Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
x.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\java update (64 bit).exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4kgxjo2a.h14.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4n4xj43d.tvs.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5tw3tlwy.vmf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5zyvb5j4.wjv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b3auqxqp.ypd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bbtrwh01.qp1.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cuvpbk5g.23y.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dyyekuld.bsr.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gsdh0jlc.iqk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pp3di0oj.b4a.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_prmtbr1l.c3e.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qqsjttzh.ysf.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x35coq0l.cfe.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xydc1ujy.3zv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ylb4k0jh.0kv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yshen41j.gbz.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\java update (64 bit).lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jul 16 03:24:48
2024, mtime=Tue Jul 16 03:24:48 2024, atime=Tue Jul 16 03:24:48 2024, length=44544, window=hide
|
dropped
|
There are 11 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\x.exe
|
"C:\Users\user\Desktop\x.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\x.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'x.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\java
update (64 bit).exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'java
update (64 bit).exe'
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
89.213.177.100
|
|||
http://www.microsoft.cots/MicrosoftP
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.microsoft.co(
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://crl.m.
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://crl.v
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 12 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
89.213.177.100
|
unknown
|
United Kingdom
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
27F1000
|
trusted library allocation
|
page read and write
|
||
283A000
|
trusted library allocation
|
page read and write
|
||
502000
|
unkown
|
page readonly
|
||
240755D2000
|
heap
|
page read and write
|
||
36CEB3E000
|
stack
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
1AE34F10000
|
trusted library section
|
page read and write
|
||
1AE34FE0000
|
heap
|
page execute and read and write
|
||
218137CD000
|
heap
|
page read and write
|
||
2CD4D068000
|
trusted library allocation
|
page read and write
|
||
7FFD34728000
|
trusted library allocation
|
page read and write
|
||
2CD4D048000
|
trusted library allocation
|
page read and write
|
||
2182DC41000
|
heap
|
page read and write
|
||
36CE7F7000
|
stack
|
page read and write
|
||
77B5E7E000
|
stack
|
page read and write
|
||
2CD637DA000
|
heap
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
7FFD348CC000
|
trusted library allocation
|
page read and write
|
||
1AE34CB0000
|
heap
|
page read and write
|
||
EC5FE7E000
|
stack
|
page read and write
|
||
1AE367F1000
|
heap
|
page read and write
|
||
218171E2000
|
trusted library allocation
|
page read and write
|
||
EC61047000
|
stack
|
page read and write
|
||
21815277000
|
heap
|
page read and write
|
||
2CD63796000
|
heap
|
page read and write
|
||
36CEC3E000
|
stack
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
218151C0000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
2CD5B271000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
218166B4000
|
trusted library allocation
|
page read and write
|
||
77B5F7F000
|
stack
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
21813817000
|
heap
|
page read and write
|
||
1AE37E93000
|
trusted library allocation
|
page read and write
|
||
77B59FE000
|
stack
|
page read and write
|
||
24001E25000
|
trusted library allocation
|
page read and write
|
||
240103CE000
|
trusted library allocation
|
page read and write
|
||
77B5CF9000
|
stack
|
page read and write
|
||
77B6BCD000
|
stack
|
page read and write
|
||
1AE35045000
|
heap
|
page read and write
|
||
7FFD3456D000
|
trusted library allocation
|
page execute and read and write
|
||
2182DC6D000
|
heap
|
page read and write
|
||
7FFD34873000
|
trusted library allocation
|
page read and write
|
||
21815230000
|
trusted library allocation
|
page read and write
|
||
7FFD34701000
|
trusted library allocation
|
page read and write
|
||
2CD63B05000
|
heap
|
page read and write
|
||
218137D5000
|
heap
|
page read and write
|
||
A63000
|
heap
|
page read and write
|
||
77B5873000
|
stack
|
page read and write
|
||
218137D3000
|
heap
|
page read and write
|
||
1AE35040000
|
heap
|
page read and write
|
||
2CD63AF3000
|
heap
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
7FFD346F1000
|
trusted library allocation
|
page read and write
|
||
7FFD34996000
|
trusted library allocation
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
2CD49883000
|
heap
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
218253E1000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
240757F0000
|
heap
|
page read and write
|
||
1AE34D69000
|
heap
|
page read and write
|
||
77B5DFA000
|
stack
|
page read and write
|
||
7FFD3456B000
|
trusted library allocation
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page execute and read and write
|
||
24073780000
|
trusted library allocation
