Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
18fvs4AVae.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\VLC_Media.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ydybnru.pye.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4mqpufjx.445.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cs4xvllz.2eu.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e0gmtdxn.qhm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gkg3mn5d.100.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_igj1vjc1.cmq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iyqsndom.0xl.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oph1kxjd.htd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pjzxblcs.pz0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qqjkkage.p2o.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_swg2tfos.lam.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tjxdpdwh.w1i.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uaa2hjgv.xxw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w0d5b5d3.coe.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x1cznaaq.xer.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yqvsoues.4p0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VLC_Media.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Nov 23 18:55:55
2024, mtime=Sat Nov 23 18:55:55 2024, atime=Sat Nov 23 18:55:55 2024, length=51200, window=hide
|
dropped
|
There are 11 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\18fvs4AVae.exe
|
"C:\Users\user\Desktop\18fvs4AVae.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\18fvs4AVae.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '18fvs4AVae.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\VLC_Media.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'VLC_Media.exe'
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
45.141.26.170
|
|||
http://crl.microsg
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.microsoft.
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://crl.micr
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://crl.microsVa
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
There are 10 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.141.26.170
|
unknown
|
Netherlands
|
||
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\18fvs4AVae_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
482000
|
unkown
|
page readonly
|
||
2771000
|
trusted library allocation
|
page read and write
|
||
7DF46F080000
|
trusted library allocation
|
page execute and read and write
|
||
16B69979000
|
trusted library allocation
|
page read and write
|
||
1AD1ECC8000
|
heap
|
page read and write
|
||
2D1A0DA7000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBCD000
|
trusted library allocation
|
page read and write
|
||
1B586CF000
|
stack
|
page read and write
|
||
7FFD9B91A000
|
trusted library allocation
|
page read and write
|
||
7DF4A3560000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page execute and read and write
|
||
1CEFE32A000
|
heap
|
page read and write
|
||
252E7F7000
|
stack
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
2D1A1B36000
|
trusted library allocation
|
page read and write
|
||
2D1AFD31000
|
trusted library allocation
|
page read and write
|
||
1AD38DE0000
|
heap
|
page read and write
|
||
252EC7C000
|
stack
|
page read and write
|
||
7FFD9B942000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
25A27D3000
|
stack
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1C19E000
|
stack
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
16B67980000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
1AD30891000
|
trusted library allocation
|
page read and write
|
||
1CEFE535000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
12782000
|
trusted library allocation
|
page read and write
|
||
1AD21933000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1CE98A14000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
1B67F000
|
stack
|
page read and write
|
||
7FFD9B866000
|
trusted library allocation
|
page execute and read and write
|
||
16B65F55000
|
heap
|
page read and write
|
||
2D1A0DD3000
|
trusted library allocation
|
page read and write
|
||
16B77B60000
|
trusted library allocation
|
page read and write
|
||
DD3000
|
trusted library allocation
|
page read and write
|
||
1CEFE2FD000
|
heap
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1CE80246000
|
trusted library allocation
|
page read and write
|
||
1CEFE250000
|
heap
|
page read and write
|
||
2D19FD97000
|
trusted library allocation
|
page read and write
|
||
16B67870000
|
heap
|
page readonly
|
||
2D19DF8D000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
1B14B000
|
stack
|
page read and write
|
||
2D19E267000
|
heap
|
page execute and read and write
|
||
2D19E190000
|
trusted library section
|
page read and write
|
||
1AD1ECDE000
|
heap
|
page read and write
|
||
2D19E1A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
1CE988C0000
|
heap
|
page read and write
|
||
7FFD9B952000
|
trusted library allocation
|
page read and write
