IOC Report
1bE8S5sN9S.exe

loading gif

Files

File Path
Type
Category
Malicious
1bE8S5sN9S.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\winlogon.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\winlogon.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1myf0o0d.gpu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3mvbbfge.3nd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_43dicpzh.gxm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4mucf15u.gme.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5g4ddmsf.2ep.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_byxr4s4s.u2u.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f3awwud0.cup.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_febcydls.ud2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gsciwpnw.jvg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h1b5t1im.0hv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jqafyzdm.efn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nepcs5ib.osd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qg4ta4de.fae.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ud0qsn4k.qe2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uki5cg5d.wbr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zqqlgrcb.xlj.psm1
ASCII text, with no line terminators
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1bE8S5sN9S.exe
"C:\Users\user\Desktop\1bE8S5sN9S.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\1bE8S5sN9S.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '1bE8S5sN9S.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\winlogon.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'winlogon.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "winlogon" /tr "C:\ProgramData\winlogon.exe"
malicious
C:\ProgramData\winlogon.exe
C:\ProgramData\winlogon.exe
malicious
C:\ProgramData\winlogon.exe
C:\ProgramData\winlogon.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://pastebin.com/raw/QUwdrCNg
104.20.4.235
malicious
https://pastebin.com
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://crl.microso
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.microsoft.9G
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://pastebin.com
unknown
https://github.com/Pester/Pester
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pastebin.com
104.20.4.235
malicious

IPs

IP
Domain
Country
Malicious
104.20.4.235
pastebin.com
United States
malicious
108.177.127.147
unknown
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\1bE8S5sN9S_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
202000
unkown
page readonly
malicious
7FF848D7D000
trusted library allocation
page execute and read and write
7FF849170000
trusted library allocation
page execute and read and write
27AA6F2B000
trusted library allocation
page read and write
7FF848E70000
trusted library allocation
page execute and read and write
206D21FF000
trusted library allocation
page read and write
22927600000
heap
page read and write
12673000
trusted library allocation
page read and write
7FF848F42000
trusted library allocation
page read and write
2660000
heap
page execute and read and write
27AA62A8000
trusted library allocation
page read and write
2291049E000
trusted library allocation
page read and write
27AA755E000
trusted library allocation
page read and write
E11000
heap
page read and write
1B56F000
stack
page read and write
A63340C000
stack
page read and write
B30000
trusted library allocation
page read and write
206DA3C0000
heap
page read and write
A6325F9000
stack
page read and write
7FF848D73000
trusted library allocation
page execute and read and write
7FF848F00000
trusted library allocation
page execute and read and write
7FF848E60000
trusted library allocation
page execute and read and write
790000
heap
page read and write
27ABEA13000
heap
page read and write
206C3071000
trusted library allocation
page read and write
A63358C000
stack
page read and write
229279B4000
heap
page read and write
1B76F000
stack
page read and write
1B41F000
stack
page read and write
7FF848D84000
trusted library allocation
page read and write
27AA477F000
heap
page read and write
7FF848D80000
trusted library allocation
page read and write
27ABE860000
heap
page read and write
2290D612000
heap
page read and write
7FF8490D2000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page execute and read and write
2291F5B0000
trusted library allocation
page read and write
2290D970000
heap
page readonly
2290F040000
heap
page read and write
206C0320000
heap
page read and write
1B31F000
stack
page read and write
27AA47C6000
heap
page read and write
2290D980000
trusted library allocation
page read and write
22927A2B000
heap
page read and write
7FF848D6B000
trusted library allocation
page read and write
A631FC3000
stack
page read and write
7FF848D63000
trusted library allocation
page execute and read and write
206C01C9000
heap
page read and write
1B99D000
stack
page read and write
27AA46B0000
heap
page read and write
27ABE892000
heap
page read and write
1FE532CD000
heap
page read and write
229105CF000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
229279E7000
heap
page read and write
1B35F000
stack
page read and write
3F5DF8C000
stack
page read and write
7FF848DCC000
trusted library allocation
page execute and read and write
7FF848E26000
trusted library allocation
page read and write
22927A91000
heap
page read and write
3A0000
heap
page read and write
206DA412000
heap
page read and write
1FE3B82F000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
1FE3C45E000
trusted library allocation
page read and write
2290F2B0000
heap
page execute and read and write
206DA403000
heap
page read and write
7FF84913A000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
7FF848EF0000
trusted library allocation
page execute and read and write
7FF8491B0000
trusted library allocation
page read and write
