IOC Report
SecuriteInfo.com.Trojan.Inject4.56087.24588.10142.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.Inject4.56087.24588.10142.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SecuriteInfo.com.Trojan.Inject4.56087.24588.10142.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Roaming\XsdType\Target.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\XsdType\Target.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Target.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0lavtjam.fny.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_50wdy5ob.v4u.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_55p0ehha.sje.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uywlj2m2.cg1.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject4.56087.24588.10142.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject4.56087.24588.10142.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
malicious
C:\Users\user\AppData\Roaming\XsdType\Target.exe
C:\Users\user\AppData\Roaming\XsdType\Target.exe
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
malicious
C:\Users\user\AppData\Roaming\XsdType\Target.exe
C:\Users\user\AppData\Roaming\XsdType\Target.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://ion=v4.535umer
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://github.com/mgravell/protobuf-net
unknown
https://cdn.discordapp.com/attachments/1301574231573663746/1301575510102507551/plugin3.dll?ex=6724fa27&is=6723a8a7&hm=de75ef4bcda6b9340b0357973edbc8ae95f493136ccb6eede12840c8370e40e0&
162.159.135.233
https://files.catbox.moe/kwfxr7.dll
unknown
https://cdn.discordapp.com/attachments/1301574231573663746/1301575510102507551/plugin3.dll?ex=6724fa
unknown
https://github.com/Pester/Pester
unknown
https://files.catbox.moe/k541xr.dll0
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://aka.ms/pscore68
unknown
https://files.catbox.moe/k541xr.dll
unknown
http://schemas.micO
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fla1337.site
147.189.173.36
cdn.discordapp.com
162.159.135.233

IPs

IP
Domain
Country
Malicious
147.189.173.36
fla1337.site
United Kingdom
162.159.135.233
cdn.discordapp.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\26d19999dcc6916aedeba96cfef5e476
4925efb44414aafd197e64f6f86a9439
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RegAsm_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\26d19999dcc6916aedeba96cfef5e476
9F5D511A35C11A2E2510B2394FAB93EC
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1DC43F58000
trusted library allocation
page read and write
malicious
1FC10306000
trusted library allocation
page read and write
malicious
1FC00346000
trusted library allocation
page read and write
malicious
1FC105D6000
trusted library allocation
page read and write
malicious
1B0CAC76000
trusted library allocation
page read and write
malicious
1FC00001000
trusted library allocation
page read and write
malicious
1DC42495000
heap
page read and write
malicious
1B0CABD6000
trusted library allocation
page read and write
malicious
1B0BA6A1000
trusted library allocation
page read and write
malicious
1FC70500000
trusted library section
page read and write
malicious
1FC10536000
trusted library allocation
page read and write
malicious
1F51E306000
trusted library allocation
page read and write
malicious
1DC43F8E000
trusted library allocation
page read and write
malicious
1F51E536000
trusted library allocation
page read and write
malicious
1DC43E21000
trusted library allocation
page read and write
malicious
1F51E5D6000
trusted library allocation
page read and write
malicious
1F50E018000
trusted library allocation
page read and write
malicious
1DC44454000
trusted library allocation
page read and write
7FFD9B924000
trusted library allocation
page read and write
1B0D2EF8000
heap
page read and write
1DC5418E000
trusted library allocation
page read and write
1B0D32A5000
heap
page read and write
4B6D9BE000
stack
page read and write
1DC440A5000
trusted library allocation
page read and write
1FC001A1000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
1FC0027E000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
1FC10007000
trusted library allocation
page read and write
1DC4415E000
trusted library allocation
page read and write
1DC4433E000
trusted library allocation
page read and write
7FFD9B934000
trusted library allocation
page read and write
1DC44474000
trusted library allocation
page read and write
1FC001F0000
trusted library allocation
page read and write
1FC00212000
trusted library allocation
page read and write
7FFD9B9A5000
trusted library allocation
page read and write
1FC00589000
trusted library allocation
page read and write
1B0D315A000
heap
page read and write
1DC442E8000
trusted library allocation
page read and write
1B0BA9F5000
trusted library allocation
page read and write
1D145285000
heap
page read and write
7FFD9B99B000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1B0D2F60000
heap
page read and write
1FC70460000
heap
page read and write
1DC44075000
trusted library allocation
page read and write
1FC729AD000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1F50C5C5000
heap
page read and write
1B0D2F0C000
heap
page read and write
1B0B8AAC000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
1DC441B9000
trusted library allocation
page read and write
1DC42435000
heap
page read and write
1DC5CAFB000
heap
page read and write
1D145248000
heap
page read and write
3B123F7000
stack
page read and write
1B0D2EB1000
heap
page read and write
1DC4244F000
heap
page read and write
1B0BAA10000
trusted library allocation
page read and write
1B0BAB3B000
trusted library allocation
page read and write
1B0D3340000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1DC44321000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
1DC44390000
trusted library allocation
page read and write
7FFD9B7B4000
trusted library allocation
page read and write
75375FE000
stack
page read and write
1DC44358000
