Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
I8YtUAUWeS.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\System User
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x48b142e9, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\System User.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
Generic INItialization configuration [WIN]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_24faipop.y05.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_24n3jbl3.ngk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dj2c2e2r.uvd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ekqdfyc2.5xv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f3mbwosb.lgb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fcxhqtgk.ji4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gl3hoeq1.0o0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mbaiwadm.fsy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p55zf3nn.che.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pxg4ciea.txp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rgkm03yo.vza.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s0ojefhf.v2r.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_swoq54dy.glm.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vexyftkz.y54.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y0t3uxtp.5uz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yxoysyw0.2qs.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System User.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Oct 13 15:54:55
2024, mtime=Sun Oct 13 15:54:55 2024, atime=Sun Oct 13 15:54:55 2024, length=70144, window=hide
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
There are 16 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\I8YtUAUWeS.exe
|
"C:\Users\user\Desktop\I8YtUAUWeS.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\I8YtUAUWeS.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'I8YtUAUWeS.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\System
User'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System
User'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System User" /tr "C:\Users\user\AppData\Roaming\System
User"
|
||
C:\Users\user\AppData\Roaming\System User
|
"C:\Users\user\AppData\Roaming\System User"
|
||
C:\Users\user\AppData\Roaming\System User
|
"C:\Users\user\AppData\Roaming\System User"
|
||
C:\Users\user\AppData\Roaming\System User
|
"C:\Users\user\AppData\Roaming\System User"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe -Embedding
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\OpenWith.exe
|
C:\Windows\system32\OpenWith.exe -Embedding
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
147.185.221.23
|
|||
https://g.live.com/odclientsettings/Prod/C:
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://crl.microso
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://crl.microsK
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV2.C:
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://crl.micr
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.mioft.sito
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 11 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
147.185.221.23
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
System User
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\mspaint.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\mspaint.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
There are 10 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
FE2000
|
unkown
|
page readonly
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
6338FB6000
|
stack
|
page read and write
|
||
282E081E000
|
heap
|
page read and write
|
||
282E0FC8000
|
heap
|
page read and write
|
||
282E0E95000
|
heap
|
page read and write
|
||
1C259EC1000
|
trusted library allocation
|
page read and write
|
||
282E1018000
|
heap
|
page read and write
|
||
282E0E59000
|
heap
|
page read and write
|
||
1C0ED000
|
heap
|
page read and write
|
||
1940000
|
heap
|
page read and write
|
||
251C6FE000
|
stack
|
page read and write
|
||
210E0CCE000
|
heap
|
page read and write
|
||
22E42790000
|
heap
|
page execute and read and write
|
||
282DEEBC000
|
heap
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
F38B47E000
|
stack
|
page read and write
|
||
1EC07370000
|
trusted library allocation
|
page read and write
|
||
23756F1F000
|
heap
|
page read and write
|
||
202E1C80000
|
trusted library allocation
|
page read and write
|
||
251CCFE000
|
stack
|
page read and write
|
||
282E0E5E000
|
heap
|
page read and write
|
||
202F22DF000
|
trusted library allocation
|
page read and write
|
||
26AB8FE000
|
stack
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
23756FF9000
|
heap
|
page read and write
|
||
1833000
|
trusted library allocation
|
page read and write
|
||
23756E44000
|
heap
|
page read and write
|
||
251D67E000
|
unkown
|
page readonly
|
||
282E101C000
|
heap
|
page read and write
|
||
210FAE30000
|
heap
|
page read and write
|
||
23756E4C000
|
heap
|
page read and write
|
||
12893000
|
trusted library allocation
|
page read and write
|
||
202E04A0000
|
heap
|
page read and write
|
||
26AB9F9000
|
stack
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
22E2B768000
|
trusted library allocation
|
page read and write
|
||
23754FE1000
|
heap
|
page read and write
|
||
22E2B3AF000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
282E0E99000
|
heap
|
page read and write
|
||
1EC074A0000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
282E07C3000
|
heap
|
page read and write
|
||
210E0C55000
|
heap
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
23756FEF000
|
heap
|
page read and write
|
||
23754ED0000
|
heap
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
282E0E89000
|
heap
|
page read and write
|
||
251CFFE000
|
stack
|
page read and write
|
||
1EC01EA2000
|
heap
|
page read and write
|
||
30D1000
|
trusted library allocation
|
page read and write
|
||
7DF4D5590000
|
trusted library allocation
|
page execute and read and write
|
||
F38B5F9000
|
stack
|
page read and write
|
||
23756E6A000
|
heap
|
page read and write
|
||
282E0E93000
|
heap
|
page read and write
|
||
23756E12000
|
heap
|
page read and write
|
||
22E284E0000
|
heap
|
page read and write
|
||
210E3F78000
|
trusted library allocation
|
page read and write
|
||
6338F3E000
|
stack
|
page read and write
|
||
23756E3C000
|
heap
|
page read and write
|
||
1C24B005000
|
trusted library allocation
|
page read and write
|
||
282E0F3A000
|
heap
|
page read and write
|
||
26ABDFE000
|
stack
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
31A1000
|
trusted library allocation
|
page read and write
|
||
282E0FD8000
|
heap
|
page read and write
|
||
237595C7000
|
heap
|
page read and write
|
||
282E0F68000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
23756E59000
|
heap
|
page read and write
|
||
1EC07384000
|
trusted library allocation
|
page read and write
|
||
23756E35000
|
heap
|
page read and write
|
||
282E0E72000
|
heap
|
page read and write
|
||
202E0360000
|
heap
|
page read and write
|
||
210E4083000
|
trusted library allocation
|
page read and write
|
||
23756E67000
|
heap
|
page read and write
|
||
282E0E46000
|
heap
|
page read and write
|
||
156C000
|
heap
|
page read and write
|
||
282E0E72000
|
heap
|
page read and write
|
||
237595CC000
|
heap
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
6338C7E000
|
stack
|
page read and write
|
||
251BA7E000
|
unkown
|
page readonly
|
||
1EC02602000
|
heap
|
page read and write
|
||
23756E48000
|
heap
|
page read and write
|
||
1EC074FA000
|
heap
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
23756E4C000
|
heap
|
page read and write
|
||
282DEE89000
|
heap
|
page read and write
|
||
251C8FE000
|
stack
|
page read and write
|
||
1EC074A2000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page execute and read and write
|
||
202FA366000
|
heap
|
page read and write
|
||
23756F05000
|
heap
|
page read and write
|
||
7FF84916C000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
22E2B874000
|
trusted library allocation
|
page read and write
|
||
282E0E87000
|
heap
|
page read and write
|
||
237595DA000
|
heap
|
page read and write
|
||
633903A000
|
stack
|
page read and write
|
||
282DEE5E000
|
heap
|
page read and write
|
||
282E0FC8000
|
heap
|
page read and write
|
||
1C05F000
|
stack
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
23756E40000
|
heap
|
page read and write
|
||
230C2CE000
|
stack
|
page read and write
|
||
282E0E41000
|
heap
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
1C24B23B000
|
trusted library allocation
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
282E0E6D000
|
heap
|
page read and write
|
||
282E0F60000
|
heap
|
page read and write
|
||
1EC074EE000
|
heap
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
23756E53000
|
heap
|
page read and write
|
||
1C24ABAA000
|
trusted library allocation
|
page read and write
|
||
23756FE8000
|
heap
|
page read and write
|
||
282E0E59000
|
heap
|
page read and write
|
||
23754E90000
|
heap
|
page read and write
|
||
23756E49000
|
heap
|
page read and write
|
||
282E0F5E000
|
heap
|
page read and write
|
||
7FF848FE2000
|
trusted library allocation
|
page read and write
|
||
210E2590000
|
trusted library allocation
|
page read and write
|
||
7DF4D55A0000
|
trusted library allocation
|
page execute and read and write
|
||
282E0EA1000
|
heap
|
page read and write
|
||
7FF849094000
|
trusted library allocation
|
page read and write
|
||
23754FE1000
|
heap
|
page read and write
|
||
23756E12000
|
heap
|
page read and write
|
||
210E27A0000
|
heap
|
page execute and read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
282E0E8F000
|
heap
|
page read and write
|
||
282E0E82000
|
heap
|
page read and write
|
||
2375B742000
|
trusted library allocation
|
page read and write
|
||
210E45D1000
|
trusted library allocation
|
page read and write
|
||
2375500C000
|
heap
|
page read and write
|
||
23754FE9000
|
heap
|
page read and write
|
||
282E0E87000
|
heap
|
page read and write
|
||
237595A4000
|
heap
|
page read and write
|
||
282E0E8B000
|
heap
|
page read and write
|
||
282E0EA1000
|
heap
|
page read and write
|
||
282DEEAD000
|
heap
|
page read and write
|
||
282E0E64000
|
heap
|
page read and write
|
||
282E0E72000
|
heap
|
page read and write
|
||
202E04A5000
|
heap
|
page read and write
|
||
1C262350000
|
heap
|
page execute and read and write
|
||
237595B4000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
1C248362000
|
heap
|
page read and write
|
||
7FF84918C000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
1C0B6000
|
heap
|
page read and write
|
||
23756FA5000
|
heap
|
page read and write
|
||
202FA5DB000
|
heap
|
page read and write
|
||
251D47E000
|
unkown
|
page readonly
|
||
210F2811000
|
trusted library allocation
|
page read and write
|
||
289F000
|
trusted library allocation
|
page read and write
|
||
210E3A9A000
|
trusted library allocation
|
page read and write
|
||
210E0EB5000
|
heap
|
page read and write
|
||
210F2AE0000
|
trusted library allocation
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
1BCFE000
|
stack
