Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
mU3Ob2XcCt.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\DVWHKMNFNN.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\DVWHKMNFNN.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\HTAGVDFUIE.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\LTKMYBSEYZ.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\NWTVCDUMOB.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\YPSIACHYXW.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1mvdsc4l.gss.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aaaz4ces.mtg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c5ljgi1z.5fi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ekkgpxbg.yeb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h2jrhzku.1jo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jzu1gptt.12s.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lpdbn1rn.kra.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mclxjvfo.iue.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ptaszgq1.0h0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ve33hvrb.xqi.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wi253m0n.y1v.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yx3tmf5u.1uy.psm1
|
ASCII text, with no line terminators
|
dropped
|
There are 11 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\mU3Ob2XcCt.dll,Main
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\mU3Ob2XcCt.dll",#1
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profiles
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profiles
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip'
-CompressionLevel Optimal
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip'
-CompressionLevel Optimal
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\mU3Ob2XcCt.dll,Save
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\mU3Ob2XcCt.dll",Main
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\mU3Ob2XcCt.dll",Save
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profiles
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip'
-CompressionLevel Optimal
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\mU3Ob2XcCt.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mU3Ob2XcCt.dll",#1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 10 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.217/CoreOPT/index.php
|
185.215.113.217
|
||
http://185.215.113.217/CoreOPT/index.php?wal=1
|
185.215.113.217
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://go.microsoft.co
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://185.215.113.217/OQa
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://185.215.113.217/CoreOPT/index.php?wal=1er
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelpX
|
unknown
|
||
http://185.215.113.217/CoreOPT/index.php?wal=1/Q
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://185.215.113.217/CoreOPT/index.php$L
|
unknown
|
||
http://185.215.113.217/CoreOPT/index.php?wal=1t
|
unknown
|
||
http://185.215.113.217/CoreOPT/index.php?wal=1ocal
|
unknown
|
||
http://185.215.113.217/CoreOPT/index.php7
|
unknown
|
||
http://185.215.113.217/CoreOPT/index.php?wal=1E
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://185.215.113.217/$
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://185.215.113.217/CoreOPT/index.phpXLW
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://185.215.113.217/CoreOPT/index.php?wal=1?~
|
unknown
|
There are 18 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.217
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
B6D7D24000
|
stack
|
page read and write
|
||
CA697D000
|
stack
|
page read and write
|
||
1EB5A8D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B27C000
|
trusted library allocation
|
page execute and read and write
|
||
287B873000
|
stack
|
page read and write
|
||
275E99A1000
|
trusted library allocation
|
page read and write
|
||
26775560000
|
heap
|
page read and write
|
||
7649477000
|
stack
|
page read and write
|
||
2075CE95000
|
heap
|
page read and write
|
||
7FFD9B430000
|
trusted library allocation
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page read and write
|
||
275F2150000
|
heap
|
page read and write
|
||
2075CCB0000
|
heap
|
page read and write
|
||
275F1B39000
|
heap
|
page read and write
|
||
275DAFAE000
|
trusted library allocation
|
page read and write
|
||
275F1EB0000
|
heap
|
page read and write
|
||
275F1DFB000
|
heap
|
page read and write
|
||
7FFD9B2D6000
|
trusted library allocation
|
page execute and read and write
|
||
CA654E000
|
stack
|
page read and write
|
||
7FFD9B402000
|
trusted library allocation
|
page read and write
|
||
275DAAB3000
|
trusted library allocation
|
page read and write
|
||
F39153E000
|
stack
|
page read and write
|
||
251F77F7000
|
heap
|
page read and write
|
||
205337E0000
|
heap
|
page read and write
|
||
275F1DD4000
|
heap
|
page read and write
|
||
19A2CA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B66D000
|
trusted library allocation
|
page read and write
|
||
F3913BE000
|
stack
|
page read and write
|
||
20745B56000
|
trusted library allocation
|
page read and write
|
||
7FFD9B230000
|
trusted library allocation
|
page read and write
|
||
2CAEA230000
|
heap
|
page execute and read and write
|
||
275D9970000
|
heap
|
page read and write
|
||
7FFD9B540000
|
trusted library allocation
|
page read and write
|
||
1D3EAD2F000
|
heap
|
page read and write
|
||
20746659000
|
trusted library allocation
|
page read and write
|
||
B6D81FF000
|
stack
|
page read and write
|
||
1EB5A700000
|
heap
|
page read and write
|
||
275D7B88000
|
heap
|
page read and write
|
||
7FFD9B400000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B450000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2AC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B480000
|
