IOC Report
0j6nSbUQQS.dll

loading gif

Files

File Path
Type
Category
Malicious
0j6nSbUQQS.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\_Files_\LTKMYBSEYZ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\NWTVCDUMOB.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\NWTVCDUMOB.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\YPSIACHYXW.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1m1zykgq.j1e.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3erf2iyg.evd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d0v5zafl.dbs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d5zu1b4q.fn2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_edvqcf40.141.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hhyhalm4.kif.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_latjz0zt.go2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m2pua0u5.xtl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ptim3fui.uza.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rbpbjoys.kxe.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vmiojeif.5wh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wetv5vpy.shr.psm1
ASCII text, with no line terminators
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\0j6nSbUQQS.dll,Main
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\0j6nSbUQQS.dll",#1
malicious
C:\Windows\SysWOW64\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\SysWOW64\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\0j6nSbUQQS.dll,Save
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\0j6nSbUQQS.dll",Main
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\0j6nSbUQQS.dll",Save
malicious
C:\Windows\SysWOW64\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\0j6nSbUQQS.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\0j6nSbUQQS.dll",#1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.217/CoreOPT/index.php
185.215.113.217
malicious
http://185.215.113.217/CoreOPT/index.php?wal=1
185.215.113.217
malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://crl.mR
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://crl.mU
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
http://185.215.113.217/CoreOPT/index.php?wal=1.
unknown
https://github.com/Pester/Pester
unknown
http://185.215.113.217/
unknown
https://ion=v4.5
unknown
http://185.215.113.217/CoreOPT/index.php?wal=1K
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://185.215.113.217/CoreOPT/index.phph
unknown
http://185.215.113.217/%
unknown
https://aka.ms/pscore68
unknown
http://185.215.113.217/Contacts
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 15 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.217
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C07E97E000
stack
page read and write
2FEE000
stack
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
23701C1C000
trusted library allocation
page read and write
7DF41FE30000
trusted library allocation
page execute and read and write
4BE1000
heap
page read and write
2F94000
heap
page read and write
EC67E0E000
stack
page read and write
196A6076000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
272CDFD6000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
272CFAB0000
heap
page read and write
1968E5AF000
trusted library allocation
page read and write
196A5DDD000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
47AF000
stack
page read and write
C3E000
stack
page read and write
7FFD9B940000
trusted library allocation
page read and write
10FE000
stack
page read and write
7FFD9BACC000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
1968DE37000
trusted library allocation
page read and write
4DB1000
heap
page read and write
23701888000
trusted library allocation
page read and write
196A60FB000
heap
page read and write
2F94000
heap
page read and write
EC67036000
stack
page read and write
C07E513000
stack
page read and write
7FFD9BB40000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
4DB1000
heap
page read and write
EC6723E000
stack
page read and write
1968BD10000
heap
page read and write
1235000
heap
page read and write
1968BE02000
heap
page read and write
7FFD9BA14000
trusted library allocation
page read and write
272D1958000
trusted library allocation
page read and write
2377B7FF000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B6D3000
trusted library allocation
page execute and read and write
4CE0000
trusted library allocation
page read and write
272CFA90000
heap
page execute and read and write
492F000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
272CE1B0000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page execute and read and write
23710072000
trusted library allocation
page read and write
7FFD9BA29000
trusted library allocation
page read and write
7FFD9B6BD000
trusted library allocation
page execute and read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
52FE000
stack
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1969DDD1000
trusted library allocation
page read and write
4DB1000
heap
page read and write
7FFD9B861000
trusted library allocation
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
367E000
stack
page read and write
7FFD9B72C000
trusted library allocation
page execute and read and write
4DB1000
heap
page read and write
2F94000
heap
page read and write
4611000
heap
page read and write
272E82AB000
heap
page read and write
2F94000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
2C5A000
heap
page read and write
7E4000
heap
page read and write
