Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
9GlCWW6bXc.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
Generic INItialization configuration [WIN]
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0e1ks4eg.fd3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ajcbmm4m.zob.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bm5tmmkk.i5m.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ejgd20co.txd.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fpfgkjkl.h3y.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hre4qeyf.m3z.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hwudrs30.oet.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jn0zgzut.cm2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jus5jvk0.spt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o233mgxr.4li.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ozyyzhme.iao.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rtvekrnf.lmi.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uav1cyzz.mxj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v4avkrma.pwf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xe4tdkqj.0r5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xmcqgsxj.cco.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Nov 17 17:21:59
2024, mtime=Sun Nov 17 17:21:59 2024, atime=Sun Nov 17 17:21:59 2024, length=261120, window=hide
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\9GlCWW6bXc.exe
|
"C:\Users\user\Desktop\9GlCWW6bXc.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\9GlCWW6bXc.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '9GlCWW6bXc.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
"C:\Users\user\AppData\Roaming\svchost.exe"
|
||
C:\Users\user\AppData\Roaming\svchost.exe
|
"C:\Users\user\AppData\Roaming\svchost.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
23.ip.gl.ply.gg
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
http://www.micom/pkiops/Docs/ry.htm0
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 4 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
23.ip.gl.ply.gg
|
147.185.221.23
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
147.185.221.23
|
23.ip.gl.ply.gg
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
svchost
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4A2000
|
unkown
|
page readonly
|
||
127C8000
|
trusted library allocation
|
page read and write
|
||
277C7A4B000
|
heap
|
page read and write
|
||
A10000
|
trusted library allocation
|
page read and write
|
||
277C7685000
|
heap
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4D08E0000
|
trusted library allocation
|
page execute and read and write
|
||
22AAC6C2000
|
trusted library allocation
|
page read and write
|
||
1BFCE000
|
stack
|
page read and write
|
||
277C79AF000
|
heap
|
page read and write
|
||
27B0000
|
heap
|
page read and write
|
||
7FF849083000
|
trusted library allocation
|
page read and write
|
||
7FF848ED2000
|
trusted library allocation
|
page read and write
|
||
33A1000
|
trusted library allocation
|
page read and write
|
||
25606F60000
|
heap
|
page read and write
|
||
F32773E000
|
stack
|
page read and write
|
||
277B0A8A000
|
trusted library allocation
|
page read and write
|
||
EF2443E000
|
stack
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
8350C0E000
|
stack
|
page read and write
|
||
A96000
|
heap
|
page read and write
|
||
1B3158C0000
|
heap
|
page read and write
|
||
277C7A55000
|
heap
|
page read and write
|
||
22AC3C72000
|
heap
|
page read and write
|
||
1AC3D000
|
stack
|
page read and write
|
||
25606FA2000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
22AAB9C9000
|
trusted library allocation
|
page read and write
|
||
7FF848D5B000
|
trusted library allocation
|
page read and write
|
||
1422000
|
heap
|
page read and write
|
||
25609DDD000
|
trusted library allocation
|
page read and write
|
||
277AF200000
|
trusted library allocation
|
page read and write
|
||
1B318641000
|
trusted library allocation
|
page read and write
|
||
F3274BE000
|
stack
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
277B1043000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
1B32FC0A000
|
heap
|
page read and write
|
||
25618D3D000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
25620EA7000
|
heap
|
page read and write
|
||
22AC3C06000
|
heap
|
page execute and read and write
|
||
7FF848E06000
|
trusted library allocation
|
page read and write
|
||
1B315B16000
|
heap
|
page execute and read and write
|
||
7FF8490A9000
|
trusted library allocation
|
page read and write
|
||
12F1000
|
stack
|
page read and write
|
||
A00000
|
trusted library allocation
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
22AAC463000
|
trusted library allocation
|
page read and write
|
||
256099E9000
|
trusted library allocation
|
page read and write
|
||
1AF4E000
|
stack
|
page read and write
|
||
F32848C000
|
stack
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
25609B14000
|
trusted library allocation
|
page read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
E02000
|
heap
|
page read and write
|
||
1B327787000
|
trusted library allocation
|
page read and write
|
||
22AAD57B000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7DF46AD60000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7DF4D08C0000
|
trusted library allocation
|
page execute and read and write
|
||
2562122B000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
7FF8490B5000
|
trusted library allocation
|
page read and write
|
||
EF23E7E000
|
stack
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page execute and read and write
|
||
25608C7A000
|
trusted library allocation
|
page read and write
|
||
EF240F8000
|
stack
|
page read and write
|
||
25606F7F000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
1B31735F000
|
heap
|
page read and write
|
||
1B318740000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
256099EF000
|
trusted library allocation
|
page read and write
|
||
8350A0C000
|
stack
|
page read and write
|