trusted library allocation
page read and write
1DC443E2000
trusted library allocation
page read and write
1DC53FC8000
trusted library allocation
page read and write
1D12C2B0000
heap
page read and write
1B0B8A6B000
heap
page read and write
1B0BA86A000
trusted library allocation
page read and write
1B0BA9C8000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
1B0CAD17000
trusted library allocation
page read and write
9B4BBFE000
stack
page read and write
1D13CA5F000
trusted library allocation
page read and write
1B0D3242000
heap
page read and write
1D1449F7000
heap
page read and write
1B0D3122000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
1D12C820000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1DC4447F000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
1FC721A4000
heap
page read and write
1DC440B9000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
1DC4434E000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
1FC729F6000
heap
page read and write
7FFD9B99F000
trusted library allocation
page read and write
1B0D3388000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
1B0B8A80000
heap
page read and write
1FC10001000
trusted library allocation
page read and write
1FC702C0000
heap
page read and write
1B0D3119000
heap
page read and write
7FFD9B986000
trusted library allocation
page read and write
1FC72C0E000
heap
page read and write
1B0BACB9000
trusted library allocation
page read and write
1F50C37F000
heap
page read and write
1DC44189000
trusted library allocation
page read and write
7FFD9B8B0000
trusted library allocation
page execute and read and write
7FFD9B984000
trusted library allocation
page read and write
1D12D966000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1DC4411A000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FFD9BAA3000
trusted library allocation
page read and write
1B0D338B000
heap
page read and write
1FC00250000
trusted library allocation
page read and write
4B6D47E000
stack
page read and write
7FFD9B954000
trusted library allocation
page read and write
1DC4439A000
trusted library allocation
page read and write
1FC0056F000
trusted library allocation
page read and write
1D1451D3000
heap
page read and write
1FC70290000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1DC44369000
trusted library allocation
page read and write
1DC442E2000
trusted library allocation
page read and write
1B0BA922000
trusted library allocation
page read and write
1FC72BE2000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
1FC0019B000
trusted library allocation
page read and write
1D12E7D2000
trusted library allocation
page read and write
1DC5CB1C000
heap
page read and write
1B0D331D000
heap
page read and write
1B0CA7F2000
trusted library allocation
page read and write
1B0BAC1F000
trusted library allocation
page read and write
1F50C6F0000
heap
page read and write
1B0BAB0F000
trusted library allocation
page read and write
1FC72ADB000
heap
page read and write
3B13BF9000
stack
page read and write
1FC003CC000
trusted library allocation
page read and write
1DC44081000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
1D144EFA000
heap
page read and write
1D12E21F000
trusted library allocation
page read and write
1D1452CE000
heap
page read and write
1FC70303000
heap
page read and write
1DC54356000
trusted library allocation
page read and write
1DC44055000
trusted library allocation
page read and write
1B0D3392000
heap
page read and write
1B0D2F6B000
heap
page read and write
7FFD9B990000
trusted library allocation
page execute and read and write
1D12C940000
heap
page execute and read and write
4B6D5F9000
stack
page read and write
1DC4451C000
trusted library allocation
page read and write
7FFD9B988000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
1DC44110000
trusted library allocation
page read and write
1B0B8A00000
heap
page read and write
1FC7282E000
heap
page read and write
1DC443AE000
trusted library allocation
page read and write
1D12E817000
trusted library allocation
page read and write
1DC44175000
trusted library allocation
page read and write
1DC42523000
trusted library allocation
page read and write
7FFD9B94F000
trusted library allocation
page read and write
1F50C2E0000
heap
page read and write
1B0D31A4000
heap
page read and write
75379FE000
stack
page read and write
1F50C6F5000
heap
page read and write
1DC443B3000
trusted library allocation
page read and write
1FC7285B000
heap
page read and write
1FC7287E000
heap
page read and write
1FC00128000
trusted library allocation
page read and write
7FFD9B925000
trusted library allocation
page read and write
4B6E58D000
stack
page read and write
7FFD9B7AD000
trusted library allocation
page execute and read and write
1DC5CB4D000
heap
page read and write
1FC72B7F000
heap
page read and write
1FC728A5000
heap
page read and write
1B0CA74E000
trusted library allocation
page read and write
1D12CC1A000
trusted library allocation
page read and write
1B0BAC53000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1FC72BE5000
heap
page read and write
1FC72763000
heap
page read and write
C22EFFF000
stack
page read and write
1B0D2F01000
heap
page read and write
1FC7285E000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
C22E7FF000
stack
page read and write
1FC00318000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
1D12E179000
trusted library allocation
page read and write
1D12DD32000
trusted library allocation
page read and write
4B6D93C000
stack
page read and write
1B0D3399000
heap
page read and write
1DC4430F000
trusted library allocation
page read and write
1D12D9FB000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
1DC4434A000
trusted library allocation
page read and write
7FFD9B876000
trusted library allocation
page execute and read and write
1B0D339C000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
1DC42455000
heap
page read and write
1B0D2E81000
heap
page read and write
3B157FA000
stack
page read and write
1DC443C0000
trusted library allocation
page read and write
