Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
dat5E54.dll.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\0404016.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\232462603231.txt
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\24255015403505.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\3065065663.txt
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2vpni1xy.uzt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c54ubspo.fui.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cj2uls5z.y5q.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f3srqcml.4ec.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fuvxt1au.qgw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i0ahh5rr.t1x.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kfqhyc0k.tac.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_voywrvb5.few.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wcyg1rry.dur.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wr5gjj14.l4z.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xkr3xl5b.k2v.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zck2uart.i3j.psm1
|
ASCII text, with no line terminators
|
dropped
|
There are 8 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\dat5E54.dll.dll,go
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\dat5E54.dll.dll",#1
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-ExecutionPolicy RemoteSigned -Scope Process -Force -Confirm:$false;$PSDefaultParameterValues
= @{'Out-File:Encoding' = 'utf8'}; " C:\Users\user\AppData\Local\Temp\0404016.ps1" | Out-File -encoding UTF8 "C:\Users\user\AppData\Local\Temp\3065065663.txt"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-ExecutionPolicy RemoteSigned -Scope Process -Force -Confirm:$false;$PSDefaultParameterValues
= @{'Out-File:Encoding' = 'utf8'}; " C:\Users\user\AppData\Local\Temp\0404016.ps1" | Out-File -encoding UTF8 "C:\Users\user\AppData\Local\Temp\3065065663.txt"
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\dat5E54.dll.dll",go
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-ExecutionPolicy RemoteSigned -Scope Process -Force -Confirm:$false;$PSDefaultParameterValues
= @{'Out-File:Encoding' = 'utf8'}; " C:\Users\user\AppData\Local\Temp\24255015403505.ps1" | Out-File -encoding UTF8 "C:\Users\user\AppData\Local\Temp\232462603231.txt"
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\dat5E54.dll.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\dat5E54.dll.dll",#1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://nuget.org/NuGet.exe
|
unknown
|
||
http://schemas.microsoft.cop
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://go.micro
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelpX
|
unknown
|
||
https://.AppV.
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://crl.v
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 11 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
178.156.131.83
|
unknown
|
Romania
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7FFDA350D000
|
unkown
|
page readonly
|
||
1BBE5330000
|
heap
|
page read and write
|
||
1833E1B1000
|
trusted library allocation
|
page read and write
|
||
1834678C000
|
heap
|
page read and write
|
||
2360808C000
|
heap
|
page read and write
|
||
236080D4000
|
heap
|
page read and write
|
||
12B52A72000
|
trusted library allocation
|
page read and write
|
||
7FFD34A42000
|
trusted library allocation
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
15A74940000
|
heap
|
page read and write
|
||
1832C6E5000
|
heap
|
page read and write
|
||
15E4279000
|
stack
|
page read and write
|
||
23608064000
|
heap
|
page read and write
|
||
18346735000
|
heap
|
page read and write
|
||
7FFDA3502000
|
unkown
|
page read and write
|
||
236080B9000
|
heap
|
page read and write
|
||
7FFD34792000
|
trusted library allocation
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
2360806A000
|
heap
|
page read and write
|
||
23D1878B000
|
heap
|
page read and write
|
||
7DF47EE30000
|
trusted library allocation
|
page execute and read and write
|
||
2DA78FE000
|
stack
|
page read and write
|
||
236080E2000
|
heap
|
page read and write
|
||
1832C360000
|
heap
|
page read and write
|
||
7FFD34666000
|
trusted library allocation
|
page read and write
|
||
183467A0000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
15A76420000
|
trusted library allocation
|
page read and write
|
||
7FFD34918000
|
trusted library allocation
|
page read and write
|
||
15A74A74000
|
heap
|
page read and write
|
||
1832EAB3000
|
trusted library allocation
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
23D187B1000
|
heap
|
page read and write
|
||
1832E66E000
|
trusted library allocation
|
page read and write
|
||
1832E65D000
|
trusted library allocation
|
page read and write
|
||
23607F80000
|
heap
|
page read and write
|
||
7FFD34761000
|
trusted library allocation
