IOC Report
9NBx4Vmiuj.exe

loading gif

Files

File Path
Type
Category
Malicious
9NBx4Vmiuj.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\btjxg.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\btjxg.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\AuditRuleType\TypeId.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\9NBx4Vmiuj.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TypeId.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b0fv5l1q.20e.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_brnwyzyn.tpv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cuq2bxmg.oo1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jkat1zxr.vdv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jzjrtcj4.r3o.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ljtmhhaa.jwl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nkijes3r.1xr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ogljnoyt.xzm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_phgzwgtn.bj3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ssovggd5.sy2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_td3mgzln.hsr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xnrbtkd2.esq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\AuditRuleType\TypeId.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\btjxg.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 26 16:24:19 2024, mtime=Tue Mar 26 16:24:19 2024, atime=Tue Mar 26 16:24:19 2024, length=152064, window=hide
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\9NBx4Vmiuj.exe
"C:\Users\user\Desktop\9NBx4Vmiuj.exe"
malicious
C:\Users\user\AppData\Roaming\AuditRuleType\TypeId.exe
C:\Users\user\AppData\Roaming\AuditRuleType\TypeId.exe
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
malicious
C:\Users\user\AppData\Local\Temp\btjxg.exe
"C:\Users\user\AppData\Local\Temp\btjxg.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\btjxg.exe'
malicious
C:\Users\user\AppData\Roaming\AuditRuleType\TypeId.exe
C:\Users\user\AppData\Roaming\AuditRuleType\TypeId.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'btjxg.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\btjxg.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://185.196.10.233/dggfsff.exe
185.196.10.233
malicious
https://api.telegram.org/bot5498061286:AAEOFPFhizSA_AbkzDV_OWcHlXVsegPpL_c/sendMessage?chat_id=1267602057&text=%E2%98%A0%20%5BXWorm%20V3.0%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A9FCA14390BF6B97E9DB7%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro
149.154.167.220
http://nuget.org/NuGet.exe
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://api.telegram.org
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://api.telegram.org/bot
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://github.com/mgravell/protobuf-net
unknown
https://github.com/Pester/Pester
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://api.telegram.org/bot5498061286:AAEOFPFhizSA_AbkzDV_OWcHlXVsegPpL_c/sendMessage?chat_id=12676
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://api.telegram.org/
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://api.telegrP
unknown
https://aka.ms/pscore68
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.micros
unknown
http://schemas.microsoft
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
gjhfhgdg.insane.wang
185.196.10.233
malicious
api.telegram.org
149.154.167.220

IPs

IP
Domain
Country
Malicious
157.254.223.19
unknown
United States
malicious
185.196.10.233
gjhfhgdg.insane.wang
Switzerland
malicious
149.154.167.220
api.telegram.org
United Kingdom

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\66369895937b82c448aed43e9a0f200e
18a49aed82e382b45161550bf2dfd1cc
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2341C890000
trusted library section
page read and write
malicious
20937418000
trusted library allocation
page read and write
malicious
2184E8F8000
trusted library allocation
page read and write
malicious
1E3B9201000
trusted library allocation
page read and write
malicious
234355C7000
heap
page read and write
malicious
1E3C92B6000
trusted library allocation
page read and write
malicious
20937300000
trusted library allocation
page read and write
malicious
13071000
trusted library allocation
page read and write
malicious
2342CE13000
trusted library allocation
page read and write
malicious
1E3C9938000
trusted library allocation
page read and write
malicious
20926CE1000
trusted library allocation
page read and write
malicious
2342CC3B000
trusted library allocation
page read and write
malicious
2341C991000
trusted library allocation
page read and write
malicious
2183E1C1000
trusted library allocation
page read and write
malicious
1E3C9848000
trusted library allocation
page read and write
malicious
1E3C9898000
trusted library allocation
page read and write
malicious
2184E858000
trusted library allocation
page read and write
malicious
310C000
trusted library allocation
page read and write
malicious
20937378000
trusted library allocation
page read and write
malicious
2184E7E0000
trusted library allocation
page read and write
malicious
20937328000
trusted library allocation
page read and write
malicious
23435160000
trusted library section
page read and write
malicious
2184E808000
trusted library allocation
page read and write
malicious
2342D0C8000
trusted library allocation
page read and write
malicious
1E3C9820000
trusted library allocation
page read and write
malicious
DE2000
unkown
page readonly
malicious
2341CB50000
trusted library allocation
page read and write
2342D191000
trusted library allocation
page read and write
30E5000
trusted library allocation
page read and write
2183E0B1000
heap
page read and write
28007A67000
trusted library allocation
page read and write
7FF8488B3000
trusted library allocation
page execute and read and write
1EC81DE1000
trusted library allocation
page read and write
7FF848A54000
trusted library allocation
page read and write
2AEBA807000
trusted library allocation
page read and write
305E000
stack
page read and write
1E3B7696000
heap
page read and write
1ECF4319000
heap
page read and write
1312000
heap
page read and write
234355CB000
heap
page read and write
7FF848AA0000
trusted library allocation
page read and write
DE0000
unkown
page readonly
209372B0000
trusted library allocation
page read and write
7FF848CA0000
trusted library allocation
page read and write
BB78BBE000
stack
page read and write
234352FE000
heap
page read and write
7FF848AE0000
trusted library allocation
page read and write
7FF848BD4000
trusted library allocation
page read and write
8C613EE000
stack
page read and write
3123000
trusted library allocation
page read and write
209251A6000
heap
page read and write
8C627CE000
stack
page read and write
BB785FE000
stack
page read and write
2183E57F000
trusted library allocation
page read and write
7FF8488CD000
trusted library allocation
page execute and read and write
2341CE0A000
trusted library allocation
page read and write
1ECF20D0000
trusted library allocation
page read and write
2341AE50000
heap
page read and write
23435751000
heap
page read and write
2AEB6D10000
heap
page read and write
7FF848890000
trusted library allocation
page read and write
1E3B94D2000
trusted library allocation
page read and write
234349C0000
trusted library allocation
page read and write
1ECF20B0000
trusted library allocation
page read and write
2341CF9D000
trusted library allocation
page read and write
7FF848C70000
trusted library allocation
page read and write
21856C1F000
heap
page read and write
1ECF449A000
heap
page read and write
7FF848883000
trusted library allocation
page execute and read and write
234355DB000
heap
page read and write
A85BBFC000
stack
page read and write
7FF848BB0000
trusted library allocation
page read and write
7FF848BE0000
trusted library allocation
page read and write
23434D16000
heap
page read and write
7FF8488BD000
trusted library allocation
page execute and read and write
1ECF3BA0000
heap
page execute and read and write
1ECF444F000
heap
page read and write
7FF848B30000
trusted library allocation
page read and write
2AEB6ED5000
heap
page read and write
1C660000
heap
page read and write
2185688F000
heap
page read and write
1ECF443F000
heap
page read and write
20926CD0000
heap
page execute and read and write
21F4FFE000
stack
page read and write
7FF848B20000
trusted library allocation
page read and write
2183E3EE000
trusted library allocation
page read and write
1E3B7690000
heap
page read and write
1EC80F99000
trusted library allocation
page read and write
1ECF1EF0000
heap
page read and write
7FF848976000
trusted library allocation
page execute and read and write
1E3B76D6000
heap
page read and write
7FF848882000
trusted library allocation
page read and write
7FF848A62000
trusted library allocation
page read and write
2341CC1A000
trusted library allocation
page read and write
2AEB9CAF000
trusted library allocation
page read and write
2341CB64000
trusted library allocation
page read and write
2183C32D000
heap
page read and write
7FF848ACD000
trusted library allocation
page read and write
7FF84893C000
trusted library allocation
page execute and read and write
2341CEB6000
trusted library allocation
page read and write
7FF8489B4000
trusted library allocation
page execute and read and write
7FF848890000
trusted library allocation
page read and write
28004B70000
heap
page read and write
1EC81894000
trusted library allocation
