Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
x.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\java Update Checker (64 bit).exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ueo4ffq.vn4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2jpil5ea.rx2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3jww55mt.40y.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4jtzfcb1.gns.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4q2cf3tq.c4o.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bbysypb1.rq5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dwd4phg5.oa0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hnwlydii.k40.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_knzj5j05.vrt.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_po5w1lqy.ovr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_puncpt5y.knu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q54gqb1g.vnc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r1tvd2sx.gv1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tdtco2fd.nva.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u3doyls5.mqk.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wisemfew.4m4.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\java Update Checker (64 bit).lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jul 16 03:27:56
2024, mtime=Tue Jul 16 03:27:56 2024, atime=Tue Jul 16 03:27:56 2024, length=43008, window=hide
|
dropped
|
There are 11 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\x.exe
|
"C:\Users\user\Desktop\x.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\x.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'x.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\java
Update Checker (64 bit).exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'java
Update Checker (64 bit).exe'
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
89.213.177.93
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://ources.t
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://ion=v4.5N
|
unknown
|
||
http://www.apache.o
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://crl.micros
|
unknown
|
There are 7 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
89.213.177.93
|
unknown
|
United Kingdom
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
A2000
|
unkown
|
page readonly
|
||
2371000
|
trusted library allocation
|
page read and write
|
||
26FCA084000
|
trusted library allocation
|
page read and write
|
||
7FF84915C000
|
trusted library allocation
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page execute and read and write
|
||
923000
|
heap
|
page read and write
|
||
BBC43CE000
|
stack
|
page read and write
|
||
26FC8E80000
|
trusted library allocation
|
page read and write
|
||
19F4F409000
|
trusted library allocation
|
page read and write
|
||
26FC942D000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
8E11313000
|
stack
|
page read and write
|
||
1B915860000
|
heap
|
page read and write
|
||
19F5048F000
|
trusted library allocation
|
page read and write
|
||
7FF849159000
|
trusted library allocation
|
page read and write
|
||
26FC77D0000
|
heap
|
page read and write
|
||
304DABE000
|
stack
|
page read and write
|
||
1B916876000
|
trusted library allocation
|
page read and write
|
||
2610746F000
|
trusted library allocation
|
page read and write
|
||
2431000
|
trusted library allocation
|
page read and write
|
||
8E119F9000
|
stack
|
page read and write
|
||
7FF848E96000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page execute and read and write
|
||
19F4F120000
|
heap
|
page execute and read and write
|
||
19F676E0000
|
heap
|
page read and write
|
||
26105050000
|
trusted library allocation
|
page read and write
|
||
2611F056000
|
heap
|
page read and write
|
||
26FCA8B5000
|
trusted library allocation
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
7FF849188000
|
trusted library allocation
|
page read and write
|
||
8E11779000
|
stack
|
page read and write
|
||
1B917103000
|
trusted library allocation
|
page read and write
|
||
26104D0B000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
E429A79000
|
stack
|
page read and write
|
||
26FCA021000
|
trusted library allocation
|
page read and write
|
||
26FC8F50000
|
heap
|
page read and write
|
||
19F4F1E1000
|
trusted library allocation
|
page read and write
|
||
1BD0C000
|
stack
|
page read and write
|
||
1B913CE0000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
26FD9253000
|
trusted library allocation
|
page read and write
|
||
1B92DFB4000
|
heap
|
page read and write
|
||
26104C20000
|
heap
|
page read and write
|
||
7DF491370000
|
trusted library allocation
|
page execute and read and write
|
||
1AD3D000
|
stack
|
page read and write
|
||
1B9140C0000
|
heap
|
page read and write
|
||
1B925BD7000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
E429D79000
|
stack
|
page read and write
|
||
2611EFD8000
|
heap
|
page read and write
|
||
304D7F9000
|
stack
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
19F4D6D9000
|
heap
|
page read and write
|
||
BBC4447000
|
stack
|
page read and write
|
||
E42AB47000
|
stack
|
page read and write
|
||
