IOC Report
ServerManager.exe

loading gif

Files

File Path
Type
Category
Malicious
ServerManager.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Server Manager.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Server Manager.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
Generic INItialization configuration [WIN]
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_03ub440h.spu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1s1x41c4.yx3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bfelk4g0.w2n.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bu2srmpn.be1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d2rcdjyt.4ld.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ecmchfxq.k3c.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f04iqpyq.ti4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fxvdo4lg.vhj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lnfmr250.lhs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lueoyisi.xdv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_va1qowu1.eyr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vwlqk5zu.imz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wwzxyr4i.ahu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xadqwjz0.zja.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y33vvror.xr1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yqggigke.u15.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Server Manager.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jul 2 04:37:53 2024, mtime=Tue Jul 2 04:37:53 2024, atime=Tue Jul 2 04:37:53 2024, length=187904, window=hide
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ServerManager.exe
"C:\Users\user\Desktop\ServerManager.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\ServerManager.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ServerManager.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Server Manager.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Server Manager.exe'
malicious
C:\ProgramData\Server Manager.exe
"C:\ProgramData\Server Manager.exe"
malicious
C:\ProgramData\Server Manager.exe
"C:\ProgramData\Server Manager.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
89.213.177.81
malicious
http://nuget.org/NuGet.exe
unknown
https://ion=v4.5mConsumer
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.micom/pkiops/Docs/ry.htm0
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://crl.micros
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
89.213.177.81
unknown
United Kingdom
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ServerManager_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Server Manager
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
E22000
unkown
page readonly
malicious
3331000
trusted library allocation
page read and write
malicious
13342000
trusted library allocation
page read and write
malicious
2D9C66F0000
trusted library allocation
page read and write
29A0000
heap
page execute and read and write
7FFD347C0000
trusted library allocation
page read and write
126F000
stack
page read and write
1D510510000
trusted library allocation
page read and write
1BD19E06000
heap
page read and write
2D9C6938000
trusted library allocation
page read and write
1B06D000
stack
page read and write
1D50F110000
trusted library allocation
page read and write
1BD7F1D0000
heap
page read and write
1BD19AB1000
heap
page read and write
DBC000
heap
page read and write
1D5111D1000
trusted library allocation
page read and write
221AAFE000
stack
page read and write
1344000
heap
page read and write
2D9C55D0000
heap
page execute and read and write
13C2000
heap
page read and write
1D527CB4000
heap
page read and write
7FFD3462C000
trusted library allocation
page execute and read and write
21AE14C2000
heap
page read and write
DDE2EBE000
stack
page read and write
7FFD34754000
trusted library allocation
page read and write
2D9C3CC0000
trusted library section
page read and write
1BD0280A000
trusted library allocation
page read and write
1C0D2000
heap
page read and write
7FFD34540000
trusted library allocation
page read and write
1D50F3A0000
heap
page execute and read and write
1C8C5000
stack
page read and write
7DF458CF0000
trusted library allocation
page execute and read and write
2D9DDBF8000
heap
page read and write
7FFD34884000
trusted library allocation
page read and write
DDE2A73000
stack
page read and write
7FFD348B9000
trusted library allocation
page read and write
7FFD348C2000
trusted library allocation
page read and write
7FFD348C9000
trusted library allocation
page read and write
DB1000
heap
page read and write
1BD7F242000
heap
page read and write
7FFD34880000
trusted library allocation
page read and write
1BD11571000
trusted library allocation
page read and write
1D50F140000
heap
page read and write
DDE2FB9000
stack
page read and write
D45000
heap
page read and write
7FFD3470A000
trusted library allocation
page read and write
1BD19C00000
heap
page read and write
7FFD34830000
trusted library allocation
page read and write
1333E000
trusted library allocation
page read and write
1D50D6A0000
heap
page read and write
1B7FE000
stack
page read and write
7FFD34760000
trusted library allocation
page execute and read and write
7FFD3458C000
trusted library allocation
page execute and read and write
2D9C7431000
trusted library allocation
page read and write
1480000
trusted library allocation
page read and write
2D9C678D000
trusted library allocation
page read and write
12BE8000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
1D51F6B9000
trusted library allocation
page read and write
1BD7F237000
heap
page read and write
BD0000
heap
page read and write
1C52D000
stack
page read and write
9E0000
heap
page read and write
136D000
heap
page read and write
2D9C5570000
trusted library allocation
page read and write
DDE3E8B000
stack
page read and write
2D9D5651000
trusted library allocation
page read and write
1D50D734000
heap
page read and write
1BD19D76000
heap
page read and write
1D5103B5000
trusted library allocation
page read and write
7FFD34620000
trusted library allocation
page execute and read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD34570000
trusted library allocation
page read and write
2D9D5661000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
18F5000
heap
