Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
exe003.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\svchost.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Log.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0n2tvqww.iga.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_43bbgrgc.km5.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dgbzchj2.2oj.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dxpli2tc.mlc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h4lwwdrq.xto.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hyuyj0ti.1p0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jfs3nh3k.14v.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_juzsquyl.l2i.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kmtqfpag.xks.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_myl1mvbw.dlf.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pgvopjfv.d54.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ryiyd1qf.hec.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tph5eqzb.aco.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x1ggbtgy.hrw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xbgvda3s.q1q.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zmwf4kpc.jfe.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Nov 22 07:18:42
2024, mtime=Fri Nov 22 07:18:42 2024, atime=Fri Nov 22 07:18:42 2024, length=74752, window=hide
|
dropped
|
There are 12 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\exe003.exe
|
"C:\Users\user\Desktop\exe003.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\exe003.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'exe003.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\svchost.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
|
||
C:\Users\user\AppData\Local\Temp\svchost.exe
|
"C:\Users\user\AppData\Local\Temp\svchost.exe"
|
||
C:\Users\user\AppData\Local\Temp\svchost.exe
|
"C:\Users\user\AppData\Local\Temp\svchost.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 1 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
22.ip.gl.ply.gg
|
|||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://crl.m20
|
unknown
|
||
http://www.microsoft.coG
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
There are 6 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
22.ip.gl.ply.gg
|
147.185.221.22
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
147.185.221.22
|
22.ip.gl.ply.gg
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
svchost
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
132000
|
unkown
|
page readonly
|
||
1BD0B4B3000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
1795A834000
|
trusted library allocation
|
page read and write
|
||
1A66B24D000
|
heap
|
page read and write
|
||
100679000
|
stack
|
page read and write
|
||
7FFB4AE52000
|
trusted library allocation
|
page read and write
|
||
1A66D58C000
|
heap
|
page read and write
|
||
17957CA0000
|
heap
|
page read and write
|
||
1795A55D000
|
trusted library allocation
|
page read and write
|
||
1009BE000
|
stack
|
page read and write
|
||
1BD0B4DD000
|
heap
|
page read and write
|
||
100479000
|
stack
|
page read and write
|
||
39437B8000
|
stack
|
page read and write
|
||
1BD0B525000
|
heap
|
page read and write
|
||
19B6C16D000
|
heap
|
page read and write
|
||
7FFB4AE70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ACBB000
|
trusted library allocation
|
page read and write
|
||
5ED000
|
heap
|
page read and write
|
||
7FFB4ACBD000
|
trusted library allocation
|
page execute and read and write
|
||
1BD0CEB0000
|
trusted library section
|
page read and write
|
||
1902000
|
heap
|
page read and write
|
||
17957AF5000
|
heap
|
page read and write
|
||
19B10001000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE6A000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
7FFB4B030000
|
trusted library allocation
|
page read and write
|
||
39434F7000
|
stack
|
page read and write
|
||
7FFB4B12D000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFD0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B024000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFA0000
|
trusted library allocation
|
page read and write
|
||
7DF438E90000
|
trusted library allocation
|
page execute and read and write
|
||
1A6010BD000
|
trusted library allocation
|
page read and write
|
||
1A66B450000
|
heap
|
page readonly
|
||
1A66D62B000
|
heap
|
page read and write
|
||
578FDFE000
|
stack
|
page read and write
|
||
133C3000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD1C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AE5A000
|
trusted library allocation
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
19B102F5000
|
trusted library allocation
|
page read and write
|
||
1A66D5EB000
|
heap
|
page read and write
|
||
19B6C138000
|
heap
|
page read and write
|
||
1BD0D040000
|
heap
|
page execute and read and write
|
||
1C34E000
|
stack
|
page read and write
|
||
19B00BFF000
|
trusted library allocation
|
page read and write
|
||
1A66B1A0000
|
heap
|
page read and write
|
||
17957A00000
|
heap
|
page read and write
|
||
7FFB4AFDF000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD60000
|
trusted library allocation
|
page read and write
|
||
7FFB4B0F0000
|
trusted library allocation
|
page read and write
|
||
1A66D412000
|
heap
|
page read and write
|
||
7FFB4B0BC000
|
trusted library allocation
|
page read and write
|
||
17957C90000
|
heap
|
page read and write
|
||
10168B000
|
stack
|
page read and write
|
||
1A66B297000
|
heap
|
page read and write
|
||
7FFB4ACE0000
|
trusted library allocation
|
page read and write
|
||
1C6FE000
|
stack
|
page read and write
|
||
1A6102F8000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFE0000
|
trusted library allocation
|
page read and write
|
||
1BD0B4A0000
|
heap
|
page read and write
|
||
7FFB4B11D000
|
trusted library allocation
|
page read and write
|
||
5790BCC000
|
stack
|
page read and write
|
||
1A66CF20000
|
heap
|
page execute and read and write
|
||
1A66B253000
|
heap
|
page read and write
|
||
7FFB4AD70000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACA3000
|
trusted library allocation
|
page execute and read and write
|
||
1A601E23000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF80000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFA0000
|
trusted library allocation
|
page read and write
|
||
1000FD000
|
stack
|
page read and write
|
||
7FFB4B004000
|
trusted library allocation
|
page read and write
|
||
1A600088000
|
trusted library allocation
|
page read and write
|
||
7FFB4B040000
|
trusted library allocation
|
page read and write
|
||
7FFB4B0D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ACC3000
|
trusted library allocation
|
page execute and read and write
|
||
29A1000
|
trusted library allocation
|
page read and write
|
||
19B6C3C0000
|
heap
|
page read and write
|
||
578FAF9000
|
stack
|
page read and write
|
||
1BD25895000
|
heap
|
page read and write
|
||
1AEB3000
|
heap
|
page read and write
|
||
1BD0E673000
|
trusted library allocation
|
page read and write
|
||
17D0000
|
trusted library allocation
|
page read and write
|
||
1A6013C3000
|