|
page read and write
|
||
7FFD345B2000
|
trusted library allocation
|
page read and write
|
||
12B5B13B000
|
heap
|
page read and write
|
||
15A76A20000
|
heap
|
page execute and read and write
|
||
2DA7AFF000
|
stack
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
236080E7000
|
heap
|
page read and write
|
||
15A00DAE000
|
trusted library allocation
|
page read and write
|
||
2DA8B89000
|
stack
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34905000
|
trusted library allocation
|
page read and write
|
||
7FFD349FF000
|
trusted library allocation
|
page read and write
|
||
23608069000
|
heap
|
page read and write
|
||
12B43333000
|
trusted library allocation
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
1833E471000
|
trusted library allocation
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
23D18756000
|
heap
|
page read and write
|
||
2360804E000
|
heap
|
page read and write
|
||
12B40F50000
|
trusted library allocation
|
page read and write
|
||
7FFD34902000
|
trusted library allocation
|
page read and write
|
||
12B40F70000
|
trusted library allocation
|
page read and write
|
||
7FFD348F4000
|
trusted library allocation
|
page read and write
|
||
1832C3A0000
|
heap
|
page read and write
|
||
15A00750000
|
trusted library allocation
|
page read and write
|
||
236080C0000
|
heap
|
page read and write
|
||
236080D2000
|
heap
|
page read and write
|
||
12B430B5000
|
trusted library allocation
|
page read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
23608043000
|
heap
|
page read and write
|
||
12B5B0FF000
|
heap
|
page read and write
|
||
2360809C000
|
heap
|
page read and write
|
||
236080EC000
|
heap
|
page read and write
|
||
15A0007E000
|
trusted library allocation
|
page read and write
|
||
23608087000
|
heap
|
page read and write
|
||
15A76CC3000
|
heap
|
page read and write
|
||
12B4398A000
|
trusted library allocation
|
page read and write
|
||
7FFD348E3000
|
trusted library allocation
|
page read and write
|
||
E18FE3000
|
stack
|
page read and write
|
||
236080EC000
|
heap
|
page read and write
|
||
1832C448000
|
heap
|
page read and write
|
||
1833E3BC000
|
trusted library allocation
|
page read and write
|
||
7FFD34A0D000
|
trusted library allocation
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
2DA7A79000
|
stack
|
page read and write
|
||
2DA7CBE000
|
stack
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
236080E7000
|
heap
|
page read and write
|
||
236080EC000
|
heap
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
23D187AC000
|
heap
|
page read and write
|
||
E196B7000
|
stack
|
page read and write
|
||
E19A3C000
|
stack
|
page read and write
|
||
23608043000
|
heap
|
page read and write
|
||
7FFD34696000
|
trusted library allocation
|
page execute and read and write
|
||
15E3DFE000
|
stack
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34670000
|
trusted library allocation
|
page execute and read and write
|
||
12B40FC0000
|
trusted library allocation
|
page read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
1832E181000
|
trusted library allocation
|
page read and write
|
||
12B42EE6000
|
trusted library allocation
|
page read and write
|
||
7FFD3490A000
|
trusted library allocation
|
page read and write
|
||
15A010E4000
|
trusted library allocation
|
page read and write
|
||
15A76CA7000
|
heap
|
page read and write
|
||
12B5AF29000
|
heap
|
page read and write
|
||
15A76360000
|
trusted library allocation
|
page read and write
|
||
23D1878F000
|
heap
|
page read and write
|
||
15A010E9000
|
trusted library allocation
|
page read and write
|
||
15A74BA5000
|
heap
|
page read and write
|
||
7FFDA341C000
|
unkown
|
page readonly
|
||
15A10031000
|
trusted library allocation
|
page read and write
|
||
7FFDA341C000
|
unkown
|
page readonly
|
||
15A00228000
|
trusted library allocation
|
page read and write
|
||
236080EE000
|
heap
|
page read and write
|
||
23608065000
|
heap
|
page read and write
|
||
23608089000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
23608064000
|
heap
|
page read and write
|
||
236080BC000
|
heap
|
page read and write
|
||
1832C409000
|
heap
|
page read and write
|
||
23D187B1000
|
heap
|
page read and write
|
||
15A74A15000
|
heap
|
page read and write
|
||
1832F1FE000
|
trusted library allocation
|
page read and write
|
||
7FFD3475A000
|
trusted library allocation
|
page read and write
|
||
12B44629000
|
trusted library allocation
|
page read and write
|
||
7FFD34660000
|
trusted library allocation
|
page execute and read and write
|
||
15E44F7000
|
stack
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
1833E477000
|
trusted library allocation
|
page read and write
|
||
236080B0000
|
heap
|
page read and write
|
||
7FFD34660000
|
trusted library allocation
|
page read and write
|
||
23D18768000
|
heap
|
page read and write
|
||