|
||
1AD1EED6000
|
heap
|
page execute and read and write
|
||
1AAFF000
|
heap
|
page read and write
|
||
2D19FB68000
|
heap
|
page read and write
|
||
1C1DF000
|
stack
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
480000
|
unkown
|
page readonly
|
||
7FFD9B922000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
1CE9868A000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1B9BE000
|
stack
|
page read and write
|
||
1CE80060000
|
trusted library allocation
|
page read and write
|
||
1AD220D8000
|
trusted library allocation
|
page read and write
|
||
1CEFE2E7000
|
heap
|
page read and write
|
||
7FFD9BAD2000
|
trusted library allocation
|
page read and write
|
||
25A3C0D000
|
stack
|
page read and write
|
||
2D19FB50000
|
heap
|
page read and write
|
||
7FFD9B931000
|
trusted library allocation
|
page read and write
|
||
7FFD9B826000
|
trusted library allocation
|
page read and write
|
||
1AD38CEC000
|
heap
|
page read and write
|
||
7FFD9BAE2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
252EB7F000
|
stack
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
5D1000
|
stack
|
page read and write
|
||
1CE98693000
|
heap
|
page read and write
|
||
1CE98A5F000
|
heap
|
page read and write
|
||
1CE904AE000
|
trusted library allocation
|
page read and write
|
||
7DF4DB680000
|
trusted library allocation
|
page execute and read and write
|
||
16B00095000
|
heap
|
page read and write
|
||
1B57877000
|
stack
|
page read and write
|
||
2D1B0004000
|
trusted library allocation
|
page read and write
|
||
2D1B826D000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
252E3CE000
|
stack
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
252EAFE000
|
stack
|
page read and write
|
||
883000
|
heap
|
page read and write
|
||
16B68E2C000
|
trusted library allocation
|
page read and write
|
||
1AD38C7F000
|
heap
|
page read and write
|
||
1B5884E000
|
stack
|
page read and write
|
||
2D1A1B16000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC8000
|
trusted library allocation
|
page read and write
|
||
1B57979000
|
stack
|
page read and write
|
||
F0172FD000
|
stack
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1AD3902A000
|
heap
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
1C7E0000
|
heap
|
page read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
1B524000
|
heap
|
page read and write
|
||
252F74B000
|
stack
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
2D19FD11000
|
trusted library allocation
|
page read and write
|
||
7FFD9B964000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
2D1B8050000
|
heap
|
page read and write
|
||
2D19E220000
|
trusted library allocation
|
page read and write
|
||
252F8CE000
|
stack
|
page read and write
|
||
2D1A01DD000
|
trusted library allocation
|
page read and write
|
||
25A303E000
|
stack
|
page read and write
|
||
16B68D63000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC3000
|
trusted library allocation
|
page read and write
|
||
8CE000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
F017AFB000
|
stack
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
1AD21C3B000
|
trusted library allocation
|
page read and write
|
||
2760000
|
heap
|
page execute and read and write
|
||
1CE98928000
|
heap
|
page read and write
|
||
25A2BF9000
|
stack
|
page read and write
|
||
16B001E6000
|
heap
|
page execute and read and write
|
||
84C000
|
heap
|
page read and write
|
||
16B68DFC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B783000
|
trusted library allocation
|
page execute and read and write
|
||
16B67985000
|
heap
|
page read and write
|
||
16B00280000
|
heap
|
page read and write
|
||
2600000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
1CE988C8000
|
heap
|
page read and write
|
||
1AD38EE0000
|
trusted library allocation
|
page read and write
|
||
1CE98C60000
|
heap
|
page read and write
|
||
16B77B51000
|
trusted library allocation
|
page read and write
|
||
1AD1ED2C000
|
heap
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
2D1AFD11000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
16B004F1000
|
heap
|
page read and write
|
||
16B6874F000
|
trusted library allocation
|
page read and write
|
||
2D1A1097000
|
trusted library allocation
|
page read and write
|
||
25A2CF9000
|
stack
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
1CE981CB000
|
heap
|
page read and write
|
||
2D19FCE0000
|
trusted library allocation
|
page read and write
|
||
2D1A0EEC000
|
trusted library allocation
|
page read and write
|
||
16B68749000
|
trusted library allocation
|
page read and write
|
||
1AD38EF0000
|
heap
|
page read and write
|
||
7FFD9B77B000
|
trusted library allocation
|
page read and write
|
||
2D1A0C84000
|
trusted library allocation
|
page read and write
|
||
F017273000
|
stack
|
page read and write
|
||
91D000
|
heap
|
page read and write
|
||
7FFD9B974000
|
trusted library allocation
|
page read and write
|
||
1CE987B0000
|
heap
|
page read and write
|
||
2D1B8250000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
1B5874C000
|
stack
|