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
1C2622B7000
|
heap
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
134A000
|
heap
|
page read and write
|
||
23756E4C000
|
heap
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
26AB5DE000
|
stack
|
page read and write
|
||
1EC073B0000
|
trusted library allocation
|
page read and write
|
||
23756E15000
|
heap
|
page read and write
|
||
202F1F61000
|
trusted library allocation
|
page read and write
|
||
1C24AF91000
|
trusted library allocation
|
page read and write
|
||
282E5475000
|
heap
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
1EC02713000
|
heap
|
page read and write
|
||
210E0B90000
|
heap
|
page read and write
|
||
1C24B149000
|
trusted library allocation
|
page read and write
|
||
23756E5D000
|
heap
|
page read and write
|
||
7FF848FE4000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
22E28505000
|
heap
|
page read and write
|
||
210FAEFA000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
251CF7E000
|
unkown
|
page readonly
|
||
23756E5D000
|
heap
|
page read and write
|
||
1EC02615000
|
heap
|
page read and write
|
||
22E29FE1000
|
trusted library allocation
|
page read and write
|
||
23756E6A000
|
heap
|
page read and write
|
||
1EC02F40000
|
trusted library section
|
page readonly
|
||
FF4000
|
unkown
|
page readonly
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
7FF849164000
|
trusted library allocation
|
page read and write
|
||
7FF848FE8000
|
trusted library allocation
|
page read and write
|
||
23756E77000
|
heap
|
page read and write
|
||
202E1CB0000
|
heap
|
page readonly
|
||
282DEE74000
|
heap
|
page read and write
|
||
A9F2CC7000
|
stack
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
282E0E7D000
|
heap
|
page read and write
|
||
210E3790000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
23756E6F000
|
heap
|
page read and write
|
||
1C2484E0000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
23754FF8000
|
heap
|
page read and write
|
||
1D18C000
|
stack
|
page read and write
|
||
26ABCF8000
|
stack
|
page read and write
|
||
210FAD19000
|
heap
|
page read and write
|
||
282E0E82000
|
heap
|
page read and write
|
||
282E0E68000
|
heap
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
282DEDE0000
|
heap
|
page read and write
|
||
1C24844B000
|
heap
|
page read and write
|
||
1BEFE000
|
stack
|
page read and write
|
||
22E28550000
|
trusted library section
|
page read and write
|
||
251C97E000
|
unkown
|
page readonly
|
||
202F2249000
|
trusted library allocation
|
page read and write
|
||
98B1D7E000
|
stack
|
page read and write
|
||
A9F35FF000
|
stack
|
page read and write
|
||
26ABF7B000
|
stack
|
page read and write
|
||
282E5473000
|
heap
|
page read and write
|
||
23756E58000
|
heap
|
page read and write
|
||
1EC074DF000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
210E33F7000
|
trusted library allocation
|
page read and write
|
||
131A8000
|
trusted library allocation
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
22E2BDC1000
|
trusted library allocation
|
page read and write
|
||
1C25A18E000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
23756F2E000
|
heap
|
page read and write
|
||
22E42900000
|
heap
|
page read and write
|
||
23754FF5000
|
heap
|
page read and write
|
||
F38C54C000
|
stack
|
page read and write
|
||
23756E72000
|
heap
|
page read and write
|
||
23754FEE000
|
heap
|
page read and write
|
||
23756E66000
|
heap
|
page read and write
|
||
22E29EE0000
|
trusted library allocation
|
page read and write
|
||
1C24B70D000
|
trusted library allocation
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
251C37B000
|
stack
|
page read and write
|
||
31AC000
|
trusted library allocation
|
page read and write
|
||
1496000
|
heap
|
page read and write
|
||
22E2B92C000
|
trusted library allocation
|
page read and write
|
||
22E42B10000
|
heap
|
page read and write
|
||
1C24B796000
|
trusted library allocation
|
page read and write
|
||
23756F84000
|
heap
|
page read and write
|
||
7FF849008000
|
trusted library allocation
|
page read and write
|
||
98B1E7E000
|
stack
|
page read and write
|
||
E6F000
|
stack
|
page read and write
|
||
202F2230000
|
trusted library allocation
|
page read and write
|
||
23756E77000
|
heap
|
page read and write
|
||
7FF848FA2000
|
trusted library allocation
|
page read and write
|
||
202E37D4000
|
trusted library allocation
|
page read and write
|
||
23756F2F000
|
heap
|
page read and write
|
||
210F2ADB000
|
trusted library allocation
|
page read and write
|
||
1EC01F13000
|
heap
|
page read and write
|
||
202E315D000
|
trusted library allocation
|
page read and write
|
||
282E081D000
|
heap
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
23756E4C000
|
heap
|
page read and write
|
||
1C248540000
|
heap
|
page read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
1BDD7025000
|
heap
|
page read and write
|
||
210E3421000
|
trusted library allocation
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
7FF849290000
|
trusted library allocation
|
page read and write
|
||
1C24838D000
|
heap
|
page read and write
|
||
98B22FB000
|
stack
|
page read and write
|
||
23756E4C000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
23756E53000
|
heap
|
page read and write
|
||
23756E6E000
|
heap
|
page read and write
|
||
23756E3D000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
1C25A123000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
5CA4DEE000
|
unkown
|
page read and write
|
||
23756E40000
|
heap
|
page read and write
|
||
23754FFD000
|
heap
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
2880000
|
heap
|
page execute and read and write
|
||
210E39CD000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
22E285BB000
|
heap
|
page read and write
|
||
23756E4C000
|
heap
|
page read and write
|
||
23756E72000
|
heap
|
page read and write
|
||
210E2510000
|
heap
|
page readonly
|
||
202E2992000
|
trusted library allocation
|
page read and write
|
||
22E2AED5000
|
trusted library allocation
|
page read and write
|
||
1C248330000
|
trusted library allocation
|
page read and write
|
||
1B230000
|
heap
|
page execute and read and write
|
||
7D0000
|
heap
|
page read and write
|
||
F38B37F000
|
stack
|
page read and write
|
||
132E1000
|
trusted library allocation
|
page read and write
|
||
23756E6A000
|
heap
|
page read and write
|
||
1EC01E5C000
|
heap
|
page read and write
|
||
282E0FD8000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
282E0E5E000
|
heap
|
page read and write
|
||
22E2B28E000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
B69000
|
heap
|
page read and write
|
||
1C24B1AB000
|
trusted library allocation
|
page read and write
|
||
282E0FB6000
|
heap
|
page read and write
|
||
22E2BE06000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
202E3D47000
|
trusted library allocation
|
page read and write
|
||
210FAD50000
|
heap
|
page read and write
|
||
282E0E67000
|
heap
|
page read and write
|
||
210FAC10000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
282E0E82000
|
heap
|
page read and write
|
||
23754FED000
|
heap
|
page read and write
|
||
1C2483D4000
|
heap
|
page read and write
|
||
202E03A5000
|
heap
|
page read and write
|
||
23756F56000
|
heap
|
page read and write
|
||
1C0E3000
|
heap
|
page read and write
|
||
202E36C9000
|
trusted library allocation
|
page read and write
|
||
210E0C0F000
|
heap
|
page read and write
|
||
22E3A2D7000
|
trusted library allocation
|
page read and write
|
||
251B6FE000
|
stack
|
page read and write
|
||
210FAF8D000
|
heap
|
page read and write
|
||
23756E40000
|
heap
|
page read and write
|
||
23756F3B000
|
heap
|
page read and write
|
||
1B52E000
|
stack
|
page read and write
|
||
282E0FEC000
|
heap
|
page read and write
|
||
23756E2C000
|
heap
|
page read and write
|
||
26ABAF7000
|
stack
|
page read and write
|
||
237595B3000
|
heap
|
page read and write
|
||
230B4F8000
|
stack
|
page read and write
|
||
251C07E000
|
unkown
|
page readonly
|
||
282E0F4E000
|
heap
|
page read and write
|
||
22E2AD52000
|
trusted library allocation
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
15C2000
|
heap
|
page read and write
|
||
282E0E86000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page execute and read and write
|
||
23756965000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
23756E19000
|
heap
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
23755001000
|
heap
|
page read and write
|
||
22E29F30000
|
trusted library allocation
|
page read and write
|
||
1EC07610000
|
trusted library allocation
|
page read and write
|
||
26ABC79000
|
stack
|
page read and write
|
||
23756F5D000
|
heap
|
page read and write
|
||
282E0F5E000
|
heap
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
1C248545000
|
heap
|
page read and write
|
||
1C2482A0000
|
heap
|
page read and write
|
||
1EC01E9E000
|
heap
|
page read and write
|
||
1C25A197000
|
trusted library allocation
|
page read and write
|
||
1352000
|
heap
|
page read and write
|
||
282DEEAC000
|
heap
|
page read and write
|
||
282E0E68000
|
heap
|
page read and write
|
||
1BDD6FC0000
|
heap
|
page read and write
|
||
282E0F6F000
|
heap
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
22E428F9000
|
heap
|
page read and write
|
||
282E0E9B000
|
heap
|
page read and write
|
||
282E0E59000
|
heap
|
page read and write
|
||
166F000
|
stack
|
page read and write
|
||
1C24B0B6000
|
trusted library allocation
|
page read and write
|
||
282E5475000
|
heap
|
page read and write
|
||
22E42555000
|
heap
|
page read and write
|
||
22E428E2000
|
heap
|
page read and write
|
||
23756E66000
|
heap
|
page read and write
|
||
130D3000
|
trusted library allocation
|
page read and write
|
||
23759050000
|
trusted library allocation
|
page read and write
|
||
282E0FE8000
|
heap
|
page read and write
|
||
23756F62000
|
heap
|
page read and write
|
||
210F2AE8000
|
trusted library allocation
|
page read and write
|
||
22E284B0000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
23756E2B000
|
heap
|
page read and write
|
||
210E2550000
|
trusted library allocation
|
page read and write
|
||
210FAFB9000
|
heap
|
page read and write
|
||
282E0E97000
|
heap
|
page read and write
|
||
282E0E82000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
23756E40000
|
heap
|
page read and write
|
||
282E0E5D000
|
heap
|
page read and write
|
||
1BF5E000
|
stack
|
page read and write
|
||
210E2500000
|
trusted library allocation
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
1EC074F3000
|
heap
|
page read and write
|
||
23756E5D000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
282E0F44000
|
heap
|
page read and write
|
||
98B1EFD000
|
stack
|
page read and write
|
||
1111000
|
stack
|
page read and write
|
||
7FF848FC1000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
23756E6E000
|
heap
|
page read and write
|
||
23756E7E000
|
heap
|
page read and write
|
||
1C894000
|
stack
|
page read and write
|
||
5CA4D69000
|
stack
|
page read and write
|
||
1BDD6EA0000
|
heap
|
page read and write
|
||
1C259F10000
|
trusted library allocation
|
page read and write
|
||
202E2EA8000
|
trusted library allocation
|
page read and write
|
||
23756E4C000
|
heap
|