||
12811000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
25606F55000
|
heap
|
page read and write
|
||
25621261000
|
heap
|
page read and write
|
||
1B315880000
|
heap
|
page read and write
|
||
29AC000
|
trusted library allocation
|
page read and write
|
||
22AAC6CE000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
1B3187D6000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
F32830E000
|
stack
|
page read and write
|
||
22AC3D5C000
|
heap
|
page read and write
|
||
142D000
|
heap
|
page read and write
|
||
25620EAF000
|
heap
|
page read and write
|
||
22AA9D75000
|
heap
|
page read and write
|
||
22AAC6D7000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
1B318095000
|
trusted library allocation
|
page read and write
|
||
277BF526000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
A43000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
7FF849083000
|
trusted library allocation
|
page read and write
|
||
25606FBE000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
22AA9AB0000
|
trusted library section
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
EF24F8A000
|
stack
|
page read and write
|
||
7FF8490BA000
|
trusted library allocation
|
page read and write
|
||
256210DE000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
22AC3DC2000
|
heap
|
page read and write
|
||
1B555000
|
heap
|
page read and write
|
||
277BF241000
|
trusted library allocation
|
page read and write
|
||
1B32F905000
|
heap
|
page read and write
|
||
7FF848DAC000
|
trusted library allocation
|
page execute and read and write
|
||
277B05E5000
|
trusted library allocation
|
page read and write
|
||
1B317480000
|
heap
|
page execute and read and write
|
||
7FF848E70000
|
trusted library allocation
|
page execute and read and write
|
||
25618D38000
|
trusted library allocation
|
page read and write
|
||
1B327797000
|
trusted library allocation
|
page read and write
|
||
277AFC73000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
17CF000
|
stack
|
page read and write
|
||
7FF848EF2000
|
trusted library allocation
|
page read and write
|
||
277C7910000
|
heap
|
page read and write
|
||
590000
|
unkown
|
page readonly
|
||
22AAB97A000
|
trusted library allocation
|
page read and write
|
||
22AAC92F000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
F327479000
|
stack
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
277AD75F000
|
heap
|
page read and write
|
||
1B317491000
|
trusted library allocation
|
page read and write
|
||
25618A81000
|
trusted library allocation
|
page read and write
|
||
277AF100000
|
trusted library allocation
|
page read and write
|
||
25609BB3000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
1B31750C000
|
trusted library allocation
|
page read and write
|
||
834FAF7000
|
stack
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
277AF050000
|
heap
|
page readonly
|
||
277B09A5000
|
trusted library allocation
|
page read and write
|
||
7FF848F02000
|
trusted library allocation
|
page read and write
|
||
22AAC879000
|
trusted library allocation
|
page read and write
|
||
22AA9A90000
|
heap
|
page read and write
|
||
63BD547000
|
stack
|
page read and write
|
||
1B4CE000
|
stack
|
page read and write
|
||
7FF848EF2000
|
trusted library allocation
|
page read and write
|
||
277AD9D0000
|
heap
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
277C76EF000
|
heap
|
page read and write
|
||
22AA9D70000
|
heap
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
1B315BA0000
|
heap
|
page read and write
|
||
1B32FAD0000
|
trusted library allocation
|
page read and write
|
||
25620F90000
|
heap
|
page execute and read and write
|
||
F32717D000
|
stack
|
page read and write
|
||
7FF8490BC000
|
trusted library allocation
|
page read and write
|
||
22AA9B13000
|
heap
|
page read and write
|
||
F327539000
|
stack
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page execute and read and write
|
||
1C402000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
1B315888000
|
heap
|
page read and write
|
||
A38000
|
heap
|
page read and write
|
||
22AA9A50000
|
heap
|
page read and write
|
||
7FF848EE2000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
25609C31000
|
trusted library allocation
|
page read and write
|
||
22AACA8F000
|
trusted library allocation
|
page read and write
|
||
1C6FF000
|
stack
|
page read and write
|
||
8350B09000
|
stack
|
page read and write
|
||
8350A8D000
|
stack
|
page read and write
|
||
7FF848D52000
|
trusted library allocation
|
page read and write
|
||
256070A0000
|
trusted library allocation
|
page read and write
|
||
EF2508C000
|
stack
|
page read and write
|
||
7FF848F0A000
|
trusted library allocation
|
page read and write
|
||
22AA9B56000
|
heap
|
page read and write
|
||
834FA7E000
|
stack
|
page read and write
|
||
22ABB751000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
25618D3F000
|
trusted library allocation
|
page read and write
|
||
7FF848D42000
|
trusted library allocation
|
page read and write
|
||
7FF848D8C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
7FF848D6B000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
22AAC6B5000
|
trusted library allocation
|
page read and write
|
||
1B3158BE000
|
heap
|
page read and write
|
||
7FF849094000
|
trusted library allocation
|
page read and write
|
||
1B31849F000
|
trusted library allocation
|
page read and write
|
||
277AF160000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1B32FB95000
|
heap
|
page read and write
|
||
1B3277E7000
|
trusted library allocation
|
page read and write
|
||
25618D57000
|
trusted library allocation
|
page read and write
|
||
EF2407D000
|
stack
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
834FB7D000
|
stack
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
25620FE0000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
22AC3B36000
|
heap
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page execute and read and write
|
||
277AD6AD000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
F327279000
|
