IOC Report
Nova Mod Pack.exe

loading gif

Files

File Path
Type
Category
Malicious
Nova Mod Pack.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Nova Mod Pack.exe.log
CSV text
dropped
malicious
C:\Users\user\System32.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\System32.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1j4yimxj.jst.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1rqokafh.4i1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1zadr2tq.mkh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2uo1srqk.hi3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4tenjwns.blx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ch5540p.4i5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g1vrj2ce.xbd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gqwjntzp.xyz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gsoqp3hx.dwb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jcbf3edo.q11.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lsm4rzfq.y0l.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_orhqjl2t.lrk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rsvszcxp.d2g.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uj5ezubt.gbq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ydnknbyb.bcg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ydxb40ij.rt3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp3B7C.tmp.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System32.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Jul 5 06:34:28 2024, mtime=Fri Jul 5 06:34:48 2024, atime=Fri Jul 5 06:34:28 2024, length=124416, window=hide
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Nova Mod Pack.exe
"C:\Users\user\Desktop\Nova Mod Pack.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Nova Mod Pack.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Nova Mod Pack.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\System32.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System32.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System32" /tr "C:\Users\user\System32.exe"
malicious
C:\Users\user\System32.exe
C:\Users\user\System32.exe
malicious
C:\Users\user\System32.exe
"C:\Users\user\System32.exe"
malicious
C:\Users\user\System32.exe
"C:\Users\user\System32.exe"
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /delete /f /tn "System32"
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "System32" /tr "C:\Users\user\System32.exe"
malicious
C:\Users\user\System32.exe
C:\Users\user\System32.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp3B7C.tmp.bat""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout 3
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
pdf-standards.gl.at.ply.gg
malicious
http://nuget.org/NuGet.exe
unknown
https://discord.gg/sU6Cv4MGev
unknown
http://schemas.mic
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://ion=v4.5
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://www.microsoft.
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://www.microsoft.cob
unknown
http://crl.micros
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pdf-standards.gl.at.ply.gg
147.185.221.20
malicious

IPs

IP
Domain
Country
Malicious
147.185.221.20
pdf-standards.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
System32
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
System32

Memdumps

Base Address
Regiontype
Protect
Malicious
2641000
trusted library allocation
page read and write
malicious
3196000
trusted library allocation
page read and write
malicious
281B000
trusted library allocation
page read and write
malicious
28BCED90000
trusted library allocation
page read and write
3250000
heap
page execute and read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
1C00BC40000
heap
page read and write
2EE0000
heap
page execute and read and write
257B7055000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
7FFD9BC40000
trusted library allocation
page read and write
D13000
heap
page read and write
1B230000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
1BC84000
heap
page read and write
257B8930000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
257D0E40000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
4FA000
unkown
page execute and read and write
257D0FC0000
heap
page read and write
7FFD9BC5D000
trusted library allocation
page read and write
7FF4A6F60000
trusted library allocation
page execute and read and write
82209AB000
stack
page read and write
21B6DB67000
heap
page read and write
257B9701000
trusted library allocation
page read and write
21B6DB11000
heap
page read and write
7FFD9BB78000
trusted library allocation
page read and write
28BCEDF1000
trusted library allocation
page read and write
28BD717D000
heap
page read and write
257D10D0000
heap
page read and write
6A5BF79000
stack
page read and write
28BC0147000
trusted library allocation
page read and write
25747D00000
heap
page read and write
1B18F000
stack
page read and write
257B9A85000
trusted library allocation
page read and write
A65000
heap
page read and write
1BBE0000
heap
page read and write
28CFC041000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page execute and read and write
1C45E000
stack
page read and write
7FFD9BA80000
trusted library allocation
page read and write
C70000
trusted library allocation
page read and write
28CFC3A1000
heap
page read and write
28CFC108000
heap
page read and write
28C90001000
trusted library allocation
page read and write
28C90309000
trusted library allocation
page read and write
28CFA175000
heap
page read and write
7FFD9BB79000
trusted library allocation
page read and write
21B56842000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9B9F4000
trusted library allocation
page read and write
28C8115F000
trusted library allocation
page read and write
1C7EB000
stack
page read and write
1E011530000
heap
page read and write
12628000
trusted library allocation
page read and write
28CFA0A0000
heap
page read and write
28BBD198000
heap
page read and write
21B539F0000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page execute and read and write
1AED0000
heap
page read and write
28BD7191000
heap
page read and write
BC2000
heap
page read and write
21B65A69000
trusted library allocation
page read and write
21B555B0000
heap
page read and write
F0B3FF9000
stack
page read and write
F0B3F7F000
stack
page read and write
257C8CF9000
trusted library allocation
page read and write
7FFD9B8BC000
trusted library allocation
page execute and read and write
15A0000
heap
page read and write
21B6DE90000
heap
page read and write
53BCFBE000
unkown
page read and write
B2A000
heap
page read and write
A70F73E000
stack
page read and write
28C81892000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
7FFD9BB33000
trusted library allocation
page read and write
135B000
heap
page read and write
B1C000