page read and write
7FF848BF0000
trusted library allocation
page read and write
2183E66F000
trusted library allocation
page read and write
234356BE000
heap
page read and write
1E3B768C000
heap
page read and write
8C62947000
stack
page read and write
12C3000
heap
page read and write
1E3C9583000
trusted library allocation
page read and write
234354E0000
heap
page read and write
2343577E000
heap
page read and write
28007431000
trusted library allocation
page read and write
21856A77000
heap
page read and write
28004DE0000
trusted library allocation
page read and write
316E000
trusted library allocation
page read and write
7FF848BE2000
trusted library allocation
page read and write
2341CF84000
trusted library allocation
page read and write
12AC000
heap
page read and write
12CA000
heap
page read and write
7FF848BE8000
trusted library allocation
page read and write
7FF848A80000
trusted library allocation
page read and write
2800670F000
heap
page read and write
1735000
heap
page read and write
136A000
heap
page read and write
1E3C94A3000
trusted library allocation
page read and write
30E9000
trusted library allocation
page read and write
21856AC6000
heap
page read and write
7FF848AB0000
trusted library allocation
page read and write
28006EAD000
trusted library allocation
page read and write
2AEB89C7000
heap
page execute and read and write
2AEB6EF0000
heap
page read and write
2AEB6E77000
heap
page read and write
2341CD90000
trusted library allocation
page read and write
BB79A0C000
stack
page read and write
2AEB8832000
heap
page read and write
3071000
trusted library allocation
page read and write
234352C0000
heap
page read and write
2092520A000
heap
page read and write
234356C0000
heap
page read and write
7FF848BEC000
trusted library allocation
page read and write
7FF848930000
trusted library allocation
page read and write
2183E31C000
trusted library allocation
page read and write
28004C43000
heap
page read and write
7FF848CE0000
trusted library allocation
page read and write
20937469000
trusted library allocation
page read and write
8C62A4E000
stack
page read and write
BB788FF000
stack
page read and write
7FF8488AD000
trusted library allocation
page execute and read and write
2093F4E0000
heap
page execute and read and write
136E000
heap
page read and write
2AEB6F70000
trusted library section
page read and write
3181000
trusted library allocation
page read and write
1ECF20C0000
heap
page readonly
F41000
stack
page read and write
7FF848AF0000
trusted library allocation
page read and write
2AED0DE3000
heap
page read and write
2801EF52000
heap
page read and write
28006965000
heap
page read and write
7FF848936000
trusted library allocation
page read and write
20925140000
heap
page read and write
1E3D1B87000
heap
page read and write
1EC90011000
trusted library allocation
page read and write
28016A11000
trusted library allocation
page read and write
7FF848960000
trusted library allocation
page execute and read and write
21856B80000
heap
page read and write
7FF848AE0000
trusted library allocation
page read and write
2184E483000
trusted library allocation
page read and write
1EC804CD000
trusted library allocation
page read and write
2183E020000
heap
page read and write
7FF848BD0000
trusted library allocation
page read and write
2AEB8A01000
trusted library allocation
page read and write
2183C6B5000
heap
page read and write
23435338000
heap
page read and write
2183E53E000
trusted library allocation
page read and write
1ECF4375000
heap
page read and write
97F95EE000
stack
page read and write
2183E542000
trusted library allocation
page read and write
7FF848B50000
trusted library allocation
page execute and read and write
20937163000
trusted library allocation
page read and write
21856B79000
heap
page read and write
5B579FC000
stack
page read and write
7FF848B6D000
trusted library allocation
page read and write
2183E586000
trusted library allocation
page read and write
7FF8488B4000
trusted library allocation
page read and write
1E3B75E0000
heap
page read and write
1BD4E000
stack
page read and write
7FF8488CB000
trusted library allocation
page execute and read and write
1BDD9000
heap
page read and write
1730000
heap
page read and write
CDCF3E1000
stack
page read and write
7FF8488C4000
trusted library allocation
page read and write
1BA50000
heap
page execute and read and write
2183E43D000
trusted library allocation
page read and write
7FF848B00000
trusted library allocation
page read and write
7FF848986000
trusted library allocation
page execute and read and write
5B561F7000
stack
page read and write
7FF848C00000
trusted library allocation
page read and write
1E3C9A01000
trusted library allocation
page read and write
1C14E000
stack
page read and write
2AED1115000
heap
page read and write
311A000
trusted library allocation
page read and write
2AEB6E3D000
heap
page read and write
2183C250000
heap
page read and write
234352B9000
heap
page read and write
7FF8488B2000
trusted library allocation
page read and write
1E3B7692000
heap
page read and write
2341CAD8000
trusted library allocation
page read and write
12D2000
heap
page read and write
1E3C99B1000
trusted library allocation
page read and write
7FF848884000
trusted library allocation
page read and write
7FF848B70000
trusted library allocation
page read and write
218561F0000
trusted library allocation
page read and write
2341AF70000
heap
page read and write
7FF848C80000
trusted library allocation
page read and write
2341AFA2000
heap
page read and write
1E3C9683000
trusted library allocation
page read and write
7FF848B50000
trusted library allocation
page read and write
7FF848B10000
trusted library allocation
page read and write
2AEC8A31000
trusted library allocation
page read and write
7FF8488A3000
trusted library allocation
page execute and read and write
2341CB72000
trusted library allocation
page read and write
7FF848B50000
trusted library allocation
page read and write
2AEB9B66000
trusted library allocation
page read and write
7FF848893000
trusted library allocation
page execute and read and write
130C000
heap
page read and write
BB78E3E000
stack
page read and write
2183C2A0000
trusted library allocation
page read and write
2AED1090000
heap
page read and write
7FF8488CB000
trusted library allocation
page execute and read and write
280169E1000
trusted library allocation
page read and write
1E3B75C0000
heap
page read and write
2800794E000
trusted library allocation
page read and write
2AEB9A0E000
trusted library allocation
page read and write
7FF848B10000
trusted library allocation
page read and write
2AED0DF0000
heap
page read and write
7FF848B10000
trusted library allocation
page read and write
7FF8488BA000
trusted library allocation
page read and write
BB78CBC000
stack
page read and write
7FF848A3A000
trusted library allocation
page read and write
2AEB89F0000
heap
page read and write
234352A0000
heap
page read and write
1270000
heap
page read and write
7FF8488B0000
trusted library allocation
page read and write
7FF848BEC000
trusted library allocation
page read and write
3164000
trusted library allocation
page read and write
BB78FBB000
stack
page read and write
2184E949000
trusted library allocation
page read and write
234352D6000
heap
page read and write
7FF848B10000
trusted library allocation
page read and write
7FF848D0F000
trusted library allocation
page read and write
21856B00000
heap
page read and write
7FF848A40000
trusted library allocation
page read and write
1D56A000
stack
page read and write
2341CC00000
trusted library allocation
page read and write
2183E026000
heap
page read and write
7FF84895C000
trusted library allocation
page execute and read and write
23435605000
heap
page read and write
7FF848AD0000
trusted library allocation
page read and write
7FF8489E3000
trusted library allocation
page execute and read and write
1EC80F91000
trusted library allocation
page read and write
1ECF1FD1000
heap
page read and write
28004C00000
heap
page read and write
313C000
trusted library allocation
page read and write
97FAACC000
stack
page read and write
234356FA000
heap
page read and write
7FF848B00000
trusted library allocation
page read and write
28006932000
heap
page read and write
2AED0FC0000
heap
page execute and read and write
7FF848A50000
trusted library allocation
page execute and read and write
7FF848AC0000
trusted library allocation
page read and write
21856AB2000
heap
page read and write
7FF848B60000
trusted library allocation
page read and write
2183E063000
heap
page read and write
21856C03000
heap
page read and write
BB78DBE000
stack
page read and write
7FF8488A0000
trusted library allocation
page read and write
7FF8488A3000
trusted library allocation
page execute and read and write
2184E4C3000
trusted library allocation
page read and write
21856A30000
heap
page read and write
7FF848BEA000
trusted library allocation
page read and write
2341CBAA000
trusted library allocation
page read and write
2AEBA7E2000
trusted library allocation
page read and write
7FF8488C4000
trusted library allocation
page read and write
1E3B78E0000
heap
page read and write
5B56DFE000
stack
page read and write
A85B3FF000
stack
page read and write
2183E756000
trusted library allocation
page read and write
7FF848BD9000
trusted library allocation
page read and write
209251A8000
heap
page read and write
BB78F3E000
stack
page read and write
7FF848950000
trusted library allocation
page execute and read and write
1E3B95A9000
trusted library allocation
page read and write
7FF8489A0000