206C019D000
heap
page read and write
7FF848DFC000
trusted library allocation
page execute and read and write
7FF849180000
trusted library allocation
page read and write
1FE3BFD0000
trusted library allocation
page read and write
229276D3000
heap
page read and write
7FF848F54000
trusted library allocation
page read and write
206C1D25000
heap
page read and write
7FF849093000
trusted library allocation
page read and write
B85000
heap
page read and write
1FE52F91000
heap
page read and write
A63293E000
stack
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
E37000
heap
page read and write
7FF8491A0000
trusted library allocation
page read and write
1FE4ACA1000
trusted library allocation
page read and write
1FE39026000
heap
page read and write
1FE532FB000
heap
page read and write
1FE3AE59000
trusted library allocation
page read and write
27ABE5F6000
heap
page read and write
229102C4000
trusted library allocation
page read and write
1C620000
heap
page read and write
D20000
heap
page execute and read and write
206C1EC0000
heap
page execute and read and write
206C1F95000
trusted library allocation
page read and write
E0B000
heap
page read and write
27ABE6B0000
heap
page execute and read and write
7FF848D8B000
trusted library allocation
page read and write
A23000
heap
page read and write
1FE3B0FD000
trusted library allocation
page read and write
7FF8490C8000
trusted library allocation
page read and write
27AA6E29000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
A5E8FDE000
stack
page read and write
7DF4EC260000
trusted library allocation
page execute and read and write
156EDF40000
heap
page read and write
2290D6C7000
heap
page read and write
206C2FA8000
trusted library allocation
page read and write
1FE534F0000
heap
page read and write
7FF848EF1000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page execute and read and write
7FF848FE0000
trusted library allocation
page read and write
7FF8490A3000
trusted library allocation
page read and write
980000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
7FF848E16000
trusted library allocation
page read and write
1FE3B682000
trusted library allocation
page read and write
A5EA2CD000
stack
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
206C2C8B000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
1175000
heap
page read and write
7FF848D74000
trusted library allocation
page read and write
7FF848D54000
trusted library allocation
page read and write
A5EA54E000
stack
page read and write
1FE3C022000
trusted library allocation
page read and write
2291F5CA000
trusted library allocation
page read and write
1FE39022000
heap
page read and write
206C1D90000
heap
page execute and read and write
7FF848E60000
trusted library allocation
page execute and read and write
A30000
heap
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
265B000
trusted library allocation
page read and write
1FE3BCCA000
trusted library allocation
page read and write
1FE3903E000
heap
page read and write
206C30BD000
trusted library allocation
page read and write
1B55E000
stack
page read and write
1FE3C4C4000
trusted library allocation
page read and write
1FE531FC000
heap
page read and write
7FF848D90000
trusted library allocation
page read and write
12AA3000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
22927604000
heap
page read and write
2290EFD0000
trusted library allocation
page read and write
910000
heap
page read and write
206DA461000
heap
page read and write
7FF848D9C000
trusted library allocation
page execute and read and write
7FF848D70000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
DF9000
heap
page read and write
206C0380000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
2290D625000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
206C2139000
trusted library allocation
page read and write
CBEE57B000
stack
page read and write
7FF848D73000
trusted library allocation
page execute and read and write
7FF849190000
trusted library allocation
page read and write
206DA41E000
heap
page read and write
7FF848EF0000
trusted library allocation
page read and write
1FE3BEDD000
trusted library allocation
page read and write
1C220000
heap
page read and write
3F5C973000
stack
page read and write
2291F5BA000
trusted library allocation
page read and write
1FE3B9AD000
trusted library allocation
page read and write
1FE52FD7000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
2292767D000
heap
page read and write
229277F0000
heap
page execute and read and write
CBEF0CD000
stack
page read and write
7FF848D60000
trusted library allocation
page read and write
2292761F000
heap
page read and write
27ABEA70000
trusted library allocation
page read and write
2290D560000
heap
page read and write
27ABE8E6000
heap
page read and write
229102F6000
trusted library allocation
page read and write
79C000
heap
page read and write
12611000
trusted library allocation
page read and write
7FF848F12000
trusted library allocation
page read and write
27ABE9AC000
heap
page read and write
2664000
trusted library allocation
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
1FE4AC31000
trusted library allocation
page read and write
1FE3BCF3000
trusted library allocation
page read and write
206DA482000
heap
page read and write
8D0000
heap
page read and write
2290D686000
heap
page read and write
22927800000
heap
page read and write
27AA71BB000
trusted library allocation
page read and write
3F5CCFE000
stack
page read and write
7FF849160000
trusted library allocation
page read and write
206DA426000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
2611000
trusted library allocation
page read and write
206DA2E0000
heap
page read and write
1FE3C49D000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
3F5C9FD000
stack
page read and write
27AA47C8000
heap
page read and write
1AFDD000
stack
page read and write
1FE3BBFF000
trusted library allocation
page read and write
