IOC Report
r.exe

loading gif

Files

File Path
Type
Category
Malicious
r.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\r.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Z\Z.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Z.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ah1ubo23.vbf.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dmtrlsuy.biy.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fr1wyhfr.h15.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ipc0mrd1.2vr.psm1
very short file (no magic)
dropped
C:\Users\user\Documents\20220608\PowerShell_transcript.932923.1sSVV7rz.20220608185617.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\Documents\20220608\PowerShell_transcript.932923.P2yThJ8b.20220608185603.txt
UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\r.exe
"C:\Users\user\Desktop\r.exe"
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 3 /tn "MicrosoftEdgeUpdate" /tr "C:\Users\user\AppData\Roaming\Z\Z.exe" /f
malicious
C:\Users\user\AppData\Roaming\Z\Z.exe
C:\Users\user\AppData\Roaming\Z\Z.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" Set-ItemProperty -Path 'HKLM:\\SOFTWARE\\Microsoft\\Windows Defender Security Center\\Notifications' -Name DisableNotifications -Value 1
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 3 /tn "MicrosoftEdgeUpdate" /tr "C:\Users\user\AppData\Roaming\Z\Z.exe" /f
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell" Set-ItemProperty -Path 'HKLM:\\SOFTWARE\\Microsoft\\Windows Defender Security Center\\Notifications' -Name DisableNotifications -Value 1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
https://sectigo.com/CPS0
unknown
http://ocsp.sectigo.com0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 3 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
248CAFFC000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
7C2000
unkown
page readonly
1BA30000
trusted library allocation
page read and write
1B11A908000
heap
page read and write
3F48637000
stack
page read and write
1974D554000
heap
page read and write
1F879770000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
1AFFB1E0000
trusted library section
page readonly
1F85F450000
unkown
page readonly
FD0000
unkown
page readonly
9B6B8FE000
stack
page read and write
136D000
stack
page read and write
1F861D0D000
trusted library allocation
page read and write
7C2000
unkown
page readonly
131A4000
trusted library allocation
page read and write
1AF80030000
trusted library allocation
page read and write
62770EC000
stack
page read and write
143C000
heap
page read and write
1F879532000
heap
page read and write
1F862608000
trusted library allocation
page read and write
7FF9F1DB0000
trusted library allocation
page read and write
1C580000
trusted library allocation
page read and write
248E25F0000
trusted library allocation
page read and write
8E2117E000
stack
page read and write
1C420000
trusted library allocation
page read and write
1AFFAB02000
heap
page read and write
1BA00000
trusted library allocation
page read and write
248CADA1000
trusted library allocation
page read and write
201580B0000
heap
page read and write
1390000
trusted library allocation
page read and write
248E2CB2000
heap
page read and write
1590000
trusted library allocation
page read and write
7FF9F1B40000
trusted library allocation
page read and write
20158985000
heap
page read and write
1370000
trusted library allocation
page read and write
1AFFAA8E000
heap
page read and write
1BA00000
trusted library allocation
page read and write
248E2661000
heap
page read and write
1AFFFE30000
trusted library allocation
page read and write
20158E02000
heap
page read and write
20158988000
heap
page read and write
20158992000
heap
page read and write
1F85F670000
heap
page read and write
1F85F5A0000
heap
page read and write
15D0000
trusted library allocation
page read and write
1C460000
trusted library allocation
page read and write
248E2970000
heap
page read and write
15A0000
trusted library allocation
page read and write
3F487BF000
stack
page read and write
20158987000
heap
page read and write
1C4F0000
trusted library allocation
page read and write
1C160000
trusted library allocation
page read and write
2C0267F0000
heap
page read and write
7FF9F1B53000
trusted library allocation
page read and write
7FF9F1E40000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
248E2600000
trusted library allocation
page read and write
201580EB000
heap
page read and write
201580A3000
heap
page read and write
248E2950000
trusted library allocation
page read and write
8E20CFE000
stack
page read and write
1F87953F000
heap
page read and write
1BA00000
trusted library allocation
page read and write
2F94000
trusted library allocation
page read and write
11AD000
heap
page read and write
2015890E000
heap
page read and write
5BE97B000
stack
page read and write
CEA6C79000
stack
page read and write
201589C3000
heap
page read and write
1453000
heap
page read and write
2015898C000
heap
page read and write
3F4893C000
stack
page read and write
88714FD000
stack
page read and write
248C864B000
heap
page read and write
1251AC4D000
heap
page read and write
1BA00000
trusted library allocation
page read and write
1F87957C000
heap
page read and write
1974D555000
heap
page read and write
248CA000000
trusted library allocation
page read and write
20158992000
heap
page read and write
248CA269000
trusted library allocation
page read and write
1C220000
trusted library allocation
page read and write
7FF9F1B2D000
trusted library allocation
page execute and read and write
201580D6000
heap
page read and write
248C85F9000
heap
page read and write
1BA10000
trusted library allocation
page read and write
2C0269F5000
heap
page read and write
1C4D0000
trusted library allocation
page read and write
1AFFAAAF000
heap
page read and write
201580D0000
heap
page read and write
1AFFAA13000
heap
page read and write
1F879780000
direct allocation
page read and write
1C230000
trusted library allocation
page read and write
20158987000
heap
page read and write
20158029000
heap
page read and write
2012FFB000
stack
page read and write
1C130000
trusted library allocation
page read and write
1F85F400000
heap
page read and write
2012BBE000
stack
page read and write
1BA10000
trusted library allocation
page read and write
7DF4974F0000
trusted library allocation
page execute and read and write
248E2600000
trusted library allocation
page read and write
1AF80130000
trusted library allocation
page read and write
2081B070000
heap
page read and write
1F860EA0000
trusted library allocation
page read and write
1C500000
trusted library allocation
page read and write
1C470000
trusted library allocation
page read and write
2015804A000
heap
page read and write
7FFA5FC70000
unkown
page read and write
2FB0000
trusted library allocation
page read and write
1D3ED800000
heap
page read and write
1BAF0000
trusted library allocation
page read and write
1BA20000
trusted library allocation
page read and write
7FF9F1B42000
trusted library allocation
page read and write
1BA90000
trusted library allocation
page read and write
1AF80110000
trusted library allocation
page read and write
1BA20000
trusted library allocation
page read and write
2C0269F0000
heap
page read and write
1B11AFB0000
trusted library allocation
page read and write
315A000
trusted library allocation
page read and write