7FFD345AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD345C0000
|
trusted library allocation
|
page read and write
|
||
1832C3E0000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
7FFD34650000
|
trusted library allocation
|
page read and write
|
||
7FFD34686000
|
trusted library allocation
|
page execute and read and write
|
||
12B429F0000
|
heap
|
page read and write
|
||
12B40F80000
|
heap
|
page readonly
|
||
23D18750000
|
heap
|
page read and write
|
||
12B40E42000
|
heap
|
page read and write
|
||
7FFD34760000
|
trusted library allocation
|
page execute and read and write
|
||
23D187AE000
|
heap
|
page read and write
|
||
12B5B0F3000
|
heap
|
page read and write
|
||
1832F7A5000
|
trusted library allocation
|
page read and write
|
||
7FFD34900000
|
trusted library allocation
|
page read and write
|
||
7FFD3491C000
|
trusted library allocation
|
page read and write
|
||
1AC5DAE0000
|
heap
|
page read and write
|
||
7FFD34A06000
|
trusted library allocation
|
page read and write
|
||
12B5AEF7000
|
heap
|
page execute and read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
1AC5F4F0000
|
heap
|
page read and write
|
||
81802FF000
|
stack
|
page read and write
|
||
236080EC000
|
heap
|
page read and write
|
||
7FFD345A3000
|
trusted library allocation
|
page execute and read and write
|
||
1832C48F000
|
heap
|
page read and write
|
||
23608037000
|
heap
|
page read and write
|
||
1BBE56C5000
|
heap
|
page read and write
|
||
7FFDA350D000
|
unkown
|
page readonly
|
||
23D1878B000
|
heap
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
12B40E10000
|
heap
|
page read and write
|
||
18346717000
|
heap
|
page read and write
|
||
7FFD34993000
|
trusted library allocation
|
page read and write
|
||
15E3DB3000
|
stack
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
7FFD3465C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page execute and read and write
|
||
15A00D6C000
|
trusted library allocation
|
page read and write
|
||
1832FCE1000
|
trusted library allocation
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
15A01B5E000
|
trusted library allocation
|
page read and write
|
||
E198BE000
|
stack
|
page read and write
|
||
12B42828000
|
heap
|
page read and write
|
||
1832C45E000
|
heap
|
page read and write
|
||
23608055000
|
heap
|
page read and write
|
||
23608105000
|
heap
|
page read and write
|
||
236080EC000
|
heap
|
page read and write
|
||
23D16CF0000
|
heap
|
page read and write
|
||
15E457C000
|
stack
|
page read and write
|
||
15A76D66000
|
heap
|
page read and write
|
||
12B43CBE000
|
trusted library allocation
|
page read and write
|
||
7FFD34742000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
15A749EE000
|
heap
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page execute and read and write
|
||
1832DFBF000
|
heap
|
page read and write
|
||
15A76C85000
|
heap
|
page read and write
|
||
23D16C10000
|
heap
|
page read and write
|
||
236080AD000
|
heap
|
page read and write
|
||
23608064000
|
heap
|
page read and write
|
||
15E47FF000
|
stack
|
page read and write
|
||
23608078000
|
heap
|
page read and write
|
||
23608100000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34900000
|
trusted library allocation
|
page read and write
|
||
23608043000
|
heap
|
page read and write
|
||
15E42FF000
|
stack
|
page read and write
|
||
2DA787F000
|
stack
|
page read and write
|
||
1832F268000
|
trusted library allocation
|
page read and write
|
||
1832EF2D000
|
trusted library allocation
|
page read and write
|
||
12B43B2F000
|
trusted library allocation
|
page read and write
|
||
1832E170000
|
heap
|
page execute and read and write
|
||
15A76CE8000
|
heap
|
page read and write
|
||
12B5B14B000
|
heap
|
page read and write
|
||
12B5ADF4000
|
heap
|
page read and write
|
||
15A00866000
|
trusted library allocation
|
page read and write
|
||
12B5B081000
|
heap
|
page read and write
|
||
23608105000
|
heap
|
page read and write
|
||
23608010000
|
heap
|
page read and write
|
||
1832C630000
|
heap
|
page execute and read and write
|
||
7FFD348AF000
|
trusted library allocation
|
page read and write
|
||
1832C492000
|
heap
|
page read and write
|
||
1832C5E0000
|
heap
|
page readonly
|
||
7FFD345BB000
|
trusted library allocation
|
page read and write
|
||
7FFD349C6000
|
trusted library allocation
|
page read and write
|
||
12B5B107000
|
heap
|
page read and write
|
||
236080EE000
|
heap
|
page read and write
|
||
1AC5F955000
|
heap
|
page read and write
|
||
12B44560000
|
trusted library allocation
|
page read and write
|
||
7DF460030000
|
trusted library allocation
|
page execute and read and write
|
||
15A10021000
|
trusted library allocation
|
page read and write
|
||
E197B9000
|
stack
|
page read and write
|
||
15A00932000
|
trusted library allocation
|
page read and write
|
||
236080AD000
|
heap
|
page read and write
|
||
15A763B0000
|
trusted library allocation
|