trusted library allocation
|
page read and write
|
||
26093170000
|
heap
|
page read and write
|
||
275F1ADE000
|
heap
|
page read and write
|
||
20754B21000
|
trusted library allocation
|
page read and write
|
||
7FFD9B390000
|
trusted library allocation
|
page read and write
|
||
275F1DBE000
|
heap
|
page read and write
|
||
7FFD9B544000
|
trusted library allocation
|
page read and write
|
||
2075CB44000
|
heap
|
page read and write
|
||
7FFD9B4C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B610000
|
trusted library allocation
|
page read and write
|
||
7FFD9B1F2000
|
trusted library allocation
|
page read and write
|
||
2CA814F7000
|
trusted library allocation
|
page read and write
|
||
7DF40E720000
|
trusted library allocation
|
page execute and read and write
|
||
20742CF0000
|
heap
|
page read and write
|
||
1EB5A990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B588000
|
trusted library allocation
|
page read and write
|
||
2075CCC2000
|
heap
|
page read and write
|
||
93052FF000
|
stack
|
page read and write
|
||
2CAE9A90000
|
trusted library allocation
|
page read and write
|
||
F3917BB000
|
stack
|
page read and write
|
||
2CA81056000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4B0000
|
trusted library allocation
|
page read and write
|
||
275D99FF000
|
trusted library allocation
|
page read and write
|
||
F3912FE000
|
stack
|
page read and write
|
||
7FFD9B3C2000
|
trusted library allocation
|
page read and write
|
||
2CA807FD000
|
trusted library allocation
|
page read and write
|
||
251F7925000
|
heap
|
page read and write
|
||
275F1C70000
|
heap
|
page execute and read and write
|
||
7FFD9B3DA000
|
trusted library allocation
|
page read and write
|
||
2CAE80CA000
|
heap
|
page read and write
|
||
A46E0FE000
|
stack
|
page read and write
|
||
275F1A90000
|
heap
|
page read and write
|
||
1EB5C5A0000
|
trusted library allocation
|
page read and write
|
||
1EB5A9C5000
|
heap
|
page read and write
|
||
7FFD9B1FD000
|
trusted library allocation
|
page execute and read and write
|
||
9304DFE000
|
stack
|
page read and write
|
||
1EB5A82C000
|
heap
|
page read and write
|
||
2CAEA040000
|
heap
|
page execute and read and write
|
||
2CA8149C000
|
trusted library allocation
|
page read and write
|
||
F3910FE000
|
stack
|
page read and write
|
||
FDC07AE000
|
stack
|
page read and write
|
||
275E99B1000
|
trusted library allocation
|
page read and write
|
||
207429B0000
|
heap
|
page read and write
|
||
7FFD9B58C000
|
trusted library allocation
|
page read and write
|
||
275D7B5D000
|
heap
|
page read and write
|
||
CAD477F000
|
stack
|
page read and write
|
||
2BCD8550000
|
heap
|
page read and write
|
||
251F9264000
|
heap
|
page read and write
|
||
7FFD9B340000
|
trusted library allocation
|
page execute and read and write
|
||
B6D7D1D000
|
stack
|
page read and write
|
||
F390DFE000
|
unkown
|
page read and write
|
||
76497FB000
|
stack
|
page read and write
|
||
2CAEA104000
|
heap
|
page read and write
|
||
7FFD9B580000
|
trusted library allocation
|
page read and write
|
||
26092D10000
|
heap
|
page read and write
|
||
2CA814E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B553000
|
trusted library allocation
|
page read and write
|
||
275F1EC2000
|
heap
|
page read and write
|
||
2CA81C22000
|
trusted library allocation
|
page read and write
|
||
7FFD9B400000
|
trusted library allocation
|
page read and write
|
||
251F93D0000
|
heap
|
page read and write
|
||
930497E000
|
stack
|
page read and write
|
||
7FFD9B574000
|
trusted library allocation
|
page read and write
|
||
20742AEF000
|
heap
|
page read and write
|
||
275DAC94000
|
trusted library allocation
|
page read and write
|
||
26775528000
|
heap
|
page read and write
|
||
A46E47D000
|
stack
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page read and write
|
||
20754CE7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B540000
|
trusted library allocation
|
page read and write
|
||
1C667138000
|
heap
|
page read and write
|
||
205337C0000
|
heap
|
page read and write
|
||
1EB5A7A8000
|
heap
|
page read and write
|
||
7FFD9B5E0000
|
trusted library allocation
|
page read and write
|
||
2CAE9E50000
|
trusted library allocation
|
page read and write
|
||
1D3EACE0000
|
heap
|
page read and write
|
||
2BCD85D0000
|
heap
|
page read and write
|
||
1D3EACE8000
|
heap
|
page read and write
|
||
F3915BE000
|
stack
|
page read and write
|
||
2BCD838D000
|
heap
|
page read and write
|
||
275F1E3C000
|
heap
|
page read and write
|
||
81F617F000
|
stack
|
page read and write
|
||
2CAEA260000
|
heap
|
page read and write
|
||
19A2B07A000
|
heap
|
page read and write
|
||
7FFD9B22B000
|
trusted library allocation
|
page read and write
|
||
9304974000
|
stack
|
page read and write
|
||
7FFD9B550000
|
trusted library allocation
|
page read and write
|
||
275DA903000
|
trusted library allocation
|
page read and write
|
||
275DA739000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5C0000
|
trusted library allocation
|
page read and write
|
||
A46DB33000
|
stack
|
page read and write
|
||
7FFD9B450000
|
trusted library allocation
|
page read and write
|
||
275DA9FE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B650000
|
trusted library allocation
|
page execute and read and write
|
||
1D3EC790000
|
heap
|
page read and write
|
||
7FFD9B22D000
|
trusted library allocation
|
page execute and read and write
|
||
1C668F30000
|
trusted library allocation
|
page read and write
|
||
7DF492C30000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B60A000
|
trusted library allocation
|
page read and write
|
||
2CAEA38F000
|
heap
|
page read and write
|
||
1D3EC960000
|
heap
|
page read and write
|
||
2CAEA560000
|
trusted library allocation
|
page read and write
|
||
CA65CF000
|
stack
|
page read and write
|
||
26093175000
|
heap
|
page read and write
|
||
