Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
kBY9lgRaca.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Java\jre-1.8\bin\RuntimeBroker.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\WindowsPowerShell\Modules\lsass.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\RuntimeDll\PBs3ExWWgPs.vbe
|
data
|
dropped
|
||
C:\RuntimeDll\cef_process.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\RuntimeDll\mOBsSQwwQhAobhYfNDABCsnt.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\0MaLlOrxiN.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\CNRzgtSC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CfUiBMYm.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\CtGsekUC.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\DJEawqoG.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\DhKAQyQA.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\FelIlyfv.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\GWKYIJYf.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\HOdrnIxw.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\HTmgdJna.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\KMBPPFZY.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\MOnylpdT.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ORagGYiO.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\PqvOIQVP.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\QEeosldM.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\UdNNkMkD.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\UicXeyNX.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\WkOFzhSS.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\WtmFjUlP.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\Yimecftu.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YmBoVQXN.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\YztwqAnw.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ZVuWGvdL.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ZfOmxfIp.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\cmPeMAqD.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\djqniAFy.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\eNXvjbiz.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\hCXTblqe.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\hiNMadse.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\iesEpfvs.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\iqbcNzlc.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\jBpuMXxn.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\jJYMqGYt.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\jWRUMqoc.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\lYDDhZsX.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\owqLTDnh.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\pPutoWtQ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\rAZKvkEJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\tFkkvTtJ.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\uqHSBmkN.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\vZJioLKA.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\vdXshwoU.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\wjWAnjWL.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\ykSQugis.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zLeRKKNH.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zPzZvHLt.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\zlIjJSaG.log
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Java\jre-1.8\bin\9e8d7a4ca61bd9
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\WindowsPowerShell\Modules\6203df4a6bafc7
|
ASCII text, with very long lines (816), with no line terminators
|
dropped
|
||
C:\Program Files\Microsoft\OneDrive\ListSync\settings\07a615e8f2b317
|
ASCII text, with very long lines (769), with no line terminators
|
dropped
|
||
C:\Program Files\Windows Portable Devices\07a615e8f2b317
|
ASCII text, with very long lines (397), with no line terminators
|
dropped
|
||
C:\RuntimeDll\07a615e8f2b317
|
ASCII text, with very long lines (368), with no line terminators
|
dropped
|
||
C:\RuntimeDll\er5JwegoF0epdZ7Hiy1grVzXqFtCRJ8c.bat
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\cef_process.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0jicts5u.2ua.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0l0tkgwa.oz2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0yjhscru.aym.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4of5xyid.r2w.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4slo1ov4.qpv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_52vjzlx5.ba3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c2h10ylj.l3k.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_canc0hgc.blq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d0djxqrm.i5l.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ejnryuvo.ux0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fvkccjkd.dyv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g35gsewh.h35.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ghu0wjrk.bza.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kq0332s1.c2h.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lmlu1ctz.3b5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m30f3fgk.pxf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mmsjatds.yl3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ubuae1sx.5u3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ya3jxzld.g0d.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z04i3w4y.fez.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\npEqFN9XfG
|
ASCII text, with no line terminators
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 75 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\kBY9lgRaca.exe
|
"C:\Users\user\Desktop\kBY9lgRaca.exe"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\RuntimeDll\PBs3ExWWgPs.vbe"
|
||
C:\Windows\SysWOW64\reg.exe
|
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
|
||
C:\RuntimeDll\cef_process.exe
|
"C:\RuntimeDll/cef_process.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\RuntimeDll\mOBsSQwwQhAobhYfNDABCsnt.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\windowspowershell\Modules\lsass.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\java\jre-1.8\bin\RuntimeBroker.exe'
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\0MaLlOrxiN.bat"
|
||
C:\Windows\System32\PING.EXE
|
ping -n 10 localhost
|
||
C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
|
"C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\RuntimeDll\er5JwegoF0epdZ7Hiy1grVzXqFtCRJ8c.bat" "
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\chcp.com
|
chcp 65001
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
There are 12 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://91.199.45.187/eternalgameSqlflowerDownloads.php
|
91.199.45.187
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://crl.microso
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.microsoft.co.
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://91.199.45.187
|
unknown
|
||
http://91.199.45.187/
|
unknown
|
||
http://crl.mi
|
unknown
|
There are 9 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
91.199.45.187
|
unknown
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
DisableTaskMgr
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\ec04d320eb9e8def9a5576336ff358d992d0f276
|
c8a612a5317e09eeb6057abe138cef54d9666039
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.ApplicationCompany
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\mOBsSQwwQhAobhYfNDABCsnt_RASMANCS
|
FileDirectory
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B12000
|
unkown
|
page readonly
|
||
4E3F000
|
heap
|
page read and write
|
||
135E7000
|
trusted library allocation
|
page read and write
|
||
23A50610000
|
heap
|
page read and write
|
||
739D000
|
heap
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
7FFAAC608000
|
trusted library allocation
|
page read and write
|
||
2E20000
|
heap
|
page read and write
|
||
174634F0000
|
heap
|
page read and write
|
||
28365350000
|
heap
|
page read and write
|
||
1FE5250D000
|
trusted library allocation
|
page read and write
|
||
7FFAACBDA000
|
trusted library allocation
|
page read and write
|
||
7FFAAC762000
|
trusted library allocation
|
page read and write
|
||
1FE68EF0000
|
heap
|
page read and write
|
||
2F92000
|
heap
|
page read and write
|
||
203147E000
|
stack
|
page read and write
|
||
2FD9000
|
heap
|
page read and write
|
||
72F1000
|
heap
|
page read and write
|
||
7FFAAC6D0000
|
trusted library allocation
|
page read and write
|
||
23A50760000
|
trusted library allocation
|
page read and write
|
||
7FFAAC516000
|
trusted library allocation
|
page execute and read and write
|
||
1802C1CA000
|
trusted library allocation
|
page read and write
|
||
7FFAACA80000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
7391000
|
heap
|
page read and write
|
||
1FE4F010000
|
trusted library allocation
|
page read and write
|
||
2E99000
|
heap
|
page read and write
|
||
1FE51D91000
|
trusted library allocation
|
page read and write
|
||
23A50700000
|
heap
|
page execute and read and write
|
||
1801BEC1000
|
trusted library allocation
|
page read and write
|
||
769000
|
stack
|
page read and write
|
||
7FFAACBC8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C5000
|
trusted library allocation
|
page read and write
|
||
1FE61195000
|
trusted library allocation
|
page read and write
|
||
1FE52B66000
|
trusted library allocation
|
page read and write
|
||
2F95000
|
heap
|
page read and write
|
||
1744C77B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B0000
|
trusted library allocation
|
page read and write
|
||
543D000
|
stack
|
page read and write
|
||
13307000
|
trusted library allocation
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
2031B3C000
|
stack
|
page read and write
|
||
2FF2000
|
unkown
|
page readonly
|
||
1BF02000
|
unkown
|
page readonly
|
||
1746374E000
|
heap
|
page read and write
|
||
17449570000
|
trusted library allocation
|
page read and write
|
||
1FE68F17000
|
heap
|
page read and write
|
||
7FFAAC5F0000
|
trusted library allocation
|
page execute and read and write
|
||
1801BA90000
|
heap
|
page read and write
|
||
2AF480E000
|
stack
|
page read and write
|
||
7FFAACB20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC760000
|
trusted library allocation
|
page read and write
|
||
2AF377E000
|
stack
|
page read and write
|
||
7FFAAC8B0000
|
trusted library allocation
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
7FFAAC886000
|
trusted library allocation
|
page read and write
|
||
23A60833000
|
trusted library allocation
|
page read and write
|
||
1BEB2000
|
unkown
|
page readonly
|
||
1801BE40000
|
heap
|
page read and write
|
||
6D80000
|
heap
|
page read and write
|
||
1FE4EE70000
|
heap
|
page read and write
|
||
17463729000
|
heap
|
page read and write
|
||
D12000
|
unkown
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
7FFAAC85D000
|
trusted library allocation
|
page read and write
|
||
1C803000
|
heap
|
page read and write
|
||
1801D6E3000
|
trusted library allocation
|
page read and write
|
||
203173E000
|
stack
|
page read and write
|
||
1B9D2000
|
heap
|
page read and write
|
||
7FFAACDB0000
|
trusted library allocation
|
page read and write
|
||
D13000
|
unkown
|
page write copy
|
||
23A68A15000
|
heap
|
page read and write
|
||
E7664BE000
|
stack
|
page read and write
|
||
14565000
|
trusted library allocation
|
page read and write
|
||
2F77000
|
heap
|
page read and write
|
||
23A51AA1000
|
trusted library allocation
|
page read and write
|
||
92FB4FF000
|
stack
|
page read and write
|
||
7FFAAC605000
|
trusted library allocation
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page execute and read and write
|
||
23A51252000
|
trusted library allocation
|
page read and write
|
||
396C000
|
trusted library allocation
|
page read and write
|
||
7FFAACE00000
|
trusted library allocation
|
page read and write
|
||