1DC4244B000
heap
page read and write
1FC72B45000
heap
page read and write
1FC7288D000
heap
page read and write
1DC42580000
heap
page read and write
1B0D337B000
heap
page read and write
3B113FF000
stack
page read and write
1D12DBD0000
trusted library allocation
page read and write
1DC42493000
heap
page read and write
7FFD9B995000
trusted library allocation
page read and write
1B0B8AB1000
heap
page read and write
7FFD9B96F000
trusted library allocation
page read and write
1B0D2FFE000
heap
page read and write
1D13C9F1000
trusted library allocation
page read and write
9B4A3FE000
stack
page read and write
7FFD9B9AD000
trusted library allocation
page read and write
3B143FB000
stack
page read and write
1B0D2F1D000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
1DC423F0000
heap
page read and write
1B0CACC7000
trusted library allocation
page read and write
1DC44404000
trusted library allocation
page read and write
1DC5CCF0000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
7FFD9BB63000
trusted library allocation
page read and write
1FC7034A000
heap
page read and write
1B0BA777000
trusted library allocation
page read and write
1FC7277A000
heap
page read and write
1B0BAAC7000
trusted library allocation
page read and write
1FC72884000
heap
page read and write
7FFD9B84C000
trusted library allocation
page execute and read and write
1DC443C7000
trusted library allocation
page read and write
1DC5CAE0000
heap
page read and write
1B0D30C6000
heap
page read and write
1FC702EA000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
1D14525A000
heap
page read and write
1B0D3013000
heap
page read and write
1B0B8D00000
heap
page read and write
1D12C296000
heap
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
1B0BAA5B000
trusted library allocation
page read and write
1B0BAB6B000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
1B0BA7C5000
trusted library allocation
page read and write
1DC440FF000
trusted library allocation
page read and write
1D145040000
heap
page read and write
1DC44297000
trusted library allocation
page read and write
1DC443EC000
trusted library allocation
page read and write
1F50C379000
heap
page read and write
1FC72C00000
heap
page read and write
7FFD9B937000
trusted library allocation
page read and write
1B0D2EA4000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
1B0BA841000
trusted library allocation
page read and write
1FC7280D000
heap
page read and write
7FFD9B99E000
trusted library allocation
page read and write
1D12C9A0000
heap
page execute and read and write
1DC44451000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
1DC44353000
trusted library allocation
page read and write
1DC443A7000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1FC70590000
heap
page read and write
1DC4245B000
heap
page read and write
1D12C9E0000
heap
page read and write
1B0D3261000
heap
page read and write
7FFD9BA10000
trusted library allocation
page execute and read and write
1D12C7E0000
trusted library section
page read and write
1FC72874000
heap
page read and write
1DC442CA000
trusted library allocation
page read and write
1F51E001000
trusted library allocation
page read and write
1FC72B14000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1FC003ED000
trusted library allocation
page read and write
1DC5415A000
trusted library allocation
page read and write
1FC729C4000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1B0BA779000
trusted library allocation
page read and write
1DC4407C000
trusted library allocation
page read and write
7FFD9B93D000
trusted library allocation
page read and write
4B6D6B6000
stack
page read and write
1DC4440C000
trusted library allocation
page read and write
1D12C830000
heap
page readonly
7FFD9B7AB000
trusted library allocation
page execute and read and write
1FC70030000
unkown
page readonly
1D12C9F1000
trusted library allocation
page read and write
1FC001DB000
trusted library allocation
page read and write
1D12D963000
trusted library allocation
page read and write
1DC440B0000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1FC00496000
trusted library allocation
page read and write
1DC44377000
trusted library allocation
page read and write
1FC00149000
trusted library allocation
page read and write
1DC44145000
trusted library allocation
page read and write
1B0D2E9F000
heap
page read and write
7FFD9B850000
trusted library allocation
page execute and read and write
1D1451FA000
heap
page read and write
1D13CA11000
trusted library allocation
page read and write
1FC728B6000
heap
page read and write
1B0BAC2C000
trusted library allocation
page read and write
1DC440F7000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
7FFD9BAF0000
trusted library allocation
page read and write
1DC4432B000
trusted library allocation
page read and write
1DC4411C000
trusted library allocation
page read and write
1FC72849000
heap
page read and write
1FC72B60000
heap
page read and write
1F50C5C0000
heap
page read and write
1B0D2FDD000
heap
page read and write
1D13CCE6000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B7EC000
trusted library allocation
page execute and read and write
1DC44386000
trusted library allocation
page read and write
1FC725F0000
trusted library section
page read and write
1B0D3187000
heap
page read and write
1B0D32C7000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1B0D3173000
heap
page read and write
1B0D2E70000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
1FC0025D000
trusted library allocation
page read and write
7FFD9B8CB000
trusted library allocation
page execute and read and write
1B0D3383000
heap
page read and write
1FC702FF000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
1D12D601000
trusted library allocation
page read and write
1B0D30FA000
heap
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
1B0D312C000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
1DC44459000
trusted library allocation
page read and write
1D12E285000
trusted library allocation
page read and write
