IOC Report
BoostFPS.exe

loading gif

Files

File Path
Type
Category
Malicious
BoostFPS.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\BoostFPS.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Roaming\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ggvwb5x.uqe.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2zkytvg1.nif.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eme0efz3.pd2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_enlihd5y.irv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gml4olhe.zxi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_huopx33y.r1e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iif5qvo5.czu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ke5jdrkb.hft.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mom512g0.reg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mu0ndttj.kcj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qicgx3xx.vhs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vfqerpcf.nnq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wn1jbp2n.b3z.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wzm31iqy.54h.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xhxc2g0f.nd2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ysmqhlt4.gvc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\FPS_BY FILMGODX.bat
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Nov 20 08:37:03 2024, mtime=Wed Nov 20 08:37:03 2024, atime=Wed Nov 20 08:37:03 2024, length=78848, window=hide
dropped
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\BoostFPS.exe
"C:\Users\user\Desktop\BoostFPS.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
C:\Users\user\AppData\Roaming\svchost.exe
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
C:\Users\user\AppData\Roaming\svchost.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\FPS_BY FILMGODX.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\mode.com
Mode 100,25
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "prompt #$H#$E# & echo on & for %b in (1) do rem"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 11 hidden processes, click here to show them.

URLs

Name
IP
Malicious
45.141.27.248
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://www.micom/pkiops/Docs/ry.htm0
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://wwwft.com/pkiops/crProPCA2011_2011-l0a
unknown
https://go.microsoft.co_
unknown
https://Token.dll
unknown
http://www.microsoft.
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://wwoft.com/pkiops/c
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
45.141.27.248
unknown
Netherlands
malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
svchost

Memdumps

Base Address
Regiontype
Protect
Malicious
25A1000
trusted library allocation
page read and write
malicious
1A2000
unkown
page readonly
malicious
24E1000
trusted library allocation
page read and write
malicious
25EC000
trusted library allocation
page read and write
malicious
3F3C94C000
stack
page read and write
21BD84CB000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
21BD8076000
heap
page read and write
2242F613000
trusted library allocation
page read and write
60B000
heap
page read and write
EBD000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
1C1FE000
stack
page read and write
1BFFE000
stack
page read and write
1DBDE7C0000
heap
page readonly
270602ED000
trusted library allocation
page read and write
2706F582000
trusted library allocation
page read and write
1DBE115C000
trusted library allocation
page read and write
7FF848CAD000
trusted library allocation
page execute and read and write
2243E563000
trusted library allocation
page read and write
1DBE13D0000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
5D0000
trusted library allocation
page read and write
7FF848E50000
trusted library allocation
page execute and read and write
7FF848D36000
trusted library allocation
page read and write
6BA000
heap
page read and write
648000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
E2B000
heap
page read and write
7FF848C60000
trusted library allocation
page read and write
C02000
heap
page read and write
1AF02000
heap
page execute and read and write
7FF848C83000
trusted library allocation
page execute and read and write
BC0000
heap
page execute and read and write
2CC1000
trusted library allocation
page read and write
1DCFD000
stack
page read and write
7FF848C90000
trusted library allocation
page read and write
21BC1A63000
trusted library allocation
page read and write
1DBE11B7000
trusted library allocation
page read and write
2707788D000
heap
page read and write
7F0000
heap
page read and write
70A000
heap
page read and write
2706F81A000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
7FF848D10000
trusted library allocation
page read and write
1B150000
heap
page read and write
224468F0000
heap
page execute and read and write
5F0000
heap
page execute and read and write
6AE000
heap
page read and write
22446925000
heap
page read and write
1DBF8A80000
heap
page read and write
125A1000
trusted library allocation
page read and write
97993CE000
stack
page read and write
2242C900000
trusted library allocation
page read and write
270606EC000
trusted library allocation
page read and write
7FF848E1A000
trusted library allocation
page read and write
7FF848E32000
trusted library allocation
page read and write
843000
heap
page read and write
22446B00000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
22446B35000
heap
page read and write
12BC000
heap
page read and write
2243E501000
trusted library allocation
page read and write
1C6D3000
heap
page read and write
600000
trusted library allocation
page read and write
7DF488060000
trusted library allocation
page execute and read and write
7FF848D40000
trusted library allocation
page read and write
1C6E9000
heap
page read and write
7FF848C93000
trusted library allocation
page execute and read and write
2705D9CD000
heap
page read and write
7FF848D3C000
trusted library allocation
page execute and read and write
2678000
trusted library allocation
page read and write
7FF848CDC000
trusted library allocation
page execute and read and write
2623000
trusted library allocation
page read and write
1B5AE000
stack
page read and write
12603000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page execute and read and write
2705D978000
heap
page read and write
21BCFC71000
trusted library allocation
page read and write
270779E0000
heap
page execute and read and write
27060540000
trusted library allocation
page read and write
21BBE110000
trusted library section
page read and write
2242F0EC000
trusted library allocation
page read and write
7FF848C72000
trusted library allocation
page read and write
7FF848CA0000
trusted library allocation
page read and write
7FF8490D8000
trusted library allocation
page read and write
1202000
heap
page read and write
2706F7E6000
trusted library allocation
page read and write
1DBDE840000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page read and write
24E0000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
B8367F9000
stack
page read and write
7FF848E58000
trusted library allocation
page read and write
1C0000
heap
page read and write
23BE4930000
heap
page read and write
180000
heap
page read and write
1B6000
unkown
page readonly
2243E7E1000
trusted library allocation
page read and write
7FF848C6D000
trusted library allocation
page execute and read and write
1160000
heap
page read and write
