IOC Report
Windows Defender.exe

loading gif

Files

File Path
Type
Category
Malicious
Windows Defender.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Windows Defender.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Windows Defender.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3mz3yklq.0er.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4bgonc1e.axp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4kw2qyt5.pgg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_54gfknof.qbi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_arooirdp.yhs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_chzbvprm.k4n.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dti0ppf5.beu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dxmsxief.1od.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e3fkp05t.ajq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ljtuef3l.sho.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o2fs4jrv.0nb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rhpwirbc.ab4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uc45zjc0.wd3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wtcjmwls.p0f.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xg0j3rl5.dw2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yv2pw3ou.4ls.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Defender.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Oct 8 11:03:17 2024, mtime=Tue Oct 8 11:03:17 2024, atime=Tue Oct 8 11:03:17 2024, length=87552, window=hide
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Windows Defender.exe
"C:\Users\user\Desktop\Windows Defender.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\Windows Defender.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Defender.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Windows Defender.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Defender.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows Defender" /tr "C:\Users\user\AppData\Local\Windows Defender.exe"
malicious
C:\Users\user\AppData\Local\Windows Defender.exe
"C:\Users\user\AppData\Local\Windows Defender.exe"
malicious
C:\Users\user\AppData\Local\Windows Defender.exe
"C:\Users\user\AppData\Local\Windows Defender.exe"
malicious
C:\Users\user\AppData\Local\Windows Defender.exe
"C:\Users\user\AppData\Local\Windows Defender.exe"
malicious
C:\Users\user\AppData\Local\Windows Defender.exe
"C:\Users\user\AppData\Local\Windows Defender.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
22.ip.gl.ply.gg
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.microsoft.cL
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
22.ip.gl.ply.gg
147.185.221.22
malicious
ip-api.com
208.95.112.1
malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
147.185.221.22
22.ip.gl.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Defender_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows Defender
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
12EA1000
trusted library allocation
page read and write
malicious
2E91000
trusted library allocation
page read and write
malicious
AD2000
unkown
page readonly
malicious
7FFD34790000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
1857BDC9000
heap
page read and write
12F53000
trusted library allocation
page read and write
7FFD34752000
trusted library allocation
page read and write
253A18C0000
heap
page execute and read and write
7FFD346E0000
trusted library allocation
page read and write
1B0623E2000
trusted library allocation
page read and write
123C000
heap
page read and write
DE0000
heap
page read and write
2538B201000
trusted library allocation
page read and write
7FFD34626000
trusted library allocation
page read and write
19F8C730000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
1857B9E4000
heap
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
7FFD34574000
trusted library allocation
page read and write
253876E8000
heap
page read and write
19F8E2EB000
trusted library allocation
page read and write
7DF49C3A0000
trusted library allocation
page execute and read and write
25387870000
trusted library section
page read and write
7FFD34870000
trusted library allocation
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
1857BC8E000
heap
page read and write
A36000
heap
page read and write
1857BC38000
heap
page read and write
253A18F0000
heap
page read and write
1B07A270000
heap
page read and write
5EC9EB7000
stack
page read and write
7133D77000
stack
page read and write
19F8FAD6000
trusted library allocation
page read and write
1857B4D4000
heap
page read and write
49FC78C000
stack
page read and write
1B071C82000
trusted library allocation
page read and write
18510031000
trusted library allocation
page read and write
19F8F396000
trusted library allocation
page read and write
1B05FF36000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
1B9DE000
stack
page read and write
7FFD3459C000
trusted library allocation
page execute and read and write
1AFF0000
heap
page execute and read and write
19FA6716000
heap
page execute and read and write
7FFD348AC000
trusted library allocation
page read and write
7FFD34581000
trusted library allocation
page read and write
2E51000
trusted library allocation
page read and write
CB0000
heap
page read and write
7FFD347C2000
trusted library allocation
page read and write
DB0000
heap
page read and write
1231000
heap
page read and write
18501069000
trusted library allocation
page read and write
13F0000
trusted library allocation
page read and write
5EC9BFE000
stack
page read and write
7133B7E000
stack
page read and write
2538AC6E000
trusted library allocation
page read and write
19FA660C000
heap
page read and write
7FFD34560000
trusted library allocation
page read and write
7FFD34900000
trusted library allocation
page read and write
E5F000
stack
page read and write
7FFD347C0000
trusted library allocation
page read and write
7FFD3456D000
trusted library allocation
page execute and read and write
7FFD34560000
trusted library allocation
page read and write
7FFD34610000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
7133693000
stack
page read and write
1857BC10000
heap
page execute and read and write
7FFD34730000
trusted library allocation
page execute and read and write
19F8C50E000
heap
page read and write
7FFD34880000
trusted library allocation
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
253996E3000
trusted library allocation
page read and write
CE2EBC3000
stack
page read and write
11B0000
trusted library allocation
page read and write
7FFD346F1000
