
page read and write
|
||
134C3000
|
trusted library allocation
|
page read and write
|
||
7FF887E30000
|
trusted library allocation
|
page read and write
|
||
7FF887E30000
|
trusted library allocation
|
page execute and read and write
|
||
2FDC000
|
heap
|
page read and write
|
||
549EFF000
|
stack
|
page read and write
|
||
11AA000
|
heap
|
page read and write
|
||
7FF887A90000
|
trusted library allocation
|
page execute and read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
14128000
|
trusted library allocation
|
page read and write
|
||
1C0ED000
|
stack
|
page read and write
|
||
22968B7F000
|
heap
|
page read and write
|
||
1C419000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
1C2C4000
|
stack
|
page read and write
|
||
26CB1CFB000
|
heap
|
page read and write
|
||
1EA4AFB4000
|
heap
|
page read and write
|
||
18E73441000
|
heap
|
page read and write
|
||
12761000
|
trusted library allocation
|
page read and write
|
||
225093BE000
|
heap
|
page read and write
|
||
7FF887D00000
|
trusted library allocation
|
page read and write
|
||
1CFD9000
|
heap
|
page read and write
|
||
7FF887A7D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887D60000
|
trusted library allocation
|
page read and write
|
||
2FDF000
|
heap
|
page read and write
|
||
1C600000
|
trusted library section
|
page read and write
|
||
7FF887D14000
|
trusted library allocation
|
page read and write
|
||
7FF887DF2000
|
trusted library allocation
|
page read and write
|
||
9F6000
|
stack
|
page read and write
|
||
3A43000
|
trusted library allocation
|
page read and write
|
||
1645000
|
heap
|
page read and write
|
||
C468FA000
|
stack
|
page read and write
|
||
1B70E000
|
stack
|
page read and write
|
||
7FF887B93000
|
trusted library allocation
|
page read and write
|
||
1BAB0000
|
heap
|
page read and write
|
||
388D000
|
trusted library allocation
|
page read and write
|
||
2E64000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
1BDA7000
|
heap
|
page read and write
|
||
193859A1000
|
heap
|
page read and write
|
||
7FF887E23000
|
trusted library allocation
|
page read and write
|
||
7FF887B6C000
|
trusted library allocation
|
page read and write
|
||
2CE4000
|
trusted library allocation
|
page read and write
|
||
7FF8879A0000
|
trusted library allocation
|
page read and write
|
||
1CFAC000
|
stack
|
page read and write
|
||
787A6FF000
|
stack
|
page read and write
|
||
5ADE000
|
stack
|
page read and write
|
||
3092000
|
trusted library allocation
|
page read and write
|
||
22968BB5000
|
heap
|
page read and write
|
||
7FF887E10000
|
trusted library allocation
|
page read and write
|
||
7FF887A83000
|
trusted library allocation
|
page execute and read and write
|
||
14F4B0B8000
|
heap
|
page read and write
|
||
1B25E000
|
heap
|
page read and write
|
||
26AB911C000
|
heap
|
page read and write
|
||
134F1000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
7FF887C17000
|
trusted library allocation
|
page read and write
|
||
7FF887DCA000
|
trusted library allocation
|
page read and write
|
||
455D3FF000
|
stack
|
page read and write
|
||
9A301FE000
|
stack
|
page read and write
|
||
7FF887D10000
|
trusted library allocation
|
page read and write
|
||
7FF887C6B000
|
trusted library allocation
|
page read and write
|
||
2EDC000
|
trusted library allocation
|
page read and write
|
||
7FF887B60000
|
trusted library allocation
|
page read and write
|
||
C470FF000
|
stack
|
page read and write
|
||
EDA000
|
heap
|
page read and write
|
||
A9B73FF000
|
stack
|
page read and write
|
||
2311687E000
|
heap
|
page read and write
|
||
2C5E000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
3263000
|
trusted library allocation
|
page read and write
|
||
7FF887C33000
|
trusted library allocation
|
page read and write
|
||
23116847000
|
heap
|
page read and write
|
||
7FF8879F4000
|
trusted library allocation
|
page read and write
|
||
7FF887DF4000
|
trusted library allocation
|
page read and write
|
||
2E1E000
|
trusted library allocation
|
page read and write
|
||
2311687E000
|
heap
|
page read and write
|
||
1970000
|
trusted library allocation
|
page read and write
|
||
7FF887D42000
|
trusted library allocation
|
page read and write
|
||
18E73449000
|
heap
|
page read and write
|
||
231167C0000
|
heap
|
page read and write
|
||
AF3000
|
heap
|
page read and write
|
||
26AB9020000
|
heap
|
page read and write
|
||
2311687E000
|
heap
|
page read and write
|
||
2DF8000
|
trusted library allocation
|
page read and write
|
||
135AC000
|
trusted library allocation
|
page read and write
|
||
DA5000
|
heap
|
page read and write
|
||
1B430000
|
trusted library allocation
|
page read and write
|
||
791F000
|
stack
|
page read and write
|
||
7FF887A2C000
|
trusted library allocation
|
page execute and read and write
|
||
1C349000
|
heap
|
page read and write
|
||
1313D000
|
trusted library allocation
|
page read and write
|
||
7FF887BD0000
|
trusted library allocation
|
page read and write
|
||
7FF887CC2000
|
trusted library allocation
|
page read and write
|
||
2296A490000
|
heap
|
page read and write
|
||
301B000
|
heap
|
page read and write
|
||
7FF887D00000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
unkown
|
page readonly
|
||
54DE000
|
stack
|
page read and write
|
||
30A1000
|
trusted library allocation
|
page read and write
|
||
1D722000
|
heap
|
page read and write
|
||
7FF887C77000
|
trusted library allocation
|
page read and write
|
||
7FF887D30000
|
trusted library allocation
|
page read and write
|
||
28A8000
|
heap
|
page read and write
|
||
26AB916A000
|
heap
|
page read and write
|
||
18E7345C000
|
heap
|
page read and write
|
||
7FF887CD0000
|
trusted library allocation
|
page read and write
|
||
14F4B0FD000
|
heap
|
page read and write
|
||
2D10000
|
heap
|
page read and write
|
||
15F855F0000
|
heap
|
page read and write
|
||
326D000
|
trusted library allocation
|
page read and write
|
||
2FF2000
|
heap
|
page read and write
|
||
2FDD000
|
heap
|
page read and write
|
||
AA0000
|
trusted library allocation
|
page read and write
|
||
14F4B110000
|
heap
|
page read and write
|
||
3160000
|
stack
|
page read and write
|
||
18E734B8000
|
heap
|
page read and write
|
||
2311685E000
|
heap
|
page read and write
|
||
22509048000
|
heap
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
7FF887DB8000
|
trusted library allocation
|
page read and write
|
||
7FF887BF2000
|
trusted library allocation
|
page read and write
|
||
7FF887BF7000
|
trusted library allocation
|
page read and write
|
||
7FF887C6D000
|
trusted library allocation
|
page read and write
|
||
2FC7000
|
heap
|
page read and write
|
||
7FF887B40000
|
trusted library allocation
|
page execute and read and write
|
||
12B38000
|
trusted library allocation
|
page read and write
|
||
7FF8879CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887BA0000
|
trusted library allocation
|
page execute and read and write
|
||
3855000
|
trusted library allocation
|
page read and write
|
||
D6E000
|
heap
|
page read and write
|
||
1BD8E000
|
heap
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
338F000
|
stack
|
page read and write
|
||
7FF887DC0000
|
trusted library allocation
|
page read and write
|
||
231167E0000
|
heap
|
page read and write
|
||
38E0000
|
trusted library allocation
|
page read and write
|
||
26AB9108000
|
heap
|
page read and write
|
||
7FF887C30000
|
trusted library allocation
|
page read and write
|
||
1BB6E000
|
stack
|
page read and write
|
||
E59000
|
heap
|
page read and write
|
||
14F4B10F000
|
heap
|
page read and write
|
||
7FF887C60000
|
trusted library allocation
|
page read and write
|
||
2311688E000
|
heap
|
page read and write
|
||
15F85610000
|
heap
|
page read and write
|
||
34E1000
|
trusted library allocation
|
page read and write
|
||
231168A3000
|
heap
|
page read and write
|
||
2E88000
|
heap
|
page read and write
|
||
13448000
|
trusted library allocation
|
page read and write
|
||
1B05D000
|
stack
|
page read and write
|
||
3352000
|
trusted library allocation
|
page read and write
|
||
392C000
|
trusted library allocation
|
page read and write
|
||
1BE02000
|
heap
|
page read and write
|
||
7FF887C40000
|
trusted library allocation
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
7FF887CD9000
|
trusted library allocation
|
page read and write
|
||
26ABAF10000
|
heap
|
page read and write
|
||
14F4B0FD000
|
heap
|
page read and write
|
||
26AB9131000
|
heap
|
page read and write
|
||
1C5F0000
|
trusted library section
|
page read and write
|
||
7FF887A8C000
|
trusted library allocation
|
page read and write
|
||
1B623000
|
stack
|
page read and write
|
||
7FF887D62000
|
trusted library allocation
|
page read and write
|
||
23116884000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
26AB912E000
|
heap
|
page read and write
|
||
2FE3000
|
heap
|
page read and write
