Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
OXhiMvksgM.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\OXhiMvksgM.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\X.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\X.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_X.exe_2883bebedfe0a947abfaed60a9497f85b63fa3ab_10868351_ec699ee9-e9a8-460e-8bd9-cd651ef3aa8e\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER635D.tmp.dmp
|
Mini DuMP crash report, 16 streams, Sun Nov 17 18:25:52 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6504.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6543.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\X.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Semo.exe.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Fri Oct 18 19:21:12 2024, mtime=Sat Nov 16 19:25:29 2024, atime=Sun Nov 10 22:05:12 2024, length=968192, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_00fd4eos.t33.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_10v1h1h1.vja.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2mqi5pi0.hdf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5yanlcpp.fn2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fwx5cq5u.kd5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gapu0315.y0y.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jmrsoecl.u1a.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kxybqzn5.3nd.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ogcykjou.cua.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_skhan0r1.1qo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tdvefrgy.iwg.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y4tdsawi.k3i.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\X.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Nov 17 17:24:38
2024, mtime=Sun Nov 17 17:24:39 2024, atime=Sun Nov 17 17:24:39 2024, length=62464, window=hide
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 15 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\OXhiMvksgM.exe
|
"C:\Users\user\Desktop\OXhiMvksgM.exe"
|
||
C:\Users\user\AppData\Local\Temp\X.exe
|
"C:\Users\user\AppData\Local\Temp\X.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\X.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'X.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\X.exe'
|
||
C:\Users\user\AppData\Roaming\X.exe
|
"C:\Users\user\AppData\Roaming\X.exe"
|
||
C:\Users\user\AppData\Roaming\X.exe
|
"C:\Users\user\AppData\Roaming\X.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 460 -p 7100 -ip 7100
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7100 -s 2088
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
activities-mustang.gl.at.ply.gg
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.microsoft.cou
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://crl.micft.cMicRosof
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 7 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
activities-mustang.gl.at.ply.gg
|
147.185.221.22
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
147.185.221.22
|
activities-mustang.gl.at.ply.gg
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
X
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
ProgramId
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
FileId
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
LowerCaseLongPath
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
LongPathHash
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
Name
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
OriginalFileName
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
Publisher
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
Version
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
BinFileVersion
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
BinaryType
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
ProductName
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
ProductVersion
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
LinkDate
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
BinProductVersion
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
AppxPackageFullName
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
Size
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
Language
|
||
\REGISTRY\A\{73414b20-e204-a0a1-24e6-89df6564c329}\Root\InventoryApplicationFile\x.exe|48638fd7336d2c0d
|
Usn
|
There are 11 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
24CC000
|
trusted library allocation
|
page read and write
|
||
6C2000
|
unkown
|
page readonly
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
280E000
|
stack
|
page read and write
|
||
7FFD34BD0000
|
trusted library allocation
|
page read and write
|
||
2BADA5FD000
|
heap
|
page read and write
|
||
2B277EC4000
|
heap
|
page read and write
|
||
7FFD34AC8000
|
trusted library allocation
|
page read and write
|
||
2B21006F000
|
trusted library allocation
|
page read and write
|
||
7FFD34774000
|
trusted library allocation
|
page read and write
|
||
7DF4B03F0000
|
trusted library allocation
|
page execute and read and write
|
||
2B277D30000
|
heap
|
page read and write
|
||
7FFD34B80000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
1B223000
|
heap
|
page read and write
|
||
539000
|
heap
|
page read and write
|
||
1C967AF3000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
95B000
|
heap
|
page read and write
|
||
236E000
|
stack
|
page read and write
|
||
BD0000
|
trusted library allocation
|
page read and write
|
||
7FFD34886000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34AD2000
|
trusted library allocation
|
page read and write
|
||
7FFD34900000
|
trusted library allocation
|
page read and write
|
||
2BAC3921000
|
trusted library allocation
|
page read and write
|
||
1C94D9EC000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34830000
|
trusted library allocation
|
page execute and read and write
|
||
95D000
|
heap
|
page read and write
|
||
D4C000
|
heap
|
page read and write
|
||
C6846BE000
|
stack
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
7FFD348A0000
|
trusted library allocation
|
page execute and read and write
|
||
1B68B000
|
stack
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page execute and read and write
