Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
test.ps1
|
ASCII text, with very long lines (702), with no line terminators
|
initial sample
|
||
C:\Users\Public\ajbs50ul.bat
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\4smg.ini
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\oSyU.ini
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\utox_x86_x64.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\regsvr32.EXE.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1fpywe1a.3ki.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ed4h13m.zby.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5hfinaoj.cmb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bi5apl12.bus.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d0rpsldo.xy0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_odght2dz.fko.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rmehz2qx.pdv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s0z2xbau.5dc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v2o35p3n.u3c.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vbeuk0i1.rlf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\second_data_temp.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W72MS75UTRADULZQLMHG.temp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Tox\tox_save.tox
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Tox\utox_save.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Tox\utox_save.in~
|
Generic INItialization configuration [interface]
|
dropped
|
There are 13 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\test.ps1"
|
||
C:\Users\Public\ajbs50ul.bat
|
"C:\Users\Public\ajbs50ul.bat"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/s /i:INSTALL C:\Users\user\AppData/Roaming/4smg.ini\")
-Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName
'MicrosoftEdgeUpdateTaskMachineUA{C804C8C0-8CC0-4804-C048-00888CC0048C}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet
-AllowStartIfOnBatteries -DontStopIfGoingOnBatteries)"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\user\AppData/Roaming/4smg.ini
|
||
C:\Users\user\Desktop\utox_x86_x64.exe
|
"C:\Users\user\Desktop\utox_x86_x64.exe"
|
||
C:\Windows\System32\OpenWith.exe
|
"C:\Windows\system32\openwith.exe"
|
||
C:\Windows\System32\regsvr32.exe
|
"regsvr32" /s /i:INSTALL C:\Users\user\AppData/Roaming/4smg.ini
|
||
C:\Program Files\Windows Media Player\wmpnscfg.exe
|
"C:\Program Files\Windows Media Player\wmpnscfg.exe"
|
||
C:\Windows\System32\dllhost.exe
|
"C:\Windows\system32\dllhost.exe"
|
||
C:\Windows\System32\rekeywiz.exe
|
"C:\Windows\system32\rekeywiz.exe"
|
||
C:\Windows\System32\rekeywiz.exe
|
"C:\Windows\system32\rekeywiz.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/s /i:INSTALL C:\Users\user\AppData/Roaming/oSyU.ini\")
-Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName
'MicrosoftEdgeUpdateTaskMachineUA{848CC004-CC00-4888-C000-44488CCC0488}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet
-AllowStartIfOnBatteries -DontStopIfGoingOnBatteries)"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\user\AppData/Roaming/oSyU.ini
|
||
C:\Windows\System32\regsvr32.exe
|
"regsvr32" /s /i:INSTALL C:\Users\user\AppData/Roaming/oSyU.ini
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://147.45.126.71:3752/20846e26ac9fe96c52/8ackhmnt.9e5wm
|
|||
https://github.com/Pester/Pester
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
https://discord.com
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://discordapp.com
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://rocketdocs.lol/utox_x86.exe
|
188.114.97.3
|
||
https://rocketdocs.lol
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://bemostake.space/test/ast21/g341g43134g/2245h1234/f21f2123/Rh-416-72-341-23.exe
|
188.114.96.3
|
||
http://rocketdocs.lol
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://bemostake.space/test/ast21/g341g43134g/2245h1234/f21f2123/Rh-416-72-341-23.exeHtj
|
unknown
|
||
http://bemostake.space
|
unknown
|
||
https://bemostake.space
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
There are 15 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bemostake.space
|
188.114.96.3
|
||
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
rocketdocs.lol
|
188.114.97.3
|
||
241.42.69.40.in-addr.arpa
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.7
|
unknown
|
unknown
|
||
46.29.238.96
|
unknown
|
Russian Federation
|
||
147.45.126.71
|
unknown
|
Russian Federation
|
||
104.223.122.15
|
unknown
|
United States
|
||
185.196.9.174
|
unknown
|
Switzerland
|
||
195.93.190.6
|
unknown
|
Ukraine
|
||
192.168.2.8
|
unknown
|
unknown
|
||
104.233.104.126
|
unknown
|
Saudi Arabia
|
||
148.251.23.146
|
unknown
|
Germany
|
||
163.172.136.118
|
unknown
|
United Kingdom
|
||
192.168.2.9
|
unknown
|
unknown
|
||
95.215.44.78
|
unknown
|
Latvia
|
||
193.124.186.205
|
unknown
|
Russian Federation
|
||
192.168.2.5
|
unknown
|
unknown
|
||
8.8.8.8
|
unknown
|
United States
|
||
37.97.185.116
|
unknown
|
Netherlands
|
||
130.133.110.14
|
unknown
|
Germany
|
||
194.249.212.109
|
unknown
|
Slovenia
|
||
136.243.141.187
|
unknown
|
Germany
|
||
37.187.122.30
|
unknown
|
France
|
||
185.14.30.213
|
unknown
|
Ukraine
|
||
185.58.206.164
|
unknown
|
Russian Federation
|
||
51.254.84.212
|
unknown
|
France
|
||
80.87.193.193
|
unknown
|
Russian Federation
|
||
46.229.52.198
|
unknown
|
Ukraine
|
||
188.114.97.3
|
rocketdocs.lol
|
European Union
|
||
205.185.116.116
|
unknown
|
United States
|
||
85.21.144.224
|
unknown
|
Russian Federation
|
||
188.114.96.3
|
bemostake.space
|
European Union
|
||
192.168.2.255
|
unknown
|
unknown
|
||
198.98.51.198
|
unknown
|
United States
|
There are 21 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\SibCode
|
sn2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
|
Version
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1BD8812D000
|
heap
|
page read and write
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD854A0000
|
direct allocation
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD88031000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
30E0000
|
direct allocation
|
page read and write
|
||
1C0C1000
|
direct allocation
|
page execute and read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
1BD8812D000
|
heap
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
203FED6F000
|
unkown
|
page read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page read and write
|
||
8D9D0FB000
|
stack
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD88055000
|
heap
|
page read and write
|
||
1BD880C8000
|
heap
|
page read and write
|
||
7FFAAC580000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD880DF000
|
heap
|
page read and write
|
||
1AFB0000
|
trusted library allocation
|
page read and write
|
||
2B1F9FCF000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4D2000
|
trusted library allocation
|
page read and write
|
||
2B1F9FD3000
|
heap
|
page read and write
|
||
1BD8759D000
|
heap
|
page read and write
|
||
1BD877CF000
|
heap
|
page read and write
|
||
1BD877D6000
|
heap
|
page read and write
|
||
1D896530000
|
heap
|
page read and write
|
||
7FFAAC320000
|
trusted library allocation
|
page read and write
|
||
1BDF0000
|
trusted library allocation
|
page read and write
|
||
1BD8779C000
|
heap
|
page read and write
|
||
203FEE72000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1BD87616000
|
heap
|
page read and write
|
||
E4C1EFE000
|
stack
|
page read and write
|
||
1BD85340000
|
unkown
|
page execute and read and write
|
||
E4C1F79000
|
stack
|
page read and write
|
||
1BB80000
|
trusted library allocation
|
page read and write
|
||
1BD87B10000
|
unkown
|
page read and write
|
||
7FF79E8F0000
|
unkown
|
page readonly
|
||
1BD877F0000
|
heap
|
page read and write
|
||
D1E000
|
heap
|
page read and write
|
||
1BD877A5000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
7FFAAC430000
|
trusted library allocation
|
page execute and read and write
|
||
51A7000
|
heap
|
page read and write
|
||
1BD877C0000
|
heap
|
page read and write
|
||
1D8B07E6000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
2253000
|
trusted library allocation
|
page read and write
|
||
1BB83000
|
trusted library allocation
|
page read and write
|
||
1BD880C7000
|
heap
|
page read and write
|
||
1BD87830000
|
unkown
|
page read and write
|
||
B78000
|
stack
|
page read and write
|
||
7FFAAC400000
|
trusted library allocation
|
page execute and read and write
|
||
1BD877BA000
|
heap
|
page read and write
|
||
1B8D0000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
trusted library section
|
page read and write
|
||
1BD8778D000
|
heap
|
page read and write
|
||
1B745000
|
trusted library allocation
|
page read and write
|
||
1BC60000
|
trusted library allocation
|
page read and write
|
||
2A21000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BB40000
|
trusted library allocation
|
page read and write
|
||
1BD87604000
|
heap
|
page read and write
|
||
E4C2038000
|
stack
|
page read and write
|
||
1BDA0000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
D94000
|
heap
|
page read and write
|
||
23BE000
|
trusted library allocation
|
page read and write
|
||
7FFAAC770000
|
trusted library allocation
|
page read and write
|
||
1B651000
|
trusted library allocation
|
page read and write
|
||
1BD880DF000
|
heap
|
page read and write
|
||
1B09B000
|
stack
|
page read and write
|
||
1B8C0000
|
trusted library allocation
|
page read and write
|
||
1BD90000
|
trusted library allocation
|
page read and write
|
||
1BD87830000
|
unkown
|
page read and write
|
||
1BD877A5000
|
heap
|
page read and write
|
||
1BD880AE000
|
heap
|
page read and write
|
||
1BD875A6000
|
heap
|
page read and write
|
||
1BD8757E000
|
heap
|
page read and write
|
||
1B660000
|
trusted library allocation
|
page read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
1BDED000
|
trusted library allocation
|
page read and write
|
||
2B1F9BF0000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1B8D0000
|
trusted library allocation
|
page read and write
|
||
1BD880E7000
|
heap
|
page read and write
|
||
7FFAAC450000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
899000
|
unkown
|
page write copy
|
||
18C0E030000
|
heap
|
page read and write
|
||
1BBC0000
|
trusted library allocation
|
page read and write
|
||
1B733000
|
trusted library allocation
|
page read and write
|
||
1BD877B8000
|
heap
|
page read and write
|
||
1BD880CF000
|
heap
|
page read and write
|
||
1BD8779F000
|
heap
|
page read and write
|
||
2F45000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
2B1DFD65000
|
heap
|
page read and write
|
||
1BD877C0000
|
heap
|
page read and write
|
||
1B980000
|
trusted library allocation
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
1BD88117000
|
heap
|
page read and write
|
||
1BD877FD000
|
heap
|
page read and write
|
||
1D897F50000
|
heap
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1B67E000
|
stack
|
page read and write
|
||
1B830000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
2B44000
|
heap
|
page read and write
|
||
260AF590000
|
unkown
|
page read and write
|
||
1BBA0000
|
trusted library allocation
|
page read and write
|
||
1D8B0BE0000
|
heap
|
page read and write
|
||
203FEE29000
|
heap
|
page read and write
|
||
5065000
|
heap
|
page read and write
|
||
203FE7AC000
|
heap
|
page read and write
|
||
1BD875A1000
|
heap
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
18C26128000
|
heap
|
page read and write
|
||
1BC70000
|
trusted library allocation
|
page read and write
|
||
1BD8558B000
|
heap
|
page read and write
|
||
1BD87624000
|
heap
|
page read and write
|
||
7FFAAC356000
|
trusted library allocation
|
page execute and read and write
|
||
2B1E26F2000
|
trusted library allocation
|
page read and write
|
||
1BD877FB000
|
heap
|
page read and write
|
||
F23000
|
heap
|
page read and write
|
||
1BD877FD000
|
heap
|
page read and write
|
||
2913E110000
|
heap
|
page read and write
|
||
D94000
|
heap
|
page read and write
|
||
1BD877BF000
|
heap
|
page read and write
|
||
7FFAAC3F6000
|
trusted library allocation
|
page read and write
|
||
18C0F72C000
|
trusted library allocation
|
page read and write
|
||
E4C1CFF000
|
stack
|
page read and write
|
||
1BD880D7000
|
heap
|
page read and write
|
||
26F9000
|
trusted library allocation
|
page read and write
|
||
1BD87604000
|
heap
|
page read and write
|
||
1BD879A8000
|
unkown
|
page read and write
|
||
1BD8778D000
|
heap
|
page read and write
|
||
1BD877F4000
|
heap
|
page read and write
|
||
1BD87B92000
|
unkown
|
page read and write
|
||
201C1320000
|
heap
|
page read and write
|
||
1B8C0000
|
trusted library allocation
|
page read and write
|
||
757000
|
heap
|
page read and write
|
||
7FFAAC421000
|
trusted library allocation
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
1BD877D6000
|
heap
|
page read and write
|
||
1BD87BB6000
|
heap
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
1B0EC000
|
heap
|
page read and write
|
||
7FFAAC6D0000
|
trusted library allocation
|
page read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1B030000
|
trusted library allocation
|
page read and write
|
||
1BD87840000
|
direct allocation
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1B027000
|
trusted library allocation
|
page read and write
|
||
1BA30000
|
trusted library allocation
|
page read and write
|
||
1BD877FD000
|
heap
|
page read and write
|
||
1BD87617000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
7FFAAC28D000
|
trusted library allocation
|
page execute and read and write
|
||
1BD876CE000
|
heap
|
page read and write
|
||
7FF6E4C8D000
|
direct allocation
|
page execute and read and write
|
||
1BD8761D000
|
heap
|
page read and write
|
||
1BD880F8000
|
heap
|
page read and write
|
||
7FF6E4A8F000
|
direct allocation
|
page execute and read and write
|
||
2B1F1A23000
|
trusted library allocation
|
page read and write
|
||
1B770000
|
trusted library allocation
|
page read and write
|
||
1B9FC000
|
stack
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
1BD880A6000
|
heap
|
page read and write
|
||
1BD880B7000
|
heap
|
page read and write
|
||
1BD8778F000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
2BCA1320000
|
heap
|
page read and write
|
||
1BD8776E000
|
heap
|
page read and write
|
||
1BD880FF000
|
heap
|
page read and write
|
||
7DF4C6CD0000
|
trusted library allocation
|
page execute and read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
18C0C1D0000
|
heap
|
page read and write
|
||
2B1E161E000
|
heap
|
page read and write
|
||
8D9CE7E000
|
stack
|
page read and write
|
||
1BD877B8000
|
heap
|
page read and write
|
||
1BD87772000
|
heap
|
page read and write
|
||
1D8981F6000
|
trusted library allocation
|
page read and write
|
||
2685000
|
trusted library allocation
|
page read and write
|
||
1AEE7000
|
heap
|
page read and write
|
||
1B860000
|
trusted library allocation
|
page read and write
|
||
1BD877F3000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD88096000
|
heap
|
page read and write
|
||
1D8A8476000
|
trusted library allocation
|
page read and write
|
||
2B1F1A32000
|
trusted library allocation
|
page read and write
|
||
1BD87787000
|
heap
|
page read and write
|
||
1BDE0000
|
trusted library allocation
|
page read and write
|
||
1BBD0000
|
trusted library allocation
|
page read and write
|
||
1BD877F8000
|
heap
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5E0000
|
trusted library allocation
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
1BD880DF000
|
heap
|
page read and write
|
||
1BD880DF000
|
heap
|
page read and write
|
||
1BD87589000
|
heap
|
page read and write
|
||
7FFAAC264000
|
trusted library allocation
|
page read and write
|
||
1AEDA000
|
heap
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
18C0C220000
|
trusted library allocation
|
page read and write
|
||
1BD880B7000
|
heap
|
page read and write
|
||
7FFAAC28D000
|
trusted library allocation
|
page execute and read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1D896560000
|
heap
|
page read and write
|
||
1BD877D6000
|
heap
|
page read and write
|
||
1BD87604000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD875B0000
|
heap
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
