Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
iLPxdpxQ3e.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\DisconnectCheats
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_03ekwddp.vsc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_50kqlwzt.ok3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cb2lysg2.ffk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_clhvavz4.fpy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ctjmfczu.0id.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ehpi01am.1wk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_enoiwdcl.qdk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fr24e1yt.z52.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gfqb5ezt.lf3.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jdufll5a.j1n.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n0fdp5bm.aph.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_na3ejatq.utg.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ovkrls1c.aip.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t5j5efbn.nlu.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xn5zdfwq.4hw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yl5jx5nd.veh.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DisconnectCheats.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Oct 31 18:04:57
2024, mtime=Thu Oct 31 18:04:57 2024, atime=Thu Oct 31 18:04:57 2024, length=305664, window=hide
|
dropped
|
There are 10 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\iLPxdpxQ3e.exe
|
"C:\Users\user\Desktop\iLPxdpxQ3e.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\iLPxdpxQ3e.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'iLPxdpxQ3e.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\DisconnectCheats'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DisconnectCheats'
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
dane1c-58098.portmap.host
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://crl.micros
|
unknown
|
There are 6 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
dane1c-58098.portmap.host
|
193.161.193.99
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
193.161.193.99
|
dane1c-58098.portmap.host
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
72000
|
unkown
|
page readonly
|
||
21D8E7E4000
|
trusted library allocation
|
page read and write
|
||
24A52DB7000
|
heap
|
page execute and read and write
|
||
20A566C7000
|
heap
|
page read and write
|
||
2A54C3F000
|
stack
|
page read and write
|
||
1EA2947C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA46000
|
trusted library allocation
|
page read and write
|
||
53E9EF9000
|
stack
|
page read and write
|
||
23B7000
|
trusted library allocation
|
page read and write
|
||
93996C9000
|
stack
|
page read and write
|
||
4FAC08C000
|
stack
|
page read and write
|
||
20A568B4000
|
heap
|
page read and write
|
||
1EA265DD000
|
heap
|
page read and write
|
||
1AFC6000
|
heap
|
page read and write
|
||
20A3FF1E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
21DA49C0000
|
heap
|
page read and write
|
||
1EA28290000
|
heap
|
page execute and read and write
|
||
53EA278000
|
stack
|
page read and write
|
||
24A52EE0000
|
heap
|
page read and write
|
||
1EA38312000
|
trusted library allocation
|
page read and write
|
||
4FABF0D000
|
stack
|
page read and write
|
||
21DA51FD000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDFD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
21DA5490000
|
heap
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
20A3F50A000
|
trusted library allocation
|
page read and write
|
||
21D8C850000
|
heap
|
page readonly
|
||
2A5588E000
|
stack
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
20A3F8C4000
|
trusted library allocation
|
page read and write
|
||
24A38E24000
|
heap
|
page read and write
|
||
24A528AE000
|
heap
|
page read and write
|
||
20A56815000
|
heap
|
page read and write
|
||
21D9CCB0000
|
trusted library allocation
|
page read and write
|
||
9398A7E000
|
stack
|
page read and write
|
||
1EA38590000
|
trusted library allocation
|
page read and write
|
||
20A565A0000
|
heap
|
page read and write
|
||
21D8C9C1000
|
trusted library allocation
|
page read and write
|
||
20A3DF80000
|
trusted library allocation
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
20A56668000
|
heap
|
page read and write
|
||
7DF413430000
|
trusted library allocation
|
page execute and read and write
|
||
21DA4E71000
|
heap
|
page read and write
|
||
7FFD9BE25000
|
trusted library allocation
|
page read and write
|
||
20A56927000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
1BE0E000
|
stack
|
page read and write
|
||
24A4ABAA000
|
trusted library allocation
|
page read and write
|
||
20A3C790000
|
heap
|
page read and write
|
||
1EA29B33000
|
trusted library allocation
|
page read and write
|
||
21DA51C0000
|
heap
|
page read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page read and write
|
||
20A3EEB5000
|
trusted library allocation
|
page read and write
|
||
21D8C7F0000
|
heap
|
page read and write
|
||
21D8CE8D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD05000
|
trusted library allocation
|
page read and write
|
||
24A38FF0000
|
heap
|
page read and write
|
||
53EA07D000
|
stack
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
20A3ED3D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
20A3C7A5000
|
heap
|
page read and write
|
||
7FFD9BDD0000
|
trusted library allocation
|
page read and write
|
||
1B24E000
|
stack
|
page read and write
|
||
7FFD9B972000