7FFD9B24C000
|
trusted library allocation
|
page execute and read and write
|
||
1D3EACF7000
|
heap
|
page read and write
|
||
2CA81C1E000
|
trusted library allocation
|
page read and write
|
||
1D3EACF4000
|
heap
|
page read and write
|
||
20744B01000
|
trusted library allocation
|
page read and write
|
||
2CA8181E000
|
trusted library allocation
|
page read and write
|
||
1C668A40000
|
trusted library allocation
|
page read and write
|
||
251F77F7000
|
heap
|
page read and write
|
||
251F926F000
|
heap
|
page read and write
|
||
1C666FE0000
|
heap
|
page read and write
|
||
7FFD9B5A0000
|
trusted library allocation
|
page read and write
|
||
2BCD9F10000
|
heap
|
page read and write
|
||
2CAE9FB0000
|
trusted library allocation
|
page read and write
|
||
287BDBE000
|
stack
|
page read and write
|
||
2CAEA44E000
|
heap
|
page read and write
|
||
7FFD9B210000
|
trusted library allocation
|
page read and write
|
||
26093150000
|
heap
|
page read and write
|
||
20754DFC000
|
trusted library allocation
|
page read and write
|
||
275E9C7C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2C0000
|
trusted library allocation
|
page read and write
|
||
2CAE9EA3000
|
heap
|
page read and write
|
||
7FFD9B4D0000
|
trusted library allocation
|
page read and write
|
||
20742C30000
|
trusted library allocation
|
page read and write
|
||
19A2CAB0000
|
heap
|
page read and write
|
||
2677556C000
|
heap
|
page read and write
|
||
7FFD9B41C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3B2000
|
trusted library allocation
|
page read and write
|
||
275F1DB0000
|
heap
|
page read and write
|
||
7FFD9B1F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5A9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B61C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5B0000
|
trusted library allocation
|
page read and write
|
||
CA687F000
|
stack
|
page read and write
|
||
2075CC87000
|
heap
|
page execute and read and write
|
||
275E9C74000
|
trusted library allocation
|
page read and write
|
||
20746722000
|
trusted library allocation
|
page read and write
|
||
2CA814B6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B660000
|
trusted library allocation
|
page read and write
|
||
19A2CA20000
|
trusted library allocation
|
page read and write
|
||
20754D3F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B579000
|
trusted library allocation
|
page read and write
|
||
2CAEA4AE000
|
heap
|
page read and write
|
||
20744920000
|
heap
|
page read and write
|
||
7FFD9B5D0000
|
trusted library allocation
|
page read and write
|
||
2CAE80DE000
|
heap
|
page read and write
|
||
19A2AFE8000
|
heap
|
page read and write
|
||
7FFD9B530000
|
trusted library allocation
|
page read and write
|
||
2CAE9AC0000
|
heap
|
page read and write
|
||
7FFD9B523000
|
trusted library allocation
|
page read and write
|
||
2CAE810B000
|
heap
|
page read and write
|
||
26775690000
|
heap
|
page read and write
|
||
1D3EAC90000
|
heap
|
page read and write
|
||
19A2B0A1000
|
heap
|
page read and write
|
||
CAD46FF000
|
stack
|
page read and write
|
||
275F1EA6000
|
heap
|
page read and write
|
||
7FFD9B570000
|
trusted library allocation
|
page read and write
|
||
251F7823000
|
heap
|
page read and write
|
||
D0742FC000
|
stack
|
page read and write
|
||
7FFD9B3B0000
|
trusted library allocation
|
page execute and read and write
|
||
2CA90074000
|
trusted library allocation
|
page read and write
|
||
287C03C000
|
stack
|
page read and write
|
||
2CAEA14A000
|
heap
|
page read and write
|
||
287BE3B000
|
stack
|
page read and write
|
||
2CAE809F000
|
heap
|
page read and write
|
||
251F782D000
|
heap
|
page read and write
|
||
7FFD9B3CA000
|
trusted library allocation
|
page read and write
|
||
19A2B0BA000
|
heap
|
page read and write
|
||
2CA902ED000
|
trusted library allocation
|
page read and write
|
||
2CA818D5000
|
trusted library allocation
|
page read and write
|
||
251F77D8000
|
heap
|
page read and write
|
||
20744939000
|
heap
|
page read and write
|
||
7FFD9B430000
|
trusted library allocation
|
page read and write
|
||
1EB5A853000
|
heap
|
page read and write
|
||
19A2AFB0000
|
heap
|
page read and write
|
||
7FFD9B560000
|
trusted library allocation
|
page read and write
|
||
1D3EAD2A000
|
heap
|
page read and write
|
||
287B8FE000
|
unkown
|
page read and write
|
||
7FFD9B630000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5C9000
|
trusted library allocation
|
page read and write
|
||
19A2CE20000
|
trusted library allocation
|
page read and write
|
||
275D7B49000
|
heap
|
page read and write
|
||
7FFD9B213000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B23B000
|
trusted library allocation
|
page read and write
|
||
20745255000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page execute and read and write
|
||
1C668A70000
|
heap
|
page read and write
|
||
7FFD9B470000
|
trusted library allocation
|
page read and write
|
||
275D9470000
|
heap
|
page read and write
|
||
7FFD9B543000
|
trusted library allocation
|
page read and write
|
||
2BCD8398000
|
heap
|
page read and write
|
||
1D3EAF85000
|
heap
|
page read and write
|
||
275F1B5B000
|
heap
|
page read and write
|
||
81F627D000
|
stack
|
page read and write
|
||
2075CB46000
|
heap
|
page read and write
|
||
1EB5A9C0000
|
heap
|
page read and write
|
||
287C13B000
|
stack
|
page read and write
|
||
287B97F000
|
stack
|
page read and write
|
||
1EB5A930000
|
heap
|
page read and write
|
||
275D7B45000
|
heap
|
page read and write
|
||
2CAEA4C0000
|
heap
|
page read and write
|
||
275D7AA5000
|
heap
|
page read and write
|
||
7FFD9B564000
|
trusted library allocation
|
page read and write
|
||
2CA902F2000
|
trusted library allocation
|
page read and write
|
||
2075CE69000
|
heap
|
page read and write
|
||
275D94E0000
|
trusted library allocation
|
page read and write
|
||