stack
|
page read and write
|
||
1B3158BB000
|
heap
|
page read and write
|
||
25609DE3000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1B32FC8F000
|
heap
|
page read and write
|
||
277BF57B000
|
trusted library allocation
|
page read and write
|
||
1B3274A0000
|
trusted library allocation
|
page read and write
|
||
7FF848F01000
|
trusted library allocation
|
page read and write
|
||
22AAB3A0000
|
trusted library allocation
|
page read and write
|
||
25608A51000
|
trusted library allocation
|
page read and write
|
||
7FF848E16000
|
trusted library allocation
|
page execute and read and write
|
||
A46000
|
heap
|
page read and write
|
||
7FF848E06000
|
trusted library allocation
|
page read and write
|
||
277C7948000
|
heap
|
page read and write
|
||
7FF848F0A000
|
trusted library allocation
|
page read and write
|
||
22AACFE3000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
1B315AE0000
|
trusted library allocation
|
page read and write
|
||
1B578000
|
heap
|
page read and write
|
||
F32850E000
|
stack
|
page read and write
|
||
63BC6F7000
|
stack
|
page read and write
|
||
63BD64C000
|
stack
|
page read and write
|
||
1B3176B8000
|
trusted library allocation
|
page read and write
|
||
7FF848F34000
|
trusted library allocation
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
277BF251000
|
trusted library allocation
|
page read and write
|
||
25621229000
|
heap
|
page read and write
|
||
834FD39000
|
stack
|
page read and write
|
||
1B319272000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
22AAB460000
|
heap
|
page read and write
|
||
B02000
|
heap
|
page read and write
|
||
A51000
|
heap
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
25606EB0000
|
heap
|
page read and write
|
||
25620E83000
|
heap
|
page read and write
|
||
F327638000
|
stack
|
page read and write
|
||
299F000
|
stack
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
277B090F000
|
trusted library allocation
|
page read and write
|
||
22AAB641000
|
heap
|
page read and write
|
||
25621272000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
25618D47000
|
trusted library allocation
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
EF243BF000
|
stack
|
page read and write
|
||
1B3CE000
|
stack
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
25620EDD000
|
heap
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
22AAB3C0000
|
trusted library allocation
|
page read and write
|
||
A65000
|
heap
|
page read and write
|
||
277B0343000
|
trusted library allocation
|
page read and write
|
||
22AAB751000
|
trusted library allocation
|
page read and write
|
||
25620DE0000
|
heap
|
page read and write
|
||
EC5000
|
heap
|
page read and write
|
||
7FF849011000
|
trusted library allocation
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
22AC3C7C000
|
heap
|
page read and write
|
||
1B32F90D000
|
heap
|
page read and write
|
||
1B315860000
|
trusted library allocation
|
page read and write
|
||
1B315B95000
|
heap
|
page read and write
|
||
63BC97C000
|
stack
|
page read and write
|
||
1BEC0000
|
heap
|
page read and write
|
||
2D87000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
22AAB606000
|
heap
|
page read and write
|
||
1B3274FF000
|
trusted library allocation
|
page read and write
|
||
22AC3D40000
|
heap
|
page read and write
|
||
277AFF8F000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
trusted library allocation
|
page read and write
|
||
2790000
|
heap
|
page execute and read and write
|
||
1413000
|
heap
|
page read and write
|
||
1280B000
|
trusted library allocation
|
page read and write
|
||
25620DE3000
|
heap
|
page read and write
|
||
1B3157C0000
|
heap
|
page read and write
|
||
1B32FC6F000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
277B02B4000
|
trusted library allocation
|
page read and write
|
||
7FF848D3D000
|
trusted library allocation
|
page execute and read and write
|
||
1B318D25000
|
trusted library allocation
|
page read and write
|
||
22AAD556000
|
trusted library allocation
|
page read and write
|
||
1B32F8B0000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
22AC3C34000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
63BC2FE000
|
stack
|
page read and write
|
||
277ADA10000
|
heap
|
page read and write
|
||
133A1000
|
trusted library allocation
|
page read and write
|
||
25606F50000
|
heap
|
page read and write
|
||
277AD620000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
1B32F9B0000
|
heap
|
page read and write
|
||
256088E0000
|
trusted library allocation
|
page read and write
|
||
25606F10000
|
heap
|
page read and write
|
||
63BC8FE000
|
stack
|
page read and write
|
||
22AAB465000
|
heap
|
page read and write
|
||
7FF848F28000
|
trusted library allocation
|
page read and write
|
||
22AAC6CA000
|
trusted library allocation
|
page read and write
|
||
7FF848DF6000
|
trusted library allocation
|
page read and write
|
||
7FF8490A2000
|
trusted library allocation
|
page read and write
|
||
7DF47FCC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
1454000
|
heap
|
page read and write
|
||
1B0E3000
|
heap
|
page read and write
|
||
256070C0000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
1A7F0000
|
trusted library allocation
|
page read and write
|
||
7FF848D6B000
|
trusted library allocation
|
page read and write
|
||
277B02E0000
|
trusted library allocation
|
page read and write
|
||
1B31852E000
|
trusted library allocation
|
page read and write
|
||
1C7FE000
|
stack
|
page read and write
|
||
277B052A000
|
trusted library allocation
|
page read and write
|
||
277BF516000
|
trusted library allocation
|
page read and write
|
||
277C76AF000
|
heap
|
page read and write
|
||
1B80F000
|
stack
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849099000
|
trusted library allocation
|
page read and write
|
||
22AC3C4C000
|
heap
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490A9000
|
trusted library allocation
|
page read and write
|
||
22AA9B54000
|
heap
|
page read and write
|
||
AC4000
|
heap
|
page read and write
|