trusted library allocation
page execute and read and write
2183C4B0000
heap
page execute and read and write
2183E097000
heap
page read and write
8C61C7F000
stack
page read and write
2183E11E000
heap
page read and write
1ECF43D8000
heap
page read and write
7FF8489B0000
trusted library allocation
page execute and read and write
28016CD8000
trusted library allocation
page read and write
7FF8488C0000
trusted library allocation
page read and write
2AEB7005000
heap
page read and write
2AED1156000
heap
page read and write
2AEB9633000
trusted library allocation
page read and write
2185689C000
heap
page read and write
8C61CFF000
stack
page read and write
21856B7E000
heap
page read and write
7FF848A4A000
trusted library allocation
page read and write
234353EC000
heap
page read and write
2AEB7040000
trusted library allocation
page read and write
2801EF44000
heap
page read and write
7FF848BD9000
trusted library allocation
page read and write
23435747000
heap
page read and write
21856C4A000
heap
page read and write
2341AE90000
heap
page read and write
CDCFBFE000
stack
page read and write
2092517C000
heap
page read and write
8C61B78000
stack
page read and write
2AEB6EEA000
heap
page read and write
7FF848C73000
trusted library allocation
page read and write
7FF848A50000
trusted library allocation
page read and write
1ECF44A5000
heap
page read and write
1EC81219000
trusted library allocation
page read and write
7FF8488CD000
trusted library allocation
page execute and read and write
7FF848A35000
trusted library allocation
page read and write
7DF44C750000
trusted library allocation
page execute and read and write
8C629CD000
stack
page read and write
BB78D39000
stack
page read and write
1E3C9503000
trusted library allocation
page read and write
1EC81E2B000
trusted library allocation
page read and write
7FF848A80000
trusted library allocation
page read and write
7FF848A3A000
trusted library allocation
page read and write
1EC81035000
trusted library allocation
page read and write
2341CD4F000
trusted library allocation
page read and write
2183E7A1000
trusted library allocation
page read and write
21856A8D000
heap
page read and write
2AED1166000
heap
page read and write
28004DF0000
heap
page readonly
7FF848A67000
trusted library allocation
page read and write
1EC80D7B000
trusted library allocation
page read and write
2AEBA294000
trusted library allocation
page read and write
7FF848C40000
trusted library allocation
page read and write
28006A67000
trusted library allocation
page read and write
7FF8488B0000
trusted library allocation
page read and write
218568F4000
heap
page read and write
3121000
trusted library allocation
page read and write
97F9C7E000
stack
page read and write
1E3B7850000
heap
page execute and read and write
209253D0000
heap
page read and write
2AEB6FC0000
heap
page readonly
2183E55D000
trusted library allocation
page read and write
7FF848CE0000
trusted library allocation
page read and write
1BDA6000
heap
page read and write
7FF848B30000
trusted library allocation
page read and write
5B551FD000
stack
page read and write
BB7897A000
stack
page read and write
3104000
trusted library allocation
page read and write
BB78C36000
stack
page read and write
21856C13000
heap
page read and write
209374E1000
trusted library allocation
page read and write
28004C3C000
heap
page read and write
2AED0E1B000
heap
page read and write
2341CDD4000
trusted library allocation
page read and write
7FF84888D000
trusted library allocation
page execute and read and write
2183E4D1000
trusted library allocation
page read and write
2183E308000
trusted library allocation
page read and write
7FF8488BB000
trusted library allocation
page execute and read and write
1C248000
stack
page read and write
1EC902F9000
trusted library allocation
page read and write
7FF848883000
trusted library allocation
page execute and read and write
2183C36D000
heap
page read and write
280087C8000
trusted library allocation
page read and write
2183E4D7000
trusted library allocation
page read and write
2AEC8A01000
trusted library allocation
page read and write
28016A01000
trusted library allocation
page read and write
2183E519000
trusted library allocation
page read and write
1C04E000
stack
page read and write
234355F7000
heap
page read and write
2AEB6FB0000
trusted library allocation
page read and write
7FF8489C0000
trusted library allocation
page execute and read and write
2AEB99A1000
trusted library allocation
page read and write
2183E07B000
heap
page read and write
1ECF1F10000
heap
page read and write
234353D9000
heap
page read and write
28006991000
heap
page read and write
8C616FD000
stack
page read and write
97FAA4C000
stack
page read and write
1E3B79E0000
heap
page execute and read and write
7FF848AF0000
trusted library allocation
page read and write
7FF848BD9000
trusted library allocation
page read and write
2341AF10000
trusted library allocation
page read and write
21856F80000
heap
page execute and read and write
28004E97000
heap
page execute and read and write
7FF848A40000
trusted library allocation
page read and write
2AEB9A9D000
trusted library allocation
page read and write
7FF848AED000
trusted library allocation
page read and write
21856AC4000
heap
page read and write
218569FB000
heap
page read and write
1E3D1AD0000
heap
page read and write
1E3B7658000
heap
page read and write
7FF848B40000
trusted library allocation
page read and write
7FF848A40000
trusted library allocation
page read and write
DE0000
unkown
page readonly
1ECF40BE000
heap
page read and write
1E3B94D8000
trusted library allocation
page read and write
2341CE91000
trusted library allocation
page read and write
7FF848BE5000
trusted library allocation
page read and write
28004CF7000
heap
page read and write
97F9A7E000
stack
page read and write
21856990000
heap
page read and write
2343528A000
heap
page read and write
7FF848C00000
trusted library allocation
page execute and read and write
2341AF72000
heap
page read and write
7FF84893C000
trusted library allocation
page execute and read and write
7FF848966000
trusted library allocation
page read and write
23435282000
heap
page read and write
2AEB7085000
heap
page read and write
A85ABE1000
stack
page read and write
2183E655000
trusted library allocation
page read and write
7FF848883000
trusted library allocation
page execute and read and write
7FF848AE0000
trusted library allocation
page read and write
7FF8488CA000
trusted library allocation
page read and write
7FF848A64000
trusted library allocation
page read and write
28004C08000
heap
page read and write
2183E367000
trusted library allocation
page read and write
28004C8D000
heap
page read and write
7DF40E1D0000
trusted library allocation
page execute and read and write
7DF40E1E0000
trusted library allocation
page execute and read and write
1CD6F000
stack
page read and write
7FF848BF0000
trusted library allocation
page read and write
280075D3000
trusted library allocation
page read and write
7FF8488C2000
trusted library allocation
page read and write
1263000
trusted library allocation
page read and write
2183E763000
trusted library allocation
page read and write
8C6177E000
stack
page read and write
2184EACD000
trusted library allocation
page read and write
7FF848B50000
trusted library allocation
page read and write
280076F1000
trusted library allocation
page read and write
218569C5000
heap
page read and write
7FF848930000
trusted library allocation
page read and write
2183E2DA000
trusted library allocation
page read and write
2183E2CD000
trusted library allocation
page read and write
1ECF1FB0000
heap
page read and write
7FF848B30000
trusted library allocation
page read and write
2AEB9BE2000
trusted library allocation
page read and write
8C6284C000
stack
page read and write
2343571B000
heap
page read and write
2341CEA4000
trusted library allocation
page read and write
97F9AF8000
stack
page read and write
8C6197B000
stack
page read and write
2AEB9D10000
trusted library allocation
page read and write
7FF848A90000
trusted library allocation
page read and write
2801EFA7000
heap
page read and write
2341CDE2000
trusted library allocation
page read and write
97F9E7B000
stack
page read and write
2800827A000
trusted library allocation
page read and write
2183E505000
trusted library allocation
page read and write
2183E6C1000
trusted library allocation
page read and write
2183E48C000
trusted library allocation
page read and write
7FF848AB8000
trusted library allocation
page read and write
7FF84890C000
trusted library allocation
page execute and read and write
234356D6000
heap
page read and write
2341CEAA000
trusted library allocation
page read and write
7FF848986000
trusted library allocation
page execute and read and write
1BE27000
heap
page read and write
7FF8488A4000
trusted library allocation
page read and write
7FF848CF0000
trusted library allocation
page read and write
2183E11A000
heap
page read and write
2800880D000
trusted library allocation
page read and write
A85C3FF000
stack
page read and write
2AEB6DF0000
heap
page read and write
7FF848AB0000
trusted library allocation
page read and write
7FF84889D000
trusted library allocation
page execute and read and write
7FF848966000
trusted library allocation
page execute and read and write
7FF8488A0000
trusted library allocation
page read and write
7FF848A70000
trusted library allocation
page execute and read and write
FC0000
heap
page read and write
BB79B8E000
stack
page read and write
28004F55000
heap
page read and write
