Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_6fbbc0b515d27881fa5e3ddbdce1d76a1eaa5f56_ac8c2a05_1e491ecf-ed80-4a5d-a544-09bfac26ab9b\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_6fbbc0b515d27881fa5e3ddbdce1d76a1eaa5f56_ac8c2a05_49d8dff7-a5a3-41b2-a831-9d5ed8b6c6c7\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_6fbbc0b515d27881fa5e3ddbdce1d76a1eaa5f56_ac8c2a05_5728b76f-367a-42b4-8042-d1a67ad722df\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_svchost.exe_ff4eaa128a01465bc0285c227bcf12ffe534_ac8c2a05_1db01ede-f8a4-4a47-9a1d-72c2e498d6aa\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER87E9.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu May 2 06:30:21 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER89BE.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu May 2 06:30:21 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8AC8.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8B46.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8B54.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8B93.tmp.txt
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8CAD.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8CDD.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8CDD.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8D2C.tmp.txt
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC55F.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu May 2 06:30:37 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC6A8.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC6E8.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC738.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC7D5.tmp.txt
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDACC.tmp.dmp
|
Mini DuMP crash report, 16 streams, Thu May 2 06:30:44 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE2EB.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE31B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE31F.tmp.csv
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE36E.tmp.txt
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv9D36.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0x6eec0579, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\tmp462D.tmp.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\yklstw
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
||
\Device\Null
|
ASCII text, with CRLF line terminators, with overstriking
|
dropped
|
There are 23 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exe
|
"C:\Users\user\Desktop\INQUIRY#46789-APRIL24_MAT_PRODUC_SAMPLE_PRODUCT.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"'
& exit
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp462D.tmp.bat""
|
||
C:\Windows\System32\schtasks.exe
|
schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\user\AppData\Roaming\svchost.exe"'
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
C:\Users\user\AppData\Roaming\svchost.exe
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
"C:\Users\user\AppData\Roaming\svchost.exe"
|
||
C:\Windows\System32\notepad.exe
|
"C:\Windows\System32\notepad.exe"
|
||
C:\Windows\System32\calc.exe
|
"C:\Windows\System32\calc.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k WerSvcGroup
|
||
C:\Windows\System32\calc.exe
|
"C:\Windows\System32\calc.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
"C:\Users\user\AppData\Roaming\svchost.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\yklstw"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\jmycmollj"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\jmycmollj"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe /stext "C:\Users\user\AppData\Local\Temp\lgevnhwnfrks"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
"C:\Users\user\AppData\Roaming\svchost.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
|
||
C:\Program Files (x86)\Windows Media Player\wmplayer.exe
|
"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\timeout.exe
|
timeout 3
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 468 -p 6364 -ip 6364
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 6364 -s 1092
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 440 -p 5480 -ip 5480
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 5480 -s 1064
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 484 -p 984 -ip 984
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 984 -s 1072
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 544 -p 1004 -ip 1004
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 1004 -s 1088
|
There are 26 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
64.188.18.137
|
|||
https://www.google.com
|
unknown
|
||
http://www.imvu.comr
|
unknown
|
||
http://geoplugin.net/json.gpJ
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
https://127.0.0.1/
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
http://geoplugin.net/json.gpq
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
http://www.nirsoft.net
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
|
unknown
|
||
http://www.ebuddy.com
|
unknown
|
There are 7 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
64.188.18.137
|
unknown
|
United States
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Rmc-CIJU8D
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-CIJU8D
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-CIJU8D
|
time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
svchost
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
ProgramId
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
FileId
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
LowerCaseLongPath
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
LongPathHash
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
Name
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
OriginalFileName
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
Publisher
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
Version
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
BinFileVersion
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
BinaryType
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
ProductName
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
ProductVersion
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
LinkDate
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
BinProductVersion
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
AppxPackageFullName
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
Size
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
Language
|
||
\REGISTRY\A\{104446fe-6c51-a55c-f7b0-5199107a097c}\Root\InventoryApplicationFile\svchost.exe|65618a80641c659b
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018000F12C64205
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
There are 16 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
20181C95000
|
trusted library allocation
|
page read and write
|
||
1BFC4373000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
57AB000
|
heap
|
page read and write
|
||
20181901000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1DB50F74000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1BFC3FE1000
|
trusted library allocation
|
page read and write
|
||
293B75B3000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
205DE1A8000
|
trusted library allocation
|
page read and write
|
||
293B7221000
|
trusted library allocation
|
page read and write
|
||
205CE573000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
5318000
|
heap
|
page read and write
|
||
988000
|
heap
|
page read and write
|
||
205CE1E1000
|
trusted library allocation
|
page read and write
|
||
5487000
|
heap
|
page read and write
|
||
1BFC2443000
|
heap
|
page read and write
|
||
293B7760000
|
trusted library allocation
|
page read and write
|
||
1BFD409B000
|
trusted library allocation
|
page read and write
|
||
1BFC4410000
|
trusted library allocation
|
page read and write
|
||
7FFD9B768000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
28D952F000
|
stack
|
page read and write
|
||
494BCFD000
|
stack
|
page read and write
|
||
1BFC458C000
|
trusted library allocation
|
page read and write
|
||
293B7728000
|
trusted library allocation
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1BFC457E000
|
trusted library allocation
|
page read and write
|
||
1594DFF000
|
stack
|
page read and write
|
||
1DB51158000
|
trusted library allocation
|
page read and write
|
||
7FFD9B991000
|
trusted library allocation
|
page read and write
|
||
10001000
|
direct allocation
|
page execute and read and write
|
||
293B7684000
|
trusted library allocation
|
page read and write
|
||
1DB51122000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
1BFC448E000
|
trusted library allocation
|
page read and write
|
||
293B772E000
|
trusted library allocation
|
page read and write
|
||
1BFC4552000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
1DB51178000
|
trusted library allocation
|
page read and write
|
||
293B766A000
|
trusted library allocation
|
page read and write
|
||
1DB51160000
|
trusted library allocation
|
page read and write
|
||
293B77A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B935000
|
trusted library allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
1DB510F0000
|
trusted library allocation
|
page read and write
|
||
293B7680000
|
trusted library allocation
|
page read and write
|
||
293B7786000
|
trusted library allocation
|
page read and write
|
||
539F000
|
stack
|
page read and write
|
||
1674442B000
|
heap
|
page read and write
|
||
293B7624000
|
trusted library allocation
|
page read and write
|
||
494B6FF000
|
stack
|
page read and write
|
||
1DB4EE41000
|
heap
|
page read and write
|
||
1DB510F6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BB000
|
trusted library allocation
|
page read and write
|
||
200DC100000
|
heap
|
page read and write
|
||
1BFC43F0000
|
trusted library allocation
|
page read and write
|
||
1DB4EE99000
|
heap
|
page read and write
|
||
1BFC4436000
|
trusted library allocation
|
page read and write
|
||
7FFD9B982000
|
trusted library allocation
|
page read and write
|
||
7FFD9B798000
|
trusted library allocation
|
page read and write
|
||
494BEFD000
|
stack
|
page read and write
|
||
293B7646000
|
trusted library allocation
|
page read and write
|
||
293B7640000
|
trusted library allocation
|
page read and write
|
||
7FFD9B976000
|
trusted library allocation
|
page read and write
|
||
293B54A0000
|
heap
|
page read and write
|
||
1DB51026000
|
trusted library allocation
|
page read and write
|
||
293B7648000
|
trusted library allocation
|
page read and write
|
||
1BFC443E000
|
trusted library allocation
|
page read and write
|
||
20181AE9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B96E000
|
trusted library allocation
|
page read and write
|
||
293B77C8000
|
trusted library allocation
|
page read and write
|
||
1BFC43AA000
|
trusted library allocation
|
page read and write
|
||
293B76CA000
|
trusted library allocation
|
page read and write
|
||
293B7708000
|
trusted library allocation
|
page read and write
|
||
293B76E8000
|
trusted library allocation
|
page read and write
|
||
293CFB41000
|
heap
|
page read and write
|
||
201819BB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B887000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
205E6B00000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
1DB50F80000
|
trusted library allocation
|
page read and write
|
||
20B34FD000
|
stack
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
1BFC44C6000
|
trusted library allocation
|
page read and write
|
||
1DB5109A000
|
trusted library allocation
|
page read and write
|
||
293B772C000
|
trusted library allocation
|
page read and write
|
||
7BDF000
|
stack
|
page read and write
|
||
201FF890000
|
heap
|
page read and write
|
||
201FFB65000
|
heap
|
page read and write
|
||
293B7784000
|
trusted library allocation
|
page read and write
|
||
1BFD3FA8000
|
trusted library allocation
|
page read and write
|
||
1BFC4466000
|
trusted library allocation
|
page read and write
|
||
201FFB60000
|
heap
|
page read and write
|
||
293B77C6000
|
trusted library allocation
|
page read and write
|
||
1BFC4520000
|
trusted library allocation
|
page read and write
|
||
E1A10FE000
|
stack
|
page read and write
|
||
1BFC4506000
|
trusted library allocation
|
page read and write
|
||
1DB611C4000
|
trusted library allocation
|
page read and write
|
||
293B77CC000
|
trusted library allocation
|
page read and write
|
||
293B7732000
|
trusted library allocation
|
page read and write
|
||
205CE1A1000
|
trusted library allocation
|
page read and write
|
||
20181AFD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B976000
|
trusted library allocation
|
page read and write
|
||