|
||
7FF887D20000
|
trusted library allocation
|
page read and write
|
||
7FF887CE8000
|
trusted library allocation
|
page read and write
|
||
1CF4D000
|
stack
|
page read and write
|
||
2FD9000
|
heap
|
page read and write
|
||
FA0000
|
trusted library allocation
|
page read and write
|
||
C46DFE000
|
stack
|
page read and write
|
||
2FD9000
|
heap
|
page read and write
|
||
14392000
|
trusted library allocation
|
page read and write
|
||
7FF8879FB000
|
trusted library allocation
|
page execute and read and write
|
||
10B4000
|
heap
|
page read and write
|
||
22968BB1000
|
heap
|
page read and write
|
||
269BDCC7000
|
heap
|
page read and write
|
||
23116861000
|
heap
|
page read and write
|
||
CA9000
|
heap
|
page read and write
|
||
1ADE000
|
stack
|
page read and write
|
||
18E734A0000
|
heap
|
page read and write
|
||
7FF887C70000
|
trusted library allocation
|
page read and write
|
||
15F85670000
|
heap
|
page read and write
|
||
1C38D000
|
stack
|
page read and write
|
||
7FF887D24000
|
trusted library allocation
|
page read and write
|
||
26AB9104000
|
heap
|
page read and write
|
||
7FF887AAD000
|
trusted library allocation
|
page execute and read and write
|
||
22968AC0000
|
heap
|
page read and write
|
||
190E000
|
stack
|
page read and write
|
||
1938597F000
|
heap
|
page read and write
|
||
13401000
|
trusted library allocation
|
page read and write
|
||
14F4B0CC000
|
heap
|
page read and write
|
||
22968B95000
|
heap
|
page read and write
|
||
1BBEE000
|
stack
|
page read and write
|
||
3448000
|
heap
|
page read and write
|
||
1B96B000
|
stack
|
page read and write
|
||
7FF887DD0000
|
trusted library allocation
|
page read and write
|
||
26AB9131000
|
heap
|
page read and write
|
||
7FF887C50000
|
trusted library allocation
|
page read and write
|
||
7FF887E70000
|
trusted library allocation
|
page execute and read and write
|
||
389B000
|
trusted library allocation
|
page read and write
|
||
33F7000
|
trusted library allocation
|
page read and write
|
||
225093B0000
|
heap
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
23437017000
|
heap
|
page read and write
|
||
14F4B0FD000
|
heap
|
page read and write
|
||
7FF887C1C000
|
trusted library allocation
|
page read and write
|
||
23116A30000
|
heap
|
page read and write
|
||
1664000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
1BCBE000
|
stack
|
page read and write
|
||
7FF887D10000
|
trusted library allocation
|
page read and write
|
||
7FF887D00000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
heap
|
page execute and read and write
|
||
7FF887C40000
|
trusted library allocation
|
page read and write
|
||
1C2CE000
|
stack
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
2311688C000
|
heap
|
page read and write
|
||
1ACED000
|
stack
|
page read and write
|
||
14F4B280000
|
heap
|
page read and write
|
||
7FF887DFF000
|
trusted library allocation
|
page read and write
|
||
130C5000
|
trusted library allocation
|
page read and write
|
||
193859BA000
|
heap
|
page read and write
|
||
26AB913A000
|
heap
|
page read and write
|
||
361C000
|
trusted library allocation
|
page read and write
|
||
22968B7D000
|
heap
|
page read and write
|
||
229689C0000
|
heap
|
page read and write
|
||
1CCAE000
|
stack
|
page read and write
|
||
CEB000
|
heap
|
page read and write
|
||
338E000
|
stack
|
page read and write
|
||
12E9D000
|
trusted library allocation
|
page read and write
|
||
2311683D000
|
heap
|
page read and write
|
||
1D5DE000
|
stack
|
page read and write
|
||
23116893000
|
heap
|
page read and write
|
||
7FF887D08000
|
trusted library allocation
|
page read and write
|
||
CBA000
|
heap
|
page read and write
|
||
157D3000
|
trusted library allocation
|
page read and write
|
||
37C4000
|
trusted library allocation
|
page read and write
|
||
22968B6B000
|
heap
|
page read and write
|
||
7FF887A9D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8879ED000
|
trusted library allocation
|
page execute and read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
7FF887C60000
|
trusted library allocation
|
page read and write
|
||
1BD53000
|
heap
|
page read and write
|
||
14F4B103000
|
heap
|
page read and write
|
||
1C590000
|
trusted library section
|
page read and write
|
||
2EA0000
|
heap
|
page read and write
|
||
2343724B000
|
heap
|
page read and write
|
||
7FF8879CD000
|
trusted library allocation
|
page execute and read and write
|
||
193859A5000
|
heap
|
page read and write
|
||
22509040000
|
heap
|
page read and write
|
||
7FF887E20000
|
trusted library allocation
|
page read and write
|
||
2FCF000
|
heap
|
page read and write
|
||
22968B66000
|
heap
|
page read and write
|
||
3404000
|
trusted library allocation
|
page read and write
|
||
1CFB0000
|
heap
|
page read and write
|
||
7FF887C60000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
trusted library allocation
|
page read and write
|
||
C46FFF000
|
stack
|
page read and write
|
||
18E73448000
|
heap
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
CED000
|
heap
|
page read and write
|
||
1C5C0000
|
trusted library section
|
page read and write
|
||
2811000
|
trusted library allocation
|
page read and write
|
||
2BF5000
|
trusted library allocation
|
page read and write
|
||
12EA8000
|
trusted library allocation
|
page read and write
|
||
344E000
|
heap
|
page read and write
|
||
7FF887CD0000
|
trusted library allocation
|
page read and write
|
||
13A4C000
|
trusted library allocation
|
page read and write
|
||
7FF887E10000
|
trusted library allocation
|
page read and write
|
||
B1D000
|
heap
|
page read and write
|
||
23436FE0000
|
heap
|
page read and write
|
||
7FF887C2A000
|
trusted library allocation
|
page read and write
|
||
2311689E000
|
heap
|
page read and write
|
||
1B57D000
|
stack
|
page read and write
|
||
18E73457000
|
heap
|
page read and write
|
||
2ED1000
|
trusted library allocation
|
page read and write
|
||
7FF887ADC000
|
trusted library allocation
|
page execute and read and write
|
||
18E73493000
|
heap
|
page read and write
|
||
1C08F000
|
stack
|
page read and write
|
||
344C000
|
heap
|
page read and write
|
||
1C4CD000
|
stack
|
page read and write
|
||
7FF887AA4000
|
trusted library allocation
|
page read and write
|
||
3836000
|
trusted library allocation
|
page read and write
|
||
1B120000
|
heap
|
page read and write
|
||
1BEB2000
|
stack
|
page read and write
|
||
1B375000
|
heap
|
page read and write
|
||
2FDC000
|
heap
|
page read and write
|
||
23116887000
|
heap
|
page read and write
|
||
7FF887B97000
|
trusted library allocation
|
page read and write
|
||
7FF887A60000
|
trusted library allocation
|
page read and write
|
||
7FF8879A4000
|
trusted library allocation
|
page read and write
|
||
7FF8879FC000
|
trusted library allocation
|
page execute and read and write
|
||
19385954000
|
heap
|
page read and write
|
||
C78C6FE000
|
stack
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
32FE000
|
stack
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
7FF887CF5000
|
trusted library allocation
|
page read and write
|
||
455D0FD000
|
stack
|
page read and write
|
||
14632000
|
trusted library allocation
|
page read and write
|
||
7FF887C4B000
|
trusted library allocation
|
page read and write
|
||
23116861000
|
heap
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
2EB8000
|
trusted library allocation
|
page read and write
|
||
22509076000
|
heap
|
page read and write
|
||
2FBD000
|
heap
|
page read and write
|
||
1513E000
|
trusted library allocation
|
page read and write
|
||
37E000
|
unkown
|
page write copy
|
||
1640000
|
heap
|
page read and write
|
||
310C000
|
trusted library allocation
|
page read and write
|
||
7FF8879BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887B6A000
|
trusted library allocation
|
page read and write
|
||
14B3B000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
7FF887E1D000
|
trusted library allocation
|
page read and write
|
||
1B42F000
|
stack
|
page read and write
|
||
14F4B115000
|
heap
|
page read and write
|
||
3214000
|
trusted library allocation
|
page read and write
|
||
3377CFE000
|
stack
|
page read and write
|
||
38CF000
|
trusted library allocation
|
page read and write
|
||
2311683E000
|
heap
|
page read and write
|
||
19385991000
|
heap
|
page read and write
|
||
7FF887C30000
|
trusted library allocation
|
page read and write
|
||
7FF887C30000
|
trusted library allocation
|
page read and write
|
||
1BBBF000
|
stack
|
page read and write
|
||
1D2EC000
|
heap
|
page read and write
|
||
7FF887B5C000
|
trusted library allocation
|
page read and write
|
||
7FF8879E0000
|
trusted library allocation
|
page read and write
|
||
18E73492000
|
heap
|
page read and write
|
||
23116860000
|
heap
|
page read and write
|
||
7FF887DF0000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
14F4B0B0000
|
heap
|
