Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
0j6nSbUQQS.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\LTKMYBSEYZ.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\NWTVCDUMOB.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\NWTVCDUMOB.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\YPSIACHYXW.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1m1zykgq.j1e.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3erf2iyg.evd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d0v5zafl.dbs.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d5zu1b4q.fn2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_edvqcf40.141.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hhyhalm4.kif.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_latjz0zt.go2.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m2pua0u5.xtl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ptim3fui.uza.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rbpbjoys.kxe.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vmiojeif.5wh.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wetv5vpy.shr.psm1
|
ASCII text, with no line terminators
|
dropped
|
There are 9 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\0j6nSbUQQS.dll,Main
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\0j6nSbUQQS.dll",#1
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh wlan show profiles
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh wlan show profiles
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip'
-CompressionLevel Optimal
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip'
-CompressionLevel Optimal
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\0j6nSbUQQS.dll,Save
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\0j6nSbUQQS.dll",Main
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\0j6nSbUQQS.dll",Save
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh wlan show profiles
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip'
-CompressionLevel Optimal
|
||
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\0j6nSbUQQS.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\0j6nSbUQQS.dll",#1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 10 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://185.215.113.217/CoreOPT/index.php
|
185.215.113.217
|
||
http://185.215.113.217/CoreOPT/index.php?wal=1
|
185.215.113.217
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://crl.mR
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://crl.mU
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelpX
|
unknown
|
||
http://185.215.113.217/CoreOPT/index.php?wal=1.
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://185.215.113.217/
|
unknown
|
||
https://ion=v4.5
|
unknown
|
||
http://185.215.113.217/CoreOPT/index.php?wal=1K
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://185.215.113.217/CoreOPT/index.phph
|
unknown
|
||
http://185.215.113.217/%
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://185.215.113.217/Contacts
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
There are 15 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.215.113.217
|
unknown
|
Portugal
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C07E97E000
|
stack
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page read and write
|
||
23701C1C000
|
trusted library allocation
|
page read and write
|
||
7DF41FE30000
|
trusted library allocation
|
page execute and read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
EC67E0E000
|
stack
|
page read and write
|
||
196A6076000
|
heap
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
272CDFD6000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
272CFAB0000
|
heap
|
page read and write
|
||
1968E5AF000
|
trusted library allocation
|
page read and write
|
||
196A5DDD000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
47AF000
|
stack
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
7FFD9BACC000
|
trusted library allocation
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
1968DE37000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
23701888000
|
trusted library allocation
|
page read and write
|
||
196A60FB000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
EC67036000
|
stack
|
page read and write
|
||
C07E513000
|
stack
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
EC6723E000
|
stack
|
page read and write
|
||
1968BD10000
|
heap
|
page read and write
|
||
1235000
|
heap
|
page read and write
|
||
1968BE02000
|
heap
|
page read and write
|
||
7FFD9BA14000
|
trusted library allocation
|
page read and write
|
||
272D1958000
|
trusted library allocation
|
page read and write
|
||
2377B7FF000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D3000
|
trusted library allocation
|
page execute and read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
272CFA90000
|
heap
|
page execute and read and write
|
||
492F000
|
stack
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
272CE1B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page execute and read and write
|
||
23710072000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA29000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6CD000
|
trusted library allocation
|
page execute and read and write
|
||
52FE000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
1969DDD1000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
7FFD9B861000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
||
7FFD9B72C000
|
trusted library allocation
|
page execute and read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
272E82AB000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