19F50FE6000
|
trusted library allocation
|
page read and write
|
||
2610790E000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
19F5F211000
|
trusted library allocation
|
page read and write
|
||
1B925B03000
|
trusted library allocation
|
page read and write
|
||
8E113DE000
|
stack
|
page read and write
|
||
26116B5B000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
E429CF7000
|
stack
|
page read and write
|
||
2611EDE0000
|
heap
|
page read and write
|
||
2611EC4F000
|
heap
|
page read and write
|
||
26FE1771000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
1D288000
|
heap
|
page read and write
|
||
19F67718000
|
heap
|
page read and write
|
||
1D282000
|
heap
|
page read and write
|
||
26FC8E40000
|
trusted library allocation
|
page read and write
|
||
304D1F3000
|
stack
|
page read and write
|
||
1B1CE000
|
heap
|
page read and write
|
||
304D6F9000
|
stack
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF848DF2000
|
trusted library allocation
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
304D9B8000
|
stack
|
page read and write
|
||
304E68D000
|
stack
|
page read and write
|
||
8E11CFB000
|
stack
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
1B9156E0000
|
trusted library allocation
|
page read and write
|
||
2611F120000
|
heap
|
page read and write
|
||
1B92DFA8000
|
heap
|
page read and write
|
||
26FC9B69000
|
trusted library allocation
|
page read and write
|
||
19F4EF80000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
19F504F1000
|
trusted library allocation
|
page read and write
|
||
7FF848FA5000
|
trusted library allocation
|
page read and write
|
||
26FC9BC7000
|
trusted library allocation
|
page read and write
|
||
1B1FD000
|
heap
|
page read and write
|
||
261081C5000
|
trusted library allocation
|
page read and write
|
||
26FC9CE1000
|
trusted library allocation
|
page read and write
|
||
26FC77D5000
|
heap
|
page read and write
|
||
26FD8FCD000
|
trusted library allocation
|
page read and write
|
||
19F67633000
|
heap
|
page read and write
|
||
7FF848E03000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849179000
|
trusted library allocation
|
page read and write
|
||
1B92DFA4000
|
heap
|
page read and write
|
||
19F4F1D0000
|
heap
|
page read and write
|
||
26116B64000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
19F4D680000
|
heap
|
page readonly
|
||
7FF848E1B000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
1B915871000
|
trusted library allocation
|
page read and write
|
||
26FC7410000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
261168DD000
|
trusted library allocation
|
page read and write
|
||
E429F7E000
|
stack
|
page read and write
|
||
26FC756F000
|
heap
|
page read and write
|
||
7FF849139000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
19F6764D000
|
heap
|
page read and write
|
||
7FF8491EC000
|
trusted library allocation
|
page read and write
|
||
E429E7E000
|
stack
|
page read and write
|
||
26FC7601000
|
heap
|
page read and write
|
||
1B92DD80000
|
trusted library allocation
|
page read and write
|
||
E4299FE000
|
stack
|
page read and write
|
||
2610823A000
|
trusted library allocation
|
page read and write
|
||
19F50A4C000
|
trusted library allocation
|
page read and write
|
||
19F676F6000
|
heap
|
page read and write
|
||
1B92E06E000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
8E1274C000
|
stack
|
page read and write
|
||
19F4F127000
|
heap
|
page execute and read and write
|
||
7FF84920C000
|
trusted library allocation
|
page read and write
|
||
1B913D5B000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
496000
|
heap
|
page read and write
|
||
26108697000
|
trusted library allocation
|
page read and write
|
||
26116A76000
|
trusted library allocation
|
page read and write
|
||
1C50D000
|
stack
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
19F67916000
|
heap
|
page read and write
|
||
BBC454E000
|
stack
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DFB000
|
trusted library allocation
|
page read and write
|
||
8E117FE000
|
stack
|
page read and write
|
||
2611EDC0000
|
heap
|
page read and write
|
||
8E11B7E000
|
stack
|
page read and write
|
||
8E126CE000
|
stack
|
page read and write
|
||
7FF848FE4000
|
trusted library allocation
|
page read and write
|
||
26104D1A000
|
heap
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page execute and read and write
|
||
19F50346000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page execute and read and write
|
||
304D5F9000
|
stack
|
page read and write
|
||
19F503FA000
|
trusted library allocation
|
page read and write
|
||
19F67854000
|
heap
|
page read and write
|
||
26FC74F0000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
26FC7530000
|
heap
|
page read and write
|
||
26FD924B000
|
trusted library allocation
|
page read and write
|
||
19F67659000
|
heap
|
page read and write
|
||
1A8FC000
|
stack
|
page read and write
|
||
19F50A0D000
|
trusted library allocation
|
page read and write
|
||
2611EED0000
|
heap
|
page execute and read and write
|
||
1B9168D3000
|
trusted library allocation
|
page read and write
|
||
1B9158F5000
|
trusted library allocation
|
page read and write
