IOC Report
Extreme Injector v3.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps10864201,00010010Label

Files

File Path
Type
Category
Malicious
Download
Extreme Injector v3.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0ydb2iq4.vzg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ld0juyv.nhw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1urgq5kw.2ee.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4iyaj5kt.0gt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5hivhbrd.ykv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_apexu05t.db5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g4cgohfu.2r5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ibdjfjzi.4ox.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mk5j3e4i.lsr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_opgbho2e.gig.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q3qqnp5p.rnd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qkjc1wbb.dcy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t5h1xjd4.hvj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vhv4skww.h1b.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xlktrxoc.byj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ykyxec3o.bh0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Dec 30 22:49:03 2024, mtime=Mon Dec 30 22:49:03 2024, atime=Mon Dec 30 22:49:03 2024, length=70656, window=hide
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Extreme Injector v3.exe
"C:\Users\user\Desktop\Extreme Injector v3.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Extreme Injector v3.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Extreme Injector v3.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
C:\Users\user\AppData\Roaming\svchost.exe
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
C:\Users\user\AppData\Roaming\svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
or-officials.gl.at.ply.gg
malicious
http://nuget.org/NuGet.exe
unknown
http://crl.m
unknown
http://crl.micro
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://crl.micro/pki/crl/productCerAut_2010-06-2
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
http://ip-api.com
unknown
https://contoso.com/Icon
unknown
http://osoft.com/pki/ceooCerAut_2010-06
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.micom/pki/certs/Miut_2010-06-23.cr
unknown
http://schemas.microsoft.co
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://crl.micros
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
or-officials.gl.at.ply.gg
147.185.221.24
malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
147.185.221.24
or-officials.gl.at.ply.gg
United States
malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Extreme Injector v3_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Extreme Injector v3_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Extreme Injector v3_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Extreme Injector v3_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Extreme Injector v3_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Extreme Injector v3_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Extreme Injector v3_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Extreme Injector v3_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Extreme Injector v3_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Extreme Injector v3_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Extreme Injector v3_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Extreme Injector v3_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Extreme Injector v3_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Extreme Injector v3_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
svchost
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
2652000
trusted library allocation
page read and write
malicious
2591000
trusted library allocation
page read and write
malicious
362000
unkown
page readonly
malicious
1C0EC7EB000
trusted library allocation
page read and write
1173509000
stack
page read and write
7FFD9BA30000
trusted library allocation
page read and write
8C233FF000
stack
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
F00000
heap
page read and write
12E606D3000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1B2A0DE0000
heap
page execute and read and write
720000
heap
page read and write
1B2A19F9000
trusted library allocation
page read and write
12E7A650000
heap
page execute and read and write
102E000
heap
page read and write
1B2A2576000
trusted library allocation
page read and write
47D1D7E000
stack
page read and write
7FFD9B826000
trusted library allocation
page read and write
16543D69000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page read and write
1B29F1C6000
heap
page read and write
1B2A1E86000
trusted library allocation
page read and write
ADB7BF000
stack
page read and write
1655AB20000
heap
page read and write
F50000
trusted library allocation
page read and write
1C0F4B86000
heap
page read and write
25DB000
trusted library allocation
page read and write
1B458000
heap
page read and write
8C22EFE000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
1052000
heap
page read and write
7FFD9B912000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
7FFD9B980000
trusted library allocation
page read and write
165408A9000
heap
page read and write
8C2337C000
stack
page read and write
1CEC3630000
heap
page read and write
8C232FE000
stack
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
12E7A955000
heap
page read and write
1B2A1F9D000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
11726B6000
stack
page read and write
1C0DD255000
trusted library allocation
page read and write
7FFD9B781000
trusted library allocation
page read and write
12E63DF6000