53FC000
|
stack
|
page read and write
|
||
1DB511A8000
|
trusted library allocation
|
page read and write
|
||
1BFC450A000
|
trusted library allocation
|
page read and write
|
||
1DB5109E000
|
trusted library allocation
|
page read and write
|
||
293B778A000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
20181A62000
|
trusted library allocation
|
page read and write
|
||
1BFC44A0000
|
trusted library allocation
|
page read and write
|
||
1BFC4570000
|
trusted library allocation
|
page read and write
|
||
1DB5101C000
|
trusted library allocation
|
page read and write
|
||
1BFC2448000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1DB510EE000
|
trusted library allocation
|
page read and write
|
||
1DB5111A000
|
trusted library allocation
|
page read and write
|
||
293B7606000
|
trusted library allocation
|
page read and write
|
||
8DC51CD000
|
stack
|
page read and write
|
||
201FF830000
|
heap
|
page read and write
|
||
1DB510FC000
|
trusted library allocation
|
page read and write
|
||
1DB5114A000
|
trusted library allocation
|
page read and write
|
||
261D102B000
|
heap
|
page read and write
|
||
201998F0000
|
trusted library allocation
|
page read and write
|
||
20181A9E000
|
trusted library allocation
|
page read and write
|
||
1BFC4574000
|
trusted library allocation
|
page read and write
|
||
1BFC43CA000
|
trusted library allocation
|
page read and write
|
||
1DB51040000
|
trusted library allocation
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page read and write
|
||
201FF920000
|
heap
|
page read and write
|
||
1DB50C7C000
|
trusted library allocation
|
page read and write
|
||
15955FA000
|
stack
|
page read and write
|
||
1BFC44E4000
|
trusted library allocation
|
page read and write
|
||
293B7618000
|
trusted library allocation
|
page read and write
|
||
1BFC451A000
|
trusted library allocation
|
page read and write
|
||
6F10000
|
heap
|
page read and write
|
||
1BFC43B0000
|
trusted library allocation
|
page read and write
|
||
1BFC45A4000
|
trusted library allocation
|
page read and write
|
||
200DBBF0000
|
trusted library allocation
|
page read and write
|
||
1BFC4500000
|
trusted library allocation
|
page read and write
|
||
7FFD9B887000
|
trusted library allocation
|
page execute and read and write
|
||
1DB6A402000
|
heap
|
page execute and read and write
|
||
1DB4F313000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
4D4D000
|
heap
|
page read and write
|
||
1BFC4456000
|
trusted library allocation
|
page read and write
|
||
1DB51100000
|
trusted library allocation
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
2019A1EA000
|
heap
|
page read and write
|
||
293B7600000
|
trusted library allocation
|
page read and write
|
||
293B5679000
|
heap
|
page read and write
|
||
1BFC4546000
|
trusted library allocation
|
page read and write
|
||
54FE000
|
heap
|
page read and write
|
||
200DBD02000
|
trusted library allocation
|
page read and write
|
||
293B7706000
|
trusted library allocation
|
page read and write
|
||
1DB5112C000
|
trusted library allocation
|
page read and write
|
||
293CF8A3000
|
trusted library allocation
|
page read and write
|
||
1BFC455E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B885000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC44D0000
|
trusted library allocation
|
page read and write
|
||
1DB51014000
|
trusted library allocation
|
page read and write
|
||
7FFD9B885000
|
trusted library allocation
|
page execute and read and write
|
||
1DB51068000
|
trusted library allocation
|
page read and write
|
||
261D1044000
|
heap
|
page read and write
|
||
1DB50FDC000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
heap
|
page read and write
|
||
293B77B8000
|
trusted library allocation
|
page read and write
|
||
1BFC23E3000
|
trusted library allocation
|
page read and write
|
||
8DC55FF000
|
stack
|
page read and write
|
||
1BFC4396000
|
trusted library allocation
|
page read and write
|
||
20181B68000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A2000
|
trusted library allocation
|
page read and write
|
||
1BFC44FA000
|
trusted library allocation
|
page read and write
|
||
261D0F80000
|
trusted library allocation
|
page read and write
|
||
1BFC4464000
|
trusted library allocation
|
page read and write
|
||
20181BB9000
|
trusted library allocation
|
page read and write
|
||
1DB60BA1000
|
trusted library allocation
|
page read and write
|
||
1BFC4556000
|
trusted library allocation
|
page read and write
|
||
293C7665000
|
trusted library allocation
|
page read and write
|
||
55E0000
|
heap
|
page read and write
|
||
6F1C000
|
heap
|
page read and write
|
||
1BFC43F8000
|
trusted library allocation
|
page read and write
|
||
1DB51038000
|
trusted library allocation
|
page read and write
|
||
1DB50FA4000
|
trusted library allocation
|
page read and write
|
||
20181B03000
|
trusted library allocation
|
page read and write
|
||
205CC600000
|
heap
|
page read and write
|
||
293C7262000
|
trusted library allocation
|
page read and write
|
||
5220000
|
heap
|
page read and write
|
||
20B2FFE000
|
stack
|
page read and write
|
||
1BFC44BE000
|
trusted library allocation
|
page read and write
|
||
293CFB3A000
|
heap
|
page read and write
|
||
1BFD4425000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
1DB51094000
|
trusted library allocation
|
page read and write
|
||
293B56D3000
|
heap
|
page read and write
|
||
293B7744000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
200DBC2B000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
1BFC4582000
|
trusted library allocation
|
page read and write
|
||
494B4F3000
|
stack
|
page read and write
|
||
1DB4EF02000
|
heap
|
page read and write
|
||
1BFC4578000
|
trusted library allocation
|
page read and write
|
||
293B764E000
|
trusted library allocation
|
page read and write
|
||
1BFC44D8000
|
trusted library allocation
|
page read and write
|
||
293B7642000
|
trusted library allocation
|
page read and write
|
||
293B75BA000
|
trusted library allocation
|
page read and write
|
||
1BFC4558000
|
trusted library allocation
|
page read and write
|
||
293B7758000
|
trusted library allocation
|
page read and write
|
||
1BFD4022000
|
trusted library allocation
|
page read and write
|
||
1BFC4454000
|
trusted library allocation
|
page read and write
|
||
E1A0EF3000
|
stack
|
page read and write
|
||
201FF903000
|
heap
|
page read and write
|
||
1DB50FF0000
|
trusted library allocation
|
page read and write
|
||
200DBD00000
|
trusted library allocation
|
page read and write
|
||
1BFC4470000
|
trusted library allocation
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
1DB50FD8000
|
trusted library allocation
|
page read and write
|
||
20181BAC000
|
trusted library allocation
|
page read and write
|
||
1BFC4446000
|
trusted library allocation
|
page read and write
|
||
20181A6D000
|
trusted library allocation
|
page read and write
|
||
1DB50FFE000
|
trusted library allocation
|
page read and write
|
||
201FF90A000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
293B765A000
|
trusted library allocation
|
page read and write
|
||
1DB51132000
|
trusted library allocation
|
page read and write
|
||
20181B62000
|
trusted library allocation
|
page read and write
|
||
86C000
|
stack
|
page read and write
|
||
1BFC4398000
|
trusted library allocation
|
page read and write
|
||
293B7746000
|
trusted library allocation
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
4FC8000
|
heap
|
page read and write
|
||
5310000
|
heap
|
page read and write
|
||
1BFC44EA000
|
trusted library allocation
|
page read and write
|
||
C8687FE000
|
stack
|
page read and write
|
||
1DB510F4000
|
trusted library allocation
|
page read and write
|
||
200DC002000
|
heap
|
page read and write
|
||
20181A03000
|
trusted library allocation
|
page read and write
|
||
1BFC45AA000
|
trusted library allocation
|
page read and write
|
||
1DB510C6000
|
trusted library allocation
|
page read and write
|
||
1DB51118000
|
trusted library allocation
|
page read and write
|
||
293B76B4000
|
trusted library allocation
|
page read and write
|
||
20B35FA000
|
stack
|
page read and write
|
||
20181A3B000
|
trusted library allocation
|
page read and write
|
||
1BFC4544000
|
trusted library allocation
|
page read and write
|
||
293B76D6000
|
trusted library allocation
|
page read and write
|
||
1DB510B6000
|
trusted library allocation
|
page read and write
|
||
526D000
|
stack
|
page read and write
|
||
293B7736000
|
trusted library allocation
|
page read and write
|
||
293B77B0000
|
trusted library allocation
|
page read and write
|
||
1BFC3FAE000
|
trusted library allocation
|
page read and write
|
||
1BFC454C000
|
trusted library allocation
|
page read and write
|
||
1DB50FBE000
|
trusted library allocation
|
page read and write
|
||
1BFC43A0000
|
trusted library allocation
|
page read and write
|
||
293CF8C0000
|
heap
|
page execute and read and write
|
||
2019A192000
|
heap
|
page read and write
|
||
1BFC4512000
|
trusted library allocation
|
page read and write
|
||
1DB5106A000
|
trusted library allocation
|
page read and write
|
||
293B76FC000
|
trusted library allocation
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
1594CFE000
|
stack
|
page read and write
|
||
1DB50FC8000
|
trusted library allocation
|
page read and write
|
||
1DB510C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B762000
|
trusted library allocation
|
page read and write
|
||
293B76B0000
|
trusted library allocation
|
page read and write
|
||
293C71E1000
|
trusted library allocation
|
page read and write
|
||
4FD9000
|
heap
|
page read and write
|
||
1DB510A8000
|
trusted library allocation
|
page read and write
|
||
201819DD000
|
trusted library allocation
|
page read and write
|
||
1BFC24DE000
|
heap
|
page read and write
|
||
1BFC4534000
|
trusted library allocation
|
page read and write
|
||
1BFC449A000
|
trusted library allocation
|
page read and write
|
||
2019A250000
|
trusted library section
|
page read and write
|
||
51D0000
|
heap
|
page read and write
|
||
1DB51086000
|
trusted library allocation
|
page read and write
|
||
293B7650000
|
trusted library allocation
|
page read and write
|
||
1DB51008000
|
trusted library allocation
|
page read and write
|
||
1DB51018000
|
trusted library allocation
|
page read and write
|
||
1DB5117A000
|
trusted library allocation
|
page read and write
|
||
C868CFE000
|
unkown
|
page readonly
|
||
1BFC402C000
|
trusted library allocation
|
page read and write
|
||
1DB51194000
|
trusted library allocation
|
page read and write
|
||
293B773A000
|
trusted library allocation
|
page read and write
|
||
1DB51140000
|
trusted library allocation
|
page read and write
|
||
1DB50FA6000
|
trusted library allocation
|
page read and write
|
||
16744420000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC43AE000
|
trusted library allocation
|
page read and write
|
||
1BFC45A6000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page readonly
|
||
293B77BA000
|
trusted library allocation
|
page read and write
|
||
293B76B2000
|
trusted library allocation
|
page read and write
|
||
E1A13FE000
|
stack
|
page read and write
|
||
293B77DE000
|
trusted library allocation
|
page read and write
|
||
4DEA000
|
stack
|
page read and write
|
||
293B7644000
|
trusted library allocation
|
page read and write
|
||
293B76EE000
|
trusted library allocation
|
page read and write
|
||
293B776A000
|
trusted library allocation
|
page read and write
|
||
1BFC2260000
|
heap
|
page read and write
|
||
1DB50CC0000
|
trusted library allocation
|
page read and write
|
||
50FF000
|
stack
|
page read and write
|
||
1DB4EDC0000
|
heap
|
page read and write
|
||
1BFC4402000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
1BFC4488000
|
trusted library allocation
|
page read and write
|
||
16744462000
|
heap
|
page read and write
|
||
1DB51016000
|
trusted library allocation
|
page read and write
|
||
1DB60C22000
|
trusted library allocation
|
page read and write
|
||
293B56EB000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page execute and read and write
|
||
3E09EF2000
|
stack
|
page read and write
|
||
1DB510AE000
|
trusted library allocation
|
page read and write
|
||
6AB0000
|
heap
|
page read and write
|
||
8100000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
1DB51110000
|
trusted library allocation
|
page read and write
|
||
494B7FF000
|
stack
|
page read and write
|
||
1DB5100A000
|
trusted library allocation
|
page read and write
|
||
1859D078000
|
heap
|
page read and write
|
||
1BFC243C000
|
heap
|
page read and write
|
||
1DB51054000
|
trusted library allocation
|
page read and write
|
||
1BFC4406000
|
trusted library allocation
|
page read and write
|
||
293B763E000
|
trusted library allocation
|
page read and write
|
||
4D2E000
|