trusted library allocation
|
page read and write
|
||
7FFB4B020000
|
trusted library allocation
|
page read and write
|
||
19B013C3000
|
trusted library allocation
|
page read and write
|
||
1BD0D2A0000
|
heap
|
page execute and read and write
|
||
1795A768000
|
trusted library allocation
|
page read and write
|
||
1C04A000
|
stack
|
page read and write
|
||
7FFB4ACDB000
|
trusted library allocation
|
page read and write
|
||
1795AD0E000
|
trusted library allocation
|
page read and write
|
||
29AF000
|
trusted library allocation
|
page read and write
|
||
7FFB4B009000
|
trusted library allocation
|
page read and write
|
||
394468B000
|
stack
|
page read and write
|
||
1A66D359000
|
heap
|
page read and write
|
||
7FFB4AEB8000
|
trusted library allocation
|
page read and write
|
||
19B018C1000
|
trusted library allocation
|
page read and write
|
||
B2CE93000
|
stack
|
page read and write
|
||
7FFB4AF70000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE80000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ACCD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AF40000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACE0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B120000
|
trusted library allocation
|
page read and write
|
||
7FFB4B019000
|
trusted library allocation
|
page read and write
|
||
1BD25964000
|
heap
|
page read and write
|
||
7FFB4AFD0000
|
trusted library allocation
|
page read and write
|
||
1795A951000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACB3000
|
trusted library allocation
|
page execute and read and write
|
||
1BD1D2E1000
|
trusted library allocation
|
page read and write
|
||
1BD1D5A7000
|
trusted library allocation
|
page read and write
|
||
19B6C350000
|
heap
|
page read and write
|
||
1A6011A5000
|
trusted library allocation
|
page read and write
|
||
19B6E550000
|
heap
|
page read and write
|
||
19B6C390000
|
trusted library allocation
|
page read and write
|
||
1A610021000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEA0000
|
trusted library allocation
|
page read and write
|
||
17957A4B000
|
heap
|
page read and write
|
||
7FFB4ACC3000
|
trusted library allocation
|
page execute and read and write
|
||
1A601E28000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACCD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AF60000
|
trusted library allocation
|
page read and write
|
||
1C8FF000
|
stack
|
page read and write
|
||
129A1000
|
trusted library allocation
|
page read and write
|
||
17957A3D000
|
heap
|
page read and write
|
||
19B00F65000
|
trusted library allocation
|
page read and write
|
||
124C1000
|
trusted library allocation
|
page read and write
|
||
129A8000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFE0000
|
trusted library allocation
|
page read and write
|
||
19B01E24000
|
trusted library allocation
|
page read and write
|
||
7FFB4B040000
|
trusted library allocation
|
page read and write
|
||
17957AFC000
|
heap
|
page read and write
|
||
19B6C110000
|
heap
|
page read and write
|
||
179719E8000
|
heap
|
page read and write
|
||
19B6C173000
|
heap
|
page read and write
|
||
17971D05000
|
heap
|
page read and write
|
||
17957C30000
|
trusted library allocation
|
page read and write
|
||
B2E4CC000
|
stack
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
7FFB4ACE0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFB0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF50000
|
trusted library allocation
|
page read and write
|
||
1A66CD70000
|
heap
|
page execute and read and write
|
||
1C402000
|
heap
|
page read and write
|
||
7FFB4ACD4000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACA4000
|
trusted library allocation
|
page read and write
|
||
19B00A52000
|
trusted library allocation
|
page read and write
|
||
1BD0F08D000
|
trusted library allocation
|
page read and write
|
||
1B83D000
|
stack
|
page read and write
|
||
7FFB4AEA0000
|
trusted library allocation
|
page execute and read and write
|
||
5790B4D000
|
stack
|
page read and write
|
||
1BD0B690000
|
heap
|
page read and write
|
||
7FFB4ADF0000
|
trusted library allocation
|
page execute and read and write
|
||
1A66B465000
|
heap
|
page read and write
|
||
7FFB4AD2C000
|
trusted library allocation
|
page execute and read and write
|
||
1A600D73000
|
trusted library allocation
|
page read and write
|
||
1B795000
|
stack
|
page read and write
|
||
1A66B259000
|
heap
|
page read and write
|
||
19B6E54B000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
7FFB4AE60000
|
trusted library allocation
|
page read and write
|
||
578FA7E000
|
stack
|
page read and write
|
||
19B6DCF5000
|
heap
|
page read and write
|
||
19B010F1000
|
trusted library allocation
|
page read and write
|
||
1B260000
|
heap
|
page read and write
|
||
7FFB4B029000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFC0000
|
trusted library allocation
|
page read and write
|
||
17957C70000
|
heap
|
page read and write
|
||
19B00F71000
|
trusted library allocation
|
page read and write
|
||
29AC000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFA0000
|
trusted library allocation
|
page read and write
|
||
17971B30000
|
heap
|
page execute and read and write
|
||
19B6DD0E000
|
heap
|
page read and write
|
||
17969898000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF10000
|
trusted library allocation
|
page read and write
|
||
394468E000
|
stack
|
page read and write
|
||
7FFB4ACB2000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEC0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B090000
|
trusted library allocation
|
page read and write
|
||
1A66CC80000
|
trusted library allocation
|
page read and write
|
||
578FF7B000
|
stack
|
page read and write
|
||
535000
|
heap
|
page read and write
|
||
19B103FA000
|
trusted library allocation
|
page read and write
|
||
1BEFE000
|
stack
|
page read and write
|
||
7FFB4AEF0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF50000
|
trusted library allocation
|
page read and write
|
||
1A66D272000
|
heap
|
page read and write
|
||
1A6102E9000
|
trusted library allocation
|
page read and write
|
||
1795A527000
|
trusted library allocation
|
page read and write
|
||
1795A30A000
|
trusted library allocation
|
page read and write
|
||
100073000
|
stack
|
page read and write
|
||
7FFB4AD0C000
|
trusted library allocation
|
page execute and read and write
|
||
1A66B420000
|
trusted library allocation
|
page read and write
|
||
1BD0CEE0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFF0000
|
trusted library allocation
|
page read and write
|
||
143D000
|
heap
|
page read and write
|
||
1BD0E3D0000
|
trusted library allocation
|
page read and write
|
||
19B0130B000
|
trusted library allocation
|
page read and write
|
||
1BC02000
|
heap
|
page read and write
|
||
14C5000
|
heap
|
page read and write
|
||
A3B000
|
heap
|
page read and write
|
||
17959616000
|
trusted library allocation
|
page read and write
|
||
17971B00000
|
trusted library allocation
|
page read and write
|
||
1BD0CFB0000
|
heap
|
page read and write
|
||
17F0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B093000
|
trusted library allocation
|
page read and write
|
||