797000
|
heap
|
page read and write
|
||
1BD87778000
|
heap
|
page read and write
|
||
1BD877AC000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
18C0D9E0000
|
heap
|
page readonly
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1AFA0000
|
trusted library allocation
|
page read and write
|
||
1BD87609000
|
heap
|
page read and write
|
||
2B1E24A4000
|
trusted library allocation
|
page read and write
|
||
518E000
|
heap
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
201C122C000
|
unkown
|
page read and write
|
||
1BD85568000
|
heap
|
page read and write
|
||
F23000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
203FF316000
|
heap
|
page read and write
|
||
2BCA14A0000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD87593000
|
heap
|
page read and write
|
||
D32000
|
heap
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page read and write
|
||
2B1E1730000
|
heap
|
page execute and read and write
|
||
2267000
|
trusted library allocation
|
page read and write
|
||
7FFAAC263000
|
trusted library allocation
|
page execute and read and write
|
||
1B8C0000
|
trusted library allocation
|
page read and write
|
||
1BC40000
|
trusted library allocation
|
page read and write
|
||
1B800000
|
trusted library allocation
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
1B733000
|
trusted library allocation
|
page read and write
|
||
7FFAAC560000
|
trusted library allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
E4C20BC000
|
stack
|
page read and write
|
||
1C8B0000
|
unkown
|
page read and write
|
||
2263000
|
trusted library allocation
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BCE0000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1D8B09DE000
|
heap
|
page read and write
|
||
2B1DFD00000
|
heap
|
page read and write
|
||
18C26115000
|
heap
|
page read and write
|
||
1BD880D1000
|
heap
|
page read and write
|
||
7FFAAC6B6000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
1BDD0000
|
trusted library allocation
|
page read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
1BD877FB000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
7FFAAC29D000
|
trusted library allocation
|
page execute and read and write
|
||
1D8B0C1F000
|
heap
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
3F0000
|
trusted library section
|
page read and write
|
||
1B680000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
7FFAAC454000
|
trusted library allocation
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
7FFAAC420000
|
trusted library allocation
|
page read and write
|
||
1BD877A2000
|
heap
|
page read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
1BD87615000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD85592000
|
heap
|
page read and write
|
||
1B760000
|
trusted library allocation
|
page read and write
|
||
1AED0000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1AE60000
|
trusted library allocation
|
page read and write
|
||
2962000
|
heap
|
page read and write
|
||
1B790000
|
trusted library allocation
|
page read and write
|
||
7FFAAC430000
|
trusted library allocation
|
page read and write
|
||
2A4B000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
8D9D279000
|
stack
|
page read and write
|
||
1B747000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
1BD877E8000
|
heap
|
page read and write
|
||
1BD877B5000
|
heap
|
page read and write
|
||
1BD87840000
|
trusted library allocation
|
page read and write
|
||
2B1F9FD8000
|
heap
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
203FEE4A000
|
heap
|
page read and write
|
||
1BD880DF000
|
heap
|
page read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
203FEEB2000
|
heap
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
18C2605D000
|
heap
|
page read and write
|
||
1D89A076000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1B610000
|
trusted library allocation
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
1BD877F0000
|
heap
|
page read and write
|
||
1D899BD0000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD880E0000
|
heap
|
page read and write
|
||
1BD8758D000
|
heap
|
page read and write
|
||
1B8E0000
|
trusted library allocation
|
page read and write
|
||
1BD877A8000
|
heap
|
page read and write
|
||
7FFAAC7C0000
|
trusted library allocation
|
page read and write
|
||
203FF270000
|
heap
|
page read and write
|
||
1AD20000
|
trusted library allocation
|
page read and write
|
||
2A46000
|
heap
|
page read and write
|
||
1BD87797000
|
heap
|
page read and write
|
||
1AE4C000
|
heap
|
page read and write
|
||
1BD88086000
|
heap
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
7FFAAC334000
|
trusted library allocation
|
page read and write
|
||
1BB70000
|
trusted library allocation
|
page read and write
|
||
1BD877FD000
|
heap
|
page read and write
|
||
1BD87B86000
|
unkown
|
page read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1D8A845C000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1D899D1A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC512000
|
trusted library allocation
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
1BD880DF000
|
heap
|
page read and write
|
||
81D7DFF000
|
stack
|
page read and write
|
||
1BD8822B000
|
heap
|
page read and write
|
||
1D8B0926000
|
heap
|
page read and write
|
||
1BD88056000
|
heap
|
page read and write
|
||
1BD877CF000
|
heap
|
page read and write
|
||
1BD877D6000
|
heap
|
page read and write
|
||
1B790000
|
trusted library allocation
|
page read and write
|
||
1BD87615000
|
heap
|
page read and write
|
||
7FFAAC689000
|
trusted library allocation
|
page read and write
|
||
1BD8778F000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1B7FA000
|
stack
|
page read and write
|
||
1BD60000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
8D9D3FB000
|
stack
|
page read and write
|
||
1BD877D8000
|
heap
|
page read and write
|
||
2913E210000
|
heap
|
page read and write
|
||
7FFAAC32D000
|
trusted library allocation
|
page execute and read and write
|
||
1B0C1000
|
heap
|
page read and write
|
||
1BCE0000
|
trusted library allocation
|
page read and write
|
||
2B1FA0A0000
|
heap
|
page read and write
|
||
7FFB16791000
|
unkown
|
page execute read
|
||
680000
|
heap
|
page read and write
|
||
2B1DFB07000
|
heap
|
page read and write
|
||
7FFB167B2000
|
unkown
|
page readonly
|
||
7FFB167B5000
|
unkown
|
page readonly
|
||
7FF79E9AB000
|
unkown
|
page read and write
|
||
201C12A0000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BB10000
|
trusted library allocation
|
page read and write
|
||
2913E070000
|
heap
|
page read and write
|
||
EDB000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
1BD877B7000
|
heap
|
page read and write
|
||
6D5000
|
heap
|
page read and write
|
||
7FFB167B0000
|
unkown
|
page read and write
|
||
1BC10000
|
trusted library allocation
|
page read and write
|
||
1BD8811F000
|
heap
|
page read and write
|
||
1BCCE000
|
trusted library allocation
|
page read and write
|
||
1D8A8466000
|
trusted library allocation
|
page read and write
|
||
1CA22000
|
unkown
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
1BD88040000
|
heap
|
page read and write
|
||
1B8D0000
|
trusted library allocation
|
page read and write
|
||
1B710000
|
trusted library allocation
|
page read and write
|
||
23B8000
|
trusted library allocation
|
page read and write
|
||
1BD877C5000
|
heap
|
page read and write
|
||
12376000
|
trusted library allocation
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
1BD880E0000
|
heap
|
page read and write
|
||
81D81FE000
|
stack
|
page read and write
|
||
203FEEB2000
|
heap
|
page read and write
|
||
1BD8779F000
|
heap
|
page read and write
|
||
7FFAAC5F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC390000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB167B5000
|
unkown
|
page readonly
|
||
1BD880DF000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1B070000
|
trusted library allocation
|
page read and write
|
||
2B1F9E8A000
|
heap
|
page read and write
|
||
1BD877C6000
|
heap
|
page read and write
|
||
1D897F10000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1B737000
|
trusted library allocation
|
page read and write
|
||
2B1E15D0000
|
trusted library allocation
|
page read and write
|
||
1BD8809F000
|
heap
|
page read and write
|
||
18C0C1D5000
|
heap
|
page read and write
|
||
54DF000
|
stack
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
18C0DA20000
|
trusted library allocation
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
7FFB0D74D000
|
unkown
|
page readonly
|
||
1BD8822A000
|
heap
|
page read and write
|
||
7FFAAC42A000
|
trusted library allocation
|
page read and write
|
||
1BD88049000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
8D9D076000
|
stack
|
page read and write
|
||
1AFCF000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1AE40000
|
trusted library allocation
|
page read and write
|
||
203FEE10000
|
heap
|
page read and write
|
||
7FFAAC67C000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1B640000
|
trusted library allocation
|
page read and write
|
||
22FE000
|
stack
|
page read and write
|
||
7FFAAC4F0000
|
trusted library allocation
|
page read and write
|
||
1BDB6000
|
trusted library allocation
|
page read and write
|
||
50EB000
|
heap
|
page read and write
|
||
1BD877A5000
|
heap
|
page read and write
|
||
1BD8811F000
|
heap
|
page read and write
|
||
203FEEB2000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD87840000
|
trusted library allocation
|
page read and write
|
||
7FF6E4941000
|
direct allocation
|
page execute and read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD87569000
|
heap
|
page read and write
|
||
1D8B04B0000
|
trusted library allocation
|
page read and write
|
||
1BD8757B000
|
heap
|
page read and write
|
||
7DF423EC6000
|
unkown
|
page read and write
|
||
1BD87794000
|
heap
|
page read and write
|
||
1BD87787000
|
heap
|
page read and write
|
||
313C000
|
trusted library allocation
|
page read and write
|
||
1BD877E8000
|
heap
|
page read and write
|
||
1BD87787000
|
heap
|
page read and write
|
||
1BD877F3000
|
heap
|
page read and write
|
||
1BD87783000
|
heap
|
page read and write
|
||
1D8B08DA000
|
heap
|
page read and write
|
||
7FF79E9AB000
|
unkown
|
page write copy
|
||
3074000
|
heap
|
page read and write
|
||
1BD877D6000
|
heap
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
1BD88081000
|
heap
|
page read and write
|
||
1BD87609000
|
heap
|
page read and write
|
||
1BD8759A000
|
heap
|
page read and write
|
||
2B1F9F20000
|
heap
|
page read and write
|
||
1BD87778000
|
heap
|
page read and write
|
||
1BDA0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC280000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
7DF49A990000
|
trusted library allocation
|
page execute and read and write
|
||
1BD8778A000
|
heap
|
page read and write
|
||
2B1DFB20000
|
heap
|
page read and write
|
||
1BD87787000
|
heap
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
2B1E1963000
|
trusted library allocation
|
page read and write
|
||
1BD880E7000
|
heap
|
page read and write
|
||
7FFAAC2CC000
|
trusted library allocation
|
page execute and read and write
|
||
1AD53000
|
trusted library allocation
|
page read and write
|
||
979000
|
unkown
|
page readonly
|
||
7FFAAC27D000
|
trusted library allocation
|
page execute and read and write
|
||
1BCB0000
|
trusted library allocation
|
page read and write
|
||
2B1F9EBD000
|
heap
|
page read and write
|
||
1BAF0000
|
trusted library allocation
|
page read and write
|
||
1BD87595000
|
heap
|
page read and write
|
||
1BB7D000
|
stack
|
page read and write
|
||
2253000
|
trusted library allocation
|
page read and write
|
||
1BCC0000
|
trusted library allocation
|
page read and write
|
||
1BBD0000
|
trusted library allocation
|
page read and write
|
||
203FEE3B000
|
heap
|
page read and write
|
||
1BD87589000
|
heap
|
page read and write
|
||
367F000
|
stack
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
7FFAAC510000
|
trusted library allocation
|
page execute and read and write
|
||
2B1E32B8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC410000
|
trusted library allocation
|
page read and write
|
||
1C6C0000
|
unkown
|
page read and write
|
||
2B1E213C000
|
trusted library allocation
|
page read and write
|
||
6BB000
|
heap
|
page read and write
|
||
1AD00000
|
trusted library allocation
|
page read and write
|
||
2B10000
|
trusted library allocation
|
page read and write
|
||
8D9CF7D000
|
stack
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
7FFAAC530000
|
trusted library allocation
|
page read and write
|
||
1C0C0000
|
trusted library allocation
|
page read and write
|
||
221F000
|
heap
|
page read and write
|
||
7FFAAC2BC000
|
trusted library allocation
|
page execute and read and write
|
||
1B743000
|
trusted library allocation
|
page read and write
|
||
7FFAAC340000
|
trusted library allocation
|
page read and write
|
||
1BD877F8000
|
heap
|
page read and write
|
||
201C1219000
|
unkown
|
page read and write
|
||
1B860000
|
trusted library allocation
|
page read and write
|
||
90000
|
heap
|
page read and write
|
||
89D000
|
unkown
|
page write copy
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1BD880B7000
|
heap
|
page read and write
|
||
1BD23000
|
trusted library allocation
|
page read and write
|
||
203FE7AD000
|
heap
|
page read and write
|
||
260AF7A7000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FFAAC37C000
|
trusted library allocation
|
page execute and read and write
|
||
1BB90000
|
trusted library allocation
|
page read and write
|
||
203FF298000
|
heap
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
B2EED7D000
|
stack
|
page read and write
|
||
1BD8770D000
|
heap
|
page read and write
|
||
201C11D0000
|
unkown
|
page read and write
|
||
7FFAAC580000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
81D8E4E000
|
stack
|
page read and write
|
||
2110000
|
heap
|
page read and write
|
||
1B690000
|
trusted library allocation
|
page read and write
|
||
201C11D1000
|
unkown
|
page execute read
|
||
7FFAAC416000
|
trusted library allocation
|
page execute and read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
735000
|
unkown
|
page read and write
|
||
295F000
|
heap
|
page read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
5072000
|
heap
|
page read and write
|
||
1AD40000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1B8E0000
|
trusted library allocation
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
1AE9D000
|
heap
|
page read and write
|
||
201C1250000
|
heap
|
page read and write
|
||
260AF787000
|
heap
|
page read and write
|
||
1D8B0566000
|
heap
|
page execute and read and write
|
||
1BC10000
|
trusted library allocation
|
page read and write
|
||
1BBF0000
|
trusted library allocation
|
page read and write
|
||
1BDB0000
|
trusted library allocation
|
page read and write
|
||
2B1E3644000
|
trusted library allocation
|
page read and write
|
||
268F000
|
trusted library allocation
|
page read and write
|
||
1BD877BD000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1B670000
|
trusted library allocation
|
page read and write
|
||
81D7BFE000
|
stack
|
page read and write
|
||
2BCA2D41000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD87894000
|
heap
|
page read and write
|
||
1BD880AF000
|
heap
|
page read and write
|
||
1BD877EB000
|
heap
|
page read and write
|
||
1B0C1000
|
heap
|
page read and write
|
||
1BA18000
|
trusted library allocation
|
page read and write
|
||
2320000
|
trusted library allocation
|
page read and write
|
||
81D7D7B000
|
stack
|
page read and write
|
||
1BBB0000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
210F000
|
stack
|
page read and write
|
||
2656000
|
trusted library allocation
|
page read and write
|
||
2260000
|
remote allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1AF05000
|
heap
|
page read and write
|
||
1BD877F0000
|
heap
|
page read and write
|
||
1BD87778000
|
heap
|
page read and write
|
||
1BD87609000
|
heap
|
page read and write
|
||
7FFAAC590000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
18C0F752000
|
trusted library allocation
|
page read and write
|
||
7DF423EB6000
|
unkown
|
page read and write
|
||
1BD877C5000
|
heap
|
page read and write
|
||
1BD877D8000
|
heap
|