20158988000
heap
page read and write
1F85F61E000
heap
page read and write
1F860F60000
heap
page read and write
7FF9F1C50000
trusted library allocation
page execute and read and write
1974D570000
heap
page read and write
1C25B000
stack
page read and write
1F8797F0000
heap
page read and write
1AFFB313000
heap
page read and write
1B11A813000
heap
page read and write
248C8520000
unkown
page readonly
1AFFAA56000
heap
page read and write
201589D0000
heap
page read and write
7FF9F1B42000
trusted library allocation
page read and write
9B6B7FF000
stack
page read and write
2015898C000
heap
page read and write
1F879780000
direct allocation
page read and write
2081B000000
heap
page read and write
2C0268E1000
heap
page read and write
1974D560000
heap
page read and write
7FF9F1D79000
trusted library allocation
page read and write
62779FE000
stack
page read and write
1B11A84D000
heap
page read and write
11D9000
heap
page read and write
8E2113E000
stack
page read and write
15B0000
trusted library allocation
page read and write
1251AD13000
heap
page read and write
20158991000
heap
page read and write
3F47F75000
stack
page read and write
1BA20000
trusted library allocation
page read and write
248E2C2D000
heap
page read and write
1974D575000
heap
page read and write
1F879770000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
7FF9F1DA0000
trusted library allocation
page read and write
1BA10000
trusted library allocation
page read and write
1445000
heap
page read and write
1B8F0000
trusted library allocation
page read and write
1430000
heap
page read and write
13F0000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
7C0000
unkown
page readonly
248E2600000
direct allocation
page read and write
1AF80024000
trusted library allocation
page read and write
1B900000
trusted library allocation
page read and write
62776F7000
stack
page read and write
2FB0000
trusted library allocation
page read and write
15C0000
trusted library allocation
page read and write
1BA70000
trusted library allocation
page read and write
1B11A88B000
heap
page read and write
5BECFF000
stack
page read and write
1C490000
trusted library allocation
page read and write
8871BFE000
stack
page read and write
1AF80021000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
1BA10000
trusted library allocation
page read and write
201589A2000
heap
page read and write
248E2600000
trusted library allocation
page read and write
1F879770000
trusted library allocation
page read and write
1F871141000
trusted library allocation
page read and write
1B87F000
trusted library allocation
page read and write
15C0000
trusted library allocation
page read and write
2F21000
trusted library allocation
page read and write
20158976000
heap
page read and write
1C1C0000
trusted library allocation
page read and write
2081B113000
heap
page read and write
7FF9F1C40000
trusted library allocation
page execute and read and write
15B0000
trusted library allocation
page read and write
7FF9F1D22000
trusted library allocation
page read and write
1F879760000
trusted library allocation
page read and write
2C0274F0000
trusted library allocation
page read and write
20158089000
heap
page read and write
1BA00000
trusted library allocation
page read and write
1C240000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
7FF9F1C16000
trusted library allocation
page execute and read and write
1F85F540000
heap
page read and write
7FF9F1E20000
trusted library allocation
page read and write
CEA6D7E000
stack
page read and write
887197E000
stack
page read and write
1590000
trusted library allocation
page read and write
201580D6000
heap
page read and write
1495000
heap
page read and write
1BA00000
trusted library allocation
page read and write
248C9F70000
trusted library allocation
page read and write
1C140000
trusted library allocation
page read and write
20158082000
heap
page read and write
1457000
heap
page read and write
1BA00000
trusted library allocation
page read and write
1BAE0000
trusted library allocation
page read and write
1BBEE000
stack
page read and write
1AFFB300000
heap
page read and write
1154000
trusted library allocation
page read and write
2081B100000
heap
page read and write
1590000
trusted library allocation
page read and write
248CAD99000
trusted library allocation
page read and write
1D3ED828000
heap
page read and write
248E2600000
trusted library allocation
page read and write
248E2CA7000
heap
page read and write
B4E327B000
stack
page read and write
2C026A00000
trusted library allocation
page read and write
2C0268BE000
heap
page read and write
FE0000
heap
page read and write
2EE0000
trusted library allocation
page read and write
7FF9F1D59000
trusted library allocation
page read and write
1F862697000
trusted library allocation
page read and write
248C85D0000
trusted library allocation
page read and write
1F879780000
trusted library allocation
page read and write
8871778000
stack
page read and write
248C8530000
unkown
page read and write
248C862F000
heap
page read and write
7FF9F1C60000
trusted library allocation
page execute and read and write
248E2600000
trusted library allocation
page read and write
1974D470000
heap
page read and write
1F879780000
trusted library allocation
page read and write
1AFFA930000
trusted library allocation
page read and write
1B49D000
stack
page read and write
1499000
heap
page read and write
248CB0C0000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
1C390000
trusted library allocation
page read and write
C50000
unkown
page readonly
13D0000
trusted library allocation
page read and write
1C480000
trusted library allocation
page read and write
7FF9F1DA0000
trusted library allocation
page read and write
20157E10000
heap
page read and write
7FF9F1E60000
trusted library allocation
page read and write
248C9F90000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
1AFFAA70000
heap
page read and write
12F31000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
20158999000
heap
page read and write
1251B602000
trusted library allocation
page read and write
1BA70000
trusted library allocation
page read and write
DD0000
heap
page read and write
1BA10000
trusted library allocation
page read and write
8E20D7F000
stack
page read and write
1BA10000
trusted library allocation
page read and write
1B840000
trusted library allocation
page read and write
7C0000
unkown
page readonly
201580B5000
heap
page read and write
1AFFB1B0000
trusted library section
page readonly
20158991000
heap
page read and write
7FF9F1B3D000
trusted library allocation
page execute and read and write
1251AC29000
heap
page read and write
248CA065000
heap
page read and write
1B870000
trusted library allocation
page read and write
1B11B002000
trusted library allocation
page read and write
1251AB80000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
248DA201000
trusted library allocation
page read and write
1BA70000
trusted library allocation
page read and write
1C540000
trusted library allocation
page read and write
1F879611000
trusted library allocation
page read and write
1F8711B1000
trusted library allocation
page read and write
1AFFA940000
trusted library section
page read and write
2015899F000
heap
page read and write
1590000
trusted library allocation
page read and write
20158E02000
heap
page read and write
248C9FC0000
heap
page read and write
201589BA000
heap
page read and write