1EC8186D000
trusted library allocation
page read and write
7FF848B80000
trusted library allocation
page read and write
7FF848AA0000
trusted library allocation
page read and write
2183E37A000
trusted library allocation
page read and write
21856BF7000
heap
page read and write
7FF848AE8000
trusted library allocation
page read and write
2800795B000
trusted library allocation
page read and write
7FF848A70000
trusted library allocation
page read and write
21F4BFF000
stack
page read and write
20936FE3000
trusted library allocation
page read and write
2341CC26000
trusted library allocation
page read and write
2183C2C0000
heap
page read and write
1ECF3CD0000
heap
page execute and read and write
7FF848AD6000
trusted library allocation
page read and write
7FF8488BD000
trusted library allocation
page execute and read and write
2341CC7E000
trusted library allocation
page read and write
1ECF1F50000
heap
page read and write
7FF848A5E000
trusted library allocation
page read and write
7FF848AF0000
trusted library allocation
page read and write
2801EFB3000
heap
page read and write
2183C6BE000
heap
page read and write
2183E5B4000
trusted library allocation
page read and write
1ECF3BE8000
heap
page read and write
2800833B000
trusted library allocation
page read and write
97FA8CC000
stack
page read and write
2183C2C6000
heap
page read and write
2341AEB0000
heap
page read and write
CDD0BFF000
stack
page read and write
23435290000
heap
page read and write
F90000
heap
page read and write
7FF848CC0000
trusted library allocation
page read and write
2183C200000
heap
page read and write
28007CEB000
trusted library allocation
page read and write
7FF446DD0000
trusted library allocation
page execute and read and write
2801EE30000
heap
page read and write
7FF848B10000
trusted library allocation
page read and write
1ECF4419000
heap
page read and write
20925148000
heap
page read and write
7FF8488BD000
trusted library allocation
page execute and read and write
21856A7B000
heap
page read and write
7FF848B30000
trusted library allocation
page read and write
2AED0D40000
heap
page read and write
8C61A79000
stack
page read and write
1E3C94AB000
trusted library allocation
page read and write
28016CE9000
trusted library allocation
page read and write
1275000
heap
page read and write
7FF848A50000
trusted library allocation
page execute and read and write
2341AF5E000
heap
page read and write
7FF8488CD000
trusted library allocation
page execute and read and write
97F952E000
stack
page read and write
23435594000
heap
page read and write
234354C0000
heap
page read and write
7FF848CC0000
trusted library allocation
page read and write
1E3B7A55000
heap
page read and write
5B565FC000
stack
page read and write
21856A13000
heap
page read and write
1E3B93E2000
trusted library allocation
page read and write
7FF8488C0000
trusted library allocation
page read and write
2341CC8C000
trusted library allocation
page read and write
7FF848A67000
trusted library allocation
page read and write
7FF8488DC000
trusted library allocation
page execute and read and write
97F9D79000
stack
page read and write
CDD0FFE000
stack
page read and write
7FF848BEA000
trusted library allocation
page read and write
7FF848BD0000
trusted library allocation
page read and write
7FF848946000
trusted library allocation
page read and write
2341AE70000
heap
page read and write
28016D60000
trusted library allocation
page read and write
2183E771000
trusted library allocation
page read and write
1EC80C05000
trusted library allocation
page read and write
1E3D1B7F000
heap
page read and write
2183E7D4000
trusted library allocation
page read and write
21856888000
heap
page read and write
1EC813CB000
trusted library allocation
page read and write
1E3C94C3000
trusted library allocation
page read and write
2AEB9DC9000
trusted library allocation
page read and write
2341CD1F000
trusted library allocation
page read and write
1ECF4320000
heap
page read and write
1BAA0000
heap
page read and write
280068B0000
heap
page read and write
97FA84E000
stack
page read and write
23435562000
heap
page read and write
2183E6ED000
trusted library allocation
page read and write
2AED1210000
trusted library allocation
page read and write
7FF848A50000
trusted library allocation
page execute and read and write
1CC6D000
stack
page read and write
2183E7BB000
trusted library allocation
page read and write
28004BB0000
heap
page read and write
23435726000
heap
page read and write
2183E0CA000
heap
page read and write
5B55DFE000
stack
page read and write
21856C26000
heap
page read and write
2801EF28000
heap
page read and write
2183E2F5000
trusted library allocation
page read and write
1600000
heap
page read and write
2183E6E1000
trusted library allocation
page read and write
7FF848A68000
trusted library allocation
page read and write
28004E00000
trusted library allocation
page read and write
12A0000
heap
page read and write
20936E84000
trusted library allocation
page read and write
7FF8488DC000
trusted library allocation
page execute and read and write
7FF848C7C000
trusted library allocation
page read and write
7FF848AC0000
trusted library allocation
page read and write
5B54DFE000
stack
page read and write
7FF848ACF000
trusted library allocation
page read and write
7FF848960000
trusted library allocation
page execute and read and write
2341CF1F000
trusted library allocation
page read and write
28004EF0000
heap
page read and write
2183E040000
heap
page read and write
2AED0FF0000
heap
page read and write
7FF8488DD000
trusted library allocation
page execute and read and write
23435270000
heap
page read and write
2184E266000
trusted library allocation
page read and write
28006986000
heap
page read and write
7FF848AC8000
trusted library allocation
page read and write
30D8000
trusted library allocation
page read and write
234353C0000
heap
page read and write
7FF8489B0000
trusted library allocation
page execute and read and write
234354F4000
heap
page read and write
2183E6E7000
trusted library allocation
page read and write
23435360000
trusted library section
page read and write
7FF848B50000
trusted library allocation
page execute and read and write
7FF848AC0000
trusted library allocation
page read and write
2183E5FE000
trusted library allocation
page read and write
20937261000
trusted library allocation
page read and write
7FF848B32000
trusted library allocation
page read and write
130E000
heap
page read and write
2341CA96000
trusted library allocation
page read and write
1ECF3BA6000
heap
page execute and read and write
7FF848AC6000
trusted library allocation
page read and write
7FF848BEC000
trusted library allocation
page read and write
7FF848C70000
trusted library allocation
page read and write
28006830000
heap
page read and write
20925130000
trusted library allocation
page read and write
A85BFFF000
stack
page read and write
7FF848AB0000
trusted library allocation
page read and write
218568EE000
heap
page read and write
7FF848A70000
trusted library allocation
page execute and read and write
7FF848A3A000
trusted library allocation
page read and write
2184E643000
trusted library allocation
page read and write
20925205000
heap
page read and write
7FF848AFA000
trusted library allocation
page read and write
2AED0D7F000
heap
page read and write
7FF848B10000
trusted library allocation
page read and write
234352C4000
heap
page read and write
1ECF42E0000
heap
page read and write
7FF8488B0000
trusted library allocation
page read and write
1E3B7833000
trusted library allocation
page read and write
7FF848A40000
trusted library allocation
page read and write
7FF848B34000
trusted library allocation
page read and write
7FF848BE8000
trusted library allocation
page read and write
7DF40E1C0000
trusted library allocation
page execute and read and write
2342C991000
trusted library allocation
page read and write
23435548000
heap
page read and write
7FF848884000
trusted library allocation
page read and write
BB7887E000
stack
page read and write
2184E543000
trusted library allocation
page read and write
1E3D1200000
trusted library allocation
page read and write
7FF8488D0000
trusted library allocation
page read and write
2AEC8D0B000
trusted library allocation
page read and write
7FF848CD0000
trusted library allocation
page read and write
7FF8488A2000
trusted library allocation
page read and write
1ECF2090000
trusted library allocation
page read and write
7FF848C7A000
trusted library allocation
page read and write
1E3D1B90000
heap
page read and write
2183E0B6000
heap
page read and write
7FF8488BD000
trusted library allocation
page execute and read and write
7FF8489A0000
trusted library allocation
page execute and read and write
7FF848956000
trusted library allocation
page read and write
20936F83000
trusted library allocation
page read and write
7FF848A90000
trusted library allocation
page read and write
1ECF3B05000
heap
page read and write
5B555FE000
stack
page read and write
7FF848BB3000
trusted library allocation
page read and write
21F57FF000
stack
page read and write
1ECF398D000
heap
page read and write
23435579000
heap
page read and write
2341CB3D000
trusted library allocation
page read and write
97F987F000
stack
page read and write
20936D86000
trusted library allocation
page read and write
2800794A000
trusted library allocation
page read and write
7FF848B60000
trusted library allocation
page read and write
7FF848AB4000
trusted library allocation
page read and write
1EC81169000
trusted library allocation
page read and write
7FF848CF0000