trusted library allocation
page read and write
1222000
heap
page read and write
1C0DD483000
trusted library allocation
page read and write
47D1EF8000
stack
page read and write
1C0DD453000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9BB6A000
trusted library allocation
page read and write
1655AC15000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
12E71FD1000
trusted library allocation
page read and write
12E63002000
trusted library allocation
page read and write
1C0DD603000
trusted library allocation
page read and write
1C0DE2BB000
trusted library allocation
page read and write
1655AC27000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
47D1CF9000
stack
page read and write
7DF4F7CA0000
trusted library allocation
page execute and read and write
47D2ECE000
stack
page read and write
1C0DC360000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
1BFFE000
stack
page read and write
7FFD9B922000
trusted library allocation
page read and write
11A0000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1C0DC1F0000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
740000
heap
page read and write
16552501000
trusted library allocation
page read and write
12E7A5BA000
heap
page read and write
1A5C0000
trusted library allocation
page read and write
1C0DC555000
trusted library allocation
page read and write
1C0F4820000
heap
page read and write
7E0000
heap
page read and write
13851000
trusted library allocation
page read and write
7FFD9B92A000
trusted library allocation
page read and write
7FFD9B92A000
trusted library allocation
page read and write
1655ABEC000
heap
page read and write
7DF4F7C90000
trusted library allocation
page execute and read and write
117273B000
stack
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
ADB73F000
unkown
page read and write
12E7A859000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BAC9000
trusted library allocation
page read and write
7FFD9BADC000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
7DF4CF550000
trusted library allocation
page execute and read and write
8C23178000
stack
page read and write
12E6317B000
trusted library allocation
page read and write
12E7AA30000
heap
page read and write
12E7A690000
heap
page read and write
1C0EC7ED000
trusted library allocation
page read and write
1655AB49000
heap
page read and write
8C2404C000
stack
page read and write
12EA8000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
1B2A2BD0000
trusted library allocation
page read and write
12E621F8000
trusted library allocation
page read and write
8B6000
heap
page read and write
1B2B91CF000
heap
page read and write
117293F000
stack
page read and write
2627000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FFD9BB70000
trusted library allocation
page read and write
47D18B2000
stack
page read and write
165436A8000
trusted library allocation
page read and write
1655AB25000
heap
page read and write
8C22CFE000
stack
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
8C230FE000
stack
page read and write
1654299D000
trusted library allocation
page read and write
1CEC39E0000
heap
page read and write
1C0DC240000
trusted library allocation
page read and write
2140000
heap
page execute and read and write
802000
heap
page read and write
165430CF000
trusted library allocation
page read and write
1B2A0C05000
heap
page read and write
7FF4D6870000
trusted library allocation
page execute and read and write
1655A9A0000
heap
page read and write
12E606D8000
heap
page read and write
12E60675000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
820000
heap
page read and write
11F0000
trusted library allocation
page read and write
1B29F17F000
heap
page read and write
1B2A21B7000
trusted library allocation
page read and write
1B2A0CAC000
heap
page read and write
1B06E000
stack
page read and write
7FFD9B820000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
1C0F4DA0000
heap
page read and write
11722FF000
stack
page read and write
23A1C8C000
stack
page read and write
1C0DC378000
heap
page read and write
12E7A9C0000
trusted library allocation
page read and write
8C23079000
stack
page read and write
1B2A0B70000
trusted library allocation
page read and write
23A0EBB000
stack
page read and write
7FFD9BBDD000
trusted library allocation
page read and write
7FFD9BAEC000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B856000
trusted library allocation
page execute and read and write
11CF000
stack
page read and write
12E7A4E0000
heap
page read and write
1BCFF000
stack
page read and write
1B2A1E21000
trusted library allocation
page read and write
1B2A0C00000
heap
page read and write
12DE8000
trusted library allocation
page read and write
12E7A946000
heap
page read and write
1B29F140000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
7FFD9BA90000
trusted library allocation
page read and write
F90000
heap
page execute and read and write
1B2A0B30000
trusted library section
page read and write
12E7A929000
heap
page read and write
47D227C000
stack
page read and write
12E7A878000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
800000
heap
page read and write
12E7A69B000
heap
page read and write
165422C5000
heap
page read and write
1200000
heap
page read and write
23A1D8E000
stack
page read and write
47D2D4E000
stack
page read and write
1655291A000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
11727B8000
stack
page read and write
7FFD9B910000
trusted library allocation
page read and write
210D000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
1C0F4BB9000
heap
page read and write
7FFD9BADA000
trusted library allocation
page read and write
12E605C0000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9B787000
trusted library allocation
page read and write
224F000
stack
page read and write