7FFA54060000
unkown
page read and write
7FFA54056000
unkown
page readonly
20158991000
heap
page read and write
1251AD08000
heap
page read and write
1BA00000
trusted library allocation
page read and write
10D0000
heap
page read and write
1AFFB1C0000
trusted library section
page readonly
1BA00000
trusted library allocation
page read and write
1B810000
trusted library allocation
page read and write
1F861CAB000
trusted library allocation
page read and write
1F860EF0000
trusted library allocation
page read and write
1AF802F9000
heap
page read and write
248E266C000
heap
page read and write
1974D530000
heap
page read and write
20158113000
heap
page read and write
1F861351000
trusted library allocation
page read and write
7FF9F1E30000
trusted library allocation
page read and write
20158977000
heap
page read and write
248E2CAB000
heap
page read and write
1F879780000
trusted library allocation
page read and write
8E20A75000
stack
page read and write
7FF9F1BFC000
trusted library allocation
page execute and read and write
1BA20000
trusted library allocation
page read and write
1BA20000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
62774FC000
stack
page read and write
20158E00000
heap
page read and write
7FFA54040000
unkown
page readonly
1BA30000
trusted library allocation
page read and write
8871C7F000
unkown
page read and write
201589C3000
heap
page read and write
8871A78000
stack
page read and write
7FF9F1B40000
trusted library allocation
page read and write
1BFEB000
stack
page read and write
248E2CB4000
heap
page read and write
1974D55E000
heap
page read and write
248CA201000
trusted library allocation
page read and write
248E2940000
trusted library allocation
page read and write
1F85F603000
heap
page read and write
20158920000
heap
page read and write
1F85F607000
heap
page read and write
7FF9F1E10000
trusted library allocation
page read and write
248C8520000
unkown
page readonly
2FB0000
trusted library allocation
page read and write
9B6B97F000
stack
page read and write
11B1000
heap
page read and write
1F861D08000
trusted library allocation
page read and write
1BA30000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
20158993000
heap
page read and write
1590000
trusted library allocation
page read and write
1974D7A5000
heap
page read and write
20133FE000
stack
page read and write
2081B04E000
heap
page read and write
20158991000
heap
page read and write
1BA00000
trusted library allocation
page read and write
2081BA02000
trusted library allocation
page read and write
12F21000
trusted library allocation
page read and write
20158999000
heap
page read and write
1C110000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
248C8560000
heap
page read and write
248E2C85000
heap
page read and write
3F488BF000
stack
page read and write
1F860F46000
heap
page execute and read and write
7FF9F1D02000
trusted library allocation
page read and write
1314D000
trusted library allocation
page read and write
248CB00D000
trusted library allocation
page read and write
2081AF50000
heap
page read and write
1BAC0000
trusted library allocation
page read and write
1C0F0000
trusted library allocation
page read and write
1251AC13000
heap
page read and write
1F860F40000
heap
page execute and read and write
1974D450000
heap
page read and write
20158974000
heap
page read and write
1C260000
heap
page read and write
7FF9F1BF0000
trusted library allocation
page execute and read and write
1F85F5FB000
heap
page read and write
2C026878000
heap
page read and write
2081AFE0000
trusted library allocation
page read and write
8E20E7A000
stack
page read and write
248DA263000
trusted library allocation
page read and write
1D3ED813000
heap
page read and write
1590000
trusted library allocation
page read and write
1F860E80000
trusted library allocation
page read and write
7FF9F1E80000
trusted library allocation
page read and write
D95000
stack
page read and write
1BA10000
trusted library allocation
page read and write
2012ABB000
stack
page read and write
13B0000
trusted library allocation
page read and write
7FF9F1B4D000
trusted library allocation
page execute and read and write
1B11A913000
heap
page read and write
248CB03A000
trusted library allocation
page read and write
1251AC79000
heap
page read and write
7FF9F1D80000
trusted library allocation
page read and write
1C370000
trusted library allocation
page read and write
2C0277A0000
trusted library allocation
page read and write
201580B0000
heap
page read and write
1C430000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
1974D560000
heap
page read and write
9B6B37A000
stack
page read and write
1AFFFEC0000
trusted library allocation
page read and write
13C0000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
8E20AFD000
stack
page read and write
1C550000
trusted library allocation
page read and write
1570000
heap
page read and write
1AFFAA24000
heap
page read and write
1F879480000
heap
page read and write
248CADC8000
trusted library allocation
page read and write
248E2600000
trusted library allocation
page read and write
1B920000
trusted library allocation
page read and write
1B11A6A0000
heap
page read and write
1590000
trusted library allocation
page read and write
1F879820000
heap
page read and write
7FF9F1D10000
trusted library allocation
page execute and read and write
1BCB0000
heap
page read and write
1BAA0000
trusted library allocation
page read and write
20158917000
heap
page read and write
9B6B87E000
stack
page read and write
B4E307B000
stack
page read and write
248C867A000
heap
page read and write
1C45D000
stack
page read and write
15A0000
trusted library allocation
page read and write
1F860FF5000
heap
page read and write
1F85F440000
unkown
page readonly
1AF802FB000
heap
page read and write
7FF9F1E60000
trusted library allocation
page read and write
1D3ED7B0000
trusted library allocation
page read and write
11DB000
heap
page read and write
201589C3000
heap
page read and write
1BAD0000
trusted library allocation
page read and write
1AF80030000
trusted library allocation
page read and write
20132FD000
stack
page read and write
8E20F37000
stack
page read and write
7FF9F1CE6000
trusted library allocation
page read and write
1D3ED86E000
heap
page read and write
2F90000
trusted library allocation
page read and write
2081B013000
heap
page read and write
248E2940000
trusted library allocation
page read and write
2015898B000
heap
page read and write
1C590000
trusted library allocation
page read and write
1F862600000
trusted library allocation
page read and write
2C0268B6000
heap
page read and write
1C100000
trusted library allocation
page read and write
1AF802F4000
heap
page read and write
CEA6DF9000
stack
page read and write
1974D546000
heap
page read and write
248E2600000
direct allocation
page read and write
7FFA5FC50000
unkown
page readonly
7FF9F1BD0000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
1BA60000
trusted library allocation
page read and write
248E2C45000
heap
page read and write
1AFFAA3D000
heap
page read and write
1BFF8000
heap
page read and write
7FF9F1CD1000
trusted library allocation
page read and write
7FFA5FC51000
unkown
page execute read
1BA80000
trusted library allocation
page read and write
7FF9F1DD0000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
12F2D000
trusted library allocation
page read and write
20158108000
heap
page read and write
1F879780000