23700F8F000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
196A63B0000
heap
page read and write
4611000
heap
page read and write
7E4000
heap
page read and write
1968BD93000
heap
page read and write
480D000
stack
page read and write
2F94000
heap
page read and write
7FFD9BB00000
trusted library allocation
page read and write
272CE1C5000
heap
page read and write
272E8376000
heap
page read and write
272CF980000
trusted library allocation
page read and write
272D124B000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page execute and read and write
4DD1000
heap
page read and write
7FFD9BA09000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
4BE1000
heap
page read and write
C07E5DE000
stack
page read and write
EC66F79000
stack
page read and write
780000
heap
page read and write
2377991D000
heap
page read and write
1969DF4B000
trusted library allocation
page read and write
2D84000
heap
page read and write
4CE0000
trusted library allocation
page read and write
2377BAAC000
heap
page read and write
2EB000
stack
page read and write
4DB1000
heap
page read and write
7FFD9B88A000
trusted library allocation
page read and write
23779B60000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
4BE1000
heap
page read and write
4DB1000
heap
page read and write
2D84000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
561E000
stack
page read and write
4BE1000
heap
page read and write
6E0000
heap
page read and write
2D84000
heap
page read and write
7FFD9B6B2000
trusted library allocation
page read and write
4DB1000
heap
page read and write
84DA96E000
unkown
page read and write
523C000
stack
page read and write
508E000
stack
page read and write
2377B950000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
2AF8000
heap
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
23701863000
trusted library allocation
page read and write
272D1A22000
trusted library allocation
page read and write
4611000
heap
page read and write
1968DDB1000
trusted library allocation
page read and write
2B1F000
heap
page read and write
1968D8B5000
heap
page read and write
51A0000
heap
page read and write
74F000
stack
page read and write
710000
heap
page read and write
1969DFAD000
trusted library allocation
page read and write
EC67D0F000
stack
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
196A60CB000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
4BE1000
heap
page read and write
4611000
heap
page read and write
2D8A000
heap
page read and write
7FFD9BA69000
trusted library allocation
page read and write
4DB7000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7DF498E80000
trusted library allocation
page execute and read and write
2A10000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
4DB1000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
4860000
heap
page read and write
23779830000
heap
page read and write
1220000
heap
page read and write
4BE1000
heap
page read and write
4DB1000
heap
page read and write
196A5FE9000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
4C01000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
C07EE7F000
stack
page read and write
196A5E28000
heap
page read and write
3600000
heap
page read and write
2377B8A7000
heap
page read and write
272CDF50000
heap
page read and write
472F000
stack
page read and write
2377BB7E000
heap
page read and write
2D84000
heap
page read and write
C07EAFE000
stack
page read and write
2F94000
heap
page read and write
4BE1000
heap
page read and write
4611000
heap
page read and write
1410000
heap
page read and write
272D12A6000
trusted library allocation
page read and write
1968BD9B000
heap
page read and write
2F94000
heap
page read and write
2C30000
heap
page read and write
272CF9A0000
trusted library allocation
page read and write
272CFE01000
trusted library allocation
page read and write
2377B930000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
272E829B000
heap
page read and write
2377B1D0000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
1510000
heap
page read and write
4DB0000
heap
page read and write
272D1237000
trusted library allocation
page read and write
7FFD9B766000
trusted library allocation
page read and write
1969DF95000
trusted library allocation
page read and write
237102EB000
trusted library allocation
page read and write
7DF414040000
trusted library allocation
page execute and read and write
7FFD9B87A000
trusted library allocation
page read and write
2D84000
heap
page read and write
4DB1000
heap
page read and write
196A5FB5000
heap
page read and write
2377B7C0000
heap
page read and write
2F94000
heap
page read and write
4980000
trusted library allocation
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
2D80000
heap
page read and write
1130000
heap
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
4611000
heap
page read and write
43B000
stack
page read and write
4DB1000
heap
page read and write
57C0000
heap
page read and write
DCB000
stack
page read and write
2F94000
heap
page read and write
5290000
heap
page read and write
4611000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
4BE1000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7DF41FE40000
trusted library allocation
page execute and read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
272CDFD8000
heap
page read and write
390000
heap
page read and write
2F94000
heap
page read and write
4EEE000
stack
page read and write
196A5DE9000
heap
page read and write
196A602F000
heap
page read and write
4BE1000
heap
page read and write
7E4000
heap