27AA479F000
heap
page read and write
264E000
stack
page read and write
27AA7433000
trusted library allocation
page read and write
2290D6FB000
heap
page read and write
26F3000
trusted library allocation
page read and write
1B39A000
heap
page read and write
2930000
heap
page execute and read and write
7FF849030000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
7FF848D64000
trusted library allocation
page read and write
CBEDBEF000
stack
page read and write
3B0000
heap
page read and write
3F5DE89000
stack
page read and write
7FF8490BC000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
27AA4670000
heap
page read and write
2AB1000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
7DF491280000
trusted library allocation
page execute and read and write
7FF848FA0000
trusted library allocation
page read and write
3F5D036000
stack
page read and write
1FE52FC6000
heap
page read and write
1FE3B837000
trusted library allocation
page read and write
1FE53100000
heap
page read and write
22927730000
trusted library allocation
page read and write
1FE5334C000
heap
page read and write
A63348E000
stack
page read and write
206C3D37000
trusted library allocation
page read and write
7FF848F32000
trusted library allocation
page read and write
7FF848EE2000
trusted library allocation
page read and write
7FF848E36000
trusted library allocation
page execute and read and write
2291F2F1000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page read and write
1FE52FFB000
heap
page read and write
206DA50E000
heap
page read and write
CBEE077000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
206C1DFD000
heap
page read and write
1FE39066000
heap
page read and write
CBEF14E000
stack
page read and write
7FF849000000
trusted library allocation
page read and write
1160000
heap
page read and write
A5EA3C9000
stack
page read and write
1FE390E0000
heap
page read and write
156EDF4E000
heap
page read and write
22927820000
heap
page read and write
7FF8491C0000
trusted library allocation
page read and write
229110A0000
trusted library allocation
page read and write
7FF8491C6000
trusted library allocation
page read and write
7FF848E2C000
trusted library allocation
page execute and read and write
229102D3000
trusted library allocation
page read and write
7FF848D8D000
trusted library allocation
page execute and read and write
206DA528000
heap
page read and write
CBEE279000
stack
page read and write
1FE53252000
heap
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
A5E92F9000
stack
page read and write
7FF848E1C000
trusted library allocation
page execute and read and write
22927900000
heap
page read and write
10D0000
heap
page read and write
D30000
heap
page read and write
22910380000
trusted library allocation
page read and write
1FE52F70000
heap
page read and write
A633509000
stack
page read and write
2290FD14000
trusted library allocation
page read and write
2290F000000
trusted library allocation
page read and write
27AA6E0B000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
206C1DA0000
heap
page read and write
1FE3AA40000
trusted library allocation
page read and write
1FE3CA5B000
trusted library allocation
page read and write
206D1F41000
trusted library allocation
page read and write
206C377E000
trusted library allocation
page read and write
A63338E000
stack
page read and write
7FF849099000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
400000
unkown
page readonly
1FE4AF21000
trusted library allocation
page read and write
27AB6241000
trusted library allocation
page read and write
206C3807000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
1FE3AA20000
heap
page execute and read and write
27AA46F0000
trusted library allocation
page read and write
1FE3BD5A000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
7FF848D70000
trusted library allocation
page read and write
229102C8000
trusted library allocation
page read and write
22927AB1000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
206C018B000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
CBEF049000
stack
page read and write
268C000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
93E000
heap
page read and write
206DA4A9000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
1B3D5000
heap
page read and write
26AF000
trusted library allocation
page read and write
1FE3AA50000
heap
page read and write
2290D64A000
heap
page read and write
CBEE3FE000
stack
page read and write
7FF848D90000
trusted library allocation
page read and write
7FF848DF6000
trusted library allocation
page read and write
2990000
heap
page execute and read and write
3F5DD8C000
stack
page read and write
27ABE5B0000
heap
page read and write
27AB651A000
trusted library allocation
page read and write
CBEE179000
stack
page read and write
796000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
2292792E000
heap
page read and write
27AA47CB000
heap
page read and write
910000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
7FF848F48000
trusted library allocation
page read and write
7FF849073000
trusted library allocation
page read and write
2290FEF4000
trusted library allocation
page read and write
206C1D97000
heap
page execute and read and write
206C2962000
trusted library allocation
page read and write
206C1DAD000
heap
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
7BC000
heap
page read and write
26E6000
trusted library allocation
page read and write
1FE3AC20000
heap
page execute and read and write
27ABE679000
heap
page read and write
1FE53222000
heap
page read and write
1FE4AC40000
trusted library allocation
page read and write
2291056E000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
9E0000
heap
page read and write
7FF848D63000
trusted library allocation
page execute and read and write
7FF8491A0000
trusted library allocation
page read and write
27AA7AB5000
trusted library allocation
page read and write
206C30F0000
trusted library allocation