1DBE2014000
trusted library allocation
page read and write
1DBF8ACD000
heap
page read and write
21BBDF03000
heap
page read and write
1DBDE870000
heap
page read and write
1C3FE000
stack
page read and write
990000
heap
page read and write
902000
heap
page read and write
125B2000
trusted library allocation
page read and write
1DBE1317000
trusted library allocation
page read and write
7FF849083000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
131A8000
trusted library allocation
page read and write
2242C8E0000
trusted library allocation
page read and write
1B54F000
stack
page read and write
125A000
heap
page read and write
7FF848C6D000
trusted library allocation
page execute and read and write
1ADF0000
heap
page execute and read and write
7FF848C74000
trusted library allocation
page read and write
3F3BEFB000
stack
page read and write
1C61B000
heap
page read and write
7FF848E20000
trusted library allocation
page execute and read and write
1B990000
heap
page execute and read and write
2705DAC0000
trusted library section
page read and write
C16000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
22446C48000
heap
page read and write
979827F000
stack
page read and write
7FF848D16000
trusted library allocation
page read and write
21BBDF09000
heap
page read and write
7FF848FC8000
trusted library allocation
page read and write
2243E7FA000
trusted library allocation
page read and write
21BBDEC8000
heap
page read and write
1DBDE610000
heap
page read and write
2705F500000
heap
page execute and read and write
6F1000
stack
page read and write
1DBE01E5000
heap
page read and write
1DBE0DDC000
trusted library allocation
page read and write
2705F511000
trusted library allocation
page read and write
1180000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
2242F491000
trusted library allocation
page read and write
3DF6A3C000
stack
page read and write
7FF848D10000
trusted library allocation
page execute and read and write
7FF8490C0000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
2242C760000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
12CB3000
trusted library allocation
page read and write
2242F0F0000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
21BBDF44000
heap
page read and write
3DF647F000
stack
page read and write
9DE000
stack
page read and write
800000
heap
page read and write
3F3B979000
stack
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
83E000
stack
page read and write
7FF848F00000
trusted library allocation
page read and write
7FF848E50000
trusted library allocation
page execute and read and write
7FF848CDC000
trusted library allocation
page execute and read and write
124E1000
trusted library allocation
page read and write
1DBF0211000
trusted library allocation
page read and write
B836B3E000
stack
page read and write
2705D9F3000
heap
page read and write
2242C963000
heap
page read and write
170E000
stack
page read and write
17FE000
stack
page read and write
550000
heap
page read and write
7FF848FCC000
trusted library allocation
page read and write
21BC146A000
trusted library allocation
page read and write
2706F914000
trusted library allocation
page read and write
2242F37B000
trusted library allocation
page read and write
224E9E70000
heap
page read and write
2242C9A4000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
3DF65F7000
stack
page read and write
1B8FF000
stack
page read and write
21BC09B3000
trusted library allocation
page read and write
2BA0000
heap
page execute and read and write
3DF667D000
stack
page read and write
3DF60C3000
stack
page read and write
23BE4930000
heap
page read and write
1C5FE000
stack
page read and write
1222000
heap
page read and write
27077850000
heap
page read and write
1DBF867A000
heap
page read and write
7FF8490A7000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page read and write
1DBF0221000
trusted library allocation
page read and write
1BAFF000
stack
page read and write
7FF848D4C000
trusted library allocation
page execute and read and write
7FF848CA0000
trusted library allocation
page read and write
5E0000
trusted library allocation
page read and write
23BE4900000
heap
page read and write
2242E4E5000
heap
page read and write
7FF848E1A000
trusted library allocation
page read and write
E39000
heap
page read and write
21BBFC30000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
12C2000
heap
page read and write
21BBE160000
heap
page readonly
1DBDE875000
heap
page read and write
21BBFCBB000
trusted library allocation
page read and write
1DBF8816000
heap
page execute and read and write
7FF848C80000
trusted library allocation
page read and write
22446C22000
heap
page read and write
27060634000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
1DBE1158000
trusted library allocation
page read and write
142587F000
stack
page read and write
2242F740000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page execute and read and write
27077C20000
heap
page read and write
2242F798000
trusted library allocation
page read and write
7FF848DF2000
trusted library allocation
page read and write
7FF848D30000
trusted library allocation
page execute and read and write
1F0000
heap
page read and write
27077CBC000
heap
page read and write
E78000
heap
page read and write
7FF848D40000
trusted library allocation
page execute and read and write
21BBDED2000
heap
page read and write
600000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
1C6E7000
heap
page read and write
21BD8513000
heap
page read and write
DF0000
heap
page read and write
7DF4A0F50000
trusted library allocation
page execute and read and write
2242C910000
heap
page readonly
1DBE12B4000
trusted library allocation
page read and write
1DBF873C000
heap
page read and write
21BC14D0000
trusted library allocation
page read and write
2619000
trusted library allocation
page read and write
2705DB30000
trusted library allocation
page read and write
3F3B5FE000
stack
page read and write
3DF67B7000
stack
page read and write
7FF849060000
trusted library allocation
page read and write
7FF848E48000
trusted library allocation
page read and write
1B04D000
stack
page read and write
7FF848C60000
trusted library allocation
page read and write
3DF7609000
stack
page read and write
2706F541000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
22446C42000
heap
page read and write
1D78B000
stack
page read and write
7FF848F40000
trusted library allocation
page read and write
2663000
trusted library allocation
page read and write
1DBE0F6F000
trusted library allocation
page read and write
1DBE1409000
trusted library allocation
page read and write
1DBF8BEB000
heap
page read and write
1AD60000
heap
page execute and read and write
21BC0C0B000
trusted library allocation
page read and write
7FF848FC3000
trusted library allocation
page read and write
7FF848C9D000
trusted library allocation
page execute and read and write
1AA6D000
stack
page read and write
7FF848E22000
trusted library allocation
page read and write
21BC0C71000
trusted library allocation
page read and write
1DBDE510000
heap
page read and write
C00000
heap
page read and write
7FF84907C000
trusted library allocation
page read and write
1DBDE6B8000
heap
page read and write
B8364FE000
stack
page read and write
2242F4F5000
trusted library allocation
page read and write
3F3B533000
stack
page read and write
7FF848CEC000
trusted library allocation
page execute and read and write
2242C9A6000
heap
page read and write
27060766000
trusted library allocation