page read and write
|
||
282DEEA9000
|
heap
|
page read and write
|
||
282E0E54000
|
heap
|
page read and write
|
||
230B27E000
|
stack
|
page read and write
|
||
23756E3A000
|
heap
|
page read and write
|
||
202E1DB6000
|
heap
|
page read and write
|
||
282E0E76000
|
heap
|
page read and write
|
||
23756E1C000
|
heap
|
page read and write
|
||
282E5473000
|
heap
|
page read and write
|
||
1C24B227000
|
trusted library allocation
|
page read and write
|
||
7FF849174000
|
trusted library allocation
|
page read and write
|
||
1B310000
|
trusted library allocation
|
page read and write
|
||
22E2B2C2000
|
trusted library allocation
|
page read and write
|
||
282E0F9D000
|
heap
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
1C25A1A7000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
26ABE7E000
|
stack
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
22E285E7000
|
heap
|
page read and write
|
||
1EC07443000
|
heap
|
page read and write
|
||
F38B4F7000
|
stack
|
page read and write
|
||
282DEE9B000
|
heap
|
page read and write
|
||
23756F2A000
|
heap
|
page read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
1EC07690000
|
trusted library allocation
|
page read and write
|
||
22E2B2F5000
|
trusted library allocation
|
page read and write
|
||
7DF4048D0000
|
trusted library allocation
|
page execute and read and write
|
||
23756F56000
|
heap
|
page read and write
|
||
282E0E9B000
|
heap
|
page read and write
|
||
251C67E000
|
unkown
|
page readonly
|
||
282E0E6D000
|
heap
|
page read and write
|
||
230AFFF000
|
stack
|
page read and write
|
||
23756E48000
|
heap
|
page read and write
|
||
1BDFF000
|
stack
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
282E0E65000
|
heap
|
page read and write
|
||
282E0E59000
|
heap
|
page read and write
|
||
2375500D000
|
heap
|
page read and write
|
||
282E5473000
|
heap
|
page read and write
|
||
282E0E64000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
1830000
|
trusted library allocation
|
page read and write
|
||
22E427DA000
|
heap
|
page read and write
|
||
23756E12000
|
heap
|
page read and write
|
||
282E0FFC000
|
heap
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
282E0E6D000
|
heap
|
page read and write
|
||
1C26258C000
|
heap
|
page read and write
|
||
251B977000
|
stack
|
page read and write
|
||
22E4250F000
|
heap
|
page read and write
|
||
23756E5D000
|
heap
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
131A1000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
282E0E6E000
|
heap
|
page read and write
|
||
23754FE7000
|
heap
|
page read and write
|
||
6339E09000
|
stack
|
page read and write
|
||
282E0E93000
|
heap
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
23756E4C000
|
heap
|
page read and write
|
||
1EC07320000
|
trusted library allocation
|
page read and write
|
||
282E0E5E000
|
heap
|
page read and write
|
||
F38C44D000
|
stack
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
23756E6F000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
1C248374000
|
heap
|
page read and write
|
||
1EC074EE000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
282E0F5C000
|
heap
|
page read and write
|
||
210E3887000
|
trusted library allocation
|
page read and write
|
||
F38B57D000
|
stack
|
page read and write
|
||
282DEE98000
|
heap
|
page read and write
|
||
230B87E000
|
stack
|
page read and write
|
||
230C34E000
|
stack
|
page read and write
|
||
1EC07380000
|
trusted library allocation
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
202FA677000
|
heap
|
page read and write
|
||
282E0E5A000
|
heap
|
page read and write
|
||
282E0E6D000
|
heap
|
page read and write
|
||
26ACA4E000
|
stack
|
page read and write
|
||
23756E39000
|
heap
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
1C2621E0000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
230AF3E000
|
stack
|
page read and write
|
||
282E0E71000
|
heap
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
7FF84922C000
|
trusted library allocation
|
page read and write
|
||
210FAFB5000
|
heap
|
page read and write
|
||
131A3000
|
trusted library allocation
|
page read and write
|
||
23756E40000
|
heap
|
page read and write
|
||
282E0E54000
|
heap
|
page read and write
|
||
771000
|
stack
|
page read and write
|
||
23756E77000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
17B0000
|
heap
|
page read and write
|
||
23756E6A000
|
heap
|
page read and write
|
||
202FA687000
|
heap
|
page read and write
|
||
1C2622A8000
|
heap
|
page read and write
|
||
1EC076E0000
|
remote allocation
|
page read and write
|
||
282DEED3000
|
heap
|
page read and write
|
||
26ACB4C000
|
stack
|
page read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
230B3F7000
|
stack
|
page read and write
|
||
1C248377000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
282DEE8B000
|
heap
|
page read and write
|
||
1C24AFC6000
|
trusted library allocation
|
page read and write
|
||
202E3252000
|
trusted library allocation
|
page read and write
|
||
282E0E72000
|
heap
|
page read and write
|
||
23756FEC000
|
heap
|
page read and write
|
||
1C262239000
|
heap
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
2375503C000
|
heap
|
page read and write
|
||
210E25E0000
|
heap
|
page read and write
|
||
282E0E40000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
23754FFC000
|
heap
|
page read and write
|
||
282E0F7C000
|
heap
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
282E0E82000
|
heap
|
page read and write
|
||
23756E4C000
|
heap
|
page read and write
|
||
7FF849169000
|
trusted library allocation
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
23754FFB000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
309E000
|
stack
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
282E0810000
|
heap
|
page read and write
|
||
1EC01E77000
|
heap
|
page read and write
|
||
22E3A051000
|
trusted library allocation
|
page read and write
|
||
282E0E90000
|
heap
|
page read and write
|
||
282E0E90000
|
heap
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
1EC076E0000
|
remote allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
210E0AB0000
|
heap
|
page read and write
|
||
23756E72000
|
heap
|
page read and write
|
||
237568D0000
|
heap
|
page read and write
|
||
251CB7E000
|
stack
|
page read and write
|
||
202E37AE000
|
trusted library allocation
|
page read and write
|
||
282E0E8B000
|
heap
|
page read and write
|
||
23756E53000
|
heap
|
page read and write
|
||
BC7000
|
heap
|
page read and write
|
||
202FA780000
|
heap
|
page read and write
|
||
7FF8491F3000
|
trusted library allocation
|
page read and write
|
||
282DEEB7000
|
heap
|
page read and write
|
||
202FA284000
|
heap
|
page read and write
|
||
282E0E95000
|
heap
|
page read and write
|
||
210FACA1000
|
heap
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
210E25E5000
|
heap
|
page read and write
|
||
251D17B000
|
stack
|
page read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
23756E11000
|
heap
|
page read and write
|
||
282DEE82000
|
heap
|
page read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
A9F2D4E000
|
stack
|
page read and write
|
||
1EC01DC0000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
237595D7000
|
heap
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
23756E48000
|
heap
|
page read and write
|
||
12F1000
|
stack
|
page read and write
|
||
23756E53000
|
heap
|
page read and write
|
||
202E3124000
|
trusted library allocation
|
page read and write
|
||
1C25A2FD000
|
trusted library allocation
|
page read and write
|
||
23756F56000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
282DEE6F000
|
heap
|
page read and write
|
||
210E27F1000
|
trusted library allocation
|
page read and write
|
||
237595D7000
|
heap
|
page read and write
|
||
22E2AFE6000
|
trusted library allocation
|
page read and write
|
||
23756E4C000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF84927D000
|
trusted library allocation
|
page read and write
|
||
22E428EB000
|
heap
|
page read and write
|
||
1B86C000
|
stack
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1EC07340000
|
trusted library allocation
|
page read and write
|
||
98B1FFE000
|
stack
|
page read and write
|
||
23756E48000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
1335000
|
heap
|
page read and write
|
||
23756E67000
|
heap
|
page read and write
|
||
23754FED000
|
heap
|
page read and write
|
||
282E0E76000
|
heap
|
page read and write
|
||
1EC0271A000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
282E0E89000
|
heap
|
page read and write
|
||
1EC01D90000
|
heap
|
page read and write
|
||
2375504A000
|
heap
|
page read and write
|
||
202E31F1000
|
trusted library allocation
|
page read and write
|
||
22E3A2CF000
|
trusted library allocation
|
page read and write
|
||
1BE50000
|
heap
|
page execute and read and write
|
||
1EC02F50000
|
trusted library section
|
page readonly
|
||
134C000
|
heap
|
page read and write
|
||
282E0E8B000
|
heap
|
page read and write
|
||
202FA420000
|
heap
|
page execute and read and write
|
||
1BDD6DB0000
|
heap
|
page read and write
|
||
1EC02F30000
|
trusted library section
|
page readonly
|
||
F38B8FE000
|
stack
|
page read and write
|
||
1C2625D2000
|
heap
|
page read and write
|
||
1EC02702000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page execute and read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
23754FE7000
|
heap
|
page read and write
|
||
282E0FC8000
|
heap
|
page read and write
|
||
23756E77000
|
heap
|
page read and write
|
||
23756FAB000
|
heap
|
page read and write
|
||
7FF849188000
|
trusted library allocation
|
page read and write
|
||
282E0E50000
|
heap
|
page read and write
|
||
202E039C000
|
heap
|
page read and write
|
||
22E425C0000
|
heap
|
page execute and read and write
|
||
23756F1D000
|
heap
|
page read and write
|
||
22E285A9000
|
heap
|
page read and write
|
||
1379000
|
heap
|
page read and write
|
||
7FF4A32E0000
|
trusted library allocation
|
page execute and read and write
|
||
23756E26000
|
heap
|
page read and write
|
||
22E2ABE7000
|
trusted library allocation
|
page read and write
|
||
282E5AF0000
|
heap
|
page readonly
|
||
23756E1C000
|
heap
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
282E0E8B000
|
heap
|
page read and write
|
||
282E0E71000
|
heap
|
page read and write
|
||
7FF849182000
|
trusted library allocation
|
page read and write
|
||
282E0E97000
|
heap
|
page read and write
|
||
26AB97F000
|
stack
|
page read and write
|
||
12898000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
210FAEEE000
|
heap
|
page read and write
|
||
7FF849153000
|
trusted library allocation
|
page read and write
|
||
23756E53000
|
heap
|
page read and write
|
||
251BF7C000
|
stack
|
page read and write
|
||
1BDD6EA8000
|
heap
|
page read and write
|
||
98B1F7E000
|
stack
|
page read and write
|
||
282E0E9B000
|
heap
|
page read and write
|
||
23754FEC000
|
heap
|
page read and write
|
||
202FA32C000
|
heap
|
page read and write
|
||
23756E72000
|
heap
|
page read and write
|
||
1EC07680000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
heap
|
page execute and read and write
|
||
23756E66000
|
heap
|
page read and write
|
||
1C262265000
|
heap
|
page read and write