page read and write
2D9C3A9F000
heap
page read and write
7FFD347D0000
trusted library allocation
page read and write
1BD01410000
trusted library section
page read and write
1BD19A50000
trusted library allocation
page read and write
1D50D750000
heap
page read and write
EAC000
heap
page read and write
D4FE0F7000
stack
page read and write
1BDEE000
stack
page read and write
1BD7F2BA000
heap
page read and write
7FFD345AC000
trusted library allocation
page execute and read and write
1D50D6B0000
heap
page read and write
21AE1B10000
heap
page read and write
60E87FF000
stack
page read and write
1BD7F410000
heap
page read and write
21AD9191000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page execute and read and write
F0F000
heap
page read and write
2D9C6636000
trusted library allocation
page read and write
2D9D5939000
trusted library allocation
page read and write
D4FF00C000
stack
page read and write
1BD19A20000
heap
page execute and read and write
D89000
heap
page read and write
1BD01A2D000
trusted library allocation
page read and write
1BD1184A000
trusted library allocation
page read and write
7FFD34750000
trusted library allocation
page read and write
7FFD34554000
trusted library allocation
page read and write
2D9C7451000
trusted library allocation
page read and write
7FFD34580000
trusted library allocation
page read and write
2D9DDD8C000
heap
page read and write
1BD017FB000
trusted library allocation
page read and write
2BD0000
heap
page read and write
1B8FE000
stack
page read and write
7FFD348A0000
trusted library allocation
page read and write
1B16D000
stack
page read and write
1B360000
trusted library allocation
page read and write
1BD19FC0000
heap
page read and write
1D0E0000
heap
page read and write
2D9C3AA1000
heap
page read and write
21AE18C0000
heap
page read and write
1C32E000
stack
page read and write
1D527B70000
heap
page read and write
2D9C5631000
trusted library allocation
page read and write
1C0D6000
heap
page read and write
1BD02620000
trusted library allocation
page read and write
2D9DDD88000
heap
page read and write
7FFD349A0000
trusted library allocation
page read and write
1BD19A70000
heap
page read and write
7FFD345BC000
trusted library allocation
page execute and read and write
7FFD347D0000
trusted library allocation
page read and write
7FFD348DC000
trusted library allocation
page read and write
21AE1990000
trusted library allocation
page read and write
7FFD3461C000
trusted library allocation
page execute and read and write
21AC7580000
heap
page read and write
1BD19E19000
heap
page read and write
7FFD34562000
trusted library allocation
page read and write
12AE1000
trusted library allocation
page read and write
1D510199000
trusted library allocation
page read and write
1BD017F6000
trusted library allocation
page read and write
1D51F69B000
trusted library allocation
page read and write
1BD19E97000
heap
page read and write
1BD7F930000
heap
page read and write
319F000
stack
page read and write
1450000
trusted library allocation
page read and write
1BD02DC6000
trusted library allocation
page read and write
7FFD34620000
trusted library allocation
page execute and read and write
21ACA0DE000
trusted library allocation
page read and write
7FFD34880000
trusted library allocation
page read and write
21AE14FF000
heap
page read and write
1D527720000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
7FFD34738000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
21AD945B000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page read and write
9B5000
heap
page read and write
31BA000
heap
page read and write
2D9DDB07000
heap
page execute and read and write
1CBC0000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
21ACAA60000
trusted library allocation
page read and write
21ACA0E6000
trusted library allocation
page read and write
1C9CA000
stack
page read and write
7FFD34553000
trusted library allocation
page execute and read and write
7FFD34760000
trusted library allocation
page read and write
7FFD34758000
trusted library allocation
page read and write
2D9D5921000
trusted library allocation
page read and write
2D9C6841000
trusted library allocation
page read and write
1D510C12000
trusted library allocation
page read and write
21AE1686000
heap
page execute and read and write
7FFD348A0000
trusted library allocation
page read and write
DED000
heap
page read and write
7FFD34563000
trusted library allocation
page execute and read and write
CF1000
stack
page read and write
7FFD348B0000
trusted library allocation
page read and write
21ACA539000
trusted library allocation
page read and write
DDE30BF000
stack
page read and write
1D51F6A0000
trusted library allocation
page read and write
1BD0185C000
trusted library allocation
page read and write
1BD19D22000
heap
page read and write
7FFD349A0000
trusted library allocation
page read and write
1D510B2D000
trusted library allocation
page read and write
1D50F220000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
7FFD34573000
trusted library allocation
page execute and read and write
7FFD34940000
trusted library allocation
page read and write
1D5111AC000
trusted library allocation
page read and write
60E8CBE000
stack
page read and write
2D9D56A2000
trusted library allocation
page read and write
BF5000
heap
page read and write
1D5103E0000
trusted library allocation
page read and write
21AC8F70000
trusted library allocation
page read and write
1C0CA000
heap
page read and write
7FFD345CC000
trusted library allocation
page execute and read and write
21AC7604000
heap
page read and write
7FFD34600000
trusted library allocation
page read and write
1BD19D33000
heap
page read and write
1D511145000
trusted library allocation
page read and write
7FFD34720000
trusted library allocation
page execute and read and write
7FFD34570000
trusted library allocation
page read and write
7FFD34580000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page read and write
1BD02590000
trusted library allocation
page read and write
E3B000
unkown
page readonly
7FFD34670000
trusted library allocation
page execute and read and write
2D9DDBC2000
heap
page read and write
1BD02EAE000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
7FFD34721000
trusted library allocation
page read and write
21AE18C9000
heap
page read and write
