Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Windows Defender.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Windows defender.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Windows defender.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4d0gffu1.kdi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5doctpg0.jh5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a1yx1xhi.w2p.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a5afjpcb.rjj.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_an02oaqi.eh5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bc0wv5r4.0qa.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f2myxf2u.u24.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gfzetyab.ch1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_irw4ztao.tgd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j1rp0ddx.gcr.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ksw5znke.o21.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mm2i0ohh.a1d.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nqhw0umi.k2z.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_szj344xv.hhd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t4fvm4dp.z2f.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wwr51r4w.hm5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows defender.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Jul 22 11:03:56
2024, mtime=Mon Jul 22 11:03:56 2024, atime=Mon Jul 22 11:03:56 2024, length=88704, window=hide
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Windows Defender.exe
|
"C:\Users\user\Desktop\Windows Defender.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Windows
Defender.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows
Defender.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Windows
defender.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows
defender.exe'
|
||
C:\Users\user\AppData\Roaming\Windows defender.exe
|
"C:\Users\user\AppData\Roaming\Windows defender.exe"
|
||
C:\Users\user\AppData\Roaming\Windows defender.exe
|
"C:\Users\user\AppData\Roaming\Windows defender.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
rest-root.gl.at.ply.gg
|
|||
http://wwcrosoft.com/pki/certs/MicWinPCA_2010-07-06.crt0
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://crl.microso
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.microsoft.co
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://osoft.co
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.microsoft.?
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://crl.micros
|
unknown
|
There are 13 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
||
rest-root.gl.at.ply.gg
|
147.185.221.20
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
147.185.221.20
|
rest-root.gl.at.ply.gg
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Windows defender
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
12991000
|
trusted library allocation
|
page read and write
|
||
2981000
|
trusted library allocation
|
page read and write
|
||
672000
|
unkown
|
page readonly
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
2C490010000
|
trusted library allocation
|
page read and write
|
||
166CBA2F000
|
trusted library allocation
|
page read and write
|
||
2C48103B000
|
trusted library allocation
|
page read and write
|
||
1731559B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
47B000
|
heap
|
page read and write
|
||
166BCFB1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB6A000
|
trusted library allocation
|
page read and write
|
||
17313BB0000
|
trusted library allocation
|
page read and write
|
||
166B9C80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B75D000
|
trusted library allocation
|
page execute and read and write
|
||
C69000
|
heap
|
page read and write
|
||
7FFD9BAE4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page read and write
|
||
1835C4D5000
|
heap
|
page read and write
|
||
7FFD9BBC6000
|
trusted library allocation
|
page read and write
|
||
166B9C50000
|
trusted library section
|
page read and write
|
||
1732C5F3000
|
heap
|
page read and write
|
||
12C3000
|
heap
|
page read and write
|
||
2C481312000
|
trusted library allocation
|
page read and write
|
||
173141FD000
|
trusted library allocation
|
page read and write
|
||
1732C572000
|
heap
|
page read and write
|
||
17314933000
|
trusted library allocation
|
page read and write
|
||
173156CA000
|
trusted library allocation
|
page read and write
|
||
1835F051000
|
trusted library allocation
|
page read and write
|
||
1B865000
|
heap
|
page read and write
|
||
1732C176000
|
heap
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
1B58E000
|
stack
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
17314DC5000
|
trusted library allocation
|
page read and write
|
||
17315683000
|
trusted library allocation
|
page read and write
|
||
1BBCE000
|
stack
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC9000
|
trusted library allocation
|
page read and write
|
||
166BCA59000
|
trusted library allocation
|
page read and write
|
||
18376820000
|
heap
|
page read and write
|
||
2C481955000
|
trusted library allocation
|
page read and write
|
||
1835F049000
|
trusted library allocation
|
page read and write
|
||
1731227B000
|
heap
|
page read and write
|
||
2C48186D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
166D3C1F000
|
heap
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