7FFAACE00000
|
trusted library allocation
|
page read and write
|
||
7FFAACE50000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8C0000
|
trusted library allocation
|
page read and write
|
||
20316F8000
|
stack
|
page read and write
|
||
1801A084000
|
heap
|
page read and write
|
||
7FFAAC9EF000
|
trusted library allocation
|
page read and write
|
||
23A4E6F9000
|
heap
|
page read and write
|
||
7FFAAC5FA000
|
trusted library allocation
|
page read and write
|
||
15BE000
|
stack
|
page read and write
|
||
2DE000
|
stack
|
page read and write
|
||
1FE6910C000
|
heap
|
page read and write
|
||
1FE69104000
|
heap
|
page read and write
|
||
7FFAACAD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC714000
|
trusted library allocation
|
page read and write
|
||
23A68B00000
|
heap
|
page read and write
|
||
3110000
|
unkown
|
page readonly
|
||
7FFAAC793000
|
trusted library allocation
|
page read and write
|
||
1366D000
|
trusted library allocation
|
page read and write
|
||
23A60AF2000
|
trusted library allocation
|
page read and write
|
||
341E000
|
trusted library allocation
|
page read and write
|
||
7FFB1DE60000
|
unkown
|
page read and write
|
||
AE0000
|
heap
|
page readonly
|
||
1FE691CA000
|
heap
|
page read and write
|
||
3AB8000
|
trusted library allocation
|
page read and write
|
||
1FE52B8B000
|
trusted library allocation
|
page read and write
|
||
7FFAACD95000
|
trusted library allocation
|
page read and write
|
||
1FE4F020000
|
heap
|
page readonly
|
||
2834CE30000
|
heap
|
page read and write
|
||
1FE5125C000
|
trusted library allocation
|
page read and write
|
||
23A518BA000
|
trusted library allocation
|
page read and write
|
||
7FFAAC640000
|
trusted library allocation
|
page read and write
|
||
1FE50BF7000
|
heap
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page execute and read and write
|
||
1744ADB0000
|
trusted library allocation
|
page read and write
|
||
1580000
|
heap
|
page execute and read and write
|
||
7FFAAC6D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
92FC80E000
|
stack
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
7FFAAC798000
|
trusted library allocation
|
page read and write
|
||
1FE4EEB0000
|
heap
|
page read and write
|
||
23A525D8000
|
trusted library allocation
|
page read and write
|
||
23A50CCE000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4E0000
|
trusted library allocation
|
page read and write
|
||
1BE72000
|
unkown
|
page readonly
|
||
2E99000
|
heap
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
2E96000
|
heap
|
page read and write
|
||
14853000
|
trusted library allocation
|
page read and write
|
||
23A68800000
|
heap
|
page read and write
|
||
7FFAAC7B9000
|
trusted library allocation
|
page read and write
|
||
283658BF000
|
heap
|
page read and write
|
||
7FFAAC432000
|
trusted library allocation
|
page read and write
|
||
7FFAAC82A000
|
trusted library allocation
|
page read and write
|
||
3072000
|
unkown
|
page readonly
|
||
1744AE20000
|
heap
|
page read and write
|
||
7293000
|
heap
|
page read and write
|
||
3091000
|
trusted library allocation
|
page read and write
|
||
1BD63000
|
heap
|
page execute and read and write
|
||
92FBA3E000
|
stack
|
page read and write
|
||
7FFAACE50000
|
trusted library allocation
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
7FFAAC7F0000
|
trusted library allocation
|
page read and write
|
||
203183B000
|
stack
|
page read and write
|
||
7FFAAC45D000
|
trusted library allocation
|
page execute and read and write
|
||
1746363F000
|
heap
|
page read and write
|
||
7FFAAC500000
|
trusted library allocation
|
page read and write
|
||
26E0000
|
heap
|
page read and write
|
||
2032607000
|
stack
|
page read and write
|
||
20317B6000
|
stack
|
page read and write
|
||
1BF52000
|
unkown
|
page readonly
|
||
7FFAAC5D2000
|
trusted library allocation
|
page read and write
|
||
2AF3AB7000
|
stack
|
page read and write
|
||
1FE51EE6000
|
trusted library allocation
|
page read and write
|
||
2EB3000
|
heap
|
page read and write
|
||
1801D80A000
|
trusted library allocation
|
page read and write
|
||
1BB3A000
|
heap
|
page read and write
|
||
1CCFE000
|
stack
|
page read and write
|
||
2836539D000
|
heap
|
page read and write
|
||
7FFAAC642000
|
trusted library allocation
|
page read and write
|
||
142B5000
|
trusted library allocation
|
page read and write
|
||
174634BA000
|
heap
|
page read and write
|
||
3ACF000
|
trusted library allocation
|
page read and write
|
||
1802C1BA000
|
trusted library allocation
|
page read and write
|
||
7FFAAC47B000
|
trusted library allocation
|
page read and write
|
||
7353000
|
heap
|
page read and write
|
||
1BB38000
|
heap
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
7FFAAC61A000
|
trusted library allocation
|
page read and write
|
||
1321B000
|
trusted library allocation
|
page read and write
|
||
E7665BF000
|
stack
|
page read and write
|
||
7FFAAC789000
|
trusted library allocation
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
1CD4E000
|
stack
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page read and write
|
||
1B7BB000
|
stack
|
page read and write
|
||
14499000
|
trusted library allocation
|
page read and write
|
||
13F58000
|
trusted library allocation
|
page read and write
|
||
B57000
|
unkown
|
page readonly
|
||
CE3000
|
unkown
|
page readonly
|
||
62A4D0D000
|
stack
|
page read and write
|
||
7FFAAC8C6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC794000
|
trusted library allocation
|
page read and write
|
||
7FFAACA20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C0000
|
trusted library allocation
|
page read and write
|
||
7421F000
|
unkown
|
page readonly
|
||
2EAE000
|
heap
|
page read and write
|
||
7FFAACD00000
|
trusted library allocation
|
page read and write
|
||
2031A3C000
|
stack
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page read and write
|
||
2834E523000
|
trusted library allocation
|
page read and write
|
||
2FAE000
|
heap
|
page read and write
|
||
2FB7000
|
heap
|
page read and write
|
||
2834E70B000
|
trusted library allocation
|
page read and write
|
||
1FE69010000
|
heap
|
page read and write
|
||
23A507F0000
|
heap
|
page execute and read and write
|
||
1801BA50000
|
trusted library section
|
page read and write
|
||
7FFAAC4FE000
|
trusted library allocation
|
page execute and read and write
|
||
14838000
|
trusted library allocation
|
page read and write
|
||
2ED8000
|
heap
|
page read and write
|
||
2835D65A000
|
trusted library allocation
|
page read and write
|
||
1346F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC450000
|
trusted library allocation
|
page read and write
|
||
7FFAACDE0000
|
trusted library allocation
|
page read and write
|
||
1744C4DD000
|
trusted library allocation
|
page read and write
|
||
2FB6000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
7322000
|
heap
|
page read and write
|
||
1FE68FB9000
|
heap
|
page read and write
|
||
1801C0E8000
|
trusted library allocation
|
page read and write
|
||
2834E650000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5E2000
|
trusted library allocation
|
page read and write
|
||
1CE30000
|
heap
|
page read and write
|
||
180343E2000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
1FE69100000
|
heap
|
page read and write
|
||
2F99000
|
heap
|
page read and write
|
||
4BFA000
|
trusted library allocation
|
page read and write
|
||
1745B3C1000
|
trusted library allocation
|
page read and write
|
||
1FE51B44000
|
trusted library allocation
|
page read and write
|
||
2F21000
|
heap
|
page read and write
|
||
92FBC3C000
|
stack
|
page read and write
|
||
1745B432000
|
trusted library allocation
|
page read and write
|
||
23A51803000
|
trusted library allocation
|
page read and write
|
||
2FAF000
|
heap
|
page read and write
|
||
1BE6D000
|
stack
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC4BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC546000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
13B6B000
|
trusted library allocation
|
page read and write
|
||
7394000
|
heap
|
page read and write
|
||
2E8F000
|
heap
|
page read and write
|
||
1BD52000
|
unkown
|
page readonly
|
||
7FFAAC860000
|
trusted library allocation
|
page execute and read and write
|
||
92FB47E000
|
unkown
|
page read and write
|
||
7FFAACB40000
|
trusted library allocation
|
page read and write
|
||
23A500A0000
|
trusted library allocation
|
page read and write
|
||
72F2000
|
heap
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
7FFAAC8C2000
|
trusted library allocation
|
page read and write
|
||
1801CE5C000
|
trusted library allocation
|
page read and write
|
||
7323000
|
heap
|
page read and write
|
||
1420B000
|
trusted library allocation
|
page read and write
|
||
7FFAACD36000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7CC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page read and write
|
||
AF5000
|
heap
|
page read and write
|
||
1801A210000
|
heap
|
page read and write
|
||
7FFAAC510000
|
trusted library allocation
|
page read and write
|
||
7FFAAC611000
|
trusted library allocation
|
page read and write
|
||
E765DEF000
|
stack
|
page read and write
|
||
1FE4F0A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
1801BA20000
|
heap
|
page read and write
|
||
7FFAAC620000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page read and write
|
||
92FB5F9000
|
stack
|
page read and write
|
||
1801A07B000
|
heap
|
page read and write
|
||
23A504DD000
|
heap
|
page read and write
|
||
7FFAACDF0000
|
trusted library allocation
|
page read and write
|
||
2835D640000
|
trusted library allocation
|
page read and write
|
||
2ECD000
|
heap
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
2EB6000
|
heap
|
page read and write
|
||
7FFAACB50000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page read and write
|
||
23A4E680000
|
heap
|
page read and write
|
||
1801D63D000
|
trusted library allocation
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
62A4C0E000
|
stack
|
page read and write
|
||
1801BA94000
|
heap
|
page read and write
|
||
7354000
|
heap
|
page read and write
|
||
CB0000
|
unkown
|
page readonly
|
||
1FE6929E000
|
heap
|
page read and write
|
||
2835D64A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page read and write
|
||
17463494000
|
heap
|
page read and write
|
||
1744B350000
|
heap
|
page execute and read and write
|
||
2834DF4F000
|
trusted library allocation
|
page read and write
|
||
1744B357000
|
heap
|
page execute and read and write
|
||
2834E0C5000
|
trusted library allocation
|
page read and write
|
||
93C647F000
|
stack
|
page read and write
|
||
180341F0000
|
heap
|
page read and write
|
||
7FFAAC474000
|
trusted library allocation
|
page read and write
|
||
2F8E000
|
heap
|
page read and write
|
||
1801DCE0000
|
trusted library allocation
|
page read and write
|
||
2AF3BBA000
|
stack
|
page read and write
|
||
7FFAACA75000
|
trusted library allocation
|
page read and write
|
||
7FFAACD10000
|
trusted library allocation
|
page read and write
|
||
148ED000
|
trusted library allocation
|
page read and write
|
||
2834E5EF000
|
trusted library allocation
|
page read and write
|
||
7FFAACC10000
|
trusted library allocation
|
page read and write
|
||
144AF000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
unkown
|
page read and write
|
||
7FFAAC51F000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACC40000
|
trusted library allocation
|
page read and write
|
||
7FFAACC50000
|
trusted library allocation
|
page read and write
|
||
2E9D000
|
heap
|
page read and write
|
||
1FE690F4000
|
heap
|
page read and write
|
||
2835D351000
|
trusted library allocation
|
page read and write
|
||
2E89000
|
heap
|
page read and write
|
||
7FFAAC7CA000
|
trusted library allocation
|
page read and write
|
||
1FE69240000
|
heap
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
1745B6BA000
|
trusted library allocation
|
page read and write
|
||
7DF4CB880000
|
trusted library allocation
|
page execute and read and write