page read and write
2D84000
heap
page read and write
1968E385000
trusted library allocation
page read and write
2D84000
heap
page read and write
84DB2BC000
stack
page read and write
140E000
unkown
page read and write
2377BBAB000
heap
page read and write
23701884000
trusted library allocation
page read and write
1453000
heap
page read and write
23701C20000
trusted library allocation
page read and write
2F94000
heap
page read and write
4611000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
4DB1000
heap
page read and write
69D000
unkown
page read and write
C8A000
heap
page read and write
2377BBA9000
heap
page read and write
1968BFB0000
heap
page read and write
84DB33E000
stack
page read and write
272CDF9B000
heap
page read and write
4BE1000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
2377BAD4000
heap
page read and write
800000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7A0000
heap
page read and write
272D1A1E000
trusted library allocation
page read and write
7FFD9B892000
trusted library allocation
page read and write
4DB1000
heap
page read and write
272D1662000
trusted library allocation
page read and write
7FFD9B6EB000
trusted library allocation
page read and write
4DB1000
heap
page read and write
3427000
heap
page read and write
84DAFBE000
stack
page read and write
84DB3BB000
stack
page read and write
23701B57000
trusted library allocation
page read and write
4611000
heap
page read and write
2C50000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
2377B310000
heap
page read and write
2D84000
heap
page read and write
272E8340000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
84DAC7F000
stack
page read and write
272D03D5000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page execute and read and write
2F94000
heap
page read and write
588F000
stack
page read and write
7D0000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
4611000
heap
page read and write
1968DD27000
heap
page execute and read and write
7FFD9B8D0000
trusted library allocation
page read and write
4611000
heap
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
2D4C000
heap
page read and write
4BE1000
heap
page read and write
EC6733C000
stack
page read and write
1969DDE1000
trusted library allocation
page read and write
4C00000
heap
page read and write
272E82EA000
heap
page read and write
196A5DB0000
heap
page read and write
196A600D000
heap
page read and write
272CDF30000
heap
page read and write
C07EA7F000
stack
page read and write
575000
heap
page read and write
EC66D79000
stack
page read and write
7E4000
heap
page read and write
196A60C4000
heap
page read and write
7FFD9BA32000
trusted library allocation
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
EC66E7E000
stack
page read and write
2A10000
trusted library allocation
page read and write
4DB1000
heap
page read and write
2EEB000
stack
page read and write
36E0000
heap
page read and write
4611000
heap
page read and write
2E9E000
stack
page read and write
70E000
stack
page read and write
4BE1000
heap
page read and write
4DB1000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
4DB1000
heap
page read and write
102F000
stack
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
4980000
trusted library allocation
page read and write
7DF414030000
trusted library allocation
page execute and read and write
4DB1000
heap
page read and write
272D1264000
trusted library allocation
page read and write
4611000
heap
page read and write
F60000
heap
page read and write
272D16D6000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
4630000
heap
page read and write
84DB0B8000
stack
page read and write
4611000
heap
page read and write
C07EC76000
stack
page read and write
7FFD9B6C2000
trusted library allocation
page read and write
141A000
heap
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
272D12AC000
trusted library allocation
page read and write
1968BD30000
heap
page read and write
830000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
2F94000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
4BE1000
heap
page read and write
272CFA20000
trusted library allocation
page read and write
4DB1000
heap
page read and write
4BE1000
heap
page read and write
4F8F000
stack
page read and write
1968D8B0000
heap
page read and write
272CF9E0000
heap
page read and write
2370107C000
trusted library allocation
page read and write
C07E8FF000
stack
page read and write
36E6000
heap
page read and write
E70000
heap
page read and write
1451000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
272E8017000
heap
page execute and read and write
2370109F000
trusted library allocation
page read and write
C07EDFE000
stack
page read and write
2377B210000
trusted library allocation
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
12EE000
stack
page read and write
1968BED0000
trusted library allocation
page read and write
4DB1000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
580000
heap
page read and write
4611000
heap
page read and write
4BE1000
heap
page read and write
1969E0A9000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
196A60D5000
heap
page read and write
196A5EAB000
heap
page read and write
1968BDDE000
heap
page read and write
4BF0000
heap
page read and write
196A60F8000
heap
page read and write
7E4000
heap
page read and write
7FFD9B881000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
84DA8E3000
stack
page read and write
1969DDB1000
trusted library allocation
page read and write
4BE1000
heap
page read and write
298B000
stack
page read and write