|
||
282E07A0000
|
heap
|
page read and write
|
||
282E0E8B000
|
heap
|
page read and write
|
||
210E286A000
|
trusted library allocation
|
page read and write
|
||
23755044000
|
heap
|
page read and write
|
||
282E0E82000
|
heap
|
page read and write
|
||
282E0E9D000
|
heap
|
page read and write
|
||
23754F50000
|
heap
|
page read and write
|
||
282DEE74000
|
heap
|
page read and write
|
||
633913E000
|
stack
|
page read and write
|
||
282E0E72000
|
heap
|
page read and write
|
||
7FF84920E000
|
trusted library allocation
|
page read and write
|
||
282E0E8D000
|
heap
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page execute and read and write
|
||
23756E40000
|
heap
|
page read and write
|
||
251B87E000
|
unkown
|
page readonly
|
||
202E03BD000
|
heap
|
page read and write
|
||
282E0FEB000
|
heap
|
page read and write
|
||
282E0F64000
|
heap
|
page read and write
|
||
202E2B39000
|
trusted library allocation
|
page read and write
|
||
1338000
|
heap
|
page read and write
|
||
282E0E84000
|
heap
|
page read and write
|
||
282E0E40000
|
heap
|
page read and write
|
||
282E0E76000
|
heap
|
page read and write
|
||
1C262222000
|
heap
|
page read and write
|
||
1EC02F20000
|
trusted library section
|
page readonly
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
1EC01EAE000
|
heap
|
page read and write
|
||
181E000
|
stack
|
page read and write
|
||
1EC02991000
|
trusted library allocation
|
page read and write
|
||
1C24B07D000
|
trusted library allocation
|
page read and write
|
||
7FF849178000
|
trusted library allocation
|
page read and write
|
||
202E2EB0000
|
trusted library allocation
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page read and write
|
||
1EC01E00000
|
heap
|
page read and write
|
||
202FA3F0000
|
heap
|
page execute and read and write
|
||
282E0E82000
|
heap
|
page read and write
|
||
22E2B1C1000
|
trusted library allocation
|
page read and write
|
||
2F0E000
|
stack
|
page read and write
|
||
23756F25000
|
heap
|
page read and write
|
||
202FA654000
|
heap
|
page read and write
|
||
A9F34FB000
|
stack
|
page read and write
|
||
23756F2E000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
23756E6B000
|
heap
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
23756E53000
|
heap
|
page read and write
|
||
202E30F1000
|
trusted library allocation
|
page read and write
|
||
23756E23000
|
heap
|
page read and write
|
||
7FF848FA2000
|
trusted library allocation
|
page read and write
|
||
A9F2DCE000
|
stack
|
page read and write
|
||
130D1000
|
trusted library allocation
|
page read and write
|
||
1500000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
282E0F3B000
|
heap
|
page read and write
|
||
28A1000
|
trusted library allocation
|
page read and write
|
||
282E0E5F000
|
heap
|
page read and write
|
||
1C24AF61000
|
trusted library allocation
|
page read and write
|
||
1EC01EFE000
|
heap
|
page read and write
|
||
23756E79000
|
heap
|
page read and write
|
||
210E33E7000
|
trusted library allocation
|
page read and write
|
||
282E0E7F000
|
heap
|
page read and write
|
||
23756F2E000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
282DEE8F000
|
heap
|
page read and write
|
||
2375501C000
|
heap
|
page read and write
|
||
282E0E82000
|
heap
|
page read and write
|
||
22E429B0000
|
trusted library allocation
|
page read and write
|
||
22E2AC3B000
|
trusted library allocation
|
page read and write
|
||
1C24838F000
|
heap
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
7FF848FF2000
|
trusted library allocation
|
page read and write
|
||
23756FE8000
|
heap
|
page read and write
|
||
23754FE7000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
23756960000
|
heap
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
1EC07502000
|
heap
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
22E29FD0000
|
heap
|
page read and write
|
||
202E03A7000
|
heap
|
page read and write
|
||
22E28560000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
22E42569000
|
heap
|
page read and write
|
||
16FF000
|
stack
|
page read and write
|
||
282DEEA5000
|
heap
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
230B77E000
|
stack
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
22E29ED0000
|
trusted library section
|
page read and write
|
||
282DEE79000
|
heap
|
page read and write
|
||
282E0E6D000
|
heap
|
page read and write
|
||
282E0E82000
|
heap
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
1C2625B5000
|
heap
|
page read and write
|
||
282E5475000
|
heap
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
2375696D000
|
heap
|
page read and write
|
||
1C24B1E3000
|
trusted library allocation
|
page read and write
|
||
251B7FE000
|
stack
|
page read and write
|
||
282E5460000
|
heap
|
page read and write
|
||
1EC01DD0000
|
trusted library section
|
page read and write
|
||
156E000
|
heap
|
page read and write
|
||
251C77E000
|
unkown
|
page readonly
|
||
23755005000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
23756E6A000
|
heap
|
page read and write
|
||
23755044000
|
heap
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
282E3800000
|
heap
|
page read and write
|
||
202E2EA4000
|
trusted library allocation
|
page read and write
|
||
282E0E97000
|
heap
|
page read and write
|
||
1EC074F3000
|
heap
|
page read and write
|
||
2891000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page execute and read and write
|
||
282E0E6D000
|
heap
|
page read and write
|
||
1C2484A0000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
230B7FC000
|
stack
|
page read and write
|
||
633897F000
|
stack
|
page read and write
|
||
251CD7E000
|
unkown
|
page readonly
|
||
23756E77000
|
heap
|
page read and write
|
||
282E0F6F000
|
heap
|
page read and write
|
||
237595D9000
|
heap
|
page read and write
|
||
210E45F6000
|
trusted library allocation
|
page read and write
|
||
282DEE5D000
|
heap
|
page read and write
|
||
1542000
|
heap
|
page read and write
|
||
23756F2A000
|
heap
|
page read and write
|
||
210E37BC000
|
trusted library allocation
|
page read and write
|
||
1C2483AD000
|
heap
|
page read and write
|
||
1C25E000
|
stack
|
page read and write
|
||
22E2AF83000
|
trusted library allocation
|
page read and write
|
||
282E0E71000
|
heap
|
page read and write
|
||
22E3A2CA000
|
trusted library allocation
|
page read and write
|
||
23756E6E000
|
heap
|
page read and write
|
||
202E2D00000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
23754FDD000
|
heap
|
page read and write
|
||
282E0E93000
|
heap
|
page read and write
|
||
202E2EB9000
|
trusted library allocation
|
page read and write
|
||
1C24B267000
|
trusted library allocation
|
page read and write
|
||
282E0FFC000
|
heap
|
page read and write
|
||
23756E4C000
|
heap
|
page read and write
|
||
6338CF9000
|
stack
|
page read and write
|
||
22E2A4AD000
|
trusted library allocation
|
page read and write
|
||
282E0E30000
|
heap
|
page read and write
|
||
1B72C000
|
stack
|
page read and write
|
||
1EC072B0000
|
trusted library allocation
|
page read and write
|
||
23754FE7000
|
heap
|
page read and write
|
||
282E0EA1000
|
heap
|
page read and write
|
||
1BFFF000
|
stack
|
page read and write
|
||
7FF849159000
|
trusted library allocation
|
page read and write
|
||
1C2625BF000
|
heap
|
page read and write
|
||
1BDBE000
|
stack
|
page read and write
|
||
2375500A000
|
heap
|
page read and write
|
||
23755046000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
202E240D000
|
trusted library allocation
|
page read and write
|
||
7FF84920A000
|
trusted library allocation
|
page read and write
|
||
202E03E8000
|
heap
|
page read and write
|
||
282E0F68000
|
heap
|
page read and write
|
||
F38B677000
|
stack
|
page read and write
|
||
251C7FF000
|
stack
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
22E2A208000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
22E2B18F000
|
trusted library allocation
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
23756E53000
|
heap
|
page read and write
|
||
282E3080000
|
trusted library allocation
|
page read and write
|
||
23755017000
|
heap
|
page read and write
|
||
1EC0741F000
|
heap
|
page read and write
|
||
282E0F78000
|
heap
|
page read and write
|
||
23754FFD000
|
heap
|
page read and write
|
||
23756E5D000
|
heap
|
page read and write
|
||
23756E5D000
|
heap
|
page read and write
|
||
23754FFD000
|
heap
|
page read and write
|
||
C06000
|
heap
|
page read and write
|
||
282E0FD8000
|
heap
|
page read and write
|
||
23756E1F000
|
heap
|
page read and write
|
||
289C000
|
trusted library allocation
|
page read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
282DEE93000
|
heap
|
page read and write
|
||
22E2B935000
|
trusted library allocation
|
page read and write
|
||
1C25A189000
|
trusted library allocation
|
page read and write
|
||
23754FF3000
|
heap
|
page read and write
|
||
1EC07450000
|
heap
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
1C249CF7000
|
heap
|
page read and write
|
||
23756E74000
|
heap
|
page read and write
|
||
230AEB3000
|
stack
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
282E5BF0000
|
heap
|
page read and write
|
||
22E2B0A1000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
282E0E83000
|
heap
|
page read and write
|
||
202E1EE0000
|
heap
|
page execute and read and write
|
||
1C26257C000
|
heap
|
page read and write
|
||
23754FC6000
|
heap
|
page read and write
|
||
1EC07455000
|
heap
|
page read and write
|
||
1C2482F0000
|
heap
|
page read and write
|
||
23756F28000
|
heap
|
page read and write
|
||
22E29FD5000
|
heap
|
page read and write
|
||
1C24A36D000
|
trusted library allocation
|
page read and write
|
||
202FA6A4000
|
heap
|
page read and write
|
||
282DEE97000
|
heap
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
1C2624F8000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
202E304D000
|
trusted library allocation
|
page read and write
|
||
1EC074E9000
|
heap
|
page read and write
|
||
210F2800000
|
trusted library allocation
|
page read and write
|
||
23756E30000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
282E0E87000
|
heap
|
page read and write
|
||
7FF84917C000
|
trusted library allocation
|
page read and write
|
||
282E0E6D000
|
heap
|
page read and write
|
||
7FF849143000
|
trusted library allocation
|
page read and write
|
||
210FABA0000
|
trusted library allocation
|
page read and write
|
||
230B8FC000
|
stack
|
page read and write
|
||
F38C3CC000
|
stack
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
22E285A1000
|
heap
|
page read and write
|
||
202E2B51000
|
trusted library allocation
|
page read and write
|
||
23759590000
|
heap
|
page read and write
|
||
282E0FFE000
|
heap
|
page read and write
|
||
23756E72000
|
heap
|
page read and write
|
||
282E0F7C000
|
heap
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
7FF848FE2000
|
trusted library allocation
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
202FA750000
|
trusted library allocation
|
page read and write
|
||
1C2482E5000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
202F2239000
|
trusted library allocation
|
page read and write
|
||
282DEEAC000
|
heap
|
page read and write
|
||
23756E3A000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