trusted library allocation
page read and write
A80000
heap
page read and write
1C11E000
stack
page read and write
253878C0000
heap
page readonly
2538B1E1000
trusted library allocation
page read and write
5EC9D79000
stack
page read and write
1B0600C0000
trusted library allocation
page read and write
185012AC000
trusted library allocation
page read and write
253890C0000
trusted library allocation
page read and write
C7E000
stack
page read and write
1857B430000
trusted library allocation
page read and write
7FFD34584000
trusted library allocation
page read and write
18501031000
trusted library allocation
page read and write
7FFD34574000
trusted library allocation
page read and write
71337DE000
stack
page read and write
253878B0000
trusted library allocation
page read and write
7FFD34702000
trusted library allocation
page read and write
7FFD348AC000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
5ECA0BC000
stack
page read and write
1340000
heap
page read and write
1857B390000
trusted library allocation
page read and write
7FF40F540000
trusted library allocation
page execute and read and write
CD0000
heap
page execute and read and write
7FFD347A0000
trusted library allocation
page read and write
7FFD34710000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
7FFD348A0000
trusted library allocation
page read and write
7FFD348AA000
trusted library allocation
page read and write
1850186A000
trusted library allocation
page read and write
253A1720000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
19FA6913000
heap
page read and write
7FFD34620000
trusted library allocation
page read and write
1B0629CB000
trusted library allocation
page read and write
7FFD34810000
trusted library allocation
page read and write
FF0000
heap
page read and write
1BCE0000
heap
page read and write
185010C4000
trusted library allocation
page read and write
1B079EB4000
heap
page read and write
98C000
heap
page read and write
1B060140000
trusted library allocation
page read and write
25387890000
trusted library allocation
page read and write
7FFD34563000
trusted library allocation
page execute and read and write
900000
heap
page read and write
7FFD34562000
trusted library allocation
page read and write
18501E28000
trusted library allocation
page read and write
19F8C573000
heap
page read and write
935000
heap
page read and write
1B05FEFC000
heap
page read and write
CE2EF7E000
stack
page read and write
19F90070000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page read and write
1C5BA000
stack
page read and write
26FF000
stack
page read and write
12738000
trusted library allocation
page read and write
5ECAD8C000
stack
page read and write
275F6BB0000
heap
page read and write
7FFD34580000
trusted library allocation
page read and write
1857B330000
trusted library section
page read and write
1B07A3BA000
heap
page read and write
1380000
heap
page read and write
1B062B67000
trusted library allocation
page read and write
18510001000
trusted library allocation
page read and write
114D000
heap
page read and write
CE3000C000
stack
page read and write
19FA6740000
heap
page read and write
7FFD34800000
trusted library allocation
page read and write
18579920000
heap
page read and write
7FFD345FC000
trusted library allocation
page execute and read and write
7FFD34820000
trusted library allocation
page read and write
7FFD347C0000
trusted library allocation
page read and write
1B3DD000
stack
page read and write
1B06376E000
trusted library allocation
page read and write
19F8C4FA000
heap
page read and write
C10000
unkown
page readonly
7FFD349C0000
trusted library allocation
page read and write
18501890000
trusted library allocation
page read and write
1B07A345000
heap
page read and write
7133EFF000
stack
page read and write
713407B000
stack
page read and write
1B0637B8000
trusted library allocation
page read and write
CE2F53E000
stack
page read and write
18579981000
heap
page read and write
7FFD3459C000
trusted library allocation
page execute and read and write
AB2000
heap
page read and write
1B05FEB0000
heap
page read and write
7FFD34760000
trusted library allocation
page read and write
1B063793000
trusted library allocation
page read and write
7FFD3455B000
trusted library allocation
page read and write
7FFD348D0000
trusted library allocation
page read and write
253878E0000
trusted library allocation
page read and write
19FA6AF0000
heap
page read and write
19F8C6A0000
heap
page read and write
1857B380000
heap
page readonly
49FC889000
stack
page read and write
19FA6664000
heap
page read and write
7FFD34740000
trusted library allocation
page read and write
7FFD34760000
trusted library allocation
page read and write
1BADE000
stack
page read and write
1857998B000
heap
page read and write
1857BB30000
heap
page read and write
7FFD34770000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
1C6B8000
stack
page read and write
1CBAE000
stack
page read and write
1208000
heap
page read and write
10E6000
heap
page read and write
1B071C7A000
trusted library allocation
page read and write
1B079F76000
heap
page execute and read and write
19FA6710000
heap
page execute and read and write
110B000
heap
page read and write
CE2F2B9000
stack
page read and write
1857BC3C000
heap
page read and write
BA0000
heap
page read and write
1B05FDF0000
heap
page read and write
19F8C4B0000
heap
page read and write
10E0000
heap
page read and write
1857BA08000
heap
page read and write
18501163000
trusted library allocation
page read and write
1B4DD000
stack
page read and write
7FFD34594000
trusted library allocation
page read and write
1BC1E000
stack
page read and write
7FFD348C4000
trusted library allocation
page read and write
19F8E080000
heap
page read and write
19F8F2A5000
trusted library allocation
page read and write
25387880000
trusted library section
page read and write
25389210000
heap
page read and write
1857BCBD000
heap
page read and write
1B8A0000
heap
page execute and read and write
19F9E574000
trusted library allocation
page read and write
1C4BE000
stack
page read and write
1B07A0E0000
trusted library allocation
page read and write
B70000
heap
page read and write
7FFD3462C000
trusted library allocation
page execute and read and write
7134C4C000
stack
page read and write
7133FFE000
stack
page read and write
49FBB39000
stack
page read and write
7FFD34660000
trusted library allocation
page execute and read and write
7FFD34873000
trusted library allocation
page read and write
1B07A274000
heap
page read and write
2F1C000
trusted library allocation
page read and write
253A19D0000
heap
page read and write