2C5A000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
23700F8F000
|
trusted library allocation
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page read and write
|
||
196A63B0000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
1968BD93000
|
heap
|
page read and write
|
||
480D000
|
stack
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
272CE1C5000
|
heap
|
page read and write
|
||
272E8376000
|
heap
|
page read and write
|
||
272CF980000
|
trusted library allocation
|
page read and write
|
||
272D124B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page execute and read and write
|
||
4DD1000
|
heap
|
page read and write
|
||
7FFD9BA09000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
C07E5DE000
|
stack
|
page read and write
|
||
EC66F79000
|
stack
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
2377991D000
|
heap
|
page read and write
|
||
1969DF4B000
|
trusted library allocation
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
2377BAAC000
|
heap
|
page read and write
|
||
2EB000
|
stack
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
7FFD9B88A000
|
trusted library allocation
|
page read and write
|
||
23779B60000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
561E000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
7FFD9B6B2000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
84DA96E000
|
unkown
|
page read and write
|
||
523C000
|
stack
|
page read and write
|
||
508E000
|
stack
|
page read and write
|
||
2377B950000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
2AF8000
|
heap
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
23701863000
|
trusted library allocation
|
page read and write
|
||
272D1A22000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
1968DDB1000
|
trusted library allocation
|
page read and write
|
||
2B1F000
|
heap
|
page read and write
|
||
1968D8B5000
|
heap
|
page read and write
|
||
51A0000
|
heap
|
page read and write
|
||
74F000
|
stack
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
1969DFAD000
|
trusted library allocation
|
page read and write
|
||
EC67D0F000
|
stack
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
196A60CB000
|
heap
|
page read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2D8A000
|
heap
|
page read and write
|
||
7FFD9BA69000
|
trusted library allocation
|
page read and write
|
||
4DB7000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
7DF498E80000
|
trusted library allocation
|
page execute and read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
4860000
|
heap
|
page read and write
|
||
23779830000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
196A5FE9000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
4C01000
|
heap
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
C07EE7F000
|
stack
|
page read and write
|
||
196A5E28000
|
heap
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
2377B8A7000
|
heap
|
page read and write
|
||
272CDF50000
|
heap
|
page read and write
|
||
472F000
|
stack
|
page read and write
|
||
2377BB7E000
|
heap
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
C07EAFE000
|
stack
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
272D12A6000
|
trusted library allocation
|
page read and write
|
||
1968BD9B000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
2C30000
|
heap
|
page read and write
|
||
272CF9A0000
|
trusted library allocation
|
page read and write
|
||
272CFE01000
|
trusted library allocation
|
page read and write
|
||
2377B930000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
272E829B000
|
heap
|
page read and write
|
||
2377B1D0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
272D1237000
|
trusted library allocation
|
page read and write
|
||
7FFD9B766000
|
trusted library allocation
|
page read and write
|
||
1969DF95000
|
trusted library allocation
|
page read and write
|
||
237102EB000
|
trusted library allocation
|
page read and write
|
||
7DF414040000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B87A000
|
trusted library allocation
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
196A5FB5000
|
heap
|
page read and write
|
||
2377B7C0000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
4980000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
43B000
|
stack
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
57C0000
|
heap
|
page read and write
|
||
DCB000
|
stack
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7DF41FE40000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B8A0000
|
trusted library allocation
|
page execute and read and write
|
||
272CDFD8000
|
heap
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
4EEE000
|
stack
|
page read and write
|
||
196A5DE9000
|
heap
|
page read and write
|
||
196A602F000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
1968E385000
|
trusted library allocation
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
84DB2BC000
|
stack
|
page read and write
|
||
140E000
|
unkown
|
page read and write
|
||
2377BBAB000
|
heap
|
page read and write
|
||
23701884000
|
trusted library allocation
|
page read and write
|
||
1453000
|
heap
|
page read and write
|
||
23701C20000
|
trusted library allocation
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
69D000
|
unkown
|
page read and write
|
||
C8A000
|
heap
|
page read and write
|
||
2377BBA9000
|
heap
|
page read and write
|
||
1968BFB0000
|
heap
|
page read and write
|
||
84DB33E000
|
stack
|
page read and write
|
||
272CDF9B000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
2377BAD4000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