|
page read and write
|
||
2CD5B549000
|
trusted library allocation
|
page read and write
|
||
2CD4C48F000
|
trusted library allocation
|
page read and write
|
||
2CD638C2000
|
heap
|
page read and write
|
||
1AE34D20000
|
heap
|
page read and write
|
||
2CD637ED000
|
heap
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
2182DC3C000
|
heap
|
page read and write
|
||
1AE4EFC4000
|
heap
|
page read and write
|
||
2CD49A95000
|
heap
|
page read and write
|
||
21817202000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
21813B55000
|
heap
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
240756D0000
|
heap
|
page execute and read and write
|
||
7FFD34744000
|
trusted library allocation
|
page read and write
|
||
127F1000
|
trusted library allocation
|
page read and write
|
||
1B1BA000
|
stack
|
page read and write
|
||
7FFD34626000
|
trusted library allocation
|
page execute and read and write
|
||
1B73A000
|
heap
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
240012D8000
|
trusted library allocation
|
page read and write
|
||
1AE4F129000
|
heap
|
page read and write
|
||
7FFD348B4000
|
trusted library allocation
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
1AE4F0FD000
|
heap
|
page read and write
|
||
2182D868000
|
heap
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
1C176000
|
stack
|
page read and write
|
||
1AE34F60000
|
heap
|
page readonly
|
||
7FFD346E2000
|
trusted library allocation
|
page read and write
|
||
240756D6000
|
heap
|
page execute and read and write
|
||
7FFD34554000
|
trusted library allocation
|
page read and write
|
||
7FFD346F2000
|
trusted library allocation
|
page read and write
|
||
21813B20000
|
heap
|
page read and write
|
||
36CE3EE000
|
stack
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
7FFD34544000
|
trusted library allocation
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
77B597E000
|
stack
|
page read and write
|
||
7FFD348B4000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
2CD4C1A5000
|
trusted library allocation
|
page read and write
|
||
2CD4C582000
|
trusted library allocation
|
page read and write
|
||
2182D874000
|
heap
|
page read and write
|
||
2182D8F9000
|
heap
|
page read and write
|
||
A3941DF000
|
stack
|
page read and write
|
||
1AE388AC000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
2CD638B0000
|
heap
|
page read and write
|
||
1AE46DBA000
|
trusted library allocation
|
page read and write
|
||
21815180000
|
trusted library allocation
|
page read and write
|
||
24001007000
|
trusted library allocation
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page execute and read and write
|
||
2182D940000
|
heap
|
page read and write
|
||
21815460000
|
trusted library allocation
|
page read and write
|
||
24075822000
|
heap
|
page read and write
|
||
218137CB000
|
heap
|
page read and write
|
||
7FFD349A6000
|
trusted library allocation
|
page read and write
|
||
240012A3000
|
trusted library allocation
|
page read and write
|
||
7FFD348AC000
|
trusted library allocation
|
page read and write
|
||
240758E9000
|
heap
|
page read and write
|
||
2182D876000
|
heap
|
page read and write
|
||
7FFD34748000
|
trusted library allocation
|
page read and write
|
||
2CD639C0000
|
heap
|
page read and write
|
||
240011D7000
|
trusted library allocation
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page execute and read and write
|
||
1AE388F6000
|
trusted library allocation
|
page read and write
|
||
21825452000
|
trusted library allocation
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
2CD49820000
|
heap
|
page read and write
|
||
1AE4F141000
|
heap
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page read and write
|
||
1B719000
|
heap
|
page read and write
|
||
7FFD3494C000
|
trusted library allocation
|
page read and write
|
||
2CD4B241000
|
trusted library allocation
|
page read and write
|
||
7FFD34554000
|
trusted library allocation
|
page read and write
|
||
7FFD34722000
|
trusted library allocation
|
page read and write
|
||
36CF68F000
|
stack
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
7FFD34893000
|
trusted library allocation
|
page read and write
|
||
7FFD348CA000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
24074FB0000
|
trusted library allocation
|
page read and write
|
||
24073530000
|
heap
|
page read and write
|
||
2182DCA4000
|
heap
|
page read and write
|
||
A39419E000
|
stack
|
page read and write
|
||
24075866000
|
heap
|
page read and write
|
||
2CD63990000
|
heap
|
page execute and read and write
|
||
EC60FCE000
|
stack
|
page read and write
|
||
2CD4C54A000
|
trusted library allocation
|
page read and write
|
||
36CF88D000
|
stack
|
page read and write
|
||
7FFD348A4000
|
trusted library allocation
|
page read and write
|
||
24075964000
|
heap
|
page read and write
|
||
2CD63B12000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34953000
|
trusted library allocation
|
page read and write
|
||
7FFD34562000
|
trusted library allocation
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
7FFD3460C000
|
trusted library allocation
|
page execute and read and write
|
||
2CD49960000
|
trusted library allocation
|
page read and write
|
||
7FFD3461C000
|
trusted library allocation
|
page execute and read and write
|
||
77B55EE000
|
stack
|
page read and write
|
||
2CD63246000
|
heap
|
page read and write
|
||
24010021000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
A394113000
|
stack
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
2CD4CB38000
|
trusted library allocation
|
page read and write
|
||
EC5FF79000
|
stack
|
page read and write
|
||
1AD7D000
|
stack
|
page read and write