trusted library allocation
page read and write
2183E743000
trusted library allocation
page read and write
23435580000
heap
page read and write
97F997F000
stack
page read and write
23435509000
heap
page read and write
7FF8489D0000
trusted library allocation
page execute and read and write
BB78B79000
stack
page read and write
2343551B000
heap
page read and write
2341CF19000
trusted library allocation
page read and write
2341CE2B000
trusted library allocation
page read and write
7FF848A5C000
trusted library allocation
page read and write
7FF848AD0000
trusted library allocation
page read and write
2183E6FF000
trusted library allocation
page read and write
2183E06B000
heap
page read and write
1ECF447A000
heap
page read and write
7FF848966000
trusted library allocation
page execute and read and write
2341AF25000
heap
page read and write
2343543E000
heap
page read and write
1EC8138D000
trusted library allocation
page read and write
28007A76000
trusted library allocation
page read and write
2AEC8A73000
trusted library allocation
page read and write
1ECF1FFC000
heap
page read and write
234352DE000
heap
page read and write
7FF848A80000
trusted library allocation
page read and write
28004BD0000
trusted library section
page read and write
2341CBEC000
trusted library allocation
page read and write
BB78573000
stack
page read and write
2341CBD2000
trusted library allocation
page read and write
8C61673000
stack
page read and write
28004C49000
heap
page read and write
1EC81009000
trusted library allocation
page read and write
21856886000
heap
page read and write
7FF848996000
trusted library allocation
page execute and read and write
2341B026000
heap
page read and write
1ECF4311000
heap
page read and write
3060000
heap
page execute and read and write
23435568000
heap
page read and write
23435730000
heap
page read and write
1ECF4405000
heap
page read and write
8C628CE000
stack
page read and write
21856B12000
heap
page read and write
7FF848B52000
trusted library allocation
page read and write
20924FC0000
heap
page read and write
1250000
trusted library allocation
page read and write
2341CE9E000
trusted library allocation
page read and write
28004E90000
heap
page execute and read and write
1ECF3C4D000
heap
page read and write
7FF848890000
trusted library allocation
page read and write
7FF848B00000
trusted library allocation
page read and write
1E3D1F00000
heap
page read and write
2AEB6FD0000
trusted library allocation
page read and write
1EC81955000
trusted library allocation
page read and write
2341CEB0000
trusted library allocation
page read and write
2343558D000
heap
page read and write
2341CC6F000
trusted library allocation
page read and write
7FF848A40000
trusted library allocation
page execute and read and write
1ECF3B0A000
heap
page read and write
1B5FD000
stack
page read and write
2AEB9452000
trusted library allocation
page read and write
5B541E1000
stack
page read and write
2184E971000
trusted library allocation
page read and write
7FF848AA0000
trusted library allocation
page read and write
1E3B7853000
heap
page execute and read and write
2AEBA26D000
trusted library allocation
page read and write
7FF848CB0000
trusted library allocation
page execute and read and write
30CF000
trusted library allocation
page read and write
218569A1000
heap
page read and write
28007956000
trusted library allocation
page read and write
20937526000
trusted library allocation
page read and write
20925165000
heap
page read and write
20925575000
heap
page read and write
1E3B766B000
heap
page read and write
7FF848C90000
trusted library allocation
page read and write
7FF848C10000
trusted library allocation
page read and write
7FF848A94000
trusted library allocation
page read and write
7FF848A94000
trusted library allocation
page read and write
2183E10E000
heap
page read and write
1EC90073000
trusted library allocation
page read and write
2343576B000
heap
page read and write
2184EA06000
trusted library allocation
page read and write
7FF848C10000
trusted library allocation
page read and write
28004BF0000
trusted library allocation
page read and write
28007952000
trusted library allocation
page read and write
2341CFC7000
trusted library allocation
page read and write
7FF8488B4000
trusted library allocation
page read and write
2183E34D000
trusted library allocation
page read and write
2AEBA82C000
trusted library allocation
page read and write
28004E30000
trusted library allocation
page read and write
2AEBA827000
trusted library allocation
page read and write
1ECF42F0000
heap
page read and write
97F94A3000
stack
page read and write
2184EA2E000
trusted library allocation
page read and write
2AED109A000
heap
page read and write
7FF848C90000
trusted library allocation
page read and write
2183E0A7000
heap
page read and write
2183E5D4000
trusted library allocation
page read and write
2FDE000
stack
page read and write
1ECF1FF7000
heap
page read and write
2AEB6E3B000
heap
page read and write
7FF848BE8000
trusted library allocation
page read and write
7FF848B80000
trusted library allocation
page read and write
21F43E1000
stack
page read and write
28006C09000
trusted library allocation
page read and write
1CB6E000
stack
page read and write
7FF848AB0000
trusted library allocation
page read and write
2183E30F000
trusted library allocation
page read and write
280069B0000
heap
page execute and read and write
1EC80A52000
trusted library allocation
page read and write
2341AC40000
unkown
page readonly
7FF84889B000
trusted library allocation
page read and write
1EC80C29000
trusted library allocation
page read and write
7FF84893C000
trusted library allocation
page execute and read and write
23435308000
heap
page read and write
2801F050000
trusted library allocation
page read and write
7FF848AE6000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
2341C8F0000
trusted library section
page read and write
1E3C9A46000
trusted library allocation
page read and write
1E3B78E5000
heap
page read and write
1EC90021000
trusted library allocation
page read and write
2183E64E000
trusted library allocation
page read and write
2800795F000
trusted library allocation
page read and write
1E3C9989000
trusted library allocation
page read and write
234352D0000
heap
page read and write
7FF848B40000
trusted library allocation
page read and write
7FF8488B0000
trusted library allocation
page read and write
2AEB8ECE000
trusted library allocation
page read and write
23435260000
heap
page read and write
2801EE54000
heap
page read and write
7FF848AD0000
trusted library allocation
page read and write
21856C46000
heap
page read and write
2341CCA7000
trusted library allocation
page read and write
7FF848BA0000
trusted library allocation
page read and write
7FF848A52000
trusted library allocation
page read and write
8C61D7E000
stack
page read and write
7FF848AF1000
trusted library allocation
page read and write
7FF848B40000
trusted library allocation
page read and write
7FF848A90000
trusted library allocation
page execute and read and write
234353DD000
heap
page read and write
7DF44C740000
trusted library allocation
page execute and read and write
234352A6000
heap
page read and write
2801EFCD000
heap
page read and write
2341CC33000
trusted library allocation
page read and write
21856B72000
heap
page read and write
7FF848CC0000
trusted library allocation
page read and write
7FF848AE0000
trusted library allocation
page read and write
7FF84889B000
trusted library allocation
page read and write
7FF848B40000
trusted library allocation
page read and write
12DF000
heap
page read and write
2183E499000
trusted library allocation
page read and write
7FF848AB0000
trusted library allocation
page read and write
2801EE5C000
heap
page read and write
2341CD84000
trusted library allocation
page read and write
7FF848CD0000
trusted library allocation
page read and write
7FF8488A4000
trusted library allocation
page read and write
209253D5000
heap
page read and write
21F53FD000
stack
page read and write
2341CECF000
trusted library allocation
page read and write
234353FF000
heap
page read and write
2341CD8A000
trusted library allocation
page read and write
2341CF97000
trusted library allocation
page read and write
21F47FF000
stack
page read and write
1ECF4473000
heap
page read and write
2341CACB000
trusted library allocation
page read and write
1ECF1FB9000
heap
page read and write
2AED113D000
heap
page read and write
BB78AFD000
stack
page read and write
7FF848A62000
trusted library allocation
page read and write
2341CAFA000
trusted library allocation
page read and write
7FF848AD6000
trusted library allocation
page read and write
1E3B7590000
heap
page read and write
2341AC42000
unkown
page readonly
2AEB9607000
trusted library allocation
page read and write
2AEBA355000
trusted library allocation
page read and write
1ECF3B00000
heap
page read and write
2343553B000
heap
page read and write
28007996000
trusted library allocation
page read and write
1EC8130F000
trusted library allocation
page read and write
1C96B000
stack
page read and write
28007BBE000
trusted library allocation
page read and write
218569AD000
heap
page read and write
7FF848C20000
trusted library allocation
page read and write
7FF848A68000
trusted library allocation
page read and write
7FF848A70000
trusted library allocation
page read and write
2341AEF0000
trusted library allocation
page read and write
7FF848890000
trusted library allocation
page read and write
218568AF000
heap
page read and write
7FF848CDD000