page read and write
|
||
7FF887C90000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887D30000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
heap
|
page execute and read and write
|
||
7FF8879C4000
|
trusted library allocation
|
page read and write
|
||
7FF8879C3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887C30000
|
trusted library allocation
|
page read and write
|
||
7FF887D28000
|
trusted library allocation
|
page read and write
|
||
2311688C000
|
heap
|
page read and write
|
||
57AE000
|
heap
|
page read and write
|
||
163A000
|
heap
|
page read and write
|
||
1BFBB000
|
stack
|
page read and write
|
||
11AC000
|
heap
|
page read and write
|
||
D15000
|
heap
|
page read and write
|
||
1C57D000
|
heap
|
page read and write
|
||
307E000
|
trusted library allocation
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
7FF887E70000
|
trusted library allocation
|
page execute and read and write
|
||
2BD2000
|
trusted library allocation
|
page read and write
|
||
14F6000
|
stack
|
page read and write
|
||
2B9A000
|
trusted library allocation
|
page read and write
|
||
BAB76FA000
|
stack
|
page read and write
|
||
1EA4ABC0000
|
heap
|
page read and write
|
||
1CC6F000
|
stack
|
page read and write
|
||
19385966000
|
heap
|
page read and write
|
||
193859C4000
|
heap
|
page read and write
|
||
7FF887E39000
|
trusted library allocation
|
page read and write
|
||
7FF887DB0000
|
trusted library allocation
|
page execute and read and write
|
||
143AC000
|
trusted library allocation
|
page read and write
|
||
7FF887D1C000
|
trusted library allocation
|
page read and write
|
||
7FF887E52000
|
trusted library allocation
|
page read and write
|
||
2C3B000
|
stack
|
page read and write
|
||
18E73470000
|
heap
|
page read and write
|
||
13C79000
|
trusted library allocation
|
page read and write
|
||
7FF887D80000
|
trusted library allocation
|
page read and write
|
||
13495000
|
trusted library allocation
|
page read and write
|
||
7FF887A9D000
|
trusted library allocation
|
page execute and read and write
|
||
2DDF000
|
stack
|
page read and write
|
||
12768000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
13808000
|
trusted library allocation
|
page read and write
|
||
787A0FA000
|
stack
|
page read and write
|
||
CDD000
|
heap
|
page read and write
|
||
269BDC90000
|
heap
|
page read and write
|
||
13270000
|
trusted library allocation
|
page read and write
|
||
1D31C000
|
heap
|
page read and write
|
||
7FF887CFA000
|
trusted library allocation
|
page read and write
|
||
193859AE000
|
heap
|
page read and write
|
||
378C000
|
trusted library allocation
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
C60000
|
trusted library allocation
|
page read and write
|
||
1437C000
|
trusted library allocation
|
page read and write
|
||
14F4B114000
|
heap
|
page read and write
|
||
2311685B000
|
heap
|
page read and write
|
||
2CF2000
|
trusted library allocation
|
page read and write
|
||
1352D000
|
trusted library allocation
|
page read and write
|
||
7FF887E40000
|
trusted library allocation
|
page execute and read and write
|
||
13D0000
|
heap
|
page read and write
|
||
7FF887B90000
|
trusted library allocation
|
page read and write
|
||
3871000
|
trusted library allocation
|
page read and write
|
||
385C000
|
trusted library allocation
|
page read and write
|
||
455D1FF000
|
stack
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
7FF887C2C000
|
trusted library allocation
|
page read and write
|
||
22CAC996000
|
heap
|
page read and write
|
||
26AB9157000
|
heap
|
page read and write
|
||
7FF887BB0000
|
trusted library allocation
|
page read and write
|
||
5690000
|
trusted library allocation
|
page read and write
|
||
7FF887BA0000
|
trusted library allocation
|
page read and write
|
||
7FF887D1C000
|
trusted library allocation
|
page read and write
|
||
3166000
|
trusted library allocation
|
page read and write
|
||
1C530000
|
trusted library section
|
page read and write
|
||
7FF887B60000
|
trusted library allocation
|
page read and write
|
||
AB6000
|
heap
|
page read and write
|
||
19385980000
|
heap
|
page read and write
|
||
1BE2E000
|
unkown
|
page read and write
|
||
7FF887E10000
|
trusted library allocation
|
page read and write
|
||
1B45D000
|
stack
|
page read and write
|
||
22968BC6000
|
heap
|
page read and write
|
||
7FF887CF0000
|
trusted library allocation
|
page read and write
|
||
18E732A0000
|
heap
|
page read and write
|
||
7FF887E50000
|
trusted library allocation
|
page read and write
|
||
7FF887D22000
|
trusted library allocation
|
page read and write
|
||
1C37E000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
1BE0E000
|
stack
|
page read and write
|
||
7FF887AB6000
|
trusted library allocation
|
page execute and read and write
|
||
12AED000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
7FF887B5B000
|
trusted library allocation
|
page read and write
|
||
7FF887D10000
|
trusted library allocation
|
page read and write
|
||
1B100000
|
heap
|
page execute and read and write
|
||
11CE000
|
stack
|
page read and write
|
||
7FF887D20000
|
trusted library allocation
|
page read and write
|
||
7FF887BF0000
|
trusted library allocation
|
page read and write
|
||
34EA000
|
heap
|
page read and write
|
||
787A8FF000
|
stack
|
page read and write
|
||
A856EFE000
|
stack
|
page read and write
|
||
3A3000
|
unkown
|
page readonly
|
||
3059000
|
trusted library allocation
|
page read and write
|
||
1BCFE000
|
stack
|
page read and write
|
||
123C000
|
heap
|
page read and write
|
||
A856FFE000
|
stack
|
page read and write
|
||
134F5000
|
trusted library allocation
|
page read and write
|
||
193859AE000
|
heap
|
page read and write
|
||
3378000
|
trusted library allocation
|
page read and write
|
||
58CF000
|
stack
|
page read and write
|
||
1B360000
|
heap
|
page execute and read and write
|
||
1215000
|
heap
|
page read and write
|
||
2EB4000
|
trusted library allocation
|
page read and write
|
||
2C1B000
|
trusted library allocation
|
page read and write
|
||
7FF887A93000
|
trusted library allocation
|
page read and write
|
||
18E734A2000
|
heap
|
page read and write
|
||
7FF887E00000
|
trusted library allocation
|
page read and write
|
||
ABC000
|
heap
|
page read and write
|
||
1D6E0000
|
heap
|
page read and write
|
||
BC973FE000
|
stack
|
page read and write
|
||
2EC6000
|
trusted library allocation
|
page read and write
|
||
269BDED0000
|
heap
|
page read and write
|
||
193859AB000
|
heap
|
page read and write
|
||
1910000
|
heap
|
page read and write
|
||
301B000
|
heap
|
page read and write
|
||
193859B5000
|
heap
|
page read and write
|
||
3179000
|
stack
|
page read and write
|
||
1C563000
|
heap
|
page read and write
|
||
7FF887C4B000
|
trusted library allocation
|
page read and write
|
||
384B000
|
trusted library allocation
|
page read and write
|
||
1C9EB000
|
stack
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
2B6E000
|
trusted library allocation
|
page read and write
|
||
38B0000
|
heap
|
page read and write
|
||
1EA4AFB0000
|
heap
|
page read and write
|
||
14F4B0E0000
|
heap
|
page read and write
|
||
7FF887E12000
|
trusted library allocation
|
page read and write
|
||
3044000
|
trusted library allocation
|
page read and write
|
||
22968BB4000
|
heap
|
page read and write
|
||
301B000
|
heap
|
page read and write
|
||
7FF887B63000
|
trusted library allocation
|
page read and write
|
||
1472B000
|
trusted library allocation
|
page read and write
|
||
1C641000
|
heap
|
page read and write
|
||
7FF887A73000
|
trusted library allocation
|
page execute and read and write
|
||
1938596C000
|
heap
|
page read and write
|
||
7FF887B90000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887B7E000
|
trusted library allocation
|
page read and write
|
||
3472000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
39A0000
|
trusted library allocation
|
page read and write
|
||
2FD9000
|
trusted library allocation
|
page read and write
|
||
1B6F0000
|
heap
|
page read and write
|
||
7FF887C0B000
|
trusted library allocation
|
page read and write
|
||
1C33A000
|
heap
|
page read and write
|
||
18E7346B000
|
heap
|
page read and write
|
||
1D11D000
|
stack
|
page read and write
|
||
22CAFFF000
|
stack
|
page read and write
|
||
7FF887DF4000
|
trusted library allocation
|
page read and write
|
||
1B701000
|
stack
|
page read and write
|
||
315C000
|
stack
|
page read and write
|
||
356B000
|
trusted library allocation
|
page read and write
|
||
193859B7000
|
heap
|
page read and write
|
||
ADC000
|
heap
|
page read and write
|
||
2FEC000
|
heap
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
7FF887BE7000
|
trusted library allocation
|
page read and write
|
||
7FF887D1F000
|
trusted library allocation
|
page read and write
|
||
3177000
|
stack
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
19385966000
