Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
4c6fK85tK7.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Recovery\zufsVvjyWcGfJF.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\Default\Downloads\WmiPrvSE.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ yberLoad.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1ad27169-68a1-4284-b3a4-ab1d46640beb.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\55dc47f4-7c66-4fb4-aa2a-4ea28e92c8cc.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\6334e2d8-afed-41d5-8a9a-b81dc662bd51.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CyberLoader.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\EunsIO9tk2.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\MVPLoader.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\c327c276-7051-4e25-8eb9-181648a7a409.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\d096c949-588b-4f62-9035-9022be100ad8.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\d365112d-c481-40f0-92bb-6621c11733c0.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e99985a1-94fc-4281-b02a-ceb1639f4b4a.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e9b737bd-75a6-4059-b77c-a41b4b38424b.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\msPortRefnetdhcp\componentWininto.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\msPortRefnetdhcp\zRMFcMzN1094wnGdurNck4fGlt.vbe
|
data
|
dropped
|
||
C:\Recovery\e5c7b42f1665e5
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\Default\Downloads\24dbde2999530e
|
ASCII text, with very long lines (562), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\componentWininto.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\zufsVvjyWcGfJF.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\StYiK3n2EA
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Windows\ShellComponents\e5c7b42f1665e5
|
ASCII text, with no line terminators
|
dropped
|
||
C:\msPortRefnetdhcp\file.vbs
|
ASCII text, with no line terminators
|
dropped
|
||
C:\msPortRefnetdhcp\m6JlOKDKnmGOe6a.bat
|
ASCII text, with no line terminators
|
dropped
|
||
\Device\Null
|
ASCII text
|
dropped
|
There are 17 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\4c6fK85tK7.exe
|
"C:\Users\user\Desktop\4c6fK85tK7.exe"
|
||
C:\Users\user\AppData\Local\Temp\ yberLoad.exe
|
"C:\Users\user\AppData\Local\Temp\ yberLoad.exe"
|
||
C:\Users\user\AppData\Local\Temp\CyberLoader.exe
|
"C:\Users\user\AppData\Local\Temp\CyberLoader.exe"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\msPortRefnetdhcp\zRMFcMzN1094wnGdurNck4fGlt.vbe"
|
||
C:\Windows\SysWOW64\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\msPortRefnetdhcp\file.vbs"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\msPortRefnetdhcp\componentWininto.exe
|
"C:\msPortRefnetdhcp\componentWininto.exe"
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\Downloads\WmiPrvSE.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Default User\Downloads\WmiPrvSE.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\Downloads\WmiPrvSE.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "zufsVvjyWcGfJFz" /sc MINUTE /mo 13 /tr "'C:\Recovery\zufsVvjyWcGfJF.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "zufsVvjyWcGfJF" /sc ONLOGON /tr "'C:\Recovery\zufsVvjyWcGfJF.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "zufsVvjyWcGfJFz" /sc MINUTE /mo 14 /tr "'C:\Recovery\zufsVvjyWcGfJF.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "zufsVvjyWcGfJFz" /sc MINUTE /mo 11 /tr "'C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe'" /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "zufsVvjyWcGfJF" /sc ONLOGON /tr "'C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe'" /rl HIGHEST /f
|
||
C:\Windows\System32\schtasks.exe
|
schtasks.exe /create /tn "zufsVvjyWcGfJFz" /sc MINUTE /mo 6 /tr "'C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe'" /rl HIGHEST
/f
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\EunsIO9tk2.bat"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe
|
C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe
|
||
C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe
|
C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\6eef2b35-f577-4ffd-aafd-9efeb85439f2.vbs"
|
||
C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe
|
"C:\Windows\ShellComponents\zufsVvjyWcGfJF.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\da4d56e5-dd25-4b11-bec9-392111f2ec60.vbs"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\Default\Downloads\WmiPrvSE.exe
|
"C:\Users\Default User\Downloads\WmiPrvSE.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\e99985a1-94fc-4281-b02a-ceb1639f4b4a.vbs"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\6334e2d8-afed-41d5-8a9a-b81dc662bd51.vbs"
|
||
C:\Users\Default\Downloads\WmiPrvSE.exe
|
"C:\Users\Default User\Downloads\WmiPrvSE.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\1ad27169-68a1-4284-b3a4-ab1d46640beb.vbs"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\d096c949-588b-4f62-9035-9022be100ad8.vbs"
|
||
C:\Users\Default\Downloads\WmiPrvSE.exe
|
"C:\Users\Default User\Downloads\WmiPrvSE.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\d365112d-c481-40f0-92bb-6621c11733c0.vbs"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\c327c276-7051-4e25-8eb9-181648a7a409.vbs"
|
||
C:\Users\Default\Downloads\WmiPrvSE.exe
|
"C:\Users\Default User\Downloads\WmiPrvSE.exe"
|
||
C:\Users\user\AppData\Local\Temp\MVPLoader.exe
|
"C:\Users\user\AppData\Local\Temp\MVPLoader.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\msPortRefnetdhcp\m6JlOKDKnmGOe6a.bat" "
|
||
C:\Windows\System32\w32tm.exe
|
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
|
There are 27 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://a0947291.xsph.ru/1606aca9.php?cucOyHPjcFsCiapNYlxb8AP6pF=a3qL3&vw0E6VKq1Z0QnGVYYOq=dzcegjt&zp=3ydwnyJbQmvHkZpB8uBecfsG&79de6aec23413a4ab0f953d98ee3ec95=a30d8b5724e653dc8148bb63fff1b326&82d9326c5696c9c72e8032934ef8fcec=wYhFWZ1EDM4cjY4Y2YwYGZ4QTZ2MDM3EzMygTN3YjZ0IjNzMGZ4cDO&cucOyHPjcFsCiapNYlxb8AP6pF=a3qL3&vw0E6VKq1Z0QnGVYYOq=dzcegjt&zp=3ydwnyJbQmvHkZpB8uBecfsG
|
141.8.194.74
|
||
https://cp.sprinthost.ru
|
unknown
|
||
https://index.from.sh/pages/game.html
|
unknown
|
||
http://a0947291.xsph.ru
|
unknown
|
||
http://a0947291.xsph.ru/1606aca9.php?NmF4dcz1AZPsODb7c4ZJsHpxaH=XN7y&dCgr8zVnf24JM9e1=Ek3Y&HF7ReWWco
|
unknown
|
||
http://a0947291.xsph.ru/1606aca9.php?Va8TbDE3pURmmcb44lzH99wN=hAzBJZDaz2bjGSGnaj3&7jMwN3LmsuWnut3CP1f4OLxk9UyStej=2Ol8yDyQOasFfx&WYDXiE9vwvmw2E33OL6ugH5OMD=qxcrEMfc3&79de6aec23413a4ab0f953d98ee3ec95=a30d8b5724e653dc8148bb63fff1b326&82d9326c5696c9c72e8032934ef8fcec=wYhFWZ1EDM4cjY4Y2YwYGZ4QTZ2MDM3EzMygTN3YjZ0IjNzMGZ4cDO&Va8TbDE3pURmmcb44lzH99wN=hAzBJZDaz2bjGSGnaj3&7jMwN3LmsuWnut3CP1f4OLxk9UyStej=2Ol8yDyQOasFfx&WYDXiE9vwvmw2E33OL6ugH5OMD=qxcrEMfc3
|
141.8.194.74
|
||
http://a0947291.xsph.ru/1606aca9.php?NmF4dcz1AZPsODb7c4ZJsHpxaH=XN7y&dCgr8zVnf24JM9e1=Ek3Y&HF7ReWWcoDkvPMgt9nivozNf=bmOSJW4Fs5auqV9RDO1j&79de6aec23413a4ab0f953d98ee3ec95=a30d8b5724e653dc8148bb63fff1b326&82d9326c5696c9c72e8032934ef8fcec=wYhFWZ1EDM4cjY4Y2YwYGZ4QTZ2MDM3EzMygTN3YjZ0IjNzMGZ4cDO&NmF4dcz1AZPsODb7c4ZJsHpxaH=XN7y&dCgr8zVnf24JM9e1=Ek3Y&HF7ReWWcoDkvPMgt9nivozNf=bmOSJW4Fs5auqV9RDO1j
|
141.8.194.74
|
||
http://a0947291.xsph.ru/1606aca9.php?UDHxzzcas1EAv9DMmpw3fnZY=rCOtt0GvVNct1WrGn4NENdapnoSCQPr&79de6a
|
unknown
|
||
https://cp.sprinthost.ru/auth/login
|
unknown
|
||
http://a0947291.xsph.ruPo
|
unknown
|
||
http://a0947291.xsph.ru/1606aca9.php?Kp0YJjcTuh6rHq0W3cybAgWVGNOKtko=Imszz&BTtKkvEZk=Up7qPN7oSeS&79de6aec23413a4ab0f953d98ee3ec95=a30d8b5724e653dc8148bb63fff1b326&82d9326c5696c9c72e8032934ef8fcec=wYhFWZ1EDM4cjY4Y2YwYGZ4QTZ2MDM3EzMygTN3YjZ0IjNzMGZ4cDO&Kp0YJjcTuh6rHq0W3cybAgWVGNOKtko=Imszz&BTtKkvEZk=Up7qPN7oSeS
|
141.8.194.74
|
||
http://a0947291.xsph.ru/
|
unknown
|
||
http://a0947291.xsph.ru/1606aca9.php?cucOyHPjcFsCiapNYlxb8AP6pF=a3qL3&vw0E6VKq1Z0QnGVYYOq=dzcegjt&zp
|
unknown
|
||
http://a0947291.xsph.ru/1606aca9.php?n8ux2yA6XyMoklAzV5ek7V=UqOdN8&79de6aec23413a4ab0f953d98ee3ec95=a30d8b5724e653dc8148bb63fff1b326&82d9326c5696c9c72e8032934ef8fcec=wYhFWZ1EDM4cjY4Y2YwYGZ4QTZ2MDM3EzMygTN3YjZ0IjNzMGZ4cDO&n8ux2yA6XyMoklAzV5ek7V=UqOdN8
|
141.8.194.74
|
||
http://a0947291.xsph.ru/1606aca9.php?LB0fbF4jPSXn2GcGAitDf41seHeqJO=wQJizLUNdVtoEeR&79de6aec23413a4ab0f953d98ee3ec95=a30d8b5724e653dc8148bb63fff1b326&82d9326c5696c9c72e8032934ef8fcec=wYhFWZ1EDM4cjY4Y2YwYGZ4QTZ2MDM3EzMygTN3YjZ0IjNzMGZ4cDO&LB0fbF4jPSXn2GcGAitDf41seHeqJO=wQJizLUNdVtoEeR
|
141.8.194.74
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://a0947291.xsph.ru/1606aca9.php?n8ux2yA6XyMoklAzV5ek7V=UqOdN8&79de6aec23413a4ab0f953d98ee3ec95=
|
unknown
|
||
http://a0947291.xsph.ru/1606aca9.php?UDHxzzcas1EAv9DMmpw3fnZY=rCOtt0GvVNct1WrGn4NENdapnoSCQPr&79de6aec23413a4ab0f953d98ee3ec95=a30d8b5724e653dc8148bb63fff1b326&82d9326c5696c9c72e8032934ef8fcec=wYhFWZ1EDM4cjY4Y2YwYGZ4QTZ2MDM3EzMygTN3YjZ0IjNzMGZ4cDO&UDHxzzcas1EAv9DMmpw3fnZY=rCOtt0GvVNct1WrGn4NENdapnoSCQPr
|
141.8.194.74
|
||
http://a0947291.xsph.ru/@=kTYjFmNwYTM
|
There are 9 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
a0947291.xsph.ru
|
141.8.194.74
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
141.8.194.74
|
a0947291.xsph.ru
|
Russian Federation
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
EnableLUA
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
|
PromptOnSecureDesktop
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
LangID
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\WScript.exe.ApplicationCompany
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
|
CheckSetting
|
||
HKEY_CURRENT_USER\SOFTWARE\29ddd7bb6e2351198888c5855f94a15ecf7b3ec4
|
7caa7ba4682597816b516b5ad2a7ed9c844e3a69
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.FriendlyAppName
|
||
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
|
C:\Windows\System32\cmd.exe.ApplicationCompany
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2DC1000
|
trusted library allocation
|
page read and write
|
||
2860000
|
trusted library allocation
|
page read and write
|
||
2651000
|
trusted library allocation
|
page read and write
|
||
3411000
|
trusted library allocation
|
page read and write
|
||
290D000
|
trusted library allocation
|
page read and write
|
||
2E71000
|
trusted library allocation
|
page read and write
|
||
1341D000
|
trusted library allocation
|
page read and write
|
||
266B000
|
trusted library allocation
|
page read and write
|
||
2E81000
|
trusted library allocation
|
page read and write
|
||
37C7000
|
trusted library allocation
|
page read and write
|
||
33C1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9FC000
|
trusted library allocation
|
page execute and read and write
|
||
167E000
|
heap
|
page read and write
|
||
297E000
|
stack
|
page read and write
|
||
ADE000
|
heap
|
page read and write
|
||
290A000
|
heap
|
page read and write
|
||
2904000
|
heap
|
page read and write
|
||
2E9A000
|
trusted library allocation
|
page read and write
|
||
1ADC0000
|
trusted library allocation
|
page read and write
|
||
257A3B6F000
|
heap
|
page read and write
|
||
1835C4D0000
|
heap
|
page read and write
|
||
7FFD9BD0A000
|
trusted library allocation
|
page read and write
|
||
189B170B000
|
heap
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
15C6F000
|
trusted library allocation
|
page read and write
|
||
130E000
|
stack
|
page read and write
|
||
189B16C9000
|
heap
|
page read and write
|
||
133CF000
|
trusted library allocation
|
page read and write
|
||
1C32A000
|
stack
|
page read and write
|
||
87E000
|
stack
|
page read and write
|
||
1B34D000
|
stack
|
page read and write
|
||
157AF000
|
trusted library allocation
|
page read and write
|
||
18302000
|
trusted library allocation
|
page read and write
|
||
1C570000
|
heap
|
page read and write
|
||
2C7E000
|
trusted library allocation
|
page read and write
|
||
2AEF7348000
|
heap
|
page read and write
|
||
2952000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
3166000
|
heap
|
page read and write
|
||
7FFD9BD74000
|
trusted library allocation
|
page read and write
|
||
13629000
|
trusted library allocation
|
page read and write
|
||
7EE000
|
heap
|
page read and write
|
||
29A9ADD0000
|
heap
|
page read and write
|
||
16FE6000
|
trusted library allocation
|
page read and write
|
||
13670000
|
trusted library allocation
|
page read and write
|
||
1C4AD000
|
stack
|
page read and write
|
||
7FFD9BCF8000
|
trusted library allocation
|
page read and write
|
||
2540000
|
heap
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
29A9AF5C000
|
heap
|
page read and write
|
||
2E81000
|
trusted library allocation
|
page read and write
|
||
2CC5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB3C000
|
trusted library allocation
|
page read and write
|
||
1D28A000
|
heap
|
page read and write
|
||
E9FB9FF000
|
stack
|
page read and write
|
||
271000
|
unkown
|
page execute read
|
||
189B16ED000
|
heap
|
page read and write
|
||
17A1D000
|
trusted library allocation
|
page read and write
|
||
3175000
|
trusted library allocation
|
page read and write
|
||
1150000
|
trusted library allocation
|
page read and write
|
||
1C790000
|
trusted library section
|
page read and write
|
||
303E000
|
trusted library allocation
|
page read and write
|
||
B0A000
|
heap
|
page read and write
|
||
1879E000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
195E000
|
stack
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
15C1D000
|
trusted library allocation
|
page read and write
|
||
2C19000
|
trusted library allocation
|
page read and write
|
||
29A9AEB5000
|
heap
|
page read and write
|
||
2C82000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
2928000
|
heap
|
page read and write
|
||
7FFD9B9CD000
|
trusted library allocation
|
page execute and read and write
|
||
17628000
|
trusted library allocation
|
page read and write
|
||
3227000
|
trusted library allocation
|
page read and write
|
||
1B440000
|
trusted library allocation
|
page read and write
|
||
2947000
|
heap
|
page read and write
|
||
C9F000
|
stack
|
page read and write
|
||
1C42A000
|
stack
|
page read and write
|
||
2CC7000
|
trusted library allocation
|
page read and write
|
||
1B97F000
|
heap
|
page read and write
|
||
7FFD9BBC7000
|
trusted library allocation
|
page read and write
|
||
1BAEC000
|
heap
|
page read and write
|
||
1B700000
|
heap
|
page read and write
|
||
2EE7000
|
stack
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
1642000
|
heap
|
page read and write
|
||
7FFD9BE40000
|
trusted library allocation
|
page read and write
|
||
18358000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB2000
|
trusted library allocation
|
page read and write
|
||
2AEF7310000
|
heap
|
page read and write
|
||
1390C000
|
trusted library allocation
|
page read and write
|
||
26D3000
|
trusted library allocation
|
page read and write
|
||
3035000
|
trusted library allocation
|
page read and write
|
||
3424000
|
trusted library allocation
|
page read and write
|
||
2B04000
|
trusted library allocation
|
page read and write
|
||
324E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
7FFD9BC3E000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