page read and write
EBA000
heap
page read and write
22446948000
heap
page read and write
1DBF01F1000
trusted library allocation
page read and write
E52000
heap
page read and write
7FF848E40000
trusted library allocation
page execute and read and write
2242F7F9000
trusted library allocation
page read and write
83E000
heap
page read and write
1A5D0000
trusted library allocation
page read and write
1DBE1227000
trusted library allocation
page read and write
27077B40000
trusted library allocation
page read and write
2705DB00000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page read and write
22446C02000
heap
page read and write
6AA000
heap
page read and write
B836ABE000
stack
page read and write
B70000
heap
page read and write
702000
heap
page read and write
2E5C000
trusted library allocation
page read and write
1D88A000
stack
page read and write
613000
heap
page read and write
1C6D0000
heap
page read and write
1DBE0120000
heap
page execute and read and write
1302000
heap
page read and write
1A3F000
stack
page read and write
7FF848CA0000
trusted library allocation
page read and write
2706F802000
trusted library allocation
page read and write
22446A20000
heap
page read and write
21BCFF2B000
trusted library allocation
page read and write
21BC0CD5000
trusted library allocation
page read and write
E45000
heap
page read and write
1C2FF000
stack
page read and write
24F0000
heap
page execute and read and write
1DBF8AE5000
heap
page read and write
23BE4944000
heap
page read and write
1DBDE650000
heap
page read and write
21BBDF1D000
heap
page read and write
27061334000
trusted library allocation
page read and write
E13000
heap
page read and write
1DBF8B5E000
heap
page read and write
7FF8490ED000
trusted library allocation
page read and write
7FF848E50000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page execute and read and write
23BE4941000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
7FF848D70000
trusted library allocation
page execute and read and write
21BD83A0000
heap
page read and write
1DBE15BC000
trusted library allocation
page read and write
7FF8490E6000
trusted library allocation
page read and write
1DBE0DEC000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
7FF848C90000
trusted library allocation
page read and write
1DBF8840000
heap
page read and write
21BD850B000
heap
page read and write
16E0000
heap
page read and write
2625000
trusted library allocation
page read and write
23BE4BA5000
heap
page read and write
7FF848D20000
trusted library allocation
page read and write
31A1000
trusted library allocation
page read and write
1CC3D000
stack
page read and write
7FF848C73000
trusted library allocation
page execute and read and write
24B0000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page read and write
27077A55000
heap
page read and write
1B156000
heap
page read and write
1C4FF000
stack
page read and write
63D000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
2242C9A9000
heap
page read and write
7FF848C54000
trusted library allocation
page read and write
2705DAE0000
trusted library allocation
page read and write
9A0000
heap
page read and write
21BC0D33000
trusted library allocation
page read and write
21BD7F80000
heap
page read and write
3FE02FB000
stack
page read and write
7FF848D76000
trusted library allocation
page execute and read and write
7FF848E12000
trusted library allocation
page read and write
23BE4941000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
1DBE1154000
trusted library allocation
page read and write
2705D970000
heap
page read and write
23BE4941000
heap
page read and write
7FF848E90000
trusted library allocation
page read and write
7FF848C6D000
trusted library allocation
page execute and read and write
7FF848F6F000
trusted library allocation
page read and write
1C600000
heap
page read and write
7FF848C83000
trusted library allocation
page execute and read and write
7FF848F20000
trusted library allocation
page read and write
1DBDE6F6000
heap
page read and write
1DBDE6FA000
heap
page read and write
7FF848F10000
trusted library allocation
page read and write
2CB1000
trusted library allocation
page read and write
7FF848C80000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
190E000
stack
page read and write
2242C920000
heap
page read and write
224EA0F0000
heap
page read and write
7FF849052000
trusted library allocation
page read and write
21BC0F1C000
trusted library allocation
page read and write
23BE4944000
heap
page read and write
7FF848D1C000
trusted library allocation
page execute and read and write
7FF848E00000
trusted library allocation
page read and write
1C0000
heap
page read and write
21BC0C45000
trusted library allocation
page read and write
7FF848E41000
trusted library allocation
page read and write
21BC0DA0000
trusted library allocation
page read and write
3F3B9FE000
stack
page read and write
7FF848E30000
trusted library allocation
page execute and read and write
7FF848FCA000
trusted library allocation
page read and write
5D0000
heap
page read and write
7FF848CA4000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
B83778C000
stack
page read and write
652000
heap
page read and write
73DC7F9000
stack
page read and write
21BC1591000
trusted library allocation
page read and write
9B0000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
7FF848E2A000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
1DBF8B70000
heap
page read and write
270608DB000
trusted library allocation
page read and write
613000
heap
page read and write
1DBE0DF4000
trusted library allocation
page read and write
1DBF8B89000
heap
page read and write
5E0000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
131A1000
trusted library allocation
page read and write
2244696B000
heap
page read and write
21BD83B0000
heap
page read and write
7FF8490C6000
trusted library allocation
page read and write
1ADD0000
trusted library allocation
page read and write
7FF848C84000
trusted library allocation
page read and write
7FF848FC4000
trusted library allocation
page read and write
21BC13C4000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page execute and read and write
7FF848C70000
trusted library allocation
page read and write
7FF848D16000
trusted library allocation
page read and write
E2D000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
128E000
stack
page read and write
1DBF8B98000
heap
page read and write
7FF848C84000
trusted library allocation
page read and write
640000
heap
page read and write
2242FD80000
trusted library allocation
page read and write
3F3BDFE000
stack
page read and write
7FF848E30000
trusted library allocation
page read and write
264B000
trusted library allocation
page read and write
1DBF8676000
heap
page read and write
3F3BD7F000
stack
page read and write
7FF848DB0000
trusted library allocation
page execute and read and write
7FF849090000
trusted library allocation
page read and write
693000
heap
page read and write
2706028A000
trusted library allocation
page read and write
7DF4A7830000
trusted library allocation
page execute and read and write
27060C95000
trusted library allocation
page read and write
979837D000
stack
page read and write
7FF848EB0000
trusted library allocation
page read and write
1B161000
heap
page read and write
1E3A22B6000
heap
page read and write
1DBF8BCC000
heap
page read and write
97983F9000
stack
page read and write
7FF848D30000
trusted library allocation
page read and write
224469B9000
heap
page read and write