2CA81B58000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5B0000
|
trusted library allocation
|
page read and write
|
||
287C0BE000
|
stack
|
page read and write
|
||
20533A10000
|
heap
|
page read and write
|
||
20744B87000
|
trusted library allocation
|
page read and write
|
||
DED04FF000
|
stack
|
page read and write
|
||
7FFD9B4D0000
|
trusted library allocation
|
page read and write
|
||
275DB4D9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B630000
|
trusted library allocation
|
page read and write
|
||
81F62FE000
|
stack
|
page read and write
|
||
7FFD9B5A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B610000
|
trusted library allocation
|
page read and write
|
||
275E99F4000
|
trusted library allocation
|
page read and write
|
||
1C667130000
|
heap
|
page read and write
|
||
20742C50000
|
trusted library allocation
|
page read and write
|
||
275DAA22000
|
trusted library allocation
|
page read and write
|
||
26775525000
|
heap
|
page read and write
|
||
275D94A0000
|
trusted library allocation
|
page read and write
|
||
251F76E0000
|
heap
|
page read and write
|
||
2CAEA423000
|
heap
|
page read and write
|
||
1C6670E0000
|
heap
|
page read and write
|
||
267754E0000
|
heap
|
page read and write
|
||
7FFD9B410000
|
trusted library allocation
|
page execute and read and write
|
||
A46E4FF000
|
stack
|
page read and write
|
||
1EB5A8D0000
|
trusted library allocation
|
page read and write
|
||
287BD3E000
|
stack
|
page read and write
|
||
2CA816B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B57C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B480000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4C0000
|
trusted library allocation
|
page read and write
|
||
F391538000
|
stack
|
page read and write
|
||
207463D6000
|
trusted library allocation
|
page read and write
|
||
2CA8150D000
|
trusted library allocation
|
page read and write
|
||
2075CCCD000
|
heap
|
page read and write
|
||
20742CF5000
|
heap
|
page read and write
|
||
287BEB8000
|
stack
|
page read and write
|
||
2CAE9AB0000
|
trusted library allocation
|
page read and write
|
||
81F637B000
|
stack
|
page read and write
|
||
2074638C000
|
trusted library allocation
|
page read and write
|
||
275D7AB0000
|
heap
|
page read and write
|
||
2CAEA4E1000
|
heap
|
page read and write
|
||
2CAE8250000
|
heap
|
page read and write
|
||
D0743FF000
|
stack
|
page read and write
|
||
F3916BE000
|
stack
|
page read and write
|
||
2CAE8070000
|
heap
|
page read and write
|
||
DED01BC000
|
stack
|
page read and write
|
||
2CAEA4CF000
|
heap
|
page read and write
|
||
275F1B4B000
|
heap
|
page read and write
|
||
275F1C77000
|
heap
|
page execute and read and write
|
||
7FFD9B4B0000
|
trusted library allocation
|
page read and write
|
||
275F1ECB000
|
heap
|
page read and write
|
||
FDC0AFE000
|
unkown
|
page read and write
|
||
1EB5A8D0000
|
trusted library allocation
|
page read and write
|
||
20744AF0000
|
heap
|
page execute and read and write
|
||
2CAEA050000
|
heap
|
page read and write
|
||
1C6671AF000
|
heap
|
page read and write
|
||
1D3EAD05000
|
heap
|
page read and write
|
||
7FFD9B4D0000
|
trusted library allocation
|
page read and write
|
||
20742BB0000
|
heap
|
page read and write
|
||
19A2AFE0000
|
heap
|
page read and write
|
||
7FFD9B620000
|
trusted library allocation
|
page execute and read and write
|
||
287CB0E000
|
stack
|
page read and write
|
||
275F1E5F000
|
heap
|
page read and write
|
||
20754CFF000
|
trusted library allocation
|
page read and write
|
||
2075CD90000
|
heap
|
page read and write
|
||
1EB5A770000
|
heap
|
page read and write
|
||
7FFD9B430000
|
trusted library allocation
|
page read and write
|
||
7FFD9B490000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page read and write
|
||
F39220C000
|
stack
|
page read and write
|
||
251F9260000
|
heap
|
page read and write
|
||
7FFD9B2CC000
|
trusted library allocation
|
page execute and read and write
|
||
1C668EB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3F0000
|
trusted library allocation
|
page execute and read and write
|
||
2075CB06000
|
heap
|
page read and write
|
||
2CA80087000
|
trusted library allocation
|
page read and write
|
||
287B9FE000
|
stack
|
page read and write
|
||
19A2CFA0000
|
heap
|
page read and write
|
||
7FFD9B558000
|
trusted library allocation
|
page read and write
|
||
7FFD9B676000
|
trusted library allocation
|
page read and write
|
||
1C668F30000
|
trusted library allocation
|
page read and write
|
||
7DF492C40000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B2D6000
|
trusted library allocation
|
page read and write
|
||
275F1ADC000
|
heap
|
page read and write
|
||
20744A70000
|
heap
|
page read and write
|
||
26775510000
|
heap
|
page read and write
|
||
7FFD9B670000
|
trusted library allocation
|
page read and write
|
||
2CAE9E90000
|
heap
|
page read and write
|
||
7FFD9B230000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3D1000
|
trusted library allocation
|
page read and write
|
||
F39163E000
|
stack
|
page read and write
|
||
7FFD9B510000
|
trusted library allocation
|
page read and write
|
||
287BF3E000
|
stack
|
page read and write
|
||
2075CE9C000
|
heap
|
page read and write
|
||
275D7B84000
|
heap
|
page read and write
|
||
7FFD9B210000
|
trusted library allocation
|
page read and write
|
||
1D3EAF80000
|
heap
|
page read and write
|
||
2CAE80C2000
|
heap
|
page read and write
|
||
FDC0BFD000
|
stack
|
page read and write
|
||
7FFD9B310000
|
trusted library allocation
|
page execute and read and write
|
||
287CB8E000
|
stack
|
page read and write
|
||
2075CB00000
|
heap
|
page read and write
|
||
20754B4C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B410000
|
trusted library allocation
|
page read and write
|
||
20742B39000
|
heap
|
page read and write
|
||
20742A90000
|
heap
|
page read and write
|
||
2CA8188E000
|