4611000
heap
page read and write
7FFD9B70C000
trusted library allocation
page execute and read and write
84DAEFF000
stack
page read and write
5DE000
stack
page read and write
1968BE41000
heap
page read and write
710000
heap
page read and write
4DB1000
heap
page read and write
C6F000
heap
page read and write
237005D4000
trusted library allocation
page read and write
4611000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
4DB1000
heap
page read and write
4BE1000
heap
page read and write
4611000
heap
page read and write
470000
heap
page read and write
1968BFB5000
heap
page read and write
272E8120000
heap
page read and write
4BE1000
heap
page read and write
2377990B000
heap
page read and write
42C0000
heap
page read and write
2F94000
heap
page read and write
272CFAB5000
heap
page read and write
4EF0000
heap
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
7E4000
heap
page read and write
4620000
heap
page read and write
1969E007000
trusted library allocation
page read and write
272E8344000
heap
page read and write
50C0000
heap
page read and write
196A60B4000
heap
page read and write
9CE000
stack
page read and write
2E80000
heap
page read and write
272D124D000
trusted library allocation
page read and write
7E4000
heap
page read and write
4DB1000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
4BE1000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
2B0D000
heap
page read and write
272D1261000
trusted library allocation
page read and write
2A4E000
stack
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
1968F685000
trusted library allocation
page read and write
11C0000
heap
page read and write
4611000
heap
page read and write
2F50000
heap
page read and write
272DFE31000
trusted library allocation
page read and write
272DFE21000
trusted library allocation
page read and write
2CA0000
heap
page read and write
7FFD9B7A6000
trusted library allocation
page execute and read and write
7FFD9BA1C000
trusted library allocation
page read and write
4611000
heap
page read and write
237011D5000
trusted library allocation
page read and write
2F94000
heap
page read and write
2D84000
heap
page read and write
29CA000
stack
page read and write
1968BEE0000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
4BE1000
heap
page read and write
196A5EF2000
heap
page read and write
C07ED77000
stack
page read and write
4C0000
heap
page read and write
1968DCC0000
heap
page execute and read and write
23700DB8000
trusted library allocation
page read and write
23700001000
trusted library allocation
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
4611000
heap
page read and write
571E000
stack
page read and write
196A5DB4000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9BA28000
trusted library allocation
page read and write
2377BB2B000
heap
page read and write
4890000
heap
page read and write
1968EF02000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
59BF000
stack
page read and write
5520000
trusted library allocation
page read and write
47CE000
stack
page read and write
2D84000
heap
page read and write
2C3C000
stack
page read and write
1968EA10000
trusted library allocation
page read and write
1216000
heap
page read and write
4DB1000
heap
page read and write
4BE1000
heap
page read and write
EC671BE000
stack
page read and write
237798FD000
heap
page read and write
4D1E000
stack
page read and write
84DAE7E000
stack
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
7FFD9BA18000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page execute and read and write
7FFD9B900000
trusted library allocation
page read and write
2CD7000
heap
page read and write
4611000
heap
page read and write
1969E0A0000
trusted library allocation
page read and write
7E0000
heap
page read and write
EC66C7F000
stack
page read and write
EC67D8C000
stack
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B9B0000
trusted library allocation
page read and write
4611000
heap
page read and write
2377BA90000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
527F000
stack
page read and write
7FFD9B776000
trusted library allocation
page read and write
4611000
heap
page read and write
9F0000
heap
page read and write
1070000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
2377BACC000
heap
page read and write
7FFD9BB1D000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
7E4000
heap
page read and write
2EDF000
stack
page read and write
1968BF70000
trusted library allocation
page read and write
4DB1000
heap
page read and write
7FFD9B77C000
trusted library allocation
page execute and read and write
6DE000
stack
page read and write
7FFD9B930000
trusted library allocation
page read and write
23700228000
trusted library allocation
page read and write
4610000
heap
page read and write
4F6E000
stack
page read and write
43C000
stack
page read and write
2D84000
heap
page read and write
7FFD9B7B6000
trusted library allocation
page execute and read and write
542F000
stack
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
2D08000
heap
page read and write
330E000
stack
page read and write
272E8220000
heap
page read and write
4DB1000
heap
page read and write
4611000
heap
page read and write
10ED000
stack
page read and write
4611000
heap
page read and write
7FFD9B9E3000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
23779901000
heap
page read and write
4DB1000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
4611000
heap
page read and write
7FFD9BB26000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
2C40000
heap