|
||
12691000
|
trusted library allocation
|
page read and write
|
||
7FFD34BE0000
|
trusted library allocation
|
page read and write
|
||
438067D000
|
stack
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
60C000
|
heap
|
page read and write
|
||
7FFD34856000
|
trusted library allocation
|
page read and write
|
||
2680000
|
heap
|
page read and write
|
||
7FFD34793000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347A2000
|
trusted library allocation
|
page read and write
|
||
7FFD34911000
|
trusted library allocation
|
page read and write
|
||
1C967BD8000
|
heap
|
page read and write
|
||
1C9504C7000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
52B000
|
heap
|
page read and write
|
||
2B210307000
|
trusted library allocation
|
page read and write
|
||
C683DFE000
|
stack
|
page read and write
|
||
1C967C1F000
|
heap
|
page read and write
|
||
4380ABB000
|
stack
|
page read and write
|
||
1C95066D000
|
trusted library allocation
|
page read and write
|
||
7FFD34B50000
|
trusted library allocation
|
page read and write
|
||
7FFD34846000
|
trusted library allocation
|
page read and write
|
||
1B32E000
|
stack
|
page read and write
|
||
2BAC05ED000
|
heap
|
page read and write
|
||
C6844B9000
|
stack
|
page read and write
|
||
7FFD34774000
|
trusted library allocation
|
page read and write
|
||
A20000
|
trusted library allocation
|
page read and write
|
||
7FFD347DC000
|
trusted library allocation
|
page execute and read and write
|
||
1C951184000
|
trusted library allocation
|
page read and write
|
||
2BAC0570000
|
heap
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
99D000
|
heap
|
page read and write
|
||
1AEE0000
|
heap
|
page execute and read and write
|
||
7FFD3481C000
|
trusted library allocation
|
page execute and read and write
|
||
B00000
|
heap
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
43806F9000
|
stack
|
page read and write
|
||
1BCDE000
|
stack
|
page read and write
|
||
7FFD347C0000
|
trusted library allocation
|
page read and write
|
||
1ADB0000
|
heap
|
page read and write
|
||
7FFD34BB0000
|
trusted library allocation
|
page read and write
|
||
1C967D10000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
676000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page read and write
|
||
2BAC2FB2000
|
trusted library allocation
|
page read and write
|
||
1C94D8C0000
|
heap
|
page read and write
|
||
A05000
|
heap
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
2BADA8AC000
|
heap
|
page read and write
|
||
1C69A000
|
stack
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
2BAC3069000
|
trusted library allocation
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
2B277B54000
|
heap
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
2BADA610000
|
heap
|
page read and write
|
||
2B277D92000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page execute and read and write
|
||
2BADA8A8000
|
heap
|
page read and write
|
||
7FFD34942000
|
trusted library allocation
|
page read and write
|
||
7FFD3484C000
|
trusted library allocation
|
page execute and read and write
|
||
2B2777C0000
|
heap
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
438016D000
|
stack
|
page read and write
|
||
2B2759F0000
|
heap
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
2B210031000
|
trusted library allocation
|
page read and write
|
||
1C950392000
|
trusted library allocation
|
page read and write
|
||
7FFD347A3000
|
trusted library allocation
|
page read and write
|
||
7FFD34B30000
|
trusted library allocation
|
page read and write
|
||
578000
|
heap
|
page read and write
|
||
1C94F355000
|
heap
|
page read and write
|
||
1B5FE000
|
stack
|
page read and write
|
||
7FFD34B20000
|
trusted library allocation
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
1C94D960000
|
heap
|
page read and write
|
||
2BAD2031000
|
trusted library allocation
|
page read and write
|
||
43804FA000
|
stack
|
page read and write
|
||
2BAC2020000
|
heap
|
page read and write
|
||
2BAC2259000
|
trusted library allocation
|
page read and write
|
||
2BAC1FF0000
|
heap
|
page execute and read and write
|
||
7F0000
|
trusted library allocation
|
page read and write
|
||
2BAC05DB000
|
heap
|
page read and write
|
||
54A000
|
heap
|
page read and write
|
||
C68407E000
|
stack
|
page read and write
|
||
1B24E000
|
stack
|
page read and write
|
||
EA2857A000
|
stack
|
page read and write
|
||
2401000
|
trusted library allocation
|
page read and write
|
||
7FFD34948000
|
trusted library allocation
|
page read and write
|
||
1C967B00000
|
heap
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
C68518E000
|
stack
|
page read and write
|
||
2BAC1FD0000
|
heap
|
page execute and read and write
|
||
2B277ECD000
|
heap
|
page read and write
|
||
510000
|
heap
|
page read and write
|
||
2B275AE7000
|
heap
|
page read and write
|
||
61F000
|
heap
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
285F000
|
heap
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34932000
|
trusted library allocation
|
page read and write
|
||
7FFD34816000
|
trusted library allocation
|
page read and write
|
||
2BAC05D5000
|
heap
|
page read and write
|
||
7FFD34764000
|
trusted library allocation
|
page read and write
|
||
24AE000
|
stack
|
page read and write
|
||
2BAC0616000
|
heap
|
page read and write
|
||
1AFBB000
|
heap
|
page read and write
|
||
7FFD3491A000
|
trusted library allocation
|
page read and write
|
||
EA284F8000
|
stack
|
page read and write
|
||
2B201E03000
|
trusted library allocation
|
page read and write
|
||
2BAC2FA1000
|
trusted library allocation
|
page read and write
|
||
2B200C06000
|
trusted library allocation
|
page read and write
|
||
1AF9A000
|
heap
|
page read and write
|
||
2BAC2F94000
|
trusted library allocation
|
page read and write
|
||
7FFD34774000
|
trusted library allocation
|
page read and write
|
||
7FFD3477B000
|
trusted library allocation
|
page read and write
|
||
1C94D8E0000
|
heap
|
page read and write
|
||
2B277B6B000
|
heap
|
page read and write
|
||
2B277710000
|
heap
|
page execute and read and write
|
||
7FFD34BC0000
|
trusted library allocation
|
page read and write
|
||
9A4000
|
heap
|
page read and write
|
||
7FFD34AB9000
|
trusted library allocation
|
page read and write
|
||
2BADA81F000