1B2A1B67000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
385F000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
1C0F4863000
heap
page read and write
8C229CE000
stack
page read and write
1655AAF5000
heap
page read and write
165422D7000
heap
page execute and read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
7FFD9BBC0000
trusted library allocation
page read and write
1502000
heap
page read and write
1C0DE305000
trusted library allocation
page read and write
7FFD9B962000
trusted library allocation
page read and write
1C0DC9AD000
trusted library allocation
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
7DF4CF560000
trusted library allocation
page execute and read and write
7FFD9BA55000
trusted library allocation
page read and write
12E7A8F0000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
7FFD9B921000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
12E7A592000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
165430D7000
trusted library allocation
page read and write
7FFD9BADC000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1B29F189000
heap
page read and write
1655A8B5000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
1C0F482C000
heap
page read and write
1C0DA96D000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
2620000
trusted library allocation
page read and write
165423B1000
heap
page read and write
1180000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
23A0A7E000
stack
page read and write
7FFD9B782000
trusted library allocation
page read and write
7FFD9B9F2000
trusted library allocation
page read and write
1C0DD0DC000
trusted library allocation
page read and write
2629000
trusted library allocation
page read and write
1C0DE300000
trusted library allocation
page read and write
47D2E4D000
stack
page read and write
1C0EC7DA000
trusted library allocation
page read and write
E11000
heap
page read and write
1B29F18F000
heap
page read and write
890000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
1655ABC1000
heap
page read and write
165407E0000
heap
page read and write
47D20FE000
stack
page read and write
1B2A2C1A000
trusted library allocation
page read and write
1B2A1D93000
trusted library allocation
page read and write
1C0DA8E0000
heap
page read and write
7DF4C4450000
trusted library allocation
page execute and read and write
16542240000
heap
page readonly
7FFD9B78D000
trusted library allocation
page execute and read and write
1B2A1EB2000
trusted library allocation
page read and write
12E63067000
trusted library allocation
page read and write
1C0EC501000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1247000
heap
page read and write
1B5A0000
heap
page read and write
E40000
heap
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
12DE1000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
3861000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
12E6072F000
heap
page read and write
1C0EC987000
trusted library allocation
page read and write
15E0000
heap
page read and write
1B2A0C40000
heap
page execute and read and write
12E7A7A0000
heap
page read and write
8C22E79000
stack
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
1C0DA870000
heap
page read and write
FD0000
heap
page execute and read and write
25F0000
trusted library allocation
page read and write
AB3000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page read and write
1B29F135000
heap
page read and write
7FFD9B93A000
trusted library allocation
page read and write
16543891000
trusted library allocation
page read and write
12E7A58D000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
165527CA000
trusted library allocation
page read and write
12E62FD6000
trusted library allocation
page read and write
1AF60000
heap
page execute and read and write
1C0DC4B0000
heap
page execute and read and write
B64000
stack
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
12E7A8AD000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
15D0000
trusted library allocation
page read and write
12E60600000
heap
page read and write
1655ABE2000
heap
page read and write
12E7A596000
heap
page read and write
B03000
heap
page read and write
1B8FE000
stack
page read and write
7FFD9BBCD000
trusted library allocation
page read and write
1C0EC4F0000
trusted library allocation
page read and write
12FF000
stack
page read and write
1B2B0E64000
trusted library allocation
page read and write
12E7A8D1000
heap
page read and write
117257E000
stack
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
12E63DF1000
trusted library allocation
page read and write
1B75E000
stack
page read and write
16540828000
heap
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
12E60650000
heap
page read and write
1C0F4B1F000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
1C0DA957000
heap
page read and write
1276000
heap
page read and write
16540A65000
heap
page read and write
E00000
heap
page read and write
122D000
heap
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
1CEC36A0000
heap
page read and write
8C2404E000
stack
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
1C0DD1EE000
trusted library allocation
page read and write
1241000
heap
page read and write
7FFD9B968000
trusted library allocation
page read and write
47D2CCC000
stack
page read and write
1B2A2743000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1C0F4C90000
trusted library allocation
page read and write
1089000
heap
page read and write
1B2B10EA000
trusted library allocation
page read and write
8C23ECD000
stack
page read and write
1B45D000
heap
page read and write
1655AB6B000
heap
page read and write
23A074F000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
10C9000
heap
page read and write
2CB0000
trusted library allocation
page read and write
1B2A19DB000
trusted library allocation
