Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
A39tzaySzX.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\RuntimeBroker
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x4d300deb, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
OpenPGP Public Key
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\RuntimeBroker.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4tdgr3hb.0fn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5de3i03c.xsb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5pu0ct2r.ayt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_glbjohkb.xhi.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_imzmhffo.ocj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iunublzp.mn4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kmfv4cuf.f1l.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ot5rexhx.zqm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qforbnhn.am5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sioqhl1m.u4b.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_svxst01h.e12.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tmbju4kw.omc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vsdhun0f.gv2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vzydpe4z.rta.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xjws4u5w.k1e.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zyw3ajrf.odi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RuntimeBroker.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Oct 6 21:52:54
2024, mtime=Sun Oct 6 21:52:54 2024, atime=Sun Oct 6 21:52:54 2024, length=46592, window=hide
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
There are 16 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\A39tzaySzX.exe
|
"C:\Users\user\Desktop\A39tzaySzX.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\A39tzaySzX.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'A39tzaySzX.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\RuntimeBroker'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RuntimeBroker'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "RuntimeBroker" /tr "C:\Users\user\AppData\Roaming\RuntimeBroker"
|
||
C:\Users\user\AppData\Roaming\RuntimeBroker
|
C:\Users\user\AppData\Roaming\RuntimeBroker
|
||
C:\Users\user\AppData\Roaming\RuntimeBroker
|
C:\Users\user\AppData\Roaming\RuntimeBroker
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe -Embedding
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe -Embedding
|
There are 6 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
introduction-husband.gl.at.ply.gg
|
|||
http://www.microsoft.coE
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://go.microsoft.co?
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2.C:
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://g.live.com/odclientsettings/Prod/C:
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://.VisualC
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://www.microsoft.c
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://crl.micros
|
unknown
|
There are 16 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
||
introduction-husband.gl.at.ply.gg
|
147.185.221.23
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
147.185.221.23
|
introduction-husband.gl.at.ply.gg
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\A39tzaySzX_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
RuntimeBroker
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\mspaint.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\mspaint.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
There are 24 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
25A1000
|
trusted library allocation
|
page read and write
|
||
312000
|
unkown
|
page readonly
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
21EA40D0000
|
trusted library allocation
|
page read and write
|
||
CE1000
|
heap
|
page read and write
|
||
224EB620000
|
heap
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
7FF8490A5000
|
trusted library allocation
|
page read and write
|
||
1C992486000
|
trusted library allocation
|
page read and write
|
||
7FF848D42000
|
trusted library allocation
|
page read and write
|
||
1C9AAB70000
|
heap
|
page read and write
|
||
131A000
|
heap
|
page read and write
|
||
224E73F0000
|
trusted library allocation
|
page read and write
|
||
19DEFCD8000
|
heap
|
page read and write
|
||
1DF33C93000
|
heap
|
page read and write
|
||
81880C7000
|
stack
|
page read and write
|
||
1DF33DBD000
|
heap
|
page read and write
|
||
224E605C000
|
heap
|
page read and write
|
||
1DF33C93000
|
heap
|
page read and write
|
||
1C9AA8D4000
|
heap
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
8186E7E000
|
stack
|
page read and write
|
||
2DE64360000
|
trusted library section
|
page read and write
|
||
1C9AAC7A000
|
heap
|
page read and write
|
||
224E6815000
|
heap
|
page read and write
|
||
25823C4C000
|
trusted library allocation
|
page read and write
|
||
D38467B000
|
stack
|
page read and write
|
||
1DF33D87000
|
heap
|
page read and write
|
||
2DE7E5CC000
|
heap
|
page read and write
|
||
1DF337F5000
|
heap
|
page read and write
|
||
1DF33CA4000
|
heap
|
page read and write
|
||
1DF33D87000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
21EA1FCC000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
1DF33CB2000
|
heap
|
page read and write
|
||
1DF38280000
|
heap
|
page read and write
|
||
2DE7E4D0000
|
heap
|
page read and write
|
||
2583B5D7000
|
heap
|
page read and write
|
||
1DF337F0000
|
heap
|
page read and write
|
||
7FF848D8D000
|
trusted library allocation
|
page execute and read and write
|
||
1AFD0000
|
heap
|
page execute and read and write
|
||
224E6D40000
|
trusted library allocation
|
page read and write
|
||
1C993C92000
|
trusted library allocation
|
page read and write
|
||
21EA1ED3000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page execute and read and write
|
||
2582429B000
|
trusted library allocation
|
page read and write
|
||
21EA1FB0000
|
heap
|
page read and write
|
||
77A5977000
|
stack
|
page read and write
|
||
1C993383000
|
trusted library allocation
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
1C9A26EF000
|
trusted library allocation
|
page read and write
|
||
81874FE000
|
stack
|
page read and write
|
||
1DF33D7B000
|
heap
|
page read and write
|
||
1DF33C83000
|
heap
|
page read and write
|
||
25823F06000
|
trusted library allocation
|
page read and write
|
||
1DF33DF5000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
1DF31E0D000
|
heap
|
page read and write
|
||
2DE76141000
|
trusted library allocation
|
page read and write
|
||
2DE64570000
|
trusted library allocation
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
1C9A2401000
|
trusted library allocation
|
page read and write
|
||
21EA1FB0000
|
heap
|
page read and write
|
||
27141C5C000
|
trusted library allocation
|
page read and write
|
||
2DE65FE2000
|
heap
|
page read and write
|
||
2DE7E603000
|
heap
|
page read and write
|
||
1C993714000
|
trusted library allocation
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
1DF33C9C000
|
heap
|
page read and write
|
||
21EA1FE7000
|
heap
|
page read and write
|
||
21EA1FEA000
|
heap
|
page read and write
|
||
D383FDE000
|
stack
|
page read and write
|
||
21EA46ED000
|
heap
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
224EB6FC000
|
heap
|
page read and write
|
||
266F000
|
trusted library allocation
|
page read and write
|
||
2DE7E5C0000
|
heap
|
page read and write
|
||
1DF33C9E000
|
heap
|
page read and write
|
||
1DF31E3C000
|
heap
|
page read and write
|
||
21EA001C000
|
heap
|
page read and write
|
||
1DF33C7C000
|
heap
|
page read and write
|
||
1DF33C8F000
|
heap
|
page read and write
|
||
25824CFC000
|
trusted library allocation
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
224EB690000
|
heap
|
page read and write
|
||
19DEFCDE000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
21EA0015000
|
heap
|
page read and write
|
||
7FF848D5B000
|
trusted library allocation
|
page read and write
|
||
12961000
|
trusted library allocation
|
page read and write
|
||
1DF33DF0000
|
heap
|
page read and write
|
||
21EA1EBC000
|
heap
|
page read and write
|
||
1C99098B000
|
heap
|
page read and write
|
||
CA6000
|
heap
|
page read and write
|
||
1DF33C7C000
|
heap
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page read and write
|
||
27142EEA000
|
trusted library allocation
|
page read and write
|
||
224EB490000
|
trusted library allocation
|
page read and write
|
||
1DF33D9C000
|
heap
|
page read and write
|
||
2313000
|
trusted library allocation
|
page read and write
|
||
21EA1FCC000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
1C9A2470000
|
trusted library allocation
|
page read and write
|
||
1C990A4D000
|
heap
|
page read and write
|
||
21EA1F94000
|
heap
|
page read and write
|
||
224EB6C5000
|
heap
|
page read and write
|
||
1DF31EB8000
|
heap
|
page read and write
|
||
1DF33CB2000
|
heap
|
page read and write
|
||
1DF33C8A000
|
heap
|
page read and write
|
||
1DF33C63000
|
heap
|
page read and write
|
||
1DF33C7E000
|
heap
|
page read and write
|
||
27140330000
|
heap
|
page read and write
|
||
21EA1ECB000
|
heap
|
page read and write
|
||
77A5CFE000
|
stack
|
page read and write
|
||
2DE7E5F2000
|
heap
|
page read and write
|
||
D3842FD000
|
stack
|
page read and write
|
||
1DF33D87000
|
heap
|
page read and write
|
||
21EA1EB6000
|
heap
|
page read and write
|
||
21EA1F40000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
21EA1FDD000
|
heap
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
2DE7E5B0000
|
heap
|
page read and write
|
||
2DE76446000
|
trusted library allocation
|
page read and write
|
||
21EA17FE000
|
heap
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
21EA1FD3000
|
heap
|
page read and write
|
||
27142C49000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
7DF4DA0B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
224E691A000
|
heap
|
page read and write
|
||
1AEEE000
|
stack
|
page read and write
|
||
1C9AABBB000
|
heap
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
2715A308000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
21EA1EC0000
|
heap
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
27151EC8000
|
trusted library allocation
|
page read and write
|
||
25822DE0000
|
trusted library allocation
|
page read and write
|
||
1DF33CA8000
|
heap
|
page read and write
|
||
224EB661000
|
heap
|
page read and write
|
||
1DF33C94000
|
heap
|
page read and write
|
||
F31D273000
|
stack
|
page read and write
|
||
1C9934C5000
|
trusted library allocation
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
B70FDFD000
|
stack
|
page read and write
|
||
1DF33C6D000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
1DF33C50000
|
heap
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
45AFF7E000
|
unkown
|
page readonly
|
||
1DF33CAC000
|
heap
|
page read and write
|
||
21E9FFFF000
|
heap
|
page read and write
|
||
7FF848F24000
|
trusted library allocation
|
page read and write
|
||
224EB4C0000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
21EA1FE6000
|
heap
|
page read and write
|
||
125AE000
|
trusted library allocation
|
page read and write
|
||
21EA1FF2000
|
heap
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
1C993791000
|
trusted library allocation
|
page read and write
|
||
21EA1FF7000
|
heap
|
page read and write
|
||
2DE66D39000
|
trusted library allocation
|
page read and write
|
||
1DF33C98000
|
heap
|
page read and write
|
||
7FF848E2C000
|
trusted library allocation
|
page execute and read and write
|
||
1DF33CA2000
|
heap
|
page read and write
|
||
2DE65FB7000
|
heap
|
page read and write
|
||
1C9A2431000
|
trusted library allocation
|
page read and write
|
||
B7100FD000