189B16D6000
|
heap
|
page read and write
|
||
4ACF000
|
stack
|
page read and write
|
||
1280C000
|
trusted library allocation
|
page read and write
|
||
E20000
|
trusted library allocation
|
page read and write
|
||
314F000
|
heap
|
page read and write
|
||
2BE8000
|
trusted library allocation
|
page read and write
|
||
1BEFA000
|
stack
|
page read and write
|
||
290E000
|
heap
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC1C000
|
trusted library allocation
|
page read and write
|
||
1BF90000
|
heap
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
1BE90000
|
trusted library section
|
page read and write
|
||
1A930000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
1C080000
|
trusted library section
|
page read and write
|
||
2AEF730B000
|
heap
|
page read and write
|
||
7FFD9B9B7000
|
trusted library allocation
|
page read and write
|
||
296F000
|
heap
|
page read and write
|
||
189B16E9000
|
heap
|
page read and write
|
||
17656000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE46000
|
trusted library allocation
|
page read and write
|
||
1BBA3000
|
stack
|
page read and write
|
||
1A8E000
|
stack
|
page read and write
|
||
7FFD9B9AC000
|
trusted library allocation
|
page read and write
|
||
29A9AF18000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
18785000
|
trusted library allocation
|
page read and write
|
||
3AE9000
|
trusted library allocation
|
page read and write
|
||
314A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page execute and read and write
|
||
3B7B000
|
trusted library allocation
|
page read and write
|
||
1361F000
|
trusted library allocation
|
page read and write
|
||
3459000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC08000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD4F000
|
trusted library allocation
|
page read and write
|
||
2EE3000
|
stack
|
page read and write
|
||
189B16EF000
|
heap
|
page read and write
|
||
1C093000
|
heap
|
page read and write
|
||
165D9C18000
|
heap
|
page read and write
|
||
1B2A0000
|
heap
|
page execute and read and write
|
||
1835C296000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
2FD4000
|
trusted library allocation
|
page read and write
|
||
AC5000
|
heap
|
page read and write
|
||
13582000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
133C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE68000
|
trusted library allocation
|
page read and write
|
||
2CF1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC2A000
|
trusted library allocation
|
page read and write
|
||
C6B000
|
heap
|
page read and write
|
||
7FFD9B9A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
E7F000
|
stack
|
page read and write
|
||
189B16D4000
|
heap
|
page read and write
|
||
1C060000
|
trusted library section
|
page read and write
|
||
22AB9A87000
|
heap
|
page read and write
|
||
31E9000
|
heap
|
page read and write
|
||
1045000
|
heap
|
page read and write
|
||
7FFD9B9A7000
|
trusted library allocation
|
page read and write
|
||
1A880000
|
trusted library allocation
|
page read and write
|
||
348A000
|
heap
|
page read and write
|
||
C25000
|
heap
|
page read and write
|
||
1BC2E000
|
stack
|
page read and write
|
||
285D000
|
trusted library allocation
|
page read and write
|
||
7EB000
|
heap
|
page read and write
|
||
7FFD9BB94000
|
trusted library allocation
|
page read and write
|
||
56FB000
|
stack
|
page read and write
|
||
321B000
|
trusted library allocation
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
563E000
|
stack
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
29A9AF2E000
|
heap
|
page read and write
|
||
3558000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
279E000
|
stack
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
2AEF733A000
|
heap
|
page read and write
|
||
1A53949B000
|
heap
|
page read and write
|
||
18704000
|
trusted library allocation
|
page read and write
|
||
304E000
|
trusted library allocation
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
2BAD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
12658000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCB2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE62000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB4B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE29000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB2A000
|
trusted library allocation
|
page read and write
|
||
1AB0000
|
heap
|
page execute and read and write
|
||
1B9AE000
|
stack
|
page read and write
|
||
7FFD9BC84000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
1354E000
|
trusted library allocation
|
page read and write
|
||
14447000
|
trusted library allocation
|
page read and write
|
||
37A2000
|
trusted library allocation
|
page read and write
|
||
257A3B46000
|
heap
|
page read and write
|
||
A92000
|
heap
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page read and write
|
||
7C67AFF000
|
stack
|
page read and write
|
||
2A8E000
|
trusted library allocation
|
page read and write
|
||
1B54E000
|
stack
|
page read and write
|
||
2949000
|
heap
|
page read and write
|
||
16F26000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page read and write
|
||
2C1B000
|
trusted library allocation
|
page read and write
|
||
3058000
|
trusted library allocation
|
page read and write
|
||
1B5FE000
|
stack
|
page read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBC8000
|
trusted library allocation
|
page read and write
|
||
189B16FB000
|
heap
|
page read and write
|
||
1B72F000
|
stack
|
page read and write
|
||
7FFD9BDB0000
|
trusted library allocation
|
page execute and read and write
|
||
2938000
|
heap
|
page read and write
|
||
1C4A9000
|
stack
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
1279B000
|
trusted library allocation
|
page read and write
|
||
2C62000
|
trusted library allocation
|
page read and write
|
||
2A5D000
|
heap
|
page read and write
|
||
31DC000
|
trusted library allocation
|
page read and write
|
||
2AEF7355000
|
heap
|
page read and write
|
||
6B00000
|
heap
|
page read and write
|
||
7FFD9BD80000
|
trusted library allocation
|
page read and write
|
||
13ABE000
|
trusted library allocation
|
page read and write
|
||
3162000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
12E71000
|
trusted library allocation
|
page read and write
|
||
7FFD9BACA000
|
trusted library allocation
|
page execute and read and write
|
||
1280A000
|
trusted library allocation
|
page read and write
|
||
2BBC000
|
trusted library allocation
|
page read and write
|
||
38E6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA6C000
|
trusted library allocation
|
page execute and read and write
|
||
29A9AEE1000
|
heap
|
page read and write
|
||
7FFD9BD38000
|
trusted library allocation
|
page read and write
|
||
320A000
|
heap
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB4E000
|
trusted library allocation
|
page read and write
|
||
2D95000
|
trusted library allocation
|
page read and write
|
||
2BB2000
|
trusted library allocation
|
page read and write
|
||
1686A000
|
trusted library allocation
|
page read and write
|
||
1B948000
|
heap
|
page read and write
|
||
1290D000
|
trusted library allocation
|
page read and write
|
||
2AEF7310000
|
heap
|
page read and write
|
||
7FFD9BB5E000
|
trusted library allocation
|
page read and write
|
||
34AF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD60000
|
trusted library allocation
|
page read and write
|
||
257A3B07000
|
heap
|
page read and write
|
||
16D75000
|
trusted library allocation
|
page read and write
|
||
29A9ACF0000
|
heap
|
page read and write
|
||
7FFD9BC36000
|
trusted library allocation
|
page read and write
|
||
31CA000
|
heap
|
page read and write
|
||
134B2000
|
trusted library allocation
|
page read and write
|
||
1CFB1000
|
heap
|
page read and write
|
||
7FFD9BC77000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD1A000
|
trusted library allocation
|
page read and write
|
||
354B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE2A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC47000
|
trusted library allocation
|
page read and write
|
||
1B6AE000
|
stack
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
37EE000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
7FFD9B9DB000
|
trusted library allocation
|
page execute and read and write
|
||
29A9AEDC000
|
heap
|
page read and write
|
||
189B1719000
|
heap
|
page read and write
|
||
2E1F000
|
stack
|
page read and write
|
||
7FFD9BE80000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BABA000
|
trusted library allocation
|
page execute and read and write
|
||
1B9F2000
|
stack
|
page read and write
|
||
149B7000
|
trusted library allocation
|
page read and write
|
||
257A3AFF000
|
heap
|
page read and write
|
||
163EB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB53000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA46000
|
trusted library allocation
|
page read and write
|
||
1D7CB000
|
stack
|
page read and write
|
||
7FFD9BB71000
|
trusted library allocation
|
page read and write
|
||
2DA6000
|
trusted library allocation
|
page read and write
|
||
12DCA000
|
trusted library allocation
|
page read and write
|
||
1960000
|
heap
|
page read and write
|
||
22AB98A0000
|
heap
|
page read and write
|
||
7FFD9BC2E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD6A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE73000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99C000
|
trusted library allocation
|
page read and write
|
||
29A9AF57000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
936000
|
stack
|
page read and write
|
||
2DC8000
|
trusted library allocation
|
page read and write
|
||
12825000
|
trusted library allocation
|
page read and write
|
||
17B98000
|
trusted library allocation
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
2ECB000
|
trusted library allocation
|
page read and write
|
||
3309000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB4C000
|
trusted library allocation
|
page read and write
|
||
133EF000
|
trusted library allocation
|
page read and write
|
||
331E000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
2ECF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page execute and read and write
|
||
980000
|
heap
|
page read and write
|
||
7FFD9BB63000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD80000
|
trusted library allocation
|
page read and write
|
||
28E1000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC57000
|
trusted library allocation
|
page read and write
|
||
1623A000
|
trusted library allocation
|
page read and write
|
||
3872000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC1E000
|
trusted library allocation
|
page read and write
|
||
1C5AA000
|
stack
|
page read and write
|
||
7FFD9BB94000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page execute and read and write
|
||
18166000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
1630000
|
heap
|
page read and write
|
||
133E1000
|
trusted library allocation
|
page read and write
|
||
1B84E000
|
stack
|
page read and write
|
||
15970000
|
trusted library allocation
|
page read and write
|
||
7FFD9B983000
|
trusted library allocation
|
page execute and read and write
|
||
2947000
|
heap
|
page read and write
|
||
29A9AEE1000
|
heap
|
page read and write
|
||
257A3B40000
|
heap
|
page read and write
|
||
1365E000
|
trusted library allocation
|
page read and write
|
||
116A000
|
heap
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page read and write
|
||
113C000
|
heap
|
page read and write
|
||
189B170F000
|
heap
|
page read and write
|
||
13D5000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
2ED0000
|
stack
|
page read and write
|
||
1D43E000
|
stack
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
257A3B21000
|
heap
|
page read and write
|
||
1B21F000
|
stack
|
page read and write
|
||
13120000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE9000
|
trusted library allocation
|
page read and write
|
||
280E000
|
stack
|
page read and write
|
||
13130000
|
trusted library allocation
|
page read and write
|
||
29A9AF41000
|
heap
|
page read and write
|
||
7FFD9BB63000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
1BFC5000
|
heap
|
page read and write
|
||
7FFD9BC5A000
|
trusted library allocation
|
page read and write
|
||
3798000
|
trusted library allocation
|
page read and write
|
||
2AD6000
|
trusted library allocation
|
page read and write
|
||
1B204000
|
heap
|
page read and write
|
||
12E91000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC79000
|
trusted library allocation
|
page read and write
|
||
2C7C000
|
trusted library allocation
|
page read and write
|
||
189B171C000
|
heap
|
page read and write
|
||
12E65000
|
trusted library allocation
|
page read and write
|
||
1CFB5000
|
heap
|
page read and write
|
||
29A9AF0D000
|
heap
|
page read and write
|
||
1BDAE000
|
stack
|
page read and write
|
||
309E000
|
stack
|
page read and write
|
||
7FFD9BE40000
|
trusted library allocation
|
page read and write
|
||
2907000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
2CC9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC7C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
2944000
|
heap
|
page read and write
|
||
18215000
|
trusted library allocation
|
page read and write
|
||
324E000
|
trusted library allocation
|
page read and write
|
||
3450000
|
trusted library allocation
|
page read and write
|
||
2ED6000
|
stack
|
page read and write
|
||
2D4A000
|
trusted library allocation
|
page read and write
|
||
257A3B1C000
|
heap
|
page read and write
|
||
AA796FA000
|
stack
|
page read and write
|
||
7FFD9BE16000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDA2000
|
trusted library allocation
|
page read and write
|
||
13443000
|
trusted library allocation
|
page read and write
|
||
29A9AF0B000
|
heap
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
257A3D45000
|
heap
|
page read and write
|
||
257A3B45000
|
heap
|
page read and write
|
||
29A9AF10000
|
heap
|
page read and write
|
||
1984000
|
heap
|
page read and write
|
||
1CA5F000
|
stack
|
page read and write
|
||
3052000
|
trusted library allocation
|
page read and write
|
||
3328000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
12E19000
|
trusted library allocation
|
page read and write
|
||
1C084000
|
heap
|
page read and write
|
||
324C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
2D9C000
|
trusted library allocation
|
page read and write
|
||
187FC000
|
trusted library allocation
|
page read and write
|
||
257A3B4E000
|
heap
|
page read and write
|
||
17BC9000
|
trusted library allocation
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
2FD4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD18000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BD60000
|
trusted library allocation
|
page read and write
|
||
1B82F000
|
stack
|
page read and write
|
||
7FFD9B9CD000
|
trusted library allocation
|
page execute and read and write
|
||
1BEA0000
|
trusted library section
|
page read and write
|
||
17C7C000
|
trusted library allocation
|
page read and write
|
||
3A54000
|
trusted library allocation
|