page read and write
196A5FB7000
heap
page read and write
4BE1000
heap
page read and write
C6B000
heap
page read and write
4DB1000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
2D84000
heap
page read and write
2377B315000
heap
page read and write
272DFE72000
trusted library allocation
page read and write
130D000
unkown
page read and write
272E83B6000
heap
page read and write
196A5FB0000
heap
page read and write
535000
stack
page read and write
2370162A000
trusted library allocation
page read and write
4611000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7E4000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
11B0000
heap
page read and write
701000
heap
page read and write
4DB1000
heap
page read and write
2F94000
heap
page read and write
7DF498E60000
trusted library allocation
page execute and read and write
C07EEFD000
stack
page read and write
4611000
heap
page read and write
1968BD8E000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
4611000
heap
page read and write
196A60BB000
heap
page read and write
480000
heap
page read and write
7E4000
heap
page read and write
2377B7B0000
heap
page execute and read and write
272CDF95000
heap
page read and write
23701131000
trusted library allocation
page read and write
2377BB0A000
heap
page read and write
343D000
heap
page read and write
272CDF62000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
7FFD9B8B2000
trusted library allocation
page read and write
7FFD9BA19000
trusted library allocation
page read and write
53E000
stack
page read and write
2D84000
heap
page read and write
35D0000
heap
page read and write
4611000
heap
page read and write
1968BDAE000
heap
page read and write
3A0000
heap
page read and write
1968BDD8000
heap
page read and write
7FFD9BA03000
trusted library allocation
page read and write
137E000
unkown
page read and write
7FFD9BA75000
trusted library allocation
page read and write
1968BEF0000
heap
page readonly
23700E21000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
4BE1000
heap
page read and write
527C000
stack
page read and write
2990000
heap
page read and write
4BE1000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
79C000
stack
page read and write
1968BD75000
heap
page read and write
C07EB7E000
stack
page read and write
272D07F1000
trusted library allocation
page read and write
12C5000
heap
page read and write
7FFD9B76C000
trusted library allocation
page execute and read and write
EC672BE000
stack
page read and write
4611000
heap
page read and write
7FFD9BB16000
trusted library allocation
page read and write
1968EB93000
trusted library allocation
page read and write
2F00000
heap
page read and write
7FFD9B6CB000
trusted library allocation
page read and write
2F94000
heap
page read and write
272E8000000
trusted library allocation
page read and write
23700DED000
trusted library allocation
page read and write
272E8332000
heap
page read and write
237010C2000
trusted library allocation
page read and write
2F90000
heap
page read and write
4611000
heap
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
84DACFE000
stack
page read and write
1968F618000
trusted library allocation
page read and write
4BE1000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
2F94000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
196A604A000
heap
page read and write
272E80D5000
heap
page read and write
4DB1000
heap
page read and write
2377BB8F000
heap
page read and write
4BE1000
heap
page read and write
23710001000
trusted library allocation
page read and write
C07E59E000
unkown
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
272D1616000
trusted library allocation
page read and write
272E82D8000
heap
page read and write
4611000
heap
page read and write
7FFD9B850000
trusted library allocation
page read and write
7CE000
stack
page read and write
4EB0000
trusted library allocation
page read and write
4BE1000
heap
page read and write
1968EEF6000
trusted library allocation
page read and write
7FFD9B8A2000
trusted library allocation
page read and write
7FFD9B71C000
trusted library allocation
page execute and read and write
7FFD9BA2C000
trusted library allocation
page read and write
4611000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page execute and read and write
7FFD9B940000
trusted library allocation
page read and write
704000
heap
page read and write
272E829F000
heap
page read and write
1968BEEB000
heap
page read and write
7E4000
heap
page read and write
272CDF8E000
heap
page read and write
2C60000
heap
page read and write
272E82C9000
heap
page read and write
84DB1BE000
stack
page read and write
272D14A8000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
272E822D000
heap
page read and write
84DB139000
stack
page read and write
1969E082000
trusted library allocation
page read and write
4BE1000
heap
page read and write
84DA9EE000
stack
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
6F0000
heap
page read and write
196A608B000
heap
page read and write
196A5EF7000
heap
page read and write
4EB0000
trusted library allocation
page read and write
EC669FF000
unkown
page read and write
4DB1000
heap
page read and write
548E000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
272CF990000
heap
page readonly
7FFD9B6D0000
trusted library allocation
page read and write
1968F321000
trusted library allocation
page read and write
7E4000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
23779B80000
heap
page read and write
272E8271000
heap
page read and write
2D84000
heap
page read and write
4DB1000
heap