|
trusted library allocation
|
page read and write
|
||
4FAB33E000
|
stack
|
page read and write
|
||
20A565BA000
|
heap
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
53EA47E000
|
stack
|
page read and write
|
||
24A38DEC000
|
heap
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
1AE1E000
|
stack
|
page read and write
|
||
1EA4086D000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDB0000
|
trusted library allocation
|
page read and write
|
||
20A4E430000
|
trusted library allocation
|
page read and write
|
||
9398877000
|
stack
|
page read and write
|
||
24A3B96C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA56000
|
trusted library allocation
|
page execute and read and write
|
||
24A53142000
|
heap
|
page read and write
|
||
21D8DC1A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page execute and read and write
|
||
24A52E9D000
|
heap
|
page read and write
|
||
7FFD9BCA2000
|
trusted library allocation
|
page read and write
|
||
1EA28EA3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDD0000
|
trusted library allocation
|
page execute and read and write
|
||
24A3BABD000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
1EA409B0000
|
trusted library allocation
|
page read and write
|
||
24A52DC0000
|
heap
|
page read and write
|
||
21D8C9B0000
|
heap
|
page execute and read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
1EA281AB000
|
heap
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page execute and read and write
|
||
20A56931000
|
heap
|
page read and write
|
||
7FFD9BD20000
|
trusted library allocation
|
page read and write
|
||
24A38E90000
|
heap
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCD8000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCC9000
|
trusted library allocation
|
page read and write
|
||
9398B7C000
|
stack
|
page read and write
|
||
2A54DBB000
|
stack
|
page read and write
|
||
7FFD9BDA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB52000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
20A567A0000
|
heap
|
page read and write
|
||
1EA29210000
|
trusted library allocation
|
page read and write
|
||
20A3F3E9000
|
trusted library allocation
|
page read and write
|
||
1B900000
|
heap
|
page read and write
|
||
7FFD9BCB4000
|
trusted library allocation
|
page read and write
|
||
53E9FF7000
|
stack
|
page read and write
|
||
20A3C6F0000
|
heap
|
page read and write
|
||
1EA40750000
|
heap
|
page execute and read and write
|
||
23A7000
|
trusted library allocation
|
page read and write
|
||
53E9D7E000
|
stack
|
page read and write
|
||
21D8AE89000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB4A000
|
trusted library allocation
|
page read and write
|
||
7DF4DCCC0000
|
trusted library allocation
|
page execute and read and write
|
||
24A38CA0000
|
heap
|
page read and write
|
||
24A38EE0000
|
heap
|
page read and write
|
||
1EA29667000
|
trusted library allocation
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
24A3C6C6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page execute and read and write
|
||
20A3FF43000
|
trusted library allocation
|
page read and write
|
||
7FFD9B974000
|
trusted library allocation
|
page read and write
|
||
21D9C9D0000
|
trusted library allocation
|
page read and write
|
||
24A38DEE000
|
heap
|
page read and write
|
||
1BD0B000
|
stack
|
page read and write
|
||
20A3E36A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
24A38DE0000
|
heap
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
1EA27F20000
|
trusted library allocation
|
page read and write
|
||
21D8C890000
|
heap
|
page read and write
|
||
7FFD9BB72000
|
trusted library allocation
|
page read and write
|
||
24A3C1F5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD08000
|
trusted library allocation
|
page read and write
|
||
20A3F356000
|
trusted library allocation
|
page read and write
|
||
1EA408F5000
|
heap
|
page read and write
|
||
7FFD9B9BD000
|
trusted library allocation
|
page execute and read and write
|
||
1EA4078E000
|
heap
|
page read and write
|
||
2351000
|
trusted library allocation
|
page read and write
|
||
4FAB2BD000
|
stack
|
page read and write
|
||
20A3C6B1000
|
heap
|
page read and write
|
||
8E0000
|
trusted library allocation
|
page read and write
|
||
20A5691E000
|
heap
|
page read and write
|
||
7FFD9BA56000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB41000
|
trusted library allocation
|
page read and write
|
||
20A3E000000
|
heap
|
page execute and read and write
|
||
20A3C5B0000
|
heap
|
page read and write
|
||
20A5614F000
|
heap
|
page read and write
|
||
1EA29208000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDA0000
|
trusted library allocation
|
page execute and read and write
|
||
1EA2920C000
|
trusted library allocation
|
page read and write
|
||
1EA264A0000
|
heap
|
page read and write
|
||
7FFD9BA46000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
20A566C0000
|
heap
|
page read and write
|
||
7FFD9BCF8000
|
trusted library allocation
|
page read and write
|
||
24A3C134000
|
trusted library allocation
|
page read and write
|
||
2A5580C000
|
stack
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
21D8AE70000
|
trusted library section
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
1EA2A0C6000
|
trusted library allocation
|
page read and write
|
||
2A547FA000
|
stack
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
21D8AE00000
|
heap
|
page read and write
|
||
1EA40780000
|
heap
|
page read and write
|
||
4FAAAF3000
|
stack
|
page read and write
|
||