272D1A1E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B892000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
272D1662000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6EB000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
3427000
|
heap
|
page read and write
|
||
84DAFBE000
|
stack
|
page read and write
|
||
84DB3BB000
|
stack
|
page read and write
|
||
23701B57000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
2377B310000
|
heap
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
272E8340000
|
heap
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
84DAC7F000
|
stack
|
page read and write
|
||
272D03D5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page execute and read and write
|
||
2F94000
|
heap
|
page read and write
|
||
588F000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
1968DD27000
|
heap
|
page execute and read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
2D4C000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
EC6733C000
|
stack
|
page read and write
|
||
1969DDE1000
|
trusted library allocation
|
page read and write
|
||
4C00000
|
heap
|
page read and write
|
||
272E82EA000
|
heap
|
page read and write
|
||
196A5DB0000
|
heap
|
page read and write
|
||
196A600D000
|
heap
|
page read and write
|
||
272CDF30000
|
heap
|
page read and write
|
||
C07EA7F000
|
stack
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
EC66D79000
|
stack
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
196A60C4000
|
heap
|
page read and write
|
||
7FFD9BA32000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
EC66E7E000
|
stack
|
page read and write
|
||
2A10000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
2EEB000
|
stack
|
page read and write
|
||
36E0000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2E9E000
|
stack
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
102F000
|
stack
|
page read and write
|
||
7FFD9B8E0000
|
trusted library allocation
|
page read and write
|
||
4980000
|
trusted library allocation
|
page read and write
|
||
7DF414030000
|
trusted library allocation
|
page execute and read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
272D1264000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
272D16D6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
4630000
|
heap
|
page read and write
|
||
84DB0B8000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
C07EC76000
|
stack
|
page read and write
|
||
7FFD9B6C2000
|
trusted library allocation
|
page read and write
|
||
141A000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
272D12AC000
|
trusted library allocation
|
page read and write
|
||
1968BD30000
|
heap
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
272CFA20000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4F8F000
|
stack
|
page read and write
|
||
1968D8B0000
|
heap
|
page read and write
|
||
272CF9E0000
|
heap
|
page read and write
|
||
2370107C000
|
trusted library allocation
|
page read and write
|
||
C07E8FF000
|
stack
|
page read and write
|
||
36E6000
|
heap
|
page read and write
|
||
E70000
|
heap
|
page read and write
|
||
1451000
|
heap
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
272E8017000
|
heap
|
page execute and read and write
|
||
2370109F000
|
trusted library allocation
|
page read and write
|
||
C07EDFE000
|
stack
|
page read and write
|
||
2377B210000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
1968BED0000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
1969E0A9000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
196A60D5000
|
heap
|
page read and write
|
||
196A5EAB000
|
heap
|
page read and write
|
||
1968BDDE000
|
heap
|
page read and write
|
||
4BF0000
|
heap
|
page read and write
|
||
196A60F8000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
7FFD9B881000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
84DA8E3000
|
stack
|
page read and write
|
||
1969DDB1000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
298B000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9B70C000
|
trusted library allocation
|
page execute and read and write
|
||
84DAEFF000
|
stack
|
page read and write
|
||
5DE000
|
stack
|
page read and write
|
||
1968BE41000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
C6F000
|
heap
|
page read and write
|
||
237005D4000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
1968BFB5000
|
heap
|
page read and write
|
||
272E8120000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2377990B000
|
heap
|
page read and write
|
||
42C0000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
272CFAB5000
|
heap
|
page read and write
|
||
4EF0000
|
heap
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
4620000
|
heap
|
page read and write
|
||
1969E007000
|
trusted library allocation
|
page read and write
|
||
272E8344000
|
heap
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
196A60B4000
|
heap
|
page read and write
|
||
9CE000
|
stack
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
272D124D000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
7FFD9BA50000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
2B0D000
|
heap
|
page read and write
|
||
272D1261000
|
trusted library allocation
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
1968F685000
|
trusted library allocation
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
272DFE31000
|
trusted library allocation
|
page read and write
|
||
272DFE21000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
7FFD9B7A6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA1C000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
237011D5000
|
trusted library allocation
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