page read and write
2377B7EC000
heap
page read and write
272E8020000
heap
page read and write
7FFD9B796000
trusted library allocation
page execute and read and write
2D84000
heap
page read and write
7FFD9B9F3000
trusted library allocation
page read and write
7FFD9B862000
trusted library allocation
page read and write
4DB1000
heap
page read and write
1968BEB0000
trusted library allocation
page read and write
46EE000
stack
page read and write
196A5E55000
heap
page read and write
2377B8BC000
heap
page read and write
488F000
stack
page read and write
196A5ED0000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
EC66EFE000
stack
page read and write
237798B0000
trusted library allocation
page read and write
272E00F0000
trusted library allocation
page read and write
600000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
484E000
stack
page read and write
272CE1C0000
heap
page read and write
272E8326000
heap
page read and write
1968BD91000
heap
page read and write
C07F9CE000
stack
page read and write
4611000
heap
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
29EB000
stack
page read and write
196A5EE2000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
2F94000
heap
page read and write
272D1686000
trusted library allocation
page read and write
4BE1000
heap
page read and write
4611000
heap
page read and write
2D84000
heap
page read and write
84DBE0E000
stack
page read and write
237102EF000
trusted library allocation
page read and write
4DB1000
heap
page read and write
4611000
heap
page read and write
4624000
heap
page read and write
EC66FBE000
stack
page read and write
4631000
heap
page read and write
7FFD9BA3C000
trusted library allocation
page read and write
4611000
heap
page read and write
4DB1000
heap
page read and write
4BE1000
heap
page read and write
127E000
unkown
page read and write
7FFD9BB00000
trusted library allocation
page read and write
272E7FD0000
heap
page execute and read and write
4DB1000
heap
page read and write
33A0000
heap
page read and write
4BE1000
heap
page read and write
4611000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
EC67138000
stack
page read and write
53EE000
stack
page read and write
7E4000
heap
page read and write
196A5EEA000
heap
page read and write
2D84000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
1430000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
F50000
heap
page read and write
4DB1000
heap
page read and write
476E000
stack
page read and write
7FFD9B78C000
trusted library allocation
page execute and read and write
4BE1000
heap
page read and write
115F000
stack
page read and write
4FAF000
stack
page read and write
7FFD9BA38000
trusted library allocation
page read and write
47D0000
heap
page read and write
4611000
heap
page read and write
2D84000
heap
page read and write
23779810000
heap
page read and write
1968DDC6000
trusted library allocation
page read and write
4BE0000
heap
page read and write
7FFD9B7E0000
trusted library allocation
page execute and read and write
2F94000
heap
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
2F3F000
stack
page read and write
13C0000
heap
page read and write
EC66CFE000
stack
page read and write
152F000
stack
page read and write
4BE1000
heap
page read and write
272E8010000
heap
page execute and read and write
272D0E4E000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
23701817000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
C07EFFB000
stack
page read and write
196A6090000
heap
page read and write
7DF498E70000
trusted library allocation
page execute and read and write
13EA000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
4DB1000
heap
page read and write
84DAD79000
stack
page read and write
1155000
stack
page read and write
272DFE01000
trusted library allocation
page read and write
4611000
heap
page read and write
4F30000
heap
page read and write
EC66DFF000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
4DB1000
heap
page read and write
8EE000
unkown
page read and write
7FFD9BB2D000
trusted library allocation
page read and write
272E7E06000
heap
page read and write
272E835C000
heap
page read and write
272D121F000
trusted library allocation
page read and write
23779907000
heap
page read and write
4611000
heap
page read and write
237018D5000
trusted library allocation
page read and write
272E824B000
heap
page read and write
4611000
heap
page read and write
23710021000
trusted library allocation
page read and write
4DD0000
heap
page read and write
2377BA30000
trusted library allocation
page read and write
23700F8D000
trusted library allocation
page read and write
23779949000
heap
page read and write
7E4000
heap
page read and write
12A0000
heap
page read and write
1210000
heap
page read and write
7FFD9B937000
trusted library allocation
page read and write
1968E505000
trusted library allocation
page read and write
1230000
heap
page read and write
272D0028000
trusted library allocation
page read and write
57BE000
stack
page read and write
7FFD9B6C4000
trusted library allocation
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
4BE1000
heap
page read and write
7E4000
heap
page read and write
7FFD9B9BF000
trusted library allocation
page read and write
2EAB000
stack
page read and write
4DB1000
heap
page read and write
4611000
heap
page read and write
4BE1000
heap
page read and write
2D84000
heap
page read and write
237798C0000
heap
page read and write
84DAF79000
stack
page read and write
272CE140000
heap
page read and write
272CDF93000
heap
page read and write
13EF000
stack