page read and write
1FE531E8000
heap
page read and write
1BD9A000
stack
page read and write
7FF849010000
trusted library allocation
page read and write
C8F000
stack
page read and write
6D0000
heap
page read and write
CBEEF4E000
stack
page read and write
3F5CE77000
stack
page read and write
27AA7B76000
trusted library allocation
page read and write
3F5DE0E000
stack
page read and write
206C3036000
trusted library allocation
page read and write
1FE3BC39000
trusted library allocation
page read and write
97A000
heap
page read and write
1FE3CA11000
trusted library allocation
page read and write
A63360E000
stack
page read and write
7FF848D74000
trusted library allocation
page read and write
1FE38FE0000
heap
page read and write
3F5D0B9000
stack
page read and write
27AA4781000
heap
page read and write
27AA8028000
trusted library allocation
page read and write
27AA60FE000
heap
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
1BB95000
stack
page read and write
807000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
22927938000
heap
page read and write
1FE5305E000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
7FF848D53000
trusted library allocation
page read and write
7FF848F38000
trusted library allocation
page read and write
206D1F11000
trusted library allocation
page read and write
1FE532D6000
heap
page read and write
1FE532A6000
heap
page read and write
229102EE000
trusted library allocation
page read and write
1FE38E90000
heap
page read and write
7FF40A9B0000
trusted library allocation
page execute and read and write
7FF8490AC000
trusted library allocation
page read and write
7FF848E56000
trusted library allocation
page execute and read and write
7FF848D40000
trusted library allocation
page read and write
E0D000
heap
page read and write
2290D65E000
heap
page read and write
2290D68B000
heap
page read and write
2290D688000
heap
page read and write
22910515000
trusted library allocation
page read and write
27AA6C72000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
1FE3BCC2000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
7FF848D64000
trusted library allocation
page read and write
CBEDBAE000
stack
page read and write
27AA8047000
trusted library allocation
page read and write
206C3D3C000
trusted library allocation
page read and write
27AA73FA000
trusted library allocation
page read and write
2290F2C1000
trusted library allocation
page read and write
7DF404920000
trusted library allocation
page execute and read and write
7FF848EF2000
trusted library allocation
page read and write
27AA4730000
trusted library allocation
page read and write
7FF8490B2000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
2290F4EA000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
2600000
heap
page execute and read and write
7FF848F70000
trusted library allocation
page read and write
1FE3906B000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
27ABEBF0000
heap
page read and write
7FF8490B4000
trusted library allocation
page read and write
22910C20000
trusted library allocation
page read and write
273E000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
8FB000
heap
page read and write
7FF848DFC000
trusted library allocation
page execute and read and write
2290F16F000
heap
page read and write
7FF8490A4000
trusted library allocation
page read and write
1FE39150000
trusted library allocation
page read and write
156EDF47000
heap
page read and write
3F5CF79000
stack
page read and write
A6326B6000
stack
page read and write
7FF848FA0000
trusted library allocation
page read and write
2AAF000
trusted library allocation
page read and write
7FF8491C0000
trusted library allocation
page read and write
1FE3BCF6000
trusted library allocation
page read and write
25FE000
stack
page read and write
1BA9E000
stack
page read and write
B3E000
stack
page read and write
206D1F82000
trusted library allocation
page read and write
5A0000
heap
page read and write
3F5D1BF000
stack
page read and write
7FF848EE0000
trusted library allocation
page read and write
206C303A000
trusted library allocation
page read and write
206C0183000
heap
page read and write
1B360000
heap
page read and write
267C000
trusted library allocation
page read and write
206C3129000
trusted library allocation
page read and write
1FE3901D000
heap
page read and write
B10000
trusted library allocation
page read and write
3F5CD79000
stack
page read and write
2AAC000
trusted library allocation
page read and write
27AA4A25000
heap
page read and write
1B110000
heap
page read and write
1FE3BCD5000
trusted library allocation
page read and write
2291F2E1000
trusted library allocation
page read and write
1FE4AC51000
trusted library allocation
page read and write
22927AA0000
heap
page read and write
27AA7A8E000
trusted library allocation
page read and write
DF7000
heap
page read and write
1FE3AA63000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF848F11000
trusted library allocation
page read and write
A5E96FF000
stack
page read and write
7FF848D60000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
1FE3BFF9000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
8FD000
heap
page read and write
206DA42A000
heap
page read and write
206D21FB000
trusted library allocation
page read and write
C95000
heap
page read and write
3F5CEFD000
stack
page read and write
156EE1D5000
heap
page read and write
A35000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
A63237E000
stack
page read and write
7FF8490F0000
trusted library allocation
page read and write
A5E8F9E000
stack
page read and write
CBEDFFF000
stack
page read and write
1FE391B0000
heap
page read and write
2291037C000
trusted library allocation
page read and write
7DF404910000
trusted library allocation
page execute and read and write
7FF849094000
trusted library allocation
page read and write
27AA6210000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
22910385000