|
stack
|
page read and write
|
||
1DF33C69000
|
heap
|
page read and write
|
||
1DF31E90000
|
heap
|
page read and write
|
||
F31E5CC000
|
stack
|
page read and write
|
||
1DF33E2E000
|
heap
|
page read and write
|
||
1DF31E2E000
|
heap
|
page read and write
|
||
1DF33C98000
|
heap
|
page read and write
|
||
1DF33D9D000
|
heap
|
page read and write
|
||
1DF33C58000
|
heap
|
page read and write
|
||
21EA1F52000
|
heap
|
page read and write
|
||
25823F95000
|
trusted library allocation
|
page read and write
|
||
1DF33C9A000
|
heap
|
page read and write
|
||
21EA1F9B000
|
heap
|
page read and write
|
||
1DF33DC8000
|
heap
|
page read and write
|
||
1DF33C98000
|
heap
|
page read and write
|
||
1C9AA9D0000
|
heap
|
page execute and read and write
|
||
1DF33C7D000
|
heap
|
page read and write
|
||
1B544000
|
heap
|
page read and write
|
||
21EA1FCD000
|
heap
|
page read and write
|
||
818804E000
|
stack
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
21EA1FEB000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
21EA1EBA000
|
heap
|
page read and write
|
||
7FF848D34000
|
trusted library allocation
|
page read and write
|
||
1DF31EB9000
|
heap
|
page read and write
|
||
21EA1F22000
|
heap
|
page read and write
|
||
77A587A000
|
stack
|
page read and write
|
||
21EA0006000
|
heap
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
818747F000
|
stack
|
page read and write
|
||
21EA46DF000
|
heap
|
page read and write
|
||
2715A41A000
|
heap
|
page read and write
|
||
25822D50000
|
heap
|
page readonly
|
||
271402E0000
|
heap
|
page execute and read and write
|
||
CA0000
|
heap
|
page read and write
|
||
21EA1F28000
|
heap
|
page read and write
|
||
21EA1FBC000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
21EA1FAB000
|
heap
|
page read and write
|
||
1DF33C86000
|
heap
|
page read and write
|
||
1C9AA407000
|
heap
|
page read and write
|
||
307F000
|
trusted library allocation
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
224EB6CB000
|
heap
|
page read and write
|
||
2DE66EBC000
|
trusted library allocation
|
page read and write
|
||
1B8AE000
|
stack
|
page read and write
|
||
1C9AA9D6000
|
heap
|
page execute and read and write
|
||
1DF33C94000
|
heap
|
page read and write
|
||
7FF848D5B000
|
trusted library allocation
|
page read and write
|
||
8187277000
|
stack
|
page read and write
|
||
D3845FD000
|
stack
|
page read and write
|
||
1DF33C8A000
|
heap
|
page read and write
|
||
77A5C7E000
|
stack
|
page read and write
|
||
1DF33C9E000
|
heap
|
page read and write
|
||
25822CE0000
|
heap
|
page read and write
|
||
1DF33C93000
|
heap
|
page read and write
|
||
25823F00000
|
trusted library allocation
|
page read and write
|
||
1DF31EA7000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
21EA1FEE000
|
heap
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
2DE7E5B4000
|
heap
|
page read and write
|
||
7FF848F58000
|
trusted library allocation
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page execute and read and write
|
||
27143471000
|
trusted library allocation
|
page read and write
|
||
8187379000
|
stack
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
21EA1FC8000
|
heap
|
page read and write
|
||
25823E31000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
21EA1EE9000
|
heap
|
page read and write
|
||
2583AED1000
|
heap
|
page read and write
|
||
25823E42000
|
trusted library allocation
|
page read and write
|
||
1DF33C98000
|
heap
|
page read and write
|
||
77A5AF6000
|
stack
|
page read and write
|
||
25832F01000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
1DF33CA4000
|
heap
|
page read and write
|
||
1C9AAC6E000
|
heap
|
page read and write
|
||
F31D87F000
|
stack
|
page read and write
|
||
1DF33C69000
|
heap
|
page read and write
|
||
1C9AAB4A000
|
heap
|
page read and write
|
||
1DF33DFF000
|
heap
|
page read and write
|
||
21EA000F000
|
heap
|
page read and write
|
||
258213C0000
|
heap
|
page read and write
|
||
1DF33C98000
|
heap
|
page read and write
|
||
224E60A3000
|
heap
|
page read and write
|
||
7FF84918B000
|
trusted library allocation
|
page read and write
|
||
2DE64425000
|
heap
|
page read and write
|
||
21EA46B4000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
1DF33D7B000
|
heap
|
page read and write
|
||
2DE7E480000
|
heap
|
page execute and read and write
|
||
21EA000A000
|
heap
|
page read and write
|
||
92BEF7F000
|
stack
|
page read and write
|
||
7FF8491CD000
|
trusted library allocation
|
page read and write
|
||
1DF33C94000
|
heap
|
page read and write
|
||
21EA1F59000
|
heap
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
1C9AAC50000
|
heap
|
page read and write
|
||
21EA1ED3000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
21EA1FEE000
|
heap
|
page read and write
|
||
21EA1FC3000
|
heap
|
page read and write
|
||
1DF33C6E000
|
heap
|
page read and write
|
||
224E695A000
|
heap
|
page read and write
|
||
7FF848F22000
|
trusted library allocation
|
page read and write
|
||
12968000
|
trusted library allocation
|
page read and write
|
||
D0B000
|
heap
|
page read and write
|
||
1DF31E46000
|
heap
|
page read and write
|
||
21EA1F9C000
|
heap
|
page read and write
|
||
1DF33DDE000
|
heap
|
page read and write
|
||
27141BA0000
|
heap
|
page execute and read and write
|
||
224EB520000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
21EA1FC4000
|
heap
|
page read and write
|
||
77A69CC000
|
stack
|
page read and write
|
||
1C992200000
|
trusted library allocation
|
page read and write
|
||
1DF33C98000
|
heap
|
page read and write
|
||
92C014D000
|
stack
|
page read and write
|
||
21EA1FDE000
|
heap
|
page read and write
|
||
7FF849099000
|
trusted library allocation
|
page read and write
|
||
961000
|
heap
|
page read and write
|
||
1DF33D87000
|
heap
|
page read and write
|
||
2617000
|
trusted library allocation
|
page read and write
|
||
258212E0000
|
heap
|
page read and write
|
||
45AF87E000
|
unkown
|
page readonly
|
||
77A56FE000
|
stack
|
page read and write
|
||
2DE64655000
|
heap
|
page read and write
|
||
21E9FFFF000
|
heap
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
21EA1F95000
|
heap
|
page read and write
|
||
92BF07E000
|
stack
|
page read and write
|
||
21EA1FEB000
|
heap
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
1B32E000
|
stack
|
page read and write
|
||
45B06FE000
|
stack
|
page read and write
|
||
45AFA77000
|
stack
|
page read and write
|
||
1C9922B0000
|
trusted library allocation
|
page read and write
|
||
1DF31E89000
|
heap
|
page read and write
|
||
1C99098E000
|
heap
|
page read and write
|
||
7FF8490DA000
|
trusted library allocation
|
page read and write
|
||
258331B9000
|
trusted library allocation
|
page read and write
|
||
2DE67144000
|
trusted library allocation
|
page read and write
|
||
7FF8490D5000
|
trusted library allocation
|
page read and write
|
||
1DF33CB2000
|
heap
|
page read and write
|
||
8187F4E000
|
stack
|
page read and write
|
||
1C990910000
|
trusted library section
|
page read and write
|
||
258240E7000
|
trusted library allocation
|
page read and write
|
||
7FF848F54000
|
trusted library allocation
|
page read and write
|
||
2715A44A000
|
heap
|
page read and write
|
||
224E6000000
|
heap
|
page read and write
|
||
818717D000
|
stack
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
1DF33CAE000
|
heap
|
page read and write
|
||
1C9A26F7000
|
trusted library allocation
|
page read and write
|
||
21EA1F5A000
|
heap
|
page read and write
|
||
1DF33C56000
|
heap
|
page read and write
|
||
27142EEE000
|
trusted library allocation
|
page read and write
|
||
21EA001C000
|
heap
|
page read and write
|
||
2DE76161000
|
trusted library allocation
|
page read and write
|
||
2DE66141000
|
trusted library allocation
|
page read and write
|
||
F31D5FD000
|
stack
|
page read and write
|
||
224EB580000
|
trusted library allocation
|
page read and write
|
||
27140088000
|
heap
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
21EA1ECB000
|
heap
|
page read and write
|
||
21EA1FC8000
|
heap
|
page read and write
|
||
1DF33D40000
|
heap
|
page read and write
|
||
21E9FFFF000
|
heap
|
page read and write
|
||
2605000
|
trusted library allocation
|
page read and write
|
||
7FF849132000
|
trusted library allocation
|
page read and write
|
||
1DF31E52000
|
heap
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
21EA1FCC000
|
heap
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
25823E3E000
|
trusted library allocation
|
page read and write
|
||
1DF31DC0000
|
heap
|
page read and write
|
||
27151C01000
|
trusted library allocation
|
page read and write
|
||
1C9AAC93000
|
heap
|
page read and write
|
||
21EA1FC4000
|
heap
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
1BB2F000
|
stack
|
page read and write
|
||
224EB62D000
|
heap
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page execute and read and write
|
||
77A67CE000
|
stack
|
page read and write
|
||
1DF33C78000
|
heap
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
27143533000
|
trusted library allocation
|
page read and write
|
||
1DF33DD0000
|
heap
|
page read and write
|
||
21EA1FF2000
|
heap
|
page read and write
|
||
F31E3CE000
|
stack
|
page read and write
|
||
7FF848F22000
|
trusted library allocation
|
page read and write
|
||
21EA0008000
|
heap
|
page read and write
|
||
92C01CE000
|
stack
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
21EA1FBA000
|
heap
|
page read and write
|
||
1DF33CB2000
|
heap
|
page read and write
|
||
27140080000
|
heap
|
page read and write
|
||
307C000
|
trusted library allocation
|
page read and write
|
||
2DE64617000
|
heap
|
page execute and read and write
|
||
1C993B86000
|
trusted library allocation
|
page read and write
|
||
1DF33DD0000
|
heap
|
page read and write
|
||
224E6079000
|
heap
|
page read and write
|
||
1DF33C93000
|
heap
|
page read and write
|
||
2DE67F6B000
|
trusted library allocation
|
page read and write
|
||
1DF33C9A000
|
heap
|
page read and write
|
||
1DF33CAA000
|
heap
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
271400C4000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
21EA46BD000
|
heap
|
page read and write
|
||
7DF427B20000
|
trusted library allocation
|
page execute and read and write
|
||
2715A448000
|
heap
|
page read and write
|
||
2583B5F4000
|
heap
|
page read and write
|
||
1C990895000
|
heap
|
page read and write
|
||
21E9FFFD000
|
heap
|
page read and write
|
||
1B5DF000
|
stack
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
2637000
|
trusted library allocation
|
page read and write
|
||
2DE6744C000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1DF33E1D000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
1C9909B9000
|
heap
|
page read and write
|
||
2715A111000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
2582417A000
|
trusted library allocation
|
page read and write
|
||
1BA20000
|
heap
|
page read and write
|
||
2DE7642E000
|
trusted library allocation
|
page read and write
|
||
224E6129000
|
heap
|
page read and write
|
||
D38437E000
|
stack
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
1C048000
|
stack
|
page read and write
|
||
1DF33C9E000
|
heap
|
page read and write
|
||
1DF33DC8000
|
heap
|
page read and write
|
||
1DF33E1D000
|
heap
|
page read and write
|
||
21EA1F6B000
|
heap
|
page read and write
|
||
1C9936AD000
|
trusted library allocation
|
page read and write
|
||
E9F000
|
stack
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
224E6E70000
|
trusted library allocation
|
page read and write
|
||
3D5000
|
heap
|
page read and write
|
||
1DF31E82000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
224EB6F1000
|
heap
|
page read and write
|
||
224E5E70000
|
heap
|
page read and write
|
||
1DF33C5E000
|
heap
|
page read and write
|
||
224EB6F8000
|
heap
|
page read and write
|
||
224E7050000
|