53EAF4C000
|
stack
|
page read and write
|
||
21D8DBAF000
|
trusted library allocation
|
page read and write
|
||
24A38E26000
|
heap
|
page read and write
|
||
7FFD9B9EC000
|
trusted library allocation
|
page execute and read and write
|
||
93987F8000
|
stack
|
page read and write
|
||
7FFD9BCDC000
|
trusted library allocation
|
page read and write
|
||
2A54BB9000
|
stack
|
page read and write
|
||
7FFD9B992000
|
trusted library allocation
|
page read and write
|
||
21DA51EC000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
7FFD9BA86000
|
trusted library allocation
|
page execute and read and write
|
||
20A3F0DE000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA2C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
21DA50D0000
|
heap
|
page read and write
|
||
20A3E135000
|
heap
|
page read and write
|
||
24A3A7A0000
|
trusted library allocation
|
page read and write
|
||
20A3C750000
|
trusted library allocation
|
page read and write
|
||
1EA28328000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA56000
|
trusted library allocation
|
page read and write
|
||
965000
|
heap
|
page read and write
|
||
53EA176000
|
stack
|
page read and write
|
||
4FAC009000
|
stack
|
page read and write
|
||
24A38F50000
|
heap
|
page readonly
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB58000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
24A53127000
|
heap
|
page read and write
|
||
24A4AB90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC5000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
20A3C613000
|
heap
|
page read and write
|
||
7FFD9BDC0000
|
trusted library allocation
|
page read and write
|
||
20A568E4000
|
heap
|
page read and write
|
||
53EB0CC000
|
stack
|
page read and write
|
||
21D8AE25000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
569000
|
heap
|
page read and write
|
||
24A4AB8B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDB0000
|
trusted library allocation
|
page read and write
|
||
24A38FF5000
|
heap
|
page read and write
|
||
21DA4E75000
|
heap
|
page read and write
|
||
24A3B83D000
|
trusted library allocation
|
page read and write
|
||
24A52E94000
|
heap
|
page read and write
|
||
21D8D9F8000
|
trusted library allocation
|
page read and write
|
||
2A55A0E000
|
stack
|
page read and write
|
||
21D8D965000
|
trusted library allocation
|
page read and write
|
||
21DA4FF8000
|
heap
|
page read and write
|
||
21D8C810000
|
trusted library section
|
page read and write
|
||
53EB14C000
|
stack
|
page read and write
|
||
24A530D9000
|
heap
|
page read and write
|
||
1EA265D9000
|
heap
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
24A38DFE000
|
heap
|
page read and write
|
||
24A3BB50000
|
trusted library allocation
|
page read and write
|
||
1EA27ED0000
|
trusted library allocation
|
page read and write
|
||
93997CE000
|
stack
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page execute and read and write
|
||
1EA27F00000
|
heap
|
page readonly
|
||
20A567DE000
|
heap
|
page read and write
|
||
21D8C895000
|
heap
|
page read and write
|
||
939964E000
|
stack
|
page read and write
|
||
4FAAE7E000
|
stack
|
page read and write
|
||
24A5314B000
|
heap
|
page read and write
|
||
20A3F0E4000
|
trusted library allocation
|
page read and write
|
||
21D8DADD000
|
trusted library allocation
|
page read and write
|
||
21D8E7C4000
|
trusted library allocation
|
page read and write
|
||
20A3F202000
|
trusted library allocation
|
page read and write
|
||
2A54CBE000
|
stack
|
page read and write
|
||
1EA29A27000
|
trusted library allocation
|
page read and write
|
||
939867E000
|
stack
|
page read and write
|
||
1EA382A1000
|
trusted library allocation
|
page read and write
|
||
21DA4E47000
|
heap
|
page read and write
|
||
21D8AEE0000
|
heap
|
page read and write
|
||
1EA26590000
|
heap
|
page read and write
|
||
20A568B7000
|
heap
|
page read and write
|
||
7FFD9BD20000
|
trusted library allocation
|
page read and write
|
||
21D8DD8D000
|
trusted library allocation
|
page read and write
|
||
24A52EC0000
|
heap
|
page read and write
|
||
24A3A8A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCE9000
|
trusted library allocation
|
page read and write
|
||
1EA28CF2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
1EA28200000
|
heap
|
page read and write
|
||
24A4A8D1000
|
trusted library allocation
|
page read and write
|
||
24A3B8DB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page execute and read and write
|
||
2A548F7000
|
stack
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page read and write
|
||
1B34E000
|
stack
|
page read and write
|
||
20A3FF68000
|
trusted library allocation
|
page read and write
|
||
20A3F0B4000
|
trusted library allocation
|
page read and write
|
||
24A3AAC8000
|
trusted library allocation
|
page read and write
|
||
21D8DAEC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page execute and read and write
|
||
24A3B61A000
|
trusted library allocation
|
page read and write
|
||
20A3EB93000
|
trusted library allocation
|
page read and write
|
||
24A38DDD000
|
heap
|
page read and write
|
||
51B000
|
heap
|
page read and write
|
||
7FFD9BB21000
|
trusted library allocation
|
page read and write
|
||
1EA284C8000
|
trusted library allocation
|
page read and write
|
||
24A3B86F000
|
trusted library allocation
|
page read and write
|
||
53EA2FE000
|
stack
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
21D8AEDD000
|
heap
|
page read and write
|
||
21D8C820000
|
trusted library allocation
|
page read and write
|
||
4FABE8F000