trusted library allocation
page read and write
22910C13000
trusted library allocation
page read and write
7FF848F01000
trusted library allocation
page read and write
206DA450000
heap
page read and write
1FE3AA55000
heap
page read and write
3F5D23E000
stack
page read and write
22910BB5000
trusted library allocation
page read and write
206C0140000
heap
page read and write
1B89E000
stack
page read and write
27AB650B000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
206DA54F000
heap
page read and write
1AB9D000
stack
page read and write
A5EA44C000
stack
page read and write
206C1BC0000
trusted library allocation
page read and write
22910B52000
trusted library allocation
page read and write
206C00E0000
heap
page read and write
7FF848D43000
trusted library allocation
page execute and read and write
27AA4710000
trusted library allocation
page read and write
206DA506000
heap
page read and write
990000
heap
page read and write
FCE000
stack
page read and write
AD0000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
27AA6E19000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
229110C5000
trusted library allocation
page read and write
351000
stack
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
27AA6449000
trusted library allocation
page read and write
ACF000
stack
page read and write
7FF849000000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
26D4000
trusted library allocation
page read and write
CBEDAA3000
stack
page read and write
DD0000
heap
page read and write
206C0360000
trusted library allocation
page read and write
7FF8490DC000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
27AA4720000
heap
page readonly
CBEE37F000
stack
page read and write
7FF848F70000
trusted library allocation
page read and write
CBEDB2E000
stack
page read and write
229110E5000
trusted library allocation
page read and write
2290D540000
heap
page read and write
1FE3AA10000
heap
page read and write
206C0181000
heap
page read and write
7FF848F21000
trusted library allocation
page read and write
1FE531EC000
heap
page read and write
3D0000
heap
page read and write
A5E947D000
stack
page read and write
26CD000
trusted library allocation
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
A6328BE000
stack
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
E99000
heap
page read and write
27ABE8E1000
heap
page read and write
C90000
heap
page read and write
27ABE868000
heap
page read and write
27AA804C000
trusted library allocation
page read and write
1FE531F0000
heap
page read and write
1B65E000
stack
page read and write
7FF848D6B000
trusted library allocation
page execute and read and write
7FF848F60000
trusted library allocation
page read and write
27AA6200000
heap
page execute and read and write
1C010000
heap
page read and write
1FE3BE11000
trusted library allocation
page read and write
2290F045000
heap
page read and write
7FF848D70000
trusted library allocation
page read and write
27AA7223000
trusted library allocation
page read and write
27AA4650000
heap
page read and write
206C3865000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
A5E987B000
stack
page read and write
7FF848D42000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
7FF8491AD000
trusted library allocation
page read and write
229102CF000
trusted library allocation
page read and write
1FE3ACB5000
trusted library allocation
page read and write
206C321D000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
206C1E85000
heap
page read and write
A6329BC000
stack
page read and write
7FF849160000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
269C000
trusted library allocation
page read and write
1FE53373000
heap
page read and write
1FE4AC61000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page execute and read and write
551000
stack
page read and write
7FF848F90000
trusted library allocation
page read and write
A5EA24E000
stack
page read and write
22910B2C000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
2FABBBE000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
7FF848DF6000
trusted library allocation
page read and write
7FF849196000
trusted library allocation
page read and write
1BC94000
stack
page read and write
9A2000
heap
page read and write
7FF8490A9000
trusted library allocation
page read and write
7FF8491D0000
trusted library allocation
page read and write
22927909000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
2291064E000
trusted library allocation
page read and write
3F5CC7E000
stack
page read and write
1FE3BF3E000
trusted library allocation
page read and write
206DA522000
heap
page read and write
27AA66EE000
trusted library allocation
page read and write
27ABE9FC000
heap
page read and write
22927A8B000
heap
page read and write
7FF848D62000
trusted library allocation
page read and write
7FF848F1A000
trusted library allocation
page read and write
7DF4EC250000
trusted library allocation
page execute and read and write
27ABE6B7000
heap
page execute and read and write
7FF848EFA000
trusted library allocation
page read and write
27AA6070000
trusted library allocation
page read and write
2290F346000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
A63247E000
stack
page read and write
DD9000
heap
page read and write
A5E967A000
stack
page read and write
7FF849170000
trusted library allocation
page execute and read and write
1FE3BCD2000
trusted library allocation
page read and write
2654000
trusted library allocation
page read and write
1FE39130000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
7FF84914C000
trusted library allocation
page read and write
7FF848D53000
trusted library allocation
page execute and read and write
7FF849070000
trusted library allocation
page read and write
22927AA8000
heap
page read and write
1FE39196000
heap
page execute and read and write
1FE5336D000
heap
page read and write
1B46E000
stack
page read and write
2290F290000
heap