1FC106DB000
trusted library allocation
page read and write
1B0BA81A000
trusted library allocation
page read and write
7FFD9B98F000
trusted library allocation
page read and write
1D144E7E000
heap
page read and write
9B49BE0000
stack
page read and write
1B0BA814000
trusted library allocation
page read and write
1DC53FE6000
trusted library allocation
page read and write
1DC5C805000
heap
page read and write
1F50C3A5000
heap
page read and write
1F50DFF0000
heap
page execute and read and write
1B0D30C0000
heap
page read and write
7FFD9B797000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page execute and read and write
4B6D3FA000
stack
page read and write
1DC4406D000
trusted library allocation
page read and write
1D12C445000
heap
page read and write
1FC71E10000
heap
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
1D145052000
heap
page read and write
1D12C8A0000
trusted library allocation
page read and write
7FFD9B95F000
trusted library allocation
page read and write
1B0BA8C8000
trusted library allocation
page read and write
7FFD9B7BD000
trusted library allocation
page execute and read and write
1B0BA91C000
trusted library allocation
page read and write
1FC72B9C000
heap
page read and write
75389FE000
stack
page read and write
1FC002DA000
trusted library allocation
page read and write
1DC4430D000
trusted library allocation
page read and write
1DC42675000
heap
page read and write
1FC7032E000
heap
page read and write
1D13CA21000
trusted library allocation
page read and write
1FC00135000
trusted library allocation
page read and write
1B0CADD5000
trusted library allocation
page read and write
1B0BAB9F000
trusted library allocation
page read and write
4B6E48E000
stack
page read and write
1F51E0AE000
trusted library allocation
page read and write
1B0D335B000
heap
page read and write
4B6D7B7000
stack
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
4B6DA3B000
stack
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9BBE0000
trusted library allocation
page read and write
1B0D32AC000
heap
page read and write
1FC00178000
trusted library allocation
page read and write
1D12D9DF000
trusted library allocation
page read and write
1B0BACAC000
trusted library allocation
page read and write
1D14504C000
heap
page read and write
1DC44060000
trusted library allocation
page read and write
1B0D2F21000
heap
page read and write
1DC4448E000
trusted library allocation
page read and write
1FC70595000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
4B6D4F9000
stack
page read and write
1DC5CB25000
heap
page read and write
1D145010000
heap
page execute and read and write
1DC44094000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
1B0BA79B000
trusted library allocation
page read and write
1B0D3248000
heap
page read and write
7FFD9B98F000
trusted library allocation
page read and write
1B0BA8BB000
trusted library allocation
page read and write
1B0B8CC0000
heap
page execute and read and write
1B0D33AC000
heap
page read and write
1D12DB16000
trusted library allocation
page read and write
1DC44107000
trusted library allocation
page read and write
1FC729C8000
heap
page read and write
1FC71D90000
trusted library section
page read and write
1DC440F3000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page execute and read and write
1B0BAA26000
trusted library allocation
page read and write
1B0BAAD5000
trusted library allocation
page read and write
1B0BAB99000
trusted library allocation
page read and write
1DC444B3000
trusted library allocation
page read and write
1DC44477000
trusted library allocation
page read and write
1FC7286B000
heap
page read and write
7FFD9B98C000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page execute and read and write
1B0BABB4000
trusted library allocation
page read and write
1DC42670000
heap
page read and write
1B0BA8A8000
trusted library allocation
page read and write
1F51E677000
trusted library allocation
page read and write
1FC702C6000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
1DC441D7000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
7FFD9B7A0000
trusted library allocation
page read and write
1FC700E6000
unkown
page readonly
1FC7275D000
heap
page read and write
1B0B8920000
heap
page read and write
1D12C7F0000
trusted library section
page read and write
1DC5C1A6000
heap
page read and write
1DC42520000
trusted library allocation
page read and write
C22D3E0000
stack
page read and write
7FFD9B95F000
trusted library allocation
page read and write
1B0D2EC2000
heap
page read and write
C22DBFE000
stack
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
1FC002A4000
trusted library allocation
page read and write
1B0CA6A1000
trusted library allocation
page read and write
1B0D2FCA000
heap
page read and write
1DC442F3000
trusted library allocation
page read and write
1DC53FD9000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1B0D2FCE000
heap
page read and write
1DC442E6000
trusted library allocation
page read and write
7FFD9B943000
trusted library allocation
page read and write
1B0BAB20000
trusted library allocation
page read and write
1FC704FE000
heap
page read and write
4B6D37E000
stack
page read and write
1B0B8AAA000
heap
page read and write
1FC72A35000
heap
page read and write
1DC440D7000
trusted library allocation
page read and write
7FFD9BA92000
trusted library allocation
page read and write
1FC72B38000
heap
page read and write
1D12C29C000
heap
page read and write
1B0CA9A6000
trusted library allocation
page read and write
1D12D989000
trusted library allocation
page read and write
1F50C367000
heap
page read and write
1D12E346000
trusted library allocation
page read and write
1DC444B5000
trusted library allocation
page read and write
1B0B8B90000
trusted library allocation
page read and write
1FC72759000
heap
page read and write
7FFD9B93A000
trusted library allocation
page read and write
3B0F99E000
stack
page read and write
1F50C650000
heap
page read and write
7FFD9BAAA000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1FC703E0000