heap
page read and write
3100000
heap
page read and write
21B53BE5000
heap
page read and write
7FFD9B87C000
trusted library allocation
page execute and read and write
28BBEAC0000
trusted library allocation
page read and write
21B6DBE0000
heap
page read and write
28BBEA80000
trusted library section
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
240E000
stack
page read and write
21B6DF3F000
heap
page read and write
6A5C1FF000
stack
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
25747D11000
heap
page read and write
E6F5B87000
stack
page read and write
257C8A11000
trusted library allocation
page read and write
1AA9D000
stack
page read and write
21B6DBF3000
heap
page read and write
7FFD9BC70000
trusted library allocation
page read and write
21B53BFF000
heap
page read and write
257C8CDA000
trusted library allocation
page read and write
28C81953000
trusted library allocation
page read and write
28CFA2B0000
trusted library allocation
page read and write
21B56877000
trusted library allocation
page read and write
28BC008D000
trusted library allocation
page read and write
1050000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
2817000
trusted library allocation
page read and write
A68000
heap
page read and write
28BBFE14000
trusted library allocation
page read and write
21B6DBE9000
heap
page read and write
28BBEA50000
heap
page read and write
7FFD9BB75000
trusted library allocation
page read and write
13148000
trusted library allocation
page read and write
7FFD9B83B000
trusted library allocation
page execute and read and write
7FFD9B814000
trusted library allocation
page read and write
21B568AA000
trusted library allocation
page read and write
2838000
trusted library allocation
page read and write
28C902EB000
trusted library allocation
page read and write
28BBFEDD000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
28CFC590000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
12C1000
heap
page read and write
7FFD9B9CA000
trusted library allocation
page read and write
1B6DB000
heap
page read and write
28BBFCE6000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
7FFD9B7F4000
trusted library allocation
page read and write
28CFC401000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9BBFA000
trusted library allocation
page read and write
1BDBE000
stack
page read and write
7FFD9BC10000
trusted library allocation
page read and write
1BA95000
stack
page read and write
28BD7276000
heap
page execute and read and write
E6F4BFE000
stack
page read and write
28C9035A000
trusted library allocation
page read and write
7FFD9BC0C000
trusted library allocation
page read and write
A710406000
stack
page read and write
6A5BDFF000
stack
page read and write
27C1000
trusted library allocation
page read and write
28BBFB42000
trusted library allocation
page read and write
1BC7F000
heap
page read and write
21B53B45000
heap
page read and write
14AE000
stack
page read and write
2836000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
21B53AD0000
heap
page read and write
28BBEA75000
heap
page read and write
7FFD9BC40000
trusted library allocation
page execute and read and write
28BC0BAD000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
F0B4FCC000
stack
page read and write
21B561D3000
trusted library allocation
page read and write
E3E000
stack
page read and write
6A5BC7E000
stack
page read and write
1316A000
trusted library allocation
page read and write
1C00BFE0000
heap
page read and write
28CFA197000
heap
page read and write
E6F49FF000
stack
page read and write
21B55460000
heap
page readonly
E6F4B79000
stack
page read and write
21B6DB20000
heap
page read and write
7FFD9B823000
trusted library allocation
page execute and read and write
7FFD9BB64000
trusted library allocation
page read and write
28CFC280000
heap
page read and write
257B8877000
heap
page execute and read and write
21B567B1000
trusted library allocation
page read and write
1C82F000
stack
page read and write
1E012DF5000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
A70000
heap
page read and write
A20000
trusted library allocation
page read and write
28CFC010000
heap
page read and write
28BCF078000
trusted library allocation
page read and write
7FFD9B822000
trusted library allocation
page read and write
7FFD9B8C6000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
28CFA140000
trusted library allocation
page read and write
F0B40F7000
stack
page read and write
3D0000
heap
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
1B35E000
stack
page read and write
21B53BDE000
heap
page read and write
257B95DB000
trusted library allocation
page read and write
115F000
heap
page read and write
7FFD9B812000
trusted library allocation
page read and write
28C811DB000
trusted library allocation
page read and write
21B53E45000
heap
page read and write
257BA81E000
trusted library allocation
page read and write
21B53AF0000
heap
page read and write
E6F5B0E000
stack
page read and write
28CFC372000
heap
page read and write
28BD7115000
heap
page read and write
21B6DB0F000
heap
page read and write
28BBEA90000
trusted library section
page read and write
1B9FE000
stack
page read and write
28CFA18D000
heap
page read and write
A75000
heap
page read and write
21B6DB97000
heap
page read and write
257D0E8C000
heap
page read and write
28BD7477000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1BDD4000
stack
page read and write
21B56999000
trusted library allocation
page read and write
E6F48FE000
stack
page read and write
25747F30000
heap
page read and write
1B0B0000
heap
page execute and read and write
5E0000
heap
page read and write
E6F4A79000
stack
page read and write
7FFD9B8D0000
trusted library allocation
page execute and read and write
28C90021000
trusted library allocation
page read and write
7FFD9B8C6000
trusted library allocation
page read and write
28CFA1D9000
heap
page read and write
7FFD9BB43000
trusted library allocation
page read and write
1C86E000
stack
page read and write
28BBD1D9000
heap
page read and write
28BBFCF3000
trusted library allocation
page read and write
257B6F21000
heap
page read and write
371000
stack
page read and write
257B9772000
trusted library allocation
page read and write
6A5CE49000
stack
page read and write
7FFD9B9E8000
trusted library allocation
page read and write
1C01E000
stack
page read and write
7FFD9B820000
trusted library allocation
page read and write
257B6F65000
heap
page read and write
257B6EE8000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
257B6F2B000
heap
page read and write
1C00BFE5000
heap
page read and write
7FFD9BB70000
trusted library allocation
page read and write
B5B000
heap
page read and write
A70F47D000
stack
page read and write
A30000
heap
page read and write
7FFD9BC70000
trusted library allocation
page read and write
21B6DBAF000
heap
page read and write
21B575AA000
trusted library allocation