7FFD347E0000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
2D9C6273000
trusted library allocation
page read and write
7FFD348E0000
trusted library allocation
page read and write
2D9DDEDA000
heap
page read and write
21AC9160000
heap
page execute and read and write
7FFD34748000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
1D50F180000
trusted library allocation
page read and write
12BE1000
trusted library allocation
page read and write
7FFD345EC000
trusted library allocation
page execute and read and write
7FFD347B0000
trusted library allocation
page read and write
21ACA0E2000
trusted library allocation
page read and write
7FFD34646000
trusted library allocation
page execute and read and write
2D9DDB6B000
heap
page read and write
2D9C740C000
trusted library allocation
page read and write
1D50DAB0000
trusted library allocation
page read and write
221B0BE000
stack
page read and write
7FFD34573000
trusted library allocation
page read and write
7FFD3456D000
trusted library allocation
page execute and read and write
D4FE23F000
stack
page read and write
2D9C3CD5000
heap
page read and write
104F000
stack
page read and write
60E8B3B000
stack
page read and write
1BD7F28E000
heap
page read and write
2D9C3D30000
trusted library allocation
page read and write
7FFD3461C000
trusted library allocation
page execute and read and write
7FFD34560000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
1BD0289F000
trusted library allocation
page read and write
1BD02596000
trusted library allocation
page read and write
2D9C7456000
trusted library allocation
page read and write
F74000
heap
page read and write
1D50DAC0000
heap
page read and write
7FFD347E0000
trusted library allocation
page read and write
29D0000
heap
page read and write
2D9C3A72000
heap
page read and write
EE5000
heap
page read and write
7FFD3497C000
trusted library allocation
page read and write
21ACA315000
trusted library allocation
page read and write
1D52776A000
heap
page read and write
DDE323E000
stack
page read and write
60E980E000
stack
page read and write
130C000
heap
page read and write
2D9C3C60000
heap
page read and write
1BD01789000
trusted library allocation
page read and write
7FFD34880000
trusted library allocation
page read and write
2D9DDB10000
heap
page read and write
1280000
heap
page read and write
1BD024C1000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
1D50F232000
heap
page read and write
7FFD349E0000
trusted library allocation
page read and write
21AC7588000
heap
page read and write
21AC9D63000
trusted library allocation
page read and write
1B550000
heap
page execute and read and write
1D51046C000
trusted library allocation
page read and write
7FFD34702000
trusted library allocation
page read and write
7FFD34680000
trusted library allocation
page execute and read and write
7FFD346F0000
trusted library allocation
page read and write
2D9D591B000
trusted library allocation
page read and write
21AC9035000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
980000
heap
page read and write
21AD945F000
trusted library allocation
page read and write
1C0CC000
heap
page read and write
DDE2AFE000
stack
page read and write
1D5278F0000
heap
page read and write
7FFD348A9000
trusted library allocation
page read and write
221BC0E000
stack
page read and write
1C085000
heap
page read and write
1BD024CE000
trusted library allocation
page read and write
21AC8EC0000
trusted library allocation
page read and write
221B1BE000
stack
page read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
21AC9D6F000
trusted library allocation
page read and write
2D9C3D90000
heap
page read and write
7FFD34770000
trusted library allocation
page read and write
21ACA93E000
trusted library allocation
page read and write
7FFD34646000
trusted library allocation
page execute and read and write
D80000
heap
page read and write
1BD19562000
heap
page read and write
1D5277D9000
heap
page read and write
13359000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
1D527C46000
heap
page read and write
1D510775000
trusted library allocation
page read and write
221ADFD000
stack
page read and write
7FFD34636000
trusted library allocation
page execute and read and write
1D510655000
trusted library allocation
page read and write
1CAC8000
stack
page read and write
7FFD34742000
trusted library allocation
page read and write
F0B000
heap
page read and write
1D5106F0000
trusted library allocation
page read and write
21AC75BC000
heap
page read and write
7FFD34600000
trusted library allocation
page read and write
1D510588000
trusted library allocation
page read and write
7FFD348CC000
trusted library allocation
page read and write
1BD19AF4000
heap
page read and write
2D9DDDC2000
heap
page read and write
2D9DDD94000
heap
page read and write
7FFD34570000
trusted library allocation
page read and write
2AEF000
trusted library allocation
page read and write
1BD02162000
trusted library allocation
page read and write
2D9DDCBE000
heap
page read and write
1BD01550000
heap
page read and write
DDE2BFE000
stack
page read and write
1BD7F278000
heap
page read and write
21AC8F30000
trusted library allocation
page read and write
221B23B000
stack
page read and write
7FFD34920000
trusted library allocation
page read and write
1B7AD000
stack
page read and write
7FFD34860000
trusted library allocation
page read and write
13367000
trusted library allocation
page read and write
1BD19B5C000
heap
page read and write
7FFD345BC000
trusted library allocation
page execute and read and write
21AC9DAA000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
21AC8EE0000
trusted library allocation
page read and write
DDE3C8E000
stack
page read and write
D4FEF8F000
stack
page read and write
1D50FFB8000
trusted library allocation
page read and write
1BD7F26D000
heap
page read and write
7FFD34810000
trusted library allocation
page read and write
21AC75DC000
heap
page read and write
7FFD34580000
trusted library allocation
page read and write
21AC7710000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
21AE1846000
heap
page read and write
1BD01FB2000
trusted library allocation
page read and write
2D9C621B000
trusted library allocation
page read and write
2D9C3AE8000
heap
page read and write
DDE2DFD000
stack
page read and write
21AC7715000
heap
page read and write
2D9DDB5C000
heap
page read and write