7FFB4B0E0000
|
trusted library allocation
|
page read and write
|
||
B2D37E000
|
stack
|
page read and write
|
||
1BD258B0000
|
heap
|
page read and write
|
||
17971A71000
|
heap
|
page read and write
|
||
1BD0CEA0000
|
trusted library section
|
page read and write
|
||
7FFB4ACBD000
|
trusted library allocation
|
page execute and read and write
|
||
AC4000
|
heap
|
page read and write
|
||
7FFB4AD6C000
|
trusted library allocation
|
page execute and read and write
|
||
23B0000
|
heap
|
page read and write
|
||
7FFB4ACC3000
|
trusted library allocation
|
page read and write
|
||
1BD0D060000
|
heap
|
page execute and read and write
|
||
17971CDA000
|
heap
|
page read and write
|
||
19B004CD000
|
trusted library allocation
|
page read and write
|
||
578FEFE000
|
stack
|
page read and write
|
||
7FFB4B020000
|
trusted library allocation
|
page read and write
|
||
1BD0D2B1000
|
trusted library allocation
|
page read and write
|
||
14AC000
|
heap
|
page read and write
|
||
19B6E53C000
|
heap
|
page read and write
|
||
1447000
|
heap
|
page read and write
|
||
1BD25617000
|
heap
|
page read and write
|
||
1BD256AA000
|
heap
|
page read and write
|
||
17971D15000
|
heap
|
page read and write
|
||
3943A3B000
|
stack
|
page read and write
|
||
7FFB4ACD3000
|
trusted library allocation
|
page execute and read and write
|
||
19B10031000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF80000
|
trusted library allocation
|
page read and write
|
||
1A6012A3000
|
trusted library allocation
|
page read and write
|
||
394440E000
|
stack
|
page read and write
|
||
B2D4F8000
|
stack
|
page read and write
|
||
A83000
|
trusted library allocation
|
page read and write
|
||
1A66B210000
|
heap
|
page read and write
|
||
7FFB4AF60000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEC0000
|
trusted library allocation
|
page execute and read and write
|
||
1A66D336000
|
heap
|
page read and write
|
||
FF0000
|
unkown
|
page readonly
|
||
10017F000
|
stack
|
page read and write
|
||
7FFB4AEB4000
|
trusted library allocation
|
page read and write
|
||
1A66B440000
|
trusted library allocation
|
page read and write
|
||
17969880000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACB4000
|
trusted library allocation
|
page read and write
|
||
1A66D860000
|
heap
|
page read and write
|
||
1445000
|
heap
|
page read and write
|
||
7FFB4B02C000
|
trusted library allocation
|
page read and write
|
||
17971D01000
|
heap
|
page read and write
|
||
7FFB4AFA0000
|
trusted library allocation
|
page read and write
|
||
1A610001000
|
trusted library allocation
|
page read and write
|
||
F02000
|
heap
|
page read and write
|
||
7FFB4AEE0000
|
trusted library allocation
|
page read and write
|
||
1BD0CF30000
|
trusted library allocation
|
page read and write
|
||
1BD0D4DB000
|
trusted library allocation
|
page read and write
|
||
1B34D000
|
heap
|
page read and write
|
||
7FFB4ADD0000
|
trusted library allocation
|
page execute and read and write
|
||
19B00D85000
|
trusted library allocation
|
page read and write
|
||
19B6E7C0000
|
heap
|
page read and write
|
||
19B6DCD0000
|
heap
|
page execute and read and write
|
||
7FFB4AF30000
|
trusted library allocation
|
page read and write
|
||
17969888000
|
trusted library allocation
|
page read and write
|
||
7FFB4B050000
|
trusted library allocation
|
page read and write
|
||
7FFB4B0D0000
|
trusted library allocation
|
page read and write
|
||
1BD1D2D1000
|
trusted library allocation
|
page read and write
|
||
19B6C370000
|
trusted library section
|
page read and write
|
||
3944509000
|
stack
|
page read and write
|
||
7FFB4AE92000
|
trusted library allocation
|
page read and write
|
||
1A600F9F000
|
trusted library allocation
|
page read and write
|
||
1B2EB000
|
heap
|
page read and write
|
||
19B012D8000
|
trusted library allocation
|
page read and write
|
||
1795AE19000
|
trusted library allocation
|
page read and write
|
||
17971590000
|
heap
|
page read and write
|
||
1BD0D046000
|
heap
|
page execute and read and write
|
||
3942FFE000
|
stack
|
page read and write
|
||
578F8FE000
|
stack
|
page read and write
|
||
19B6DB80000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD80000
|
trusted library allocation
|
page read and write
|
||
19B6E410000
|
heap
|
page read and write
|
||
7FFB4B018000
|
trusted library allocation
|
page read and write
|
||
133C8000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
7FFB4AFC0000
|
trusted library allocation
|
page read and write
|
||
B2CF1E000
|
stack
|
page read and write
|
||
7FFB4ACC2000
|
trusted library allocation
|
page read and write
|
||
1BD25604000
|
heap
|
page read and write
|
||
1A66B218000
|
heap
|
page read and write
|
||
7FFB4ADB6000
|
trusted library allocation
|
page execute and read and write
|
||
19B6E240000
|
heap
|
page read and write
|
||
7FFB4B0D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B000000
|
trusted library allocation
|
page read and write
|
||
1BD0D32D000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD66000
|
trusted library allocation
|
page read and write
|
||
1A66D270000
|
heap
|
page read and write
|
||
1BD25807000
|
heap
|
page read and write
|
||
B2D67E000
|
stack
|
page read and write
|
||
7FFB4B0E0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD5C000
|
trusted library allocation
|
page execute and read and write
|
||
19B01124000
|
trusted library allocation
|
page read and write
|
||
17971E69000
|
heap
|
page read and write
|
||
39432FE000
|
stack
|
page read and write
|
||
39438BE000
|
stack
|
page read and write
|
||
19B01E1F000
|
trusted library allocation
|
page read and write
|
||
17959550000
|
heap
|
page execute and read and write
|
||
1802000
|
heap
|
page read and write
|
||
7FFB4B100000
|
trusted library allocation
|
page read and write
|
||
7FFB4B120000
|
trusted library allocation
|
page read and write
|
||
7FFB4B110000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACB3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ACFC000
|
trusted library allocation
|
page execute and read and write
|
||
1A66B251000
|
heap
|
page read and write
|
||
7FFB4AE62000
|
trusted library allocation
|
page read and write
|
||
19B6E437000
|
heap
|
page read and write
|
||
19B6DC80000
|
heap
|
page execute and read and write
|
||
7FFB4AF30000
|
trusted library allocation
|
page read and write
|
||
1BD0DEB1000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
394347F000
|
stack
|
page read and write
|
||
19B00080000
|
trusted library allocation
|
page read and write
|
||
1C7FF000
|
stack
|
page read and write
|
||
7FFB4AEB0000
|
trusted library allocation
|
page read and write
|
||
1BD0CF70000
|
trusted library allocation
|
page read and write
|
||
1A66D501000
|
heap
|
page read and write
|
||
1A66B1B0000
|
heap
|
page read and write
|
||
1BD0B670000
|
heap
|
page read and write
|
||
7FFB4AE52000
|
trusted library allocation
|
page read and write
|
||
7FFB4B0DC000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
17971D0D000
|
heap
|
page read and write
|
||
1BD1D599000
|
trusted library allocation
|
page read and write
|
||
17959FE2000
|
trusted library allocation
|
page read and write
|
||
