Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
fdsN8iw6WG.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Microsoft\sihost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Microsoft\sihost.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fdsN8iw6WG.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\V10Cviyryl.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\diacazft\diacazft.cmdline
|
Unicode text, UTF-8 (with BOM) text, with no line terminators
|
dropped
|
||
C:\Users\user\Desktop\FMuYuXzk.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\PvOoeAES.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YehEOcJA.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\eWKdrIOo.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\iMBUyFOh.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\nASSbBeV.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\qcbjycVR.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\dEhCbXEAIUCUplvbdoWVtmGx.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\System32\SecurityHealthSystray.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Microsoft\Edge\Application\CSC13EEC4598AE74082ADE16A1F2183AE80.TMP
|
MSVC .res
|
dropped
|
||
C:\Program Files\Microsoft\66fc9ff0ee96c2
|
ASCII text, with very long lines (332), with no line terminators
|
dropped
|
||
C:\Program Files\Windows Portable Devices\9e0136ccaf7772
|
ASCII text, with very long lines (915), with no line terminators
|
dropped
|
||
C:\Program Files\Windows Sidebar\Shared Gadgets\9e8d7a4ca61bd9
|
ASCII text, with very long lines (465), with no line terminators
|
dropped
|
||
C:\Users\user\9e0136ccaf7772
|
MGR bitmap, modern format, 8-bit aligned
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RuntimeBroker.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dEhCbXEAIUCUplvbdoWVtmGx.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\sihost.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\3a401533b82e2cb9c9bc589aa6ee01300983b035
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\AY9NvOnlHp
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES34F8.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6d0, 10 symbols, created Fri Oct 4 16:46:30 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES38D0.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x6ec, 10 symbols, created Fri Oct 4 16:46:31 2024,
1st section name ".debug$S"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0tajbc0f.e5j.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2dobmehz.24v.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3itvei3k.yet.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3j3f3kin.tx4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_44ldsf1b.pc4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4bqqyszl.zwx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4jjukrcd.43p.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4tcnu5by.qsy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cg4pdg1a.qja.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cjhhrvcz.li2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_czye3rc5.a23.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_duylgtxd.hgo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ertewja2.3zs.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j4k2tofd.bky.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jj5zh10i.fgl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kcqwktpf.3r5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kuzo2tp4.ws0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lmeqz20l.ga1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mcdixpv2.uns.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ryq3vxmq.oki.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v0heos1j.43u.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vzeota2v.du2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wylfqmjf.10h.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z5s2x1ud.no5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\diacazft\diacazft.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\diacazft\diacazft.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (346), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\khjlbg4u\khjlbg4u.0.cs
|
C++ source, Unicode text, UTF-8 (with BOM) text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\khjlbg4u\khjlbg4u.cmdline
|
Unicode text, UTF-8 (with BOM) text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\khjlbg4u\khjlbg4u.out
|
Unicode text, UTF-8 (with BOM) text, with very long lines (331), with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\Desktop\1549a610452dc1
|
ASCII text, with very long lines (809), with no line terminators
|
dropped
|
||
C:\Users\user\dEhCbXEAIUCUplvbdoWVtmGx.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\System32\CSC8295EB2BCC8D4700AEF6D1253A133871.TMP
|
MSVC .res
|
dropped
|
||
\Device\Null
|
ASCII text
|
dropped
|
There are 57 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\fdsN8iw6WG.exe
|
"C:\Users\user\Desktop\fdsN8iw6WG.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\diacazft\diacazft.cmdline"
|
||
C:\Program Files\Microsoft\sihost.exe
|
"C:\Program Files\Microsoft\sihost.exe"
|
||
C:\Program Files\Microsoft\sihost.exe
|
"C:\Program Files\Microsoft\sihost.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\khjlbg4u\khjlbg4u.cmdline"
|
||
C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe
|
"C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft\sihost.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe'
|
||
C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe
|
"C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\user\dEhCbXEAIUCUplvbdoWVtmGx.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe'
|
||
C:\Users\user\Desktop\fdsN8iw6WG.exe
|
C:\Users\user\Desktop\fdsN8iw6WG.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\fdsN8iw6WG.exe'
|
||
C:\Users\user\Desktop\fdsN8iw6WG.exe
|
C:\Users\user\Desktop\fdsN8iw6WG.exe
|
||
C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe
|
"C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe"
|
||
C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe
|
"C:\Program Files\Windows Sidebar\Shared Gadgets\RuntimeBroker.exe"
|
||
C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe
|
"C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe"
|
||
C:\Program Files\Microsoft\sihost.exe
|
"C:\Program Files\Microsoft\sihost.exe"
|
||
C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe
|
"C:\Program Files\Windows Portable Devices\dEhCbXEAIUCUplvbdoWVtmGx.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES34F8.tmp"
"c:\Program Files (x86)\Microsoft\Edge\Application\CSC13EEC4598AE74082ADE16A1F2183AE80.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES38D0.tmp"
"c:\Windows\System32\CSC8295EB2BCC8D4700AEF6D1253A133871.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\V10Cviyryl.bat"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
||
C:\Windows\System32\Conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 25 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://aka.ms/pscore68
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://www.micom/pkiops/Docs/ry.htm0
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
sihost
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
dEhCbXEAIUCUplvbdoWVtmGx
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
dEhCbXEAIUCUplvbdoWVtmGx
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
RuntimeBroker
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
RuntimeBroker
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
fdsN8iw6WG
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
fdsN8iw6WG
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
dEhCbXEAIUCUplvbdoWVtmGx
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
dEhCbXEAIUCUplvbdoWVtmGx
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
dEhCbXEAIUCUplvbdoWVtmGx
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.ApplicationCompany
|
There are 9 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B52000
|
unkown
|
page readonly
|
||
1306D000
|
trusted library allocation
|
page read and write
|
||
132B7000
|
trusted library allocation
|
page read and write
|
||
142D000
|
heap
|
page read and write
|
||
7FF848D58000
|
trusted library allocation
|
page read and write
|
||
284C8810000
|
trusted library allocation
|
page read and write
|
||
132BAFFC000
|
heap
|
page read and write
|
||
2EA0000
|
unkown
|
page readonly
|
||
F1BCE3E000
|
stack
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
132BC959000
|
direct allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
1354000
|
heap
|
page read and write
|
||
2A85000
|
trusted library allocation
|
page read and write
|
||
12F5000
|
heap
|
page read and write
|
||
40867BF000
|
stack
|
page read and write
|
||
C8133FF000
|
stack
|
page read and write
|
||
7FF848F52000
|
trusted library allocation
|
page read and write
|
||
322B000
|
trusted library allocation
|
page read and write
|
||
20500F6B000
|
trusted library allocation
|
page read and write
|
||
12737000
|
trusted library allocation
|
page read and write
|
||
1C0BF000
|
stack
|
page read and write
|
||
30C4000
|
trusted library allocation
|
page read and write
|
||
333F000
|
trusted library allocation
|
page read and write
|
||
132BAFEC000
|
heap
|
page read and write
|
||
936310E000
|
stack
|
page read and write
|
||
B50000
|
unkown
|
page readonly
|
||
31FB000
|
trusted library allocation
|
page read and write
|
||
3828000
|
trusted library allocation
|
page read and write
|
||
F62000
|
heap
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D94000
|
trusted library allocation
|
page read and write
|
||
2B5B000
|
trusted library allocation
|
page read and write
|
||
1BBFF000
|
stack
|
page read and write
|
||
2090D0B8000
|
trusted library allocation
|
page read and write
|
||
29BB000
|
trusted library allocation
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
2090BF5B000
|
trusted library allocation
|
page read and write
|
||
342B000
|
trusted library allocation
|
page read and write
|
||
2739000
|
trusted library allocation
|
page read and write
|
||
1BD4E000
|
stack
|
page read and write
|
||
132B1000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page execute and read and write
|
||
387A000
|
trusted library allocation
|
page read and write
|
||
7FF848F74000
|
trusted library allocation
|
page read and write
|
||
276F000
|
trusted library allocation
|
page read and write
|
||
284C8860000
|
trusted library allocation
|
page read and write
|
||
12A31000
|
trusted library allocation
|
page read and write
|
||
2090CE75000
|
trusted library allocation
|
page read and write
|
||
1C102000
|
heap
|
page execute and read and write
|
||
7FF848D84000
|
trusted library allocation
|
page read and write
|
||
E39834E000
|
stack
|
page read and write
|
||
7FF848F2A000
|
trusted library allocation
|
page read and write
|
||
E3974FD000
|
stack
|
page read and write
|
||
936263C000
|
stack
|
page read and write
|
||
1B6A0000
|
heap
|
page read and write
|
||
1FB4863F000
|
heap
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
4086CF8000
|
stack
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
256812A4000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
2B17000
|
trusted library allocation
|
page read and write
|
||
27A3000
|
trusted library allocation
|
page read and write
|
||
21885549000
|
trusted library allocation
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
2477000
|
trusted library allocation
|
page read and write
|
||
398600E000
|
stack
|
page read and write
|
||
161F000
|
stack
|
page read and write
|
||
85E000
|
heap
|
page read and write
|
||
256813C0000
|
trusted library allocation
|
page read and write
|
||
2090D66B000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
274F000
|
trusted library allocation
|
page read and write
|
||
12D51000
|
trusted library allocation
|
page read and write
|
||
1D056000
|
heap
|
page read and write
|
||
1496000
|
heap
|
page read and write
|
||
1B302000
|
heap
|
page read and write
|
||
1418A9EF000
|
trusted library allocation
|
page read and write
|
||
7FF848F1A000
|
trusted library allocation
|
page read and write
|
||
1B928000
|
heap
|
page read and write
|
||
25680F82000
|
trusted library allocation
|
page read and write
|
||
2CD3000
|
trusted library allocation
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D58000
|
trusted library allocation
|
page read and write
|
||
132BB03C000
|
heap
|
page read and write
|
||
132BC98B000
|
direct allocation
|
page read and write
|
||
3804000
|
trusted library allocation
|
page read and write
|
||
18D9DE70000
|
heap
|
page read and write
|
||
335A000
|
trusted library allocation
|
page read and write
|
||
E3975F6000
|
stack
|
page read and write
|
||
3327000
|
trusted library allocation
|
page read and write
|
||
E3983CC000
|
stack
|
page read and write
|
||
7FF848F64000
|
trusted library allocation
|
page read and write
|
||
284C6B0C000
|
heap
|
page read and write
|
||
2F4B000
|
trusted library allocation
|
page read and write
|
||
284C8440000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
284C6C00000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
326E000
|
trusted library allocation
|
page read and write
|
||
284C8A51000
|
trusted library allocation
|
page read and write
|
||
284C6A54000
|
heap
|
page read and write
|
||
2C47000
|
trusted library allocation
|
page read and write
|
||
2D23000
|
trusted library allocation
|
page read and write
|
||
1418A9F3000
|
trusted library allocation
|
page read and write
|
||
323B000
|
trusted library allocation
|
page read and write
|
||
1418B2FB000
|
trusted library allocation
|
page read and write
|
||
7FF848F18000
|
trusted library allocation
|
page read and write
|
||
132BAF50000
|
heap
|
page read and write
|
||
3251000
|
trusted library allocation
|
page read and write
|
||
1C3A5000
|
heap
|
page read and write
|
||
F36000
|
heap
|
page read and write
|
||
20500F67000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
1DCF674A000
|
heap
|
page read and write
|
||
325B000
|
trusted library allocation
|
page read and write
|
||
132BDA70000
|
direct allocation
|
page read and write
|
||
7FF848EF7000
|
trusted library allocation
|
page read and write
|
||
147A000
|
heap
|
page read and write
|
||
3116000
|
trusted library allocation
|
page read and write
|
||
936217F000
|
stack
|
page read and write
|
||
17E0000
|
trusted library allocation
|
page read and write
|
||
6484239000
|
stack
|
page read and write
|
||
340000
|
heap
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