page read and write
4611000
heap
page read and write
4DB1000
heap
page read and write
4611000
heap
page read and write
4F0F000
stack
page read and write
2377B2C0000
heap
page read and write
7FFD9B786000
trusted library allocation
page read and write
1401000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
4DB1000
heap
page read and write
272E805B000
heap
page read and write
272E8490000
heap
page read and write
73F000
stack
page read and write
1968F9D2000
trusted library allocation
page read and write
4BE1000
heap
page read and write
2A7A000
heap
page read and write
C07E9F9000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
237010EA000
trusted library allocation
page read and write
2377BA50000
heap
page read and write
2F94000
heap
page read and write
4DB1000
heap
page read and write
2D84000
heap
page read and write
7E4000
heap
page read and write
4FFB000
stack
page read and write
272E00EB000
trusted library allocation
page read and write
23779870000
heap
page read and write
820000
heap
page read and write
237012EA000
trusted library allocation
page read and write
196A6056000
heap
page read and write
12C0000
heap
page read and write
2D84000
heap
page read and write
1968EE02000
trusted library allocation
page read and write
1968DFD8000
trusted library allocation
page read and write
2D80000
heap
page read and write
82F000
stack
page read and write
C07EF7E000
stack
page read and write
4BE1000
heap
page read and write
5080000
trusted library allocation
page read and write
60A000
heap
page read and write
4BE1000
heap
page read and write
4611000
heap
page read and write
7FFD9BB30000
trusted library allocation
page read and write
4611000
heap
page read and write
196A5EA9000
heap
page read and write
478D000
stack
page read and write
4DB1000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
4DB1000
heap
page read and write
2D84000
heap
page read and write
4DB1000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
4BE1000
heap
page read and write
2F94000
heap
page read and write
2D84000
heap
page read and write
2A70000
heap
page read and write
1968F908000
trusted library allocation
page read and write
272CE170000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
272CE120000
heap
page read and write
4BE1000
heap
page read and write
84DBD8E000
stack
page read and write
4BE1000
heap
page read and write
1969E09B000
trusted library allocation
page read and write
84DB23E000
stack
page read and write
C07EBF9000
stack
page read and write
2377BBA4000
heap
page read and write
13E0000
heap
page read and write
7E4000
heap
page read and write
7FFD9BACA000
trusted library allocation
page read and write
4611000
heap
page read and write
105B000
stack
page read and write
4BE1000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
4DB1000
heap
page read and write
4BE1000
heap
page read and write
196A5F05000
heap
page read and write
23701312000
trusted library allocation
page read and write
7E4000
heap
page read and write
4BE1000
heap
page read and write
7E4000
heap
page read and write
1968DD20000
heap
page execute and read and write
1968D769000
heap
page read and write
1968BD95000
heap
page read and write
F2F000
stack
page read and write
2377B7FD000
heap
page read and write
7FFD9B6D2000
trusted library allocation
page read and write
4611000
heap
page read and write
7FFD9B6B3000
trusted library allocation
page execute and read and write
EC670BE000
stack
page read and write
7E4000
heap
page read and write
4DDC000
stack
page read and write
2377B267000
heap
page execute and read and write
52BE000
stack
page read and write
4D9E000
stack
page read and write
7FFD9BA79000
trusted library allocation
page read and write
33AA000
heap
page read and write
7FFD9B6C3000
trusted library allocation
page execute and read and write
237102F9000
trusted library allocation
page read and write
1968F63A000
trusted library allocation
page read and write
2F70000
heap
page read and write
84DADFF000
stack
page read and write
7FFD9BADC000
trusted library allocation
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
5080000
trusted library allocation
page read and write
4BE1000
heap
page read and write
98D000
stack
page read and write
7E4000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
272E00F9000
trusted library allocation
page read and write
1968BF30000
trusted library allocation
page read and write
4DC0000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
196A6108000
heap
page read and write
4611000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
10F5000
stack
page read and write
334E000
stack
page read and write
7FFD9BA22000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
1968BD50000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
4DB1000
heap
page read and write
272D1278000
trusted library allocation
page read and write
AD0000
heap
page read and write
7E4000
heap
page read and write
6F8000
heap
page read and write
7E4000
heap
page read and write
537D000
stack
page read and write
1968F774000
trusted library allocation
page read and write
2F94000
heap
page read and write
1968DD30000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
4BE1000
heap
page read and write
4DB1000
heap
page read and write
4CE0000
trusted library allocation
page read and write
48EE000
stack
page read and write
1968F3DE000
trusted library allocation
page read and write
2377B871000
heap
page read and write
4611000
heap
page read and write
196A6050000
heap
page read and write
1520000
heap
page read and write
1410000
heap
page read and write