trusted library allocation
page read and write
1F85F5C9000
heap
page read and write
1AFFB318000
heap
page read and write
7FF9F1DD0000
trusted library allocation
page read and write
1BA40000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
2081B081000
heap
page read and write
1B11A83C000
heap
page read and write
1974D560000
heap
page read and write
1C440000
trusted library allocation
page read and write
1B8D0000
trusted library allocation
page read and write
1BA10000
trusted library allocation
page read and write
7FF9F1DC0000
trusted library allocation
page read and write
1B880000
trusted library allocation
page read and write
7FF9F1D70000
trusted library allocation
page read and write
1C410000
trusted library allocation
page read and write
7FF9F1D30000
trusted library allocation
page execute and read and write
7FF9F1D60000
trusted library allocation
page read and write
1170000
heap
page read and write
1AFFB318000
heap
page read and write
20158917000
heap
page read and write
1F879770000
trusted library allocation
page read and write
7FF9F1D50000
trusted library allocation
page read and write
7FF9F1B34000
trusted library allocation
page read and write
248E2600000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
7FF9F1C16000
trusted library allocation
page execute and read and write
15D0000
trusted library allocation
page read and write
7FF9F1C50000
trusted library allocation
page execute and read and write
1AF80160000
remote allocation
page read and write
248DA26F000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
20158917000
heap
page read and write
B4E2E7E000
stack
page read and write
1590000
trusted library allocation
page read and write
7FFA54065000
unkown
page readonly
2015897A000
heap
page read and write
1BA20000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
7FF9F1B8C000
trusted library allocation
page execute and read and write
13141000
trusted library allocation
page read and write
7FF9F1DC0000
trusted library allocation
page read and write
1C520000
trusted library allocation
page read and write
1C1D0000
trusted library allocation
page read and write
1BAE0000
heap
page read and write
2FD0000
trusted library allocation
page read and write
7FF9F1D90000
trusted library allocation
page read and write
20158E02000
heap
page read and write
1BA00000
trusted library allocation
page read and write
7FF44B770000
trusted library allocation
page execute and read and write
1D3ED902000
heap
page read and write
1974D55E000
heap
page read and write
248E2CB8000
heap
page read and write
1AF80200000
heap
page read and write
201589BA000
heap
page read and write
7FF9F1CD2000
trusted library allocation
page read and write
1974D552000
heap
page read and write
7FF9F1D40000
trusted library allocation
page read and write
1C180000
trusted library allocation
page read and write
20158E02000
heap
page read and write
1AF80160000
remote allocation
page read and write
2081B049000
heap
page read and write
92239FF000
stack
page read and write
7FF9F1B49000
trusted library allocation
page read and write
1BA10000
trusted library allocation
page read and write
1BA3E000
stack
page read and write
1D3ED853000
heap
page read and write
7FF9F1E00000
trusted library allocation
page read and write
1BA40000
trusted library allocation
page read and write
1AFFBE20000
trusted library allocation
page read and write
201589BC000
heap
page read and write
7FF9F1BF0000
trusted library allocation
page execute and read and write
1AF80020000
trusted library allocation
page read and write
1AF80044000
trusted library allocation
page read and write
1F879532000
heap
page read and write
248CB005000
trusted library allocation
page read and write
7FF9F1D10000
trusted library allocation
page execute and read and write
8E212BB000
stack
page read and write
1F87980A000
heap
page read and write
1F861130000
heap
page execute and read and write
1B11A902000
heap
page read and write
1B830000
trusted library allocation
page read and write
1AFFAA00000
heap
page read and write
C60000
heap
page read and write
248E2668000
heap
page read and write
7FF9F1CF1000
trusted library allocation
page read and write
7FF9F1B4D000
trusted library allocation
page execute and read and write
1BA10000
trusted library allocation
page read and write
8E20B7E000
stack
page read and write
1F879760000
trusted library allocation
page read and write
12F28000
trusted library allocation
page read and write
1C380000
trusted library allocation
page read and write
248C86AD000
heap
page read and write
1F879760000
trusted library allocation
page read and write
248CA1F0000
heap
page execute and read and write
1B7E0000
trusted library allocation
page read and write
2C0268E0000
heap
page read and write
1F879820000
heap
page read and write
8E20DFE000
stack
page read and write
7FF9F1B33000
trusted library allocation
page execute and read and write
8E20EBE000
stack
page read and write
20158993000
heap
page read and write
2081B04C000
heap
page read and write
1B11A82C000
heap
page read and write
1590000
trusted library allocation
page read and write
7FF9F1B50000
trusted library allocation
page read and write
248C85F0000
heap
page read and write
7FF9F1BD6000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
3F482FF000
stack
page read and write
7FF9F1C26000
trusted library allocation
page execute and read and write
1BA00000
trusted library allocation
page read and write
3F47FFD000
stack
page read and write
7FF9F1E10000
trusted library allocation
page read and write
1F860FF0000
heap
page read and write
15A0000
trusted library allocation
page read and write
1C4A0000
trusted library allocation
page read and write
5BE5CE000
stack
page read and write
248E2CAB000
heap
page read and write
1BA80000
trusted library allocation
page read and write
20158919000
heap
page read and write
2FF0000
heap
page execute and read and write
1C3E0000
trusted library allocation
page read and write
1C530000
heap
page execute and read and write
1B11A800000
heap
page read and write
201580D6000
heap
page read and write
7FF9F1B23000
trusted library allocation
page execute and read and write
1C560000
trusted library allocation
page read and write
201589D0000
heap
page read and write
1F8794FB000
heap
page read and write
1370000
trusted library allocation
page read and write
125A000
heap
page read and write
248E25E1000
trusted library allocation
page read and write
1BA78000
trusted library allocation
page read and write
1F861006000
heap
page read and write
1BA00000
trusted library allocation
page read and write
1550000
heap
page read and write
1251AC00000
heap
page read and write
1F860E60000
heap
page read and write
7FF9F1B49000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
3F483FE000
stack
page read and write
248E2600000
direct allocation
page read and write
3F4847E000
stack
page read and write
1AFFAA75000
heap
page read and write
1D3ED710000
heap
page read and write
1590000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
1383000
trusted library allocation
page read and write
1C190000
trusted library allocation
page read and write
2FC0000
trusted library allocation
page read and write
20158071000
heap
page read and write
1BA00000
trusted library allocation
page read and write
248E2CB4000
heap
page read and write
1591000
trusted library allocation
page read and write
2C0269D0000
trusted library allocation
page read and write