|
heap
|
page read and write
|
||
23437240000
|
heap
|
page read and write
|
||
134E4000
|
trusted library allocation
|
page read and write
|
||
33CE000
|
stack
|
page read and write
|
||
340000
|
unkown
|
page readonly
|
||
7FF887C50000
|
trusted library allocation
|
page read and write
|
||
19385990000
|
heap
|
page read and write
|
||
7FF887D1F000
|
trusted library allocation
|
page read and write
|
||
14345000
|
trusted library allocation
|
page read and write
|
||
7FF887AF8000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887C2C000
|
trusted library allocation
|
page read and write
|
||
7FF887D80000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887CDC000
|
trusted library allocation
|
page read and write
|
||
1B50E000
|
stack
|
page read and write
|
||
13ED6000
|
trusted library allocation
|
page read and write
|
||
1B9EF000
|
stack
|
page read and write
|
||
3182000
|
stack
|
page read and write
|
||
7FF8879BC000
|
trusted library allocation
|
page read and write
|
||
23437245000
|
heap
|
page read and write
|
||
2FEC000
|
heap
|
page read and write
|
||
7FF887D24000
|
trusted library allocation
|
page read and write
|
||
1C364000
|
heap
|
page read and write
|
||
1C4D0000
|
trusted library section
|
page read and write
|
||
1BA18000
|
heap
|
page read and write
|
||
2C1F000
|
trusted library allocation
|
page read and write
|
||
7FF8879E8000
|
trusted library allocation
|
page read and write
|
||
2750000
|
heap
|
page execute and read and write
|
||
3038000
|
trusted library allocation
|
page read and write
|
||
2E64000
|
trusted library allocation
|
page read and write
|
||
1B60E000
|
stack
|
page read and write
|
||
7FF887CF0000
|
trusted library allocation
|
page read and write
|
||
7FF887B01000
|
trusted library allocation
|
page execute and read and write
|
||
2E9C000
|
trusted library allocation
|
page read and write
|
||
7FF887BC0000
|
trusted library allocation
|
page read and write
|
||
22968AC5000
|
heap
|
page read and write
|
||
11F5000
|
heap
|
page read and write
|
||
2311685E000
|
heap
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
7FF887BA8000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887D4F000
|
trusted library allocation
|
page read and write
|
||
7FF887E52000
|
trusted library allocation
|
page read and write
|
||
1B66E000
|
stack
|
page read and write
|
||
13D18000
|
trusted library allocation
|
page read and write
|
||
9A300FE000
|
stack
|
page read and write
|
||
7FF887D90000
|
trusted library allocation
|
page execute and read and write
|
||
3567000
|
trusted library allocation
|
page read and write
|
||
7FF887C3B000
|
trusted library allocation
|
page read and write
|
||
7FF887C60000
|
trusted library allocation
|
page read and write
|
||
1BE9F000
|
heap
|
page read and write
|
||
193859B5000
|
heap
|
page read and write
|
||
18E734A9000
|
heap
|
page read and write
|
||
7FF887C50000
|
trusted library allocation
|
page read and write
|
||
18E73492000
|
heap
|
page read and write
|
||
1C431000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
C8D000
|
stack
|
page read and write
|
||
171C000
|
heap
|
page read and write
|
||
3007000
|
heap
|
page read and write
|
||
7FF887A8D000
|
trusted library allocation
|
page execute and read and write
|
||
26AB9153000
|
heap
|
page read and write
|
||
7FF887BF0000
|
trusted library allocation
|
page read and write
|
||
1BD00000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
1C6DF000
|
unkown
|
page read and write
|
||
BAB77FE000
|
stack
|
page read and write
|
||
7FF887C20000
|
trusted library allocation
|
page read and write
|
||
33BE000
|
trusted library allocation
|
page read and write
|
||
9A303FF000
|
stack
|
page read and write
|
||
231168A6000
|
heap
|
page read and write
|
||
123B000
|
heap
|
page read and write
|
||
33CB000
|
trusted library allocation
|
page read and write
|
||
BAB7DFF000
|
stack
|
page read and write
|
||
10F6000
|
stack
|
page read and write
|
||
7FF887A93000
|
trusted library allocation
|
page read and write
|
||
2EDB000
|
trusted library allocation
|
page read and write
|
||
23436FE8000
|
heap
|
page read and write
|
||
30FB000
|
trusted library allocation
|
page read and write
|
||
37EE000
|
trusted library allocation
|
page read and write
|
||
7FF887D30000
|
trusted library allocation
|
page read and write
|
||
549AFF000
|
stack
|
page read and write
|
||
1EA4AC38000
|
heap
|
page read and write
|
||
26AB9163000
|
heap
|
page read and write
|
||
7FF887DE2000
|
trusted library allocation
|
page read and write
|
||
12C45000
|
trusted library allocation
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
7FF887A2C000
|
trusted library allocation
|
page execute and read and write
|
||
B90000
|
heap
|
page read and write
|
||
12ADD000
|
trusted library allocation
|
page read and write
|
||
7FF887E60000
|
trusted library allocation
|
page execute and read and write
|
||
34E2000
|
heap
|
page read and write
|
||
1CF5B000
|
stack
|
page read and write
|
||
26AB9010000
|
heap
|
page read and write
|
||
18E73457000
|
heap
|
page read and write
|
||
7FF887C70000
|
trusted library allocation
|
page read and write
|
||
7FF887C20000
|
trusted library allocation
|
page read and write
|
||
7FF887CF7000
|
trusted library allocation
|
page read and write
|
||
2F88000
|
heap
|
page read and write
|
||
3445000
|
heap
|
page read and write
|
||
23116886000
|
heap
|
page read and write
|
||
7FF887D20000
|
trusted library allocation
|
page read and write
|
||
13BF8000
|
trusted library allocation
|
page read and write
|
||
7FF887CF0000
|
trusted library allocation
|
page read and write
|
||
15F856A6000
|
heap
|
page read and write
|
||
771E000
|
stack
|
page read and write
|
||
7FF887A86000
|
trusted library allocation
|
page read and write
|
||
26AB9117000
|
heap
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
7FF887C43000
|
trusted library allocation
|
page read and write
|
||
7FF887C8D000
|
trusted library allocation
|
page read and write
|
||
7FF887E29000
|
trusted library allocation
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
18E73490000
|
heap
|
page read and write
|
||
A9B76FE000
|
stack
|
page read and write
|
||
1404000
|
heap
|
page read and write
|
||
2890000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
7FF887CF7000
|
trusted library allocation
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
1276D000
|
trusted library allocation
|
page read and write
|
||
3911000
|
trusted library allocation
|
page read and write
|
||
7FF887A93000
|
trusted library allocation
|
page read and write
|
||
1B06D000
|
stack
|
page read and write
|
||
D2B000
|
heap
|
page read and write
|
||
7FF887B36000
|
trusted library allocation
|
page read and write
|
||
7FF887D42000
|
trusted library allocation
|
page read and write
|
||
3413000
|
trusted library allocation
|
page read and write
|
||
269BDED5000
|
heap
|
page read and write
|
||
74C9BFF000
|
stack
|
page read and write
|
||
2E56000
|
trusted library allocation
|
page read and write
|
||
D0B000
|
heap
|
page read and write
|
||
7FF887C70000
|
trusted library allocation
|
page read and write
|
||
7FF887A60000
|
trusted library allocation
|
page execute and read and write
|
||
1BA0E000
|
stack
|
page read and write
|
||
7FF887C20000
|
trusted library allocation
|
page read and write
|
||
7FF887E20000
|
trusted library allocation
|
page read and write
|
||
7FF887B98000
|
trusted library allocation
|
page execute and read and write
|
||
22968BB1000
|
heap
|
page read and write
|
||
7FF887B70000
|
trusted library allocation
|
page read and write
|
||
7FF8879DC000
|
trusted library allocation
|
page read and write
|
||
7FF887A70000
|
trusted library allocation
|
page execute and read and write
|
||
1C1C7000
|
stack
|
page read and write
|
||
1C69A000
|
heap
|
page read and write
|
||
3030000
|
trusted library allocation
|
page read and write
|
||
18E73420000
|
heap
|
page read and write
|
||
22968BBC000
|
heap
|
page read and write
|
||
22968BBC000
|
heap
|
page read and write
|
||
22968B7D000
|
heap
|
page read and write
|
||
7FF887C74000
|
trusted library allocation
|
page read and write
|
||
A856CFF000
|
stack
|
page read and write
|
||
2EC8000
|
trusted library allocation
|
page read and write
|
||
7FF887E30000
|
trusted library allocation
|
page read and write
|
||
7FF887BD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887D10000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
1760000
|
heap
|
page execute and read and write
|
||
7FF887A80000
|
trusted library allocation
|
page read and write
|
||
1763000
|
heap
|
page read and write
|
||
1351C000
|
trusted library allocation
|
page read and write
|
||
7FF8879D4000
|
trusted library allocation
|
page read and write
|
||
1BCA8000
|
heap
|
page read and write
|
||
23116839000
|
heap
|
page read and write
|
||
D08000