trusted library allocation
page read and write
280087ED000
trusted library allocation
page read and write
2183E6B4000
trusted library allocation
page read and write
1D36E000
stack
page read and write
7FF848AE0000
trusted library allocation
page read and write
2341CCD5000
trusted library allocation
page read and write
1D268000
stack
page read and write
21856A1C000
heap
page read and write
2341CB5D000
trusted library allocation
page read and write
7FF848B00000
trusted library allocation
page read and write
5B53BFE000
stack
page read and write
7FF848884000
trusted library allocation
page read and write
7FF848A5E000
trusted library allocation
page read and write
CDD07FC000
stack
page read and write
2341CE3F000
trusted library allocation
page read and write
21F5BFE000
stack
page read and write
1C543000
stack
page read and write
2800827F000
trusted library allocation
page read and write
7FF848930000
trusted library allocation
page read and write
7FF848C10000
trusted library allocation
page read and write
97F99F7000
stack
page read and write
28007B08000
trusted library allocation
page read and write
2AEB6F80000
trusted library section
page read and write
7FF848976000
trusted library allocation
page execute and read and write
20936CE1000
trusted library allocation
page read and write
7FF848AF0000
trusted library allocation
page read and write
1EC811E0000
trusted library allocation
page read and write
2341CE54000
trusted library allocation
page read and write
7FF848CA6000
trusted library allocation
page read and write
7FF84889D000
trusted library allocation
page execute and read and write
2AED115C000
heap
page read and write
2AEB6E2F000
heap
page read and write
21856A17000
heap
page read and write
7FF848AD4000
trusted library allocation
page read and write
2AED1350000
heap
page read and write
7FF848AA8000
trusted library allocation
page read and write
7FF8489F5000
trusted library allocation
page execute and read and write
8C61BFA000
stack
page read and write
2183C32B000
heap
page read and write
1CA6D000
stack
page read and write
1ECF2120000
trusted library allocation
page read and write
7FF8488FC000
trusted library allocation
page execute and read and write
1EC8007C000
trusted library allocation
page read and write
7FF848A22000
trusted library allocation
page read and write
2AEB977B000
trusted library allocation
page read and write
5B53BBE000
stack
page read and write
23435501000
heap
page read and write
23435426000
heap
page read and write
2183E7F0000
trusted library allocation
page read and write
2AEC8CF9000
trusted library allocation
page read and write
2184E741000
trusted library allocation
page read and write
2343533D000
heap
page read and write
7FF848940000
trusted library allocation
page read and write
1E3B78B0000
heap
page execute and read and write
7FF848AE0000
trusted library allocation
page read and write
7FF848AF6000
trusted library allocation
page read and write
28006984000
heap
page read and write
7FF8488B4000
trusted library allocation
page read and write
1ECF3B90000
trusted library allocation
page read and write
7FF848AE7000
trusted library allocation
page read and write
1E3D1B25000
heap
page read and write
2183E4E4000
trusted library allocation
page read and write
218568C4000
heap
page read and write
1D06A000
stack
page read and write
1BD50000
heap
page read and write
28007C8A000
trusted library allocation
page read and write
2183C301000
heap
page read and write
1ECF3AE0000
heap
page execute and read and write
7FF848B30000
trusted library allocation
page read and write
20937491000
trusted library allocation
page read and write
97F95AE000
stack
page read and write
28016CB6000
trusted library allocation
page read and write
1ECF4498000
heap
page read and write
7FF848AB0000
trusted library allocation
page read and write
2183E3A9000
trusted library allocation
page read and write
7FF848B20000
trusted library allocation
page read and write
1E3B7820000
trusted library allocation
page read and write
2801EF56000
heap
page read and write
2183E0F4000
heap
page read and write
7FF848BF0000
trusted library allocation
page read and write
7FF848A4D000
trusted library allocation
page read and write
BB789FE000
stack
page read and write
7FF848894000
trusted library allocation
page read and write
7FF848AC0000
trusted library allocation
page read and write
2341CCE2000
trusted library allocation
page read and write
1E3B76D4000
heap
page read and write
2341CEBC000
trusted library allocation
page read and write
97F9B77000
stack
page read and write
1C76B000
stack
page read and write
7FF848B20000
trusted library allocation
page read and write
7FF848BA0000
trusted library allocation
page read and write
7FF848AC0000
trusted library allocation
page read and write
5B569FA000
stack
page read and write
28016CCB000
trusted library allocation
page read and write
1E3B7A10000
trusted library allocation
page read and write
2184E463000
trusted library allocation
page read and write
7FF848AD0000
trusted library allocation
page read and write
2341CAAA000
trusted library allocation
page read and write
7FF848AD8000
trusted library allocation
page read and write
7FF848AC1000
trusted library allocation
page read and write
28004C4D000
heap
page read and write
7FF848BE5000
trusted library allocation
page read and write
1EC80001000
trusted library allocation
page read and write
7FF848C00000
trusted library allocation
page read and write
7FF848A70000
trusted library allocation
page execute and read and write
234352F4000
heap
page read and write
97FA94E000
stack
page read and write
7FF848A47000
trusted library allocation
page read and write
218569E6000
heap
page read and write
2AEB8960000
heap
page execute and read and write
2341CABE000
trusted library allocation
page read and write
7FF848AA0000
trusted library allocation
page read and write
28007DA7000
trusted library allocation
page read and write
7FF848A60000
trusted library allocation
page read and write
1EC81099000
trusted library allocation
page read and write
21856B87000
heap
page read and write
20936FA3000
trusted library allocation
page read and write
2184E9C1000
trusted library allocation
page read and write
7FF8489A0000
trusted library allocation
page execute and read and write
2342D24F000
trusted library allocation
page read and write
1C445000
stack
page read and write
1710000
heap
page read and write
5B575FD000
stack
page read and write
7FF848AA0000
trusted library allocation
page read and write
7FF848A22000
trusted library allocation
page read and write
3152000
trusted library allocation
page read and write
7FF848A31000
trusted library allocation
page read and write
7FF848B40000
trusted library allocation
page read and write
2343569E000
heap
page read and write
7FF8488C0000
trusted library allocation
page read and write
7FF848B40000
trusted library allocation
page read and write
2341CCBA000
trusted library allocation
page read and write
2183C4B3000
heap
page execute and read and write
7FF848A90000
trusted library allocation
page read and write
7FF848ABB000
trusted library allocation
page read and write
2183E338000
trusted library allocation
page read and write
2183E443000
trusted library allocation
page read and write
30FD000
trusted library allocation
page read and write
7FF848B30000
trusted library allocation
page read and write
2183E706000
trusted library allocation
page read and write
2341AF9C000
heap
page read and write
2184E1C1000
trusted library allocation
page read and write
2800816E000
trusted library allocation
page read and write
28007946000
trusted library allocation
page read and write
1ECF20E0000
heap
page read and write
7FF848D00000
trusted library allocation
page read and write
28016C1D000
trusted library allocation
page read and write
2183E430000
trusted library allocation
page read and write
2AEC8CFB000
trusted library allocation
page read and write
7FF848AD1000
trusted library allocation
page read and write
7FF848B81000
trusted library allocation
page read and write
2185698B000
heap
page read and write
2AEB6F90000
trusted library allocation
page read and write
1ECF40A5000
heap
page read and write
2801F0C0000
heap
page read and write
1EC902EC000
trusted library allocation
page read and write
28004C5F000
heap
page read and write
28016A52000
trusted library allocation
page read and write
1ECF43CE000
heap
page read and write
2AED0EE0000
heap
page read and write
7FF8488B4000
trusted library allocation
page read and write
1CD80000
heap
page read and write
318E000
trusted library allocation
page read and write
7FF848CB0000
trusted library allocation
page read and write
28004F50000
heap
page read and write
8C61AF7000
stack
page read and write
7FF84888D000
trusted library allocation
page execute and read and write
23435737000
heap
page read and write
2183E5A7000
trusted library allocation
page read and write
7FF848B00000
trusted library allocation
page read and write
2183E59A000
trusted library allocation
page read and write
218568E5000
heap
page read and write
2AEC8CF3000
trusted library allocation
page read and write
2183E7A7000
trusted library allocation
page read and write
2183E3C4000
trusted library allocation
page read and write
28006921000
heap
page read and write
2341AEBE000
heap
page read and write
218569CF000
heap
page read and write
2183C2E2000
heap
page read and write
2341CD70000
trusted library allocation
page read and write
21856A83000
heap
page read and write
3102000
trusted library allocation
page read and write