7FFD34583000
trusted library allocation
page read and write
19F90090000
trusted library allocation
page read and write
253993F1000
trusted library allocation
page read and write
25387610000
heap
page read and write
2538A6E7000
trusted library allocation
page read and write
1BBDE000
stack
page read and write
19F9004B000
trusted library allocation
page read and write
13DE000
stack
page read and write
2F80000
trusted library allocation
page read and write
1B8F0000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
5ECAC87000
stack
page read and write
114B000
heap
page read and write
1B0FE000
stack
page read and write
7FFD348A8000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page execute and read and write
7FFD349C0000
trusted library allocation
page read and write
7FFD34646000
trusted library allocation
page execute and read and write
185004CD000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
7FFD347EE000
trusted library allocation
page read and write
12DF000
stack
page read and write
7FFD34722000
trusted library allocation
page read and write
5EC9AFE000
stack
page read and write
253893D0000
heap
page execute and read and write
10BD000
heap
page read and write
253A1ADA000
heap
page read and write
7FFD3458D000
trusted library allocation
page execute and read and write
7FFD34646000
trusted library allocation
page execute and read and write
19F8C4B8000
heap
page read and write
2E4E000
stack
page read and write
1C21E000
stack
page read and write
253993E1000
trusted library allocation
page read and write
A60000
heap
page read and write
253876C5000
heap
page read and write
19FA6957000
heap
page read and write
7FFD34550000
trusted library allocation
page read and write
253A18C6000
heap
page execute and read and write
1B062900000
trusted library allocation
page read and write
7FFD34996000
trusted library allocation
page read and write
997000
heap
page read and write
CE2FF8E000
stack
page read and write
1857BC40000
heap
page read and write
7FFD34744000
trusted library allocation
page read and write
253A19F6000
heap
page read and write
1B41D000
stack
page read and write
25387915000
heap
page read and write
1B062589000
trusted library allocation
page read and write
7FFD34564000
trusted library allocation
page read and write
7FFD34570000
trusted library allocation
page read and write
CE3020C000
stack
page read and write
1B20F000
stack
page read and write
2F59000
trusted library allocation
page read and write
7FFD34800000
trusted library allocation
page read and write
1423000
trusted library allocation
page read and write
1850188C000
trusted library allocation
page read and write
18579987000
heap
page read and write
CE3008E000
stack
page read and write
18510021000
trusted library allocation
page read and write
12F58000
trusted library allocation
page read and write
1B8D3000
heap
page read and write
7FFD34574000
trusted library allocation
page read and write
105E000
heap
page read and write
1BADF000
stack
page read and write
7FFD34770000
trusted library allocation
page read and write
7FFD34740000
trusted library allocation
page read and write
275F6AD0000
heap
page read and write
7133CF9000
stack
page read and write
AE7000
heap
page read and write
1B05FEB8000
heap
page read and write
5D0000
heap
page read and write
1857B370000
trusted library allocation
page read and write
19F9E280000
trusted library allocation
page read and write
49FC70F000
stack
page read and write
CA0000
trusted library allocation
page read and write
7FFD34660000
trusted library allocation
page execute and read and write
7FFD34810000
trusted library allocation
page read and write
7DF405680000
trusted library allocation
page execute and read and write
49FB8FD000
stack
page read and write
1B0629C3000
trusted library allocation
page read and write
5EC9FBF000
stack
page read and write
7FFD34574000
trusted library allocation
page read and write
1140000
heap
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
7FFD34748000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
253A1785000
heap
page read and write
7FFD34890000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
49FC80D000
stack
page read and write
7FFD34610000
trusted library allocation
page read and write
7FFD3462C000
trusted library allocation
page execute and read and write
19F8C680000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
A00000
heap
page read and write
2D20000
heap
page execute and read and write
1BCE3000
heap
page read and write
2D80000
heap
page execute and read and write
BC5000
heap
page read and write
7FFD34570000
trusted library allocation
page read and write
1B05FFA6000
heap
page read and write
7FFD3471A000
trusted library allocation
page read and write
1031000
heap
page read and write
1B05FE50000
heap
page read and write
7FFD34850000
trusted library allocation
page read and write
7FFD348E0000
trusted library allocation
page read and write
1B079FE0000
heap
page read and write
1B06290D000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
1B079F70000
heap
page execute and read and write
7FFD34870000
trusted library allocation
page read and write
12708000
trusted library allocation
page read and write
12701000
trusted library allocation
page read and write
7FFD3455B000
trusted library allocation
page read and write
5A0000
heap
page read and write
7FFD348B4000
trusted library allocation
page read and write
7FFD345F0000
trusted library allocation
page read and write
7FFD34630000
trusted library allocation
page execute and read and write
49FBBBE000
stack
page read and write
2538A53A000
trusted library allocation
page read and write
253A19FA000
heap
page read and write
18501347000
trusted library allocation
page read and write
1857B95D000
heap
page read and write
1857BDC0000
heap
page read and write
7FFD34780000
trusted library allocation
page read and write
1857BC34000
heap
page read and write
7FFD34830000
trusted library allocation
page read and write
7FFD34543000
trusted library allocation
page execute and read and write
1B079E1C000
heap
page read and write
1340000
trusted library allocation
page read and write
25387910000
heap
page read and write
7FFD347E0000
trusted library allocation
page read and write
1857B980000
heap
page read and write
49FB372000
stack
page read and write
7FFD34690000
trusted library allocation
page execute and read and write
253A1B15000
heap
page read and write
7FFD34830000
trusted library allocation
page read and write
A89000
heap
page read and write
1857B3A0000
heap
page read and write
25387729000
heap
page read and write
7FFD34554000