7E4000
heap
page read and write
2F94000
heap
page read and write
5270000
heap
page read and write
23779946000
heap
page read and write
4DB1000
heap
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
1969DDFC000
trusted library allocation
page read and write
2D84000
heap
page read and write
2D84000
heap
page read and write
42AF000
stack
page read and write
7FFD9B8C0000
trusted library allocation
page execute and read and write
4BE1000
heap
page read and write
23701055000
trusted library allocation
page read and write
4D5F000
stack
page read and write
C60000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
2D84000
heap
page read and write
1CB000
stack
page read and write
23710031000
trusted library allocation
page read and write
366E000
stack
page read and write
2377B66B000
heap
page read and write
504E000
stack
page read and write
1968DDA0000
heap
page execute and read and write
7FFD9BAE0000
trusted library allocation
page read and write
32B000
stack
page read and write
503C000
stack
page read and write
EC66973000
stack
page read and write
1969DFED000
trusted library allocation
page read and write
1968BE3B000
heap
page read and write
2F94000
heap
page read and write
7E4000
heap
page read and write
196A5E87000
heap
page read and write
710000
heap
page read and write
1968DD10000
heap
page read and write
4DB1000
heap
page read and write
578E000
stack
page read and write
272CDFDF000
heap
page read and write
272E8334000
heap
page read and write
7FFD9BA04000
trusted library allocation
page read and write
114D000
stack
page read and write
3600000
heap
page read and write
23779730000
heap
page read and write
272E8140000
heap
page read and write
23779B85000
heap
page read and write
272E836E000
heap
page read and write
23700ECB000
trusted library allocation
page read and write
272D1233000
trusted library allocation
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
5050000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
142E000
stack
page read and write
C07E87E000
stack
page read and write
4DB1000
heap
page read and write
7E4000
heap
page read and write
2377BA98000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
272E8152000
heap
page read and write
7FFD9BABA000
trusted library allocation
page read and write
4DB1000
heap
page read and write
4DB1000
heap
page read and write
4611000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
7FFD9BAB0000
trusted library allocation
page read and write
4611000
heap
page read and write
7FFD9BA24000
trusted library allocation
page read and write
4BE1000
heap
page read and write
272CFE87000
trusted library allocation
page read and write
7FFD9B6DB000
trusted library allocation
page read and write
4611000
heap
page read and write
2EFE000
stack
page read and write
1968BE70000
heap
page read and write
2D84000
heap
page read and write
196A608E000
heap
page read and write
23700F87000
trusted library allocation
page read and write
4BE1000
heap
page read and write
4DB1000
heap
page read and write
AD6000
heap
page read and write
54CE000
stack
page read and write
1968EEF0000
trusted library allocation
page read and write
2F60000
heap
page read and write
1969DDE5000
trusted library allocation
page read and write
4ECE000
stack
page read and write
4BE1000
heap
page read and write
7FFD9B872000
trusted library allocation
page read and write
4DB1000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
4BE1000
heap
page read and write
7FFD9B860000
trusted library allocation
page read and write
272CDFAE000
heap
page read and write
2F94000
heap
page read and write
23779B70000
heap
page readonly
84DB036000
stack
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
4DB1000
heap
page read and write
4611000
heap
page read and write
2377B770000
heap
page execute and read and write
7FFD9B6B4000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
4DB1000
heap
page read and write
7FFD9B86A000
trusted library allocation
page read and write
4611000
heap
page read and write
9EE000
stack
page read and write
4DB1000
heap
page read and write
810000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
C07ECF8000
stack
page read and write
1968BC30000
heap
page read and write
7FFD9BB30000
trusted library allocation
page read and write
2F94000
heap
page read and write
2CF1000
heap
page read and write
13BE000
stack
page read and write
1969DE22000
trusted library allocation
page read and write
4DB1000
heap
page read and write
570000
heap
page read and write
52D000
stack
page read and write
1968F5CC000
trusted library allocation
page read and write
1968F9CD000
trusted library allocation
page read and write
2D01000
heap
page read and write
4E1D000
stack
page read and write
4BE1000
heap
page read and write
4DB1000
heap
page read and write
272E80BD000
heap
page read and write
4E5D000
stack
page read and write
7E4000
heap
page read and write
7FFD9B7D0000
trusted library allocation
page execute and read and write
338F000
stack
page read and write
4BE1000
heap
page read and write
474D000
stack
page read and write
4BE1000
heap
page read and write
4611000
heap
page read and write
23700086000
trusted library allocation
page read and write
2377B260000
heap
page execute and read and write
7E4000
heap
page read and write
4DB1000
heap
page read and write
2F94000
heap
page read and write
7FFD9B871000
trusted library allocation
page read and write
2D84000
heap
page read and write
533E000
stack
page read and write
4611000
heap
page read and write
There are 1068 hidden memdumps, click here to show them.