trusted library allocation
|
page read and write
|
||
251F77F7000
|
heap
|
page read and write
|
||
76495FE000
|
stack
|
page read and write
|
||
7FFD9B550000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B330000
|
trusted library allocation
|
page execute and read and write
|
||
19A2B175000
|
heap
|
page read and write
|
||
7FFD9B212000
|
trusted library allocation
|
page read and write
|
||
275DB5A2000
|
trusted library allocation
|
page read and write
|
||
2CAE8080000
|
heap
|
page read and write
|
||
7FFD9B580000
|
trusted library allocation
|
page read and write
|
||
251F93C0000
|
heap
|
page read and write
|
||
7FFD9B5E3000
|
trusted library allocation
|
page read and write
|
||
20754DD4000
|
trusted library allocation
|
page read and write
|
||
275F1C60000
|
trusted library allocation
|
page read and write
|
||
275D9981000
|
trusted library allocation
|
page read and write
|
||
20742BF0000
|
heap
|
page read and write
|
||
2CA90001000
|
trusted library allocation
|
page read and write
|
||
B6D7D2E000
|
stack
|
page read and write
|
||
7FFD9B5C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B578000
|
trusted library allocation
|
page read and write
|
||
275F1EE9000
|
heap
|
page read and write
|
||
7FFD9B500000
|
trusted library allocation
|
page read and write
|
||
2074631C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B590000
|
trusted library allocation
|
page read and write
|
||
2075CEE2000
|
heap
|
page read and write
|
||
2CA80229000
|
trusted library allocation
|
page read and write
|
||
7FFD9B21D000
|
trusted library allocation
|
page execute and read and write
|
||
275D94C0000
|
trusted library allocation
|
page read and write
|
||
287BB7E000
|
stack
|
page read and write
|
||
2CA902F4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2DC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B460000
|
trusted library allocation
|
page read and write
|
||
7FFD9B600000
|
trusted library allocation
|
page read and write
|
||
20742AFA000
|
heap
|
page read and write
|
||
19A2CA20000
|
trusted library allocation
|
page read and write
|
||
20742AB0000
|
heap
|
page read and write
|
||
7FFD9B2A6000
|
trusted library allocation
|
page read and write
|
||
2074671E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B440000
|
trusted library allocation
|
page read and write
|
||
275DB206000
|
trusted library allocation
|
page read and write
|
||
7FFD9B21D000
|
trusted library allocation
|
page execute and read and write
|
||
275D9F56000
|
trusted library allocation
|
page read and write
|
||
275DACE5000
|
trusted library allocation
|
page read and write
|
||
20742C60000
|
heap
|
page readonly
|
||
7FFD9B410000
|
trusted library allocation
|
page read and write
|
||
2CAEA356000
|
heap
|
page read and write
|
||
26777070000
|
heap
|
page read and write
|
||
A46E37E000
|
stack
|
page read and write
|
||
1EB5A8D0000
|
trusted library allocation
|
page read and write
|
||
20754DF2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B640000
|
trusted library allocation
|
page execute and read and write
|
||
A46DBBF000
|
unkown
|
page read and write
|
||
7FFD9B4A0000
|
trusted library allocation
|
page read and write
|
||
1C668F30000
|
trusted library allocation
|
page read and write
|
||
287BA7E000
|
stack
|
page read and write
|
||
A46E1F7000
|
stack
|
page read and write
|
||
2CA81541000
|
trusted library allocation
|
page read and write
|
||
CA68FB000
|
stack
|
page read and write
|
||
7FFD9B1F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B569000
|
trusted library allocation
|
page read and write
|
||
20744A40000
|
heap
|
page execute and read and write
|
||
7FFD9B4F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B450000
|
trusted library allocation
|
page read and write
|
||
1C6671EB000
|
heap
|
page read and write
|
||
275F1E93000
|
heap
|
page read and write
|
||
A46E178000
|
stack
|
page read and write
|
||
26775536000
|
heap
|
page read and write
|
||
F39127E000
|
stack
|
page read and write
|
||
D0744FF000
|
stack
|
page read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page read and write
|
||
A46DFFE000
|
stack
|
page read and write
|
||
A46DBFE000
|
stack
|
page read and write
|
||
1EB5A720000
|
heap
|
page read and write
|
||
275E9C6D000
|
trusted library allocation
|
page read and write
|
||
76496FD000
|
stack
|
page read and write
|
||
1C668A40000
|
trusted library allocation
|
page read and write
|
||
A46E3FF000
|
stack
|
page read and write
|
||
7DF498E90000
|
trusted library allocation
|
page execute and read and write
|
||
1EB5A990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B680000
|
trusted library allocation
|
page read and write
|
||
275F1CA0000
|
heap
|
page read and write
|
||
2CAE9E10000
|
heap
|
page readonly
|
||
7FFD9B570000
|
trusted library allocation
|
page read and write
|
||
20744AA0000
|
trusted library allocation
|
page read and write
|
||
2075CEB5000
|
heap
|
page read and write
|
||
7FFD9B2D0000
|
trusted library allocation
|
page read and write
|
||
2CAEA47E000
|
heap
|
page read and write
|
||
2CAEA4AC000
|
heap
|
page read and write
|
||
7FFD9B520000
|
trusted library allocation
|
page read and write
|
||
2CAE8075000
|
heap
|
page read and write
|
||
2BCD8340000
|
heap
|
page read and write
|
||
93051FE000
|
stack
|
page read and write
|
||
7FFD9B620000
|
trusted library allocation
|
page read and write
|
||
7FFD9B460000
|
trusted library allocation
|
page read and write
|
||
19A2CE20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B520000
|
trusted library allocation
|
page read and write
|
||
275D9555000
|
heap
|
page read and write
|
||
287BDB7000
|
stack
|
page read and write
|
||
275D9550000
|
heap
|
page read and write
|
||
205337B0000
|
heap
|
page read and write
|
||
19A2CA20000
|
trusted library allocation
|
page read and write
|
||
26777230000
|
heap
|