page read and write
28C80BFB000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
2610000
heap
page execute and read and write
21B6DAC0000
heap
page read and write
1230000
heap
page read and write
7FFD9BB7A000
trusted library allocation
page read and write
28CFC2DB000
heap
page read and write
257D1197000
heap
page read and write
21B6DBC0000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9B8B6000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page execute and read and write
7FFD9B8C6000
trusted library allocation
page read and write
7FFD9B824000
trusted library allocation
page read and write
133E000
stack
page read and write
28CFC40A000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
28CFA250000
heap
page readonly
7FFD9B813000
trusted library allocation
page execute and read and write
28BD7486000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
7FFD9BB72000
trusted library allocation
page read and write
21B55470000
trusted library allocation
page read and write
F0B50C9000
stack
page read and write
1B170000
trusted library allocation
page read and write
2631000
trusted library allocation
page read and write
B2F000
heap
page read and write
7FFD9BB30000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
28CFBC90000
heap
page execute and read and write
7FFD9B8D6000
trusted library allocation
page execute and read and write
7FFD9BC0A000
trusted library allocation
page read and write
7C0000
heap
page read and write
257B8870000
heap
page execute and read and write
7FFD9BA60000
trusted library allocation
page read and write
257D10D4000
heap
page read and write
3C0000
heap
page read and write
249B2930000
heap
page read and write
6A5BD79000
stack
page read and write
28BD718D000
heap
page read and write
7FFD9B7F3000
trusted library allocation
page execute and read and write
1C3FA000
stack
page read and write
21B65A77000
trusted library allocation
page read and write
7FFD9B8D6000
trusted library allocation
page execute and read and write
D10000
heap
page read and write
28BD7250000
heap
page read and write
257C89F1000
trusted library allocation
page read and write
257B6F3D000
heap
page read and write
1B55D000
stack
page read and write
126B1000
trusted library allocation
page read and write
1B1BF000
stack
page read and write
28BD7181000
heap
page read and write
28C80087000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
28CFBCC5000
heap
page read and write
28BD7185000
heap
page read and write
28C81E25000
trusted library allocation
page read and write
28BD73BA000
heap
page read and write
28BD7438000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
28BCEDB1000
trusted library allocation
page read and write
B31000
heap
page read and write
28CFC2A3000
heap
page read and write
99FF1EF000
stack
page read and write
BC6000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
257D10A0000
heap
page execute and read and write
7FFD9B906000
trusted library allocation
page execute and read and write
21B6DF87000
heap
page read and write
21B53C26000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
257D1264000
heap
page read and write
21B65A08000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
257B8840000
trusted library allocation
page read and write
1B2BE000
stack
page read and write
2FE0000
heap
page execute and read and write
C80000
trusted library allocation
page read and write
257D0EF2000
heap
page read and write
A00000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
21B6DE80000
heap
page read and write
28CFA320000
heap
page read and write
7FFD9B7FD000
trusted library allocation
page execute and read and write
257BA819000
trusted library allocation
page read and write
F0B3BFE000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page execute and read and write
25747D03000
heap
page read and write
6A5B9FE000
stack
page read and write
7FFD9BC90000
trusted library allocation
page read and write
7DF43B0D0000
trusted library allocation
page execute and read and write
8220CFF000
unkown
page read and write
257B95F1000
trusted library allocation
page read and write
21B65A6D000
trusted library allocation
page read and write
F0B3E7E000
stack
page read and write
D35000
heap
page read and write
28CFA1D4000
heap
page read and write
257B89F1000
trusted library allocation
page read and write
26AF000
stack
page read and write
7FFD9B8E6000
trusted library allocation
page execute and read and write
7FFD9B8F6000
trusted library allocation
page execute and read and write
28BBFCEE000
trusted library allocation
page read and write
25747ED0000
heap
page read and write
257D09F0000
heap
page read and write
7FFD9B80D000
trusted library allocation
page execute and read and write
1B6DD000
stack
page read and write
C5E000
stack
page read and write
7FFD9BB68000
trusted library allocation
page read and write
28BBFF95000
trusted library allocation
page read and write
A71048C000
stack
page read and write
7FFD9BC30000
trusted library allocation
page execute and read and write
1290000
heap
page read and write
8F1000
stack
page read and write
E6F5C8E000
stack
page read and write
3261000
trusted library allocation
page read and write
28BBD060000
heap
page read and write
21B56960000
trusted library allocation
page read and write
2866000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B9E4000
trusted library allocation
page read and write
7FFD9B804000
trusted library allocation
page read and write
21B657EF000
trusted library allocation
page read and write
AE17ADC000
stack
page read and write
7FFD9BC66000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
28BD746E000
heap
page read and write
C83000
trusted library allocation
page read and write
7FFD9B80D000
trusted library allocation
page execute and read and write
7FFD9BC30000
trusted library allocation
page execute and read and write
A70F37E000
stack
page read and write
B34000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
3279000
trusted library allocation
page read and write
7FFD9B82B000
trusted library allocation
page read and write
F0B4277000
stack
page read and write
257C8A61000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
28CFC3B4000
heap
page read and write
257B95E9000
trusted library allocation
page read and write
53BD27F000
stack
page read and write
257B8850000
heap
page readonly
26A0000
heap
page execute and read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
21B564FE000
trusted library allocation
page read and write
28BD750B000
heap
page read and write
21B6DCF0000
trusted library allocation
page read and write
21B56B4B000
trusted library allocation
page read and write
1B19E000
stack
page read and write
21B55510000
heap
page execute and read and write
28BCF071000
trusted library allocation
page read and write
27AF000
stack
page read and write
257B8EBD000
trusted library allocation
page read and write
F0B51CE000
stack
page read and write