page read and write
1C0F4AF8000
heap
page read and write
1B2A1842000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1654324D000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1402000
heap
page read and write
2110000
heap
page read and write
1B3C3000
heap
page read and write
7FFD9BB7E000
trusted library allocation
page read and write
1655ADF0000
heap
page read and write
924000
heap
page read and write
1BE7E000
stack
page read and write
23A103E000
stack
page read and write
12E62D4C000
trusted library allocation
page read and write
12E7A04D000
heap
page read and write
7FFD9BBC6000
trusted library allocation
page read and write
1B2B10FB000
trusted library allocation
page read and write
2DEF000
trusted library allocation
page read and write
47D21FE000
stack
page read and write
12E7A8BD000
heap
page read and write
7FFD9B912000
trusted library allocation
page read and write
12E7A770000
heap
page execute and read and write
1C0F4909000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
12E61FC5000
heap
page read and write
1C0F4BC0000
heap
page read and write
1C0F4BCD000
heap
page read and write
23A0FBF000
stack
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
370000
unkown
page readonly
1B9FE000
stack
page read and write
7DF4C4440000
trusted library allocation
page execute and read and write
1655A904000
heap
page read and write
7FFD9B79B000
trusted library allocation
page read and write
47D193D000
stack
page read and write
2CC0000
heap
page read and write
1CEC3650000
heap
page read and write
1C0DA993000
heap
page read and write
165527C2000
trusted library allocation
page read and write
1C0DC200000
heap
page readonly
8C231F9000
stack
page read and write
7FFD9BAD5000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
12E72001000
trusted library allocation
page read and write
7DF482020000
trusted library allocation
page execute and read and write
1B2A1DF6000
trusted library allocation
page read and write
1C0DA953000
heap
page read and write
47D1C7E000
stack
page read and write
25EE000
trusted library allocation
page read and write
E2D000
heap
page read and write
BE0000
heap
page read and write
12E7A84E000
heap
page read and write
13853000
trusted library allocation
page read and write
1B2A0DC0000
heap
page execute and read and write
1BDA8000
stack
page read and write
1C0DD7EB000
trusted library allocation
page read and write
E77000
heap
page read and write
1B2B9574000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
13858000
trusted library allocation
page read and write
E51000
heap
page read and write
1655AC0C000
heap
page read and write
1654086D000
heap
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
1C0DC1D0000
trusted library allocation
page read and write
12EA3000
trusted library allocation
page read and write
1B2A1F16000
trusted library allocation
page read and write
16543E2A000
trusted library allocation
page read and write
1C0DA999000
heap
page read and write
117263E000
stack
page read and write
165527BB000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
117247E000
stack
page read and write
7DF482000000
trusted library allocation
page execute and read and write
7FFD9BAD0000
trusted library allocation
page read and write
12E7A812000
heap
page read and write
F10000
heap
page read and write
1654085F000
heap
page read and write
7FFD9BADC000
trusted library allocation
page read and write
1225000
heap
page read and write
12E7A508000
heap
page read and write
8C23F49000
stack
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1B2A0B40000
trusted library section
page read and write
7FFD9BB70000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
EAB000
heap
page read and write
12E61FC0000
heap
page read and write
7FFD9B931000
trusted library allocation
page read and write
1602000
heap
page read and write
1B2A0E78000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
8C22DFE000
stack
page read and write
12E61F20000
heap
page readonly
12E7A8C9000
heap
page read and write
1B29F19F000
heap
page read and write
7FFD9B912000
trusted library allocation
page read and write
16543103000
trusted library allocation
page read and write
1CEC3620000
heap
page read and write
1B2A19F1000
trusted library allocation
page read and write
1702000
heap
page read and write
12E60690000
heap
page read and write
2560000
heap
page execute and read and write
2EAC000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9BB96000
trusted library allocation
page read and write
1134000
stack
page read and write
1C0DC2C0000
heap
page execute and read and write
12E7A5DD000
heap
page read and write
2639000
trusted library allocation
page read and write
16542230000
trusted library allocation
page read and write
23A1D0C000
stack
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
7FFD9B958000
trusted library allocation
page read and write
7FFD9BAC9000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
2DDF000
stack
page read and write
7DF482010000
trusted library allocation
page execute and read and write
1655AA80000
heap
page execute and read and write
12E7A6A5000
heap
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
165524F1000
trusted library allocation
page read and write
1B2A0C10000
trusted library allocation
page read and write
165442B7000
trusted library allocation
page read and write
104B000
heap
page read and write
1B29F130000
heap
page read and write
1B9AD000
stack
page read and write
1B29F1C8000
heap
page read and write
1302000
heap
page read and write
1C0F4A90000
heap
page read and write
1C0DD6BA000
trusted library allocation
page read and write
12E7A91E000
heap
page read and write
1C0DDD6D000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9BBB0000
trusted library allocation
page read and write
1C0DC210000
trusted library allocation
page read and write