page read and write
|
||
12AF5000
|
trusted library allocation
|
page read and write
|
||
291C000
|
trusted library allocation
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
7FFD9BB53000
|
trusted library allocation
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
1163000
|
heap
|
page read and write
|
||
3223000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBEE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
257A3B0D000
|
heap
|
page read and write
|
||
2EFA000
|
stack
|
page read and write
|
||
189B16A0000
|
heap
|
page read and write
|
||
29A9AEF6000
|
heap
|
page read and write
|
||
189B15C0000
|
heap
|
page read and write
|
||
7FFD9BD64000
|
trusted library allocation
|
page read and write
|
||
2949000
|
heap
|
page read and write
|
||
7FFD9BBAD000
|
trusted library allocation
|
page read and write
|
||
2C1F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
13D5000
|
heap
|
page read and write
|
||
2AEF734A000
|
heap
|
page read and write
|
||
303B000
|
trusted library allocation
|
page read and write
|
||
22AB9A30000
|
heap
|
page read and write
|
||
1CF80000
|
heap
|
page read and write
|
||
189B16DC000
|
heap
|
page read and write
|
||
2EC6000
|
stack
|
page read and write
|
||
1320D000
|
trusted library allocation
|
page read and write
|
||
1ADDD000
|
stack
|
page read and write
|
||
1BF9E000
|
stack
|
page read and write
|
||
7FFD9BB6B000
|
trusted library allocation
|
page read and write
|
||
3056000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE70000
|
trusted library allocation
|
page execute and read and write
|
||
1357B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC26000
|
trusted library allocation
|
page read and write
|
||
257A3B59000
|
heap
|
page read and write
|
||
3314000
|
trusted library allocation
|
page read and write
|
||
5A5D000
|
stack
|
page read and write
|
||
2851000
|
trusted library allocation
|
page read and write
|
||
29A9AF10000
|
heap
|
page read and write
|
||
21794EF0000
|
heap
|
page read and write
|
||
13AA5000
|
trusted library allocation
|
page read and write
|
||
189B18C5000
|
heap
|
page read and write
|
||
134FE000
|
trusted library allocation
|
page read and write
|
||
31E2000
|
trusted library allocation
|
page read and write
|
||
1753B000
|
trusted library allocation
|
page read and write
|
||
18891000
|
trusted library allocation
|
page read and write
|
||
2947000
|
heap
|
page read and write
|
||
296F000
|
heap
|
page read and write
|
||
7FFD9BC33000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC92000
|
trusted library allocation
|
page read and write
|
||
257A3B3A000
|
heap
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
12D9F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC42000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
7FFD9B9DC000
|
trusted library allocation
|
page execute and read and write
|
||
E32000
|
unkown
|
page readonly
|
||
352E000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
13D7A000
|
trusted library allocation
|
page read and write
|
||
38F0000
|
trusted library allocation
|
page read and write
|
||
318E000
|
heap
|
page read and write
|
||
1BD8E000
|
stack
|
page read and write
|
||
1BE10000
|
trusted library section
|
page read and write
|
||
7FFD9BBD9000
|
trusted library allocation
|
page read and write
|
||
156FF000
|
trusted library allocation
|
page read and write
|
||
126D7000
|
trusted library allocation
|
page read and write
|
||
1CB59000
|
stack
|
page read and write
|
||
189B1860000
|
heap
|
page read and write
|
||
3446000
|
trusted library allocation
|
page read and write
|
||
1661D000
|
trusted library allocation
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
2C86000
|
trusted library allocation
|
page read and write
|
||
12EC9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC63000
|
trusted library allocation
|
page read and write
|
||
13454000
|
trusted library allocation
|
page read and write
|
||
39EC000
|
stack
|
page read and write
|
||
1A5394C8000
|
heap
|
page read and write
|
||
2901000
|
heap
|
page read and write
|
||
2B81000
|
trusted library allocation
|
page read and write
|
||
1C4B5000
|
heap
|
page read and write
|
||
2954000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE26000
|
trusted library allocation
|
page read and write
|
||
189B1741000
|
heap
|
page read and write
|
||
13125000
|
trusted library allocation
|
page read and write
|
||
14139000
|
trusted library allocation
|
page read and write
|
||
A7A000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page execute and read and write
|
||
257A3B0C000
|
heap
|
page read and write
|
||
290C000
|
heap
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page read and write
|
||
133CD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
1D293000
|
heap
|
page read and write
|
||
2925000
|
heap
|
page read and write
|
||
7FFD9B9DC000
|
trusted library allocation
|
page execute and read and write
|
||
134C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B3000
|
trusted library allocation
|
page read and write
|
||
1B99D000
|
stack
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
1350E000
|
trusted library allocation
|
page read and write
|
||
2FC5000
|
trusted library allocation
|
page read and write
|
||
2AEF7347000
|
heap
|
page read and write
|
||
32E1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE50000
|
trusted library allocation
|
page read and write
|
||
A15000
|
heap
|
page read and write
|
||
404000
|
unkown
|
page read and write
|
||
13A8C000
|
trusted library allocation
|
page read and write
|
||
18951000
|
trusted library allocation
|
page read and write
|
||
3487000
|
heap
|
page read and write
|
||
1762000
|
heap
|
page read and write
|
||
B319FFF000
|
stack
|
page read and write
|
||
2ED3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD4E000
|
trusted library allocation
|
page read and write
|
||
1C25A000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
3475000
|
trusted library allocation
|
page read and write
|
||
2EFA000
|
stack
|
page read and write
|
||
2B4000
|
unkown
|
page read and write
|
||
7FFD9B9FC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BE30000
|
trusted library allocation
|
page read and write
|
||
291A000
|
heap
|
page read and write
|
||
7FFD9BA0C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBA7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD68000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE5A000
|
trusted library allocation
|
page read and write
|
||
12851000
|
trusted library allocation
|
page read and write
|
||
2B17000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC05000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE5E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDAD000
|
trusted library allocation
|
page execute and read and write
|
||
2912000
|
heap
|
page read and write
|
||
7FFD9BBF8000
|
trusted library allocation
|
page read and write
|
||
189B1740000
|
heap
|
page read and write
|
||
18435000
|
trusted library allocation
|
page read and write
|
||
1174000
|
heap
|
page read and write
|
||
2C15000
|
trusted library allocation
|
page read and write
|
||
13065000
|
trusted library allocation
|
page read and write
|
||
182C5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC3B000
|
trusted library allocation
|
page read and write
|
||
17709000
|
trusted library allocation
|
page read and write
|
||
2D22000
|
trusted library allocation
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
7FFD9BC11000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD48000
|
trusted library allocation
|
page read and write
|
||
176F6000
|
trusted library allocation
|
page read and write
|
||
B07000
|
heap
|
page read and write
|
||
32D7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
11C9000
|
heap
|
page read and write
|
||
13429000
|
trusted library allocation
|
page read and write
|
||
1D1BC000
|
stack
|
page read and write
|
||
2937000
|
heap
|
page read and write
|
||
2921000
|
heap
|
page read and write
|
||
1274E000
|
trusted library allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
7FFD9BE23000
|
trusted library allocation
|
page read and write
|
||
29A9AF43000
|
heap
|
page read and write
|
||
1B880000
|
heap
|
page execute and read and write
|
||
7FFD9BD08000
|
trusted library allocation
|
page read and write
|
||
520E000
|
stack
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
3438000
|
trusted library allocation
|
page read and write
|
||
31CA000
|
heap
|
page read and write
|
||
1C7A0000
|
trusted library section
|
page read and write
|
||
1677000
|
heap
|
page read and write
|
||
18408000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
13E1D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB81000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB77000
|
trusted library allocation
|
page read and write
|
||
3407000
|
heap
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
127A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
3277000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BC000
|
trusted library allocation
|
page read and write
|
||
11B6000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
136CD000
|
trusted library allocation
|
page read and write
|
||
1BDFA000
|
stack
|
page read and write
|
||
257A3B66000
|
heap
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page execute and read and write
|
||
1BB20000
|
heap
|
page execute and read and write
|
||
2669000
|
trusted library allocation
|
page read and write
|
||
3549000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA36000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9CD000
|
trusted library allocation
|
page execute and read and write
|
||
19239000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
3868000
|
trusted library allocation
|
page read and write
|
||
7FFD9B986000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
2BB8000
|
trusted library allocation
|
page read and write
|
||
1535000
|
heap
|
page read and write
|
||
7FFD9BB7C000
|
trusted library allocation
|
page read and write
|
||
3B65000
|
trusted library allocation
|
page read and write
|
||
2AEF7345000
|
heap
|
page read and write
|
||
29A9ADF0000
|
heap
|
page read and write
|
||
10DB000
|
heap
|
page read and write
|
||
CF9000
|
heap
|
page read and write
|
||
29A9AF39000
|
heap
|
page read and write
|
||
1C090000
|
trusted library section
|
page read and write
|
||
7FFD9B9AB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B99C000
|
trusted library allocation
|
page read and write
|
||
1B340000
|
heap
|
page read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
30A5000
|
heap
|
page read and write
|
||
2AEF72C0000
|
heap
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
257A3B72000
|
heap
|
page read and write
|
||
2949000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
1D5BC000
|
stack
|
page read and write
|
||
257A3B4B000
|
heap
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
1C770000
|
trusted library section
|
page read and write
|
||
1A70000
|
heap
|
page read and write
|
||
29A9AF4F000
|
heap
|
page read and write
|
||
2AEF72E9000
|
heap
|
page read and write
|
||
296F000
|
heap
|
page read and write
|
||
2D2000
|
unkown
|
page write copy
|
||
7FFD9BE80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page execute and read and write
|
||
2949000
|
heap
|
page read and write
|
||
29A9AEC0000
|
heap
|
page read and write
|
||
134E2000
|
trusted library allocation
|
page read and write
|
||
736000
|
stack
|
page read and write
|
||
2A8C000
|
trusted library allocation
|
page read and write
|
||
2AEF9160000
|
heap
|
page read and write
|
||
7FFD9BE2D000
|
trusted library allocation
|
page read and write
|
||
189B16ED000
|
heap
|
page read and write
|
||
38E4000
|
trusted library allocation
|
page read and write
|
||
292A000
|
heap
|
page read and write
|
||
1C072000
|
heap
|
page read and write
|
||
2E90000
|
trusted library allocation
|
page read and write
|
||
1D256000
|
heap
|
page read and write
|
||
7FFD9BB74000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page execute and read and write
|
||
31DA000
|
trusted library allocation
|
page read and write
|
||
5247000
|
heap
|
page read and write
|
||
F5F27FE000
|
stack
|
page read and write
|
||
189B16ED000
|
heap
|
page read and write
|
||
18767000
|
trusted library allocation
|
page read and write
|
||
2AEF7625000
|
heap
|
page read and write
|
||
12900000
|
trusted library allocation
|
page read and write
|
||
15209000
|
trusted library allocation
|
page read and write
|
||
1DA8467B000
|
heap
|
page read and write
|
||
29A9AF10000
|
heap
|
page read and write
|
||
1B7A1000
|
stack
|
page read and write
|
||
2AEF7309000
|
heap
|
page read and write
|
||
21794FC0000
|
heap
|
page read and write
|
||
1BFFE000
|
unkown
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
2BB6000
|
trusted library allocation
|
page read and write
|
||
257A59A0000
|
heap
|
page read and write
|
||
3150000
|
heap
|
page read and write
|
||
169B6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC95000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
340C000
|
trusted library allocation
|
page read and write
|
||
1BDE0000
|
trusted library section
|
page read and write
|
||
7FFD9BD5F000
|
trusted library allocation
|
page read and write
|
||
12E78000
|
trusted library allocation
|
page read and write
|
||
135B1000
|
trusted library allocation
|
page read and write
|
||
189B170F000
|
heap
|
page read and write
|
||
1835C230000
|
heap
|
page read and write
|
||
2692000
|
trusted library allocation
|
page read and write
|
||
56BE000
|
stack
|
page read and write
|
||
295B000
|
heap
|
page read and write
|
||
3454000
|
trusted library allocation
|
page read and write
|
||
28C0000
|
heap
|
page read and write
|
||
7FFD9BEA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BE31000
|
trusted library allocation
|
page read and write
|
||
E9FBBFE000
|
stack
|
page read and write
|
||
14CFA000
|
trusted library allocation
|
page read and write
|
||
15464000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD58000
|
trusted library allocation
|
page read and write
|
||
4630000
|
heap
|
page read and write
|
||
3165000
|
heap
|
page read and write
|
||
CA9000
|
heap
|
page read and write
|
||
2E60000
|
heap
|
page execute and read and write
|
||
3192000
|
heap
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
135FB000
|
trusted library allocation
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
1B44E000
|
stack
|
page read and write
|
||
17554000
|
trusted library allocation
|
page read and write
|
||
2EDB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB84000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1BAC8000
|
heap
|
page read and write
|
||
7FFD9B9B6000
|
trusted library allocation
|
page read and write
|
||
2AEF730D000
|
heap
|
page read and write
|
||
166A8000
|
trusted library allocation
|
page read and write
|
||
3138000
|
heap
|
page read and write
|
||
7C67EFE000
|
stack
|
page read and write
|
||
7FF7605BF000
|
unkown
|
page read and write
|
||
344D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE8E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE70000