1A601891000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF80000
|
trusted library allocation
|
page read and write
|
||
7FFB4B020000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD1C000
|
trusted library allocation
|
page execute and read and write
|
||
B2E2CD000
|
stack
|
page read and write
|
||
19B6C300000
|
heap
|
page read and write
|
||
1BD50000
|
heap
|
page execute and read and write
|
||
DCF000
|
stack
|
page read and write
|
||
7FFB4B032000
|
trusted library allocation
|
page read and write
|
||
1795B38C000
|
trusted library allocation
|
page read and write
|
||
1BD0EADA000
|
trusted library allocation
|
page read and write
|
||
129A3000
|
trusted library allocation
|
page read and write
|
||
1A66D56D000
|
heap
|
page read and write
|
||
7FFB4B110000
|
trusted library allocation
|
page read and write
|
||
7DF42A600000
|
trusted library allocation
|
page execute and read and write
|
||
1A600F99000
|
trusted library allocation
|
page read and write
|
||
1BD0E024000
|
trusted library allocation
|
page read and write
|
||
17957A5D000
|
heap
|
page read and write
|
||
1B2FD000
|
heap
|
page read and write
|
||
19B10306000
|
trusted library allocation
|
page read and write
|
||
1795A52D000
|
trusted library allocation
|
page read and write
|
||
1BD1D2C0000
|
trusted library allocation
|
page read and write
|
||
B2E3C7000
|
stack
|
page read and write
|
||
394383E000
|
stack
|
page read and write
|
||
14AA000
|
heap
|
page read and write
|
||
33C1000
|
trusted library allocation
|
page read and write
|
||
19B6E513000
|
heap
|
page read and write
|
||
1B33D000
|
heap
|
page read and write
|
||
1BD0EA34000
|
trusted library allocation
|
page read and write
|
||
A75000
|
heap
|
page read and write
|
||
7FFB4B014000
|
trusted library allocation
|
page read and write
|
||
1BD0E000
|
stack
|
page read and write
|
||
7FFB4AEB2000
|
trusted library allocation
|
page read and write
|
||
A2C000
|
heap
|
page read and write
|
||
7FFB4ADA6000
|
trusted library allocation
|
page execute and read and write
|
||
B2D576000
|
stack
|
page read and write
|
||
1494000
|
heap
|
page read and write
|
||
7FFB4AF90000
|
trusted library allocation
|
page read and write
|
||
17959591000
|
trusted library allocation
|
page read and write
|
||
578FC77000
|
stack
|
page read and write
|
||
7FFB4ACD0000
|
trusted library allocation
|
page read and write
|
||
578FE7E000
|
stack
|
page read and write
|
||
17969600000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE60000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AF30000
|
trusted library allocation
|
page read and write
|
||
1795B3B1000
|
trusted library allocation
|
page read and write
|
||
142D000
|
heap
|
page read and write
|
||
19B6E330000
|
heap
|
page read and write
|
||
1A600A52000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEA0000
|
trusted library allocation
|
page execute and read and write
|
||
1B15E000
|
stack
|
page read and write
|
||
7DF42A610000
|
trusted library allocation
|
page execute and read and write
|
||
17971D09000
|
heap
|
page read and write
|
||
7FFB4ACC4000
|
trusted library allocation
|
page read and write
|
||
7FFB4B0C0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFC0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B110000
|
trusted library allocation
|
page read and write
|
||
19B6C177000
|
heap
|
page read and write
|
||
7DF4773F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AD70000
|
trusted library allocation
|
page execute and read and write
|
||
17971DC3000
|
heap
|
page read and write
|
||
7FFB4B003000
|
trusted library allocation
|
page read and write
|
||
1BD0E5B8000
|
trusted library allocation
|
page read and write
|
||
7FFB4B0F0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACD4000
|
trusted library allocation
|
page read and write
|
||
7FFB4B000000
|
trusted library allocation
|
page read and write
|
||
1BD0E2E2000
|
trusted library allocation
|
page read and write
|
||
10093E000
|
stack
|
page read and write
|
||
100737000
|
stack
|
page read and write
|
||
578F97E000
|
stack
|
page read and write
|
||
19B00F6D000
|
trusted library allocation
|
page read and write
|
||
63F000
|
heap
|
page read and write
|
||
19B00229000
|
trusted library allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
19B00F7E000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEB0000
|
trusted library allocation
|
page read and write
|
||
19B10011000
|
trusted library allocation
|
page read and write
|
||
1BD0F0D2000
|
trusted library allocation
|
page read and write
|
||
7FFB4AED0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD96000
|
trusted library allocation
|
page execute and read and write
|
||
7DF438E80000
|
trusted library allocation
|
page execute and read and write
|
||
1795A17A000
|
trusted library allocation
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
1795A64F000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFF9000
|
trusted library allocation
|
page read and write
|
||
17969879000
|
trusted library allocation
|
page read and write
|
||
1BD4F000
|
stack
|
page read and write
|
||
7FFB4ACEB000
|
trusted library allocation
|
page read and write
|
||
65B000
|
heap
|
page read and write
|
||
7FFB4AF10000
|
trusted library allocation
|
page read and write
|
||
143F000
|
heap
|
page read and write
|
||
1A601E03000
|
trusted library allocation
|
page read and write
|
||
7FFB4B120000
|
trusted library allocation
|
page read and write
|
||
1BFFE000
|
stack
|
page read and write
|
||
17971A74000
|
heap
|
page read and write
|
||
7FFB4ACD0000
|
trusted library allocation
|
page read and write
|
||
1AF1E000
|
stack
|
page read and write
|
||
1BD25683000
|
heap
|
page read and write
|
||
17971CCA000
|
heap
|
page read and write
|
||
17971F20000
|
heap
|
page read and write
|
||
7FFB4B126000
|
trusted library allocation
|
page read and write
|
||
7FFB4B030000
|
trusted library allocation
|
page read and write
|
||
1A66D400000
|
heap
|
page read and write
|
||
7FFB4AE80000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AE72000
|
trusted library allocation
|
page read and write
|
||
8F1000
|
stack
|
page read and write
|
||
7FFB4AF30000
|
trusted library allocation
|
page read and write
|
||
1A66CDA0000
|
heap
|
page read and write
|
||
AA6000
|
heap
|
page read and write
|
||
101589000
|
stack
|
page read and write
|
||
1A6102EE000
|
trusted library allocation
|
page read and write
|
||
7FFB4AED0000
|
trusted library allocation
|
page read and write
|
||
578F5B3000
|
stack
|
page read and write
|
||
1BD2584E000
|
heap
|
page read and write
|
||
1BD0B490000
|
heap
|
page read and write
|
||
1A601DDE000
|
trusted library allocation
|
page read and write
|
||
7FFB4B050000
|
trusted library allocation
|
page read and write
|
||
7FFB4B0B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD60000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
1BA90000
|
heap
|
page read and write
|
||
17957A24000
|
heap
|
page read and write
|
||
1BD25658000
|
heap
|
page read and write
|
||
1BD0D0CF000
|
heap
|
page read and write
|
||
7FFB4AF00000
|
trusted library allocation
|
page read and write
|
||
1BD257F0000
|
heap
|
page read and write