page read and write
|
||
1BBE3700000
|
heap
|
page read and write
|
||
E199BF000
|
stack
|
page read and write
|
||
7FFD34A06000
|
trusted library allocation
|
page read and write
|
||
236080EC000
|
heap
|
page read and write
|
||
15A749CD000
|
heap
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page execute and read and write
|
||
15E417F000
|
stack
|
page read and write
|
||
12B42A01000
|
trusted library allocation
|
page read and write
|
||
23608064000
|
heap
|
page read and write
|
||
7FFD345A3000
|
trusted library allocation
|
page execute and read and write
|
||
15E437E000
|
stack
|
page read and write
|
||
7FFD34650000
|
trusted library allocation
|
page read and write
|
||
7FFDA3502000
|
unkown
|
page read and write
|
||
1832F48E000
|
trusted library allocation
|
page read and write
|
||
1832E8B3000
|
trusted library allocation
|
page read and write
|
||
12B40E71000
|
heap
|
page read and write
|
||
F7E354F000
|
stack
|
page read and write
|
||
12B40E77000
|
heap
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
1AC5DB50000
|
heap
|
page read and write
|
||
236080EC000
|
heap
|
page read and write
|
||
15E45F8000
|
stack
|
page read and write
|
||
236080E0000
|
heap
|
page read and write
|
||
12B429F5000
|
heap
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
15E43FE000
|
stack
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
15A76395000
|
heap
|
page read and write
|
||
23608089000
|
heap
|
page read and write
|
||
12B44625000
|
trusted library allocation
|
page read and write
|
||
1BBE5698000
|
heap
|
page read and write
|
||
15E40FE000
|
stack
|
page read and write
|
||
2360807C000
|
heap
|
page read and write
|
||
23D16D10000
|
heap
|
page read and write
|
||
2DA79FE000
|
stack
|
page read and write
|
||
1833E479000
|
trusted library allocation
|
page read and write
|
||
236080E2000
|
heap
|
page read and write
|
||
15A74960000
|
heap
|
page read and write
|
||
236080AD000
|
heap
|
page read and write
|
||
23608064000
|
heap
|
page read and write
|
||
15A10001000
|
trusted library allocation
|
page read and write
|
||
15A76C57000
|
heap
|
page read and write
|
||
15A76C9E000
|
heap
|
page read and write
|
||
E194F9000
|
stack
|
page read and write
|
||
183469F0000
|
heap
|
page read and write
|
||
7FFD345A2000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
23D18751000
|
heap
|
page read and write
|
||
1832C650000
|
trusted library allocation
|
page read and write
|
||
12B43AC1000
|
trusted library allocation
|
page read and write
|
||
7FFD348F9000
|
trusted library allocation
|
page read and write
|
||
15A76A65000
|
heap
|
page read and write
|
||
1AC5F984000
|
heap
|
page read and write
|
||
15A004ED000
|
trusted library allocation
|
page read and write
|
||
2DA7DB9000
|
stack
|
page read and write
|
||
183467BF000
|
heap
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
E1947F000
|
stack
|
page read and write
|
||
15E52CE000
|
stack
|
page read and write
|
||
183467A9000
|
heap
|
page read and write
|
||
1832F10A000
|
trusted library allocation
|
page read and write
|
||
7FFD34A32000
|
trusted library allocation
|
page read and write
|
||
15A76B62000
|
heap
|
page read and write
|
||
12B42C29000
|
trusted library allocation
|
page read and write
|
||
15A004E5000
|
trusted library allocation
|
page read and write
|
||
2360804D000
|
heap
|
page read and write
|
||
1833E1F2000
|
trusted library allocation
|
page read and write
|
||
23D188C0000
|
heap
|
page read and write
|
||
15A01628000
|
trusted library allocation
|
page read and write
|
||
236080FD000
|
heap
|
page read and write
|
||
236080EC000
|
heap
|
page read and write
|
||
7FFD348F4000
|
trusted library allocation
|
page read and write
|
||
236080C3000
|
heap
|
page read and write
|
||
7FFDA3380000
|
unkown
|
page readonly
|
||
7FFD345B4000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
1833E452000
|
trusted library allocation
|
page read and write
|
||
12B41050000
|
heap
|
page read and write
|
||
7FFD34A37000
|
trusted library allocation
|
page read and write
|
||
15A764E0000
|
heap
|
page execute and read and write
|
||
15A749DC000
|
heap
|
page read and write
|
||
236080BF000
|
heap
|
page read and write
|
||
12B40E8F000
|
heap
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
1832C44A000
|
heap
|
page read and write
|
||
15A749DA000
|
heap
|
page read and write
|
||
23608083000
|
heap
|
page read and write
|
||
23D16F90000
|
heap
|
page read and write
|
||
E193F9000
|
stack
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
15A00001000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD348D3000
|
trusted library allocation
|
page read and write
|
||
15A76C8B000
|
heap
|
page read and write
|
||
12B52CF7000
|
trusted library allocation
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
7FFD346C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34740000
|
trusted library allocation