trusted library allocation
page read and write
1FC70170000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1FC0010E000
trusted library allocation
page read and write
1B0D33A2000
heap
page read and write
1B0CA866000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
1DC42370000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
3B11BFD000
stack
page read and write
1F51E1C6000
trusted library allocation
page read and write
1F50C348000
heap
page read and write
1FC729D8000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
1F50C3FD000
heap
page read and write
1D12C2D7000
heap
page read and write
1FC72B3B000
heap
page read and write
1F526030000
trusted library allocation
page read and write
1FC004D4000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B99E000
trusted library allocation
page read and write
1FC7276C000
heap
page read and write
1DC5C660000
trusted library allocation
page read and write
1DC4445C000
trusted library allocation
page read and write
1DC443A9000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
1DC44465000
trusted library allocation
page read and write
1FC72794000
heap
page read and write
1DC44487000
trusted library allocation
page read and write
1FC72BD0000
heap
page read and write
1B0D30CB000
heap
page read and write
1DC44152000
trusted library allocation
page read and write
7536DE1000
stack
page read and write
1F50C550000
trusted library allocation
page read and write
1DC442FA000
trusted library allocation
page read and write
1DC443F3000
trusted library allocation
page read and write
1B0D2F30000
heap
page read and write
1F51E1A9000
trusted library allocation
page read and write
1D145143000
heap
page read and write
1B0BA870000
trusted library allocation
page read and write
7537DFC000
stack
page read and write
1D144E40000
heap
page read and write
1FC704F0000
heap
page read and write
1DC5CB74000
heap
page read and write
1FC727CF000
heap
page read and write
1DC423F5000
heap
page read and write
1F51E3CD000
trusted library allocation
page read and write
1D1451D7000
heap
page read and write
1B0D2F2B000
heap
page read and write
1DC44493000
trusted library allocation
page read and write
1D12C292000
heap
page read and write
7FFD9B94F000
trusted library allocation
page read and write
1FC727B5000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1DC44069000
trusted library allocation
page read and write
1DC442F5000
trusted library allocation
page read and write
1FC71D40000
trusted library section
page read and write
1FC00524000
trusted library allocation
page read and write
4B6D8BE000
stack
page read and write
1B0D31E3000
heap
page read and write
1FC002ED000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9B7A4000
trusted library allocation
page read and write
1B0BAB50000
trusted library allocation
page read and write
1B0BA8E3000
trusted library allocation
page read and write
1FC00531000
trusted library allocation
page read and write
4B6E68E000
stack
page read and write
1DC42410000
heap
page read and write
7FFD9BAB2000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page read and write
1B0D32BA000
heap
page read and write
1FC0053F000
trusted library allocation
page read and write
1F51E3F5000
trusted library allocation
page read and write
1FC7294A000
heap
page read and write
1D1452BD000
heap
page read and write
1DC442FC000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
3B0FFE1000
stack
page read and write
75371FE000
stack
page read and write
1F50C620000
heap
page execute and read and write
1B0B8B40000
heap
page read and write
1FC7276F000
heap
page read and write
1DC53FC1000
trusted library allocation
page read and write
1DC44002000
trusted library allocation
page read and write
3B10BFA000
stack
page read and write
1B0B8AFA000
heap
page read and write
7FFD9B93C000
trusted library allocation
page read and write
1DC44370000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
1D12E7F8000
trusted library allocation
page read and write
1FC00228000
trusted library allocation
page read and write
1DC4412B000
trusted library allocation
page read and write
7FFD9B937000
trusted library allocation
page read and write
1DC44132000
trusted library allocation
page read and write
1B0BA690000
heap
page read and write
1B0BAC46000
trusted library allocation
page read and write
1DC44170000
trusted library allocation
page read and write
7FFD9B996000
trusted library allocation
page read and write
1B0D3138000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
1FC72743000
heap
page read and write
1B0CA849000
trusted library allocation
page read and write
1FC004BB000
trusted library allocation
page read and write
1B0D2E95000
heap
page read and write
1DC44472000
trusted library allocation
page read and write
9B4A7FE000
stack
page read and write
1B0D300D000
heap
page read and write
1B0B8B34000
heap
page read and write
1FC72B54000
heap
page read and write
1FC0030A000
trusted library allocation
page read and write
1B0D3282000
heap
page read and write
1FC72C07000
heap
page read and write
1B0BAA02000
trusted library allocation
page read and write
7DF416C90000
trusted library allocation
page execute and read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
1FC72782000
heap
page read and write
1DC4440E000
trusted library allocation
page read and write
1B0BA87D000
trusted library allocation
page read and write
1D12D9E9000
trusted library allocation
page read and write
1DC443F1000
trusted library allocation
page read and write
1DC44364000
trusted library allocation
page read and write
7FFD9B772000
trusted library allocation
page read and write
1D12DCFE000
trusted library allocation
page read and write
1B0B8BC0000
trusted library allocation
page read and write
1DC441BE000
trusted library allocation
page read and write
1B0D3348000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1FC7278E000
heap
page read and write
1DC4437A000
trusted library allocation
page read and write
3B147FA000
stack
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