7FF848F4C000
|
trusted library allocation
|
page read and write
|
||
2620000
|
heap
|
page read and write
|
||
A4C000
|
heap
|
page read and write
|
||
33FE000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
trusted library allocation
|
page read and write
|
||
1B77E000
|
stack
|
page read and write
|
||
2C6B000
|
trusted library allocation
|
page read and write
|
||
15A0000
|
heap
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
1C3B6000
|
heap
|
page read and write
|
||
3119000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
1C002000
|
heap
|
page read and write
|
||
341E000
|
trusted library allocation
|
page read and write
|
||
25680C06000
|
trusted library allocation
|
page read and write
|
||
936207E000
|
stack
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
1428000
|
heap
|
page read and write
|
||
2090A170000
|
heap
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
171F000
|
stack
|
page read and write
|
||
7FF848EFA000
|
trusted library allocation
|
page read and write
|
||
18D9E1E0000
|
heap
|
page read and write
|
||
BED87B000
|
stack
|
page read and write
|
||
132BAFFA000
|
heap
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page read and write
|
||
1FB4A133000
|
direct allocation
|
page read and write
|
||
383A000
|
trusted library allocation
|
page read and write
|
||
12831000
|
trusted library allocation
|
page read and write
|
||
F1BD0BE000
|
stack
|
page read and write
|
||
259C000
|
trusted library allocation
|
page read and write
|
||
1FB485EE000
|
heap
|
page read and write
|
||
37F2000
|
trusted library allocation
|
page read and write
|
||
127A000
|
heap
|
page read and write
|
||
132BB014000
|
heap
|
page read and write
|
||
E397477000
|
stack
|
page read and write
|
||
21884F60000
|
heap
|
page read and write
|
||
25AB000
|
trusted library allocation
|
page read and write
|
||
1C3DA000
|
heap
|
page read and write
|
||
1BEFF000
|
stack
|
page read and write
|
||
7FF848F8D000
|
trusted library allocation
|
page read and write
|
||
2AA0000
|
heap
|
page read and write
|
||
12F81000
|
trusted library allocation
|
page read and write
|
||
3069000
|
heap
|
page read and write
|
||
1FB487F9000
|
direct allocation
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
1FB485EA000
|
heap
|
page read and write
|
||
93626BE000
|
stack
|
page read and write
|
||
31A9000
|
trusted library allocation
|
page read and write
|
||
21884F90000
|
heap
|
page execute and read and write
|
||
2C49000
|
trusted library allocation
|
page read and write
|
||
27D6000
|
trusted library allocation
|
page read and write
|
||
1418AAA9000
|
trusted library allocation
|
page read and write
|
||
1DCF6650000
|
heap
|
page read and write
|
||
1B2CF000
|
stack
|
page read and write
|
||
34E0000
|
trusted library allocation
|
page read and write
|
||
20500F74000
|
trusted library allocation
|
page read and write
|
||
321F000
|
trusted library allocation
|
page read and write
|
||
132BDA53000
|
direct allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page execute and read and write
|
||
132BCA70000
|
direct allocation
|
page read and write
|
||
28A2000
|
trusted library allocation
|
page read and write
|
||
1DCF6740000
|
heap
|
page read and write
|
||
7FF848F2C000
|
trusted library allocation
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
7FF848F8D000
|
trusted library allocation
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
F1BCCFB000
|
stack
|
page read and write
|
||
1131000
|
stack
|
page read and write
|
||
1FB485F9000
|
heap
|
page read and write
|
||
7FF848F0C000
|
trusted library allocation
|
page read and write
|
||
31AC000
|
trusted library allocation
|
page read and write
|
||
1FB48646000
|
heap
|
page read and write
|
||
3985139000
|
stack
|
page read and write
|
||
12451000
|
trusted library allocation
|
page read and write
|
||
327F000
|
trusted library allocation
|
page read and write
|
||
334D000
|
trusted library allocation
|
page read and write
|
||
20501792000
|
trusted library allocation
|
page read and write
|
||
B2F000
|
stack
|
page read and write
|
||
1C0FB000
|
stack
|
page read and write
|
||
272C000
|
trusted library allocation
|
page read and write
|
||
1452000
|
heap
|
page read and write
|
||
7FF848D6B000
|
trusted library allocation
|
page execute and read and write
|
||
284C87A0000
|
trusted library allocation
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F74000
|
trusted library allocation
|
page read and write
|
||
936330E000
|
stack
|
page read and write
|
||
4086EFE000
|
stack
|
page read and write
|
||
25680F93000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
1C400000
|
heap
|
page read and write
|
||
1B8C1000
|
heap
|
page read and write
|
||
31A4000
|
trusted library allocation
|
page read and write
|
||
1BFBF000
|
stack
|
page read and write
|
||
7FF848F1A000
|
trusted library allocation
|
page read and write
|
||
1FB48645000
|
heap
|
page read and write
|
||
2090D7DA000
|
trusted library allocation
|
page read and write
|
||
2090D777000
|
trusted library allocation
|
page read and write
|
||
245B000
|
trusted library allocation
|
page read and write
|
||
323D000
|
trusted library allocation
|
page read and write
|
||
2EA2000
|
unkown
|
page readonly
|
||
31E9000
|
trusted library allocation
|
page read and write
|
||
12851000
|
trusted library allocation
|
page read and write
|
||
14187BD0000
|
heap
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
7FF84926A000
|
trusted library allocation
|
page read and write
|
||
287A000
|
trusted library allocation
|
page read and write
|
||
21883642000
|
heap
|
page read and write
|
||
1332C000
|
trusted library allocation
|
page read and write
|
||
1FB4862B000
|
heap
|
page read and write
|
||
1418AA85000
|
trusted library allocation
|
page read and write
|
||
7FF848D84000
|
trusted library allocation
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
6483FFD000
|
stack
|
page read and write
|
||
1F5ACEE0000
|
heap
|
page read and write
|
||
F1BDC0E000
|
stack
|
page read and write
|
||
13461000
|
trusted library allocation
|
page read and write
|
||
1BAD2000
|
unkown
|
page readonly
|
||
7FF848D73000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
2090D03C000
|
trusted library allocation
|
page read and write
|
||
1C423000
|
heap
|
page read and write
|
||
1B0CE000
|
stack
|
page read and write
|
||
7FF848F4C000
|
trusted library allocation
|
page read and write
|
||
1C37C000
|
stack
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
27EE000
|
trusted library allocation
|
page read and write
|
||
398543C000
|
stack
|
page read and write
|
||
7FF848F23000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
2B9D000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
1913000
|
heap
|
page read and write
|
||
2F1C000
|
trusted library allocation
|
page read and write
|
||
284C8C7A000
|
trusted library allocation
|
page read and write
|
||
269E000
|
stack
|
page read and write
|
||
2769000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
218835F0000
|
heap
|
page readonly
|
||
7FF848F5D000
|
trusted library allocation
|
page read and write
|
||
3985E0E000
|
stack
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
275C000
|
trusted library allocation
|
page read and write
|
||
2729000
|
trusted library allocation
|
page read and write
|
||
7FF848E2C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F1A000
|
trusted library allocation
|
page read and write
|
||
2589000
|
trusted library allocation
|
page read and write
|
||
13221000
|
trusted library allocation
|
page read and write
|
||
20500C00000
|
trusted library allocation
|
page read and write
|
||
2090D184000
|
trusted library allocation
|
page read and write
|
||
889000
|
heap
|
page read and write
|
||
848000
|
heap
|
page read and write
|
||
3250000
|
trusted library allocation
|
page read and write
|
||
1775000
|
heap
|
page read and write
|
||
3984CFF000
|
stack
|
page read and write
|
||
327F000
|
trusted library allocation
|
page read and write
|
||
20500D7E000
|
trusted library allocation
|
page read and write
|
||
7FF848F87000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
31E1000
|
trusted library allocation
|
page read and write
|
||
12DD7000
|
trusted library allocation
|
page read and write
|
||
7FF848D9B000
|
trusted library allocation
|
page execute and read and write
|
||
2050007A000
|
trusted library allocation
|
page read and write
|
||
F15000
|
heap
|
page read and write
|
||
2188539A000
|
trusted library allocation
|
page read and write
|
||
218835E0000
|
trusted library allocation
|
page read and write
|
||
1CB1E000
|
stack
|
page read and write
|
||
1FB48648000
|
heap
|
page read and write
|
||
7FF848F5C000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page execute and read and write
|
||
26A1000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
7FF848E2C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
25681161000
|
trusted library allocation
|
page read and write
|
||
132BB03D000
|
heap
|
page read and write
|
||
1FB4A070000
|
direct allocation
|
page read and write
|
||
284C9A14000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
1BBBE000
|
stack
|
page read and write
|
||
7FF848F37000
|
trusted library allocation
|
page read and write
|
||
6484136000
|
stack
|
page read and write
|
||
13391000
|
trusted library allocation
|
page read and write
|
||
218862B1000
|
trusted library allocation
|
page read and write
|
||
1418A792000
|
trusted library allocation
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
7FF848F0C000
|
trusted library allocation
|
page read and write
|
||
21883644000
|
heap
|
page read and write
|
||
25680F7E000
|
trusted library allocation
|
page read and write
|
||
2568007F000
|
trusted library allocation
|
page read and write
|
||
2EE4000
|
trusted library allocation
|
page read and write
|
||
F5D000
|
heap
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F63000
|
trusted library allocation
|
page read and write
|
||
7FF848F27000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page execute and read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
541000
|
stack
|
page read and write
|
||
143E000
|
heap
|
page read and write
|
||
F1BDC8D000
|
stack
|
page read and write
|
||
14189640000
|
trusted library allocation
|
page read and write
|
||
1447000
|
heap
|
page read and write
|
||
24FB000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F33000
|
trusted library allocation
|
page read and write
|
||
C7333FC000
|
stack
|
page read and write
|
||
284C99E6000
|
trusted library allocation
|
page read and write
|
||
148B000
|
heap
|
page read and write
|
||
2090CF9F000
|
trusted library allocation
|
page read and write
|
||
7FF848F27000
|
trusted library allocation
|
page read and write
|
||
32C8000
|
trusted library allocation
|
page read and write
|
||
32FB000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D88000
|
trusted library allocation
|
page read and write
|
||
7FF848E1C000
|
trusted library allocation
|
page execute and read and write
|
||
1FB48890000
|
direct allocation
|
page read and write
|
||
20500F70000
|
trusted library allocation
|
page read and write
|
||
2EF3000
|
trusted library allocation
|
page read and write
|
||
2568178B000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
7FF848D9D000
|
trusted library allocation
|
page execute and read and write
|
||
8B8000
|
heap
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
3206000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
284C6C60000
|
heap
|
page read and write
|
||
342F000
|
trusted library allocation
|
page read and write
|
||
C812FBB000
|
stack
|
page read and write
|
||
2721000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
1321000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
25CB000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
2C03000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page execute and read and write
|
||
1AEC0000
|
heap
|
page read and write
|
||
7FF849310000
|
trusted library allocation
|
page read and write
|
||
7FF848EF8000
|
trusted library allocation
|
page read and write
|
||
1BDBE000
|
stack
|
page read and write
|
||
27EA000
|
trusted library allocation
|
page read and write
|
||
290D000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
133A9000
|
trusted library allocation
|
page read and write
|
||
14189AE5000
|
trusted library allocation
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
31E9000
|
heap
|
page read and write
|
||
279F000
|
trusted library allocation
|
page read and write
|
||
1BAFE000
|
stack
|
page read and write
|
||
284C8AD5000
|
trusted library allocation
|
page read and write
|
||
7FF848F16000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
2090CE6C000
|
trusted library allocation
|
page read and write
|
||
1FB48590000
|
heap
|
page read and write
|
||
2090A135000
|
heap
|
page read and write
|
||
31B6000
|
trusted library allocation
|
page read and write
|
||
12C61000
|
trusted library allocation
|
page read and write
|
||
E3978FE000
|
stack
|
page read and write
|
||
3310000
|
trusted library allocation
|
page read and write
|
||
21883510000
|
heap
|
page read and write
|
||
2450000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
1418AB82000
|
trusted library allocation
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
14187C6C000
|
heap
|
page read and write
|
||
14187BF0000
|
trusted library section
|
page read and write
|
||
25680C2A000
|
trusted library allocation
|
page read and write
|
||
1FB485FD000
|
heap
|
page read and write
|
||
7FF848F03000
|
trusted library allocation
|
page read and write
|
||
1285000
|
heap
|
page read and write
|
||
1B901000
|
heap
|
page read and write
|
||
21883683000
|
heap
|
page read and write
|
||
1C443000
|
heap
|
page read and write
|
||
3221000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
127D000
|
heap
|
page read and write
|
||
14187C98000
|
heap
|
page read and write
|
||
132BB045000
|
heap
|
page read and write
|
||
1469000
|
heap
|
page read and write
|
||
2C91000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
3984C7F000
|
unkown
|
page read and write
|
||
1FB4861B000
|
heap
|
page read and write
|
||
7FF848F07000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
2736000
|
trusted library allocation
|
page read and write
|
||
1BEBE000
|
stack
|
page read and write
|
||
2090A178000
|
heap
|
page read and write
|
||
7FF848D54000
|
trusted library allocation
|
page read and write
|
||
7FF848DE6000
|
trusted library allocation
|
page read and write
|
||
331A000
|
trusted library allocation
|
page read and write
|
||
284C6A5E000