|
trusted library allocation
|
page read and write
|
||
29A9AF0F000
|
heap
|
page read and write
|
||
7FFD9BE70000
|
trusted library allocation
|
page read and write
|
||
2DF8000
|
trusted library allocation
|
page read and write
|
||
2BF2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE5C000
|
trusted library allocation
|
page read and write
|
||
1BCFA000
|
stack
|
page read and write
|
||
379E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD7000
|
trusted library allocation
|
page read and write
|
||
29A9AEFC000
|
heap
|
page read and write
|
||
29A9AEF6000
|
heap
|
page read and write
|
||
7FFD9BE3D000
|
trusted library allocation
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
7FFD9BBC2000
|
trusted library allocation
|
page read and write
|
||
29A9AF35000
|
heap
|
page read and write
|
||
1C030000
|
heap
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
327B000
|
heap
|
page read and write
|
||
18827000
|
trusted library allocation
|
page read and write
|
||
12E8D000
|
trusted library allocation
|
page read and write
|
||
1C4EA000
|
heap
|
page read and write
|
||
364C000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
189B14E0000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
189B170F000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
347A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC24000
|
trusted library allocation
|
page read and write
|
||
3145000
|
heap
|
page read and write
|
||
1B02E000
|
stack
|
page read and write
|
||
1B98A000
|
heap
|
page read and write
|
||
31C9000
|
heap
|
page read and write
|
||
7FFD9BB9D000
|
trusted library allocation
|
page read and write
|
||
1D200000
|
heap
|
page read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page execute and read and write
|
||
1B4AF000
|
stack
|
page read and write
|
||
18194000
|
trusted library allocation
|
page read and write
|
||
13F3C000
|
trusted library allocation
|
page read and write
|
||
1D91B000
|
stack
|
page read and write
|
||
270000
|
unkown
|
page readonly
|
||
7FF7605C5000
|
unkown
|
page write copy
|
||
176A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBDC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA86000
|
trusted library allocation
|
page execute and read and write
|
||
1B8B6000
|
heap
|
page read and write
|
||
4F90000
|
heap
|
page read and write
|
||
C9E000
|
stack
|
page read and write
|
||
3095000
|
trusted library allocation
|
page read and write
|
||
B7F000
|
stack
|
page read and write
|
||
544C000
|
stack
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
17C89000
|
trusted library allocation
|
page read and write
|
||
7FF4B2350000
|
trusted library allocation
|
page execute and read and write
|
||
F5F29FF000
|
stack
|
page read and write
|
||
7FFD9BD80000
|
trusted library allocation
|
page execute and read and write
|
||
1621000
|
heap
|
page read and write
|
||
1CE4E000
|
stack
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BD42000
|
trusted library allocation
|
page read and write
|
||
10C6000
|
heap
|
page read and write
|
||
2AEF7354000
|
heap
|
page read and write
|
||
17BBC000
|
trusted library allocation
|
page read and write
|
||
1343B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD7000
|
trusted library allocation
|
page execute and read and write
|
||
4680000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
15D2F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB2E000
|
trusted library allocation
|
page read and write
|
||
160ED000
|
trusted library allocation
|
page read and write
|
||
189B16BB000
|
heap
|
page read and write
|
||
7FFD9BB5B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
1701D000
|
trusted library allocation
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
2D4F000
|
stack
|
page read and write
|
||
1D279000
|
heap
|
page read and write
|
||
2AD4000
|
trusted library allocation
|
page read and write
|
||
1B9A2000
|
heap
|
page read and write
|
||
7FFD9BB4C000
|
trusted library allocation
|
page read and write
|
||
2D9B000
|
trusted library allocation
|
page read and write
|
||
1C22D000
|
stack
|
page read and write
|
||
1D1C0000
|
heap
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
21794F65000
|
heap
|
page read and write
|
||
7FFD9BE36000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
1834000
|
heap
|
page read and write
|
||
7FFD9BB8A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC08000
|
trusted library allocation
|
page read and write
|
||
181F7000
|
trusted library allocation
|
page read and write
|
||
21794FC8000
|
heap
|
page read and write
|
||
3417000
|
trusted library allocation
|
page read and write
|
||
16A66000
|
trusted library allocation
|
page read and write
|
||
1C710000
|
trusted library section
|
page read and write
|
||
3330000
|
heap
|
page read and write
|
||
7FFD9BB5C000
|
trusted library allocation
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
1ABDE000
|
heap
|
page read and write
|
||
1C6AA000
|
stack
|
page read and write
|
||
133D1000
|
trusted library allocation
|
page read and write
|
||
1827C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC26000
|
trusted library allocation
|
page read and write
|
||
2904000
|
heap
|
page read and write
|
||
7FFD9BC02000
|
trusted library allocation
|
page read and write
|
||
128ED000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
1BA9F000
|
heap
|
page read and write
|
||
386C000
|
trusted library allocation
|
page read and write
|
||
2E9C000
|
trusted library allocation
|
page read and write
|
||
29A9AEFB000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
1841D000
|
trusted library allocation
|
page read and write
|
||
1DA84310000
|
heap
|
page read and write
|
||
7FFD9BD72000
|
trusted library allocation
|
page read and write
|
||
33CA000
|
trusted library allocation
|
page read and write
|
||
12661000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD7A000
|
trusted library allocation
|
page read and write
|
||
1B8A7000
|
stack
|
page read and write
|
||
525F000
|
stack
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
2BEE000
|
trusted library allocation
|
page read and write
|
||
3250000
|
trusted library allocation
|
page read and write
|
||
1100000
|
trusted library allocation
|
page read and write
|
||
29A9AF4E000
|
heap
|
page read and write
|
||
31D4000
|
trusted library allocation
|
page read and write
|
||
1BFC2000
|
heap
|
page read and write
|
||
1A20000
|
trusted library allocation
|
page read and write
|
||
31EA000
|
trusted library allocation
|
page read and write
|
||
1726000
|
heap
|
page read and write
|
||
7FFD9BE10000
|
trusted library allocation
|
page read and write
|
||
133C3000
|
trusted library allocation
|
page read and write
|
||
144F7000
|
trusted library allocation
|
page read and write
|
||
1333A000
|
trusted library allocation
|
page read and write
|
||
12EC9000
|
trusted library allocation
|
page read and write
|
||
172E5000
|
trusted library allocation
|
page read and write
|
||
2AEF7349000
|
heap
|
page read and write
|
||
386E000
|
trusted library allocation
|
page read and write
|
||
189B16F0000
|
heap
|
page read and write
|
||
7FFD9BD72000
|
trusted library allocation
|
page read and write
|
||
F5F24FA000
|
stack
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
257A3AFC000
|
heap
|
page read and write
|
||
7FFD9BE36000
|
trusted library allocation
|
page read and write
|
||
28E8000
|
heap
|
page read and write
|
||
257A3AD0000
|
heap
|
page read and write
|
||
3209000
|
heap
|
page read and write
|
||
295B000
|
heap
|
page read and write
|
||
134AC000
|
trusted library allocation
|
page read and write
|
||
2C1D000
|
trusted library allocation
|
page read and write
|
||
31D1000
|
heap
|
page read and write
|
||
F5F2BFF000
|
stack
|
page read and write
|
||
7FFD9BAA8000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
2AEF72F6000
|
heap
|
page read and write
|
||
1330F000
|
trusted library allocation
|
page read and write
|
||
4BCF000
|
stack
|
page read and write
|
||
1190000
|
trusted library allocation
|
page read and write
|
||
31C9000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
2D7C000
|
trusted library allocation
|
page read and write
|
||
1835C240000
|
heap
|
page read and write
|
||
A79000
|
heap
|
page read and write
|
||
296F000
|
heap
|
page read and write
|
||
189B34A0000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
29A9AF3F000
|
heap
|
page read and write
|
||
7FFD9BE3D000
|
trusted library allocation
|
page read and write
|
||
9BC000
|
heap
|
page read and write
|
||
2959000
|
trusted library allocation
|
page read and write
|
||
2E02000
|
trusted library allocation
|
page read and write
|
||
D56000
|
stack
|
page read and write
|
||
7FFD9BD80000
|
trusted library allocation
|
page read and write
|
||
1274C000
|
trusted library allocation
|
page read and write
|
||
17659000
|
trusted library allocation
|
page read and write
|
||
2B0E000
|
trusted library allocation
|
page read and write
|
||
1B840000
|
heap
|
page execute and read and write
|
||
115B000
|
heap
|
page read and write
|
||
3B61000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
142FA000
|
trusted library allocation
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
2AEF730D000
|
heap
|
page read and write
|
||
2AE000
|
unkown
|
page write copy
|
||
1C035000
|
heap
|
page read and write
|
||
EBE000
|
stack
|
page read and write
|
||
7FFD9B9EC000
|
trusted library allocation
|
page execute and read and write
|
||
1980000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
1D6CD000
|
stack
|
page read and write
|
||
1196000
|
unkown
|
page readonly
|
||
1679000
|
heap
|
page read and write
|
||
3219000
|
trusted library allocation
|
page read and write
|
||
3167000
|
heap
|
page read and write
|
||
15340000
|
trusted library allocation
|
page read and write
|
||
1BFDA000
|
stack
|
page read and write
|
||
3443000
|
trusted library allocation
|
page read and write
|
||
4F8F000
|
stack
|
page read and write
|
||
29A9AF09000
|
heap
|
page read and write
|
||
2AEF7270000
|
heap
|
page read and write
|
||
7FFD9BC46000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE30000
|
trusted library allocation
|
page read and write
|
||
31D1000
|
heap
|
page read and write
|
||
2D46000
|
trusted library allocation
|
page read and write
|
||
7C67CFE000
|
stack
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
29A9AF0D000
|
heap
|
page read and write
|
||
1B40C000
|
stack
|
page read and write
|
||
257A3AA0000
|
heap
|
page read and write
|
||
189B16CC000
|
heap
|
page read and write
|
||
E9FB35A000
|
stack
|
page read and write
|
||
7FFD9BE80000
|
trusted library allocation
|
page execute and read and write
|
||
31CA000
|
heap
|
page read and write
|
||
1D84B000
|
stack
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
189B16ED000
|
heap
|
page read and write
|
||
34C6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBB4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
270000
|
unkown
|
page readonly
|
||
1929D000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
1C1DE000
|
stack
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE33000
|
trusted library allocation
|
page read and write
|
||
12819000
|
trusted library allocation
|
page read and write
|
||
26FB000
|
stack
|
page read and write
|
||
1BE23000
|
stack
|
page read and write
|
||
1C720000
|
trusted library section
|
page read and write
|
||
35C9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B997000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE40000
|
trusted library allocation
|
page read and write
|
||
257A3B54000
|
heap
|
page read and write
|
||
135CC000
|
trusted library allocation
|
page read and write
|
||
2EB2000
|
trusted library allocation
|
page read and write
|
||
1C700000
|
trusted library section
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
1366000
|
stack
|
page read and write
|
||
1D065000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
1342D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA56000
|
trusted library allocation
|
page read and write
|
||
31CA000
|
heap
|
page read and write
|
||
189B1721000
|
heap
|
page read and write
|
||
7FFD9BB43000
|
trusted library allocation
|
page read and write
|
||
1CA10000
|
trusted library section
|
page read and write
|
||
257A3AF0000
|
heap
|
page read and write
|
||
7FFD9B982000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE19000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF7000
|
trusted library allocation
|
page read and write
|
||
1C62E000
|
unkown
|
page read and write
|
||
29A9AF3A000
|
heap
|
page read and write
|
||
7FFD9BAAA000
|
trusted library allocation
|
page execute and read and write
|
||
257A3AB0000
|
heap
|
page read and write
|
||
1CD4B000
|
stack
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
22AB9A79000
|
heap
|
page read and write
|
||
1A90000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
29A9AF0D000
|
heap
|
page read and write
|
||
30A8000
|
trusted library allocation
|
page read and write
|
||
2F00000
|
heap
|
page readonly
|
||
134BF000
|
trusted library allocation
|
page read and write
|
||
257A3B5A000
|
heap
|
page read and write
|
||
29A9AF55000
|
heap
|
page read and write
|
||
7FFD9BA36000
|
trusted library allocation
|
page read and write
|
||
2CAA000
|
trusted library allocation
|
page read and write
|
||
189B16EA000
|
heap
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
2954000
|
heap
|
page read and write
|
||
7FFD9BD3F000
|
trusted library allocation
|
page read and write
|
||
1B44E000
|
stack
|
page read and write
|
||
3167000
|
heap
|
page read and write
|
||
1086000
|
heap
|
page read and write
|
||
31D1000
|
heap
|
page read and write
|
||
524B000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD30000
|
trusted library allocation
|
page read and write
|
||
2B0C000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
1602D000
|
trusted library allocation
|
page read and write
|
||
1B5A4000
|
stack
|
page read and write
|
||
2947000
|
heap
|
page read and write
|
||
18988000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD8B000
|
trusted library allocation
|
page read and write
|
||
35D1000
|
trusted library allocation
|
page read and write
|
||
30E6000
|
trusted library allocation
|
page read and write
|
||
189B16EB000
|
heap
|
page read and write
|
||
17F75000
|
trusted library allocation
|
page read and write
|
||
2B85000
|
trusted library allocation
|
page read and write
|
||
183B2000
|
trusted library allocation
|
page read and write
|
||
AA79DFF000
|
stack
|
page read and write
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
126D4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC53000
|
trusted library allocation
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
1671000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
31D1000
|
heap
|
page read and write
|
||
2DD5000
|
trusted library allocation
|
page read and write
|
||
3658000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
2AEF7332000
|
heap
|
page read and write
|
||
3221000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
2947000
|
heap
|
page read and write
|
||
30A4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BD82000