page read and write
|
||
1BBB0000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
2913DF70000
|
heap
|
page read and write
|
||
1A8C1000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1A6CD000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
203FE7A6000
|
heap
|
page read and write
|
||
1B040000
|
trusted library allocation
|
page read and write
|
||
1BD880B0000
|
heap
|
page read and write
|
||
7FFAAC350000
|
trusted library allocation
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
E88000
|
heap
|
page read and write
|
||
239A000
|
trusted library allocation
|
page read and write
|
||
1CA36000
|
unkown
|
page read and write
|
||
D89000
|
heap
|
page read and write
|
||
1BD8778F000
|
heap
|
page read and write
|
||
2BCA1464000
|
heap
|
page read and write
|
||
1B9C0000
|
trusted library allocation
|
page read and write
|
||
1B700000
|
trusted library allocation
|
page read and write
|
||
1BD8778F000
|
heap
|
page read and write
|
||
7FFAAC26D000
|
trusted library allocation
|
page execute and read and write
|
||
2913E320000
|
heap
|
page read and write
|
||
1BD877B8000
|
heap
|
page read and write
|
||
1BB80000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
7FFAAC35D000
|
trusted library allocation
|
page execute and read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1A8C1000
|
heap
|
page read and write
|
||
1BDD0000
|
trusted library allocation
|
page read and write
|
||
1BA00000
|
trusted library allocation
|
page read and write
|
||
1BD877B2000
|
heap
|
page read and write
|
||
1AF21000
|
heap
|
page read and write
|
||
7FFAAC3F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5C0000
|
trusted library allocation
|
page read and write
|
||
1BD8778F000
|
heap
|
page read and write
|
||
1BD875A3000
|
heap
|
page read and write
|
||
7FFAAC4B0000
|
trusted library allocation
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
203FE760000
|
heap
|
page read and write
|
||
350000
|
heap
|
page read and write
|
||
1BD8778F000
|
heap
|
page read and write
|
||
1BD8777E000
|
heap
|
page read and write
|
||
2646000
|
trusted library allocation
|
page read and write
|
||
1B733000
|
trusted library allocation
|
page read and write
|
||
1BD8811F000
|
heap
|
page read and write
|
||
1C83B000
|
unkown
|
page read and write
|
||
7FFAAC514000
|
trusted library allocation
|
page read and write
|
||
1BD879A4000
|
unkown
|
page read and write
|
||
2B1F9CD0000
|
heap
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
203FE6C1000
|
unkown
|
page execute read
|
||
7FFAAC33D000
|
trusted library allocation
|
page execute and read and write
|
||
69F000
|
unkown
|
page write copy
|
||
1BD880F7000
|
heap
|
page read and write
|
||
7FFAAC530000
|
trusted library allocation
|
page execute and read and write
|
||
1BD8779F000
|
heap
|
page read and write
|
||
1BC20000
|
trusted library allocation
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
1B700000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5C9000
|
trusted library allocation
|
page read and write
|
||
1BD876BF000
|
heap
|
page read and write
|
||
7FFAAC640000
|
trusted library allocation
|
page read and write
|
||
18C1E041000
|
trusted library allocation
|
page read and write
|
||
7FFB0D749000
|
unkown
|
page read and write
|
||
1BD85592000
|
heap
|
page read and write
|
||
50FE000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD87589000
|
heap
|
page read and write
|
||
7FFAAC343000
|
trusted library allocation
|
page execute and read and write
|
||
1AEB0000
|
trusted library allocation
|
page read and write
|
||
1BD8779F000
|
heap
|
page read and write
|
||
1BD877A3000
|
heap
|
page read and write
|
||
1BD8759F000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD87CBD000
|
heap
|
page read and write
|
||
7FFAAC4F1000
|
trusted library allocation
|
page read and write
|
||
7FF79E9AC000
|
unkown
|
page readonly
|
||
2EB3000
|
trusted library allocation
|
page read and write
|
||
1D8B0977000
|
heap
|
page read and write
|
||
1BD880C7000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
203FF316000
|
heap
|
page read and write
|
||
81D7EFD000
|
stack
|
page read and write
|
||
1B8F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6B0000
|
trusted library allocation
|
page read and write
|
||
1B8D0000
|
trusted library allocation
|
page read and write
|
||
1BD8760B000
|
heap
|
page read and write
|
||
203FE768000
|
heap
|
page read and write
|
||
1D899B72000
|
trusted library allocation
|
page read and write
|
||
512E000
|
heap
|
page read and write
|
||
1BD877B7000
|
heap
|
page read and write
|
||
18C0C066000
|
heap
|
page read and write
|
||
1BD88117000
|
heap
|
page read and write
|
||
1B733000
|
trusted library allocation
|
page read and write
|
||
1B038000
|
trusted library allocation
|
page read and write
|
||
1BD877A0000
|
heap
|
page read and write
|
||
6B9000
|
heap
|
page read and write
|
||
1BD8779A000
|
heap
|
page read and write
|
||
7FFAAC450000
|
trusted library allocation
|
page execute and read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
2B1E291F000
|
trusted library allocation
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1BD50000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
7FFAAC610000
|
trusted library allocation
|
page read and write
|
||
1ACB0000
|
trusted library allocation
|
page read and write
|
||
1BD877FD000
|
heap
|
page read and write
|
||
1BD877C0000
|
heap
|
page read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
1BD8806C000
|
heap
|
page read and write
|
||
7FFAAC330000
|
trusted library allocation
|
page read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
1A370000
|
trusted library allocation
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
1A8BA000
|
heap
|
page read and write
|
||
1BD87BB6000
|
heap
|
page read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
E6B000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
81D827E000
|
stack
|
page read and write
|
||
2320000
|
trusted library allocation
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
1BB10000
|
trusted library allocation
|
page read and write
|
||
201C1327000
|
heap
|
page read and write
|
||
2BCA2E40000
|
heap
|
page read and write
|
||
7FFAAC262000
|
trusted library allocation
|
page read and write
|
||
1BD88064000
|
heap
|
page read and write
|
||
1AE10000
|
trusted library allocation
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
1BD877D6000
|
heap
|
page read and write
|
||
1BD87593000
|
heap
|
page read and write
|
||
1BC0F000
|
trusted library allocation
|
page read and write
|
||
1BD880FF000
|
heap
|
page read and write
|
||
7FFAAC540000
|
trusted library allocation
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
203FE946000
|
heap
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
1BD88056000
|
heap
|
page read and write
|
||
1BD8760B000
|
heap
|
page read and write
|
||
7FFAAC470000
|
trusted library allocation
|
page read and write
|
||
260AF760000
|
heap
|
page read and write
|
||
81D7CFE000
|
stack
|
page read and write
|
||
1BC90000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
1BD877B2000
|
heap
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
7FF79EACC000
|
unkown
|
page write copy
|
||
1BC50000
|
trusted library allocation
|
page read and write
|
||
1BD877FC000
|
heap
|
page read and write
|
||
7FFAAC560000
|
trusted library allocation
|
page read and write
|
||
385F000
|
stack
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
81D8DCD000
|
stack
|
page read and write
|
||
1BD877A7000
|
heap
|
page read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
1D8B092F000
|
heap
|
page read and write
|
||
1BD877C5000
|
heap
|
page read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
81D80F8000
|
stack
|
page read and write
|
||
1BD8770D000
|
heap
|
page read and write
|
||
2B1E22CB000
|
trusted library allocation
|
page read and write
|
||
8D9CC7E000
|
stack
|
page read and write
|
||
2200000
|
heap
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
1BB80000
|
trusted library allocation
|
page read and write
|
||
1BD8559E000
|
heap
|
page read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
7DF423EB4000
|
unkown
|
page read and write
|
||
1BD880DF000
|
heap
|
page read and write
|
||
203FF2D5000
|
heap
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
347F000
|
stack
|
page read and write
|
||
7FFAAC426000
|
trusted library allocation
|
page execute and read and write
|
||
2B1F9E83000
|
heap
|
page read and write
|
||
1BD875A1000
|
heap
|
page read and write
|
||
1D8993F3000
|
trusted library allocation
|
page read and write
|
||
ED7000
|
heap
|
page read and write
|
||
203FED7C000
|
unkown
|
page read and write
|
||
1BCA7000
|
trusted library allocation
|
page read and write
|
||
1BD87572000
|
heap
|
page read and write
|
||
1AD30000
|
trusted library allocation
|
page read and write
|
||
2B1DFCE0000
|
heap
|
page read and write
|
||
2F3C000
|
trusted library allocation
|
page read and write
|
||
1BD880AF000
|
heap
|
page read and write
|
||
1BD85568000
|
heap
|
page read and write
|
||
7FFB16790000
|
unkown
|
page readonly
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
2B1F1A42000
|
trusted library allocation
|
page read and write
|
||
1D896670000
|
heap
|
page read and write
|
||
7FFAAC320000
|
trusted library allocation
|
page execute and read and write
|
||
1AD03000
|
trusted library allocation
|
page read and write
|
||
1BCD0000
|
trusted library allocation
|
page read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
1B8C0000
|
trusted library allocation
|
page read and write
|
||
1B7E0000
|
trusted library allocation
|
page read and write
|
||
897000
|
unkown
|
page read and write
|
||
2B1F9F38000
|
heap
|
page read and write
|
||
1B870000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1B6F0000
|
trusted library allocation
|
page read and write
|
||
1D8B064E000
|
heap
|
page read and write
|
||
7FFAAC6A0000
|
trusted library allocation
|
page read and write
|
||
1B640000
|
trusted library allocation
|
page read and write
|
||
2913E090000
|
heap
|
page readonly
|
||
1BD877EB000
|
heap
|
page read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
1BD8757B000
|
heap
|
page read and write
|
||
1B74A000
|
trusted library allocation
|
page read and write
|
||
7DF423EC1000
|
unkown
|
page execute read
|
||
1BD8778F000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD877C0000
|
heap
|
page read and write
|
||
1BA20000
|
trusted library allocation
|
page read and write
|
||
1BD87787000
|
heap
|
page read and write
|
||
2B1F9B80000
|
heap
|
page execute and read and write
|
||
1D8B057B000
|
heap
|
page read and write
|
||
7DF423EB0000
|
unkown
|
page read and write
|
||
1BD880D7000
|
heap
|
page read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
7FFAAC550000
|
trusted library allocation
|
page read and write
|
||
1BD8759A000
|
heap
|
page read and write
|
||
1BD8757B000
|
heap
|
page read and write
|
||
EC16FF4000
|
stack
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4D0000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BC00000
|
trusted library allocation
|
page read and write
|
||
8A9000
|
unkown
|
page readonly
|
||
1BAE0000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
18C0BF00000
|
heap
|
page read and write
|
||
1BB80000
|
trusted library allocation
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
1B040000
|
trusted library allocation
|
page read and write
|
||
1BD8761E000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
7FFAAC406000
|
trusted library allocation
|
page execute and read and write
|
||
1BD8811F000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD880C7000
|
heap
|
page read and write
|
||
7FFAAC5A0000
|
trusted library allocation
|
page read and write
|
||
18C0F745000
|
trusted library allocation
|
page read and write
|
||
18C0C05C000
|
heap
|
page read and write
|
||
1BD880FF000
|
heap
|
page read and write
|
||
1A94D000
|
stack
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
E4C2D8D000
|
stack
|
page read and write
|
||
1BD880D7000
|
heap
|
page read and write
|
||
1AEB7000
|
heap
|
page read and write
|
||
1BD88044000
|
heap
|
page read and write
|
||
1BD877D6000
|
heap
|
page read and write
|
||
1BB87000
|
trusted library allocation
|
page read and write
|
||
1ADFF000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
18C2625C000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
13121000
|
trusted library allocation
|
page read and write
|
||
D1D000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
509E000
|
heap
|
page read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
979000
|
unkown
|
page readonly
|
||
1BD880BF000
|
heap
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
1B67B000
|
trusted library allocation
|
page read and write
|
||
1BD877CF000
|
heap
|
page read and write
|
||
23B0000
|
trusted library allocation
|
page read and write
|
||
1BD880BF000
|
heap
|
page read and write
|
||
1BD875A1000
|
heap
|
page read and write
|
||
1D8A81DF000
|
trusted library allocation
|
page read and write
|
||
1BD88053000
|
heap
|
page read and write
|
||
1B725000
|
trusted library allocation
|
page read and write
|
||
1BD880E7000
|
heap
|
page read and write
|
||
1BD87794000
|
heap
|
page read and write
|
||
1BD8777C000
|
heap
|
page read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
1AE9C000
|
trusted library allocation
|
page read and write
|
||
508D000
|
heap
|
page read and write
|
||
23AE000
|
trusted library allocation
|
page read and write
|
||
1AE20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC330000
|
trusted library allocation
|
page read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
1BD877B8000
|
heap
|
page read and write
|
||
51AA000
|
heap
|
page read and write
|
||
18C0C0AA000
|
heap
|
page read and write
|
||
7FFAAC342000
|
trusted library allocation
|
page read and write
|
||
18C1E0B0000
|
trusted library allocation
|
page read and write
|
||
1BD880CF000
|
heap
|
page read and write
|
||
1D899C17000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1BD88057000
|
heap
|
page read and write
|
||
7FFAAC34D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC4FA000
|
trusted library allocation
|
page read and write
|
||
1B7A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC69C000
|
trusted library allocation
|
page read and write
|
||
1BD877EB000
|
heap
|
page read and write
|
||
1BD880CF000
|
heap
|
page read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page read and write
|
||
1BD880D7000
|
heap
|
page read and write
|
||
1BD877EF000
|
heap
|
page read and write
|
||
7FFAAC34D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC273000
|
trusted library allocation
|
page execute and read and write
|
||
1BD30000
|
trusted library allocation
|
page read and write
|
||
1BD8778E000
|
heap
|
page read and write
|
||
18C0F74E000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
7FFB2CE20000
|
direct allocation
|
page execute and read and write
|
||
1BD87626000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD875A3000
|
heap
|
page read and write
|
||
1BD8778F000
|
heap
|
page read and write
|
||
1BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
1BD880C7000
|
heap
|
page read and write
|
||
7FFAAC272000
|
trusted library allocation
|
page read and write
|
||
8D9CFF9000
|
stack
|
page read and write
|
||
1BD87796000
|
heap
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
7FFAAC333000
|
trusted library allocation
|
page execute and read and write
|
||
1BD880A6000
|
heap
|
page read and write
|
||
1B030000
|
trusted library allocation
|
page read and write
|
||
1AFE0000
|
trusted library allocation
|
page read and write
|
||
264C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5E0000
|
trusted library allocation
|
page read and write
|
||
1BD877BF000
|
heap
|
page read and write
|
||
219F000
|
stack
|
page read and write
|
||
1BD87572000
|
heap
|
page read and write
|
||
DAA000
|
heap
|
page read and write
|
||
89D000
|
unkown
|
page write copy
|
||
8D9D17E000
|
stack
|
page read and write
|
||
1D8B093F000
|
heap
|
page read and write
|
||
1BD877D0000
|
heap
|
page read and write
|
||
680000
|
trusted library section
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD8809F000
|
heap
|
page read and write
|
||
1BD87840000