1836E3CA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
2C48109E000
|
trusted library allocation
|
page read and write
|
||
1835F044000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1C44E000
|
stack
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
2C4810CA000
|
trusted library allocation
|
page read and write
|
||
1405000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
1841EC7000
|
stack
|
page read and write
|
||
1732C63B000
|
heap
|
page read and write
|
||
7FFD9BAE9000
|
trusted library allocation
|
page read and write
|
||
485000
|
heap
|
page read and write
|
||
5C4477E000
|
stack
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAEC000
|
trusted library allocation
|
page read and write
|
||
166B9C60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA9F000
|
trusted library allocation
|
page read and write
|
||
2C480FD5000
|
trusted library allocation
|
page read and write
|
||
7DF4D94A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAD4000
|
trusted library allocation
|
page read and write
|
||
12303000
|
trusted library allocation
|
page read and write
|
||
17314DF1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
16C0000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
17312340000
|
trusted library allocation
|
page read and write
|
||
5C4437E000
|
stack
|
page read and write
|
||
1841076000
|
stack
|
page read and write
|
||
2C4F8FCE000
|
heap
|
page read and write
|
||
166BC866000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
2C4F8F60000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
17313F58000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
3081000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
1840933000
|
stack
|
page read and write
|
||
1732C501000
|
heap
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
166BB540000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
2C480229000
|
trusted library allocation
|
page read and write
|
||
2C480A52000
|
trusted library allocation
|
page read and write
|
||
166D3E9A000
|
heap
|
page read and write
|
||
18413FB000
|
stack
|
page read and write
|
||
17323F82000
|
trusted library allocation
|
page read and write
|
||
17315B34000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
184204E000
|
stack
|
page read and write
|
||
1291B4C000
|
stack
|
page read and write
|
||
1840FF9000
|
stack
|
page read and write
|
||
1732C104000
|
heap
|
page read and write
|
||
FE91277000
|
stack
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
1732C237000
|
heap
|
page execute and read and write
|
||
2C4FB588000
|
heap
|
page read and write
|
||
2D04000
|
trusted library allocation
|
page read and write
|
||
1732C5F1000
|
heap
|
page read and write
|
||
1ADAE000
|
stack
|
page read and write
|
||
2C4FB593000
|
heap
|
page read and write
|
||
1835DE80000
|
trusted library section
|
page read and write
|
||
1835F1A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page execute and read and write
|
||
73E000
|
stack
|
page read and write
|
||
B65000
|
heap
|
page read and write
|
||
2C481DE1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB3000
|
trusted library allocation
|
page read and write
|
||
12905CE000
|
stack
|
page read and write
|
||
2C4FB162000
|
heap
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
166BCA84000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7DF410590000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
1732C3B0000
|
trusted library allocation
|
page read and write
|
||
1835E0D0000
|
heap
|
page execute and read and write
|
||
1220000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
17314CA2000
|
trusted library allocation
|
page read and write
|
||
7DF4D94B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1C3E0000
|
heap
|
page read and write
|
||
1BE2F000
|
stack
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
22FF000
|
stack
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
1835F94E000
|
trusted library allocation
|
page read and write
|
||
17312190000
|
heap
|
page read and write
|
||
17312360000
|
trusted library allocation
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
1B0AE000
|
stack
|
page read and write
|
||
184127E000
|
stack
|
page read and write
|
||
BF6000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
166B9CDF000
|
heap
|
page read and write
|
||
1835E309000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE5000
|
trusted library allocation
|
page read and write
|
||
FE9173B000
|
stack
|
page read and write
|
||
1836E151000
|
trusted library allocation
|
page read and write
|
||
2C4FB580000
|
heap
|
page read and write
|
||
5C453CC000
|
stack
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
13071000
|
trusted library allocation
|
page read and write
|
||
1291AC7000
|
stack
|
page read and write
|
||
755000
|
heap
|
page read and write
|
||
17315B54000
|
trusted library allocation
|
page read and write
|
||
17314C95000
|
trusted library allocation
|
page read and write
|
||
2C4FB164000
|
heap
|
page read and write
|
||
2C4FB172000
|
heap
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page execute and read and write
|
||
1836E111000
|
trusted library allocation
|
page read and write
|
||
166D3BD8000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
18376961000
|
heap
|
page read and write
|
||
2C4F901A000
|
heap
|
page read and write
|
||
FE91438000
|
stack
|
page read and write
|
||
129087E000
|
stack
|
page read and write
|
||
183764B1000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