page execute and read and write
27ABE750000
heap
page read and write
1FE39140000
heap
page readonly
3F5D2BE000
stack
page read and write
7FF848EE2000
trusted library allocation
page read and write
2292765F000
heap
page read and write
7DF4AC010000
trusted library allocation
page execute and read and write
27AA4785000
heap
page read and write
1FE3AC31000
trusted library allocation
page read and write
7FF8490C9000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
206C0110000
heap
page read and write
2290D530000
heap
page read and write
7FF8490A8000
trusted library allocation
page read and write
7FF8491E0000
trusted library allocation
page read and write
1FE38F70000
heap
page read and write
22927992000
heap
page read and write
27AA8002000
trusted library allocation
page read and write
A63227E000
stack
page read and write
8DC000
heap
page read and write
3F5CFBF000
stack
page read and write
206C2F17000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
1FE3A960000
trusted library allocation
page read and write
200000
unkown
page readonly
7FF848EE0000
trusted library allocation
page read and write
206D2209000
trusted library allocation
page read and write
7DF491290000
trusted library allocation
page execute and read and write
12678000
trusted library allocation
page read and write
1FE4AF1A000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
2290D608000
heap
page read and write
1A640000
trusted library allocation
page read and write
7FF8490A2000
trusted library allocation
page read and write
7B0000
heap
page read and write
12671000
trusted library allocation
page read and write
1FE531F8000
heap
page read and write
206DA512000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
27ABE85C000
heap
page read and write
1B15E000
stack
page read and write
12AA8000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
1BFCE000
stack
page read and write
22927982000
heap
page read and write
2290D9B0000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF8490C4000
trusted library allocation
page read and write
206DA5E0000
trusted library allocation
page read and write
A5E937E000
stack
page read and write
1FE3A990000
trusted library allocation
page read and write
26F7000
trusted library allocation
page read and write
22910357000
trusted library allocation
page read and write
730000
trusted library allocation
page read and write
CBEE4FE000
stack
page read and write
7FF848F10000
trusted library allocation
page read and write
A20000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
229279EA000
heap
page read and write
7FF848E56000
trusted library allocation
page execute and read and write
1130000
heap
page read and write
1FE52F96000
heap
page read and write
2290D646000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
1170000
heap
page read and write
870000
heap
page read and write
27AA6E21000
trusted library allocation
page read and write
206DA547000
heap
page read and write
206DA416000
heap
page read and write
271B000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
206C3698000
trusted library allocation
page read and write
A63263E000
stack
page read and write
206DA3F8000
heap
page read and write
206C03D0000
heap
page execute and read and write
2290F78F000
trusted library allocation
page read and write
A5EA34D000
stack
page read and write
1FE3BFF1000
trusted library allocation
page read and write
CF1000
stack
page read and write
7FF848F02000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF8491C0000
trusted library allocation
page read and write
206C1C0D000
heap
page read and write
7FF8491A0000
trusted library allocation
page read and write
CBEE0FD000
stack
page read and write
A6324F7000
stack
page read and write
27AA60E0000
heap
page read and write
156EDEA0000
heap
page read and write
740000
trusted library allocation
page read and write
27AA6040000
trusted library allocation
page read and write
7FF8490D8000
trusted library allocation
page read and write
206C2F43000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
2A9E000
stack
page read and write
7FF848FF0000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
206C023C000
heap
page read and write
206C2B09000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
206C0227000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
206C01C5000
heap
page read and write
A6322FE000
stack
page read and write
7FF849030000
trusted library allocation
page read and write
9E5000
heap
page read and write
206C329A000
trusted library allocation
page read and write
206C03E5000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
26C4000
trusted library allocation
page read and write
7FF848F28000
trusted library allocation
page read and write
206C31BC000
trusted library allocation
page read and write
206C2E97000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
206C1E0D000
heap
page read and write
206C03E0000
heap
page read and write
1B02D000
stack
page read and write
27AB6221000
trusted library allocation
page read and write
156EE1D0000
heap
page read and write
27ABE98E000
heap
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
1FE3B889000
trusted library allocation
page read and write
2671000
trusted library allocation
page read and write
206D2390000
trusted library allocation
page read and write
206C3CF2000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
27AA74C8000
trusted library allocation
page read and write
27AA72B2000
trusted library allocation
page read and write
229110EA000
trusted library allocation
page read and write
7FF848F12000
trusted library allocation
page read and write
1FE39068000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
27AA75E5000
trusted library allocation
page read and write
206C1DE5000
heap
page read and write
27ABE9DA000
heap
page read and write
206C1F11000
trusted library allocation
page read and write
912000
heap
page read and write
2290D642000
heap
page read and write
206DA41A000
heap