|
||
21816151000
|
trusted library allocation
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page execute and read and write
|
||
1C180000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
A394AFB000
|
stack
|
page read and write
|
||
2CD4C5C6000
|
trusted library allocation
|
page read and write
|
||
2CD498C4000
|
heap
|
page read and write
|
||
7FFD34821000
|
trusted library allocation
|
page read and write
|
||
24010031000
|
trusted library allocation
|
page read and write
|
||
1C07A000
|
stack
|
page read and write
|
||
7FFD34553000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page read and write
|
||
24073560000
|
heap
|
page read and write
|
||
2CD63762000
|
heap
|
page read and write
|
||
7FFD348BC000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
A3955CE000
|
stack
|
page read and write
|
||
2CD5B261000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
2CD4C1B2000
|
trusted library allocation
|
page read and write
|
||
7FFD34685000
|
trusted library allocation
|
page execute and read and write
|
||
7DF418A50000
|
trusted library allocation
|
page execute and read and write
|
||
2407359F000
|
heap
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page execute and read and write
|
||
24001309000
|
trusted library allocation
|
page read and write
|
||
7FFD3457B000
|
trusted library allocation
|
page read and write
|
||
24074FF0000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
1C83A000
|
stack
|
page read and write
|
||
1AE34CE0000
|
heap
|
page read and write
|
||
7FFD348A8000
|
trusted library allocation
|
page read and write
|
||
2CD639FC000
|
heap
|
page read and write
|
||
7FFD34616000
|
trusted library allocation
|
page read and write
|
||
7FFD349B7000
|
trusted library allocation
|
page read and write
|
||
7DF43F640000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
2182D817000
|
heap
|
page execute and read and write
|
||
2CD4CAAF000
|
trusted library allocation
|
page read and write
|
||
A5D000
|
heap
|
page read and write
|
||
24001E00000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
21813814000
|
heap
|
page read and write
|
||
24001781000
|
trusted library allocation
|
page read and write
|
||
7FFD34742000
|
trusted library allocation
|
page read and write
|
||
2CD5B539000
|
trusted library allocation
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
21825411000
|
trusted library allocation
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
1AE4F0EC000
|
heap
|
page read and write
|
||
2407597A000
|
heap
|
page read and write
|
||
1AE34D65000
|
heap
|
page read and write
|
||
218151F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page execute and read and write
|
||
EC603FE000
|
stack
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
218256CF000
|
trusted library allocation
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
1B290000
|
heap
|
page execute and read and write
|
||
A39447E000
|
stack
|
page read and write
|
||
1AE37DD7000
|
trusted library allocation
|
page read and write
|
||
77B6ACE000
|
stack
|
page read and write
|
||
1AE3784B000
|
trusted library allocation
|
page read and write
|
||
7FFD34562000
|
trusted library allocation
|
page read and write
|
||
36CE6F9000
|
stack
|
page read and write
|
||
24075040000
|
heap
|
page execute and read and write
|
||
1AE4F07A000
|
heap
|
page read and write
|
||
7FFD3457D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
2CD4C517000
|
trusted library allocation
|
page read and write
|
||
7FFD3471A000
|
trusted library allocation
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
77B5C77000
|
stack
|
page read and write
|
||
2CD4C2FF000
|
trusted library allocation
|
page read and write
|
||
2CD49995000
|
heap
|
page read and write
|
||
36CE9B9000
|
stack
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
EC5FFFE000
|
stack
|
page read and write
|
||
21815260000
|
heap
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
24000BFF000
|
trusted library allocation
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
24075676000
|
heap
|
page read and write
|
||
EC5FBFE000
|
stack
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
24000D73000
|
trusted library allocation
|
page read and write
|
||
2CD639CE000
|
heap
|
page read and write
|
||
2CD637A7000
|
heap
|
page read and write
|
||
2182D83F000
|
heap
|
page read and write
|
||
EA0000
|
heap
|
page execute and read and write
|
||
1B6A0000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD348CC000
|
trusted library allocation
|
page read and write
|
||
A394677000
|
stack
|
page read and write
|
||
24000001000
|
trusted library allocation
|
page read and write
|
||
1AE34FA0000
|
trusted library allocation
|
page read and write
|
||
1AE46B41000
|
trusted library allocation
|
page read and write
|
||
2182DC00000
|
heap
|
page read and write
|
||
24075137000
|
heap
|
page read and write
|
||
2CD4D023000
|
trusted library allocation
|
page read and write
|
||
1AE36AC0000
|
heap
|
page read and write
|
||
1AE36AD1000
|
trusted library allocation
|
page read and write
|
||
24000CCF000
|
trusted library allocation
|
page read and write
|
||
1B9DE000
|
stack
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
24010072000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
240735E9000
|
heap
|
page read and write
|
||
1C63A000
|
stack
|
page read and write
|
||
1AE4F00B000
|
heap
|
page read and write
|
||
240756A0000
|
heap
|
page execute and read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
2407596D000
|
heap
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
2182DD81000
|
heap
|
page read and write
|
||
21813790000
|
heap
|
page read and write