|
heap
|
page read and write
|
||
C469FE000
|
stack
|
page read and write
|
||
781F000
|
stack
|
page read and write
|
||
2F23000
|
trusted library allocation
|
page read and write
|
||
7FF887C40000
|
trusted library allocation
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
12AE1000
|
trusted library allocation
|
page read and write
|
||
7FF8879ED000
|
trusted library allocation
|
page execute and read and write
|
||
1B8FF000
|
stack
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
3892000
|
trusted library allocation
|
page read and write
|
||
331A000
|
heap
|
page read and write
|
||
1CB01000
|
heap
|
page read and write
|
||
300F000
|
trusted library allocation
|
page read and write
|
||
7FF887B70000
|
trusted library allocation
|
page read and write
|
||
2C9E000
|
trusted library allocation
|
page read and write
|
||
2DF4000
|
trusted library allocation
|
page read and write
|
||
2FDE000
|
heap
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
2FC7000
|
heap
|
page read and write
|
||
2E72000
|
trusted library allocation
|
page read and write
|
||
193859B5000
|
heap
|
page read and write
|
||
7FF887A97000
|
trusted library allocation
|
page read and write
|
||
304B000
|
trusted library allocation
|
page read and write
|
||
13A71000
|
trusted library allocation
|
page read and write
|
||
12BE000
|
stack
|
page read and write
|
||
1D02D000
|
stack
|
page read and write
|
||
3052000
|
trusted library allocation
|
page read and write
|
||
22CB1FE000
|
stack
|
page read and write
|
||
2C2A000
|
trusted library allocation
|
page read and write
|
||
7FF887E24000
|
trusted library allocation
|
page read and write
|
||
7FF887E39000
|
trusted library allocation
|
page read and write
|
||
39DA000
|
trusted library allocation
|
page read and write
|
||
14F4B0FD000
|
heap
|
page read and write
|
||
9A306FE000
|
stack
|
page read and write
|
||
7FF8879B3000
|
trusted library allocation
|
page execute and read and write
|
||
269BDC00000
|
heap
|
page read and write
|
||
3377DFE000
|
stack
|
page read and write
|
||
2FC2000
|
heap
|
page read and write
|
||
7FF8879F0000
|
trusted library allocation
|
page read and write
|
||
7FF887C30000
|
trusted library allocation
|
page read and write
|
||
7FF887A83000
|
trusted library allocation
|
page read and write
|
||
1C36D000
|
heap
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
7FF887C6D000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
heap
|
page execute and read and write
|
||
CC5000
|
heap
|
page read and write
|
||
7FF887DF2000
|
trusted library allocation
|
page read and write
|
||
16EE000
|
stack
|
page read and write
|
||
7FF887E60000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887A96000
|
trusted library allocation
|
page execute and read and write
|
||
2E50000
|
trusted library allocation
|
page read and write
|
||
1C379000
|
heap
|
page read and write
|
||
1D6DB000
|
stack
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
7FF887E00000
|
trusted library allocation
|
page read and write
|
||
3A2000
|
unkown
|
page write copy
|
||
1C445000
|
heap
|
page read and write
|
||
14F4B10D000
|
heap
|
page read and write
|
||
18E73490000
|
heap
|
page read and write
|
||
787A2FE000
|
stack
|
page read and write
|
||
231166E0000
|
heap
|
page read and write
|
||
14F4AFB0000
|
heap
|
page read and write
|
||
B63000
|
heap
|
page read and write
|
||
6E20000
|
trusted library allocation
|
page read and write
|
||
7FF887B90000
|
trusted library allocation
|
page read and write
|
||
26AB9162000
|
heap
|
page read and write
|
||
1BD0D000
|
stack
|
page read and write
|
||
31F0000
|
heap
|
page read and write
|
||
7FF887A84000
|
trusted library allocation
|
page read and write
|
||
19385966000
|
heap
|
page read and write
|
||
7FF887CC7000
|
trusted library allocation
|
page read and write
|
||
1BA01000
|
stack
|
page read and write
|
||
2CA0000
|
trusted library allocation
|
page read and write
|
||
7FF887C80000
|
trusted library allocation
|
page execute and read and write
|
||
23116884000
|
heap
|
page read and write
|
||
26AB9160000
|
heap
|
page read and write
|
||
7FF887BB1000
|
trusted library allocation
|
page execute and read and write
|
||
34E2000
|
heap
|
page read and write
|
||
22968B66000
|
heap
|
page read and write
|
||
1BC6D000
|
stack
|
page read and write
|
||
7FF887C43000
|
trusted library allocation
|
page read and write
|
||
7FF887A86000
|
trusted library allocation
|
page read and write
|
||
131E5000
|
trusted library allocation
|
page read and write
|
||
7FF8879C2000
|
trusted library allocation
|
page read and write
|
||
D97000
|
heap
|
page read and write
|
||
26AB916D000
|
heap
|
page read and write
|
||
118B000
|
heap
|
page read and write
|
||
1C5C0000
|
heap
|
page read and write
|
||
7FF887BC7000
|
trusted library allocation
|
page execute and read and write
|
||
2311683E000
|
heap
|
page read and write
|
||
7FF887B86000
|
trusted library allocation
|
page read and write
|
||
2EAA000
|
trusted library allocation
|
page read and write
|
||
1AECD000
|
stack
|
page read and write
|
||
1C43C000
|
heap
|
page read and write
|
||
7FF887A8D000
|
trusted library allocation
|
page execute and read and write
|
||
E6E000
|
heap
|
page read and write
|
||
26AB9103000
|
heap
|
page read and write
|
||
1730000
|
trusted library allocation
|
page read and write
|
||
1C87F000
|
stack
|
page read and write
|
||
7FF887B73000
|
trusted library allocation
|
page read and write
|
||
3400000
|
trusted library section
|
page read and write
|
||
7FF887AB6000
|
trusted library allocation
|
page execute and read and write
|
||
1C417000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
7FF8879D2000
|
trusted library allocation
|
page read and write
|
||
18E7346E000
|
heap
|
page read and write
|
||
193859B1000
|
heap
|
page read and write
|
||
2FCF000
|
heap
|
page read and write
|
||
7FF8879EB000
|
trusted library allocation
|
page execute and read and write
|
||
19385951000
|
heap
|
page read and write
|
||
7FF887B80000
|
trusted library allocation
|
page read and write
|
||
22968BA2000
|
heap
|
page read and write
|
||
1C3C2000
|
heap
|
page read and write
|
||
33AF000
|
trusted library allocation
|
page read and write
|
||
2D70000
|
heap
|
page read and write
|
||
23116881000
|
heap
|
page read and write
|
||
7FF887AF0000
|
trusted library allocation
|
page execute and read and write
|
||
12E28000
|
trusted library allocation
|
page read and write
|
||
1C5BC000
|
heap
|
page read and write
|
||
2F15000
|
trusted library allocation
|
page read and write
|
||
30D7000
|
trusted library allocation
|
page read and write
|
||
18E73483000
|
heap
|
page read and write
|
||
18E73471000
|
heap
|
page read and write
|
||
C9B000
|
heap
|
page read and write
|
||
7FF887A86000
|
trusted library allocation
|
page read and write
|
||
23116880000
|
heap
|
page read and write
|
||
26AB917F000
|
heap
|
page read and write
|
||
7FF8879E4000
|
trusted library allocation
|
page read and write
|
||
7FF887CC0000
|
trusted library allocation
|
page read and write
|
||
7FF887B5A000
|
trusted library allocation
|
page read and write
|
||
2E68000
|
trusted library allocation
|
page read and write
|
||
3047000
|
trusted library allocation
|
page read and write
|
||
34A1000
|
trusted library allocation
|
page read and write
|
||
7FF887ACC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887CD9000
|
trusted library allocation
|
page read and write
|
||
1A80000
|
heap
|
page read and write
|
||
57A7000
|
heap
|
page read and write
|
||
26AB90B0000
|
heap
|
page read and write
|
||
7FF8879D0000
|
trusted library allocation
|
page read and write
|
||
1C184000
|
stack
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
22968BAC000
|
heap
|
page read and write
|
||
22509370000
|
heap
|
page read and write
|
||
7FF887C54000
|
trusted library allocation
|
page read and write
|
||
7FF887BC0000
|
trusted library allocation
|
page execute and read and write
|
||
12FFD000
|
trusted library allocation
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
1392E000
|
trusted library allocation
|
page read and write
|
||
1430D000
|
trusted library allocation
|
page read and write
|
||
112E000
|
stack
|
page read and write
|
||
A9B74FF000
|
stack
|
page read and write
|
||
301B000
|
heap
|
page read and write
|
||
1D19E000
|
stack
|
page read and write
|
||
2DE0000
|
heap
|
page execute and read and write
|
||
26AB9151000
|
heap
|
page read and write
|
||
1AE0000
|
heap
|
page read and write
|
||
389B000
|
trusted library allocation
|
page read and write
|
||
7FF887D50000
|
trusted library allocation
|
page read and write
|
||
23436FC0000
|
heap
|
page read and write
|
||
2311689F000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
22968B80000
|
heap
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
A9B78FF000
|
stack
|