1AE02000
heap
page read and write
12608000
trusted library allocation
page read and write
27060281000
trusted library allocation
page read and write
2242CA20000
trusted library allocation
page read and write
1DBE01B0000
heap
page read and write
7FF848C63000
trusted library allocation
page execute and read and write
7FF848D36000
trusted library allocation
page execute and read and write
D2000
unkown
page readonly
23BE4BB0000
heap
page read and write
7FF8490CD000
trusted library allocation
page read and write
622000
heap
page read and write
21BBE0B0000
heap
page read and write
7FF848E30000
trusted library allocation
page execute and read and write
1DBDE684000
heap
page read and write
2707787A000
heap
page read and write
21BBDF46000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
27077BBE000
heap
page read and write
1251000
heap
page read and write
23BE4941000
heap
page read and write
1255000
heap
page read and write
3F3CBCE000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
3DF6ABE000
stack
page read and write
7FF848E80000
trusted library allocation
page read and write
224EA0F5000
heap
page read and write
674000
heap
page read and write
22446C2D000
heap
page read and write
21BBDEFD000
heap
page read and write
8C6000
heap
page read and write
1DBE1165000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
27077CD7000
heap
page read and write
7FF848C92000
trusted library allocation
page read and write
7FF848E54000
trusted library allocation
page read and write
22446991000
heap
page read and write
1DBF8B07000
heap
page read and write
7FF848C94000
trusted library allocation
page read and write
1DBF8711000
heap
page read and write
23D0000
heap
page read and write
B83677D000
stack
page read and write
B8366F7000
stack
page read and write
23BE4941000
heap
page read and write
3DF6B3C000
stack
page read and write
1DBE149C000
trusted library allocation
page read and write
1C688000
heap
page read and write
66A000
heap
page read and write
27060514000
trusted library allocation
page read and write
27077ED0000
heap
page read and write
2612000
trusted library allocation
page read and write
2705DB20000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
1C64F000
heap
page read and write
4F4000
stack
page read and write
7FF848F93000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
682000
heap
page read and write
2E51000
trusted library allocation
page read and write
7FF848C93000
trusted library allocation
page read and write
27077893000
heap
page read and write
A3AA71C000
stack
page read and write
2242E56A000
trusted library allocation
page read and write
97982F7000
stack
page read and write
2705DAD0000
trusted library section
page read and write
1DBE2019000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
7FF848D46000
trusted library allocation
page read and write
1B34F000
stack
page read and write
CFF000
stack
page read and write
7FF848D46000
trusted library allocation
page execute and read and write
626000
heap
page read and write
21BC0692000
trusted library allocation
page read and write
8B8000
heap
page read and write
3DF750E000
stack
page read and write
B8368B7000
stack
page read and write
125A8000
trusted library allocation
page read and write
224469F5000
heap
page read and write
22430318000
trusted library allocation
page read and write
7FF848DA0000
trusted library allocation
page execute and read and write
6FE000
heap
page read and write
14255DD000
stack
page read and write
1DBDE6AE000
heap
page read and write
25572B08000
heap
page read and write
7FF848C84000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
880000
heap
page execute and read and write
2242F585000
trusted library allocation
page read and write
651000
heap
page read and write
7FF848E80000
trusted library allocation
page read and write
2243E4F1000
trusted library allocation
page read and write
1AE02000
heap
page read and write
3DF6838000
stack
page read and write
124E3000
trusted library allocation
page read and write
C13000
heap
page read and write
1DBF86B6000
heap
page read and write
1DBF8BAF000
heap
page read and write
1DBDE6CE000
heap
page read and write
7FF848E4A000
trusted library allocation
page read and write
9FE000
stack
page read and write
1DBF81F6000
heap
page read and write
1DBE1A5B000
trusted library allocation
page read and write
7FF848DB0000
trusted library allocation
page execute and read and write
B83657F000
stack
page read and write
7FF848F30000
trusted library allocation
page read and write
1DBE06BE000
trusted library allocation
page read and write
A02000
heap
page read and write
27077B87000
heap
page read and write
1DBF0263000
trusted library allocation
page read and write
82D000
heap
page read and write
1DBE0277000
trusted library allocation
page read and write
27077C0C000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
22430313000
trusted library allocation
page read and write
21BD8467000
heap
page read and write
E11000
heap
page read and write
1E3A2260000
heap
page read and write
23BE4943000
heap
page read and write
2242C860000
heap
page read and write
7FF848C8D000
trusted library allocation
page execute and read and write
1BCFE000
stack
page read and write
3DF61CE000
stack
page read and write
12E51000
trusted library allocation
page read and write
1DBF8B18000
heap
page read and write
2242FE41000
trusted library allocation
page read and write
7FF848C94000
trusted library allocation
page read and write
E3F000
heap
page read and write
270779E7000
heap
page execute and read and write
1B12D000
stack
page read and write
7FF848FCC000
trusted library allocation
page read and write
23BE4941000
heap
page read and write
530000
heap
page read and write
7FF848E22000
trusted library allocation
page read and write
7FF848FE9000
trusted library allocation
page read and write
7FF848FB4000
trusted library allocation
page read and write
7DF4A7840000
trusted library allocation
page execute and read and write
1AF4E000
stack
page read and write
2242F64E000
trusted library allocation
page read and write
27060820000
trusted library allocation
page read and write
2242FD1A000
trusted library allocation
page read and write
12CB1000
trusted library allocation
page read and write
1AA1C000
stack
page read and write
15CF000
stack
page read and write
677000
heap
page read and write
A3AA79F000
stack
page read and write
270778BD000
heap
page read and write
7FF848FD2000
trusted library allocation
page read and write
21BBDF49000
heap
page read and write
142555E000
stack
page read and write
2601000
trusted library allocation
page read and write
22446C4C000
heap
page read and write
7FF848C9D000
trusted library allocation
page execute and read and write
21BC0F4E000
trusted library allocation
page read and write
7FF848C90000
trusted library allocation
page read and write
979867E000
stack
page read and write
A3AAA7F000
stack
page read and write
270612EF000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
21BD83CD000
heap
page read and write
1C6D9000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
5B0000
trusted library allocation
page read and write
7DF4A88C0000
trusted library allocation
page execute and read and write
BE3000
trusted library allocation
page read and write
2706F799000
trusted library allocation
page read and write
6D2000
heap
page read and write
1B44E000
stack
page read and write
7FF8490A0000
trusted library allocation
page read and write
27077B9F000
heap
page read and write
1DBE1A81000
trusted library allocation