page read and write
|
||
1CE811C5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBC6000
|
trusted library allocation
|
page read and write
|
||
1AD206D0000
|
trusted library allocation
|
page read and write
|
||
1B577FE000
|
stack
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page execute and read and write
|
||
16B00567000
|
heap
|
page read and write
|
||
7FFD9B948000
|
trusted library allocation
|
page read and write
|
||
1B587CE000
|
stack
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
1CEFE2E9000
|
heap
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
F0173FE000
|
stack
|
page read and write
|
||
1AD1EBE0000
|
heap
|
page read and write
|
||
7FFD9B836000
|
trusted library allocation
|
page read and write
|
||
1AD220FF000
|
trusted library allocation
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
F0175F7000
|
stack
|
page read and write
|
||
7FFD9B954000
|
trusted library allocation
|
page read and write
|
||
BC5000
|
heap
|
page read and write
|
||
1CE904BC000
|
trusted library allocation
|
page read and write
|
||
25A2D7D000
|
stack
|
page read and write
|
||
16B6605D000
|
heap
|
page read and write
|
||
2D1B000A000
|
trusted library allocation
|
page read and write
|
||
1AD2264D000
|
trusted library allocation
|
page read and write
|
||
F017A7F000
|
stack
|
page read and write
|
||
16B004BB000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
7FFD9B972000
|
trusted library allocation
|
page read and write
|
||
1CE98634000
|
heap
|
page read and write
|
||
1C6DA000
|
stack
|
page read and write
|
||
2D1B80F2000
|
heap
|
page read and write
|
||
F01797E000
|
stack
|
page read and write
|
||
16B693BB000
|
trusted library allocation
|
page read and write
|
||
1CE81946000
|
trusted library allocation
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBD6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
2D19DF59000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
16B00000000
|
trusted library allocation
|
page read and write
|
||
1AD1ECE4000
|
heap
|
page read and write
|
||
1CEFE2DD000
|
heap
|
page read and write
|
||
2D19FC70000
|
heap
|
page execute and read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1CE98717000
|
heap
|
page execute and read and write
|
||
480000
|
unkown
|
page readonly
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
2D1A157C000
|
trusted library allocation
|
page read and write
|
||
2D1B83A1000
|
heap
|
page read and write
|
||
16B65FAC000
|
heap
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
1AD30B64000
|
trusted library allocation
|
page read and write
|
||
1CE81502000
|
trusted library allocation
|
page read and write
|
||
16B00070000
|
heap
|
page read and write
|
||
1CE90235000
|
trusted library allocation
|
page read and write
|
||
1AD21656000
|
trusted library allocation
|
page read and write
|
||
1B4DF000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1CE988CC000
|
heap
|
page read and write
|
||
16B65FA6000
|
heap
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
1B57AFE000
|
stack
|
page read and write
|
||
F0174F9000
|
stack
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
1AD38CCE000
|
heap
|
page read and write
|
||
2D1A1019000
|
trusted library allocation
|
page read and write
|
||
252EA7E000
|
stack
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
1CE904CC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
7FFD9B792000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
1B57B7F000
|
stack
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
2D19DFDB000
|
heap
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
1AD21654000
|
trusted library allocation
|
page read and write
|
||
1AD21AC6000
|
trusted library allocation
|
page read and write
|
||
25A3E0C000
|
stack
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
16B65FA8000
|
heap
|
page read and write
|
||
252E978000
|
stack
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
1BE5C000
|
stack
|
page read and write
|
||
16B0053D000
|
heap
|
page read and write
|
||
7FFD9BB6A000
|
trusted library allocation
|
page read and write
|
||
1AD30B5D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
2D1B80FD000
|
heap
|
page read and write
|
||
F0185CC000
|
stack
|
page read and write
|
||
2D1A0C8D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
1AD1EEF5000
|
heap
|
page read and write
|
||
2D1AFFFE000
|
trusted library allocation
|
page read and write
|
||
2D19DF9B000
|
heap
|
page read and write
|
||
91A000
|
heap
|
page read and write
|
||
1AD20865000
|
heap
|
page read and write
|
||
2D1B8278000
|
heap
|
page read and write
|
||
2D1B0002000
|
trusted library allocation
|
page read and write
|
||
16B65FBE000
|
heap
|
page read and write
|
||
1AD308A1000
|
trusted library allocation
|
page read and write
|
||
1C7DC000
|
stack
|
page read and write
|
||
252EBFE000
|
stack
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
2D1B8170000
|
heap
|
page read and write
|
||
252E8F7000
|
stack
|
page read and write
|
||
1B320000
|
heap
|
page read and write
|
||
7FFD9B7DC000
|
trusted library allocation