trusted library section
|
page readonly
|
||
1DF33D41000
|
heap
|
page read and write
|
||
1C9936E2000
|
trusted library allocation
|
page read and write
|
||
21EA46B6000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
224E5E90000
|
heap
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
82F000
|
stack
|
page read and write
|
||
2DE76382000
|
trusted library allocation
|
page read and write
|
||
21E9FFFD000
|
heap
|
page read and write
|
||
1DF33E22000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
1B36E000
|
stack
|
page read and write
|
||
77A5BF8000
|
stack
|
page read and write
|
||
21EA1FDD000
|
heap
|
page read and write
|
||
224EB5A0000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
21EA1FE7000
|
heap
|
page read and write
|
||
21EA1FEE000
|
heap
|
page read and write
|
||
1DF33DF0000
|
heap
|
page read and write
|
||
1DF33C7C000
|
heap
|
page read and write
|
||
45B137E000
|
unkown
|
page readonly
|
||
1DF33C64000
|
heap
|
page read and write
|
||
21EA1FA1000
|
heap
|
page read and write
|
||
21EA1FE7000
|
heap
|
page read and write
|
||
1C993529000
|
trusted library allocation
|
page read and write
|
||
81872F8000
|
stack
|
page read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
2583B391000
|
heap
|
page read and write
|
||
81870F9000
|
stack
|
page read and write
|
||
1DF3829B000
|
heap
|
page read and write
|
||
7FF848E1C000
|
trusted library allocation
|
page execute and read and write
|
||
AF1000
|
stack
|
page read and write
|
||
1DF33DD0000
|
heap
|
page read and write
|
||
27151ED7000
|
trusted library allocation
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
27143A09000
|
trusted library allocation
|
page read and write
|
||
1DF33DD0000
|
heap
|
page read and write
|
||
21EA002A000
|
heap
|
page read and write
|
||
21EA1FA4000
|
heap
|
page read and write
|
||
224E6113000
|
heap
|
page read and write
|
||
1DF33E07000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
1DF31E81000
|
heap
|
page read and write
|
||
21EA46EB000
|
heap
|
page read and write
|
||
45B077E000
|
unkown
|
page readonly
|
||
2DE7E5C4000
|
heap
|
page read and write
|
||
1DF33C94000
|
heap
|
page read and write
|
||
1DF33C8F000
|
heap
|
page read and write
|
||
2DE643A8000
|
heap
|
page read and write
|
||
2DE642E0000
|
heap
|
page read and write
|
||
7FF849185000
|
trusted library allocation
|
page read and write
|
||
21EA1FF2000
|
heap
|
page read and write
|
||
1BD0E000
|
stack
|
page read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
7DF48A830000
|
trusted library allocation
|
page execute and read and write
|
||
1DF33CA6000
|
heap
|
page read and write
|
||
21EA1FCC000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
1DF33C57000
|
heap
|
page read and write
|
||
81873FF000
|
stack
|
page read and write
|
||
224E6013000
|
heap
|
page read and write
|
||
7FF848F28000
|
trusted library allocation
|
page read and write
|
||
2583B71D000
|
heap
|
page read and write
|
||
127A000
|
heap
|
page read and write
|
||
1C993005000
|
trusted library allocation
|
page read and write
|
||
1C99096E000
|
heap
|
page read and write
|
||
1C990790000
|
heap
|
page read and write
|
||
25821457000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
2DE661C5000
|
trusted library allocation
|
page read and write
|
||
7FF8490A3000
|
trusted library allocation
|
page read and write
|
||
7FF848F2A000
|
trusted library allocation
|
page read and write
|
||
1DF33D69000
|
heap
|
page read and write
|
||
7FF849073000
|
trusted library allocation
|
page read and write
|
||
92BF2F9000
|
stack
|
page read and write
|
||
21EA1FD3000
|
heap
|
page read and write
|
||
92BF378000
|
stack
|
page read and write
|
||
21EA46BE000
|
heap
|
page read and write
|
||
2DE66369000
|
trusted library allocation
|
page read and write
|
||
77A68CE000
|
stack
|
page read and write
|
||
1C993D53000
|
trusted library allocation
|
page read and write
|
||
21EA1FE6000
|
heap
|
page read and write
|
||
1DF31E62000
|
heap
|
page read and write
|
||
21EA0036000
|
heap
|
page read and write
|
||
2DE65FD9000
|
heap
|
page read and write
|
||
2DE7E5C8000
|
heap
|
page read and write
|
||
21EA1FB0000
|
heap
|
page read and write
|
||
27142952000
|
trusted library allocation
|
page read and write
|
||
D383ED7000
|
stack
|
page read and write
|
||
258331D7000
|
trusted library allocation
|
page read and write
|
||
1DF33C65000
|
heap
|
page read and write
|
||
2DE64610000
|
heap
|
page execute and read and write
|
||
25822D40000
|
trusted library allocation
|
page read and write
|
||
F31D2FE000
|
stack
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
21EA1EC2000
|
heap
|
page read and write
|
||
21EA1FF7000
|
heap
|
page read and write
|
||
21EA1F6A000
|
heap
|
page read and write
|
||
8186F7E000
|
stack
|
page read and write
|
||
27151E20000
|
trusted library allocation
|
page read and write
|
||
7FF848D72000
|
trusted library allocation
|
page read and write
|
||
1C994204000
|
trusted library allocation
|
page read and write
|
||
B70FE7D000
|
stack
|
page read and write
|
||
2DE66B93000
|
trusted library allocation
|
page read and write
|
||
1DF33C40000
|
heap
|
page read and write
|
||
21EA1FCC000
|
heap
|
page read and write
|
||
224E7070000
|
trusted library section
|
page readonly
|
||
21EA0006000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
1DF33DDE000
|
heap
|
page read and write
|
||
1DF33CA0000
|
heap
|
page read and write
|
||
2DE66EB3000
|
trusted library allocation
|
page read and write
|
||
25823BE5000
|
trusted library allocation
|
page read and write
|
||
21EA0033000
|
heap
|
page read and write
|
||
25822D00000
|
trusted library section
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
224E691A000
|
heap
|
page read and write
|
||
21EA1FDD000
|
heap
|
page read and write
|
||
2582146B000
|
heap
|
page read and write
|
||
224EB480000
|
trusted library allocation
|
page read and write
|
||
1DF33CA2000
|
heap
|
page read and write
|
||
7FF849094000
|
trusted library allocation
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
224EB5F0000
|
remote allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
1DF33C74000
|
heap
|
page read and write
|
||
224E6043000
|
heap
|
page read and write
|
||
21EA1FC9000
|
heap
|
page read and write
|
||
21EA1FEF000
|
heap
|
page read and write
|
||
224EB590000
|
trusted library allocation
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
935000
|
heap
|
page read and write
|
||
1DF33740000
|
heap
|
page read and write
|
||
19DEFCB0000
|
heap
|
page read and write
|
||
12963000
|
trusted library allocation
|
page read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
1C990940000
|
trusted library allocation
|
page read and write
|
||
21EA1FA6000
|
heap
|
page read and write
|
||
1DF3828D000
|
heap
|
page read and write
|
||
27151C4F000
|
trusted library allocation
|
page read and write
|
||
1C9AA938000
|
heap
|
page read and write
|
||
21EA1FEE000
|
heap
|
page read and write
|
||
1C9AA850000
|
heap
|
page read and write
|
||
224E6A91000
|
trusted library allocation
|
page read and write
|
||
21EA1FDD000
|
heap
|
page read and write
|
||
224E6075000
|
heap
|
page read and write
|
||
1DF31E6C000
|
heap
|
page read and write
|
||
1B16E000
|
stack
|
page read and write
|
||
7FF848E56000
|
trusted library allocation
|
page execute and read and write
|
||
21EA000D000
|
heap
|
page read and write
|
||
224E5FA0000
|
trusted library allocation
|
page read and write
|
||
2DE67F21000
|
trusted library allocation
|
page read and write
|
||
2DE67F66000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
1DF33D82000
|
heap
|
page read and write
|
||
45B08FE000
|
stack
|
page read and write
|
||
1C9AAA00000
|
heap
|
page read and write
|
||
1C9909BE000
|
heap
|
page read and write
|
||
1DF33C87000
|
heap
|
page read and write
|
||
1CA5C000
|
stack
|
page read and write
|
||
1DF33C54000
|
heap
|
page read and write
|
||
25823922000
|
trusted library allocation
|
page read and write
|
||
27142EE6000
|
trusted library allocation
|
page read and write
|
||
21EA1FB9000
|
heap
|
page read and write
|
||
224E6E60000
|
trusted library allocation
|
page read and write
|
||
1DF33C87000
|
heap
|
page read and write
|
||
21EA1FBA000
|
heap
|
page read and write
|
||
1DF33CAA000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page execute and read and write
|
||
1DF33DDE000
|
heap
|
page read and write
|
||
1DF33CA4000
|
heap
|
page read and write
|
||
7FF848F12000
|
trusted library allocation
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
45B017E000
|
unkown
|
page readonly
|
||
21EA0020000
|
heap
|
page read and write
|
||
ED0000
|
trusted library allocation
|
page read and write
|
||
25822E50000
|
heap
|
page execute and read and write
|
||
1DF33DC8000
|
heap
|
page read and write
|
||
1B4DF000
|
stack
|
page read and write
|
||
27142F26000
|
trusted library allocation
|
page read and write
|
||
7FF848D8C000
|
trusted library allocation
|
page execute and read and write
|
||
21EA1FB5000
|
heap
|
page read and write
|
||
1DF33C94000
|
heap
|
page read and write
|
||
1DF31E3D000
|
heap
|
page read and write
|
||
1DF33C93000
|
heap
|
page read and write
|
||
2715A220000
|
heap
|
page read and write
|
||
1C9A2707000
|
trusted library allocation
|
page read and write
|
||
1C994224000
|
trusted library allocation
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page execute and read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
21EA1FC8000
|
heap
|
page read and write
|
||
2DE679AC000
|
trusted library allocation
|
page read and write
|
||
24BE000
|
stack
|
page read and write
|
||
2800000
|
heap
|
page execute and read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
2DE67263000
|
trusted library allocation
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
1DF33C7C000
|
heap
|
page read and write
|
||
1DF33C77000
|
heap
|
page read and write
|
||
1DF33CA0000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
1DF38293000
|
heap
|
page read and write
|
||
21EA1FF7000
|
heap
|
page read and write
|
||
2583B6FE000
|
heap
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
21EA46C8000
|
heap
|
page read and write
|
||
1DF35E90000
|
trusted library allocation
|
page read and write
|
||
21EA1EC4000
|
heap
|
page read and write
|
||
1DF31EAA000
|
heap
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
92BEEFE000
|
stack
|
page read and write
|
||
1DF33CAA000
|
heap
|
page read and write
|
||
1DF33C8F000
|
heap
|
page read and write
|
||
B70FC7E000
|
stack
|
page read and write
|
||
21E9FE30000
|
heap
|
page read and write
|
||
21EA1FB5000
|
heap
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
27142B81000
|
trusted library allocation
|
page read and write
|
||
1DF33CA6000
|
heap
|
page read and write
|
||
25823C55000
|
trusted library allocation
|
page read and write
|
||
1B5FD000
|
stack
|
page read and write
|
||
7FF8490A8000
|
trusted library allocation
|
page read and write
|
||
21EA1FF2000
|
heap
|
page read and write
|
||
1DF33C9E000
|
heap
|
page read and write
|
||
1C9AA88A000
|
heap
|
page read and write
|
||
9B1000
|
heap
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
21EA1FC8000
|
heap
|
page read and write
|
||
15AE000
|
stack
|
page read and write
|
||
2715A15B000
|
heap
|
page read and write
|
||
8FC000
|
heap
|
page read and write
|
||
21EA1FD3000
|
heap
|
page read and write
|
||
2DE65F46000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
D38427E000
|
stack
|
page read and write
|
||
F31D577000
|
stack
|
page read and write
|
||
224EB610000
|
heap
|
page read and write
|
||
1DF33C63000
|
heap
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
1DF31E71000
|
heap
|
page read and write
|
||
1DF3829B000
|
heap
|
page read and write
|
||
21EA17FD000
|
heap
|
page read and write
|
||
2715A147000
|
heap
|
page read and write
|