|
heap
|
page read and write
|
||
2090A0B0000
|
heap
|
page read and write
|
||
7FF848F4C000
|
trusted library allocation
|
page read and write
|
||
284C8857000
|
heap
|
page execute and read and write
|
||
1D044000
|
heap
|
page read and write
|
||
132BC977000
|
direct allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
8EB000
|
heap
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
132BCA10000
|
direct allocation
|
page read and write
|
||
7FF848F8E000
|
trusted library allocation
|
page read and write
|
||
3079000
|
trusted library allocation
|
page read and write
|
||
1AF8E000
|
stack
|
page read and write
|
||
7FF848F64000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
2090CC0B000
|
trusted library allocation
|
page read and write
|
||
2F93000
|
trusted library allocation
|
page read and write
|
||
6484F0D000
|
stack
|
page read and write
|
||
141895B0000
|
trusted library allocation
|
page read and write
|
||
1D054000
|
heap
|
page read and write
|
||
1BF6F000
|
stack
|
page read and write
|
||
2576000
|
trusted library allocation
|
page read and write
|
||
398523E000
|
stack
|
page read and write
|
||
21886366000
|
trusted library allocation
|
page read and write
|
||
2A21000
|
trusted library allocation
|
page read and write
|
||
335E000
|
trusted library allocation
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
7FF848F8D000
|
trusted library allocation
|
page read and write
|
||
13101000
|
trusted library allocation
|
page read and write
|
||
1F5ACF60000
|
heap
|
page read and write
|
||
132BDA30000
|
direct allocation
|
page read and write
|
||
31BA000
|
trusted library allocation
|
page read and write
|
||
7FF848F94000
|
trusted library allocation
|
page read and write
|
||
1BB10000
|
unkown
|
page readonly
|
||
2B20000
|
trusted library allocation
|
page read and write
|
||
7FF848F18000
|
trusted library allocation
|
page read and write
|
||
1802000
|
heap
|
page read and write
|
||
25681958000
|
trusted library allocation
|
page read and write
|
||
2F2D000
|
trusted library allocation
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
126D1000
|
trusted library allocation
|
page read and write
|
||
27EC000
|
trusted library allocation
|
page read and write
|
||
1BBB3000
|
heap
|
page execute and read and write
|
||
27E6000
|
trusted library allocation
|
page read and write
|
||
1AFAD000
|
stack
|
page read and write
|
||
132BAFF9000
|
heap
|
page read and write
|
||
2B79000
|
trusted library allocation
|
page read and write
|
||
7FF848F82000
|
trusted library allocation
|
page read and write
|
||
359D000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
2DFD000
|
trusted library allocation
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
25681306000
|
trusted library allocation
|
page read and write
|
||
7FF848D32000
|
trusted library allocation
|
page read and write
|
||
1B2F0000
|
heap
|
page read and write
|
||
2C5E000
|
stack
|
page read and write
|
||
12457000
|
trusted library allocation
|
page read and write
|
||
130E000
|
heap
|
page read and write
|
||
311B000
|
trusted library allocation
|
page read and write
|
||
21AACC00000
|
heap
|
page read and write
|
||
1418A9FC000
|
trusted library allocation
|
page read and write
|
||
1FB48610000
|
heap
|
page read and write
|
||
7FF848F37000
|
trusted library allocation
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
1BB20000
|
heap
|
page execute and read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
950D8FC000
|
stack
|
page read and write
|
||
280A000
|
trusted library allocation
|
page read and write
|
||
7FF848F74000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
3697000
|
trusted library allocation
|
page read and write
|
||
1B976000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
3985F8C000
|
stack
|
page read and write
|
||
7FF848F94000
|
trusted library allocation
|
page read and write
|
||
E3972FE000
|
stack
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
33E7000
|
trusted library allocation
|
page read and write
|
||
E396F13000
|
stack
|
page read and write
|
||
1F5ACDC0000
|
heap
|
page read and write
|
||
4087CCC000
|
stack
|
page read and write
|
||
1B890000
|
heap
|
page read and write
|
||
284C978E000
|
trusted library allocation
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
21883570000
|
heap
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
1FB485FA000
|
heap
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page read and write
|
||
3150000
|
heap
|
page execute and read and write
|
||
2090CE60000
|
trusted library allocation
|
page read and write
|
||
2F2F000
|
trusted library allocation
|
page read and write
|
||
336F000
|
trusted library allocation
|
page read and write
|
||
2090CEE5000
|
trusted library allocation
|
page read and write
|
||
14189D9C000
|
trusted library allocation
|
page read and write
|
||
7FF849290000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
284C6C20000
|
heap
|
page read and write
|
||
1AD6E189000
|
heap
|
page read and write
|
||
37A7000
|
trusted library allocation
|
page read and write
|
||
7FF848F83000
|
trusted library allocation
|
page read and write
|
||
64844BB000
|
stack
|
page read and write
|
||
7FF848F84000
|
trusted library allocation
|
page read and write
|
||
1005000
|
heap
|
page read and write
|
||
287B000
|
trusted library allocation
|
page read and write
|
||
2783000
|
trusted library allocation
|
page read and write
|
||
2B19000
|
trusted library allocation
|
page read and write
|
||
C73367F000
|
stack
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
2188365C000
|
heap
|
page read and write
|
||
437BAFE000
|
stack
|
page read and write
|
||
25680B19000
|
trusted library allocation
|
page read and write
|
||
887000
|
heap
|
page read and write
|
||
7FF848F5E000
|
trusted library allocation
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
1B97E000
|
stack
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
1902000
|
heap
|
page read and write
|
||
146D000
|
heap
|
page read and write
|
||
7FF848FA4000
|
trusted library allocation
|
page read and write
|
||
1CA0B000
|
stack
|
page read and write
|
||
7FF848F44000
|
trusted library allocation
|
page read and write
|
||
2747000
|
trusted library allocation
|
page read and write
|
||
7FF848F28000
|
trusted library allocation
|
page read and write
|
||
3872000
|
trusted library allocation
|
page read and write
|
||
20500F63000
|
trusted library allocation
|
page read and write
|
||
3790000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D83000
|
trusted library allocation
|
page read and write
|
||
27C3000
|
trusted library allocation
|
page read and write
|
||
284C6A56000
|
heap
|
page read and write
|
||
2808000
|
trusted library allocation
|
page read and write
|
||
20500001000
|
trusted library allocation
|
page read and write
|
||
1488000
|
heap
|
page read and write
|
||
B39000
|
heap
|
page read and write
|
||
C7E000
|
stack
|
page read and write
|
||
2050195F000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1FB4864E000
|
heap
|
page read and write
|
||
218860FA000
|
trusted library allocation
|
page read and write
|
||
132D1000
|
trusted library allocation
|
page read and write
|
||
1ADD0000
|
heap
|
page read and write
|
||
276D000
|
trusted library allocation
|
page read and write
|
||
7FF848F5D000
|
trusted library allocation
|
page read and write
|
||
132BB015000
|
heap
|
page read and write
|
||
2457000
|
trusted library allocation
|
page read and write
|
||
3984DF9000
|
stack
|
page read and write
|
||
33EB000
|
trusted library allocation
|
page read and write
|
||
1BBC3000
|
heap
|
page read and write
|
||
307BFF000
|
stack
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
218866E1000
|
trusted library allocation
|
page read and write
|
||
7FF848D8C000
|
trusted library allocation
|
page execute and read and write
|
||
2C4D000
|
trusted library allocation
|
page read and write
|
||
31E0000
|
heap
|
page read and write
|
||
21886659000
|
trusted library allocation
|
page read and write
|
||
1BCFF000
|
stack
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page execute and read and write
|
||
2B7B000
|
trusted library allocation
|
page read and write
|
||
284C9A0C000
|
trusted library allocation
|
page read and write
|
||
284C88B0000
|
heap
|
page read and write
|
||
35CD000
|
trusted library allocation
|
page read and write
|
||
33DA000
|
trusted library allocation
|
page read and write
|
||
1685000
|
heap
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page execute and read and write
|
||
24A4000
|
trusted library allocation
|
page read and write
|
||
13341000
|
trusted library allocation
|
page read and write
|
||
2861000
|
trusted library allocation
|
page read and write
|
||
1445000
|
heap
|
page read and write
|
||
3420000
|
trusted library allocation
|
page read and write
|
||
284C6A6C000
|
heap
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
32BB000
|
trusted library allocation
|
page read and write
|
||
1FB4A135000
|
direct allocation
|
page read and write
|
||
1502000
|
heap
|
page read and write
|
||
7FF848F8E000
|
trusted library allocation
|
page read and write
|
||
1C40C000
|
heap
|
page read and write
|
||
101F000
|
heap
|
page read and write
|
||
E3984CC000
|
stack
|
page read and write
|
||
284C8850000
|
heap
|
page execute and read and write
|
||
3786000
|
trusted library allocation
|
page read and write
|
||
2090A1F7000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
1C6FE000
|
stack
|
page read and write
|
||
284C9C29000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
heap
|
page execute and read and write
|
||
218835A0000
|
trusted library section
|
page read and write
|
||
33FA000
|
trusted library allocation
|
page read and write
|
||
28A0000
|
trusted library allocation
|
page read and write
|
||
2644000
|
trusted library allocation
|
page read and write
|
||
2B1B000
|
trusted library allocation
|
page read and write
|
||
132BDA50000
|
direct allocation
|
page read and write
|
||
2188631D000
|
trusted library allocation
|
page read and write
|
||
18D9DEA9000
|
heap
|
page read and write
|
||
1418A6C2000
|
trusted library allocation
|
page read and write
|
||
388D000
|
trusted library allocation
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
284C8410000
|
heap
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
39851BC000
|
stack
|
page read and write
|
||
24F9000
|
trusted library allocation
|
page read and write
|
||
1265000
|
heap
|
page read and write
|
||
1DCF6570000
|
heap
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
1418AC39000
|
trusted library allocation
|
page read and write
|
||
101B000
|
heap
|
page read and write
|
||
D02000
|
heap
|
page read and write
|
||
7FF848F26000
|
trusted library allocation
|
page read and write
|
||
340B000
|
trusted library allocation
|
page read and write
|
||
1085000
|
heap
|
page read and write
|
||
2090BE80000
|
heap
|
page read and write
|
||
B52000
|
unkown
|
page readonly
|
||
7FF848D94000
|
trusted library allocation
|
page read and write
|
||
1BC40000
|
heap
|
page read and write
|
||
1418A9E3000
|
trusted library allocation
|
page read and write
|
||
2090A155000
|
heap
|
page read and write
|
||
132BC990000
|
direct allocation
|
page read and write
|
||
21883600000
|
heap
|
page read and write
|
||
2861000
|
trusted library allocation
|
page read and write
|
||
EE1000
|
stack
|
page read and write
|
||
21883648000
|
heap
|
page read and write
|
||
DF9000
|
heap
|
page read and write
|
||
1B341000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page execute and read and write
|
||
12DD1000
|
trusted library allocation
|
page read and write
|
||
7FF848F82000
|
trusted library allocation
|
page read and write
|
||
7FF848D9C000
|
trusted library allocation
|
page execute and read and write
|
||
5C0000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
384E000
|
trusted library allocation
|
page read and write
|
||
7FF848D84000
|
trusted library allocation
|
page read and write
|
||
128E1000
|
trusted library allocation
|
page read and write
|
||
27FD000
|
trusted library allocation
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
28AD000
|
trusted library allocation
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
1B65E000
|
stack
|
page read and write
|
||
4086A7E000
|
stack
|
page read and write
|
||
7FF848DEC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D83000
|
trusted library allocation
|
page read and write
|
||
2581000
|
trusted library allocation
|
page read and write
|
||
2C41000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page execute and read and write
|
||
1AFF0000
|
trusted library allocation
|
page read and write
|
||
218862A0000
|
trusted library allocation
|
page read and write
|
||
7FF848F09000
|
trusted library allocation
|
page read and write
|
||
2090D1E5000
|
trusted library allocation
|
page read and write
|
||
1C545000
|
heap
|
page read and write
|
||
218835B5000
|
heap
|
page read and write
|
||
B85000
|
unkown
|
page readonly
|
||
2FBE000
|
stack
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page read and write
|
||
7FF848F3D000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
132BB057000
|
heap
|
page read and write
|
||
4086BF9000
|
stack
|
page read and write
|
||
7FF848F7D000
|
trusted library allocation
|
page read and write
|
||
6483C73000
|
stack
|
page read and write
|
||
1FB485FB000
|
heap
|
page read and write
|
||
3231000
|
trusted library allocation
|
page read and write
|
||
7FF848F28000
|
trusted library allocation
|
page read and write
|
||
2867000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
37EA000
|
trusted library allocation
|
page read and write
|
||
260B000
|
trusted library allocation
|
page read and write
|
||
FA1000
|
heap
|
page read and write
|
||
13201000
|
trusted library allocation
|
page read and write
|
||
93625BF000
|
stack
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
BED9FF000
|
stack
|
page read and write
|
||
14189710000
|
heap
|
page read and write
|
||
20500C3D000
|
trusted library allocation
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
3814000
|
trusted library allocation
|
page read and write
|
||
1DCF6785000
|
heap
|
page read and write
|
||
1AD6E520000
|
heap
|
page read and write
|
||
25680F8F000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
F1F000
|
heap
|
page read and write
|
||
E3976F8000
|
stack
|
page read and write
|
||
4086C7D000
|
stack
|
page read and write
|
||
2737000
|
trusted library allocation
|
page read and write
|
||
C7336FF000
|
stack
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
284C96B6000
|
trusted library allocation