page read and write
|
||
7FF8879B3000
|
trusted library allocation
|
page read and write
|
||
7FF887C30000
|
trusted library allocation
|
page read and write
|
||
303C000
|
trusted library allocation
|
page read and write
|
||
391E000
|
trusted library allocation
|
page read and write
|
||
7FF887D60000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887C75000
|
trusted library allocation
|
page read and write
|
||
7FF887ADC000
|
trusted library allocation
|
page execute and read and write
|
||
1BEBF000
|
unkown
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
3289000
|
trusted library allocation
|
page read and write
|
||
193859A1000
|
heap
|
page read and write
|
||
1440000
|
trusted library allocation
|
page read and write
|
||
2CAB000
|
trusted library allocation
|
page read and write
|
||
357F000
|
trusted library allocation
|
page read and write
|
||
1950000
|
trusted library allocation
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
13ECA000
|
trusted library allocation
|
page read and write
|
||
7FF8879C3000
|
trusted library allocation
|
page read and write
|
||
7FF887BD0000
|
trusted library allocation
|
page read and write
|
||
33780FF000
|
stack
|
page read and write
|
||
7FF887B7C000
|
trusted library allocation
|
page read and write
|
||
14F4B10D000
|
heap
|
page read and write
|
||
26CB1AD6000
|
heap
|
page read and write
|
||
2F0B000
|
trusted library allocation
|
page read and write
|
||
18E73490000
|
heap
|
page read and write
|
||
569D000
|
heap
|
page read and write
|
||
7FF887C60000
|
trusted library allocation
|
page read and write
|
||
15F85678000
|
heap
|
page read and write
|
||
175B000
|
heap
|
page read and write
|
||
EC0000
|
unkown
|
page readonly
|
||
1BDB4000
|
stack
|
page read and write
|
||
2FE4000
|
trusted library allocation
|
page read and write
|
||
26CB1AA0000
|
heap
|
page read and write
|
||
EFB000
|
heap
|
page read and write
|
||
17B5000
|
heap
|
page read and write
|
||
112E000
|
stack
|
page read and write
|
||
22968B7A000
|
heap
|
page read and write
|
||
3874000
|
trusted library allocation
|
page read and write
|
||
14F4B115000
|
heap
|
page read and write
|
||
1938597A000
|
heap
|
page read and write
|
||
7FF8879DD000
|
trusted library allocation
|
page execute and read and write
|
||
1B22E000
|
stack
|
page read and write
|
||
7FF887A6C000
|
trusted library allocation
|
page execute and read and write
|
||
13441000
|
trusted library allocation
|
page read and write
|
||
22968BB1000
|
heap
|
page read and write
|
||
2FE5000
|
heap
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
7FF887A70000
|
trusted library allocation
|
page read and write
|
||
26AB9117000
|
heap
|
page read and write
|
||
7FF887A80000
|
trusted library allocation
|
page read and write
|
||
345F000
|
heap
|
page read and write
|
||
7FF887D20000
|
trusted library allocation
|
page read and write
|
||
7FF887E40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887CE0000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
2BFB000
|
trusted library allocation
|
page read and write
|
||
1C0F0000
|
heap
|
page read and write
|
||
14F4B285000
|
heap
|
page read and write
|
||
22968AA0000
|
heap
|
page read and write
|
||
7FF887B7B000
|
trusted library allocation
|
page read and write
|
||
7FF887D40000
|
trusted library allocation
|
page read and write
|
||
7FF8879F4000
|
trusted library allocation
|
page read and write
|
||
7FF887D10000
|
trusted library allocation
|
page read and write
|
||
7FF887C50000
|
trusted library allocation
|
page read and write
|
||
3390000
|
trusted library section
|
page read and write
|
||
22968B80000
|
heap
|
page read and write
|
||
7FF887A9D000
|
trusted library allocation
|
page execute and read and write
|
||
14F4B0B0000
|
heap
|
page read and write
|
||
A9B77FE000
|
stack
|
page read and write
|
||
18E73640000
|
heap
|
page read and write
|
||
7FF887D90000
|
trusted library allocation
|
page execute and read and write
|
||
116A000
|
unkown
|
page readonly
|
||
7FF887CF8000
|
trusted library allocation
|
page read and write
|
||
3119000
|
trusted library allocation
|
page read and write
|
||
14F4B125000
|
heap
|
page read and write
|
||
1BE56000
|
heap
|
page read and write
|
||
CBB000
|
heap
|
page read and write
|
||
7FF8879C4000
|
trusted library allocation
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
302C000
|
heap
|
page read and write
|
||
7FF887E20000
|
trusted library allocation
|
page read and write
|
||
C46AFF000
|
stack
|
page read and write
|
||
14F4B0C6000
|
heap
|
page read and write
|
||
7FF887CCC000
|
trusted library allocation
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
2BEC000
|
trusted library allocation
|
page read and write
|
||
7FF887C61000
|
trusted library allocation
|
page read and write
|
||
14F4B0B7000
|
heap
|
page read and write
|
||
134F7000
|
trusted library allocation
|
page read and write
|
||
15F8585B000
|
heap
|
page read and write
|
||
7FF887C2C000
|
trusted library allocation
|
page read and write
|
||
7FF887BAA000
|
trusted library allocation
|
page execute and read and write
|
||
2D29000
|
trusted library allocation
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
14F4B060000
|
heap
|
page read and write
|
||
14F4AF90000
|
heap
|
page read and write
|
||
19387730000
|
heap
|
page read and write
|
||
7FF887A97000
|
trusted library allocation
|
page read and write
|
||
9A305FE000
|
stack
|
page read and write
|
||
1025000
|
heap
|
page read and write
|
||
34EA000
|
heap
|
page read and write
|
||
7FF887C02000
|
trusted library allocation
|
page read and write
|
||
7FF887DD0000
|
trusted library allocation
|
page read and write
|
||
787A4FE000
|
stack
|
page read and write
|
||
340000
|
unkown
|
page readonly
|
||
22CAC960000
|
heap
|
page read and write
|
||
22968BA3000
|
heap
|
page read and write
|
||
7FF887A80000
|
trusted library allocation
|
page read and write
|
||
7FF887E23000
|
trusted library allocation
|
page read and write
|
||
19385B55000
|
heap
|
page read and write
|
||
22968B95000
|
heap
|
page read and write
|
||
134E5000
|
trusted library allocation
|
page read and write
|
||
7FF887CC9000
|
trusted library allocation
|
page read and write
|
||
7FF887A1C000
|
trusted library allocation
|
page execute and read and write
|
||
26AB917F000
|
heap
|
page read and write
|
||
1C326000
|
heap
|
page read and write
|
||
38A5000
|
trusted library allocation
|
page read and write
|
||
373000
|
unkown
|
page readonly
|
||
12FF1000
|
trusted library allocation
|
page read and write
|
||
137B1000
|
trusted library allocation
|
page read and write
|
||
1C283000
|
stack
|
page read and write
|
||
2FCA000
|
heap
|
page read and write
|
||
7FF887BE0000
|
trusted library allocation
|
page execute and read and write
|
||
1C625000
|
heap
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
7FF887E70000
|
trusted library allocation
|
page execute and read and write
|
||
22968BA8000
|
heap
|
page read and write
|
||
7FF887E50000
|
trusted library allocation
|
page read and write
|
||
7FF8879BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887D12000
|
trusted library allocation
|
page read and write
|
||
7FF887BD0000
|
trusted library allocation
|
page read and write
|
||
1BE60000
|
trusted library section
|
page read and write
|
||
7FF887CA0000
|
trusted library allocation
|
page read and write
|
||
14F4B0CB000
|
heap
|
page read and write
|
||
7FF887D26000
|
trusted library allocation
|
page read and write
|
||
7FF887C10000
|
trusted library allocation
|
page read and write
|
||
7FF8879CB000
|
trusted library allocation
|
page execute and read and write
|
||
11DF000
|
heap
|
page read and write
|
||
7FF887DEE000
|
trusted library allocation
|
page read and write
|
||
14846000
|
trusted library allocation
|
page read and write
|
||
1C1D0000
|
heap
|
page read and write
|
||
1C4D0000
|
heap
|
page read and write
|
||
2FDA000
|
heap
|
page read and write
|
||
7FF887A76000
|
trusted library allocation
|
page read and write
|
||
1AE63000
|
heap
|
page read and write
|
||
2311686A000
|
heap
|
page read and write
|
||
109F000
|
stack
|
page read and write
|
||
347D000
|
trusted library allocation
|
page read and write
|
||
7FF887DA0000
|
trusted library allocation
|
page read and write
|
||
7FF887C10000
|
trusted library allocation
|
page read and write
|
||
18E7346E000
|
heap
|
page read and write
|
||
BAB7CFF000
|
stack
|
page read and write
|
||
14F4B10D000
|
heap
|
page read and write
|
||
7FF887C29000
|
trusted library allocation
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
7FF887D50000
|
trusted library allocation
|
page read and write
|
||
2EA8000
|
trusted library allocation
|
page read and write
|
||
7FF887D32000
|
trusted library allocation
|
page read and write
|
||
26AB90FC000
|
heap
|
page read and write
|
||
397C000
|