29CA000
|
stack
|
page read and write
|
||
1968BEE0000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
196A5EF2000
|
heap
|
page read and write
|
||
C07ED77000
|
stack
|
page read and write
|
||
4C0000
|
heap
|
page read and write
|
||
1968DCC0000
|
heap
|
page execute and read and write
|
||
23700DB8000
|
trusted library allocation
|
page read and write
|
||
23700001000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
571E000
|
stack
|
page read and write
|
||
196A5DB4000
|
heap
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA28000
|
trusted library allocation
|
page read and write
|
||
2377BB2B000
|
heap
|
page read and write
|
||
4890000
|
heap
|
page read and write
|
||
1968EF02000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
59BF000
|
stack
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
2C3C000
|
stack
|
page read and write
|
||
1968EA10000
|
trusted library allocation
|
page read and write
|
||
1216000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
EC671BE000
|
stack
|
page read and write
|
||
237798FD000
|
heap
|
page read and write
|
||
4D1E000
|
stack
|
page read and write
|
||
84DAE7E000
|
stack
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA18000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
2CD7000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
1969E0A0000
|
trusted library allocation
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
EC66C7F000
|
stack
|
page read and write
|
||
EC67D8C000
|
stack
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2377BA90000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
527F000
|
stack
|
page read and write
|
||
7FFD9B776000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
2377BACC000
|
heap
|
page read and write
|
||
7FFD9BB1D000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2EDF000
|
stack
|
page read and write
|
||
1968BF70000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
7FFD9B77C000
|
trusted library allocation
|
page execute and read and write
|
||
6DE000
|
stack
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
23700228000
|
trusted library allocation
|
page read and write
|
||
4610000
|
heap
|
page read and write
|
||
4F6E000
|
stack
|
page read and write
|
||
43C000
|
stack
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
7FFD9B7B6000
|
trusted library allocation
|
page execute and read and write
|
||
542F000
|
stack
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
2D08000
|
heap
|
page read and write
|
||
330E000
|
stack
|
page read and write
|
||
272E8220000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
10ED000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9B9E3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
23779901000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9BB26000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
196A5FB7000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
C6B000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
2377B315000
|
heap
|
page read and write
|
||
272DFE72000
|
trusted library allocation
|
page read and write
|
||
130D000
|
unkown
|
page read and write
|
||
272E83B6000
|
heap
|
page read and write
|
||
196A5FB0000
|
heap
|
page read and write
|
||
535000
|
stack
|
page read and write
|
||
2370162A000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
701000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
7DF498E60000
|
trusted library allocation
|
page execute and read and write
|
||
C07EEFD000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
1968BD8E000
|
heap
|
page read and write
|
||
7FFD9BB60000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
196A60BB000
|
heap
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2377B7B0000
|
heap
|
page execute and read and write
|
||
272CDF95000
|
heap
|
page read and write
|
||
23701131000
|
trusted library allocation
|
page read and write
|
||
2377BB0A000
|
heap
|
page read and write
|
||
343D000
|
heap
|
page read and write
|
||
272CDF62000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B2000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA19000
|
trusted library allocation
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
35D0000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
1968BDAE000
|
heap
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
1968BDD8000
|
heap
|
page read and write
|
||
7FFD9BA03000
|
trusted library allocation
|
page read and write
|
||
137E000
|
unkown
|
page read and write
|
||
7FFD9BA75000
|
trusted library allocation
|
page read and write
|
||
1968BEF0000
|
heap
|
page readonly
|
||
23700E21000
|
trusted library allocation
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
527C000
|
stack
|
page read and write
|
||
2990000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
79C000
|
stack
|
page read and write
|
||
1968BD75000
|
heap
|
page read and write
|
||
C07EB7E000
|
stack
|
page read and write
|
||
272D07F1000
|
trusted library allocation
|
page read and write
|
||
12C5000
|
heap
|
page read and write
|
||
7FFD9B76C000
|
trusted library allocation
|
page execute and read and write
|
||
EC672BE000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9BB16000
|
trusted library allocation
|
page read and write
|
||
1968EB93000
|
trusted library allocation
|
page read and write
|
||
2F00000
|
heap
|
page read and write
|
||
7FFD9B6CB000
|
trusted library allocation
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
272E8000000
|
trusted library allocation
|
page read and write
|
||
23700DED000
|
trusted library allocation
|
page read and write
|
||
272E8332000
|
heap
|
page read and write
|
||