7FFD9BA02000
trusted library allocation
page read and write
28C810C0000
trusted library allocation
page read and write
1299000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
A70EFFF000
stack
page read and write
28BBD194000
heap
page read and write
28CFC03B000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
257B8800000
trusted library section
page read and write
28CFC055000
heap
page read and write
7FFD9B86C000
trusted library allocation
page execute and read and write
2637000
trusted library allocation
page read and write
26C1000
trusted library allocation
page read and write
A60000
heap
page read and write
21B6DF36000
heap
page read and write
28CFA2E0000
trusted library allocation
page read and write
28CFC29D000
heap
page read and write
7FFD9BC6D000
trusted library allocation
page read and write
257C8CE1000
trusted library allocation
page read and write
28BBED40000
heap
page execute and read and write
7FFD9B8CC000
trusted library allocation
page execute and read and write
7FFD9B9F2000
trusted library allocation
page read and write
257B8900000
trusted library allocation
page read and write
2844000
trusted library allocation
page read and write
7FFD9BAFF000
trusted library allocation
page read and write
7FFD9BB78000
trusted library allocation
page read and write
C6A000
unkown
page readonly
249B2640000
heap
page read and write
28CFBCC0000
heap
page read and write
28CFA191000
heap
page read and write
7FFD9BB00000
trusted library allocation
page read and write
21B53B40000
heap
page read and write
FB1000
stack
page read and write
AFC000
heap
page read and write
28CFC42E000
heap
page read and write
28CFA2A0000
heap
page execute and read and write
E6F4DB8000
stack
page read and write
7FFD9BC60000
trusted library allocation
page read and write
28C90242000
trusted library allocation
page read and write
31E6000
trusted library allocation
page read and write
3271000
trusted library allocation
page read and write
6A5C37C000
stack
page read and write
28BD743E000
heap
page read and write
28BCF06F000
trusted library allocation
page read and write
2430000
heap
page read and write
F0B417D000
stack
page read and write
7FFD9BB80000
trusted library allocation
page read and write
249B2630000
heap
page read and write
12CD000
heap
page read and write
F0B41F9000
stack
page read and write
258E000
stack
page read and write
7FFD9B802000
trusted library allocation
page read and write
282B000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
126B3000
trusted library allocation
page read and write
28BBEBC0000
heap
page read and write
28BBD190000
heap
page read and write
28BBF991000
trusted library allocation
page read and write
7FFD9BB8C000
trusted library allocation
page read and write
21B6DFC8000
heap
page read and write
6A5CF4E000
stack
page read and write
1BC77000
heap
page read and write
28CFC347000
heap
page read and write
7FFD9BB30000
trusted library allocation
page read and write
25747DD0000
heap
page read and write
A70F3F9000
stack
page read and write
7FFD9BA00000
trusted library allocation
page execute and read and write
28BBFF29000
trusted library allocation
page read and write
257B88F0000
heap
page read and write
28BD7539000
heap
page read and write
7FFD9B86C000
trusted library allocation
page execute and read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
A71028E000
stack
page read and write
10E3000
heap
page read and write
1A7F0000
trusted library allocation
page read and write
28C90072000
trusted library allocation
page read and write
21B555CE000
heap
page read and write
2831000
trusted library allocation
page read and write
7FFD9B814000
trusted library allocation
page read and write
1210000
heap
page read and write
28BBFEA2000
trusted library allocation
page read and write
BC9000
heap
page read and write
1C35A000
stack
page read and write
AF0000
heap
page read and write
7FFD9BB69000
trusted library allocation
page read and write
21B657B1000
trusted library allocation
page read and write
25747CD0000
heap
page read and write
21B6DF89000
heap
page read and write
257B9D7D000
trusted library allocation
page read and write
7CB000
heap
page read and write
28BBFDBA000
trusted library allocation
page read and write
A70F2F9000
stack
page read and write
21B554E0000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
B6E000
stack
page read and write
257B8A78000
trusted library allocation
page read and write
28BBEA70000
heap
page read and write
E6F4CBE000
stack
page read and write
7FFD9B7FD000
trusted library allocation
page execute and read and write
AE17BDF000
stack
page read and write
25747D10000
heap
page read and write
21B55750000
heap
page execute and read and write
AC0000
heap
page read and write
12CB000
heap
page read and write
7FFD9B814000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
127D1000
trusted library allocation
page read and write
B5D000
heap
page read and write
15A5000
heap
page read and write
257D10CC000
heap
page read and write
A70EF7D000
stack
page read and write
257B6FE0000
heap
page read and write
12F7000
heap
page read and write
99FF16F000
unkown
page read and write
6A5BE77000
stack
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
7FFD9B9D0000
trusted library allocation
page execute and read and write
C5E000
unkown
page readonly
6A5BEFD000
stack
page read and write
A71058E000
stack
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
2F30000
heap
page read and write
1C96A000
stack
page read and write
257C8A21000
trusted library allocation
page read and write
E6F4FBE000
stack
page read and write
25747D02000
heap
page read and write
7FFD9BB74000
trusted library allocation
page read and write
257BA7D4000
trusted library allocation
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
1CF6D000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
257BA286000
trusted library allocation
page read and write
28CFBC30000
heap
page execute and read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
28CFC180000
heap
page read and write
257C8CDF000
trusted library allocation
page read and write
28C81308000
trusted library allocation
page read and write
7FFD9B9F8000
trusted library allocation
page read and write
28BBF9BD000
trusted library allocation
page read and write
7FFD9B9BA000
trusted library allocation
page read and write
F0B44FE000
stack
page read and write
A70F53E000
stack
page read and write
28BBEBD5000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
28C80D81000
trusted library allocation
page read and write
28CFC1B3000
heap
page read and write
28CFC069000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
BB3000
heap
page read and write
F0B42F8000
stack
page read and write
7FFD9B9F8000
trusted library allocation
page read and write
7FFD9BC56000
trusted library allocation
page read and write
10B3000
heap
page read and write
1C00BBA0000
heap
page read and write
A45000
heap