1BD02197000
trusted library allocation
page read and write
221B13E000
stack
page read and write
7FFD34780000
trusted library allocation
page read and write
D4FE07E000
stack
page read and write
7FFD34800000
trusted library allocation
page read and write
7FFD34670000
trusted library allocation
page execute and read and write
1D50F3B1000
trusted library allocation
page read and write
7FFD3456D000
trusted library allocation
page execute and read and write
DDE32BB000
stack
page read and write
2D9C6752000
trusted library allocation
page read and write
1D50F145000
heap
page read and write
D4FE4BF000
stack
page read and write
7FFD34890000
trusted library allocation
page read and write
7FFD345BC000
trusted library allocation
page execute and read and write
1BD02275000
trusted library allocation
page read and write
1BD025C5000
trusted library allocation
page read and write
7FFD34883000
trusted library allocation
page read and write
1D510355000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
D4FF20E000
stack
page read and write
7FFD34533000
trusted library allocation
page execute and read and write
ED5000
heap
page read and write
3310000
heap
page read and write
21AC76A0000
heap
page read and write
60E89BF000
stack
page read and write
7FFD348D0000
trusted library allocation
page read and write
7FFD34690000
trusted library allocation
page execute and read and write
7FFD34940000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
2AE1000
trusted library allocation
page read and write
21AC76D0000
heap
page read and write
1630000
heap
page execute and read and write
1BD0286C000
trusted library allocation
page read and write
21AD9469000
trusted library allocation
page read and write
7FFD34554000
trusted library allocation
page read and write
1D51F422000
trusted library allocation
page read and write
2ADE000
stack
page read and write
1D51F6A8000
trusted library allocation
page read and write
21AC7490000
heap
page read and write
2D9C3CE0000
trusted library section
page read and write
2AF1000
trusted library allocation
page read and write
1BD01460000
heap
page readonly
1B5F0000
heap
page read and write
E00000
heap
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
1BD024CA000
trusted library allocation
page read and write
2D9D591F000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD34702000
trusted library allocation
page read and write
1BD19D7D000
heap
page read and write
7FFD347E0000
trusted library allocation
page read and write
1BD19E57000
heap
page read and write
21ACAF4B000
trusted library allocation
page read and write
2D9C3ABD000
heap
page read and write
1C7CC000
stack
page read and write
7FFD3454B000
trusted library allocation
page read and write
7FFD345AC000
trusted library allocation
page execute and read and write
7FFD348B2000
trusted library allocation
page read and write
7FFD34553000
trusted library allocation
page execute and read and write
7FFD347C0000
trusted library allocation
page read and write
1D50DA70000
heap
page read and write
60E9889000
stack
page read and write
21AE188C000
heap
page read and write
7FFD349BD000
trusted library allocation
page read and write
1D527858000
heap
page read and write
7FFD34752000
trusted library allocation
page read and write
1BD19AB3000
heap
page read and write
1BD19CFC000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
9E0000
unkown
page readonly
1D51F3D1000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
60E8353000
stack
page read and write
2D9C3A9C000
heap
page read and write
2D9DE060000
heap
page read and write
1D527C60000
heap
page read and write
7FFD349CD000
trusted library allocation
page read and write
7FFD34570000
trusted library allocation
page read and write
D4FDBE3000
stack
page read and write
21AC7680000
heap
page read and write
1D50F425000
trusted library allocation
page read and write
7FFD34701000
trusted library allocation
page read and write
1D4DC000
stack
page read and write
2A80000
heap
page execute and read and write
1BD11591000
trusted library allocation
page read and write
1BD7F4B0000
heap
page read and write
7FFD34550000
trusted library allocation
page read and write
1BD01450000
trusted library allocation
page read and write
21AC939A000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
60E978C000
stack
page read and write
2D9DDD84000
heap
page read and write
7FFD348A3000
trusted library allocation
page read and write
D4FF18D000
stack
page read and write
21AC9EF6000
trusted library allocation
page read and write
60E8D3B000
stack
page read and write
21AC9DF6000
trusted library allocation
page read and write
221BD0E000
stack
page read and write
D4FE339000
stack
page read and write
2D9DDD90000
heap
page read and write
2D9C5AFD000
trusted library allocation
page read and write
7FFD346F2000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
221AEBE000
stack
page read and write
2D9DDE1E000
heap
page read and write
21AE1886000
heap
page read and write
7DF458D00000
trusted library allocation
page execute and read and write
1D5104D1000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
1BD19B14000
heap
page read and write
1BD117C5000
trusted library allocation
page read and write
7FFD34898000
trusted library allocation
page read and write
7FFD34636000
trusted library allocation
page execute and read and write
1D51F3C0000
trusted library allocation
page read and write
1BD024C5000
trusted library allocation
page read and write
1BD024D6000
trusted library allocation
page read and write
21AC9030000
heap
page read and write
7FFD34552000
trusted library allocation
page read and write
60E8AB8000
stack
page read and write
7FFD34744000
trusted library allocation
page read and write
1D527B89000
heap
page read and write
1BD01847000
trusted library allocation
page read and write
21AD91A1000
trusted library allocation
page read and write
7FFD34710000
trusted library allocation
page read and write
1BD0216B000
trusted library allocation
page read and write
D4FE5BB000
stack
page read and write
7FFD349C6000
trusted library allocation
page read and write
21AC9BC3000
trusted library allocation
page read and write
1BD028E9000
trusted library allocation
page read and write
7FFD34610000
trusted library allocation
page read and write
1D51012F000
trusted library allocation
page read and write
60E83DE000
stack
page read and write