23755044000
|
heap
|
page read and write
|
||
23756F62000
|
heap
|
page read and write
|
||
23756E53000
|
heap
|
page read and write
|
||
23754FEE000
|
heap
|
page read and write
|
||
202FA37B000
|
heap
|
page read and write
|
||
23756E67000
|
heap
|
page read and write
|
||
1C24B627000
|
trusted library allocation
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
7FF84926D000
|
trusted library allocation
|
page read and write
|
||
23756E5A000
|
heap
|
page read and write
|
||
23754FEE000
|
heap
|
page read and write
|
||
7DF4D55B0000
|
trusted library allocation
|
page execute and read and write
|
||
282DEE90000
|
heap
|
page read and write
|
||
237595D9000
|
heap
|
page read and write
|
||
282DEFC0000
|
heap
|
page read and write
|
||
282E0F4E000
|
heap
|
page read and write
|
||
210FAD14000
|
heap
|
page read and write
|
||
1EC01E5A000
|
heap
|
page read and write
|
||
1EC074C2000
|
heap
|
page read and write
|
||
23756E3D000
|
heap
|
page read and write
|
||
202E0330000
|
heap
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
202E2EAC000
|
trusted library allocation
|
page read and write
|
||
23756E40000
|
heap
|
page read and write
|
||
1C24BC81000
|
trusted library allocation
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
210E3243000
|
trusted library allocation
|
page read and write
|
||
282E0E56000
|
heap
|
page read and write
|
||
14D3000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
23754FF2000
|
heap
|
page read and write
|
||
282DEEC2000
|
heap
|
page read and write
|
||
23754DB0000
|
heap
|
page read and write
|
||
23756E77000
|
heap
|
page read and write
|
||
22E3A2E8000
|
trusted library allocation
|
page read and write
|
||
1BB20000
|
heap
|
page read and write
|
||
282E0E64000
|
heap
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
210FAEF4000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
6339D0D000
|
stack
|
page read and write
|
||
282E0E72000
|
heap
|
page read and write
|
||
1C24BCC6000
|
trusted library allocation
|
page read and write
|
||
A9F327B000
|
stack
|
page read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
7FF849276000
|
trusted library allocation
|
page read and write
|
||
1BDD7020000
|
heap
|
page read and write
|
||
1C248350000
|
heap
|
page read and write
|
||
7FF848FF4000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
23754FFD000
|
heap
|
page read and write
|
||
210FAE67000
|
heap
|
page read and write
|
||
282E0E72000
|
heap
|
page read and write
|
||
5CA507F000
|
stack
|
page read and write
|
||
2375501C000
|
heap
|
page read and write
|
||
251D77B000
|
stack
|
page read and write
|
||
22E42892000
|
heap
|
page read and write
|
||
282E0E8B000
|
heap
|
page read and write
|
||
237595D9000
|
heap
|
page read and write
|
||
23756E77000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
202E3D67000
|
trusted library allocation
|
page read and write
|
||
22E41FE1000
|
heap
|
page read and write
|
||
1CD8A000
|
stack
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7DF4AF181000
|
trusted library allocation
|
page execute read
|
||
15D2000
|
heap
|
page read and write
|
||
23756F2C000
|
heap
|
page read and write
|
||
282E0EA2000
|
heap
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
23756FAB000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
1303000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
23756FD2000
|
heap
|
page read and write
|
||
237595D7000
|
heap
|
page read and write
|
||
23756FA4000
|
heap
|
page read and write
|
||
210E3916000
|
trusted library allocation
|
page read and write
|
||
23756E39000
|
heap
|
page read and write
|
||
22E428B7000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
F38B2FE000
|
stack
|
page read and write
|
||
23754FF5000
|
heap
|
page read and write
|
||
98B207B000
|
stack
|
page read and write
|
||
23755044000
|
heap
|
page read and write
|
||
202FA5BC000
|
heap
|
page read and write
|
||
210FAC26000
|
heap
|
page execute and read and write
|
||
202E1CC0000
|
trusted library allocation
|
page read and write
|
||
23756E53000
|
heap
|
page read and write
|
||
202E3896000
|
trusted library allocation
|
page read and write
|
||
1EC074E7000
|
heap
|
page read and write
|
||
202E0460000
|
heap
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
202E1DA0000
|
heap
|
page read and write
|
||
1EC0750B000
|
heap
|
page read and write
|
||
230B37E000
|
stack
|
page read and write
|
||
23756E66000
|
heap
|
page read and write
|
||
26ABEFE000
|
stack
|
page read and write
|
||
F38B27E000
|
stack
|
page read and write
|
||
23756E6B000
|
heap
|
page read and write
|
||
22E3A011000
|
trusted library allocation
|
page read and write
|
||
23756E53000
|
heap
|
page read and write
|
||
23756E10000
|
heap
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
7FF84916A000
|
trusted library allocation
|
page read and write
|
||
23756F5D000
|
heap
|
page read and write
|
||
F38AFA3000
|
stack
|
page read and write
|
||
282E0EA1000
|
heap
|
page read and write
|
||
FE0000
|
unkown
|
page readonly
|
||
1150000
|
heap
|
page read and write
|
||
210FAF61000
|
heap
|
page read and write
|
||
282E0F7C000
|
heap
|
page read and write
|
||
237595D7000
|
heap
|
page read and write
|
||
23756E4C000
|
heap
|
page read and write
|
||
23756E49000
|
heap
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
1534000
|
heap
|
page read and write
|
||
1EC02600000
|
heap
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
23756E72000
|
heap
|
page read and write
|
||
23756F83000
|
heap
|
page read and write
|
||
282E0E89000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
282E0E9B000
|
heap
|
page read and write
|
||
1C140000
|
heap
|
page read and write
|
||
23755009000
|
heap
|
page read and write
|
||
1EC0740F000
|
heap
|
page read and write
|
||
7FF849133000
|
trusted library allocation
|
page read and write
|
||
30C0000
|
heap
|
page execute and read and write
|
||
1EC01F02000
|
heap
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
1CE90000
|
heap
|
page read and write
|
||
23756E6A000
|
heap
|
page read and write
|
||
202E1CF0000
|
trusted library allocation
|
page read and write
|
||
1C259ED1000
|
trusted library allocation
|
page read and write
|
||
202E2CBD000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1EC072C0000
|
trusted library allocation
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
22E2AA32000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
23756E67000
|
heap
|
page read and write
|
||
23756E48000
|
heap
|
page read and write
|
||
210E35E4000
|
trusted library allocation
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
6338EF9000
|
stack
|
page read and write
|
||
23756E77000
|
heap
|
page read and write
|
||
282E0E53000
|
heap
|
page read and write
|
||
251BD7C000
|
stack
|
page read and write
|
||
251C9FE000
|
stack
|
page read and write
|
||
282DEE8E000
|
heap
|
page read and write
|
||
1EC0750F000
|
heap
|
page read and write
|
||
1EC07330000
|
trusted library allocation
|
page read and write
|
||
282E0E67000
|
heap
|
page read and write
|
||
1C2482E0000
|
heap
|
page read and write
|
||
7FF849168000
|
trusted library allocation
|
page read and write
|
||
22E28500000
|
heap
|
page read and write
|
||
282DEE7B000
|
heap
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
1C26223B000
|
heap
|
page read and write
|
||
1EC01D60000
|
heap
|
page read and write
|
||
26ABD79000
|
stack
|
page read and write
|
||
230B576000
|
stack
|
page read and write
|
||
22E2B18D000
|
trusted library allocation
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
23756E4D000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
282E0E9D000
|
heap
|
page read and write
|
||
202E306C000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
251C17C000
|
stack
|
page read and write
|
||
23756E44000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
282DEEE0000
|
heap
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
282E0E6D000
|
heap
|
page read and write
|
||
251B3DB000
|
stack
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
23756E6B000
|
heap
|
page read and write
|
||
98B1CFE000
|
stack
|
page read and write
|
||
1C24AAA4000
|
trusted library allocation
|
page read and write
|
||
23756E77000
|
heap
|
page read and write
|
||
23756E2C000
|
heap
|
page read and write
|
||
23756E48000
|
heap
|
page read and write
|
||
202E2B43000
|
trusted library allocation
|
page read and write
|
||
202FA2E4000
|
heap
|
page read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
23756E30000
|
heap
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
1EC073B3000
|
trusted library allocation
|
page read and write
|
||
23755025000
|
heap
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
23754FFC000
|
heap
|
page read and write
|
||
282E0E50000
|
heap
|
page read and write
|
||
23755028000
|
heap
|
page read and write
|
||
210E0C52000
|
heap
|
page read and write
|
||
1C2481A0000
|
heap
|
page read and write
|
||
23756E48000
|
heap
|
page read and write
|
||
23756E39000
|
heap
|
page read and write
|
||
1C24AD93000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
202FA582000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
18B0000
|
heap
|
page read and write
|
||
23756F56000
|
heap
|
page read and write
|
||
210E38B3000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
282E0E5A000
|
heap
|
page read and write
|
||
210E24E0000
|
trusted library allocation
|
page read and write
|
||
282E5C10000
|
heap
|
page read and write
|
||
230C44C000
|
stack
|
page read and write
|
||
23756E39000
|
heap
|
page read and write
|
||
282E0E82000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
237595CF000
|
heap
|
page read and write
|
||
210E0E80000
|
heap
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
202E0368000
|
heap
|
page read and write
|
||
FA5000
|
heap
|
page read and write
|
||
251C4FE000
|
stack
|
page read and write
|
||
282E0E72000
|
heap
|
page read and write
|
||
1C089000
|
heap
|
page read and write
|
||
23754FF3000
|
heap
|
page read and write
|
||
23756E63000
|
heap
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
1BDD6FA0000
|
heap
|
page read and write
|
||
210FAEDB000
|
heap
|
page read and write
|
||
282E0F60000
|
heap
|
page read and write
|
||
210F2862000
|
trusted library allocation
|
page read and write
|
||
63388F3000
|
stack
|
page read and write
|
||
23756FB8000
|
heap
|
page read and write
|
||
282E0E6D000
|
heap
|
page read and write
|
||
1C695000
|
stack
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
202E03E5000
|
heap
|
page read and write
|
||
1EC07490000
|
trusted library allocation
|
page read and write
|
||
23756E43000
|
heap
|
page read and write
|
||
202FA6A1000
|
heap
|
page read and write
|
||
23756E6E000
|
heap
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
202FA561000
|
heap
|
page read and write
|
||
23756E72000
|
heap
|
page read and write
|
||
202E1FC8000
|
trusted library allocation
|
page read and write
|
||
1C35E000
|
stack
|
page read and write
|
||
23756E6A000
|
heap
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
230B2F9000
|
stack
|
page read and write
|
||
23756E4C000
|
heap
|
page read and write
|
||
251D37E000
|
stack
|
page read and write