page read and write
257D0F21000
heap
page read and write
7FFD9B813000
trusted library allocation
page execute and read and write
28BD74DF000
heap
page read and write
7FFD9B7F3000
trusted library allocation
page execute and read and write
21B55517000
heap
page execute and read and write
28BBFFD4000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9BA08000
trusted library allocation
page read and write
6A5B93E000
stack
page read and write
7FFD9BC72000
trusted library allocation
page read and write
28C80001000
trusted library allocation
page read and write
E6F4EBE000
stack
page read and write
257B6DF0000
heap
page read and write
21B53BED000
heap
page read and write
2840000
trusted library allocation
page read and write
1285000
heap
page read and write
7FFD9BC76000
trusted library allocation
page read and write
1C00BBB0000
heap
page read and write
A70F83E000
stack
page read and write
7FFD9BC6D000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
28CF9FA0000
heap
page read and write
21B56816000
trusted library allocation
page read and write
257B7000000
heap
page read and write
28CFC061000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9B82B000
trusted library allocation
page read and write
6A5CD4E000
stack
page read and write
A50000
trusted library allocation
page read and write
28CFA080000
heap
page read and write
F0B3BB3000
stack
page read and write
1030000
heap
page read and write
13170000
trusted library allocation
page read and write
B60000
heap
page read and write
1076000
heap
page read and write
28CFC441000
heap
page read and write
28BC06D6000
trusted library allocation
page read and write
F0B3EFE000
stack
page read and write
249B2660000
heap
page read and write
F0B457B000
stack
page read and write
7DF43B0E0000
trusted library allocation
page execute and read and write
10DF000
heap
page read and write
6A5C2FE000
stack
page read and write
28BC0509000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
21B570D3000
trusted library allocation
page read and write
257B9DBD000
trusted library allocation
page read and write
5A0000
heap
page read and write
28CFC3FB000
heap
page read and write
28BC0615000
trusted library allocation
page read and write
28C80A52000
trusted library allocation
page read and write
7FFD9B83D000
trusted library allocation
page execute and read and write
A70F27E000
stack
page read and write
A71038E000
stack
page read and write
A71050C000
stack
page read and write
28CFC1A8000
heap
page read and write
7FFD9B9CA000
trusted library allocation
page read and write
28C81E2A000
trusted library allocation
page read and write
1605000
heap
page read and write
7FFD9BC1C000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page execute and read and write
28BCF06A000
trusted library allocation
page read and write
28CFC374000
heap
page read and write
12B9000
heap
page read and write
25747D00000
heap
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
28BD74B2000
heap
page read and write
99FF0E9000
stack
page read and write
28C902F7000
trusted library allocation
page read and write
7FFD9B834000
trusted library allocation
page read and write
21B53E30000
trusted library allocation
page read and write
1580000
trusted library allocation
page read and write
1B45F000
stack
page read and write
7FFD9BB40000
trusted library allocation
page read and write
E6F497E000
stack
page read and write
1BBBE000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1B250000
heap
page execute and read and write
257B6EE0000
heap
page read and write
21B65A6F000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
25747D13000
heap
page read and write
7FFD9B8CC000
trusted library allocation
page execute and read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9BB7C000
trusted library allocation
page read and write
A70F5B9000
stack
page read and write
6A5C0F8000
stack
page read and write
25747CDA000
heap
page read and write
7DF4E9160000
trusted library allocation
page execute and read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
28CFC315000
heap
page read and write
7FFD9B9F2000
trusted library allocation
page read and write
28BC002C000
trusted library allocation
page read and write
6A5C079000
stack
page read and write
A9C000
heap
page read and write
B19000
heap
page read and write
25747F20000
heap
page read and write
E6F4E3A000
stack
page read and write
28C81E05000
trusted library allocation
page read and write
A35000
heap
page read and write
25747D11000
heap
page read and write
2621000
trusted library allocation
page read and write
1BBC0000
heap
page read and write
7FFD9B9D1000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
7FFD9B803000
trusted library allocation
page execute and read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B81B000
trusted library allocation
page read and write
21B57585000
trusted library allocation
page read and write
28BD73FA000
heap
page read and write
3050000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
28CFBAD1000
heap
page read and write
7B0000
heap
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
28BBFAFF000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page execute and read and write
7FFD9BB64000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
21B56F06000
trusted library allocation
page read and write
10DD000
heap
page read and write
1C0BB000
stack
page read and write
A60000
heap
page read and write
1C55D000
stack
page read and write
AE17B5E000
stack
page read and write
AC5000
heap
page read and write
6A5CECD000
stack
page read and write
1BEBE000
stack
page read and write
9D0000
heap
page read and write
1B090000
heap
page read and write
28BBD270000
heap
page read and write
21B56A8F000
trusted library allocation
page read and write
6A5BFF7000
stack
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
28CFC398000
heap
page read and write
28BD7189000
heap
page read and write
25747EB0000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
28C81005000
trusted library allocation
page read and write
1B660000
heap
page read and write
2F5E000
stack
page read and write
750000
trusted library allocation
page read and write
6D0000
heap
page read and write
257D120F000
heap
page read and write
28BBEFA9000
trusted library allocation
page read and write
7DF426EA0000
trusted library allocation
page execute and read and write
2E50000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
28BBFCF7000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
F0B514C000
stack
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
12621000
trusted library allocation
page read and write
31EE000
trusted library allocation
page read and write
28CFC0D8000
heap
page read and write
7FFD9B86C000
trusted library allocation
page execute and read and write
7FFD9B8B0000
trusted library allocation
page read and write
257D1261000
heap
page read and write
F0B4379000
stack
page read and write