|
page execute and read and write
|
||
2D19E120000
|
heap
|
page read and write
|
||
16B000E8000
|
heap
|
page read and write
|
||
16B65FA4000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
16B67840000
|
trusted library allocation
|
page read and write
|
||
2D1A10D5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
1AD22697000
|
trusted library allocation
|
page read and write
|
||
2D1AFD84000
|
trusted library allocation
|
page read and write
|
||
1CE8146D000
|
trusted library allocation
|
page read and write
|
||
2D19DF8F000
|
heap
|
page read and write
|
||
16B00551000
|
heap
|
page read and write
|
||
25A2E3F000
|
stack
|
page read and write
|
||
2D19FCD0000
|
heap
|
page read and write
|
||
7FFD9B856000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B92A000
|
trusted library allocation
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
1B573AE000
|
stack
|
page read and write
|
||
7FFD9BAE8000
|
trusted library allocation
|
page read and write
|
||
2D19FD00000
|
heap
|
page execute and read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
1CE9867D000
|
heap
|
page read and write
|
||
1B28E000
|
stack
|
page read and write
|
||
2D19DF50000
|
heap
|
page read and write
|
||
16B67800000
|
heap
|
page read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
1CE800A0000
|
heap
|
page execute and read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
16B65EF0000
|
heap
|
page read and write
|
||
2D1A0908000
|
trusted library allocation
|
page read and write
|
||
1CEFE2E5000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1CE800E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
1CE80050000
|
heap
|
page readonly
|
||
7FFD9BAB4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page execute and read and write
|
||
1CE81FE9000
|
trusted library allocation
|
page read and write
|
||
1AD1EEF0000
|
heap
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page read and write
|
||
1AD21FF3000
|
trusted library allocation
|
page read and write
|
||
2D19E1C5000
|
heap
|
page read and write
|
||
2D1A0C80000
|
trusted library allocation
|
page read and write
|
||
1AD1EEA0000
|
heap
|
page readonly
|
||
16B67B51000
|
trusted library allocation
|
page read and write
|
||
1AD22133000
|
trusted library allocation
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
1AD1ED28000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1AD21876000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1AD30B6C000
|
trusted library allocation
|
page read and write
|
||
16B001E0000
|
heap
|
page execute and read and write
|
||
1CE81256000
|
trusted library allocation
|
page read and write
|
||
1C1E0000
|
heap
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
2D19E1C0000
|
heap
|
page read and write
|
||
2D1B000C000
|
trusted library allocation
|
page read and write
|
||
16B685A2000
|
trusted library allocation
|
page read and write
|
||
16B68DA4000
|
trusted library allocation
|
page read and write
|
||
2D1B825B000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
F018549000
|
stack
|
page read and write
|
||
2D19DF30000
|
heap
|
page read and write
|
||
7FFD9B774000
|
trusted library allocation
|
page read and write
|
||
16B003EF000
|
heap
|
page read and write
|
||
16B68B54000
|
trusted library allocation
|
page read and write
|
||
1AD20D3E000
|
trusted library allocation
|
page read and write
|
||
7DF46F070000
|
trusted library allocation
|
page execute and read and write
|
||
2D19DF93000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
2D19E160000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
2D19DF6F000
|
heap
|
page read and write
|
||
1B480000
|
heap
|
page read and write
|
||
1CE986C3000
|
heap
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
16B688BC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1CE80020000
|
trusted library allocation
|
page read and write
|
||
1AD212C4000
|
trusted library allocation
|
page read and write
|
||
1B576FE000
|
stack
|
page read and write
|
||
1CE988BC000
|
heap
|
page read and write
|
||
16B65F68000
|
heap
|
page read and write
|
||
16B6801D000
|
trusted library allocation
|
page read and write
|
||
2D19DF63000
|
heap
|
page read and write
|
||
F0176F8000
|
stack
|
page read and write
|
||
2D1A0E36000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page read and write
|
||
12771000
|
trusted library allocation
|
page read and write
|
||
2D1A1664000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA93000
|
trusted library allocation
|
page read and write
|
||
1AD21B80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page execute and read and write
|
||
25A2FB8000
|
stack
|
page read and write
|
||
2D1B811E000
|
heap
|
page read and write
|
||
1277E000
|
trusted library allocation
|
page read and write
|
||
1B57A7A000
|
stack
|
page read and write
|
||
2D1B8096000
|
heap
|
page read and write
|
||
2D19E1D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
252E87D000
|
stack
|
page read and write
|
||
1AD30880000
|
trusted library allocation
|
page read and write
|
||
1AD1EE80000
|