||
63BC9FE000
|
stack
|
page read and write
|
||
22AC3C10000
|
heap
|
page execute and read and write
|
||
63BBFFF000
|
stack
|
page read and write
|
||
1B315B90000
|
heap
|
page read and write
|
||
7FF848D53000
|
trusted library allocation
|
page execute and read and write
|
||
22AC3C48000
|
heap
|
page read and write
|
||
277B0432000
|
trusted library allocation
|
page read and write
|
||
1AE1D000
|
stack
|
page read and write
|
||
25621122000
|
heap
|
page read and write
|
||
834FE3E000
|
stack
|
page read and write
|
||
22AACED7000
|
trusted library allocation
|
page read and write
|
||
1B32F8AE000
|
heap
|
page read and write
|
||
63BC5FD000
|
stack
|
page read and write
|
||
7FF8490A8000
|
trusted library allocation
|
page read and write
|
||
2560A1D9000
|
trusted library allocation
|
page read and write
|
||
2560A3A6000
|
trusted library allocation
|
page read and write
|
||
277B1023000
|
trusted library allocation
|
page read and write
|
||
277AF6ED000
|
trusted library allocation
|
page read and write
|
||
277BF221000
|
trusted library allocation
|
page read and write
|
||
25620F87000
|
heap
|
page execute and read and write
|
||
22AAD576000
|
trusted library allocation
|
page read and write
|
||
277B04C8000
|
trusted library allocation
|
page read and write
|
||
127C1000
|
trusted library allocation
|
page read and write
|
||
7FF848E36000
|
trusted library allocation
|
page execute and read and write
|
||
22AAD0A4000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
22AAB3B0000
|
heap
|
page readonly
|
||
EF23FF7000
|
stack
|
page read and write
|
||
EF23F7E000
|
stack
|
page read and write
|
||
9E0000
|
trusted library allocation
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
A0B000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
25607100000
|
heap
|
page read and write
|
||
277AFF98000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
25606ED0000
|
heap
|
page read and write
|
||
EF2433E000
|
stack
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
22AACA5B000
|
trusted library allocation
|
page read and write
|
||
1B315850000
|
trusted library section
|
page read and write
|
||
1B3158EE000
|
heap
|
page read and write
|
||
22AC3DA6000
|
heap
|
page read and write
|
||
277AF1D0000
|
heap
|
page execute and read and write
|
||
22AA9D60000
|
trusted library allocation
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
277C7223000
|
heap
|
page read and write
|
||
1B327491000
|
trusted library allocation
|
page read and write
|
||
834FC3E000
|
stack
|
page read and write
|
||
A28000
|
heap
|
page read and write
|
||
1B32FA90000
|
heap
|
page execute and read and write
|
||
2810000
|
trusted library allocation
|
page read and write
|
||
25606F68000
|
heap
|
page read and write
|
||
22ABB7BE000
|
trusted library allocation
|
page read and write
|
||
256213C0000
|
heap
|
page read and write
|
||
7FF848F38000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
277AF449000
|
trusted library allocation
|
page read and write
|
||
1B32FC84000
|
heap
|
page read and write
|
||
25620FC0000
|
heap
|
page read and write
|
||
F32838B000
|
stack
|
page read and write
|
||
1502000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
2560A2BE000
|
trusted library allocation
|
page read and write
|
||
BA5000
|
heap
|
page read and write
|
||
25618D45000
|
trusted library allocation
|
page read and write
|
||
7FF8490A4000
|
trusted library allocation
|
page read and write
|
||
1B31795D000
|
trusted library allocation
|
page read and write
|
||
A77000
|
heap
|
page read and write
|
||
22AA9B17000
|
heap
|
page read and write
|
||
1B317470000
|
heap
|
page read and write
|
||
22AA9AC0000
|
trusted library section
|
page read and write
|
||
277B0224000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
7FF848DBC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490A9000
|
trusted library allocation
|
page read and write
|
||
1B318C19000
|
trusted library allocation
|
page read and write
|
||
7FF848D80000
|
trusted library allocation
|
page read and write
|
||
7FF848E06000
|
trusted library allocation
|
page read and write
|
||
1B32FB0C000
|
heap
|
page read and write
|
||
22ABBA44000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
2560A832000
|
trusted library allocation
|
page read and write
|
||
AD5000
|
heap
|
page read and write
|
||
277C7A44000
|
heap
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
7FF848D9C000
|
trusted library allocation
|
page execute and read and write
|
||
1D0FE000
|
stack
|
page read and write
|
||
1451000
|
heap
|
page read and write
|
||
EF23AF3000
|
stack
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
143C000
|
heap
|
page read and write
|
||
EF25009000
|
stack
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
7FF848DAC000
|
trusted library allocation
|
page execute and read and write
|
||
133A8000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
7FF848F32000
|
trusted library allocation
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page execute and read and write
|
||
25618ABF000
|
trusted library allocation
|
page read and write
|
||
14C1000
|
heap
|
page read and write
|
||
7FF8490A4000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
22AAC6BD000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
277AD670000
|
heap
|
page read and write
|
||
1B2A0000
|
heap
|
page execute and read and write
|
||
22AA9AD0000
|
heap
|
page read and write
|
||
25621257000
|
heap
|
page read and write
|
||
22AAC814000
|
trusted library allocation
|
page read and write
|
||
1B32FBF2000
|
heap
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
1B3158EB000
|
heap
|
page read and write
|
||
1B32FBF8000
|
heap
|
page read and write
|
||
F02000
|
heap
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page read and write
|
||
277C767A000
|
heap
|
page read and write
|
||
22AC3C44000
|
heap
|
page read and write
|
||
7FF848D54000
|
trusted library allocation
|
page read and write
|
||
1B31589E000
|
heap
|
page read and write
|
||
A25000
|
heap