||
1DF33D7B000
|
heap
|
page read and write
|
||
7FF8490A2000
|
trusted library allocation
|
page read and write
|
||
21EA1FD4000
|
heap
|
page read and write
|
||
1DF33D7B000
|
heap
|
page read and write
|
||
21EA1E88000
|
heap
|
page read and write
|
||
21EA1FC4000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
21E9FFBC000
|
heap
|
page read and write
|
||
1DF33CB8000
|
heap
|
page read and write
|
||
1DF3828B000
|
heap
|
page read and write
|
||
7FF8490C9000
|
trusted library allocation
|
page read and write
|
||
45B05FE000
|
stack
|
page read and write
|
||
2DE7E7D0000
|
trusted library allocation
|
page read and write
|
||
2DE65EE0000
|
heap
|
page read and write
|
||
1DF33C6D000
|
heap
|
page read and write
|
||
1DF33CA0000
|
heap
|
page read and write
|
||
7DF427B30000
|
trusted library allocation
|
page execute and read and write
|
||
1C99336E000
|
trusted library allocation
|
page read and write
|
||
1DF33C9A000
|
heap
|
page read and write
|
||
1DF33CA2000
|
heap
|
page read and write
|
||
1C9AACBD000
|
heap
|
page read and write
|
||
1DF33E1F000
|
heap
|
page read and write
|
||
77A6949000
|
stack
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
19DEFE20000
|
heap
|
page read and write
|
||
1DF33C8A000
|
heap
|
page read and write
|
||
21EA1FF7000
|
heap
|
page read and write
|
||
21EA1FB9000
|
heap
|
page read and write
|
||
1DF33C9C000
|
heap
|
page read and write
|
||
2DE671D4000
|
trusted library allocation
|
page read and write
|
||
21EA1FD3000
|
heap
|
page read and write
|
||
21EA1FB9000
|
heap
|
page read and write
|
||
1C993618000
|
trusted library allocation
|
page read and write
|
||
224E608B000
|
heap
|
page read and write
|
||
1DF33C93000
|
heap
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
1DF31BF0000
|
heap
|
page read and write
|
||
21EA1FDD000
|
heap
|
page read and write
|
||
25823FF8000
|
trusted library allocation
|
page read and write
|
||
45B0B7A000
|
stack
|
page read and write
|
||
1C9A2421000
|
trusted library allocation
|
page read and write
|
||
1DF38287000
|
heap
|
page read and write
|
||
1DF33C77000
|
heap
|
page read and write
|
||
21E9FFCD000
|
heap
|
page read and write
|
||
2715A443000
|
heap
|
page read and write
|
||
1C9923D0000
|
heap
|
page execute and read and write
|
||
25822F57000
|
trusted library allocation
|
page read and write
|
||
27141BE1000
|
trusted library allocation
|
page read and write
|
||
21EA1ECB000
|
heap
|
page read and write
|
||
7FF8490D8000
|
trusted library allocation
|
page read and write
|
||
7DF43E360000
|
trusted library allocation
|
page execute and read and write
|
||
1AB2C000
|
stack
|
page read and write
|
||
1DF31E6F000
|
heap
|
page read and write
|
||
1DF38287000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1DF33C9A000
|
heap
|
page read and write
|
||
7FF8490AC000
|
trusted library allocation
|
page read and write
|
||
25823ADF000
|
trusted library allocation
|
page read and write
|
||
224E6913000
|
heap
|
page read and write
|
||
1BE0F000
|
stack
|
page read and write
|
||
1DF33CAE000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
1DF33C9C000
|
heap
|
page read and write
|
||
7FF8490AC000
|
trusted library allocation
|
page read and write
|
||
21EA1FE7000
|
heap
|
page read and write
|
||
2583B3CB000
|
heap
|
page read and write
|
||
45B04FE000
|
stack
|
page read and write
|
||
92BEE7E000
|
stack
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
B70FD7E000
|
stack
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
1DF33CA2000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
1DF33C8A000
|
heap
|
page read and write
|
||
1DF33DF0000
|
heap
|
page read and write
|
||
271400CA000
|
heap
|
page read and write
|
||
13073000
|
trusted library allocation
|
page read and write
|
||
1C9AAB42000
|
heap
|
page read and write
|
||
7FF849001000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
1DF33D7B000
|
heap
|
page read and write
|
||
1DF33D91000
|
heap
|
page read and write
|
||
7FF848F52000
|
trusted library allocation
|
page read and write
|
||
2DE64590000
|
trusted library allocation
|
page read and write
|
||
21EA000A000
|
heap
|
page read and write
|
||
21EA1F90000
|
heap
|
page read and write
|
||
1B4BF000
|
heap
|
page read and write
|
||
2DE66130000
|
heap
|
page execute and read and write
|
||
1C9921F0000
|
heap
|
page readonly
|
||
21EA1FE6000
|
heap
|
page read and write
|
||
B70FCFF000
|
stack
|
page read and write
|
||
258240AE000
|
trusted library allocation
|
page read and write
|
||
25821494000
|
heap
|
page read and write
|
||
92BF47E000
|
stack
|
page read and write
|
||
295F000
|
stack
|
page read and write
|
||
21EA1FE6000
|
heap
|
page read and write
|
||
21EA1FCD000
|
heap
|
page read and write
|
||
21EA1FEB000
|
heap
|
page read and write
|
||
F31D7F8000
|
stack
|
page read and write
|
||
D3843FB000
|
stack
|
page read and write
|
||
1DF31E64000
|
heap
|
page read and write
|
||
25823E35000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
1DF33CAC000
|
heap
|
page read and write
|
||
1DF33DD5000
|
heap
|
page read and write
|
||
21EA1FCC000
|
heap
|
page read and write
|
||
1DF33C77000
|
heap
|
page read and write
|
||
1DF31E93000
|
heap
|
page read and write
|
||
7FF848F21000
|
trusted library allocation
|
page read and write
|
||
8187FCC000
|
stack
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page execute and read and write
|
||
F31E549000
|
stack
|
page read and write
|
||
21EA1FFE000
|
heap
|
page read and write
|
||
21EA1FEA000
|
heap
|
page read and write
|
||
25EA000
|
trusted library allocation
|
page read and write
|
||
224EB6ED000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
1DF33DDE000
|
heap
|
page read and write
|
||
1C9922E0000
|
trusted library allocation
|
page read and write
|
||
8F6000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
1DF33CA8000
|
heap
|
page read and write
|
||
81881CE000
|
stack
|
page read and write
|
||
258213E0000
|
heap
|
page read and write
|
||
2715A42E000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
13078000
|
trusted library allocation
|
page read and write
|
||
1DF33C7C000
|
heap
|
page read and write
|
||
21E9FF10000
|
heap
|
page read and write
|
||
2DE76434000
|
trusted library allocation
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
1DF33D5F000
|
heap
|
page read and write
|
||
224E602B000
|
heap
|
page read and write
|
||
1C9AAC84000
|
heap
|
page read and write
|
||
21EA004B000
|
heap
|
page read and write
|
||
25824659000
|
trusted library allocation
|
page read and write
|
||
1DF33C7D000
|
heap
|
page read and write
|
||
1DF33CA2000
|
heap
|
page read and write
|
||
1DF31CD0000
|
heap
|
page read and write
|
||
2DE643B2000
|
heap
|
page read and write
|
||
1DF31E71000
|
heap
|
page read and write
|
||
2582339D000
|
trusted library allocation
|
page read and write
|
||
271400BB000
|
heap
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
77A577E000
|
stack
|
page read and write
|
||
224EB640000
|
heap
|
page read and write
|
||
271400C2000
|
heap
|
page read and write
|
||
1C992240000
|
heap
|
page execute and read and write
|
||
2DE643E8000
|
heap
|
page read and write
|
||
45B177E000
|
unkown
|
page readonly
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
2DE67170000
|
trusted library allocation
|
page read and write
|
||
1DF33CB2000
|
heap
|
page read and write
|
||
7FF8490C9000
|
trusted library allocation
|
page read and write
|
||
25821497000
|
heap
|
page read and write
|
||
1B39FD9000
|
stack
|
page read and write
|
||
2DE76427000
|
trusted library allocation
|
page read and write
|
||
1DF33C93000
|
heap
|
page read and write
|
||
27140270000
|
trusted library allocation
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
2715A0F0000
|
heap
|
page execute and read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
21EA1FF7000
|
heap
|
page read and write
|
||
21EA1FF2000
|
heap
|
page read and write
|
||
21EA0018000
|
heap
|
page read and write
|
||
7FF848D72000
|
trusted library allocation
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
1DF33CA0000
|
heap
|
page read and write
|
||
21EA1FCC000
|
heap
|
page read and write
|
||
1DF33C94000
|
heap
|
page read and write
|
||
1DF33D62000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
1DF33CA6000
|
heap
|
page read and write
|
||
21EA1FB9000
|
heap
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page execute and read and write
|
||
1DF33D4F000
|
heap
|
page read and write
|
||
1DF33C9A000
|
heap
|
page read and write
|
||
1DF33DF0000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
21EA46E7000
|
heap
|
page read and write
|
||
2DE673EA000
|
trusted library allocation
|
page read and write
|
||
2583B320000
|
heap
|
page read and write
|
||
21EA1FF2000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
21EA46E7000
|
heap
|
page read and write
|
||
2583B7F0000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
1DF33C78000
|
heap
|
page read and write
|
||
D69000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page execute and read and write
|
||
CE5000
|
heap
|
page read and write
|
||
21EA1FD8000
|
heap
|
page read and write
|
||
1DF33DC8000
|
heap
|
page read and write
|
||
1C9AAB46000
|
heap
|
page read and write
|
||
7FF848DF6000
|
trusted library allocation
|
page read and write
|
||
1DF33CB2000
|
heap
|
page read and write
|
||
1DF33C85000
|
heap
|
page read and write
|
||
27142DBF000
|
trusted library allocation
|
page read and write
|
||
21EA1FD3000
|
heap
|
page read and write
|
||
2DE65FD7000
|
heap
|
page read and write
|
||
21EA1FEA000
|
heap
|
page read and write
|
||
1DF33DC8000
|
heap
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
21EA1FF2000
|
heap
|
page read and write
|
||
1DF33CA6000
|
heap
|
page read and write
|
||
1B507000
|
heap
|
page read and write
|
||
21EA1FB0000
|
heap
|
page read and write
|
||
261C000
|
trusted library allocation
|
page read and write
|
||
7FF848D90000
|
trusted library allocation
|
page read and write
|
||
21EA46DD000
|
heap
|
page read and write
|
||
21EA1FAA000
|
heap
|
page read and write
|
||
92BEBB3000
|
stack
|
page read and write
|
||
2DE67507000
|
trusted library allocation
|
page read and write
|
||
2DE761AE000
|
trusted library allocation
|
page read and write
|
||
27151ECD000
|
trusted library allocation
|
page read and write
|
||
224E6F70000
|
trusted library allocation
|
page read and write
|
||
1DF33C90000
|
heap
|
page read and write
|
||
21EA1EBC000
|
heap
|
page read and write
|
||
21EA1FF2000
|
heap
|
page read and write
|
||
224EB6C1000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
25821453000
|
heap
|
page read and write
|
||
77A57FF000
|
stack
|
page read and write
|
||
1DF31EB8000
|
heap
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
45B0A7E000
|
unkown
|
page readonly
|
||
2DE643A0000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
27151EE7000
|
trusted library allocation
|
page read and write
|
||
27140335000
|
heap
|
page read and write
|
||
31E000
|
unkown
|
page readonly
|
||
25822D10000
|
trusted library section
|
page read and write
|
||
1DF33CAE000
|
heap
|
page read and write
|
||
1B3A27E000
|
unkown
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
F31D676000
|
stack
|
page read and write
|
||
12A7000
|
heap
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
1DF31EB8000
|
heap
|
page read and write
|
||
21EA1F92000
|
heap
|
page read and write
|
||
1DF33D82000
|
heap
|
page read and write
|
||
7FF848E56000
|
trusted library allocation
|
page execute and read and write
|
||
1DF33C78000
|
heap
|
page read and write
|
||
1DF33C79000
|
heap
|
page read and write
|
||
21EA1FF2000
|
heap
|
page read and write
|
||
224E6077000
|
heap
|
page read and write
|
||
224EB6BF000
|
heap
|
page read and write
|
||
7DF43E370000
|
trusted library allocation
|