|
||
240758E1000
|
heap
|
page read and write
|
||
24075700000
|
heap
|
page read and write
|
||
24074F50000
|
trusted library allocation
|
page read and write
|
||
1AE37AFF000
|
trusted library allocation
|
page read and write
|
||
1AB70000
|
heap
|
page read and write
|
||
7FFD34711000
|
trusted library allocation
|
page read and write
|
||
240012D4000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
21813750000
|
heap
|
page read and write
|
||
2CD638CE000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page execute and read and write
|
||
1AE3860A000
|
trusted library allocation
|
page read and write
|
||
A395649000
|
stack
|
page read and write
|
||
2CD4C606000
|
trusted library allocation
|
page read and write
|
||
7DF4E7910000
|
trusted library allocation
|
page execute and read and write
|
||
1AE4EFCC000
|
heap
|
page read and write
|
||
240758AB000
|
heap
|
page read and write
|
||
24000FA1000
|
trusted library allocation
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
2181637D000
|
trusted library allocation
|
page read and write
|
||
2CD49940000
|
trusted library section
|
page read and write
|
||
1AE4F0A7000
|
heap
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
1BF75000
|
stack
|
page read and write
|
||
36CF78E000
|
stack
|
page read and write
|
||
7DF4E0630000
|
trusted library allocation
|
page execute and read and write
|
||
1AE4EFF2000
|
heap
|
page read and write
|
||
1AE38252000
|
trusted library allocation
|
page read and write
|
||
24000C07000
|
trusted library allocation
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
EC601F6000
|
stack
|
page read and write
|
||
1AE34DA9000
|
heap
|
page read and write
|
||
9F6000
|
heap
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
1C21E000
|
stack
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
2CD63B0B000
|
heap
|
page read and write
|
||
77B5B77000
|
stack
|
page read and write
|
||
7FFD3456D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
1AE37BBF000
|
trusted library allocation
|
page read and write
|
||
7FFD3457B000
|
trusted library allocation
|
page execute and read and write
|
||
1AE3835E000
|
trusted library allocation
|
page read and write
|
||
7FFD349AD000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
218151A0000
|
trusted library allocation
|
page read and write
|
||
7FFD346FA000
|
trusted library allocation
|
page read and write
|
||
21813B15000
|
heap
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
2182D7E0000
|
heap
|
page execute and read and write
|
||
77B5EFE000
|
stack
|
page read and write
|
||
7FFD348A9000
|
trusted library allocation
|
page read and write
|
||
1AE36993000
|
heap
|
page read and write
|
||
A39574C000
|
stack
|
page read and write
|
||
2181615A000
|
trusted library allocation
|
page read and write
|
||
7FFD34791000
|
trusted library allocation
|
page read and write
|
||
2CD4C57D000
|
trusted library allocation
|
page read and write
|
||
218153E1000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
24000D0D000
|
trusted library allocation
|
page read and write
|
||
240758D4000
|
heap
|
page read and write
|
||
240737A0000
|
heap
|
page read and write
|
||
7FFD34660000
|
trusted library allocation
|
page execute and read and write
|
||
1AE46AF1000
|
trusted library allocation
|
page read and write
|
||
21815609000
|
trusted library allocation
|
page read and write
|
||
7FFD34724000
|
trusted library allocation
|
page read and write
|
||
218256CB000
|
trusted library allocation
|
page read and write
|
||
EC602F8000
|
stack
|
page read and write
|
||
7FFD347E4000
|
trusted library allocation
|
page read and write
|
||
2CD4989D000
|
heap
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
36CF70D000
|
stack
|
page read and write
|
||
2CD499C0000
|
trusted library allocation
|
page read and write
|
||
21813B10000
|
heap
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
EC6037F000
|
stack
|
page read and write
|
||
77B6C4E000
|
stack
|
page read and write
|
||
2182D820000
|
heap
|
page read and write
|
||
77B5AFE000
|
stack
|
page read and write
|
||
EC60F4E000
|
stack
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
240758C2000
|
heap
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
2CD638BC000
|
heap
|
page read and write
|
||
24001210000
|
trusted library allocation
|
page read and write
|
||
24075A60000
|
heap
|
page read and write
|
||
2CD49950000
|
trusted library section
|
page read and write
|
||
7DF43F630000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34990000
|
trusted library allocation
|
page execute and read and write
|
||
218165B6000
|
trusted library allocation
|
page read and write
|
||
2CD496E0000
|
heap
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page execute and read and write
|
||
24001160000
|
trusted library allocation
|
page read and write
|
||
7FFD3471A000
|
trusted library allocation
|
page read and write
|
||
240010BE000
|
trusted library allocation
|
page read and write
|
||
1AE36950000
|
heap
|
page read and write
|
||
1AE34CC0000
|
heap
|
page read and write
|
||
2CD49A00000
|
heap
|
page read and write
|
||
2CD63707000
|
heap
|
page execute and read and write
|
||
1AE36B57000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34552000
|
trusted library allocation
|
page read and write
|
||
7FFD3459C000
|
trusted library allocation
|
page execute and read and write
|
||
218153D0000
|
heap
|
page execute and read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
77B5D79000
|
stack
|
page read and write
|
||
9FC000
|
heap
|
page read and write
|
||
1AE37E0B000
|
trusted library allocation
|
page read and write
|
||
EC5000
|
heap
|