1FC10753000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
1B0BAC6E000
trusted library allocation
page read and write
9B4ABFC000
stack
page read and write
1DC4443F000
trusted library allocation
page read and write
1DC5CAF0000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
1DC442DF000
trusted library allocation
page read and write
1FC72BCA000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1DC4435D000
trusted library allocation
page read and write
3B103FA000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1FC729D3000
heap
page read and write
1DC44137000
trusted library allocation
page read and write
1FC70270000
heap
page read and write
1FC7284E000
heap
page read and write
7FFD9BADC000
trusted library allocation
page read and write
1B0BAADC000
trusted library allocation
page read and write
7FFD9B94C000
trusted library allocation
page read and write
3B12FFA000
stack
page read and write
3B107FE000
stack
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
1D144EC0000
heap
page read and write
3B133FE000
stack
page read and write
1FC002FC000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
9B49FFE000
stack
page read and write
1DC442DC000
trusted library allocation
page read and write
1DC440C0000
trusted library allocation
page read and write
1B0BACD9000
trusted library allocation
page read and write
4B6D83F000
stack
page read and write
1DC44314000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1FC7032A000
heap
page read and write
1B0D2FEB000
heap
page read and write
7FFD9B927000
trusted library allocation
page read and write
1FC0026A000
trusted library allocation
page read and write
3B13FFA000
stack
page read and write
1F50E001000
trusted library allocation
page read and write
1B0D2F66000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
4B6E60C000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1FC0041C000
trusted library allocation
page read and write
1FC72B23000
heap
page read and write
1F50C37C000
heap
page read and write
1DC440D9000
trusted library allocation
page read and write
7FFD9B9AE000
trusted library allocation
page read and write
1DC53ECE000
trusted library allocation
page read and write
1D14527A000
heap
page read and write
1FC001BB000
trusted library allocation
page read and write
1DC44196000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
1B0D3179000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1DC5C693000
heap
page execute and read and write
1B0D2FC4000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
1FC72B0C000
heap
page read and write
7FFD9B9BE000
trusted library allocation
page read and write
1B0B8C40000
heap
page execute and read and write
3B10FFC000
stack
page read and write
C22EBFE000
stack
page read and write
1B0BA863000
trusted library allocation
page read and write
1DC444A9000
trusted library allocation
page read and write
1B0D2EBA000
heap
page read and write
1DC4242F000
heap
page read and write
1DC444A4000
trusted library allocation
page read and write
1FC70336000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1DC44077000
trusted library allocation
page read and write
1B0BA919000
trusted library allocation
page read and write
7FF4B7D20000
trusted library allocation
page execute and read and write
1FC00430000
trusted library allocation
page read and write
1B0BA9DC000
trusted library allocation
page read and write
7FFD9B793000
trusted library allocation
page execute and read and write
1D12C1F0000
heap
page read and write
1DC42600000
heap
page execute and read and write
7FFD9B836000
trusted library allocation
page read and write
1DC5CB6E000
heap
page read and write
1FC727A9000
heap
page read and write
1FC72BB6000
heap
page read and write
75381FD000
stack
page read and write
3B12BFA000
stack
page read and write
1D12D779000
trusted library allocation
page read and write
1D12E81C000
trusted library allocation
page read and write
1FC103F4000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1B0D32BE000
heap
page read and write
1B0D32EE000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
1F50E00C000
trusted library allocation
page read and write
1FC702EC000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7FFD9B790000
trusted library allocation
page read and write
1B0BAB8B000
trusted library allocation
page read and write
1DC42459000
heap
page read and write
1FC72720000
heap
page execute and read and write
1D12C800000
trusted library allocation
page read and write
4B6E507000
stack
page read and write
1B0BAAF6000
trusted library allocation
page read and write
1F50C340000
heap
page read and write
1DC4431E000
trusted library allocation
page read and write
7FFD9B98D000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
1B0D31B7000
heap
page read and write
1B0BAA76000
trusted library allocation
page read and write
1D144E96000
heap
page read and write
7FFD9B92A000
trusted library allocation
page read and write
1DC5BE50000
trusted library allocation
page read and write
1B0D2EF1000
heap
page read and write
1DC53FA5000
trusted library allocation
page read and write
1F51E627000
trusted library allocation
page read and write
4B6E40E000
stack
page read and write
1D13CCDC000
trusted library allocation
page read and write
1FC00423000
trusted library allocation
page read and write
7FFD9B8B9000
trusted library allocation
page execute and read and write
7FFD9B7BB000
trusted library allocation
page execute and read and write
1DC5C7B0000
heap
page read and write
4B6CFC3000
stack
page read and write
1B0B8D05000
heap
page read and write
4B6D63E000
stack
page read and write
1FC00338000
trusted library allocation
page read and write
1FC00482000
trusted library allocation
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
1B0D30E9000
heap
page read and write
1B0D2ED1000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
1B0BAA97000
trusted library allocation
page read and write
1B0BAA2C000
trusted library allocation
page read and write
7FFD9B958000
trusted library allocation