|
||
7FFB4ACA2000
|
trusted library allocation
|
page read and write
|
||
1BD0CEC0000
|
trusted library allocation
|
page read and write
|
||
1D1FE000
|
stack
|
page read and write
|
||
19B6C380000
|
trusted library section
|
page read and write
|
||
1BD256B9000
|
heap
|
page read and write
|
||
1BBB0000
|
heap
|
page execute and read and write
|
||
7FFB4AF80000
|
trusted library allocation
|
page read and write
|
||
17957CA5000
|
heap
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
7FFB4B0A0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF00000
|
trusted library allocation
|
page read and write
|
||
7FFB4B028000
|
trusted library allocation
|
page read and write
|
||
17971E37000
|
heap
|
page read and write
|
||
7FFB4AEA4000
|
trusted library allocation
|
page read and write
|
||
1BD0B850000
|
heap
|
page read and write
|
||
7FFB4AEF0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACD0000
|
trusted library allocation
|
page read and write
|
||
19B00C0D000
|
trusted library allocation
|
page read and write
|
||
A24000
|
heap
|
page read and write
|
||
1AFBE000
|
stack
|
page read and write
|
||
5AC000
|
heap
|
page read and write
|
||
7FFB4ADA6000
|
trusted library allocation
|
page execute and read and write
|
||
1AEB0000
|
heap
|
page read and write
|
||
7FFB4AE82000
|
trusted library allocation
|
page read and write
|
||
7FFB4AED0000
|
trusted library allocation
|
page read and write
|
||
578FD7A000
|
stack
|
page read and write
|
||
17957A86000
|
heap
|
page read and write
|
||
7FFB4ACD2000
|
trusted library allocation
|
page read and write
|
||
57909CC000
|
stack
|
page read and write
|
||
7FFB4AFD0000
|
trusted library allocation
|
page read and write
|
||
1BD25710000
|
heap
|
page read and write
|
||
17957C10000
|
trusted library allocation
|
page read and write
|
||
1B55E000
|
stack
|
page read and write
|
||
17957A89000
|
heap
|
page read and write
|
||
1A66D607000
|
heap
|
page read and write
|
||
179597B8000
|
trusted library allocation
|
page read and write
|
||
1A6102F6000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEA2000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFD3000
|
trusted library allocation
|
page read and write
|
||
7FFB4B130000
|
trusted library allocation
|
page read and write
|
||
1BD0EC0A000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
1BD0DD02000
|
trusted library allocation
|
page read and write
|
||
B15000
|
heap
|
page read and write
|
||
AA9000
|
heap
|
page read and write
|
||
5790AC7000
|
stack
|
page read and write
|
||
19B6C224000
|
heap
|
page read and write
|
||
7FFB4AE90000
|
trusted library allocation
|
page execute and read and write
|
||
17957C95000
|
heap
|
page read and write
|
||
1A610308000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page execute and read and write
|
||
7FFB4B140000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEF0000
|
trusted library allocation
|
page read and write
|
||
1BD1D320000
|
trusted library allocation
|
page read and write
|
||
19B1006F000
|
trusted library allocation
|
page read and write
|
||
39433FA000
|
stack
|
page read and write
|
||
7FFB4AE70000
|
trusted library allocation
|
page execute and read and write
|
||
578F87E000
|
stack
|
page read and write
|
||
7FFB4ACD0000
|
trusted library allocation
|
page read and write
|
||
19B6E55C000
|
heap
|
page read and write
|
||
19B6E210000
|
heap
|
page read and write
|
||
19B6E200000
|
heap
|
page execute and read and write
|
||
B2CFDF000
|
stack
|
page read and write
|
||
10148D000
|
stack
|
page read and write
|
||
7FFB4AD60000
|
trusted library allocation
|
page read and write
|
||
1413000
|
heap
|
page read and write
|
||
1A4F0000
|
trusted library allocation
|
page read and write
|
||
1A66D2BE000
|
heap
|
page read and write
|
||
1BD258B6000
|
heap
|
page read and write
|
||
7FFB4AFF0000
|
trusted library allocation
|
page read and write
|
||
23A0000
|
heap
|
page execute and read and write
|
||
7FFB4AF50000
|
trusted library allocation
|
page read and write
|
||
1BD0F0B3000
|
trusted library allocation
|
page read and write
|
||
124D1000
|
trusted library allocation
|
page read and write
|
||
7FFB4B0F0000
|
trusted library allocation
|
page execute and read and write
|
||
17971D82000
|
heap
|
page read and write
|
||
394448D000
|
stack
|
page read and write
|
||
10140F000
|
stack
|
page read and write
|
||
7FFB4AE90000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AE40000
|
trusted library allocation
|
page read and write
|
||
17969591000
|
trusted library allocation
|
page read and write
|
||
19B6E531000
|
heap
|
page read and write
|
||
1A66CC40000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE90000
|
trusted library allocation
|
page execute and read and write
|
||
17957A49000
|
heap
|
page read and write
|
||
1B994000
|
stack
|
page read and write
|
||
7FFB4AD96000
|
trusted library allocation
|
page execute and read and write
|
||
19B10021000
|
trusted library allocation
|
page read and write
|
||
1BD0CF00000
|
trusted library allocation
|
page read and write
|
||
1795A596000
|
trusted library allocation
|
page read and write
|
||
17971E75000
|
heap
|
page read and write
|
||
17957C40000
|
heap
|
page readonly
|
||
7FFB4AD66000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page execute and read and write
|
||
7FFB4ACDD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ADE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AD70000
|
trusted library allocation
|
page read and write
|
||
7FFB4B0C0000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page execute and read and write
|
||
7FFB4AE62000
|
trusted library allocation
|
page read and write
|
||
1BD0EB19000
|
trusted library allocation
|
page read and write
|
||
1A6011D7000
|
trusted library allocation
|
page read and write
|
||
1795B367000
|
trusted library allocation
|
page read and write
|
||
1A66B26D000
|
heap
|
page read and write
|
||
1BD0E557000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD7C000
|
trusted library allocation
|
page execute and read and write
|
||
930000
|
heap
|
page read and write
|
||
7FFB4AD80000
|
trusted library allocation
|
page execute and read and write
|
||
24BE000
|
stack
|
page read and write
|
||
17957AE5000
|
heap
|
page read and write
|
||
130000
|
unkown
|
page readonly
|
||
A3E000
|
heap
|
page read and write
|
||
7FFB4B0A0000
|
trusted library allocation
|
page read and write
|
||
B2E34E000
|
stack
|
page read and write
|
||
1A601306000
|
trusted library allocation
|
page read and write
|
||
1BD0EC01000
|
trusted library allocation
|
page read and write
|
||
7FFB4B022000
|
trusted library allocation
|
page read and write
|
||
A42000
|
heap
|
page read and write
|
||
1A66CCD0000
|
heap
|
page execute and read and write
|
||
1BD25922000
|
heap
|
page read and write
|
||
7FFB4ACB0000
|
trusted library allocation
|
page read and write
|
||
1BD0E36D000
|
trusted library allocation
|
page read and write
|
||
1BD1D5B7000
|
trusted library allocation
|
page read and write
|
||
1437000
|
heap
|
page read and write
|
||
1BD25681000
|
heap
|
page read and write
|
||
1A66CDA5000
|
heap
|
page read and write
|
||
1C050000
|
heap
|