237010C2000
|
trusted library allocation
|
page read and write
|
||
2F90000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9B6ED000
|
trusted library allocation
|
page execute and read and write
|
||
84DACFE000
|
stack
|
page read and write
|
||
1968F618000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
7FFD9B890000
|
trusted library allocation
|
page execute and read and write
|
||
2F94000
|
heap
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
196A604A000
|
heap
|
page read and write
|
||
272E80D5000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
2377BB8F000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
23710001000
|
trusted library allocation
|
page read and write
|
||
C07E59E000
|
unkown
|
page read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page read and write
|
||
272D1616000
|
trusted library allocation
|
page read and write
|
||
272E82D8000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page read and write
|
||
7CE000
|
stack
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
1968EEF6000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B71C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA2C000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
704000
|
heap
|
page read and write
|
||
272E829F000
|
heap
|
page read and write
|
||
1968BEEB000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
272CDF8E000
|
heap
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
272E82C9000
|
heap
|
page read and write
|
||
84DB1BE000
|
stack
|
page read and write
|
||
272D14A8000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
272E822D000
|
heap
|
page read and write
|
||
84DB139000
|
stack
|
page read and write
|
||
1969E082000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
84DA9EE000
|
stack
|
page read and write
|
||
7FFD9B8D0000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
196A608B000
|
heap
|
page read and write
|
||
196A5EF7000
|
heap
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
EC669FF000
|
unkown
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
548E000
|
stack
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
272CF990000
|
heap
|
page readonly
|
||
7FFD9B6D0000
|
trusted library allocation
|
page read and write
|
||
1968F321000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
23779B80000
|
heap
|
page read and write
|
||
272E8271000
|
heap
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
2377B7EC000
|
heap
|
page read and write
|
||
272E8020000
|
heap
|
page read and write
|
||
7FFD9B796000
|
trusted library allocation
|
page execute and read and write
|
||
2D84000
|
heap
|
page read and write
|
||
7FFD9B9F3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B862000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
1968BEB0000
|
trusted library allocation
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
196A5E55000
|
heap
|
page read and write
|
||
2377B8BC000
|
heap
|
page read and write
|
||
488F000
|
stack
|
page read and write
|
||
196A5ED0000
|
heap
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
EC66EFE000
|
stack
|
page read and write
|
||
237798B0000
|
trusted library allocation
|
page read and write
|
||
272E00F0000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
484E000
|
stack
|
page read and write
|
||
272CE1C0000
|
heap
|
page read and write
|
||
272E8326000
|
heap
|
page read and write
|
||
1968BD91000
|
heap
|
page read and write
|
||
C07F9CE000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9BAA3000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
29EB000
|
stack
|
page read and write
|
||
196A5EE2000
|
heap
|
page read and write
|
||
7FFD9B8F0000
|
trusted library allocation
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
272D1686000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
84DBE0E000
|
stack
|
page read and write
|
||
237102EF000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4624000
|
heap
|
page read and write
|
||
EC66FBE000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
7FFD9BA3C000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
127E000
|
unkown
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
272E7FD0000
|
heap
|
page execute and read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
EC67138000
|
stack
|
page read and write
|
||
53EE000
|
stack
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
196A5EEA000
|
heap
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
476E000
|
stack
|
page read and write
|
||
7FFD9B78C000
|
trusted library allocation
|
page execute and read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
115F000
|
stack
|
page read and write
|
||
4FAF000
|
stack
|
page read and write
|
||
7FFD9BA38000
|
trusted library allocation
|
page read and write
|
||
47D0000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
23779810000
|
heap
|
page read and write
|
||
1968DDC6000
|
trusted library allocation
|
page read and write
|
||
4BE0000
|
heap
|
page read and write
|
||
7FFD9B7E0000
|
trusted library allocation
|
page execute and read and write
|
||
2F94000
|
heap
|
page read and write
|
||
7FFD9B870000
|
trusted library allocation
|
page execute and read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
EC66CFE000
|
stack
|
page read and write
|
||
152F000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
272E8010000
|
heap
|
page execute and read and write
|
||
272D0E4E000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
23701817000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page read and write
|
||
C07EFFB000
|
stack
|
page read and write
|
||
196A6090000
|
heap
|
page read and write
|
||
7DF498E70000
|