7FFD9BB00000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
28C81094000
trusted library allocation
page read and write
3141000
trusted library allocation
page read and write
21B53BE1000
heap
page read and write
25747D11000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7FFD9B80D000
trusted library allocation
page execute and read and write
28CFC1AF000
heap
page read and write
12B6000
heap
page read and write
28BBFE40000
trusted library allocation
page read and write
109A000
heap
page read and write
1BAB0000
heap
page read and write
21B56FEB000
trusted library allocation
page read and write
C50000
unkown
page readonly
257BA25F000
trusted library allocation
page read and write
E6F503C000
stack
page read and write
7FFD9BC80000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
28BC0B88000
trusted library allocation
page read and write
28BBD158000
heap
page read and write
21B53C28000
heap
page read and write
7FFD9B8C6000
trusted library allocation
page read and write
28CFC305000
heap
page read and write
21B53BA0000
heap
page read and write
13A0000
heap
page read and write
257BA17A000
trusted library allocation
page read and write
6F0000
heap
page read and write
28CFC1A0000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B804000
trusted library allocation
page read and write
28BBD420000
heap
page read and write
A40000
heap
page read and write
7FFD9BB7C000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1BE4E000
stack
page read and write
3130000
heap
page execute and read and write
134F000
heap
page read and write
7FFD9B85C000
trusted library allocation
page execute and read and write
28BBFCFB000
trusted library allocation
page read and write
12623000
trusted library allocation
page read and write
1CA6A000
stack
page read and write
7FFD9BB40000
trusted library allocation
page read and write
BC4000
heap
page read and write
15AE000
stack
page read and write
28BCF088000
trusted library allocation
page read and write
28C90031000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
3281000
trusted library allocation
page read and write
1CB70000
heap
page read and write
6A5B9BE000
stack
page read and write
257D1460000
heap
page read and write
31A2000
trusted library allocation
page read and write
28CFA0E0000
heap
page read and write
1BB40000
heap
page read and write
25747D11000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
28CFC445000
heap
page read and write
7FFD9B9B1000
trusted library allocation
page read and write
28C81786000
trusted library allocation
page read and write
7FFD9B82D000
trusted library allocation
page execute and read and write
1B65F000
stack
page read and write
7FFD9B8CC000
trusted library allocation
page execute and read and write
7FFD9B800000
trusted library allocation
page read and write
790000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
1AFDE000
stack
page read and write
590000
heap
page read and write
A70F8BC000
stack
page read and write
28BD7260000
trusted library allocation
page read and write
7FFD9B822000
trusted library allocation
page read and write
AC7000
heap
page read and write
257B8820000
trusted library allocation
page read and write
257B9C9D000
trusted library allocation
page read and write
28CFBC37000
heap
page execute and read and write
7FFD9B834000
trusted library allocation
page read and write
E6F5A0E000
stack
page read and write
F0B4F4E000
stack
page read and write
28CFC42B000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
257B6F1C000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
28BD72A0000
heap
page read and write
21B56963000
trusted library allocation
page read and write
28BCED81000
trusted library allocation
page read and write
28BCEDA1000
trusted library allocation
page read and write
E6F4AFE000
stack
page read and write
249B26B0000
heap
page read and write
7FFD9B9E2000
trusted library allocation
page read and write
7FFD9B8F6000
trusted library allocation
page execute and read and write
257D10C8000
heap
page read and write
21B56785000
trusted library allocation
page read and write
7FFD9B8DC000
trusted library allocation
page execute and read and write
1280000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
127C1000
trusted library allocation
page read and write
127C8000
trusted library allocation
page read and write
7CD000
heap
page read and write
28CFA120000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
28BD748A000
heap
page read and write
21B56875000
trusted library allocation
page read and write
28BBED81000
trusted library allocation
page read and write
E6F4D39000
stack
page read and write
7FFD9B9C1000
trusted library allocation
page read and write
21B657A1000
trusted library allocation
page read and write
7FFD9B8D6000
trusted library allocation
page read and write
7FFD9B81D000
trusted library allocation
page execute and read and write
28BD7380000
heap
page read and write
7FFD9B86C000
trusted library allocation
page execute and read and write
28CFC050000
heap
page read and write
28BD70EC000
heap
page read and write
7FFD9BA04000
trusted library allocation
page read and write
7B8000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
21B6DFBA000
heap
page read and write
28BBF980000
trusted library allocation
page read and write
A55000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
28C81DE0000
trusted library allocation
page read and write
28BBFF5C000
trusted library allocation
page read and write
A70F63B000
stack
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
28CFC3FF000
heap
page read and write
1E011439000
heap
page read and write
7FFD9B814000
trusted library allocation
page read and write
21B55770000
heap
page execute and read and write
21B5671B000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
114B000
heap
page read and write
249B26BF000
heap
page read and write
257C8CE9000
trusted library allocation
page read and write
E6F5C0C000
stack
page read and write
1370000
trusted library allocation
page read and write
28BD74D1000
heap
page read and write
7FFD9B935000
trusted library allocation
page execute and read and write
DB1000
stack
page read and write
1D06A000
stack
page read and write
28BC0BA8000
trusted library allocation
page read and write
1C00BBD0000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
7FFD9B7F3000
trusted library allocation
page execute and read and write
7FFD9BB72000
trusted library allocation
page read and write
283E000
trusted library allocation
page read and write
7F8000
heap
page read and write
16AE000
stack
page read and write
28CFA325000
heap
page read and write
799000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page execute and read and write
7FFD9BC80000
trusted library allocation
page read and write
28BD7270000
heap
page execute and read and write
21B53B50000
heap
page read and write
7FFD9B9C1000
trusted library allocation
page read and write