|
||
778000
|
stack
|
page read and write
|
||
7FFAAC876000
|
trusted library allocation
|
page read and write
|
||
1299000
|
heap
|
page read and write
|
||
2E99000
|
heap
|
page read and write
|
||
4BE1000
|
trusted library allocation
|
page read and write
|
||
7FFAACD20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC760000
|
trusted library allocation
|
page read and write
|
||
7DF4CB890000
|
trusted library allocation
|
page execute and read and write
|
||
20311FF000
|
stack
|
page read and write
|
||
1FE61082000
|
trusted library allocation
|
page read and write
|
||
1CBFE000
|
stack
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
23A50886000
|
trusted library allocation
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
1FE4F064000
|
heap
|
page read and write
|
||
1801A040000
|
heap
|
page read and write
|
||
1801BDE0000
|
heap
|
page readonly
|
||
2AF4A0C000
|
stack
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
17463771000
|
heap
|
page read and write
|
||
1BB4A000
|
heap
|
page read and write
|
||
1FE692A2000
|
heap
|
page read and write
|
||
2834E2CA000
|
trusted library allocation
|
page read and write
|
||
23A51770000
|
trusted library allocation
|
page read and write
|
||
7FFAACA10000
|
trusted library allocation
|
page read and write
|
||
CE3000
|
unkown
|
page readonly
|
||
7FFAAC7CC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB50000
|
trusted library allocation
|
page read and write
|
||
322E000
|
stack
|
page read and write
|
||
23A51B93000
|
trusted library allocation
|
page read and write
|
||
E765D6F000
|
unkown
|
page read and write
|
||
1B419000
|
heap
|
page read and write
|
||
2FBD000
|
heap
|
page read and write
|
||
13FE7000
|
trusted library allocation
|
page read and write
|
||
145E9000
|
trusted library allocation
|
page read and write
|
||
23A500D0000
|
heap
|
page readonly
|
||
7FFAAC770000
|
trusted library allocation
|
page read and write
|
||
23A68839000
|
heap
|
page read and write
|
||
7FFAAC6A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
1FE4EF34000
|
heap
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
7FFAAC610000
|
trusted library allocation
|
page read and write
|
||
7FFAACAE0000
|
trusted library allocation
|
page read and write
|
||
145C1000
|
trusted library allocation
|
page read and write
|
||
2FB6000
|
heap
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
7FFAACD30000
|
trusted library allocation
|
page read and write
|
||
6E83000
|
heap
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
513F000
|
stack
|
page read and write
|
||
1801D749000
|
trusted library allocation
|
page read and write
|
||
1BEF2000
|
unkown
|
page readonly
|
||
180344F1000
|
heap
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page read and write
|
||
2835D642000
|
trusted library allocation
|
page read and write
|
||
3102000
|
unkown
|
page readonly
|
||
7FFAAC640000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7A4000
|
trusted library allocation
|
page read and write
|
||
23A68AC7000
|
heap
|
page read and write
|
||
1744B1D6000
|
heap
|
page read and write
|
||
7FFB1DE65000
|
unkown
|
page readonly
|
||
7FFAAC64A000
|
trusted library allocation
|
page read and write
|
||
2E85000
|
heap
|
page read and write
|
||
6578000
|
heap
|
page read and write
|
||
7FFAAC546000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACAE0000
|
trusted library allocation
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
7FFAAC8E0000
|
trusted library allocation
|
page read and write
|
||
3239000
|
trusted library allocation
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page read and write
|
||
7FFAAC612000
|
trusted library allocation
|
page read and write
|
||
180344B3000
|
heap
|
page read and write
|
||
2834B500000
|
heap
|
page read and write
|
||
7FFAACDE0000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACA60000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6B0000
|
trusted library allocation
|
page read and write
|
||
1724000
|
heap
|
page read and write
|
||
135C000
|
heap
|
page read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC470000
|
trusted library allocation
|
page read and write
|
||
1315F000
|
trusted library allocation
|
page read and write
|
||
7FFAACA60000
|
trusted library allocation
|
page read and write
|
||
30E2000
|
unkown
|
page readonly
|
||
7FFAAC720000
|
trusted library allocation
|
page read and write
|
||
31CB000
|
trusted library allocation
|
page read and write
|
||
92FB6F7000
|
stack
|
page read and write
|
||
1C1DE000
|
stack
|
page read and write
|
||
17463403000
|
heap
|
page read and write
|
||
2FAD000
|
heap
|
page read and write
|
||
2834B580000
|
trusted library section
|
page read and write
|
||
7FFAAC506000
|
trusted library allocation
|
page read and write
|
||
2834E40A000
|
trusted library allocation
|
page read and write
|
||
1272000
|
heap
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
7FFAAC886000
|
trusted library allocation
|
page read and write
|
||
23A518EC000
|
trusted library allocation
|
page read and write
|
||
7422000
|
heap
|
page read and write
|
||
1FE692A7000
|
heap
|
page read and write
|
||
23A5156E000
|
trusted library allocation
|
page read and write
|
||
1FE4EF76000
|
heap
|
page read and write
|
||
1B9C0000
|
heap
|
page read and write
|
||
2834D3CF000
|
trusted library allocation
|
page read and write
|
||
2836582D000
|
heap
|
page read and write
|
||
18033EF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC770000
|
trusted library allocation
|
page read and write
|
||
73F2000
|
heap
|
page read and write
|
||
7FFAAC48D000
|
trusted library allocation
|
page execute and read and write
|
||
3AA4000
|
trusted library allocation
|
page read and write
|
||
7FFAACBF0000
|
trusted library allocation
|
page read and write
|
||
2FB2000
|
heap
|
page read and write
|
||
74201000
|
unkown
|
page execute read
|
||
308E000
|
stack
|
page read and write
|
||
1FE6914B000
|
heap
|
page read and write
|
||
7FFAACB10000
|
trusted library allocation
|
page read and write
|
||
23A50150000
|
trusted library allocation
|
page read and write
|
||
1B9BA000
|
heap
|
page read and write
|
||
73F1000
|
heap
|
page read and write
|
||
23A68B16000
|
heap
|
page read and write
|
||
7FFAAC7F0000
|
trusted library allocation
|
page read and write
|
||
92FB9B9000
|
stack
|
page read and write
|
||
7FFAAC464000
|
trusted library allocation
|
page read and write
|
||
CB1000
|
unkown
|
page execute read
|
||
7FFAAC6BE000
|
trusted library allocation
|
page read and write
|
||
1C846000
|
heap
|
page read and write
|
||
2AF488E000
|
stack
|
page read and write
|
||
13231000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B0000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
7FFAAC8B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B9000
|
trusted library allocation
|
page read and write
|
||
23A51A0E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C8000
|
trusted library allocation
|
page read and write
|
||
2834B35F000
|
heap
|
page read and write
|
||
38C7000
|
trusted library allocation
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
7FFAAC6A6000
|
trusted library allocation
|
page read and write
|
||
23A68A86000
|
heap
|
page read and write
|
||
13A6F000
|
trusted library allocation
|
page read and write
|
||
1FE60FA2000
|
trusted library allocation
|
page read and write
|
||
7FFAACE20000
|
trusted library allocation
|
page read and write
|
||
7DF415070000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACA00000
|
trusted library allocation
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
203268C000
|
stack
|
page read and write
|
||
2835D63B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page read and write
|
||
28365875000
|
heap
|
page read and write
|
||
1FE6107B000
|
trusted library allocation
|
page read and write
|
||
2F96000
|
heap
|
page read and write
|
||
2FBB000
|
heap
|
page read and write
|
||
7FFAACAC0000
|
trusted library allocation
|
page read and write
|
||
2836539F000
|
heap
|
page read and write
|
||
7FFAACC90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
23FF000
|
stack
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
7FFAAC620000
|
trusted library allocation
|
page read and write
|
||
2835D383000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4BC000
|
trusted library allocation
|
page execute and read and write
|
||
1744AE84000
|
heap
|
page read and write
|
||
133DD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC48C000
|
trusted library allocation
|
page execute and read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
7FFAAC614000
|
trusted library allocation
|
page read and write
|
||
7FFAACAA0000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
7FFAAC50C000
|
trusted library allocation
|
page execute and read and write
|
||
1803409F000
|
heap
|
page read and write
|
||
7FFAACA63000
|
trusted library allocation
|
page read and write
|
||
28365620000
|
trusted library allocation
|
page read and write
|
||
1801A030000
|
heap
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6A0000
|
trusted library allocation
|
page read and write
|
||
7FFAACDC0000
|
trusted library allocation
|
page read and write
|
||
62A3C7E000
|
stack
|
page read and write
|
||
1C7CA000
|
heap
|
page read and write
|
||
1FE6923E000
|
heap
|
page read and write
|
||
1744C083000
|
trusted library allocation
|
page read and write
|
||
17463480000
|
heap
|
page read and write
|
||
7FFAACC00000
|
trusted library allocation
|
page read and write
|
||
7FFAAC463000
|
trusted library allocation
|
page execute and read and write
|
||
23A51577000
|
trusted library allocation
|
page read and write
|
||
1744D1BD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6D0000
|
trusted library allocation
|
page read and write
|
||
1C002000
|
unkown
|
page readonly
|
||
2AF367F000
|
unkown
|
page read and write
|
||
194E1990000
|
heap
|
page read and write
|
||
2834B3A6000
|
heap
|
page read and write
|
||
7FFAAC46D000
|
trusted library allocation
|
page execute and read and write
|
||
1744B533000
|
trusted library allocation
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
78B000
|
stack
|
page read and write
|
||
717C000
|
stack
|
page read and write
|
||
194E1D34000
|
heap
|
page read and write
|
||
28365881000
|
heap
|
page read and write
|
||
7FFAACE10000
|
trusted library allocation
|
page read and write
|
||
7FFAACA80000
|
trusted library allocation
|
page read and write
|
||
20310F3000
|
stack
|
page read and write
|
||
283654E0000
|
heap
|
page read and write
|
||
2FAC000
|
heap
|
page read and write
|
||
23A4E6F2000
|
heap
|
page read and write
|
||
1244000
|
heap
|
page read and write
|
||
7FFAACAB0000
|
trusted library allocation
|
page read and write
|
||
2834D81E000
|
trusted library allocation
|
page read and write
|
||
92FB7F8000
|
stack
|
page read and write
|
||
1801BF47000
|
trusted library allocation
|
page read and write
|
||
1BB40000
|
heap
|
page read and write
|
||
7FFAAC624000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8C2000
|
trusted library allocation
|
page read and write
|
||
13187000
|
trusted library allocation
|
page read and write
|
||
4DCC000
|
heap
|
page read and write
|
||
1801A09C000
|
heap
|
page read and write
|
||
7FFAACA53000
|
trusted library allocation
|
page read and write
|
||
1745B6AB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC450000
|
trusted library allocation
|
page read and write
|
||
2AF3DBE000
|
stack
|
page read and write
|
||
1801BEB0000
|
heap
|
page execute and read and write
|
||
7FFAAC7A8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6E0000
|
trusted library allocation
|
page read and write
|
||
2834E4A7000
|
trusted library allocation
|
page read and write
|
||
4C14000
|
heap
|
page read and write
|
||
7FFAAC793000
|
trusted library allocation
|
page read and write
|
||
4E3B000
|
heap
|
page read and write
|
||
7FFAAC7B4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC560000
|
trusted library allocation