trusted library allocation
|
page read and write
|
||
1AD208E3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
16B67830000
|
trusted library section
|
page read and write
|
||
16B65F50000
|
heap
|
page read and write
|
||
2D1B838F000
|
heap
|
page read and write
|
||
1B57323000
|
stack
|
page read and write
|
||
1AD20860000
|
heap
|
page read and write
|
||
25A3D8D000
|
stack
|
page read and write
|
||
7FFD9B773000
|
trusted library allocation
|
page execute and read and write
|
||
16B68B7F000
|
trusted library allocation
|
page read and write
|
||
1B57779000
|
stack
|
page read and write
|
||
16B6992F000
|
trusted library allocation
|
page read and write
|
||
1CE803E9000
|
trusted library allocation
|
page read and write
|
||
252E38E000
|
stack
|
page read and write
|
||
2D1AFD41000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAEC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
1AD22672000
|
trusted library allocation
|
page read and write
|
||
2D1A0F25000
|
trusted library allocation
|
page read and write
|
||
DE5000
|
heap
|
page read and write
|
||
1CE8136D000
|
trusted library allocation
|
page read and write
|
||
1CE989D4000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
2D1B001C000
|
trusted library allocation
|
page read and write
|
||
1CE98A53000
|
heap
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B944000
|
trusted library allocation
|
page read and write
|
||
7DF406CA0000
|
trusted library allocation
|
page execute and read and write
|
||
1AD218A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B968000
|
trusted library allocation
|
page read and write
|
||
25A3B8E000
|
stack
|
page read and write
|
||
2D19E1E0000
|
heap
|
page readonly
|
||
CCC000
|
stack
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
252F7C9000
|
stack
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
1B578FD000
|
stack
|
page read and write
|
||
1AD221C0000
|
trusted library allocation
|
page read and write
|
||
2D1B80BF000
|
heap
|
page read and write
|
||
25A2A7E000
|
stack
|
page read and write
|
||
7FFD9B958000
|
trusted library allocation
|
page read and write
|
||
16B67820000
|
trusted library section
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
2D1A0FB8000
|
trusted library allocation
|
page read and write
|
||
1AD21B1F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
2D19DFD8000
|
heap
|
page read and write
|
||
2D1A0C7C000
|
trusted library allocation
|
page read and write
|
||
1CE8068D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B830000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
16B68F19000
|
trusted library allocation
|
page read and write
|
||
16B77E43000
|
trusted library allocation
|
page read and write
|
||
1AD38F0D000
|
heap
|
page read and write
|
||
1CE814CF000
|
trusted library allocation
|
page read and write
|
||
2D1A1AF1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBDD000
|
trusted library allocation
|
page read and write
|
||
1AD1EEB0000
|
heap
|
page read and write
|
||
252E77E000
|
stack
|
page read and write
|
||
16B77B81000
|
trusted library allocation
|
page read and write
|
||
12778000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
1CEFE490000
|
heap
|
page read and write
|
||
F016FFE000
|
stack
|
page read and write
|
||
1AD1EDE0000
|
heap
|
page read and write
|
||
1CE81A2B000
|
trusted library allocation
|
page read and write
|
||
16B68E5F000
|
trusted library allocation
|
page read and write
|
||
1CEFE2E1000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
1AD206A0000
|
trusted library allocation
|
page read and write
|
||
2D19E2A5000
|
heap
|
page read and write
|
||
2D1A091F000
|
trusted library allocation
|
page read and write
|
||
1B180000
|
heap
|
page read and write
|
||
1CE986D2000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
25A2DF9000
|
stack
|
page read and write
|
||
1AD21907000
|
trusted library allocation
|
page read and write
|
||
16B66048000
|
heap
|
page read and write
|
||
1CE80DC7000
|
trusted library allocation
|
page read and write
|
||
1C05A000
|
stack
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
F017777000
|
stack
|
page read and write
|
||
1AD3901F000
|
heap
|
page read and write
|
||
1CE98938000
|
heap
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
1CE98A77000
|
heap
|
page read and write
|
||
1C4DB000
|
stack
|
page read and write
|
||
1B57BF8000
|
stack
|
page read and write
|
||
1B579F7000
|
stack
|
page read and write
|
||
7FFD9BAC9000
|
trusted library allocation
|
page read and write
|
||
16B693E2000
|
trusted library allocation
|
page read and write
|
||
1CE9866D000
|
heap
|
page read and write
|
||
16B65F9D000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1AD39039000
|
heap
|
page read and write
|
||
1AD21471000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
1AD21628000
|
trusted library allocation
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB8C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
1CE812E7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B978000
|
trusted library allocation
|