|
page read and write
|
||
8C043F5000
|
stack
|
page read and write
|
||
1418AA79000
|
trusted library allocation
|
page read and write
|
||
3077F4000
|
stack
|
page read and write
|
||
21886B50000
|
trusted library allocation
|
page read and write
|
||
670000
|
trusted library allocation
|
page read and write
|
||
10E1000
|
stack
|
page read and write
|
||
1FB48606000
|
heap
|
page read and write
|
||
25F7000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
7FF848F2C000
|
trusted library allocation
|
page read and write
|
||
7FF848F83000
|
trusted library allocation
|
page read and write
|
||
936320D000
|
stack
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
126A1000
|
trusted library allocation
|
page read and write
|
||
256810BF000
|
trusted library allocation
|
page read and write
|
||
284C96A8000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
F1BDE0E000
|
stack
|
page read and write
|
||
4086F7F000
|
stack
|
page read and write
|
||
1418B2D5000
|
trusted library allocation
|
page read and write
|
||
336D000
|
trusted library allocation
|
page read and write
|
||
284C99E2000
|
trusted library allocation
|
page read and write
|
||
20500C05000
|
trusted library allocation
|
page read and write
|
||
37FC000
|
trusted library allocation
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
CE1000
|
stack
|
page read and write
|
||
648433E000
|
stack
|
page read and write
|
||
1FB4A210000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
DF0000
|
heap
|
page read and write
|
||
1C1FB000
|
stack
|
page read and write
|
||
2460000
|
trusted library allocation
|
page read and write
|
||
31DA000
|
trusted library allocation
|
page read and write
|
||
284C9D8C000
|
trusted library allocation
|
page read and write
|
||
21AACA18000
|
heap
|
page read and write
|
||
12FC1000
|
trusted library allocation
|
page read and write
|
||
31EF000
|
trusted library allocation
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
28AF000
|
trusted library allocation
|
page read and write
|
||
284C87E0000
|
trusted library allocation
|
page read and write
|
||
2090BE60000
|
trusted library allocation
|
page read and write
|
||
284C8445000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
2050189E000
|
trusted library allocation
|
page read and write
|
||
132BAF10000
|
heap
|
page read and write
|
||
2880000
|
trusted library allocation
|
page read and write
|
||
1C433000
|
heap
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
2090CB09000
|
trusted library allocation
|
page read and write
|
||
7FF848F28000
|
trusted library allocation
|
page read and write
|
||
341C000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
trusted library allocation
|
page read and write
|
||
1BB46000
|
heap
|
page read and write
|
||
1BA20000
|
heap
|
page read and write
|
||
132BB055000
|
heap
|
page read and write
|
||
21885D71000
|
trusted library allocation
|
page read and write
|
||
13151000
|
trusted library allocation
|
page read and write
|
||
12601000
|
trusted library allocation
|
page read and write
|
||
14187C10000
|
heap
|
page read and write
|
||
289C000
|
trusted library allocation
|
page read and write
|
||
32C0000
|
trusted library allocation
|
page read and write
|
||
E397379000
|
stack
|
page read and write
|
||
32C1000
|
trusted library allocation
|
page read and write
|
||
3080000
|
trusted library allocation
|
page read and write
|
||
7FF848F77000
|
trusted library allocation
|
page read and write
|
||
7FF848D9C000
|
trusted library allocation
|
page execute and read and write
|
||
27D9000
|
trusted library allocation
|
page read and write
|
||
280E000
|
trusted library allocation
|
page read and write
|
||
1390000
|
trusted library allocation
|
page read and write
|
||
284C9E16000
|
trusted library allocation
|
page read and write
|
||
7FF848F0C000
|
trusted library allocation
|
page read and write
|
||
7FF848D72000
|
trusted library allocation
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page execute and read and write
|
||
1FB485F1000
|
heap
|
page read and write
|
||
12B11000
|
trusted library allocation
|
page read and write
|
||
7FF848F9D000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
1AEC0000
|
heap
|
page execute and read and write
|
||
1A9DD000
|
stack
|
page read and write
|
||
1DCF6670000
|
heap
|
page read and write
|
||
1C48D000
|
heap
|
page read and write
|
||
2B59000
|
trusted library allocation
|
page read and write
|
||
1FB48610000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
14187C93000
|
heap
|
page read and write
|
||
25680A53000
|
trusted library allocation
|
page read and write
|
||
31CB000
|
trusted library allocation
|
page read and write
|
||
2A7B000
|
trusted library allocation
|
page read and write
|
||
127A1000
|
trusted library allocation
|
page read and write
|
||
408673F000
|
unkown
|
page read and write
|
||
7FF848F74000
|
trusted library allocation
|
page read and write
|
||
2EF6000
|
trusted library allocation
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
1B67E000
|
stack
|
page read and write
|
||
1BE4F000
|
stack
|
page read and write
|
||
2B8E000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
20501038000
|
trusted library allocation
|
page read and write
|
||
335C000
|
trusted library allocation
|
page read and write
|
||
7FF848F37000
|
trusted library allocation
|
page read and write
|
||
1FB485F0000
|
heap
|
page read and write
|
||
273A000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
64841BC000
|
stack
|
page read and write
|
||
21AACDD5000
|
heap
|
page read and write
|
||
12461000
|
trusted library allocation
|
page read and write
|
||
7FF848F33000
|
trusted library allocation
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
2716000
|
trusted library allocation
|
page read and write
|
||
1FB48813000
|
direct allocation
|
page read and write
|
||
1FB4A110000
|
direct allocation
|
page read and write
|
||
DF5000
|
heap
|
page read and write
|
||
218863DF000
|
trusted library allocation
|
page read and write
|
||
1585000
|
heap
|
page read and write
|
||
1B87E000
|
stack
|
page read and write
|
||
7FF849320000
|
trusted library allocation
|
page read and write
|
||
284C88CE000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page execute and read and write
|
||
1B6C8000
|
heap
|
page read and write
|
||
7FF848EFA000
|
trusted library allocation
|
page read and write
|
||
2C7E000
|
trusted library allocation
|
page read and write
|
||
7FF848F84000
|
trusted library allocation
|
page read and write
|
||
3077000
|
trusted library allocation
|
page read and write
|
||
132BCAB0000
|
heap
|
page read and write
|
||
132BC930000
|
direct allocation
|
page read and write
|
||
1B570000
|
heap
|
page execute and read and write
|
||
133AC000
|
trusted library allocation
|
page read and write
|
||
14189650000
|
heap
|
page execute and read and write
|
||
21886C77000
|
trusted library allocation
|
page read and write
|
||
BFF000
|
stack
|
page read and write
|
||
1C3BC000
|
heap
|
page read and write
|
||
1900000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
21886B8F000
|
trusted library allocation
|
page read and write
|
||
30EF000
|
trusted library allocation
|
page read and write
|
||
288D000
|
trusted library allocation
|
page read and write
|
||
281D000
|
trusted library allocation
|
page read and write
|
||
7FF848F74000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page read and write
|
||
6483E79000
|
stack
|
page read and write
|
||
132BAFFC000
|
heap
|
page read and write
|
||
284C9A80000
|
trusted library allocation
|
page read and write
|
||
1B961000
|
heap
|
page read and write
|
||
7FF848F44000
|
trusted library allocation
|
page read and write
|
||
6484078000
|
stack
|
page read and write
|
||
7FF848F7E000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
trusted library allocation
|
page read and write
|
||
C8132FF000
|
unkown
|
page read and write
|
||
3261000
|
trusted library allocation
|
page read and write
|
||
1418AAF2000
|
trusted library allocation
|
page read and write
|
||
1FB4A0BD000
|
direct allocation
|
page read and write
|
||
1418A68C000
|
trusted library allocation
|
page read and write
|
||
2800000
|
trusted library allocation
|
page read and write
|
||
8C045FE000
|
stack
|
page read and write
|
||
218835B0000
|
heap
|
page read and write
|
||
1418B35E000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
2B9F000
|
trusted library allocation
|
page read and write
|
||
2090D219000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
14189600000
|
trusted library allocation
|
page read and write
|
||
7FF848D78000
|
trusted library allocation
|
page read and write
|
||
284C967E000
|
trusted library allocation
|
page read and write
|
||
21883590000
|
trusted library section
|
page read and write
|
||
7FF848F6D000
|
trusted library allocation
|
page read and write
|
||
3473000
|
trusted library allocation
|
page read and write
|
||
320B000
|
trusted library allocation
|
page read and write
|
||
2E49000
|
heap
|
page read and write
|
||
218860BF000
|
trusted library allocation
|
page read and write
|
||
18EF000
|
stack
|
page read and write
|
||
25A7000
|
trusted library allocation
|
page read and write
|
||
1FB48608000
|
heap
|
page read and write
|
||
284C87D0000
|
heap
|
page readonly
|
||
3687000
|
trusted library allocation
|
page read and write
|
||
2F29000
|
trusted library allocation
|
page read and write
|
||
14187B60000
|
heap
|
page read and write
|
||
3299000
|
trusted library allocation
|
page read and write
|
||
7FF848F27000
|
trusted library allocation
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F3C000
|
trusted library allocation
|
page read and write
|
||
7FF848EF8000
|
trusted library allocation
|
page read and write
|
||
284C94A2000
|
trusted library allocation
|
page read and write
|
||
7FF848F6D000
|
trusted library allocation
|
page read and write
|
||
1445000
|
heap
|
page read and write
|
||
2090BED0000
|
heap
|
page execute and read and write
|
||
25680F8B000
|
trusted library allocation
|
page read and write
|
||
3296000
|
trusted library allocation
|
page read and write
|
||
2188665E000
|
trusted library allocation
|
page read and write
|
||
246B000
|
trusted library allocation
|
page read and write
|
||
3259000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
398600C000
|
stack
|
page read and write
|
||
13081000
|
trusted library allocation
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
132BB047000
|
heap
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
2090D839000
|
trusted library allocation
|
page read and write
|
||
64842BE000
|
stack
|
page read and write
|
||
7FF848D9B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F87000
|
trusted library allocation
|
page read and write
|
||
15E5000
|
heap
|
page read and write
|
||
1D43F000
|
stack
|
page read and write
|
||
2F2B000
|
trusted library allocation
|
page read and write
|
||
1DCF6781000
|
heap
|
page read and write
|
||
284C9AAD000
|
trusted library allocation
|
page read and write
|
||
7FF848D5B000
|
trusted library allocation
|
page execute and read and write
|
||
132BAF40000
|
heap
|
page read and write
|
||
3810000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
7FF848F1C000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
3984EF9000
|
stack
|
page read and write
|
||
132BAFEC000
|
heap
|
page read and write
|
||
3196000
|
trusted library allocation
|
page read and write
|
||
2738000
|
trusted library allocation
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page read and write
|
||
284C9671000
|
trusted library allocation
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
21884FD5000
|
heap
|
page read and write
|
||
1D000000
|
heap
|
page read and write
|
||
2090A110000
|
heap
|
page read and write
|
||
93622F8000
|
stack
|
page read and write
|
||
218835C0000
|
trusted library allocation
|
page read and write
|
||
2BE1000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
18D9DEA0000
|
heap
|
page read and write
|
||
9361D5F000
|
unkown
|
page read and write
|
||
3866000
|
trusted library allocation
|
page read and write
|
||
AE1000
|
stack
|
page read and write
|
||
1336A000
|
trusted library allocation
|
page read and write
|
||
132BB00F000
|
heap
|
page read and write
|
||
F1D000
|
heap
|
page read and write
|
||
10DE000
|
stack
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page execute and read and write
|
||
825000
|
heap
|
page read and write
|
||
12CC1000
|
trusted library allocation
|
page read and write
|
||
311F000
|
stack
|
page read and write
|
||
2B6A000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
286B000
|
trusted library allocation
|
page read and write
|
||
132B1000
|
trusted library allocation
|
page read and write
|
||
F1BCF38000
|
stack
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
F1BDE8E000
|
stack
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
332D000
|
trusted library allocation
|
page read and write
|
||
7FF848F54000
|
trusted library allocation
|
page read and write
|
||
24C0000
|
heap
|
page read and write
|
||
6483F77000
|
stack
|
page read and write
|
||
12A6000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
1FB488C0000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
2090A1BB000
|
heap
|
page read and write
|
||
7FF848DCC000
|
trusted library allocation
|
page execute and read and write
|
||
1230000
|
heap
|
page execute and read and write
|
||
2090A150000
|
heap
|
page read and write
|
||
2B7D000
|
trusted library allocation
|
page read and write
|
||
3826000
|
trusted library allocation
|
page read and write
|
||
31ED000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
2F3A000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
heap
|
page read and write
|
||
2B68000
|
trusted library allocation
|
page read and write
|
||
10EE000
|
stack
|
page read and write
|
||
144A000
|
heap
|
page read and write
|
||
132BAFC8000
|
heap
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
126B1000
|
trusted library allocation
|
page read and write
|
||
1FB48657000
|
heap
|
page read and write
|
||
11FF000
|
stack
|
page read and write
|
||
132BC9F0000
|
direct allocation
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
6B8000
|
heap
|
page read and write
|
||
132BB008000
|
heap
|
page read and write
|
||
7FF848F54000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF4387D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
12811000
|
trusted library allocation
|
page read and write
|
||
24F6000
|
trusted library allocation
|
page read and write
|
||
7FF849330000
|
trusted library allocation
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F74000