|
||
8E12849000
|
stack
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
BBC32FF000
|
stack
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
19F67967000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
26104D2C000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
E429EFE000
|
stack
|
page read and write
|
||
26FD9265000
|
trusted library allocation
|
page read and write
|
||
19F4F160000
|
heap
|
page execute and read and write
|
||
6A5000
|
heap
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1B9165EB000
|
trusted library allocation
|
page read and write
|
||
7FF848E9C000
|
trusted library allocation
|
page execute and read and write
|
||
26106700000
|
trusted library allocation
|
page read and write
|
||
19F6798B000
|
heap
|
page read and write
|
||
19F4FDCD000
|
trusted library allocation
|
page read and write
|
||
304DC3C000
|
stack
|
page read and write
|
||
1B92DE45000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1B916C3B000
|
trusted library allocation
|
page read and write
|
||
19F5038B000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
2611EF4C000
|
heap
|
page read and write
|
||
1B916998000
|
trusted library allocation
|
page read and write
|
||
261075E6000
|
trusted library allocation
|
page read and write
|
||
26FD8F61000
|
trusted library allocation
|
page read and write
|
||
1BF0C000
|
stack
|
page read and write
|
||
26FE18A9000
|
heap
|
page read and write
|
||
BBC3479000
|
stack
|
page read and write
|
||
1B915720000
|
trusted library allocation
|
page read and write
|
||
2611EFDA000
|
heap
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
E429C79000
|
stack
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
26116B56000
|
trusted library allocation
|
page read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
||
1B13E000
|
stack
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
1B913D5F000
|
heap
|
page read and write
|
||
2447000
|
trusted library allocation
|
page read and write
|
||
1BB8D000
|
stack
|
page read and write
|
||
BBC34FD000
|
stack
|
page read and write
|
||
26108677000
|
trusted library allocation
|
page read and write
|
||
1B916933000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
26FE18EB000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
1B1A5000
|
heap
|
page read and write
|
||
19F4D650000
|
trusted library allocation
|
page read and write
|
||
1B916FF7000
|
trusted library allocation
|
page read and write
|
||
BBC434C000
|
stack
|
page read and write
|
||
26FC7571000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
261080DE000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
472000
|
heap
|
page read and write
|
||
1B92DEC0000
|
heap
|
page read and write
|
||
26107477000
|
trusted library allocation
|
page read and write
|
||
1BF10000
|
heap
|
page read and write
|
||
7FF8492A0000
|
trusted library allocation
|
page read and write
|
||
BBC3578000
|
stack
|
page read and write
|
||
2611ECF3000
|
heap
|
page read and write
|
||
26FCAD42000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
304D57E000
|
stack
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
2610793A000
|
trusted library allocation
|
page read and write
|
||
304D939000
|
stack
|
page read and write
|
||
7FF848FD1000
|
trusted library allocation
|
page read and write
|
||
7FF849133000
|
trusted library allocation
|
page read and write
|
||
E42ABCC000
|
stack
|
page read and write
|
||
E429DF9000
|
stack
|
page read and write
|
||
1B925891000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849002000
|
trusted library allocation
|
page read and write
|
||
304E707000
|
stack
|
page read and write
|
||
1B92E136000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
1B03F000
|
stack
|
page read and write
|
||
7FF849148000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
8E11A7E000
|
stack
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
26104CD8000
|
heap
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
26104D10000
|
heap
|
page read and write
|
||
19F67830000
|
heap
|
page read and write
|
||
45C000
|
heap
|
page read and write
|
||
7FF848DE2000
|
trusted library allocation
|
page read and write
|
||
1B18D000
|
heap
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
2610869C000
|
trusted library allocation
|
page read and write
|
||
261074D9000
|
trusted library allocation
|
page read and write
|
||
19F6768B000
|
heap
|
page read and write
|
||
7DF4E6AB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E04000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
26116891000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
26FCA78E000
|
trusted library allocation
|
page read and write
|
||
7FF848F82000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
8E3000
|
trusted library allocation
|
page read and write
|
||
1B917695000
|
trusted library allocation
|
page read and write
|
||
BBC377F000
|
stack
|
page read and write
|
||
1B915730000
|
heap
|
page execute and read and write
|
||
7DF4E6AA0000
|
trusted library allocation
|
page execute and read and write
|
||
8E1167E000
|
stack
|
page read and write
|
||
26105075000
|
heap
|
page read and write
|
||