|
stack
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB84000
|
trusted library allocation
|
page read and write
|
||
20A4E141000
|
trusted library allocation
|
page read and write
|
||
20A566CE000
|
heap
|
page read and write
|
||
53EAFC9000
|
stack
|
page read and write
|
||
20A566A0000
|
heap
|
page read and write
|
||
20A567D9000
|
heap
|
page read and write
|
||
20A3F147000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B993000
|
trusted library allocation
|
page execute and read and write
|
||
20A3C4B0000
|
heap
|
page read and write
|
||
56D000
|
heap
|
page read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
20A5668A000
|
heap
|
page read and write
|
||
7FFD9BD80000
|
trusted library allocation
|
page read and write
|
||
24A3B940000
|
trusted library allocation
|
page read and write
|
||
20A3E1C5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
4E5000
|
heap
|
page read and write
|
||
7FFD9BB32000
|
trusted library allocation
|
page read and write
|
||
913000
|
heap
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
20A569C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
24A3AD6D000
|
trusted library allocation
|
page read and write
|
||
1EA29219000
|
trusted library allocation
|
page read and write
|
||
20A4E51D000
|
trusted library allocation
|
page read and write
|
||
21D8AEC3000
|
heap
|
page read and write
|
||
1EA408BE000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
21DA521C000
|
heap
|
page read and write
|
||
12361000
|
trusted library allocation
|
page read and write
|
||
20A565FC000
|
heap
|
page read and write
|
||
1EA26720000
|
heap
|
page read and write
|
||
4FAB13F000
|
stack
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
21D8AE80000
|
heap
|
page read and write
|
||
1EA2A0CB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
24A38DC4000
|
heap
|
page read and write
|
||
20A566D3000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
21D8C880000
|
heap
|
page read and write
|
||
7FFD9BE00000
|
trusted library allocation
|
page read and write
|
||
20A3EFCC000
|
trusted library allocation
|
page read and write
|
||
24A38DA0000
|
heap
|
page read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
24A53310000
|
heap
|
page read and write
|
||
7FFD9BD63000
|
trusted library allocation
|
page read and write
|
||
1EA382C1000
|
trusted library allocation
|
page read and write
|
||
2A5487E000
|
stack
|
page read and write
|
||
21D8E145000
|
trusted library allocation
|
page read and write
|
||
1A380000
|
trusted library allocation
|
page read and write
|
||
24A3A7D0000
|
trusted library allocation
|
page read and write
|
||
21D8AEBF000
|
heap
|
page read and write
|
||
24A52E15000
|
heap
|
page read and write
|
||
939847C000
|
stack
|
page read and write
|
||
1EA40897000
|
heap
|
page read and write
|
||
7FFD9BD02000
|
trusted library allocation
|
page read and write
|
||
1EA2818F000
|
heap
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
939877E000
|
stack
|
page read and write
|
||
53E9E7E000
|
stack
|
page read and write
|
||
1EA294F2000
|
trusted library allocation
|
page read and write
|
||
20A3C7A0000
|
heap
|
page read and write
|
||
7FFD9B9BB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
24A52E21000
|
heap
|
page read and write
|
||
21D8AE93000
|
heap
|
page read and write
|
||
20A3FF63000
|
trusted library allocation
|
page read and write
|
||
53EA4FC000
|
stack
|
page read and write
|
||
93989FF000
|
stack
|
page read and write
|
||
7FFD9BDF6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDE0000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
20A3F1D6000
|
trusted library allocation
|
page read and write
|
||
20A5681D000
|
heap
|
page read and write
|
||
24A5311E000
|
heap
|
page read and write
|
||
7FFD9BD9A000
|
trusted library allocation
|
page read and write
|
||
1EA2919C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
21D8DBA4000
|
trusted library allocation
|
page read and write
|
||
20A4E42E000
|
trusted library allocation
|
page read and write
|
||
7DF40B700000
|
trusted library allocation
|
page execute and read and write
|
||
939974C000
|
stack
|
page read and write
|
||
1EA26682000
|
heap
|
page read and write
|
||
24A38F20000
|
trusted library allocation
|
page read and write
|
||
2A5497E000
|
stack
|
page read and write
|
||
20A56948000
|
heap
|
page read and write
|
||
20A3E130000
|
heap
|
page read and write
|
||
7FFD9B9CC000
|
trusted library allocation
|
page execute and read and write
|
||
1EA2921D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
24A3B837000
|
trusted library allocation
|
page read and write
|
||
24A38FB0000
|
heap
|
page read and write
|
||
53EB14E000
|
stack
|
page read and write
|
||
7FFD9BA5C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BE20000
|
trusted library allocation
|
page read and write
|
||
512000
|
heap
|
page read and write
|
||
20A3C760000
|
heap
|
page readonly
|
||
7FFD9BB82000
|
trusted library allocation
|
page read and write
|
||
1EA29335000
|
trusted library allocation
|
page read and write
|
||
24A3C028000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDE0000
|
trusted library allocation
|
page read and write
|
||
24A3BA84000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
12358000
|
trusted library allocation
|
page read and write
|
||
20A4E161000
|
trusted library allocation
|
page read and write
|
||
20A4E171000
|
trusted library allocation
|
page read and write
|
||
21D8D98D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