1290A7E000
|
stack
|
page read and write
|
||
166CBA2A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
1835FEE8000
|
trusted library allocation
|
page read and write
|
||
28EF000
|
stack
|
page read and write
|
||
166BB969000
|
trusted library allocation
|
page read and write
|
||
166BC992000
|
trusted library allocation
|
page read and write
|
||
1731223D000
|
heap
|
page read and write
|
||
166BC6FA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
1841F4C000
|
stack
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
166BB570000
|
trusted library allocation
|
page read and write
|
||
17324018000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB9C000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1731493D000
|
trusted library allocation
|
page read and write
|
||
2C4FAA80000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
495000
|
heap
|
page read and write
|
||
166BC6AC000
|
trusted library allocation
|
page read and write
|
||
2C4FB5DD000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
1835C5F8000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
1835F04D000
|
trusted library allocation
|
page read and write
|
||
1835F975000
|
trusted library allocation
|
page read and write
|
||
17313D31000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD8000
|
trusted library allocation
|
page read and write
|
||
166D4100000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
1835F2F5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B962000
|
trusted library allocation
|
page read and write
|
||
27D0000
|
heap
|
page execute and read and write
|
||
18376710000
|
heap
|
page execute and read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
DEC000
|
stack
|
page read and write
|
||
166BD525000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBDD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7A3000
|
trusted library allocation
|
page read and write
|
||
17312370000
|
heap
|
page readonly
|
||
5C4544E000
|
stack
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
2C480086000
|
trusted library allocation
|
page read and write
|
||
166D3C79000
|
heap
|
page read and write
|
||
166BB5A0000
|
trusted library allocation
|
page read and write
|
||
FE9228D000
|
stack
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1835DFCB000
|
heap
|
page read and write
|
||
2C4FA940000
|
heap
|
page read and write
|
||
166D3BE9000
|
heap
|
page read and write
|
||
1835C4D0000
|
heap
|
page read and write
|
||
C1C000
|
heap
|
page read and write
|
||
2C490031000
|
trusted library allocation
|
page read and write
|
||
1837653C000
|
heap
|
page read and write
|
||
166BC772000
|
trusted library allocation
|
page read and write
|
||
48F000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
1835DEE5000
|
heap
|
page read and write
|
||
21E0000
|
heap
|
page execute and read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
1835C470000
|
heap
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
2C4902F8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
183764AF000
|
heap
|
page read and write
|
||
166BB560000
|
heap
|
page read and write
|
||
7C1000
|
stack
|
page read and write
|
||
166BC530000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
17314CAF000
|
trusted library allocation
|
page read and write
|
||
166CB750000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
5C442FE000
|
stack
|
page read and write
|
||
1BB7E000
|
stack
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
17323D9F000
|
trusted library allocation
|
page read and write
|
||
17314782000
|
trusted library allocation
|
page read and write
|
||
17312239000
|
heap
|
page read and write
|
||
2C4FAF99000
|
heap
|
page read and write
|
||
2C4FB1B6000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
5C43FCF000
|
stack
|
page read and write
|
||
518000
|
heap
|
page read and write
|
||
FE911FE000
|
stack
|
page read and write
|
||
1732C4E0000
|
heap
|
page read and write
|
||
1731224F000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
905000
|
heap
|
page read and write
|
||
7FFD9BAD4000
|
trusted library allocation
|
page read and write
|
||
2C4FA8F0000
|
trusted library allocation
|
page read and write
|
||
1835E0E1000
|
trusted library allocation
|
page read and write
|
||
2C4F8F50000
|
trusted library section
|
page read and write
|
||
1732C581000
|
heap
|
page read and write
|
||
1835C53E000
|
heap
|
page read and write
|
||
13078000
|
trusted library allocation
|
page read and write
|
||
173123D0000
|
heap
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
1B84D000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
1835ECCB000
|
trusted library allocation
|
page read and write
|
||
166B9C30000
|
heap
|
page read and write
|
||
1E1000
|
stack
|
page read and write
|
||
173154B5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B912000
|
trusted library allocation
|
page read and write
|
||
166B9CA0000
|
heap
|
page read and write
|
||
173155C1000
|
trusted library allocation
|
page read and write
|
||
166BC6B0000
|
trusted library allocation
|
page read and write
|
||
166CBA37000
|
trusted library allocation
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
2C4FABC6000
|
heap
|
page execute and read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
2C4F8FDE000
|
heap
|
page read and write
|
||
1835F869000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
173121B0000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