trusted library allocation
|
page execute and read and write
|
||
13EA000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
84DAD79000
|
stack
|
page read and write
|
||
1155000
|
stack
|
page read and write
|
||
272DFE01000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
EC66DFF000
|
stack
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
8EE000
|
unkown
|
page read and write
|
||
7FFD9BB2D000
|
trusted library allocation
|
page read and write
|
||
272E7E06000
|
heap
|
page read and write
|
||
272E835C000
|
heap
|
page read and write
|
||
272D121F000
|
trusted library allocation
|
page read and write
|
||
23779907000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
237018D5000
|
trusted library allocation
|
page read and write
|
||
272E824B000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
23710021000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
2377BA30000
|
trusted library allocation
|
page read and write
|
||
23700F8D000
|
trusted library allocation
|
page read and write
|
||
23779949000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
7FFD9B937000
|
trusted library allocation
|
page read and write
|
||
1968E505000
|
trusted library allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
272D0028000
|
trusted library allocation
|
page read and write
|
||
57BE000
|
stack
|
page read and write
|
||
7FFD9B6C4000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
7FFD9B9BF000
|
trusted library allocation
|
page read and write
|
||
2EAB000
|
stack
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
237798C0000
|
heap
|
page read and write
|
||
84DAF79000
|
stack
|
page read and write
|
||
272CE140000
|
heap
|
page read and write
|
||
272CDF93000
|
heap
|
page read and write
|
||
13EF000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4F0F000
|
stack
|
page read and write
|
||
2377B2C0000
|
heap
|
page read and write
|
||
7FFD9B786000
|
trusted library allocation
|
page read and write
|
||
1401000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
272E805B000
|
heap
|
page read and write
|
||
272E8490000
|
heap
|
page read and write
|
||
73F000
|
stack
|
page read and write
|
||
1968F9D2000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2A7A000
|
heap
|
page read and write
|
||
C07E9F9000
|
stack
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
237010EA000
|
trusted library allocation
|
page read and write
|
||
2377BA50000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
4FFB000
|
stack
|
page read and write
|
||
272E00EB000
|
trusted library allocation
|
page read and write
|
||
23779870000
|
heap
|
page read and write
|
||
820000
|
heap
|
page read and write
|
||
237012EA000
|
trusted library allocation
|
page read and write
|
||
196A6056000
|
heap
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
1968EE02000
|
trusted library allocation
|
page read and write
|
||
1968DFD8000
|
trusted library allocation
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
82F000
|
stack
|
page read and write
|
||
C07EF7E000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
5080000
|
trusted library allocation
|
page read and write
|
||
60A000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
196A5EA9000
|
heap
|
page read and write
|
||
478D000
|
stack
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
1968F908000
|
trusted library allocation
|
page read and write
|
||
272CE170000
|
heap
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
272CE120000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
84DBD8E000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
1969E09B000
|
trusted library allocation
|
page read and write
|
||
84DB23E000
|
stack
|
page read and write
|
||
C07EBF9000
|
stack
|
page read and write
|
||
2377BBA4000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
7FFD9BACA000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
105B000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
196A5F05000
|
heap
|
page read and write
|
||
23701312000
|
trusted library allocation
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
1968DD20000
|
heap
|
page execute and read and write
|
||
1968D769000
|
heap
|
page read and write
|
||
1968BD95000
|
heap
|
page read and write
|
||
F2F000
|
stack
|
page read and write
|
||
2377B7FD000
|
heap
|
page read and write
|
||
7FFD9B6D2000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9B6B3000
|
trusted library allocation
|
page execute and read and write
|
||
EC670BE000
|
stack
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
4DDC000
|
stack
|
page read and write
|
||
2377B267000
|
heap
|
page execute and read and write
|
||
52BE000
|
stack
|
page read and write
|
||
4D9E000
|
stack
|
page read and write
|
||
7FFD9BA79000
|
trusted library allocation
|
page read and write
|
||
33AA000
|
heap
|
page read and write
|
||
7FFD9B6C3000
|
trusted library allocation
|
page execute and read and write
|
||
237102F9000
|
trusted library allocation
|
page read and write
|
||
1968F63A000
|
trusted library allocation
|
page read and write
|
||
2F70000
|
heap
|
page read and write
|
||
84DADFF000
|
stack
|
page read and write
|
||
7FFD9BADC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6DD000
|
trusted library allocation
|
page execute and read and write
|
||
5080000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
98D000
|
stack
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
272E00F9000
|
trusted library allocation
|
page read and write
|
||
1968BF30000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
196A6108000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
10F5000
|
stack
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