|
heap
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
2BAC323F000
|
trusted library allocation
|
page read and write
|
||
2BAC1E60000
|
trusted library allocation
|
page read and write
|
||
7FFD3476D000
|
trusted library allocation
|
page execute and read and write
|
||
6D3000
|
heap
|
page read and write
|
||
2B2759D0000
|
heap
|
page read and write
|
||
534000
|
stack
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
1B1BF000
|
stack
|
page read and write
|
||
7FFD34770000
|
trusted library allocation
|
page read and write
|
||
2B2780B0000
|
heap
|
page read and write
|
||
1AFE3000
|
heap
|
page read and write
|
||
2B277B21000
|
heap
|
page read and write
|
||
2B277D86000
|
heap
|
page read and write
|
||
EA28477000
|
stack
|
page read and write
|
||
1C95113A000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
2B275A4C000
|
heap
|
page read and write
|
||
1C95041D000
|
trusted library allocation
|
page read and write
|
||
2BADA930000
|
trusted library allocation
|
page read and write
|
||
6D2000
|
unkown
|
page readonly
|
||
4380A3E000
|
stack
|
page read and write
|
||
2BAC1F00000
|
heap
|
page read and write
|
||
7DF4DBDF0000
|
trusted library allocation
|
page execute and read and write
|
||
1C94F2D0000
|
heap
|
page execute and read and write
|
||
EA2867E000
|
stack
|
page read and write
|
||
576000
|
heap
|
page read and write
|
||
2B275A02000
|
heap
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34856000
|
trusted library allocation
|
page execute and read and write
|
||
1B220000
|
heap
|
page read and write
|
||
2B275CB0000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
438158A000
|
stack
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
29C1000
|
trusted library allocation
|
page read and write
|
||
C68453E000
|
stack
|
page read and write
|
||
2BAC05CC000
|
heap
|
page read and write
|
||
2B200228000
|
trusted library allocation
|
page read and write
|
||
7FFD34846000
|
trusted library allocation
|
page execute and read and write
|
||
2BAC30EE000
|
trusted library allocation
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
1C95063A000
|
trusted library allocation
|
page read and write
|
||
8F0000
|
trusted library allocation
|
page read and write
|
||
C684439000
|
stack
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page execute and read and write
|
||
2B277E27000
|
heap
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
2BAC2FA5000
|
trusted library allocation
|
page read and write
|
||
129C8000
|
trusted library allocation
|
page read and write
|
||
643000
|
heap
|
page read and write
|
||
2B277B61000
|
heap
|
page read and write
|
||
1C94F82D000
|
trusted library allocation
|
page read and write
|
||
1C94DA36000
|
heap
|
page read and write
|
||
C68510E000
|
stack
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB4000
|
trusted library allocation
|
page read and write
|
||
2BAC20B8000
|
trusted library allocation
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
A01000
|
heap
|
page read and write
|
||
7FFD34960000
|
trusted library allocation
|
page execute and read and write
|
||
D80000
|
heap
|
page read and write
|
||
1C95F3CF000
|
trusted library allocation
|
page read and write
|
||
43808B9000
|
stack
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
2BAC0820000
|
heap
|
page read and write
|
||
1C94F3DB000
|
trusted library allocation
|
page read and write
|
||
2B275CB5000
|
heap
|
page read and write
|
||
438057F000
|
stack
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
2BADA630000
|
heap
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
2B2102ED000
|
trusted library allocation
|
page read and write
|
||
1B58E000
|
stack
|
page read and write
|
||
7FFD34988000
|
trusted library allocation
|
page read and write
|
||
7FFD34850000
|
trusted library allocation
|
page read and write
|
||
7FFD34BA0000
|
trusted library allocation
|
page read and write
|
||
7FFD348C0000
|
trusted library allocation
|
page execute and read and write
|
||
1C967C43000
|
heap
|
page read and write
|
||
2BADA85F000
|
heap
|
page read and write
|
||
24CA000
|
trusted library allocation
|
page read and write
|
||
7FFD34AF4000
|
trusted library allocation
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
1C290000
|
heap
|
page read and write
|
||
2BADA8B1000
|
heap
|
page read and write
|
||
1C967873000
|
heap
|
page read and write
|
||
2B2102F7000
|
trusted library allocation
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
1C950B87000
|
trusted library allocation
|
page read and write
|
||
7FFD34BA0000
|
trusted library allocation
|
page execute and read and write
|
||
7DF4CD9D0000
|
trusted library allocation
|
page execute and read and write
|
||
2BAC2A83000
|
trusted library allocation
|
page read and write
|
||
7FFD34910000
|
trusted library allocation
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page read and write
|
||
CE2000
|
heap
|
page read and write
|
||
7FFD34773000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
EA292C9000
|
stack
|
page read and write
|
||
2B277D47000
|
heap
|
page read and write
|
||
7FFD3476D000
|
trusted library allocation
|
page execute and read and write
|
||
2BAC3898000
|
trusted library allocation
|
page read and write
|
||
438047F000
|
stack
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
7FFD3477D000
|
trusted library allocation
|
page execute and read and write
|
||
2BAC0430000
|
heap
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
1B18D000
|
stack
|
page read and write
|
||
1C967BF2000
|
heap
|
page read and write
|
||
12401000
|
trusted library allocation
|
page read and write
|
||
7FFD34A90000
|
trusted library allocation
|
page read and write
|
||
7FFD34B10000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
7FFD34912000
|
trusted library allocation
|
page read and write
|
||
1C94D940000
|
trusted library section
|
page read and write
|
||
2BADA859000
|
heap
|
page read and write
|
||
7FFD34C00000
|
trusted library allocation
|
page read and write
|
||
1B200000
|
heap
|
page read and write
|
||
7FFD34782000
|
trusted library allocation
|
page read and write
|
||
C68433F000
|
stack
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
2BAC3E56000
|
trusted library allocation
|
page read and write
|
||
2BAC2C42000
|