page read and write
73DCA7F000
unkown
page read and write
7FF848E32000
trusted library allocation
page read and write
4F1000
stack
page read and write
2706F80A000
trusted library allocation
page read and write
69B000
heap
page read and write
3F3C9CA000
stack
page read and write
1A0000
unkown
page readonly
B83780E000
stack
page read and write
1C690000
heap
page read and write
21BD8448000
heap
page read and write
BCE000
stack
page read and write
7FF848C64000
trusted library allocation
page read and write
3F3B5BE000
stack
page read and write
7FF848F40000
trusted library allocation
page read and write
BE0000
trusted library allocation
page read and write
22446B2A000
heap
page read and write
B83647E000
stack
page read and write
7FF848F50000
trusted library allocation
page read and write
7FF848FDC000
trusted library allocation
page read and write
1D48E000
stack
page read and write
7FF848F00000
trusted library allocation
page read and write
2706F800000
trusted library allocation
page read and write
21BD80A6000
heap
page execute and read and write
25572930000
heap
page read and write
7FF848D66000
trusted library allocation
page execute and read and write
2705DB60000
trusted library allocation
page read and write
1DBE1500000
trusted library allocation
page read and write
25572D75000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
2242C840000
heap
page read and write
7FF848E50000
trusted library allocation
page execute and read and write
21BBFE68000
trusted library allocation
page read and write
2706F7FB000
trusted library allocation
page read and write
27077C77000
heap
page read and write
7FF848FD8000
trusted library allocation
page read and write
23BE4870000
heap
page read and write
21BBE0F0000
heap
page read and write
B836BBB000
stack
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
1D38C000
stack
page read and write
7FF848C80000
trusted library allocation
page read and write
7FF848CCC000
trusted library allocation
page execute and read and write
21BBE1C0000
heap
page read and write
B837709000
stack
page read and write
7FF848E72000
trusted library allocation
page read and write
3DF614E000
stack
page read and write
27077B93000
heap
page read and write
270605CF000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
2CBF000
trusted library allocation
page read and write
7FF848FF8000
trusted library allocation
page read and write
21BBFA30000
heap
page execute and read and write
12601000
trusted library allocation
page read and write
B8369BB000
stack
page read and write
7FF848E48000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page execute and read and write
7FF848EC0000
trusted library allocation
page read and write
7FF848D00000
trusted library allocation
page read and write
1DBE01F1000
trusted library allocation
page read and write
7FF848E12000
trusted library allocation
page read and write
7FF848D56000
trusted library allocation
page execute and read and write
24DE000
stack
page read and write
1DBF04E2000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page read and write
2243E7EA000
trusted library allocation
page read and write
570000
heap
page read and write
12BE000
heap
page read and write
23BE4941000
heap
page read and write
8FF000
stack
page read and write
639000
heap
page read and write
7FF848D40000
trusted library allocation
page execute and read and write
9798578000
stack
page read and write
1225000
heap
page read and write
1DBF8AC1000
heap
page read and write
7FF848E60000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
1E3A22B9000
heap
page read and write
21BD83C3000
heap
page read and write
7FF84905C000
trusted library allocation
page read and write
11FF000
stack
page read and write
7FF848D76000
trusted library allocation
page execute and read and write
21BBF9A0000
trusted library allocation
page read and write
21BD84EE000
heap
page read and write
21BC14A9000
trusted library allocation
page read and write
1BA02000
heap
page read and write
1AA7D000
stack
page read and write
BD0000
heap
page read and write
97992C9000
stack
page read and write
97980FE000
stack
page read and write
7FF848F60000
trusted library allocation
page read and write
7FF848D90000
trusted library allocation
page execute and read and write
7FF848CB0000
trusted library allocation
page read and write
7FF848E11000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page read and write
7FF848EE0000
trusted library allocation
page read and write
1DBDE5F0000
heap
page read and write
7FF49AB90000
trusted library allocation
page execute and read and write
2242C928000
heap
page read and write
7FF848E90000
trusted library allocation
page read and write
970000
heap
page read and write
270778DB000
heap
page read and write
1C6FF000
stack
page read and write
7FF848FB9000
trusted library allocation
page read and write
1E3A21E0000
heap
page read and write
7FF848E42000
trusted library allocation
page read and write
7FF848CB0000
trusted library allocation
page read and write
7FF848CEC000
trusted library allocation
page execute and read and write
1DBDE6B2000
heap
page read and write
1288000
heap
page read and write
23BE4941000
heap
page read and write
813000
heap
page read and write
3F3CAC9000
stack
page read and write
7FF848C83000
trusted library allocation
page execute and read and write
1DBF04E0000
trusted library allocation
page read and write
21BD80D0000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
21BD84FB000
heap
page read and write
7FF848C8B000
trusted library allocation
page read and write
21BCFF32000
trusted library allocation
page read and write
2CAE000
stack
page read and write
1D08A000
stack
page read and write
7FF8490AB000
trusted library allocation
page read and write
7FF848C53000
trusted library allocation
page execute and read and write
7FF848C90000
trusted library allocation
page read and write
3DF64F9000
stack
page read and write
2706F531000
trusted library allocation
page read and write
1B4A0000
heap
page execute and read and write
7FF8490B7000
trusted library allocation
page read and write
2242C8D0000
trusted library section
page read and write
7FF848C92000
trusted library allocation
page read and write
1B61D000
stack
page read and write
2242F264000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page read and write
2617000
trusted library allocation
page read and write
21BBFC00000
heap
page execute and read and write
7FF848FD0000
trusted library allocation
page read and write
21BD84E9000
heap
page read and write
22446C44000
heap
page read and write
21BBFA50000
heap
page read and write
21BD7FF4000
heap
page read and write
560000
heap
page read and write
D02000
heap
page read and write
2242CB40000
heap
page read and write
7FF848D40000
trusted library allocation
page read and write
2705DBF0000
heap
page read and write
7FF848E70000
trusted library allocation
page read and write
3F3CA47000
stack
page read and write
21BC1A68000
trusted library allocation
page read and write
2242C8A0000
heap
page read and write
21BBFA64000
heap
page read and write
224E9E50000
heap
page read and write
7FF848E70000
trusted library allocation
page read and write
2705DB90000
trusted library allocation
page read and write
2706089D000
trusted library allocation
page read and write
7FF848F93000
trusted library allocation
page read and write
27060C48000
trusted library allocation
page read and write
7FF848FC5000
trusted library allocation
page read and write
3F3BBF7000
stack
page read and write
224468F6000
heap