|
trusted library allocation
|
page read and write
|
||
2C36000
|
trusted library allocation
|
page read and write
|
||
7FF848F23000
|
trusted library allocation
|
page read and write
|
||
2B59000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
3858000
|
trusted library allocation
|
page read and write
|
||
1339E000
|
trusted library allocation
|
page read and write
|
||
132BB03E000
|
heap
|
page read and write
|
||
34E4000
|
trusted library allocation
|
page read and write
|
||
7FF848F5D000
|
trusted library allocation
|
page read and write
|
||
2B8C000
|
trusted library allocation
|
page read and write
|
||
1418AA11000
|
trusted library allocation
|
page read and write
|
||
132BCA5D000
|
direct allocation
|
page read and write
|
||
83E000
|
heap
|
page read and write
|
||
2891000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
25CF000
|
trusted library allocation
|
page read and write
|
||
ED9000
|
heap
|
page read and write
|
||
1BBB0000
|
heap
|
page execute and read and write
|
||
1418AD66000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page execute and read and write
|
||
1260000
|
heap
|
page read and write
|
||
258C000
|
trusted library allocation
|
page read and write
|
||
F1BD13D000
|
stack
|
page read and write
|
||
386E000
|
trusted library allocation
|
page read and write
|
||
39852BF000
|
stack
|
page read and write
|
||
284C87C0000
|
trusted library allocation
|
page read and write
|
||
2B7F000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
284C9B10000
|
trusted library allocation
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
2F09000
|
trusted library allocation
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page read and write
|
||
284C6A2D000
|
heap
|
page read and write
|
||
EFC000
|
heap
|
page read and write
|
||
32B9000
|
trusted library allocation
|
page read and write
|
||
3409000
|
trusted library allocation
|
page read and write
|
||
3794000
|
trusted library allocation
|
page read and write
|
||
2090A1AB000
|
heap
|
page read and write
|
||
2C82000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
1FB4A090000
|
direct allocation
|
page read and write
|
||
1B3E2000
|
heap
|
page read and write
|
||
3985E8C000
|
stack
|
page read and write
|
||
1ACBD000
|
stack
|
page read and write
|
||
1B9C0000
|
heap
|
page read and write
|
||
134F1000
|
trusted library allocation
|
page read and write
|
||
341E000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page read and write
|
||
1FB4A130000
|
direct allocation
|
page read and write
|
||
2090BE40000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page execute and read and write
|
||
2731000
|
trusted library allocation
|
page read and write
|
||
132BB058000
|
heap
|
page read and write
|
||
28F1000
|
trusted library allocation
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
33B1000
|
trusted library allocation
|
page read and write
|
||
1B78C000
|
stack
|
page read and write
|
||
7FF848F64000
|
trusted library allocation
|
page read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F3D000
|
trusted library allocation
|
page read and write
|
||
25A0000
|
heap
|
page read and write
|
||
1B318000
|
heap
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
2BB6000
|
trusted library allocation
|
page read and write
|
||
845000
|
heap
|
page read and write
|
||
845000
|
heap
|
page read and write
|
||
3693000
|
trusted library allocation
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page execute and read and write
|
||
143F000
|
heap
|
page read and write
|
||
7FF848D30000
|
trusted library allocation
|
page read and write
|
||
7FF848D48000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page execute and read and write
|
||
2090CE68000
|
trusted library allocation
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
1FB485EE000
|
heap
|
page read and write
|
||
284C9A03000
|
trusted library allocation
|
page read and write
|
||
648443E000
|
stack
|
page read and write
|
||
21AACA1A000
|
heap
|
page read and write
|
||
13107000
|
trusted library allocation
|
page read and write
|
||
377A000
|
trusted library allocation
|
page read and write
|
||
1DCF6A10000
|
heap
|
page read and write
|
||
27AF000
|
trusted library allocation
|
page read and write
|
||
902000
|
heap
|
page read and write
|
||
1410000
|
trusted library allocation
|
page read and write
|
||
325F000
|
trusted library allocation
|
page read and write
|
||
F1BCB7E000
|
stack
|
page read and write
|
||
284C99D9000
|
trusted library allocation
|
page read and write
|
||
14B5000
|
heap
|
page read and write
|
||
2910000
|
heap
|
page execute and read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
14189A61000
|
trusted library allocation
|
page read and write
|
||
1418A9DF000
|
trusted library allocation
|
page read and write
|
||
21883687000
|
heap
|
page read and write
|
||
1615000
|
heap
|
page read and write
|
||
3984E7F000
|
stack
|
page read and write
|
||
2188364A000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D9D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F50000
|
trusted library allocation
|
page execute and read and write
|
||
2C6F000
|
trusted library allocation
|
page read and write
|
||
25680001000
|
trusted library allocation
|
page read and write
|
||
21883530000
|
heap
|
page read and write
|
||
20500F78000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
7FF848F3C000
|
trusted library allocation
|
page read and write
|
||
7FF848F26000
|
trusted library allocation
|
page read and write
|
||
1C443000
|
heap
|
page read and write
|
||
2540000
|
heap
|
page execute and read and write
|
||
1FB485EB000
|
heap
|
page read and write
|
||
281F000
|
trusted library allocation
|
page read and write
|
||
324D000
|
trusted library allocation
|
page read and write
|
||
20500C3F000
|
trusted library allocation
|
page read and write
|
||
25680DA2000
|
trusted library allocation
|
page read and write
|
||
8E1000
|
stack
|
page read and write
|
||
284C6A4C000
|
heap
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
378A000
|
trusted library allocation
|
page read and write
|
||
326C000
|
trusted library allocation
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page read and write
|
||
7FF848D83000
|
trusted library allocation
|
page read and write
|
||
132BB00F000
|
heap
|
page read and write
|
||
F1BCEB7000
|
stack
|
page read and write
|
||
7FF848F5E000
|
trusted library allocation
|
page read and write
|
||
7FF848F83000
|
trusted library allocation
|
page read and write
|
||
7FF848F64000
|
trusted library allocation
|
page read and write
|
||
2FC1000
|
trusted library allocation
|
page read and write
|
||
1FB4A0F0000
|
direct allocation
|
page read and write
|
||
31A1000
|
trusted library allocation
|
page read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
2C30000
|
trusted library allocation
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
27B1000
|
trusted library allocation
|
page read and write
|
||
138A000
|
heap
|
page read and write
|
||
F31000
|
heap
|
page read and write
|
||
13077000
|
trusted library allocation
|
page read and write
|
||
1B72D000
|
stack
|
page read and write
|
||
168E000
|
stack
|
page read and write
|
||
E39727F000
|
stack
|
page read and write
|
||
7FF848F5D000
|
trusted library allocation
|
page read and write
|
||
7FF848F54000
|
trusted library allocation
|
page read and write
|
||
7FF848F3C000
|
trusted library allocation
|
page read and write
|
||
37E6000
|
trusted library allocation
|
page read and write
|
||
7FF848D3D000
|
trusted library allocation
|
page execute and read and write
|
||
319A000
|
trusted library allocation
|
page read and write
|
||
1FB48610000
|
heap
|
page read and write
|
||
1AED6000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
25CD000
|
trusted library allocation
|
page read and write
|
||
1C33F000
|
stack
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
286D000
|
trusted library allocation
|
page read and write
|
||
18E5000
|
heap
|
page read and write
|
||
3304000
|
trusted library allocation
|
page read and write
|
||
256818FA000
|
trusted library allocation
|
page read and write
|
||
F1BCFBC000
|
stack
|
page read and write
|
||
35D5000
|
trusted library allocation
|
page read and write
|
||
D13000
|
heap
|
page read and write
|
||
4087D4E000
|
stack
|
page read and write
|
||
30F7000
|
trusted library allocation
|
page read and write
|
||
1B0BE000
|
stack
|
page read and write
|
||
398533A000
|
stack
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
2699000
|
trusted library allocation
|
page read and write
|
||
F1BDD8C000
|
stack
|
page read and write
|
||
83B000
|
heap
|
page read and write
|
||
1418A682000
|
trusted library allocation
|
page read and write
|
||
7FF848E56000
|
trusted library allocation
|
page execute and read and write
|
||
132BB040000
|
heap
|
page read and write
|
||
1418AA70000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
2A7E000
|
trusted library allocation
|
page read and write
|
||
3762000
|
trusted library allocation
|
page read and write
|
||
6484E8E000
|
stack
|
page read and write
|
||
1F5ACDC9000
|
heap
|
page read and write
|
||
1DCF6770000
|
heap
|
page read and write
|
||
4086FFC000
|
stack
|
page read and write
|
||
347B000
|
trusted library allocation
|
page read and write
|
||
1C4ED000
|
heap
|
page read and write
|
||
1DCF6781000
|
heap
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page read and write
|
||
18D9DE50000
|
heap
|
page read and write
|
||
31F9000
|
trusted library allocation
|
page read and write
|
||
31CD000
|
trusted library allocation
|
page read and write
|
||
132BAFF9000
|
heap
|
page read and write
|
||
21886531000
|
trusted library allocation
|
page read and write
|
||
7FF848F07000
|
trusted library allocation
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page execute and read and write
|
||
340D000
|
trusted library allocation
|
page read and write
|
||
284C97F4000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
275A000
|
trusted library allocation
|
page read and write
|
||
1BB32000
|
unkown
|
page readonly
|
||
39849E3000
|
stack
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
284C9B73000
|
trusted library allocation
|
page read and write
|
||
3984FF8000
|
stack
|
page read and write
|
||
3237000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
33A1000
|
trusted library allocation
|
page read and write
|
||
12E1000
|
stack
|
page read and write
|
||
284C6B20000
|
heap
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page execute and read and write
|
||
2B6C000
|
trusted library allocation
|
page read and write
|
||
27AB000
|
trusted library allocation
|
page read and write
|
||
B65000
|
heap
|
page read and write
|
||
1B401000
|
heap
|
page read and write
|
||
266F000
|
trusted library allocation
|
page read and write
|
||
7FF848D58000
|
trusted library allocation
|
page read and write
|
||
3363000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
2090CE79000
|
trusted library allocation
|
page read and write
|
||
1C51C000
|
heap
|
page read and write
|
||
1B98E000
|
heap
|
page read and write
|
||
25FB000
|
trusted library allocation
|
page read and write
|
||
829000
|
heap
|
page read and write
|
||
1FB48570000
|
heap
|
page read and write
|
||
2451000
|
trusted library allocation
|
page read and write
|
||
1C573000
|
heap
|
page read and write
|
||
1BBB0000
|
heap
|
page execute and read and write
|
||
4087B4C000
|
stack
|
page read and write
|
||
1268000
|
heap
|
page read and write
|
||
20501305000
|
trusted library allocation
|
page read and write
|
||
1FB4860E000
|
heap
|
page read and write
|
||
1DCF6840000
|
heap
|
page read and write
|
||
12EB1000
|
trusted library allocation
|
page read and write
|
||
1418A9E7000
|
trusted library allocation
|
page read and write
|
||
289A000
|
trusted library allocation
|
page read and write
|
||
7FF848F9D000
|
trusted library allocation
|
page read and write
|
||
2611000
|
trusted library allocation
|
page read and write
|
||
7FF848F3C000
|
trusted library allocation
|
page read and write
|
||
1418A667000
|
trusted library allocation
|
page read and write
|
||
132BC970000
|
direct allocation
|
page read and write
|
||
132BB049000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
31CF000
|
trusted library allocation
|
page read and write
|
||
12B17000
|
trusted library allocation
|
page read and write
|
||
7FF848F14000
|
trusted library allocation
|
page read and write
|
||
32CB000
|
trusted library allocation
|
page read and write
|
||
132BB057000
|
heap
|
page read and write
|
||
1C3F6000
|
heap
|
page read and write
|
||
27E8000
|
trusted library allocation
|
page read and write
|
||
1DCF6780000
|
heap
|
page read and write
|
||
32D7000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page execute and read and write
|
||
1BAF2000
|
unkown
|
page readonly
|
||
31F7000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
398503E000
|
stack
|
page read and write
|
||
25B8000
|
trusted library allocation
|
page read and write
|
||
2B92000
|
trusted library allocation
|
page read and write
|
||
1441000
|
heap
|
page read and write
|
||
1AEF1000
|
heap
|
page read and write
|
||
1418AA7D000
|
trusted library allocation
|
page read and write
|
||
2B11000
|
trusted library allocation
|
page read and write
|
||
39850B6000
|
stack
|
page read and write
|
||
288B000
|
trusted library allocation
|
page read and write
|
||
20501877000
|
trusted library allocation
|
page read and write
|
||
E3973FE000
|
stack
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
1AD6E0E0000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page execute and read and write
|
||
F1BC7E3000
|
stack
|
page read and write
|
||
1FB48870000
|
direct allocation
|
page read and write
|
||
1C3D2000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
132C1000
|
trusted library allocation
|
page read and write
|
||
7FF848D88000
|
trusted library allocation
|
page read and write
|
||
21885321000
|
trusted library allocation
|
page read and write
|
||
2090A1CB000
|
heap
|
page read and write
|
||
25681122000
|
trusted library allocation
|
page read and write
|
||
284C6A97000
|
heap
|
page read and write
|
||
284CA3AD000
|
trusted library allocation
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
8C047FE000
|
stack
|
page read and write
|
||
3864000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
1C395000
|
heap
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
E40000
|
heap
|
page read and write
|
||
2090CF73000
|
trusted library allocation
|
page read and write
|
||
2090A1F2000
|
heap
|
page read and write