165442DC000
trusted library allocation
page read and write
12E722C4000
trusted library allocation
page read and write
12E62A22000
trusted library allocation
page read and write
1C0EC7CD000
trusted library allocation
page read and write
117358C000
stack
page read and write
1654086B000
heap
page read and write
1B2A1B70000
trusted library allocation
page read and write
12E6204F000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
1655A82C000
heap
page read and write
47D1F78000
stack
page read and write
1B2B0E11000
trusted library allocation
page read and write
165442FC000
trusted library allocation
page read and write
23A0CF8000
stack
page read and write
7FFD9B774000
trusted library allocation
page read and write
1C0F49B0000
heap
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
23A0F3E000
stack
page read and write
7FFD9B970000
trusted library allocation
page read and write
47D217E000
stack
page read and write
7FFD9B774000
trusted library allocation
page read and write
1BBFE000
stack
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1299000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
1C0DD0E6000
trusted library allocation
page read and write
1B2A12BD000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
47D19BE000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
165426F8000
trusted library allocation
page read and write
165524D1000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1B2A2C15000
trusted library allocation
page read and write
1654358F000
trusted library allocation
page read and write
1B602000
heap
page read and write
8C230F7000
stack
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
1C0DE019000
trusted library allocation
page read and write
1C0DD823000
trusted library allocation
page read and write
1B2B951C000
heap
page read and write
1C0DD25E000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
1B2B9400000
heap
page read and write
1B2B94AC000
heap
page read and write
1C0F4BD1000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
104D000
heap
page read and write
16540832000
heap
page read and write
1B2B9498000
heap
page read and write
1655A810000
heap
page read and write
6FC000
stack
page read and write
123C000
heap
page read and write
1655ABC5000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
16543774000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
8BC000
heap
page read and write
1655A8A2000
heap
page read and write
1C0F4B95000
heap
page read and write
E13000
heap
page read and write
1C0F4B07000
heap
page read and write
7FFD9BB8C000
trusted library allocation
page read and write
8E4000
heap
page read and write
1C0DDE2F000
trusted library allocation
page read and write
23A0B7F000
stack
page read and write
11729BB000
stack
page read and write
7FFD9B820000
trusted library allocation
page read and write
23A0DB7000
stack
page read and write
1655AAF0000
heap
page read and write
8C23FCD000
stack
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
E3C000
heap
page read and write
165434D4000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
8A5000
heap
page read and write
7FFD9BAD8000
trusted library allocation
page read and write
11724F7000
stack
page read and write
12598000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1C0F4AB2000
heap
page read and write
1655A84E000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
1C0DA94C000
heap
page read and write
12B4000
heap
page read and write
1C0DD8A5000
trusted library allocation
page read and write
1B29F187000
heap
page read and write
1B460000
heap
page read and write
12E606D5000
heap
page read and write
1B2A2682000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
16540867000
heap
page read and write
1B2A20FD000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
1C0EC511000
trusted library allocation
page read and write
1C0DC4E1000
trusted library allocation
page read and write
1102000
heap
page read and write
165423A0000
heap
page read and write
2E9E000
stack
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1B2B9180000
heap
page read and write
1BE3E000
stack
page read and write
12E722CC000
trusted library allocation
page read and write
23A0E39000
stack
page read and write
1BAFE000
stack
page read and write
12E61F30000
trusted library allocation
page read and write
E20000
heap
page read and write
1B2A0DF1000
trusted library allocation
page read and write
165424C0000
heap
page execute and read and write
1654090E000
heap
page read and write
12E71FF1000
trusted library allocation
page read and write
F02000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1B2A1AFF000
trusted library allocation
page read and write
12DE3000
trusted library allocation
page read and write
16542280000
trusted library allocation
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
1BEFF000
stack
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
E3E000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
165437D6000
trusted library allocation
page read and write
12E7A919000
heap
page read and write
1C0DD511000
trusted library allocation
page read and write
7FFD9BA31000
trusted library allocation
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
7FFD9BAD0000
trusted library allocation
page read and write
12E60640000
trusted library allocation
page read and write
1C0DDDD0000
trusted library allocation
page read and write
1C0DA910000
heap
page read and write
12E60694000
heap
page read and write
47D1DF7000
stack
page read and write
AB0000
trusted library allocation
page read and write
8C22C73000
stack
page read and write
260A000
trusted library allocation
page read and write
12E63838000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
1655A9B3000
heap
page read and write
2603000
trusted library allocation
page read and write