page read and write
|
||
2182DC97000
|
heap
|
page read and write
|
||
1AE36955000
|
heap
|
page read and write
|
||
24000BF9000
|
trusted library allocation
|
page read and write
|
||
1AE34D7D000
|
heap
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
24073510000
|
heap
|
page read and write
|
||
2CD63BE0000
|
trusted library allocation
|
page read and write
|
||
7FFD348B9000
|
trusted library allocation
|
page read and write
|
||
7FFD34670000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
7FFD3456D000
|
trusted library allocation
|
page execute and read and write
|
||
EC5FB33000
|
stack
|
page read and write
|
||
240737A5000
|
heap
|
page read and write
|
||
7FFD3455D000
|
trusted library allocation
|
page execute and read and write
|
||
24073770000
|
trusted library section
|
page read and write
|
||
7FFD34732000
|
trusted library allocation
|
page read and write
|
||
2CD497C0000
|
heap
|
page read and write
|
||
EC610CC000
|
stack
|
page read and write
|
||
2CD4C1AA000
|
trusted library allocation
|
page read and write
|
||
2181649D000
|
trusted library allocation
|
page read and write
|
||
2CD4D06D000
|
trusted library allocation
|
page read and write
|
||
24075125000
|
heap
|
page read and write
|
||
1AE34EF0000
|
heap
|
page read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
2182DDAA000
|
heap
|
page read and write
|
||
2CD49A10000
|
trusted library allocation
|
page read and write
|
||
1AE3841F000
|
trusted library allocation
|
page read and write
|
||
A394579000
|
stack
|
page read and write
|
||
21813770000
|
heap
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
A3947F7000
|
stack
|
page read and write
|
||
2CD4BFC6000
|
trusted library allocation
|
page read and write
|
||
7FFD348A2000
|
trusted library allocation
|
page read and write
|
||
E40000
|
trusted library allocation
|
page read and write
|
||
7FFD34646000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34606000
|
trusted library allocation
|
page read and write
|
||
2CD63B1D000
|
heap
|
page read and write
|
||
E63000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
218151B0000
|
heap
|
page readonly
|
||
2CD5B531000
|
trusted library allocation
|
page read and write
|
||
2CD63AFA000
|
heap
|
page read and write
|
||
500000
|
unkown
|
page readonly
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page execute and read and write
|
||
218256D9000
|
trusted library allocation
|
page read and write
|
||
24075580000
|
heap
|
page read and write
|
||
2CD63710000
|
heap
|
page read and write
|
||
7FFD345BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
21813B50000
|
heap
|
page read and write
|
||
218256E9000
|
trusted library allocation
|
page read and write
|
||
2401030A000
|
trusted library allocation
|
page read and write
|
||
2CD4B2C7000
|
trusted library allocation
|
page read and write
|
||
7FFD34742000
|
trusted library allocation
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
12802000
|
trusted library allocation
|
page read and write
|
||
7FFD345F0000
|
trusted library allocation
|
page read and write
|
||
1AE4EFB0000
|
heap
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
A394A7E000
|
stack
|
page read and write
|
||
1AE36A15000
|
heap
|
page read and write
|
||
24001945000
|
trusted library allocation
|
page read and write
|
||
7FFD34744000
|
trusted library allocation
|
page read and write
|
||
7FFD34670000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
2CD63760000
|
heap
|
page read and write
|
||
218171BD000
|
trusted library allocation
|
page read and write
|
||
1AE37CE1000
|
trusted library allocation
|
page read and write
|
||
A3956CD000
|
stack
|
page read and write
|
||
1B6FD000
|
heap
|
page read and write
|
||
21816C48000
|
trusted library allocation
|
page read and write
|
||
127F8000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
1AE4EFA6000
|
heap
|
page execute and read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
2407597C000
|
heap
|
page read and write
|
||
21816683000
|
trusted library allocation
|
page read and write
|
||
240102EB000
|
trusted library allocation
|
page read and write
|
||
36CE2E3000
|
stack
|
page read and write
|
||
1AE4EFA0000
|
heap
|
page execute and read and write
|
||
E43000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
24001A0C000
|
trusted library allocation
|
page read and write
|
||
1AE4F1B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
2182DDB7000
|
heap
|
page read and write
|
||
2CD4C1B6000
|
trusted library allocation
|
page read and write
|
||
EC6047C000
|
stack
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
36CE8F7000
|
stack
|
page read and write
|
||
1AE4F034000
|
heap
|
page read and write
|
||
77B5FFB000
|
stack
|
page read and write
|
||
2CD4B70E000
|
trusted library allocation
|
page read and write
|
||
7DF4E7900000
|
trusted library allocation
|
page execute and read and write
|
||
2CD499B0000
|
heap
|
page execute and read and write
|
||
1B740000
|
heap
|
page read and write
|
||
2CD63700000
|
heap
|
page execute and read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34646000
|
trusted library allocation
|
page execute and read and write
|
||
1C840000
|
heap
|
page read and write
|
||
24073500000
|
heap
|
page read and write
|
||
7FFD3495C000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
2CD497E0000
|
heap
|
page read and write
|
||
2182DD9F000
|
heap
|
page read and write
|
||
7FFD3457B000
|
trusted library allocation
|
page read and write
|
||
2CD4C009000
|
trusted library allocation
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
240735A1000
|
heap
|
page read and write
|
||
1AE37B31000
|
trusted library allocation