|
||
6483D7F000
|
stack
|
page read and write
|
||
2188363C000
|
heap
|
page read and write
|
||
339F000
|
trusted library allocation
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
21884FD0000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
1413000
|
heap
|
page read and write
|
||
1C501000
|
heap
|
page read and write
|
||
1FB4A0BB000
|
direct allocation
|
page read and write
|
||
2568104D000
|
trusted library allocation
|
page read and write
|
||
1C390000
|
heap
|
page read and write
|
||
2090A266000
|
heap
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
1BB12000
|
unkown
|
page readonly
|
||
144F000
|
heap
|
page read and write
|
||
218863B3000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
2856000
|
trusted library allocation
|
page read and write
|
||
F1BD03E000
|
stack
|
page read and write
|
||
7FF848F07000
|
trusted library allocation
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
1BB30000
|
heap
|
page read and write
|
||
12E1000
|
stack
|
page read and write
|
||
2F38000
|
trusted library allocation
|
page read and write
|
||
1C49E000
|
heap
|
page read and write
|
||
1B9B2000
|
unkown
|
page readonly
|
||
648500E000
|
stack
|
page read and write
|
||
3359000
|
trusted library allocation
|
page read and write
|
||
4086D76000
|
stack
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
25C9000
|
trusted library allocation
|
page read and write
|
||
7FF848E56000
|
trusted library allocation
|
page execute and read and write
|
||
25A9000
|
trusted library allocation
|
page read and write
|
||
31F1000
|
trusted library allocation
|
page read and write
|
||
3844000
|
trusted library allocation
|
page read and write
|
||
1FB48560000
|
heap
|
page read and write
|
||
F34000
|
heap
|
page read and write
|
||
1C3AE000
|
heap
|
page read and write
|
||
2090BE50000
|
heap
|
page readonly
|
||
275E000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
2F0C000
|
trusted library allocation
|
page read and write
|
||
1FB4A0B0000
|
direct allocation
|
page read and write
|
||
132BDA55000
|
direct allocation
|
page read and write
|
||
7FF848F72000
|
trusted library allocation
|
page read and write
|
||
2C3A000
|
trusted library allocation
|
page read and write
|
||
2090CAFF000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
25F1000
|
trusted library allocation
|
page read and write
|
||
1FB48636000
|
heap
|
page read and write
|
||
7FF848F34000
|
trusted library allocation
|
page read and write
|
||
132BCA50000
|
direct allocation
|
page read and write
|
||
1AB1D000
|
stack
|
page read and write
|
||
7FF848F23000
|
trusted library allocation
|
page read and write
|
||
11EF000
|
stack
|
page read and write
|
||
1B021000
|
heap
|
page read and write
|
||
7FF848F84000
|
trusted library allocation
|
page read and write
|
||
31B8000
|
trusted library allocation
|
page read and write
|
||
4086B7E000
|
stack
|
page read and write
|
||
1FB485E4000
|
heap
|
page read and write
|
||
A38000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
2B14000
|
trusted library allocation
|
page read and write
|
||
F9A000
|
heap
|
page read and write
|
||
132BB049000
|
heap
|
page read and write
|
||
1FB48656000
|
heap
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
2188363E000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
27D7000
|
trusted library allocation
|
page read and write
|
||
132BAFF7000
|
heap
|
page read and write
|
||
1FB48616000
|
heap
|
page read and write
|
||
12691000
|
trusted library allocation
|
page read and write
|
||
1FB4861B000
|
heap
|
page read and write
|
||
64843BD000
|
stack
|
page read and write
|
||
1418AA68000
|
trusted library allocation
|
page read and write
|
||
936233E000
|
stack
|
page read and write
|
||
2C58000
|
trusted library allocation
|
page read and write
|
||
7FF848DF6000
|
trusted library allocation
|
page read and write
|
||
284C99EA000
|
trusted library allocation
|
page read and write
|
||
1DCF6781000
|
heap
|
page read and write
|
||
822000
|
heap
|
page read and write
|
||
4087BC7000
|
stack
|
page read and write
|
||
6483CFE000
|
unkown
|
page read and write
|
||
AA1000
|
heap
|
page read and write
|
||
F0F000
|
stack
|
page read and write
|
||
3321000
|
trusted library allocation
|
page read and write
|
||
37FE000
|
trusted library allocation
|
page read and write
|
||
8F6000
|
heap
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page execute and read and write
|
||
1AED0000
|
heap
|
page read and write
|
||
132BCA6F000
|
direct allocation
|
page read and write
|
||
1FB4882B000
|
direct allocation
|
page read and write
|
||
284C6A10000
|
heap
|
page read and write
|
||
28DF000
|
trusted library allocation
|
page read and write
|
||
1B3EE000
|
stack
|
page read and write
|
||
299E000
|
trusted library allocation
|
page read and write
|
||
1D53E000
|
stack
|
page read and write
|
||
B50000
|
unkown
|
page readonly
|
||
324A000
|
trusted library allocation
|
page read and write
|
||
21AACA10000
|
heap
|
page read and write
|
||
AEF000
|
stack
|
page read and write
|
||
7FF848DCC000
|
trusted library allocation
|
page execute and read and write
|
||
284C99EE000
|
trusted library allocation
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F64000
|
trusted library allocation
|
page read and write
|
||
130C000
|
heap
|
page read and write
|
||
1C4B6000
|
heap
|
page read and write
|
||
2C8F000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
B75000
|
heap
|
page read and write
|
||
6D8000
|
heap
|
page read and write
|
||
25680C21000
|
trusted library allocation
|
page read and write
|
||
14187B70000
|
heap
|
page read and write
|
||
27CD000
|
trusted library allocation
|
page read and write
|
||
AFF000
|
stack
|
page read and write
|
||
284C6C65000
|
heap
|
page read and write
|
||
7FF848F44000
|
trusted library allocation
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
1FB48654000
|
heap
|
page read and write
|
||
1770000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
7FF848D42000
|
trusted library allocation
|
page read and write
|
||
2090CF30000
|
trusted library allocation
|
page read and write
|
||
3340000
|
trusted library allocation
|
page read and write
|
||
1B96A000
|
heap
|
page read and write
|
||
2823000
|
trusted library allocation
|
page read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
1FB485EE000
|
heap
|
page read and write
|
||
2090C3AD000
|
trusted library allocation
|
page read and write
|
||
437B7CC000
|
stack
|
page read and write
|
||
30FF000
|
trusted library allocation
|
page read and write
|
||
14187C4E000
|
heap
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
1C449000
|
heap
|
page read and write
|
||
31D8000
|
trusted library allocation
|
page read and write
|
||
3984D7F000
|
stack
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
125F1000
|
trusted library allocation
|
page read and write
|
||
1DCF68B4000
|
heap
|
page read and write
|
||
2090CE5C000
|
trusted library allocation
|
page read and write
|
||
20500A51000
|
trusted library allocation
|
page read and write
|
||
131F1000
|
trusted library allocation
|
page read and write
|
||
7FF848F3C000
|
trusted library allocation
|
page read and write
|
||
132BB035000
|
heap
|
page read and write
|
||
272E000
|
stack
|
page read and write
|
||
1B25E000
|
stack
|
page read and write
|
||
1BBE8000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
2DD1000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
7FF848F93000
|
trusted library allocation
|
page read and write
|
||
269B000
|
trusted library allocation
|
page read and write
|
||
3338000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
E396F9F000
|
unkown
|
page read and write
|
||
3832000
|
trusted library allocation
|
page read and write
|
||
27F9000
|
trusted library allocation
|
page read and write
|
||
7FF848F2C000
|
trusted library allocation
|
page read and write
|
||
1FB487D0000
|
direct allocation
|
page read and write
|
||
1B450000
|
heap
|
page execute and read and write
|
||
1BAE2000
|
unkown
|
page readonly
|
||
7FF848D43000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
437BBFF000
|
stack
|
page read and write
|
||
93623B6000
|
stack
|
page read and write
|
||
325D000
|
trusted library allocation
|
page read and write
|
||
333C000
|
trusted library allocation
|
page read and write
|
||
205013C1000
|
trusted library allocation
|
page read and write
|
||
21883608000
|
heap
|
page read and write
|
||
1248000
|
heap
|
page read and write
|
||
2090D2A1000
|
trusted library allocation
|
page read and write
|
||
2090BE20000
|
trusted library allocation
|
page read and write
|
||
398608E000
|
stack
|
page read and write
|
||
14187C4C000
|
heap
|
page read and write
|
||
1B54B000
|
stack
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
132BC9D0000
|
direct allocation
|
page read and write
|
||
BED8FE000
|
stack
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
100F000
|
stack
|
page read and write
|
||
244E000
|
stack
|
page read and write
|
||
936253E000
|
stack
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page read and write
|
||
2F27000
|
trusted library allocation
|
page read and write
|
||
1324000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
25BA000
|
trusted library allocation
|
page read and write
|
||
1B4EE000
|
stack
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
6483EFE000
|
stack
|
page read and write
|
||
1418B3BC000
|
trusted library allocation
|
page read and write
|
||
21AACDD0000
|
heap
|
page read and write
|
||
1FB48610000
|
heap
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
327D000
|
trusted library allocation
|
page read and write
|
||
133A1000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
1BDFF000
|
stack
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
20500228000
|
trusted library allocation
|
page read and write
|
||
381A000
|
trusted library allocation
|
page read and write
|
||
271A000
|
trusted library allocation
|
page read and write
|
||
31EB000
|
trusted library allocation
|
page read and write
|
||
273B000
|
trusted library allocation
|
page read and write
|
||
2F41000
|
trusted library allocation
|
page read and write
|
||
1FB4860D000
|
heap
|
page read and write
|
||
93624BA000
|
stack
|
page read and write
|
||
7FF848F72000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
7FF848F03000
|
trusted library allocation
|
page read and write
|
||
284C9AE4000
|
trusted library allocation
|
page read and write
|
||
BD6000
|
heap
|
page read and write
|
||
1C44E000
|
heap
|
page read and write
|
||
1B8D3000
|
heap
|
page read and write
|
||
1BD02000
|
heap
|
page execute and read and write
|
||
257A000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
1C46B000
|
heap
|
page read and write
|
||
F72000
|
heap
|
page read and write
|
||
1B990000
|
heap
|
page execute and read and write
|
||
32B7000
|
trusted library allocation
|
page read and write
|
||
27A1000
|
trusted library allocation
|
page read and write
|
||
21886442000
|
trusted library allocation
|
page read and write
|
||
9362439000
|
stack
|
page read and write
|
||
6EE000
|
heap
|
page read and write
|
||
2A1E000
|
stack
|
page read and write
|
||
2188629C000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
6483DFE000
|
stack
|
page read and write
|
||
40870FC000
|
stack
|
page read and write
|
||
284C99DD000
|
trusted library allocation
|
page read and write
|
||
259A000
|
trusted library allocation
|
page read and write
|
||
3848000
|
trusted library allocation
|
page read and write
|
||
1B150000
|
heap
|
page execute and read and write
|
||
13F5000
|
heap
|
page read and write
|
||
380A000
|
trusted library allocation
|
page read and write
|
||
AA5000
|
heap
|
page read and write
|
||
E05000
|
heap
|
page read and write
|
||
31C7000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page read and write
|
||
2C4B000
|
trusted library allocation
|
page read and write
|
||
4086E7A000
|
stack
|
page read and write
|
||
132BCA30000
|
direct allocation
|
page read and write
|
||
2ADE000
|
trusted library allocation
|
page read and write
|
||
2902000
|
trusted library allocation
|
page read and write
|
||
205004CD000
|
trusted library allocation
|
page read and write
|
||
7FF848F63000
|
trusted library allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
1418AAB5000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
1AD6E0B0000
|
heap
|
page read and write
|
||
24DF000
|
trusted library allocation
|
page read and write
|
||
1BEBE000
|
stack
|
page read and write
|
||
131F7000
|
trusted library allocation
|
page read and write
|
||
3984F7D000
|
stack
|
page read and write
|
||
1BC02000
|
heap
|
page read and write
|
||
35D0000
|
trusted library allocation
|
page read and write
|
||
7FF848D8B000
|
trusted library allocation
|
page execute and read and write
|
||
2C5C000
|
trusted library allocation
|
page read and write
|
||
D7F000
|
stack
|
page read and write
|
||
3272000
|
trusted library allocation
|
page read and write
|
||
7FF848F33000
|
trusted library allocation
|
page read and write
|
||
3239000
|
trusted library allocation
|
page read and write
|
||
7FF848F74000
|
trusted library allocation
|
page read and write
|
||
1FB48830000
|
direct allocation
|
page read and write
|
||
1DCF68B0000
|
heap
|
page read and write
|
||
7FF848F7E000
|
trusted library allocation
|
page read and write
|
||
33C2000
|
trusted library allocation
|
page read and write
|
||
B78000
|
heap
|
page read and write
|
||
B8F000
|
heap
|
page read and write
|
||
2629000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
BAD000
|
heap
|
page read and write
|
||
1C3D4000
|
heap
|
page read and write
|
||
E39844B000
|
stack
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
28EB000
|
trusted library allocation
|
page read and write
|
||
27BF000
|
trusted library allocation
|
page read and write
|
||
26B0000
|
trusted library allocation
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
E39854E000
|
stack
|
page read and write
|
||
218864F8000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
7FF848F64000
|
trusted library allocation
|
page read and write
|
||
21884EA0000
|
trusted library allocation
|
page read and write
|
||
284CA2C5000
|
trusted library allocation
|
page read and write
|
||
7FF848D94000
|
trusted library allocation
|
page read and write
|
||
31C9000
|
trusted library allocation
|
page read and write
|
||
1418A9EB000
|
trusted library allocation
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
27DB000
|
trusted library allocation
|
page read and write
|
||
146B000
|
heap
|
page read and write
|
||
25EE000
|
stack
|
page read and write
|
||
132BCA5B000
|
direct allocation