26107FF8000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page execute and read and write
|
||
19F6790F000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
52E000
|
heap
|
page read and write
|
||
26104D57000
|
heap
|
page read and write
|
||
1B925B61000
|
trusted library allocation
|
page read and write
|
||
2611EF1A000
|
heap
|
page read and write
|
||
1B204000
|
heap
|
page read and write
|
||
1B9168A2000
|
trusted library allocation
|
page read and write
|
||
19F502A4000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
26FE1700000
|
heap
|
page execute and read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
1D392000
|
heap
|
page read and write
|
||
26106A99000
|
trusted library allocation
|
page read and write
|
||
26107C3B000
|
trusted library allocation
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
7FF848FAA000
|
trusted library allocation
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
19F6765B000
|
heap
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
26FE14F0000
|
heap
|
page execute and read and write
|
||
304D77D000
|
stack
|
page read and write
|
||
26105060000
|
heap
|
page readonly
|
||
26FCA7F4000
|
trusted library allocation
|
page read and write
|
||
1B916A1D000
|
trusted library allocation
|
page read and write
|
||
1B913CC0000
|
heap
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
7FF84918C000
|
trusted library allocation
|
page read and write
|
||
7FF848DED000
|
trusted library allocation
|
page execute and read and write
|
||
7DF43F880000
|
trusted library allocation
|
page execute and read and write
|
||
8E118FD000
|
stack
|
page read and write
|
||
26FE18C0000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
26106871000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
26FCAD8C000
|
trusted library allocation
|
page read and write
|
||
7DF4A9690000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
19F4D630000
|
trusted library section
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1B655000
|
stack
|
page read and write
|
||
1B925B73000
|
trusted library allocation
|
page read and write
|
||
26FC7510000
|
heap
|
page read and write
|
||
1B917675000
|
trusted library allocation
|
page read and write
|
||
1B92DFB8000
|
heap
|
page read and write
|
||
26106860000
|
heap
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
1B925880000
|
trusted library allocation
|
page read and write
|
||
19F4F170000
|
trusted library allocation
|
page read and write
|
||
1C5F0000
|
heap
|
page read and write
|
||
4C1000
|
heap
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
19F4D930000
|
heap
|
page read and write
|
||
26FE1586000
|
heap
|
page read and write
|
||
26FC9B61000
|
trusted library allocation
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
2611EF86000
|
heap
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
26FE1A70000
|
heap
|
page read and write
|
||
BBC2EA3000
|
stack
|
page read and write
|
||
19F50213000
|
trusted library allocation
|
page read and write
|
||
2260000
|
heap
|
page execute and read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
7FF849149000
|
trusted library allocation
|
page read and write
|
||
1B9140B0000
|
trusted library section
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
1B915770000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
26104D16000
|
heap
|
page read and write
|
||
19F4D5B0000
|
heap
|
page read and write
|
||
26FE1550000
|
heap
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
2611EF7E000
|
heap
|
page read and write
|
||
1B925C47000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
E429B79000
|
stack
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
1B916477000
|
trusted library allocation
|
page read and write
|
||
7FF849158000
|
trusted library allocation
|
page read and write
|
||
23DB000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
7FF84922C000
|
trusted library allocation
|
page read and write
|
||
26107880000
|
trusted library allocation
|
page read and write
|
||
7FF848EB6000
|
trusted library allocation
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
7FF406730000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
19F50967000
|
trusted library allocation
|
page read and write
|
||
8E11BFE000
|
stack
|
page read and write
|
||
26108109000
|
trusted library allocation
|
page read and write
|
||
26FC9F66000
|
trusted library allocation
|
page read and write
|
||
26FE1600000
|
heap
|
page read and write
|
||
1B92DD50000
|
heap
|
page execute and read and write
|
||
1B915710000
|
heap
|
page readonly
|
||
1D380000
|
heap
|
page read and write
|
||
2611F130000
|
trusted library allocation
|
page read and write
|
||
26FE185F000
|
heap
|
page read and write
|
||
1B92DFA0000
|
heap
|
page read and write
|
||
1B915A99000
|
trusted library allocation
|
page read and write
|
||
261066C0000
|
trusted library allocation
|
page read and write
|
||
8E11977000
|
stack
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
19F4D6D3000
|
heap
|
page read and write
|
||
2611ED0E000
|
heap
|
page read and write
|
||
26FCA325000
|
trusted library allocation
|
page read and write
|
||
19F4F050000
|
heap
|
page read and write
|
||