|
page read and write
|
||
7FF849011000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
F327377000
|
stack
|
page read and write
|
||
7FF848D63000
|
trusted library allocation
|
page read and write
|
||
1BBCA000
|
stack
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
F32783C000
|
stack
|
page read and write
|
||
2560A877000
|
trusted library allocation
|
page read and write
|
||
1B32F8BB000
|
heap
|
page read and write
|
||
834F5F2000
|
stack
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
22AABC1F000
|
trusted library allocation
|
page read and write
|
||
F32828C000
|
stack
|
page read and write
|
||
7FF848E0C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D53000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E26000
|
trusted library allocation
|
page execute and read and write
|
||
834FBF9000
|
stack
|
page read and write
|
||
8F1000
|
stack
|
page read and write
|
||
22AC3D27000
|
heap
|
page read and write
|
||
2560A87C000
|
trusted library allocation
|
page read and write
|
||
AFE000
|
heap
|
page read and write
|
||
277B01C1000
|
trusted library allocation
|
page read and write
|
||
1B315840000
|
trusted library section
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
2562112B000
|
heap
|
page read and write
|
||
7FF8490B2000
|
trusted library allocation
|
page read and write
|
||
63BD4CB000
|
stack
|
page read and write
|
||
22AA9B19000
|
heap
|
page read and write
|
||
277AD6B9000
|
heap
|
page read and write
|
||
1802000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page execute and read and write
|
||
AE0000
|
heap
|
page read and write
|
||
277B0AB0000
|
trusted library allocation
|
page read and write
|
||
F3276BE000
|
stack
|
page read and write
|
||
7DF4D08D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
1C210000
|
heap
|
page read and write
|
||
277AF165000
|
heap
|
page read and write
|
||
7FF8490B2000
|
trusted library allocation
|
page read and write
|
||
277AD600000
|
heap
|
page read and write
|
||
EF23EF9000
|
stack
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
7FF848E36000
|
trusted library allocation
|
page execute and read and write
|
||
22AAC6C6000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
22AAD531000
|
trusted library allocation
|
page read and write
|
||
7FF848D74000
|
trusted library allocation
|
page read and write
|
||
129A3000
|
trusted library allocation
|
page read and write
|
||
25606FE6000
|
heap
|
page read and write
|
||
1B3185BC000
|
trusted library allocation
|
page read and write
|
||
7FF8490BA000
|
trusted library allocation
|
page read and write
|
||
22AC3D56000
|
heap
|
page read and write
|
||
7FF849196000
|
trusted library allocation
|
page read and write
|
||
277C796E000
|
heap
|
page read and write
|
||
277C7A4D000
|
heap
|
page read and write
|
||
2562127F000
|
heap
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
63BBFB3000
|
stack
|
page read and write
|
||
1B319298000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
22AAB5D0000
|
heap
|
page read and write
|
||
7FF848D4D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
25608AD8000
|
trusted library allocation
|
page read and write
|
||
25618A71000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
834FEBF000
|
stack
|
page read and write
|
||
22AA9AD8000
|
heap
|
page read and write
|
||
277C7B30000
|
heap
|
page read and write
|
||
277C7A25000
|
heap
|
page read and write
|
||
2560963B000
|
trusted library allocation
|
page read and write
|
||
22AAB3F0000
|
trusted library allocation
|
page read and write
|
||
1B3187A2000
|
trusted library allocation
|
page read and write
|
||
22AC3DB8000
|
heap
|
page read and write
|
||
1BFFE000
|
stack
|
page read and write
|
||
7FF848E46000
|
trusted library allocation
|
page execute and read and write
|
||
25621227000
|
heap
|
page read and write
|
||
22AAC1A3000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
7FF848F0A000
|
trusted library allocation
|
page read and write
|
||
1B318CFE000
|
trusted library allocation
|
page read and write
|
||
1B31595D000
|
heap
|
page read and write
|
||
1B56F000
|
heap
|
page read and write
|
||
1280E000
|
trusted library allocation
|
page read and write
|
||
22AC3C00000
|
heap
|
page execute and read and write
|
||
22AA9B2D000
|
heap
|
page read and write
|
||
1C60A000
|
stack
|
page read and write
|
||
1BB60000
|
heap
|
page execute and read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
1BEFE000
|
stack
|
page read and write
|
||
1B32FC4E000
|
heap
|
page read and write
|
||
22AAC3A9000
|
trusted library allocation
|
page read and write
|
||
1B32F915000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
63BC679000
|
stack
|
page read and write
|
||
25607060000
|
trusted library allocation
|
page read and write
|
||
835098E000
|
stack
|
page read and write
|
||
25621248000
|
heap
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
25620EA3000
|
heap
|
page read and write
|
||
277B0470000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
7FF848E0C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
1B07D000
|
stack
|
page read and write
|
||
AC2000
|
heap
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
1B31855A000
|
trusted library allocation
|
page read and write
|
||
22ABBA3C000
|
trusted library allocation
|
page read and write
|
||
63BC3FE000
|
stack
|
page read and write
|
||
1B315BA5000
|
heap
|
page read and write
|
||
7DF4E3780000
|
trusted library allocation
|
page execute and read and write
|
||
129A8000
|
trusted library allocation
|
page read and write
|
||
277AF040000
|
trusted library allocation
|
page read and write
|
||
7DF46AD50000
|
trusted library allocation
|
page execute and read and write
|
||
33B1000
|
trusted library allocation
|
page read and write
|
||
22AAD075000
|
trusted library allocation
|
page read and write
|
||
1B327778000
|
trusted library allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
1B315A70000
|
trusted library allocation
|
page read and write
|
||
22AAC35D000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