page read and write
27ABE931000
heap
page read and write
CBEDEFE000
stack
page read and write
7FF848D43000
trusted library allocation
page execute and read and write
27AA4791000
heap
page read and write
941000
heap
page read and write
7DF4AC020000
trusted library allocation
page execute and read and write
7FF848D4D000
trusted library allocation
page execute and read and write
2290FEC8000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848D64000
trusted library allocation
page read and write
2290D6CE000
heap
page read and write
A5E927E000
stack
page read and write
A5E8E93000
stack
page read and write
206C0390000
heap
page readonly
8D6000
heap
page read and write
206C1F00000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF848F52000
trusted library allocation
page read and write
1ABFD000
stack
page read and write
A5E9579000
stack
page read and write
7FF848E0C000
trusted library allocation
page execute and read and write
7FF848E80000
trusted library allocation
page execute and read and write
206C32D8000
trusted library allocation
page read and write
27AA79A9000
trusted library allocation
page read and write
27ABE854000
heap
page read and write
26CF000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
1FE3C3B8000
trusted library allocation
page read and write
206C37A4000
trusted library allocation
page read and write
E01000
heap
page read and write
27AA478F000
heap
page read and write
7FF848E26000
trusted library allocation
page execute and read and write
7FF848E26000
trusted library allocation
page execute and read and write
1FE391B5000
heap
page read and write
7FF8491A0000
trusted library allocation
page read and write
27AA724F000
trusted library allocation
page read and write
7FF848F44000
trusted library allocation
page read and write
7FF848DCC000
trusted library allocation
page execute and read and write
2290D5A0000
heap
page read and write
A5E97FF000
stack
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF8490D0000
trusted library allocation
page read and write
27AB6510000
trusted library allocation
page read and write
206C1E30000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page read and write
27ABE858000
heap
page read and write
22910A46000
trusted library allocation
page read and write
27AA46E0000
trusted library section
page read and write
7FF849153000
trusted library allocation
page read and write
206DA422000
heap
page read and write
22927C10000
heap
page read and write
2290F150000
heap
page read and write
A6323F9000
stack
page read and write
206DA4EF000
heap
page read and write
B80000
heap
page read and write
27ABE850000
heap
page read and write
156EDE70000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
7FF848E06000
trusted library allocation
page read and write
10CF000
stack
page read and write
5B0000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
CBEE2FA000
stack
page read and write
7FF84917C000
trusted library allocation
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
A5E95F9000
stack
page read and write
27AA46D0000
trusted library section
page read and write
1B03E000
stack
page read and write
27AA752A000
trusted library allocation
page read and write
269E000
trusted library allocation
page read and write
1FE3CA56000
trusted library allocation
page read and write
2291034F000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
1FE39110000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
2290D63D000
heap
page read and write
27AA6215000
heap
page read and write
2290FEBE000
trusted library allocation
page read and write
7FF848F22000
trusted library allocation
page read and write
7FF848DAC000
trusted library allocation
page execute and read and write
22910353000
trusted library allocation
page read and write
CBEE1F7000
stack
page read and write
1FE531E4000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
7FF8490F0000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
206D2219000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
7FF848D7B000
trusted library allocation
page read and write
24F0000
heap
page read and write
A63257E000
stack
page read and write
3F5DF0D000
stack
page read and write
CBEDE7E000
stack
page read and write
22927A69000
heap
page read and write
2290D5E0000
trusted library allocation
page read and write
1FE3902A000
heap
page read and write
27AA72DE000
trusted library allocation
page read and write
206C03A0000
trusted library allocation
page read and write
156EDE80000
heap
page read and write
7FF8491D0000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page execute and read and write
229103E7000
trusted library allocation
page read and write
3F5DF8E000
stack
page read and write
2FABB3F000
unkown
page read and write
CBEEFCA000
stack
page read and write
7FF848FA0000
trusted library allocation
page read and write
1B01F000
stack
page read and write
2291F5AC000
trusted library allocation
page read and write
1FE4AF1F000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
A5EA4CC000
stack
page read and write
A632739000
stack
page read and write
1FE4AF39000
trusted library allocation
page read and write
2291068C000
trusted library allocation
page read and write
2728000
trusted library allocation
page read and write
1FE3BC65000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
22910362000
trusted library allocation
page read and write
5D0000
heap
page read and write
3F5D33B000
stack
page read and write
27AB6292000
trusted library allocation
page read and write
7FF848D44000
trusted library allocation
page read and write
2FABAB9000
stack
page read and write
27AA4740000
heap
page read and write
27AB6251000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
229277F7000
heap
page execute and read and write
2290D960000
trusted library allocation
page read and write
1FE3BCC6000
trusted library allocation
page read and write
27ABE830000
heap
page execute and read and write
7FF848D6D000
trusted library allocation