2D9C3B60000
heap
page read and write
1BD7F274000
heap
page read and write
60E990D000
stack
page read and write
7FFD349B0000
trusted library allocation
page read and write
1BD7F230000
heap
page read and write
7FFD34626000
trusted library allocation
page read and write
7FFD34606000
trusted library allocation
page read and write
1D510737000
trusted library allocation
page read and write
1D527760000
heap
page read and write
21ACA9FD000
trusted library allocation
page read and write
7FFD34710000
trusted library allocation
page execute and read and write
1D51F3E1000
trusted library allocation
page read and write
7FFD34650000
trusted library allocation
page execute and read and write
7FFD34710000
trusted library allocation
page execute and read and write
21ACAABF000
trusted library allocation
page read and write
21ACA9D7000
trusted library allocation
page read and write
7FFD34880000
trusted library allocation
page read and write
21ACA0F3000
trusted library allocation
page read and write
21AE18D2000
heap
page read and write
1BFEC000
stack
page read and write
7FFD3460C000
trusted library allocation
page execute and read and write
2BE1000
trusted library allocation
page read and write
60E88FD000
stack
page read and write
B51000
stack
page read and write
7FFD348A4000
trusted library allocation
page read and write
2D9C3C40000
heap
page read and write
221AF39000
stack
page read and write
2D9C3AAB000
heap
page read and write
EA6000
heap
page read and write
7FFD34870000
trusted library allocation
page read and write
DDE3E8E000
stack
page read and write
7FFD34800000
trusted library allocation
page read and write
21ACA8F1000
trusted library allocation
page read and write
7FFD347F0000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
1BD01849000
trusted library allocation
page read and write
1D50F100000
heap
page readonly
7FFD34810000
trusted library allocation
page read and write
D4FE1F9000
stack
page read and write
21AC7609000
heap
page read and write
1BD7F1E0000
heap
page read and write
1BCEE000
stack
page read and write
7FFD34570000
trusted library allocation
page read and write
21AC91EB000
trusted library allocation
page read and write
15FE000
stack
page read and write
DDE2CFE000
stack
page read and write
7FFD34720000
trusted library allocation
page execute and read and write
1D5106B8000
trusted library allocation
page read and write
1BD19CF0000
heap
page read and write
7FFD34720000
trusted library allocation
page execute and read and write
12D0000
heap
page read and write
2D9DDCA5000
heap
page read and write
21AE1790000
heap
page read and write
7DF4C26F0000
trusted library allocation
page execute and read and write
1D50F5D8000
trusted library allocation
page read and write
1D5106EB000
trusted library allocation
page read and write
990000
heap
page read and write
1BD024D2000
trusted library allocation
page read and write
7FFD3471A000
trusted library allocation
page read and write
1BD19E03000
heap
page read and write
116F000
stack
page read and write
1D510CFA000
trusted library allocation
page read and write
21AE152D000
heap
page read and write
21AC7592000
heap
page read and write
1D50FE02000
trusted library allocation
page read and write
21AD91E2000
trusted library allocation
page read and write
1483000
trusted library allocation
page read and write
D40000
heap
page read and write
7FFD34990000
trusted library allocation
page read and write
21AE1908000
heap
page read and write
1CFDB000
stack
page read and write
1D51049D000
trusted library allocation
page read and write
1C62D000
stack
page read and write
21AE18D6000
heap
page read and write
2D9C5859000
trusted library allocation
page read and write
21AD9180000
trusted library allocation
page read and write
BA0000
heap
page read and write
7DF4D9210000
trusted library allocation
page execute and read and write
7FFD34863000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
21ACAF95000
trusted library allocation
page read and write
7FFD34532000
trusted library allocation
page read and write
7FFD34714000
trusted library allocation
page read and write
1BD19E8B000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
7FFD3455D000
trusted library allocation
page execute and read and write
D4FE3B8000
stack
page read and write
21AE1592000
heap
page read and write
1BD11858000
trusted library allocation
page read and write
7FFD34564000
trusted library allocation
page read and write
7FFD34646000
trusted library allocation
page execute and read and write
F91000
stack
page read and write
7FFD3456D000
trusted library allocation
page execute and read and write
2D9DD63C000
heap
page read and write
21ACA291000
trusted library allocation
page read and write
60E8C3F000
stack
page read and write
7FFD34700000
trusted library allocation
page read and write
7FFD347C0000
trusted library allocation
page read and write
2960000
heap
page execute and read and write
1400000
heap
page read and write
7FFD34870000
trusted library allocation
page read and write
7FFD34800000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
1D50D79A000
heap
page read and write
221AFB9000
stack
page read and write
1BFF0000
heap
page read and write
1BD19D2C000
heap
page read and write
1420000
heap
page read and write
2D9DDD80000
heap
page read and write
7FFD34572000
trusted library allocation
page read and write
7FFD3496C000
trusted library allocation
page read and write
60E8779000
stack
page read and write
7FFD34560000
trusted library allocation
page read and write
1B6AF000
stack
page read and write
7FFD348D8000
trusted library allocation
page read and write
7FFD346F0000
trusted library allocation
page execute and read and write
EE2000
heap
page read and write
1D50D754000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
1BD026BF000
trusted library allocation
page read and write
1BD03385000
trusted library allocation
page read and write
7FFD34734000
trusted library allocation
page read and write
1341000
heap
page read and write
E20000
unkown
page readonly
21AC75C0000
heap
page read and write
7FFD34893000
trusted library allocation
page read and write
7FFD34923000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
2D9C3CD0000
heap
page read and write
2D9C6DB3000
trusted library allocation
page read and write
1BD7F2B5000
heap
page read and write
1BD0333B000
trusted library allocation