|
page execute and read and write
|
||
1FE4EEF0000
|
heap
|
page read and write
|
||
7FFB1DE60000
|
unkown
|
page read and write
|
||
7FFAAC790000
|
trusted library allocation
|
page read and write
|
||
3010000
|
heap
|
page execute and read and write
|
||
194E1A67000
|
heap
|
page read and write
|
||
1744B446000
|
trusted library allocation
|
page read and write
|
||
1333000
|
heap
|
page read and write
|
||
283654F6000
|
heap
|
page read and write
|
||
7FFAAC7D0000
|
trusted library allocation
|
page read and write
|
||
519E000
|
stack
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
23A688AA000
|
heap
|
page read and write
|
||
7FFB1DE60000
|
unkown
|
page read and write
|
||
2834B420000
|
heap
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
B10000
|
unkown
|
page readonly
|
||
7FFAAC840000
|
trusted library allocation
|
page read and write
|
||
18034112000
|
heap
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
7FFAAC763000
|
trusted library allocation
|
page read and write
|
||
92FB57E000
|
stack
|
page read and write
|
||
7FFAAC4AC000
|
trusted library allocation
|
page execute and read and write
|
||
1801DCBC000
|
trusted library allocation
|
page read and write
|
||
20314F9000
|
stack
|
page read and write
|
||
1FE526DA000
|
trusted library allocation
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
7FFB1DE41000
|
unkown
|
page execute read
|
||
14806000
|
trusted library allocation
|
page read and write
|
||
7FFAACD10000
|
trusted library allocation
|
page read and write
|
||
1309000
|
heap
|
page read and write
|
||
7FFAAC440000
|
trusted library allocation
|
page read and write
|
||
7FFAAC51C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC790000
|
trusted library allocation
|
page read and write
|
||
1FE50D80000
|
heap
|
page execute and read and write
|
||
135E000
|
heap
|
page read and write
|
||
7FFAAC7C8000
|
trusted library allocation
|
page read and write
|
||
1BEF0000
|
unkown
|
page readonly
|
||
1FE69490000
|
heap
|
page read and write
|
||
2D8B000
|
stack
|
page read and write
|
||
28365837000
|
heap
|
page read and write
|
||
7FFAAC7C8000
|
trusted library allocation
|
page read and write
|
||
1801BE27000
|
heap
|
page execute and read and write
|
||
7FFAACDF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page read and write
|
||
1C0A5000
|
heap
|
page read and write
|
||
1746375C000
|
heap
|
page read and write
|
||
E76627D000
|
stack
|
page read and write
|
||
2F2E000
|
heap
|
page read and write
|
||
7FFAAC516000
|
trusted library allocation
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
7FFAAC85A000
|
trusted library allocation
|
page read and write
|
||
2F21000
|
heap
|
page read and write
|
||
1FE69152000
|
heap
|
page read and write
|
||
1323D000
|
trusted library allocation
|
page read and write
|
||
1FE6929B000
|
heap
|
page read and write
|
||
7FFAAC792000
|
trusted library allocation
|
page read and write
|
||
2F9E000
|
heap
|
page read and write
|
||
7FFAAC464000
|
trusted library allocation
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page read and write
|
||
17449530000
|
heap
|
page read and write
|
||
7384000
|
heap
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
30C2000
|
unkown
|
page readonly
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
1801BDF0000
|
trusted library allocation
|
page read and write
|
||
1801D722000
|
trusted library allocation
|
page read and write
|
||
174636C7000
|
heap
|
page read and write
|
||
23A50184000
|
heap
|
page read and write
|
||
2834B365000
|
heap
|
page read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page read and write
|
||
62A40BE000
|
stack
|
page read and write
|
||
31F000
|
stack
|
page read and write
|
||
7FFAACBE0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC510000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC516000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC793000
|
trusted library allocation
|
page read and write
|
||
1BEC2000
|
unkown
|
page readonly
|
||
1FE52BB0000
|
trusted library allocation
|
page read and write
|
||
1C050000
|
heap
|
page read and write
|
||
592F000
|
stack
|
page read and write
|
||
180340EA000
|
heap
|
page read and write
|
||
7FFAACB33000
|
trusted library allocation
|
page read and write
|
||
7FFAACDA5000
|
trusted library allocation
|
page read and write
|
||
1802BEC1000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD8000
|
trusted library allocation
|
page read and write
|
||
180344DA000
|
heap
|
page read and write
|
||
7FFAAC462000
|
trusted library allocation
|
page read and write
|
||
2834CE34000
|
heap
|
page read and write
|
||
7FFAAC8C0000
|
trusted library allocation
|
page read and write
|
||
174493F0000
|
heap
|
page read and write
|
||
2834F14C000
|
trusted library allocation
|
page read and write
|
||
283653FB000
|
heap
|
page read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page read and write
|
||
62A3E3E000
|
stack
|
page read and write
|
||
1744C47A000
|
trusted library allocation
|
page read and write
|
||
13091000
|
trusted library allocation
|
page read and write
|
||
23A60821000
|
trusted library allocation
|
page read and write
|
||
1C34E000
|
stack
|
page read and write
|
||
2FA9000
|
heap
|
page read and write
|
||
7421D000
|
unkown
|
page read and write
|
||
1801D016000
|
trusted library allocation
|
page read and write
|
||
1FE68EE7000
|
heap
|
page execute and read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page read and write
|
||
1CB4E000
|
stack
|
page read and write
|
||
1744BFB5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page read and write
|
||
FB0000
|
heap
|
page read and write
|
||
7FFAAC760000
|
trusted library allocation
|
page read and write
|
||
15F4000
|
heap
|
page read and write
|
||
23A500E0000
|
trusted library allocation
|
page read and write
|
||
2FD9000
|
heap
|
page read and write
|
||
17463687000
|
heap
|
page read and write
|
||
7FFAAC478000
|
trusted library allocation
|
page read and write
|
||
1744C6C0000
|
trusted library allocation
|
page read and write
|
||
1744CBE4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
2FA1000
|
heap
|
page read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page read and write
|
||
7FFAACD40000
|
trusted library allocation
|
page read and write
|
||
23A5214B000
|
trusted library allocation
|
page read and write
|
||
1801A048000
|
heap
|
page read and write
|
||
1BF00000
|
unkown
|
page readonly
|
||
2834D2D0000
|
heap
|
page execute and read and write
|
||
1468F000
|
trusted library allocation
|
page read and write
|
||
1BED2000
|
unkown
|
page readonly
|
||
1C7C0000
|
heap
|
page read and write
|
||
6E80000
|
heap
|
page read and write
|
||
1BA2E000
|
heap
|
page read and write
|
||
2FB3000
|
heap
|
page read and write
|
||
62A41BE000
|
stack
|
page read and write
|
||
7FFAAC600000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC460000
|
trusted library allocation
|
page read and write
|
||
1FE4F104000
|
heap
|
page read and write
|
||
74216000
|
unkown
|
page readonly
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B4000
|
trusted library allocation
|
page read and write
|
||
2DFE000
|
stack
|
page read and write
|
||
2C8B000
|
stack
|
page read and write
|
||
1744944F000
|
heap
|
page read and write
|
||
283655D0000
|
heap
|
page execute and read and write
|
||
12D000
|
stack
|
page read and write
|
||
7FFAACE40000
|
trusted library allocation
|
page read and write
|
||
1744CC23000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B0000
|
trusted library allocation
|
page read and write
|
||
2834B361000
|
heap
|
page read and write
|
||
7FFAACAF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC470000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
7FFAAC7C2000
|
trusted library allocation
|
page read and write
|
||
3058000
|
unkown
|
page readonly
|
||
4BE0000
|
heap
|
page read and write
|
||
2F93000
|
heap
|
page read and write
|
||
7FFAAC84C000
|
trusted library allocation
|
page read and write
|
||
2F97000
|
heap
|
page read and write
|
||
E7661F7000
|
stack
|
page read and write
|
||
7FFAAC642000
|
trusted library allocation
|
page read and write
|
||
3005000
|
heap
|
page read and write
|
||
1FE519EF000
|
trusted library allocation
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
1BD50000
|
unkown
|
page readonly
|
||
E76607F000
|
stack
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page read and write
|
||
7FFAACD50000
|
trusted library allocation
|
page read and write
|
||
23A68A8D000
|
heap
|
page read and write
|
||
7FFAAC51C000
|
trusted library allocation
|
page execute and read and write
|
||
E76710E000
|
stack
|
page read and write
|
||
7DF4CB870000
|
trusted library allocation
|
page execute and read and write
|
||
2835D381000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page read and write
|
||
62A3CFB000
|
stack
|
page read and write
|
||
2F92000
|
heap
|
page read and write
|
||
283658E0000
|
heap
|
page read and write
|
||
2834DDA2000
|
trusted library allocation
|
page read and write
|
||
17463401000
|
heap
|
page read and write
|
||
14311000
|
trusted library allocation
|
page read and write
|
||
1744B3C1000
|
trusted library allocation
|
page read and write
|
||
1FE4F060000
|
heap
|
page read and write
|
||
7FFAAC452000
|
trusted library allocation
|
page read and write
|
||
7FFAACDB9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
2AF397D000
|
stack
|
page read and write
|
||
7FFAAC8D0000
|
trusted library allocation
|
page read and write
|
||
B53000
|
unkown
|
page readonly
|
||
7FFAAC8BD000
|
trusted library allocation
|
page read and write
|
||
283658C9000
|
heap
|
page read and write
|
||
2835D7BB000
|
trusted library allocation
|
page read and write
|
||
1FE4F100000
|
heap
|
page read and write
|
||
23A51401000
|
trusted library allocation
|
page read and write
|
||
23A525FD000
|
trusted library allocation
|
page read and write
|
||
2834B5C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6E0000
|
trusted library allocation
|
page read and write
|
||
7FFAACAC0000
|
trusted library allocation
|
page read and write
|
||
3AD6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC580000
|
trusted library allocation
|
page execute and read and write
|
||
20318B9000
|
stack
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
2834E21B000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
unkown
|
page readonly
|
||
7FFAACD90000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6B0000
|
trusted library allocation
|
page read and write
|
||
62A423B000
|
stack
|
page read and write
|
||
62A4D8E000
|
stack
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6D2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC43D000
|
trusted library allocation
|
page execute and read and write
|
||
203270C000
|
stack
|
page read and write
|
||
7FFAAC642000
|
trusted library allocation
|
page read and write
|
||
7FFAAC600000
|
trusted library allocation
|
page read and write
|
||
1B61A000
|
stack
|
page read and write
|
||
7FFAAC72F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
1802C1B0000
|
trusted library allocation
|
page read and write
|
||
283658D2000
|
heap
|
page read and write
|
||
1C0DE000
|
stack
|
page read and write
|
||
72F1000
|
heap
|
page read and write
|
||
7FFAAC820000
|
trusted library allocation
|
page read and write
|
||
92FC709000
|
stack
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
23A4E670000
|
heap
|
page read and write
|
||
3060000
|
unkown
|
page readonly
|
||
7FFAACDD0000
|
trusted library allocation
|
page read and write
|
||
7394000
|
heap
|
page read and write
|
||
2834D340000
|
heap
|
page read and write
|
||
7FFAAC7CA000
|
trusted library allocation
|
page read and write
|
||
2FD9000
|
heap
|
page read and write
|
||
7FFAAC6A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC536000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACB7D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC644000
|
trusted library allocation
|