24A3C10D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDB0000
|
trusted library allocation
|
page execute and read and write
|
||
4FAB43E000
|
stack
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
20A568E0000
|
heap
|
page read and write
|
||
21D8AEBD000
|
heap
|
page read and write
|
||
7FFD9BA4C000
|
trusted library allocation
|
page execute and read and write
|
||
21D8D413000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
20A56883000
|
heap
|
page read and write
|
||
21D8D95F000
|
trusted library allocation
|
page read and write
|
||
1EA2954A000
|
trusted library allocation
|
page read and write
|
||
4FAAB7D000
|
stack
|
page read and write
|
||
2340000
|
heap
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
53EA1F9000
|
stack
|
page read and write
|
||
7FFD9BE06000
|
trusted library allocation
|
page read and write
|
||
1EA4083B000
|
heap
|
page read and write
|
||
20A565C3000
|
heap
|
page read and write
|
||
1B44E000
|
stack
|
page read and write
|
||
1EA266E0000
|
heap
|
page read and write
|
||
7FFD9BB82000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA76000
|
trusted library allocation
|
page execute and read and write
|
||
21DA51CB000
|
heap
|
page read and write
|
||
7FFD9B9BB000
|
trusted library allocation
|
page read and write
|
||
24A3B2F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9FC000
|
trusted library allocation
|
page execute and read and write
|
||
20A3ED3F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD2000
|
trusted library allocation
|
page read and write
|
||
1EA29301000
|
trusted library allocation
|
page read and write
|
||
1EA28171000
|
heap
|
page read and write
|
||
20A3C619000
|
heap
|
page read and write
|
||
20A3C615000
|
heap
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
24A3B879000
|
trusted library allocation
|
page read and write
|
||
1EA265F1000
|
heap
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
1EA2661D000
|
heap
|
page read and write
|
||
2A5477E000
|
stack
|
page read and write
|
||
24A52E4F000
|
heap
|
page read and write
|
||
2A54A3E000
|
stack
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
24A3A880000
|
heap
|
page execute and read and write
|
||
24A52E90000
|
heap
|
page read and write
|
||
24A3A890000
|
heap
|
page read and write
|
||
1EA27EF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
1EA3858B000
|
trusted library allocation
|
page read and write
|
||
2A55909000
|
stack
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF9000
|
trusted library allocation
|
page read and write
|
||
1EA26710000
|
trusted library section
|
page read and write
|
||
24A52D90000
|
trusted library allocation
|
page read and write
|
||
1EA27F10000
|
heap
|
page read and write
|
||
7DF419D40000
|
trusted library allocation
|
page execute and read and write
|
||
1B6AA000
|
stack
|
page read and write
|
||
1EA3859A000
|
trusted library allocation
|
page read and write
|
||
939897B000
|
stack
|
page read and write
|
||
20A3C730000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
24A38F40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B97D000
|
trusted library allocation
|
page execute and read and write
|
||
4E2000
|
heap
|
page read and write
|
||
20A3F96A000
|
trusted library allocation
|
page read and write
|
||
70000
|
unkown
|
page readonly
|
||
4FAC10C000
|
stack
|
page read and write
|
||
8F3000
|
trusted library allocation
|
page read and write
|
||
53EAECE000
|
stack
|
page read and write
|
||
21D8DC72000
|
trusted library allocation
|
page read and write
|
||
20A565C5000
|
heap
|
page read and write
|
||
1EA280C0000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
24A38F60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
21DA4FCA000
|
heap
|
page read and write
|
||
21D9CA32000
|
trusted library allocation
|
page read and write
|
||
21D8E312000
|
trusted library allocation
|
page read and write
|
||
21D8AF06000
|
heap
|
page read and write
|
||
24A3BBB0000
|
trusted library allocation
|
page read and write
|
||
1EA293C5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB78000
|
trusted library allocation
|
page read and write
|
||
24A4A912000
|
trusted library allocation
|
page read and write
|
||
53E9DFE000
|
stack
|
page read and write
|
||
7FFD9BDC0000
|
trusted library allocation
|
page read and write
|
||
20A4E438000
|
trusted library allocation
|
page read and write
|
||
1EA2661A000
|
heap
|
page read and write
|
||
939954E000
|
stack
|
page read and write
|
||
1AFEA000
|
heap
|
page read and write
|
||
1AF50000
|
heap
|
page read and write
|
||
24A5307C000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
1EA408EA000
|
heap
|
page read and write
|
||
1EA2A081000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA86000
|
trusted library allocation
|
page execute and read and write
|
||
1EA280C5000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
9398AFE000
|
stack
|
page read and write
|
||
7FFD9BA5C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BDB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE10000
|
trusted library allocation
|
page read and write
|
||
1EA28227000
|
heap
|
page execute and read and write
|
||
7FFD9BD9A000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
stack
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
1EA266B0000
|
heap
|
page read and write
|
||
7FFD9BB5A000
|
trusted library allocation
|
page read and write
|
||
24A3C6CC000
|
trusted library allocation
|
page read and write
|
||
53E99FF000
|
stack
|
page read and write
|
||
21D8DCD3000
|
trusted library allocation