|
page read and write
|
||
7FFD34636000
|
trusted library allocation
|
page execute and read and write
|
||
2CD499A0000
|
heap
|
page readonly
|
||
7FFD34574000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
1AE37522000
|
trusted library allocation
|
page read and write
|
||
21825401000
|
trusted library allocation
|
page read and write
|
||
1AE34F50000
|
trusted library allocation
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
2400133C000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
240735A5000
|
heap
|
page read and write
|
||
7FFD34543000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34563000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34720000
|
trusted library allocation
|
page execute and read and write
|
||
36CE87D000
|
stack
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4E0640000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
2182DC59000
|
heap
|
page read and write
|
||
2182DC65000
|
heap
|
page read and write
|
||
218137EB000
|
heap
|
page read and write
|
||
7FFD34730000
|
trusted library allocation
|
page execute and read and write
|
||
27E0000
|
heap
|
page read and write
|
||
24001121000
|
trusted library allocation
|
page read and write
|
||
2CD4C362000
|
trusted library allocation
|
page read and write
|
||
1AE4F133000
|
heap
|
page read and write
|
||
7FFD34564000
|
trusted library allocation
|
page read and write
|
||
1AE4EEA0000
|
heap
|
page read and write
|
||
7FFD3455D000
|
trusted library allocation
|
page execute and read and write
|
||
218163E6000
|
trusted library allocation
|
page read and write
|
||
240735E4000
|
heap
|
page read and write
|
||
AB3000
|
heap
|
page read and write
|
||
240757E8000
|
heap
|
page read and write
|
||
1AE34F30000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
24074F60000
|
heap
|
page read and write
|
||
36CF90E000
|
stack
|
page read and write
|
||
218256D7000
|
trusted library allocation
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
7FFD348B8000
|
trusted library allocation
|
page read and write
|
||
1AE36CF8000
|
trusted library allocation
|
page read and write
|
||
24075A00000
|
trusted library allocation
|
page read and write
|
||
2182D8BF000
|
heap
|
page read and write
|
||
EC6114E000
|
stack
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page execute and read and write
|
||
1BBDD000
|
stack
|
page read and write
|
||
2CD5B241000
|
trusted library allocation
|
page read and write
|
||
A394879000
|
stack
|
page read and write
|
||
1AE37B8D000
|
trusted library allocation
|
page read and write
|
||
7FFD348C5000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
21816377000
|
trusted library allocation
|
page read and write
|
||
1AE46E21000
|
trusted library allocation
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
7FFD34700000
|
trusted library allocation
|
page execute and read and write
|
||
A3944FF000
|
stack
|
page read and write
|
||
7FFD34893000
|
trusted library allocation
|
page read and write
|
||
7DF4E7920000
|
trusted library allocation
|
page execute and read and write
|
||
1AE37AD4000
|
trusted library allocation
|
page read and write
|
||
240757E4000
|
heap
|
page read and write
|
||
7FFD348B9000
|
trusted library allocation
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
24010001000
|
trusted library allocation
|
page read and write
|
||
1AE4EFC8000
|
heap
|
page read and write
|
||
24001DDA000
|
trusted library allocation
|
page read and write
|
||
2CD49840000
|
heap
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
1AE38819000
|
trusted library allocation
|
page read and write
|
||
276F000
|
stack
|
page read and write
|
||
21817207000
|
trusted library allocation
|
page read and write
|
||
7FFD345F6000
|
trusted library allocation
|
page read and write
|
||
240102FA000
|
trusted library allocation
|
page read and write
|
||
A39554C000
|
stack
|
page read and write
|
||
1AE4F0A9000
|
heap
|
page read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
2CD63B1A000
|
heap
|
page read and write
|
||
A3945FF000
|
stack
|
page read and write
|
||
2182DA40000
|
trusted library allocation
|
page read and write
|
||
240102F2000
|
trusted library allocation
|
page read and write
|
||
EC6057B000
|
stack
|
page read and write
|
||
1B49E000
|
stack
|
page read and write
|
||
7FFD348C8000
|
trusted library allocation
|
page read and write
|
||
7FFD34711000
|
trusted library allocation
|
page read and write
|
||
127FE000
|
trusted library allocation
|
page read and write
|
||
240004CD000
|
trusted library allocation
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
36CEBBF000
|
stack
|
page read and write
|
||
1AE4EFC0000
|
heap
|
page read and write
|
||
1AE34F20000
|
trusted library section
|
page read and write
|
||
A3949FE000
|
stack
|
page read and write
|
||
7FFD3461C000
|
trusted library allocation
|
page execute and read and write
|
||
A32000
|
heap
|
page read and write
|
||
218166E7000
|
trusted library allocation
|
page read and write
|
||
240758C0000
|
heap
|
page read and write
|
||
24000229000
|
trusted library allocation
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34702000
|
trusted library allocation
|
page read and write
|
||
1AE34DA5000
|
heap
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
21813740000
|
heap
|
page read and write
|
||
7FFD3460C000
|
trusted library allocation
|
page execute and read and write
|
||
77B5A79000
|
stack
|
page read and write
|
||
36CE93F000
|
stack
|
page read and write
|
||
7FFD345AC000
|
trusted library allocation
|
page execute and read and write
|
||
240757EC000
|
heap
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page execute and read and write