stack
|
page read and write
|
||
201819CF000
|
trusted library allocation
|
page read and write
|
||
205DE625000
|
trusted library allocation
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
968000
|
stack
|
page read and write
|
||
1DB51044000
|
trusted library allocation
|
page read and write
|
||
1BFC43EE000
|
trusted library allocation
|
page read and write
|
||
1BFC43C8000
|
trusted library allocation
|
page read and write
|
||
1DB51130000
|
trusted library allocation
|
page read and write
|
||
5517000
|
heap
|
page read and write
|
||
7FFD9B9BB000
|
trusted library allocation
|
page read and write
|
||
6DE0000
|
heap
|
page read and write
|
||
293B71C0000
|
heap
|
page read and write
|
||
1BFC45A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC44AA000
|
trusted library allocation
|
page read and write
|
||
293B76AE000
|
trusted library allocation
|
page read and write
|
||
1DB50FE8000
|
trusted library allocation
|
page read and write
|
||
200DC100000
|
heap
|
page read and write
|
||
7FFD9B778000
|
trusted library allocation
|
page read and write
|
||
293B768E000
|
trusted library allocation
|
page read and write
|
||
51BF000
|
stack
|
page read and write
|
||
1BFC44A6000
|
trusted library allocation
|
page read and write
|
||
1DB511B0000
|
trusted library allocation
|
page read and write
|
||
293B75C4000
|
trusted library allocation
|
page read and write
|
||
1DB51024000
|
trusted library allocation
|
page read and write
|
||
200DC113000
|
heap
|
page read and write
|
||
261D1802000
|
trusted library allocation
|
page read and write
|
||
1BFC439C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B935000
|
trusted library allocation
|
page read and write
|
||
1DB510C0000
|
trusted library allocation
|
page read and write
|
||
293B77BE000
|
trusted library allocation
|
page read and write
|
||
293B770A000
|
trusted library allocation
|
page read and write
|
||
293B7782000
|
trusted library allocation
|
page read and write
|
||
722F000
|
stack
|
page read and write
|
||
205CC611000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
1BFC4432000
|
trusted library allocation
|
page read and write
|
||
15952FE000
|
stack
|
page read and write
|
||
87D000
|
stack
|
page read and write
|
||
293B7632000
|
trusted library allocation
|
page read and write
|
||
1BFC4542000
|
trusted library allocation
|
page read and write
|
||
1DB51060000
|
trusted library allocation
|
page read and write
|
||
261D0F20000
|
heap
|
page read and write
|
||
1BFC438E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B911000
|
trusted library allocation
|
page read and write
|
||
293B7670000
|
trusted library allocation
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
1BFC43FC000
|
trusted library allocation
|
page read and write
|
||
1DB50FCC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B926000
|
trusted library allocation
|
page read and write
|
||
1595AFE000
|
stack
|
page read and write
|
||
205CC63D000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
293B777E000
|
trusted library allocation
|
page read and write
|
||
293B76DA000
|
trusted library allocation
|
page read and write
|
||
293B5622000
|
heap
|
page read and write
|
||
201918C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B902000
|
trusted library allocation
|
page read and write
|
||
201FF870000
|
heap
|
page read and write
|
||
7FFD9B768000
|
trusted library allocation
|
page read and write
|
||
293B7672000
|
trusted library allocation
|
page read and write
|
||
293B76D0000
|
trusted library allocation
|
page read and write
|
||
293B5600000
|
heap
|
page read and write
|
||
293B7772000
|
trusted library allocation
|
page read and write
|
||
20181AE3000
|
trusted library allocation
|
page read and write
|
||
1BFC43FA000
|
trusted library allocation
|
page read and write
|
||
1BFC452A000
|
trusted library allocation
|
page read and write
|
||
293B778E000
|
trusted library allocation
|
page read and write
|
||
1BFC241D000
|
heap
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
1DB4F123000
|
trusted library allocation
|
page read and write
|
||
205CC641000
|
heap
|
page read and write
|
||
494B8FB000
|
stack
|
page read and write
|
||
1DB4EEEA000
|
heap
|
page read and write
|
||
701E000
|
stack
|
page read and write
|
||
20181A21000
|
trusted library allocation
|
page read and write
|
||
201FF895000
|
heap
|
page read and write
|
||
54F3000
|
heap
|
page read and write
|
||
1BFC2702000
|
heap
|
page read and write
|
||
1DB510CA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B75D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
293B766C000
|
trusted library allocation
|
page read and write
|
||
1DB50FC0000
|
trusted library allocation
|
page read and write
|
||
1DB51176000
|
trusted library allocation
|
page read and write
|
||
205CC5B0000
|
trusted library allocation
|
page read and write
|
||
E1A15FF000
|
stack
|
page read and write
|
||
293B7620000
|
trusted library allocation
|
page read and write
|
||
1BFC447A000
|
trusted library allocation
|
page read and write
|
||
293B75DE000
|
trusted library allocation
|
page read and write
|
||
200DBC38000
|
heap
|
page read and write
|
||
1BFC447C000
|
trusted library allocation
|
page read and write
|
||
1BFC449C000
|
trusted library allocation
|
page read and write
|
||
1BFC442A000
|
trusted library allocation
|
page read and write
|
||
20181A98000
|
trusted library allocation
|
page read and write
|
||
E1A18FD000
|
stack
|
page read and write
|
||
293B76AA000
|
trusted library allocation
|
page read and write
|
||
200DC102000
|
heap
|
page read and write
|
||
716F000
|
stack
|
page read and write
|
||
20181BE9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1594EFE000
|
stack
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
293B75F6000
|
trusted library allocation
|
page read and write
|
||
5536000
|
heap
|
page read and write
|
||
1DB5116C000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
heap
|
page read and write
|
||
293B7794000
|
trusted library allocation
|
page read and write
|
||
293B7726000
|
trusted library allocation
|
page read and write
|
||
1BFC43EC000
|
trusted library allocation
|
page read and write
|
||
293B760C000
|
trusted library allocation
|
page read and write
|
||
1BFC4462000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
4E60000
|
heap
|
page readonly
|
||
8DC577E000
|
stack
|
page read and write
|
||
201818B0000
|
heap
|
page execute and read and write
|
||
293B75EC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
7FFD9B923000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9B8000
|
trusted library allocation
|
page read and write
|
||
293B762A000
|
trusted library allocation
|
page read and write
|
||
770F000
|
stack
|
page read and write
|
||
1DB50F92000
|
trusted library allocation
|
page read and write
|
||
1DB51146000
|
trusted library allocation
|
page read and write
|
||
1BFC444E000
|
trusted library allocation
|
page read and write
|
||
293B77BC000
|
trusted library allocation
|
page read and write
|
||
1BFC438A000
|
trusted library allocation
|
page read and write
|
||
1BFC43BE000
|
trusted library allocation
|
page read and write
|
||
1BFC450E000
|
trusted library allocation
|
page read and write
|
||
7A6B000
|
stack
|
page read and write
|
||
1DB5112A000
|
trusted library allocation
|
page read and write
|
||
6EF0000
|
heap
|
page read and write
|
||
293B770C000
|
trusted library allocation
|
page read and write
|
||
1DB50FA2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B971000
|
trusted library allocation
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
6F20000
|
heap
|
page read and write
|
||
1BFC44CC000
|
trusted library allocation
|
page read and write
|
||
5375000
|
heap
|
page read and write
|
||
1DB51196000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
6D80000
|
heap
|
page read and write
|
||
293B7780000
|
trusted library allocation
|
page read and write
|
||
1DB51128000
|
trusted library allocation
|
page read and write
|
||
293B75E4000
|
trusted library allocation
|
page read and write
|
||
293B7720000
|
trusted library allocation
|
page read and write
|
||
293B7740000
|
trusted library allocation
|
page read and write
|
||
293B7688000
|
trusted library allocation
|
page read and write
|
||
1DB50FD6000
|
trusted library allocation
|
page read and write
|
||
1DB51062000
|
trusted library allocation
|
page read and write
|
||
1DB511A4000
|
trusted library allocation
|
page read and write
|
||
1DB51022000
|
trusted library allocation
|
page read and write
|
||
6F0D000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
1BFC4502000
|
trusted library allocation
|
page read and write
|
||
1DB5119E000
|
trusted library allocation
|
page read and write
|
||
1DB50F7A000
|
trusted library allocation
|
page read and write
|
||
201817F0000
|
trusted library allocation
|
page read and write
|
||
2019A19B000
|
heap
|
page read and write
|
||
1BFC4430000
|
trusted library allocation
|
page read and write
|
||
293B776E000
|
trusted library allocation
|
page read and write
|
||
1DB5102A000
|
trusted library allocation
|
page read and write
|
||
1BFC24D0000
|
heap
|
page read and write
|
||
1BFC44AE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
1DB5117E000
|
trusted library allocation
|
page read and write
|
||
1DB50FA0000
|
trusted library allocation
|
page read and write
|
||
1DB510AC000
|
trusted library allocation
|
page read and write
|
||
1DB51072000
|
trusted library allocation
|
page read and write
|
||
293B5613000
|
heap
|
page read and write
|
||
1DB4F302000
|
heap
|
page read and write
|
||
293B72BD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
293B76A8000
|
trusted library allocation
|
page read and write
|
||
1BFC4516000
|
trusted library allocation
|
page read and write
|
||
1DB5113C000
|
trusted library allocation
|
page read and write
|
||
293B761E000
|
trusted library allocation
|
page read and write
|
||
1BFC4418000
|
trusted library allocation
|
page read and write
|
||
4D38000
|
heap
|
page read and write
|
||
4DB0000
|
heap
|
page readonly
|
||
293B7692000
|
trusted library allocation
|
page read and write
|
||
1DB50FE4000
|
trusted library allocation
|
page read and write
|
||
1BFC406A000
|
trusted library allocation
|
page read and write
|
||
530D000
|
stack
|
page read and write
|
||
293B7628000
|
trusted library allocation
|
page read and write
|
||
7FFD9B778000
|
trusted library allocation
|
page read and write
|
||
2019A158000
|
heap
|
page read and write
|
||
1DB510D2000
|
trusted library allocation
|
page read and write
|
||
541E000
|
stack
|
page read and write
|
||
1DB50F7C000
|
trusted library allocation
|
page read and write
|
||
1BFC407D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B973000
|
trusted library allocation
|
page read and write
|
||
293B7756000
|
trusted library allocation
|
page read and write
|
||
293B7682000
|
trusted library allocation
|
page read and write
|
||
205CC560000
|
trusted library allocation
|
page read and write
|
||
2019A0F0000
|
heap
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
1BFC44E2000
|
trusted library allocation
|
page read and write
|
||
1DB5116A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
201819C7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
2019A1EE000
|
heap
|
page read and write
|
||
201FF4C0000
|
unkown
|
page readonly
|
||
20181B22000
|
trusted library allocation
|
page read and write
|
||
1DB5107C000
|
trusted library allocation
|
page read and write
|
||
1BFC453E000
|
trusted library allocation
|
page read and write
|
||
293B776C000
|
trusted library allocation
|
page read and write
|
||
1BFC447E000
|
trusted library allocation
|
page read and write
|
||
293B7678000
|
trusted library allocation
|
page read and write
|
||
1BFC4538000
|
trusted library allocation
|
page read and write
|
||
1DB51046000
|
trusted library allocation
|
page read and write
|
||
293B761A000
|
trusted library allocation
|
page read and write
|
||
200DBC02000
|
unkown
|
page read and write
|
||
293B7696000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1DB4F140000
|
heap
|
page execute and read and write
|
||
293B7796000
|
trusted library allocation
|
page read and write
|
||
201819F1000
|
trusted library allocation
|
page read and write
|
||
1BFC23E0000
|
trusted library allocation
|
page read and write
|
||
1DB6A500000
|
heap
|
page read and write
|
||
1DB51124000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
5330000
|
heap
|
page readonly
|
||
1DB5111C000
|
trusted library allocation
|
page read and write
|
||
2018198C000
|
trusted library allocation
|
page read and write
|
||
1BFC43D0000
|
trusted library allocation
|
page read and write
|
||
1859EA40000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
1BFC437C000