1C0EC4E1000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
1BAFE000
stack
page read and write
12E608F5000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
1C0DD7B8000
trusted library allocation
page read and write
7FFD9B783000
trusted library allocation
page read and write
12E63DAC000
trusted library allocation
page read and write
1B29F181000
heap
page read and write
1B2A0BC0000
trusted library allocation
page read and write
1655A9A5000
heap
page read and write
1C0F4832000
heap
page read and write
1C0DA790000
heap
page read and write
117237E000
stack
page read and write
16542210000
trusted library allocation
page read and write
7FFD9BB6C000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
12E722BD000
trusted library allocation
page read and write
1B26E000
stack
page read and write
12E6068C000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
23A0D3E000
stack
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1C1EA000
stack
page read and write
16543D43000
trusted library allocation
page read and write
1B2A209C000
trusted library allocation
page read and write
7FFD9BBC6000
trusted library allocation
page read and write
7FFD9BA72000
trusted library allocation
page read and write
7FFD9B964000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1190000
heap
page read and write
7FFD9B922000
trusted library allocation
page read and write
BD0000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page execute and read and write
1BDB0000
heap
page read and write
16544301000
trusted library allocation
page read and write
12E63753000
trusted library allocation
page read and write
7FFD9B9F6000
trusted library allocation
page read and write
1B2B9310000
heap
page read and write
11725F9000
stack
page read and write
1B2B91FE000
heap
page read and write
1C0DA8E5000
heap
page read and write
12E605A0000
heap
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
1029000
heap
page read and write
1C0DA995000
heap
page read and write
1655AAC0000
heap
page read and write
7FFD9BAE8000
trusted library allocation
page read and write
97D000
heap
page read and write
23A1B8E000
stack
page read and write
7FFD9BADA000
trusted library allocation
page read and write
1655A8B3000
heap
page read and write
7FFD9B958000
trusted library allocation
page read and write
1B29F310000
heap
page read and write
12E61F40000
heap
page execute and read and write
1B802000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
1B437000
heap
page read and write
1B29F330000
heap
page read and write
12E63093000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
E44000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
16543107000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9BB63000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
23A1D8C000
stack
page read and write
23A1B0D000
stack
page read and write
6F4000
stack
page read and write
7FFD9BAE2000
trusted library allocation
page read and write
1C0EC7D2000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
7FFD9B954000
trusted library allocation
page read and write
1B29F152000
heap
page read and write
1B2A0B10000
heap
page read and write
1655A865000
heap
page read and write
1B2A1FD0000
trusted library allocation
page read and write
117283E000
stack
page read and write
12E63DD1000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
16543C5D000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
12E7A55A000
heap
page read and write
1C2EA000
stack
page read and write
1C0DC709000
trusted library allocation
page read and write
91E000
heap
page read and write
7FFD9BAD2000
trusted library allocation
page read and write
165436E1000
trusted library allocation
page read and write
1655AAE6000
heap
page read and write
1C0F487D000
heap
page read and write
7FFD9BAD4000
trusted library allocation
page read and write
1B2B957C000
heap
page read and write
10CC000
heap
page read and write
47D1FF9000
stack
page read and write
12E62D43000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
11723F9000
stack
page read and write
8C22FFD000
stack
page read and write
1C0DD63E000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1B2B9620000
trusted library allocation
page read and write
12E6327B000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
12E722DC000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
7FFD9BAF0000
trusted library allocation
page read and write
12E7A81D000
heap
page read and write
1C0EC554000
trusted library allocation
page read and write
972000
heap
page read and write
1B6AE000
stack
page read and write
3851000
trusted library allocation
page read and write
16542556000
trusted library allocation
page read and write
970000
heap
page read and write
1B2A265C000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
2EA1000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
1C0DA95B000
heap
page read and write
1B2A0C90000
heap
page read and write
23A07CF000
stack
page read and write
7FFD9B784000
trusted library allocation
page read and write
1046000
heap
page read and write
1C0DD481000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
1CEC39E5000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
12E7A84B000
heap
page read and write
1B2B9540000
heap
page read and write
8C2327E000
stack
page read and write
12E7A518000
heap
page read and write
1B2B0E21000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
1B2A26E5000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
1171FF3000
stack
page read and write
1B2B94B5000
heap
page read and write
1B2B9257000
heap
page read and write
12E63920000
trusted library allocation
page read and write
1000000
heap
page read and write
165527DA000
trusted library allocation
page read and write
1B2A2130000
trusted library allocation
page read and write
360000
unkown
page readonly
1048000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9BAB3000