|
page read and write
|
||
1BBE3B80000
|
heap
|
page read and write
|
||
1832C400000
|
heap
|
page read and write
|
||
15A76500000
|
heap
|
page read and write
|
||
7FFD34752000
|
trusted library allocation
|
page read and write
|
||
15A00864000
|
trusted library allocation
|
page read and write
|
||
1BBE5680000
|
heap
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
1832C4F4000
|
heap
|
page read and write
|
||
7FFDA341C000
|
unkown
|
page readonly
|
||
1BBE3B85000
|
heap
|
page read and write
|
||
12B5AEF0000
|
heap
|
page execute and read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
2360805B000
|
heap
|
page read and write
|
||
15E41FE000
|
stack
|
page read and write
|
||
183467C2000
|
heap
|
page read and write
|
||
12B52CEB000
|
trusted library allocation
|
page read and write
|
||
236080EE000
|
heap
|
page read and write
|
||
7FFD348F0000
|
trusted library allocation
|
page read and write
|
||
7FFD346C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34660000
|
trusted library allocation
|
page execute and read and write
|
||
23608105000
|
heap
|
page read and write
|
||
12B43A58000
|
trusted library allocation
|
page read and write
|
||
1832C5F0000
|
trusted library allocation
|
page read and write
|
||
1AC5DAB0000
|
heap
|
page read and write
|
||
12B52A21000
|
trusted library allocation
|
page read and write
|
||
12B43D13000
|
trusted library allocation
|
page read and write
|
||
15E524E000
|
stack
|
page read and write
|
||
1AC5F99A000
|
heap
|
page read and write
|
||
7FFDA3381000
|
unkown
|
page execute read
|
||
236080EC000
|
heap
|
page read and write
|
||
236080EC000
|
heap
|
page read and write
|
||
2DA7C79000
|
stack
|
page read and write
|
||
1832C637000
|
heap
|
page execute and read and write
|
||
E1993C000
|
stack
|
page read and write
|
||
1BBE56DE000
|
heap
|
page read and write
|
||
12B52CEF000
|
trusted library allocation
|
page read and write
|
||
1AC5DEB0000
|
heap
|
page read and write
|
||
23608064000
|
heap
|
page read and write
|
||
12B5B000000
|
heap
|
page read and write
|
||
2DA8A8E000
|
stack
|
page read and write
|
||
1AC5DAC0000
|
heap
|
page read and write
|
||
7FFD3476A000
|
trusted library allocation
|
page read and write
|
||
7FFD347F0000
|
trusted library allocation
|
page read and write
|
||
12B5B112000
|
heap
|
page read and write
|
||
15A74930000
|
heap
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
7FFD348F9000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page execute and read and write
|
||
1833E46B000
|
trusted library allocation
|
page read and write
|
||
1832C489000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
2DA7E3A000
|
stack
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
12B41000000
|
heap
|
page execute and read and write
|
||
236080E9000
|
heap
|
page read and write
|
||
7FFD346C5000
|
trusted library allocation
|
page execute and read and write
|
||
1832C444000
|
heap
|
page read and write
|
||
12B5B142000
|
heap
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
236080EC000
|
heap
|
page read and write
|
||
7FFD345B3000
|
trusted library allocation
|
page execute and read and write
|
||
15A74BA0000
|
heap
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
7FFD34782000
|
trusted library allocation
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
7FFD34751000
|
trusted library allocation
|
page read and write
|
||
1832C330000
|
heap
|
page read and write
|
||
15A76D14000
|
heap
|
page read and write
|
||
7FFD34A35000
|
trusted library allocation
|
page read and write
|
||
15A0107F000
|
trusted library allocation
|
page read and write
|
||
12B40EB9000
|
heap
|
page read and write
|
||
236080E2000
|
heap
|
page read and write
|
||
F7E34C6000
|
stack
|
page read and write
|
||
15A102F1000
|
trusted library allocation
|
page read and write
|
||
1833E46F000
|
trusted library allocation
|
page read and write
|
||
1832C340000
|
heap
|
page read and write
|
||
2360801D000
|
heap
|
page read and write
|
||
12B5AE00000
|
heap
|
page read and write
|
||
7FFD3499A000
|
trusted library allocation
|
page read and write
|
||
23D18785000
|
heap
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
7DF47EE40000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page execute and read and write
|
||
23608089000
|
heap
|
page read and write
|
||
12B5AD80000
|
heap
|
page read and write
|
||
12B5AE33000
|
heap
|
page read and write
|
||
15A76F30000
|
heap
|
page read and write
|
||
7FFD345A4000
|
trusted library allocation
|
page read and write
|
||
23608059000
|
heap
|
page read and write
|
||
15A76C48000
|
heap
|
page read and write
|
||
E1963F000
|
stack
|
page read and write
|
||
23608053000
|
heap
|
page read and write
|
||
2360805E000
|
heap
|
page read and write
|
||
1834653D000
|
heap
|
page read and write
|
||
7FFDA350D000
|
unkown
|
page readonly
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