trusted library allocation
|
page read and write
|
||
1C95F648000
|
trusted library allocation
|
page read and write
|
||
1AF90000
|
heap
|
page read and write
|
||
EA2817E000
|
stack
|
page read and write
|
||
2B277BDC000
|
heap
|
page read and write
|
||
9F3000
|
heap
|
page read and write
|
||
2BADA512000
|
heap
|
page read and write
|
||
875000
|
heap
|
page read and write
|
||
EA283F9000
|
stack
|
page read and write
|
||
269C000
|
trusted library allocation
|
page read and write
|
||
2BADA4F7000
|
heap
|
page execute and read and write
|
||
1B8D1000
|
heap
|
page read and write
|
||
1C95044F000
|
trusted library allocation
|
page read and write
|
||
1B89E000
|
heap
|
page read and write
|
||
7FFD34B70000
|
trusted library allocation
|
page read and write
|
||
2B277ED7000
|
heap
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
2BAC061A000
|
heap
|
page read and write
|
||
1B3F0000
|
heap
|
page execute and read and write
|
||
7FFD34958000
|
trusted library allocation
|
page read and write
|
||
2BADA718000
|
heap
|
page read and write
|
||
2B275A75000
|
heap
|
page read and write
|
||
2B277604000
|
heap
|
page read and write
|
||
2B275A2C000
|
heap
|
page read and write
|
||
7FFD34AA3000
|
trusted library allocation
|
page read and write
|
||
7FFD34980000
|
trusted library allocation
|
page read and write
|
||
7FFD34C10000
|
trusted library allocation
|
page read and write
|
||
2B277EBC000
|
heap
|
page read and write
|
||
2BAC1E90000
|
heap
|
page readonly
|
||
2B277D96000
|
heap
|
page read and write
|
||
7FFD34BAC000
|
trusted library allocation
|
page read and write
|
||
EA27D83000
|
stack
|
page read and write
|
||
1A9F0000
|
trusted library allocation
|
page read and write
|
||
2B275A0E000
|
heap
|
page read and write
|
||
7FFD34A70000
|
trusted library allocation
|
page read and write
|
||
C68427D000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
7DE000
|
stack
|
page read and write
|
||
EA2877B000
|
stack
|
page read and write
|
||
1C94F361000
|
trusted library allocation
|
page read and write
|
||
7FFD34ACC000
|
trusted library allocation
|
page read and write
|
||
2BAD2336000
|
trusted library allocation
|
page read and write
|
||
7FFD34BC0000
|
trusted library allocation
|
page read and write
|
||
190000
|
heap
|
page read and write
|
||
2B277760000
|
trusted library allocation
|
page read and write
|
||
B2E000
|
stack
|
page read and write
|
||
2B277D82000
|
heap
|
page read and write
|
||
C68417E000
|
stack
|
page read and write
|
||
910000
|
trusted library allocation
|
page read and write
|
||
7FFD347BB000
|
trusted library allocation
|
page read and write
|
||
1BE18000
|
stack
|
page read and write
|
||
AF4000
|
stack
|
page read and write
|
||
965000
|
heap
|
page read and write
|
||
2BAD231E000
|
trusted library allocation
|
page read and write
|
||
438150C000
|
stack
|
page read and write
|
||
438168C000
|
stack
|
page read and write
|
||
1AFD4000
|
heap
|
page read and write
|
||
2B277B7F000
|
heap
|
page read and write
|
||
1C95F391000
|
trusted library allocation
|
page read and write
|
||
2B277DC9000
|
heap
|
page read and write
|
||
2BADA8A1000
|
heap
|
page read and write
|
||
1C967B98000
|
heap
|
page read and write
|
||
1AE3D000
|
stack
|
page read and write
|
||
2B200F9F000
|
trusted library allocation
|
page read and write
|
||
C6845BE000
|
stack
|
page read and write
|
||
7FFD34B7C000
|
trusted library allocation
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
7FFD34BC6000
|
trusted library allocation
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
1C94F280000
|
trusted library allocation
|
page read and write
|
||
43801EE000
|
stack
|
page read and write
|
||
2BADA824000
|
heap
|
page read and write
|
||
170000
|
heap
|
page read and write
|
||
2BAC1EA0000
|
trusted library allocation
|
page read and write
|
||
1B4FE000
|
stack
|
page read and write
|
||
7FFD34984000
|
trusted library allocation
|
page read and write
|
||
2B277D8A000
|
heap
|
page read and write
|
||
1C967CE0000
|
trusted library allocation
|
page read and write
|
||
1C95F370000
|
trusted library allocation
|
page read and write
|
||
7FFD34B90000
|
trusted library allocation
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
1C95F6B0000
|
trusted library allocation
|
page read and write
|
||
1C9678AF000
|
heap
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
1B6FE000
|
stack
|
page read and write
|
||
1C967B73000
|
heap
|
page read and write
|
||
2B277B52000
|
heap
|
page read and write
|
||
7FFD34990000
|
trusted library allocation
|
page read and write
|
||
2BAC1F10000
|
trusted library allocation
|
page read and write
|
||
1C94D920000
|
heap
|
page read and write
|
||
7FFD34950000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34880000
|
trusted library allocation
|
page execute and read and write
|
||
2B277C27000
|
heap
|
page execute and read and write
|
||
7FFD34922000
|
trusted library allocation
|
page read and write
|
||
2BADA787000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34BE0000
|
trusted library allocation
|
page read and write
|
||
1C94DA39000
|
heap
|
page read and write
|
||
2BAC2FA9000
|
trusted library allocation
|
page read and write
|
||
AA0000
|
heap
|
page execute and read and write
|
||
7FFD34940000
|
trusted library allocation
|
page execute and read and write
|
||
1C9678E2000
|
heap
|
page read and write
|
||
1C95F64F000
|
trusted library allocation
|
page read and write
|
||
2BADA72C000
|
heap
|
page read and write
|
||
2BAC306B000
|
trusted library allocation
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
2B277B10000
|
heap
|
page read and write
|
||
2BADA896000
|
heap
|
page read and write
|
||
1C94D9EE000
|
heap
|
page read and write
|
||
1B7FE000
|
stack
|
page read and write
|
||
EA281FA000
|
stack
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
1C950577000
|
trusted library allocation
|
page read and write
|
||
2BADA03B000
|
heap
|
page read and write
|
||
2B277E07000
|
heap
|
page read and write
|
||
62B000
|
heap
|
page read and write
|
||
2BAC3335000
|
trusted library allocation
|
page read and write
|
||
7FFD34BF6000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC9000
|
trusted library allocation
|
page read and write
|
||
1C967C30000
|
heap
|
page read and write