|
trusted library allocation
|
page read and write
|
||
17B22000
|
trusted library allocation
|
page read and write
|
||
128B1000
|
trusted library allocation
|
page read and write
|
||
2AEF730D000
|
heap
|
page read and write
|
||
17BF6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE4D000
|
trusted library allocation
|
page read and write
|
||
2AEF7340000
|
heap
|
page read and write
|
||
7FFD9BC82000
|
trusted library allocation
|
page read and write
|
||
12741000
|
trusted library allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
2954000
|
heap
|
page read and write
|
||
1BFC0000
|
trusted library section
|
page read and write
|
||
7FFD9BBF2000
|
trusted library allocation
|
page read and write
|
||
257A3B46000
|
heap
|
page read and write
|
||
31D8000
|
trusted library allocation
|
page read and write
|
||
189B15E0000
|
heap
|
page read and write
|
||
404000
|
unkown
|
page read and write
|
||
1D1C4000
|
heap
|
page read and write
|
||
7FFD9BBE2000
|
trusted library allocation
|
page read and write
|
||
1DA84410000
|
heap
|
page read and write
|
||
35E7000
|
trusted library allocation
|
page read and write
|
||
1DA844F6000
|
heap
|
page read and write
|
||
162D000
|
heap
|
page read and write
|
||
2D1000
|
unkown
|
page read and write
|
||
2947000
|
heap
|
page read and write
|
||
1B040000
|
heap
|
page execute and read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
257A3B4E000
|
heap
|
page read and write
|
||
1835C430000
|
heap
|
page read and write
|
||
321D000
|
trusted library allocation
|
page read and write
|
||
13440000
|
trusted library allocation
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
182DE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDBD000
|
trusted library allocation
|
page execute and read and write
|
||
2CAC000
|
trusted library allocation
|
page read and write
|
||
2925000
|
heap
|
page read and write
|
||
1B64E000
|
stack
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page read and write
|
||
2D24000
|
trusted library allocation
|
page read and write
|
||
3335000
|
trusted library allocation
|
page read and write
|
||
232B000
|
stack
|
page read and write
|
||
7FFD9BE20000
|
trusted library allocation
|
page read and write
|
||
32D5000
|
trusted library allocation
|
page read and write
|
||
131E000
|
stack
|
page read and write
|
||
E10000
|
heap
|
page execute and read and write
|
||
1BDDF000
|
stack
|
page read and write
|
||
29A9AF35000
|
heap
|
page read and write
|
||
7FFD9BBA4000
|
trusted library allocation
|
page read and write
|
||
290E000
|
heap
|
page read and write
|
||
17AC4000
|
trusted library allocation
|
page read and write
|
||
1351C000
|
trusted library allocation
|
page read and write
|
||
DFE000
|
stack
|
page read and write
|
||
7FFD9BD2A000
|
trusted library allocation
|
page read and write
|
||
1DA844E4000
|
heap
|
page read and write
|
||
34EE000
|
stack
|
page read and write
|
||
1AC85000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
2AEF730D000
|
heap
|
page read and write
|
||
7FFD9BA36000
|
trusted library allocation
|
page read and write
|
||
6CB68FF000
|
stack
|
page read and write
|
||
3037000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
7FFD9BE3A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB36000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC3A000
|
trusted library allocation
|
page read and write
|
||
2AEF733C000
|
heap
|
page read and write
|
||
7FFD9BC74000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page execute and read and write
|
||
113C000
|
heap
|
page read and write
|
||
2AEF72E9000
|
heap
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
1AE80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
1B962000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
2DDE000
|
stack
|
page read and write
|
||
31AC000
|
trusted library allocation
|
page read and write
|
||
7C678FA000
|
stack
|
page read and write
|
||
1C0DE000
|
unkown
|
page read and write
|
||
740000
|
heap
|
page read and write
|
||
81B000
|
heap
|
page read and write
|
||
B319EFE000
|
stack
|
page read and write
|
||
12DCD000
|
trusted library allocation
|
page read and write
|
||
18872000
|
trusted library allocation
|
page read and write
|
||
257A3B60000
|
heap
|
page read and write
|
||
12F21000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD31000
|
trusted library allocation
|
page read and write
|
||
29A9AF30000
|
heap
|
page read and write
|
||
7FFD9BB9F000
|
trusted library allocation
|
page read and write
|
||
2954000
|
heap
|
page read and write
|
||
257A3AFF000
|
heap
|
page read and write
|
||
7FFD9B9BC000
|
trusted library allocation
|
page read and write
|
||
189B16C0000
|
heap
|
page read and write
|
||
7FFD9BE10000
|
trusted library allocation
|
page read and write
|
||
CB3000
|
heap
|
page read and write
|
||
16ED59A000
|
stack
|
page read and write
|
||
7FFD9B9C3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
257A3B20000
|
heap
|
page read and write
|
||
2B4E000
|
stack
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
1BD22000
|
stack
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
1CC4D000
|
stack
|
page read and write
|
||
7FFD9BE4A000
|
trusted library allocation
|
page read and write
|
||
2A3000
|
unkown
|
page readonly
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FFD9BBFC000
|
trusted library allocation
|
page read and write
|
||
2B50000
|
heap
|
page read and write
|
||
AA79AFE000
|
stack
|
page read and write
|
||
21794F00000
|
heap
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
23DE000
|
stack
|
page read and write
|
||
7FFD9BBE7000
|
trusted library allocation
|
page read and write
|
||
257A3B07000
|
heap
|
page read and write
|
||
7FFD9BDAB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B997000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE30000
|
trusted library allocation
|
page read and write
|
||
184F5000
|
trusted library allocation
|
page read and write
|
||
1C52A000
|
stack
|
page read and write
|
||
29A9AF35000
|
heap
|
page read and write
|
||
1BAF0000
|
heap
|
page read and write
|
||
1AE8D000
|
stack
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
7FFD9BC2E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB7B000
|
trusted library allocation
|
page read and write
|
||
A30000
|
trusted library allocation
|
page read and write
|
||
2F53000
|
trusted library allocation
|
page read and write
|
||
189B16D6000
|
heap
|
page read and write
|
||
7FFD9BB3C000
|
trusted library allocation
|
page read and write
|
||
315A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
18932000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD50000
|
trusted library allocation
|
page read and write
|
||
3547000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBEC000
|
trusted library allocation
|
page read and write
|
||
1C9C0000
|
trusted library section
|
page read and write
|
||
1B343000
|
stack
|
page read and write
|
||
176D8000
|
trusted library allocation
|
page read and write
|
||
3320000
|
trusted library allocation
|
page read and write
|
||
295B000
|
heap
|
page read and write
|
||
461E000
|
stack
|
page read and write
|
||
316A000
|
heap
|
page read and write
|
||
7FFD9BBB8000
|
trusted library allocation
|
page read and write
|
||
7FF7605C5000
|
unkown
|
page read and write
|
||
2D3A000
|
heap
|
page read and write
|
||
7FFD9BA96000
|
trusted library allocation
|
page execute and read and write
|
||
3400000
|
heap
|
page read and write
|
||
292C000
|
heap
|
page read and write
|
||
2900000
|
heap
|
page read and write
|
||
189B16C0000
|
heap
|
page read and write
|
||
7FFD9BE5D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page execute and read and write
|
||
DB0000
|
heap
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
heap
|
page read and write
|
||
7FF7605C0000
|
unkown
|
page readonly
|
||
2EE6000
|
trusted library allocation
|
page read and write
|
||
12750000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
1B14E000
|
stack
|
page read and write
|
||
7FFD9BBED000
|
trusted library allocation
|
page read and write
|
||
31AA000
|
trusted library allocation
|
page read and write
|
||
2D3C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB5B000
|
trusted library allocation
|
page read and write
|
||
12E73000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
2923000
|
heap
|
page read and write
|
||
7FFD9B9CC000
|
trusted library allocation
|
page read and write
|
||
1C760000
|
trusted library section
|
page read and write
|
||
1D73D000
|
stack
|
page read and write
|
||
1DA85F30000
|
heap
|
page read and write
|
||
286A000
|
trusted library allocation
|
page read and write
|
||
2AEF72F6000
|
heap
|
page read and write
|
||
13584000
|
trusted library allocation
|
page read and write
|
||
1BAAF000
|
stack
|
page read and write
|
||
7FFD9BD41000
|
trusted library allocation
|
page read and write
|
||
1BD8E000
|
stack
|
page read and write
|
||
2947000
|
heap
|
page read and write
|
||
B9F000
|
stack
|
page read and write
|
||
2AEF7620000
|
heap
|
page read and write
|
||
190B7000
|
trusted library allocation
|
page read and write
|
||
1354B000
|
trusted library allocation
|
page read and write
|
||
113A000
|
heap
|
page read and write
|
||
2C5E000
|
trusted library allocation
|
page read and write
|
||
17AAB000
|
trusted library allocation
|
page read and write
|
||
22AB9A70000
|
heap
|
page read and write
|
||
126E3000
|
trusted library allocation
|
page read and write
|
||
1BA2E000
|
heap
|
page read and write
|
||
29A9AF10000
|
heap
|
page read and write
|
||
523F000
|
heap
|
page read and write
|
||
5210000
|
heap
|
page read and write
|
||
2DBA000
|
trusted library allocation
|
page read and write
|
||
12786000
|
trusted library allocation
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
1146000
|
heap
|
page read and write
|
||
2BAE000
|
stack
|
page read and write
|
||
2EE9000
|
stack
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
1A539380000
|
heap
|
page read and write
|
||
7C679FF000
|
stack
|
page read and write
|
||
585E000
|
stack
|
page read and write
|
||
38E8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
3217000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD30000
|
trusted library allocation
|
page read and write
|
||
1D8CF000
|
stack
|
page read and write
|
||
3AE7000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BEA0000
|
trusted library allocation
|
page read and write
|
||
1C070000
|
trusted library section
|
page read and write
|
||
18321000
|
trusted library allocation
|
page read and write
|
||
13411000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
274E000
|
stack
|
page read and write
|
||
B3198FA000
|
stack
|
page read and write
|
||
7FFD9BD70000
|
trusted library allocation
|
page read and write
|
||
EA5000
|
heap
|
page read and write
|
||
4D4D000
|
stack
|
page read and write
|
||
2909000
|
heap
|
page read and write
|
||
2ED1000
|
trusted library allocation
|
page read and write
|
||
165D9B30000
|
heap
|
page read and write
|
||
21794F6B000
|
heap
|
page read and write
|
||
31D1000
|
heap
|
page read and write
|
||
105D000
|
heap
|
page read and write
|
||
21794F60000
|
heap
|
page read and write
|
||
1CD2D000
|
stack
|
page read and write
|
||
312D000
|
trusted library allocation
|
page read and write
|
||
2AEF7340000
|
heap
|
page read and write
|
||
2EDE000
|
trusted library allocation
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
37A0000
|
trusted library allocation
|
page read and write
|
||
2AE000
|
unkown
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
1D5CE000
|
stack
|
page read and write
|
||
B319CFE000
|
stack
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
2D2000
|
unkown
|
page readonly
|
||
33BE000
|
stack
|
page read and write
|
||
1BA00000
|
heap
|
page read and write
|
||
10C3000
|
heap
|
page read and write
|
||
135FE000
|
trusted library allocation
|
page read and write
|
||
29A9AF48000
|
heap
|
page read and write
|
||
CDF000
|
heap
|
page read and write
|
||
7FFD9BE60000
|
trusted library allocation
|
page execute and read and write
|
||
1B15000
|
heap
|
page read and write
|
||
7FFD9BE50000
|
trusted library allocation
|
page read and write
|
||
182A7000
|
trusted library allocation
|
page read and write
|
||
2AD2000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
7FFD9BD92000
|
trusted library allocation
|
page read and write
|
||
3A27000
|
trusted library allocation
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
1C9E0000
|
trusted library section
|
page read and write
|
||
1C9F0000
|
heap
|
page read and write
|
||
32D9000
|
trusted library allocation
|
page read and write
|
||
13B7B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA56000
|
trusted library allocation
|
page read and write
|
||
1344C000
|
trusted library allocation
|
page read and write
|
||
2B06000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC51000
|
trusted library allocation
|
page read and write
|
||
1A5394C0000
|
heap
|
page read and write
|
||
3350000
|
trusted library allocation
|
page read and write
|
||
1A5394F6000
|
heap
|
page read and write
|
||
28FE000
|
stack
|
page read and write
|
||
12DC1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB56000
|
trusted library allocation
|
page read and write
|
||
1C6B0000
|
trusted library section
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
1532A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE50000
|
trusted library allocation
|
page read and write
|
||
257A3AF0000
|
heap
|
page read and write
|
||
1DA84670000
|
heap
|
page read and write
|
||
33C8000
|
trusted library allocation
|
page read and write
|
||
165D9D10000
|
heap
|
page read and write
|
||
2B88000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB23000
|
trusted library allocation
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
12E7A000
|
trusted library allocation
|
page read and write
|
||
271000
|
unkown
|
page execute read
|
||
2B86000
|
stack
|
page read and write
|
||
7FFD9BBAF000
|
trusted library allocation
|
page read and write
|
||
2905000
|
heap
|
page read and write
|
||
4FEE000
|
stack
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
1D224000
|
heap
|
page read and write
|
||
1353D000
|
trusted library allocation
|
page read and write
|
||
2901000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
trusted library allocation
|
page read and write
|
||
A8C000
|
heap
|
page read and write
|
||
2A3000
|
unkown
|
page readonly
|
||
D1E000
|
stack
|
page read and write
|
||
16EDBFE000
|
stack
|
page read and write
|
||
50F0000
|
heap
|
page read and write
|
||
7FFD9BB8F000
|
trusted library allocation
|
page read and write
|
||
300E000
|
stack
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB46000
|
trusted library allocation
|
page read and write
|
||
30C6000
|
trusted library allocation
|
page read and write
|
||
3240000
|
trusted library allocation
|
page read and write
|
||
18226000
|
trusted library allocation
|
page read and write
|
||
3B63000
|
trusted library allocation
|
page read and write
|
||
2A2E000
|
stack
|
page read and write
|
||
1B3AE000
|
stack
|
page read and write
|
||
291E000
|
heap
|