|
direct allocation
|
page execute and read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1D898110000
|
heap
|
page execute and read and write
|
||
7FFAAC520000
|
trusted library allocation
|
page read and write
|
||
1D8B0969000
|
heap
|
page read and write
|
||
1B9F0000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
7FFAAC344000
|
trusted library allocation
|
page read and write
|
||
1BD880AF000
|
heap
|
page read and write
|
||
7FFAAC5D0000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4D0000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD89003000
|
heap
|
page read and write
|
||
1B01E000
|
stack
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
203FED40000
|
direct allocation
|
page execute and read and write
|
||
50F1000
|
heap
|
page read and write
|
||
900000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
E8F000
|
heap
|
page read and write
|
||
7FFAAC684000
|
trusted library allocation
|
page read and write
|
||
2BCA14C0000
|
heap
|
page read and write
|
||
1D8B093B000
|
heap
|
page read and write
|
||
1BD877A0000
|
heap
|
page read and write
|
||
1B770000
|
trusted library allocation
|
page read and write
|
||
7FFAAC460000
|
trusted library allocation
|
page execute and read and write
|
||
203FE950000
|
heap
|
page read and write
|
||
5077000
|
heap
|
page read and write
|
||
81D82FE000
|
stack
|
page read and write
|
||
897000
|
unkown
|
page write copy
|
||
2300000
|
heap
|
page read and write
|
||
F23000
|
heap
|
page read and write
|
||
2BCA1420000
|
heap
|
page read and write
|
||
7FFAAC440000
|
trusted library allocation
|
page execute and read and write
|
||
5ADB000
|
stack
|
page read and write
|
||
203FEE31000
|
heap
|
page read and write
|
||
1BD877A9000
|
heap
|
page read and write
|
||
7FFAAC4F0000
|
trusted library allocation
|
page execute and read and write
|
||
D35000
|
heap
|
page read and write
|
||
E4C2138000
|
stack
|
page read and write
|
||
1BD87840000
|
trusted library allocation
|
page read and write
|
||
1BD877F0000
|
heap
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
1BD85591000
|
heap
|
page read and write
|
||
2B1E2A5B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
7FFAAC500000
|
trusted library allocation
|
page read and write
|
||
1BD875A3000
|
heap
|
page read and write
|
||
1BD8804B000
|
heap
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
2243000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
1BD877A8000
|
heap
|
page read and write
|
||
7DF423EB1000
|
unkown
|
page execute read
|
||
1BD880B0000
|
heap
|
page read and write
|
||
5067000
|
heap
|
page read and write
|
||
895000
|
unkown
|
page readonly
|
||
1BCA0000
|
trusted library allocation
|
page read and write
|
||
1B0D5000
|
heap
|
page read and write
|
||
1ADC0000
|
trusted library allocation
|
page read and write
|
||
1BD88117000
|
heap
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
71E000
|
heap
|
page read and write
|
||
1BD880B7000
|
heap
|
page read and write
|
||
18C0BF70000
|
heap
|
page read and write
|
||
18C26347000
|
heap
|
page read and write
|
||
203FEEB3000
|
heap
|
page read and write
|
||
18C0DAC7000
|
heap
|
page execute and read and write
|
||
7FFAAC3E0000
|
trusted library allocation
|
page read and write
|
||
1BD8804B000
|
heap
|
page read and write
|
||
18C262A2000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
1BD87615000
|
heap
|
page read and write
|
||
260AF610000
|
heap
|
page read and write
|
||
1BD8757B000
|
heap
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
1BD877A0000
|
heap
|
page read and write
|
||
1D8B05FA000
|
heap
|
page read and write
|
||
1BD88068000
|
heap
|
page read and write
|
||
2913DF10000
|
remote allocation
|
page execute and read and write
|
||
1D89935A000
|
trusted library allocation
|
page read and write
|
||
1B010000
|
trusted library allocation
|
page read and write
|
||
1BD880C7000
|
heap
|
page read and write
|
||
1BD87BFD000
|
heap
|
page read and write
|
||
1BD8760E000
|
heap
|
page read and write
|
||
1BD87792000
|
heap
|
page read and write
|
||
18C0FC0C000
|
trusted library allocation
|
page read and write
|
||
1CAA7000
|
unkown
|
page read and write
|
||
1BD876CF000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
7DF423EB0000
|
unkown
|
page read and write
|
||
1BD877D8000
|
heap
|
page read and write
|
||
2267000
|
trusted library allocation
|
page read and write
|
||
1BAA0000
|
trusted library allocation
|
page read and write
|
||
1D8965AB000
|
heap
|
page read and write
|
||
895000
|
unkown
|
page readonly
|
||
1B6B0000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC663000
|
trusted library allocation
|
page read and write
|
||
E4C233B000
|
stack
|
page read and write
|
||
18C1E1F2000
|
trusted library allocation
|
page read and write
|
||
1B85D000
|
stack
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page execute and read and write
|
||
1BD880E7000
|
heap
|
page read and write
|
||
1BA10000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4C0000
|
trusted library allocation
|
page read and write
|
||
1BD880FF000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1BBC0000
|
trusted library allocation
|
page read and write
|
||
1BBD0000
|
trusted library allocation
|
page read and write
|
||
13128000
|
trusted library allocation
|
page read and write
|
||
1BD875A9000
|
heap
|
page read and write
|
||
1BD877D5000
|
heap
|
page read and write
|
||
1B750000
|
trusted library allocation
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
7FFAAC5A3000
|
trusted library allocation
|
page read and write
|
||
1BD875B0000
|
heap
|
page read and write
|
||
1BD87616000
|
heap
|
page read and write
|
||
18C0FCE4000
|
trusted library allocation
|
page read and write
|
||
1BD880DF000
|
heap
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
1BAD0000
|
heap
|
page read and write
|
||
7FFB0D6D1000
|
unkown
|
page execute read
|
||
DA5000
|
heap
|
page read and write
|
||
1AD80000
|
trusted library allocation
|
page read and write
|
||
7FFB0D71F000
|
unkown
|
page read and write
|
||
1BD8777E000
|
heap
|
page read and write
|
||
1B090000
|
trusted library allocation
|
page read and write
|
||
1BD87776000
|
heap
|
page read and write
|
||
1B880000
|
trusted library allocation
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
18C26240000
|
heap
|
page read and write
|
||
D3A000
|
heap
|
page read and write
|
||
1BD877B6000
|
heap
|
page read and write
|
||
7FFAAC610000
|
trusted library allocation
|
page read and write
|
||
1BD87794000
|
heap
|
page read and write
|
||
1B722000
|
trusted library allocation
|
page read and write
|
||
1BD877B7000
|
heap
|
page read and write
|
||
203FE7AC000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD880DF000
|
heap
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
1BD880A6000
|
heap
|
page read and write
|
||
7FFAAC600000
|
trusted library allocation
|
page read and write
|
||
1BA80000
|
trusted library allocation
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1BD8759D000
|
heap
|
page read and write
|
||
7FFAAC322000
|
trusted library allocation
|
page read and write
|
||
91F000
|
trusted library allocation
|
page read and write
|
||
18C262B2000
|
heap
|
page read and write
|
||
1D89839A000
|
trusted library allocation
|
page read and write
|
||
1BD877E8000
|
heap
|
page read and write
|
||
1BD8776E000
|
heap
|
page read and write
|
||
1B9E0000
|
trusted library allocation
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
73C000
|
heap
|
page read and write
|
||
1ADA0000
|
trusted library allocation
|
page read and write
|
||
1BA70000
|
trusted library allocation
|
page read and write
|
||
1BD880D0000
|
heap
|
page read and write
|
||
1BBE0000
|
trusted library allocation
|
page read and write
|
||
18C260CA000
|
heap
|
page read and write
|
||
1C6C0000
|
unkown
|
page read and write
|
||
81D7C7D000
|
stack
|
page read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
7FFAAC760000
|
trusted library allocation
|
page execute and read and write
|
||
1D8B063F000
|
heap
|
page read and write
|
||
1AE63000
|
heap
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
7FFAAC6A0000
|
trusted library allocation
|
page read and write
|
||
2B1E31A8000
|
trusted library allocation
|
page read and write
|
||
18C0C07C000
|
heap
|
page read and write
|
||
2BCA2D53000
|
heap
|
page read and write
|
||
D0B000
|
heap
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page read and write
|
||
2B1E1741000
|
trusted library allocation
|
page read and write
|
||
E5F000
|
trusted library allocation
|
page read and write
|
||
7DF423EB1000
|
unkown
|
page execute read
|
||
1BD87593000
|
heap
|
page read and write
|
||
1BE00000
|
trusted library allocation
|
page read and write
|
||
1BD880DF000
|
heap
|
page read and write
|
||
1BA90000
|
trusted library allocation
|
page read and write
|
||
1BD877C0000
|
heap
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
18C0BF30000
|
heap
|
page read and write
|
||
7FF6E47F0000
|
direct allocation
|
page execute and read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
1B0E2000
|
heap
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
1BD87570000
|
heap
|
page read and write
|
||
203FE71F000
|
unkown
|
page execute and read and write
|
||
1C834000
|
unkown
|
page read and write
|
||
1BD88040000
|
heap
|
page read and write
|
||
1B6D0000
|
trusted library allocation
|
page read and write
|
||
7FFB167A6000
|
unkown
|
page readonly
|
||
7FFAAC5F0000
|
trusted library allocation
|
page read and write
|
||
1BD88823000
|
heap
|
page read and write
|
||
1BD877EB000
|
heap
|
page read and write
|
||
1B033000
|
trusted library allocation
|
page read and write
|
||
2B1DFB4A000
|
heap
|
page read and write
|
||
7FFAAC540000
|
trusted library allocation
|
page read and write
|
||
1BD880D1000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1B000000
|
trusted library allocation
|
page read and write
|
||
1BD8758D000
|
heap
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
1BD877A8000
|
heap
|
page read and write
|
||
1AE05000
|
trusted library allocation
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
7FF79E9AC000
|
unkown
|
page readonly
|
||
1BB90000
|
trusted library allocation
|
page read and write
|
||
1BB90000
|
trusted library allocation
|
page read and write
|
||
203FEE21000
|
heap
|
page read and write
|
||
1BC66000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD877B8000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1B9B0000
|
trusted library allocation
|
page read and write
|
||
18C0FBB5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC332000
|
trusted library allocation
|
page read and write
|
||
1BB80000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
7FF79E8F1000
|
unkown
|
page execute read
|
||
2B1E29C7000
|
trusted library allocation
|
page read and write
|
||
2B1DFB60000
|
heap
|
page read and write
|
||
B2EEC74000
|
stack
|
page read and write
|
||
1BE00000
|
trusted library allocation
|
page read and write
|
||
1BD877F2000
|
heap
|
page read and write
|
||
6A7000
|
unkown
|
page readonly
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD88066000
|
heap
|
page read and write
|
||
1AE70000
|
trusted library allocation
|
page read and write
|
||
203FEE30000
|
heap
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
7DF423EB6000
|
unkown
|
page read and write
|
||
18C0C230000
|
heap
|
page read and write
|
||
1BD8758D000
|
heap
|
page read and write
|
||
1AC90000
|
trusted library allocation
|
page read and write
|
||
8A9000
|
unkown
|
page readonly
|
||
8D9CD7F000
|
stack
|
page read and write
|
||
203FE948000
|
heap
|
page read and write
|
||
1BD87C17000
|
unkown
|
page read and write
|
||
CC9000
|
heap
|
page read and write
|
||
1BC50000
|
trusted library allocation
|
page read and write
|
||
1BD877D6000
|
heap
|
page read and write
|
||
7FFB16790000
|
unkown
|
page readonly
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
7FF79EACB000
|
unkown
|
page write copy
|
||
260AF730000
|
heap
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
1BD880B0000
|
heap
|
page read and write
|
||
1AEBB000
|
heap
|
page read and write
|
||
1AF4E000
|
heap
|
page read and write
|
||
1BD877B7000
|
heap
|
page read and write
|
||
1BD880CF000
|
heap
|
page read and write
|
||
264F000
|
trusted library allocation
|
page read and write
|
||
1BBA0000
|
trusted library allocation
|
page read and write
|
||
1BD8779F000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
92D42CC000
|
stack
|
page read and write
|
||
1BD877A2000
|
heap
|
page read and write
|
||
1ACC0000
|
trusted library allocation
|
page read and write
|
||
1BDC0000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
18C0F76A000
|
trusted library allocation
|
page read and write
|
||
18C0BFB0000
|
heap
|
page read and write
|
||
1B650000
|
trusted library allocation
|
page read and write
|
||
2652000
|
trusted library allocation
|
page read and write
|
||
1D8965E7000
|
heap
|
page read and write
|
||
50A4000
|
heap
|
page read and write
|
||
2BCA2E41000
|
heap
|
page read and write
|
||
2253000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4E2000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD8777C000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1B750000
|
trusted library allocation
|
page read and write
|
||
1BD30000
|
trusted library allocation
|
page read and write
|
||
7FFAAC280000
|
trusted library allocation
|
page read and write
|
||
1BD877FD000
|
heap
|
page read and write
|
||
1BD877BA000
|
heap
|
page read and write
|
||
2B1F9C30000
|
heap
|
page read and write
|
||
1BD8757A000
|
heap
|
page read and write
|
||
1BD20000
|
trusted library allocation
|
page read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
7DF49A9A0000
|
trusted library allocation
|
page execute and read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1BD880DF000
|
heap
|
page read and write
|
||
1BD879FC000
|
heap
|
page read and write
|
||
1BBC0000
|
trusted library allocation
|
page read and write
|
||
2B1DFDB0000
|
heap
|
page read and write
|
||
1BD877A1000
|
heap
|
page read and write
|
||
1BD8760D000
|
heap
|
page read and write
|
||
8D9DE4C000
|
stack
|
page read and write
|
||
1BD875B0000
|
heap
|
page read and write
|
||
1BD8779C000
|
heap
|
page read and write
|
||
1BD8822D000
|
heap
|
page read and write
|
||
1BD877FD000
|
heap
|
page read and write
|
||
2B1DFB40000
|
heap
|
page read and write
|
||
2B1E1560000
|
trusted library allocation
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
7FFB167B2000
|
unkown
|
page readonly
|
||
1BD877FF000
|
heap
|
page read and write
|
||
1BD877FD000
|
heap
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
260AF5EC000
|
unkown
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
1BD87787000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4A0000
|
trusted library allocation
|
page read and write
|
||
1AE89000
|
heap
|
page read and write
|
||
1BD877F0000
|
heap
|
page read and write
|
||
1BD877BF000
|
heap
|
page read and write
|
||
2B1F1A2A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC340000
|
trusted library allocation
|
page read and write
|
||
260AF780000
|
heap
|
page read and write
|
||
1BB90000
|
trusted library allocation
|
page read and write
|
||
1BD85591000
|
heap
|
page read and write
|
||
1B721000
|
trusted library allocation
|
page read and write
|
||
1B770000
|
trusted library allocation
|
page read and write
|
||
1BB00000
|
trusted library allocation
|
page read and write
|
||
1BB83000
|
trusted library allocation
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
1BD8778F000
|
heap
|
page read and write
|
||
18C0DB10000
|
heap
|
page read and write
|
||
1BD877C4000
|
heap
|
page read and write
|
||
1D89659F000
|
heap
|
page read and write
|
||
201C2DF0000
|
heap
|
page read and write
|
||
1BD877B5000
|
heap
|
page read and write
|
||
18C0F756000
|
trusted library allocation
|
page read and write
|
||
18C262D7000
|
heap
|
page read and write
|
||
7FFAAC5F0000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
203FED20000
|
heap
|
page readonly
|
||
1BD87BA6000
|
unkown
|
page read and write
|
||
7FFAAC576000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
67B000
|
stack
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
1B0ED000
|
heap
|
page read and write