|
||
23756E77000
|
heap
|
page read and write
|
||
282E0E76000
|
heap
|
page read and write
|
||
230C4CE000
|
stack
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
22E425C7000
|
heap
|
page execute and read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
282E0E90000
|
heap
|
page read and write
|
||
282E0E42000
|
heap
|
page read and write
|
||
26ABB7D000
|
stack
|
page read and write
|
||
7FF848E21000
|
trusted library allocation
|
page read and write
|
||
23756E77000
|
heap
|
page read and write
|
||
23756F56000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
F38B87E000
|
stack
|
page read and write
|
||
23756E53000
|
heap
|
page read and write
|
||
1BCB0000
|
heap
|
page read and write
|
||
1EC01D80000
|
heap
|
page read and write
|
||
202FA59A000
|
heap
|
page read and write
|
||
1EC01E43000
|
heap
|
page read and write
|
||
23756F62000
|
heap
|
page read and write
|
||
23756E6B000
|
heap
|
page read and write
|
||
D5F000
|
stack
|
page read and write
|
||
63389FF000
|
stack
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
282E0E6D000
|
heap
|
page read and write
|
||
1C2624C0000
|
heap
|
page read and write
|
||
22E2BE0B000
|
trusted library allocation
|
page read and write
|
||
1EC02E20000
|
trusted library allocation
|
page read and write
|
||
282E0E93000
|
heap
|
page read and write
|
||
282E0E8D000
|
heap
|
page read and write
|
||
23756E5D000
|
heap
|
page read and write
|
||
1710000
|
heap
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
23756E48000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
2375696E000
|
heap
|
page read and write
|
||
23755044000
|
heap
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
1318000
|
heap
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
282E0E95000
|
heap
|
page read and write
|
||
251C87E000
|
unkown
|
page readonly
|
||
23754FEE000
|
heap
|
page read and write
|
||
282E0F66000
|
heap
|
page read and write
|
||
1425000
|
heap
|
page read and write
|
||
202E2EBD000
|
trusted library allocation
|
page read and write
|
||
282E0F30000
|
heap
|
page read and write
|
||
282E0E48000
|
heap
|
page read and write
|
||
23755045000
|
heap
|
page read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
282E0E5E000
|
heap
|
page read and write
|
||
1C24B806000
|
trusted library allocation
|
page read and write
|
||
282E0E8B000
|
heap
|
page read and write
|
||
1820000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
23756E66000
|
heap
|
page read and write
|
||
282E5463000
|
heap
|
page read and write
|
||
210FACC5000
|
heap
|
page read and write
|
||
282E0E67000
|
heap
|
page read and write
|
||
23756E77000
|
heap
|
page read and write
|
||
1C248470000
|
trusted library allocation
|
page read and write
|
||
23756E44000
|
heap
|
page read and write
|
||
251BB7E000
|
stack
|
page read and write
|
||
1C24AECF000
|
trusted library allocation
|
page read and write
|
||
23754FF3000
|
heap
|
page read and write
|
||
282E0E87000
|
heap
|
page read and write
|
||
7FF849159000
|
trusted library allocation
|
page read and write
|
||
1C248460000
|
heap
|
page readonly
|
||
23756F5D000
|
heap
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
152C000
|
heap
|
page read and write
|
||
230B5F9000
|
stack
|
page read and write
|
||
1EC07370000
|
trusted library allocation
|
page read and write
|
||
23756E5E000
|
heap
|
page read and write
|
||
282E0E8A000
|
heap
|
page read and write
|
||
23756E53000
|
heap
|
page read and write
|
||
1C2625C8000
|
heap
|
page read and write
|
||
30DC000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
282DEEAD000
|
heap
|
page read and write
|
||
22E42509000
|
heap
|
page read and write
|
||
15D4000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
282E0E8B000
|
heap
|
page read and write
|
||
251D97D000
|
stack
|
page read and write
|
||
210FAF97000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
319F000
|
stack
|
page read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
23754FF2000
|
heap
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
282E0FFE000
|
heap
|
page read and write
|
||
23756FAE000
|
heap
|
page read and write
|
||
282DEEB9000
|
heap
|
page read and write
|
||
282E0FFD000
|
heap
|
page read and write
|
||
1C2624C6000
|
heap
|
page read and write
|
||
282E0FC8000
|
heap
|
page read and write
|
||
282E0E72000
|
heap
|
page read and write
|
||
B88000
|
heap
|
page read and write
|
||
23756E5A000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
23756E3A000
|
heap
|
page read and write
|
||
23756E18000
|
heap
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
284E000
|
stack
|
page read and write
|
||
1C248450000
|
trusted library allocation
|
page read and write
|
||
282E0E8F000
|
heap
|
page read and write
|
||
1C24A0C8000
|
trusted library allocation
|
page read and write
|
||
23756E30000
|
heap
|
page read and write
|
||
98B227C000
|
stack
|
page read and write
|
||
23756E6A000
|
heap
|
page read and write
|
||
15CF000
|
heap
|
page read and write
|
||
2375504A000
|
heap
|
page read and write
|
||
23754FF5000
|
heap
|
page read and write
|
||
282E0E82000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
282E0F9A000
|
heap
|
page read and write
|
||
22E2B106000
|
trusted library allocation
|
page read and write
|
||
282E0E5E000
|
heap
|
page read and write
|
||
1EC032B0000
|
trusted library allocation
|
page read and write
|
||
23756E00000
|
heap
|
page read and write
|
||
22E29FA0000
|
trusted library allocation
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
1EC076E0000
|
remote allocation
|
page read and write
|
||
210E40E6000
|
trusted library allocation
|
page read and write
|
||
251CA7E000
|
unkown
|
page readonly
|
||
7C0000
|
heap
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
282E0FF4000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
282DEEB2000
|
heap
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
B7B000
|
heap
|
page read and write
|
||
1CE8E000
|
stack
|
page read and write
|
||
1BCAD000
|
stack
|
page read and write
|
||
BC9000
|
heap
|
page read and write
|
||
7FF849162000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
282E0E71000
|
heap
|
page read and write
|
||
210F2821000
|
trusted library allocation
|
page read and write
|
||
7FF848FBA000
|
trusted library allocation
|
page read and write
|
||
7FF84921C000
|
trusted library allocation
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
202FA542000
|
heap
|
page read and write
|
||
22E29F00000
|
trusted library allocation
|
page read and write
|
||
282E0E53000
|
heap
|
page read and write
|
||
2375501D000
|
heap
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
282DEE90000
|
heap
|
page read and write
|
||
282DEE6C000
|
heap
|
page read and write
|
||
23756E1B000
|
heap
|
page read and write
|
||
7FF848FBA000
|
trusted library allocation
|
page read and write
|
||
23756E77000
|
heap
|
page read and write
|
||
26ABBF7000
|
stack
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
282E0E82000
|
heap
|
page read and write
|
||
210E4145000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
230C3C9000
|
stack
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
282E0FB4000
|
heap
|
page read and write
|
||
1B960000
|
heap
|
page execute and read and write
|
||
7FF849002000
|
trusted library allocation
|
page read and write
|
||
1C249EA1000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
23756F09000
|
heap
|
page read and write
|
||
23756FC9000
|
heap
|
page read and write
|
||
23756E12000
|
heap
|
page read and write
|
||
210E0C15000
|
heap
|
page read and write
|
||
15B6000
|
heap
|
page read and write
|
||
23756E4C000
|
heap
|
page read and write
|
||
14FE000
|
heap
|
page read and write
|
||
23756E67000
|
heap
|
page read and write
|
||
1C248520000
|
heap
|
page read and write
|
||
1490000
|
heap
|
page read and write
|
||
282DEE88000
|
heap
|
page read and write
|
||
22E2B18B000
|
trusted library allocation
|
page read and write
|
||
23754FF7000
|
heap
|
page read and write
|
||
1EC0271A000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1C262380000
|
heap
|
page execute and read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
1EC02F10000
|
trusted library section
|
page readonly
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
282E0E72000
|
heap
|
page read and write
|
||
282E0E76000
|
heap
|
page read and write
|
||
282E0E76000
|
heap
|
page read and write
|
||
F38B778000
|
stack
|
page read and write
|
||
7FF849165000
|
trusted library allocation
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
7FF849266000
|
trusted library allocation
|
page read and write
|
||
23756FB8000
|
heap
|
page read and write
|
||
210E461B000
|
trusted library allocation
|
page read and write
|
||
202F1F71000
|
trusted library allocation
|
page read and write
|
||
282DEE81000
|
heap
|
page read and write
|
||
23756E53000
|
heap
|
page read and write
|
||
282E0FFC000
|
heap
|
page read and write
|
||
202E1CA0000
|
trusted library allocation
|
page read and write
|
||
1C262387000
|
heap
|
page execute and read and write
|
||
23756E5D000
|
heap
|
page read and write
|
||
282DEE52000
|
heap
|
page read and write
|
||
F38C4C9000
|
stack
|
page read and write
|
||
7FF849179000
|
trusted library allocation
|
page read and write
|
||
1EC074C0000
|
heap
|
page read and write
|
||
23754FF5000
|
heap
|
page read and write
|
||
26ACBCE000
|
stack
|
page read and write
|
||
237595C7000
|
heap
|
page read and write
|
||
1EC01E13000
|
heap
|
page read and write
|
||
F38B97C000
|
stack
|
page read and write
|
||
23756FFA000
|
heap
|
page read and write
|
||
23756E24000
|
heap
|
page read and write
|
||
23756E63000
|
heap
|
page read and write
|
||
237595C9000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
23756F26000
|
heap
|
page read and write
|
||
1B42E000
|
stack
|
page read and write
|
||
282E0E65000
|
heap
|
page read and write
|
||
F38B6F9000
|
stack
|
page read and write
|
||
237595D9000
|
heap
|
page read and write
|
||
23756E35000
|
heap
|
page read and write
|
||
63392BC000
|
stack
|
page read and write
|
||
1945000
|
heap
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
98B1DFE000
|
stack
|
page read and write
|
||
210E24D0000
|
trusted library section
|
page read and write
|
||
132F1000
|
trusted library allocation
|
page read and write
|
||
7DF4BC4F0000
|
trusted library allocation
|
page execute and read and write
|
||
23756E40000
|
heap
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
23754FF4000
|
heap
|
page read and write
|
||
23754FEB000
|
heap
|
page read and write
|
||
23756FC9000
|
heap
|
page read and write
|
||
282E0E97000
|
heap
|
page read and write
|
||
A9F31FE000
|
stack
|
page read and write
|
||
23755048000
|
heap
|
page read and write
|
||
22E42670000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
23756E2A000
|
heap
|
page read and write
|
||
202E0250000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
282E0E5D000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
150F000
|
stack
|
page read and write
|
||
22E284C0000
|
heap
|
page read and write
|
||
1C24AC12000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
22E42840000
|
heap
|
page read and write
|
||
282DEE84000
|
heap