page execute and read and write
7FF848C94000
trusted library allocation
page read and write
1CA3E000
stack
page read and write
7FF849110000
trusted library allocation
page read and write
23BE4941000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
E41000
heap
page read and write
7FF848CAB000
trusted library allocation
page read and write
1DBE1976000
trusted library allocation
page read and write
224302F3000
trusted library allocation
page read and write
2705DBF5000
heap
page read and write
1C702000
heap
page read and write
25572A10000
heap
page read and write
1B602000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
B60000
heap
page execute and read and write
2705DAA0000
heap
page read and write
1DBE0C44000
trusted library allocation
page read and write
1190000
heap
page read and write
7FF848C93000
trusted library allocation
page execute and read and write
25572A30000
heap
page read and write
1CF85000
stack
page read and write
67F000
heap
page read and write
1302000
heap
page read and write
7FF848DA0000
trusted library allocation
page execute and read and write
7FF848C7D000
trusted library allocation
page execute and read and write
7FF848CBC000
trusted library allocation
page execute and read and write
AFF000
stack
page read and write
27060E04000
trusted library allocation
page read and write
7FF848FB9000
trusted library allocation
page read and write
27060950000
trusted library allocation
page read and write
7FF848C8D000
trusted library allocation
page execute and read and write
2651000
trusted library allocation
page read and write
1D68A000
stack
page read and write
21BC1009000
trusted library allocation
page read and write
1DBE0190000
trusted library allocation
page read and write
2242C96B000
heap
page read and write
7FF848EE0000
trusted library allocation
page read and write
2242C97D000
heap
page read and write
2706F511000
trusted library allocation
page read and write
1DBE1169000
trusted library allocation
page read and write
62D000
heap
page read and write
1E3A2100000
heap
page read and write
8BC000
heap
page read and write
21BD8515000
heap
page read and write
1BEFE000
stack
page read and write
7FF848EA0000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page execute and read and write
7FF849100000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
6AE000
heap
page read and write
7FF848C64000
trusted library allocation
page read and write
640000
heap
page read and write
2705D940000
heap
page read and write
1DBE1B43000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page read and write
7FF848C9D000
trusted library allocation
page execute and read and write
27061314000
trusted library allocation
page read and write
21BBE130000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
23BE490B000
heap
page read and write
27077B70000
heap
page read and write
260E000
trusted library allocation
page read and write
131A3000
trusted library allocation
page read and write
2705F597000
trusted library allocation
page read and write
27077B83000
heap
page read and write
2242CB10000
heap
page execute and read and write
2242C967000
heap
page read and write
7FF8490DF000
trusted library allocation
page read and write
7FF848C63000
trusted library allocation
page execute and read and write
2242CA90000
trusted library allocation
page read and write
7FF848D26000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
125AE000
trusted library allocation
page read and write
1DBF04DC000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
3DF657E000
stack
page read and write
7FF848D20000
trusted library allocation
page read and write
1DBE0DEA000
trusted library allocation
page read and write
21BCFF3A000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
1DBF8810000
heap
page execute and read and write
979914F000
stack
page read and write
3F3BA7B000
stack
page read and write
11A0000
heap
page read and write
7FF848E42000
trusted library allocation
page read and write
3F3BC78000
stack
page read and write
2705D860000
heap
page read and write
21BD8506000
heap
page read and write
1B14E000
stack
page read and write
1C6D5000
heap
page read and write
27077CD0000
heap
page read and write
27077C28000
heap
page read and write
22446900000
heap
page read and write
2242E311000
heap
page read and write
16CE000
stack
page read and write
21BBE170000
trusted library allocation
page read and write
27077C94000
heap
page read and write
21BC0E1C000
trusted library allocation
page read and write
B8361D3000
stack
page read and write
7FF848E80000
trusted library allocation
page read and write
B80000
heap
page execute and read and write
1DBDE6BA000
heap
page read and write
839000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
7FF848E60000
trusted library allocation
page read and write
C02000
heap
page read and write
21BCFF4A000
trusted library allocation
page read and write
31AC000
trusted library allocation
page read and write
23BE4860000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
21BBFC41000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
22446945000
heap
page read and write
1DBE116D000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page execute and read and write
7FF849010000
trusted library allocation
page read and write
21BD8078000
heap
page read and write
7FF848FE4000
trusted library allocation
page read and write
21BC1A43000
trusted library allocation
page read and write
979807E000
stack
page read and write
2705D983000
heap
page read and write
1B960000
heap
page read and write
7FF848DA0000
trusted library allocation
page execute and read and write
31AF000
trusted library allocation
page read and write
97981FA000
stack
page read and write
7FF848EF0000
trusted library allocation
page read and write
21BBFA55000
heap
page read and write
1C6DB000
heap
page read and write
7FF848EE0000
trusted library allocation
page read and write
3F3BAFD000
stack
page read and write
CF1000
stack
page read and write
2705D9F8000
heap
page read and write
2705FF61000
trusted library allocation
page read and write
D02000
heap
page read and write
7FF848FF2000
trusted library allocation
page read and write
1B74E000
stack
page read and write
2705DA70000
heap
page read and write
27077A30000
heap
page read and write
7FF848D80000
trusted library allocation
page execute and read and write
7FF848FC0000
trusted library allocation
page read and write
21BBE090000
heap
page read and write
678000
heap
page read and write
6AE000
heap
page read and write
1DBDE800000
trusted library allocation
page read and write
270605A3000
trusted library allocation
page read and write
124E8000
trusted library allocation
page read and write
22446BE0000
heap
page read and write
22446850000
trusted library allocation
page read and write
1B9FE000
stack
page read and write
7FF848D1C000
trusted library allocation
page execute and read and write
7FF848D85000
trusted library allocation
page execute and read and write
1DBF8BE4000
heap
page read and write
2705D9B5000
heap
page read and write
7FF848FC2000
trusted library allocation
page read and write
7FF848FC9000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
7FF848C9D000
trusted library allocation
page execute and read and write
23BE4930000
heap
page read and write
7FF848D90000
trusted library allocation
page execute and read and write
625000
heap
page read and write
7FF848FB4000
trusted library allocation
page read and write
B00000
heap
page read and write
2705D9AC000
heap
page read and write
21BCFEA7000
trusted library allocation