page read and write
|
||
6570000
|
heap
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page execute and read and write
|
||
2834EC9B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC70C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
E76663C000
|
stack
|
page read and write
|
||
1FE60DB1000
|
trusted library allocation
|
page read and write
|
||
2836581F000
|
heap
|
page read and write
|
||
3231000
|
trusted library allocation
|
page read and write
|
||
23A520ED000
|
trusted library allocation
|
page read and write
|
||
2834B590000
|
trusted library section
|
page read and write
|
||
2AF38F9000
|
stack
|
page read and write
|
||
7FFAAC6D0000
|
trusted library allocation
|
page read and write
|
||
1FE6928A000
|
heap
|
page read and write
|
||
2E9E000
|
heap
|
page read and write
|
||
7FFAAC8E0000
|
trusted library allocation
|
page read and write
|
||
1FE4ED70000
|
heap
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
7FFAAC600000
|
trusted library allocation
|
page read and write
|
||
92FB1E3000
|
stack
|
page read and write
|
||
129B000
|
heap
|
page read and write
|
||
7FFAACA70000
|
trusted library allocation
|
page read and write
|
||
1FE60DC1000
|
trusted library allocation
|
page read and write
|
||
174495A0000
|
heap
|
page readonly
|
||
E76617E000
|
stack
|
page read and write
|
||
23A68874000
|
heap
|
page read and write
|
||
7FFAAC442000
|
trusted library allocation
|
page read and write
|
||
17449431000
|
heap
|
page read and write
|
||
142CE000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
7FFAAC886000
|
trusted library allocation
|
page read and write
|
||
62A3FB9000
|
stack
|
page read and write
|
||
1FE4F070000
|
trusted library allocation
|
page read and write
|
||
7392000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
2834B5A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC600000
|
trusted library allocation
|
page read and write
|
||
1FE68E10000
|
heap
|
page execute and read and write
|
||
1BB33000
|
heap
|
page execute and read and write
|
||
1200000
|
heap
|
page read and write
|
||
18034330000
|
trusted library allocation
|
page read and write
|
||
1FE69132000
|
heap
|
page read and write
|
||
7FFAAC8B6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4EE000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC450000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
1744C593000
|
trusted library allocation
|
page read and write
|
||
7422000
|
heap
|
page read and write
|
||
7FFAAC550000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD30000
|
trusted library allocation
|
page read and write
|
||
2F21000
|
heap
|
page read and write
|
||
23A50720000
|
heap
|
page execute and read and write
|
||
23A50801000
|
trusted library allocation
|
page read and write
|
||
377F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6E0000
|
trusted library allocation
|
page read and write
|
||
14443000
|
trusted library allocation
|
page read and write
|
||
2F8F000
|
heap
|
page read and write
|
||
2AF36FF000
|
stack
|
page read and write
|
||
23A68920000
|
heap
|
page read and write
|
||
7FFB1DE60000
|
unkown
|
page read and write
|
||
1745B3F1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page read and write
|
||
28365354000
|
heap
|
page read and write
|
||
7384000
|
heap
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
7FFAACC00000
|
trusted library allocation
|
page read and write
|
||
7FFAAC51C000
|
trusted library allocation
|
page execute and read and write
|
||
2834E2B2000
|
trusted library allocation
|
page read and write
|
||
7FFAACDC0000
|
trusted library allocation
|
page read and write
|
||
1B0C0000
|
trusted library allocation
|
page read and write
|
||
2AF4A8E000
|
stack
|
page read and write
|
||
7FFAAC48B000
|
trusted library allocation
|
page execute and read and write
|
||
30D4000
|
unkown
|
page readonly
|
||
7FFAAC6A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5D0000
|
trusted library allocation
|
page read and write
|
||
1FE51B01000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
heap
|
page read and write
|
||
17449433000
|
heap
|
page read and write
|
||
1801CEC1000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
1553000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7D0000
|
trusted library allocation
|
page execute and read and write
|
||
1FE4EF16000
|
heap
|
page read and write
|
||
760000
|
stack
|
page read and write
|
||
62A3F39000
|
stack
|
page read and write
|
||
7FFAAC620000
|
trusted library allocation
|
page read and write
|
||
13D61000
|
trusted library allocation
|
page read and write
|
||
2AF3B3E000
|
stack
|
page read and write
|
||
23A4E880000
|
heap
|
page read and write
|
||
4DC0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC49C000
|
trusted library allocation
|
page execute and read and write
|
||
283658CB000
|
heap
|
page read and write
|
||
7FFAAC453000
|
trusted library allocation
|
page execute and read and write
|
||
2834E353000
|
trusted library allocation
|
page read and write
|
||
174495D4000
|
heap
|
page read and write
|
||
23A6883B000
|
heap
|
page read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page read and write
|
||
2834D579000
|
trusted library allocation
|
page read and write
|
||
2834B36B000
|
heap
|
page read and write
|
||
7FFAACA30000
|
trusted library allocation
|
page read and write
|
||
7FFAAC51C000
|
trusted library allocation
|
page execute and read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
1FE4EFE8000
|
heap
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
7FFAAC460000
|
trusted library allocation
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
7FFAACDE7000
|
trusted library allocation
|
page read and write
|
||
17449590000
|
trusted library allocation
|
page read and write
|
||
72C2000
|
heap
|
page read and write
|
||
1FE5214A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACA30000
|
trusted library allocation
|
page read and write
|
||
1CDFD000
|
stack
|
page read and write
|
||
7FFAAC600000
|
trusted library allocation
|
page execute and read and write
|
||
1744D1DD000
|
trusted library allocation
|
page read and write
|
||
2EEB000
|
heap
|
page read and write
|
||
180344DE000
|
heap
|
page read and write
|
||
2AF3A3F000
|
stack
|
page read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
7FFAAC684000
|
trusted library allocation
|
page read and write
|
||
1801A230000
|
heap
|
page read and write
|
||
E76673B000
|
stack
|
page read and write
|
||
174495D0000
|
heap
|
page read and write
|
||
369D000
|
trusted library allocation
|
page read and write
|
||
1746348C000
|
heap
|
page read and write
|
||
131B000
|
heap
|
page read and write
|
||
1803413C000
|
heap
|
page read and write
|
||
2ED8000
|
heap
|
page read and write
|
||
1BB2B000
|
heap
|
page read and write
|
||
7FFAAC853000
|
trusted library allocation
|
page read and write
|
||
1BE90000
|
unkown
|
page readonly
|
||
23A6889F000
|
heap
|
page read and write
|
||
2834E46D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC510000
|
trusted library allocation
|
page read and write
|
||
2834B401000
|
heap
|
page read and write
|
||
1745B736000
|
trusted library allocation
|
page read and write
|
||
2AF39F9000
|
stack
|
page read and write
|
||
23A513EB000
|
trusted library allocation
|
page read and write
|
||
2F9A000
|
heap
|
page read and write
|
||
1FE69183000
|
heap
|
page read and write
|
||
23A60873000
|
trusted library allocation
|
page read and write
|
||
7FFAAC86E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
62A413C000
|
stack
|
page read and write
|
||
2AF33E3000
|
stack
|
page read and write
|
||
7FFAACD40000
|
trusted library allocation
|
page read and write
|
||
7391000
|
heap
|
page read and write
|
||
1744C3EF000
|
trusted library allocation
|
page read and write
|
||
7FFAACD60000
|
trusted library allocation
|
page read and write
|
||
180340DE000
|
heap
|
page read and write
|
||
2834EACE000
|
trusted library allocation
|
page read and write
|
||
92FBB3C000
|
stack
|
page read and write
|
||
2EF5000
|
heap
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
7FFAAC7AC000
|
trusted library allocation
|
page read and write
|
||
1FE4EFF0000
|
trusted library allocation
|
page read and write
|
||
79A000
|
stack
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
518E000
|
stack
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page read and write
|
||
147DF000
|
trusted library allocation
|
page read and write
|
||
7FFAACC40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6A0000
|
trusted library allocation
|
page read and write
|
||
2FB9000
|
heap
|
page read and write
|
||
7FFAAC640000
|
trusted library allocation
|
page read and write
|
||
1FE60E02000
|
trusted library allocation
|
page read and write
|
||
1BEA2000
|
unkown
|
page readonly
|
||
E7666BE000
|
stack
|
page read and write
|
||
2834E37E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
7FFAACAF0000
|
trusted library allocation
|
page read and write
|
||
1FE517E1000
|
trusted library allocation
|
page read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page read and write
|
||
B12000
|
unkown
|
page readonly
|
||
92FC60E000
|
stack
|
page read and write
|
||
2FD9000
|
heap
|
page read and write
|
||
23A60AFA000
|
trusted library allocation
|
page read and write
|
||
28365740000
|
heap
|
page read and write
|
||
1FE61080000
|
trusted library allocation
|
page read and write
|
||
2F9D000
|
heap
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page execute and read and write
|
||
17BF000
|
stack
|
page read and write
|
||
28365759000
|
heap
|
page read and write
|
||
7FFAAC4EC000
|
trusted library allocation
|
page execute and read and write
|
||
23A519D5000
|
trusted library allocation
|
page read and write
|
||
18034136000
|
heap
|
page read and write
|
||
7391000
|
heap
|
page read and write
|
||
23A50070000
|
heap
|
page read and write
|
||
23A52064000
|
trusted library allocation
|
page read and write
|
||
7FFAACC33000
|
trusted library allocation
|
page read and write
|
||
7FFAACBF0000
|
trusted library allocation
|
page read and write
|
||
72C0000
|
heap
|
page read and write
|
||
7FFAAC6E0000
|
trusted library allocation
|
page read and write
|
||
7FFAACE70000
|
trusted library allocation
|
page read and write
|
||
1FE690FC000
|
heap
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page execute and read and write
|
||
3797000
|
trusted library allocation
|
page read and write
|
||
1CF3E000
|
stack
|
page read and write
|
||
7FFAAC516000
|
trusted library allocation
|
page read and write
|
||
203157E000
|
stack
|
page read and write
|
||
7FFAAC4F0000
|
trusted library allocation
|
page read and write
|
||
7FFAACC30000
|
trusted library allocation
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
7FFAAC61A000
|
trusted library allocation
|
page read and write
|
||
1FE4F0E0000
|
heap
|
page read and write
|
||
2834B320000
|
heap
|
page read and write
|
||
3769000
|
trusted library allocation
|
page read and write
|
||
35E000
|
stack
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
62A3DF9000
|
stack
|
page read and write
|
||
7FFAAC468000
|
trusted library allocation
|
page read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page read and write
|
||
7FFAAC615000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
133D5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC454000
|
trusted library allocation
|
page read and write
|
||
7FFAAC510000
|
trusted library allocation
|
page read and write
|
||
17449439000
|
heap
|
page read and write
|
||
CB1000
|
unkown
|
page execute read
|
||
1745B695000
|
trusted library allocation
|
page read and write
|
||
2AF498C000
|
stack
|
page read and write
|
||
7FFAAC463000
|
trusted library allocation
|
page execute and read and write
|
||
1FE5202E000
|
trusted library allocation
|
page read and write
|
||
62A4C87000
|
stack
|
page read and write
|
||
7FFAAC8C6000
|
trusted library allocation
|
page read and write
|
||
1802BF32000
|
trusted library allocation