E1927E000
|
stack
|
page read and write
|
||
1832DFA5000
|
heap
|
page read and write
|
||
7FFD34904000
|
trusted library allocation
|
page read and write
|
||
12B5AD4F000
|
heap
|
page read and write
|
||
12B40E30000
|
heap
|
page read and write
|
||
7FFDA3502000
|
unkown
|
page read and write
|
||
15A010C1000
|
trusted library allocation
|
page read and write
|
||
2DA7EBF000
|
stack
|
page read and write
|
||
183467EB000
|
heap
|
page read and write
|
||
12B43AE8000
|
trusted library allocation
|
page read and write
|
||
12B437AD000
|
trusted library allocation
|
page read and write
|
||
7FFD348D3000
|
trusted library allocation
|
page read and write
|
||
183464C0000
|
heap
|
page read and write
|
||
1834681F000
|
heap
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
15A01058000
|
trusted library allocation
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
12B40F90000
|
trusted library allocation
|
page read and write
|
||
1833E181000
|
trusted library allocation
|
page read and write
|
||
15A76A63000
|
heap
|
page read and write
|
||
7FFD34656000
|
trusted library allocation
|
page read and write
|
||
15A76B02000
|
heap
|
page read and write
|
||
236080A4000
|
heap
|
page read and write
|
||
7FFD34912000
|
trusted library allocation
|
page read and write
|
||
7FFD349F7000
|
trusted library allocation
|
page read and write
|
||
1BBE37E0000
|
heap
|
page read and write
|
||
23D187B1000
|
heap
|
page read and write
|
||
1832FDA6000
|
trusted library allocation
|
page read and write
|
||
1832DFA0000
|
heap
|
page read and write
|
||
1832C6E0000
|
heap
|
page read and write
|
||
12B40DD0000
|
heap
|
page read and write
|
||
2DA75D3000
|
stack
|
page read and write
|
||
7FFD34751000
|
trusted library allocation
|
page read and write
|
||
15A76390000
|
heap
|
page read and write
|
||
15A74A1A000
|
heap
|
page read and write
|
||
15A76C6E000
|
heap
|
page read and write
|
||
E195F9000
|
stack
|
page read and write
|
||
7FFD345A0000
|
trusted library allocation
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
7FFD3490C000
|
trusted library allocation
|
page read and write
|
||
1832C5D0000
|
trusted library allocation
|
page read and write
|
||
1832C412000
|
heap
|
page read and write
|
||
7FFD34A02000
|
trusted library allocation
|
page read and write
|
||
7FFD345BB000
|
trusted library allocation
|
page read and write
|
||
23608019000
|
heap
|
page read and write
|
||
1834650D000
|
heap
|
page read and write
|
||
7FFD345AD000
|
trusted library allocation
|
page execute and read and write
|
||
12B52CF9000
|
trusted library allocation
|
page read and write
|
||
23609A80000
|
heap
|
page read and write
|
||
2360810B000
|
heap
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
23607FC0000
|
heap
|
page read and write
|
||
12B4402A000
|
trusted library allocation
|
page read and write
|
||
7FFD348A2000
|
trusted library allocation
|
page read and write
|
||
7FFD349AA000
|
trusted library allocation
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
1BBE3890000
|
heap
|
page read and write
|
||
23608043000
|
heap
|
page read and write
|
||
15A76B57000
|
heap
|
page read and write
|
||
7FFD34909000
|
trusted library allocation
|
page read and write
|
||
81800FC000
|
stack
|
page read and write
|
||
15A01361000
|
trusted library allocation
|
page read and write
|
||
7FFD345C0000
|
trusted library allocation
|
page read and write
|
||
23608056000
|
heap
|
page read and write
|
||
7FFD349BC000
|
trusted library allocation
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
236080EE000
|
heap
|
page read and write
|
||
12B5B270000
|
heap
|
page read and write
|
||
1832FAF2000
|
trusted library allocation
|
page read and write
|
||
1832C640000
|
heap
|
page read and write
|
||
1AC5F99D000
|
heap
|
page read and write
|
||
23D18786000
|
heap
|
page read and write
|
||
12B5B139000
|
heap
|
page read and write
|
||
E1937E000
|
stack
|
page read and write
|
||
7FFD3499C000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page execute and read and write
|
||
18346787000
|
heap
|
page read and write
|
||
23608064000
|
heap
|
page read and write
|
||
1832C43E000
|
heap
|
page read and write
|
||
236080A9000
|
heap
|
page read and write
|
||
7FFD34782000
|
trusted library allocation
|
page read and write
|
||
7FFD34750000
|
trusted library allocation
|
page read and write
|
||
4FE0E7F000
|
stack
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
15A76380000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page execute and read and write
|
||
15A76AB1000
|
heap
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
23608105000
|
heap
|
page read and write
|
||
2DA8B0E000
|
stack
|
page read and write
|
||
1BBE3800000
|
heap
|
page read and write
|
||
15A0112F000
|
trusted library allocation
|
page read and write
|
||
12B52A31000
|
trusted library allocation
|