1B92E0E7000
|
heap
|
page read and write
|
||
7FF848EBC000
|
trusted library allocation
|
page execute and read and write
|
||
2611EF00000
|
heap
|
page read and write
|
||
26107469000
|
trusted library allocation
|
page read and write
|
||
7DF491380000
|
trusted library allocation
|
page execute and read and write
|
||
BBC33FF000
|
stack
|
page read and write
|
||
12378000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
7FF849154000
|
trusted library allocation
|
page read and write
|
||
19F4D640000
|
trusted library section
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
26107A55000
|
trusted library allocation
|
page read and write
|
||
19F4FE7B000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
1B92DDC3000
|
heap
|
page read and write
|
||
19F5F4D3000
|
trusted library allocation
|
page read and write
|
||
BBC367A000
|
stack
|
page read and write
|
||
26FCA7CD000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
26FC9FF5000
|
trusted library allocation
|
page read and write
|
||
19F4D6DB000
|
heap
|
page read and write
|
||
19F671EC000
|
heap
|
page read and write
|
||
26FC7605000
|
heap
|
page read and write
|
||
1B92E11B000
|
heap
|
page read and write
|
||
E429AFF000
|
stack
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
1B45E000
|
stack
|
page read and write
|
||
1B916C37000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
19F4D935000
|
heap
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
19F50B34000
|
trusted library allocation
|
page read and write
|
||
1B925B63000
|
trusted library allocation
|
page read and write
|
||
1B195000
|
heap
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
E42ACCE000
|
stack
|
page read and write
|
||
19F4FC33000
|
trusted library allocation
|
page read and write
|
||
19F4D6ED000
|
heap
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page execute and read and write
|
||
430000
|
heap
|
page read and write
|
||
26FCAD87000
|
trusted library allocation
|
page read and write
|
||
19F5F24D000
|
trusted library allocation
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
1B92E109000
|
heap
|
page read and write
|
||
1B92DFBC000
|
heap
|
page read and write
|
||
304D67E000
|
stack
|
page read and write
|
||
26FE14F7000
|
heap
|
page execute and read and write
|
||
1A3A0000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
261068F7000
|
trusted library allocation
|
page read and write
|
||
1B913D23000
|
heap
|
page read and write
|
||
304E60E000
|
stack
|
page read and write
|
||
1B9140A0000
|
trusted library section
|
page read and write
|
||
1B916907000
|
trusted library allocation
|
page read and write
|
||
2611ECCD000
|
heap
|
page read and write
|
||
1B915850000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
1B92E085000
|
heap
|
page read and write
|
||
19F5F4CB000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
19F5F4D5000
|
trusted library allocation
|
page read and write
|
||
1B91690B000
|
trusted library allocation
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1B92DFB0000
|
heap
|
page read and write
|
||
19F4FDD9000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
304D47E000
|
stack
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
26106865000
|
heap
|
page read and write
|
||
26106730000
|
heap
|
page execute and read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
12381000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
8E11C7F000
|
stack
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
26FE1720000
|
heap
|
page read and write
|
||
1B925B59000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
BBC37FE000
|
stack
|
page read and write
|
||
1B925B55000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
304DB3C000
|
stack
|
page read and write
|
||
1B92D873000
|
heap
|
page read and write
|
||
E4298FE000
|
stack
|
page read and write
|
||
26104D54000
|
heap
|
page read and write
|
||
1B92DDA0000
|
heap
|
page read and write
|
||
26104CE2000
|
heap
|
page read and write
|
||
7FF848FD8000
|
trusted library allocation
|
page read and write
|
||
1B916B7E000
|
trusted library allocation
|
page read and write
|
||
26104D1E000
|
heap
|
page read and write
|
||
7FF849004000
|
trusted library allocation
|
page read and write
|
||
1B916A89000
|
trusted library allocation
|
page read and write
|
||
A0000
|
unkown
|
page readonly
|
||
19F5F4E5000
|
trusted library allocation
|
page read and write
|
||
E42997E000
|
stack
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
26FC8E00000
|
heap
|
page read and write
|
||
BBC2F2D000
|
stack
|
page read and write
|
||
7FF849236000
|
trusted library allocation
|
page read and write
|
||
26106757000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
7FF849113000
|
trusted library allocation
|
page read and write
|
||
26FC8FE8000
|
trusted library allocation
|
page read and write
|
||
1B9170DC000
|
trusted library allocation
|
page read and write
|
||
7FF849123000
|
trusted library allocation
|
page read and write
|
||
1B92DFAC000
|
heap
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
26116871000
|
trusted library allocation
|
page read and write
|
||
19F4D690000
|
heap
|
page read and write
|
||