page read and write
|
||
275D7AA0000
|
heap
|
page read and write
|
||
7FFD9B223000
|
trusted library allocation
|
page execute and read and write
|
||
B6D85FF000
|
stack
|
page read and write
|
||
2CAEA142000
|
heap
|
page read and write
|
||
275F1984000
|
heap
|
page read and write
|
||
F39107E000
|
stack
|
page read and write
|
||
7FFD9B666000
|
trusted library allocation
|
page read and write
|
||
9304CFE000
|
unkown
|
page read and write
|
||
275DA9D8000
|
trusted library allocation
|
page read and write
|
||
275D7B00000
|
heap
|
page read and write
|
||
B6D84FE000
|
stack
|
page read and write
|
||
7FFD9B640000
|
trusted library allocation
|
page read and write
|
||
A46DF7A000
|
stack
|
page read and write
|
||
251F782D000
|
heap
|
page read and write
|
||
2CAEA49C000
|
heap
|
page read and write
|
||
7DF40E730000
|
trusted library allocation
|
page execute and read and write
|
||
1EB5A8D0000
|
trusted library allocation
|
page read and write
|
||
7DF498E80000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B5A0000
|
trusted library allocation
|
page read and write
|
||
20742B10000
|
heap
|
page read and write
|
||
2CA902FC000
|
trusted library allocation
|
page read and write
|
||
CA64C8000
|
stack
|
page read and write
|
||
20742AFE000
|
heap
|
page read and write
|
||
26777080000
|
heap
|
page read and write
|
||
930496D000
|
stack
|
page read and write
|
||
20745F05000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3A1000
|
trusted library allocation
|
page read and write
|
||
2CA814A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B680000
|
trusted library allocation
|
page read and write
|
||
DED047F000
|
stack
|
page read and write
|
||
2CAEA200000
|
heap
|
page execute and read and write
|
||
2CAEA240000
|
heap
|
page read and write
|
||
20533800000
|
heap
|
page read and write
|
||
7FFD9B4C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B420000
|
trusted library allocation
|
page read and write
|
||
7FFD9B549000
|
trusted library allocation
|
page read and write
|
||
2075CC20000
|
heap
|
page read and write
|
||
251F9268000
|
heap
|
page read and write
|
||
2CA814CA000
|
trusted library allocation
|
page read and write
|
||
7FFD9B520000
|
trusted library allocation
|
page read and write
|
||
19A2CA20000
|
trusted library allocation
|
page read and write
|
||
20754B74000
|
trusted library allocation
|
page read and write
|
||
2CAEA0BD000
|
heap
|
page read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page read and write
|
||
F39218E000
|
stack
|
page read and write
|
||
2CAE8060000
|
heap
|
page read and write
|
||
275F1E4C000
|
heap
|
page read and write
|
||
7FFD9B222000
|
trusted library allocation
|
page read and write
|
||
7DF492C50000
|
trusted library allocation
|
page execute and read and write
|
||
FDC10FE000
|
stack
|
page read and write
|
||
F391439000
|
stack
|
page read and write
|
||
7FFD9B590000
|
trusted library allocation
|
page read and write
|
||
275F1C10000
|
heap
|
page execute and read and write
|
||
275D7A70000
|
heap
|
page read and write
|
||
7FFD9B660000
|
trusted library allocation
|
page read and write
|
||
7FFD9B62C000
|
trusted library allocation
|
page read and write
|
||
275F1E07000
|
heap
|
page read and write
|
||
2CAEA404000
|
heap
|
page read and write
|
||
2075CB39000
|
heap
|
page read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page read and write
|
||
2CAE80CC000
|
heap
|
page read and write
|
||
251F7820000
|
heap
|
page read and write
|
||
7FFD9B55C000
|
trusted library allocation
|
page read and write
|
||
2075CD94000
|
heap
|
page read and write
|
||
275DA909000
|
trusted library allocation
|
page read and write
|
||
20754B01000
|
trusted library allocation
|
page read and write
|
||
7FFD9B480000
|
trusted library allocation
|
page read and write
|
||
2CAEA670000
|
heap
|
page read and write
|
||
7FFD9B570000
|
trusted library allocation
|
page read and write
|
||
1EB5A620000
|
heap
|
page read and write
|
||
2075CB7A000
|
heap
|
page read and write
|
||
2CAE8106000
|
heap
|
page read and write
|
||
CA6A7E000
|
stack
|
page read and write
|
||
A46E07F000
|
stack
|
page read and write
|
||
275F1AA6000
|
heap
|
page read and write
|
||
2CAE80CE000
|
heap
|
page read and write
|
||
2CA81488000
|
trusted library allocation
|
page read and write
|
||
251F9263000
|
heap
|
page read and write
|
||
F3911FE000
|
stack
|
page read and write
|
||
7FFD9B420000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5F0000
|
trusted library allocation
|
page read and write
|
||
19A2B170000
|
heap
|
page read and write
|
||
2CAE80C8000
|
heap
|
page read and write
|
||
7FFD9B2C6000
|
trusted library allocation
|
page read and write
|
||
2075CB6D000
|
heap
|
page read and write
|
||
1C6671CA000
|
heap
|
page read and write
|
||
FDC079D000
|
stack
|
page read and write
|
||
7FFD9B3B0000
|
trusted library allocation
|
page read and write
|
||
2BCD8380000
|
heap
|
page read and write
|
||
2BCD8350000
|
heap
|
page read and write
|
||
1C667125000
|
heap
|
page read and write
|
||
7FFD9B3E0000
|
trusted library allocation
|
page execute and read and write
|
||
20746368000
|
trusted library allocation
|
page read and write
|
||
275D9BA8000
|
trusted library allocation
|
page read and write
|
||
26775400000
|
heap
|
page read and write
|
||
287CC0E000
|
stack
|
page read and write
|
||
2677555C000
|
heap
|
page read and write
|
||
2CA8186A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B470000
|
trusted library allocation
|
page read and write
|
||
7FFD9B460000
|
trusted library allocation
|
page read and write
|
||
287BFBE000
|
stack
|
page read and write
|
||
19A2AED0000
|
heap
|
page read and write
|
||
251F926A000
|
heap
|
page read and write
|
||
275D98D0000
|
trusted library allocation
|
page read and write
|
||
251F7920000
|
heap
|
page read and write
|
||
1D3EAB90000
|
heap