2C481893000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
2C4FB5C1000
|
heap
|
page read and write
|
||
FE9210F000
|
stack
|
page read and write
|
||
2C480C33000
|
trusted library allocation
|
page read and write
|
||
4BD000
|
heap
|
page read and write
|
||
17315B0F000
|
trusted library allocation
|
page read and write
|
||
1732C1B5000
|
heap
|
page read and write
|
||
166BC528000
|
trusted library allocation
|
page read and write
|
||
2C4F8FEE000
|
heap
|
page read and write
|
||
1BCCE000
|
stack
|
page read and write
|
||
7FF472C60000
|
trusted library allocation
|
page execute and read and write
|
||
CB0000
|
heap
|
page read and write
|
||
166CB771000
|
trusted library allocation
|
page read and write
|
||
7FFD9B964000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
1B383000
|
heap
|
page read and write
|
||
17312380000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC4000
|
trusted library allocation
|
page read and write
|
||
1291A4E000
|
stack
|
page read and write
|
||
2301000
|
trusted library allocation
|
page read and write
|
||
166BC34F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
1A9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AC000
|
trusted library allocation
|
page execute and read and write
|
||
12308000
|
trusted library allocation
|
page read and write
|
||
456000
|
heap
|
page read and write
|
||
18409BD000
|
stack
|
page read and write
|
||
1380000
|
trusted library allocation
|
page read and write
|
||
1285000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
2C4F8F70000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
2C4FAB60000
|
heap
|
page execute and read and write
|
||
166D3C35000
|
heap
|
page read and write
|
||
166BB741000
|
trusted library allocation
|
page read and write
|
||
173123D5000
|
heap
|
page read and write
|
||
166B9CE9000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
166D3DC0000
|
heap
|
page execute and read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
166BB6E0000
|
heap
|
page execute and read and write
|
||
1AF0D000
|
stack
|
page read and write
|
||
166B9D94000
|
heap
|
page read and write
|
||
166CB741000
|
trusted library allocation
|
page read and write
|
||
2C4FB11A000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
17312276000
|
heap
|
page read and write
|
||
1291BCE000
|
stack
|
page read and write
|
||
C66000
|
heap
|
page read and write
|
||
166B9C20000
|
heap
|
page read and write
|
||
2C48112C000
|
trusted library allocation
|
page read and write
|
||
CB6000
|
heap
|
page read and write
|
||
1732C4F0000
|
heap
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
FE913BE000
|
stack
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
17313B80000
|
trusted library allocation
|
page read and write
|
||
1287000
|
heap
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
166B9CA8000
|
heap
|
page read and write
|
||
90000
|
unkown
|
page readonly
|
||
166B9AD0000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
2C4FA930000
|
heap
|
page read and write
|
||
129A7000
|
trusted library allocation
|
page read and write
|
||
2C4FB121000
|
heap
|
page read and write
|
||
2C480001000
|
trusted library allocation
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
2C4F8E10000
|
heap
|
page read and write
|
||
166BCB09000
|
trusted library allocation
|
page read and write
|
||
5C444F9000
|
stack
|
page read and write
|
||
2C4FB624000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
166BD54A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
166BC192000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
166BBC0D000
|
trusted library allocation
|
page read and write
|
||
18376514000
|
heap
|
page read and write
|
||
2C4FB196000
|
heap
|
page read and write
|
||
7FFD9B8A5000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1290C7A000
|
stack
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
166D3B90000
|
heap
|
page read and write
|
||
5C4554C000
|
stack
|
page read and write
|
||
125D000
|
heap
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
150F000
|
stack
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1C48F000
|
stack
|
page read and write
|
||
1835E167000
|
trusted library allocation
|
page read and write
|
||
2970000
|
heap
|
page execute and read and write
|
||
47D000
|
heap
|
page read and write
|
||
5C454C7000
|
stack
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
2C4FB674000
|
heap
|
page read and write
|
||
FE910FE000
|
stack
|
page read and write
|
||
2C4902EA000
|
trusted library allocation
|
page read and write
|
||
17315B59000
|
trusted library allocation
|
page read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
1835C588000
|
heap
|
page read and write
|
||
17314E55000
|
trusted library allocation
|
page read and write
|
||
2C4FB5DB000
|
heap
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
1835FA36000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
17314C9E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
2C4F8F10000
|
heap
|
page read and write
|
||
166BCA8A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
2C4F8FD8000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
17312231000
|
heap
|
page read and write
|
||
1836E101000
|
trusted library allocation
|
page read and write
|
||
5C448FE000
|
stack
|
page read and write
|
||
166B9BD0000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
1840E7E000
|
stack
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B958000