|
page read and write
|
||
20A56A80000
|
heap
|
page read and write
|
||
21DA52F0000
|
trusted library allocation
|
page read and write
|
||
53EA37E000
|
stack
|
page read and write
|
||
20A3F9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
20A3F9A9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDED000
|
trusted library allocation
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCA3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD9C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
21D8AF59000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1B14E000
|
stack
|
page read and write
|
||
7FFD9B98B000
|
trusted library allocation
|
page read and write
|
||
7DF40B710000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
21D8AE30000
|
heap
|
page read and write
|
||
20A568F7000
|
heap
|
page read and write
|
||
24A52E17000
|
heap
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
7FFD9BD20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A2000
|
trusted library allocation
|
page read and write
|
||
93981DE000
|
stack
|
page read and write
|
||
12351000
|
trusted library allocation
|
page read and write
|
||
93986F6000
|
stack
|
page read and write
|
||
20A568F5000
|
heap
|
page read and write
|
||
4FAB3BE000
|
stack
|
page read and write
|
||
93985F9000
|
stack
|
page read and write
|
||
7FFD9B99D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BD02000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
4FAB239000
|
stack
|
page read and write
|
||
20A4E448000
|
trusted library allocation
|
page read and write
|
||
24A52EAD000
|
heap
|
page read and write
|
||
1EA2901D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD9C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD30000
|
trusted library allocation
|
page read and write
|
||
1B7A4000
|
stack
|
page read and write
|
||
21D8CBE9000
|
trusted library allocation
|
page read and write
|
||
24A4A8C1000
|
trusted library allocation
|
page read and write
|
||
21DA4EAB000
|
heap
|
page read and write
|
||
7FFD9BDFF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCE4000
|
trusted library allocation
|
page read and write
|
||
1EA29215000
|
trusted library allocation
|
page read and write
|
||
20A56825000
|
heap
|
page read and write
|
||
4A6000
|
heap
|
page read and write
|
||
7FFD9BD0C000
|
trusted library allocation
|
page read and write
|
||
1EA408A0000
|
heap
|
page read and write
|
||
1EA2922A000
|
trusted library allocation
|
page read and write
|
||
20A3E100000
|
heap
|
page execute and read and write
|
||
7FFD9BDE6000
|
trusted library allocation
|
page read and write
|
||
4FAB0F7000
|
stack
|
page read and write
|
||
7FFD9BC13000
|
trusted library allocation
|
page read and write
|
||
1EA26690000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
BC000
|
unkown
|
page readonly
|
||
1EA29361000
|
trusted library allocation
|
page read and write
|
||
93988FA000
|
stack
|
page read and write
|
||
7FFD9BB88000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
4FAABFE000
|
stack
|
page read and write
|
||
24A38DE4000
|
heap
|
page read and write
|
||
20A3E60E000
|
trusted library allocation
|
page read and write
|
||
7DF4DCCB0000
|
trusted library allocation
|
page execute and read and write
|
||
20A3C770000
|
trusted library allocation
|
page read and write
|
||
20A567E5000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
939857F000
|
stack
|
page read and write
|
||
1EA40670000
|
heap
|
page read and write
|
||
7FFD9B9A3000
|
trusted library allocation
|
page execute and read and write
|
||
4FAC18E000
|
stack
|
page read and write
|
||
24A52FC0000
|
heap
|
page read and write
|
||
7FF475720000
|
trusted library allocation
|
page execute and read and write
|
||
70000
|
unkown
|
page readonly
|
||
123A3000
|
trusted library allocation
|
page read and write
|
||
21DA51FF000
|
heap
|
page read and write
|
||
1EA281D0000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB88000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
24A52E28000
|
heap
|
page read and write
|
||
9398193000
|
stack
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB42000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
2A5467E000
|
stack
|
page read and write
|
||
7FFD9B9AB000
|
trusted library allocation
|
page read and write
|
||
4FAAF7E000
|
stack
|
page read and write
|
||
1EA280A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCC3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9EC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BDC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDF0000
|
trusted library allocation
|
page read and write
|
||
24A53032000
|
heap
|
page read and write
|
||
7FFD9BD13000
|
trusted library allocation
|
page read and write
|
||
20A565EA000
|
heap
|
page read and write
|
||
53EA3FE000
|
stack
|
page read and write
|
||
940000
|
heap
|
page execute and read and write
|
||
24A38FB5000
|
heap
|
page read and write
|
||
7FFD9BA26000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCD3000
|
trusted library allocation
|
page read and write
|
||
20A3ED47000
|
trusted library allocation
|
page read and write
|
||
20A3C60D000
|
heap
|
page read and write
|
||
21DA51B1000
|
heap
|
page read and write
|
||
21D8AEC7000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
2320000
|
heap
|
page execute and read and write
|
||
7FFD9BB51000
|
trusted library allocation
|
page read and write
|
||
21D8ADF0000
|
heap
|
page read and write
|
||
20A3F234000
|
trusted library allocation
|
page read and write
|
||