|
page read and write
|
||
23756E6E000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
6338D7F000
|
stack
|
page read and write
|
||
23756E6A000
|
heap
|
page read and write
|
||
23756F28000
|
heap
|
page read and write
|
||
210E399A000
|
trusted library allocation
|
page read and write
|
||
26AB87D000
|
stack
|
page read and write
|
||
22E28568000
|
heap
|
page read and write
|
||
1C262880000
|
heap
|
page read and write
|
||
1EC07517000
|
heap
|
page read and write
|
||
282E0E7B000
|
heap
|
page read and write
|
||
282E0E4D000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
210E2CBE000
|
trusted library allocation
|
page read and write
|
||
23756E72000
|
heap
|
page read and write
|
||
A9F317E000
|
stack
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
22E42514000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
1EC025E1000
|
trusted library allocation
|
page read and write
|
||
210E25FD000
|
heap
|
page read and write
|
||
282E0E82000
|
heap
|
page read and write
|
||
23756F3B000
|
heap
|
page read and write
|
||
282E0E8F000
|
heap
|
page read and write
|
||
282E0F78000
|
heap
|
page read and write
|
||
23756E6E000
|
heap
|
page read and write
|
||
282E0E82000
|
heap
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
23756E72000
|
heap
|
page read and write
|
||
210E0C29000
|
heap
|
page read and write
|
||
23756E35000
|
heap
|
page read and write
|
||
282E0F6F000
|
heap
|
page read and write
|
||
282E0FD8000
|
heap
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
1C24BCCB000
|
trusted library allocation
|
page read and write
|
||
14FC000
|
heap
|
page read and write
|
||
1C2625CF000
|
heap
|
page read and write
|
||
22E428E8000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
23756E1C000
|
heap
|
page read and write
|
||
1EC01E8E000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
23756E66000
|
heap
|
page read and write
|
||
210E3822000
|
trusted library allocation
|
page read and write
|
||
23756E67000
|
heap
|
page read and write
|
||
202FA280000
|
heap
|
page read and write
|
||
210E2770000
|
heap
|
page execute and read and write
|
||
12891000
|
trusted library allocation
|
page read and write
|
||
22E2856F000
|
heap
|
page read and write
|
||
282E0E9B000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1C24A8F2000
|
trusted library allocation
|
page read and write
|
||
23756F62000
|
heap
|
page read and write
|
||
1EC07341000
|
trusted library allocation
|
page read and write
|
||
23756E5D000
|
heap
|
page read and write
|
||
282DEE87000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
1571000
|
heap
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
202E2FDC000
|
trusted library allocation
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
1C249E90000
|
heap
|
page execute and read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
23756E6E000
|
heap
|
page read and write
|
||
1C262370000
|
trusted library allocation
|
page read and write
|
||
7FF849154000
|
trusted library allocation
|
page read and write
|
||
6338E7D000
|
stack
|
page read and write
|
||
282E0E88000
|
heap
|
page read and write
|
||
23756E30000
|
heap
|
page read and write
|
||
210E0BD0000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
210E0EB0000
|
heap
|
page read and write
|
||
210E0C09000
|
heap
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
1C2483D6000
|
heap
|
page read and write
|
||
63391BE000
|
stack
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
F38AFEE000
|
stack
|
page read and write
|
||
7FF849172000
|
trusted library allocation
|
page read and write
|
||
1C262525000
|
heap
|
page read and write
|
||
282E0E53000
|
heap
|
page read and write
|
||
23756E32000
|
heap
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
26AB593000
|
stack
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
7FF848FB1000
|
trusted library allocation
|
page read and write
|
||
282E0E87000
|
heap
|
page read and write
|
||
282E0E67000
|
heap
|
page read and write
|
||
210E0BD8000
|
heap
|
page read and write
|
||
282E0F7C000
|
heap
|
page read and write
|
||
202E1C50000
|
heap
|
page read and write
|
||
7FF84916C000
|
trusted library allocation
|
page read and write
|
||
251C27E000
|
unkown
|
page readonly
|
||
282DEE89000
|
heap
|
page read and write
|
||
22E2A066000
|
trusted library allocation
|
page read and write
|
||
1EC07513000
|
heap
|
page read and write
|
||
202E2F78000
|
trusted library allocation
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
282E0F78000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
A9F30FE000
|
stack
|
page read and write
|
||
1C24836E000
|
heap
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
23756F00000
|
heap
|
page read and write
|
||
251C57E000
|
unkown
|
page readonly
|
||
282E5AE0000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
23756FAE000
|
heap
|
page read and write
|
||
251CC7E000
|
unkown
|
page readonly
|
||
23756E6A000
|
heap
|
page read and write
|
||
202E3D6C000
|
trusted library allocation
|
page read and write
|
||
202FA450000
|
heap
|
page read and write
|
||
22E428D9000
|
heap
|
page read and write
|
||
1EC01E93000
|
heap
|
page read and write
|
||
282E081E000
|
heap
|
page read and write
|
||
282E0E6D000
|
heap
|
page read and write
|
||
1C0B8000
|
heap
|
page read and write
|
||
98B1C77000
|
stack
|
page read and write
|
||
1EC07620000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
282DEE90000
|
heap
|
page read and write
|
||
282E0F62000
|
heap
|
page read and write
|
||
132E8000
|
trusted library allocation
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
282E0E90000
|
heap
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
1EC01E27000
|
heap
|
page read and write
|
||
282E0FE8000
|
heap
|
page read and write
|
||
202FA30E000
|
heap
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
282E0E8F000
|
heap
|
page read and write
|
||
282DEE78000
|
heap
|
page read and write
|
||
1C262490000
|
heap
|
page read and write
|
||
23756E73000
|
heap
|
page read and write
|
||
282E5463000
|
heap
|
page read and write
|
||
26AC9CD000
|
stack
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
282DEE90000
|
heap
|
page read and write
|
||
26ACAC9000
|
stack
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
23756E72000
|
heap
|
page read and write
|
||
210FAC30000
|
heap
|
page read and write
|
||
22E29F60000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
23756E39000
|
heap
|
page read and write
|
||
23756E53000
|
heap
|
page read and write
|
||
251DE7E000
|
unkown
|
page readonly
|
||
1C24AEA3000
|
trusted library allocation
|
page read and write
|
||
23756E10000
|
heap
|
page read and write
|
||
202E1D30000
|
trusted library allocation
|
page read and write
|
||
251BE7E000
|
unkown
|
page readonly
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
202E03A3000
|
heap
|
page read and write
|
||
1EC01E7C000
|
heap
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
F38B3F9000
|
stack
|
page read and write
|
||
282E5480000
|
heap
|
page read and write
|
||
282E0E82000
|
heap
|
page read and write
|
||
23756E14000
|
heap
|
page read and write
|
||
1EC074EA000
|
heap
|
page read and write
|
||
F90000
|
unkown
|
page readonly
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
23756F2C000
|
heap
|
page read and write
|
||
282E0E65000
|
heap
|
page read and write
|
||
210E4616000
|
trusted library allocation
|
page read and write
|
||
23756E72000
|
heap
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
230B47E000
|
stack
|
page read and write
|
||
202FA6A6000
|
heap
|
page read and write
|
||
282E0E64000
|
heap
|
page read and write
|
||
23756E48000
|
heap
|
page read and write
|
||
1C259EA1000
|
trusted library allocation
|
page read and write
|
||
282E0E97000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
202E2B3D000
|
trusted library allocation
|
page read and write
|
||
251DA7E000
|
unkown
|
page readonly
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
1EC08000000
|
heap
|
page read and write
|
||
202F1FB2000
|
trusted library allocation
|
page read and write
|
||
251BC7E000
|
unkown
|
page readonly
|
||
282E0E99000
|
heap
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
22E2AD97000
|
trusted library allocation
|
page read and write
|
||
282E0E76000
|
heap
|
page read and write
|
||
282E0FE8000
|
heap
|
page read and write
|
||
23756FC8000
|
heap
|
page read and write
|
||
1B62F000
|
stack
|
page read and write
|
||
202E3008000
|
trusted library allocation
|
page read and write
|
||
251D579000
|
stack
|
page read and write
|
||
7DF4EEA50000
|
trusted library allocation
|
page execute and read and write
|
||
230B679000
|
stack
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
A9F307F000
|
stack
|
page read and write
|
||
1EC02C40000
|
trusted library allocation
|
page read and write
|
||
1C248280000
|
heap
|
page read and write
|
||
282E0FE8000
|
heap
|
page read and write
|
||
282E0FFC000
|
heap
|
page read and write
|
||
7DF4048E0000
|
trusted library allocation
|
page execute and read and write
|
||
23755049000
|
heap
|
page read and write
|
||
32E1000
|
trusted library allocation
|
page read and write
|
||
23756F13000
|
heap
|
page read and write
|
||
230AFBE000
|
stack
|
page read and write
|
||
23756E72000
|
heap
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
282E07C0000
|
heap
|
page read and write
|
||
1EC074C8000
|
heap
|
page read and write
|
||
23756E72000
|
heap
|
page read and write
|
||
251D27E000
|
unkown
|
page readonly
|
||
23756E57000
|
heap
|
page read and write
|
||
23756E44000
|
heap
|
page read and write
|
||
210F2AF9000
|
trusted library allocation
|
page read and write
|
||
202E330D000
|
trusted library allocation
|
page read and write
|
||
251D87E000
|
unkown
|
page readonly
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
1EC07360000
|
trusted library allocation
|
page read and write
|
||
B9B000
|
heap
|
page read and write
|
||
23756F3B000
|
heap
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
251CE7E000
|
stack
|
page read and write
|
||
23755038000
|
heap
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
202FA427000
|
heap
|
page execute and read and write
|
||
1C24B7F5000
|
trusted library allocation
|
page read and write
|
||
7FF848FD1000
|
trusted library allocation
|
page read and write
|
||
633923E000
|
stack
|
page read and write
|
||
251C5FE000
|
stack
|
page read and write
|
||
23756E77000
|
heap
|
page read and write
|
||
202F222B000
|
trusted library allocation
|
page read and write
|
||
202E2EB5000
|
trusted library allocation
|
page read and write
|
||
282E0E82000
|
heap
|
page read and write
|
||
1EC07340000
|
trusted library allocation
|
page read and write
|
||
7FF849004000
|
trusted library allocation
|
page read and write
|
||
251B77E000
|
unkown
|
page readonly
|
||
1B54E000
|
stack
|
page read and write
|
||
210FAC20000
|
heap
|
page execute and read and write
|
||
D65000
|
heap
|
page read and write
|
||
22E3A280000
|
trusted library allocation
|
page read and write
|
||
2375696E000
|
heap
|
page read and write
|
||
F38B7FF000
|
stack
|
page read and write
|
||
16F0000
|
trusted library allocation
|
page read and write
|
||
23756E6E000
|
heap
|
page read and write