|
trusted library allocation
|
page read and write
|
||
307F000
|
trusted library allocation
|
page read and write
|
||
166BD56A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
1228000
|
heap
|
page read and write
|
||
17324027000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAFC000
|
trusted library allocation
|
page read and write
|
||
CBE000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
1290CF7000
|
stack
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1840F7D000
|
stack
|
page read and write
|
||
1841DCE000
|
stack
|
page read and write
|
||
1835E5AD000
|
trusted library allocation
|
page read and write
|
||
1290BF9000
|
stack
|
page read and write
|
||
FE91179000
|
stack
|
page read and write
|
||
1732C280000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1835C55E000
|
heap
|
page read and write
|
||
1835F38B000
|
trusted library allocation
|
page read and write
|
||
1835F062000
|
trusted library allocation
|
page read and write
|
||
2C4F9017000
|
heap
|
page read and write
|
||
FE9153A000
|
stack
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
166D3E35000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
5C447FE000
|
stack
|
page read and write
|
||
5C446FB000
|
stack
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
17312237000
|
heap
|
page read and write
|
||
17324037000
|
trusted library allocation
|
page read and write
|
||
1290EFE000
|
stack
|
page read and write
|
||
1835DE90000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
173150F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1B823000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
166D3F17000
|
heap
|
page read and write
|
||
2C490021000
|
trusted library allocation
|
page read and write
|
||
166D3747000
|
heap
|
page read and write
|
||
12F5000
|
heap
|
page read and write
|
||
166BCA56000
|
trusted library allocation
|
page read and write
|
||
166D3DF8000
|
heap
|
page read and write
|
||
1732C5A8000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
17314E90000
|
trusted library allocation
|
page read and write
|
||
18410F8000
|
stack
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
2C481570000
|
trusted library allocation
|
page read and write
|
||
17315A7D000
|
trusted library allocation
|
page read and write
|
||
2C4902EE000
|
trusted library allocation
|
page read and write
|
||
2C480F9F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
18376991000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
2C4FB330000
|
heap
|
page read and write
|
||
2C4FA840000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
1731568C000
|
trusted library allocation
|
page read and write
|
||
166CB7B1000
|
trusted library allocation
|
page read and write
|
||
FE914B9000
|
stack
|
page read and write
|
||
166B9D28000
|
heap
|
page read and write
|
||
7FFD9BAEC000
|
trusted library allocation
|
page read and write
|
||
166B9CE5000
|
heap
|
page read and write
|
||
1732C0C0000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
2C4FABB0000
|
trusted library allocation
|
page read and write
|
||
166BCA75000
|
trusted library allocation
|
page read and write
|
||
1B790000
|
heap
|
page read and write
|
||
166BCFD7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
1C1DA000
|
stack
|
page read and write
|
||
2C4F8F90000
|
heap
|
page read and write
|
||
12F3000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
1AEAE000
|
stack
|
page read and write
|
||
7DF4105A0000
|
trusted library allocation
|
page execute and read and write
|
||
1731222E000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
1835F4A9000
|
trusted library allocation
|
page read and write
|
||
BD3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
1732C17C000
|
heap
|
page read and write
|
||
1B34B000
|
stack
|
page read and write
|
||
5C443F9000
|
stack
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
17315624000
|
trusted library allocation
|
page read and write
|
||
1731506E000
|
trusted library allocation
|
page read and write
|
||
166D3EF0000
|
heap
|
page read and write
|
||
1840D7E000
|
stack
|
page read and write
|
||
17313DB5000
|
trusted library allocation
|
page read and write
|
||
1BA3E000
|
stack
|
page read and write
|
||
2C4FAF70000
|
heap
|
page read and write
|
||
17323D31000
|
trusted library allocation
|
page read and write
|
||
166B9CDC000
|
heap
|
page read and write
|
||
1732C360000
|
heap
|
page execute and read and write
|
||
1835ECE3000
|
trusted library allocation
|
page read and write
|
||
17314C91000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
2F6F000
|
stack
|
page read and write
|
||
17314AAD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
B40000
|
heap
|
page read and write
|
||
1835C51F000
|
heap
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
1835DEB0000
|
trusted library allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
2C4FA860000
|
trusted library allocation
|
page read and write
|
||
FE9220E000
|
stack
|
page read and write
|
||
1841E4E000
|
stack
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1290583000
|
stack
|
page read and write
|
||
166BC6B8000
|
trusted library allocation
|
page read and write
|
||
2C481788000
|
trusted library allocation
|
page read and write
|
||
1731223B000
|
heap
|
page read and write
|
||
5C455CE000
|
stack
|
page read and write
|
||
166BCA86000
|
trusted library allocation
|
page read and write
|
||
166BCECC000
|
trusted library allocation
|