trusted library allocation
page read and write
19F8F450000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page read and write
1B05FE10000
heap
page read and write
CE2EE7E000
stack
page read and write
7FFD348A8000
trusted library allocation
page read and write
7FFD34710000
trusted library allocation
page execute and read and write
1B062C88000
trusted library allocation
page read and write
49FBCBF000
stack
page read and write
16D5000
heap
page read and write
ABD000
heap
page read and write
253876FC000
heap
page read and write
49FB3FE000
stack
page read and write
18579940000
heap
page read and write
1857B3F0000
heap
page execute and read and write
7FFD34680000
trusted library allocation
page execute and read and write
253A176D000
heap
page read and write
7FFD345F0000
trusted library allocation
page read and write
19FA68A9000
heap
page read and write
7FFD3454D000
trusted library allocation
page execute and read and write
18579B30000
heap
page read and write
49FB9BF000
stack
page read and write
49FBD3B000
stack
page read and write
19F8DFD0000
trusted library allocation
page read and write
7FFD34810000
trusted library allocation
page read and write
C80000
trusted library allocation
page read and write
7FFD34544000
trusted library allocation
page read and write
275F6ED5000
heap
page read and write
BF1D879000
stack
page read and write
1B0719FD000
trusted library allocation
page read and write
253A1902000
heap
page read and write
2EF2000
trusted library allocation
page read and write
19F90095000
trusted library allocation
page read and write
7FFD348B9000
trusted library allocation
page read and write
1B0629C9000
trusted library allocation
page read and write
1229000
heap
page read and write
7FFD34550000
trusted library allocation
page read and write
A20000
heap
page read and write
7FFD34700000
trusted library allocation
page execute and read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD34572000
trusted library allocation
page read and write
7FFD346FA000
trusted library allocation
page read and write
253876DE000
heap
page read and write
49FB978000
stack
page read and write
18501063000
trusted library allocation
page read and write
253A17B7000
heap
page read and write
1857BD51000
heap
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
275F6C30000
heap
page read and write
DF0000
heap
page read and write
19F8C790000
heap
page read and write
12731000
trusted library allocation
page read and write
1B079DE0000
heap
page read and write
7DF42D1B0000
trusted library allocation
page execute and read and write
2538A5B7000
trusted library allocation
page read and write
1857B9DB000
heap
page read and write
7FFD348A3000
trusted library allocation
page read and write
7FFD3457B000
trusted library allocation
page read and write
7FFD34893000
trusted library allocation
page read and write
1B1FF000
stack
page read and write
7FFD348F0000
trusted library allocation
page read and write
18579D15000
heap
page read and write
253996C9000
trusted library allocation
page read and write
7FFD34616000
trusted library allocation
page read and write
CE30109000
stack
page read and write
1B062D53000
trusted library allocation
page read and write
5EC9C79000
stack
page read and write
1410000
trusted library allocation
page read and write
1033000
heap
page read and write
9D9000
heap
page read and write
7FFD34700000
trusted library allocation
page execute and read and write
1B07A2B0000
heap
page read and write
49FBA38000
stack
page read and write
1435000
heap
page read and write
7DF405670000
trusted library allocation
page execute and read and write
12E9E000
trusted library allocation
page read and write
25387724000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
1B9DE000
stack
page read and write
1B0601E5000
heap
page read and write
19F8C578000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
B24000
heap
page read and write
AD0000
unkown
page readonly
7FFD34584000
trusted library allocation
page read and write
7DF48A1E0000
trusted library allocation
page execute and read and write
19F8C536000
heap
page read and write
DF1000
stack
page read and write
551000
stack
page read and write
7FFD3459B000
trusted library allocation
page execute and read and write
2EF9000
trusted library allocation
page read and write
7FFD345CC000
trusted library allocation
page execute and read and write
7FFD345BC000
trusted library allocation
page execute and read and write
19F8C740000
heap
page readonly
185011DF000
trusted library allocation
page read and write
7FFD34656000
trusted library allocation
page execute and read and write
1200000
heap
page read and write
7133BF9000
stack
page read and write
5ECA1BC000
stack
page read and write
19F8C795000
heap
page read and write
1B0600A0000
heap
page readonly
1CEAA000
stack
page read and write
25389360000
heap
page execute and read and write
1857B982000
heap
page read and write
2538AC47000
trusted library allocation
page read and write
1857BAF0000
trusted library allocation
page read and write
1B07A32B000
heap
page read and write
253876B2000
heap
page read and write
940000
trusted library allocation
page read and write
18500FA1000
trusted library allocation
page read and write
7FFD348A2000
trusted library allocation
page read and write
EF1000
stack
page read and write
7FFD346E2000
trusted library allocation
page read and write
7FFD34570000
trusted library allocation
page read and write
19F8F51B000
trusted library allocation
page read and write
2538922D000
heap
page read and write
7FFD347D0000
trusted library allocation
page read and write
1121000
heap
page read and write
9DB000
heap
page read and write
D50000
heap
page read and write
1B0628FC000
trusted library allocation
page read and write
7FFD347D0000
trusted library allocation
page read and write
253878D0000
heap
page read and write
1B8D0000
heap
page read and write
7FFD34690000
trusted library allocation
page execute and read and write
11C0000
heap
page read and write
19F8F41B000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page read and write
7FFD3455D000
trusted library allocation
page execute and read and write
19F8E09A000
heap
page read and write
7FFD34590000
trusted library allocation
page read and write
1B071991000
trusted library allocation
page read and write
5ECAE0E000
stack
page read and write
1B079F80000
heap
page execute and read and write
9E0000
heap
page read and write
19F8EE77000
trusted library allocation
page read and write
275F6BD0000
heap
page read and write
D61000
stack
page read and write
19F8DF90000
heap
page execute and read and write
2711000