|
trusted library allocation
|
page read and write
|
||
C8685FD000
|
stack
|
page read and write
|
||
1BFC4504000
|
trusted library allocation
|
page read and write
|
||
1DB50FC2000
|
trusted library allocation
|
page read and write
|
||
1BFC4566000
|
trusted library allocation
|
page read and write
|
||
205CC6B6000
|
heap
|
page read and write
|
||
1BFC43E8000
|
trusted library allocation
|
page read and write
|
||
20181ACB000
|
trusted library allocation
|
page read and write
|
||
1BFC43CC000
|
trusted library allocation
|
page read and write
|
||
1DB51076000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC449E000
|
trusted library allocation
|
page read and write
|
||
1BFC23B0000
|
trusted library allocation
|
page read and write
|
||
54FA000
|
heap
|
page read and write
|
||
205CC520000
|
heap
|
page read and write
|
||
1DB5119C000
|
trusted library allocation
|
page read and write
|
||
1DB51066000
|
trusted library allocation
|
page read and write
|
||
3E09FFE000
|
stack
|
page read and write
|
||
1DB51082000
|
trusted library allocation
|
page read and write
|
||
7FFD9B94E000
|
trusted library allocation
|
page read and write
|
||
205CE1C6000
|
trusted library allocation
|
page read and write
|
||
293B767E000
|
trusted library allocation
|
page read and write
|
||
1BFC4388000
|
trusted library allocation
|
page read and write
|
||
1BFC24B2000
|
heap
|
page read and write
|
||
1DB510D0000
|
trusted library allocation
|
page read and write
|
||
1DB51192000
|
trusted library allocation
|
page read and write
|
||
780F000
|
stack
|
page read and write
|
||
200DBC38000
|
heap
|
page read and write
|
||
293B7754000
|
trusted library allocation
|
page read and write
|
||
201FF94E000
|
heap
|
page read and write
|
||
293B77E2000
|
trusted library allocation
|
page read and write
|
||
201FF8E0000
|
heap
|
page read and write
|
||
1BFC4526000
|
trusted library allocation
|
page read and write
|
||
1BFC4452000
|
trusted library allocation
|
page read and write
|
||
201FF850000
|
heap
|
page read and write
|
||
1BFC4590000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
1DB510A2000
|
trusted library allocation
|
page read and write
|
||
293B75C8000
|
trusted library allocation
|
page read and write
|
||
293B763C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93E000
|
trusted library allocation
|
page read and write
|
||
200DC102000
|
heap
|
page read and write
|
||
1BFC2428000
|
heap
|
page read and write
|
||
1DB5100E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
2019A150000
|
heap
|
page read and write
|
||
293B76D4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page read and write
|
||
20191929000
|
trusted library allocation
|
page read and write
|
||
1DB510FA000
|
trusted library allocation
|
page read and write
|
||
20181A8D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC43F6000
|
trusted library allocation
|
page read and write
|
||
1BFC4536000
|
trusted library allocation
|
page read and write
|
||
1BFC23D0000
|
heap
|
page execute and read and write
|
||
293B77EE000
|
trusted library allocation
|
page read and write
|
||
201819B2000
|
trusted library allocation
|
page read and write
|
||
1DB51120000
|
trusted library allocation
|
page read and write
|
||
293B771C000
|
trusted library allocation
|
page read and write
|
||
1DB50FAE000
|
trusted library allocation
|
page read and write
|
||
1BFC43D4000
|
trusted library allocation
|
page read and write
|
||
1DB5105E000
|
trusted library allocation
|
page read and write
|
||
1BFDC941000
|
heap
|
page read and write
|
||
4FBC000
|
stack
|
page read and write
|
||
20181A54000
|
trusted library allocation
|
page read and write
|
||
7FFD9B89D000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC4514000
|
trusted library allocation
|
page read and write
|
||
E1A14FF000
|
stack
|
page read and write
|
||
7FFD9B98F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
1BFC454A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
1BFC43E0000
|
trusted library allocation
|
page read and write
|
||
293B760E000
|
trusted library allocation
|
page read and write
|
||
1BFC44D6000
|
trusted library allocation
|
page read and write
|
||
201819B8000
|
trusted library allocation
|
page read and write
|
||
545E000
|
stack
|
page read and write
|
||
1859EA45000
|
heap
|
page read and write
|
||
1594FFE000
|
stack
|
page read and write
|
||
1595BFB000
|
stack
|
page read and write
|
||
1DB50F7E000
|
trusted library allocation
|
page read and write
|
||
1DB4EE50000
|
heap
|
page read and write
|
||
1DB510A0000
|
trusted library allocation
|
page read and write
|
||
20181AAF000
|
trusted library allocation
|
page read and write
|
||
1DB51070000
|
trusted library allocation
|
page read and write
|
||
1DB4F0F0000
|
trusted library allocation
|
page read and write
|
||
51FC000
|
stack
|
page read and write
|
||
1DB50FAC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
1DB51096000
|
trusted library allocation
|
page read and write
|
||
1BFC43B6000
|
trusted library allocation
|
page read and write
|
||
293B563F000
|
heap
|
page read and write
|
||
293B71D0000
|
heap
|
page execute and read and write
|
||
20B2CF3000
|
stack
|
page read and write
|
||
1DB5104E000
|
trusted library allocation
|
page read and write
|
||
1BFC4586000
|
trusted library allocation
|
page read and write
|
||
1BFC456C000
|
trusted library allocation
|
page read and write
|
||
293B7750000
|
trusted library allocation
|
page read and write
|
||
20181A87000
|
trusted library allocation
|
page read and write
|
||
7FFD9B938000
|
trusted library allocation
|
page read and write
|
||
1DB4EEAF000
|
heap
|
page read and write
|
||
1DB51170000
|
trusted library allocation
|
page read and write
|
||
293B7622000
|
trusted library allocation
|
page read and write
|
||
293B75FA000
|
trusted library allocation
|
page read and write
|
||
205CC699000
|
heap
|
page read and write
|
||
1BFC4474000
|
trusted library allocation
|
page read and write
|
||
293B7778000
|
trusted library allocation
|
page read and write
|
||
2019A140000
|
heap
|
page execute and read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC44A8000
|
trusted library allocation
|
page read and write
|
||
201FF923000
|
heap
|
page read and write
|
||
6F31000
|
heap
|
page read and write
|
||
293B76B6000
|
trusted library allocation
|
page read and write
|
||
293B770E000
|
trusted library allocation
|
page read and write
|
||
293B7700000
|
trusted library allocation
|
page read and write
|
||
200DBC38000
|
heap
|
page read and write
|
||
5320000
|
heap
|
page read and write
|
||
1DB510B8000
|
trusted library allocation
|
page read and write
|
||
20B2EFF000
|
stack
|
page read and write
|
||
1BFC4378000
|
trusted library allocation
|
page read and write
|
||
4F80000
|
heap
|
page readonly
|
||
1BFC43BC000
|
trusted library allocation
|
page read and write
|
||
1DB510B2000
|
trusted library allocation
|
page read and write
|
||
293B71EE000
|
trusted library allocation
|
page read and write
|
||
C868BFC000
|
stack
|
page read and write
|
||
293B76BE000
|
trusted library allocation
|
page read and write
|
||
16744380000
|
heap
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
1BFC443A000
|
trusted library allocation
|
page read and write
|
||
52FC000
|
stack
|
page read and write
|
||
261D1002000
|
heap
|
page read and write
|
||
1BFC446A000
|
trusted library allocation
|
page read and write
|
||
1DB50F98000
|
trusted library allocation
|
page read and write
|
||
7FFD9B987000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1BFC4390000
|
trusted library allocation
|
page read and write
|
||
7FFD9B941000
|
trusted library allocation
|
page read and write
|
||
C86827B000
|
stack
|
page read and write
|
||
1DB4EE13000
|
heap
|
page read and write
|
||
1DB51144000
|
trusted library allocation
|
page read and write
|
||
293B777A000
|
trusted library allocation
|
page read and write
|
||
1BFC4392000
|
trusted library allocation
|
page read and write
|
||
7BF0000
|
heap
|
page read and write
|
||
7FFD9B753000
|
trusted library allocation
|
page execute and read and write
|
||
1DB51000000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
heap
|
page read and write
|
||
293B71B0000
|
trusted library allocation
|
page read and write
|
||
1BFC4400000
|
trusted library allocation
|
page read and write
|
||
1DB51084000
|
trusted library allocation
|
page read and write
|
||
200DBC79000
|
heap
|
page read and write
|
||
293B76A4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC24A9000
|
heap
|
page read and write
|
||
1DB50C6A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
1DB50FB2000
|
trusted library allocation
|
page read and write
|
||
20181BA1000
|
trusted library allocation
|
page read and write
|
||
20181A79000
|
trusted library allocation
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page read and write
|
||
1BFC438C000
|
trusted library allocation
|
page read and write
|
||
15953FF000
|
stack
|
page read and write
|
||
1BFC457C000
|
trusted library allocation
|
page read and write
|
||
1DB50FCE000
|
trusted library allocation
|
page read and write
|
||
1DB50FC6000
|
trusted library allocation
|
page read and write
|
||
205DE1A1000
|
trusted library allocation
|
page read and write
|
||
494B5FF000
|
stack
|
page read and write
|
||
1DB50F96000
|
trusted library allocation
|
page read and write
|
||
3E0A5FF000
|
stack
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
1BFC243E000
|
heap
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
1DB50F94000
|
trusted library allocation
|
page read and write
|
||
20181B39000
|
trusted library allocation
|
page read and write
|
||
7FFD9B988000
|
trusted library allocation
|
page read and write
|
||
1DB50F8C000
|
trusted library allocation
|
page read and write
|
||
15951FF000
|
stack
|
page read and write
|
||
1BFC4518000
|
trusted library allocation
|
page read and write
|
||
293B75DA000
|
trusted library allocation
|
page read and write
|
||
1DB5119A000
|
trusted library allocation
|
page read and write
|
||
1BFC453A000
|
trusted library allocation
|
page read and write
|
||
1BFC43F4000
|
trusted library allocation
|
page read and write
|
||
1DB4F202000
|
heap
|
page read and write
|
||
293B77B2000
|
trusted library allocation
|
page read and write
|
||
201FF9B0000
|
heap
|
page read and write
|
||
1BFC44BA000
|
trusted library allocation
|
page read and write
|
||
1859CF20000
|
heap
|
page read and write
|
||
1BFC45B0000
|
trusted library allocation
|
page read and write
|
||
6D5E000
|
stack
|
page read and write
|
||
7FFD9B8F2000
|
trusted library allocation
|
page read and write
|
||
1BFC4424000
|
trusted library allocation
|
page read and write
|
||
1BFD45C4000
|
trusted library allocation
|
page read and write
|
||
1BFC43CE000
|
trusted library allocation
|
page read and write
|
||
205CC6B8000
|
heap
|
page read and write
|
||
1DB51182000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
16744451000
|
heap
|
page read and write
|
||
1BFC4426000
|
trusted library allocation
|
page read and write
|
||
293B7206000
|
trusted library allocation
|
page read and write
|
||
1DB5101A000
|
trusted library allocation
|
page read and write
|
||
5478000
|
heap
|
page read and write
|
||
1BFC44EC000
|
trusted library allocation
|
page read and write
|
||
1BFC44FE000
|
trusted library allocation
|
page read and write
|
||
3E0A8FE000
|
stack
|
page read and write
|
||
1DB5115A000
|
trusted library allocation
|
page read and write
|
||
1BFC44BC000
|
trusted library allocation
|
page read and write
|
||
5790000
|
heap
|
page read and write
|
||
1BFC44DA000
|
trusted library allocation
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
1DB50FDA000
|
trusted library allocation
|
page read and write
|
||
1BFC44F2000
|
trusted library allocation
|
page read and write
|
||
1DB5108E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B966000
|
trusted library allocation
|
page read and write
|
||
16744520000
|
heap
|
page read and write
|
||
200DC013000
|
heap
|
page read and write
|
||
1BFC4540000
|
trusted library allocation
|
page read and write
|
||
293B76BC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B941000
|
trusted library allocation
|
page read and write
|
||
7FF4D6950000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9DB000
|
trusted library allocation
|
page read and write
|
||
1DB51126000
|
trusted library allocation
|
page read and write
|
||
1DB50FB8000
|
trusted library allocation
|
page read and write
|
||
1DB510DC000
|
trusted library allocation
|
page read and write
|
||
1DB4EE2C000
|
heap
|
page read and write
|
||
1BFC4444000
|
trusted library allocation
|
page read and write
|
||
1DB510DA000
|
trusted library allocation
|
page read and write
|
||
293B77C4000
|