page execute and read and write
|
||
45B087E000
|
unkown
|
page readonly
|
||
21EA1F91000
|
heap
|
page read and write
|
||
1DF38282000
|
heap
|
page read and write
|
||
258241AA000
|
trusted library allocation
|
page read and write
|
||
27140070000
|
trusted library section
|
page read and write
|
||
310000
|
unkown
|
page readonly
|
||
1DF33CB2000
|
heap
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
1C993376000
|
trusted library allocation
|
page read and write
|
||
21EA17F0000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
2DE67F46000
|
trusted library allocation
|
page read and write
|
||
21E9FFF3000
|
heap
|
page read and write
|
||
7FF8490A8000
|
trusted library allocation
|
page read and write
|
||
818814D000
|
stack
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
224E60FE000
|
heap
|
page read and write
|
||
27140060000
|
trusted library section
|
page read and write
|
||
1DF33C78000
|
heap
|
page read and write
|
||
21EA1FC1000
|
heap
|
page read and write
|
||
92BF1F9000
|
stack
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
21EA1FC1000
|
heap
|
page read and write
|
||
21EA1EAA000
|
heap
|
page read and write
|
||
21EA1FEA000
|
heap
|
page read and write
|
||
45B097E000
|
unkown
|
page readonly
|
||
1C993365000
|
trusted library allocation
|
page read and write
|
||
CE4000
|
heap
|
page read and write
|
||
2583B3A0000
|
heap
|
page read and write
|
||
2DE645C0000
|
trusted library allocation
|
page read and write
|
||
2DE6600D000
|
heap
|
page read and write
|
||
21EA1EBE000
|
heap
|
page read and write
|
||
1DF33D92000
|
heap
|
page read and write
|
||
1DF33CB2000
|
heap
|
page read and write
|
||
21EA1F92000
|
heap
|
page read and write
|
||
21EA1FF2000
|
heap
|
page read and write
|
||
2DE66D75000
|
trusted library allocation
|
page read and write
|
||
1BAAD000
|
stack
|
page read and write
|
||
21EA1FF2000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
D0D000
|
heap
|
page read and write
|
||
21EA1FEA000
|
heap
|
page read and write
|
||
7FF8491CD000
|
trusted library allocation
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
21EA1FC8000
|
heap
|
page read and write
|
||
21EA1FEE000
|
heap
|
page read and write
|
||
21EA1FEE000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
45B047E000
|
unkown
|
page readonly
|
||
2583B5D9000
|
heap
|
page read and write
|
||
1DF31E88000
|
heap
|
page read and write
|
||
1DF33DFF000
|
heap
|
page read and write
|
||
2582144B000
|
heap
|
page read and write
|
||
21EA1FEE000
|
heap
|
page read and write
|
||
21EA1FCC000
|
heap
|
page read and write
|
||
224EB5A0000
|
trusted library allocation
|
page read and write
|
||
1B060000
|
heap
|
page read and write
|
||
7FF848F58000
|
trusted library allocation
|
page read and write
|
||
7FF848F54000
|
trusted library allocation
|
page read and write
|
||
12E7000
|
heap
|
page read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
25822CD5000
|
heap
|
page read and write
|
||
1C150000
|
heap
|
page read and write
|
||
25824CF7000
|
trusted library allocation
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
2300000
|
trusted library allocation
|
page read and write
|
||
1DF33D67000
|
heap
|
page read and write
|
||
1C9A26ED000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
1DF33C93000
|
heap
|
page read and write
|
||
1DF33CA0000
|
heap
|
page read and write
|
||
1DF33CA8000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
21EA1FEA000
|
heap
|
page read and write
|
||
1DF31E82000
|
heap
|
page read and write
|
||
21EA46DA000
|
heap
|
page read and write
|
||
1DF33C6D000
|
heap
|
page read and write
|
||
1B9AD000
|
stack
|
page read and write
|
||
F31E4CE000
|
stack
|
page read and write
|
||
1DF33C7D000
|
heap
|
page read and write
|
||
1DF33CAC000
|
heap
|
page read and write
|
||
1C99346B000
|
trusted library allocation
|
page read and write
|
||
2DE7E5B8000
|
heap
|
page read and write
|
||
258216B0000
|
heap
|
page read and write
|
||
1DF33CAC000
|
heap
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
7FF848D33000
|
trusted library allocation
|
page execute and read and write
|
||
1C994229000
|
trusted library allocation
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
92BF3FE000
|
stack
|
page read and write
|
||
1DF33CAA000
|
heap
|
page read and write
|
||
21EA1FF7000
|
heap
|
page read and write
|
||
27141AE0000
|
trusted library allocation
|
page read and write
|
||
21EA1FC0000
|
heap
|
page read and write
|
||
1DF33C93000
|
heap
|
page read and write
|
||
21EA46DA000
|
heap
|
page read and write
|
||
1DF33CAE000
|
heap
|
page read and write
|
||
1DF31E8C000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
2625000
|
trusted library allocation
|
page read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
1C9AABF7000
|
heap
|
page read and write
|
||
1DF31E4E000
|
heap
|
page read and write
|
||
224E609D000
|
heap
|
page read and write
|
||
1DF33C78000
|
heap
|
page read and write
|
||
2642000
|
trusted library allocation
|
page read and write
|
||
2583B6E1000
|
heap
|
page read and write
|
||
21EA1EEA000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
258230F9000
|
trusted library allocation
|
page read and write
|
||
CDF000
|
heap
|
page read and write
|
||
1DF33C7C000
|
heap
|
page read and write
|
||
224EB5F0000
|
remote allocation
|
page read and write
|
||
27141BD0000
|
heap
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
45B0F7E000
|
unkown
|
page readonly
|
||
1B063000
|
heap
|
page read and write
|
||
1DF33CB8000
|
heap
|
page read and write
|
||
1DF33C8A000
|
heap
|
page read and write
|
||
25832F40000
|
trusted library allocation
|
page read and write
|
||
1DF33C78000
|
heap
|
page read and write
|
||
2715A152000
|
heap
|
page read and write
|
||
21EA1EBE000
|
heap
|
page read and write
|
||
1DF33C9C000
|
heap
|
page read and write
|
||
1C9A26E9000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
1DF33C8A000
|
heap
|
page read and write
|
||
21EA1FA3000
|
heap
|
page read and write
|
||
27140030000
|
heap
|
page read and write
|
||
2DE64650000
|
heap
|
page read and write
|
||
224EB494000
|
trusted library allocation
|
page read and write
|
||
45B1079000
|
stack
|
page read and write
|
||
7FF848E2C000
|
trusted library allocation
|
page execute and read and write
|
||
1C9AAB3A000
|
heap
|
page read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
1BE45000
|
stack
|
page read and write
|
||
1C660000
|
heap
|
page read and write
|
||
1DF33DD0000
|
heap
|
page read and write
|
||
21EA1EA2000
|
heap
|
page read and write
|
||
1DF33CA0000
|
heap
|
page read and write
|
||
7FF8490C4000
|
trusted library allocation
|
page read and write
|
||
21EA1FF7000
|
heap
|
page read and write
|
||
271439BF000
|
trusted library allocation
|
page read and write
|
||
27141B10000
|
trusted library allocation
|
page read and write
|
||
224E608D000
|
heap
|
page read and write
|
||
2DE642D0000
|
heap
|
page read and write
|
||
3081000
|
trusted library allocation
|
page read and write
|
||
1DF33C86000
|
heap
|
page read and write
|
||
224E60BA000
|
heap
|
page read and write
|
||
224EB440000
|
trusted library allocation
|
page read and write
|
||
7FF84914E000
|
trusted library allocation
|
page read and write
|
||
1DF31E58000
|
heap
|
page read and write
|
||
2DE6731F000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
2715A13E000
|
heap
|
page read and write
|
||
1DF33C7C000
|
heap
|
page read and write
|
||
21EA46BD000
|
heap
|
page read and write
|
||
21EA1F32000
|
heap
|
page read and write
|
||
25822D60000
|
heap
|
page execute and read and write
|
||
21EA48D0000
|
heap
|
page read and write
|
||
B70F9FE000
|
stack
|
page read and write
|
||
27142EF6000
|
trusted library allocation
|
page read and write
|
||
2629000
|
trusted library allocation
|
page read and write
|
||
7FF849099000
|
trusted library allocation
|
page read and write
|
||
1DF33C52000
|
heap
|
page read and write
|
||
92BF276000
|
stack
|
page read and write
|
||
1C55A000
|
stack
|
page read and write
|
||
92C00C9000
|
stack
|
page read and write
|
||
27159BEE000
|
heap
|
page read and write
|
||
21EA1FCC000
|
heap
|
page read and write
|
||
21EA1F14000
|
heap
|
page read and write
|
||
2DE65EF0000
|
heap
|
page read and write
|
||
27142AD3000
|
trusted library allocation
|
page read and write
|
||
224E6900000
|
heap
|
page read and write
|
||
932000
|
heap
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
1890000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
25821492000
|
heap
|
page read and write
|
||
21EA000B000
|
heap
|
page read and write
|
||
21EA1EC4000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1DF33C86000
|
heap
|
page read and write
|
||
45B067E000
|
unkown
|
page readonly
|
||
21EA1FDD000
|
heap
|
page read and write
|
||
21EA1FF4000
|
heap
|
page read and write
|
||
7FF848F2A000
|
trusted library allocation
|
page read and write
|
||
1DF33DD5000
|
heap
|
page read and write
|
||
1DF31E60000
|
heap
|
page read and write
|
||
FA1000
|
stack
|
page read and write
|
||
21EA0015000
|
heap
|
page read and write
|
||
77A684C000
|
stack
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page execute and read and write
|
||
1C990990000
|
heap
|
page read and write
|
||
21EA1FCC000
|
heap
|
page read and write
|
||
7FF848D8B000
|
trusted library allocation
|
page execute and read and write
|
||
2DE7E5BC000
|
heap
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
2DE76436000
|
trusted library allocation
|
page read and write
|
||
77A5D7E000
|
stack
|
page read and write
|
||
25823E39000
|
trusted library allocation
|
page read and write
|
||
224EB6F3000
|
heap
|
page read and write
|
||
1DF33C94000
|
heap
|
page read and write
|
||
21EA1FDD000
|
heap
|
page read and write
|
||
21EA1FE7000
|
heap
|
page read and write
|
||
1C990890000
|
heap
|
page read and write
|
||
21EA1F99000
|
heap
|
page read and write
|
||
25832EF1000
|
trusted library allocation
|
page read and write
|
||
2715A42B000
|
heap
|
page read and write
|
||
1B46B000
|
stack
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
1DF33CAA000
|
heap
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
21EA1FF7000
|
heap
|
page read and write
|
||
2583B70D000
|
heap
|
page read and write
|
||
2583B66C000
|
heap
|
page read and write
|
||
77A58FF000
|
stack
|
page read and write
|
||
B70FEFB000
|
stack
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
21EA0029000
|
heap
|
page read and write
|
||
1C9941DF000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
1DF31E4A000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
21EA1F14000
|
heap
|
page read and write
|
||
21EA1F52000
|
heap
|
page read and write
|
||
125A1000
|
trusted library allocation
|
page read and write
|
||
224EB520000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
2DE6660D000
|
trusted library allocation
|
page read and write
|
||
1C990920000
|
trusted library allocation
|
page read and write
|
||
2DE643DD000
|
heap
|
page read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
21EA0006000
|
heap
|
page read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
1C993115000
|
trusted library allocation
|
page read and write
|
||
1C9909BB000
|
heap
|
page read and write
|
||
19DEFCD0000
|
heap
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
1DF33CA6000
|
heap
|
page read and write
|
||
21EA1FD9000
|
heap
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
1DF31E4A000
|
heap
|
page read and write
|
||
7FF848D3D000
|
trusted library allocation
|
page execute and read and write
|
||
27142D08000
|
trusted library allocation
|
page read and write
|
||
2DE64300000
|
heap
|
page read and write
|
||
21EA1F40000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
1DF33DDE000
|
heap
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page execute and read and write
|
||
21EA1FB9000
|