25609A56000
|
trusted library allocation
|
page read and write
|
||
277C7913000
|
heap
|
page read and write
|
||
A13000
|
trusted library allocation
|
page read and write
|
||
277B0B13000
|
trusted library allocation
|
page read and write
|
||
25620E11000
|
heap
|
page read and write
|
||
7FF848DAC000
|
trusted library allocation
|
page execute and read and write
|
||
EF244BB000
|
stack
|
page read and write
|
||
277B0250000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
277B1048000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
trusted library allocation
|
page read and write
|
||
277BF230000
|
trusted library allocation
|
page read and write
|
||
EF2413E000
|
stack
|
page read and write
|
||
834FCBC000
|
stack
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page read and write
|
||
25621109000
|
heap
|
page read and write
|
||
277AD683000
|
heap
|
page read and write
|
||
1B315B10000
|
heap
|
page execute and read and write
|
||
7FF848E36000
|
trusted library allocation
|
page execute and read and write
|
||
277C7743000
|
heap
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
1B32FC2F000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
22AC3B20000
|
heap
|
page read and write
|
||
277ADA00000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
DE0000
|
heap
|
page execute and read and write
|
||
22AC3E50000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
EF24F0C000
|
stack
|
page read and write
|
||
1B32FC58000
|
heap
|
page read and write
|
||
911000
|
stack
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
33AF000
|
trusted library allocation
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
7FF8490B8000
|
trusted library allocation
|
page read and write
|
||
F3271FF000
|
stack
|
page read and write
|
||
63BC778000
|
stack
|
page read and write
|
||
339F000
|
stack
|
page read and write
|
||
7FF848F34000
|
trusted library allocation
|
page read and write
|
||
1B3157B0000
|
heap
|
page read and write
|
||
7FF4B8710000
|
trusted library allocation
|
page execute and read and write
|
||
63BC37E000
|
stack
|
page read and write
|
||
25620FB0000
|
trusted library allocation
|
page read and write
|
||
22AC3C38000
|
heap
|
page read and write
|
||
1AE40000
|
heap
|
page execute and read and write
|
||
277C76B8000
|
heap
|
page read and write
|
||
1B318CBF000
|
trusted library allocation
|
page read and write
|
||
1B315A50000
|
trusted library allocation
|
page read and write
|
||
22AAC9FB000
|
trusted library allocation
|
page read and write
|
||
7FF84914C000
|
trusted library allocation
|
page read and write
|
||
EF241B7000
|
stack
|
page read and write
|
||
7FF849083000
|
trusted library allocation
|
page read and write
|
||
8350B8C000
|
stack
|
page read and write
|
||
A26000
|
heap
|
page read and write
|
||
13B0000
|
trusted library allocation
|
page read and write
|
||
1BAC5000
|
stack
|
page read and write
|
||
25606FAA000
|
heap
|
page read and write
|
||
A92000
|
heap
|
page read and write
|
||
7FF848D44000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
256210C0000
|
heap
|
page read and write
|
||
22AACB16000
|
trusted library allocation
|
page read and write
|
||
A4B000
|
heap
|
page read and write
|
||
277AF1D6000
|
heap
|
page execute and read and write
|
||
1B32FC69000
|
heap
|
page read and write
|
||
25618EBE000
|
trusted library allocation
|
page read and write
|
||
1B318674000
|
trusted library allocation
|
page read and write
|
||
7FF848D64000
|
trusted library allocation
|
page read and write
|
||
1B32FC03000
|
heap
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
63BC6FE000
|
stack
|
page read and write
|
||
1B3184CB000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
834F8FE000
|
stack
|
page read and write
|
||
145C000
|
heap
|
page read and write
|
||
7FF848DAC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D6D000
|
trusted library allocation
|
page execute and read and write
|
||
25607105000
|
heap
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
277C7990000
|
heap
|
page read and write
|
||
277AF0D0000
|
trusted library allocation
|
page read and write
|
||
7FF848F24000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
7FF84915E000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
7FF8490B8000
|
trusted library allocation
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
7FF848E06000
|
trusted library allocation
|
page read and write
|
||
7FF848D53000
|
trusted library allocation
|
page execute and read and write
|
||
22AAC6B9000
|
trusted library allocation
|
page read and write
|
||
277AD759000
|
heap
|
page read and write
|
||
277AD6F4000
|
heap
|
page read and write
|
||
1C50D000
|
stack
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
7FF8490BC000
|
trusted library allocation
|
page read and write
|
||
22AA9B11000
|
heap
|
page read and write
|
||
1B318201000
|
trusted library allocation
|
page read and write
|
||
1B3157E0000
|
heap
|
page read and write
|
||
7DF47FCB0000
|
trusted library allocation
|
page execute and read and write
|
||
F3270FE000
|
stack
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
7FF8490A4000
|
trusted library allocation
|
page read and write
|
||
2560A858000
|
trusted library allocation
|
page read and write
|
||
29A1000
|
trusted library allocation
|
page read and write
|
||
7FF848D54000
|
trusted library allocation
|
page read and write
|
||
63BC47A000
|
stack
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
7FF848F38000
|
trusted library allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
22AAB5F0000
|
heap
|
page read and write
|
||
25609D5E000
|
trusted library allocation
|
page read and write
|
||
33AC000
|
trusted library allocation
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490B8000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
133A3000
|
trusted library allocation
|
page read and write
|
||
22AAB471000
|
heap
|
page read and write
|
||
EF24E8F000
|
stack
|
page read and write
|
||
25609E1F000
|