trusted library allocation
|
page read and write
|
||
3A51000
|
trusted library allocation
|
page read and write
|
||
7FF8879DD000
|
trusted library allocation
|
page execute and read and write
|
||
2BE8000
|
trusted library allocation
|
page read and write
|
||
2FE2000
|
heap
|
page read and write
|
||
7FF887B7C000
|
trusted library allocation
|
page read and write
|
||
1CCAD000
|
stack
|
page read and write
|
||
455CEFF000
|
stack
|
page read and write
|
||
7FF887D24000
|
trusted library allocation
|
page read and write
|
||
7FF8879D0000
|
trusted library allocation
|
page read and write
|
||
549DFE000
|
stack
|
page read and write
|
||
14F4B0FF000
|
heap
|
page read and write
|
||
3230000
|
heap
|
page read and write
|
||
193857E0000
|
heap
|
page read and write
|
||
12CCA000
|
trusted library allocation
|
page read and write
|
||
7FF887D00000
|
trusted library allocation
|
page read and write
|
||
7FF887B7A000
|
trusted library allocation
|
page read and write
|
||
7FF887BA0000
|
trusted library allocation
|
page execute and read and write
|
||
23116893000
|
heap
|
page read and write
|
||
7FF887C3B000
|
trusted library allocation
|
page read and write
|
||
18E734AD000
|
heap
|
page read and write
|
||
26AB912C000
|
heap
|
page read and write
|
||
137D8000
|
trusted library allocation
|
page read and write
|
||
22968BAD000
|
heap
|
page read and write
|
||
7FF887D72000
|
trusted library allocation
|
page read and write
|
||
7FF887CE5000
|
trusted library allocation
|
page read and write
|
||
7FF887B30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887CB0000
|
trusted library allocation
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
1CE4B000
|
stack
|
page read and write
|
||
7FF8879E3000
|
trusted library allocation
|
page read and write
|
||
13510000
|
trusted library allocation
|
page read and write
|
||
14F4B110000
|
heap
|
page read and write
|
||
7FF887C80000
|
trusted library allocation
|
page read and write
|
||
7FF8879D4000
|
trusted library allocation
|
page read and write
|
||
193859B0000
|
heap
|
page read and write
|
||
22CAC900000
|
heap
|
page read and write
|
||
1C44B000
|
heap
|
page read and write
|
||
22968B66000
|
heap
|
page read and write
|
||
1C071000
|
heap
|
page read and write
|
||
3521000
|
trusted library allocation
|
page read and write
|
||
1BDCF000
|
heap
|
page read and write
|
||
15F85855000
|
heap
|
page read and write
|
||
7FF887D14000
|
trusted library allocation
|
page read and write
|
||
37E000
|
unkown
|
page read and write
|
||
1B56E000
|
stack
|
page read and write
|
||
7FF8879FD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887B63000
|
trusted library allocation
|
page read and write
|
||
7FF887C10000
|
trusted library allocation
|
page read and write
|
||
9A2FDFA000
|
stack
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
7FF887D40000
|
trusted library allocation
|
page read and write
|
||
1AA80000
|
trusted library allocation
|
page read and write
|
||
7FF887C20000
|
trusted library allocation
|
page read and write
|
||
1C3CE000
|
stack
|
page read and write
|
||
3488000
|
heap
|
page read and write
|
||
14F4B098000
|
heap
|
page read and write
|
||
26CB1A00000
|
heap
|
page read and write
|
||
37B4000
|
trusted library allocation
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
CA5000
|
heap
|
page read and write
|
||
3283000
|
trusted library allocation
|
page read and write
|
||
7FF887CA4000
|
trusted library allocation
|
page read and write
|
||
1B9F3000
|
stack
|
page read and write
|
||
1710000
|
heap
|
page read and write
|
||
14DC0000
|
trusted library allocation
|
page read and write
|
||
148E9000
|
trusted library allocation
|
page read and write
|
||
269BF860000
|
heap
|
page read and write
|
||
2FC8000
|
heap
|
page read and write
|
||
7FF887DEF000
|
trusted library allocation
|
page read and write
|
||
7FF887A0C000
|
trusted library allocation
|
page execute and read and write
|
||
19385930000
|
heap
|
page read and write
|
||
7FF887D22000
|
trusted library allocation
|
page read and write
|
||
7FF887BA0000
|
trusted library allocation
|
page read and write
|
||
18BE000
|
stack
|
page read and write
|
||
7FF887C20000
|
trusted library allocation
|
page read and write
|
||
14F4B112000
|
heap
|
page read and write
|
||
7FF887ADC000
|
trusted library allocation
|
page execute and read and write
|
||
193859C4000
|
heap
|
page read and write
|
||
1C371000
|
heap
|
page read and write
|
||
22968B66000
|
heap
|
page read and write
|
||
7FF887AA4000
|
trusted library allocation
|
page read and write
|
||
7FF887C00000
|
trusted library allocation
|
page read and write
|
||
26AB9040000
|
heap
|
page read and write
|
||
14F4B0E0000
|
heap
|
page read and write
|
||
74C98FF000
|
stack
|
page read and write
|
||
549FFF000
|
stack
|
page read and write
|
||
7FF887CA8000
|
trusted library allocation
|
page read and write
|
||
5690000
|
heap
|
page read and write
|
||
22968BB7000
|
heap
|
page read and write
|
||
1B7FE000
|
stack
|
page read and write
|
||
7FF887A9C000
|
trusted library allocation
|
page read and write
|
||
BC96CFA000
|
stack
|
page read and write
|
||
3012000
|
trusted library allocation
|
page read and write
|
||
193859B5000
|
heap
|
page read and write
|
||
14F4B10C000
|
heap
|
page read and write
|
||
5BA0000
|
heap
|
page read and write
|
||
133C1000
|
trusted library allocation
|
page read and write
|
||
1BE4F000
|
heap
|
page read and write
|
||
7FF887CB0000
|
trusted library allocation
|
page read and write
|
||
1B60F000
|
stack
|
page read and write
|
||
1BD3E000
|
heap
|
page read and write
|
||
7FF887C90000
|
trusted library allocation
|
page read and write
|
||
357D000
|
trusted library allocation
|
page read and write
|
||
318A000
|
stack
|
page read and write
|
||
7FF887CDE000
|
trusted library allocation
|
page read and write
|
||
23116A20000
|
heap
|
page read and write
|
||
1C4B0000
|
trusted library section
|
page read and write
|
||
1B4A0000
|
heap
|
page execute and read and write
|
||
7FF887C00000
|
trusted library allocation
|
page read and write
|
||
1BD84000
|
heap
|
page read and write
|
||
7FF887DEF000
|
trusted library allocation
|
page read and write
|
||
50EF000
|
stack
|
page read and write
|
||
5B5B000
|
stack
|
page read and write
|
||
305A000
|
trusted library allocation
|
page read and write
|
||
7FF887BA8000
|
trusted library allocation
|
page execute and read and write
|
||
1BA6E000
|
stack
|
page read and write
|
||
7FF887CA2000
|
trusted library allocation
|
page read and write
|
||
BAB79FD000
|
stack
|
page read and write
|
||
23116893000
|
heap
|
page read and write
|
||
7FF887DF4000
|
trusted library allocation
|
page read and write
|
||
74C97FD000
|
stack
|
page read and write
|
||
569C000
|
heap
|
page read and write
|
||
26AB915B000
|
heap
|
page read and write
|
||
13A3C000
|
trusted library allocation
|
page read and write
|
||
7FF887BF2000
|
trusted library allocation
|
page read and write
|
||
7FF8879FD000
|
trusted library allocation
|
page execute and read and write
|
||
13CFA000
|
trusted library allocation
|
page read and write
|
||
18E734AD000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
1D00F000
|
heap
|
page read and write
|
||
341000
|
unkown
|
page execute read
|
||
2EE8000
|
trusted library allocation
|
page read and write
|
||
14102000
|
trusted library allocation
|
page read and write
|
||
3992000
|
trusted library allocation
|
page read and write
|
||
163C000
|
heap
|
page read and write
|
||
7FF8879ED000
|
trusted library allocation
|
page execute and read and write
|
||
2AD0000
|
heap
|
page execute and read and write
|
||
7FF8879EC000
|
trusted library allocation
|
page read and write
|
||
34EA000
|
heap
|
page read and write
|
||
23116888000
|
heap
|
page read and write
|
||
14F4B0AC000
|
heap
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
A9B75FD000
|
stack
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
1C610000
|
trusted library section
|
page read and write
|
||
18E73471000
|
heap
|
page read and write
|
||
3843000
|
trusted library allocation
|
page read and write
|
||
7FF887AAE000
|
trusted library allocation
|
page execute and read and write
|
||
13A40000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
7FF887B53000
|
trusted library allocation
|
page read and write
|
||
193858C0000
|
heap
|
page read and write
|
||
19385966000
|
heap
|
page read and write
|
||
B46000
|
stack
|
page read and write
|
||
7FF887B40000
|
trusted library allocation
|
page read and write
|
||
2FA1000
|
heap
|
page read and write
|
||
1BFCE000
|
stack
|
page read and write
|
||
22968B7B000
|
heap
|
page read and write
|
||
CE7000
|
heap
|
page read and write
|
||
23116861000
|
heap
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
22968BBB000
|
heap
|
page read and write
|
||
23438B20000
|
heap
|
page read and write