|
page read and write
|
||
A46E27D000
|
stack
|
page read and write
|
||
7FFD9B3C0000
|
trusted library allocation
|
page read and write
|
||
2CAEA097000
|
heap
|
page read and write
|
||
275F1D80000
|
heap
|
page read and write
|
||
20533808000
|
heap
|
page read and write
|
||
7FFD9B67D000
|
trusted library allocation
|
page read and write
|
||
19A2CE20000
|
trusted library allocation
|
page read and write
|
||
2074492B000
|
heap
|
page read and write
|
||
1EB5A778000
|
heap
|
page read and write
|
||
2CAEA3E2000
|
heap
|
page read and write
|
||
CA69FE000
|
stack
|
page read and write
|
||
275F1B85000
|
heap
|
page read and write
|
||
26092DB8000
|
heap
|
page read and write
|
||
7FFD9B220000
|
trusted library allocation
|
page read and write
|
||
20745C3F000
|
trusted library allocation
|
page read and write
|
||
1D3EC780000
|
heap
|
page read and write
|
||
A46DEFE000
|
stack
|
page read and write
|
||
26092D40000
|
heap
|
page read and write
|
||
2CA814E3000
|
trusted library allocation
|
page read and write
|
||
F390D73000
|
stack
|
page read and write
|
||
7FFD9B590000
|
trusted library allocation
|
page read and write
|
||
7FFD9B640000
|
trusted library allocation
|
page read and write
|
||
20535230000
|
heap
|
page read and write
|
||
275DB256000
|
trusted library allocation
|
page read and write
|
||
76494FE000
|
stack
|
page read and write
|
||
764977F000
|
stack
|
page read and write
|
||
20754DED000
|
trusted library allocation
|
page read and write
|
||
A46DE7F000
|
stack
|
page read and write
|
||
7FFD9B4A0000
|
trusted library allocation
|
page read and write
|
||
2CA814B4000
|
trusted library allocation
|
page read and write
|
||
1C6671F5000
|
heap
|
page read and write
|
||
275F1EBD000
|
heap
|
page read and write
|
||
7FFD9B560000
|
trusted library allocation
|
page read and write
|
||
FDC07A4000
|
stack
|
page read and write
|
||
19A2B0E0000
|
heap
|
page read and write
|
||
7FFD9B3AA000
|
trusted library allocation
|
page read and write
|
||
20742C70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3D2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5A5000
|
trusted library allocation
|
page read and write
|
||
2075CEC3000
|
heap
|
page read and write
|
||
2CA90031000
|
trusted library allocation
|
page read and write
|
||
7FFD9B690000
|
trusted library allocation
|
page read and write
|
||
275D7A80000
|
heap
|
page read and write
|
||
20754DF4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B610000
|
trusted library allocation
|
page read and write
|
||
2CAEA4A6000
|
heap
|
page read and write
|
||
26775610000
|
heap
|
page read and write
|
||
B6D80FE000
|
unkown
|
page read and write
|
||
7FFD9B440000
|
trusted library allocation
|
page read and write
|
||
7FFD9B630000
|
trusted library allocation
|
page read and write
|
||
764967D000
|
stack
|
page read and write
|
||
F39117A000
|
stack
|
page read and write
|
||
764957E000
|
stack
|
page read and write
|
||
7FFD9B4A0000
|
trusted library allocation
|
page read and write
|
||
FDC0FFE000
|
stack
|
page read and write
|
||
7FFD9B510000
|
trusted library allocation
|
page read and write
|
||
FDC0CFE000
|
stack
|
page read and write
|
||
7FFD9B3C0000
|
trusted library allocation
|
page execute and read and write
|
||
275D955A000
|
heap
|
page read and write
|
||
20742AF4000
|
heap
|
page read and write
|
||
7FFD9B4F0000
|
trusted library allocation
|
page read and write
|
||
2CAEA237000
|
heap
|
page execute and read and write
|
||
7FFD9B490000
|
trusted library allocation
|
page read and write
|
||
2CAEA4DB000
|
heap
|
page read and write
|
||
1C6670C0000
|
heap
|
page read and write
|
||
2CA814F9000
|
trusted library allocation
|
page read and write
|
||
1C668A40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B510000
|
trusted library allocation
|
page read and write
|
||
275F1CB2000
|
heap
|
page read and write
|
||
20744810000
|
trusted library allocation
|
page read and write
|
||
20742CC0000
|
heap
|
page read and write
|
||
1C667120000
|
heap
|
page read and write
|
||
7FFD9B240000
|
trusted library allocation
|
page read and write
|
||
7FFD9B200000
|
trusted library allocation
|
page read and write
|
||
7FFD9B470000
|
trusted library allocation
|
page read and write
|
||
287BC7E000
|
stack
|
page read and write
|
||
275F1C80000
|
heap
|
page read and write
|
||
26775536000
|
heap
|
page read and write
|
||
2075CC90000
|
heap
|
page read and write
|
||
2075CCD2000
|
heap
|
page read and write
|
||
26775536000
|
heap
|
page read and write
|
||
7FFD9B540000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3E0000
|
trusted library allocation
|
page execute and read and write
|
||
A46EF4E000
|
stack
|
page read and write
|
||
275DB198000
|
trusted library allocation
|
page read and write
|
||
20533A15000
|
heap
|
page read and write
|
||
275E9981000
|
trusted library allocation
|
page read and write
|
||
2CA80001000
|
trusted library allocation
|
page read and write
|
||
20742CC5000
|
heap
|
page read and write
|
||
20754B31000
|
trusted library allocation
|
page read and write
|
||
26092DB0000
|
heap
|
page read and write
|
||
7FFD9B572000
|
trusted library allocation
|
page read and write
|
||
26775695000
|
heap
|
page read and write
|
||
CAD467C000
|
stack
|
page read and write
|
||
251F77E9000
|
heap
|
page read and write
|
||
7FFD9B4B0000
|
trusted library allocation
|
page read and write
|
||
1D3EAC70000
|
heap
|
page read and write
|
||
7FFD9B2F6000
|
trusted library allocation
|
page execute and read and write
|
||
2075CBC8000
|
heap
|
page read and write
|
||
2CAEA08D000
|
heap
|
page read and write
|
||
7FFD9B530000
|
trusted library allocation
|
page read and write
|
||
275F1AB0000
|
heap
|
page read and write
|
||
20754B35000
|
trusted library allocation
|
page read and write
|
||
1D3EAD05000
|
heap
|
page read and write
|
||
275F1E2D000