|
||
2CD49A40000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
2CD637D1000
|
heap
|
page read and write
|
||
21815170000
|
trusted library section
|
page read and write
|
||
2182DC61000
|
heap
|
page read and write
|
||
1AE4F04D000
|
heap
|
page read and write
|
||
36CEABC000
|
stack
|
page read and write
|
||
EC5FBBE000
|
stack
|
page read and write
|
||
218158AD000
|
trusted library allocation
|
page read and write
|
||
1AE369EB000
|
heap
|
page read and write
|
||
1AE4F360000
|
heap
|
page read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
240735BD000
|
heap
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
7FFD349BD000
|
trusted library allocation
|
page read and write
|
||
7DF418A60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34748000
|
trusted library allocation
|
page read and write
|
||
1AE34D5D000
|
heap
|
page read and write
|
||
2182DC10000
|
heap
|
page read and write
|
||
2CD4C9C9000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
1AE34D5F000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
2182DC71000
|
heap
|
page read and write
|
||
21815FE6000
|
trusted library allocation
|
page read and write
|
||
2CD5B2B2000
|
trusted library allocation
|
page read and write
|
||
24001E20000
|
trusted library allocation
|
page read and write
|
||
2CD63712000
|
heap
|
page read and write
|
||
77B69CE000
|
stack
|
page read and write
|
||
7FFD347A3000
|
trusted library allocation
|
page read and write
|
||
2CD4C41A000
|
trusted library allocation
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
7FFD3455B000
|
trusted library allocation
|
page read and write
|
||
1BADE000
|
stack
|
page read and write
|
||
2CD639E0000
|
heap
|
page read and write
|
||
1AE36A90000
|
heap
|
page execute and read and write
|
||
7FFD34616000
|
trusted library allocation
|
page read and write
|
||
A3946FD000
|
stack
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
24010243000
|
trusted library allocation
|
page read and write
|
||
7FFD348B2000
|
trusted library allocation
|
page read and write
|
||
21816412000
|
trusted library allocation
|
page read and write
|
||
1A820000
|
trusted library allocation
|
page read and write
|
||
24073652000
|
heap
|
page read and write
|
||
7FFD34553000
|
trusted library allocation
|
page execute and read and write
|
||
1AE36984000
|
heap
|
page read and write
|
||
7FFD3470A000
|
trusted library allocation
|
page read and write
|
||
7FFD34894000
|
trusted library allocation
|
page read and write
|
||
1AE36F9D000
|
trusted library allocation
|
page read and write
|
||
2182DC69000
|
heap
|
page read and write
|
||
EC604FE000
|
stack
|
page read and write
|
||
1AE388D1000
|
trusted library allocation
|
page read and write
|
||
21813812000
|
heap
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
218137A2000
|
heap
|
page read and write
|
||
EC60079000
|
stack
|
page read and write
|
||
240013C1000
|
trusted library allocation
|
page read and write
|
||
EC5FEFE000
|
stack
|
page read and write
|
||
21816B63000
|
trusted library allocation
|
page read and write
|
||
2CD5B52F000
|
trusted library allocation
|
page read and write
|
||
1AE369BF000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
EC6114C000
|
stack
|
page read and write
|
||
240735E6000
|
heap
|
page read and write
|
||
7FFD34734000
|
trusted library allocation
|
page read and write
|
||
1C1DE000
|
stack
|
page read and write
|
||
21816500000
|
trusted library allocation
|
page read and write
|
||
240735A7000
|
heap
|
page read and write
|
||
2CD49887000
|
heap
|
page read and write
|
||
36CE67F000
|
stack
|
page read and write
|
||
A3957CE000
|
stack
|
page read and write
|
||
7FFD346F0000
|
trusted library allocation
|
page read and write
|
||
2CD49980000
|
trusted library allocation
|
page read and write
|
||
2400188D000
|
trusted library allocation
|
page read and write
|
||
7FFD34710000
|
trusted library allocation
|
page execute and read and write
|
||
36CF809000
|
stack
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
1AE34FF0000
|
trusted library allocation
|
page read and write
|
||
24075120000
|
heap
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
240755A9000
|
heap
|
page read and write
|
||
77B58FE000
|
stack
|
page read and write
|
||
77B6B49000
|
stack
|
page read and write
|
||
7FFD34563000
|
trusted library allocation
|
page execute and read and write
|
||
1AE369BD000
|
heap
|
page read and write
|
||
1AE46AD1000
|
trusted library allocation
|
page read and write
|
||
1AE34D28000
|
heap
|
page read and write
|
||
240758DD000
|
heap
|
page read and write
|
||
2407359C000
|
heap
|
page read and write
|
||
7FFD34600000
|
trusted library allocation
|
page read and write
|
||
2CD498C8000
|
heap
|
page read and write
|
||
24001827000
|
trusted library allocation
|
page read and write
|
||
77B5BFD000
|
stack
|
page read and write
|
||
1B723000
|
heap
|
page read and write
|
||
24010011000
|
trusted library allocation
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34542000
|
trusted library allocation
|
page read and write
|
||
2182D810000
|
heap
|
page execute and read and write
|
||
240102F0000
|
trusted library allocation
|
page read and write
|
||
36CE77F000
|
stack
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
2CD4CB97000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34606000
|
trusted library allocation
|
page read and write
|
||
2CD63B0D000
|
heap
|
page read and write
|
||
A3954CE000
|
stack
|
page read and write
|
||
A3948F8000
|
stack
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
24075632000
|
heap
|
page read and write
|
||
1B75A000
|
heap
|