page read and write
1DC442AB000
trusted library allocation
page read and write
9B4B3FF000
stack
page read and write
1FC00575000
trusted library allocation
page read and write
1B0B8A20000
heap
page read and write
1B0D31AE000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1FC72808000
heap
page read and write
1DC443DD000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
1DC42270000
heap
page read and write
1D1451D5000
heap
page read and write
3B14BFF000
stack
page read and write
1FC71E50000
trusted library allocation
page read and write
1DC4417C000
trusted library allocation
page read and write
7FFD9B92F000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
1FC001E2000
trusted library allocation
page read and write
1D145120000
heap
page read and write
1F50C2F0000
heap
page read and write
1DC4417A000
trusted library allocation
page read and write
1B0D2F12000
heap
page read and write
7FFD9B9B8000
trusted library allocation
page read and write
1B0BA9A7000
trusted library allocation
page read and write
7FFD9B9A5000
trusted library allocation
page read and write
1B0D3218000
heap
page read and write
1FC72B72000
heap
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
1B0D32C0000
heap
page read and write
1DC5C640000
heap
page execute and read and write
7FFD9BAD0000
trusted library allocation
page read and write
1DC443CE000
trusted library allocation
page read and write
1FC72AD0000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1D12DAB3000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
7FFD9B929000
trusted library allocation
page read and write
1DC441D2000
trusted library allocation
page read and write
1DC444AE000
trusted library allocation
page read and write
C22DFFE000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1FC7297E000
heap
page read and write
4B6D738000
stack
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
1D12D9F7000
trusted library allocation
page read and write
1B0BAA1F000
trusted library allocation
page read and write
1FC70351000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1D12DDBC000
trusted library allocation
page read and write
1DC4449A000
trusted library allocation
page read and write
1D12D958000
trusted library allocation
page read and write
1B0D2EDA000
heap
page read and write
1D13CCF6000
trusted library allocation
page read and write
1DC54126000
trusted library allocation
page read and write
3B14FF9000
stack
page read and write
7FFD9B997000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1B0BABCF000
trusted library allocation
page read and write
1FC7283A000
heap
page read and write
1B0D2F50000
heap
page read and write
1D12C895000
heap
page read and write
1DC44099000
trusted library allocation
page read and write
1DC42510000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
1DC443FD000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1B0BA7D9000
trusted library allocation
page read and write
1B0D2EC5000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
1FC72930000
heap
page read and write
1DC53E21000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1B0D2EAF000
heap
page read and write
9B4AFFD000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
4B6D2FF000
stack
page read and write
1B0D322E000
heap
page read and write
75385FE000
stack
page read and write
1D12C9D0000
trusted library allocation
page read and write
1D12C110000
heap
page read and write
1D12C890000
heap
page read and write
1D12D444000
trusted library allocation
page read and write
1DC44481000
trusted library allocation
page read and write
1B0D33A0000
heap
page read and write
1DC541E1000
trusted library allocation
page read and write
1DC44337000
trusted library allocation
page read and write
1FC005A2000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
1FC004CD000
trusted library allocation
page read and write
1DC444A2000
trusted library allocation
page read and write
7DF416C80000
trusted library allocation
page execute and read and write
1D12DD7C000
trusted library allocation
page read and write
7FFD9B99C000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
1D14513F000
heap
page read and write
1D145017000
heap
page execute and read and write
1F50C570000
trusted library allocation
page read and write
1B0D2F5B000
heap
page read and write
1FC72774000
heap
page read and write
1B0D2ECD000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
1B0D26D0000
trusted library allocation
page read and write
1B0B8A40000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1FC727C7000
heap
page read and write
1FC004B5000
trusted library allocation
page read and write
7FFD9B96F000
trusted library allocation
page read and write
1DC42390000
heap
page read and write
1FC72730000
heap
page read and write
1FC7298F000
heap
page read and write
1DC42418000
heap
page read and write
1D145243000
heap
page read and write
7FFD9B947000
trusted library allocation
page read and write
1FC7039E000
heap
page read and write
1DC444AB000
trusted library allocation
page read and write
1FC7294E000
heap
page read and write
1B0D31EA000
heap
page read and write
1B0BA92F000
trusted library allocation
page read and write
1DC42350000
heap
page read and write
1DC54215000
trusted library allocation
page read and write
1FC72830000
heap
page read and write
7FFD9BB00000
trusted library allocation
page read and write
1DC44292000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1DC4444C000
trusted library allocation
page read and write
1DC440F0000
trusted library allocation
page read and write
1F50C310000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1F50C510000
heap
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
1FC72B2E000
heap
page read and write
1B0D3246000
heap
page read and write
1D1452C7000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
1B0BACD3000
trusted library allocation
page read and write
1FC72787000
heap
page read and write
1FC72BF1000
heap
page read and write
1D145290000
heap
page read and write
1DC44467000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1D12C210000