page read and write
|
||
15A102EC000
|
trusted library allocation
|
page read and write
|
||
12B40E7F000
|
heap
|
page read and write
|
||
236080F4000
|
heap
|
page read and write
|
||
7FFD34860000
|
trusted library allocation
|
page read and write
|
||
E192FE000
|
stack
|
page read and write
|
||
15E4479000
|
stack
|
page read and write
|
||
2DA7BFD000
|
stack
|
page read and write
|
||
12B43A7E000
|
trusted library allocation
|
page read and write
|
||
7FFD345BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
18259B6000
|
stack
|
page read and write
|
||
2360809F000
|
heap
|
page read and write
|
||
1AC5F940000
|
heap
|
page read and write
|
||
15A76ABA000
|
heap
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
7FFD347D0000
|
trusted library allocation
|
page read and write
|
||
23608092000
|
heap
|
page read and write
|
||
12B40DB0000
|
heap
|
page read and write
|
||
1832C680000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
2DA7FBC000
|
stack
|
page read and write
|
||
2DA7D37000
|
stack
|
page read and write
|
||
12B5B04C000
|
heap
|
page read and write
|
||
7FFD345B0000
|
trusted library allocation
|
page read and write
|
||
15A76B54000
|
heap
|
page read and write
|
||
7FFD3490C000
|
trusted library allocation
|
page read and write
|
||
12B40E6F000
|
heap
|
page read and write
|
||
7FFDA3381000
|
unkown
|
page execute read
|
||
12B52A01000
|
trusted library allocation
|
page read and write
|
||
7FFD3466C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347E0000
|
trusted library allocation
|
page read and write
|
||
15A74B70000
|
heap
|
page read and write
|
||
12B42EEE000
|
trusted library allocation
|
page read and write
|
||
1832E0F0000
|
trusted library allocation
|
page read and write
|
||
23607EA0000
|
heap
|
page read and write
|
||
23D18768000
|
heap
|
page read and write
|
||
2DA797F000
|
stack
|
page read and write
|
||
15A76A30000
|
heap
|
page read and write
|
||
81801FE000
|
stack
|
page read and write
|
||
236080E2000
|
heap
|
page read and write
|
||
1832DF70000
|
heap
|
page execute and read and write
|
||
1833E1B4000
|
trusted library allocation
|
page read and write
|
||
12B5B016000
|
heap
|
page read and write
|
||
15A763E0000
|
trusted library allocation
|
page read and write
|
||
12B5B0F1000
|
heap
|
page read and write
|
||
12B40F20000
|
heap
|
page read and write
|
||
15A00F8B000
|
trusted library allocation
|
page read and write
|
||
15A749D2000
|
heap
|
page read and write
|
||
2DA803E000
|
stack
|
page read and write
|
||
15A76E30000
|
trusted library allocation
|
page read and write
|
||
1AC5DB58000
|
heap
|
page read and write
|
||
12B52CF1000
|
trusted library allocation
|
page read and write
|
||
E1983F000
|
stack
|
page read and write
|
||
15E407E000
|
stack
|
page read and write
|
||
12B430BE000
|
trusted library allocation
|
page read and write
|
||
1BBE3898000
|
heap
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
12B5AF32000
|
heap
|
page read and write
|
||
7FFD34908000
|
trusted library allocation
|
page read and write
|
||
15A76C30000
|
heap
|
page read and write
|
||
7FFDA3381000
|
unkown
|
page execute read
|
||
7FFD34890000
|
trusted library allocation
|
page read and write
|
||
1833E1A1000
|
trusted library allocation
|
page read and write
|
||
12B41075000
|
heap
|
page read and write
|
||
1832E3A8000
|
trusted library allocation
|
page read and write
|
||
1AC5F97F000
|
heap
|
page read and write
|
||
15A01C28000
|
trusted library allocation
|
page read and write
|
||
1BBE56B0000
|
heap
|
page read and write
|
||
7DF4E7090000
|
trusted library allocation
|
page execute and read and write
|
||
23D16F95000
|
heap
|
page read and write
|
||
2DA7B7B000
|
stack
|
page read and write
|
||
7FFD348D0000
|
trusted library allocation
|
page read and write
|
||
1833E365000
|
trusted library allocation
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
7DF4E70A0000
|
trusted library allocation
|
page execute and read and write
|
||
23608064000
|
heap
|
page read and write
|
||
15A74990000
|
heap
|
page read and write
|
||
1833E37D000
|
trusted library allocation
|
page read and write
|
||
12B40EBE000
|
heap
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
12B42EDE000
|
trusted library allocation
|
page read and write
|
||
23608064000
|
heap
|
page read and write
|
||
12B5B097000
|
heap
|
page read and write
|
||
15E487C000
|
stack
|
page read and write
|
||
15A004DD000
|
trusted library allocation
|
page read and write
|
||
12B41070000
|
heap
|
page read and write
|
||
15A76B50000
|
heap
|
page read and write
|
||
E1A48D000
|
stack
|
page read and write
|
||
1834650F000
|
heap
|
page read and write
|
||
183466C0000
|
heap
|
page read and write
|
||
7FFD345A4000
|
trusted library allocation
|
page read and write
|
||
7DF460040000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD345FC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3465C000