1B9171C4000
|
trusted library allocation
|
page read and write
|
||
7FF849008000
|
trusted library allocation
|
page read and write
|
||
1B92DE07000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
26FC9F92000
|
trusted library allocation
|
page read and write
|
||
23BF000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
19F4D610000
|
heap
|
page read and write
|
||
26FD9255000
|
trusted library allocation
|
page read and write
|
||
26FE0F60000
|
trusted library allocation
|
page read and write
|
||
1AE3E000
|
stack
|
page read and write
|
||
1B913D18000
|
heap
|
page read and write
|
||
1AF3E000
|
stack
|
page read and write
|
||
BBC36F9000
|
stack
|
page read and write
|
||
19F6794A000
|
heap
|
page read and write
|
||
8E11877000
|
stack
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
1B9140C5000
|
heap
|
page read and write
|
||
1BBCE000
|
stack
|
page read and write
|
||
304E80C000
|
stack
|
page read and write
|
||
7FF84914C000
|
trusted library allocation
|
page read and write
|
||
19F4F055000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
8E11AF8000
|
stack
|
page read and write
|
||
E429873000
|
stack
|
page read and write
|
||
26FCA26A000
|
trusted library allocation
|
page read and write
|
||
8E127CE000
|
stack
|
page read and write
|
||
BBC2FEF000
|
stack
|
page read and write
|
||
8E1139D000
|
stack
|
page read and write
|
||
2611EF50000
|
heap
|
page read and write
|
||
261078AC000
|
trusted library allocation
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
494000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
7FF849142000
|
trusted library allocation
|
page read and write
|
||
26105070000
|
heap
|
page read and write
|
||
2611EF54000
|
heap
|
page read and write
|
||
8E0000
|
trusted library allocation
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
2611EF48000
|
heap
|
page read and write
|
||
2456000
|
trusted library allocation
|
page read and write
|
||
1B914080000
|
heap
|
page read and write
|
||
BBC35F6000
|
stack
|
page read and write
|
||
19F6764B000
|
heap
|
page read and write
|
||
7FF848FA2000
|
trusted library allocation
|
page read and write
|
||
7FF848E5C000
|
trusted library allocation
|
page execute and read and write
|
||
2611F076000
|
heap
|
page read and write
|
||
1BC0E000
|
stack
|
page read and write
|
||
7FF84923D000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
1B913D6F000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
19F4F6AE000
|
trusted library allocation
|
page read and write
|
||
1B20F000
|
heap
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
1B980000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
26FE1829000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
19F50A73000
|
trusted library allocation
|
page read and write
|
||
26FE1500000
|
heap
|
page read and write
|
||
1B1D0000
|
heap
|
page read and write
|
||
19F4D6CC000
|
heap
|
page read and write
|
||
261072C3000
|
trusted library allocation
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
1B915865000
|
heap
|
page read and write
|
||
26104C30000
|
heap
|
page read and write
|
||
4C6000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
7FF849290000
|
trusted library allocation
|
page read and write
|
||
26FE14E0000
|
trusted library allocation
|
page read and write
|
||
2610799D000
|
trusted library allocation
|
page read and write
|
||
7FF848FE2000
|
trusted library allocation
|
page read and write
|
||
26116CDE000
|
trusted library allocation
|
page read and write
|
||
1D280000
|
heap
|
page read and write
|
||
26107845000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
7FF848FB1000
|
trusted library allocation
|
page read and write
|
||
26FC760E000
|
heap
|
page read and write
|
||
1B92DD90000
|
heap
|
page execute and read and write
|
||
456000
|
heap
|
page read and write
|
||
236F000
|
stack
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
1B92DE59000
|
heap
|
page read and write
|
||
19F6794E000
|
heap
|
page read and write
|
||
19F501E7000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
26116B74000
|
trusted library allocation
|
page read and write
|
||
7FF8491E3000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
7FF848DF2000
|
trusted library allocation
|
page read and write
|
||
19F678D1000
|
heap
|
page read and write
|
||
7FF848FE8000
|
trusted library allocation
|
page read and write
|
||
7FF849134000
|
trusted library allocation
|
page read and write
|
||
19F67630000
|
heap
|
page read and write
|
||
7FF849182000
|
trusted library allocation
|
page read and write
|
||
19F4D716000
|
heap
|
page read and write
|
||
304D4FE000
|
stack
|
page read and write
|
||
26FCA6E8000
|
trusted library allocation
|
page read and write
|
||
7FF84916C000
|
trusted library allocation
|
page read and write
|
||
26FC8E60000
|
trusted library allocation
|
page read and write
|
||
1B1BC000
|
heap
|
page read and write
|
||
1B913D4E000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
26107B21000
|
trusted library allocation
|
page read and write
|
||
E42AC4C000
|
stack
|
page read and write
|
||
1B1C4000
|
heap
|
page read and write
|
||
26FC8F61000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page execute and read and write