trusted library allocation
page read and write
1B0719B1000
trusted library allocation
page read and write
19F8C4F2000
heap
page read and write
1B05FF39000
heap
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
970000
heap
page read and write
18579CF0000
heap
page read and write
7FFD347D0000
trusted library allocation
page read and write
19F8F27A000
trusted library allocation
page read and write
2741000
trusted library allocation
page read and write
25387680000
heap
page read and write
1850022A000
trusted library allocation
page read and write
7FFD345FC000
trusted library allocation
page execute and read and write
7134A4E000
stack
page read and write
25399411000
trusted library allocation
page read and write
1BD1E000
stack
page read and write
7133C7D000
stack
page read and write
12E91000
trusted library allocation
page read and write
19FA6830000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
185013C9000
trusted library allocation
page read and write
12E53000
trusted library allocation
page read and write
CE3018D000
stack
page read and write
5EC9DBE000
stack
page read and write
1857B920000
heap
page read and write
7FFD34656000
trusted library allocation
page execute and read and write
1B079E4D000
heap
page read and write
7FFD34860000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page execute and read and write
25389215000
heap
page read and write
1B2FF000
stack
page read and write
1160000
heap
page read and write
7FFD345F6000
trusted library allocation
page read and write
253A1B05000
heap
page read and write
12F51000
trusted library allocation
page read and write
253876EA000
heap
page read and write
7FFD34970000
trusted library allocation
page read and write
253890F0000
trusted library allocation
page read and write
7FFD34656000
trusted library allocation
page execute and read and write
1120000
heap
page read and write
1B061E5E000
trusted library allocation
page read and write
7FFD349C3000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
A65000
heap
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
1380000
heap
page execute and read and write
1B07A37A000
heap
page read and write
18501785000
trusted library allocation
page read and write
253A19D5000
heap
page read and write
7133AFA000
stack
page read and write
1B0628F8000
trusted library allocation
page read and write
7FFD34580000
trusted library allocation
page read and write
1B07A260000
heap
page read and write
273F000
trusted library allocation
page read and write
1430000
heap
page read and write
7FFD3472A000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
7FFD34573000
trusted library allocation
page execute and read and write
253A1B09000
heap
page read and write
7FFD34710000
trusted library allocation
page execute and read and write
7FFD34750000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
1064000
heap
page read and write
7FFD34544000
trusted library allocation
page read and write
1857BC44000
heap
page read and write
12733000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
19F8C4F8000
heap
page read and write
7FFD346E2000
trusted library allocation
page read and write
1AEC0000
trusted library allocation
page read and write
7FFD34564000
trusted library allocation
page read and write
19FA660A000
heap
page read and write
7FFD348C9000
trusted library allocation
page read and write
1B061991000
trusted library allocation
page read and write
1B05FE55000
heap
page read and write
5ECA03F000
stack
page read and write
7FFD348B0000
trusted library allocation
page read and write
7FFD3459C000
trusted library allocation
page execute and read and write
7FFD348CC000
trusted library allocation
page read and write
7FFD34800000
trusted library allocation
page read and write
1B062678000
trusted library allocation
page read and write
7FFD34590000
trusted library allocation
page read and write
CE3028E000
stack
page read and write
7FFD34580000
trusted library allocation
page read and write
7FFD34720000
trusted library allocation
page execute and read and write
7FFD34850000
trusted library allocation
page read and write
1857BC30000
heap
page read and write
49FBABA000
stack
page read and write
1857BC48000
heap
page read and write
CE2F07E000
stack
page read and write
5B0000
heap
page read and write
2538A37B000
trusted library allocation
page read and write
1B30E000
stack
page read and write
7FFD34790000
trusted library allocation
page read and write
7FFD34722000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
7DF48A1D0000
trusted library allocation
page execute and read and write
ABB000
heap
page read and write
1B062AAF000
trusted library allocation
page read and write
7FFD345CC000
trusted library allocation
page execute and read and write
1BA10000
heap
page execute and read and write
19F9E291000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
BC0000
heap
page read and write
7FFD3499D000
trusted library allocation
page read and write
7FFD34690000
trusted library allocation
page execute and read and write
7FFD34724000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page read and write
B6E000
stack
page read and write
19F8F57E000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
19FA65F5000
heap
page read and write
7FFD34930000
trusted library allocation
page read and write
1AB7E000
stack
page read and write
7FFD34990000
trusted library allocation
page read and write
1B061BB9000
trusted library allocation
page read and write
1B062905000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
18579948000
heap
page read and write
2731000
trusted library allocation
page read and write
7FFD34740000
trusted library allocation
page execute and read and write
12703000
trusted library allocation
page read and write
2538AD2F000
trusted library allocation
page read and write
111F000
heap
page read and write
19F8C53A000
heap
page read and write
1B05FDE0000
heap
page read and write
19FA6945000
heap
page read and write
18501952000
trusted library allocation
page read and write
1BBDF000
stack
page read and write
253A1A03000
heap
page read and write
1B062C33000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
1857BED0000
heap
page read and write
19F8C490000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD34543000
trusted library allocation
page execute and read and write
7FFD347C0000
trusted library allocation
page read and write
49FB6FE000
stack
page read and write
253876DC000
heap
page read and write
5ECAC0A000
stack
page read and write
12E51000
trusted library allocation
page read and write
CE2EEFE000
stack
page read and write
1AFBF000
stack
page read and write