page read and write
|
||
1795A6B2000
|
trusted library allocation
|
page read and write
|
||
578FBF8000
|
stack
|
page read and write
|
||
7FFB4ACB4000
|
trusted library allocation
|
page read and write
|
||
B2D6FE000
|
stack
|
page read and write
|
||
10150E000
|
stack
|
page read and write
|
||
17959480000
|
trusted library allocation
|
page read and write
|
||
19B0194E000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE88000
|
trusted library allocation
|
page read and write
|
||
19B01250000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD0C000
|
trusted library allocation
|
page execute and read and write
|
||
7DF42A5F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AE81000
|
trusted library allocation
|
page read and write
|
||
299F000
|
stack
|
page read and write
|
||
1BD1D4F5000
|
trusted library allocation
|
page read and write
|
||
1001FF000
|
stack
|
page read and write
|
||
7FFB4AEE0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF00000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFF3000
|
trusted library allocation
|
page read and write
|
||
17957AFA000
|
heap
|
page read and write
|
||
33CC000
|
trusted library allocation
|
page read and write
|
||
B2D87B000
|
stack
|
page read and write
|
||
58C000
|
heap
|
page read and write
|
||
1AFF000
|
stack
|
page read and write
|
||
19B6E610000
|
trusted library allocation
|
page read and write
|
||
19B6E206000
|
heap
|
page execute and read and write
|
||
7FFB4AEE0000
|
trusted library allocation
|
page read and write
|
||
5A1000
|
heap
|
page read and write
|
||
B02000
|
heap
|
page read and write
|
||
7FFB4B040000
|
trusted library allocation
|
page read and write
|
||
1BD0CEF0000
|
heap
|
page readonly
|
||
7FF472F80000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AF20000
|
trusted library allocation
|
page read and write
|
||
179695B1000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEB0000
|
trusted library allocation
|
page execute and read and write
|
||
1A600001000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFB0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACC0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACF0000
|
trusted library allocation
|
page read and write
|
||
1795A895000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACCD000
|
trusted library allocation
|
page execute and read and write
|
||
17971AC9000
|
heap
|
page read and write
|
||
7FFB4AD70000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AD0C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ACA0000
|
trusted library allocation
|
page read and write
|
||
19B6DBB0000
|
heap
|
page read and write
|
||
179695C1000
|
trusted library allocation
|
page read and write
|
||
19B102E8000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFD0000
|
trusted library allocation
|
page read and write
|
||
3943739000
|
stack
|
page read and write
|
||
7FFB4B010000
|
trusted library allocation
|
page read and write
|
||
B2D3FB000
|
stack
|
page read and write
|
||
7FFB4ACB0000
|
trusted library allocation
|
page read and write
|
||
19B00F69000
|
trusted library allocation
|
page read and write
|
||
1A60115F000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
4F1000
|
stack
|
page read and write
|
||
17971E1C000
|
heap
|
page read and write
|
||
17959580000
|
heap
|
page execute and read and write
|
||
7FFB4AE61000
|
trusted library allocation
|
page read and write
|
||
179719E0000
|
heap
|
page read and write
|
||
7FFB4AF20000
|
trusted library allocation
|
page read and write
|
||
1BD1D2B1000
|
trusted library allocation
|
page read and write
|
||
1B25E000
|
stack
|
page read and write
|
||
17957990000
|
heap
|
page read and write
|
||
7FFB4AF90000
|
trusted library allocation
|
page read and write
|
||
19B00F7A000
|
trusted library allocation
|
page read and write
|
||
B2D5FA000
|
stack
|
page read and write
|
||
7FFB4AE7A000
|
trusted library allocation
|
page read and write
|
||
1BD0E488000
|
trusted library allocation
|
page read and write
|
||
19B00BF7000
|
trusted library allocation
|
page read and write
|
||
1A66CD40000
|
heap
|
page read and write
|
||
1BD0DEB9000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACAD000
|
trusted library allocation
|
page execute and read and write
|
||
5790A4E000
|
stack
|
page read and write
|
||
1795AEDB000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF70000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFB0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACC0000
|
trusted library allocation
|
page read and write
|
||
1BD25BB0000
|
heap
|
page read and write
|
||
1B332000
|
heap
|
page read and write
|
||
7FFB4AD8C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B060000
|
trusted library allocation
|
page read and write
|
||
1008BF000
|
stack
|
page read and write
|
||
1BD0CFB5000
|
heap
|
page read and write
|
||
1AE1D000
|
stack
|
page read and write
|
||
11C0000
|
heap
|
page read and write
|
||
1795B3AC000
|
trusted library allocation
|
page read and write
|
||
1BD255F0000
|
heap
|
page read and write
|
||
17957C50000
|
trusted library allocation
|
page read and write
|
||
1A6004CD000
|
trusted library allocation
|
page read and write
|
||
1A66B1D0000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
7FFB4B00C000
|
trusted library allocation
|
page read and write
|
||
7FFB4B0C0000
|
trusted library allocation
|
page read and write
|
||
17971BD0000
|
heap
|
page read and write
|
||
1AA5D000
|
stack
|
page read and write
|
||
5C3000
|
heap
|
page read and write
|
||
7FFB4B100000
|
trusted library allocation
|
page read and write
|
||
394327E000
|
stack
|
page read and write
|
||
7FFB4ACD0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B0E0000
|
trusted library allocation
|
page read and write
|
||
B2E54E000
|
stack
|
page read and write
|
||
7FFB4AE8A000
|
trusted library allocation
|
page read and write
|
||
B2CF9E000
|
stack
|
page read and write
|
||
394393C000
|
stack
|
page read and write
|
||
1A66CDBF000
|
heap
|
page read and write
|
||
B2E24F000
|
stack
|
page read and write
|
||
1006BE000
|
stack
|
page read and write
|
||
29B1000
|
trusted library allocation
|
page read and write
|
||
1D0FE000
|
stack
|
page read and write
|
||
1A66B400000
|
trusted library section
|
page read and write
|
||
7FFB4B030000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF20000
|
trusted library allocation
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
19B01781000
|
trusted library allocation
|
page read and write
|
||
1502000
|
heap
|
page read and write
|
||
7FFB4B0C0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE51000
|
trusted library allocation
|
page read and write
|
||
1A66D320000
|
heap
|
page read and write
|
||
17971D19000
|
heap
|
page read and write
|
||
7FFB4ACC0000
|
trusted library allocation
|
page read and write
|
||
19B6E554000
|
heap
|
page read and write
|
||
7FFB4AEA8000
|
trusted library allocation
|
page read and write
|
||
179579C0000
|
heap
|
page read and write
|
||
7FFB4ACDD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AF90000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFE0000
|
trusted library allocation
|
page read and write