|
||
1BD87796000
|
heap
|
page read and write
|
||
1BB00000
|
trusted library allocation
|
page read and write
|
||
EC16FFB000
|
stack
|
page read and write
|
||
3872000
|
stack
|
page read and write
|
||
7FFAAC346000
|
trusted library allocation
|
page execute and read and write
|
||
2B1FA000000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3E6000
|
trusted library allocation
|
page read and write
|
||
1BD877B8000
|
heap
|
page read and write
|
||
58DC000
|
stack
|
page read and write
|
||
1BC20000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
2270000
|
heap
|
page execute and read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
1AE30000
|
trusted library allocation
|
page read and write
|
||
1BB30000
|
trusted library allocation
|
page read and write
|
||
1BD880CF000
|
heap
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
18C0FC21000
|
trusted library allocation
|
page read and write
|
||
2320000
|
trusted library allocation
|
page read and write
|
||
1BD880C7000
|
heap
|
page read and write
|
||
1BAD0000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD877D5000
|
heap
|
page read and write
|
||
1BD877F0000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
1BDF0000
|
trusted library allocation
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
2B1F9B86000
|
heap
|
page execute and read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1B980000
|
trusted library allocation
|
page read and write
|
||
1BD877A9000
|
heap
|
page read and write
|
||
1BD85598000
|
heap
|
page read and write
|
||
1B050000
|
trusted library allocation
|
page read and write
|
||
1B6D0000
|
trusted library allocation
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
1BD8779A000
|
heap
|
page read and write
|
||
1B6AC000
|
trusted library allocation
|
page read and write
|
||
D3D000
|
heap
|
page read and write
|
||
7FFAAC570000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD88044000
|
heap
|
page read and write
|
||
1BD88083000
|
heap
|
page read and write
|
||
7FFAAC522000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD877AC000
|
heap
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
2320000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1B030000
|
trusted library allocation
|
page read and write
|
||
1D8B058D000
|
heap
|
page read and write
|
||
1BD8811F000
|
heap
|
page read and write
|
||
1B780000
|
trusted library allocation
|
page read and write
|
||
1ACE0000
|
trusted library allocation
|
page read and write
|
||
2341000
|
trusted library allocation
|
page read and write
|
||
513E000
|
heap
|
page read and write
|
||
1BD87572000
|
heap
|
page read and write
|
||
1D8966D0000
|
trusted library allocation
|
page read and write
|
||
2B1F9CB0000
|
heap
|
page read and write
|
||
1BD877B5000
|
heap
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
7FFAAC5DC000
|
trusted library allocation
|
page read and write
|
||
1B721000
|
trusted library allocation
|
page read and write
|
||
1B760000
|
trusted library allocation
|
page read and write
|
||
1D896510000
|
heap
|
page read and write
|
||
1BD854D0000
|
direct allocation
|
page read and write
|
||
1BD877F8000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
260AF5D9000
|
unkown
|
page read and write
|
||
201C1347000
|
heap
|
page read and write
|
||
1B8C0000
|
trusted library allocation
|
page read and write
|
||
1B037000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6B0000
|
trusted library allocation
|
page read and write
|
||
1BD8778F000
|
heap
|
page read and write
|
||
1BD87609000
|
heap
|
page read and write
|
||
7DF423EC0000
|
unkown
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1BD8779F000
|
heap
|
page read and write
|
||
1BD88096000
|
heap
|
page read and write
|
||
203FED40000
|
direct allocation
|
page execute and read and write
|
||
1D898CFB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC580000
|
trusted library allocation
|
page read and write
|
||
1B840000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
7FFAAC620000
|
trusted library allocation
|
page read and write
|
||
1BD877A2000
|
heap
|
page read and write
|
||
7FFAAC316000
|
trusted library allocation
|
page read and write
|
||
1BD88067000
|
heap
|
page read and write
|
||
7FFAAC4EA000
|
trusted library allocation
|
page read and write
|
||
1BD877D8000
|
heap
|
page read and write
|
||
18C0C038000
|
heap
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
1BC90000
|
trusted library allocation
|
page read and write
|
||
1B8C0000
|
trusted library allocation
|
page read and write
|
||
92D46FD000
|
stack
|
page read and write
|
||
7FFAAC35B000
|
trusted library allocation
|
page read and write
|
||
1BD8779B000
|
heap
|
page read and write
|
||
2B1E17B3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC3DC000
|
trusted library allocation
|
page execute and read and write
|
||
1BD87DA5000
|
unkown
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
1BD8779F000
|
heap
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
1B8D0000
|
trusted library allocation
|
page read and write
|
||
1AD10000
|
trusted library allocation
|
page read and write
|
||
2EC3000
|
trusted library allocation
|
page read and write
|
||
2F33000
|
trusted library allocation
|
page read and write
|
||
1D898160000
|
heap
|
page execute and read and write
|
||
2B1F9DEA000
|
heap
|
page read and write
|
||
7FFB0D74A000
|
unkown
|
page write copy
|
||
1BD00000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD8757E000
|
heap
|
page read and write
|
||
1AEF6000
|
heap
|
page read and write
|
||
1BD880CF000
|
heap
|
page read and write
|
||
1BD88053000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
60B0000
|
heap
|
page read and write
|
||
1AE84000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
2B1F1750000
|
trusted library allocation
|
page read and write
|
||
1BD876BF000
|
heap
|
page read and write
|
||
1D896581000
|
heap
|
page read and write
|
||
2B1F1761000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD875A1000
|
heap
|
page read and write
|
||
EC171FF000
|
stack
|
page read and write
|
||
1BD877AC000
|
heap
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
1BD877F0000
|
heap
|
page read and write
|
||
505C000
|
heap
|
page read and write
|
||
1D8B0BF9000
|
heap
|
page read and write
|
||
1BD87778000
|
heap
|
page read and write
|
||
1BD8779C000
|
heap
|
page read and write
|
||
7FFAAC570000
|
trusted library allocation
|
page read and write
|
||
51AD000
|
heap
|
page read and write
|
||
8D9DECD000
|
stack
|
page read and write
|
||
2B1E1590000
|
heap
|
page read and write
|
||
81D8079000
|
stack
|
page read and write
|
||
7FFAAC260000
|
trusted library allocation
|
page read and write
|
||
7FFAAC273000
|
trusted library allocation
|
page read and write
|
||
1BD877D8000
|
heap
|
page read and write
|
||
1E4000
|
heap
|
page read and write
|
||
7FFAAC5D0000
|
trusted library allocation
|
page read and write
|
||
2260000
|
remote allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD8779F000
|
heap
|
page read and write
|
||
7FFB167B5000
|
unkown
|
page readonly
|
||
7FFAAC274000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
12341000
|
trusted library allocation
|
page read and write
|
||
203FF2D5000
|
heap
|
page read and write
|
||
1BD880BF000
|
heap
|
page read and write
|
||
18C0E272000
|
trusted library allocation
|
page read and write
|
||
7FFAAC590000
|
trusted library allocation
|
page read and write
|
||
1B630000
|
trusted library allocation
|
page read and write
|
||
1BC60000
|
trusted library allocation
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
1BA20000
|
trusted library allocation
|
page read and write
|
||
7FF6E4D69000
|
direct allocation
|
page execute and read and write
|
||
2253000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BC80000
|
trusted library allocation
|
page read and write
|
||
1BD88057000
|
heap
|
page read and write
|
||
1BDC0000
|
trusted library allocation
|
page read and write
|
||
1BD877F0000
|
heap
|
page read and write
|
||
1BD8760B000
|
heap
|
page read and write
|
||
1BD877B7000
|
heap
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
7FFAAC5D0000
|
trusted library allocation
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1BD8759F000
|
heap
|
page read and write
|
||
1ADA0000
|
heap
|
page read and write
|
||
1BD8559D000
|
heap
|
page read and write
|
||
1D8B05A9000
|
heap
|
page read and write
|
||
5083000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1BD875C2000
|
heap
|
page read and write
|
||
8D9C9A3000
|
stack
|
page read and write
|
||
203FEE30000
|
heap
|
page read and write
|
||
2263000
|
trusted library allocation
|
page read and write
|
||
1BD87604000
|
heap
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
1BD877AC000
|
heap
|
page read and write
|
||
1B750000
|
trusted library allocation
|
page read and write
|
||
1C838000
|
unkown
|
page read and write
|
||
3F0000
|
heap
|
page read and write
|
||
1BD880B0000
|
heap
|
page read and write
|
||
1BD877CF000
|
heap
|
page read and write
|
||
1B070000
|
trusted library allocation
|
page read and write
|
||
1B950000
|
trusted library allocation
|
page read and write
|
||
1BD87799000
|
heap
|
page read and write
|
||
2F30000
|
direct allocation
|
page execute and read and write
|
||
203FE709000
|
unkown
|
page read and write
|
||
1BD87609000
|
heap
|
page read and write
|
||
1A8C1000
|
heap
|
page read and write
|
||
1AFC0000
|
trusted library allocation
|
page read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
2B2A000
|
heap
|
page read and write
|
||
1B080000
|
trusted library allocation
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1BD875A4000
|
heap
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
1BD877F2000
|
heap
|
page read and write
|
||
1BD877D1000
|
heap
|
page read and write
|
||
1BD85576000
|
heap
|
page read and write
|
||
1BD87593000
|
heap
|
page read and write
|
||
2263000
|
trusted library allocation
|
page read and write
|
||
7DF423EBA000
|
unkown
|
page read and write
|
||
1BD88127000
|
heap
|
page read and write
|
||
8D9CEFA000
|
stack
|
page read and write
|
||
2F2000
|
stack
|
page read and write
|
||
203FEE4A000
|
heap
|
page read and write
|
||
1BD88077000
|
heap
|
page read and write
|
||
1BD877B8000
|
heap
|
page read and write
|
||
2B1E1580000
|
trusted library allocation
|
page read and write
|
||
1BD877A1000
|
heap
|
page read and write
|
||
18C26107000
|
heap
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page read and write
|
||
1BD87778000
|
heap
|
page read and write
|
||
18C260CC000
|
heap
|
page read and write
|
||
2C31000
|
heap
|
page read and write
|
||
1B13F000
|
heap
|
page read and write
|
||
2313000
|
trusted library allocation
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
1BD87794000
|
heap
|
page read and write
|
||
18C0FBCE000
|
trusted library allocation
|
page read and write
|
||
2263000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD88066000
|
heap
|
page read and write
|
||
1BD877D6000
|
heap
|
page read and write
|
||
1BD877C0000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
1BCF0000
|
trusted library allocation
|
page read and write
|
||
1BD877BF000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page readonly
|
||
2B1DFD90000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1AEE7000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1B7F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC440000
|
trusted library allocation
|
page execute and read and write
|
||
2B1F1741000
|
trusted library allocation
|
page read and write
|
||
2B1F9BAF000
|
heap
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
1B990000
|
trusted library allocation
|
page read and write
|
||
18C0C0A4000
|
heap
|
page read and write
|
||
201C122F000
|
unkown
|
page execute and read and write
|
||
1BD880D7000
|
heap
|
page read and write
|
||
1BD87569000
|
heap
|
page read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
1BD880DF000
|
heap
|
page read and write
|
||
884000
|
unkown
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
11D5000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
1BD8761B000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD877BA000
|
heap
|
page read and write
|
||
1D898B6C000
|
trusted library allocation
|
page read and write
|
||
E4C1DFE000
|
stack
|
page read and write
|
||
1BD88072000
|
heap
|
page read and write
|
||
2263000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
18C26040000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD88048000
|
heap
|
page read and write
|
||
5CDC000
|
stack
|
page read and write
|
||
2B1F9BF9000
|
heap
|
page read and write
|
||
1BD875A2000
|
heap
|
page read and write
|
||
5131000
|
heap
|
page read and write
|
||
203FED30000
|
trusted library allocation
|
page read and write
|
||
D41000
|
heap
|
page read and write
|
||
D94000
|
heap
|
page read and write
|
||
1BD10000
|
trusted library allocation
|
page read and write
|
||
5085000
|
heap
|
page read and write
|
||
92D467D000
|
stack
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
1AFD0000
|
trusted library allocation
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
1BD877D8000
|
heap
|
page read and write
|
||
7FFAAC5B0000
|
trusted library allocation
|
page read and write
|
||
7FF79EACB000
|
unkown
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1CA16000
|
unkown
|
page read and write
|
||
203FF261000
|
heap
|
page read and write
|
||
1AD70000
|
trusted library allocation
|
page read and write
|
||
1B725000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1BD88077000
|
heap
|
page read and write
|
||
2B1F9E7D000
|
heap
|
page read and write
|
||
1BD8779F000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD88110000
|
heap
|
page read and write
|
||
7FFAAC6E0000
|
trusted library allocation
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1B860000
|
trusted library allocation
|
page read and write
|
||
18C0E041000
|
trusted library allocation
|
page read and write
|
||
1BD877D6000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
203FE7AC000
|
heap
|
page read and write
|
||
1ED000
|
heap
|
page read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
1BD88056000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1CC35000
|
unkown
|
page read and write
|
||
1BB20000
|
trusted library allocation
|
page read and write
|
||
E4C1C7E000
|
stack
|
page read and write
|
||
1BB80000
|
trusted library allocation
|
page read and write
|
||
1BB80000
|
trusted library allocation
|
page read and write
|
||
1AEFE000
|
heap
|
page read and write
|
||
2659000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
trusted library allocation
|
page read and write
|
||
1BD877FC000
|
heap
|
page read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
2B1F9B90000
|
heap
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1B670000
|
trusted library allocation
|
page read and write
|
||
2B1DFB00000
|
heap
|
page read and write
|
||
1B71B000
|
stack
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
7FFAAC310000
|
trusted library allocation
|
page read and write
|
||
260AF765000
|
heap
|
page read and write
|
||
201C16D0000
|
heap
|
page read and write
|
||
1B8C0000
|
trusted library allocation
|
page read and write
|
||
203FF461000
|
heap
|
page read and write
|
||
2B1F9CD3000
|
heap
|
page read and write
|
||
1BD877B7000
|
heap
|
page read and write
|
||
2B1E36E6000
|
trusted library allocation
|
page read and write
|
||
1B710000
|
trusted library allocation
|
page read and write
|
||
2913E32A000
|
heap
|
page read and write
|
||
1D8B0C11000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD8760A000
|
heap
|
page read and write
|
||
9B5B0FC000
|
stack
|
page read and write
|
||
7FFAAC570000
|
trusted library allocation
|
page read and write
|
||
1BD88062000
|
heap
|
page read and write
|
||
1B620000
|
trusted library allocation
|
page read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
1BC90000
|
trusted library allocation
|
page read and write
|
||
26E2000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
1BA00000
|
trusted library allocation
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page read and write
|
||
7FFAAC610000
|
trusted library allocation
|
page read and write
|
||
7FFAAC517000
|