7FFD9B802000
trusted library allocation
page read and write
7FFD9B81D000
trusted library allocation
page execute and read and write
1070000
heap
page read and write
21B564F5000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
13261000
trusted library allocation
page read and write
28BC071D000
trusted library allocation
page read and write
6A5CF4C000
stack
page read and write
28BD70C0000
heap
page read and write
1C2F5000
stack
page read and write
21B53C2B000
heap
page read and write
7FFD9B83B000
trusted library allocation
page read and write
1CB6D000
stack
page read and write
28BC0109000
trusted library allocation
page read and write
9F0000
heap
page read and write
7FFD9BB53000
trusted library allocation
page read and write
7B5000
heap
page read and write
257D1134000
heap
page read and write
A70EEF3000
stack
page read and write
155F000
stack
page read and write
249B2935000
heap
page read and write
7FFD9B8D6000
trusted library allocation
page execute and read and write
257B99F4000
trusted library allocation
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
21B6DFC3000
heap
page read and write
257B9625000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
257B9995000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page execute and read and write
A71030C000
stack
page read and write
7FFD9BA10000
trusted library allocation
page execute and read and write
E6F4873000
stack
page read and write
25747D11000
heap
page read and write
263D000
trusted library allocation
page read and write
A9A000
heap
page read and write
1000000
heap
page read and write
21B559A9000
trusted library allocation
page read and write
7DF4BF4E0000
trusted library allocation
page execute and read and write
21B554A0000
trusted library allocation
page read and write
28BBEB10000
trusted library allocation
page read and write
257B9A78000
trusted library allocation
page read and write
6A5C27C000
stack
page read and write
7FFD9B9F4000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page execute and read and write
1E011610000
heap
page read and write
A70F6BA000
stack
page read and write
28CFA1AD000
heap
page read and write
28CFA150000
heap
page read and write
257B8880000
heap
page execute and read and write
7FFD9BC50000
trusted library allocation
page read and write
5C0000
heap
page read and write
7FFD9B800000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
7FFD9B802000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
28CFC362000
heap
page read and write
E6F5A8D000
stack
page read and write
28C812A7000
trusted library allocation
page read and write
257B9CFE000
trusted library allocation
page read and write
1AC3E000
stack
page read and write
2639000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
7FFD9BC00000
trusted library allocation
page read and write
7FFD9B7FD000
trusted library allocation
page execute and read and write
1BAB3000
heap
page read and write
28BBD425000
heap
page read and write
257B95F9000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
257B6FD3000
heap
page read and write
21B65781000
trusted library allocation
page read and write
8220DFF000
stack
page read and write
28CFC4A0000
trusted library allocation
page read and write
28CFC037000
heap
page read and write
7DF426EB0000
trusted library allocation
page execute and read and write
21B53B80000
trusted library allocation
page read and write
28C81124000
trusted library allocation
page read and write
28CFC035000
heap
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
7FFD9B81D000
trusted library allocation
page execute and read and write
28CFA19B000
heap
page read and write
A50000
heap
page read and write
28CFC3F6000
heap
page read and write
28BC0B63000
trusted library allocation
page read and write
7DF4BF4F0000
trusted library allocation
page execute and read and write
1E012DF0000
heap
page read and write
21B53BE7000
heap
page read and write
6A5BCFE000
stack
page read and write
28C8186C000
trusted library allocation
page read and write
13141000
trusted library allocation
page read and write
21B55C4D000
trusted library allocation
page read and write
257B9BCF000
trusted library allocation
page read and write
7FFD9BB43000
trusted library allocation
page read and write
21B57012000
trusted library allocation
page read and write
7FFD9B8D0000
trusted library allocation
page execute and read and write
5E0000
heap
page read and write
21B57560000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
28BD7179000
heap
page read and write
257B6FDC000
heap
page read and write
257B7030000
heap
page read and write
7FFD9B813000
trusted library allocation
page execute and read and write
28BBD250000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page execute and read and write
28BBFD08000
trusted library allocation
page read and write
1B29F000
stack
page read and write
7FFD9BA30000
trusted library allocation
page read and write
1BC53000
heap
page read and write
21B55781000
trusted library allocation
page read and write
7FFD9B8F6000
trusted library allocation
page execute and read and write
AF6000
heap
page read and write
28CFA235000
heap
page read and write
1CE6E000
stack
page read and write
257D10D8000
heap
page read and write
28C80C8F000
trusted library allocation
page read and write
4E0000
unkown
page execute and read and write
28BBD18D000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9B813000
trusted library allocation
page execute and read and write
7FFD9BC80000
trusted library allocation
page read and write
1C05E000
stack
page read and write
7FFD9B8F6000
trusted library allocation
page execute and read and write
F0B407F000
stack
page read and write
7AB000
heap
page read and write
21B53E40000
heap
page read and write
21B5648B000
trusted library allocation
page read and write
327D000
trusted library allocation
page read and write
21B6DBF0000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
C52000
unkown
page readonly
7FFD9BAA0000
trusted library allocation
page read and write
257B6EF2000
heap
page read and write
21B65A87000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
7FFD9BC13000
trusted library allocation
page read and write
257D1103000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
1BD4F000
stack
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
28CFA193000
heap
page read and write
53BCF39000
stack
page read and write
1159000
heap
page read and write
28BBD150000
heap
page read and write
7FFD9B83D000
trusted library allocation
page execute and read and write
28CFA260000
trusted library allocation
page read and write
21B56A2D000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
21B56B47000
trusted library allocation
page read and write
21B6DBEC000
heap
page read and write
28BBEAD0000
heap
page readonly
7FFD9BB6C000
trusted library allocation
page read and write
28CFC07F000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
1C4F4000