7FFD34760000
trusted library allocation
page execute and read and write
19F9E556000
trusted library allocation
page read and write
C6F000
stack
page read and write
1B05FEED000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
19FA6972000
heap
page read and write
18501E23000
trusted library allocation
page read and write
7FFD34754000
trusted library allocation
page read and write
7FFD348D2000
trusted library allocation
page read and write
7FFD34724000
trusted library allocation
page read and write
1040000
heap
page read and write
7FFD34630000
trusted library allocation
page execute and read and write
1C31D000
stack
page read and write
1B071C94000
trusted library allocation
page read and write
49FB67D000
stack
page read and write
49FC90C000
stack
page read and write
1115000
heap
page read and write
CE2F33A000
stack
page read and write
7FFD349E0000
trusted library allocation
page read and write
1CCAA000
stack
page read and write
1BB1E000
stack
page read and write
BF1D97F000
stack
page read and write
253A19E3000
heap
page read and write
AE9000
heap
page read and write
1857BB07000
heap
page execute and read and write
7FFD348A5000
trusted library allocation
page read and write
CE2F17D000
stack
page read and write
7FFD348D0000
trusted library allocation
page read and write
5EC9CFD000
stack
page read and write
2F5F000
trusted library allocation
page read and write
12E58000
trusted library allocation
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
19F8FAFD000
trusted library allocation
page read and write
7FFD34542000
trusted library allocation
page read and write
7FFD3494E000
trusted library allocation
page read and write
12E98000
trusted library allocation
page read and write
185102EA000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page read and write
253A1AF8000
heap
page read and write
DF5000
heap
page read and write
5EC9B7A000
stack
page read and write
1385000
heap
page read and write
1B05FEF6000
heap
page read and write
1350000
heap
page read and write
19F8C750000
trusted library allocation
page read and write
19F8E085000
heap
page read and write
CA0000
heap
page read and write
10EC000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
5ECA13E000
stack
page read and write
7FFD34990000
trusted library allocation
page read and write
1B100000
heap
page execute and read and write
1C01E000
stack
page read and write
7FFD34626000
trusted library allocation
page execute and read and write
19F9E2DD000
trusted library allocation
page read and write
253996CB000
trusted library allocation
page read and write
2539944B000
trusted library allocation
page read and write
CE2F5BC000
stack
page read and write
7FFD34740000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD34894000
trusted library allocation
page read and write
7FFD34680000
trusted library allocation
page execute and read and write
1B071C84000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
7FFD34712000
trusted library allocation
page read and write
7FFD346E2000
trusted library allocation
page read and write
19FA6820000
heap
page read and write
1B8D0000
heap
page read and write
7FFD34890000
trusted library allocation
page read and write
18500D7E000
trusted library allocation
page read and write
185102E6000
trusted library allocation
page read and write
1857999D000
heap
page read and write
A3A000
heap
page read and write
7FFD348F0000
trusted library allocation
page read and write
7FFD347F0000
trusted library allocation
page read and write
118B000
heap
page read and write
123A000
heap
page read and write
2538B206000
trusted library allocation
page read and write
253996C4000
trusted library allocation
page read and write
7FFD34573000
trusted library allocation
page execute and read and write
1857B340000
trusted library section
page read and write
5EC9A7E000
stack
page read and write
7FFD34720000
trusted library allocation
page execute and read and write
19F8ECC3000
trusted library allocation
page read and write
1B062A4C000
trusted library allocation
page read and write
18510304000
trusted library allocation
page read and write
7FFD348DC000
trusted library allocation
page read and write
7FFD34933000
trusted library allocation
page read and write
19F9E564000
trusted library allocation
page read and write
5EC9E36000
stack
page read and write
270F000
trusted library allocation
page read and write
1B062596000
trusted library allocation
page read and write
253A1890000
heap
page read and write
19F8F2D7000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
1B0628F4000
trusted library allocation
page read and write
1857B97A000
heap
page read and write
7FFD34760000
trusted library allocation
page read and write
7FFD34758000
trusted library allocation
page read and write
1BD45000
heap
page read and write
7FFD347F0000
trusted library allocation
page read and write
253A191B000
heap
page read and write
7FFD34860000
trusted library allocation
page read and write
12E0000
heap
page read and write
7FFD34573000
trusted library allocation
page execute and read and write
2EDB000
trusted library allocation
page read and write
CE2EFF9000
stack
page read and write
713371D000
stack
page read and write
19F8C4ED000
heap
page read and write
2538A49B000
trusted library allocation
page read and write
1B05FE80000
trusted library section
page read and write
2EFB000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
7FFD34750000
trusted library allocation
page execute and read and write
1C7BC000
heap
page read and write
19F8FBBE000
trusted library allocation
page read and write
19F8EE6B000
trusted library allocation
page read and write
185102F4000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
25399401000
trusted library allocation
page read and write
13FF000
stack
page read and write
7DF49C3B0000
trusted library allocation
page execute and read and write
7FFD345CC000
trusted library allocation
page execute and read and write
7FFD349D0000
trusted library allocation
page read and write
18500087000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
253876A7000
heap
page read and write
5EC9773000
stack
page read and write
253A1A60000
heap
page read and write
7FFD34540000
trusted library allocation
page read and write
11B0000
heap
page read and write
1857BC7C000
heap
page read and write
7FFD346F1000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
7134B4E000
stack
page read and write
7FFD34690000
trusted library allocation
page execute and read and write
7FFD347F0000
trusted library allocation
page read and write
7FFD34712000
trusted library allocation
page read and write
7FFD34563000