1AF802EA000
heap
page read and write
1251AC3C000
heap
page read and write
1AFFAA89000
heap
page read and write
201589D9000
heap
page read and write
20158974000
heap
page read and write
20157F80000
trusted library allocation
page read and write
1AF8000E000
trusted library allocation
page read and write
1AFFA7C0000
heap
page read and write
2081B075000
heap
page read and write
1BA70000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
1F87952D000
heap
page read and write
248E25F0000
trusted library allocation
page read and write
20158999000
heap
page read and write
1BFF0000
heap
page read and write
7FF9F1DB7000
trusted library allocation
page read and write
146B000
heap
page read and write
201589B3000
heap
page read and write
1BA00000
trusted library allocation
page read and write
1C530000
trusted library allocation
page read and write
9B6B77E000
stack
page read and write
1F85F6B5000
heap
page read and write
1F85F643000
heap
page read and write
20157FF0000
remote allocation
page read and write
1B8F8000
trusted library allocation
page read and write
7FF9F1B44000
trusted library allocation
page read and write
1F879760000
trusted library allocation
page read and write
1F879780000
direct allocation
page read and write
1F861D0B000
trusted library allocation
page read and write
1AFFFFE0000
trusted library allocation
page read and write
CEA689B000
stack
page read and write
2C0268DD000
heap
page read and write
1BA00000
trusted library allocation
page read and write
2C026970000
trusted library allocation
page read and write
248E2600000
trusted library allocation
page read and write
9B6B67B000
stack
page read and write
1974D53B000
heap
page read and write
248E2C10000
heap
page read and write
248CADCB000
trusted library allocation
page read and write
20158991000
heap
page read and write
1BA50000
trusted library allocation
page read and write
1F879800000
heap
page read and write
248E25B0000
heap
page execute and read and write
2015898C000
heap
page read and write
1590000
trusted library allocation
page read and write
2015898A000
heap
page read and write
1AF8024C000
heap
page read and write
8E21038000
stack
page read and write
201580C3000
heap
page read and write
248E25D6000
heap
page execute and read and write
8E210BF000
stack
page read and write
248C9F80000
heap
page readonly
1F861D3D000
trusted library allocation
page read and write
1251AC6E000
heap
page read and write
248E2600000
trusted library allocation
page read and write
1F861141000
trusted library allocation
page read and write
1BFBE000
stack
page read and write
15B0000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
248E2600000
trusted library allocation
page read and write
1C39F000
trusted library allocation
page read and write
1AFFB215000
heap
page read and write
248C86A0000
heap
page read and write
1B860000
trusted library allocation
page read and write
1974D320000
heap
page read and write
1AFFB1F0000
trusted library section
page readonly
8E20FBA000
stack
page read and write
2E8E000
stack
page read and write
15A0000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
1F871150000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
201589BA000
heap
page read and write
7FF9F1C06000
trusted library allocation
page execute and read and write
1F879780000
trusted library allocation
page read and write
1F87953F000
heap
page read and write
1590000
trusted library allocation
page read and write
20158984000
heap
page read and write
1AFFA7D0000
heap
page read and write
248C8510000
unkown
page readonly
3000000
trusted library allocation
page read and write
20158992000
heap
page read and write
20158964000
heap
page read and write
13151000
trusted library allocation
page read and write
201580D0000
heap
page read and write
20158951000
heap
page read and write
922356A000
stack
page read and write
248C8639000
heap
page read and write
20130F7000
stack
page read and write
248DA210000
trusted library allocation
page read and write
248E25F0000
trusted library allocation
page read and write
7FF9F1BF6000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
1595000
trusted library allocation
page read and write
7FF9F1B33000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
7FF9F1BE0000
trusted library allocation
page execute and read and write
1C400000
trusted library allocation
page read and write
7FF9F1DD7000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
248E2CB8000
heap
page read and write
B42000
unkown
page readonly
1974D577000
heap
page read and write
20158970000
heap
page read and write
1F879760000
trusted library allocation
page read and write
248CA412000
trusted library allocation
page read and write
2EC8000
trusted library allocation
page read and write
2012B3E000
stack
page read and write
9B6BA7E000
stack
page read and write
7FF4E1270000
trusted library allocation
page execute and read and write
1F861CD9000
trusted library allocation
page read and write
1BA10000
trusted library allocation
page read and write
248E2600000
trusted library allocation
page read and write
1BA10000
trusted library allocation
page read and write
7FF9F1CD4000
trusted library allocation
page read and write
7FF9F1BDC000
trusted library allocation
page execute and read and write
1AFFB200000
heap
page read and write
1B11A870000
heap
page read and write
2C026870000
heap
page read and write
2C027740000
trusted library allocation
page read and write
248E25F0000
trusted library allocation
page read and write
1AFFAAA0000
heap
page read and write
92238F9000
stack
page read and write
62778FC000
stack
page read and write
15D0000
trusted library allocation
page read and write
2081AF40000
heap
page read and write
2C0268BE000
heap
page read and write
1BA00000
trusted library allocation
page read and write
20158013000
heap
page read and write
1AFFBE30000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
2015897E000
heap
page read and write
15B0000
trusted library allocation
page read and write
1C510000
trusted library allocation
page read and write
1C418000
trusted library allocation
page read and write
1C1ED000
stack
page read and write
3030000
heap
page read and write
20158999000
heap
page read and write
7FF9F1D20000
trusted library allocation
page read and write
248C8675000
heap
page read and write
248E2600000
trusted library allocation
page read and write
20158974000
heap
page read and write
1C200000
trusted library allocation
page read and write
20157FF0000
remote allocation
page read and write
2015898A000
heap
page read and write
1F85F450000
unkown
page readonly
1AF802F0000
heap
page read and write
1F879760000
trusted library allocation
page read and write
3F486BA000
stack
page read and write
1974D7A0000
heap
page read and write
1B11A853000
heap
page read and write
201589BA000
heap
page read and write
248E2640000
heap
page read and write
15A0000
trusted library allocation
page read and write
20158900000
heap
page read and write
2015890D000
heap
page read and write
20158970000
heap
page read and write
7FF9F1B5D000
trusted library allocation
page execute and read and write
1590000
trusted library allocation
page read and write
7FF9F1B4D000
trusted library allocation
page execute and read and write
20158802000
heap
page read and write
5BEA7B000
stack
page read and write
1AFFB359000
heap
page read and write
16CE000
stack
page read and write
1C170000
trusted library allocation