21D9CCAB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE01000
|
trusted library allocation
|
page read and write
|
||
24A3BC6B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
21D8E79F000
|
trusted library allocation
|
page read and write
|
||
24A53138000
|
heap
|
page read and write
|
||
24A53150000
|
heap
|
page read and write
|
||
20A56922000
|
heap
|
page read and write
|
||
24A5305A000
|
heap
|
page read and write
|
||
21D9CCB8000
|
trusted library allocation
|
page read and write
|
||
2A54AB9000
|
stack
|
page read and write
|
||
24A38D80000
|
heap
|
page read and write
|
||
7FFD9BD80000
|
trusted library allocation
|
page read and write
|
||
24A3B4A6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9FC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
21D9CD32000
|
trusted library allocation
|
page read and write
|
||
24A38DE8000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
20A3C60F000
|
heap
|
page read and write
|
||
1EA408C8000
|
heap
|
page read and write
|
||
7FFD9BDAC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
21D9C9C1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
20A3C5D0000
|
heap
|
page read and write
|
||
2A54B38000
|
stack
|
page read and write
|
||
7FFD9BD70000
|
trusted library allocation
|
page read and write
|
||
23AD000
|
trusted library allocation
|
page read and write
|
||
1EA29B0C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A2000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
1EA29204000
|
trusted library allocation
|
page read and write
|
||
21D8C840000
|
trusted library allocation
|
page read and write
|
||
1EA2820D000
|
heap
|
page read and write
|
||
21D8E22A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
2A543C3000
|
stack
|
page read and write
|
||
21D8C89A000
|
heap
|
page read and write
|
||
4FAAEF9000
|
stack
|
page read and write
|
||
4FAB4BB000
|
stack
|
page read and write
|
||
1EA292D8000
|
trusted library allocation
|
page read and write
|
||
4AC000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BDA0000
|
trusted library allocation
|
page read and write
|
||
20A3F173000
|
trusted library allocation
|
page read and write
|
||
1EA281E9000
|
heap
|
page read and write
|
||
20A3E007000
|
heap
|
page execute and read and write
|
||
4FABF8E000
|
stack
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
2A5578E000
|
stack
|
page read and write
|
||
24A3A926000
|
trusted library allocation
|
page read and write
|
||
21D8AE20000
|
heap
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
1EA38592000
|
trusted library allocation
|
page read and write
|
||
93995CC000
|
stack
|
page read and write
|
||
20A3E141000
|
trusted library allocation
|
page read and write
|
||
24A52DCC000
|
heap
|
page read and write
|
||
24A3C681000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE10000
|
trusted library allocation
|
page read and write
|
||
4CA000
|
heap
|
page read and write
|
||
1EA28EB1000
|
trusted library allocation
|
page read and write
|
||
21D8DA5B000
|
trusted library allocation
|
page read and write
|
||
20A56937000
|
heap
|
page read and write
|
||
20A3C5F4000
|
heap
|
page read and write
|
||
1EA265DF000
|
heap
|
page read and write
|
||
1AD1D000
|
stack
|
page read and write
|
||
21D8AF04000
|
heap
|
page read and write
|
||
21D8AEC1000
|
heap
|
page read and write
|
||
20A3C655000
|
heap
|
page read and write
|
||
1EA40980000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
20A3F41A000
|
trusted library allocation
|
page read and write
|
||
24A38DE2000
|
heap
|
page read and write
|
||
1EA29BF4000
|
trusted library allocation
|
page read and write
|
||
1EA295AB000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB51000
|
trusted library allocation
|
page read and write
|
||
586000
|
heap
|
page read and write
|
||
21D8DD51000
|
trusted library allocation
|
page read and write
|
||
20A4E1B0000
|
trusted library allocation
|
page read and write
|
||
20A3C5D8000
|
heap
|
page read and write
|
||
21DA50A0000
|
heap
|
page execute and read and write
|
||
24A53100000
|
heap
|
page read and write
|
||
7FFD9BDF7000
|
trusted library allocation
|
page read and write
|
||
2A549F7000
|
stack
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
||
20A3F4CA000
|
trusted library allocation
|
page read and write
|
||
21D8DA87000
|
trusted library allocation
|
page read and write
|
||
24A3C6A7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A4000
|
trusted library allocation
|
page read and write
|
||
2A54D3E000
|
stack
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
7DF4DCCD0000
|
trusted library allocation
|
page execute and read and write
|
||
20A3F31D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
7FFD9BE20000
|
trusted library allocation
|
page read and write
|
||
1EA385AA000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB42000
|
trusted library allocation
|
page read and write
|
||
1EA26700000
|
trusted library section
|
page read and write
|
||
21D8D9CC000
|
trusted library allocation
|
page read and write
|
||
1EA382D1000
|
trusted library allocation
|
page read and write
|
||
1A350000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD90000
|
trusted library allocation
|
page read and write
|
||
21DA4E10000
|
heap
|
page read and write
|
||
1EA28120000
|
heap
|
page read and write
|
||
21DA4F10000
|
heap
|
page execute and read and write
|
||
4FAAFF7000
|
stack
|
page read and write
|
||
21D9CC08000
|
trusted library allocation
|
page read and write
|
||
24A38EA0000
|
heap
|
page read and write
|
||