|
page read and write
|
||
CF5000
|
unkown
|
page read and write
|
||
7FFAAC6B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9DE000
|
trusted library allocation
|
page read and write
|
||
7FFAACE10000
|
trusted library allocation
|
page read and write
|
||
7FFAACB20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC799000
|
trusted library allocation
|
page read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page read and write
|
||
7FFAAC473000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B9000
|
trusted library allocation
|
page read and write
|
||
1B960000
|
heap
|
page read and write
|
||
7FFAACC20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC460000
|
trusted library allocation
|
page read and write
|
||
23A5261D000
|
trusted library allocation
|
page read and write
|
||
1FE690F0000
|
heap
|
page read and write
|
||
7DF453080000
|
trusted library allocation
|
page execute and read and write
|
||
3070000
|
unkown
|
page readonly
|
||
7FFAAC546000
|
trusted library allocation
|
page execute and read and write
|
||
203250E000
|
stack
|
page read and write
|
||
1801BA60000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page read and write
|
||
1FE5208F000
|
trusted library allocation
|
page read and write
|
||
23A68AD6000
|
heap
|
page read and write
|
||
30E0000
|
unkown
|
page readonly
|
||
7FFAACAA0000
|
trusted library allocation
|
page read and write
|
||
1FE6108A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC618000
|
trusted library allocation
|
page read and write
|
||
7FFAAC611000
|
trusted library allocation
|
page read and write
|
||
2F93000
|
heap
|
page read and write
|
||
7FFAAC44B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page read and write
|
||
E765CE3000
|
stack
|
page read and write
|
||
7FFAACA13000
|
trusted library allocation
|
page read and write
|
||
23A68A00000
|
heap
|
page read and write
|
||
7FFAACB00000
|
trusted library allocation
|
page read and write
|
||
23A60831000
|
trusted library allocation
|
page read and write
|
||
7FFAAC444000
|
trusted library allocation
|
page read and write
|
||
92FB83E000
|
stack
|
page read and write
|
||
1C000000
|
unkown
|
page readonly
|
||
203278E000
|
stack
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page read and write
|
||
2FBD000
|
heap
|
page read and write
|
||
2F21000
|
heap
|
page read and write
|
||
2834B3AA000
|
heap
|
page read and write
|
||
92FBBBE000
|
stack
|
page read and write
|
||
312D000
|
heap
|
page read and write
|
||
567F000
|
stack
|
page read and write
|
||
7FFAAC470000
|
trusted library allocation
|
page read and write
|
||
194E1D30000
|
heap
|
page read and write
|
||
7FFAACC20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page read and write
|
||
1801D27A000
|
trusted library allocation
|
page read and write
|
||
1FE51F62000
|
trusted library allocation
|
page read and write
|
||
2836583B000
|
heap
|
page read and write
|
||
7FFAAC6D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC484000
|
trusted library allocation
|
page read and write
|
||
30A2000
|
unkown
|
page readonly
|
||
7FFAAC46D000
|
trusted library allocation
|
page execute and read and write
|
||
1801CFDB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC47D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC8E0000
|
trusted library allocation
|
page read and write
|
||
13471000
|
trusted library allocation
|
page read and write
|
||
2834B332000
|
heap
|
page read and write
|
||
7FFAACA40000
|
trusted library allocation
|
page read and write
|
||
529C000
|
stack
|
page read and write
|
||
174636CF000
|
heap
|
page read and write
|
||
1FE4EF38000
|
heap
|
page read and write
|
||
2AF37F9000
|
stack
|
page read and write
|
||
1801A0C7000
|
heap
|
page read and write
|
||
3571000
|
trusted library allocation
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
1FE52BAB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C2000
|
trusted library allocation
|
page read and write
|
||
1FE69288000
|
heap
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
1801D092000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5EA000
|
trusted library allocation
|
page read and write
|
||
2834DF45000
|
trusted library allocation
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
1744D198000
|
trusted library allocation
|
page read and write
|
||
30F8000
|
unkown
|
page readonly
|
||
62A403F000
|
stack
|
page read and write
|
||
17463800000
|
heap
|
page read and write
|
||
174493D0000
|
heap
|
page read and write
|
||
23A50A2A000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page execute and read and write
|
||
2835D371000
|
trusted library allocation
|
page read and write
|
||
1FE60D91000
|
trusted library allocation
|
page read and write
|
||
3092000
|
unkown
|
page readonly
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC463000
|
trusted library allocation
|
page read and write
|
||
1700000
|
heap
|
page execute and read and write
|
||
6580000
|
trusted library allocation
|
page read and write
|
||
1801D15E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC516000
|
trusted library allocation
|
page read and write
|
||
7FFAAC45B000
|
trusted library allocation
|
page read and write
|
||
1744C3C3000
|
trusted library allocation
|
page read and write
|
||
789000
|
stack
|
page read and write
|
||
2834D189000
|
heap
|
page read and write
|
||
7FFAAC648000
|
trusted library allocation
|
page read and write
|
||
7FFAACBE8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
1802BEF3000
|
trusted library allocation
|
page read and write
|
||
2748000
|
heap
|
page read and write
|
||
18033F3A000
|
heap
|
page read and write
|
||
4E25000
|
heap
|
page read and write
|
||
2834CE10000
|
trusted library allocation
|
page read and write
|
||
1FE6926E000
|
heap
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
1744C5CC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page read and write
|
||
707F000
|
stack
|
page read and write
|
||
7FFAAC7C5000
|
trusted library allocation
|
page read and write
|
||
3686000
|
trusted library allocation
|
page read and write
|
||
1745B6B2000
|
trusted library allocation
|
page read and write
|
||
7FFAACA2D000
|
trusted library allocation
|
page read and write
|
||
7FFAACAD0000
|
trusted library allocation
|
page read and write
|
||
2AF387E000
|
stack
|
page read and write
|
||
174635D0000
|
heap
|
page read and write
|
||
7FFAACE30000
|
trusted library allocation
|
page read and write
|
||
28365720000
|
heap
|
page read and write
|
||
1744CD0B000
|
trusted library allocation
|
page read and write
|
||
14789000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
7FFAAC663000
|
trusted library allocation
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
7FFAACE30000
|
trusted library allocation
|
page read and write
|
||
36B7000
|
trusted library allocation
|
page read and write
|
||
7DF4DACF0000
|
trusted library allocation
|
page execute and read and write
|
||
143FB000
|
trusted library allocation
|
page read and write
|
||
1BF22000
|
unkown
|
page readonly
|
||
7FFAACD80000
|
trusted library allocation
|
page read and write
|
||
14608000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
23A68DD0000
|
heap
|
page read and write
|
||
7FFAAC896000
|
trusted library allocation
|
page read and write
|
||
1FE50FB8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC526000
|
trusted library allocation
|
page execute and read and write
|
||
2834B5E0000
|
heap
|
page read and write
|
||
1801D1BF000
|
trusted library allocation
|
page read and write
|
||
14283000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7A0000
|
trusted library allocation
|
page read and write
|
||
1FE68FA7000
|
heap
|
page read and write
|
||
23A500C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
23A4E6C2000
|
heap
|
page read and write
|
||
23A4E6B0000
|
heap
|
page read and write
|
||
7FFB1DE60000
|
unkown
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page read and write
|
||
1801A080000
|
heap
|
page read and write
|
||
7FFAAC443000
|
trusted library allocation
|
page execute and read and write
|
||
2E67000
|
heap
|
page read and write
|
||
174492F0000
|
heap
|
page read and write
|
||
7FFAAC85C000
|
trusted library allocation
|
page read and write
|
||
596B000
|
stack
|
page read and write
|
||
2834CDC0000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
2FBE000
|
heap
|
page read and write
|
||
20315FB000
|
stack
|
page read and write
|
||
2E89000
|
heap
|
page read and write
|
||
30B2000
|
unkown
|
page readonly
|
||
174633C0000
|
heap
|
page read and write
|
||
7FFAAC644000
|
trusted library allocation
|
page read and write
|
||
283658A2000
|
heap
|
page read and write
|
||
7FFAAC430000
|
trusted library allocation
|
page read and write
|
||
7DF4E21C0000
|
trusted library allocation
|
page execute and read and write
|
||
15A0000
|
heap
|
page read and write
|
||
7FFAAC5E1000
|
trusted library allocation
|
page read and write
|
||
F5A000
|
stack
|
page read and write
|
||
23A68A94000
|
heap
|
page read and write
|
||
1744CC4A000
|
trusted library allocation
|
page read and write
|
||
1BE70000
|
unkown
|
page readonly
|
||
7FFAAC83C000
|
trusted library allocation
|
page read and write
|
||
2834EBDA000
|
trusted library allocation
|
page read and write
|
||
2835D3C2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
7FFAAC88D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page execute and read and write
|
||
1801C38C000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
17463769000
|
heap
|
page read and write
|
||
7FFAACC80000
|
trusted library allocation
|
page read and write
|
||
1365000
|
heap
|
page read and write
|
||
92FC78C000
|
stack
|
page read and write
|
||
1744C65F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B4000
|
trusted library allocation
|
page read and write
|
||
1744D1E2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7F0000
|
trusted library allocation
|
page read and write
|
||
1B260000
|
trusted library allocation
|
page read and write
|
||
1434F000
|
trusted library allocation
|
page read and write
|
||
1745B6B0000
|
trusted library allocation
|
page read and write
|
||
1801CC78000
|
trusted library allocation
|
page read and write
|
||
2834B328000
|
heap
|
page read and write
|
||
92FB8B7000
|
stack
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B0000
|
trusted library allocation
|
page read and write
|
||
7FFAACDB0000
|
trusted library allocation
|
page read and write
|
||
62A3D7E000
|
stack
|
page read and write
|
||
16BE000
|
stack
|
page read and write
|
||
7FFAAC460000
|
trusted library allocation
|
page read and write
|
||
92FBABF000
|
stack
|
page read and write
|
||
785000
|
stack
|
page read and write
|
||
2834F16C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC47D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC648000
|
trusted library allocation
|
page read and write
|
||
1802BEE1000
|
trusted library allocation
|
page read and write
|
||
1744B88E000
|
trusted library allocation
|
page read and write
|
||
13244000
|
trusted library allocation
|
page read and write
|
||
7FFAACB30000
|
trusted library allocation
|
page read and write
|
||
23A51B3B000
|
trusted library allocation
|
page read and write
|
||
2836584F000
|
heap
|
page read and write
|
||
509D000
|
stack
|
page read and write
|
||
1FE50D91000
|
trusted library allocation
|
page read and write
|
||
72F1000
|
heap
|
page read and write
|
||
174494F0000
|
heap
|
page read and write
|
||
17463484000
|
heap
|
page read and write
|
||
7FFAAC89D000
|
trusted library allocation
|
page read and write
|
||
125B000
|
heap
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7E0000
|
trusted library allocation
|
page read and write
|
||
1801CEED000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
unkown
|
page readonly
|
||
174637F0000
|
trusted library allocation
|
page read and write
|
||
1CA4E000
|
stack
|
page read and write
|
||
2834D2D7000
|
heap
|
page execute and read and write