page read and write
1BA10000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
1251AC2D000
heap
page read and write
1AFFB9E0000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
7FF9F1B50000
trusted library allocation
page read and write
2C026690000
heap
page read and write
2081AFB0000
heap
page read and write
20158000000
heap
page read and write
20158981000
heap
page read and write
1B11A6B0000
heap
page read and write
2F10000
heap
page read and write
1F85F5FD000
heap
page read and write
154E000
stack
page read and write
92235EE000
stack
page read and write
313E000
stack
page read and write
7FF9F1E70000
trusted library allocation
page read and write
7FF9F1B50000
trusted library allocation
page read and write
2C0266A0000
trusted library allocation
page read and write
1F85F61B000
heap
page read and write
3141000
trusted library allocation
page read and write
1BA10000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
1F879780000
trusted library allocation
page read and write
1BA10000
trusted library allocation
page read and write
2015804E000
heap
page read and write
1AF80000000
trusted library allocation
page read and write
8E20BFE000
stack
page read and write
3010000
trusted library allocation
page read and write
1C3C0000
trusted library allocation
page read and write
7FF9F1E90000
trusted library allocation
page read and write
1AFFAABA000
heap
page read and write
1370000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
248E2960000
trusted library allocation
page read and write
1BA10000
trusted library allocation
page read and write
1AF80211000
heap
page read and write
1B11A880000
heap
page read and write
1590000
trusted library allocation
page read and write
1AFFAB13000
heap
page read and write
248C8635000
heap
page read and write
20158919000
heap
page read and write
1C1A0000
trusted library allocation
page read and write
1974D571000
heap
page read and write
1251AC83000
heap
page read and write
1BC90000
trusted library allocation
page read and write
1F8625CB000
trusted library allocation
page read and write
1AFFAA1F000
heap
page read and write
1B890000
trusted library allocation
page read and write
7FF9F1D80000
trusted library allocation
page read and write
1BA30000
trusted library allocation
page read and write
1C3F0000
trusted library allocation
page read and write
1BA70000
trusted library allocation
page read and write
1C3D0000
trusted library allocation
page read and write
15E0000
heap
page read and write
B40000
unkown
page readonly
13E0000
trusted library allocation
page read and write
1AFFFE40000
trusted library allocation
page read and write
2081B108000
heap
page read and write
2012EFB000
stack
page read and write
2015894C000
heap
page read and write
1BCA0000
trusted library allocation
page read and write
7FF9F1CFD000
trusted library allocation
page read and write
2015899D000
heap
page read and write
1590000
trusted library allocation
page read and write
2C0267D0000
heap
page read and write
2C0269F9000
heap
page read and write
1BA00000
trusted library allocation
page read and write
7FFA5FC66000
unkown
page readonly
1590000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
7FF9F1B34000
trusted library allocation
page read and write
119A000
heap
page read and write
248E2CA7000
heap
page read and write
1BDBE000
stack
page read and write
9B6B57A000
stack
page read and write
20158919000
heap
page read and write
1590000
trusted library allocation
page read and write
B40000
unkown
page readonly
15A0000
trusted library allocation
page read and write
1F879571000
heap
page read and write
887157E000
stack
page read and write
151C000
heap
page read and write
7FF9F1D50000
trusted library allocation
page read and write
20158999000
heap
page read and write
9223A7C000
stack
page read and write
1161000
trusted library allocation
page read and write
7FF9F1E80000
trusted library allocation
page read and write
1AFFB302000
heap
page read and write
1F85F460000
unkown
page read and write
1D3EE202000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
1BA20000
trusted library allocation
page read and write
248CA060000
heap
page read and write
7FF9F1B33000
trusted library allocation
page execute and read and write
7FF9F1E00000
trusted library allocation
page read and write
2C026860000
trusted library allocation
page read and write
2015898A000
heap
page read and write
9223978000
stack
page read and write
1BA00000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
1B7F0000
trusted library allocation
page read and write
1F861CEA000
trusted library allocation
page read and write
2015898A000
heap
page read and write
1F879790000
trusted library allocation
page read and write
7FF9F1B40000
trusted library allocation
page read and write
1F8625D3000
trusted library allocation
page read and write
5BEEFF000
stack
page read and write
1C1F0000
trusted library allocation
page read and write
1AFFAA79000
heap
page read and write
150E000
heap
page read and write
7FF9F1C00000
trusted library allocation
page execute and read and write
1590000
trusted library allocation
page read and write
1BCEF000
stack
page read and write
887167C000
stack
page read and write
15B0000
trusted library allocation
page read and write
1F85F5A5000
heap
page read and write
248E25F0000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
7DF4D7C80000
trusted library allocation
page execute and read and write
3F4930E000
stack
page read and write
7FF9F1E50000
trusted library allocation
page read and write
3F48578000
stack
page read and write
248E2600000
trusted library allocation
page read and write
248CADAA000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
9B6BC7E000
stack
page read and write
3F4883E000
stack
page read and write
117C000
heap
page read and write
7FFA5FC75000
unkown
page readonly
1F879760000
trusted library allocation
page read and write
15C0000
heap
page read and write
248E2646000
heap
page read and write
1AF802AB000
heap
page read and write
1590000
trusted library allocation
page read and write
2FA1000
trusted library allocation
page read and write
1D3ED86E000
heap
page read and write
20158E02000
heap
page read and write
13148000
trusted library allocation
page read and write
1974D546000
heap
page read and write
201580E3000
heap
page read and write
7FF9F1B5D000
trusted library allocation
page execute and read and write
1F860EB0000
heap
page readonly
5BE87D000
stack
page read and write
1AFFAA9E000
heap
page read and write
1F879780000
trusted library allocation
page read and write
248E2950000
trusted library allocation
page read and write
1C450000
trusted library allocation
page read and write
1974D55E000
heap
page read and write
1F861CE2000
trusted library allocation
page read and write
1F879760000
trusted library allocation
page read and write
62771EE000
stack
page read and write
2C0268CD000
heap
page read and write
146D000
heap
page read and write
1AF802DF000
heap
page read and write
2015899F000
heap
page read and write
1449000
heap
page read and write
20158985000
heap
page read and write
1590000
trusted library allocation
page read and write
1AFFAAFC000
heap
page read and write
1B8C0000
trusted library allocation
page read and write
248E25F1000
trusted library allocation
page read and write
1440000
heap
page read and write
1F8794DA000
heap
page read and write
15B0000
trusted library allocation
page read and write
7FF9F1D30000