7FFD9BDC6000
|
trusted library allocation
|
page read and write
|
||
21D9C9F1000
|
trusted library allocation
|
page read and write
|
||
1EA27F50000
|
trusted library allocation
|
page read and write
|
||
24A3B49C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
21DA4FC6000
|
heap
|
page read and write
|
||
20A3E070000
|
heap
|
page execute and read and write
|
||
1EA38598000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7DF413440000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
21D8CA35000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCC4000
|
trusted library allocation
|
page read and write
|
||
24A4AB9A000
|
trusted library allocation
|
page read and write
|
||
1AFDE000
|
heap
|
page read and write
|
||
21D9CCC9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
1EA2A0A6000
|
trusted library allocation
|
page read and write
|
||
93984FE000
|
stack
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
2A546FE000
|
stack
|
page read and write
|
||
24A3B9CF000
|
trusted library allocation
|
page read and write
|
||
53EA0F9000
|
stack
|
page read and write
|
||
1EA26725000
|
heap
|
page read and write
|
||
1EA281A0000
|
heap
|
page read and write
|
||
1EA28126000
|
heap
|
page read and write
|
||
4FAB1B8000
|
stack
|
page read and write
|
||
7FFD9BCFC000
|
trusted library allocation
|
page read and write
|
||
20A4E429000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
23BD000
|
trusted library allocation
|
page read and write
|
||
24A3B8AF000
|
trusted library allocation
|
page read and write
|
||
24A5300C000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1EA28220000
|
heap
|
page execute and read and write
|
||
20A5680D000
|
heap
|
page read and write
|
||
7FFD9BD60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B973000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BE00000
|
trusted library allocation
|
page read and write
|
||
20A3C590000
|
heap
|
page read and write
|
||
24A38E29000
|
heap
|
page read and write
|
||
7FFD9BCF4000
|
trusted library allocation
|
page read and write
|
||
1EA26598000
|
heap
|
page read and write
|
||
20A3F44D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD30000
|
trusted library allocation
|
page read and write
|
||
20A56819000
|
heap
|
page read and write
|
||
53E9C73000
|
stack
|
page read and write
|
||
4FAB07D000
|
stack
|
page read and write
|
||
7FFD9BB84000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB74000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
21D8D993000
|
trusted library allocation
|
page read and write
|
||
21D9C9E1000
|
trusted library allocation
|
page read and write
|
||
20A5684A000
|
heap
|
page read and write
|
||
1EA282A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
2A5598C000
|
stack
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page execute and read and write
|
||
24A3C0CE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD0A000
|
trusted library allocation
|
page read and write
|
||
1EA2876D000
|
trusted library allocation
|
page read and write
|
||
24A52FE6000
|
heap
|
page read and write
|
||
24A52DB0000
|
heap
|
page execute and read and write
|
||
7FFD9BCD3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B994000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB54000
|
trusted library allocation
|
page read and write
|
||
7DF419D50000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
24A3B611000
|
trusted library allocation
|
page read and write
|
||
24A4AB92000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB5A000
|
trusted library allocation
|
page read and write
|
||
20A3FA91000
|
trusted library allocation
|
page read and write
|
||
24A3A860000
|
heap
|
page execute and read and write
|
||
7FFD9BD08000
|
trusted library allocation
|
page read and write
|
||
1A8DD000
|
stack
|
page read and write
|
||
53E9CFE000
|
stack
|
page read and write
|
||
24A53129000
|
heap
|
page read and write
|
||
21D8C860000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB2A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
21D8D73D000
|
trusted library allocation
|
page read and write
|
||
1B8DE000
|
stack
|
page read and write
|
||
20A4E36F000
|
trusted library allocation
|
page read and write
|
||
21DA4F16000
|
heap
|
page execute and read and write
|
||
21DA4FC0000
|
heap
|
page read and write
|
||
1EA265D1000
|
heap
|
page read and write
|
||
24A4A8A1000
|
trusted library allocation
|
page read and write
|
||
20A3C62D000
|
heap
|
page read and write
|
||
7FFD9BDD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCF4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
53E9F7F000
|
stack
|
page read and write
|
||
21DA4FD3000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
53EB04C000
|
stack
|
page read and write
|
||
20A5661D000
|
heap
|
page read and write
|
||
1EA27F97000
|
heap
|
page read and write
|
||
7FFD9BD0C000
|
trusted library allocation
|
page read and write
|
||
1EA408CA000
|
heap
|
page read and write
|
||
8F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
21D8C8D0000
|
trusted library allocation
|
page read and write
|
||
21D8E251000
|
trusted library allocation
|
page read and write
|
||
230E000
|
stack
|
page read and write
|
||
517000
|
heap
|
page read and write
|
||
21D8E7E9000
|
trusted library allocation
|
page read and write
|
||
20A3C5E2000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
20A3F267000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page execute and read and write
|
There are 861 hidden memdumps, click here to show them.