trusted library allocation
|
page read and write
|
||
1DB51180000
|
trusted library allocation
|
page read and write
|
||
1BFD44F5000
|
trusted library allocation
|
page read and write
|
||
1DB5112E000
|
trusted library allocation
|
page read and write
|
||
293B7654000
|
trusted library allocation
|
page read and write
|
||
293B763A000
|
trusted library allocation
|
page read and write
|
||
293B76B8000
|
trusted library allocation
|
page read and write
|
||
20B2DFF000
|
stack
|
page read and write
|
||
1BFC4394000
|
trusted library allocation
|
page read and write
|
||
1BFC451E000
|
trusted library allocation
|
page read and write
|
||
1DB5106C000
|
trusted library allocation
|
page read and write
|
||
1BFC4458000
|
trusted library allocation
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
201817D0000
|
trusted library allocation
|
page read and write
|
||
201FF957000
|
heap
|
page read and write
|
||
201918C1000
|
trusted library allocation
|
page read and write
|
||
1DB511AC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B948000
|
trusted library allocation
|
page read and write
|
||
293B77AE000
|
trusted library allocation
|
page read and write
|
||
1BFC4492000
|
trusted library allocation
|
page read and write
|
||
50D7000
|
stack
|
page read and write
|
||
1DB51138000
|
trusted library allocation
|
page read and write
|
||
293B76E0000
|
trusted library allocation
|
page read and write
|
||
6F12000
|
heap
|
page read and write
|
||
293B7602000
|
trusted library allocation
|
page read and write
|
||
293B54C0000
|
heap
|
page read and write
|
||
1DB51106000
|
trusted library allocation
|
page read and write
|
||
1DB60C9B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
293B7674000
|
trusted library allocation
|
page read and write
|
||
1DB51102000
|
trusted library allocation
|
page read and write
|
||
293B75C6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
293B56A5000
|
heap
|
page read and write
|
||
38F56B000
|
stack
|
page read and write
|
||
1DB50FEC000
|
trusted library allocation
|
page read and write
|
||
1DB50FEA000
|
trusted library allocation
|
page read and write
|
||
1BFC4532000
|
trusted library allocation
|
page read and write
|
||
293B7738000
|
trusted library allocation
|
page read and write
|
||
201FF998000
|
heap
|
page read and write
|
||
1BFC44F4000
|
trusted library allocation
|
page read and write
|
||
1DB51010000
|
trusted library allocation
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
C8688FE000
|
unkown
|
page readonly
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
1DB51166000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AC000
|
trusted library allocation
|
page execute and read and write
|
||
8DC5979000
|
stack
|
page read and write
|
||
205CC590000
|
heap
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
1BFC4494000
|
trusted library allocation
|
page read and write
|
||
1DB50FB6000
|
trusted library allocation
|
page read and write
|
||
1DB50F9C000
|
trusted library allocation
|
page read and write
|
||
1DB60F56000
|
trusted library allocation
|
page read and write
|
||
200DBC00000
|
unkown
|
page read and write
|
||
1DB51058000
|
trusted library allocation
|
page read and write
|
||
293CF8A0000
|
trusted library allocation
|
page read and write
|
||
293B77B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B923000
|
trusted library allocation
|
page read and write
|
||
1BFC4450000
|
trusted library allocation
|
page read and write
|
||
1BFC4478000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9BB000
|
trusted library allocation
|
page read and write
|
||
1DB511AA000
|
trusted library allocation
|
page read and write
|
||
1BFC457A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E3000
|
trusted library allocation
|
page read and write
|
||
293B7766000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC441E000
|
trusted library allocation
|
page read and write
|
||
1BFC2240000
|
heap
|
page read and write
|
||
293B7686000
|
trusted library allocation
|
page read and write
|
||
293B775A000
|
trusted library allocation
|
page read and write
|
||
1BFC44B0000
|
trusted library allocation
|
page read and write
|
||
1DB51012000
|
trusted library allocation
|
page read and write
|
||
1BFC44FC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
1DB4EE75000
|
heap
|
page read and write
|
||
8410000
|
heap
|
page read and write
|
||
293B5647000
|
heap
|
page read and write
|
||
20181B1F000
|
trusted library allocation
|
page read and write
|
||
1BFC4584000
|
trusted library allocation
|
page read and write
|
||
1BFC459A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC44F8000
|
trusted library allocation
|
page read and write
|
||
293B772A000
|
trusted library allocation
|
page read and write
|
||
293B77E4000
|
trusted library allocation
|
page read and write
|
||
1BFC4460000
|
trusted library allocation
|
page read and write
|
||
796D000
|
stack
|
page read and write
|
||
20181AD9000
|
trusted library allocation
|
page read and write
|
||
1DB50F82000
|
trusted library allocation
|
page read and write
|
||
293B76EA000
|
trusted library allocation
|
page read and write
|
||
1BFC43F2000
|
trusted library allocation
|
page read and write
|
||
1DB5107E000
|
trusted library allocation
|
page read and write
|
||
293B7668000
|
trusted library allocation
|
page read and write
|
||
1BFC43C6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B80C000
|
trusted library allocation
|
page execute and read and write
|
||
1BFDC660000
|
heap
|
page execute and read and write
|
||
20181A18000
|
trusted library allocation
|
page read and write
|
||
293B77A0000
|
trusted library allocation
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
1BFC459E000
|
trusted library allocation
|
page read and write
|
||
1DB510C2000
|
trusted library allocation
|
page read and write
|
||
293B7748000
|
trusted library allocation
|
page read and write
|
||
712F000
|
stack
|
page read and write
|
||
1DB50FFC000
|
trusted library allocation
|
page read and write
|
||
293B7774000
|
trusted library allocation
|
page read and write
|
||
1DB51042000
|
trusted library allocation
|
page read and write
|
||
205CC702000
|
heap
|
page read and write
|
||
1BFC43C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
8124000
|
heap
|
page read and write
|
||
1BFC437A000
|
trusted library allocation
|
page read and write
|
||
1BFC43DC000
|
trusted library allocation
|
page read and write
|
||
51D0000
|
heap
|
page read and write
|
||
1DB51116000
|
trusted library allocation
|
page read and write
|
||
200DBD24000
|
heap
|
page read and write
|
||
1DB50FAA000
|
trusted library allocation
|
page read and write
|
||
293B76EC000
|
trusted library allocation
|
page read and write
|
||
1DB5110C000
|
trusted library allocation
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
1DB51064000
|
trusted library allocation
|
page read and write
|
||
1BFC24E4000
|
heap
|
page read and write
|
||
293B764A000
|
trusted library allocation
|
page read and write
|
||
205CC902000
|
heap
|
page read and write
|
||
293C7596000
|
trusted library allocation
|
page read and write
|
||
7FFD9B913000
|
trusted library allocation
|
page read and write
|
||
20181A9B000
|
trusted library allocation
|
page read and write
|
||
1859D070000
|
heap
|
page read and write
|
||
261D0F50000
|
heap
|
page read and write
|
||
1BFC440E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
293B75E0000
|
trusted library allocation
|
page read and write
|
||
293B77EA000
|
trusted library allocation
|
page read and write
|
||
1DB51080000
|
trusted library allocation
|
page read and write
|
||
293B769C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
1DB51108000
|
trusted library allocation
|
page read and write
|
||
1DB5105C000
|
trusted library allocation
|
page read and write
|
||
20181820000
|
heap
|
page read and write
|
||
1BFC456A000
|
trusted library allocation
|
page read and write
|
||
8210000
|
heap
|
page read and write
|
||
5340000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1DB61025000
|
trusted library allocation
|
page read and write
|
||
1DB4F110000
|
heap
|
page execute and read and write
|
||
4CEC000
|
stack
|
page read and write
|
||
293B75CE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B971000
|
trusted library allocation
|
page read and write
|
||
1DB50FA8000
|
trusted library allocation
|
page read and write
|
||
1BFC4428000
|
trusted library allocation
|
page read and write
|
||
293B77C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
293C7804000
|
trusted library allocation
|
page read and write
|
||
293C72DB000
|
trusted library allocation
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
1DB50BA1000
|
trusted library allocation
|
page read and write
|
||
293B7788000
|
trusted library allocation
|
page read and write
|
||
1BFC448C000
|
trusted library allocation
|
page read and write
|
||
1DB5118C000
|
trusted library allocation
|
page read and write
|
||
205CC430000
|
heap
|
page read and write
|
||
201819F7000
|
trusted library allocation
|
page read and write
|
||
1BFC4486000
|
trusted library allocation
|
page read and write
|
||
7FFD9B976000
|
trusted library allocation
|
page read and write
|
||
205CC677000
|
heap
|
page read and write
|
||
95E000
|
stack
|
page read and write
|
||
261D1000000
|
heap
|
page read and write
|
||
1BFC4386000
|
trusted library allocation
|
page read and write
|
||
1BFC444C000
|
trusted library allocation
|
page read and write
|
||
1BFC4588000
|
trusted library allocation
|
page read and write
|
||
293B769A000
|
trusted library allocation
|
page read and write
|
||
1BFC45AE000
|
trusted library allocation
|
page read and write
|
||
293B7690000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
1DB510BE000
|
trusted library allocation
|
page read and write
|
||
1BFC43C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC43E4000
|
trusted library allocation
|
page read and write
|
||
293B769E000
|
trusted library allocation
|
page read and write
|
||
1BFC43BA000
|
trusted library allocation
|
page read and write
|
||
E1A17FA000
|
stack
|
page read and write
|
||
1BFC2390000
|
trusted library allocation
|
page read and write
|
||
1BFC4434000
|
trusted library allocation
|
page read and write
|
||
293B76F6000
|
trusted library allocation
|
page read and write
|
||
1DB510D8000
|
trusted library allocation
|
page read and write
|
||
83C000
|
stack
|
page read and write
|
||
1BFC43C0000
|
trusted library allocation
|
page read and write
|
||
1DB50FEE000
|
trusted library allocation
|
page read and write
|
||
293B71E1000
|
trusted library allocation
|
page read and write
|
||
1BFC24EF000
|
heap
|
page read and write
|
||
293B7616000
|
trusted library allocation
|
page read and write
|
||
1BFC45A8000
|
trusted library allocation
|
page read and write
|
||
1BFC2340000
|
heap
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC2502000
|
heap
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page read and write
|
||
1DB5111E000
|
trusted library allocation
|
page read and write
|
||
1594972000
|
stack
|
page read and write
|
||
6F41000
|
heap
|
page read and write
|
||
20181AA1000
|
trusted library allocation
|
page read and write
|
||
293B7698000
|
trusted library allocation
|
page read and write
|
||
20181B52000
|
trusted library allocation
|
page read and write
|
||
293B7764000
|
trusted library allocation
|
page read and write
|
||
1BFC4568000
|
trusted library allocation
|
page read and write
|
||
201FF792000
|
unkown
|
page readonly
|
||
293B75DC000
|
trusted library allocation
|
page read and write
|
||
1DB5118E000
|
trusted library allocation
|
page read and write
|
||
1BFC44F6000
|
trusted library allocation
|
page read and write
|
||
1DB51034000
|
trusted library allocation
|
page read and write
|
||
1DB510E8000
|
trusted library allocation
|
page read and write
|
||
15950FB000
|
stack
|
page read and write
|
||
293B77D0000
|
trusted library allocation
|
page read and write
|
||
205CC6E2000
|
heap
|
page read and write
|
||
1DB510CC000
|
trusted library allocation
|
page read and write
|
||
1BFC4498000
|
trusted library allocation
|
page read and write
|
||
E1A0FFF000
|
stack
|
page read and write
|
||
293B761C000
|
trusted library allocation
|
page read and write
|
||
293B7710000
|
trusted library allocation
|
page read and write
|
||
1DB51148000
|
trusted library allocation
|
page read and write
|
||
1DB50FE0000
|
trusted library allocation
|
page read and write
|
||
28D94AC000
|
stack
|
page read and write
|
||
293B76CC000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
293B779A000
|
trusted library allocation
|
page read and write
|
||
1DB50FBC000
|
trusted library allocation
|
page read and write
|
||
293B75CC000
|
trusted library allocation
|