2184E46B000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
2AEB7000000
heap
page read and write
7FF848AC0000
trusted library allocation
page read and write
1E3C93A4000
trusted library allocation
page read and write
28004B40000
heap
page read and write
21856BB7000
heap
page read and write
21856BE4000
heap
page read and write
7FF8488BD000
trusted library allocation
page execute and read and write
2AEB6E39000
heap
page read and write
1CD70000
heap
page read and write
1EC81E06000
trusted library allocation
page read and write
3118000
trusted library allocation
page read and write
7FF848956000
trusted library allocation
page read and write
5B571F8000
stack
page read and write
2183C585000
heap
page read and write
7FF848B1B000
trusted library allocation
page read and write
28004B50000
heap
page read and write
21856880000
heap
page read and write
2183E402000
trusted library allocation
page read and write
2183DFC0000
heap
page read and write
7FF848CF0000
trusted library allocation
page read and write
1EC80228000
trusted library allocation
page read and write
1ECF44AC000
heap
page read and write
7FF8488A0000
trusted library allocation
page read and write
7FF8488FC000
trusted library allocation
page execute and read and write
28007BF7000
trusted library allocation
page read and write
7FF848AE6000
trusted library allocation
page read and write
1ECF4485000
heap
page read and write
7FF848AD6000
trusted library allocation
page read and write
2183C332000
heap
page read and write
20925500000
heap
page read and write
7FF8488B2000
trusted library allocation
page read and write
1ECF20F0000
trusted library allocation
page read and write
7FF848880000
trusted library allocation
page read and write
1EC812AE000
trusted library allocation
page read and write
20925570000
heap
page read and write
1D46C000
stack
page read and write
7FF848AD0000
trusted library allocation
page read and write
1E3B75A0000
heap
page read and write
2183E50C000
trusted library allocation
page read and write
2AEC8CEC000
trusted library allocation
page read and write
2183C598000
heap
page read and write
7FF848BB3000
trusted library allocation
page read and write
1ECF1FF9000
heap
page read and write
3192000
trusted library allocation
page read and write
2183E7E1000
trusted library allocation
page read and write
7FF84889B000
trusted library allocation
page read and write
7FF848BB3000
trusted library allocation
page read and write
2183E08A000
heap
page read and write
7FF848966000
trusted library allocation
page execute and read and write
1EC810C5000
trusted library allocation
page read and write
1E3D1230000
trusted library allocation
page read and write
234354D2000
heap
page read and write
2341CCC8000
trusted library allocation
page read and write
7FF848B60000
trusted library allocation
page execute and read and write
7FF8488D4000
trusted library allocation
page read and write
7FF848950000
trusted library allocation
page read and write
97F9CFF000
stack
page read and write
7FF848B60000
trusted library allocation
page read and write
1BA3E000
stack
page read and write
280069D0000
heap
page execute and read and write
21856C3F000
heap
page read and write
7FF848A80000
trusted library allocation
page read and write
2341CD3E000
trusted library allocation
page read and write
7FF848BB0000
trusted library allocation
page read and write
A85AFFE000
stack
page read and write
234354C8000
heap
page read and write
2183C490000
trusted library allocation
page read and write
7FF848BA0000
trusted library allocation
page read and write
1ECF3BE6000
heap
page read and write
1ECF43DA000
heap
page read and write
21856B93000
heap
page read and write
7FF848AB0000
trusted library allocation
page read and write
7FF848B70000
trusted library allocation
page read and write
7FF848B90000
trusted library allocation
page read and write
2AED107C000
heap
page read and write
7FF848A50000
trusted library allocation
page read and write
28004C3F000
heap
page read and write
7FF848A40000
trusted library allocation
page execute and read and write
7FF848A57000
trusted library allocation
page read and write
1BAA3000
heap
page read and write
20937063000
trusted library allocation
page read and write
2183E61F000
trusted library allocation
page read and write
21856BC5000
heap
page read and write
2341CBDF000
trusted library allocation
page read and write
7FF848893000
trusted library allocation
page execute and read and write
28004E70000
trusted library allocation
page read and write
7FF848950000
trusted library allocation
page read and write
2341CC5C000
trusted library allocation
page read and write
2092517A000
heap
page read and write
7FF848C30000
trusted library allocation
page execute and read and write
7FF848A60000
trusted library allocation
page read and write
2341C800000
heap
page execute and read and write
2183E0FE000
heap
page read and write
2341AEB5000
heap
page read and write
7FF8488AD000
trusted library allocation
page execute and read and write
8C618FE000
stack
page read and write
7FF848A5B000
trusted library allocation
page read and write
12A6000
heap
page read and write
1EC8112A000
trusted library allocation
page read and write
311F000
trusted library allocation
page read and write
2AEC8A21000
trusted library allocation
page read and write
7DF480F60000
trusted library allocation
page execute and read and write
1ECF4315000
heap
page read and write
7FF8488A0000
trusted library allocation
page read and write
2341CDDB000
trusted library allocation
page read and write
7FF848894000
trusted library allocation
page read and write
21856A10000
heap
page read and write
7FF848B00000
trusted library allocation
page read and write
7FF848940000
trusted library allocation
page read and write
7FF848AC8000
trusted library allocation
page read and write
28004C88000
heap
page read and write
7FF8489C0000
trusted library allocation
page execute and read and write
1BDF3000
heap
page read and write
7DF480F50000
trusted library allocation
page execute and read and write
2341C980000
heap
page read and write
2341AF36000
heap
page read and write
2183C6B0000
heap
page read and write
2AEC8E85000
trusted library allocation
page read and write
7FF848AE0000
trusted library allocation
page read and write
23435438000
heap
page read and write
7FF848B20000
trusted library allocation
page read and write
134B000
heap
page read and write
1E3B76AC000
heap
page read and write
7FF848890000
trusted library allocation
page read and write
2183E2BC000
trusted library allocation
page read and write
21856980000
heap
page read and write
21856BCB000
heap
page read and write
1E3B7630000
trusted library allocation
page read and write
FE0000
heap
page read and write
BB7998E000
stack
page read and write
2183E38D000
trusted library allocation
page read and write
1ECF3C3B000
heap
page read and write
1EC902F1000
trusted library allocation
page read and write
7FF848C10000
trusted library allocation
page read and write
209250E0000
heap
page read and write
2343554D000
heap
page read and write
23435783000
heap
page read and write
BB79B8C000
stack
page read and write
7FF848C8E000
trusted library allocation
page read and write
2183C230000
heap
page read and write
8C617FE000
stack
page read and write
28004EF5000
heap
page read and write
2341CF63000
trusted library allocation
page read and write
7FF848A44000
trusted library allocation
page read and write
2183E024000
heap
page read and write
7FF848946000
trusted library allocation
page read and write
7FF848B29000
trusted library allocation
page read and write
1EC81E26000
trusted library allocation
page read and write
7FF84896C000
trusted library allocation
page execute and read and write
7FF848CA0000
trusted library allocation
page read and write
7FF848A80000
trusted library allocation
page execute and read and write
2183C580000
heap
page read and write
2341CEF8000
trusted library allocation
page read and write
7FF8488A0000
trusted library allocation
page read and write
28007A10000
trusted library allocation
page read and write
7FF848BE2000
trusted library allocation
page read and write
2AEB6F50000
heap
page read and write
2183E46A000
trusted library allocation
page read and write
2AEB9AC9000
trusted library allocation
page read and write
7FF848AA4000
trusted library allocation
page read and write
7FF8488BB000
trusted library allocation
page execute and read and write
7FF848CA0000
trusted library allocation
page execute and read and write
2AED10B0000
heap
page read and write
7FF848BF0000
trusted library allocation
page read and write
2343555A000
heap
page read and write
7FF848A40000
trusted library allocation
page execute and read and write
2341CB30000
trusted library allocation
page read and write
1E3C97D0000
trusted library allocation
page read and write
2AEB9B2B000
trusted library allocation
page read and write
2183E092000
heap
page read and write
7FF8488AD000
trusted library allocation
page execute and read and write
7FF848AF0000
trusted library allocation
page read and write
234353C6000
heap
page read and write
2AEB8C29000
trusted library allocation
page read and write
1E3B95DD000
trusted library allocation
page read and write
97F98F9000
stack
page read and write
7FF84888D000
trusted library allocation
page execute and read and write
7FF848B50000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
209253F0000
trusted library allocation
page read and write
21856C0B000
heap
page read and write
2341AF20000
heap
page read and write
23435760000
heap
page read and write
2183C2EC000
heap
page read and write