|
||
1A98D000
|
stack
|
page read and write
|
||
2B200D7D000
|
trusted library allocation
|
page read and write
|
||
1B87C000
|
heap
|
page read and write
|
||
7FFD34952000
|
trusted library allocation
|
page read and write
|
||
1C94D950000
|
trusted library section
|
page read and write
|
||
2B201DDE000
|
trusted library allocation
|
page read and write
|
||
1C967869000
|
heap
|
page read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3478D000
|
trusted library allocation
|
page execute and read and write
|
||
43809BF000
|
stack
|
page read and write
|
||
1C967826000
|
heap
|
page execute and read and write
|
||
2B200FA1000
|
trusted library allocation
|
page read and write
|
||
2B2004CB000
|
trusted library allocation
|
page read and write
|
||
1C94F2C0000
|
trusted library allocation
|
page read and write
|
||
7FFD34856000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
2BADA720000
|
heap
|
page read and write
|
||
2B277BF1000
|
heap
|
page read and write
|
||
977000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
5B8000
|
heap
|
page read and write
|
||
1C95060A000
|
trusted library allocation
|
page read and write
|
||
7FFD34BF0000
|
trusted library allocation
|
page read and write
|
||
2BADA4F0000
|
heap
|
page execute and read and write
|
||
2BAC3206000
|
trusted library allocation
|
page read and write
|
||
7FFD34810000
|
trusted library allocation
|
page read and write
|
||
7FFD347CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34762000
|
trusted library allocation
|
page read and write
|
||
CB0000
|
heap
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
7FFD34BE0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC0000
|
trusted library allocation
|
page read and write
|
||
2BADA724000
|
heap
|
page read and write
|
||
7FFD34BC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
C68528E000
|
stack
|
page read and write
|
||
2BADAAD0000
|
heap
|
page read and write
|
||
1B38E000
|
stack
|
page read and write
|
||
7FFD347BC000
|
trusted library allocation
|
page execute and read and write
|
||
2BAC05A2000
|
heap
|
page read and write
|
||
2B275C40000
|
trusted library allocation
|
page read and write
|
||
1C967AA0000
|
heap
|
page execute and read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
2BAC2FAE000
|
trusted library allocation
|
page read and write
|
||
2B277E2B000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
1C94D9B0000
|
heap
|
page read and write
|
||
2B201951000
|
trusted library allocation
|
page read and write
|
||
2B2102F5000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page execute and read and write
|
||
C68538E000
|
stack
|
page read and write
|
||
2BAC3151000
|
trusted library allocation
|
page read and write
|
||
C683CF3000
|
stack
|
page read and write
|
||
2BADA878000
|
heap
|
page read and write
|
||
1C95F64D000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
7FFD34AF9000
|
trusted library allocation
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34876000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34880000
|
trusted library allocation
|
page execute and read and write
|
||
C6840F9000
|
stack
|
page read and write
|
||
2B277D60000
|
heap
|
page read and write
|
||
2BADA514000
|
heap
|
page read and write
|
||
1B800000
|
heap
|
page read and write
|
||
936000
|
heap
|
page read and write
|
||
2B2010BC000
|
trusted library allocation
|
page read and write
|
||
EA291CD000
|
stack
|
page read and write
|
||
66E000
|
heap
|
page read and write
|
||
2B201890000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
BF0000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
2B2775B0000
|
heap
|
page execute and read and write
|
||
1C94D965000
|
heap
|
page read and write
|
||
7FFD34830000
|
trusted library allocation
|
page read and write
|
||
7FFD3495A000
|
trusted library allocation
|
page read and write
|
||
2B277C20000
|
heap
|
page execute and read and write
|
||
2B2004CD000
|
trusted library allocation
|
page read and write
|
||
2B2011D5000
|
trusted library allocation
|
page read and write
|
||
7FFD34840000
|
trusted library allocation
|
page read and write
|
||
1C95F381000
|
trusted library allocation
|
page read and write
|
||
2BAC32D4000
|
trusted library allocation
|
page read and write
|
||
4381609000
|
stack
|
page read and write
|
||
2B277C50000
|
heap
|
page read and write
|
||
7FFD347AD000
|
trusted library allocation
|
page execute and read and write
|
||
1C94F350000
|
heap
|
page read and write
|
||
7FFD34764000
|
trusted library allocation
|
page read and write
|
||
EA2827E000
|
stack
|
page read and write
|
||
438093E000
|
stack
|
page read and write
|
||
7FFD34A60000
|
trusted library allocation
|
page read and write
|
||
2BAC0825000
|
heap
|
page read and write
|
||
1C95F361000
|
trusted library allocation
|
page read and write
|
||
1C967830000
|
heap
|
page read and write
|
||
2BAC33F0000
|
trusted library allocation
|
page read and write
|
||
2B275A34000
|
heap
|
page read and write
|
||
7FFD34940000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
2B200001000
|
trusted library allocation
|
page read and write
|
||
1C94FDB1000
|
trusted library allocation
|
page read and write
|
||
2BAC0530000
|
heap
|
page read and write
|
||
1B0BF000
|
stack
|
page read and write
|
||
1C967820000
|
heap
|
page execute and read and write
|
||
5D0000
|
heap
|
page read and write
|
||
C6843B7000
|
stack
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
541000
|
heap
|
page read and write
|
||
7FFD347B0000
|
trusted library allocation
|
page read and write
|
||
7FFD349C0000
|
trusted library allocation
|
page read and write
|
||
C6842F7000
|
stack
|
page read and write
|
||
2BAC0590000
|
heap
|
page read and write
|
||
C7C000
|
heap
|
page read and write
|
||
1C79C000
|
stack
|
page read and write
|
||
7FFD3478B000
|
trusted library allocation
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
EA293CC000
|
stack
|
page read and write
|
||
2BAC1F05000
|
heap
|
page read and write
|
||
2B200080000
|
trusted library allocation
|
page read and write
|
||
7FFD34826000
|
trusted library allocation
|
page read and write
|
||
12693000
|
trusted library allocation
|
page read and write
|
||
129C1000
|
trusted library allocation
|
page read and write
|
||
2BAD2051000