heap
|
page read and write
|
||
7FF849094000
|
trusted library allocation
|
page read and write
|
||
21EA1F9C000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
2645000
|
trusted library allocation
|
page read and write
|
||
1C9937CF000
|
trusted library allocation
|
page read and write
|
||
1DF33CA0000
|
heap
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
1DF33C86000
|
heap
|
page read and write
|
||
21EA1FF7000
|
heap
|
page read and write
|
||
92BEFF9000
|
stack
|
page read and write
|
||
1C9922A5000
|
heap
|
page read and write
|
||
16AF000
|
stack
|
page read and write
|
||
1B7AE000
|
stack
|
page read and write
|
||
3071000
|
trusted library allocation
|
page read and write
|
||
1DF33DC8000
|
heap
|
page read and write
|
||
77A5A79000
|
stack
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
224EB430000
|
trusted library allocation
|
page read and write
|
||
224EB654000
|
heap
|
page read and write
|
||
1DF33CAC000
|
heap
|
page read and write
|
||
21EA1FD3000
|
heap
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
21E9FFB5000
|
heap
|
page read and write
|
||
25821459000
|
heap
|
page read and write
|
||
27151ECF000
|
trusted library allocation
|
page read and write
|
||
2DE643E4000
|
heap
|
page read and write
|
||
1B6DE000
|
stack
|
page read and write
|
||
21EA1F95000
|
heap
|
page read and write
|
||
27142C79000
|
trusted library allocation
|
page read and write
|
||
271400C6000
|
heap
|
page read and write
|
||
45B0C7E000
|
unkown
|
page readonly
|
||
77A5673000
|
stack
|
page read and write
|
||
1DF33DD5000
|
heap
|
page read and write
|
||
818757B000
|
stack
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
21EA1EB6000
|
heap
|
page read and write
|
||
1C992628000
|
trusted library allocation
|
page read and write
|
||
25824826000
|
trusted library allocation
|
page read and write
|
||
27151C11000
|
trusted library allocation
|
page read and write
|
||
19DEFBB0000
|
heap
|
page read and write
|
||
224EB480000
|
trusted library allocation
|
page read and write
|
||
21EA1FAC000
|
heap
|
page read and write
|
||
21EA1EA1000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page execute and read and write
|
||
21EA1FE7000
|
heap
|
page read and write
|
||
21EA1EAE000
|
heap
|
page read and write
|
||
1BC00000
|
heap
|
page execute and read and write
|
||
25823E46000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
25821449000
|
heap
|
page read and write
|
||
1C9922A0000
|
heap
|
page read and write
|
||
21EA1FF2000
|
heap
|
page read and write
|
||
2DE64600000
|
trusted library allocation
|
page read and write
|
||
224E5FB0000
|
trusted library section
|
page read and write
|
||
F31D8FF000
|
stack
|
page read and write
|
||
1C990958000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
2DE643FE000
|
heap
|
page read and write
|
||
1DF33C9E000
|
heap
|
page read and write
|
||
45B03FE000
|
stack
|
page read and write
|
||
21EA1FC8000
|
heap
|
page read and write
|
||
45AFC7E000
|
stack
|
page read and write
|
||
1DF33DD5000
|
heap
|
page read and write
|
||
8186FF9000
|
stack
|
page read and write
|
||
1DF33D5B000
|
heap
|
page read and write
|
||
21EA46C7000
|
heap
|
page read and write
|
||
1DF33C83000
|
heap
|
page read and write
|
||
92BF5FB000
|
stack
|
page read and write
|
||
1249000
|
heap
|
page read and write
|
||
2715A100000
|
heap
|
page read and write
|
||
224EB64D000
|
heap
|
page read and write
|
||
21EA1ED8000
|
heap
|
page read and write
|
||
21EA1FC8000
|
heap
|
page read and write
|
||
1C9AA980000
|
trusted library allocation
|
page read and write
|
||
224EB470000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
7FF848D73000
|
trusted library allocation
|
page execute and read and write
|
||
21EA1FD3000
|
heap
|
page read and write
|
||
2715A3B1000
|
heap
|
page read and write
|
||
21EA1F80000
|
heap
|
page read and write
|
||
1C9AAAE0000
|
heap
|
page read and write
|
||
2DE65F3C000
|
heap
|
page read and write
|
||
21EA1FD3000
|
heap
|
page read and write
|
||
21EA46C7000
|
heap
|
page read and write
|
||
7FF848DFC000
|
trusted library allocation
|
page execute and read and write
|
||
27142CA5000
|
trusted library allocation
|
page read and write
|
||
21EA1ED3000
|
heap
|
page read and write
|
||
21EA1F92000
|
heap
|
page read and write
|
||
21EA1F3C000
|
heap
|
page read and write
|
||
1C99300F000
|
trusted library allocation
|
page read and write
|
||
271400DC000
|
heap
|
page read and write
|
||
21EA1FC0000
|
heap
|
page read and write
|
||
2961000
|
trusted library allocation
|
page read and write
|
||
1DF31E58000
|
heap
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF848DF6000
|
trusted library allocation
|
page read and write
|
||
21EA1FF2000
|
heap
|
page read and write
|
||
2682000
|
trusted library allocation
|
page read and write
|
||
92BEBFE000
|
stack
|
page read and write
|
||
21EA1FF7000
|
heap
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
1C990950000
|
heap
|
page read and write
|
||
1C9A2410000
|
trusted library allocation
|
page read and write
|
||
1C9908E0000
|
heap
|
page read and write
|
||
2DE64580000
|
heap
|
page readonly
|
||
45AFD7E000
|
unkown
|
page readonly
|
||
7FF848DCC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
F31D4FE000
|
stack
|
page read and write
|
||
1DF31E7E000
|
heap
|
page read and write
|
||
1268000
|
heap
|
page read and write
|
||
1DF38287000
|
heap
|
page read and write
|
||
21EA1FE6000
|
heap
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page read and write
|
||
21EA1900000
|
heap
|
page read and write
|
||
224EB6FE000
|
heap
|
page read and write
|
||
1DF33C6A000
|
heap
|
page read and write
|
||
1265000
|
heap
|
page read and write
|
||
F31D9FB000
|
stack
|
page read and write
|
||
21EA46E7000
|
heap
|
page read and write
|
||
1DF38293000
|
heap
|
page read and write
|
||
21EA1FB9000
|
heap
|
page read and write
|
||
2715A1B0000
|
heap
|
page read and write
|
||
27143365000
|
trusted library allocation
|
page read and write
|
||
21EA1FEB000
|
heap
|
page read and write
|
||
1DF33C51000
|
heap
|
page read and write
|
||
2DE66D47000
|
trusted library allocation
|
page read and write
|
||
7FF848D42000
|
trusted library allocation
|
page read and write
|
||
1DF33C86000
|
heap
|
page read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
21EA002A000
|
heap
|
page read and write
|
||
1DF33C63000
|
heap
|
page read and write
|
||
224EB600000
|
heap
|
page read and write
|
||
1DF33CAE000
|
heap
|
page read and write
|
||
45B127D000
|
stack
|
page read and write
|
||
224E6070000
|
heap
|
page read and write
|
||
21EA1FE3000
|
heap
|
page read and write
|
||
21EA1FC1000
|
heap
|
page read and write
|
||
2713FFC0000
|
heap
|
page read and write
|
||
21EA1F90000
|
heap
|
page read and write
|
||
21EA1FF7000
|
heap
|
page read and write
|
||
258331C6000
|
trusted library allocation
|
page read and write
|
||
1DF33C94000
|
heap
|
page read and write
|
||
1DF33C94000
|
heap
|
page read and write
|
||
7FF8491C7000
|
trusted library allocation
|
page read and write
|
||
2DE67DFD000
|
trusted library allocation
|
page read and write
|
||
8186BB3000
|
stack
|
page read and write
|
||
45AFE7C000
|
stack
|
page read and write
|
||
278F000
|
stack
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
1A5D0000
|
trusted library allocation
|
page read and write
|
||
1DF33E2F000
|
heap
|
page read and write
|
||
21EA1F26000
|
heap
|
page read and write
|
||
2850000
|
heap
|
page read and write
|
||
1DF33CA8000
|
heap
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
21EA1EE1000
|
heap
|
page read and write
|
||
21EA1FF7000
|
heap
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
21EA46E7000
|
heap
|
page read and write
|
||
92BF57F000
|
stack
|
page read and write
|
||
224E6902000
|
heap
|
page read and write
|
||
258216B5000
|
heap
|
page read and write
|
||
21EA1FD3000
|
heap
|
page read and write
|
||
790000
|
unkown
|
page readonly
|
||
7FF848D8B000
|
trusted library allocation
|
page read and write
|
||
1DF33C93000
|
heap
|
page read and write
|
||
1DF33DD0000
|
heap
|
page read and write
|
||
1DF33C9E000
|
heap
|
page read and write
|
||
21EA1FCC000
|
heap
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
7FF848D9C000
|
trusted library allocation
|
page execute and read and write
|
||
45B057E000
|
unkown
|
page readonly
|
||
1DF31D10000
|
heap
|
page read and write
|
||
1BC4E000
|
stack
|
page read and write
|
||
2DE7E6FB000
|
heap
|
page read and write
|
||
F31E44D000
|
stack
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
271420AD000
|
trusted library allocation
|
page read and write
|
||
25821418000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
2DE67392000
|
trusted library allocation
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
27E0000
|
heap
|
page execute and read and write
|
||
1DF33C79000
|
heap
|
page read and write
|
||
27142F23000
|
trusted library allocation
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
F31CFFE000
|
stack
|
page read and write
|
||
21EA0003000
|
heap
|
page read and write
|
||
77A5DFC000
|
stack
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
1DF31E5F000
|
heap
|
page read and write
|
||
92C01CB000
|
stack
|
page read and write
|
||
1DF33DF6000
|
heap
|
page read and write
|
||
2583B3D0000
|
heap
|
page read and write
|
||
1DF33C9C000
|
heap
|
page read and write
|
||
1DF33C9C000
|
heap
|
page read and write
|
||
21EA1F22000
|
heap
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
77A59FD000
|
stack
|
page read and write
|
||
1B3A2FF000
|
stack
|
page read and write
|
||
F31D6F9000
|
stack
|
page read and write
|
||
21EA46B0000
|
heap
|
page read and write
|
||
27151BE1000
|
trusted library allocation
|
page read and write
|
||
7FF84917C000
|
trusted library allocation
|
page read and write
|
||
224EB5B0000
|
trusted library allocation
|
page read and write
|
||
21EA002E000
|
heap
|
page read and write
|
||
21EA1EC0000
|
heap
|
page read and write
|
||
125B1000
|
trusted library allocation
|
page read and write
|
||
21E9FFFA000
|
heap
|
page read and write
|
||
1DF33C93000
|
heap
|
page read and write
|
||
21EA17F5000
|
heap
|
page read and write
|
||
1AF6A000
|
stack
|
page read and write
|
||
21EA1ED8000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
1DF33C8F000
|
heap
|
page read and write
|
||
7FF848F12000
|
trusted library allocation
|
page read and write
|
||
21EA1FE6000
|
heap
|
page read and write
|
||
1B50A000
|
heap
|
page read and write
|
||
25822D20000
|
trusted library allocation
|
page read and write
|
||
21EA1FB9000
|
heap
|
page read and write
|
||
1DF33CAA000
|
heap
|
page read and write
|
||
1DF33C90000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
21EA1FEB000
|
heap
|
page read and write
|
||
F31D77E000
|
stack
|
page read and write
|
||
1DF33DD5000
|
heap
|
page read and write
|
||
1DF33C79000
|
heap
|
page read and write
|
||
8186BFF000
|
stack
|
page read and write
|
||
92BF0F7000
|
stack
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
1DF33CA2000
|
heap
|
page read and write
|
||
1C990900000
|
trusted library section
|
page read and write
|
||
21EA1ED8000
|
heap
|
page read and write
|
||
1DF33DF0000
|
heap
|
page read and write
|
||
21EA46C8000
|
heap
|
page read and write
|
||
21E9FFFF000
|
heap
|
page read and write
|
||
2DE65F97000
|
heap
|
page read and write
|
||
2DE679D3000
|
trusted library allocation
|
page read and write
|
||
1C9AA990000
|
heap
|
page read and write
|
||
1DF33C9A000
|
heap
|
page read and write
|
||
21EA46E7000
|
heap
|
page read and write
|
||
1DF33C8A000
|
heap
|
page read and write
|
||
21EA1FC8000
|
heap
|
page read and write
|
||
21EA1ED8000
|
heap
|
page read and write
|
||
27141BC0000
|
trusted library allocation
|
page read and write
|
||
224E7090000
|
trusted library section
|
page readonly
|
||
1DF33CA4000
|