|
||
BBC2FAE000
|
stack
|
page read and write
|
||
8E116FF000
|
stack
|
page read and write
|
||
26FD9246000
|
trusted library allocation
|
page read and write
|
||
7FF848F91000
|
trusted library allocation
|
page read and write
|
||
26FD924D000
|
trusted library allocation
|
page read and write
|
||
26106740000
|
heap
|
page read and write
|
||
19F5F1E1000
|
trusted library allocation
|
page read and write
|
||
261168A1000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
1B9258DC000
|
trusted library allocation
|
page read and write
|
||
E42AA4D000
|
stack
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
26106717000
|
heap
|
page execute and read and write
|
||
26FD8F91000
|
trusted library allocation
|
page read and write
|
||
19F67711000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
26107813000
|
trusted library allocation
|
page read and write
|
||
2611EC20000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
1B9258A1000
|
trusted library allocation
|
page read and write
|
||
1B917650000
|
trusted library allocation
|
page read and write
|
||
26FC756D000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
2611EC5E000
|
heap
|
page read and write
|
||
2611F07F000
|
heap
|
page read and write
|
||
1B140000
|
heap
|
page read and write
|
||
1B92DDE6000
|
heap
|
page read and write
|
||
19F5F4C6000
|
trusted library allocation
|
page read and write
|
||
7FF848E0D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
26106D3D000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
26FC99B4000
|
trusted library allocation
|
page read and write
|
||
7FF848F9A000
|
trusted library allocation
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page read and write
|
||
26FD8F81000
|
trusted library allocation
|
page read and write
|
||
7FF849162000
|
trusted library allocation
|
page read and write
|
||
1B92DDE4000
|
heap
|
page read and write
|
||
26108167000
|
trusted library allocation
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
26FE0FD3000
|
heap
|
page read and write
|
||
A0000
|
unkown
|
page readonly
|
||
23F2000
|
trusted library allocation
|
page read and write
|
||
26FE15C1000
|
heap
|
page read and write
|
||
19F67667000
|
heap
|
page read and write
|
||
7FF849276000
|
trusted library allocation
|
page read and write
|
||
1B181000
|
heap
|
page read and write
|
||
2611F08A000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
2611EF58000
|
heap
|
page read and write
|
||
7FF848FC4000
|
trusted library allocation
|
page read and write
|
||
19F5100B000
|
trusted library allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
1B913D57000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
19F4F268000
|
trusted library allocation
|
page read and write
|
||
1B916B1D000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
304E78C000
|
stack
|
page read and write
|
||
E42AACE000
|
stack
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
BBC3379000
|
stack
|
page read and write
|
||
19F4D5D0000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
26FE182D000
|
heap
|
page read and write
|
||
241D000
|
trusted library allocation
|
page read and write
|
||
19F5F201000
|
trusted library allocation
|
page read and write
|
||
19F50307000
|
trusted library allocation
|
page read and write
|
||
26108104000
|
trusted library allocation
|
page read and write
|
||
1E1000
|
stack
|
page read and write
|
||
304DBBE000
|
stack
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
7FF849076000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
26FC7543000
|
heap
|
page read and write
|
||
1B913D96000
|
heap
|
page read and write
|
||
7FF848FD4000
|
trusted library allocation
|
page read and write
|
||
1B913D10000
|
heap
|
page read and write
|
||
26FCA173000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
23F0000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
1B75A000
|
stack
|
page read and write
|
||
2445000
|
trusted library allocation
|
page read and write
|
||
900000
|
heap
|
page execute and read and write
|
||
26107B82000
|
trusted library allocation
|
page read and write
|
||
1B1DC000
|
heap
|
page read and write
|
||
26FC8E70000
|
heap
|
page readonly
|
||
19F4D4D0000
|
heap
|
page read and write
|
||
1B915700000
|
trusted library allocation
|
page read and write
|
||
7FF849153000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
1B91769A000
|
trusted library allocation
|
page read and write
|
||
26FC758D000
|
heap
|
page read and write
|
||
26FC7577000
|
heap
|
page read and write
|
||
E42A9CE000
|
stack
|
page read and write
|
||
BBC42CE000
|
stack
|
page read and write
|
||
304D8B6000
|
stack
|
page read and write
|
||
26104C50000
|
heap
|
page read and write
|
||
7FF848DE3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
26106710000
|
heap
|
page execute and read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
19F503C1000
|
trusted library allocation
|
page read and write
|
||
7FF849246000
|
trusted library allocation
|
page read and write
|
||
1B854000
|
stack
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
19F4FF5F000
|
trusted library allocation
|
page read and write