stack
page read and write
257B7050000
heap
page read and write
30F0000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
1BB9A000
stack
page read and write
6A5B8B3000
stack
page read and write
CEF000
stack
page read and write
28BBD1AE000
heap
page read and write
1600000
heap
page read and write
5D0000
heap
page read and write
1B6D7000
heap
page read and write
1B070000
heap
page execute and read and write
7FFD9BC67000
trusted library allocation
page read and write
7FFD9B82D000
trusted library allocation
page execute and read and write
1BB1E000
stack
page read and write
F0B447E000
stack
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1B6D1000
heap
page read and write
21B56FAC000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page execute and read and write
7FFD9BAB0000
trusted library allocation
page read and write
28BD7512000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
7FFD9BAD3000
trusted library allocation
page read and write
28BD7151000
heap
page read and write
28C80C01000
trusted library allocation
page read and write
28CFBC50000
heap
page read and write
7FFD9BB88000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
13A5000
heap
page read and write
28BBD1D6000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
257D12F0000
trusted library allocation
page read and write
F0B43FE000
stack
page read and write
257B8860000
trusted library allocation
page read and write
1B49F000
stack
page read and write
28BD71B7000
heap
page read and write
28BBD19C000
heap
page read and write
13263000
trusted library allocation
page read and write
257BA7F9000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
257B8810000
trusted library section
page read and write
257B89E0000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
28C902F1000
trusted library allocation
page read and write
28BBEAA0000
trusted library allocation
page read and write
6A5CDCE000
stack
page read and write
28C813C5000
trusted library allocation
page read and write
B24000
heap
page read and write
21B55806000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
28BBF24D000
trusted library allocation
page read and write
25A0000
heap
page execute and read and write
28BC05EE000
trusted library allocation
page read and write
7FFD9B804000
trusted library allocation
page read and write
257B9B17000
trusted library allocation
page read and write
257B9A20000
trusted library allocation
page read and write
A70F4F6000
stack
page read and write
21B6DF9A000
heap
page read and write
B4E000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
28CFC319000
heap
page read and write
1BC4E000
stack
page read and write
28C903CD000
trusted library allocation
page read and write
7FFD9BB59000
trusted library allocation
page read and write
257B9442000
trusted library allocation
page read and write
26B1000
trusted library allocation
page read and write
A70F7BE000
stack
page read and write
257BA347000
trusted library allocation
page read and write
1C25B000
stack
page read and write
7FFD9BB20000
trusted library allocation
page read and write
257D114A000
heap
page read and write
28BBED70000
heap
page execute and read and write
257D10C0000
heap
page read and write
7FFD9BB69000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B81D000
trusted library allocation
page execute and read and write
1010000
heap
page read and write
2833000
trusted library allocation
page read and write
E6F4C77000
stack
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
1E011430000
heap
page read and write
249B26B8000
heap
page read and write
4F8000
unkown
page execute and read and write
8F1000
stack
page read and write
2EAE000
stack
page read and write
7FFD9B80D000
trusted library allocation
page execute and read and write
7FFD9BB54000
trusted library allocation
page read and write
27B0000
heap
page read and write
257B8C1A000
trusted library allocation
page read and write
21B6DFDE000
heap
page read and write
7FFD9B8CC000
trusted library allocation
page execute and read and write
F0B504D000
stack
page read and write
1BFBE000
stack
page read and write
257B88F5000
heap
page read and write
257B9769000
trusted library allocation
page read and write
28BBEE00000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
13268000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
3277000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
1AD4D000
stack
page read and write
7FFD9B840000
trusted library allocation
page read and write
257B6F27000
heap
page read and write
28C80D0F000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page execute and read and write
1B5BD000
stack
page read and write
1250000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
98E000
stack
page read and write
257D1233000
heap
page read and write
7FFD9B9DA000
trusted library allocation
page read and write
7FFD9B804000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
28C81031000
trusted library allocation
page read and write
257B9AB1000
trusted library allocation
page read and write
126B8000
trusted library allocation
page read and write
257D1231000
heap
page read and write
1BC17000
heap
page read and write
257B9633000
trusted library allocation
page read and write
1BFDA000
stack
page read and write
1200000
heap
page read and write
1C00BC48000
heap
page read and write
7FFD9BB00000
trusted library allocation
page read and write
6A5BFFE000
stack
page read and write
7DF4E9150000
trusted library allocation
page execute and read and write
10B0000
heap
page read and write
730000
trusted library allocation
page read and write
28C902F9000
trusted library allocation
page read and write
28C80C09000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
D30000
heap
page read and write
28BBEB50000
trusted library allocation
page read and write
31D2000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
28C902EF000
trusted library allocation
page read and write
21B575A5000
trusted library allocation
page read and write
E6F4F3E000
stack
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
1B39E000
stack
page read and write
1E012E00000
heap
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
7FFD9BB62000
trusted library allocation
page read and write
6A5C17E000
stack
page read and write
28C80229000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
257B6EFF000
heap
page read and write
7FFD9B822000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page execute and read and write
28C804CD000
trusted library allocation
page read and write
7FFD9B82D000
trusted library allocation
page execute and read and write
7DF4BF4D0000
trusted library allocation
page execute and read and write
7FFD9BBF0000
trusted library allocation
page read and write
28BBF7D2000
trusted library allocation
page read and write
7FFD9B802000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
There are 1184 hidden memdumps, click here to show them.