trusted library allocation
page read and write
1B820000
trusted library allocation
page read and write
248CADFB000
trusted library allocation
page read and write
20158989000
heap
page read and write
3020000
trusted library allocation
page read and write
1974D541000
heap
page read and write
201580CA000
heap
page read and write
2015890B000
heap
page read and write
20157E20000
heap
page read and write
1AFFBE01000
trusted library allocation
page read and write
1F879780000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
2081B029000
heap
page read and write
1AF8022B000
heap
page read and write
248C8530000
unkown
page read and write
1F85F601000
heap
page read and write
2EF0000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
2C027720000
trusted library allocation
page read and write
627716E000
stack
page read and write
7FF9F1E20000
trusted library allocation
page read and write
248CA079000
heap
page read and write
1BEEE000
stack
page read and write
1590000
trusted library allocation
page read and write
2015898A000
heap
page read and write
1B930000
heap
page execute and read and write
3F4837D000
stack
page read and write
1370000
trusted library allocation
page read and write
1F879790000
trusted library allocation
page read and write
201580D0000
heap
page read and write
20158054000
heap
page read and write
1315000
stack
page read and write
2F00000
trusted library allocation
page read and write
1C120000
trusted library allocation
page read and write
1BA10000
trusted library allocation
page read and write
20158991000
heap
page read and write
248E25F0000
trusted library allocation
page read and write
1164000
trusted library allocation
page read and write
1AFFB501000
trusted library allocation
page read and write
1251AC53000
heap
page read and write
20157FF0000
remote allocation
page read and write
3F484FF000
stack
page read and write
1AF80008000
trusted library allocation
page read and write
1B850000
trusted library allocation
page read and write
1F879780000
trusted library allocation
page read and write
1F879770000
trusted library allocation
page read and write
248E2940000
trusted library allocation
page read and write
7FF9F1E50000
trusted library allocation
page read and write
248E2600000
direct allocation
page read and write
3F48739000
stack
page read and write
1D3ED802000
heap
page read and write
201589C3000
heap
page read and write
1BAB0000
trusted library allocation
page read and write
15B0000
trusted library allocation
page read and write
1C360000
trusted library allocation
page read and write
20158E02000
heap
page read and write
1223000
heap
page read and write
248E2600000
trusted library allocation
page read and write
15E5000
heap
page read and write
1C150000
trusted library allocation
page read and write
2015898D000
heap
page read and write
20158E02000
heap
page read and write
1590000
trusted library allocation
page read and write
1C1B0000
trusted library allocation
page read and write
8871877000
stack
page read and write
9B6ACBC000
stack
page read and write
1C4E0000
trusted library allocation
page read and write
1C0BE000
stack
page read and write
1AFFB359000
heap
page read and write
248CB016000
trusted library allocation
page read and write
7FF9F1E70000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
1AF8021E000
heap
page read and write
7FF9F1B3D000
trusted library allocation
page execute and read and write
2FC0000
trusted library allocation
page read and write
1251AB50000
heap
page read and write
2E90000
heap
page execute and read and write
7FF9F1E40000
trusted library allocation
page read and write
2081B076000
heap
page read and write
1C4B0000
trusted library allocation
page read and write
922387F000
stack
page read and write
FD0000
unkown
page readonly
201589D9000
heap
page read and write
1AF802FB000
heap
page read and write
3F4827E000
stack
page read and write
1AF8029E000
heap
page read and write
1251AAF0000
heap
page read and write
2081B03C000
heap
page read and write
248C8651000
heap
page read and write
201580D6000
heap
page read and write
15C5000
heap
page read and write
7FF9F1D90000
trusted library allocation
page read and write
248E25F0000
trusted library allocation
page read and write
248C8510000
unkown
page readonly
1F8625E5000
trusted library allocation
page read and write
1F879760000
trusted library allocation
page read and write
C50000
unkown
page readonly
1B8E0000
trusted library allocation
page read and write
1F85F67D000
heap
page read and write
248E25D0000
heap
page execute and read and write
1F85F6AA000
heap
page read and write
7FFA54041000
unkown
page execute read
1BDEE000
stack
page read and write
887147C000
stack
page read and write
15A0000
trusted library allocation
page read and write
1B6BD000
stack
page read and write
1AFFAA8C000
heap
page read and write
10F0000
heap
page read and write
20158974000
heap
page read and write
1F85F460000
unkown
page read and write
248C8540000
heap
page read and write
20158974000
heap
page read and write
2C027750000
trusted library allocation
page read and write
7FF9F1D60000
trusted library allocation
page read and write
20158116000
heap
page read and write
248CAD6B000
trusted library allocation
page read and write
1B910000
trusted library allocation
page read and write
7FFA5FC72000
unkown
page readonly
2015803C000
heap
page read and write
1F8794FB000
heap
page read and write
2EA0000
trusted library allocation
page read and write
248E2600000
trusted library allocation
page read and write
7FF9F1D40000
trusted library allocation
page read and write
9B6B0F8000
stack
page read and write
8E2123E000
stack
page read and write
1F879760000
direct allocation
page read and write
20158986000
heap
page read and write
1F879571000
heap
page read and write
248E2600000
trusted library allocation
page read and write
7FF9F1CE2000
trusted library allocation
page read and write
7FF9F1CF4000
trusted library allocation
page read and write
1B8B0000
trusted library allocation
page read and write
2FC3000
trusted library allocation
page read and write
7FF9F1BEC000
trusted library allocation
page execute and read and write
7FF9F1DF0000
trusted library allocation
page read and write
1AFFBE23000
trusted library allocation
page read and write
B4E317B000
stack
page read and write
B4E2B5B000
stack
page read and write
248C84D0000
heap
page read and write
13A0000
trusted library allocation
page read and write
248E2662000
heap
page read and write
1D3ED720000
heap
page read and write
1B11A900000
heap
page read and write
20158E02000
heap
page read and write
1F85F5C0000
heap
page read and write
62777FF000
stack
page read and write
201589AD000
heap
page read and write
7FF9F1BEC000
trusted library allocation
page execute and read and write
1F86268F000
trusted library allocation
page read and write
248E2CB2000
heap
page read and write
7FF9F1B20000
trusted library allocation
page read and write
9B6B6FF000
stack
page read and write
1AF80262000
heap
page read and write
1F879780000
trusted library allocation
page read and write
1AFFAA92000
heap
page read and write
20157E80000
heap
page read and write
7FF9F1BE0000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
7FF9F1CD2000
trusted library allocation
page read and write
1F879760000
trusted library allocation
page read and write
15C0000
trusted library allocation
page read and write
1BA40000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