|
page read and write
|
||
F1BDE0C000
|
stack
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
1AD6E180000
|
heap
|
page read and write
|
||
33F6000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
4086AF9000
|
stack
|
page read and write
|
||
7FF848F6D000
|
trusted library allocation
|
page read and write
|
||
2090A0D0000
|
heap
|
page read and write
|
||
21886372000
|
trusted library allocation
|
page read and write
|
||
274D000
|
trusted library allocation
|
page read and write
|
||
2A24000
|
trusted library allocation
|
page read and write
|
||
1418AA26000
|
trusted library allocation
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
132AD000
|
trusted library allocation
|
page read and write
|
||
132BB006000
|
heap
|
page read and write
|
||
141895D0000
|
trusted library allocation
|
page read and write
|
||
27F7000
|
trusted library allocation
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
1B55E000
|
stack
|
page read and write
|
||
256804CE000
|
trusted library allocation
|
page read and write
|
||
12741000
|
trusted library allocation
|
page read and write
|
||
132BAFE9000
|
heap
|
page read and write
|
||
7FF848E56000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
132BAFFC000
|
heap
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
719000
|
heap
|
page read and write
|
||
132BC973000
|
direct allocation
|
page read and write
|
||
284C9DD6000
|
trusted library allocation
|
page read and write
|
||
7FF848F4D000
|
trusted library allocation
|
page read and write
|
||
2B5D000
|
trusted library allocation
|
page read and write
|
||
39853BF000
|
stack
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
14187B90000
|
heap
|
page read and write
|
||
F1BDD07000
|
stack
|
page read and write
|
||
1BBD0000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
334B000
|
trusted library allocation
|
page read and write
|
||
7FF848E56000
|
trusted library allocation
|
page execute and read and write
|
||
1B3CE000
|
stack
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page read and write
|
||
7FF848F72000
|
trusted library allocation
|
page read and write
|
||
1FB48810000
|
direct allocation
|
page read and write
|
||
2090D001000
|
trusted library allocation
|
page read and write
|
||
145B000
|
heap
|
page read and write
|
||
33E9000
|
trusted library allocation
|
page read and write
|
||
1B57F000
|
stack
|
page read and write
|
||
218862AD000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
F1BCA7F000
|
unkown
|
page read and write
|
||
BED97F000
|
stack
|
page read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
1BACE000
|
stack
|
page read and write
|
||
1BAD0000
|
unkown
|
page readonly
|
||
1BB08000
|
unkown
|
page readonly
|
||
4087ACE000
|
stack
|
page read and write
|
||
21886AAA000
|
trusted library allocation
|
page read and write
|
||
1B1CE000
|
stack
|
page read and write
|
||
2B63000
|
trusted library allocation
|
page read and write
|
||
27FB000
|
trusted library allocation
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
7FF848F52000
|
trusted library allocation
|
page read and write
|
||
950D9FF000
|
stack
|
page read and write
|
||
33A3000
|
trusted library allocation
|
page read and write
|
||
2869000
|
trusted library allocation
|
page read and write
|
||
284C8A40000
|
heap
|
page execute and read and write
|
||
B92000
|
unkown
|
page readonly
|
||
1FB4862D000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page execute and read and write
|
||
2090CCB9000
|
trusted library allocation
|
page read and write
|
||
1BAF0000
|
unkown
|
page readonly
|
||
1438000
|
heap
|
page read and write
|
||
7FF848D53000
|
trusted library allocation
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
128E1000
|
trusted library allocation
|
page read and write
|
||
1BDBF000
|
stack
|
page read and write
|
||
1C230000
|
heap
|
page execute and read and write
|
||
13E0000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
89B000
|
heap
|
page read and write
|
||
28E1000
|
trusted library allocation
|
page read and write
|
||
7FF848F57000
|
trusted library allocation
|
page read and write
|
||
7FF848D94000
|
trusted library allocation
|
page read and write
|
||
21886BB6000
|
trusted library allocation
|
page read and write
|
||
82D000
|
heap
|
page read and write
|
||
2FC9000
|
trusted library allocation
|
page read and write
|
||
2090CE71000
|
trusted library allocation
|
page read and write
|
||
379E000
|
trusted library allocation
|
page read and write
|
||
1B9FE000
|
stack
|
page read and write
|
||
3200000
|
trusted library allocation
|
page read and write
|
||
273C000
|
trusted library allocation
|
page read and write
|
||
2BE8000
|
trusted library allocation
|
page read and write
|
||
7FF848F53000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F74000
|
trusted library allocation
|
page read and write
|
||
218857ED000
|
trusted library allocation
|
page read and write
|
||
936227D000
|
stack
|
page read and write
|
||
1B2EE000
|
stack
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
3243000
|
trusted library allocation
|
page read and write
|
||
1D2FF000
|
stack
|
page read and write
|
||
6A9000
|
heap
|
page read and write
|
||
93620F9000
|
stack
|
page read and write
|
||
141896E0000
|
heap
|
page read and write
|
||
1BB30000
|
unkown
|
page readonly
|
||
21886626000
|
trusted library allocation
|
page read and write
|
||
25681897000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
1B75F000
|
stack
|
page read and write
|
||
20501121000
|
trusted library allocation
|
page read and write
|
||
1B9F0000
|
heap
|
page execute and read and write
|
||
12531000
|
trusted library allocation
|
page read and write
|
||
7FF848F6D000
|
trusted library allocation
|
page read and write
|
||
3418000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
12781000
|
trusted library allocation
|
page read and write
|
||
132BAF20000
|
heap
|
page read and write
|
||
1418A9F8000
|
trusted library allocation
|
page read and write
|
||
2C6D000
|
trusted library allocation
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
1B8F0000
|
heap
|
page execute and read and write
|
||
1FB48656000
|
heap
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
7FF848F34000
|
trusted library allocation
|
page read and write
|
||
284C9D25000
|
trusted library allocation
|
page read and write
|
||
2090C932000
|
trusted library allocation
|
page read and write
|
||
12E6000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
7FF848D78000
|
trusted library allocation
|
page read and write
|
||
307B000
|
trusted library allocation
|
page read and write
|
||
13071000
|
trusted library allocation
|
page read and write
|
||
2F1E000
|
trusted library allocation
|
page read and write
|
||
132BB00F000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
F1BD1BE000
|
stack
|
page read and write
|
||
7FF848F83000
|
trusted library allocation
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
284C6A93000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
2C5E000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page execute and read and write
|
||
7FF848D83000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
2090D751000
|
trusted library allocation
|
page read and write
|
||
1C474000
|
heap
|
page read and write
|
||
218862BA000
|
trusted library allocation
|
page read and write
|
||
E397579000
|
stack
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
284C9CF5000
|
trusted library allocation
|
page read and write
|
||
7FF848D88000
|
trusted library allocation
|
page read and write
|
||
14189C89000
|
trusted library allocation
|
page read and write
|
||
132BB029000
|
heap
|
page read and write
|
||
1B09C000
|
stack
|
page read and write
|
||
1F5ACCD0000
|
heap
|
page read and write
|
||
132BB01A000
|
heap
|
page read and write
|
||
1BA00000
|
heap
|
page read and write
|
||
21885F41000
|
trusted library allocation
|
page read and write
|
||
1FB48817000
|
direct allocation
|
page read and write
|
||
33FC000
|
trusted library allocation
|
page read and write
|
||
301F000
|
stack
|
page read and write
|
||
132BAFD7000
|
heap
|
page read and write
|
||
7FF848DCC000
|
trusted library allocation
|
page execute and read and write
|
||
1457000
|
heap
|
page read and write
|
||
2520000
|
trusted library allocation
|
page read and write
|
||
149A000
|
heap
|
page read and write
|
||
1AB7D000
|
stack
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
7FF848F1C000
|
trusted library allocation
|
page read and write
|
||
14189F2E000
|
trusted library allocation
|
page read and write
|
||
7FF849247000
|
trusted library allocation
|
page read and write
|
||
7FF848DCC000
|
trusted library allocation
|
page execute and read and write
|
||
3079FF000
|
stack
|
page read and write
|
||
3349000
|
trusted library allocation
|
page read and write
|
||
E396FDE000
|
stack
|
page read and write
|
||
274B000
|
trusted library allocation
|
page read and write
|
||
7FF848DF6000
|
trusted library allocation
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page read and write
|
||
D00000
|
heap
|
page read and write
|
||
B96000
|
unkown
|
page readonly
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
361000
|
stack
|
page read and write
|
||
1C405000
|
heap
|
page read and write
|
||
32E3000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F54000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
24CF000
|
trusted library allocation
|
page read and write
|
||
6EA000
|
heap
|
page read and write
|
||
31DC000
|
trusted library allocation
|
page read and write
|
||
14187C05000
|
heap
|
page read and write
|
||
F1BCBFA000
|
stack
|
page read and write
|
||
7FF848D53000
|
trusted library allocation
|
page read and write
|
||
9363187000
|
stack
|
page read and write
|
||
7FF848F54000
|
trusted library allocation
|
page read and write
|
||
2B8F000
|
trusted library allocation
|
page read and write
|
||
F1BCDF9000
|
stack
|
page read and write
|
||
205012A4000
|
trusted library allocation
|
page read and write
|
||
2BB9000
|
trusted library allocation
|
page read and write
|
||
93621F9000
|
stack
|
page read and write
|
||
2B9F000
|
trusted library allocation
|
page read and write
|
||
2A75000
|
trusted library allocation
|
page read and write
|
||
2617000
|
trusted library allocation
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page read and write
|
||
1590000
|
trusted library allocation
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page execute and read and write
|
||
1418AB1E000
|
trusted library allocation
|
page read and write
|
||
1B1E0000
|
heap
|
page execute and read and write
|
||
790000
|
heap
|
page read and write
|
||
1BA4A000
|
heap
|
page read and write
|
||
9361CD3000
|
stack
|
page read and write
|
||
C02000
|
heap
|
page read and write
|
||
1F5ACDD7000
|
heap
|
page read and write
|
||
7FF848D53000
|
trusted library allocation
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
7FF848F16000
|
trusted library allocation
|
page read and write
|
||
334F000
|
trusted library allocation
|
page read and write
|
||
85B000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
F1BCD7D000
|
stack
|
page read and write
|
||
1B35D000
|
stack
|
page read and write
|
||
1C4A6000
|
heap
|
page read and write
|
||
1B77D000
|
stack
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
7FF848F6D000
|
trusted library allocation
|
page read and write
|
||
1C445000
|
heap
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
33F8000
|
trusted library allocation
|
page read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
1BA70000
|
heap
|
page read and write
|
||
2F3E000
|
trusted library allocation
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
13011000
|
trusted library allocation
|
page read and write
|
||
284C9D59000
|
trusted library allocation
|
page read and write
|
||
284C6A50000
|
heap
|
page read and write
|
||
2090CE64000
|
trusted library allocation
|
page read and write
|
||
1418B1EF000
|
trusted library allocation
|
page read and write
|
||
2E04000
|
trusted library allocation
|
page read and write
|
||
285A000
|
trusted library allocation
|
page read and write
|
||
1FB485C0000
|
heap
|
page read and write
|
||
3400000
|
trusted library allocation
|
page read and write
|
||
2090CAE6000
|
trusted library allocation
|
page read and write
|
||
1BBFE000
|
stack
|
page read and write
|
||
2FF9000
|
heap
|
page read and write
|
||
CAF000
|
stack
|
page read and write
|
||
2598000
|
trusted library allocation
|
page read and write
|
||
7FF848F63000
|
trusted library allocation
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
408707F000
|
stack
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
141895C0000
|
heap
|
page readonly
|
||
14189580000
|
trusted library section
|
page read and write
|
||
20500F85000
|
trusted library allocation
|
page read and write
|
||
AAF000
|
heap
|
page read and write
|
||
1FB4A0D0000
|
direct allocation
|
page read and write
|
||
E39797C000
|
stack
|
page read and write
|
||
12DE1000
|
trusted library allocation
|
page read and write
|
||
324C000
|
trusted library allocation
|
page read and write
|
||
1FB4A0CF000
|
direct allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
950DAFE000
|
stack
|
page read and write
|
||
333A000
|
trusted library allocation
|
page read and write
|
||
374E000
|
trusted library allocation
|
page read and write
|
||
284C8F1E000
|
trusted library allocation
|
page read and write
|
||
7FF848F8E000
|
trusted library allocation
|
page read and write
|
||
1BBC0000
|
heap
|
page read and write
|
||
33D6000
|
trusted library allocation
|
page read and write
|
||
7FF848D88000
|
trusted library allocation
|
page read and write
|
||
205011D8000
|
trusted library allocation
|
page read and write
|
||
2696000
|
trusted library allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
3097000
|
trusted library allocation
|
page read and write
|
||
33AB000
|
trusted library allocation
|
page read and write
|
||
F1BD23B000
|
stack
|
page read and write
|
||
F1BCAFE000
|
stack
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
7FF848F18000
|
trusted library allocation
|
page read and write
|
||
7FF848F3C000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
21884FC0000
|
trusted library allocation
|
page read and write
|
||
341A000
|
trusted library allocation
|
page read and write
|
||
2761000
|
trusted library allocation
|
page read and write
|
||
1418AD05000
|
trusted library allocation
|
page read and write
|
||
BAB000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
1486000
|
heap
|
page read and write
|
||
126A7000
|
trusted library allocation
|
page read and write