heap
|
page read and write
|
||
1DF33C94000
|
heap
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page read and write
|
||
27143A04000
|
trusted library allocation
|
page read and write
|
||
21EA1F26000
|
heap
|
page read and write
|
||
2DE76171000
|
trusted library allocation
|
page read and write
|
||
1DF33D88000
|
heap
|
page read and write
|
||
1DF33CA6000
|
heap
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
224E7080000
|
trusted library section
|
page readonly
|
||
25822E56000
|
heap
|
page execute and read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
2715A454000
|
heap
|
page read and write
|
||
7FF848F21000
|
trusted library allocation
|
page read and write
|
||
27140250000
|
trusted library allocation
|
page read and write
|
||
1DF33CA2000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
F31D3FE000
|
stack
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page execute and read and write
|
||
21EA1FCC000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
224E6E41000
|
trusted library allocation
|
page read and write
|
||
21EA1FD3000
|
heap
|
page read and write
|
||
7FF8490D2000
|
trusted library allocation
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
25824CD7000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
258331BE000
|
trusted library allocation
|
page read and write
|
||
1DF33C78000
|
heap
|
page read and write
|
||
21EA1FF7000
|
heap
|
page read and write
|
||
21EA1FF2000
|
heap
|
page read and write
|
||
21EA1E95000
|
heap
|
page read and write
|
||
25824765000
|
trusted library allocation
|
page read and write
|
||
224EB65A000
|
heap
|
page read and write
|
||
7FF848D9C000
|
trusted library allocation
|
page execute and read and write
|
||
21EA1FC1000
|
heap
|
page read and write
|
||
271434D4000
|
trusted library allocation
|
page read and write
|
||
2DE65EE5000
|
heap
|
page read and write
|
||
2DE64380000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
7DF4DA0C0000
|
trusted library allocation
|
page execute and read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
77A5B7B000
|
stack
|
page read and write
|
||
7FF848EF1000
|
trusted library allocation
|
page read and write
|
||
1DF31EBB000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
1DF33DC8000
|
heap
|
page read and write
|
||
45B027B000
|
stack
|
page read and write
|
||
45AF97E000
|
unkown
|
page readonly
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
1B546000
|
heap
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
1DF33D82000
|
heap
|
page read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
21EA000A000
|
heap
|
page read and write
|
||
21EA1FEE000
|
heap
|
page read and write
|
||
1DF33E08000
|
heap
|
page read and write
|
||
91B000
|
heap
|
page read and write
|
||
1DF33DD0000
|
heap
|
page read and write
|
||
1DF33D4A000
|
heap
|
page read and write
|
||
224E5F70000
|
heap
|
page read and write
|
||
D6B000
|
heap
|
page read and write
|
||
1DF33D54000
|
heap
|
page read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
21EA0006000
|
heap
|
page read and write
|
||
92BF4FD000
|
stack
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
1895000
|
heap
|
page read and write
|
||
7FF8490AA000
|
trusted library allocation
|
page read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
||
21EA1FEA000
|
heap
|
page read and write
|
||
1DF33C5C000
|
heap
|
page read and write
|
||
7DF48A820000
|
trusted library allocation
|
page execute and read and write
|
||
1DF33DDE000
|
heap
|
page read and write
|
||
1DF33C50000
|
heap
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
2714344B000
|
trusted library allocation
|
page read and write
|
||
1DF33C8A000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
2DE7E72A000
|
heap
|
page read and write
|
||
1DF33C7C000
|
heap
|
page read and write
|
||
224EB450000
|
trusted library allocation
|
page read and write
|
||
224E6800000
|
heap
|
page read and write
|
||
21EA1FF7000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
2DE76540000
|
trusted library allocation
|
page read and write
|
||
1DF33CA4000
|
heap
|
page read and write
|
||
21EA1FC1000
|
heap
|
page read and write
|
||
1DF33CB2000
|
heap
|
page read and write
|
||
21EA67C2000
|
trusted library allocation
|
page read and write
|
||
1DF33C9A000
|
heap
|
page read and write
|
||
21EA1FB0000
|
heap
|
page read and write
|
||
7DF427B40000
|
trusted library allocation
|
page execute and read and write
|
||
27140290000
|
trusted library allocation
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
1DF31EAA000
|
heap
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
25822EC0000
|
heap
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
21EA1FDD000
|
heap
|
page read and write
|
||
21EA1FF7000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
1DF31E2E000
|
heap
|
page read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
1C65C000
|
stack
|
page read and write
|
||
21E9FFFF000
|
heap
|
page read and write
|
||
1DF33C6D000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E26000
|
trusted library allocation
|
page execute and read and write
|
||
1DF31EA2000
|
heap
|
page read and write
|
||
21EA17FE000
|
heap
|
page read and write
|
||
25823F69000
|
trusted library allocation
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
224EB700000
|
heap
|
page read and write
|
||
27141E09000
|
trusted library allocation
|
page read and write
|
||
1BF4A000
|
stack
|
page read and write
|
||
1C9928CD000
|
trusted library allocation
|
page read and write
|
||
21EA1FDA000
|
heap
|
page read and write
|
||
19DEFC90000
|
heap
|
page read and write
|
||
21EA1FC8000
|
heap
|
page read and write
|
||
21EA1F90000
|
heap
|
page read and write
|
||
92BF17D000
|
stack
|
page read and write
|
||
1C9923F0000
|
heap
|
page read and write
|
||
1DF33C78000
|
heap
|
page read and write
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
1DF33CAC000
|
heap
|
page read and write
|
||
27142E8D000
|
trusted library allocation
|
page read and write
|
||
7FF848D8B000
|
trusted library allocation
|
page read and write
|
||
14A5000
|
heap
|
page read and write
|
||
2DE64429000
|
heap
|
page read and write
|
||
1DF33DD5000
|
heap
|
page read and write
|
||
21EA1F28000
|
heap
|
page read and write
|
||
9AF000
|
heap
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
21EA1FEB000
|
heap
|
page read and write
|
||
21EA1FE6000
|
heap
|
page read and write
|
||
21E9FFFD000
|
heap
|
page read and write
|
||
77A6A4E000
|
stack
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
21EA46E3000
|
heap
|
page read and write
|
||
7FF848EE2000
|
trusted library allocation
|
page read and write
|
||
2DE671B5000
|
trusted library allocation
|
page read and write
|
||
7FF848DFC000
|
trusted library allocation
|
page execute and read and write
|
||
2DE7E73E000
|
heap
|
page read and write
|
||
1DF31E70000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
27142FA7000
|
trusted library allocation
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
25822DA0000
|
trusted library allocation
|
page read and write
|
||
F31D97E000
|
stack
|
page read and write
|
||
224EB70A000
|
heap
|
page read and write
|
||
2582473E000
|
trusted library allocation
|
page read and write
|
||
21EA0009000
|
heap
|
page read and write
|
||
1DF33C7C000
|
heap
|
page read and write
|
||
21EA1FEA000
|
heap
|
page read and write
|
||
21EA1FE7000
|
heap
|
page read and write
|
||
1DF33C69000
|
heap
|
page read and write
|
||
1C993436000
|
trusted library allocation
|
page read and write
|
||
1DF33CA8000
|
heap
|
page read and write
|
||
224EB490000
|
trusted library allocation
|
page read and write
|
||
1DF33CB2000
|
heap
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
1BF0E000
|
stack
|
page read and write
|
||
7FF848EFA000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
21EA1FDA000
|
heap
|
page read and write
|
||
1DF33E1D000
|
heap
|
page read and write
|
||
1DF38298000
|
heap
|
page read and write
|
||
21E9FFFB000
|
heap
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
7FF49E800000
|
trusted library allocation
|
page execute and read and write
|
||
1DF33DFF000
|
heap
|
page read and write
|
||
21EA1FA8000
|
heap
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
1DF33CAE000
|
heap
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
21EA1FE3000
|
heap
|
page read and write
|
||
21EA1FF2000
|
heap
|
page read and write
|
||
1DF33C87000
|
heap
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
21EA1F32000
|
heap
|
page read and write
|
||
1DF33CAE000
|
heap
|
page read and write
|
||
2583B7E0000
|
heap
|
page read and write
|
||
2715A3B6000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
27151BF0000
|
trusted library allocation
|
page read and write
|
||
21EA0006000
|
heap
|
page read and write
|
||
21EA46E2000
|
heap
|
page read and write
|
||
2583B71F000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1C9AA860000
|
heap
|
page read and write
|
||
21EA1E91000
|
heap
|
page read and write
|
||
1C990870000
|
heap
|
page read and write
|
||
1DF33D67000
|
heap
|
page read and write
|
||
27140055000
|
heap
|
page read and write
|
||
21EA1E95000
|
heap
|
page read and write
|
||
1DF33C6D000
|
heap
|
page read and write
|
||
1AFAF000
|
stack
|
page read and write
|
||
2DE643E0000
|
heap
|
page read and write
|
||
2583B725000
|
heap
|
page read and write
|
||
7FF8490C4000
|
trusted library allocation
|
page read and write
|
||
224EB451000
|
trusted library allocation
|
page read and write
|
||
1C9AAB3E000
|
heap
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
45B117E000
|
unkown
|
page readonly
|
||
21EA46EA000
|
heap
|
page read and write
|
||
1DF33D67000
|
heap
|
page read and write
|
||
21EA1800000
|
heap
|
page read and write
|
||
1DF33C86000
|
heap
|
page read and write
|
||
92C004A000
|
stack
|
page read and write
|
||
25823ACA000
|
trusted library allocation
|
page read and write
|
||
21EA1FC0000
|
heap
|
page read and write
|
||
1DF33D5F000
|
heap
|
page read and write
|
||
1DF31E58000
|
heap
|
page read and write
|
||
21E9FF50000
|
heap
|
page read and write
|
||
27142E38000
|
trusted library allocation
|
page read and write
|
||
21E9FFB1000
|
heap
|
page read and write
|
||
1DF31E0C000
|
heap
|
page read and write
|
||
2583B5C0000
|
heap
|
page read and write
|
||
1B3D0000
|
heap
|
page read and write
|
||
25822D70000
|
trusted library allocation
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
1C9AAAED000
|
heap
|
page read and write
|
||
271400BE000
|
heap
|
page read and write
|
||
27140102000
|
heap
|
page read and write
|
||
1DF33E27000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
25821410000
|
heap
|
page read and write
|
||
1C9AAB32000
|
heap
|
page read and write
|
||
D5E000
|
heap
|
page read and write
|
||
8186EFE000
|
stack
|
page read and write
|
||
2582144F000
|
heap
|
page read and write
|
||
21EA1FD7000
|
heap
|
page read and write
|
||
1DF33D83000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page execute and read and write
|
||
19DEFE25000
|
heap
|
page read and write
|
||
21EA46DA000
|
heap
|
page read and write
|
||
1DF33C87000
|
heap
|
page read and write
|
||
1B26E000
|
stack
|
page read and write
|
||
1DF33C8F000
|
heap
|
page read and write
|
||
1DF33C9E000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF84907F000
|
trusted library allocation
|
page read and write
|
||
125A8000
|
trusted library allocation
|
page read and write
|
||
21EA1FBD000
|
heap
|
page read and write
|
||
1DF33D5B000
|
heap
|
page read and write
|
||
25823AD1000
|
trusted library allocation
|
page read and write
|
||
1DF33C7C000
|
heap
|
page read and write
|
||
2DE678C7000
|
trusted library allocation
|
page read and write
|
||
21E9FFFD000
|
heap
|
page read and write
|
||
7FF849163000
|
trusted library allocation
|
page read and write