|
trusted library allocation
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
1C96736B000
|
heap
|
page read and write
|
||
2B275BC0000
|
heap
|
page read and write
|
||
C6841F7000
|
stack
|
page read and write
|
||
EA2944E000
|
stack
|
page read and write
|
||
2BAC05D7000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page execute and read and write
|
||
2B275C80000
|
trusted library allocation
|
page read and write
|
||
2BADA7E9000
|
heap
|
page read and write
|
||
1B140000
|
heap
|
page read and write
|
||
A03000
|
heap
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
7FFD34A30000
|
trusted library allocation
|
page read and write
|
||
7FFD34A93000
|
trusted library allocation
|
page read and write
|
||
2B2102E8000
|
trusted library allocation
|
page read and write
|
||
C0F000
|
stack
|
page read and write
|
||
2BAC37B2000
|
trusted library allocation
|
page read and write
|
||
915000
|
heap
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page read and write
|
||
2B277490000
|
trusted library allocation
|
page read and write
|
||
7FFD34B60000
|
trusted library allocation
|
page read and write
|
||
2B2775F0000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
2B201304000
|
trusted library allocation
|
page read and write
|
||
1C94D990000
|
trusted library allocation
|
page read and write
|
||
EA285FE000
|
stack
|
page read and write
|
||
2B20111F000
|
trusted library allocation
|
page read and write
|
||
2B210021000
|
trusted library allocation
|
page read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
1B34E000
|
stack
|
page read and write
|
||
1B05E000
|
stack
|
page read and write
|
||
1B48E000
|
stack
|
page read and write
|
||
2B200A53000
|
trusted library allocation
|
page read and write
|
||
2B2775F5000
|
heap
|
page read and write
|
||
C25000
|
heap
|
page read and write
|
||
CB3000
|
heap
|
page read and write
|
||
2B277DBC000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FFD34BD0000
|
trusted library allocation
|
page read and write
|
||
7FFD34B6A000
|
trusted library allocation
|
page read and write
|
||
2BAD209F000
|
trusted library allocation
|
page read and write
|
||
7FFD34BB0000
|
trusted library allocation
|
page read and write
|
||
12403000
|
trusted library allocation
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
2DCB000
|
trusted library allocation
|
page read and write
|
||
240C000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
500000
|
trusted library allocation
|
page read and write
|
||
1C951160000
|
trusted library allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
C00000
|
trusted library allocation
|
page read and write
|
||
2BADA757000
|
heap
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
1B8B1000
|
heap
|
page read and write
|
||
1C967C16000
|
heap
|
page read and write
|
||
CDD000
|
heap
|
page read and write
|
||
7FFD34AB0000
|
trusted library allocation
|
page read and write
|
||
7FFD34982000
|
trusted library allocation
|
page read and write
|
||
7FFD34ADC000
|
trusted library allocation
|
page read and write
|
||
2B2013BF000
|
trusted library allocation
|
page read and write
|
||
2BADA805000
|
heap
|
page read and write
|
||
1C95F667000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page execute and read and write
|
||
97E000
|
stack
|
page read and write
|
||
7FFD3477D000
|
trusted library allocation
|
page execute and read and write
|
||
2BADA7D2000
|
heap
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
2A07000
|
trusted library allocation
|
page read and write
|
||
1C9679C0000
|
heap
|
page read and write
|
||
CA2000
|
heap
|
page read and write
|
||
438073F000
|
stack
|
page read and write
|
||
7FFD34866000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347A3000
|
trusted library allocation
|
page execute and read and write
|
||
2B275A73000
|
heap
|
page read and write
|
||
2B277E8B000
|
heap
|
page read and write
|
||
2BADA505000
|
heap
|
page read and write
|
||
438170E000
|
stack
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
EA2914E000
|
stack
|
page read and write
|
||
2B201E23000
|
trusted library allocation
|
page read and write
|
||
12408000
|
trusted library allocation
|
page read and write
|
||
1C94DA97000
|
heap
|
page read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
2BAC3E31000
|
trusted library allocation
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
2BAC2F9D000
|
trusted library allocation
|
page read and write
|
||
9FE000
|
heap
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
1C94D9A0000
|
heap
|
page readonly
|
||
2BAD2326000
|
trusted library allocation
|
page read and write
|
||
2B2012A2000
|
trusted library allocation
|
page read and write
|
||
7FFD34921000
|
trusted library allocation
|
page read and write
|
||
1C967C39000
|
heap
|
page read and write
|
||
2BADA861000
|
heap
|
page read and write
|
||
7FFD3479D000
|
trusted library allocation
|
page execute and read and write
|
||
1C94D970000
|
trusted library allocation
|
page read and write
|
||
7FFD349D0000
|
trusted library allocation
|
page read and write
|
||
2BAC0598000
|
heap
|
page read and write
|
||
2BAC3E51000
|
trusted library allocation
|
page read and write
|
||
2BADA714000
|
heap
|
page read and write
|
||
554000
|
stack
|
page read and write
|
||
2B275C60000
|
trusted library allocation
|
page read and write
|
||
1C94D9F8000
|
heap
|
page read and write
|
||
24B1000
|
trusted library allocation
|
page read and write
|
||
7FFD34AD0000
|
trusted library allocation
|
page read and write
|
||
7FFD34B02000
|
trusted library allocation
|
page read and write
|
||
438148F000
|
stack
|
page read and write
|
||
2B277D56000
|
heap
|
page read and write
|
||
2B20186A000
|
trusted library allocation
|
page read and write
|
||
2BADA50F000
|
heap
|
page read and write
|
||
7FFD34944000
|
trusted library allocation
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
2BAC38BE000
|
trusted library allocation
|
page read and write
|
||
2BAD231C000
|
trusted library allocation
|
page read and write
|
||
7FFD34B00000
|
trusted library allocation
|
page read and write
|
||
1C967C36000
|
heap
|
page read and write
|
||
7FFD34A50000
|
trusted library allocation
|
page read and write
|
||
1C967AD6000
|
heap
|
page read and write
|
||
2BAC0510000
|