page execute and read and write
1FE4AF29000
trusted library allocation
page read and write
2291046E000
trusted library allocation
page read and write
7FF8490B8000
trusted library allocation
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
93C000
heap
page read and write
1FE38F90000
heap
page read and write
9B0000
heap
page read and write
206D1F31000
trusted library allocation
page read and write
856000
heap
page read and write
1FE4B034000
trusted library allocation
page read and write
3F5DD0E000
stack
page read and write
7FF8491E0000
trusted library allocation
page read and write
7FF848D52000
trusted library allocation
page read and write
E3D000
heap
page read and write
26B4000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
7FF848F20000
trusted library allocation
page execute and read and write
206C1B90000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FC000
heap
page read and write
206C3D17000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
12AA1000
trusted library allocation
page read and write
2746000
trusted library allocation
page read and write
3F5CDFE000
stack
page read and write
DA5000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
27AB6512000
trusted library allocation
page read and write
1FE3CA37000
trusted library allocation
page read and write
27AA4789000
heap
page read and write
27ABE60F000
heap
page read and write
2290D9B5000
heap
page read and write
A63283E000
stack
page read and write
1FE3BBCB000
trusted library allocation
page read and write
27AA4570000
heap
page read and write
CBEE47C000
stack
page read and write
7FF849083000
trusted library allocation
page read and write
1B66E000
stack
page read and write
206C23DE000
trusted library allocation
page read and write
2AA1000
trusted library allocation
page read and write
27ABE8B5000
heap
page read and write
2290D648000
heap
page read and write
27AA71C1000
trusted library allocation
page read and write
229102C0000
trusted library allocation
page read and write
27ABE687000
heap
page read and write
1FE3BCF8000
trusted library allocation
page read and write
A6327B8000
stack
page read and write
206C0189000
heap
page read and write
1FE39190000
heap
page execute and read and write
7FF8490CC000
trusted library allocation
page read and write
7FF848F58000
trusted library allocation
page read and write
27AA4A20000
heap
page read and write
7FF8491C0000
trusted library allocation
page read and write
7FF8490B9000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
7DF4AC030000
trusted library allocation
page execute and read and write
22927A96000
heap
page read and write
7FF848F24000
trusted library allocation
page read and write
206C2FD4000
trusted library allocation
page read and write
A5E8F1D000
stack
page read and write
7FF848F00000
trusted library allocation
page read and write
206C2B17000
trusted library allocation
page read and write
1C61A000
stack
page read and write
7FF849020000
trusted library allocation
page read and write
206DA760000
heap
page read and write
7FF848D5B000
trusted library allocation
page read and write
7FF848F34000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page execute and read and write
2290D600000
heap
page read and write
27AA7343000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
1C51C000
stack
page read and write
7FF848FD0000
trusted library allocation
page read and write
1FE531E0000
heap
page read and write
7FF848F0A000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
206C1E0F000
heap
page read and write
7FF848D72000
trusted library allocation
page read and write
27ABE66E000
heap
page read and write
3F5D13B000
stack
page read and write
7FF848D9C000
trusted library allocation
page execute and read and write
1BE94000
stack
page read and write
2291035F000
trusted library allocation
page read and write
743000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
206C1D20000
heap
page read and write
1B21F000
stack
page read and write
7FF848F40000
trusted library allocation
page read and write
27ABE864000
heap
page read and write
1FE3C585000
trusted library allocation
page read and write
1FE38FF2000
heap
page read and write
CBEDF7A000
stack
page read and write
27AA6221000
trusted library allocation
page read and write
A5E93F7000
stack
page read and write
27AB652A000
trusted library allocation
page read and write
7D0000
heap
page read and write
206DA55D000
heap
page read and write
206DA56A000
heap
page read and write
A5E977E000
stack
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
710000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page execute and read and write
27AA4747000
heap
page read and write
2292763F000
heap
page read and write
22927970000
heap
page read and write
7FF8491CD000
trusted library allocation
page read and write
A5E94F6000
stack
page read and write
7FF8491A6000
trusted library allocation
page read and write
1B25E000
stack
page read and write
2291F333000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
DA0000
heap
page read and write
7FF848D74000
trusted library allocation
page read and write
2291F2C1000
trusted library allocation
page read and write
7FF848F2A000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
905000
heap
page read and write
22910383000
trusted library allocation
page read and write
1B3D3000
heap
page read and write
7FF849190000
trusted library allocation
page execute and read and write
27AA4767000
heap
page read and write
7D2000
heap
page read and write
1FE3B93D000
trusted library allocation
page read and write
7FF84915C000
trusted library allocation
page read and write
206DA2C0000
heap
page read and write
206C00F0000
heap
page read and write
1FE3BCEF000
trusted library allocation
page read and write
206C017C000
heap
page read and write
7FF848D44000
trusted library allocation
page read and write
1B050000
heap
page execute and read and write
There are 1018 hidden memdumps, click here to show them.