page read and write
|
||
1DB5113E000
|
trusted library allocation
|
page read and write
|
||
1DB5117C000
|
trusted library allocation
|
page read and write
|
||
5797000
|
heap
|
page read and write
|
||
1DB5105A000
|
trusted library allocation
|
page read and write
|
||
20181A4E000
|
trusted library allocation
|
page read and write
|
||
1BFC3FD2000
|
trusted library allocation
|
page read and write
|
||
293C7735000
|
trusted library allocation
|
page read and write
|
||
293B775E000
|
trusted library allocation
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
1BFC452C000
|
trusted library allocation
|
page read and write
|
||
1BFC44C4000
|
trusted library allocation
|
page read and write
|
||
1BFC4412000
|
trusted library allocation
|
page read and write
|
||
1BFC4440000
|
trusted library allocation
|
page read and write
|
||
293B7666000
|
trusted library allocation
|
page read and write
|
||
7FFD9B891000
|
trusted library allocation
|
page execute and read and write
|
||
205CC62D000
|
heap
|
page read and write
|
||
1DB51050000
|
trusted library allocation
|
page read and write
|
||
293B7752000
|
trusted library allocation
|
page read and write
|
||
1BFC4550000
|
trusted library allocation
|
page read and write
|
||
1BFC4408000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1BFDC802000
|
heap
|
page execute and read and write
|
||
293B77E8000
|
trusted library allocation
|
page read and write
|
||
1DB5110E000
|
trusted library allocation
|
page read and write
|
||
1DB5118A000
|
trusted library allocation
|
page read and write
|
||
293B76BA000
|
trusted library allocation
|
page read and write
|
||
50DC000
|
stack
|
page read and write
|
||
1DB51036000
|
trusted library allocation
|
page read and write
|
||
293B77D8000
|
trusted library allocation
|
page read and write
|
||
1DB50FFA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B91D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
293B76F4000
|
trusted library allocation
|
page read and write
|
||
5450000
|
heap
|
page read and write
|
||
1DB510CE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC43B2000
|
trusted library allocation
|
page read and write
|
||
77EF000
|
stack
|
page read and write
|
||
293B7724000
|
trusted library allocation
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
293D0010000
|
heap
|
page read and write
|
||
1DB60D13000
|
trusted library allocation
|
page read and write
|
||
293B75F8000
|
trusted library allocation
|
page read and write
|
||
205CC5A0000
|
heap
|
page execute and read and write
|
||
7FFD9B752000
|
trusted library allocation
|
page read and write
|
||
7FFD9B948000
|
trusted library allocation
|
page read and write
|
||
1DB50F70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B971000
|
trusted library allocation
|
page read and write
|
||
293B7636000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9B972000
|
trusted library allocation
|
page read and write
|
||
293B75FE000
|
trusted library allocation
|
page read and write
|
||
16744451000
|
heap
|
page read and write
|
||
1DB5102E000
|
trusted library allocation
|
page read and write
|
||
1BFC451C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1DB50FB0000
|
trusted library allocation
|
page read and write
|
||
205CC580000
|
trusted library allocation
|
page read and write
|
||
20181B95000
|
trusted library allocation
|
page read and write
|
||
293B77D4000
|
trusted library allocation
|
page read and write
|
||
1DB51092000
|
trusted library allocation
|
page read and write
|
||
1DB5113A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
1DB51028000
|
trusted library allocation
|
page read and write
|
||
1BFC4472000
|
trusted library allocation
|
page read and write
|
||
293B75FC000
|
trusted library allocation
|
page read and write
|
||
201819E3000
|
trusted library allocation
|
page read and write
|
||
1DB510BA000
|
trusted library allocation
|
page read and write
|
||
293B76AC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
38F8FF000
|
unkown
|
page read and write
|
||
293B7722000
|
trusted library allocation
|
page read and write
|
||
1DB50FF6000
|
trusted library allocation
|
page read and write
|
||
293B764C000
|
trusted library allocation
|
page read and write
|
||
293CFB3F000
|
heap
|
page read and write
|
||
1BFC43FE000
|
trusted library allocation
|
page read and write
|
||
1BFC4414000
|
trusted library allocation
|
page read and write
|
||
4EAE000
|
stack
|
page read and write
|
||
1BFC445E000
|
trusted library allocation
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
7FFD9B9BF000
|
trusted library allocation
|
page read and write
|
||
293B75BC000
|
trusted library allocation
|
page read and write
|
||
1BFC4404000
|
trusted library allocation
|
page read and write
|
||
1DB5106E000
|
trusted library allocation
|
page read and write
|
||
1DB50FD0000
|
trusted library allocation
|
page read and write
|
||
1DB68BD0000
|
trusted library allocation
|
page read and write
|
||
1DB5107A000
|
trusted library allocation
|
page read and write
|
||
1BFC4576000
|
trusted library allocation
|
page read and write
|
||
293CFB00000
|
heap
|
page read and write
|
||
E1A11FE000
|
stack
|
page read and write
|
||
1BFC45A2000
|
trusted library allocation
|
page read and write
|
||
293B77A4000
|
trusted library allocation
|
page read and write
|
||
20B32FF000
|
stack
|
page read and write
|
||
7FFD9B9AB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
293B75F0000
|
trusted library allocation
|
page read and write
|
||
293B76D8000
|
trusted library allocation
|
page read and write
|
||
205E6A02000
|
heap
|
page execute and read and write
|
||
293B75D2000
|
trusted library allocation
|
page read and write
|
||
200DBBE0000
|
heap
|
page read and write
|
||
1DB5103C000
|
trusted library allocation
|
page read and write
|
||
1DB5101E000
|
trusted library allocation
|
page read and write
|
||
1DB51142000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1DB51006000
|
trusted library allocation
|
page read and write
|
||
1DB50FE6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
205CC410000
|
heap
|
page read and write
|
||
293B7662000
|
trusted library allocation
|
page read and write
|
||
7FFD9B89D000
|
trusted library allocation
|
page execute and read and write
|
||
3E0A3FF000
|
stack
|
page read and write
|
||
201FF4C2000
|
unkown
|
page readonly
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1BFC455C000
|
trusted library allocation
|
page read and write
|
||
15956FD000
|
stack
|
page read and write
|
||
1DB50FC4000
|
trusted library allocation
|
page read and write
|
||
1DB50FD2000
|
trusted library allocation
|
page read and write
|
||
1DB51032000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
7020000
|
heap
|
page read and write
|
||
293B7658000
|
trusted library allocation
|
page read and write
|
||
1BFC4598000
|
trusted library allocation
|
page read and write
|
||
1DB51150000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
293B7716000
|
trusted library allocation
|
page read and write
|
||
293B76A6000
|
trusted library allocation
|
page read and write
|
||
16744461000
|
heap
|
page read and write
|
||
293B7792000
|
trusted library allocation
|
page read and write
|
||
20181B2B000
|
trusted library allocation
|
page read and write
|
||
1DB51056000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
heap
|
page readonly
|
||
293B7614000
|
trusted library allocation
|
page read and write
|
||
200DBC13000
|
unkown
|
page read and write
|
||
10000000
|
direct allocation
|
page read and write
|
||
1DB510B0000
|
trusted library allocation
|
page read and write
|
||
1DB510D6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B754000
|
trusted library allocation
|
page read and write
|
||
7FFD9B916000
|
trusted library allocation
|
page read and write
|
||
1BFC445C000
|
trusted library allocation
|
page read and write
|
||
1DB50FF4000
|
trusted library allocation
|
page read and write
|
||
1DB50F84000
|
trusted library allocation
|
page read and write
|
||
7FFD9B806000
|
trusted library allocation
|
page read and write
|
||
293B762E000
|
trusted library allocation
|
page read and write
|
||
293B766E000
|
trusted library allocation
|
page read and write
|
||
3E0A4FE000
|
stack
|
page read and write
|
||
293B778C000
|
trusted library allocation
|
page read and write
|
||
1BFC44B2000
|
trusted library allocation
|
page read and write
|
||
7410000
|
heap
|
page read and write
|
||
3E0A1FE000
|
stack
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
1DB510C4000
|
trusted library allocation
|
page read and write
|
||
293B77AC000
|
trusted library allocation
|
page read and write
|
||
205CC651000
|
heap
|
page read and write
|
||
1BFC4480000
|
trusted library allocation
|
page read and write
|
||
20181BAF000
|
trusted library allocation
|
page read and write
|
||
1BFC443C000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
1BFC4562000
|
trusted library allocation
|
page read and write
|
||
1BFC44C8000
|
trusted library allocation
|
page read and write
|
||
293B7612000
|
trusted library allocation
|
page read and write
|
||
293B77F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B996000
|
trusted library allocation
|
page read and write
|
||
293B7770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
20181B7D000
|
trusted library allocation
|
page read and write
|
||
201FF954000
|
heap
|
page read and write
|
||
293B7660000
|
trusted library allocation
|
page read and write
|
||
205DE6F5000
|
trusted library allocation
|
page read and write
|
||
6EEE000
|
stack
|
page read and write
|
||
293B76DC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
1DB5103A000
|
trusted library allocation
|
page read and write
|
||
205E6B02000
|
heap
|
page read and write
|
||
6F70000
|
heap
|
page read and write
|
||
293B77D6000
|
trusted library allocation
|
page read and write
|
||
16744280000
|
heap
|
page read and write
|
||
293B777C000
|
trusted library allocation
|
page read and write
|
||
494BDFA000
|
stack
|
page read and write
|
||
205CC613000
|
heap
|
page read and write
|
||
1DB4EE3C000
|
heap
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B926000
|
trusted library allocation
|
page read and write
|
||
293B76C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B948000
|
trusted library allocation
|
page read and write
|
||
200DBC38000
|
heap
|
page read and write
|
||
5610000
|
heap
|
page read and write
|
||
293C71E8000
|
trusted library allocation
|
page read and write
|
||
205CC510000
|
heap
|
page read and write
|
||
293B76D2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
1DB51114000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
1859D040000
|
heap
|
page read and write
|
||
1BFC43A8000
|
trusted library allocation
|
page read and write
|
||
1DB510FE000
|
trusted library allocation
|
page read and write
|
||
205CC646000
|
heap
|
page read and write
|
||
293B5626000
|
heap
|
page read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
C70000
|
heap
|
page read and write
|
||
1BFD4113000
|
trusted library allocation
|
page read and write
|
||
20181BBB000
|
trusted library allocation
|
page read and write
|
||
1BFC43A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC4442000
|
trusted library allocation
|
page read and write
|
||
1BFC4524000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page execute and read and write
|
||
1DB51104000
|
trusted library allocation
|
page read and write
|
||
1BFC4560000
|
trusted library allocation
|
page read and write
|
||
1DB510F2000
|
trusted library allocation
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
293B5641000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
293B76E4000
|
trusted library allocation
|
page read and write
|
||
1BFC44B4000
|
trusted library allocation
|
page read and write
|
||
1BFDBFD0000
|
trusted library allocation
|
page read and write
|
||
1DB50F8A000
|
trusted library allocation
|
page read and write
|
||
1DB51112000
|
trusted library allocation
|
page read and write
|
||
293B7762000
|
trusted library allocation
|
page read and write
|
||
293B5802000
|
heap
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
1BFC43A6000
|
trusted library allocation
|
page read and write
|
||
1BFC4510000
|
trusted library allocation
|
page read and write
|
||
1DB511A2000
|
trusted library allocation
|
page read and write
|
||
293B5702000
|
heap
|
page read and write
|
||
7ADE000
|
stack
|
page read and write
|
||
205CC624000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
293B76C0000
|
trusted library allocation
|
page read and write
|
||
1DB51030000
|
trusted library allocation
|
page read and write
|
||
7FFD9B893000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC2400000
|
heap
|
page read and write
|
||
1DB60BA8000
|
trusted library allocation