heap
|
page read and write
|
||
1B8CE000
|
stack
|
page read and write
|
||
7FFD34890000
|
trusted library allocation
|
page execute and read and write
|
||
1B8AD000
|
heap
|
page read and write
|
||
1AFB0000
|
heap
|
page execute and read and write
|
||
1BB6F000
|
stack
|
page read and write
|
||
96E000
|
heap
|
page read and write
|
||
1C94F250000
|
trusted library allocation
|
page read and write
|
||
7FFD34B08000
|
trusted library allocation
|
page read and write
|
||
1BC7C000
|
stack
|
page read and write
|
||
7FFD349A0000
|
trusted library allocation
|
page read and write
|
||
2B201E28000
|
trusted library allocation
|
page read and write
|
||
DAE000
|
unkown
|
page read and write
|
||
7FFD34A40000
|
trusted library allocation
|
page read and write
|
||
C683D7E000
|
stack
|
page read and write
|
||
7FFD348B0000
|
trusted library allocation
|
page execute and read and write
|
||
2BAC3E0C000
|
trusted library allocation
|
page read and write
|
||
4380838000
|
stack
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
7FFD34920000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34BA0000
|
trusted library allocation
|
page read and write
|
||
EA280FF000
|
stack
|
page read and write
|
||
1D2000
|
unkown
|
page readonly
|
||
1C950451000
|
trusted library allocation
|
page read and write
|
||
2BAC3980000
|
trusted library allocation
|
page read and write
|
||
93C000
|
heap
|
page read and write
|
||
1B875000
|
heap
|
page read and write
|
||
1C94F589000
|
trusted library allocation
|
page read and write
|
||
7FFD349E0000
|
trusted library allocation
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
519000
|
heap
|
page read and write
|
||
2BAC2C38000
|
trusted library allocation
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
1AE00000
|
heap
|
page read and write
|
||
2B277E02000
|
heap
|
page read and write
|
||
7FFD3482C000
|
trusted library allocation
|
page execute and read and write
|
||
1AEBE000
|
stack
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
54C000
|
heap
|
page read and write
|
||
7FFD34B80000
|
trusted library allocation
|
page read and write
|
||
7FFD34B70000
|
trusted library allocation
|
page read and write
|
||
2B201005000
|
trusted library allocation
|
page read and write
|
||
7FFD34B90000
|
trusted library allocation
|
page execute and read and write
|
||
1C967AC0000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
1AA3C000
|
stack
|
page read and write
|
||
7FFD34AF0000
|
trusted library allocation
|
page read and write
|
||
B05000
|
heap
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD34902000
|
trusted library allocation
|
page read and write
|
||
2B2018F3000
|
trusted library allocation
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
C68530C000
|
stack
|
page read and write
|
||
EA27DCF000
|
stack
|
page read and write
|
||
2BAC1E80000
|
trusted library allocation
|
page read and write
|
||
2B2102EF000
|
trusted library allocation
|
page read and write
|
||
1C967ADE000
|
heap
|
page read and write
|
||
7FFD347FC000
|
trusted library allocation
|
page execute and read and write
|
||
2B275AE2000
|
heap
|
page read and write
|
||
1C95117F000
|
trusted library allocation
|
page read and write
|
||
2BADA80E000
|
heap
|
page read and write
|
||
2B275C00000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2B275A78000
|
heap
|
page read and write
|
||
1C950CAE000
|
trusted library allocation
|
page read and write
|
||
2B277EB0000
|
heap
|
page read and write
|
||
1C94D9F4000
|
heap
|
page read and write
|
||
43805F7000
|
stack
|
page read and write
|
||
2B277E61000
|
heap
|
page read and write
|
||
7FFD3477D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34794000
|
trusted library allocation
|
page read and write
|
||
1C950BED000
|
trusted library allocation
|
page read and write
|
||
1C94DA34000
|
heap
|
page read and write
|
||
972000
|
heap
|
page read and write
|
||
7FFD347BC000
|
trusted library allocation
|
page execute and read and write
|
||
2BAC3053000
|
trusted library allocation
|
page read and write
|
||
1C95053E000
|
trusted library allocation
|
page read and write
|
||
2BADA500000
|
heap
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
7FFD34784000
|
trusted library allocation
|
page read and write
|
||
7FFD34AC4000
|
trusted library allocation
|
page read and write
|
||
2B277DE1000
|
heap
|
page read and write
|
||
240F000
|
trusted library allocation
|
page read and write
|
||
124B8000
|
trusted library allocation
|
page read and write
|
||
1C94F310000
|
heap
|
page read and write
|
||
7FFD34AD8000
|
trusted library allocation
|
page read and write
|
||
270E000
|
stack
|
page read and write
|
||
2B275A15000
|
heap
|
page read and write
|
||
2B201031000
|
trusted library allocation
|
page read and write
|
||
7FFD34B0C000
|
trusted library allocation
|
page read and write
|
||
EA2837E000
|
stack
|
page read and write
|
||
EA2924E000
|
stack
|
page read and write
|
||
1C94D9B8000
|
heap
|
page read and write
|
||
7FFD34A00000
|
trusted library allocation
|
page read and write
|
||
1C950727000
|
trusted library allocation
|
page read and write
|
||
7FFD34A20000
|
trusted library allocation
|
page read and write
|
||
124B3000
|
trusted library allocation
|
page read and write
|
||
7FFD34BCD000
|
trusted library allocation
|
page read and write
|
||
7FFD347EC000
|
trusted library allocation
|
page execute and read and write
|
||
2BAD2061000
|
trusted library allocation
|
page read and write
|
||
7FFD34763000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34BF0000
|
trusted library allocation
|
page read and write
|
||
1C967AD2000
|
heap
|
page read and write
|
||
43807B8000
|
stack
|
page read and write
|
||
7FFD34BB0000
|
trusted library allocation
|
page read and write
|
||
2BAC24FE000
|
trusted library allocation
|
page read and write
|
||
EA282F7000
|
stack
|
page read and write
|
||
EA2807E000
|
stack
|
page read and write
|
||
1C950488000
|
trusted library allocation
|
page read and write
|
||
12698000
|
trusted library allocation
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
2DD5000
|
trusted library allocation
|
page read and write
|
||
7FFD34954000
|
trusted library allocation
|
page read and write
|
||
EA2934D000
|
stack
|
page read and write
|
||
6C0000
|
unkown