page read and write
1BD01500000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
ECD000
heap
page read and write
221BC8C000
stack
page read and write
D4FE2B6000
stack
page read and write
1BD1184F000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
7FFD3455D000
trusted library allocation
page execute and read and write
21AE1501000
heap
page read and write
7FF4B5420000
trusted library allocation
page execute and read and write
2D9C3AAD000
heap
page read and write
DDE3D0E000
stack
page read and write
7FFD347C0000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
7FFD3472A000
trusted library allocation
page read and write
2D9C63AE000
trusted library allocation
page read and write
21AC8EF0000
heap
page readonly
1BD11561000
trusted library allocation
page read and write
7FFD34564000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
7FFD34610000
trusted library allocation
page read and write
2D9C56B8000
trusted library allocation
page read and write
1D50D6D0000
heap
page read and write
1BD19A66000
heap
page execute and read and write
7FFD34860000
trusted library allocation
page read and write
21ACA0D6000
trusted library allocation
page read and write
7FFD348D0000
trusted library allocation
page read and write
1D50DAC5000
heap
page read and write
1D527B80000
heap
page read and write
60E8877000
stack
page read and write
7FFD34564000
trusted library allocation
page read and write
1BD19B33000
heap
page read and write
7DF4D9200000
trusted library allocation
page execute and read and write
7FFD34656000
trusted library allocation
page execute and read and write
7FFD348E0000
trusted library allocation
page read and write
21AC9F32000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
7FFD346D0000
trusted library allocation
page read and write
7FFD346E1000
trusted library allocation
page read and write
BF0000
heap
page read and write
168E000
stack
page read and write
1D527750000
heap
page execute and read and write
2D9C5610000
trusted library allocation
page read and write
1C052000
heap
page read and write
1BD19D2E000
heap
page read and write
7FFD34534000
trusted library allocation
page read and write
1BD7F2B7000
heap
page read and write
60E970E000
stack
page read and write
7FFD34760000
trusted library allocation
page read and write
1D50D7FF000
heap
page read and write
1BD015E6000
trusted library allocation
page read and write
1D527BD9000
heap
page read and write
1BD19CE0000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
1BD119D0000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
1BD115D1000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
21ACA204000
trusted library allocation
page read and write
1BD19E91000
heap
page read and write
1BD19D48000
heap
page read and write
221AD79000
stack
page read and write
18A0000
heap
page read and write
7FFD34760000
trusted library allocation
page read and write
2D9C3AE5000
heap
page read and write
7FFD34810000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
2D9C3AA7000
heap
page read and write
1BD0181A000
trusted library allocation
page read and write
60E8A39000
stack
page read and write
1D527BD1000
heap
page read and write
7FFD34740000
trusted library allocation
page read and write
2D9C6F80000
trusted library allocation
page read and write
7FFD34530000
trusted library allocation
page read and write
2D9DDF03000
heap
page read and write
1BD19E60000
heap
page read and write
16CE000
stack
page read and write
7FFD34970000
trusted library allocation
page read and write
21AD9171000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
7FFD34702000
trusted library allocation
page read and write
7FFD34564000
trusted library allocation
page read and write
1D527C72000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
21AC8F90000
heap
page read and write
1D50D75E000
heap
page read and write
2D9C65CD000
trusted library allocation
page read and write
21ACA47E000
trusted library allocation
page read and write
DDE3D87000
stack
page read and write
7FFD34610000
trusted library allocation
page execute and read and write
21AE1557000
heap
page read and write
1BD7F272000
heap
page read and write
7FFD34840000
trusted library allocation
page read and write
7FFD347D0000
trusted library allocation
page read and write
1BD02CE1000
trusted library allocation
page read and write
2D9C6082000
trusted library allocation
page read and write
2D9C5620000
heap
page read and write
1B5A0000
heap
page read and write
21AE16B0000
heap
page read and write
1BD03380000
trusted library allocation
page read and write
21AE179A000
heap
page read and write
D4FE17E000
stack
page read and write
1D50D76E000
heap
page read and write
7FFD34980000
trusted library allocation
page execute and read and write
21AC75C4000
heap
page read and write
7FFD34560000
trusted library allocation
page read and write
EA0000
heap
page read and write
31A0000
heap
page read and write
7FFD34560000
trusted library allocation
page read and write
7FFD34732000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
1BD19A89000
heap
page read and write
21ACA31D000
trusted library allocation
page read and write
FE0000
heap
page read and write
7FFD34616000
trusted library allocation
page read and write
D4FF08E000
stack
page read and write
7FFD347D0000
trusted library allocation
page read and write
1D5105C1000
trusted library allocation
page read and write
7FFD345E0000
trusted library allocation
page read and write
D4FDE7E000
stack
page read and write
7FFD34820000
trusted library allocation
page read and write
7DF4C26E0000
trusted library allocation
page execute and read and write
7FFD348B4000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
1BD02DED000
trusted library allocation
page read and write
1D527CAC000
heap
page read and write
7FFD348B8000
trusted library allocation
page read and write
DDE2F37000
stack
page read and write
2D9C3CA0000
heap
page read and write
EE0000
heap
page read and write
2D9C55E0000
heap
page execute and read and write
7FFD347F0000
trusted library allocation
page read and write
221ACFF000
stack
page read and write
7FFD346F2000
trusted library allocation
page read and write
21ACA0DA000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
221AC7A000
stack
page read and write
7FFD3458B000
trusted library allocation
page read and write
2D9C6231000
trusted library allocation