trusted library allocation
page read and write
12E61F70000
heap
page read and write
12E631AE000
trusted library allocation
page read and write
7FFD9B794000
trusted library allocation
page read and write
F80000
heap
page read and write
7FFD9B954000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9B895000
trusted library allocation
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
12E7A807000
heap
page read and write
1B29F1CB000
heap
page read and write
1655AB00000
heap
page read and write
8C23E4E000
stack
page read and write
7FFD9B921000
trusted library allocation
page read and write
B25000
heap
page read and write
7FFD9BB00000
trusted library allocation
page read and write
1C0F4BE0000
heap
page read and write
1B2B9567000
heap
page read and write
165408A6000
heap
page read and write
16540A20000
heap
page read and write
1041000
heap
page read and write
2648000
trusted library allocation
page read and write
165430C7000
trusted library allocation
page read and write
7FFD9BB7A000
trusted library allocation
page read and write
7FFD9BA37000
trusted library allocation
page read and write
1027000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
16552542000
trusted library allocation
page read and write
1B2B941A000
heap
page read and write
8A0000
heap
page read and write
1C8E000
stack
page read and write
16540869000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1BC02000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
12E61F10000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
1063000
heap
page read and write
1B29F120000
heap
page read and write
1B2B10DD000
trusted library allocation
page read and write
12E72044000
trusted library allocation
page read and write
12E632DC000
trusted library allocation
page read and write
23A0AF9000
stack
page read and write
12E630F6000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
1B2A0C47000
heap
page execute and read and write
7FFD9BAC9000
trusted library allocation
page read and write
7FFD9B772000
trusted library allocation
page read and write
16543563000
trusted library allocation
page read and write
47D2C4E000
stack
page read and write
8B0000
heap
page read and write
8C2347B000
stack
page read and write
11728BE000
stack
page read and write
B20000
heap
page read and write
1B2B10E2000
trusted library allocation
page read and write
EB1000
heap
page read and write
700000
heap
page read and write
1C0DC280000
trusted library allocation
page read and write
23A0C7D000
stack
page read and write
1BEE0000
heap
page read and write
1C0DD786000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
BC4000
stack
page read and write
1160000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B958000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
12E7A6B6000
heap
page read and write
1C0EE000
stack
page read and write
12E7A657000
heap
page execute and read and write
23A0BFB000
stack
page read and write
1C0DDC61000
trusted library allocation
page read and write
23A06C3000
stack
page read and write
1243000
heap
page read and write
12E7A8A4000
heap
page read and write
1251000
heap
page read and write
1C0F4B72000
heap
page read and write
B00000
heap
page read and write
1B40A000
heap
page read and write
1B2A2BF5000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
117360E000
stack
page read and write
2624000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
10B0000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
165424D1000
trusted library allocation
page read and write
1B2A1019000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
8DC000
heap
page read and write
EAE000
heap
page read and write
1013000
heap
page read and write
1655AC35000
heap
page read and write
8F3000
heap
page read and write
1B2B9501000
heap
page read and write
165407F0000
heap
page read and write
2DF1000
trusted library allocation
page read and write
2DEC000
trusted library allocation
page read and write
15CE000
stack
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
1654085D000
heap
page read and write
12E7A50F000
heap
page read and write
1C3EC000
stack
page read and write
1B2A0B80000
heap
page readonly
25F2000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
12E7A000000
trusted library allocation
page read and write
1BB9E000
stack
page read and write
385C000
trusted library allocation
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
16542F22000
trusted library allocation
page read and write
12591000
trusted library allocation
page read and write
12EA1000
trusted library allocation
page read and write
165422D0000
heap
page execute and read and write
117348E000
stack
page read and write
12E6249D000
trusted library allocation
page read and write
1C0F4888000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
1B2A19E9000
trusted library allocation
page read and write
47D1E7E000
stack
page read and write
24CE000
stack
page read and write
870000
trusted library allocation
page read and write
1C0F48CB000
heap
page read and write
1B25C000
stack
page read and write
16542250000
trusted library allocation
page read and write
23A1C07000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
47D19FE000
stack
page read and write
1C0DDD47000
trusted library allocation
page read and write
1C0DD5A1000
trusted library allocation
page read and write
1CEC36A8000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1C0F4AD3000
heap
page read and write
E00000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
1C0DA8D0000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1B2B96A0000
heap
page read and write
ADB6B9000
stack
page read and write
1B29F185000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
7FFD9BBD0000
trusted library allocation
page read and write
1C0DA890000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9BAD5000