page read and write
|
||
FE90DDD000
|
stack
|
page read and write
|
||
2C4FB5E2000
|
heap
|
page read and write
|
||
166BD56F000
|
trusted library allocation
|
page read and write
|
||
17314F0C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
166BC91C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
5C4427E000
|
stack
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
2C481E26000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
17312233000
|
heap
|
page read and write
|
||
173121F0000
|
heap
|
page read and write
|
||
7FFD9B978000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
166BB656000
|
heap
|
page execute and read and write
|
||
129097E000
|
stack
|
page read and write
|
||
17312278000
|
heap
|
page read and write
|
||
2C48121A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
1835C542000
|
heap
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B754000
|
trusted library allocation
|
page read and write
|
||
12988000
|
trusted library allocation
|
page read and write
|
||
1835F2BC000
|
trusted library allocation
|
page read and write
|
||
FE916BE000
|
stack
|
page read and write
|
||
18411FE000
|
stack
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
12908FE000
|
stack
|
page read and write
|
||
7FFD9BAC3000
|
trusted library allocation
|
page read and write
|
||
2C490071000
|
trusted library allocation
|
page read and write
|
||
2C4FAF80000
|
heap
|
page read and write
|
||
166BC803000
|
trusted library allocation
|
page read and write
|
||
1B795000
|
heap
|
page read and write
|
||
1837684C000
|
heap
|
page read and write
|
||
1835F3EE000
|
trusted library allocation
|
page read and write
|
||
2C4FB0FF000
|
heap
|
page read and write
|
||
7FFD9B931000
|
trusted library allocation
|
page read and write
|
||
1BD2E000
|
stack
|
page read and write
|
||
1841FCC000
|
stack
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
1B380000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
183768D1000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD6000
|
trusted library allocation
|
page read and write
|
||
2C4812AF000
|
trusted library allocation
|
page read and write
|
||
17312300000
|
heap
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1290F7C000
|
stack
|
page read and write
|
||
3071000
|
trusted library allocation
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
5C445F7000
|
stack
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
2C4FA870000
|
heap
|
page readonly
|
||
166B9D9C000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
166BD03A000
|
trusted library allocation
|
page read and write
|
||
1B7E1000
|
heap
|
page read and write
|
||
491000
|
heap
|
page read and write
|
||
7DF452550000
|
trusted library allocation
|
page execute and read and write
|
||
1B5FD000
|
stack
|
page read and write
|
||
7FFD9B9D3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
1290DFE000
|
stack
|
page read and write
|
||
1360000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
2C4FA880000
|
trusted library allocation
|
page read and write
|
||
1840EFB000
|
stack
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
7DF452530000
|
trusted library allocation
|
page execute and read and write
|
||
166B9C10000
|
trusted library section
|
page read and write
|
||
166BB650000
|
heap
|
page execute and read and write
|
||
17312390000
|
heap
|
page execute and read and write
|
||
1837683D000
|
heap
|
page read and write
|
||
2C48100F000
|
trusted library allocation
|
page read and write
|
||
FE9238C000
|
stack
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
trusted library allocation
|
page read and write
|
||
21F0000
|
heap
|
page execute and read and write
|
||
430000
|
heap
|
page read and write
|
||
1B48E000
|
stack
|
page read and write
|
||
17314CA6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BB000
|
trusted library allocation
|
page execute and read and write
|
||
2C481E2B000
|
trusted library allocation
|
page read and write
|
||
166BC345000
|
trusted library allocation
|
page read and write
|
||
1835EB32000
|
trusted library allocation
|
page read and write
|
||
129194E000
|
stack
|
page read and write
|
||
166BD0AA000
|
trusted library allocation
|
page read and write
|
||
166B9D25000
|
heap
|
page read and write
|
||
FE9107E000
|
stack
|
page read and write
|
||
1835DEC0000
|
heap
|
page readonly
|
||
2C4FB1A8000
|
heap
|
page read and write
|
||
2C4F8FD0000
|
heap
|
page read and write
|
||
1835F205000
|
trusted library allocation
|
page read and write
|
||
1835F176000
|
trusted library allocation
|
page read and write
|
||
3060000
|
heap
|
page execute and read and write
|
||
1298E000
|
trusted library allocation
|
page read and write
|
||
1BA70000
|
heap
|
page read and write
|
||
166B9BB0000
|
heap
|
page read and write
|
||
7FFD9B964000
|
trusted library allocation
|
page read and write
|
||
45C000
|
heap
|
page read and write
|
||
1731503B000
|
trusted library allocation
|
page read and write
|
||
18409FE000
|
stack
|
page read and write
|
||
1732C58A000
|
heap
|
page read and write
|
||
17314FD9000
|
trusted library allocation
|
page read and write
|
||
18376830000
|
heap
|
page read and write
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
4BB000
|
heap
|
page read and write
|
||
1C4A0000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
51F000
|
heap
|
page read and write
|
||
1C0D5000
|
stack
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
1B68E000
|
stack