heap
page read and write
1D12C2DB000
heap
page read and write
1D1451BF000
heap
page read and write
3B117FF000
stack
page read and write
1B0D3310000
heap
page read and write
1DC5C690000
heap
page execute and read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
3B11FFA000
stack
page read and write
1B0B8A82000
heap
page read and write
1B0B8BAB000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1FC72BE0000
heap
page read and write
1DC442BE000
trusted library allocation
page read and write
3B127FC000
stack
page read and write
1DC441C8000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
1D13CCD8000
trusted library allocation
page read and write
1FC72B6D000
heap
page read and write
1FC72A40000
heap
page read and write
C22D7FF000
stack
page read and write
1D12CA78000
trusted library allocation
page read and write
1D12C259000
heap
page read and write
1B0BA4B4000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
1B0B8BA0000
heap
page read and write
1FC70250000
heap
page read and write
1D12DC9C000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1DC423E0000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
1B0D3015000
heap
page read and write
1F51E1A1000
trusted library allocation
page read and write
1FC72B30000
heap
page read and write
1FC70032000
unkown
page readonly
7FFD9BA80000
trusted library allocation
page read and write
C22E3FD000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1FC0013C000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1F51E152000
trusted library allocation
page read and write
1FC72834000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
1B0D3177000
heap
page read and write
7FFD9B995000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
1B0BAB34000
trusted library allocation
page read and write
7FFD9B92B000
trusted library allocation
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
1D12C440000
heap
page read and write
1D12CEC0000
trusted library allocation
page read and write
1B0BAB42000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1B0BACE6000
trusted library allocation
page read and write
1D12C420000
heap
page read and write
1D145205000
heap
page read and write
1D12C8D0000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
1DC4446D000
trusted library allocation
page read and write
1D14514F000
heap
page read and write
4B6D57D000
stack
page read and write
1B0BA807000
trusted library allocation
page read and write
1B0D325F000
heap
page read and write
1B0BA8CF000
trusted library allocation
page read and write
1F50C3AA000
heap
page read and write
1FC00325000
trusted library allocation
page read and write
1DC443D6000
trusted library allocation
page read and write
1D12C290000
heap
page read and write
7538DFE000
stack
page read and write
1DC440D2000
trusted library allocation
page read and write
1FC72899000
heap
page read and write
4B6D27E000
stack
page read and write
3B137FE000
stack
page read and write
1FC004AF000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
1D12C29A000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
1FC103ED000
trusted library allocation
page read and write
1FC001CE000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
1B0D2FC0000
heap
page read and write
1D12E25E000
trusted library allocation
page read and write
7FFD9BA04000
trusted library allocation
page read and write
1DC44126000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1DC4246B000
heap
page read and write
1FC002B1000
trusted library allocation
page read and write
1D12D9ED000
trusted library allocation
page read and write
1D12D95C000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
1B0BABE9000
trusted library allocation
page read and write
3B0F9DE000
stack
page read and write
1B0D31FB000
heap
page read and write
1B0D328E000
heap
page read and write
9B4B7FE000
stack
page read and write
1B0B8A46000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
1B0BA8F0000
trusted library allocation
page read and write
1DC441A3000
trusted library allocation
page read and write
1B0BA8DC000
trusted library allocation
page read and write
1FC00298000
trusted library allocation
page read and write
1DC44154000
trusted library allocation
page read and write
7FFD9BAC9000
trusted library allocation
page read and write
1B0BABA6000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
1D145044000
heap
page read and write
7FFD9B826000
trusted library allocation
page read and write
1DC44343000
trusted library allocation
page read and write
1D12C250000
heap
page read and write
1DC442A3000
trusted library allocation
page read and write
1FC0048F000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
7FFD9B920000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1FC004A9000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1D12C840000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1FC7295A000
heap
page read and write
1FC70400000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7DF416C70000
trusted library allocation
page execute and read and write
1DC442C3000
trusted library allocation
page read and write
1B0B8BA5000
heap
page read and write
1DC53F72000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
1FC7287A000
heap
page read and write
7FFD9B826000
trusted library allocation
page read and write
1FC000E7000
trusted library allocation
page read and write
1FC00114000
trusted library allocation
page read and write
1D144F20000
heap
page read and write
1DC4441C000
trusted library allocation
page read and write
7FFD9B9AF000
trusted library allocation
page read and write
1DC442A1000
trusted library allocation
page read and write
1D12D955000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1B0BA969000
trusted library allocation
page read and write
1B0BA7B8000
trusted library allocation
page read and write
1B0BA78B000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1FC704F5000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
There are 1024 hidden memdumps, click here to show them.