trusted library allocation
page execute and read and write
7FFD34620000
trusted library allocation
page read and write
1857BDF4000
heap
page read and write
1857B9D6000
heap
page read and write
7FFD34620000
trusted library allocation
page execute and read and write
CE2F3BE000
stack
page read and write
7FFD345F0000
trusted library allocation
page read and write
253898AD000
trusted library allocation
page read and write
CE2F4B8000
stack
page read and write
2538945C000
trusted library allocation
page read and write
1B079E70000
heap
page read and write
110D000
heap
page read and write
1B0637B3000
trusted library allocation
page read and write
9E1000
heap
page read and write
7FFD34899000
trusted library allocation
page read and write
253876A0000
heap
page read and write
2F17000
trusted library allocation
page read and write
7FFD34656000
trusted library allocation
page execute and read and write
7133E79000
stack
page read and write
7FFD3494C000
trusted library allocation
page read and write
2F51000
trusted library allocation
page read and write
7FFD34626000
trusted library allocation
page read and write
1857BC4C000
heap
page read and write
1266000
heap
page read and write
49FB779000
stack
page read and write
7FFD348E0000
trusted library allocation
page read and write
1851006D000
trusted library allocation
page read and write
B80000
heap
page read and write
7FFD34560000
trusted library allocation
page read and write
1B05FE60000
heap
page read and write
1B07A2A4000
heap
page read and write
CE2F1F6000
stack
page read and write
1BCD5000
stack
page read and write
1B05FEC2000
heap
page read and write
2F68000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
DC0000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
9AC000
heap
page read and write
7133DF8000
stack
page read and write
7FFD34573000
trusted library allocation
page execute and read and write
1B0632E2000
trusted library allocation
page read and write
19F9E2A1000
trusted library allocation
page read and write
7FFD348D0000
trusted library allocation
page read and write
1857997D000
heap
page read and write
BD0000
heap
page read and write
2538A5F0000
trusted library allocation
page read and write
7FFD34540000
trusted library allocation
page read and write
19F8E260000
heap
page read and write
CE2F43E000
stack
page read and write
11C5000
heap
page read and write
19F8C57C000
heap
page read and write
18500001000
trusted library allocation
page read and write
1BCE6000
heap
page read and write
1268000
heap
page read and write
185799C3000
heap
page read and write
275F6ED0000
heap
page read and write
1857B944000
heap
page read and write
7FFD3456D000
trusted library allocation
page execute and read and write
253893B0000
trusted library allocation
page read and write
5EC97FE000
stack
page read and write
7FFD3454D000
trusted library allocation
page execute and read and write
7FFD34626000
trusted library allocation
page execute and read and write
7FFD3458D000
trusted library allocation
page execute and read and write
25387640000
heap
page read and write
49FBC3E000
stack
page read and write
7DF42D1A0000
trusted library allocation
page execute and read and write
7FFD34620000
trusted library allocation
page read and write
910000
trusted library allocation
page read and write
2538A3E4000
trusted library allocation
page read and write
19F8E498000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
1B0600B0000
heap
page read and write
2CA0000
heap
page read and write
1B9FF000
stack
page read and write
1B062C96000
trusted library allocation
page read and write
1420000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
49FB7FF000
stack
page read and write
7134CCE000
stack
page read and write
19F8C710000
trusted library allocation
page read and write
7FFD34728000
trusted library allocation
page read and write
7FFD347F0000
trusted library allocation
page read and write
1857BDA2000
heap
page read and write
7FFD34712000
trusted library allocation
page read and write
19F8F54C000
trusted library allocation
page read and write
7FFD34543000
trusted library allocation
page execute and read and write
253996D1000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
7FFD3461C000
trusted library allocation
page execute and read and write
1857BD8E000
heap
page read and write
7FFD3459D000
trusted library allocation
page execute and read and write
7FFD34721000
trusted library allocation
page read and write
7FFD347D0000
trusted library allocation
page read and write
930000
heap
page read and write
1857BCDA000
heap
page read and write
7FFD348C8000
trusted library allocation
page read and write
DE0000
heap
page read and write
1B07A363000
heap
page read and write
1B061A13000
trusted library allocation
page read and write
7FFD347E0000
trusted library allocation
page read and write
2538A500000
trusted library allocation
page read and write
7FFD347E0000
trusted library allocation
page read and write
2D7E000
stack
page read and write
9AF000
heap
page read and write
19F8F332000
trusted library allocation
page read and write
18501005000
trusted library allocation
page read and write
18579B10000
heap
page read and write
184F000
stack
page read and write
7FFD34780000
trusted library allocation
page read and write
1857B4C0000
heap
page read and write
1B07A399000
heap
page read and write
14FF000
stack
page read and write
2538A685000
trusted library allocation
page read and write
2E40000
heap
page read and write
19FA6647000
heap
page read and write
253893E1000
trusted library allocation
page read and write
7FFD34728000
trusted library allocation
page read and write
5ECAB8E000
stack
page read and write
1B071C76000
trusted library allocation
page read and write
1B0625A0000
trusted library allocation
page read and write
DAE000
stack
page read and write
1B063115000
trusted library allocation
page read and write
25389609000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
1857BC72000
heap
page read and write
2E8E000
stack
page read and write
8D0000
heap
page read and write
1B0FE000
stack
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
253A1768000
heap
page read and write
1857B4C5000
heap
page read and write
275F6C38000
heap
page read and write
2D40000
heap
page read and write
7FFD34711000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
18501128000
trusted library allocation
page read and write
7FFD346FA000
trusted library allocation
page read and write
7FFD34742000
trusted library allocation
page read and write
19FA696D000
heap
page read and write
7FFD34990000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