page read and write
|
||
189B1709000
|
heap
|
page read and write
|
||
313D000
|
heap
|
page read and write
|
||
C3C000
|
heap
|
page read and write
|
||
7FFD9BBA2000
|
trusted library allocation
|
page read and write
|
||
257A3D40000
|
heap
|
page read and write
|
||
7FFD9BD50000
|
trusted library allocation
|
page read and write
|
||
148B5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC69000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD60000
|
trusted library allocation
|
page read and write
|
||
32DD000
|
trusted library allocation
|
page read and write
|
||
1265D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBBF000
|
trusted library allocation
|
page read and write
|
||
1B9A6000
|
heap
|
page read and write
|
||
2B39000
|
stack
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
5241000
|
heap
|
page read and write
|
||
1BAFA000
|
heap
|
page read and write
|
||
126CC000
|
trusted library allocation
|
page read and write
|
||
2904000
|
heap
|
page read and write
|
||
1B24F000
|
stack
|
page read and write
|
||
1D21A000
|
heap
|
page read and write
|
||
7FFD9B996000
|
trusted library allocation
|
page read and write
|
||
162EA000
|
trusted library allocation
|
page read and write
|
||
257A3B41000
|
heap
|
page read and write
|
||
2B0A000
|
trusted library allocation
|
page read and write
|
||
35D5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
12798000
|
trusted library allocation
|
page read and write
|
||
29A9AF3D000
|
heap
|
page read and write
|
||
2AEF7338000
|
heap
|
page read and write
|
||
2F55000
|
heap
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
7FFD9B9C7000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB2E000
|
trusted library allocation
|
page read and write
|
||
685BAFE000
|
stack
|
page read and write
|
||
178D000
|
heap
|
page read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page read and write
|
||
3AEC000
|
stack
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1B8FE000
|
stack
|
page read and write
|
||
1C07A000
|
heap
|
page read and write
|
||
30F4000
|
trusted library allocation
|
page read and write
|
||
2EC3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB7A000
|
trusted library allocation
|
page read and write
|
||
2C13000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE60000
|
trusted library allocation
|
page execute and read and write
|
||
3254000
|
trusted library allocation
|
page read and write
|
||
1128000
|
heap
|
page read and write
|
||
1BEB0000
|
heap
|
page read and write
|
||
321F000
|
trusted library allocation
|
page read and write
|
||
1873C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A6000
|
trusted library allocation
|
page read and write
|
||
17133000
|
trusted library allocation
|
page read and write
|
||
30E4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD80000
|
trusted library allocation
|
page read and write
|
||
16B68000
|
trusted library allocation
|
page read and write
|
||
2BB4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
17BC6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page execute and read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
178B000
|
heap
|
page read and write
|
||
1D1DA000
|
heap
|
page read and write
|
||
7FFD9BC28000
|
trusted library allocation
|
page read and write
|
||
ADC000
|
heap
|
page read and write
|
||
2E8F000
|
stack
|
page read and write
|
||
12651000
|
trusted library allocation
|
page read and write
|
||
2868000
|
trusted library allocation
|
page read and write
|
||
6CB60FA000
|
stack
|
page read and write
|
||
2E85000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB1000
|
trusted library allocation
|
page execute and read and write
|
||
1BBFA000
|
stack
|
page read and write
|
||
257A3B21000
|
heap
|
page read and write
|
||
2949000
|
heap
|
page read and write
|
||
1DA844C8000
|
heap
|
page read and write
|
||
29A9AEB0000
|
heap
|
page read and write
|
||
257A3B52000
|
heap
|
page read and write
|
||
409000
|
unkown
|
page readonly
|
||
1010000
|
heap
|
page read and write
|
||
133C1000
|
trusted library allocation
|
page read and write
|
||
310F000
|
stack
|
page read and write
|
||
286C000
|
trusted library allocation
|
page read and write
|
||
189B1729000
|
heap
|
page read and write
|
||
7FFD9BC82000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page execute and read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
1165000
|
heap
|
page read and write
|
||
3B5F000
|
trusted library allocation
|
page read and write
|
||
1885E000
|
trusted library allocation
|
page read and write
|
||
173A5000
|
trusted library allocation
|
page read and write
|
||
13389000
|
trusted library allocation
|
page read and write
|
||
16C28000
|
trusted library allocation
|
page read and write
|
||
4FA0000
|
heap
|
page read and write
|
||
33B1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBDD000
|
trusted library allocation
|
page read and write
|
||
2954000
|
heap
|
page read and write
|
||
295B000
|
heap
|
page read and write
|
||
2911000
|
heap
|
page read and write
|
||
189B171D000
|
heap
|
page read and write
|
||
1C04C000
|
heap
|
page read and write
|
||
7FFD9BBD2000
|
trusted library allocation
|
page read and write
|
||
2EBC000
|
stack
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
14DE000
|
stack
|
page read and write
|
||
189B171E000
|
heap
|
page read and write
|
||
19174000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD82000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE43000
|
trusted library allocation
|
page read and write
|
||
1C950000
|
heap
|
page read and write
|
||
31CB000
|
heap
|
page read and write
|
||
F5F25FE000
|
stack
|
page read and write
|
||
33E0000
|
heap
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
9CF000
|
heap
|
page read and write
|
||
E1E000
|
stack
|
page read and write
|
||
31CA000
|
heap
|
page read and write
|
||
167AA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD4F000
|
trusted library allocation
|
page read and write
|
||
1A539460000
|
heap
|
page read and write
|
||
2DA4000
|
trusted library allocation
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
2CCB000
|
trusted library allocation
|
page read and write
|
||
1835C260000
|
heap
|
page read and write
|
||
1DA84675000
|
heap
|
page read and write
|
||
AF6000
|
stack
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
1B4F0000
|
heap
|
page execute and read and write
|
||
15B6D000
|
trusted library allocation
|
page read and write
|
||
1B96C000
|
heap
|
page read and write
|
||
1C8AA000
|
stack
|
page read and write
|
||
2B95000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBFE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE20000
|
trusted library allocation
|
page read and write
|
||
189B1720000
|
heap
|
page read and write
|
||
5247000
|
heap
|
page read and write
|
||
7FFD9BCA2000
|
trusted library allocation
|
page read and write
|
||
133F5000
|
trusted library allocation
|
page read and write
|
||
2AEF72F6000
|
heap
|
page read and write
|
||
35CD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
7FFD9BAC8000
|
trusted library allocation
|
page execute and read and write
|
||
BDE000
|
stack
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
3039000
|
trusted library allocation
|
page read and write
|
||
13510000
|
trusted library allocation
|
page read and write
|
||
28F1000
|
heap
|
page read and write
|
||
7FFD9BC4B000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
7FFD9BA46000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BD70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA86000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
28C8000
|
heap
|
page read and write
|
||
2EF2000
|
stack
|
page read and write
|
||
B3199FE000
|
stack
|
page read and write
|
||
17EC5000
|
trusted library allocation
|
page read and write
|
||
2E37000
|
trusted library allocation
|
page read and write
|
||
29A9AF5B000
|
heap
|
page read and write
|
||
7FFD9BE20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
189B1711000
|
heap
|
page read and write
|
||
7FFD9BC2C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF8000
|
trusted library allocation
|
page read and write
|
||
31AE000
|
trusted library allocation
|
page read and write
|
||
685B9FF000
|
stack
|
page read and write
|
||
99B8FC000
|
stack
|
page read and write
|
||
2DA9000
|
trusted library allocation
|
page read and write
|
||
1A53AEA0000
|
heap
|
page read and write
|
||
17763000
|
trusted library allocation
|
page read and write
|
||
2CC0000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
189B1714000
|
heap
|
page read and write
|
||
38EC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD1A000
|
trusted library allocation
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
7FFD9B9BB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD6F000
|
trusted library allocation
|
page read and write
|
||
E9FB8FD000
|
stack
|
page read and write
|
||
A75000
|
heap
|
page read and write
|
||
7FFD9BB43000
|
trusted library allocation
|
page read and write
|
||
257A3AFB000
|
heap
|
page read and write
|
||
2FC3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BD70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
31B6000
|
trusted library allocation
|
page read and write
|
||
685B13A000
|
stack
|
page read and write
|
||
3B67000
|
trusted library allocation
|
page read and write
|
||
17CA6000
|
trusted library allocation
|
page read and write
|
||
2639000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
128AB000
|
trusted library allocation
|
page read and write
|
||
CDF000
|
stack
|
page read and write
|
||
34AD000
|
trusted library allocation
|
page read and write
|
||
3564000
|
trusted library allocation
|
page read and write
|
||
1C000000
|
trusted library section
|
page read and write
|
||
B31A0FE000
|
stack
|
page read and write
|
||
257A3B21000
|
heap
|
page read and write
|
||
313E000
|
heap
|
page read and write
|
||
7FFD9BC32000
|
trusted library allocation
|
page read and write
|
||
1C99B000
|
heap
|
page read and write
|
||
1BA2E000
|
stack
|
page read and write
|
||
2ECD000
|
trusted library allocation
|
page read and write
|
||
13B7E000
|
trusted library allocation
|
page read and write
|
||
31D1000
|
heap
|
page read and write
|
||
17604000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9DD000
|
trusted library allocation
|
page execute and read and write
|
||
30A6000
|
trusted library allocation
|
page read and write
|
||
30A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB5A000
|
trusted library allocation
|
page read and write
|
||
1B94E000
|
stack
|
page read and write
|
||
189B16C8000
|
heap
|
page read and write
|
||
2AEF7356000
|
heap
|
page read and write
|
||
7FFD9BB97000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC38000
|
trusted library allocation
|
page read and write
|
||
12DB5000
|
trusted library allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
295B000
|
heap
|
page read and write
|
||
7FFD9B99C000
|
trusted library allocation
|
page read and write
|
||
3054000
|
trusted library allocation
|
page read and write
|
||
13449000
|
trusted library allocation
|
page read and write
|
||
35C5000
|
trusted library allocation
|
page read and write
|
||
320A000
|
heap
|
page read and write
|
||
3149000
|
heap
|
page read and write
|
||
174F2000
|
trusted library allocation
|
page read and write
|
||
1028000
|
heap
|
page read and write
|
||
2AD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE52000
|
trusted library allocation
|
page read and write
|
||
3AEB000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
7FFD9BB4B000
|
trusted library allocation
|
page read and write
|
||
392E000
|
trusted library allocation
|
page read and write
|
||
29A9AF30000
|
heap
|
page read and write
|
||
189B16CD000
|
heap
|
page read and write
|
||
1390F000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
heap
|
page read and write
|
||
29A9AF30000
|
heap
|
page read and write
|
||
29A9AF32000
|
heap
|
page read and write
|
||
2FB1000
|
trusted library allocation
|
page read and write
|
||
2BEC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC8C000
|
trusted library allocation
|
page read and write
|
||
126DA000
|
trusted library allocation
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE53000
|
trusted library allocation
|
page read and write
|
||
1BF2E000
|
stack
|
page read and write
|
||
1315D000
|
trusted library allocation
|
page read and write
|
||
14F82000
|
trusted library allocation
|
page read and write
|
||
2694000
|
trusted library allocation
|
page read and write
|
||
2AEF733B000
|
heap
|
page read and write
|
||
324C000
|
stack
|
page read and write
|
||
29A9AEF6000
|
heap
|
page read and write
|
||
7FFD9B9D4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC16000
|
trusted library allocation
|
page read and write
|
||
37AF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE6F000
|
trusted library allocation
|
page read and write
|
||
35D9000
|
trusted library allocation
|
page read and write
|
||
23F6000
|
heap
|
page read and write
|
||
154F2000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
2BFE000
|
trusted library allocation
|
page read and write
|
||
314C000
|
stack
|
page read and write
|
||
7FFD9BD20000
|
trusted library allocation
|
page read and write
|
||
176FC000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
191F000
|
stack
|
page read and write
|
||
5236000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page execute and read and write
|
||
17A62000
|
trusted library allocation
|
page read and write
|
||
2D3000
|
unkown
|
page readonly
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
290F000
|
heap
|
page read and write
|
||
1835C4DB000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
1D6CE000
|
stack
|
page read and write
|
||
1C109000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page execute and read and write
|
||
7FFD9BE33000
|
trusted library allocation
|
page read and write
|
||
2AA2000
|
trusted library allocation
|
page read and write
|
||
2AEF7340000
|
heap
|
page read and write
|
||
1CF2C000
|
stack
|
page read and write
|
||
7FFD9BD3F000
|
trusted library allocation
|
page read and write
|
||
3415000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB64000
|
trusted library allocation
|
page read and write
|
||
6CB64FE000
|
stack
|
page read and write
|
||
14D75000
|
trusted library allocation
|
page read and write
|
||
1B3F0000
|
trusted library allocation
|
page read and write
|
||
2BBA000
|
trusted library allocation
|
page read and write
|
||
E00000
|
trusted library allocation
|
page read and write
|
||
1C2DE000
|
stack
|
page read and write
|
||
257A3B40000
|
heap
|
page read and write
|
||
7FFD9BB3C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD8000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC67000
|
trusted library allocation
|
page read and write
|
||
1342B000
|
trusted library allocation
|
page read and write
|
||
12E4F000
|
trusted library allocation
|
page read and write
|
||
31D6000
|
trusted library allocation
|
page read and write
|
||
198B000
|
heap
|
page read and write
|
||
99B9FF000
|
stack
|
page read and write
|
||
7FFD9BB5B000
|