page read and write
|
||
1CE8139F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
2D19DF20000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
1AD1EEC0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
2D1A0C0C000
|
trusted library allocation
|
page read and write
|
||
DCC000
|
stack
|
page read and write
|
||
252E30E000
|
stack
|
page read and write
|
||
1AD30AB5000
|
trusted library allocation
|
page read and write
|
||
1CE811F1000
|
trusted library allocation
|
page read and write
|
||
1CE901E1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
16B67B40000
|
heap
|
page execute and read and write
|
||
8D3000
|
heap
|
page read and write
|
||
252F64E000
|
stack
|
page read and write
|
||
25A3C8E000
|
stack
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
16B69955000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAE9000
|
trusted library allocation
|
page read and write
|
||
1CE80C12000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
16B003EB000
|
heap
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
1AD38F00000
|
heap
|
page read and write
|
||
1CE801C1000
|
trusted library allocation
|
page read and write
|
||
1AD30B7C000
|
trusted library allocation
|
page read and write
|
||
1CE988B0000
|
heap
|
page read and write
|
||
1AD38FBC000
|
heap
|
page read and write
|
||
1AD0D000
|
stack
|
page read and write
|
||
7FFD9BB7C000
|
trusted library allocation
|
page read and write
|
||
16B00380000
|
trusted library allocation
|
page read and write
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
1AD20871000
|
trusted library allocation
|
page read and write
|
||
16B0051D000
|
heap
|
page read and write
|
||
1B5894C000
|
stack
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1AD308E4000
|
trusted library allocation
|
page read and write
|
||
16B0054B000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
1AD38C85000
|
heap
|
page read and write
|
||
16B006D0000
|
heap
|
page read and write
|
||
25A2C7E000
|
stack
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
2D1A0C88000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
F0177FC000
|
stack
|
page read and write
|
||
1AD38C93000
|
heap
|
page read and write
|
||
1BCBD000
|
stack
|
page read and write
|
||
2D1B8130000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
1AD21816000
|
trusted library allocation
|
page read and write
|
||
846000
|
heap
|
page read and write
|
||
16B68C0F000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
1CE98A73000
|
heap
|
page read and write
|
||
7FFD9BB53000
|
trusted library allocation
|
page read and write
|
||
7DF4DB690000
|
trusted library allocation
|
page execute and read and write
|
||
16B003B0000
|
heap
|
page read and write
|
||
1CEFE325000
|
heap
|
page read and write
|
||
2D1A0C78000
|
trusted library allocation
|
page read and write
|
||
16B77BC3000
|
trusted library allocation
|
page read and write
|
||
F01864C000
|
stack
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B762000
|
trusted library allocation
|
page read and write
|
||
1CEFE4B0000
|
heap
|
page read and write
|
||
1CE81FC4000
|
trusted library allocation
|
page read and write
|
||
2D1B8098000
|
heap
|
page read and write
|
||
1CE989CE000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
1CE989A1000
|
heap
|
page read and write
|
||
16B003F3000
|
heap
|
page read and write
|
||
16B003FF000
|
heap
|
page read and write
|
||
7FFD9B962000
|
trusted library allocation
|
page read and write
|
||
1B47E000
|
stack
|
page read and write
|
||
252E9FA000
|
stack
|
page read and write
|
||
1AD39001000
|
heap
|
page read and write
|
||
2D19E260000
|
heap
|
page execute and read and write
|
||
1CE904B2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
2D19E270000
|
trusted library allocation
|
page read and write
|
||
F01747E000
|
stack
|
page read and write
|
||
2D1B82EC000
|
heap
|
page read and write
|
||
7FFD9B912000
|
trusted library allocation
|
page read and write
|
||
25A313E000
|
stack
|
page read and write
|
||
2D1A0C91000
|
trusted library allocation
|
page read and write
|
||
16B65F10000
|
heap
|
page read and write
|
||
2D1B8371000
|
heap
|
page read and write
|
||
F0179FC000
|
stack
|
page read and write
|
||
1AD20A99000
|
trusted library allocation
|
page read and write
|
||
1AD38FA0000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
16B00403000
|
heap
|
page read and write
|
||
16B67D7A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B932000
|
trusted library allocation
|
page read and write
|
||
1CE9891C000
|
heap
|
page read and write
|
||
2D19E1F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
1B500000
|
heap
|
page read and write
|
||
16B678B0000
|
trusted library allocation
|
page read and write
|
||
16B0056B000
|
heap
|
page read and write
|
||
1AD38C70000
|
heap
|
page read and write
|
||
2D1A1497000
|
trusted library allocation
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
F0184CE000
|
stack
|
page read and write
|
||
25A2AFE000
|
stack
|
page read and write
|
||
25A3D07000
|
stack
|
page read and write
|
||
16B6980C000
|