trusted library allocation
|
page read and write
|
||
EF23BFE000
|
stack
|
page read and write
|
||
22AA9B59000
|
heap
|
page read and write
|
||
834F87E000
|
stack
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
834FF3E000
|
stack
|
page read and write
|
||
834FFBB000
|
stack
|
page read and write
|
||
22AC3DC4000
|
heap
|
page read and write
|
||
1B7CE000
|
stack
|
page read and write
|
||
63BC4FE000
|
stack
|
page read and write
|
||
25609B78000
|
trusted library allocation
|
page read and write
|
||
4B0000
|
unkown
|
page readonly
|
||
22AC3C40000
|
heap
|
page read and write
|
||
277AD6B3000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
F3272FE000
|
stack
|
page read and write
|
||
7FF84900D000
|
trusted library allocation
|
page read and write
|
||
1438000
|
heap
|
page read and write
|
||
7FF849143000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
277BF508000
|
trusted library allocation
|
page read and write
|
||
22AAB63A000
|
heap
|
page read and write
|
||
1B32777F000
|
trusted library allocation
|
page read and write
|
||
1B315A60000
|
heap
|
page readonly
|
||
22AAC968000
|
trusted library allocation
|
page read and write
|
||
7FF848F32000
|
trusted library allocation
|
page read and write
|
||
14AF000
|
heap
|
page read and write
|
||
7FF848D6B000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
7FF848D54000
|
trusted library allocation
|
page read and write
|
||
1B1EE000
|
stack
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
277C7800000
|
heap
|
page read and write
|
||
277B0FFE000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
2864000
|
trusted library allocation
|
page read and write
|
||
F3273FD000
|
stack
|
page read and write
|
||
25608928000
|
heap
|
page read and write
|
||
1B32FBD6000
|
heap
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page execute and read and write
|
||
25620F80000
|
heap
|
page execute and read and write
|
||
1B32FC17000
|
heap
|
page read and write
|
||
277B0B72000
|
trusted library allocation
|
page read and write
|
||
1B32F92B000
|
heap
|
page read and write
|
||
1B6CE000
|
stack
|
page read and write
|
||
7FF848D43000
|
trusted library allocation
|
page execute and read and write
|
||
1B315820000
|
heap
|
page read and write
|
||
25606DD0000
|
heap
|
page read and write
|
||
25618A51000
|
trusted library allocation
|
page read and write
|
||
277AF1E0000
|
heap
|
page execute and read and write
|
||
22AC3B45000
|
heap
|
page read and write
|
||
22AC3D88000
|
heap
|
page read and write
|
||
129A1000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490AC000
|
trusted library allocation
|
page read and write
|
||
256097B1000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
25607080000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
7FF848D34000
|
trusted library allocation
|
page read and write
|
||
7FF848D5D000
|
trusted library allocation
|
page execute and read and write
|
||
1B315AA0000
|
trusted library allocation
|
page read and write
|
||
1B4D0000
|
heap
|
page read and write
|
||
63BC27E000
|
stack
|
page read and write
|
||
289E000
|
stack
|
page read and write
|
||
277C7907000
|
heap
|
page read and write
|
||
1B81D000
|
stack
|
page read and write
|
||
1B32F890000
|
heap
|
page read and write
|
||
25609AE8000
|
trusted library allocation
|
page read and write
|
||
277AD6B5000
|
heap
|
page read and write
|
||
277BF50E000
|
trusted library allocation
|
page read and write
|
||
25621157000
|
heap
|
page read and write
|
||
277AD752000
|
heap
|
page read and write
|
||
22AAB6A4000
|
heap
|
page read and write
|
||
A62000
|
heap
|
page read and write
|
||
1B31820A000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
277C79A6000
|
heap
|
page read and write
|
||
22AAB7D5000
|
trusted library allocation
|
page read and write
|
||
267E000
|
heap
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page execute and read and write
|
||
277C76B6000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
AA8000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
22AA9950000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
277B03F9000
|
trusted library allocation
|
page read and write
|
||
22ABBA37000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
1B3192B7000
|
trusted library allocation
|
page read and write
|
||
7FF848EFA000
|
trusted library allocation
|
page read and write
|
||
25620EAB000
|
heap
|
page read and write
|
||
1B32F966000
|
heap
|
page read and write
|
||
277AF221000
|
trusted library allocation
|
page read and write
|
||
7FF848F32000
|
trusted library allocation
|
page read and write
|
||
63BC7F9000
|
stack
|
page read and write
|
||
1B0E0000
|
heap
|
page read and write
|
||
7FF848E36000
|
trusted library allocation
|
page execute and read and write
|
||
277AF210000
|
heap
|
page execute and read and write
|
||
277C79FB000
|
heap
|
page read and write
|
||
2562126D000
|
heap
|
page read and write
|
||
256094A3000
|
trusted library allocation
|
page read and write
|
||
22ABB771000
|
trusted library allocation
|
page read and write
|
||
EF23B7E000
|
stack
|
page read and write
|
||
7FF8490B5000
|
trusted library allocation
|
page read and write
|
||
22ABBA55000
|
trusted library allocation
|
page read and write
|
||
F3277BE000
|
stack
|
page read and write
|
||
4A0000
|
unkown
|
page readonly
|
||
AAF000
|
heap
|
page read and write
|
||
1425000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
1AFE000
|
stack
|
page read and write
|
||
7FF849073000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF848D53000
|
trusted library allocation
|
page execute and read and write
|
||
25620EB7000
|
heap
|
page read and write
|
||
277C7670000
|
heap
|
page read and write
|
||
A4B000
|
heap
|
page read and write
|
||
7FF848DFC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D33000
|
trusted library allocation
|
page execute and read and write
|
||
834F9F9000
|
stack
|
page read and write
|
||
1B32777D000
|
trusted library allocation
|
page read and write
|
||
1B3192BC000
|
trusted library allocation