page read and write
62D000
heap
page read and write
12E58000
trusted library allocation
page read and write
260A000
trusted library allocation
page read and write
2243E7DC000
trusted library allocation
page read and write
888000
heap
page read and write
B836A3F000
stack
page read and write
7FF8490B0000
trusted library allocation
page read and write
122D000
heap
page read and write
21BCFC41000
trusted library allocation
page read and write
7FF848C90000
trusted library allocation
page read and write
7FF848FFC000
trusted library allocation
page read and write
2243E521000
trusted library allocation
page read and write
1CE7E000
stack
page read and write
2242F831000
trusted library allocation
page read and write
3F3B8FE000
stack
page read and write
21BCFCB2000
trusted library allocation
page read and write
600000
heap
page read and write
64C000
heap
page read and write
16D0000
trusted library allocation
page read and write
A00000
heap
page read and write
7FF848E30000
trusted library allocation
page execute and read and write
7FF848D46000
trusted library allocation
page execute and read and write
7FF8490BD000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
21BC0BDF000
trusted library allocation
page read and write
1DBF8640000
heap
page read and write
7FF848C60000
trusted library allocation
page read and write
21BBDEB0000
heap
page read and write
7FF848D56000
trusted library allocation
page execute and read and write
21BCFC50000
trusted library allocation
page read and write
7FF848E02000
trusted library allocation
page read and write
224E9E77000
heap
page read and write
21BD81B0000
trusted library allocation
page read and write
21BBDEC0000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
3DF758E000
stack
page read and write
7FF848C64000
trusted library allocation
page read and write
3DF770E000
stack
page read and write
2243E511000
trusted library allocation
page read and write
1E3A2265000
heap
page read and write
B8365F9000
stack
page read and write
D0000
unkown
page readonly
713000
heap
page read and write
2242F0F8000
trusted library allocation
page read and write
21BCFC61000
trusted library allocation
page read and write
123C000
heap
page read and write
7FF848CA0000
trusted library allocation
page read and write
22446C38000
heap
page read and write
7FF848D2C000
trusted library allocation
page execute and read and write
1D58E000
stack
page read and write
7FF848D66000
trusted library allocation
page execute and read and write
7FF848FF0000
trusted library allocation
page read and write
7FF848FA3000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page read and write
2242E9BD000
trusted library allocation
page read and write
1B470000
heap
page read and write
63E000
heap
page read and write
7FF848CAB000
trusted library allocation
page execute and read and write
27077B50000
heap
page execute and read and write
1DBE0F78000
trusted library allocation
page read and write
7FF848C80000
trusted library allocation
page read and write
2242F8B5000
trusted library allocation
page read and write
2242E4E0000
heap
page read and write
10FF000
stack
page read and write
7FF848C70000
trusted library allocation
page read and write
7FF84909C000
trusted library allocation
page read and write
7FF848C8D000
trusted library allocation
page execute and read and write
2705D9B7000
heap
page read and write
260C000
trusted library allocation
page read and write
7FF848E44000
trusted library allocation
page read and write
21BC0D65000
trusted library allocation
page read and write
3F3C8CE000
stack
page read and write
224E9E7A000
heap
page read and write
170000
heap
page read and write
7FF848C7B000
trusted library allocation
page read and write
21BC09BC000
trusted library allocation
page read and write
27060D7B000
trusted library allocation
page read and write
F02000
heap
page read and write
9797DCF000
stack
page read and write
2243E99A000
trusted library allocation
page read and write
1DBE1534000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
12D9000
heap
page read and write
7FF848E70000
trusted library allocation
page read and write
9798477000
stack
page read and write
1DBDE790000
trusted library allocation
page read and write
224E9D50000
heap
page read and write
2705F739000
trusted library allocation
page read and write
2705DB55000
heap
page read and write
21BC0D01000
trusted library allocation
page read and write
224E9E30000
heap
page read and write
2705FE41000
trusted library allocation
page read and write
1A0000
heap
page read and write
E00000
heap
page read and write
23BE4890000
heap
page read and write
7FF848C62000
trusted library allocation
page read and write
7FF848E60000
trusted library allocation
page execute and read and write
7DF4A88E0000
trusted library allocation
page execute and read and write
21BD84BB000
heap
page read and write
2242C95D000
heap
page read and write
224302CE000
trusted library allocation
page read and write
1131000
stack
page read and write
7FF848C94000
trusted library allocation
page read and write
1DBF86D3000
heap
page read and write
21BCFF30000
trusted library allocation
page read and write
1DBE1171000
trusted library allocation
page read and write
702000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
7FF848CA0000
trusted library allocation
page read and write
12CB8000
trusted library allocation
page read and write
1DBF04FA000
trusted library allocation
page read and write
21BC1005000
trusted library allocation
page read and write
E9A000
heap
page read and write
979817E000
stack
page read and write
25FE000
stack
page read and write
EB8000
heap
page read and write
7FF848E78000
trusted library allocation
page read and write
7FF848CA4000
trusted library allocation
page read and write
1B64B000
stack
page read and write
2705F9DD000
trusted library allocation
page read and write
270607BF000
trusted library allocation
page read and write
97985FF000
stack
page read and write
7FF849020000
trusted library allocation
page read and write
2242F6CA000
trusted library allocation
page read and write
2242E4A0000
heap
page execute and read and write
7FF848EF0000
trusted library allocation
page read and write
3F3B87E000
stack
page read and write
1BDFE000
stack
page read and write
2242C8C0000
trusted library section
page read and write
7FF849070000
trusted library allocation
page read and write
27060762000
trusted library allocation
page read and write
7FF848E44000
trusted library allocation
page read and write
2242EF42000
trusted library allocation
page read and write
2242CB60000
heap
page read and write
21BBE120000
trusted library section
page read and write
7FF848F50000
trusted library allocation
page read and write
646000
heap
page read and write
1ADD3000
trusted library allocation
page read and write
7FF848C5D000
trusted library allocation
page execute and read and write
1DBE01E0000
heap
page read and write
1DBF8A90000
heap
page read and write
23BE4BA0000
heap
page read and write
1AF40000
heap
page read and write
3DF693E000
stack
page read and write
1E3A2200000
heap
page read and write
2705DB10000
heap
page readonly
264F000
trusted library allocation
page read and write
2242E4F1000
trusted library allocation
page read and write
2705DA4C000
heap
page read and write
25572D70000
heap
page read and write
1DA00000
heap
page read and write
3DF673E000
stack
page read and write
224468C0000
heap
page read and write
7FF848D66000
trusted library allocation
page execute and read and write
27060DA1000