|
page readonly
|
||
1C9500DA000
|
trusted library allocation
|
page read and write
|
||
C8F000
|
stack
|
page read and write
|
||
2BADA71C000
|
heap
|
page read and write
|
||
635000
|
heap
|
page read and write
|
||
1B884000
|
heap
|
page read and write
|
||
2411000
|
trusted library allocation
|
page read and write
|
||
1C94DA0C000
|
heap
|
page read and write
|
||
1C950455000
|
trusted library allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
7DF4B0410000
|
trusted library allocation
|
page execute and read and write
|
||
606000
|
heap
|
page read and write
|
||
1BFE4000
|
stack
|
page read and write
|
||
7FFD34B90000
|
trusted library allocation
|
page read and write
|
||
124B1000
|
trusted library allocation
|
page read and write
|
||
2B275A2E000
|
heap
|
page read and write
|
||
7FFD34AA0000
|
trusted library allocation
|
page read and write
|
||
1B44E000
|
stack
|
page read and write
|
||
2BAC2C29000
|
trusted library allocation
|
page read and write
|
||
2BAC318B000
|
trusted library allocation
|
page read and write
|
||
EA286FF000
|
stack
|
page read and write
|
||
7FFD3482C000
|
trusted library allocation
|
page execute and read and write
|
||
536000
|
heap
|
page read and write
|
||
7FFD34773000
|
trusted library allocation
|
page execute and read and write
|
||
2BAC05CF000
|
heap
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
AC5000
|
heap
|
page read and write
|
||
2DD1000
|
trusted library allocation
|
page read and write
|
||
1B120000
|
heap
|
page execute and read and write
|
||
2BADA8B3000
|
heap
|
page read and write
|
||
C03000
|
trusted library allocation
|
page read and write
|
||
2BAC05D3000
|
heap
|
page read and write
|
||
2BAC2F99000
|
trusted library allocation
|
page read and write
|
||
C685209000
|
stack
|
page read and write
|
||
2B277D7E000
|
heap
|
page read and write
|
||
7FFD34772000
|
trusted library allocation
|
page read and write
|
||
7FFD34B60000
|
trusted library allocation
|
page read and write
|
||
D85000
|
heap
|
page read and write
|
||
7FFD34900000
|
trusted library allocation
|
page read and write
|
||
2BAC2CEA000
|
trusted library allocation
|
page read and write
|
||
29B0000
|
heap
|
page execute and read and write
|
||
1D0000
|
unkown
|
page readonly
|
||
7FFD34760000
|
trusted library allocation
|
page read and write
|
||
2B2759F8000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
7FFD34930000
|
trusted library allocation
|
page read and write
|
||
1C95F657000
|
trusted library allocation
|
page read and write
|
||
7FFD34BD0000
|
trusted library allocation
|
page read and write
|
||
1AC1D000
|
stack
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
7FFD34846000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347BD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34990000
|
trusted library allocation
|
page execute and read and write
|
||
1C950366000
|
trusted library allocation
|
page read and write
|
||
2B277C30000
|
heap
|
page read and write
|
||
2B21048B000
|
trusted library allocation
|
page read and write
|
||
7FFD34790000
|
trusted library allocation
|
page read and write
|
||
7FF4A8890000
|
trusted library allocation
|
page execute and read and write
|
||
2BADA544000
|
heap
|
page read and write
|
||
7FFD34951000
|
trusted library allocation
|
page read and write
|
||
7FFD3492A000
|
trusted library allocation
|
page read and write
|
||
7DF4B0400000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34820000
|
trusted library allocation
|
page read and write
|
||
7FFD347CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3485C000
|
trusted library allocation
|
page execute and read and write
|
||
2BADA5AC000
|
heap
|
page read and write
|
||
2B275C70000
|
heap
|
page readonly
|
||
1B8C8000
|
heap
|
page read and write
|
||
7FFD34A10000
|
trusted library allocation
|
page read and write
|
||
2BAC1F40000
|
trusted library allocation
|
page read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
2B277BAE000
|
heap
|
page read and write
|
||
C68473C000
|
stack
|
page read and write
|
||
1C950BC6000
|
trusted library allocation
|
page read and write
|
||
1C9500D1000
|
trusted library allocation
|
page read and write
|
||
1B877000
|
heap
|
page read and write
|
||
2B2759C0000
|
heap
|
page read and write
|
||
2840000
|
heap
|
page read and write
|
||
1C967B1B000
|
heap
|
page read and write
|
||
4F4000
|
stack
|
page read and write
|
||
7FFD349B0000
|
trusted library allocation
|
page read and write
|
||
7FFD349F0000
|
trusted library allocation
|
page read and write
|
||
2BADA752000
|
heap
|
page read and write
|
||
7FFD34AE0000
|
trusted library allocation
|
page read and write
|
||
7FFD34A80000
|
trusted library allocation
|
page read and write
|
||
7FFD347A4000
|
trusted library allocation
|
page read and write
|
||
7FFD34970000
|
trusted library allocation
|
page read and write
|
||
2B201784000
|
trusted library allocation
|
page read and write
|
||
1C967B91000
|
heap
|
page read and write
|
||
7DF4CD9E0000
|
trusted library allocation
|
page execute and read and write
|
||
8CE000
|
stack
|
page read and write
|
||
1B28F000
|
stack
|
page read and write
|
||
1C950AE1000
|
trusted library allocation
|
page read and write
|
||
2691000
|
trusted library allocation
|
page read and write
|
||
1C9678AA000
|
heap
|
page read and write
|
||
2BAD2318000
|
trusted library allocation
|
page read and write
|
||
1B2BE000
|
stack
|
page read and write
|
||
7FFD34AD3000
|
trusted library allocation
|
page read and write
|
||
7DF4DBE00000
|
trusted library allocation
|
page execute and read and write
|
||
2BAC2031000
|
trusted library allocation
|
page read and write
|
||
C68463D000
|
stack
|
page read and write
|
||
7FFD34820000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD347A0000
|
trusted library allocation
|
page read and write
|
||
1C94D7E0000
|
heap
|
page read and write
|
||
7FFD34B53000
|
trusted library allocation
|
page read and write
|
||
2B210001000
|
trusted library allocation
|
page read and write
|
||
43800E2000
|
stack
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page read and write
|
||
2BADA710000
|
heap
|
page read and write
|
||
7FFD34942000
|
trusted library allocation
|
page read and write
|
There are 862 hidden memdumps, click here to show them.