|
||
7FF887C68000
|
trusted library allocation
|
page read and write
|
||
1BE3E000
|
stack
|
page read and write
|
||
7FF887B4C000
|
trusted library allocation
|
page read and write
|
||
1CDAD000
|
stack
|
page read and write
|
||
26AB9177000
|
heap
|
page read and write
|
||
7FF887CC9000
|
trusted library allocation
|
page read and write
|
||
314C000
|
stack
|
page read and write
|
||
18E73478000
|
heap
|
page read and write
|
||
7FF887CB0000
|
trusted library allocation
|
page read and write
|
||
7FF887CF0000
|
trusted library allocation
|
page read and write
|
||
19385951000
|
heap
|
page read and write
|
||
1BAFA000
|
stack
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
1C66B000
|
heap
|
page read and write
|
||
1EA4AC37000
|
heap
|
page read and write
|
||
269BDB20000
|
heap
|
page read and write
|
||
15044000
|
trusted library allocation
|
page read and write
|
||
7FF887C6C000
|
trusted library allocation
|
page read and write
|
||
12AD1000
|
trusted library allocation
|
page read and write
|
||
7A1C000
|
stack
|
page read and write
|
||
14F4B103000
|
heap
|
page read and write
|
||
22968B4C000
|
heap
|
page read and write
|
||
7FF887B80000
|
trusted library allocation
|
page read and write
|
||
22968B95000
|
heap
|
page read and write
|
||
2B49000
|
trusted library allocation
|
page read and write
|
||
7FF887CA2000
|
trusted library allocation
|
page read and write
|
||
7FF887CA0000
|
trusted library allocation
|
page read and write
|
||
1D21E000
|
stack
|
page read and write
|
||
153E000
|
stack
|
page read and write
|
||
2FBD000
|
heap
|
page read and write
|
||
7FF887B40000
|
trusted library allocation
|
page execute and read and write
|
||
26CB1CF0000
|
heap
|
page read and write
|
||
7FF887C71000
|
trusted library allocation
|
page read and write
|
||
14F4B0DF000
|
heap
|
page read and write
|
||
1BFC0000
|
heap
|
page read and write
|
||
1CAAE000
|
stack
|
page read and write
|
||
2FC1000
|
heap
|
page read and write
|
||
7FF887C2E000
|
trusted library allocation
|
page read and write
|
||
7FF887D30000
|
trusted library allocation
|
page read and write
|
||
7FF887D2F000
|
trusted library allocation
|
page read and write
|
||
7FF887A9D000
|
trusted library allocation
|
page execute and read and write
|
||
18E734A6000
|
heap
|
page read and write
|
||
7FF887A84000
|
trusted library allocation
|
page read and write
|
||
1309C000
|
trusted library allocation
|
page read and write
|
||
26AB9101000
|
heap
|
page read and write
|
||
23436FA0000
|
heap
|
page read and write
|
||
1C368000
|
heap
|
page read and write
|
||
7FF887CE0000
|
trusted library allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
54A0FE000
|
stack
|
page read and write
|
||
7FF8879B7000
|
trusted library allocation
|
page read and write
|
||
455D4FF000
|
stack
|
page read and write
|
||
5498FA000
|
stack
|
page read and write
|
||
3310000
|
heap
|
page read and write
|
||
8F6000
|
stack
|
page read and write
|
||
1BE40000
|
heap
|
page read and write
|
||
34E2000
|
heap
|
page read and write
|
||
23116810000
|
heap
|
page read and write
|
||
7FF887A9C000
|
trusted library allocation
|
page read and write
|
||
1C329000
|
heap
|
page read and write
|
||
7FF887B6B000
|
trusted library allocation
|
page read and write
|
||
14F4B0E8000
|
heap
|
page read and write
|
||
1241000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
7FF887D30000
|
trusted library allocation
|
page read and write
|
||
14B78000
|
trusted library allocation
|
page read and write
|
||
38F7000
|
trusted library allocation
|
page read and write
|
||
22CAC925000
|
heap
|
page read and write
|
||
1938597D000
|
heap
|
page read and write
|
||
7FF887AA0000
|
trusted library allocation
|
page read and write
|
||
7FF887CA4000
|
trusted library allocation
|
page read and write
|
||
120F000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
23116884000
|
heap
|
page read and write
|
||
7FF887D1A000
|
trusted library allocation
|
page read and write
|
||
26AB9109000
|
heap
|
page read and write
|
||
7FF887B70000
|
trusted library allocation
|
page read and write
|
||
3086000
|
stack
|
page read and write
|
||
7FF887A80000
|
trusted library allocation
|
page read and write
|
||
455CFFE000
|
stack
|
page read and write
|
||
E38000
|
heap
|
page read and write
|
||
193858E0000
|
heap
|
page read and write
|
||
7FF887D28000
|
trusted library allocation
|
page read and write
|
||
7FF887E2C000
|
trusted library allocation
|
page read and write
|
||
37E0000
|
trusted library allocation
|
page read and write
|
||
7FF887DCA000
|
trusted library allocation
|
page read and write
|
||
7FF887D00000
|
trusted library allocation
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
5240000
|
heap
|
page read and write
|
||
1666000
|
heap
|
page read and write
|
||
344F000
|
heap
|
page read and write
|
||
7FF887BA0000
|
trusted library allocation
|
page execute and read and write
|
||
13EFD000
|
trusted library allocation
|
page read and write
|
||
2DCB000
|
trusted library allocation
|
page read and write
|
||
1CD5D000
|
stack
|
page read and write
|
||
1EA4ABD0000
|
heap
|
page read and write
|
||
7FF887D50000
|
trusted library allocation
|
page read and write
|
||
26AB9169000
|
heap
|
page read and write
|
||
1BDCF000
|
stack
|
page read and write
|
||
13DDC000
|
trusted library allocation
|
page read and write
|
||
1CB04000
|
heap
|
page read and write
|
||
7FF887E10000
|
trusted library allocation
|
page read and write
|
||
18E73610000
|
heap
|
page read and write
|
||
19D4000
|
heap
|
page read and write
|
||
2FCC000
|
heap
|
page read and write
|
||
7FF887CC7000
|
trusted library allocation
|
page read and write
|
||
7FF887C25000
|
trusted library allocation
|
page read and write
|
||
7FF887C90000
|
trusted library allocation
|
page execute and read and write
|
||
3487000
|
heap
|
page read and write
|
||
1AEC0000
|
trusted library allocation
|
page read and write
|
||
7FF887B90000
|
trusted library allocation
|
page read and write
|
||
7FF887E02000
|
trusted library allocation
|
page read and write
|
||
13DD3000
|
trusted library allocation
|
page read and write
|
||
33783FF000
|
stack
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
5B1E000
|
stack
|
page read and write
|
||
3593000
|
trusted library allocation
|
page read and write
|
||
22968BC1000
|
heap
|
page read and write
|
||
12CD5000
|
trusted library allocation
|
page read and write
|
||
549CFE000
|
stack
|
page read and write
|
||
18E73471000
|
heap
|
page read and write
|
||
3377FFF000
|
stack
|
page read and write
|
||
23116894000
|
heap
|
page read and write
|
||
7FF887E13000
|
trusted library allocation
|
page read and write
|
||
787A7FE000
|
stack
|
page read and write
|
||
13CE5000
|
trusted library allocation
|
page read and write
|
||
1D316000
|
heap
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
13584000
|
trusted library allocation
|
page read and write
|
||
2FBC000
|
heap
|
page read and write
|
||
1938597D000
|
heap
|
page read and write
|
||
2C57000
|
trusted library allocation
|
page read and write
|
||
193859B3000
|
heap
|
page read and write
|
||
301B000
|
heap
|
page read and write
|
||
3507000
|
trusted library allocation
|
page read and write
|
||
22968B51000
|
heap
|
page read and write
|
||
14F4B104000
|
heap
|
page read and write
|
||
7FF887CDC000
|
trusted library allocation
|
page read and write
|
||
225093BB000
|
heap
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
787A5FF000
|
stack
|
page read and write
|
||
1416A000
|
trusted library allocation
|
page read and write
|
||
7FF887DF2000
|
trusted library allocation
|
page read and write
|
||
26CB1AA8000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
26AB9117000
|
heap
|
page read and write
|
||
C46CFF000
|
stack
|
page read and write
|
||
2311685C000
|
heap
|
page read and write
|
||
7FF8879DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887D30000
|
trusted library allocation
|
page read and write
|
||
BC972FF000
|
stack
|
page read and write
|
||
1B8E0000
|
heap
|
page read and write
|
||
2FDE000
|
heap
|
page read and write
|
||
1EA4AC29000
|
heap
|
page read and write
|
||
7FF887D20000
|
trusted library allocation
|
page read and write
|
||
18E734A4000
|
heap
|
page read and write
|
||
A856BFE000
|
stack
|
page read and write
|
||
18E73457000
|
heap
|
page read and write
|
||
2C6E000
|
trusted library allocation
|
page read and write
|
||
347D000
|
heap
|
page read and write
|
||
7FF887B3C000
|
trusted library allocation
|
page execute and read and write
|
||
CD0000
|
trusted library allocation
|
page read and write
|
||
2EBA000
|
trusted library allocation
|
page read and write
|
||
37D3000
|
trusted library allocation
|
page read and write
|
||
18E751A0000
|
heap
|
page read and write
|
There are 2160 hidden memdumps, click here to show them.