trusted library allocation
|
page read and write
|
||
1BD87616000
|
heap
|
page read and write
|
||
1BD8779F000
|
heap
|
page read and write
|
||
1BCC0000
|
trusted library allocation
|
page read and write
|
||
203FF260000
|
heap
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
1B880000
|
trusted library section
|
page read and write
|
||
1BD877C0000
|
heap
|
page read and write
|
||
7FFB16791000
|
unkown
|
page execute read
|
||
1BD88107000
|
heap
|
page read and write
|
||
E4C1E7A000
|
stack
|
page read and write
|
||
1BD88120000
|
heap
|
page read and write
|
||
203FE740000
|
heap
|
page read and write
|
||
2B1F9BCE000
|
heap
|
page read and write
|
||
1BD875D5000
|
heap
|
page read and write
|
||
2257000
|
trusted library allocation
|
page read and write
|
||
7FFAAC33D000
|
trusted library allocation
|
page execute and read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
7FFB0D720000
|
unkown
|
page readonly
|
||
1BD877C0000
|
heap
|
page read and write
|
||
1BD877F0000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1BB80000
|
trusted library allocation
|
page read and write
|
||
2B1F9F41000
|
heap
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
1BD876C0000
|
heap
|
page read and write
|
||
1BD87799000
|
heap
|
page read and write
|
||
1BD877C5000
|
heap
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
1BD8777F000
|
heap
|
page read and write
|
||
203FE970000
|
heap
|
page read and write
|
||
1D896730000
|
heap
|
page read and write
|
||
DAA000
|
heap
|
page read and write
|
||
1BD880DF000
|
heap
|
page read and write
|
||
1BD877A7000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1D8966A0000
|
trusted library section
|
page read and write
|
||
1B060000
|
trusted library allocation
|
page read and write
|
||
2260000
|
remote allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD88066000
|
heap
|
page read and write
|
||
1BD875A4000
|
heap
|
page read and write
|
||
5075000
|
heap
|
page read and write
|
||
2B1E1570000
|
heap
|
page readonly
|
||
72B000
|
heap
|
page read and write
|
||
1BD877A9000
|
heap
|
page read and write
|
||
1BD87783000
|
heap
|
page read and write
|
||
2BCA1598000
|
heap
|
page read and write
|
||
7FFAAC6A0000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
1B6A0000
|
trusted library allocation
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
8D9D1FE000
|
stack
|
page read and write
|
||
7DF423EC4000
|
unkown
|
page read and write
|
||
1BD875B0000
|
heap
|
page read and write
|
||
2B1F9DE0000
|
heap
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
1BD70000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
1C4C0000
|
heap
|
page read and write
|
||
1AEAC000
|
heap
|
page read and write
|
||
2A20000
|
heap
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
1BC40000
|
trusted library allocation
|
page read and write
|
||
201C2DF1000
|
heap
|
page read and write
|
||
1BD87794000
|
heap
|
page read and write
|
||
1BD875A3000
|
heap
|
page read and write
|
||
2F31000
|
direct allocation
|
page execute and read and write
|
||
2B1F9BD8000
|
heap
|
page read and write
|
||
1BD87778000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
203FE791000
|
heap
|
page read and write
|
||
2320000
|
trusted library allocation
|
page read and write
|
||
1BCB0000
|
trusted library allocation
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
30DD000
|
stack
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
7FFB16790000
|
unkown
|
page readonly
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1BD87593000
|
heap
|
page read and write
|
||
1D8A8458000
|
trusted library allocation
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
203FEE20000
|
heap
|
page read and write
|
||
E69000
|
heap
|
page read and write
|
||
18C0C235000
|
heap
|
page read and write
|
||
8D9D2FC000
|
stack
|
page read and write
|
||
1D898171000
|
trusted library allocation
|
page read and write
|
||
1BAED000
|
heap
|
page read and write
|
||
203FED40000
|
direct allocation
|
page execute and read and write
|
||
1D8966E0000
|
heap
|
page readonly
|
||
1BD87616000
|
heap
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
1AEF4000
|
heap
|
page read and write
|
||
1A8C9000
|
heap
|
page read and write
|
||
1BD877B2000
|
heap
|
page read and write
|
||
1BD877E8000
|
heap
|
page read and write
|
||
1BD880B7000
|
heap
|
page read and write
|
||
1ADB0000
|
trusted library allocation
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
5EDD000
|
stack
|
page read and write
|
||
1B756000
|
trusted library allocation
|
page read and write
|
||
2B1F9F8D000
|
heap
|
page read and write
|
||
1BD877D6000
|
heap
|
page read and write
|
||
50D2000
|
heap
|
page read and write
|
||
1BB50000
|
trusted library allocation
|
page read and write
|
||
1B8B0000
|
trusted library allocation
|
page read and write
|
||
1D899FA5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5A0000
|
trusted library allocation
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1B030000
|
trusted library allocation
|
page read and write
|
||
1AD9C000
|
heap
|
page execute and read and write
|
||
7FFB2CE20000
|
direct allocation
|
page execute and read and write
|
||
81D7A75000
|
stack
|
page read and write
|
||
1AEDA000
|
heap
|
page read and write
|
||
4FE2000
|
heap
|
page read and write
|
||
1BBF0000
|
trusted library allocation
|
page read and write
|
||
1BD87624000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
81D8D4F000
|
stack
|
page read and write
|
||
2BCA1400000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
2B1F9F6B000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4E1000
|
trusted library allocation
|
page read and write
|
||
5070000
|
heap
|
page read and write
|
||
1D8966F0000
|
trusted library allocation
|
page read and write
|
||
1D897FE4000
|
heap
|
page read and write
|
||
18C1E050000
|
trusted library allocation
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
2B1F17AA000
|
trusted library allocation
|
page read and write
|
||
81D817E000
|
stack
|
page read and write
|
||
1BD8759D000
|
heap
|
page read and write
|
||
7FFAAC3E0000
|
trusted library allocation
|
page execute and read and write
|
||
1D8965A3000
|
heap
|
page read and write
|
||
18C0BF10000
|
heap
|
page read and write
|
||
1D8B0700000
|
heap
|
page read and write
|
||
2F20000
|
trusted library allocation
|
page read and write
|
||
1B910000
|
trusted library allocation
|
page read and write
|
||
1BD8778F000
|
heap
|
page read and write
|
||
26D5000
|
trusted library allocation
|
page read and write
|
||
2CDA000
|
heap
|
page read and write
|
||
1BD877C0000
|
heap
|
page read and write
|
||
1B6CF000
|
trusted library allocation
|
page read and write
|
||
1BD8558B000
|
heap
|
page read and write
|
||
1BD8778E000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD8806F000
|
heap
|
page read and write
|
||
1BE03000
|
trusted library allocation
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
7FFB167A6000
|
unkown
|
page readonly
|
||
1D8965A5000
|
heap
|
page read and write
|
||
1BD87615000
|
heap
|
page read and write
|
||
1BD877FB000
|
heap
|
page read and write
|
||
1B6A0000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
trusted library allocation
|
page read and write
|
||
2B1F9F4E000
|
heap
|
page read and write
|
||
2A80000
|
heap
|
page read and write
|
||
1BD877F0000
|
heap
|
page read and write
|
||
1D8B09D6000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1B6F0000
|
trusted library allocation
|
page read and write
|
||
203FE7A2000
|
heap
|
page read and write
|
||
7FFAAC452000
|
trusted library allocation
|
page read and write
|
||
1BD877A8000
|
heap
|
page read and write
|
||
F23000
|
heap
|
page read and write
|
||
1BD8804D000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BCA0000
|
trusted library allocation
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
1BD00000
|
trusted library allocation
|
page read and write
|
||
5120000
|
heap
|
page read and write
|
||
2B40000
|
heap
|
page read and write
|
||
81D7FF7000
|
stack
|
page read and write
|
||
7FFAAC350000
|
trusted library allocation
|
page read and write
|
||
2200000
|
heap
|
page read and write
|
||
1BD87787000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
1BD8778D000
|
heap
|
page read and write
|
||
1BD8811F000
|
heap
|
page read and write
|
||
201C1260000
|
heap
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page readonly
|
||
203FE78B000
|
heap
|
page read and write
|
||
1BD880DF000
|
heap
|
page read and write
|
||
5197000
|
heap
|
page read and write
|
||
1BD880CF000
|
heap
|
page read and write
|
||
1BD877A8000
|
heap
|
page read and write
|
||
1BD877CF000
|
heap
|
page read and write
|
||
1BD8758D000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
203FEE72000
|
heap
|
page read and write
|
||
1D897FE0000
|
heap
|
page read and write
|
||
1BB40000
|
trusted library allocation
|
page read and write
|
||
1BD8778F000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD87609000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1B030000
|
trusted library allocation
|
page read and write
|
||
1BD877BA000
|
heap
|
page read and write
|
||
E4C1D79000
|
stack
|
page read and write
|
||
1B0DB000
|
heap
|
page read and write
|
||
203FEE72000
|
heap
|
page read and write
|
||
7FFAAC28B000
|
trusted library allocation
|
page execute and read and write
|
||
1BD87609000
|
heap
|
page read and write
|
||
1BD877E8000
|
heap
|
page read and write
|
||
1B870000
|
heap
|
page execute and read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD877A3000
|
heap
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
7FFAAC270000
|
trusted library allocation
|
page read and write
|
||
1BD877C0000
|
heap
|
page read and write
|
||
2B1F9F7D000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD880A6000
|
heap
|
page read and write
|
||
1B090000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
1BD8757A000
|
heap
|
page read and write
|
||
1BD877FD000
|
heap
|
page read and write
|
||
1BD87569000
|
heap
|
page read and write
|
||
1BD87800000
|
heap
|
page read and write
|
||
1ADF0000
|
trusted library allocation
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
B04000
|
stack
|
page read and write
|
||
203FE940000
|
heap
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
2913DF50000
|
remote allocation
|
page execute and read and write
|
||
2B1DFB46000
|
heap
|
page read and write
|
||
1BC75000
|
trusted library allocation
|
page read and write
|
||
1B690000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
direct allocation
|
page read and write
|
||
7FFAAC5B0000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
2B1FA2FC000
|
heap
|
page read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
1B7D0000
|
trusted library allocation
|
page read and write
|
||
1BD87D7B000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
203FED30000
|
trusted library allocation
|
page read and write
|
||
7FFAAC27D000
|
trusted library allocation
|
page execute and read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
1D89912D000
|
trusted library allocation
|
page read and write
|
||
1BD880AE000
|
heap
|
page read and write
|
||
7FFAAC326000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
1B660000
|
trusted library allocation
|
page read and write
|
||
51BE000
|
heap
|
page read and write
|
||
7FFAAC590000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD88097000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
2335000
|
heap
|
page read and write
|
||
1BAC0000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1B0CF000
|
heap
|
page read and write
|
||
260AF591000
|
unkown
|
page execute read
|
||
1BD877C5000
|
heap
|
page read and write
|
||
1BD877B5000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5D2000
|
trusted library allocation
|
page read and write
|
||
1BD87A20000
|
unkown
|
page read and write
|
||
1BBA0000
|
trusted library allocation
|
page read and write
|
||
67B000
|
stack
|
page read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
1BD880D7000
|
heap
|
page read and write
|
||
7FFAAC410000
|
trusted library allocation
|
page read and write
|
||
1BD87794000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1B74F000
|
trusted library allocation
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
203FF316000
|
heap
|
page read and write
|
||
7FFAAC550000
|
trusted library allocation
|
page read and write
|
||
18C0C062000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1A8B6000
|
heap
|
page read and write
|
||
1BD877CF000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1BD87801000
|
heap
|
page read and write
|
||
1BD8757B000
|
heap
|
page read and write
|
||
1BD87830000
|
unkown
|
page read and write
|
||
1BD877A3000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD877FC000
|
heap
|
page read and write
|
||
1BD880FF000
|
heap
|
page read and write
|
||
1BD8761B000
|
heap
|
page read and write
|
||
1AEDA000
|
heap
|
page read and write
|
||
2B1E357F000
|
trusted library allocation
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
1BD877B7000
|
heap
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
B798E7D000
|
stack
|
page read and write
|
||
2B1F9F81000
|
heap
|
page read and write
|
||
7FFAAC510000
|
trusted library allocation
|
page read and write
|
||
1B760000
|
trusted library allocation
|
page read and write
|
||
18C2625F000
|
heap
|
page read and write
|
||
1D8B07F6000
|
heap
|
page read and write
|
||
1BD88056000
|
heap
|
page read and write
|
||
1D89659D000
|
heap
|
page read and write
|
||
7FF79E8F0000
|
unkown
|
page readonly
|
||
1BD875B0000
|
heap
|
page read and write
|
||
1B8FE000
|
stack
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
203FE79B000
|
heap
|
page read and write
|
||
1BD87626000
|
heap
|
page read and write
|
||
260B1150000
|
heap
|
page readonly
|
||
2913E11C000
|
heap
|
page read and write
|
||
6A7000
|
unkown
|
page readonly
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
1BD87588000
|
heap
|
page read and write
|
||
B2EEC7C000
|
stack
|
page read and write
|
||
1B030000
|
trusted library allocation
|
page read and write
|
||
B798EFE000
|
stack
|
page read and write
|
||
1BB20000
|
trusted library allocation
|
page read and write
|
||
2BCA2E41000
|
heap
|
page read and write
|
||
7FFAAC3D0000
|
trusted library allocation
|
page read and write
|
||
1BD87615000
|
heap
|
page read and write
|
||
2A44000
|
heap
|
page read and write
|
||
7FFAAC3EC000
|
trusted library allocation
|
page execute and read and write
|
||
1BD877FD000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1D8A8171000
|
trusted library allocation
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
1BD877C5000
|
heap
|
page read and write
|
||
1B040000
|
trusted library allocation
|
page read and write
|
||
18C26160000
|
heap
|
page read and write
|
||
2B1F9F67000
|
heap
|
page read and write
|
||
1BD87572000
|
heap
|
page read and write
|
||
203FEDA0000
|
heap
|
page read and write
|
||
7FFAAC31C000
|
trusted library allocation
|
page execute and read and write
|
||
1BD8759D000
|
heap
|
page read and write
|
||
1BD880E7000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD8778F000
|
heap
|
page read and write
|
||
1BD877D7000
|
heap
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
1BD8761D000
|
heap
|
page read and write
|
||
8AD000
|
unkown
|
page readonly
|
||
1BD87796000
|
heap
|
page read and write
|
||
1BDE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5A0000
|
trusted library allocation
|
page read and write
|
||
1D896430000
|
heap
|
page read and write
|
||
203FEE72000
|
heap
|
page read and write
|
||
92D477C000
|
stack
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
7FFAAC490000
|
trusted library allocation
|
page read and write
|
||
1BD880D7000
|
heap
|
page read and write
|
||
2320000
|
trusted library allocation
|
page read and write
|
||
1B960000
|
trusted library allocation
|
page read and write
|
||
1BD88083000
|
heap
|
page read and write
|
||
1D8B08A7000
|
heap
|
page read and write
|
||
1BD88117000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
1BD88053000
|
heap
|
page read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
1BD877A9000
|
heap
|
page read and write
|
||
1BD88071000
|
heap
|
page read and write
|
||
1BD875A1000
|
heap
|
page read and write