page read and write
18A3000
heap
page read and write
7DF404B50000
trusted library allocation
page execute and read and write
7FFD34889000
trusted library allocation
page read and write
7FFD348F0000
trusted library allocation
page read and write
7FFD34680000
trusted library allocation
page execute and read and write
1BD01561000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page read and write
221BD87000
stack
page read and write
7FFD34990000
trusted library allocation
page read and write
1D527756000
heap
page execute and read and write
2D9DDCA0000
heap
page read and write
7FFD34720000
trusted library allocation
page execute and read and write
1BD19A60000
heap
page execute and read and write
E50000
trusted library allocation
page read and write
12AE8000
trusted library allocation
page read and write
1D51073B000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page read and write
2D9C5540000
trusted library allocation
page read and write
21ACA22D000
trusted library allocation
page read and write
DBA000
heap
page read and write
1BD02684000
trusted library allocation
page read and write
2D9DDEFA000
heap
page read and write
2D9C3D20000
heap
page readonly
2D9D5631000
trusted library allocation
page read and write
21ACA41D000
trusted library allocation
page read and write
21AE18E4000
heap
page read and write
7FFD348D0000
trusted library allocation
page read and write
7FFD34718000
trusted library allocation
page read and write
1BD01420000
trusted library section
page read and write
7FFD34990000
trusted library allocation
page read and write
21AD9479000
trusted library allocation
page read and write
1D50F0F0000
trusted library allocation
page read and write
60E998E000
stack
page read and write
1BD19DF2000
heap
page read and write
1BD11868000
trusted library allocation
page read and write
7FFD3458B000
trusted library allocation
page execute and read and write
2B8F000
stack
page read and write
7FFD348C0000
trusted library allocation
page read and write
60E8977000
stack
page read and write
7FFD348C4000
trusted library allocation
page read and write
12AE3000
trusted library allocation
page read and write
1BEEF000
stack
page read and write
21AE18A3000
heap
page read and write
7FFD34770000
trusted library allocation
page read and write
1BD014C0000
heap
page execute and read and write
7FFD34960000
trusted library allocation
page read and write
DDE31BC000
stack
page read and write
21AC9D75000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
14F5000
heap
page read and write
3320000
heap
page execute and read and write
7FFD34740000
trusted library allocation
page execute and read and write
7FFD34620000
trusted library allocation
page read and write
221B038000
stack
page read and write
1BD01430000
trusted library allocation
page read and write
1D5111CC000
trusted library allocation
page read and write
1D50D758000
heap
page read and write
2D9C6EBE000
trusted library allocation
page read and write
1D50F87D000
trusted library allocation
page read and write
2D9C3D10000
trusted library allocation
page read and write
1D50D718000
heap
page read and write
DA9000
heap
page read and write
1BD024DF000
trusted library allocation
page read and write
DDE2D79000
stack
page read and write
2D9C3A68000
heap
page read and write
114F000
stack
page read and write
1B4AF000
stack
page read and write
1BD028A4000
trusted library allocation
page read and write
1D510C39000
trusted library allocation
page read and write
DDE2E78000
stack
page read and write
1BD0273C000
trusted library allocation
page read and write
9C0000
heap
page read and write
2D9DDD98000
heap
page read and write
21AC75BE000
heap
page read and write
9B0000
heap
page read and write
21AC9171000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
221AA73000
stack
page read and write
7FFD34840000
trusted library allocation
page read and write
7FFD34680000
trusted library allocation
page execute and read and write
13338000
trusted library allocation
page read and write
7FFD34712000
trusted library allocation
page read and write
DDE3E0C000
stack
page read and write
2D9C65D3000
trusted library allocation
page read and write
1CEDD000
stack
page read and write
7FFD3457B000
trusted library allocation
page read and write
7FFD349B6000
trusted library allocation
page read and write
21AE14B0000
heap
page read and write
1BD017B3000
trusted library allocation
page read and write
E38000
unkown
page readonly
17CD000
stack
page read and write
21AE1690000
heap
page read and write
1300000
heap
page read and write
2D9C3A60000
heap
page read and write
7FFD348A0000
trusted library allocation
page read and write
DDE313E000
stack
page read and write
2D9C6662000
trusted library allocation
page read and write
2D9C68D5000
trusted library allocation
page read and write
D9B000
heap
page read and write
7FFD34820000
trusted library allocation
page read and write
1BD19CEC000
heap
page read and write
21ACA351000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page execute and read and write
2D9C3CF0000
trusted library allocation
page read and write
1D51023D000
trusted library allocation
page read and write
1BD7F4B5000
heap
page read and write
21ACA1A5000
trusted library allocation
page read and write
2D9C69F5000
trusted library allocation
page read and write
7FFD3495C000
trusted library allocation
page read and write
EDE000
heap
page read and write
7FFD34770000
trusted library allocation
page read and write
7FFD34574000
trusted library allocation
page read and write
2D9C6E98000
trusted library allocation
page read and write
1B7AF000
stack
page read and write
1D50D75C000
heap
page read and write
221AB7E000
stack
page read and write
7FFD34980000
trusted library allocation
page read and write
1D50D795000
heap
page read and write
1BD03360000
trusted library allocation
page read and write
1D50D74D000
heap
page read and write
2D9C3D95000
heap
page read and write
1D0DA000
stack
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD34563000
trusted library allocation
page execute and read and write
21AC75C6000
heap
page read and write
DE9000
heap
page read and write
1D511187000
trusted library allocation
page read and write
1D51034F000
trusted library allocation
page read and write
7FFD34740000
trusted library allocation
page execute and read and write
18F0000
heap
page read and write