trusted library allocation
|
page read and write
|
||
1DA843F0000
|
heap
|
page read and write
|
||
1B94E000
|
stack
|
page read and write
|
||
7FFD9B997000
|
trusted library allocation
|
page read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD7B000
|
trusted library allocation
|
page read and write
|
||
14F5000
|
heap
|
page read and write
|
||
15E7B000
|
trusted library allocation
|
page read and write
|
||
C1A000
|
heap
|
page read and write
|
||
1D22F000
|
heap
|
page read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page execute and read and write
|
||
3400000
|
heap
|
page execute and read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page execute and read and write
|
||
1BF8D000
|
stack
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
1481D000
|
trusted library allocation
|
page read and write
|
||
2906000
|
heap
|
page read and write
|
||
343E000
|
stack
|
page read and write
|
||
7FFD9BE00000
|
trusted library allocation
|
page read and write
|
||
1D63D000
|
stack
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
189B16F0000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
7FF7605C7000
|
unkown
|
page readonly
|
||
32DF000
|
trusted library allocation
|
page read and write
|
||
1B79D000
|
heap
|
page read and write
|
||
151F4000
|
trusted library allocation
|
page read and write
|
||
1202000
|
heap
|
page read and write
|
||
12653000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
1D240000
|
heap
|
page read and write
|
||
2D9E000
|
stack
|
page read and write
|
||
34B1000
|
trusted library allocation
|
page read and write
|
||
7FF7605B1000
|
unkown
|
page execute read
|
||
2AEF735B000
|
heap
|
page read and write
|
||
28E0000
|
heap
|
page read and write
|
||
1CA57000
|
heap
|
page read and write
|
||
1D53E000
|
stack
|
page read and write
|
||
7FFD9BE50000
|
trusted library allocation
|
page read and write
|
||
32C2000
|
trusted library allocation
|
page read and write
|
||
9AE000
|
heap
|
page read and write
|
||
7FFD9BAC1000
|
trusted library allocation
|
page execute and read and write
|
||
1088000
|
heap
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
13446000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC8F000
|
trusted library allocation
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
7FFD9BBE2000
|
trusted library allocation
|
page read and write
|
||
1BFE0000
|
trusted library section
|
page read and write
|
||
257A3CA0000
|
heap
|
page read and write
|
||
343A000
|
trusted library allocation
|
page read and write
|
||
2BF0000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
17F58000
|
trusted library allocation
|
page read and write
|
||
1C2A3000
|
stack
|
page read and write
|
||
1B945000
|
heap
|
page read and write
|
||
7FF7605B1000
|
unkown
|
page execute read
|
||
7FFD9BAE7000
|
trusted library allocation
|
page execute and read and write
|
||
B5D000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
2F54000
|
trusted library allocation
|
page read and write
|
||
3206000
|
heap
|
page read and write
|
||
13ABB000
|
trusted library allocation
|
page read and write
|
||
2A40000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
257A3AFE000
|
heap
|
page read and write
|
||
7FFD9BE5F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE60000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
9A9000
|
heap
|
page read and write
|
||
1751D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
2AEF7349000
|
heap
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
29A9AEF6000
|
heap
|
page read and write
|
||
189B170F000
|
heap
|
page read and write
|
||
B9E000
|
stack
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
257A3B6E000
|
heap
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page execute and read and write
|
||
1BCAA000
|
stack
|
page read and write
|
||
13594000
|
trusted library allocation
|
page read and write
|
||
126DD000
|
trusted library allocation
|
page read and write
|
||
257A3B1A000
|
heap
|
page read and write
|
||
14BC4000
|
trusted library allocation
|
page read and write
|
||
1DA844C0000
|
heap
|
page read and write
|
||
7FFD9BC6A000
|
trusted library allocation
|
page read and write
|
||
1835C268000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
133ED000
|
trusted library allocation
|
page read and write
|
||
1ABEE000
|
stack
|
page read and write
|
||
1AEA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB43000
|
trusted library allocation
|
page read and write
|
||
3260000
|
trusted library allocation
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
29A9C860000
|
heap
|
page read and write
|
||
1822E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE50000
|
trusted library allocation
|
page execute and read and write
|
||
1B8A0000
|
heap
|
page read and write
|
||
288B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page execute and read and write
|
||
534B000
|
stack
|
page read and write
|
||
165F8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE6A000
|
trusted library allocation
|
page read and write
|
||
1C4B0000
|
heap
|
page read and write
|
||
30D1000
|
trusted library allocation
|
page read and write
|
||
1B8B0000
|
heap
|
page read and write
|
||
134BD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC7F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7FF7605B0000
|
unkown
|
page readonly
|
||
1204000
|
heap
|
page read and write
|
||
31D2000
|
trusted library allocation
|
page read and write
|
||
2460000
|
heap
|
page read and write
|
||
152C2000
|
trusted library allocation
|
page read and write
|
||
2DB0000
|
heap
|
page execute and read and write
|
||
7D5000
|
heap
|
page read and write
|
||
1A5394A0000
|
heap
|
page read and write
|
||
14089000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD62000
|
trusted library allocation
|
page read and write
|
||
292A000
|
heap
|
page read and write
|
||
257A3B2A000
|
heap
|
page read and write
|
||
314F000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
2AEF7260000
|
heap
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
1285D000
|
trusted library allocation
|
page read and write
|
||
2C64000
|
trusted library allocation
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
16E25000
|
trusted library allocation
|
page read and write
|
||
175EB000
|
trusted library allocation
|
page read and write
|
||
1D18E000
|
stack
|
page read and write
|
||
379A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page read and write
|
||
3160000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC5A000
|
trusted library allocation
|
page read and write
|
||
B319AFE000
|
stack
|
page read and write
|
||
1B7F3000
|
stack
|
page read and write
|
||
7FFD9BB66000
|
trusted library allocation
|
page read and write
|
||
1D4BD000
|
stack
|
page read and write
|
||
1108000
|
heap
|
page read and write
|
||
2390000
|
heap
|
page read and write
|
||
F5F2CFF000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
3034000
|
heap
|
page read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
2AEF7337000
|
heap
|
page read and write
|
||
530F000
|
stack
|
page read and write
|
||
189B16F0000
|
heap
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
29A9CBF0000
|
heap
|
page read and write
|
||
7FFD9BC15000
|
trusted library allocation
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
AA799FD000
|
stack
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
1BA20000
|
heap
|
page read and write
|
||
165D9C10000
|
heap
|
page read and write
|
||
7FFD9BE56000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE26000
|
trusted library allocation
|
page read and write
|
||
DD6000
|
stack
|
page read and write
|
||
292A000
|
heap
|
page read and write
|
||
153F0000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page execute and read and write
|
||
13D0000
|
heap
|
page read and write
|
||
18845000
|
trusted library allocation
|
page read and write
|
||
13CCA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD8B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE90000
|
trusted library allocation
|
page execute and read and write
|
||
386A000
|
trusted library allocation
|
page read and write
|
||
167B000
|
heap
|
page read and write
|
||
7FFD9BB9F000
|
trusted library allocation
|
page read and write
|
||
18E1D000
|
trusted library allocation
|
page read and write
|
||
189B16D6000
|
heap
|
page read and write
|
||
7FFD9BB2C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC4E000
|
trusted library allocation
|
page read and write
|
||
2AEF731A000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
38EE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
296F000
|
heap
|
page read and write
|
||
7C67FFF000
|
stack
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
26CC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC4000
|
trusted library allocation
|
page read and write
|
||
1D1E1000
|
heap
|
page read and write
|
||
1A50000
|
heap
|
page execute and read and write
|
||
296F000
|
heap
|
page read and write
|
||
12B00000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
7FFD9BAB8000
|
trusted library allocation
|
page execute and read and write
|
||
7B8000
|
heap
|
page read and write
|
||
313C000
|
heap
|
page read and write
|
||
567E000
|
stack
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page execute and read and write
|
||
1B8F3000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
F5F2AFE000
|
stack
|
page read and write
|
||
1BED9000
|
stack
|
page read and write
|
||
3164000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
7FFD9BC5F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE4E000
|
trusted library allocation
|
page read and write
|
||
2913000
|
heap
|
page read and write
|
||
1C9F0000
|
trusted library section
|
page read and write
|
||
295B000
|
heap
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
313C000
|
heap
|
page read and write
|
||
1BA53000
|
heap
|
page read and write
|
||
24C0000
|
heap
|
page execute and read and write
|
||
1C730000
|
trusted library section
|
page read and write
|
||
3124000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD40000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
38EA000
|
trusted library allocation
|
page read and write
|
||
29A9AF1A000
|
heap
|
page read and write
|
||
1BBFD000
|
stack
|
page read and write
|
||
AA79CFF000
|
stack
|
page read and write
|
||
7FFD9B9AC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
2949000
|
heap
|
page read and write
|
||
1BAE1000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
257A3B07000
|
heap
|
page read and write
|
||
3201000
|
heap
|
page read and write
|
||
7FFD9B983000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BD9B000
|
trusted library allocation
|
page read and write
|
||
257A3AEB000
|
heap
|
page read and write
|
||
2AEF72DB000
|
heap
|
page read and write
|
||
7FFD9BB77000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC01000
|
trusted library allocation
|
page read and write
|
||
1830000
|
heap
|
page read and write
|
||
1CC55000
|
stack
|
page read and write
|
||
1BD90000
|
heap
|
page read and write
|
||
2AEF734B000
|
heap
|
page read and write
|
||
1B80F000
|
stack
|
page read and write
|
||
2912000
|
heap
|
page read and write
|
||
4D6087E000
|
stack
|
page read and write
|
||
13535000
|
trusted library allocation
|
page read and write
|
||
257A3B3B000
|
heap
|
page read and write
|
||
32D3000
|
trusted library allocation
|
page read and write
|
||
E30000
|
unkown
|
page readonly
|
||
7FFD9B9A3000
|
trusted library allocation
|
page execute and read and write
|
||
CE5000
|
heap
|
page read and write
|
||
1A1E000
|
stack
|
page read and write
|
||
257A5630000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
257A3B49000
|
heap
|
page read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page read and write
|
||
C3A000
|
heap
|
page read and write
|
||
7FFD9BE83000
|
trusted library allocation
|
page read and write
|
||
1835DD70000
|
heap
|
page read and write
|
||
22AB9A34000
|
heap
|
page read and write
|
||
12BA5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB61000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE5000
|
trusted library allocation
|
page read and write
|
||
14F6000
|
stack
|
page read and write
|
||
36E2000
|
trusted library allocation
|
page read and write
|
||
7FF7605C7000
|
unkown
|
page readonly
|
||
17646000
|
trusted library allocation
|
page read and write
|
||
257A3B1E000
|
heap
|
page read and write
|
||
7FFD9BE40000
|
trusted library allocation
|
page read and write
|
||
28E8000
|
heap
|
page read and write
|
||
17928000
|
trusted library allocation
|
page read and write
|
||
257A3B66000
|
heap
|
page read and write
|
||
15290000
|
trusted library allocation
|
page read and write
|
||
32DB000
|
trusted library allocation
|
page read and write
|
||
2954000
|
heap
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC89000
|
trusted library allocation
|
page read and write
|
||
2BEA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC18000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE60000
|
trusted library allocation
|
page read and write
|
||
30C3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
13070000
|
trusted library allocation
|
page read and write
|
||
1185000
|
heap
|
page read and write
|
||
290E000
|
heap
|
page read and write
|
||
105B000
|
heap
|
page read and write
|
||
1C6AF000
|
unkown
|
page read and write
|
||
115D000
|
heap
|
page read and write
|
||
2AEF730F000
|
heap
|
page read and write
|
||
ABB000
|
heap
|
page read and write
|
||
1C9D0000
|
trusted library section
|
page read and write
|
||
316D000
|
heap
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
1B6F4000
|
stack
|
page read and write
|
||
33FE000
|
stack
|
page read and write
|
||
7FFD9BD46000
|
trusted library allocation
|
page read and write
|
||
31C9000
|
heap
|
page read and write
|
||
2AEF72E0000
|
heap
|
page read and write
|
||
1764C000
|
trusted library allocation
|
page read and write
|
||
AA9000
|
heap
|
page read and write
|
||
2904000
|
heap
|
page read and write
|
||
A75000
|
heap
|
page read and write
|
||
7FF7605BF000
|
unkown
|
page readonly
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB53000
|
trusted library allocation
|
page read and write
|
||
5230000
|
heap
|
page read and write
|
||
2C17000
|
trusted library allocation
|
page read and write
|
||
18244000
|
trusted library allocation
|
page read and write
|
||
1BAAD000
|
stack
|
page read and write
|
||
1D0AE000
|
stack
|
page read and write
|
||
7FFD9BC72000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
1C9AA000
|
stack
|
page read and write
|
||
13D5000
|
heap
|
page read and write
|
||
7FFD9BE90000
|
trusted library allocation
|
page execute and read and write
|
||
257A3B3B000
|
heap
|
page read and write
|
||
7FFD9BAA8000
|
trusted library allocation
|
page execute and read and write
|
||
1BDF0000
|
trusted library section
|
page read and write
|
||
15134000
|
trusted library allocation
|
page read and write
|
||
189B1749000
|
heap
|
page read and write
|
||
21794FF6000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
2AEF7310000
|
heap
|
page read and write
|
||
1BE9E000
|
stack
|
page read and write