|
||
1BD877D0000
|
heap
|
page read and write
|
||
1BD8757B000
|
heap
|
page read and write
|
||
1BD880D7000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD8759C000
|
heap
|
page read and write
|
||
1ADE0000
|
trusted library allocation
|
page read and write
|
||
18C262A9000
|
heap
|
page read and write
|
||
1BCD0000
|
trusted library allocation
|
page read and write
|
||
B2EECFD000
|
stack
|
page read and write
|
||
1BD87778000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page execute and read and write
|
||
1B600000
|
trusted library allocation
|
page read and write
|
||
7FFAAC332000
|
trusted library allocation
|
page read and write
|
||
1B8A0000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
1BD87615000
|
heap
|
page read and write
|
||
1BD8760D000
|
heap
|
page read and write
|
||
18C26262000
|
heap
|
page read and write
|
||
E4C2E8D000
|
stack
|
page read and write
|
||
7FFAAC324000
|
trusted library allocation
|
page read and write
|
||
2913E050000
|
heap
|
page read and write
|
||
201C16D5000
|
heap
|
page read and write
|
||
1B8BA000
|
stack
|
page read and write
|
||
201C1399000
|
heap
|
page read and write
|
||
2913E326000
|
heap
|
page read and write
|
||
203FF4D2000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
2913E32E000
|
heap
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
1BD87615000
|
heap
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
56DF000
|
stack
|
page read and write
|
||
1B930000
|
heap
|
page read and write
|
||
1BD88053000
|
heap
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
203FEE73000
|
heap
|
page read and write
|
||
1BA60000
|
trusted library allocation
|
page read and write
|
||
1B7B0000
|
trusted library allocation
|
page read and write
|
||
1BD88057000
|
heap
|
page read and write
|
||
8AD000
|
unkown
|
page readonly
|
||
2B1F9EF7000
|
heap
|
page read and write
|
||
18C0DAC0000
|
heap
|
page execute and read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page read and write
|
||
1BD877AC000
|
heap
|
page read and write
|
||
7FFAAC380000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
8D9CDFA000
|
stack
|
page read and write
|
||
1BD8761B000
|
heap
|
page read and write
|
||
1BD8811F000
|
heap
|
page read and write
|
||
1BD8759F000
|
heap
|
page read and write
|
||
340000
|
heap
|
page read and write
|
||
2B1E31EF000
|
trusted library allocation
|
page read and write
|
||
1B727000
|
trusted library allocation
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
203FE7AC000
|
heap
|
page read and write
|
||
1BDA9000
|
trusted library allocation
|
page read and write
|
||
1BD87794000
|
heap
|
page read and write
|
||
7FFAAC400000
|
trusted library allocation
|
page read and write
|
||
2B1DFB8C000
|
heap
|
page read and write
|
||
7FF6E4C9D000
|
direct allocation
|
page execute and read and write
|
||
1BD8811F000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
7DF4C6CF0000
|
trusted library allocation
|
page execute and read and write
|
||
1BD87778000
|
heap
|
page read and write
|
||
2B1F1A28000
|
trusted library allocation
|
page read and write
|
||
1BD880B1000
|
heap
|
page read and write
|
||
1BD8779D000
|
heap
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
1BD8777E000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
7FFAAC32C000
|
trusted library allocation
|
page execute and read and write
|
||
E77000
|
heap
|
page read and write
|
||
8D9C9EE000
|
stack
|
page read and write
|
||
1B9D0000
|
trusted library allocation
|
page read and write
|
||
203FE794000
|
heap
|
page read and write
|
||
1BD88040000
|
heap
|
page read and write
|
||
1BD877C0000
|
heap
|
page read and write
|
||
1BD8559D000
|
heap
|
page read and write
|
||
2BCA2D40000
|
heap
|
page read and write
|
||
1B6B0000
|
trusted library allocation
|
page read and write
|
||
26F2000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD875E2000
|
heap
|
page read and write
|
||
1B620000
|
trusted library allocation
|
page read and write
|
||
18C0C1F0000
|
trusted library allocation
|
page read and write
|
||
63E000
|
stack
|
page read and write
|
||
1BDBA000
|
trusted library allocation
|
page read and write
|
||
18C0F672000
|
trusted library allocation
|
page read and write
|
||
1BA10000
|
trusted library allocation
|
page read and write
|
||
203FED30000
|
unkown
|
page read and write
|
||
1BD877B5000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD8757A000
|
heap
|
page read and write
|
||
1BD87609000
|
heap
|
page read and write
|
||
2B1DFDB5000
|
heap
|
page read and write
|
||
7FFAAC600000
|
trusted library allocation
|
page read and write
|
||
1BD8811F000
|
heap
|
page read and write
|
||
DA5000
|
heap
|
page read and write
|
||
1BD87609000
|
heap
|
page read and write
|
||
1D8B0C25000
|
heap
|
page read and write
|
||
1BD877FD000
|
heap
|
page read and write
|
||
1AD60000
|
trusted library allocation
|
page read and write
|
||
7FF79E8F1000
|
unkown
|
page execute read
|
||
7FFAAC284000
|
trusted library allocation
|
page read and write
|
||
1B733000
|
trusted library allocation
|
page read and write
|
||
1BD877B2000
|
heap
|
page read and write
|
||
1BD880D7000
|
heap
|
page read and write
|
||
1BD87776000
|
heap
|
page read and write
|
||
2BCA2E44000
|
heap
|
page read and write
|
||
1B750000
|
trusted library allocation
|
page read and write
|
||
1D8B0540000
|
heap
|
page read and write
|
||
1B050000
|
trusted library allocation
|
page read and write
|
||
E4C2D0E000
|
stack
|
page read and write
|
||
7FFAAC560000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
69F000
|
unkown
|
page read and write
|
||
2644000
|
trusted library allocation
|
page read and write
|
||
2B1F9CE3000
|
heap
|
page read and write
|
||
1BD87776000
|
heap
|
page read and write
|
||
203FED60000
|
unkown
|
page read and write
|
||
1BCC0000
|
trusted library allocation
|
page read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
23C1000
|
trusted library allocation
|
page read and write
|
||
1ACA0000
|
trusted library allocation
|
page read and write
|
||
1BD8559D000
|
heap
|
page read and write
|
||
1B900000
|
trusted library allocation
|
page read and write
|
||
1BD87615000
|
heap
|
page read and write
|
||
1BD8777C000
|
heap
|
page read and write
|
||
1B7C0000
|
trusted library allocation
|
page read and write
|
||
7FFB167B2000
|
unkown
|
page readonly
|
||
7FFB167B0000
|
unkown
|
page read and write
|
||
5096000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD875A1000
|
heap
|
page read and write
|
||
1D899C46000
|
trusted library allocation
|
page read and write
|
||
1AD85000
|
trusted library allocation
|
page read and write
|
||
1BD875A3000
|
heap
|
page read and write
|
||
1BD87569000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1C780000
|
unkown
|
page read and write
|
||
1B8C0000
|
trusted library allocation
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD87778000
|
heap
|
page read and write
|
||
7FFAAC540000
|
trusted library allocation
|
page read and write
|
||
1D897FFD000
|
heap
|
page read and write
|
||
1BD85591000
|
heap
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
1BD8778D000
|
heap
|
page read and write
|
||
7FFAAC5E0000
|
trusted library allocation
|
page read and write
|
||
690000
|
trusted library allocation
|
page read and write
|
||
50FC000
|
heap
|
page read and write
|
||
1BD87E76000
|
heap
|
page read and write
|
||
1D8B09D2000
|
heap
|
page read and write
|
||
1B033000
|
trusted library allocation
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
7FFAAC550000
|
trusted library allocation
|
page read and write
|
||
1B659000
|
trusted library allocation
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1BD87778000
|
heap
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
1BD87787000
|
heap
|
page read and write
|
||
1D8A81A1000
|
trusted library allocation
|
page read and write
|
||
7DF49A980000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB167B0000
|
unkown
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
D81000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
23A8000
|
trusted library allocation
|
page read and write
|
||
1BD877C8000
|
heap
|
page read and write
|
||
1BD877F2000
|
heap
|
page read and write
|
||
7FFB0D6D0000
|
unkown
|
page readonly
|
||
2100000
|
heap
|
page read and write
|
||
1BD88096000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
1D899C5C000
|
trusted library allocation
|
page read and write
|
||
E4C21BE000
|
stack
|
page read and write
|
||
1D8B092B000
|
heap
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5C0000
|
trusted library allocation
|
page read and write
|
||
D0F000
|
heap
|
page read and write
|
||
1B810000
|
trusted library allocation
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
1BC30000
|
trusted library allocation
|
page read and write
|
||
1BD877F0000
|
heap
|
page read and write
|
||
1ACF0000
|
trusted library allocation
|
page read and write
|
||
D55000
|
heap
|
page read and write
|
||
1B060000
|
trusted library allocation
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
1B040000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
2B1F1A30000
|
trusted library allocation
|
page read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
1BD70000
|
trusted library allocation
|
page read and write
|
||
1BD8779F000
|
heap
|
page read and write
|
||
1BD8811F000
|
heap
|
page read and write
|
||
18C0FC10000
|
trusted library allocation
|
page read and write
|
||
2B1E32F2000
|
trusted library allocation
|
page read and write
|
||
1BD87569000
|
heap
|
page read and write
|
||
1BD14000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
7FFAAC500000
|
trusted library allocation
|
page execute and read and write
|
||
E4C1942000
|
stack
|
page read and write
|
||
26F7000
|
trusted library allocation
|
page read and write
|
||
7FFB167B0000
|
unkown
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
955000
|
heap
|
page read and write
|
||
2B1E3234000
|
trusted library allocation
|
page read and write
|
||
2B1DFD60000
|
heap
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
2B1E314A000
|
trusted library allocation
|
page read and write
|
||
2B1F9EB9000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
E4C2E0D000
|
stack
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
1B050000
|
trusted library allocation
|
page read and write
|
||
1BAB0000
|
trusted library allocation
|
page read and write
|
||
1BD88110000
|
heap
|
page read and write
|
||
1BD8778D000
|
heap
|
page read and write
|
||
1BC30000
|
trusted library allocation
|
page read and write
|
||
1BD87609000
|
heap
|
page read and write
|
||
8D9D47E000
|
stack
|
page read and write
|
||
920000
|
heap
|
page execute and read and write
|
||
1BD879AB000
|
unkown
|
page read and write
|
||
1BD877A8000
|
heap
|
page read and write
|
||
18C0DE64000
|
heap
|
page read and write
|
||
7FFAAC480000
|
trusted library allocation
|
page read and write
|
||
203FE78B000
|
heap
|
page read and write
|
||
1B920000
|
trusted library allocation
|
page read and write
|
||
1D8B07F8000
|
heap
|
page read and write
|
||
2B1E321E000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
18C262F2000
|
heap
|
page read and write
|
||
2B1E15A0000
|
trusted library allocation
|
page read and write
|
||
910000
|
trusted library allocation
|
page read and write
|
||
8D9DDCE000
|
stack
|
page read and write
|
||
7FFB167A6000
|
unkown
|
page readonly
|
||
201C1350000
|
heap
|
page read and write
|
||
1BD87781000
|
heap
|
page read and write
|
||
1BD880CF000
|
heap
|
page read and write
|
||
1BD877B7000
|
heap
|
page read and write
|
||
1BD10000
|
trusted library allocation
|
page read and write
|
||
1BD88117000
|
heap
|
page read and write
|
||
7FFAAC290000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD877B8000
|
heap
|
page read and write
|
||
1AFB0000
|
trusted library allocation
|
page read and write
|
||
736000
|
heap
|
page read and write
|
||
1BD87604000
|
heap
|
page read and write
|
||
18C0DA23000
|
trusted library allocation
|
page read and write
|
||
1BD880D7000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1B773000
|
trusted library allocation
|
page read and write
|
||
1BD877F0000
|
heap
|
page read and write
|
||
1D8965BD000
|
heap
|
page read and write
|
||
1BD88048000
|
heap
|
page read and write
|
||
1BD87778000
|
heap
|
page read and write
|
||
1BD877A7000
|
heap
|
page read and write
|
||
1D8B0570000
|
heap
|
page read and write
|
||
1B780000
|
trusted library allocation
|
page read and write
|
||
1D8965EA000
|
heap
|
page read and write
|
||
203FEE28000
|
heap
|
page read and write
|
||
1AEE7000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1BD877E8000
|
heap
|
page read and write
|
||
2B1DFD40000
|
heap
|
page read and write
|
||
1BD8809F000
|
heap
|
page read and write
|
||
2B1FA2B0000
|
heap
|
page read and write
|
||
79A000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
212E000
|
stack
|
page read and write
|
||
1BD40000
|
trusted library allocation
|
page read and write
|
||
1BD877CF000
|
heap
|
page read and write
|
||
1C0D2000
|
direct allocation
|
page execute and read and write
|
||
2AB0000
|
trusted library allocation
|
page read and write
|
||
1D8B08F0000
|
heap
|
page read and write
|
||
1BD877B5000
|
heap
|
page read and write
|
||
1B770000
|
trusted library allocation
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
31C3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC698000
|
trusted library allocation
|
page read and write
|
||
1B040000
|
trusted library allocation
|
page read and write
|
||
2E3C000
|
heap
|
page read and write
|
||
1BD87574000
|
heap
|
page read and write
|
||
1BD8779D000
|
heap
|
page read and write
|
||
1BBE0000
|
trusted library allocation
|
page read and write
|
||
2B1F9DE3000
|
heap
|
page read and write
|
||
81D7AFE000
|
stack
|
page read and write
|
||
1BD87E13000
|
heap
|
page read and write
|
||
7DF418660000
|
trusted library allocation
|
page execute and read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1BD40000
|
trusted library allocation
|
page read and write
|
||
1D8B07E0000
|
heap
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
1BD88072000
|
heap
|
page read and write
|
||
1BD87CBD000
|
heap
|
page read and write
|
||
1B850000
|
trusted library allocation
|
page read and write
|
||
260AF6F0000
|
heap
|
page read and write
|
||
7FFAAC530000
|
trusted library allocation
|
page read and write
|
||
1BD87779000
|
heap
|
page read and write
|
||
1BD875A1000
|
heap
|
page read and write
|
||
D94000
|
heap
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
1B750000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
203FF316000
|
heap
|
page read and write
|
||
1BD8811F000
|
heap
|
page read and write
|
||
1BD80000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5C4000
|
trusted library allocation
|
page read and write
|
||
203FF460000
|
heap
|
page read and write
|
||
1BD8805F000
|
heap
|
page read and write
|
||
1B6C0000
|
trusted library allocation
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1B970000
|
trusted library allocation
|
page read and write
|
||
2BCA14A8000
|
heap
|
page read and write
|
||
1ACD0000
|
trusted library allocation
|
page read and write
|
||
203FF270000
|
heap
|
page read and write
|
||
5099000
|
heap
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
1B87C000
|
heap
|
page execute and read and write
|
||
1BD877BF000
|
heap
|
page read and write
|
||
1BE30000
|
trusted library allocation
|
page read and write
|
||
2BCA1460000
|
heap
|
page read and write
|
||
1BD87615000
|
heap
|
page read and write
|
||
1BD8779B000
|
heap
|
page read and write
|
||
203FEEEA000
|
heap
|
page read and write
|
||
7FFAAC4E0000
|
trusted library allocation
|
page read and write
|
||
2310000
|
trusted library allocation
|
page read and write
|
||
2B1F9F69000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD8811F000
|
heap
|
page read and write
|
||
1AE5E000
|
heap
|
page read and write
|
||
1BCD0000
|
trusted library allocation
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
7FFB167B0000
|
unkown
|
page read and write
|
||
1BD875A3000
|
heap
|
page read and write
|
||
1BD8778F000
|
heap
|
page read and write
|
||
18C0DAD0000
|
heap
|
page execute and read and write
|
||
1D8B0900000
|
heap
|
page read and write