|
page read and write
|
||
1BFC4384000
|
trusted library allocation
|
page read and write
|
||
1BFC44DE000
|
trusted library allocation
|
page read and write
|
||
293B765E000
|
trusted library allocation
|
page read and write
|
||
1BFC440C000
|
trusted library allocation
|
page read and write
|
||
293B76DE000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
1BFC445A000
|
trusted library allocation
|
page read and write
|
||
1BFC44A4000
|
trusted library allocation
|
page read and write
|
||
1BFC4416000
|
trusted library allocation
|
page read and write
|
||
1DB51048000
|
trusted library allocation
|
page read and write
|
||
293B77CA000
|
trusted library allocation
|
page read and write
|
||
1DB510BC000
|
trusted library allocation
|
page read and write
|
||
1DB4F0D0000
|
trusted library allocation
|
page read and write
|
||
1DB510DE000
|
trusted library allocation
|
page read and write
|
||
494BAFE000
|
stack
|
page read and write
|
||
1BFC456E000
|
trusted library allocation
|
page read and write
|
||
293B562D000
|
heap
|
page read and write
|
||
293B7702000
|
trusted library allocation
|
page read and write
|
||
1DB510A4000
|
trusted library allocation
|
page read and write
|
||
550E000
|
stack
|
page read and write
|
||
205CC5B3000
|
trusted library allocation
|
page read and write
|
||
1DB50F90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
293B774C000
|
trusted library allocation
|
page read and write
|
||
1DB5108C000
|
trusted library allocation
|
page read and write
|
||
1DB4EE24000
|
heap
|
page read and write
|
||
293B76F2000
|
trusted library allocation
|
page read and write
|
||
1BFC24EB000
|
heap
|
page read and write
|
||
293B75D8000
|
trusted library allocation
|
page read and write
|
||
293B56AF000
|
heap
|
page read and write
|
||
7E2E000
|
stack
|
page read and write
|
||
293B768A000
|
trusted library allocation
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
1DB510A6000
|
trusted library allocation
|
page read and write
|
||
205CC63B000
|
heap
|
page read and write
|
||
7FFD9B7A4000
|
trusted library allocation
|
page read and write
|
||
1BFC4594000
|
trusted library allocation
|
page read and write
|
||
2019A16C000
|
heap
|
page read and write
|
||
293B76C6000
|
trusted library allocation
|
page read and write
|
||
1DB69010000
|
heap
|
page read and write
|
||
1DB510F8000
|
trusted library allocation
|
page read and write
|
||
1BFC43EA000
|
trusted library allocation
|
page read and write
|
||
1BFC44D2000
|
trusted library allocation
|
page read and write
|
||
90D000
|
stack
|
page read and write
|
||
1DB51162000
|
trusted library allocation
|
page read and write
|
||
1DB51078000
|
trusted library allocation
|
page read and write
|
||
7040000
|
heap
|
page read and write
|
||
1DB4EE3A000
|
heap
|
page read and write
|
||
1DB51088000
|
trusted library allocation
|
page read and write
|
||
293B76F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1BFC439E000
|
trusted library allocation
|
page read and write
|
||
293B7712000
|
trusted library allocation
|
page read and write
|
||
293B75B8000
|
trusted library allocation
|
page read and write
|
||
261D0F40000
|
heap
|
page read and write
|
||
293B561F000
|
heap
|
page read and write
|
||
4D2C000
|
stack
|
page read and write
|
||
16744462000
|
heap
|
page read and write
|
||
293B5652000
|
heap
|
page read and write
|
||
7FFD9B762000
|
trusted library allocation
|
page read and write
|
||
20181A8A000
|
trusted library allocation
|
page read and write
|
||
293B765C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
293B76FA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
1DB51198000
|
trusted library allocation
|
page read and write
|
||
293B77D2000
|
trusted library allocation
|
page read and write
|
||
293B7790000
|
trusted library allocation
|
page read and write
|
||
293B77C0000
|
trusted library allocation
|
page read and write
|
||
4FFF000
|
stack
|
page read and write
|
||
1DB511A6000
|
trusted library allocation
|
page read and write
|
||
1BFC4438000
|
trusted library allocation
|
page read and write
|
||
293B75D0000
|
trusted library allocation
|
page read and write
|
||
1DB510E2000
|
trusted library allocation
|
page read and write
|
||
1BFC446E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
1BFDC94B000
|
heap
|
page read and write
|
||
293B760A000
|
trusted library allocation
|
page read and write
|
||
1BFC437E000
|
trusted library allocation
|
page read and write
|
||
1DB5104A000
|
trusted library allocation
|
page read and write
|
||
293B7626000
|
trusted library allocation
|
page read and write
|
||
201818E6000
|
trusted library allocation
|
page read and write
|
||
1BFC458A000
|
trusted library allocation
|
page read and write
|
||
760F000
|
stack
|
page read and write
|
||
1BFC4508000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B98B000
|
trusted library allocation
|
page read and write
|
||
167446E0000
|
heap
|
page read and write
|
||
16744360000
|
heap
|
page read and write
|
||
2019A211000
|
heap
|
page read and write
|
||
1BFC4476000
|
trusted library allocation
|
page read and write
|
||
1DB51184000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
293B7768000
|
trusted library allocation
|
page read and write
|
||
1BFC44EE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page read and write
|
||
293B768C000
|
trusted library allocation
|
page read and write
|
||
53DE000
|
stack
|
page read and write
|
||
7FFD9B991000
|
trusted library allocation
|
page read and write
|
||
1DB610F5000
|
trusted library allocation
|
page read and write
|
||
1BFC455A000
|
trusted library allocation
|
page read and write
|
||
1DB4EDA0000
|
heap
|
page read and write
|
||
54C1000
|
heap
|
page read and write
|
||
293B75F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
20199C40000
|
heap
|
page read and write
|
||
20181BD5000
|
trusted library allocation
|
page read and write
|
||
C8686FE000
|
unkown
|
page readonly
|
||
1BFC442C000
|
trusted library allocation
|
page read and write
|
||
261D1013000
|
heap
|
page read and write
|
||
293CF210000
|
trusted library allocation
|
page read and write
|
||
1BFC44CA000
|
trusted library allocation
|
page read and write
|
||
293B76A0000
|
trusted library allocation
|
page read and write
|
||
1DB50FDE000
|
trusted library allocation
|
page read and write
|
||
293B7798000
|
trusted library allocation
|
page read and write
|
||
293B75E8000
|
trusted library allocation
|
page read and write
|
||
1DB51004000
|
trusted library allocation
|
page read and write
|
||
5370000
|
heap
|
page read and write
|
||
1BFC458E000
|
trusted library allocation
|
page read and write
|
||
293B76C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B6000
|
trusted library allocation
|
page read and write
|
||
522D000
|
heap
|
page read and write
|
||
20181A47000
|
trusted library allocation
|
page read and write
|
||
1BFC4468000
|
trusted library allocation
|
page read and write
|
||
1BFC2350000
|
heap
|
page read and write
|
||
7FFD9B991000
|
trusted library allocation
|
page read and write
|
||
1BFC249A000
|
heap
|
page read and write
|
||
E1A12FB000
|
stack
|
page read and write
|
||
54E2000
|
heap
|
page read and write
|
||
1DB50F9E000
|
trusted library allocation
|
page read and write
|
||
1BFC453C000
|
trusted library allocation
|
page read and write
|
||
293B77DC000
|
trusted library allocation
|
page read and write
|
||
20B36FD000
|
stack
|
page read and write
|
||
205CC6EF000
|
heap
|
page read and write
|
||
293B77A6000
|
trusted library allocation
|
page read and write
|
||
20181AFA000
|
trusted library allocation
|
page read and write
|
||
1BFC43B8000
|
trusted library allocation
|
page read and write
|
||
293B771E000
|
trusted library allocation
|
page read and write
|
||
1DB5115C000
|
trusted library allocation
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
1DB4EDB0000
|
heap
|
page read and write
|
||
293B779C000
|
trusted library allocation
|
page read and write
|
||
1DB50F86000
|
trusted library allocation
|
page read and write
|
||
1BFC4580000
|
trusted library allocation
|
page read and write
|
||
782E000
|
stack
|
page read and write
|
||
1BFC4554000
|
trusted library allocation
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
1BFC4496000
|
trusted library allocation
|
page read and write
|
||
20181A2C000
|
trusted library allocation
|
page read and write
|
||
293B7656000
|
trusted library allocation
|
page read and write
|
||
293B7718000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
4D30000
|
heap
|
page read and write
|
||
293B55B0000
|
heap
|
page read and write
|
||
1BFC2478000
|
heap
|
page read and write
|
||
1DB510E4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
1BFDC93A000
|
heap
|
page read and write
|
||
1BFC4448000
|
trusted library allocation
|
page read and write
|
||
1DB5109C000
|
trusted library allocation
|
page read and write
|
||
494BBFF000
|
stack
|
page read and write
|
||
293B76C2000
|
trusted library allocation
|
page read and write
|
||
1BFC44AC000
|
trusted library allocation
|
page read and write
|
||
293B75BE000
|
trusted library allocation
|
page read and write
|
||
2019A214000
|
heap
|
page read and write
|
||
293B76A2000
|
trusted library allocation
|
page read and write
|
||
1BFC4484000
|
trusted library allocation
|
page read and write
|
||
1DB51156000
|
trusted library allocation
|
page read and write
|
||
1DB51134000
|
trusted library allocation
|
page read and write
|
||
1DB5103E000
|
trusted library allocation
|
page read and write
|
||
205E61D0000
|
trusted library allocation
|
page read and write
|
||
1BFC4592000
|
trusted library allocation
|
page read and write
|
||
1BFC4564000
|
trusted library allocation
|
page read and write
|
||
1DB50F88000
|
trusted library allocation
|
page read and write
|
||
293B767A000
|
trusted library allocation
|
page read and write
|
||
293B7630000
|
trusted library allocation
|
page read and write
|
||
1DB50CBE000
|
trusted library allocation
|
page read and write
|
||
1DB50FCA000
|
trusted library allocation
|
page read and write
|
||
5470000
|
heap
|
page read and write
|
||
1DB51152000
|
trusted library allocation
|
page read and write
|
||
1BFC446C000
|
trusted library allocation
|
page read and write
|
||
3E0A2FB000
|
stack
|
page read and write
|
||
293B77DA000
|
trusted library allocation
|
page read and write
|
||
20181B93000
|
trusted library allocation
|
page read and write
|
||
1DB5100C000
|
trusted library allocation
|
page read and write
|
||
1DB5104C000
|
trusted library allocation
|
page read and write
|
||
201FF94B000
|
heap
|
page read and write
|
||
50F3000
|
stack
|
page read and write
|
||
1BFC4596000
|
trusted library allocation
|
page read and write
|
||
293B72A1000
|
trusted library allocation
|
page read and write
|
||
293B75D6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
200DBC78000
|
heap
|
page read and write
|
||
1BFC44A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
1BFC44C0000
|
trusted library allocation
|
page read and write
|
||
560E000
|
stack
|
page read and write
|
||
7FFD9B893000
|
trusted library allocation
|
page execute and read and write
|
||
205CC802000
|
heap
|
page read and write
|
||
1DB4EED9000
|
heap
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page execute and read and write
|
||
1DB50F9A000
|
trusted library allocation
|
page read and write
|
||
200DBC78000
|
heap
|
page read and write
|
||
1BFC44DC000
|
trusted library allocation
|
page read and write
|
||
293B7776000
|
trusted library allocation
|
page read and write
|
||
2019A206000
|
heap
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
heap
|
page read and write
|
||
293B7652000
|
trusted library allocation
|
page read and write
|
||
1DB5114C000
|
trusted library allocation
|
page read and write
|
||
1BFC459C000
|
trusted library allocation
|
page read and write
|
||
1DB51154000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC4490000
|
trusted library allocation
|
page read and write
|
||
20181A7F000
|
trusted library allocation
|
page read and write
|
||
1BFC43B4000
|
trusted library allocation
|
page read and write
|
||
20181AD0000
|
trusted library allocation
|
page read and write
|
||
1BFC43DA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B891000
|
trusted library allocation
|
page execute and read and write
|
||
15959FE000
|
stack
|
page read and write
|
||
293B76E6000
|
trusted library allocation
|
page read and write
|
||
1DB51020000
|
trusted library allocation
|
page read and write
|
||
1BFC23C0000
|
heap
|
page read and write
|
||
1DB510EA000
|
trusted library allocation
|
page read and write
|
||
20B30FD000
|
stack
|
page read and write
|
||
293B75E6000
|
trusted library allocation
|
page read and write
|
||
1DB4ED80000
|
heap
|
page read and write