page read and write
|
||
24074F70000
|
heap
|
page readonly
|
||
24000A52000
|
trusted library allocation
|
page read and write
|
||
36CEA38000
|
stack
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
7FFD345FC000
|
trusted library allocation
|
page execute and read and write
|
||
24073740000
|
heap
|
page read and write
|
||
1C73C000
|
stack
|
page read and write
|
||
EC600FD000
|
stack
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
1AE388F1000
|
trusted library allocation
|
page read and write
|
||
A39497E000
|
stack
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
1AE37D1E000
|
trusted library allocation
|
page read and write
|
||
24075943000
|
heap
|
page read and write
|
||
1AE37D76000
|
trusted library allocation
|
page read and write
|
||
1AE4EFB4000
|
heap
|
page read and write
|
||
1AE37CA8000
|
trusted library allocation
|
page read and write
|
||
36CECBB000
|
stack
|
page read and write
|
||
7FFD34883000
|
trusted library allocation
|
page read and write
|
||
1AE46DD8000
|
trusted library allocation
|
page read and write
|
||
7FFD34564000
|
trusted library allocation
|
page read and write
|
||
7FFD34636000
|
trusted library allocation
|
page execute and read and write
|
||
7FF48DA10000
|
trusted library allocation
|
page execute and read and write
|
||
2CD49990000
|
heap
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
2CD63ACF000
|
heap
|
page read and write
|
||
2182DD06000
|
heap
|
page read and write
|
||
2CD4BC93000
|
trusted library allocation
|
page read and write
|
||
2CD49889000
|
heap
|
page read and write
|
||
2400194E000
|
trusted library allocation
|
page read and write
|
||
1AE46DBE000
|
trusted library allocation
|
page read and write
|
||
218167A2000
|
trusted library allocation
|
page read and write
|
||
A394779000
|
stack
|
page read and write
|
||
2CD4B46A000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
1B39E000
|
stack
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
1AE37BF2000
|
trusted library allocation
|
page read and write
|
||
1AE38337000
|
trusted library allocation
|
page read and write
|
||
1AE37A6D000
|
trusted library allocation
|
page read and write
|
||
1B59E000
|
stack
|
page read and write
|
||
EC6027A000
|
stack
|
page read and write
|
||
1BCDD000
|
stack
|
page read and write
|
||
8F1000
|
stack
|
page read and write
|
||
1AE4F11D000
|
heap
|
page read and write
|
||
240757F8000
|
heap
|
page read and write
|
||
2CD4CAD5000
|
trusted library allocation
|
page read and write
|
||
1B69C000
|
stack
|
page read and write
|
||
240755A5000
|
heap
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
21816C6F000
|
trusted library allocation
|
page read and write
|
||
1AE36977000
|
heap
|
page read and write
|
||
24001866000
|
trusted library allocation
|
page read and write
|
||
1AE36960000
|
heap
|
page read and write
|
||
24001033000
|
trusted library allocation
|
page read and write
|
||
7FFD345AC000
|
trusted library allocation
|
page execute and read and write
|
||
2CD5B52B000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
2CD4C1AE000
|
trusted library allocation
|
page read and write
|
||
7FFD348C2000
|
trusted library allocation
|
page read and write
|
||
7FFD34610000
|
trusted library allocation
|
page read and write
|
||
E30000
|
trusted library allocation
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
7FFD34899000
|
trusted library allocation
|
page read and write
|
||
2CD49A90000
|
heap
|
page read and write
|
||
36CE36E000
|
stack
|
page read and write
|
||
1AE376D4000
|
trusted library allocation
|
page read and write
|
||
2CD4BE50000
|
trusted library allocation
|
page read and write
|
||
1AE4EFB8000
|
heap
|
page read and write
|
||
2182D830000
|
heap
|
page read and write
|
||
7FFD348C8000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
21813B40000
|
trusted library section
|
page read and write
|
||
2CD63D50000
|
heap
|
page read and write
|
||
1C240000
|
heap
|
page read and write
|
||
2CD63ABB000
|
heap
|
page read and write
|
||
21816C09000
|
trusted library allocation
|
page read and write
|
||
77B6A4C000
|
stack
|
page read and write
|
||
240757E0000
|
heap
|
page read and write
|
||
1AE34D63000
|
heap
|
page read and write
|
||
2CD4C4E7000
|
trusted library allocation
|
page read and write
|
||
1AE4EFBC000
|
heap
|
page read and write
|
||
A1B000
|
heap
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
7FFD34600000
|
trusted library allocation
|
page read and write
|
||
24000D7C000
|
trusted library allocation
|
page read and write
|
||
7FFD3454D000
|
trusted library allocation
|
page execute and read and write
|
||
2182DCE7000
|
heap
|
page read and write
|
||
21816D30000
|
trusted library allocation
|
page read and write
|
||
CFD000
|
stack
|
page read and write
|
||
2CD4987D000
|
heap
|
page read and write
|
||
24073760000
|
trusted library section
|
page read and write
|
||
1AE37C31000
|
trusted library allocation
|
page read and write
|
||
21815E32000
|
trusted library allocation
|
page read and write
|
||
2CD638B5000
|
heap
|
page read and write
|
||
EC60179000
|
stack
|
page read and write
|
||
1AE46B01000
|
trusted library allocation
|
page read and write
|
||
2182D8E2000
|
heap
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
7FFD34738000
|
trusted library allocation
|
page read and write
|
||
7FFD345BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34950000
|
trusted library allocation
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
1AE46DC8000
|
trusted library allocation
|
page read and write
|
||
2400007B000
|
trusted library allocation
|
page read and write
|
There are 859 hidden memdumps, click here to show them.