|
page read and write
|
||
22ABBA3E000
|
trusted library allocation
|
page read and write
|
||
25606F9E000
|
heap
|
page read and write
|
||
277C77E0000
|
heap
|
page read and write
|
||
7FF848F22000
|
trusted library allocation
|
page read and write
|
||
1456000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
277C78E0000
|
heap
|
page read and write
|
||
25606FA8000
|
heap
|
page read and write
|
||
7FF848E0C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
A2C000
|
heap
|
page read and write
|
||
22AA9A30000
|
heap
|
page read and write
|
||
F3275B9000
|
stack
|
page read and write
|
||
A2D000
|
heap
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page execute and read and write
|
||
63BC87E000
|
stack
|
page read and write
|
||
2560A2E5000
|
trusted library allocation
|
page read and write
|
||
1C8FF000
|
stack
|
page read and write
|
||
256097CC000
|
trusted library allocation
|
page read and write
|
||
63BD6CC000
|
stack
|
page read and write
|
||
1B32FC75000
|
heap
|
page read and write
|
||
22AAC7E8000
|
trusted library allocation
|
page read and write
|
||
277C7903000
|
heap
|
page read and write
|
||
22AC3C3C000
|
heap
|
page read and write
|
||
7FF848D54000
|
trusted library allocation
|
page read and write
|
||
25609DDF000
|
trusted library allocation
|
page read and write
|
||
25620E50000
|
heap
|
page read and write
|
||
1B3274B1000
|
trusted library allocation
|
page read and write
|
||
1B3274C1000
|
trusted library allocation
|
page read and write
|
||
1B318089000
|
trusted library allocation
|
page read and write
|
||
277AF29A000
|
trusted library allocation
|
page read and write
|
||
63BCA7B000
|
stack
|
page read and write
|
||
7FF848F34000
|
trusted library allocation
|
page read and write
|
||
277AF0C0000
|
heap
|
page read and write
|
||
F32840C000
|
stack
|
page read and write
|
||
2562114C000
|
heap
|
page read and write
|
||
7FF848F01000
|
trusted library allocation
|
page read and write
|
||
277AD6CD000
|
heap
|
page read and write
|
||
22AACFBD000
|
trusted library allocation
|
page read and write
|
||
834FDB8000
|
stack
|
page read and write
|
||
25608F1D000
|
trusted library allocation
|
page read and write
|
||
7FF848F38000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
1B318DE6000
|
trusted library allocation
|
page read and write
|
||
7FF848EF2000
|
trusted library allocation
|
page read and write
|
||
EF242B9000
|
stack
|
page read and write
|
||
25608A40000
|
heap
|
page execute and read and write
|
||
DAE000
|
stack
|
page read and write
|
||
256097C3000
|
trusted library allocation
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
22AA9B0D000
|
heap
|
page read and write
|
||
7FF848F01000
|
trusted library allocation
|
page read and write
|
||
7FF84904D000
|
trusted library allocation
|
page read and write
|
||
7FF848EF1000
|
trusted library allocation
|
page read and write
|
||
13F0000
|
heap
|
page execute and read and write
|
||
A48000
|
heap
|
page read and write
|
||
22AA9AE2000
|
heap
|
page read and write
|
||
25609BFD000
|
trusted library allocation
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
1B3158E9000
|
heap
|
page read and write
|
||
25609CFD000
|
trusted library allocation
|
page read and write
|
||
63BC57B000
|
stack
|
page read and write
|
||
22AAB665000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
277AD5F0000
|
heap
|
page read and write
|
||
22ABB781000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page execute and read and write
|
||
13D0000
|
trusted library allocation
|
page read and write
|
||
22AAB740000
|
heap
|
page execute and read and write
|
||
63BD5CC000
|
stack
|
page read and write
|
||
834F97E000
|
stack
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
DCF000
|
stack
|
page read and write
|
||
25607090000
|
heap
|
page readonly
|
||
22AAC353000
|
trusted library allocation
|
page read and write
|
||
7FF8490BC000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
1C20C000
|
stack
|
page read and write
|
||
7FF8491C0000
|
trusted library allocation
|
page read and write
|
||
2560A27F000
|
trusted library allocation
|
page read and write
|
||
22AC3F80000
|
heap
|
page read and write
|
||
277BF28F000
|
trusted library allocation
|
page read and write
|
||
277AF060000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7FF848D7D000
|
trusted library allocation
|
page execute and read and write
|
||
1902000
|
heap
|
page read and write
|
||
1B315B60000
|
heap
|
page read and write
|
||
1B31885B000
|
trusted library allocation
|
page read and write
|
||
22AC3C30000
|
heap
|
page read and write
|
||
1487000
|
heap
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
1B32FB00000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
25621199000
|
heap
|
page read and write
|
||
EF2510E000
|
stack
|
page read and write
|
||
1BCC4000
|
stack
|
page read and write
|
||
25609649000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
A3E000
|
heap
|
page read and write
|
||
22AAB430000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
F32820F000
|
stack
|
page read and write
|
||
7DF4E3790000
|
trusted library allocation
|
page execute and read and write
|
||
EF2423A000
|
stack
|
page read and write
|
||
277BF50C000
|
trusted library allocation
|
page read and write
|
||
63BD44E000
|
stack
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
277C79A0000
|
heap
|
page read and write
|
||
A91000
|
heap
|
page read and write
|
||
1B32FB1E000
|
heap
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
277ADA15000
|
heap
|
page read and write
|
||
7FF848E0C000
|
trusted library allocation
|
page execute and read and write
|
||
1BC02000
|
heap
|
page read and write
|
||
25620E2A000
|
heap
|
page read and write
|
||
F327072000
|
stack
|
page read and write
|
||
25609A82000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
27C1000
|
trusted library allocation
|
page read and write
|
||
1B317EE1000
|
trusted library allocation
|
page read and write
|
There are 964 hidden memdumps, click here to show them.