|
||
1DB51002000
|
trusted library allocation
|
page read and write
|
||
293B76E2000
|
trusted library allocation
|
page read and write
|
||
1BFC454E000
|
trusted library allocation
|
page read and write
|
||
293B7734000
|
trusted library allocation
|
page read and write
|
||
1DB5115E000
|
trusted library allocation
|
page read and write
|
||
1BFD4356000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
heap
|
page read and write
|
||
1DB5108A000
|
trusted library allocation
|
page read and write
|
||
200DBBC0000
|
heap
|
page read and write
|
||
201FF820000
|
heap
|
page read and write
|
||
205CC6EB000
|
heap
|
page read and write
|
||
1DB51174000
|
trusted library allocation
|
page read and write
|
||
1BFC439A000
|
trusted library allocation
|
page read and write
|
||
C8689FE000
|
stack
|
page read and write
|
||
7FFD9B961000
|
trusted library allocation
|
page read and write
|
||
293B7604000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC2602000
|
heap
|
page read and write
|
||
293B7704000
|
trusted library allocation
|
page read and write
|
||
293B771A000
|
trusted library allocation
|
page read and write
|
||
790F000
|
stack
|
page read and write
|
||
293B77B6000
|
trusted library allocation
|
page read and write
|
||
1DB51172000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1BFD3FA1000
|
trusted library allocation
|
page read and write
|
||
15954FD000
|
stack
|
page read and write
|
||
1DB50FD4000
|
trusted library allocation
|
page read and write
|
||
1BFC3FA1000
|
trusted library allocation
|
page read and write
|
||
1DB5116E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B1000
|
trusted library allocation
|
page read and write
|
||
293B5902000
|
heap
|
page read and write
|
||
293B7610000
|
trusted library allocation
|
page read and write
|
||
1DB510E6000
|
trusted library allocation
|
page read and write
|
||
4F0C000
|
stack
|
page read and write
|
||
1DB5102C000
|
trusted library allocation
|
page read and write
|
||
293B774E000
|
trusted library allocation
|
page read and write
|
||
293B77EC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B973000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B1000
|
trusted library allocation
|
page read and write
|
||
10016000
|
direct allocation
|
page execute and read and write
|
||
1BFC44D4000
|
trusted library allocation
|
page read and write
|
||
1BFC44C2000
|
trusted library allocation
|
page read and write
|
||
1DB51074000
|
trusted library allocation
|
page read and write
|
||
1DB51090000
|
trusted library allocation
|
page read and write
|
||
20181B70000
|
trusted library allocation
|
page read and write
|
||
293B779E000
|
trusted library allocation
|
page read and write
|
||
293B774A000
|
trusted library allocation
|
page read and write
|
||
1BFC4572000
|
trusted library allocation
|
page read and write
|
||
1BFC4528000
|
trusted library allocation
|
page read and write
|
||
205CC5D0000
|
heap
|
page execute and read and write
|
||
20B33FE000
|
stack
|
page read and write
|
||
1DB50FE2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B94E000
|
trusted library allocation
|
page read and write
|
||
1BFC45AC000
|
trusted library allocation
|
page read and write
|
||
16744462000
|
heap
|
page read and write
|
||
1BFC2413000
|
heap
|
page read and write
|
||
293B7634000
|
trusted library allocation
|
page read and write
|
||
1BFC4522000
|
trusted library allocation
|
page read and write
|
||
1BFC43E2000
|
trusted library allocation
|
page read and write
|
||
1BFC4530000
|
trusted library allocation
|
page read and write
|
||
1BFC4380000
|
trusted library allocation
|
page read and write
|
||
1DB4EE45000
|
heap
|
page read and write
|
||
261D1102000
|
heap
|
page read and write
|
||
1DB50FBA000
|
trusted library allocation
|
page read and write
|
||
1BFC44E6000
|
trusted library allocation
|
page read and write
|
||
293B75CA000
|
trusted library allocation
|
page read and write
|
||
1DB51168000
|
trusted library allocation
|
page read and write
|
||
1BFC4482000
|
trusted library allocation
|
page read and write
|
||
76EE000
|
stack
|
page read and write
|
||
2019A15C000
|
heap
|
page read and write
|
||
1BFDC900000
|
heap
|
page read and write
|
||
C868AFE000
|
unkown
|
page readonly
|
||
980000
|
heap
|
page read and write
|
||
293B77A8000
|
trusted library allocation
|
page read and write
|
||
1BFC2420000
|
heap
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
205DE7C4000
|
trusted library allocation
|
page read and write
|
||
1DB510AA000
|
trusted library allocation
|
page read and write
|
||
293B564C000
|
heap
|
page read and write
|
||
2019A164000
|
heap
|
page read and write
|
||
7FFD9B941000
|
trusted library allocation
|
page read and write
|
||
1BFC4422000
|
trusted library allocation
|
page read and write
|
||
293B77E6000
|
trusted library allocation
|
page read and write
|
||
4D3C000
|
stack
|
page read and write
|
||
3E0A0FF000
|
stack
|
page read and write
|
||
8C0000
|
heap
|
page readonly
|
||
1DB510E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page execute and read and write
|
||
20181B7B000
|
trusted library allocation
|
page read and write
|
||
1BFC442E000
|
trusted library allocation
|
page read and write
|
||
1BFC43DE000
|
trusted library allocation
|
page read and write
|
||
1DB510EC000
|
trusted library allocation
|
page read and write
|
||
293B762C000
|
trusted library allocation
|
page read and write
|
||
1BFC448A000
|
trusted library allocation
|
page read and write
|
||
293CFA02000
|
heap
|
page execute and read and write
|
||
1BFC43D2000
|
trusted library allocation
|
page read and write
|
||
200DC000000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
20B31FE000
|
stack
|
page read and write
|
||
1BFC44F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B968000
|
trusted library allocation
|
page read and write
|
||
293B56B6000
|
heap
|
page read and write
|
||
6DE0000
|
heap
|
page read and write
|
||
1BFC44E0000
|
trusted library allocation
|
page read and write
|
||
1BFC444A000
|
trusted library allocation
|
page read and write
|
||
293B55F0000
|
trusted library allocation
|
page read and write
|
||
293B77E0000
|
trusted library allocation
|
page read and write
|
||
20181BB2000
|
trusted library allocation
|
page read and write
|
||
201819AC000
|
trusted library allocation
|
page read and write
|
||
1DB51098000
|
trusted library allocation
|
page read and write
|
||
1BFC44CE000
|
trusted library allocation
|
page read and write
|
||
293B75C0000
|
trusted library allocation
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
293B7608000
|
trusted library allocation
|
page read and write
|
||
200DC113000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
7D2E000
|
stack
|
page read and write
|
||
293B75EA000
|
trusted library allocation
|
page read and write
|
||
1BFC3FC6000
|
trusted library allocation
|
page read and write
|
||
1DB51052000
|
trusted library allocation
|
page read and write
|
||
1DB5114E000
|
trusted library allocation
|
page read and write
|
||
293B76CE000
|
trusted library allocation
|
page read and write
|
||
1BFC43D8000
|
trusted library allocation
|
page read and write
|
||
1DB51188000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
293B775C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B768000
|
trusted library allocation
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
293B77CE000
|
trusted library allocation
|
page read and write
|
||
1BFC452E000
|
trusted library allocation
|
page read and write
|
||
200DBC78000
|
heap
|
page read and write
|
||
38F9FF000
|
stack
|
page read and write
|
||
205E7010000
|
heap
|
page read and write
|
||
1DB4EEDD000
|
heap
|
page read and write
|
||
1DB4F120000
|
trusted library allocation
|
page read and write
|
||
293B7287000
|
trusted library allocation
|
page read and write
|
||
20181B5D000
|
trusted library allocation
|
page read and write
|
||
3E0A7FA000
|
stack
|
page read and write
|
||
50EF000
|
stack
|
page read and write
|
||
20181B42000
|
trusted library allocation
|
page read and write
|
||
201818C1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page execute and read and write
|
||
494B9FF000
|
stack
|
page read and write
|
||
20181A0C000
|
trusted library allocation
|
page read and write
|
||
1DB50FF8000
|
trusted library allocation
|
page read and write
|
||
1DB4EE00000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC43AC000
|
trusted library allocation
|
page read and write
|
||
293B75F2000
|
trusted library allocation
|
page read and write
|
||
6B20000
|
heap
|
page read and write
|
||
293B7714000
|
trusted library allocation
|
page read and write
|
||
1DB51190000
|
trusted library allocation
|
page read and write
|
||
792E000
|
stack
|
page read and write
|
||
28D95AF000
|
stack
|
page read and write
|
||
1BFC44B6000
|
trusted library allocation
|
page read and write
|
||
1DB51164000
|
trusted library allocation
|
page read and write
|
||
293B75EE000
|
trusted library allocation
|
page read and write
|
||
1DB51186000
|
trusted library allocation
|
page read and write
|
||
1DB510B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B926000
|
trusted library allocation
|
page read and write
|
||
293B55A0000
|
heap
|
page read and write
|
||
293B7730000
|
trusted library allocation
|
page read and write
|
||
1BFC441A000
|
trusted library allocation
|
page read and write
|
||
1DB510D4000
|
trusted library allocation
|
page read and write
|
||
293B767C000
|
trusted library allocation
|
page read and write
|
||
200DBD15000
|
trusted library allocation
|
page read and write
|
||
1BFC43D6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B982000
|
trusted library allocation
|
page read and write
|
||
293B7638000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
1BFC4382000
|
trusted library allocation
|
page read and write
|
||
6FDD000
|
stack
|
page read and write
|
||
1BFC4548000
|
trusted library allocation
|
page read and write
|
||
1DB511A0000
|
trusted library allocation
|
page read and write
|
||
293B7664000
|
trusted library allocation
|
page read and write
|
||
1DB6A53A000
|
heap
|
page read and write
|
||
293B7742000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
293B75E2000
|
trusted library allocation
|
page read and write
|
||
293B7694000
|
trusted library allocation
|
page read and write
|
||
293B7212000
|
trusted library allocation
|
page read and write
|
||
1DB5110A000
|
trusted library allocation
|
page read and write
|
||
293B75C2000
|
trusted library allocation
|
page read and write
|
||
550B000
|
heap
|
page read and write
|
||
1DB50FF2000
|
trusted library allocation
|
page read and write
|
||
1BFDD010000
|
heap
|
page read and write
|
||
1859D000000
|
heap
|
page read and write
|
||
1DB4EE3F000
|
heap
|
page read and write
|
||
1BFC2452000
|
heap
|
page read and write
|
||
8DC587E000
|
stack
|
page read and write
|
||
1BFC44E8000
|
trusted library allocation
|
page read and write
|
||
1DB51136000
|
trusted library allocation
|
page read and write
|
||
293B77AA000
|
trusted library allocation
|
page read and write
|
||
293C7353000
|
trusted library allocation
|
page read and write
|
||
1BFC4420000
|
trusted library allocation
|
page read and write
|
||
1BFC43E6000
|
trusted library allocation
|
page read and write
|
||
2018199E000
|
trusted library allocation
|
page read and write
|
||
293B7676000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
20181A65000
|
trusted library allocation
|
page read and write
|
||
1BFC450C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
1BFC441C000
|
trusted library allocation
|
page read and write
|
||
1BFC44B8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B94E000
|
trusted library allocation
|
page read and write
|
||
293B75D4000
|
trusted library allocation
|
page read and write
|
||
293B773E000
|
trusted library allocation
|
page read and write
|
||
1DB50FB4000
|
trusted library allocation
|
page read and write
|
||
293B773C000
|
trusted library allocation
|
page read and write
|
||
1DB50F8E000
|
trusted library allocation
|
page read and write
|
||
293B76FE000
|
trusted library allocation
|
page read and write
|
||
1DB4F100000
|
heap
|
page read and write
|
||
2019A600000
|
trusted library section
|
page read and write
|
||
1BFC43A4000
|
trusted library allocation
|
page read and write
|
||
293B76F8000
|
trusted library allocation
|
page read and write
|
||
20181985000
|
trusted library allocation
|
page read and write
|
||
205CE26A000
|
trusted library allocation
|
page read and write
|
||
1DB511AE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B946000
|
trusted library allocation
|
page read and write
|
||
1BFC440A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
There are 1694 hidden memdumps, click here to show them.