|
||
2AEF72EC000
|
heap
|
page read and write
|
||
7FFD9BAAA000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
29A9AF31000
|
heap
|
page read and write
|
||
1C0A0000
|
heap
|
page execute and read and write
|
||
F5F28FF000
|
stack
|
page read and write
|
||
1BEAE000
|
stack
|
page read and write
|
||
15F2B000
|
trusted library allocation
|
page read and write
|
||
379C000
|
trusted library allocation
|
page read and write
|
||
134AE000
|
trusted library allocation
|
page read and write
|
||
1790000
|
heap
|
page read and write
|
||
7FFD9BCA5000
|
trusted library allocation
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
7FFD9BB2C000
|
trusted library allocation
|
page read and write
|
||
C67000
|
heap
|
page read and write
|
||
1BFF0000
|
trusted library section
|
page read and write
|
||
7FFD9BAE1000
|
trusted library allocation
|
page execute and read and write
|
||
104B000
|
heap
|
page read and write
|
||
2705000
|
trusted library allocation
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
2AEF72F6000
|
heap
|
page read and write
|
||
29A9AF5F000
|
heap
|
page read and write
|
||
17E98000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
1CA4F000
|
heap
|
page read and write
|
||
175CD000
|
trusted library allocation
|
page read and write
|
||
1361A000
|
trusted library allocation
|
page read and write
|
||
257A3B46000
|
heap
|
page read and write
|
||
2901000
|
heap
|
page read and write
|
||
C08000
|
heap
|
page read and write
|
||
29A9AF49000
|
heap
|
page read and write
|
||
2AEF7290000
|
heap
|
page read and write
|
||
15032000
|
trusted library allocation
|
page read and write
|
||
1840000
|
heap
|
page read and write
|
||
166F000
|
heap
|
page read and write
|
||
1B920000
|
heap
|
page read and write
|
||
7FFD9BD08000
|
trusted library allocation
|
page read and write
|
||
2D20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
1C093000
|
stack
|
page read and write
|
||
2BF0000
|
trusted library allocation
|
page read and write
|
||
257A3B48000
|
heap
|
page read and write
|
||
292A000
|
heap
|
page read and write
|
||
152F5000
|
trusted library allocation
|
page read and write
|
||
1CA00000
|
trusted library section
|
page read and write
|
||
7FFD9BD52000
|
trusted library allocation
|
page read and write
|
||
2B08000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB36000
|
trusted library allocation
|
page read and write
|
||
2949000
|
heap
|
page read and write
|
||
257A3B40000
|
heap
|
page read and write
|
||
190C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB2000
|
trusted library allocation
|
page read and write
|
||
257A3B07000
|
heap
|
page read and write
|
||
3134000
|
heap
|
page read and write
|
||
183D1000
|
trusted library allocation
|
page read and write
|
||
3AED000
|
trusted library allocation
|
page read and write
|
||
1C780000
|
trusted library section
|
page read and write
|
||
7FFD9BBEC000
|
trusted library allocation
|
page read and write
|
||
257A3B2B000
|
heap
|
page read and write
|
||
1835C4D5000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
3A3F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE16000
|
trusted library allocation
|
page read and write
|
||
3334000
|
trusted library allocation
|
page read and write
|
||
29A9AF3F000
|
heap
|
page read and write
|
||
12901000
|
trusted library allocation
|
page read and write
|
||
2DC4000
|
trusted library allocation
|
page read and write
|
||
1A539495000
|
heap
|
page read and write
|
||
7FFD9BE20000
|
trusted library allocation
|
page read and write
|
||
29A9AF34000
|
heap
|
page read and write
|
||
14805000
|
trusted library allocation
|
page read and write
|
||
135E5000
|
trusted library allocation
|
page read and write
|
||
6CB66FF000
|
stack
|
page read and write
|
||
7FFD9BDA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE70000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
12E81000
|
trusted library allocation
|
page read and write
|
||
1C11C000
|
heap
|
page read and write
|
||
1CA91000
|
heap
|
page read and write
|
||
1C9B0000
|
trusted library section
|
page read and write
|
||
12E81000
|
trusted library allocation
|
page read and write
|
||
3252000
|
trusted library allocation
|
page read and write
|
||
1BE81000
|
stack
|
page read and write
|
||
765000
|
heap
|
page read and write
|
||
321F000
|
heap
|
page read and write
|
||
292D000
|
heap
|
page read and write
|
||
7FFD9BADA000
|
trusted library allocation
|
page execute and read and write
|
||
1AEB0000
|
trusted library allocation
|
page read and write
|
||
2925000
|
heap
|
page read and write
|
||
2AEF730D000
|
heap
|
page read and write
|
||
189B16DB000
|
heap
|
page read and write
|
||
189B1714000
|
heap
|
page read and write
|
||
17C86000
|
trusted library allocation
|
page read and write
|
||
2AEF730A000
|
heap
|
page read and write
|
||
1ADF0000
|
trusted library allocation
|
page read and write
|
||
174B000
|
heap
|
page read and write
|
||
13325000
|
trusted library allocation
|
page read and write
|
||
14C74000
|
trusted library allocation
|
page read and write
|
||
EF6000
|
stack
|
page read and write
|
||
257A3B5E000
|
heap
|
page read and write
|
||
12813000
|
trusted library allocation
|
page read and write
|
||
126D1000
|
trusted library allocation
|
page read and write
|
||
181CC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE6C000
|
trusted library allocation
|
page read and write
|
||
308B000
|
stack
|
page read and write
|
||
9AE000
|
heap
|
page read and write
|
||
685B7FE000
|
stack
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
2BB1000
|
trusted library allocation
|
page read and write
|
||
7FF7605B0000
|
unkown
|
page readonly
|
||
BE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB2C000
|
trusted library allocation
|
page read and write
|
||
1C55E000
|
heap
|
page read and write
|
||
9AA000
|
heap
|
page read and write
|
||
ADA000
|
heap
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
158B0000
|
trusted library allocation
|
page read and write
|
||
1D1FC000
|
heap
|
page read and write
|
||
7FFD9B9AB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
164AB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC79000
|
trusted library allocation
|
page read and write
|
||
595F000
|
stack
|
page read and write
|
||
2EB9000
|
trusted library allocation
|
page read and write
|
||
1187000
|
heap
|
page read and write
|
||
1BB8E000
|
stack
|
page read and write
|
||
1A539490000
|
heap
|
page read and write
|
||
7FFD9BE36000
|
trusted library allocation
|
page read and write
|
||
189B170F000
|
heap
|
page read and write
|
||
7FFD9BE4E000
|
trusted library allocation
|
page read and write
|
||
173F000
|
heap
|
page read and write
|
||
1A900000
|
trusted library allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
5210000
|
trusted library allocation
|
page read and write
|
||
1CE2F000
|
stack
|
page read and write
|
||
7FFD9BD61000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE77000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1C1AF000
|
stack
|
page read and write
|
||
7FFD9BE3A000
|
trusted library allocation
|
page read and write
|
||
189B16D6000
|
heap
|
page read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page execute and read and write
|
||
1B2ED000
|
stack
|
page read and write
|
||
2AEF7332000
|
heap
|
page read and write
|
||
6CB61FE000
|
stack
|
page read and write
|
||
3118000
|
heap
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
15ABD000
|
trusted library allocation
|
page read and write
|
||
12E7D000
|
trusted library allocation
|
page read and write
|
||
685B6FD000
|
stack
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
1BE00000
|
trusted library section
|
page read and write
|
||
7FFD9B9B7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
2928000
|
heap
|
page read and write
|
||
2AEF7332000
|
heap
|
page read and write
|
||
21796AE0000
|
heap
|
page read and write
|
||
7FFD9B9C4000
|
trusted library allocation
|
page read and write
|
||
188C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page read and write
|
||
1521D000
|
trusted library allocation
|
page read and write
|
||
295B000
|
heap
|
page read and write
|
||
2AEF7344000
|
heap
|
page read and write
|
||
7FFD9BB64000
|
trusted library allocation
|
page read and write
|
||
1760000
|
heap
|
page read and write
|
||
2AEF7340000
|
heap
|
page read and write
|
||
189B16D6000
|
heap
|
page read and write
|
||
17A8D000
|
trusted library allocation
|
page read and write
|
||
290F000
|
heap
|
page read and write
|
||
191D6000
|
trusted library allocation
|
page read and write
|
||
181E000
|
stack
|
page read and write
|
||
139BC000
|
trusted library allocation
|
page read and write
|
||
1BC8B000
|
stack
|
page read and write
|
||
2C84000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCCD000
|
trusted library allocation
|
page read and write
|
||
22AB9980000
|
heap
|
page read and write
|
||
1D3BE000
|
stack
|
page read and write
|
||
1BA4E000
|
stack
|
page read and write
|
||
4D605FF000
|
stack
|
page read and write
|
||
30CB000
|
trusted library allocation
|
page read and write
|
||
2FAF000
|
trusted library allocation
|
page read and write
|
||
816000
|
heap
|
page read and write
|
||
7FFD9BE30000
|
trusted library allocation
|
page read and write
|
||
1BB44000
|
stack
|
page read and write
|
||
1D01F000
|
heap
|
page read and write
|
||
1281B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB31000
|
trusted library allocation
|
page read and write
|
||
31C8000
|
heap
|
page read and write
|
||
2AEF8CC0000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
2C66000
|
trusted library allocation
|
page read and write
|
||
2954000
|
heap
|
page read and write
|
||
7FFD9BA3C000
|
trusted library allocation
|
page execute and read and write
|
||
29A9AF3F000
|
heap
|
page read and write
|
||
1CFD9000
|
heap
|
page read and write
|
||
3054000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
3422000
|
trusted library allocation
|
page read and write
|
||
13E7C000
|
trusted library allocation
|
page read and write
|
||
1279D000
|
trusted library allocation
|
page read and write
|
||
B319DFF000
|
stack
|
page read and write
|
||
1C3A5000
|
stack
|
page read and write
|
||
189B1728000
|
heap
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page execute and read and write
|
||
E9FBCFF000
|
stack
|
page read and write
|
||
7FFD9BC92000
|
trusted library allocation
|
page read and write
|
||
A25000
|
heap
|
page read and write
|
||
257A3B1E000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
264E000
|
stack
|
page read and write
|
||
7FFD9BC99000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9CB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
1B959000
|
heap
|
page read and write
|
||
13B4C000
|
trusted library allocation
|
page read and write
|
||
17BB6000
|
trusted library allocation
|
page read and write
|
||
2B83000
|
trusted library allocation
|
page read and write
|
||
1BA91000
|
heap
|
page read and write
|
||
1751000
|
heap
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B3000
|
trusted library allocation
|
page execute and read and write
|
||
12BB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD50000
|
trusted library allocation
|
page read and write
|
||
3030000
|
heap
|
page read and write
|
||
13418000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE90000
|
trusted library allocation
|
page execute and read and write
|
||
7C680FF000
|
stack
|
page read and write
|
||
16EDAFD000
|
stack
|
page read and write
|
||
1B2CE000
|
stack
|
page read and write
|
||
314F000
|
heap
|
page read and write
|
||
2944000
|
heap
|
page read and write
|
||
1B146000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
145F9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
17706000
|
trusted library allocation
|
page read and write
|
||
187C4000
|
trusted library allocation
|
page read and write
|
||
1D273000
|
heap
|
page read and write
|
||
3480000
|
heap
|
page read and write
|
||
1358A000
|
trusted library allocation
|
page read and write
|
||
13B65000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE40000
|
trusted library allocation
|
page read and write
|
||
179D8000
|
trusted library allocation
|
page read and write
|
||
3149000
|
heap
|
page read and write
|
||
2AEF72F6000
|
heap
|
page read and write
|
||
2D34000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
7FFD9BE90000
|
trusted library allocation
|
page read and write
|
||
189B170A000
|
heap
|
page read and write
|
||
7FFD9BD28000
|
trusted library allocation
|
page read and write
|
||
2EF0000
|
trusted library allocation
|
page read and write
|
||
172C000
|
heap
|
page read and write
|
||
189B16F9000
|
heap
|
page read and write
|
||
405000
|
unkown
|
page write copy
|
||
1C3DE000
|
stack
|
page read and write
|
||
13558000
|
trusted library allocation
|
page read and write
|
||
314F000
|
heap
|
page read and write
|
||
1BFBE000
|
stack
|
page read and write
|
||
1D034000
|
heap
|
page read and write
|
||
21794F20000
|
heap
|
page read and write
|
||
6CB67FE000
|
stack
|
page read and write
|
||
1645000
|
heap
|
page read and write
|
||
7FFD9BE2F000
|
trusted library allocation
|
page read and write
|
||
1149000
|
heap
|
page read and write
|
||
296F000
|
heap
|
page read and write
|
||
7FFD9BB3E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
1423A000
|
trusted library allocation
|
page read and write
|
||
31C8000
|
heap
|
page read and write
|
||
7FFD9BD70000
|
trusted library allocation
|
page read and write
|
||
189B1744000
|
heap
|
page read and write
|
||
1B10000
|
heap
|
page read and write
|
||
2AEF7319000
|
heap
|
page read and write
|
||
7FFD9BA5C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB5C000
|
trusted library allocation
|
page read and write
|
||
3209000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
1C027000
|
stack
|
page read and write
|
||
1D28D000
|
stack
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
2AEF7349000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A7000
|
trusted library allocation
|
page read and write
|
||
175A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB8C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9EC000
|
trusted library allocation
|
page execute and read and write
|
||
1D000000
|
heap
|
page read and write
|
||
7FFD9BE06000
|
trusted library allocation
|
page read and write
|
||
189B1710000
|
heap
|
page read and write
|
||
311E000
|
trusted library allocation
|
page read and write
|
||
2AEF72ED000
|
heap
|
page read and write
|
||
22AB99A0000
|
heap
|
page read and write
|
||
171E3000
|
trusted library allocation
|
page read and write
|
||
6CB62FF000
|
stack
|
page read and write
|
||
189B18C0000
|
heap
|
page read and write
|
||
1A40000
|
trusted library allocation
|
page read and write
|
||
4D6057C000
|
stack
|
page read and write
|
||
131E000
|
stack
|
page read and write
|
||
7FFD9B983000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB73000
|
trusted library allocation
|
page read and write
|
||
1B913000
|
heap
|
page read and write
|
||
34AB000
|
trusted library allocation
|
page read and write
|
There are 2288 hidden memdumps, click here to show them.