8E20C7D000
stack
page read and write
7FF9F1CF0000
trusted library allocation
page execute and read and write
1AFFA830000
heap
page read and write
1974D556000
heap
page read and write
1970000
heap
page read and write
1BBFF000
stack
page read and write
1C210000
trusted library allocation
page read and write
7FF9F1E30000
trusted library allocation
page read and write
5BEBF7000
stack
page read and write
1251AC6A000
heap
page read and write
2C0268BE000
heap
page read and write
248E2D0A000
heap
page read and write
20158976000
heap
page read and write
1AFFB1A0000
trusted library section
page readonly
7FF9F1B30000
trusted library allocation
page read and write
248CB0C8000
trusted library allocation
page read and write
20158051000
heap
page read and write
B4E337F000
stack
page read and write
1530000
heap
page read and write
1B11A852000
heap
page read and write
1AF800D0000
trusted library allocation
page read and write
20158999000
heap
page read and write
1AFFB202000
heap
page read and write
1D3ED900000
heap
page read and write
1590000
trusted library allocation
page read and write
2081B053000
heap
page read and write
248E2C85000
heap
page read and write
248C85E5000
heap
page read and write
1BA00000
trusted library allocation
page read and write
1AF8023F000
heap
page read and write
7FF9F1EA0000
trusted library allocation
page read and write
CEA6CFA000
stack
page read and write
20158102000
heap
page read and write
15A0000
trusted library allocation
page read and write
1BA00000
trusted library allocation
page read and write
1C5A0000
trusted library allocation
page read and write
1BA10000
trusted library allocation
page read and write
1497000
heap
page read and write
7FF9F1B43000
trusted library allocation
page execute and read and write
1F879770000
trusted library allocation
page read and write
1F85F440000
unkown
page readonly
248E2600000
trusted library allocation
page read and write
7FF9F1BF0000
trusted library allocation
page read and write
1251AD00000
heap
page read and write
1150000
trusted library allocation
page read and write
1AFFFEB0000
trusted library allocation
page read and write
20131FE000
stack
page read and write
201580F9000
heap
page read and write
1975000
heap
page read and write
248E2D0A000
heap
page read and write
1BA80000
trusted library allocation
page read and write
1C3A0000
trusted library allocation
page read and write
1F8625DC000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
1AF80000000
trusted library allocation
page read and write
1B11A857000
heap
page read and write
15A0000
trusted library allocation
page read and write
5BE54C000
stack
page read and write
1C4C0000
trusted library allocation
page read and write
248E2600000
trusted library allocation
page read and write
1C1E0000
trusted library allocation
page read and write
1C3B0000
trusted library allocation
page read and write
1F879770000
trusted library allocation
page read and write
1F879572000
heap
page read and write
2081B102000
heap
page read and write
7FF9F1DE0000
trusted library allocation
page read and write
8871B78000
stack
page read and write
1F879578000
heap
page read and write
7FF9F1B8C000
trusted library allocation
page execute and read and write
1BA00000
trusted library allocation
page read and write
248C8590000
heap
page read and write
15A0000
trusted library allocation
page read and write
1D3ED780000
heap
page read and write
1D3ED841000
heap
page read and write
248CB031000
trusted library allocation
page read and write
9B6B27C000
stack
page read and write
1F8611AA000
trusted library allocation
page read and write
1D3ED913000
heap
page read and write
1590000
trusted library allocation
page read and write
7FF9F1DF0000
trusted library allocation
page read and write
1B800000
trusted library allocation
page read and write
1960000
trusted library allocation
page read and write
1F860F30000
trusted library allocation
page read and write
62775FB000
stack
page read and write
1F85F560000
heap
page read and write
7FF9F1D70000
trusted library allocation
page read and write
B42000
unkown
page readonly
20158948000
heap
page read and write
1AF8029B000
heap
page read and write
1251AAE0000
heap
page read and write
1B8A0000
trusted library allocation
page read and write
1251AD02000
heap
page read and write
1F879578000
heap
page read and write
1F879614000
trusted library allocation
page read and write
20158E02000
heap
page read and write
1C570000
trusted library allocation
page read and write
9B6B47E000
stack
page read and write
1BA00000
trusted library allocation
page read and write
1BA20000
trusted library allocation
page read and write
1AFFFFD0000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
248E25F0000
trusted library allocation
page read and write
248E2600000
trusted library allocation
page read and write
20158974000
heap
page read and write
5BEAFE000
stack
page read and write
1590000
trusted library allocation
page read and write
7FFA54062000
unkown
page readonly
248C85E0000
heap
page read and write
20158E3E000
heap
page read and write
1590000
trusted library allocation
page read and write
1F879760000
trusted library allocation
page read and write
1AF80160000
remote allocation
page read and write
5BEDFD000
stack
page read and write
1F85F647000
heap
page read and write
1F8795F0000
heap
page execute and read and write
15C0000
trusted library allocation
page read and write
201580AB000
heap
page read and write
1F879803000
heap
page read and write
7FF9F1CDD000
trusted library allocation
page read and write
1BEBE000
stack
page read and write
248E2600000
direct allocation
page read and write
201580AC000
heap
page read and write
248E25E4000
trusted library allocation
page read and write
17CE000
stack
page read and write
1F879780000
direct allocation
page read and write
1F879650000
trusted library allocation
page read and write
248CAFE9000
trusted library allocation
page read and write
1AF80140000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
1B11A829000
heap
page read and write
7FF9F1DE0000
trusted library allocation
page read and write
7FF9F1B24000
trusted library allocation
page read and write
1AF80120000
trusted library allocation
page read and write
2FA4000
trusted library allocation
page read and write
1BA05000
trusted library allocation
page read and write
1AFFB1D0000
trusted library section
page readonly
1BA10000
trusted library allocation
page read and write
2015804D000
heap
page read and write
1F87952D000
heap
page read and write
1BA01000
trusted library allocation
page read and write
7FF9F1CC2000
trusted library allocation
page read and write
1F8711A5000
trusted library allocation
page read and write
1D3ED879000
heap
page read and write
7FF9F1BE0000
trusted library allocation
page read and write
3F485BF000
stack
page read and write
7FF9F1DB0000
trusted library allocation
page read and write
2C027730000
heap
page readonly
1AF80040000
trusted library allocation
page read and write
20158991000
heap
page read and write
201580E8000
heap
page read and write
201580EB000
heap
page read and write
1B11A710000
heap
page read and write
1F879760000
trusted library allocation
page read and write
1F879780000
trusted library allocation
page read and write
1F879761000
trusted library allocation
page read and write
248C862B000
heap
page read and write
There are 1248 hidden memdumps, click here to show them.