|
||
23A5182F000
|
trusted library allocation
|
page read and write
|
||
2FA8000
|
heap
|
page read and write
|
||
13875000
|
trusted library allocation
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
7FFAAC6C0000
|
trusted library allocation
|
page read and write
|
||
D13000
|
unkown
|
page readonly
|
||
1802BEF1000
|
trusted library allocation
|
page read and write
|
||
FCB000
|
stack
|
page read and write
|
||
1BB30000
|
heap
|
page execute and read and write
|
||
1745B842000
|
trusted library allocation
|
page read and write
|
||
336B000
|
trusted library allocation
|
page read and write
|
||
2AF3D3C000
|
stack
|
page read and write
|
||
7FFAAC470000
|
trusted library allocation
|
page read and write
|
||
14483000
|
trusted library allocation
|
page read and write
|
||
123C000
|
heap
|
page read and write
|
||
23A515B4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC580000
|
trusted library allocation
|
page execute and read and write
|
||
283657C1000
|
heap
|
page read and write
|
||
23A4E8C0000
|
heap
|
page read and write
|
||
1746361C000
|
heap
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
2E26000
|
heap
|
page read and write
|
||
7290000
|
heap
|
page read and write
|
||
1440E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page read and write
|
||
2834DF57000
|
trusted library allocation
|
page read and write
|
||
7FFAAC47B000
|
trusted library allocation
|
page execute and read and write
|
||
2834B36D000
|
heap
|
page read and write
|
||
7FFAACA90000
|
trusted library allocation
|
page read and write
|
||
7FFAACA40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7E0000
|
trusted library allocation
|
page read and write
|
||
17463473000
|
heap
|
page read and write
|
||
174636E7000
|
heap
|
page read and write
|
||
657E000
|
heap
|
page read and write
|
||
2AF4907000
|
stack
|
page read and write
|
||
2F89000
|
heap
|
page read and write
|
||
2F99000
|
heap
|
page read and write
|
||
62A3BFA000
|
stack
|
page read and write
|
||
1801A0C4000
|
heap
|
page read and write
|
||
6F7E000
|
stack
|
page read and write
|
||
7FFAACA50000
|
trusted library allocation
|
page read and write
|
||
7FFAACC53000
|
trusted library allocation
|
page read and write
|
||
73C0000
|
heap
|
page read and write
|
||
7FFAAC770000
|
trusted library allocation
|
page read and write
|
||
1BC00000
|
heap
|
page read and write
|
||
7FFAACD70000
|
trusted library allocation
|
page read and write
|
||
5A6C000
|
stack
|
page read and write
|
||
7384000
|
heap
|
page read and write
|
||
7FFAACB10000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9F0000
|
trusted library allocation
|
page read and write
|
||
7FFB1DE56000
|
unkown
|
page readonly
|
||
1745B617000
|
trusted library allocation
|
page read and write
|
||
17C0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4E6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC5F1000
|
trusted library allocation
|
page read and write
|
||
1367B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC628000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
318E000
|
stack
|
page read and write
|
||
3042000
|
unkown
|
page readonly
|
||
7FFAAC620000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
E7662F9000
|
stack
|
page read and write
|
||
74200000
|
unkown
|
page readonly
|
||
7FFAAC4FC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC46D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
1FE68E60000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
unkown
|
page readonly
|
||
1253000
|
heap
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
7FFAACD1D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC460000
|
trusted library allocation
|
page read and write
|
||
7FFAACD3A000
|
trusted library allocation
|
page read and write
|
||
23A4E8C4000
|
heap
|
page read and write
|
||
3062000
|
unkown
|
page readonly
|
||
35BD000
|
trusted library allocation
|
page read and write
|
||
3000000
|
unkown
|
page readonly
|
||
23A68AD2000
|
heap
|
page read and write
|
||
4E29000
|
heap
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
1FE6109A000
|
trusted library allocation
|
page read and write
|
||
1824000
|
heap
|
page read and write
|
||
7FFAAC510000
|
trusted library allocation
|
page read and write
|
||
62A3EB7000
|
stack
|
page read and write
|
||
3099000
|
trusted library allocation
|
page read and write
|
||
7FFAAC440000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B0000
|
trusted library allocation
|
page read and write
|
||
2834B37F000
|
heap
|
page read and write
|
||
1801CF79000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
E76738E000
|
stack
|
page read and write
|
||
7384000
|
heap
|
page read and write
|
||
7FFAAC622000
|
trusted library allocation
|
page read and write
|
||
7FFAAC46D000
|
trusted library allocation
|
page execute and read and write
|
||
1FE525F2000
|
trusted library allocation
|
page read and write
|
||
1FE4EF50000
|
heap
|
page read and write
|
||
1744AE80000
|
heap
|
page read and write
|
||
62A3A7F000
|
unkown
|
page read and write
|
||
174633D6000
|
heap
|
page read and write
|
||
7FFAAC7C0000
|
trusted library allocation
|
page read and write
|
||
2F22000
|
heap
|
page read and write
|
||
7FFAACC7A000
|
trusted library allocation
|
page read and write
|
||
283653F0000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
2836583F000
|
heap
|
page read and write
|
||
93C61BF000
|
stack
|
page read and write
|
||
23A51B36000
|
trusted library allocation
|
page read and write
|
||
23A50180000
|
heap
|
page read and write
|
||
7FFB1DE62000
|
unkown
|
page readonly
|
||
23A60AEC000
|
trusted library allocation
|
page read and write
|
||
7FFAACE20000
|
trusted library allocation
|
page read and write
|
||
7FFB1DE40000
|
unkown
|
page readonly
|
||
7FFAAC480000
|
trusted library allocation
|
page read and write
|
||
2FD9000
|
heap
|
page read and write
|
||
1BEB0000
|
unkown
|
page readonly
|
||
23A60801000
|
trusted library allocation
|
page read and write
|
||
23A68900000
|
heap
|
page read and write
|
||
17449437000
|
heap
|
page read and write
|
||
1744942F000
|
heap
|
page read and write
|
||
1744B5E9000
|
trusted library allocation
|
page read and write
|
||
7390000
|
heap
|
page read and write
|
||
2FA4000
|
heap
|
page read and write
|
||
1745B3E1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6D0000
|
trusted library allocation
|
page read and write
|
||
7FFAACD90000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6B0000
|
trusted library allocation
|
page read and write
|
||
174493F8000
|
heap
|
page read and write
|
||
1FE4EF3A000
|
heap
|
page read and write
|
||
1BF50000
|
unkown
|
page readonly
|
||
E7660F9000
|
stack
|
page read and write
|
||
1FE68F36000
|
heap
|
page read and write
|
||
7FFAAC790000
|
trusted library allocation
|
page read and write
|
||
2F92000
|
heap
|
page read and write
|
||
1744BE13000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
142FB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6B0000
|
trusted library allocation
|
page read and write
|
||
23A4E735000
|
heap
|
page read and write
|
||
30F2000
|
unkown
|
page readonly
|
||
7FFAAC463000
|
trusted library allocation
|
page execute and read and write
|
||
1801BA80000
|
trusted library allocation
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page read and write
|
||
7FFAACC30000
|
trusted library allocation
|
page read and write
|
||
3701000
|
trusted library allocation
|
page read and write
|
||
1801BA40000
|
trusted library section
|
page read and write
|
||
3002000
|
unkown
|
page readonly
|
||
2834EBB3000
|
trusted library allocation
|
page read and write
|
||
143AF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
2834D351000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
2834B5E4000
|
heap
|
page read and write
|
||
1D03B000
|
stack
|
page read and write
|
||
18033EC0000
|
trusted library allocation
|
page read and write
|
||
7FFAACA70000
|
trusted library allocation
|
page read and write
|
||
2836574E000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
2F19000
|
heap
|
page read and write
|
||
141AF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC740000
|
trusted library allocation
|
page read and write
|
||
2F58000
|
heap
|
page read and write
|
||
1745B3F3000
|
trusted library allocation
|
page read and write
|
||
1FE51D2A000
|
trusted library allocation
|
page read and write
|
||
E7663B7000
|
stack
|
page read and write
|
||
62A37E3000
|
stack
|
page read and write
|
||
7FFAAC464000
|
trusted library allocation
|
page read and write
|
||
23A51BBE000
|
trusted library allocation
|
page read and write
|
||
23A52622000
|
trusted library allocation
|
page read and write
|
||
17449435000
|
heap
|
page read and write
|
||
2AF3E3B000
|
stack
|
page read and write
|
||
1BF20000
|
unkown
|
page readonly
|
||
12F0000
|
heap
|
page read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page read and write
|
||
E76653E000
|
stack
|
page read and write
|
||
7FFAAC7C0000
|
trusted library allocation
|
page execute and read and write
|
||
1801DC96000
|
trusted library allocation
|
page read and write
|
||
72F1000
|
heap
|
page read and write
|
||
23A50110000
|
trusted library allocation
|
page read and write
|
||
7FFAACA90000
|
trusted library allocation
|
page read and write
|
||
2AF3C3E000
|
stack
|
page read and write
|
||
7291000
|
heap
|
page read and write
|
||
283654EF000
|
heap
|
page read and write
|
||
1FE51E49000
|
trusted library allocation
|
page read and write
|
||
1744B3B0000
|
heap
|
page execute and read and write
|
||
7FFAAC6D0000
|
trusted library allocation
|
page read and write
|
||
1803407B000
|
heap
|
page read and write
|
||
180343B0000
|
heap
|
page read and write
|
||
1744CB3E000
|
trusted library allocation
|
page read and write
|
||
7FFB1DE60000
|
unkown
|
page read and write
|
||
1744B380000
|
heap
|
page execute and read and write
|
||
17449414000
|
heap
|
page read and write
|
||
1446D000
|
trusted library allocation
|
page read and write
|
||
C8D000
|
stack
|
page read and write
|
||
7FFAAC47B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC480000
|
trusted library allocation
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page read and write
|
||
E76633F000
|
stack
|
page read and write
|
||
1746365D000
|
heap
|
page read and write
|
||
1BB62000
|
heap
|
page read and write
|
||
23A4E70C000
|
heap
|
page read and write
|
||
7FFAACC10000
|
trusted library allocation
|
page read and write
|
||
1FE4EEF8000
|
heap
|
page read and write
|
||
2834CE00000
|
heap
|
page execute and read and write
|
||
7DF415060000
|
trusted library allocation
|
page execute and read and write
|
||
1CEFD000
|
stack
|
page read and write
|
||
7FFAACA50000
|
trusted library allocation
|
page read and write
|
||
23A4E77C000
|
heap
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
7FFAAC8B6000
|
trusted library allocation
|
page read and write
|
||
142F0000
|
trusted library allocation
|
page read and write
|
||
D14000
|
unkown
|
page readonly
|
||
7DF4E21B0000
|
trusted library allocation
|
page execute and read and write
|
||
B45000
|
unkown
|
page readonly
|
||
7FFAAC463000
|
trusted library allocation
|
page execute and read and write
|
||
4DCA000
|
heap
|
page read and write
|
||
2EEB000
|
heap
|
page read and write
|
||
1801A404000
|
heap
|
page read and write
|
||
7DF4DAD00000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACC80000
|
trusted library allocation
|
page execute and read and write
|
||
13206000
|
trusted library allocation
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page read and write
|
||
1FE4EF36000
|
heap
|
page read and write
|
||
CB0000
|
unkown
|
page readonly
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
23A513F9000
|
trusted library allocation
|
page read and write
|
||
696000
|
stack
|
page read and write
|
||
194E1890000
|
heap
|
page read and write
|
||
2FA1000
|
heap
|
page read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page read and write
|
||