|
heap
|
page read and write
|
||
251F77D0000
|
heap
|
page read and write
|
||
26092D20000
|
heap
|
page read and write
|
||
7FFD9B440000
|
trusted library allocation
|
page read and write
|
||
1EB5A806000
|
heap
|
page read and write
|
||
19A2CFDC000
|
heap
|
page read and write
|
||
2075CCE5000
|
heap
|
page read and write
|
||
1EB5C5A0000
|
trusted library allocation
|
page read and write
|
||
251F78D0000
|
heap
|
page read and write
|
||
275F1CC1000
|
heap
|
page read and write
|
||
20745E97000
|
trusted library allocation
|
page read and write
|
||
2CAE80BE000
|
heap
|
page read and write
|
||
207458E1000
|
trusted library allocation
|
page read and write
|
||
F39173E000
|
stack
|
page read and write
|
||
81F60FE000
|
stack
|
page read and write
|
||
275D7B3D000
|
heap
|
page read and write
|
||
2CAE9AC5000
|
heap
|
page read and write
|
||
7FFD9B420000
|
trusted library allocation
|
page read and write
|
||
7FFD9B224000
|
trusted library allocation
|
page read and write
|
||
20742AF8000
|
heap
|
page read and write
|
||
2CA814CC000
|
trusted library allocation
|
page read and write
|
||
275F1EC6000
|
heap
|
page read and write
|
||
2CAEA340000
|
heap
|
page read and write
|
||
287BAF9000
|
stack
|
page read and write
|
||
7FFD9B600000
|
trusted library allocation
|
page read and write
|
||
81F5D76000
|
stack
|
page read and write
|
||
20744D28000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3C1000
|
trusted library allocation
|
page read and write
|
||
275E9C72000
|
trusted library allocation
|
page read and write
|
||
7FFD9B2A0000
|
trusted library allocation
|
page read and write
|
||
81F5DFD000
|
stack
|
page read and write
|
||
7FFD9B3E0000
|
trusted library allocation
|
page execute and read and write
|
||
81F607E000
|
stack
|
page read and write
|
||
2CAE9ACA000
|
heap
|
page read and write
|
||
7FFD9B490000
|
trusted library allocation
|
page read and write
|
||
2677556D000
|
heap
|
page read and write
|
||
7FFD9B50F000
|
trusted library allocation
|
page read and write
|
||
2CAEA3CA000
|
heap
|
page read and write
|
||
7FFD9B650000
|
trusted library allocation
|
page read and write
|
||
275F1EDB000
|
heap
|
page read and write
|
||
2CAE8270000
|
heap
|
page read and write
|
||
81F61FB000
|
stack
|
page read and write
|
||
2CA90021000
|
trusted library allocation
|
page read and write
|
||
20746075000
|
trusted library allocation
|
page read and write
|
||
2075CE2C000
|
heap
|
page read and write
|
||
275DB59E000
|
trusted library allocation
|
page read and write
|
||
2CAE9A50000
|
heap
|
page read and write
|
||
7FFD9B580000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3F2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B650000
|
trusted library allocation
|
page read and write
|
||
2CA80C5E000
|
trusted library allocation
|
page read and write
|
||
1C668EB0000
|
trusted library allocation
|
page read and write
|
||
26775519000
|
heap
|
page read and write
|
||
7FFD9B220000
|
trusted library allocation
|
page read and write
|
||
275F1B13000
|
heap
|
page read and write
|
||
A46E2FE000
|
stack
|
page read and write
|
||
2BCD8550000
|
heap
|
page read and write
|
||
275D94D0000
|
heap
|
page readonly
|
||
1C668EB0000
|
trusted library allocation
|
page read and write
|
||
2075CEDB000
|
heap
|
page read and write
|
||
2075CB08000
|
heap
|
page read and write
|
||
7FFD9B660000
|
trusted library allocation
|
page read and write
|
||
275F1DB6000
|
heap
|
page read and write
|
||
1EB5A8D0000
|
trusted library allocation
|
page read and write
|
||
1D3EAD05000
|
heap
|
page read and write
|
||
275D9530000
|
heap
|
page execute and read and write
|
||
7FFD9B26C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B5F0000
|
trusted library allocation
|
page read and write
|
||
275DAA6C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B620000
|
trusted library allocation
|
page read and write
|
||
275DAE93000
|
trusted library allocation
|
page read and write
|
||
275DAA45000
|
trusted library allocation
|
page read and write
|
||
251F78F0000
|
heap
|
page read and write
|
||
A46E57C000
|
stack
|
page read and write
|
||
2075CC80000
|
heap
|
page execute and read and write
|
||
7FFD9B4F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B3F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B670000
|
trusted library allocation
|
page read and write
|
||
9304EFD000
|
stack
|
page read and write
|
||
19A2CA20000
|
trusted library allocation
|
page read and write
|
||
81F63FB000
|
stack
|
page read and write
|
||
2075CEBD000
|
heap
|
page read and write
|
||
7FFD9B582000
|
trusted library allocation
|
page read and write
|
||
F391376000
|
stack
|
page read and write
|
||
287BBFE000
|
stack
|
page read and write
|
||
20754D5A000
|
trusted library allocation
|
page read and write
|
||
251F9266000
|
heap
|
page read and write
|
||
7FFD9B214000
|
trusted library allocation
|
page read and write
|
||
2CAEA42E000
|
heap
|
page read and write
|
||
7FFD9B20B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B680000
|
trusted library allocation
|
page read and write
|
||
2CAEA0FA000
|
heap
|
page read and write
|
||
F3914B9000
|
stack
|
page read and write
|
||
7FFD9B306000
|
trusted library allocation
|
page execute and read and write
|
||
20754C9E000
|
trusted library allocation
|
page read and write
|
||
251F77E6000
|
heap
|
page read and write
|
||
1C668F30000
|
trusted library allocation
|
page read and write
|
||
275F1AD0000
|
heap
|
page read and write
|
||
275DB1E4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B1F3000
|
trusted library allocation
|
page execute and read and write
|
||
19A2CE20000
|
trusted library allocation
|
page read and write
|
||
287BCF9000
|
stack
|
page read and write
|
||
7FFD9B61A000
|
trusted library allocation
|
page read and write
|
There are 765 hidden memdumps, click here to show them.