19F8E271000
trusted library allocation
page read and write
CE2F23E000
stack
page read and write
7FFD348A2000
trusted library allocation
page read and write
7134ACC000
stack
page read and write
19F8E73D000
trusted library allocation
page read and write
19F8E230000
trusted library allocation
page read and write
16D0000
heap
page read and write
2701000
trusted library allocation
page read and write
7FFD34899000
trusted library allocation
page read and write
2538B1BC000
trusted library allocation
page read and write
1B85A000
stack
page read and write
185799C5000
heap
page read and write
1BCDE000
stack
page read and write
2538A652000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
10B3000
heap
page read and write
19FA68DD000
heap
page read and write
7FFD34750000
trusted library allocation
page read and write
7134BC7000
stack
page read and write
7FFD349A0000
trusted library allocation
page read and write
19F9E55B000
trusted library allocation
page read and write
D55000
heap
page read and write
7FFD34800000
trusted library allocation
page read and write
7FFD345F6000
trusted library allocation
page read and write
253996D3000
trusted library allocation
page read and write
19F8EFE5000
trusted library allocation
page read and write
19F9E271000
trusted library allocation
page read and write
1850130F000
trusted library allocation
page read and write
1B079994000
heap
page read and write
1227000
heap
page read and write
7FFD34550000
trusted library allocation
page read and write
5ECAD0D000
stack
page read and write
7FFD34712000
trusted library allocation
page read and write
1857B958000
heap
page read and write
2F61000
trusted library allocation
page read and write
1857BD25000
heap
page read and write
18501E03000
trusted library allocation
page read and write
AE6000
unkown
page readonly
18579D10000
heap
page read and write
7133A7E000
stack
page read and write
1857BD93000
heap
page read and write
19F8C6D0000
heap
page read and write
1B05FF0E000
heap
page read and write
7FFD348A0000
trusted library allocation
page read and write
713379E000
stack
page read and write
7FFD34600000
trusted library allocation
page execute and read and write
7FFD34873000
trusted library allocation
page read and write
8F1000
stack
page read and write
7FFD348D0000
trusted library allocation
page read and write
19F8F637000
trusted library allocation
page read and write
19FA65B0000
heap
page read and write
49FB877000
stack
page read and write
18501DDE000
trusted library allocation
page read and write
7FFD34810000
trusted library allocation
page read and write
1B7E0000
heap
page execute and read and write
7FFD34790000
trusted library allocation
page read and write
7FFD34626000
trusted library allocation
page execute and read and write
7FFD3458B000
trusted library allocation
page read and write
26F0000
heap
page execute and read and write
19F8EFEE000
trusted library allocation
page read and write
1B0601E0000
heap
page read and write
7FFD34544000
trusted library allocation
page read and write
2538A7A3000
trusted library allocation
page read and write
7FFD345CC000
trusted library allocation
page execute and read and write
1B05FE90000
trusted library section
page read and write
2FB8000
trusted library allocation
page read and write
7FFD34570000
trusted library allocation
page read and write
25399634000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
1CCB0000
heap
page read and write
2F4F000
stack
page read and write
1857BB00000
heap
page execute and read and write
FFC000
heap
page read and write
1B063220000
trusted library allocation
page read and write
19F8F9F1000
trusted library allocation
page read and write
1ACBD000
stack
page read and write
7FFD34770000
trusted library allocation
page read and write
49FC98E000
stack
page read and write
7FFD34580000
trusted library allocation
page read and write
7FFD34580000
trusted library allocation
page read and write
1B05FEA0000
trusted library allocation
page read and write
1B05FFA2000
heap
page read and write
BF1D8FE000
unkown
page read and write
1540000
heap
page read and write
2D60000
heap
page execute and read and write
18500D75000
trusted library allocation
page read and write
1B060090000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
19F8C56E000
heap
page read and write
2538AB62000
trusted library allocation
page read and write
1857B350000
trusted library allocation
page read and write
7FFD34660000
trusted library allocation
page execute and read and write
7FFD34780000
trusted library allocation
page read and write
5EC9F39000
stack
page read and write
1BDB5000
heap
page read and write
1857B9AE000
heap
page read and write
7FFD3458D000
trusted library allocation
page execute and read and write
7FFD349B0000
trusted library allocation
page read and write
1C7B0000
heap
page read and write
9A1000
heap
page read and write
1B07A368000
heap
page read and write
1150000
heap
page read and write
1B40E000
stack
page read and write
1B062909000
trusted library allocation
page read and write
19F8E050000
heap
page execute and read and write
AAA000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
7133F7E000
stack
page read and write
1CFAC000
stack
page read and write
1B079E1A000
heap
page read and write
7FFD34590000
trusted library allocation
page read and write
1B060100000
heap
page execute and read and write
18579954000
heap
page read and write
2EFF000
trusted library allocation
page read and write
CE2F0F7000
stack
page read and write
7FFD3497C000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
7FFD34894000
trusted library allocation
page read and write
7FFD348D8000
trusted library allocation
page read and write
25389E32000
trusted library allocation
page read and write
1857BDD4000
heap
page read and write
7FFD3454D000
trusted library allocation
page execute and read and write
7DF49C3C0000
trusted library allocation
page execute and read and write
1B0631FA000
trusted library allocation
page read and write
18500A53000
trusted library allocation
page read and write
979000
heap
page read and write
7FFD345BC000
trusted library allocation
page execute and read and write
2538A71A000
trusted library allocation
page read and write
2720000
heap
page read and write
7FFD34820000
trusted library allocation
page read and write
1B0719C1000
trusted library allocation
page read and write
7FFD34880000
trusted library allocation
page read and write
1545000
heap
page read and write
25387620000
heap
page read and write
2538A410000
trusted library allocation
page read and write
There are 1049 hidden memdumps, click here to show them.