2D9C6F21000
trusted library allocation
page read and write
7FFD34900000
trusted library allocation
page read and write
1B6FE000
stack
page read and write
21ACAF90000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
14F0000
heap
page read and write
221BE0C000
stack
page read and write
7FFD34850000
trusted library allocation
page read and write
1374000
heap
page read and write
7FFD3458D000
trusted library allocation
page execute and read and write
7FFD3489C000
trusted library allocation
page read and write
DDE303A000
stack
page read and write
7FFD34980000
trusted library allocation
page read and write
60E867E000
stack
page read and write
7FFD346EA000
trusted library allocation
page read and write
12BE3000
trusted library allocation
page read and write
2D9DDB58000
heap
page read and write
1285000
heap
page read and write
7FFD34610000
trusted library allocation
page read and write
1BD017D3000
trusted library allocation
page read and write
7FFD3453D000
trusted library allocation
page execute and read and write
E49000
unkown
page readonly
21AE1630000
heap
page execute and read and write
60E86FE000
stack
page read and write
1BD7F935000
heap
page read and write
2D9DDB00000
heap
page execute and read and write
7FFD34570000
trusted library allocation
page read and write
21ACA0EA000
trusted library allocation
page read and write
21AE1884000
heap
page read and write
2D9C63A5000
trusted library allocation
page read and write
60E8BBE000
stack
page read and write
1D5100BE000
trusted library allocation
page read and write
1BD11581000
trusted library allocation
page read and write
1D50D722000
heap
page read and write
7DF404B40000
trusted library allocation
page execute and read and write
21AC904B000
heap
page read and write
7FFD34750000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
1D50F150000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
1BD19CE8000
heap
page read and write
7FFD34616000
trusted library allocation
page execute and read and write
7DF4D9220000
trusted library allocation
page execute and read and write
221BE8E000
stack
page read and write
7FFD34750000
trusted library allocation
page execute and read and write
2D9DDDDA000
heap
page read and write
D4FDF7E000
stack
page read and write
D4FDEFE000
stack
page read and write
7FFD34712000
trusted library allocation
page read and write
DE7000
heap
page read and write
F72000
heap
page read and write
7FFD34860000
trusted library allocation
page read and write
2D9C6239000
trusted library allocation
page read and write
BB0000
heap
page read and write
D4FF109000
stack
page read and write
1BD01470000
trusted library allocation
page read and write
1D50F370000
heap
page execute and read and write
2D9DDB40000
heap
page read and write
7FFD3456D000
trusted library allocation
page execute and read and write
7FFD349C0000
trusted library allocation
page read and write
1D527C95000
heap
page read and write
7FFD34810000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
7FFD34574000
trusted library allocation
page read and write
D4FDFF9000
stack
page read and write
7FFD34584000
trusted library allocation
page read and write
3634000
trusted library allocation
page read and write
1D527C44000
heap
page read and write
1D51F3B1000
trusted library allocation
page read and write
21AD94F7000
trusted library allocation
page read and write
13331000
trusted library allocation
page read and write
7FFD34616000
trusted library allocation
page read and write
1BD02927000
trusted library allocation
page read and write
7FFD34590000
trusted library allocation
page read and write
7FFD34711000
trusted library allocation
page read and write
1880000
heap
page execute and read and write
D4FE53E000
stack
page read and write
1C42E000
stack
page read and write
7FFD348D2000
trusted library allocation
page read and write
1BD19CF4000
heap
page read and write
1BBEA000
stack
page read and write
2D9C6808000
trusted library allocation
page read and write
21AC9D80000
trusted library allocation
page read and write
21AE1680000
heap
page execute and read and write
7FFD347F0000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
21AE1888000
heap
page read and write
21ACAF70000
trusted library allocation
page read and write
221AE77000
stack
page read and write
7FFD3456B000
trusted library allocation
page read and write
7FFD34550000
trusted library allocation
page read and write
7FFD34800000
trusted library allocation
page read and write
2D9DDCB2000
heap
page read and write
2D9D5929000
trusted library allocation
page read and write
1D5277B6000
heap
page read and write
1BD19D3C000
heap
page read and write
7FFD348B0000
trusted library allocation
page read and write
7FFD34580000
trusted library allocation
page read and write
7FFD348E0000
trusted library allocation
page read and write
1D50D797000
heap
page read and write
1D5277B4000
heap
page read and write
21AE184A000
heap
page read and write
2D9C3B58000
heap
page read and write
7FFD348C8000
trusted library allocation
page read and write
1BD19CF8000
heap
page read and write
1BD7F27C000
heap
page read and write
1B9FF000
stack
page read and write
7FFD348BC000
trusted library allocation
page read and write
1BD01809000
trusted library allocation
page read and write
1BD1180F000
trusted library allocation
page read and write
1BD19D6F000
heap
page read and write
221ABFE000
stack
page read and write
7FFD345E6000
trusted library allocation
page read and write
1D50D710000
heap
page read and write
1BD7F200000
heap
page read and write
7FFD34730000
trusted library allocation
page read and write
2D9C6229000
trusted library allocation
page read and write
7FFD347E0000
trusted library allocation
page read and write
DDE2B7E000
stack
page read and write
2D9C6693000
trusted library allocation
page read and write
DDE2C79000
stack
page read and write
7FFD34563000
trusted library allocation
page execute and read and write
D60000
trusted library allocation
page read and write
D4FE43E000
stack
page read and write
21AC963E000
trusted library allocation
page read and write
21AE14F2000
heap
page read and write
7FFD348F0000
trusted library allocation
page read and write
7FFD347F0000
trusted library allocation
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
F62000
heap
page read and write
There are 996 hidden memdumps, click here to show them.