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
B35000
|
heap
|
page read and write
|
||
2C4FB0FD000
|
heap
|
page read and write
|
||
1732C59E000
|
heap
|
page read and write
|
||
1840CFE000
|
stack
|
page read and write
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
1290B7D000
|
stack
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
1248000
|
heap
|
page read and write
|
||
1BACE000
|
stack
|
page read and write
|
||
18412FD000
|
stack
|
page read and write
|
||
166B9CBF000
|
heap
|
page read and write
|
||
1835F055000
|
trusted library allocation
|
page read and write
|
||
1835DE70000
|
trusted library section
|
page read and write
|
||
2C490001000
|
trusted library allocation
|
page read and write
|
||
1835FF07000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1ACA0000
|
heap
|
page read and write
|
||
1732401D000
|
trusted library allocation
|
page read and write
|
||
166BC6A3000
|
trusted library allocation
|
page read and write
|
||
173120B0000
|
heap
|
page read and write
|
||
166BCDE7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
1840C7E000
|
stack
|
page read and write
|
||
2C4FB0DF000
|
heap
|
page read and write
|
||
5C4457D000
|
stack
|
page read and write
|
||
7FFD9B7B4000
|
trusted library allocation
|
page read and write
|
||
1731492F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD2000
|
trusted library allocation
|
page read and write
|
||
FE91377000
|
stack
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
5C4447E000
|
stack
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAE8000
|
trusted library allocation
|
page read and write
|
||
2C4804CD000
|
trusted library allocation
|
page read and write
|
||
2C481E06000
|
trusted library allocation
|
page read and write
|
||
2110000
|
heap
|
page read and write
|
||
670000
|
unkown
|
page readonly
|
||
FE9218C000
|
stack
|
page read and write
|
||
7FFD9B968000
|
trusted library allocation
|
page read and write
|
||
2C4FB58F000
|
heap
|
page read and write
|
||
1835DED0000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
5C4497B000
|
stack
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
166BCA4E000
|
trusted library allocation
|
page read and write
|
||
1C8AA000
|
stack
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1320000
|
heap
|
page read and write
|
||
2C4F8EF0000
|
heap
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B941000
|
trusted library allocation
|
page read and write
|
||
7DF4D0960000
|
trusted library allocation
|
page execute and read and write
|
||
166D3F12000
|
heap
|
page read and write
|
||
183765E0000
|
heap
|
page execute and read and write
|
||
2C4813CB000
|
trusted library allocation
|
page read and write
|
||
7DF452540000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
FE90D53000
|
stack
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
5C4487E000
|
stack
|
page read and write
|
||
17323D51000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1835FF0D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE6000
|
trusted library allocation
|
page read and write
|
||
686000
|
unkown
|
page readonly
|
||
166BC6A7000
|
trusted library allocation
|
page read and write
|
||
17313D20000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
2C490308000
|
trusted library allocation
|
page read and write
|
||
166BC6C5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
1835ECDD000
|
trusted library allocation
|
page read and write
|
||
1835DF40000
|
heap
|
page read and write
|
||
1837694F000
|
heap
|
page read and write
|
||
166D3C51000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B962000
|
trusted library allocation
|
page read and write
|
||
7FFD9B753000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4D0970000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
17324025000
|
trusted library allocation
|
page read and write
|
||
2C4FABC0000
|
heap
|
page execute and read and write
|
||
2C4FB1AC000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
173150F9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BD000
|
trusted library allocation
|
page execute and read and write
|
||
10F1000
|
stack
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
18376985000
|
heap
|
page read and write
|
||
1837697F000
|
heap
|
page read and write
|
||
183765E7000
|
heap
|
page execute and read and write
|
||
1835F114000
|
trusted library allocation
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
166BB730000
|
heap
|
page read and write
|
||
1835C4E0000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAEA000
|
trusted library allocation
|
page read and write
|
||
2C4F8F65000
|
heap
|
page read and write
|
||
166BC74E000
|
trusted library allocation
|
page read and write
|
||
16C5000
|
heap
|
page read and write
|
||
18376883000
|
heap
|
page read and write
|
||
1835C460000
|
heap
|
page read and write
|
||
7FFD9B8F2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
17314C9A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
1290D7E000
|
stack
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1835FEC2000
|
trusted library allocation
|
page read and write
|
||
17314D60000
|
trusted library allocation
|
page read and write
|
||
184137F000
|
stack
|
page read and write
|
||
C35000
|
heap
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
166B9D8A000
|
heap
|
page read and write
|
||
12301000
|
trusted library allocation
|
page read and write
|
||
1732C187000
|
heap
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