|
||
1AE9D000
|
stack
|
page read and write
|
||
7FFB4B008000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE84000
|
trusted library allocation
|
page read and write
|
||
1A600229000
|
trusted library allocation
|
page read and write
|
||
1A66B460000
|
heap
|
page read and write
|
||
7FFB4B110000
|
trusted library allocation
|
page read and write
|
||
394357D000
|
stack
|
page read and write
|
||
7FFB4B012000
|
trusted library allocation
|
page read and write
|
||
990000
|
trusted library allocation
|
page read and write
|
||
19B6C16A000
|
heap
|
page read and write
|
||
124CB000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACC4000
|
trusted library allocation
|
page read and write
|
||
7FFB4B010000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF40000
|
trusted library allocation
|
page read and write
|
||
1BD0E901000
|
trusted library allocation
|
page read and write
|
||
19B6C130000
|
heap
|
page read and write
|
||
7FFB4ADD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ACB3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4ACB4000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACB0000
|
trusted library allocation
|
page read and write
|
||
B2D47D000
|
stack
|
page read and write
|
||
7FFB4AED0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACC0000
|
trusted library allocation
|
page read and write
|
||
17959450000
|
trusted library allocation
|
page read and write
|
||
5790BCE000
|
stack
|
page read and write
|
||
17957AF1000
|
heap
|
page read and write
|
||
1BD0EB40000
|
trusted library allocation
|
page read and write
|
||
7FFB4B0F0000
|
trusted library allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
7FFB4B000000
|
trusted library allocation
|
page read and write
|
||
3942F73000
|
stack
|
page read and write
|
||
1A61048C000
|
trusted library allocation
|
page read and write
|
||
19B6E256000
|
heap
|
page read and write
|
||
17957BD0000
|
heap
|
page read and write
|
||
7FFB4AF10000
|
trusted library allocation
|
page read and write
|
||
1A66B308000
|
heap
|
page read and write
|
||
19B6C18D000
|
heap
|
page read and write
|
||
1796987E000
|
trusted library allocation
|
page read and write
|
||
B2D2F9000
|
stack
|
page read and write
|
||
19B00001000
|
trusted library allocation
|
page read and write
|
||
A45000
|
heap
|
page read and write
|
||
19B0188D000
|
trusted library allocation
|
page read and write
|
||
7FFB4B03C000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF10000
|
trusted library allocation
|
page read and write
|
||
39436B7000
|
stack
|
page read and write
|
||
7FFB4AFB0000
|
trusted library allocation
|
page read and write
|
||
394363E000
|
stack
|
page read and write
|
||
A37000
|
heap
|
page read and write
|
||
1A66D4E0000
|
heap
|
page read and write
|
||
19B6E2AE000
|
heap
|
page read and write
|
||
1A6102F0000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
1A601210000
|
trusted library allocation
|
page read and write
|
||
1005FD000
|
stack
|
page read and write
|
||
7FFB4AF20000
|
trusted library allocation
|
page read and write
|
||
1BD0B855000
|
heap
|
page read and write
|
||
39439BE000
|
stack
|
page read and write
|
||
1BD0B4FE000
|
heap
|
page read and write
|
||
7FFB4AFC0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE70000
|
trusted library allocation
|
page read and write
|
||
33BE000
|
stack
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
19B6E414000
|
heap
|
page read and write
|
||
39435F9000
|
stack
|
page read and write
|
||
7FFB4ADE0000
|
trusted library allocation
|
page execute and read and write
|
||
19B102ED000
|
trusted library allocation
|
page read and write
|
||
1BD0CE80000
|
heap
|
page read and write
|
||
7FFB4ACD0000
|
trusted library allocation
|
page read and write
|
||
19B6E429000
|
heap
|
page read and write
|
||
7FFB4AE98000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF70000
|
trusted library allocation
|
page read and write
|
||
1A66D637000
|
heap
|
page read and write
|
||
1A600D7C000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACCD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AF00000
|
trusted library allocation
|
page read and write
|
||
1BD2589F000
|
heap
|
page read and write
|
||
7FFB4B130000
|
trusted library allocation
|
page read and write
|
||
7FFB4B01C000
|
trusted library allocation
|
page read and write
|
||
B2D27E000
|
stack
|
page read and write
|
||
179579A0000
|
heap
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
1A610070000
|
trusted library allocation
|
page read and write
|
||
1477000
|
heap
|
page read and write
|
||
19B6C154000
|
heap
|
page read and write
|
||
1B89A000
|
stack
|
page read and write
|
||
1A66D5D9000
|
heap
|
page read and write
|
||
17959A5D000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD86000
|
trusted library allocation
|
page read and write
|
||
1A601004000
|
trusted library allocation
|
page read and write
|
||
1795A6EC000
|
trusted library allocation
|
page read and write
|
||
17971E5C000
|
heap
|
page read and write
|
||
17957A84000
|
heap
|
page read and write
|
||
1A66B24B000
|
heap
|
page read and write
|
||
B2D77E000
|
stack
|
page read and write
|
||
394460C000
|
stack
|
page read and write
|
||
1A66B295000
|
heap
|
page read and write
|
||
7FFB4B010000
|
trusted library allocation
|
page read and write
|
||
19B01866000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE50000
|
trusted library allocation
|
page read and write
|
||
19B6C320000
|
heap
|
page read and write
|
||
7FFB4AEF0000
|
trusted library allocation
|
page read and write
|
||
19B01827000
|
trusted library allocation
|
page read and write
|
||
19B6C142000
|
heap
|
page read and write
|
||
579094E000
|
stack
|
page read and write
|
||
7FFB4AE52000
|
trusted library allocation
|
page read and write
|
||
19B6C3B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4B100000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADD0000
|
trusted library allocation
|
page execute and read and write
|
||
578FCF9000
|
stack
|
page read and write
|
||
100577000
|
stack
|
page read and write
|
||
7FFB4AEC0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACD4000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF40000
|
trusted library allocation
|
page read and write
|
||
1A601785000
|
trusted library allocation
|
page read and write
|
||
1BD0E2B6000
|
trusted library allocation
|
page read and write
|
||
B2E44D000
|
stack
|
page read and write
|
||
32B0000
|
heap
|
page execute and read and write
|
||
19B011D9000
|
trusted library allocation
|
page read and write
|
||
100A3B000
|
stack
|
page read and write
|
||
1BD0B4E6000
|
heap
|
page read and write
|
||
7FFB4B0D0000
|
trusted library allocation
|
page read and write
|
||
394337F000
|
stack
|
page read and write
|
||
144A000
|
heap
|
page read and write
|
||
1A601952000
|
trusted library allocation
|
page read and write
|
||
7DF477400000
|
trusted library allocation
|
page execute and read and write
|
||
1BD0E455000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF60000
|
trusted library allocation
|
page read and write
|
||
7FFB4AE80000
|
trusted library allocation
|
page execute and read and write