|
||
280C000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
7FF848F93000
|
trusted library allocation
|
page read and write
|
||
7FF848F7E000
|
trusted library allocation
|
page read and write
|
||
7FF848D78000
|
trusted library allocation
|
page read and write
|
||
1B92C000
|
heap
|
page read and write
|
||
3410000
|
trusted library allocation
|
page read and write
|
||
21AACA00000
|
heap
|
page read and write
|
||
7FF848F2A000
|
trusted library allocation
|
page read and write
|
||
1425000
|
heap
|
page read and write
|
||
3356000
|
trusted library allocation
|
page read and write
|
||
132BAFE3000
|
heap
|
page read and write
|
||
385C000
|
trusted library allocation
|
page read and write
|
||
284CA2EC000
|
trusted library allocation
|
page read and write
|
||
1C41E000
|
heap
|
page read and write
|
||
2568022A000
|
trusted library allocation
|
page read and write
|
||
E39787C000
|
stack
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page execute and read and write
|
||
132BB02E000
|
heap
|
page read and write
|
||
2090A0A0000
|
heap
|
page read and write
|
||
287C000
|
trusted library allocation
|
page read and write
|
||
2B57000
|
trusted library allocation
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page execute and read and write
|
||
2B0E000
|
trusted library allocation
|
page read and write
|
||
132BDA10000
|
direct allocation
|
page read and write
|
||
387C000
|
trusted library allocation
|
page read and write
|
||
2090C7B5000
|
trusted library allocation
|
page read and write
|
||
1418A4B3000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
20501032000
|
trusted library allocation
|
page read and write
|
||
6E1000
|
stack
|
page read and write
|
||
2CC0000
|
heap
|
page execute and read and write
|
||
12BD1000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
25680D99000
|
trusted library allocation
|
page read and write
|
||
F9C000
|
heap
|
page read and write
|
||
368D000
|
trusted library allocation
|
page read and write
|
||
2B10000
|
trusted library allocation
|
page read and write
|
||
12B01000
|
trusted library allocation
|
page read and write
|
||
12A21000
|
trusted library allocation
|
page read and write
|
||
284CA1E0000
|
trusted library allocation
|
page read and write
|
||
7FF848F2C000
|
trusted library allocation
|
page read and write
|
||
21883430000
|
heap
|
page read and write
|
||
1BAE0000
|
unkown
|
page readonly
|
||
2F4F000
|
trusted library allocation
|
page read and write
|
||
E39777E000
|
stack
|
page read and write
|
||
33A3000
|
trusted library allocation
|
page read and write
|
||
3316000
|
trusted library allocation
|
page read and write
|
||
288F000
|
trusted library allocation
|
page read and write
|
||
18E0000
|
heap
|
page read and write
|
||
134E000
|
heap
|
page read and write
|
||
218862A5000
|
trusted library allocation
|
page read and write
|
||
650000
|
trusted library allocation
|
page read and write
|
||
31BC000
|
trusted library allocation
|
page read and write
|
||
31A0000
|
heap
|
page execute and read and write
|
||
2878000
|
trusted library allocation
|
page read and write
|
||
218865C4000
|
trusted library allocation
|
page read and write
|
||
2A30000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
3407000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
308B000
|
trusted library allocation
|
page read and write
|
||
2C71000
|
trusted library allocation
|
page read and write
|
||
25680FA0000
|
trusted library allocation
|
page read and write
|
||
1B89E000
|
stack
|
page read and write
|
||
1AD6E0C0000
|
heap
|
page read and write
|
||
2889000
|
trusted library allocation
|
page read and write
|
||
3329000
|
trusted library allocation
|
page read and write
|
||
6484F89000
|
stack
|
page read and write
|
||
7FF848F77000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
936328C000
|
stack
|
page read and write
|
||
28E3000
|
trusted library allocation
|
page read and write
|
||
1C459000
|
heap
|
page read and write
|
||
1C43A000
|
heap
|
page read and write
|
||
936273B000
|
stack
|
page read and write
|
||
7FF848F3C000
|
trusted library allocation
|
page read and write
|
||
2758000
|
trusted library allocation
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
1B9B0000
|
unkown
|
page readonly
|
||
1C402000
|
heap
|
page read and write
|
||
7FF848F34000
|
trusted library allocation
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
1B35F000
|
stack
|
page read and write
|
||
EC5000
|
heap
|
page read and write
|
||
25C1000
|
trusted library allocation
|
page read and write
|
||
21AACBE0000
|
heap
|
page read and write
|
||
2090A1AF000
|
heap
|
page read and write
|
||
A25000
|
heap
|
page read and write
|
||
14189715000
|
heap
|
page read and write
|
||
132BAFEC000
|
heap
|
page read and write
|
||
2596000
|
trusted library allocation
|
page read and write
|
||
25681093000
|
trusted library allocation
|
page read and write
|
||
F1BCC7F000
|
stack
|
page read and write
|
||
3071000
|
trusted library allocation
|
page read and write
|
||
1FB48648000
|
heap
|
page read and write
|
||
32B1000
|
trusted library allocation
|
page read and write
|
||
284C6A4E000
|
heap
|
page read and write
|
||
14FF000
|
stack
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
3101000
|
trusted library allocation
|
page read and write
|
||
7FF848DFC000
|
trusted library allocation
|
page execute and read and write
|
||
876000
|
heap
|
page read and write
|
||
13111000
|
trusted library allocation
|
page read and write
|
||
7FF848D78000
|
trusted library allocation
|
page read and write
|
||
1B5FD000
|
stack
|
page read and write
|
||
37F4000
|
trusted library allocation
|
page read and write
|
||
332B000
|
trusted library allocation
|
page read and write
|
||
1C7BE000
|
stack
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
33E1000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
12601000
|
trusted library allocation
|
page read and write
|
||
20501092000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
heap
|
page execute and read and write
|
||
7FF848F94000
|
trusted library allocation
|
page read and write
|
||
7FF848DF6000
|
trusted library allocation
|
page read and write
|
||
7FF848F77000
|
trusted library allocation
|
page read and write
|
||
2050115C000
|
trusted library allocation
|
page read and write
|
||
B97000
|
heap
|
page read and write
|
||
1B980000
|
heap
|
page read and write
|
||
3243000
|
trusted library allocation
|
page read and write
|
||
1C6BE000
|
stack
|
page read and write
|
||
7FF848D9C000
|
trusted library allocation
|
page execute and read and write
|
||
E39767D000
|
stack
|
page read and write
|
||
33CD000
|
trusted library allocation
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
9361DDF000
|
stack
|
page read and write
|
||
14187C00000
|
heap
|
page read and write
|
||
1DCF6771000
|
heap
|
page read and write
|
||
1C518000
|
heap
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page execute and read and write
|
||
F3C000
|
heap
|
page read and write
|
||
1BCBE000
|
stack
|
page read and write
|
||
27D9000
|
trusted library allocation
|
page read and write
|
||
284C9BB2000
|
trusted library allocation
|
page read and write
|
||
18D9DE40000
|
heap
|
page read and write
|
||
2C69000
|
trusted library allocation
|
page read and write
|
||
7FF848F57000
|
trusted library allocation
|
page read and write
|
||
1BF4F000
|
stack
|
page read and write
|
||
EF6000
|
heap
|
page read and write
|
||
1C4E4000
|
heap
|
page read and write
|
||
132BB040000
|
heap
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
17CF000
|
stack
|
page read and write
|
||
21884EF0000
|
heap
|
page execute and read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
E3977FE000
|
stack
|
page read and write
|
||
F30000
|
heap
|
page read and write
|
||
7FF848F93000
|
trusted library allocation
|
page read and write
|
||
A76000
|
heap
|
page read and write
|
||
3C0000
|
trusted library allocation
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
64840BE000
|
stack
|
page read and write
|
||
12971000
|
trusted library allocation
|
page read and write
|
||
132BB04E000
|
heap
|
page read and write
|
||
7FF848F74000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
14FE000
|
stack
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
1B3E0000
|
heap
|
page read and write
|
||
1BA0A000
|
heap
|
page read and write
|
||
40866B3000
|
stack
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
3223000
|
trusted library allocation
|
page read and write
|
||
132BB02B000
|
heap
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F50000
|
trusted library allocation
|
page execute and read and write
|
||
25680F86000
|
trusted library allocation
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
1FB48657000
|
heap
|
page read and write
|
||
1FB48850000
|
heap
|
page read and write
|
||
7FF848F18000
|
trusted library allocation
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
14DC000
|
heap
|
page read and write
|
||
34DE000
|
trusted library allocation
|
page read and write
|
||
12B21000
|
trusted library allocation
|
page read and write
|
||
3985F07000
|
stack
|
page read and write
|
||
1FB48600000
|
heap
|
page read and write
|
||
97F000
|
stack
|
page read and write
|
||
14187C18000
|
heap
|
page read and write
|
||
2749000
|
trusted library allocation
|
page read and write
|
||
2459000
|
trusted library allocation
|
page read and write
|
||
132BC9B0000
|
heap
|
page read and write
|
||
1BE60000
|
heap
|
page execute and read and write
|
||
1FB4863D000
|
heap
|
page read and write
|
||
132BB040000
|
heap
|
page read and write
|
||
2F16000
|
trusted library allocation
|
page read and write
|
||
40867FE000
|
stack
|
page read and write
|
||
274B000
|
trusted library allocation
|
page read and write
|
||
335B000
|
trusted library allocation
|
page read and write
|
||
381C000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
1DCF6781000
|
heap
|
page read and write
|
||
332F000
|
trusted library allocation
|
page read and write
|
||
936328E000
|
stack
|
page read and write
|
||
2090C107000
|
trusted library allocation
|
page read and write
|
||
132BB014000
|
heap
|
page read and write
|
||
326F000
|
trusted library allocation
|
page read and write
|
||
25681339000
|
trusted library allocation
|
page read and write
|
||
3830000
|
trusted library allocation
|
page read and write
|
||
3270000
|
trusted library allocation
|
page read and write
|
||
20500C0F000
|
trusted library allocation
|
page read and write
|
||
2808000
|
trusted library allocation
|
page read and write
|
||
12731000
|
trusted library allocation
|
page read and write
|
||
7FF848F27000
|
trusted library allocation
|
page read and write
|
||
132BB000000
|
heap
|
page read and write
|
||
3351000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page execute and read and write
|
||
12A27000
|
trusted library allocation
|
page read and write
|
||
132BB014000
|
heap
|
page read and write
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
2F1A000
|
trusted library allocation
|
page read and write
|
||
7FF848FA4000
|
trusted library allocation
|
page read and write
|
||
1BB24000
|
unkown
|
page readonly
|
||
A18000
|
heap
|
page read and write
|
||
1F5ACEC0000
|
heap
|
page read and write
|
||
3248000
|
trusted library allocation
|
page read and write
|
||
1C4CE000
|
heap
|
page read and write
|
||
284C6A18000
|
heap
|
page read and write
|
||
1B2FD000
|
heap
|
page read and write
|
||
2090BEE1000
|
trusted library allocation
|
page read and write
|
||
7FF848F87000
|
trusted library allocation
|
page read and write
|
||
2090A130000
|
heap
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
7FF848F93000
|
trusted library allocation
|
page read and write
|
||
267F000
|
trusted library allocation
|
page read and write
|
||
2C5A000
|
trusted library allocation
|
page read and write
|
||
7FF848F16000
|
trusted library allocation
|
page read and write
|
||
256811D8000
|
trusted library allocation
|
page read and write
|
||
F5C000
|
heap
|
page read and write
|
||
7FF848D33000
|
trusted library allocation
|
page execute and read and write
|
||
132BAFC0000
|
heap
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
2600000
|
trusted library allocation
|
page read and write
|
||
3852000
|
trusted library allocation
|
page read and write
|
||
125F7000
|
trusted library allocation
|
page read and write
|
||
7FF848D84000
|
trusted library allocation
|
page read and write
|
||
28B0000
|
trusted library allocation
|
page read and write
|
||
1DCF6780000
|
heap
|
page read and write
|
||
12BF1000
|
trusted library allocation
|
page read and write
|
||
133A3000
|
trusted library allocation
|
page read and write
|
||
218862A9000
|
trusted library allocation
|
page read and write
|
||
4087C4C000
|
stack
|
page read and write
|
||
25681871000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
205010BE000
|
trusted library allocation
|
page read and write
|
||
383C000
|
trusted library allocation
|
page read and write
|
||
25BC000
|
trusted library allocation
|
page read and write
|
||
13431000
|
trusted library allocation
|
page read and write
|
||
7FF849092000
|
trusted library allocation
|
page read and write
|
||
4086DFB000
|
stack
|
page read and write
|
||
24E0000
|
heap
|
page execute and read and write
|
||
3431000
|
trusted library allocation
|
page read and write
|
||
2B81000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
25F9000
|
trusted library allocation
|
page read and write
|
||
7FF848F9D000
|
trusted library allocation
|
page read and write
|
||
1418AE22000
|
trusted library allocation
|
page read and write
|
||
1B000000
|
heap
|
page read and write
|
||
25AF000
|
trusted library allocation
|
page read and write
|
||
2B2B000
|
trusted library allocation
|
page read and write
|
||
1FB4A150000
|
direct allocation
|
page read and write
|
||
2F18000
|
trusted library allocation
|
page read and write
|
||
13392000
|
trusted library allocation
|
page read and write
|
||
7FF848D62000
|
trusted library allocation
|
page read and write
|
||
2B8A000
|
trusted library allocation
|
page read and write
|
||
7FF848F26000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
1418ABBD000
|
trusted library allocation
|
page read and write
|
||
1B8FC000
|
heap
|
page read and write
|
||
14189590000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page execute and read and write
|
||
1DCF6782000
|
heap
|
page read and write
|
||
7FF848D34000
|
trusted library allocation
|
page read and write
|
||
25AD000
|
trusted library allocation
|
page read and write
|
There are 2178 hidden memdumps, click here to show them.