BB78A79000
stack
page read and write
7FF8488DB000
trusted library allocation
page execute and read and write
5B545FD000
stack
page read and write
2183C2FF000
heap
page read and write
1E3B7830000
trusted library allocation
page read and write
1E3B79C0000
heap
page read and write
7FF8488A2000
trusted library allocation
page read and write
7FF848A31000
trusted library allocation
page read and write
23435541000
heap
page read and write
1EC9030A000
trusted library allocation
page read and write
1ECF3BB0000
heap
page read and write
7FF848A70000
trusted library allocation
page execute and read and write
CDCFFFE000
stack
page read and write
1ECF44B5000
heap
page read and write
21856ABE000
heap
page read and write
28008812000
trusted library allocation
page read and write
2AEB6E33000
heap
page read and write
1E3D1F3F000
heap
page read and write
3150000
trusted library allocation
page read and write
1BF4E000
stack
page read and write
8C619FD000
stack
page read and write
2341CB23000
trusted library allocation
page read and write
138C000
heap
page read and write
7FF848936000
trusted library allocation
page read and write
23435676000
heap
page read and write
7FF848A90000
trusted library allocation
page read and write
2AEB6DF8000
heap
page read and write
CDCF7FE000
stack
page read and write
7FF848B90000
trusted library allocation
page read and write
1E3D1EF0000
heap
page read and write
7FF848CB0000
trusted library allocation
page execute and read and write
1ECF1E10000
heap
page read and write
234353CB000
heap
page read and write
7FF848CE0000
trusted library allocation
page read and write
7FF848ADD000
trusted library allocation
page read and write
1E3C9201000
trusted library allocation
page read and write
97F9BF9000
stack
page read and write
7FF848CD6000
trusted library allocation
page read and write
7FF848BD4000
trusted library allocation
page read and write
2341CAEC000
trusted library allocation
page read and write
BB79A87000
stack
page read and write
1D070000
heap
page read and write
2183E1B0000
heap
page execute and read and write
21856A7E000
heap
page read and write
2AEC8DAC000
trusted library allocation
page read and write
1ECF1F70000
heap
page read and write
2184E364000
trusted library allocation
page read and write
2AEB89C0000
heap
page execute and read and write
2341C880000
heap
page execute and read and write
1ECF21D5000
heap
page read and write
1E3C92A6000
trusted library allocation
page read and write
280069E1000
trusted library allocation
page read and write
CDD13FE000
stack
page read and write
7FF848A70000
trusted library allocation
page read and write
2AEB7080000
heap
page read and write
21856BAE000
heap
page read and write
7FF848A30000
trusted library allocation
page read and write
21856A45000
heap
page read and write
1E3B7A50000
heap
page read and write
7FF848B20000
trusted library allocation
page read and write
2AEB6E4F000
heap
page read and write
7FF848A80000
trusted library allocation
page execute and read and write
7FF848C00000
trusted library allocation
page read and write
2AEB6E7C000
heap
page read and write
21856BB2000
heap
page read and write
234356B3000
heap
page read and write
1ECF4397000
heap
page read and write
2801ED40000
heap
page read and write
2341CC9A000
trusted library allocation
page read and write
7FF848B60000
trusted library allocation
page read and write
1ECF1F77000
heap
page read and write
2341CF5C000
trusted library allocation
page read and write
FA0000
heap
page read and write
2341CA90000
trusted library allocation
page read and write
7FF848B70000
trusted library allocation
page read and write
7FF848A20000
trusted library allocation
page read and write
97F9DFE000
stack
page read and write
7FF848A50000
trusted library allocation
page read and write
28008253000
trusted library allocation
page read and write
7FF848BF2000
trusted library allocation
page read and write
7FF848880000
trusted library allocation
page read and write
7FF848B00000
trusted library allocation
page read and write
23435713000
heap
page read and write
1EC90001000
trusted library allocation
page read and write
BB79B0C000
stack
page read and write
2341CAB7000
trusted library allocation
page read and write
8C6187A000
stack
page read and write
2184E790000
trusted library allocation
page read and write
2183E550000
trusted library allocation
page read and write
1EC80D71000
trusted library allocation
page read and write
1C34E000
stack
page read and write
7FF848AD8000
trusted library allocation
page read and write
A85C7FF000
stack
page read and write
7FF848A64000
trusted library allocation
page read and write
2AEB9A3A000
trusted library allocation
page read and write
23435705000
heap
page read and write
28007AA2000
trusted library allocation
page read and write
2AEBA188000
trusted library allocation
page read and write
CDD03FE000
stack
page read and write
7FF848A90000
trusted library allocation
page read and write
209250C0000
heap
page read and write
7FF848A6D000
trusted library allocation
page read and write
2183E69F000
trusted library allocation
page read and write
7FF848950000
trusted library allocation
page execute and read and write
1E3C9781000
trusted library allocation
page read and write
1ECF21D0000
heap
page read and write
7FF848A30000
trusted library allocation
page read and write
7FF8488EC000
trusted library allocation
page execute and read and write
2341CE03000
trusted library allocation
page read and write
7FF8489A5000
trusted library allocation
page execute and read and write
7FF848AD0000
trusted library allocation
page read and write
7FF8488EC000
trusted library allocation
page execute and read and write
12E2000
heap
page read and write
7FF848AC8000
trusted library allocation
page read and write
8C61DFB000
stack
page read and write
1ECF4040000
heap
page read and write
28007942000
trusted library allocation
page read and write
A85B7FF000
stack
page read and write
2183C210000
heap
page read and write
7FF848A60000
trusted library allocation
page read and write
1BBAE000
stack
page read and write
2183E09C000
heap
page read and write
28016CD0000
trusted library allocation
page read and write
7FF848ABE000
trusted library allocation
page read and write
2341AD70000
heap
page read and write
2AEB6F10000
heap
page read and write
2183E4F8000
trusted library allocation
page read and write
20936F8B000
trusted library allocation
page read and write
BB78EBA000
stack
page read and write
28004BE0000
trusted library section
page read and write
7FF848880000
trusted library allocation
page read and write
2183E051000
heap
page read and write
209250A0000
heap
page read and write
7FF8488AA000
trusted library allocation
page read and write
2341CE1E000
trusted library allocation
page read and write
280069A0000
heap
page read and write
7FF848A80000
trusted library allocation
page read and write
7FF8488B0000
trusted library allocation
page read and write
1EC90031000
trusted library allocation
page read and write
5B559FE000
stack
page read and write
7FF848D00000
trusted library allocation
page read and write
7FF848960000
trusted library allocation
page read and write
7FF848A62000
trusted library allocation
page read and write
7FF848C90000
trusted library allocation
page read and write
7FF848CD0000
trusted library allocation
page read and write
7FF848970000
trusted library allocation
page execute and read and write
2183E2C0000
trusted library allocation
page read and write
7FF848A90000
trusted library allocation
page read and write
7FF84894C000
trusted library allocation
page execute and read and write
7FF848BD4000
trusted library allocation
page read and write
2801EF94000
heap
page read and write
2183E6C8000
trusted library allocation
page read and write
21856BFE000
heap
page read and write
97FAB4E000
stack
page read and write
7FF848B70000
trusted library allocation
page execute and read and write
7FF84895C000
trusted library allocation
page execute and read and write
2183C384000
heap
page read and write
21856AF5000
heap
page read and write
1E3B7650000
heap
page read and write
7FF8488DC000
trusted library allocation
page execute and read and write
7FF848936000
trusted library allocation
page read and write
7FF848B20000
trusted library allocation
page read and write
1EC81788000
trusted library allocation
page read and write
21856A3D000
heap
page read and write
7FF848A4F000
trusted library allocation
page read and write
7FF848A64000
trusted library allocation
page read and write
7FF848CD6000
trusted library allocation
page read and write
234356EE000
heap
page read and write
2183E4F1000
trusted library allocation
page read and write
7FF848B90000
trusted library allocation
page read and write
2343535E000
heap
page read and write
97FA9C9000
stack
page read and write
7FF848AA0000
trusted library allocation
page execute and read and write
2341AF30000
heap
page read and write
7FF848A60000
trusted library allocation
page execute and read and write
1B0A0000
trusted library allocation
page read and write
21856B42000
heap
page read and write
7FF848AF0000
trusted library allocation
page read and write
7FF848BB0000
trusted library allocation
page read and write
1E3B9356000
trusted library allocation
page read and write
2AEB8A88000
trusted library allocation
page read and write
7FF8488AD000
trusted library allocation
page execute and read and write
2AEC8CF1000
trusted library allocation
page read and write
7FF848A68000
trusted library allocation
page read and write
There are 1394 hidden memdumps, click here to show them.