7FFAAC546000
|
trusted library allocation
|
page execute and read and write
|
||
23A4E6EC000
|
heap
|
page read and write
|
||
7FFAAC790000
|
trusted library allocation
|
page read and write
|
||
7FFAACB30000
|
trusted library allocation
|
page read and write
|
||
52A0000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
1A0000
|
heap
|
page read and write
|
||
23A51F7E000
|
trusted library allocation
|
page read and write
|
||
194E1A60000
|
heap
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
7FFAAC6B0000
|
trusted library allocation
|
page read and write
|
||
1802C346000
|
trusted library allocation
|
page read and write
|
||
23A5191F000
|
trusted library allocation
|
page read and write
|
||
1801A400000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
3112000
|
unkown
|
page readonly
|
||
7FFAAC464000
|
trusted library allocation
|
page read and write
|
||
1B5BB000
|
heap
|
page read and write
|
||
23A60AF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC784000
|
trusted library allocation
|
page read and write
|
||
7FFAAC47B000
|
trusted library allocation
|
page read and write
|
||
2AF3CBE000
|
stack
|
page read and write
|
||
E76730C000
|
stack
|
page read and write
|
||
1801A088000
|
heap
|
page read and write
|
||
7FFAAC611000
|
trusted library allocation
|
page read and write
|
||
1802C1B2000
|
trusted library allocation
|
page read and write
|
||
28365357000
|
heap
|
page read and write
|
||
1BED0000
|
unkown
|
page readonly
|
||
1BEA0000
|
unkown
|
page readonly
|
||
7FFAAC580000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
92FC68E000
|
stack
|
page read and write
|
||
131D7000
|
trusted library allocation
|
page read and write
|
||
203117F000
|
unkown
|
page read and write
|
||
30C0000
|
unkown
|
page readonly
|
||
7FFAAC5F0000
|
trusted library allocation
|
page read and write
|
||
2834B520000
|
heap
|
page read and write
|
||
7FFAAC7CC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC4BC000
|
trusted library allocation
|
page execute and read and write
|
||
174495B0000
|
trusted library allocation
|
page read and write
|
||
23A5179E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6A8000
|
trusted library allocation
|
page read and write
|
||
7FFAACE60000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9F0000
|
trusted library allocation
|
page read and write
|
||
28365730000
|
heap
|
page read and write
|
||
1820000
|
heap
|
page read and write
|
||
62A3B7F000
|
stack
|
page read and write
|
||
1FE68EE0000
|
heap
|
page execute and read and write
|
||
1744940E000
|
heap
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC5FC000
|
trusted library allocation
|
page read and write
|
||
1802C1AB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7A2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7E0000
|
trusted library allocation
|
page read and write
|
||
203258E000
|
stack
|
page read and write
|
||
13231000
|
trusted library allocation
|
page read and write
|
||
2834F171000
|
trusted library allocation
|
page read and write
|
||
7FFAACAB0000
|
trusted library allocation
|
page read and write
|
||
131F0000
|
trusted library allocation
|
page read and write
|
||
23A68B3E000
|
heap
|
page read and write
|
||
7FFAAC674000
|
trusted library allocation
|
page read and write
|
||
2031ABE000
|
stack
|
page read and write
|
||
7FFAAC840000
|
trusted library allocation
|
page read and write
|
||
7FFAACA10000
|
trusted library allocation
|
page read and write
|
||
17463490000
|
heap
|
page read and write
|
||
1745B6CA000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
unkown
|
page write copy
|
||
1FE51DBD000
|
trusted library allocation
|
page read and write
|
||
17449476000
|
heap
|
page read and write
|
||
23A60B0A000
|
trusted library allocation
|
page read and write
|
||
B10000
|
unkown
|
page readonly
|
||
7FFAAC8D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC640000
|
trusted library allocation
|
page read and write
|
||
7FFAACE60000
|
trusted library allocation
|
page execute and read and write
|
||
194E1970000
|
heap
|
page read and write
|
||
28365505000
|
heap
|
page read and write
|
||
1450A000
|
trusted library allocation
|
page read and write
|
||
ED000
|
stack
|
page read and write
|
||
1FE51EAB000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7B4000
|
trusted library allocation
|
page read and write
|
||
2F2A000
|
heap
|
page read and write
|
||
180343C0000
|
heap
|
page read and write
|
||
7FFAACA20000
|
trusted library allocation
|
page read and write
|
||
7FF4C4DD0000
|
trusted library allocation
|
page execute and read and write
|
||
E76718E000
|
stack
|
page read and write
|
||
7FFAAC520000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC580000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC86E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7D0000
|
trusted library allocation
|
page read and write
|
||
1744BFBF000
|
trusted library allocation
|
page read and write
|
||
92FB77D000
|
stack
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
7FFAAC770000
|
trusted library allocation
|
page read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page read and write
|
||
2E9A000
|
heap
|
page read and write
|
||
23A5208A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC762000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
unkown
|
page readonly
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
23A51B03000
|
trusted library allocation
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
20319BE000
|
stack
|
page read and write
|
||
7FFAAC61A000
|
trusted library allocation
|
page read and write
|
||
1801BE20000
|
heap
|
page execute and read and write
|
||
7FFAAC648000
|
trusted library allocation
|
page read and write
|
||
1BE92000
|
unkown
|
page readonly
|
||
1744AD80000
|
trusted library allocation
|
page read and write
|
||
7FFAAC602000
|
trusted library allocation
|
page read and write
|
||
7FFAACA00000
|
trusted library allocation
|
page read and write
|
||
203193E000
|
stack
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
23A688E0000
|
heap
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
7FFAACE40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C0000
|
trusted library allocation
|
page read and write
|
||
1FE6913B000
|
heap
|
page read and write
|
||
23A4E6B8000
|
heap
|
page read and write
|
||
7FFAAC79C000
|
trusted library allocation
|
page read and write
|
||
1FE4EE50000
|
heap
|
page read and write
|
||
4E2E000
|
heap
|
page read and write
|
||
1FE50E16000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8BD000
|
trusted library allocation
|
page read and write
|
||
72C1000
|
heap
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page execute and read and write
|
||
2F8D000
|
heap
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
3030000
|
heap
|
page execute and read and write
|
||
1FE690F8000
|
heap
|
page read and write
|
||
180342E0000
|
heap
|
page execute and read and write
|
||
7FFAAC44D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC643000
|
trusted library allocation
|
page read and write
|
||
E76728C000
|
stack
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page read and write
|
||
7422000
|
heap
|
page read and write
|
||
7FFAACD20000
|
trusted library allocation
|
page read and write
|
||
12FC000
|
heap
|
page read and write
|
||
7422000
|
heap
|
page read and write
|
||
1FE691A8000
|
heap
|
page read and write
|
||
92FB939000
|
stack
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page read and write
|
||
1FE52618000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7C0000
|
trusted library allocation
|
page read and write
|
||
1FE4EF30000
|
heap
|
page read and write
|
||
7FFAAC773000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9E0000
|
trusted library allocation
|
page read and write
|
||
1BFDE000
|
stack
|
page read and write
|
||
3040000
|
unkown
|
page readonly
|
||
557E000
|
stack
|
page read and write
|
||
2FB4000
|
heap
|
page read and write
|
||
E766438000
|
stack
|
page read and write
|
||
7FFAACB00000
|
trusted library allocation
|
page read and write
|
||
203167D000
|
stack
|
page read and write
|
||
23A50727000
|
heap
|
page execute and read and write
|
||
1FE4F030000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6C2000
|
trusted library allocation
|
page read and write
|
||
3670000
|
trusted library allocation
|
page read and write
|
||
E76720E000
|
stack
|
page read and write
|
||
23A4E738000
|
heap
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
7FFAACC60000
|
trusted library allocation
|
page read and write
|
||
1BD60000
|
heap
|
page execute and read and write
|
||
28365821000
|
heap
|
page read and write
|
||
283658E2000
|
heap
|
page read and write
|
||
17463705000
|
heap
|
page read and write
|
||
7FFAACDD0000
|
trusted library allocation
|
page read and write
|
||
1801DCDB000
|
trusted library allocation
|
page read and write
|
||
7FFAACB40000
|
trusted library allocation
|
page read and write
|
||
180343C3000
|
heap
|
page read and write
|
||
7FFAAC610000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC73F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
7FFAAC433000
|
trusted library allocation
|
page execute and read and write
|
||
2834F127000
|
trusted library allocation
|
page read and write
|
||
1FE4EF7C000
|
heap
|
page read and write
|
||
1BB00000
|
heap
|
page read and write
|
||
18034040000
|
heap
|
page read and write
|
||
1C07B000
|
heap
|
page read and write
|
||
1801C911000
|
trusted library allocation
|
page read and write
|
||
7FFAAC602000
|
trusted library allocation
|
page read and write
|
||
2834B5D0000
|
heap
|
page readonly
|
||
14150000
|
trusted library allocation
|
page read and write
|
||
2FD9000
|
heap
|
page read and write
|
||
73C1000
|
heap
|
page read and write
|
||
7FFAAC434000
|
trusted library allocation
|
page read and write
|
||
92FB67E000
|
stack
|
page read and write
|
||
1BB16000
|
heap
|
page read and write
|
||
2E99000
|
heap
|
page read and write
|
||
1BB2E000
|
heap
|
page read and write
|
||
7FFAAC6E0000
|
trusted library allocation
|
page execute and read and write
|
||
93C613C000
|
stack
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page read and write
|
||
2F81000
|
heap
|
page read and write
|
||
7FFAACB60000
|
trusted library allocation
|
page read and write
|
||
2834B560000
|
heap
|
page read and write
|
||
7FFAAC71C000
|
trusted library allocation
|
page read and write
|
||
7FFAACBE0000
|
trusted library allocation
|
page read and write
|
||
792000
|
stack
|
page read and write
|
||
7FFAAC7D0000
|
trusted library allocation
|
page read and write
|
||
13235000
|
trusted library allocation
|
page read and write
|
||
3956000
|
trusted library allocation
|
page read and write
|
||
7FFAAC83A000
|
trusted library allocation
|
page read and write
|
||
62A3AFF000
|
stack
|
page read and write
|
||
739D000
|
heap
|
page read and write
|
||
17463458000
|
heap
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page execute and read and write
|
||
13447000
|
trusted library allocation
|
page read and write
|
||
7FFAAC790000
|
trusted library allocation
|
page read and write
|
||
1FE69108000
|
heap
|
page read and write
|
||
1744947B000
|
heap
|
page read and write
|
||
194E1A6A000
|
heap
|
page read and write
|
||
14667000
|
trusted library allocation
|
page read and write
|
||
7FFAAC46D000
|
trusted library allocation
|
page execute and read and write
|
||
190000
|
heap
|
page read and write
|
||
17463749000
|
heap
|
page read and write
|
||
3100000
|
unkown
|
page readonly
|
||
7FFAAC4F6000
|
trusted library allocation
|
page read and write
|
||
7DF453090000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC8D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC570000
|
trusted library allocation
|
page execute and read and write
|
||
1744943D000
|
heap
|
page read and write
|
||
7FFAAC644000
|
trusted library allocation
|
page read and write
|
There are 1683 hidden memdumps, click here to show them.