7FFD9BA22000
|
trusted library allocation
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
1968BD50000
|
heap
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
272D1278000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
6F8000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
537D000
|
stack
|
page read and write
|
||
1968F774000
|
trusted library allocation
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
1968DD30000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4CE0000
|
trusted library allocation
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
1968F3DE000
|
trusted library allocation
|
page read and write
|
||
2377B871000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
196A6050000
|
heap
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
5270000
|
heap
|
page read and write
|
||
23779946000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
7FFD9B6D4000
|
trusted library allocation
|
page read and write
|
||
1969DDFC000
|
trusted library allocation
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
42AF000
|
stack
|
page read and write
|
||
7FFD9B8C0000
|
trusted library allocation
|
page execute and read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
23701055000
|
trusted library allocation
|
page read and write
|
||
4D5F000
|
stack
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
1CB000
|
stack
|
page read and write
|
||
23710031000
|
trusted library allocation
|
page read and write
|
||
366E000
|
stack
|
page read and write
|
||
2377B66B000
|
heap
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
1968DDA0000
|
heap
|
page execute and read and write
|
||
7FFD9BAE0000
|
trusted library allocation
|
page read and write
|
||
32B000
|
stack
|
page read and write
|
||
503C000
|
stack
|
page read and write
|
||
EC66973000
|
stack
|
page read and write
|
||
1969DFED000
|
trusted library allocation
|
page read and write
|
||
1968BE3B000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
196A5E87000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
1968DD10000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
272CDFDF000
|
heap
|
page read and write
|
||
272E8334000
|
heap
|
page read and write
|
||
7FFD9BA04000
|
trusted library allocation
|
page read and write
|
||
114D000
|
stack
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
23779730000
|
heap
|
page read and write
|
||
272E8140000
|
heap
|
page read and write
|
||
23779B85000
|
heap
|
page read and write
|
||
272E836E000
|
heap
|
page read and write
|
||
23700ECB000
|
trusted library allocation
|
page read and write
|
||
272D1233000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
5050000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
142E000
|
stack
|
page read and write
|
||
C07E87E000
|
stack
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
2377BA98000
|
heap
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
272E8152000
|
heap
|
page read and write
|
||
7FFD9BABA000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
7FFD9BA24000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
272CFE87000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6DB000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2EFE000
|
stack
|
page read and write
|
||
1968BE70000
|
heap
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
196A608E000
|
heap
|
page read and write
|
||
23700F87000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
AD6000
|
heap
|
page read and write
|
||
54CE000
|
stack
|
page read and write
|
||
1968EEF0000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
1969DDE5000
|
trusted library allocation
|
page read and write
|
||
4ECE000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
7FFD9B872000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
7FFD9B860000
|
trusted library allocation
|
page read and write
|
||
272CDFAE000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
23779B70000
|
heap
|
page readonly
|
||
84DB036000
|
stack
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
2377B770000
|
heap
|
page execute and read and write
|
||
7FFD9B6B4000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
7FFD9B86A000
|
trusted library allocation
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
C07ECF8000
|
stack
|
page read and write
|
||
1968BC30000
|
heap
|
page read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
2CF1000
|
heap
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
1969DE22000
|
trusted library allocation
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
52D000
|
stack
|
page read and write
|
||
1968F5CC000
|
trusted library allocation
|
page read and write
|
||
1968F9CD000
|
trusted library allocation
|
page read and write
|
||
2D01000
|
heap
|
page read and write
|
||
4E1D000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
272E80BD000
|
heap
|
page read and write
|
||
4E5D000
|
stack
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page execute and read and write
|
||
338F000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
474D000
|
stack
|
page read and write
|
||
4BE1000
|
heap
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
||
23700086000
|
trusted library allocation
|
page read and write
|
||
2377B260000
|
heap
|
page execute and read and write
|
||
7E4000
|
heap
|
page read and write
|
||
4DB1000
|
heap
|
page read and write
|
||
2F94000
|
heap
|
page read and write
|
||
7FFD9B871000
|
trusted library allocation
|
page read and write
|
||
2D84000
|
heap
|
page read and write
|
||
533E000
|
stack
|
page read and write
|
||
4611000
|
heap
|
page read and write
|
There are 1068 hidden memdumps, click here to show them.