|
trusted library allocation
|
page execute and read and write
|
||
2DA80BC000
|
stack
|
page read and write
|
||
15A10013000
|
trusted library allocation
|
page read and write
|
||
7FFD34686000
|
trusted library allocation
|
page execute and read and write
|
||
12B42A87000
|
trusted library allocation
|
page read and write
|
||
15E46FE000
|
stack
|
page read and write
|
||
15A76A27000
|
heap
|
page execute and read and write
|
||
23608064000
|
heap
|
page read and write
|
||
236080EE000
|
heap
|
page read and write
|
||
12B5AD40000
|
heap
|
page read and write
|
||
7FFDA3380000
|
unkown
|
page readonly
|
||
1832FDAA000
|
trusted library allocation
|
page read and write
|
||
183465E0000
|
heap
|
page read and write
|
||
18346594000
|
heap
|
page read and write
|
||
1832F241000
|
trusted library allocation
|
page read and write
|
||
15E467F000
|
stack
|
page read and write
|
||
23D16D60000
|
heap
|
page read and write
|
||
E1957D000
|
stack
|
page read and write
|
||
4FE0BE6000
|
stack
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page read and write
|
||
12B40CD0000
|
heap
|
page read and write
|
||
1832F2AF000
|
trusted library allocation
|
page read and write
|
||
E19738000
|
stack
|
page read and write
|
||
15A76510000
|
heap
|
page read and write
|
||
7FFD3475A000
|
trusted library allocation
|
page read and write
|
||
1834656B000
|
heap
|
page read and write
|
||
7FFD345CB000
|
trusted library allocation
|
page read and write
|
||
23608066000
|
heap
|
page read and write
|
||
12B5AEC0000
|
trusted library allocation
|
page read and write
|
||
12B5ADE6000
|
heap
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
23D16D68000
|
heap
|
page read and write
|
||
15A763A0000
|
heap
|
page readonly
|
||
23607FC0000
|
heap
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
12B41010000
|
trusted library allocation
|
page read and write
|
||
2360806D000
|
heap
|
page read and write
|
||
15A769D0000
|
heap
|
page execute and read and write
|
||
236080EC000
|
heap
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
15A0130F000
|
trusted library allocation
|
page read and write
|
||
7FFDA3380000
|
unkown
|
page readonly
|
||
15E477C000
|
stack
|
page read and write
|
||
1833E31B000
|
trusted library allocation
|
page read and write
|
||
1832E207000
|
trusted library allocation
|
page read and write
|
||
7DF4E70B0000
|
trusted library allocation
|
page execute and read and write
|
||
1832C440000
|
heap
|
page read and write
|
||
12B44374000
|
trusted library allocation
|
page read and write
|
||
12B5AF2E000
|
heap
|
page read and write
|
||
18346811000
|
heap
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page read and write
|
||
236080F0000
|
heap
|
page read and write
|
||
236080C8000
|
heap
|
page read and write
|
||
15A76D4C000
|
heap
|
page read and write
|
||
15A76A75000
|
heap
|
page read and write
|
||
12B40EB7000
|
heap
|
page read and write
|
||
23608061000
|
heap
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page read and write
|
||
7FFD348E0000
|
trusted library allocation
|
page read and write
|
||
1832F1D8000
|
trusted library allocation
|
page read and write
|
||
2DA7F3E000
|
stack
|
page read and write
|
||
7FFD34656000
|
trusted library allocation
|
page read and write
|
||
183466E3000
|
heap
|
page read and write
|
||
12B5AE70000
|
heap
|
page execute and read and write
|
||
12B5B12D000
|
heap
|
page read and write
|
||
15A102FA000
|
trusted library allocation
|
page read and write
|
||
183467E7000
|
heap
|
page read and write
|
||
15A01C24000
|
trusted library allocation
|
page read and write
|
||
15A10073000
|
trusted library allocation
|
page read and write
|
||
23608028000
|
heap
|
page read and write
|
||
15A01971000
|
trusted library allocation
|
page read and write
|
||
236080CF000
|
heap
|
page read and write
|
||
7FFD34870000
|
trusted library allocation
|
page read and write
|
||
7FFD345B0000
|
trusted library allocation
|
page read and write
|
||
1832FA5A000
|
trusted library allocation
|
page read and write
|
||
7FFD346D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
7FFD34880000
|
trusted library allocation
|
page read and write
|
||
7FFD34908000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
1825C7F000
|
stack
|
page read and write
|
||
23D187B1000
|
heap
|
page read and write
|
||
15A0052E000
|
trusted library allocation
|
page read and write
|
||
236098E0000
|
heap
|
page read and write
|
||
183466CA000
|
heap
|
page read and write
|
||
E1A40E000
|
stack
|
page read and write
|
||
12B5AF20000
|
heap
|
page read and write
|
||
1832E666000
|
trusted library allocation
|
page read and write
|
||
1AC5DEB5000
|
heap
|
page read and write
|
||
7FFD34755000
|
trusted library allocation
|
page read and write
|
||
236080EC000
|
heap
|
page read and write
|
There are 700 hidden memdumps, click here to show them.