|
||
21EA1FC4000
|
heap
|
page read and write
|
||
D383F5E000
|
stack
|
page read and write
|
||
2713FFF0000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
1DF33C8A000
|
heap
|
page read and write
|
||
2DE7642C000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
21EA1FD3000
|
heap
|
page read and write
|
||
2614000
|
trusted library allocation
|
page read and write
|
||
45AF8FE000
|
stack
|
page read and write
|
||
1DF33C7D000
|
heap
|
page read and write
|
||
1DF33D67000
|
heap
|
page read and write
|
||
45B037E000
|
unkown
|
page readonly
|
||
21EA1F9F000
|
heap
|
page read and write
|
||
21EA1E97000
|
heap
|
page read and write
|
||
21EA0026000
|
heap
|
page read and write
|
||
21E9FFF3000
|
heap
|
page read and write
|
||
1C9AAB36000
|
heap
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
21EA1EC2000
|
heap
|
page read and write
|
||
1C993430000
|
trusted library allocation
|
page read and write
|
||
7FF84913C000
|
trusted library allocation
|
page read and write
|
||
2DE67A94000
|
trusted library allocation
|
page read and write
|
||
21EA1FE6000
|
heap
|
page read and write
|
||
7FF848DCC000
|
trusted library allocation
|
page execute and read and write
|
||
1DF36530000
|
heap
|
page read and write
|
||
296C000
|
trusted library allocation
|
page read and write
|
||
1C9935DF000
|
trusted library allocation
|
page read and write
|
||
21EA1E87000
|
heap
|
page read and write
|
||
1DF31E82000
|
heap
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
27140109000
|
heap
|
page read and write
|
||
2583B409000
|
heap
|
page read and write
|
||
2583B4B0000
|
heap
|
page read and write
|
||
2DE65F87000
|
heap
|
page read and write
|
||
25832ED1000
|
trusted library allocation
|
page read and write
|
||
21EA1EB6000
|
heap
|
page read and write
|
||
2715A3F2000
|
heap
|
page read and write
|
||
21EA000A000
|
heap
|
page read and write
|
||
2DE65FF0000
|
heap
|
page read and write
|
||
F31D479000
|
stack
|
page read and write
|
||
7FF848F28000
|
trusted library allocation
|
page read and write
|
||
1DF31E4A000
|
heap
|
page read and write
|
||
27142BE5000
|
trusted library allocation
|
page read and write
|
||
92BFFCE000
|
stack
|
page read and write
|
||
1B470000
|
heap
|
page read and write
|
||
1C993372000
|
trusted library allocation
|
page read and write
|
||
45AFB7E000
|
unkown
|
page readonly
|
||
77A53FE000
|
stack
|
page read and write
|
||
1C99336A000
|
trusted library allocation
|
page read and write
|
||
224E70A0000
|
trusted library section
|
page readonly
|
||
7FF848D72000
|
trusted library allocation
|
page read and write
|
||
27140280000
|
heap
|
page readonly
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
2715A300000
|
heap
|
page read and write
|
||
1DF33C78000
|
heap
|
page read and write
|
||
1DF33C6D000
|
heap
|
page read and write
|
||
1DF33CA0000
|
heap
|
page read and write
|
||
224EB450000
|
trusted library allocation
|
page read and write
|
||
21EA1F3C000
|
heap
|
page read and write
|
||
2DE67200000
|
trusted library allocation
|
page read and write
|
||
1DF33C60000
|
heap
|
page read and write
|
||
B71017B000
|
stack
|
page read and write
|
||
224E6802000
|
heap
|
page read and write
|
||
1DF33C6E000
|
heap
|
page read and write
|
||
21EA1FB2000
|
heap
|
page read and write
|
||
127C000
|
heap
|
page read and write
|
||
306E000
|
stack
|
page read and write
|
||
1DF33C7C000
|
heap
|
page read and write
|
||
45B07FE000
|
stack
|
page read and write
|
||
818707E000
|
stack
|
page read and write
|
||
1DF33D87000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
1DF33C6A000
|
heap
|
page read and write
|
||
7FF849073000
|
trusted library allocation
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490D8000
|
trusted library allocation
|
page read and write
|
||
2DE6796D000
|
trusted library allocation
|
page read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
224E6091000
|
heap
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
21EA1FE3000
|
heap
|
page read and write
|
||
2DE6731B000
|
trusted library allocation
|
page read and write
|
||
21EA1FCC000
|
heap
|
page read and write
|
||
21EA46C3000
|
heap
|
page read and write
|
||
21EA1EE0000
|
heap
|
page read and write
|
||
1C993C6B000
|
trusted library allocation
|
page read and write
|
||
1DF33D67000
|
heap
|
page read and write
|
||
2713FFD0000
|
heap
|
page read and write
|
||
1DF31EB8000
|
heap
|
page read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
2DE7E721000
|
heap
|
page read and write
|
||
1DF33C9C000
|
heap
|
page read and write
|
||
21EA1FD3000
|
heap
|
page read and write
|
||
21EA0016000
|
heap
|
page read and write
|
||
45B0D7E000
|
unkown
|
page readonly
|
||
2715A0F6000
|
heap
|
page execute and read and write
|
||
2583B5E6000
|
heap
|
page read and write
|
||
45AF4BB000
|
stack
|
page read and write
|
||
7FF848F52000
|
trusted library allocation
|
page read and write
|
||
21EA1F98000
|
heap
|
page read and write
|
||
21EA1FEE000
|
heap
|
page read and write
|
||
224EC000000
|
heap
|
page read and write
|
||
1C992E53000
|
trusted library allocation
|
page read and write
|
||
21EA1FF7000
|
heap
|
page read and write
|
||
7FF8490DC000
|
trusted library allocation
|
page read and write
|
||
1DF33C8B000
|
heap
|
page read and write
|
||
1DF33DB9000
|
heap
|
page read and write
|
||
2DE67354000
|
trusted library allocation
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
F31D37E000
|
stack
|
page read and write
|
||
F31E64E000
|
stack
|
page read and write
|
||
1DF31EB8000
|
heap
|
page read and write
|
||
1DF33C9B000
|
heap
|
page read and write
|
||
81871F9000
|
stack
|
page read and write
|
||
224EB702000
|
heap
|
page read and write
|
||
7FF848D84000
|
trusted library allocation
|
page read and write
|
||
1DF33CAA000
|
heap
|
page read and write
|
||
1C9A2884000
|
trusted library allocation
|
page read and write
|
||
1DF31E7B000
|
heap
|
page read and write
|
||
1DF33DDE000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
1C95C000
|
stack
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
21EA1FBD000
|
heap
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
1DF33DD5000
|
heap
|
page read and write
|
||
1DF33DF0000
|
heap
|
page read and write
|
||
224E6102000
|
heap
|
page read and write
|
||
45B007C000
|
stack
|
page read and write
|
||
21EA1FC1000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
2DE64370000
|
trusted library section
|
page read and write
|
||
21EA46DA000
|
heap
|
page read and write
|
||
1DF33DF0000
|
heap
|
page read and write
|
||
21EA1FC9000
|
heap
|
page read and write
|
||
21EA1F6C000
|
heap
|
page read and write
|
||
2715A3E4000
|
heap
|
page read and write
|
||
1DF38293000
|
heap
|
page read and write
|
||
21EA1FCC000
|
heap
|
page read and write
|
||
27142632000
|
trusted library allocation
|
page read and write
|
||
224EB5F0000
|
remote allocation
|
page read and write
|
||
7FF8490A3000
|
trusted library allocation
|
page read and write
|
||
7FF8491C6000
|
trusted library allocation
|
page read and write
|
||
21EA0005000
|
heap
|
page read and write
|
||
25822CD0000
|
heap
|
page read and write
|
||
1DF33D48000
|
heap
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
1DF33C94000
|
heap
|
page read and write
|
||
25822ED1000
|
trusted library allocation
|
page read and write
|
||
258241DD000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
45AF5BE000
|
stack
|
page read and write
|
||
45B0CFE000
|
stack
|
page read and write
|
||
224EB4C3000
|
trusted library allocation
|
page read and write
|
||
224EB530000
|
trusted library allocation
|
page read and write
|
||
21EA1FAC000
|
heap
|
page read and write
|
||
1DF31E58000
|
heap
|
page read and write
|
||
7FF848E26000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
2590000
|
heap
|
page execute and read and write
|
||
7FF849160000
|
trusted library allocation
|
page execute and read and write
|
||
2621000
|
trusted library allocation
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
6F1000
|
stack
|
page read and write
|
||
1C9908A0000
|
heap
|
page read and write
|
||
21EA1FF2000
|
heap
|
page read and write
|
||
1C992401000
|
trusted library allocation
|
page read and write
|
||
21E9FFF3000
|
heap
|
page read and write
|
||
1DF33C6D000
|
heap
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
21EA1FE3000
|
heap
|
page read and write
|
||
1DF33CA6000
|
heap
|
page read and write
|
||
45B09FE000
|
stack
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
21EA1FB0000
|
heap
|
page read and write
|
||
21EA1F6A000
|
heap
|
page read and write
|
||
2583B590000
|
heap
|
page execute and read and write
|
||
21EA1FEF000
|
heap
|
page read and write
|
||
7FF848F24000
|
trusted library allocation
|
page read and write
|
||
45B16FE000
|
stack
|
page read and write
|
||
21EA1FEA000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
CCD000
|
heap
|
page read and write
|
||
21EA1FE1000
|
heap
|
page read and write
|
||
224EB70A000
|
heap
|
page read and write
|
||
27142C11000
|
trusted library allocation
|
page read and write
|
||
21EA1FDD000
|
heap
|
page read and write
|
||
1DF33D52000
|
heap
|
page read and write
|
||
7FF848E95000
|
trusted library allocation
|
page execute and read and write
|
||
21EA1F92000
|
heap
|
page read and write
|
||
27140050000
|
heap
|
page read and write
|
||
1DF33C66000
|
heap
|
page read and write
|
||
1B472000
|
heap
|
page read and write
|
||
1DF33C7D000
|
heap
|
page read and write
|
||
21EA1FEA000
|
heap
|
page read and write
|
||
7FF8490D2000
|
trusted library allocation
|
page read and write
|
||
7FF848EFA000
|
trusted library allocation
|
page read and write
|
||
21EA1FB5000
|
heap
|
page read and write
|
||
1DF33C64000
|
heap
|
page read and write
|
||
21EA1FD3000
|
heap
|
page read and write
|
||
EE5000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
2DE65F42000
|
heap
|
page read and write
|
||
21EA0024000
|
heap
|
page read and write
|
||
45B0E7B000
|
stack
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
25824CB2000
|
trusted library allocation
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
2DE64340000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
21EA1E88000
|
heap
|
page read and write
|
||
21EA1E80000
|
heap
|
page read and write
|
||
21E9FFEA000
|
heap
|
page read and write
|
||
2DE7E920000
|
heap
|
page read and write
|
||
224E7060000
|
trusted library section
|
page readonly
|
||
21EA1FD3000
|
heap
|
page read and write
|
||
2715A0C0000
|
heap
|
page read and write
|
||
1C993499000
|
trusted library allocation
|
page read and write
|
||
21EA1FC8000
|
heap
|
page read and write
|
||
271439E4000
|
trusted library allocation
|
page read and write
|
||
21EA1FE7000
|
heap
|
page read and write
|
||
21EA1F9C000
|
heap
|
page read and write
|
||
12A9000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
2583B620000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
1DF33C94000
|
heap
|
page read and write
|
||
1DF33C73000
|
heap
|
page read and write
|
||
1DF33C89000
|
heap
|
page read and write
|
||
B70F977000
|
stack
|
page read and write
|
||
7FF8490DC000
|
trusted library allocation
|
page read and write
|
||
2715A436000
|
heap
|
page read and write
|
||
1DF33C69000
|
heap
|
page read and write
|
||
1DF33C8E000
|
heap
|
page read and write
|
||
1C993361000
|
trusted library allocation
|
page read and write
|
||
2DE7E688000
|
heap
|
page read and write
|
||
1DF33CB2000
|
heap
|
page read and write
|
||
7FF848EF1000
|
trusted library allocation
|
page read and write
|
||
13071000
|
trusted library allocation
|
page read and write
|
||
1C990A3A000
|
heap
|
page read and write
|
||
1C993656000
|
trusted library allocation
|
page read and write
|
||
1B504000
|
heap
|
page read and write
|
||
1DF33C81000
|
heap
|
page read and write
|
There are 1953 hidden memdumps, click here to show them.