trusted library allocation
|
page read and write
|
||
1BABE000
|
stack
|
page read and write
|
||
1CE98AE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BACC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
1CE80DBB000
|
trusted library allocation
|
page read and write
|
||
1CE988F2000
|
heap
|
page read and write
|
||
1CE80040000
|
trusted library allocation
|
page read and write
|
||
2D1A0C74000
|
trusted library allocation
|
page read and write
|
||
F01864E000
|
stack
|
page read and write
|
||
1AD30B62000
|
trusted library allocation
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
7DF406CB0000
|
trusted library allocation
|
page execute and read and write
|
||
16B67BCA000
|
trusted library allocation
|
page read and write
|
||
16B68BE3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
7FFD9B782000
|
trusted library allocation
|
page read and write
|
||
16B66052000
|
heap
|
page read and write
|
||
25A2B7E000
|
stack
|
page read and write
|
||
1CEFE2E3000
|
heap
|
page read and write
|
||
2D1B8331000
|
heap
|
page read and write
|
||
25A2F3E000
|
stack
|
page read and write
|
||
1B589CE000
|
stack
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1CEFE4B5000
|
heap
|
page read and write
|
||
1CE98890000
|
heap
|
page execute and read and write
|
||
2D1A0D4A000
|
trusted library allocation
|
page read and write
|
||
1B4E4000
|
heap
|
page read and write
|
||
16B0055F000
|
heap
|
page read and write
|
||
25A2EB7000
|
stack
|
page read and write
|
||
1CE81282000
|
trusted library allocation
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B83C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
1AD21479000
|
trusted library allocation
|
page read and write
|
||
16B6799F000
|
heap
|
page read and write
|
||
1CE81B13000
|
trusted library allocation
|
page read and write
|
||
1BF55000
|
stack
|
page read and write
|
||
1AD21998000
|
trusted library allocation
|
page read and write
|
||
16B65F60000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1AD1EE60000
|
trusted library allocation
|
page read and write
|
||
1B183000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
1CEFE2A0000
|
heap
|
page read and write
|
||
1CE901C1000
|
trusted library allocation
|
page read and write
|
||
1CE801B0000
|
heap
|
page read and write
|
||
16B00510000
|
heap
|
page read and write
|
||
1AD38D80000
|
heap
|
page execute and read and write
|
||
2D1A0A25000
|
trusted library allocation
|
page read and write
|
||
1AD2071D000
|
heap
|
page read and write
|
||
16B65FEA000
|
heap
|
page read and write
|
||
7DF4DB670000
|
trusted library allocation
|
page execute and read and write
|
||
16B00390000
|
heap
|
page execute and read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
16B0010D000
|
heap
|
page read and write
|
||
7FFD9B911000
|
trusted library allocation
|
page read and write
|
||
1AD38C95000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
1AD1ECFF000
|
heap
|
page read and write
|
||
2D19E04A000
|
heap
|
page read and write
|
||
252E67E000
|
stack
|
page read and write
|
||
1CE98710000
|
heap
|
page execute and read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
16B004AE000
|
heap
|
page read and write
|
||
1CE81FE4000
|
trusted library allocation
|
page read and write
|
||
2D19FF39000
|
trusted library allocation
|
page read and write
|
||
1CE98A2E000
|
heap
|
page read and write
|
||
16B694A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
1AD3902F000
|
heap
|
page read and write
|
||
7FFD9BAA3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page execute and read and write
|
||
1CE81F9F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
1CEFE260000
|
heap
|
page read and write
|
||
2D1A1B3B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
1B57CFB000
|
stack
|
page read and write
|
||
7FFD9BAB3000
|
trusted library allocation
|
page read and write
|
||
2D1B8271000
|
heap
|
page read and write
|
||
16B00429000
|
heap
|
page read and write
|
||
2D19E2A0000
|
heap
|
page read and write
|
||
1AD1ECC0000
|
heap
|
page read and write
|
||
1CE988B4000
|
heap
|
page read and write
|
||
16B65FE5000
|
heap
|
page read and write
|
||
2D19E180000
|
trusted library section
|
page read and write
|
||
7FFD9B921000
|
trusted library allocation
|
page read and write
|
||
7FFD9B94A000
|
trusted library allocation
|
page read and write
|
||
1AD21966000
|
trusted library allocation
|
page read and write
|
||
1AD22104000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA8F000
|
trusted library allocation
|
page read and write
|
||
1BBBD000
|
stack
|
page read and write
|
||
1AD38D55000
|
heap
|
page read and write
|
||
16B77E3C000
|
trusted library allocation
|
page read and write
|
||
7DF4A3550000
|
trusted library allocation
|
page execute and read and write
|
||
16B0016D000
|
heap
|
page read and write
|
||
16B65FE7000
|
heap
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
7FFD9B93A000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
1CEFE280000
|
heap
|
page read and write
|
||
16B77E5B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