7FFD9B974000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE8000
|
trusted library allocation
|
page read and write
|
||
18376760000
|
trusted library allocation
|
page read and write
|
||
1C9AC000
|
stack
|
page read and write
|
||
166CBA48000
|
trusted library allocation
|
page read and write
|
||
166CB761000
|
trusted library allocation
|
page read and write
|
||
FE912FD000
|
stack
|
page read and write
|
||
1732C230000
|
heap
|
page execute and read and write
|
||
2C4FA830000
|
trusted library section
|
page read and write
|
||
1C9B0000
|
heap
|
page read and write
|
||
1C2D8000
|
stack
|
page read and write
|
||
1835C500000
|
heap
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
7FFD9B968000
|
trusted library allocation
|
page read and write
|
||
1841179000
|
stack
|
page read and write
|
||
7FFD9BAF8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA3000
|
trusted library allocation
|
page read and write
|
||
FE915BE000
|
stack
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
1732C657000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
166BB735000
|
heap
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
1835C5DD000
|
heap
|
page read and write
|
||
1835C490000
|
heap
|
page read and write
|
||
1836E3D8000
|
trusted library allocation
|
page read and write
|
||
2C4FB050000
|
heap
|
page read and write
|
||
1835ECD9000
|
trusted library allocation
|
page read and write
|
||
2C481258000
|
trusted library allocation
|
page read and write
|
||
1835C54A000
|
heap
|
page read and write
|
||
7FFD9BB7C000
|
trusted library allocation
|
page read and write
|
||
1835DF80000
|
trusted library allocation
|
page read and write
|
||
FE9240E000
|
stack
|
page read and write
|
||
166D3DE0000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
1836E3CF000
|
trusted library allocation
|
page read and write
|
||
17313BFD000
|
heap
|
page read and write
|
||
166B9C90000
|
heap
|
page readonly
|
||
17312305000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
166D3DB0000
|
trusted library allocation
|
page read and write
|
||
1A88D000
|
stack
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
1732401F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB73000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
1836E3E8000
|
trusted library allocation
|
page read and write
|
||
2C4FA8B0000
|
trusted library allocation
|
page read and write
|
||
1AFAE000
|
stack
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B972000
|
trusted library allocation
|
page read and write
|
||
2C4FAC00000
|
heap
|
page execute and read and write
|
||
FE9163E000
|
stack
|
page read and write
|
||
12919CC000
|
stack
|
page read and write
|
||
1290AF9000
|
stack
|
page read and write
|
||
1835DEE0000
|
heap
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
184204C000
|
stack
|
page read and write
|
||
1836E0E1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
1835EE5B000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
166B9CFD000
|
heap
|
page read and write
|
||
17323D61000
|
trusted library allocation
|
page read and write
|
||
166BC9EB000
|
trusted library allocation
|
page read and write
|
||
C33000
|
heap
|
page read and write
|
||
7FFD9BBCD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
17314D66000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
12909F9000
|
stack
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
166BC778000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
11F0000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
166BC6B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
166BB7C7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB3000
|
trusted library allocation
|
page read and write
|
||
5C4534F000
|
stack
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B94A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B931000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
FE92309000
|
stack
|
page read and write
|
||
183764DD000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page execute and read and write
|
||
13073000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
2C4FA935000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
2C4811E1000
|
trusted library allocation
|
page read and write
|
||
2C4FB087000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
5C44679000
|
stack
|
page read and write
|
||
5C43F83000
|
stack
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
166D3CB0000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
1840DFA000
|
stack
|
page read and write
|
||
1290E7A000
|
stack
|
page read and write
|
||
7FFD9B93A000
|
trusted library allocation
|
page read and write
|
||
1732C616000
|
heap
|
page read and write
|
||
1BDCD000
|
stack
|
page read and write
|
||
125A000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
18376470000
|
heap
|
page read and write
|
||
17312310000
|
heap
|
page read and write
|
||
1BC20000
|
heap
|
page execute and read and write
|
||
12981000
|
trusted library allocation
|
page read and write
|
||
166B9C25000
|
heap
|
page read and write
|
||
173121F8000
|
heap
|
page read and write
|
||
18376630000
|
heap
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
1835F90F000
|
trusted library allocation
|
page read and write
|
||
166BD099000
|
trusted library allocation
|
page read and write
|
||
166BC7D7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
There are 962 hidden memdumps, click here to show them.