|
||
1A60186A000
|
trusted library allocation
|
page read and write
|
||
19B6C1B7000
|
heap
|
page read and write
|
||
19B6E27B000
|
heap
|
page read and write
|
||
124C8000
|
trusted library allocation
|
page read and write
|
||
17971D5E000
|
heap
|
page read and write
|
||
1B45E000
|
stack
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
17971CB0000
|
heap
|
page read and write
|
||
7FFB4B100000
|
trusted library allocation
|
page read and write
|
||
19B6DBF0000
|
trusted library allocation
|
page read and write
|
||
1A610031000
|
trusted library allocation
|
page read and write
|
||
10160C000
|
stack
|
page read and write
|
||
7FFB4ACDD000
|
trusted library allocation
|
page execute and read and write
|
||
1004FE000
|
stack
|
page read and write
|
||
578F9FA000
|
stack
|
page read and write
|
||
7FFB4B038000
|
trusted library allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
7FFB4AF70000
|
trusted library allocation
|
page read and write
|
||
19B01E00000
|
trusted library allocation
|
page read and write
|
||
17971AD4000
|
heap
|
page read and write
|
||
19B6DB70000
|
heap
|
page readonly
|
||
1BD0B4E8000
|
heap
|
page read and write
|
||
1BD0D0B0000
|
heap
|
page read and write
|
||
1A66D420000
|
heap
|
page read and write
|
||
7FFB4AFF0000
|
trusted library allocation
|
page read and write
|
||
1A66D28B000
|
heap
|
page read and write
|
||
B2D7FE000
|
stack
|
page read and write
|
||
1BD0D77E000
|
trusted library allocation
|
page read and write
|
||
5EF000
|
heap
|
page read and write
|
||
1A601120000
|
trusted library allocation
|
page read and write
|
||
2511000
|
trusted library allocation
|
page read and write
|
||
7FFB4ADC0000
|
trusted library allocation
|
page execute and read and write
|
||
1795ADF3000
|
trusted library allocation
|
page read and write
|
||
19B013C7000
|
trusted library allocation
|
page read and write
|
||
10083A000
|
stack
|
page read and write
|
||
1A66D62D000
|
heap
|
page read and write
|
||
1BD0B527000
|
heap
|
page read and write
|
||
1BD0B4E4000
|
heap
|
page read and write
|
||
7FFB4AD96000
|
trusted library allocation
|
page execute and read and write
|
||
586000
|
heap
|
page read and write
|
||
1BF4C000
|
stack
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
578F5FE000
|
stack
|
page read and write
|
||
19B012A8000
|
trusted library allocation
|
page read and write
|
||
1BD1D59E000
|
trusted library allocation
|
page read and write
|
||
19B6E42F000
|
heap
|
page read and write
|
||
17957A45000
|
heap
|
page read and write
|
||
17957A3F000
|
heap
|
page read and write
|
||
7FFB4AF50000
|
trusted library allocation
|
page read and write
|
||
17971D3F000
|
heap
|
page read and write
|
||
7FFB4B120000
|
trusted library allocation
|
page read and write
|
||
17CF000
|
stack
|
page read and write
|
||
7FFB4ACC0000
|
trusted library allocation
|
page read and write
|
||
E02000
|
heap
|
page read and write
|
||
1A601030000
|
trusted library allocation
|
page read and write
|
||
17957A08000
|
heap
|
page read and write
|
||
1BB80000
|
heap
|
page read and write
|
||
7FFB4B0CC000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEE0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD76000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF60000
|
trusted library allocation
|
page read and write
|
||
1A66B3E0000
|
heap
|
page read and write
|
||
1BD2593F000
|
heap
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
7FFB4B0B0000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
7FFB4ACC4000
|
trusted library allocation
|
page read and write
|
||
17971A12000
|
heap
|
page read and write
|
||
7FFB4AD50000
|
trusted library allocation
|
page read and write
|
||
19B01DDA000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFF4000
|
trusted library allocation
|
page read and write
|
||
24C1000
|
trusted library allocation
|
page read and write
|
||
7DF47F970000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4AE70000
|
trusted library allocation
|
page execute and read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
7FFB4AEC0000
|
trusted library allocation
|
page read and write
|
||
7DF47F960000
|
trusted library allocation
|
page execute and read and write
|
||
19B6C3C5000
|
heap
|
page read and write
|
||
1BD0D250000
|
trusted library allocation
|
page read and write
|
||
133C1000
|
trusted library allocation
|
page read and write
|
||
19B6E4B5000
|
heap
|
page read and write
|
||
7FFB4AD6C000
|
trusted library allocation
|
page execute and read and write
|
||
1A66B29A000
|
heap
|
page read and write
|
||
1BD25656000
|
heap
|
page read and write
|
||
7FFB4AE71000
|
trusted library allocation
|
page read and write
|
||
1007B8000
|
stack
|
page read and write
|
||
1A66B257000
|
heap
|
page read and write
|
||
7FFB4B0B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4AF40000
|
trusted library allocation
|
page read and write
|
||
17971DA4000
|
heap
|
page read and write
|
||
7FFB4ACBD000
|
trusted library allocation
|
page execute and read and write
|
||
19B6DCF0000
|
heap
|
page read and write
|
||
1BD0B52B000
|
heap
|
page read and write
|
||
7FFB4AD86000
|
trusted library allocation
|
page execute and read and write
|
||
394458E000
|
stack
|
page read and write
|
||
19B00F75000
|
trusted library allocation
|
page read and write
|
||
7FFB4AD56000
|
trusted library allocation
|
page read and write
|
||
7FFB4B116000
|
trusted library allocation
|
page read and write
|
||
19B010BF000
|
trusted library allocation
|
page read and write
|
||
1A66CCD7000
|
heap
|
page execute and read and write
|
||
10168E000
|
stack
|
page read and write
|
||
7FFB4B020000
|
trusted library allocation
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
17971DB8000
|
heap
|
page read and write
|
||
9B0000
|
trusted library allocation
|
page read and write
|
||
7FFB4ACCB000
|
trusted library allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
1A66CEF0000
|
trusted library allocation
|
page read and write
|
||
17971CD1000
|
heap
|
page read and write
|
||
1BD0F0D7000
|
trusted library allocation
|
page read and write
|
||
5C1000
|
heap
|
page read and write
|
||
17971A3D000
|
heap
|
page read and write
|
||
17971D11000
|
heap
|
page read and write
|
||
1BD25632000
|
heap
|
page read and write
|
||
7FFB4AE60000
|
trusted library allocation
|
page read and write
|
||
1141000
|
stack
|
page read and write
|
||
1A66B410000
|
trusted library section
|
page read and write
|
||
7FFB4AE94000
|
trusted library allocation
|
page read and write
|
||
7FFB4AFE3000
|
trusted library allocation
|
page read and write
|
||
1795A5C2000
|
trusted library allocation
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
1BD255FB000
|
heap
|
page read and write
|
||
578FB7D000
|
stack
|
page read and write
|
||
1428000
|
heap
|
page read and write
|
||
7FFB4AF90000
|
trusted library allocation
|
page read and write
|
||
1BD25951000
|
heap
|
page read and write
|
||
7FFB4B0E0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB4B030000
|
trusted library allocation
|
page read and write
|
||
17971B36000
|
heap
|
page execute and read and write
|
There are 960 hidden memdumps, click here to show them.