1CE8158B000
|
trusted library allocation
|
page read and write
|
||
F01737E000
|
stack
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
1B568000
|
heap
|
page read and write
|
||
7FFD9B941000
|
trusted library allocation
|
page read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
1AD220FB000
|
trusted library allocation
|
page read and write
|
||
1CEFE530000
|
heap
|
page read and write
|
||
16B68C72000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
1CE98684000
|
heap
|
page read and write
|
||
16B0015C000
|
heap
|
page read and write
|
||
7FFD9BBED000
|
trusted library allocation
|
page read and write
|
||
1CE901F1000
|
trusted library allocation
|
page read and write
|
||
16B67920000
|
heap
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1AD1EED0000
|
heap
|
page execute and read and write
|
||
1CE812B3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
16B67860000
|
trusted library allocation
|
page read and write
|
||
16B65E10000
|
heap
|
page read and write
|
||
1AD1ED8B000
|
heap
|
page read and write
|
||
25A30BF000
|
stack
|
page read and write
|
||
7FFD9BBE6000
|
trusted library allocation
|
page read and write
|
||
16B77E49000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
1CE98A4B000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
F017877000
|
stack
|
page read and write
|
||
1AD1EE20000
|
heap
|
page read and write
|
||
1AD1ECFD000
|
heap
|
page read and write
|
||
F01757E000
|
stack
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
16B004C1000
|
heap
|
page read and write
|
||
1AD22692000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAFC000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
16B00480000
|
heap
|
page read and write
|
||
16B0055C000
|
heap
|
page read and write
|
||
2D19DF91000
|
heap
|
page read and write
|
||
7FF4D6220000
|
trusted library allocation
|
page execute and read and write
|
||
1CE988C4000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
1B5767E000
|
stack
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page execute and read and write
|
||
1A7A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
86B000
|
heap
|
page read and write
|
||
252E283000
|
stack
|
page read and write
|
||
1CEFE327000
|
heap
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
1AD30871000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
16B003FB000
|
heap
|
page read and write
|
||
2D1A0D48000
|
trusted library allocation
|
page read and write
|
||
16B68757000
|
trusted library allocation
|
page read and write
|
||
2D1A0762000
|
trusted library allocation
|
page read and write
|
||
16B77B71000
|
trusted library allocation
|
page read and write
|
||
1AD1EDC0000
|
heap
|
page read and write
|
||
1C155000
|
stack
|
page read and write
|
||
16B6937C000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF8000
|
trusted library allocation
|
page read and write
|
||
252F6CC000
|
stack
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
2D19DFAD000
|
heap
|
page read and write
|
||
1CE904BA000
|
trusted library allocation
|
page read and write
|
||
1B370000
|
heap
|
page execute and read and write
|
||
16B004B2000
|
heap
|
page read and write
|
||
7FFD9BB9C000
|
trusted library allocation
|
page read and write
|
||
25A3E8E000
|
stack
|
page read and write
|
||
1CE98610000
|
heap
|
page read and write
|
||
2D19DFD6000
|
heap
|
page read and write
|
||
1CE80F1D000
|
trusted library allocation
|
page read and write
|
||
16B77E4B000
|
trusted library allocation
|
page read and write
|
||
2D1B8357000
|
heap
|
page read and write
|
||
252F84C000
|
stack
|
page read and write
|
||
915000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
1B588C9000
|
stack
|
page read and write
|
||
252E6FA000
|
stack
|
page read and write
|
||
1AD1EE90000
|
heap
|
page execute and read and write
|
||
16B77E41000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAD8000
|
trusted library allocation
|
page read and write
|
||
1AD21A4F000
|
trusted library allocation
|
page read and write
|
||
25A31BB000
|
stack
|
page read and write
|
||
1B573EF000
|
stack
|
page read and write
|
||
2D1A15A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page read and write
|
||
8CC000
|
heap
|
page read and write
|
||
2D1B8052000
|
heap
|
page read and write
|
||
16B003F7000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
16B69974000
|
trusted library allocation
|
page read and write
|
||
16B68D2A000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
1CE81A52000
|
trusted library allocation
|
page read and write
|
||
F01767D000
|
stack
|
page read and write
|
||
F0178FF000
|
stack
|
page read and write
|
||
16B692D6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B82C000
|
trusted library allocation
|
page execute and read and write
|
||
2D1A153D000
|
trusted library allocation
|
page read and write
|
||
1B57C7E000
|
stack
|
page read and write
|
||
7FFD9BAC4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AB000
|
trusted library allocation
|
page read and write
|
There are 866 hidden memdumps, click here to show them.