|
||
BBC38FB000
|
stack
|
page read and write
|
||
19F67750000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
26FCA208000
|
trusted library allocation
|
page read and write
|
||
1B92DD96000
|
heap
|
page execute and read and write
|
||
7FF848FDA000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF848E3B000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page execute and read and write
|
||
19F51006000
|
trusted library allocation
|
page read and write
|
||
BBC387E000
|
stack
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
26FE0F90000
|
trusted library allocation
|
page read and write
|
||
19F50278000
|
trusted library allocation
|
page read and write
|
||
19F4FDE9000
|
trusted library allocation
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
26FCA13A000
|
trusted library allocation
|
page read and write
|
||
7FF849168000
|
trusted library allocation
|
page read and write
|
||
7FF84921A000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
19F5F4CD000
|
trusted library allocation
|
page read and write
|
||
26FC9B93000
|
trusted library allocation
|
page read and write
|
||
E429BFD000
|
stack
|
page read and write
|
||
7DF491390000
|
trusted library allocation
|
page execute and read and write
|
||
304D83E000
|
stack
|
page read and write
|
||
19F505AB000
|
trusted library allocation
|
page read and write
|
||
8E128CC000
|
stack
|
page read and write
|
||
26FC9189000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
19F4D6A2000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
7FF849144000
|
trusted library allocation
|
page read and write
|
||
1C30E000
|
stack
|
page read and write
|
||
1B92DFE2000
|
heap
|
page read and write
|
||
19F50438000
|
trusted library allocation
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
19F67867000
|
heap
|
page read and write
|
||
7DF4A96A0000
|
trusted library allocation
|
page execute and read and write
|
||
9F5000
|
heap
|
page read and write
|
||
1B913CB0000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
26FC8E95000
|
heap
|
page read and write
|
||
8E1294E000
|
stack
|
page read and write
|
||
1B915D3D000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
19F4D920000
|
trusted library allocation
|
page read and write
|
||
7FF848DE4000
|
trusted library allocation
|
page read and write
|
||
19F4D698000
|
heap
|
page read and write
|
||
26FE1887000
|
heap
|
page read and write
|
||
26FE1620000
|
heap
|
page read and write
|
||
7FF848EE6000
|
trusted library allocation
|
page execute and read and write
|
||
1B925871000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FBA000
|
trusted library allocation
|
page read and write
|
||
1B92E290000
|
heap
|
page read and write
|
||
BBC44CC000
|
stack
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
26FC7539000
|
heap
|
page read and write
|
||
1B192000
|
heap
|
page read and write
|
||
261074D7000
|
trusted library allocation
|
page read and write
|
||
BBC327E000
|
stack
|
page read and write
|
||
26FC75B4000
|
heap
|
page read and write
|
||
7FF849174000
|
trusted library allocation
|
page read and write
|
||
1BE0A000
|
stack
|
page read and write
|
||
1B9162C2000
|
trusted library allocation
|
page read and write
|
||
E429FFB000
|
stack
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
19F50FC1000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
E4295EF000
|
stack
|
page read and write
|
||
492000
|
heap
|
page read and write
|
||
304E80E000
|
stack
|
page read and write
|
||
1B916A50000
|
trusted library allocation
|
page read and write
|
||
19F67B10000
|
heap
|
page read and write
|
||
7DF43F870000
|
trusted library allocation
|
page execute and read and write
|
||
26104CD0000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
19F4D71A000
|
heap
|
page read and write
|
||
2611EF44000
|
heap
|
page read and write
|
||
26FC8F00000
|
heap
|
page execute and read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
2402000
|
trusted library allocation
|
page read and write
|
||
12371000
|
trusted library allocation
|
page read and write
|
||
26FC7579000
|
heap
|
page read and write
|
||
26FE18B6000
|
heap
|
page read and write
|
||
26FE180C000
|
heap
|
page read and write
|
||
26104C90000
|
heap
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
26FC8E90000
|
heap
|
page read and write
|
||
7FF848E02000
|
trusted library allocation
|
page read and write
|
||
7FF8491DA000
|
trusted library allocation
|
page read and write
|
||
26FCAD67000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
26104D18000
|
heap
|
page read and write
|
||
304DA3E000
|
stack
|
page read and write
|
||
1B913D51000
|
heap
|
page read and write
|
||
19F4D670000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
26FE182F000
|
heap
|
page read and write
|
||
26108652000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
19F4F100000
|
heap
|
page execute and read and write
|
||
26105030000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
1B33E000
|
stack
|
page read and write
|
||
7FF848FC8000
|
trusted library allocation
|
page read and write
|
||
26FE174B000
|
heap
|
page read and write
|
There are 864 hidden memdumps, click here to show them.