|
||
1AD90000
|
heap
|
page execute and read and write
|
||
50F6000
|
heap
|
page read and write
|
||
1ADD0000
|
trusted library allocation
|
page read and write
|
||
1B67D000
|
trusted library allocation
|
page read and write
|
||
18C0E000000
|
heap
|
page execute and read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD8758B000
|
heap
|
page read and write
|
||
1BD880E0000
|
heap
|
page read and write
|
||
1B600000
|
trusted library allocation
|
page read and write
|
||
1BD8810F000
|
heap
|
page read and write
|
||
12349000
|
trusted library allocation
|
page read and write
|
||
1BD87796000
|
heap
|
page read and write
|
||
E4C1FBE000
|
stack
|
page read and write
|
||
1AFA0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC600000
|
trusted library allocation
|
page read and write
|
||
1BD60000
|
trusted library allocation
|
page read and write
|
||
260AF5EF000
|
unkown
|
page execute and read and write
|
||
7FFAAC620000
|
trusted library allocation
|
page read and write
|
||
2B1F9F05000
|
heap
|
page read and write
|
||
507D000
|
heap
|
page read and write
|
||
7FFAAC5D8000
|
trusted library allocation
|
page read and write
|
||
1AEC0000
|
trusted library allocation
|
page read and write
|
||
7FFB0D748000
|
unkown
|
page readonly
|
||
60C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC34B000
|
trusted library allocation
|
page read and write
|
||
1BB30000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
1BD87840000
|
trusted library allocation
|
page read and write
|
||
7FF79EACF000
|
unkown
|
page readonly
|
||
7FFAAC5C0000
|
trusted library allocation
|
page read and write
|
||
1BD87787000
|
heap
|
page read and write
|
||
7FFAAC440000
|
trusted library allocation
|
page execute and read and write
|
||
1BD880CF000
|
heap
|
page read and write
|
||
2B1F9BD6000
|
heap
|
page read and write
|
||
7FFAAC640000
|
trusted library allocation
|
page read and write
|
||
203FF2D5000
|
heap
|
page read and write
|
||
1BD88044000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1BD88117000
|
heap
|
page read and write
|
||
1D8B0993000
|
heap
|
page read and write
|
||
7FFAAC7D0000
|
trusted library allocation
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
1BD8758D000
|
heap
|
page read and write
|
||
1BD88048000
|
heap
|
page read and write
|
||
1B8E0000
|
trusted library allocation
|
page read and write
|
||
1BD87787000
|
heap
|
page read and write
|
||
1BD8758B000
|
heap
|
page read and write
|
||
7FFAAC723000
|
trusted library allocation
|
page read and write
|
||
1BD85568000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
2B1F9DF4000
|
heap
|
page read and write
|
||
DA7000
|
heap
|
page read and write
|
||
1BD8778D000
|
heap
|
page read and write
|
||
1A7D0000
|
heap
|
page read and write
|
||
7FFB16791000
|
unkown
|
page execute read
|
||
506A000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
23BA000
|
trusted library allocation
|
page read and write
|
||
1BD88086000
|
heap
|
page read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
1BD88087000
|
heap
|
page read and write
|
||
1B680000
|
trusted library allocation
|
page read and write
|
||
203FE6C0000
|
unkown
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD87794000
|
heap
|
page read and write
|
||
1BD87778000
|
heap
|
page read and write
|
||
1AD8B000
|
stack
|
page read and write
|
||
1D8966B0000
|
trusted library allocation
|
page read and write
|
||
18C0F731000
|
trusted library allocation
|
page read and write
|
||
2330000
|
heap
|
page read and write
|
||
1BD8760B000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD8558B000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD85592000
|
heap
|
page read and write
|
||
1BD87593000
|
heap
|
page read and write
|
||
509C000
|
heap
|
page read and write
|
||
7DF44A1E0000
|
trusted library allocation
|
page execute and read and write
|
||
1BD877E4000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1BD877E8000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD88044000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
1BD8760B000
|
heap
|
page read and write
|
||
1BD877FC000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
286E000
|
stack
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1D898EDF000
|
trusted library allocation
|
page read and write
|
||
1BD8779D000
|
heap
|
page read and write
|
||
1BD880EF000
|
heap
|
page read and write
|
||
1BD8777E000
|
heap
|
page read and write
|
||
1BD875B7000
|
heap
|
page read and write
|
||
1BD8811F000
|
heap
|
page read and write
|
||
1BD877FF000
|
heap
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
81D837B000
|
stack
|
page read and write
|
||
7FF6E4C85000
|
direct allocation
|
page execute and read and write
|
||
5116000
|
heap
|
page read and write
|
||
7FF79EACF000
|
unkown
|
page readonly
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1B9A0000
|
trusted library allocation
|
page read and write
|
||
E4C22BE000
|
stack
|
page read and write
|
||
1B610000
|
trusted library allocation
|
page read and write
|
||
1ADFA000
|
trusted library allocation
|
page read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
2240000
|
trusted library allocation
|
page read and write
|
||
6C7000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
203FE71C000
|
unkown
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
791000
|
heap
|
page read and write
|
||
1BD88107000
|
heap
|
page read and write
|
||
1D897EE0000
|
trusted library allocation
|
page read and write
|
||
1AFF0000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
D3A000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1C9A0000
|
unkown
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
7FFAAC424000
|
trusted library allocation
|
page read and write
|
||
1BD87794000
|
heap
|
page read and write
|
||
1BD87787000
|
heap
|
page read and write
|
||
1B743000
|
trusted library allocation
|
page read and write
|
||
1BD877B5000
|
heap
|
page read and write
|
||
2A76000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
203FEE30000
|
heap
|
page read and write
|
||
1BD877D8000
|
heap
|
page read and write
|
||
1BD877F0000
|
heap
|
page read and write
|
||
1BD85591000
|
heap
|
page read and write
|
||
203FF2D5000
|
heap
|
page read and write
|
||
7FFAAC28B000
|
trusted library allocation
|
page read and write
|
||
1BD877A8000
|
heap
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
1D8B0560000
|
heap
|
page execute and read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1B97B000
|
stack
|
page read and write
|
||
1BD877A2000
|
heap
|
page read and write
|
||
203FF261000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD877C0000
|
heap
|
page read and write
|
||
1AF72000
|
heap
|
page read and write
|
||
1BD877FD000
|
heap
|
page read and write
|
||
1D8B05D1000
|
heap
|
page read and write
|
||
1AD00000
|
trusted library allocation
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
1B8C0000
|
trusted library allocation
|
page read and write
|
||
18C0EC72000
|
trusted library allocation
|
page read and write
|
||
1AEA0000
|
trusted library allocation
|
page read and write
|
||
2A71000
|
heap
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
1B8C3000
|
trusted library allocation
|
page read and write
|
||
1BD87622000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
18C0DA60000
|
trusted library allocation
|
page read and write
|
||
1BD880B0000
|
heap
|
page read and write
|
||
1D896690000
|
trusted library section
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1AED0000
|
heap
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
1BD877F3000
|
heap
|
page read and write
|
||
7FFAAC4D0000
|
trusted library allocation
|
page read and write
|
||
DA7000
|
heap
|
page read and write
|
||
7FFAAC3FC000
|
trusted library allocation
|
page execute and read and write
|
||
1B8C0000
|
trusted library allocation
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD878F0000
|
unkown
|
page read and write
|
||
D41000
|
heap
|
page read and write
|
||
1B8C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page read and write
|
||
2B1F9FB3000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BCE0000
|
trusted library allocation
|
page read and write
|
||
1BD87609000
|
heap
|
page read and write
|
||
18C26330000
|
heap
|
page read and write
|
||
201C1310000
|
heap
|
page readonly
|
||
1BCB0000
|
trusted library allocation
|
page read and write
|
||
1BD87787000
|
heap
|
page read and write
|
||
1BD877F6000
|
heap
|
page read and write
|
||
1BD85591000
|
heap
|
page read and write
|
||
7FFAAC457000
|
trusted library allocation
|
page read and write
|
||
313E000
|
trusted library allocation
|
page read and write
|
||
1B080000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4E0000
|
trusted library allocation
|
page read and write
|
||
18C0F743000
|
trusted library allocation
|
page read and write
|
||
2BCA304D000
|
heap
|
page read and write
|
||
7FFAAC38C000
|
trusted library allocation
|
page execute and read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD880C7000
|
heap
|
page read and write
|
||
1BD877D8000
|
heap
|
page read and write
|
||
2260000
|
trusted library allocation
|
page read and write
|
||
1BD877D8000
|
heap
|
page read and write
|
||
81D7B7E000
|
stack
|
page read and write
|
||
1BD877F2000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
7FFAAC790000
|
trusted library allocation
|
page read and write
|
||
1D897FE6000
|
heap
|
page read and write
|
||
1BD877BF000
|
heap
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1AED4000
|
heap
|
page read and write
|
||
1BD80000
|
trusted library allocation
|
page read and write
|
||
2D83000
|
heap
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
1AE50000
|
trusted library allocation
|
page read and write
|
||
5107000
|
heap
|
page read and write
|
||
203FE790000
|
heap
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
1D896734000
|
heap
|
page read and write
|
||
380000
|
heap
|
page read and write
|
||
1BC63000
|
trusted library allocation
|
page read and write
|
||
1BD875A1000
|
heap
|
page read and write
|
||
1BA30000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
81D7F76000
|
stack
|
page read and write
|
||
1BD8805F000
|
heap
|
page read and write
|
||
B798BFD000
|
stack
|
page read and write
|
||
E4C223E000
|
stack
|
page read and write
|
||
8D9CCFE000
|
stack
|
page read and write
|
||
2B1DFB88000
|
heap
|
page read and write
|
||
1BD8777F000
|
heap
|
page read and write
|
||
1D8B0618000
|
heap
|
page read and write
|
||
268D000
|
trusted library allocation
|
page read and write
|
||
1AFA0000
|
trusted library allocation
|
page read and write
|
||
1BC40000
|
trusted library allocation
|
page read and write
|
||
2B1DFC00000
|
heap
|
page read and write
|
||
2210000
|
trusted library section
|
page read and write
|
||
1A7F4000
|
heap
|
page read and write
|
||
2B1F9DB0000
|
heap
|
page execute and read and write
|
||
1BA30000
|
trusted library allocation
|
page read and write
|
||
2B1F9F79000
|
heap
|
page read and write
|
||
2D83000
|
heap
|
page read and write
|
||
2253000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
8D9D37E000
|
stack
|
page read and write
|
||
1BD8811F000
|
heap
|
page read and write
|
||
1BD87572000
|
heap
|
page read and write
|
||
1BD8777C000
|
heap
|
page read and write
|
||
1AEE0000
|
trusted library allocation
|
page read and write
|
||
1BD877FC000
|
heap
|
page read and write
|
||
2A36000
|
heap
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
1BD87792000
|
heap
|
page read and write
|
||
1BD8761B000
|
heap
|
page read and write
|
||
1BD877A8000
|
heap
|
page read and write
|
||
1BD88066000
|
heap
|
page read and write
|
||
1BCA2000
|
trusted library allocation
|
page read and write
|
||
1BD87579000
|
heap
|
page read and write
|
||
1BD87801000
|
heap
|
page read and write
|
||
1D899CDF000
|
trusted library allocation
|
page read and write
|
||
1BD50000
|
trusted library allocation
|
page read and write
|
||
1B6C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC460000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4C6CE0000
|
trusted library allocation
|
page execute and read and write
|
||
1BD87569000
|
heap
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1AEF6000
|
heap
|
page read and write
|
||
18C0C03D000
|
heap
|
page read and write
|
||
2B1F9E81000
|
heap
|
page read and write
|
||
B798B7A000
|
stack
|
page read and write
|
||
2257000
|
trusted library allocation
|
page read and write
|
||
1BB60000
|
trusted library allocation
|
page read and write
|
||
1B030000
|
trusted library allocation
|
page read and write
|
||
1AD0D000
|
stack
|
page read and write
|
||
18C26324000
|
heap
|
page read and write
|
||
1B8D0000
|
trusted library allocation
|
page read and write
|
||
1BD87778000
|
heap
|
page read and write
|
||
1BD877B5000
|
heap
|
page read and write
|
||
7FFAAC520000
|
trusted library allocation
|
page execute and read and write
|
||
18C0E0CB000
|
trusted library allocation
|
page read and write
|
||
28EE000
|
stack
|
page read and write
|
||
1BD87797000
|
heap
|
page read and write
|
||
2250000
|
trusted library allocation
|
page read and write
|
||
23C3000
|
trusted library allocation
|
page read and write
|
||
18C0FCDF000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
1B733000
|
trusted library allocation
|
page read and write
|
||
7FFAAC270000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
203FE78B000
|
heap
|
page read and write
|
||
1AE80000
|
trusted library allocation
|
page read and write
|
||
1BD877AC000
|
heap
|
page read and write
|
||
2BCA3159000
|
heap
|
page read and write
|
||
7FFAAC34D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC334000
|
trusted library allocation
|
page read and write
|
||
1D8A8464000
|
trusted library allocation
|
page read and write
|
||
1BD8777E000
|
heap
|
page read and write
|
||
1BC00000
|
trusted library allocation
|
page read and write
|
||
7FFAAC323000
|
trusted library allocation
|
page execute and read and write
|
||
1BD87794000
|
heap
|
page read and write
|
||
729000
|
heap
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1D8A8191000
|
trusted library allocation
|
page read and write
|
||
51A4000
|
heap
|
page read and write
|
||
1BD880D7000
|
heap
|
page read and write
|
||
1BD880F7000
|
heap
|
page read and write
|
||
1AEB3000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
2B1F1771000
|
trusted library allocation
|
page read and write
|
||
81D7E7E000
|
stack
|
page read and write
|
||
1BD8822A000
|
heap
|
page read and write
|
||
203FF316000
|
heap
|
page read and write
|
||
1C6C0000
|
unkown
|
page read and write
|
||
1BD875A3000
|
heap
|
page read and write
|
||
1BD88436000
|
heap
|
page read and write
|
||
7FF6E47F0000
|
direct allocation
|
page execute and read and write
|
||
7DF4D7030000
|
trusted library allocation
|
page execute and read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
1B023000
|
trusted library allocation
|
page read and write
|
||
2649000
|
trusted library allocation
|
page read and write
|
||
D45000
|
heap
|
page read and write
|
||
1BD87569000
|
heap
|
page read and write
|
||
1B760000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page read and write
|
||
E4C19CE000
|
stack
|
page read and write
|
||
1BC83000
|
trusted library allocation
|
page read and write
|
||
203FE7AD000
|
heap
|
page read and write
|
||
517E000
|
heap
|
page read and write
|
||
EC173FF000
|
stack
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1BD87714000
|
heap
|
page read and write
|
||
1B030000
|
trusted library allocation
|
page read and write
|
||
1B760000
|
trusted library allocation
|
page read and write
|
||
2B1F9E6B000
|
heap
|
page read and write
|
||
1BD877C8000
|
heap
|
page read and write
|
||
1BD877C4000
|
heap
|
page read and write
|
||
A94000
|
heap
|
page read and write
|
||
1BCF0000
|
trusted library allocation
|
page read and write
|
||
1B020000
|
trusted library allocation
|
page read and write
|
||
1BD87593000
|
heap
|
page read and write
|
||
1BD877E8000
|
heap
|
page read and write
|
||
1BC80000
|
trusted library allocation
|
page read and write
|
||
1B630000
|
trusted library allocation
|
page read and write
|
||
1AEC3000
|
heap
|
page read and write
|
There are 2763 hidden memdumps, click here to show them.