trusted library allocation
page read and write
7FF848C70000
trusted library allocation
page read and write
1DBE0140000
heap
page execute and read and write
1DBF8BF5000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page execute and read and write
7FF848F80000
trusted library allocation
page read and write
7FF848CDC000
trusted library allocation
page execute and read and write
7FF848E52000
trusted library allocation
page read and write
2242E718000
trusted library allocation
page read and write
2CBC000
trusted library allocation
page read and write
7FF848C74000
trusted library allocation
page read and write
16F0000
heap
page execute and read and write
7FF848E74000
trusted library allocation
page read and write
21BD8509000
heap
page read and write
1DBF8721000
heap
page read and write
B83683E000
stack
page read and write
ADF000
stack
page read and write
7FF848C84000
trusted library allocation
page read and write
B83667F000
stack
page read and write
21BBE1C5000
heap
page read and write
25572B00000
heap
page read and write
7FF848F82000
trusted library allocation
page read and write
2242C969000
heap
page read and write
27077A46000
heap
page read and write
7FF848C73000
trusted library allocation
page execute and read and write
B90000
heap
page read and write
1802000
heap
page read and write
979934C000
stack
page read and write
3F3BCFE000
stack
page read and write
7FF848E21000
trusted library allocation
page read and write
21BC0EEA000
trusted library allocation
page read and write
21BD7FCF000
heap
page read and write
7FF848C9D000
trusted library allocation
page execute and read and write
7FF848F90000
trusted library allocation
page read and write
B836939000
stack
page read and write
24D0000
trusted library allocation
page read and write
1DDFC000
stack
page read and write
21BBDEFF000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
6EE000
heap
page read and write
822000
heap
page read and write
64C000
heap
page read and write
3F3CB4C000
stack
page read and write
97986FE000
stack
page read and write
23BE4941000
heap
page read and write
2242CA50000
trusted library allocation
page read and write
360000
unkown
page readonly
7FF848FC8000
trusted library allocation
page read and write
2649000
trusted library allocation
page read and write
B70000
heap
page read and write
27060E63000
trusted library allocation
page read and write
14254DC000
stack
page read and write
21BC010D000
trusted library allocation
page read and write
7FF848D10000
trusted library allocation
page read and write
23BE4941000
heap
page read and write
7DF4A0F60000
trusted library allocation
page execute and read and write
180E000
stack
page read and write
643000
heap
page read and write
979877C000
stack
page read and write
27060725000
trusted library allocation
page read and write
1DBDE670000
heap
page read and write
1DBE1160000
trusted library allocation
page read and write
7FF848C8D000
trusted library allocation
page execute and read and write
1DBE1288000
trusted library allocation
page read and write
23BE4941000
heap
page read and write
2244693A000
heap
page read and write
23BE4930000
heap
page read and write
852000
heap
page read and write
1238000
heap
page read and write
B83768E000
stack
page read and write
22446907000
heap
page read and write
7DF4A88D0000
trusted library allocation
page execute and read and write
1DBE041A000
trusted library allocation
page read and write
2242F5B1000
trusted library allocation
page read and write
97991CD000
stack
page read and write
7FF8490B0000
trusted library allocation
page read and write
12E53000
trusted library allocation
page read and write
3DF66F9000
stack
page read and write
7FF848F70000
trusted library allocation
page read and write
1DBE1FF4000
trusted library allocation
page read and write
21BBE150000
trusted library allocation
page read and write
7FF848D3C000
trusted library allocation
page execute and read and write
7FF849090000
trusted library allocation
page read and write
B02000
heap
page read and write
1CB3E000
stack
page read and write
97984FB000
stack
page read and write
7FF848F00000
trusted library allocation
page read and write
1C6BD000
heap
page read and write
9797D83000
stack
page read and write
3DF768C000
stack
page read and write
27061339000
trusted library allocation
page read and write
1213000
heap
page read and write
7DF488050000
trusted library allocation
page execute and read and write
1C649000
heap
page read and write
710000
heap
page read and write
1C0FB000
stack
page read and write
2705DB50000
heap
page read and write
1257000
heap
page read and write
B83760C000
stack
page read and write
3DF69BF000
stack
page read and write
1E0000
heap
page read and write
2242F521000
trusted library allocation
page read and write
1DBF04EA000
trusted library allocation
page read and write
1DBE1FCF000
trusted library allocation
page read and write
7FF848C90000
trusted library allocation
page read and write
7FF848D30000
trusted library allocation
page read and write
1DBDE7B0000
trusted library allocation
page read and write
1200000
heap
page read and write
21BBF970000
trusted library allocation
page read and write
B75000
heap
page read and write
31B1000
trusted library allocation
page read and write
715000
heap
page read and write
27077915000
heap
page read and write
7FF848E11000
trusted library allocation
page read and write
7FF848CBC000
trusted library allocation
page execute and read and write
7FF848E90000
trusted library allocation
page read and write
23BE4930000
heap
page read and write
3DF68BA000
stack
page read and write
7FF848EF0000
trusted library allocation
page read and write
979924E000
stack
page read and write
848000
heap
page read and write
7FF848CCC000
trusted library allocation
page execute and read and write
D0000
unkown
page readonly
7FF848F10000
trusted library allocation
page read and write
1ADC0000
heap
page read and write
3F0000
heap
page read and write
2705F3A7000
heap
page read and write
7FF848D30000
trusted library allocation
page read and write
2243E778000
trusted library allocation
page read and write
7FF848C7B000
trusted library allocation
page read and write
3F3BB79000
stack
page read and write
2242FC74000
trusted library allocation
page read and write
21BC1A1E000
trusted library allocation
page read and write
73DCAFF000
stack
page read and write
E22000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
7FF848C7D000
trusted library allocation
page execute and read and write
DE0000
trusted library allocation
page read and write
646000
heap
page read and write
4F1000
stack
page read and write
1E3A22B0000
heap
page read and write
8D0000
heap
page read and write
7FF849080000
trusted library allocation
page execute and read and write
1C402000
heap
page read and write
845000
heap
page read and write
2242FD59000
trusted library allocation
page read and write
21BD80A0000
heap
page execute and read and write
7FF848F70000
trusted library allocation
page read and write
8D5000
heap
page read and write
1902000
heap
page read and write
261F000
trusted library allocation
page read and write
7FF848EF0000
trusted library allocation
page read and write
2242CB65000
heap
page read and write
1D188000
stack
page read and write
7FF848CAD000
trusted library allocation
page execute and read and write
E3D000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
3F3BE7E000
stack
page read and write
B83758F000
stack
page read and write
There are 1237 hidden memdumps, click here to show them.