|
||
7FF849154000
|
trusted library allocation
|
page read and write
|
||
282E0FC8000
|
heap
|
page read and write
|
||
149C000
|
heap
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
7DF4BC500000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
1EC07670000
|
trusted library allocation
|
page read and write
|
||
1EC01E79000
|
heap
|
page read and write
|
||
2375501C000
|
heap
|
page read and write
|
||
23756E72000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
1BDFE000
|
stack
|
page read and write
|
||
1506000
|
heap
|
page read and write
|
||
1C0B2000
|
heap
|
page read and write
|
||
22E29F20000
|
heap
|
page read and write
|
||
282E0E5D000
|
heap
|
page read and write
|
||
1EC07400000
|
heap
|
page read and write
|
||
282E0F4E000
|
heap
|
page read and write
|
||
23756E39000
|
heap
|
page read and write
|
||
1EC02700000
|
heap
|
page read and write
|
||
282E0F6F000
|
heap
|
page read and write
|
||
31EE000
|
stack
|
page read and write
|
||
22E424E9000
|
heap
|
page read and write
|
||
22E3A001000
|
trusted library allocation
|
page read and write
|
||
202E03AB000
|
heap
|
page read and write
|
||
282E0E68000
|
heap
|
page read and write
|
||
1BBF0000
|
heap
|
page execute and read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
282E0E44000
|
heap
|
page read and write
|
||
23756E6B000
|
heap
|
page read and write
|
||
22E427B0000
|
heap
|
page read and write
|
||
23756E40000
|
heap
|
page read and write
|
||
1C10B000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
1C24B733000
|
trusted library allocation
|
page read and write
|
||
282E0E60000
|
heap
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
7FF848FCA000
|
trusted library allocation
|
page read and write
|
||
23756E30000
|
heap
|
page read and write
|
||
210FAEE1000
|
heap
|
page read and write
|
||
23756E67000
|
heap
|
page read and write
|
||
282E0E5D000
|
heap
|
page read and write
|
||
26ABA7F000
|
stack
|
page read and write
|
||
1EC01EB8000
|
heap
|
page read and write
|
||
7FF848FF8000
|
trusted library allocation
|
page read and write
|
||
F38C5CE000
|
stack
|
page read and write
|
||
282E0FD8000
|
heap
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
6339F0E000
|
stack
|
page read and write
|
||
23756FE8000
|
heap
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
282DEE83000
|
heap
|
page read and write
|
||
282E0FE8000
|
heap
|
page read and write
|
||
7FF848FDA000
|
trusted library allocation
|
page read and write
|
||
22E2BDE7000
|
trusted library allocation
|
page read and write
|
||
23756E4D000
|
heap
|
page read and write
|
||
282E0F54000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
237595D0000
|
heap
|
page read and write
|
||
23756FD2000
|
heap
|
page read and write
|
||
282DEE6C000
|
heap
|
page read and write
|
||
210E37F6000
|
trusted library allocation
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
202E2B2B000
|
trusted library allocation
|
page read and write
|
||
23756E10000
|
heap
|
page read and write
|
||
282E0E8D000
|
heap
|
page read and write
|
||
23756E66000
|
heap
|
page read and write
|
||
1BCB3000
|
heap
|
page read and write
|
||
23756E21000
|
heap
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
1C2623B0000
|
heap
|
page read and write
|
||
23755021000
|
heap
|
page read and write
|
||
6338DF7000
|
stack
|
page read and write
|
||
210F27F1000
|
trusted library allocation
|
page read and write
|
||
1506000
|
heap
|
page read and write
|
||
23759860000
|
heap
|
page read and write
|
||
23756E6B000
|
heap
|
page read and write
|
||
23756E72000
|
heap
|
page read and write
|
||
210E3565000
|
trusted library allocation
|
page read and write
|
||
210E0BB0000
|
heap
|
page read and write
|
||
1665000
|
heap
|
page read and write
|
||
202F1F41000
|
trusted library allocation
|
page read and write
|
||
282E0E93000
|
heap
|
page read and write
|
||
282E0F46000
|
heap
|
page read and write
|
||
23756E54000
|
heap
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page read and write
|
||
22E2B012000
|
trusted library allocation
|
page read and write
|
||
282E0E90000
|
heap
|
page read and write
|
||
282E0E9B000
|
heap
|
page read and write
|
||
26AC94E000
|
stack
|
page read and write
|
||
22E42559000
|
heap
|
page read and write
|
||
282E0815000
|
heap
|
page read and write
|
||
1EC02F00000
|
trusted library section
|
page readonly
|
||
210FAF94000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
22E2B84D000
|
trusted library allocation
|
page read and write
|
||
7DF4EEA60000
|
trusted library allocation
|
page execute and read and write
|
||
23756E72000
|
heap
|
page read and write
|
||
1C060000
|
heap
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
23756E30000
|
heap
|
page read and write
|
||
150C000
|
heap
|
page read and write
|
||
282E0F66000
|
heap
|
page read and write
|
||
282E0E47000
|
heap
|
page read and write
|
||
1C248397000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
6339C8E000
|
stack
|
page read and write
|
||
22E28530000
|
heap
|
page read and write
|
||
22E427D6000
|
heap
|
page read and write
|
||
23756E48000
|
heap
|
page read and write
|
||
282E0E76000
|
heap
|
page read and write
|
||
1EC07484000
|
heap
|
page read and write
|
||
22E2859B000
|
heap
|
page read and write
|
||
1EC01E72000
|
heap
|
page read and write
|
||
282E0F62000
|
heap
|
page read and write
|
||
1C262544000
|
heap
|
page read and write
|
||
251C47E000
|
unkown
|
page readonly
|
||
1C79A000
|
stack
|
page read and write
|
||
282E0EA7000
|
heap
|
page read and write
|
||
210FAEF8000
|
heap
|
page read and write
|
||
23756E66000
|
heap
|
page read and write
|
||
282E0E69000
|
heap
|
page read and write
|
||
1C249F26000
|
trusted library allocation
|
page read and write
|
||
A9F347D000
|
stack
|
page read and write
|
||
23756E63000
|
heap
|
page read and write
|
||
23755044000
|
heap
|
page read and write
|
||
1C24BCA6000
|
trusted library allocation
|
page read and write
|
||
230B6FF000
|
stack
|
page read and write
|
||
2375959D000
|
heap
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
282E0E6D000
|
heap
|
page read and write
|
||
130D8000
|
trusted library allocation
|
page read and write
|
||
210E3BB6000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
23754FEE000
|
heap
|
page read and write
|
||
23756E15000
|
heap
|
page read and write
|
||
7FF849133000
|
trusted library allocation
|
page read and write
|
||
7FF849168000
|
trusted library allocation
|
page read and write
|
||
282E0E87000
|
heap
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
1C24AE41000
|
trusted library allocation
|
page read and write
|
||
282E0F52000
|
heap
|
page read and write
|
||
23756F62000
|
heap
|
page read and write
|
||
23756F2E000
|
heap
|
page read and write
|
||
282E1017000
|
heap
|
page read and write
|
||
23756E57000
|
heap
|
page read and write
|
||
23756E77000
|
heap
|
page read and write
|
||
23756E77000
|
heap
|
page read and write
|
||
63390BA000
|
stack
|
page read and write
|
||
1C2625AE000
|
heap
|
page read and write
|
||
282E0E4F000
|
heap
|
page read and write
|
||
282E0E84000
|
heap
|
page read and write
|
||
1C24AF35000
|
trusted library allocation
|
page read and write
|
||
1AE1D000
|
stack
|
page read and write
|
||
202E2169000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
23756F25000
|
heap
|
page read and write
|
||
202FA63D000
|
heap
|
page read and write
|
||
202E1DA5000
|
heap
|
page read and write
|
||
210E0C13000
|
heap
|
page read and write
|
||
7FF849290000
|
trusted library allocation
|
page read and write
|
||
23754FE1000
|
heap
|
page read and write
|
||
1529000
|
heap
|
page read and write
|
||
23756E28000
|
heap
|
page read and write
|
||
282E0E5D000
|
heap
|
page read and write
|
||
202FA530000
|
heap
|
page read and write
|
||
23756E63000
|
heap
|
page read and write
|
||
22E2ABDF000
|
trusted library allocation
|
page read and write
|
||
282E0E82000
|
heap
|
page read and write
|
||
251D07E000
|
unkown
|
page readonly
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
23756F1B000
|
heap
|
page read and write
|
||
1715000
|
heap
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
282E0E99000
|
heap
|
page read and write
|
||
1B320000
|
heap
|
page read and write
|
||
1331000
|
stack
|
page read and write
|
||
23759580000
|
heap
|
page read and write
|
||
7FF848FE8000
|
trusted library allocation
|
page read and write
|
||
7FF848FE4000
|
trusted library allocation
|
page read and write
|
||
17F5000
|
heap
|
page read and write
|
||
6339D8D000
|
stack
|
page read and write
|
||
B9D000
|
heap
|
page read and write
|
||
23756F56000
|
heap
|
page read and write
|
||
282E546B000
|
heap
|
page read and write
|
||
210FAF7F000
|
heap
|
page read and write
|
||
22E424A0000
|
heap
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
210E0EA0000
|
trusted library section
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page execute and read and write
|
||
2375501A000
|
heap
|
page read and write
|
||
23756F5D000
|
heap
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
282DEE9B000
|
heap
|
page read and write
|
||
202F23D2000
|
trusted library allocation
|
page read and write
|
||
7FF848FB1000
|
trusted library allocation
|
page read and write
|
||
202E1F30000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
202FA6A9000
|
heap
|
page read and write
|
||
202E3D22000
|
trusted library allocation
|
page read and write
|
||
1EC07610000
|
trusted library allocation
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
1C262509000
|
heap
|
page read and write
|
||
23756E61000
|
heap
|
page read and write
|
||
23756F2C000
|
heap
|
page read and write
|
||
1C248393000
|
heap
|
page read and write
|
||
282E0E71000
|
heap
|
page read and write
|
||
282DEE94000
|
heap
|
page read and write
|
||
210E405D000
|
trusted library allocation
|
page read and write
|
||
22E39FE1000
|
trusted library allocation
|
page read and write
|
||
282E0F46000
|
heap
|
page read and write
|
||
251DDFE000
|
stack
|
page read and write
|
||
202E1F41000
|
trusted library allocation
|
page read and write
|
||
210E2A19000
|
trusted library allocation
|
page read and write
|
||
23755017000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
210E27E0000
|
heap
|
page read and write
|
||
23756E67000
|
heap
|
page read and write
|
||
22E29F10000
|
heap
|
page readonly
|
||
23756E6E000
|
heap
|
page read and write
|
||
282E0E9A000
|
heap
|
page read and write
|
||
210E3AFB000
|
trusted library allocation
|
page read and write
|
||
6339E8C000
|
stack
|
page read and write
|
||
7FF848FA2000
|
trusted library allocation
|
page read and write
|
||
23754FFD000
|
heap
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
1EC07462000
|
heap
|
page read and write
|
||
F38C34E000
|
stack
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
22E285E4000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
282E0F64000
|
heap
|
page read and write
|
||
1EC0742C000
|
heap
|
page read and write
|
||
22E29FC0000
|
heap
|
page execute and read and write
|
||
22E2B075000
|
trusted library allocation
|
page read and write
|
||
1790000
|
heap
|
page execute and read and write
|
There are 1906 hidden memdumps, click here to show them.