trusted library allocation
page read and write
8C22F77000
stack
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9BB80000
trusted library allocation
page read and write
2608000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1C0DA918000
heap
page read and write
7FFD9B912000
trusted library allocation
page read and write
F70000
trusted library allocation
page read and write
1B7AE000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
12E60698000
heap
page read and write
1C0DC2C6000
heap
page execute and read and write
BA0000
heap
page read and write
2676000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
1039000
heap
page read and write
1655AB31000
heap
page read and write
12E7A959000
heap
page read and write
1B2B0DF1000
trusted library allocation
page read and write
7FFD9B784000
trusted library allocation
page read and write
8C22D7E000
stack
page read and write
1C0F4BC9000
heap
page read and write
1C0DA955000
heap
page read and write
1C0DC4D0000
heap
page execute and read and write
1B2B955F000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1B370000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
1C0DE2E0000
trusted library allocation
page read and write
12E6385F000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
12E606AC000
heap
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
1238000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1C0F4BD7000
heap
page read and write
1BCAA000
stack
page read and write
1AF5A000
stack
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
1C0DA923000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
12E7A8A9000
heap
page read and write
2580000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
12E7A552000
heap
page read and write
BC0000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
7FFD9BAB0000
trusted library allocation
page read and write
47D207A000
stack
page read and write
16540A60000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
1B2B953C000
heap
page read and write
7FFD9BAD2000
trusted library allocation
page read and write
1C0F487F000
heap
page read and write
7FFD9B826000
trusted library allocation
page read and write
1B8AE000
stack
page read and write
E99000
heap
page read and write
1AB1D000
stack
page read and write
7FFD9B912000
trusted library allocation
page read and write
165527C0000
trusted library allocation
page read and write
1655ACE0000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
47D2DC9000
stack
page read and write
2CD0000
heap
page execute and read and write
12E61FD1000
trusted library allocation
page read and write
16543500000
trusted library allocation
page read and write
16540865000
heap
page read and write
7FFD9B774000
trusted library allocation
page read and write
E38000
heap
page read and write
2DE1000
trusted library allocation
page read and write
12E6066E000
heap
page read and write
14FF000
stack
page read and write
7FFD9BAD9000
trusted library allocation
page read and write
1B2B91DB000
heap
page read and write
25F5000
trusted library allocation
page read and write
165408A4000
heap
page read and write
FA0000
heap
page read and write
12E604C0000
heap
page read and write
117340C000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1C0DA8F0000
heap
page read and write
12E7A7E0000
heap
page read and write
12E7A815000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
12E6069A000
heap
page read and write
7FFD9B954000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
A70000
unkown
page readonly
7FFD9BAD8000
trusted library allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
23A10BC000
stack
page read and write
1213000
heap
page read and write
1B2B923C000
heap
page read and write
1B16E000
stack
page read and write
165435F2000
trusted library allocation
page read and write
12E608F0000
heap
page read and write
243F000
stack
page read and write
7FFD9B78B000
trusted library allocation
page read and write
1302000
heap
page read and write
1654087D000
heap
page read and write
8F1000
heap
page read and write
1B2A0B50000
trusted library allocation
page read and write
1B31D000
stack
page read and write
16540820000
heap
page read and write
1202000
heap
page read and write
7FFD9BAA3000
trusted library allocation
page read and write
7FFD9B92A000
trusted library allocation
page read and write
1B29F148000
heap
page read and write
1B2B91E4000
heap
page read and write
13FF000
stack
page read and write
12E63397000
trusted library allocation
page read and write
7FFD9BBD6000
trusted library allocation
page read and write
E22000
heap
page read and write
12E7A7C3000
heap
page read and write
1C0DD575000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
12E722C2000
trusted library allocation
page read and write
165409F0000
heap
page read and write
15F0000
heap
page execute and read and write
1B5D0000
heap
page execute and read and write
E2B000
heap
page read and write
1C0EC8E6000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
1C0DA8D5000
heap
page read and write
165422C0000
heap
page read and write
117338E000
stack
page read and write
103E000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1C0DCF31000
trusted library allocation
page read and write
7FFD9BAC4000
trusted library allocation
page read and write
165422E0000
trusted library allocation
page read and write
1B2A1A31000
trusted library allocation
page read and write
1C0F4B83000
heap
page read and write
1C0DD4E5000
trusted library allocation
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
117227E000
stack
page read and write
23A1A8E000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
2678000
trusted library allocation
page read and write
7FFD9B921000
trusted library allocation
page read and write
There are 1063 hidden memdumps, click here to show them.